Virtual Private Networking
Prentice Hall (Verlag)
978-0-13-020335-9 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
PLEASE PROVIDE
VPNs are rapidly becoming the networking technology of choice for companies that want to link their locations, customers, and/or suppliers cost-effectively. This hands-on, "in-the-trenches" guidebook cuts through the VPN hype, helping any network professional build, secure, and manage a VPN successfully. The book covers both business and technical aspects of VPN consideration, planning, design, implementation, and ongoing management. Discover what VPNs are and how they work; make the business case for building a VPN; and determine whether to build it yourself or outsource it to an Internet service provider. Compare VPN deployment models; understand the L2TP tunneling protocol; learn your options for providing consistent Quality of Service and service-level guarantees; and more. The book also contains six detailed case studies; a full chapter on service provider VPN offerings; and a preview of the future of VPNs.
Bruce Perlmutter is Senior Engineer at Nortel Networks in Billerica, MA, where he designs and builds VPN products for Nortel. Jonathan L. Zarkower is Product Manager at Nortel Networks in Billerica, MA
1. Introduction.
Networking 101. An Abridged Evolution of the Internet. So What Is a VPN Anyway? Goals of This Book.
2. The Networking Evolution to VPNs.
Voice VPNs. Wide Area Branch Office and Backbone Networks. Remote Access. Electronic Commerce. SNA Networks. The Internet and IP. Conclusions.
3. The Business Case for VPNs.
The Enterprise Customer. From the Service Provider's Perspective.
4. Tunneling.
VPN Models. VPN Tunneling Protocols.
5. VPN Products and Solutions.
Software-Based VPN Solutions. Hardware-Based VPN Solutions. Service Provider.located VPN Products. Summary.
6. The Enterprise Environment for VPNs.
Authentication Services. Public Key Infrastructure. The Lightweight Directory Protocol (LDAP). Address management. Name Services. Quality of Service. Fixed Qos Mechanism: Entry Priority, Queueing, Shaping, and Preprovisioning. Summary.
7. The Service Provider Environment for VPNs.
A Large-scale L2TP Deployment. Modem Provisioning and Dial Number Planning. Pricing Models and Billing Services. Network Management. VPN Provisioning. Summary.
8. A Look Ahead.
Cellular Telephony and VPNs. VPN Applications in Broadband Access Networks. Multicasting Protocols in the VPN Environment. Multiprotocol Label Switching (MPLS). IP Version 6-IPv6. The Advanced Encryption Standard (AES). Biometric Authentication Methods. Summary. The Light at the End of the Tunnel.
Index.
Erscheint lt. Verlag | 19.1.2000 |
---|---|
Verlagsort | Upper Saddle River |
Sprache | englisch |
Gewicht | 742 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Informatik ► Weitere Themen ► Hardware | |
ISBN-10 | 0-13-020335-1 / 0130203351 |
ISBN-13 | 978-0-13-020335-9 / 9780130203359 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich