nod.se

min knutpunkt i tillvaron
or the homepage of
Niklas Ögren
Home

Links & References

Similar reports

Anders Roxenhag

For some earlier numbers regarding performance:
Lie and Madeleine, title. Lie and Madeleine, Final

IPSec end-to-end security: will it change the design of future networks?
Andreas, ipsec fw

Future Security in Wireless LAN Networks
Moioli

Alberto Escudero He considers the case when even the pair communicating do not what to reveal where they are. One aspect of this is that he can splice in a new path (this is also important to allow mobility).

Ronnie Bodinger, An MPLS Connection Manager in an Edge Router

Daliang Wen, MPLS Label Distribution in an Edge Router

Kerry S. Lowe, Web based management of an Edge Router

All references from my report

  1. Extreme Networks, Leveraging MPLS to enhance network transport capabilities
    http://www.extremenetworks.com/technology/whitepapers/MPLS.asp
    Accessed on 2002-01-15.

  2. Extreme Networks, MPLS Installation and User Guide
    http://www.extremenetworks.com/support/documentation/MPLSInstall.pdf
    Accessed on 2002-02-01

  3. Extreme Networks, Tech Brief Extreme Networks VMAN
    http://www.extremenetworks.com/technology/whitepapers/vMAN.asp
    Accessed on 2002-02-04

  4. Extreme Networks, ExtremeWare Manual 6.2
    http://www.extremenetworks.com/support/TechnicalDocumentationSoftware.asp

  5. Bay Networks, Spanning Tree Algorithm
    http://support.baynetworks.com/library/tpubs/html/router/soft1000/bridge/2950A-19.html
    Accessed on 2002-01-15.

  6. I. Pepelnjak and J. Guichard, MPLS and VPN Architecture, Cisco Press, Indianapolis, 2000

  7. E. Rosen and Y. Rekhter, BGP/MPLS VPNs, RFC 2547, 1999

  8. E. Rosen et al. Use of PE-PE IPsec in RFC2547 VPNs
    http://www.ietf.org/internet-drafts/draft-ietf-ppvpn-ipsec-2547-01.txt
    Accessed on 2002-05-15

  9. C. Davis, IPSec: Securing VPNs, McGraw-Hill, Berkeley, California, 2001

  10. P. Tomsu and G. Wieser, MPLS-Based VPNs, Prentice Hall, New Jersey, 2001

  11. P. Tomsu and G. Wieser, MPLS-Based VPNs, Prentice Hall, New Jersey, 2001, page 81

  12. ASL, Protocol Decode Chart
    http://www.decodes.co.uk/content/chart.htm
    Accessed on 2002-02-04

  13. IEEE Standard 802.1Q-1998, IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks, 1998

  14. T. Greene, RapidStream gets to the (Check) Point
    http://www.nwfusion.com/news/2002/0121infra.html
    Accessed on 2002-02-22

  15. A. Valencia, M. Littlewood, and T. Kolar, Cisco Layer Two Forwarding (Protocol) "L2F", RFC 2341, 1998

  16. K. Hamzeh, et al. Point-to-Point Tunneling Protocol (PPTP), RFC 2637, 1999

  17. W. Townsley, et al. Layer two Tunneling Protocol (L2TP), RFC 2661, 1999

  18. W. Townsley, et al. Layer two Tunneling Protocol Version 3 (L2TPv3), draft-ietf-l2tpext-l2tp-base-02.txt, March 2002

  19. Riverstone Networks, Riverstone Networks introduces new ring resiliency system for Ethernet access networks
    http://www.riverstonenet.com/news/press/20011105-1.shtml
    Accessed on 2002-03-22

  20. N. Slabakov, Spanning Tree: Death is Not an Option
    http://www.riverstonenet.com/technology/spanning_tree.shtml
    Accessed on 2002-03-25

  21. IEEE Standard 802.1w-2001, IEEE Standards for Local and Metropolitan Area Networks: Common specifications, Part 3 Amendment 2: Rapid reconfiguration, 2001

  22. D. Awduche, RSVP-TE: Extensions to RSVP for LSP Tunnels, RFC 3209, 2001
no (a) nod se