Home
Links & References
Similar reports
Anders Roxenhag
For some earlier numbers regarding performance:
Lie and Madeleine, title.
Lie and Madeleine, Final
IPSec end-to-end security: will it change the design of future networks?
Andreas, ipsec fw
Future Security in Wireless LAN Networks
Moioli
Alberto Escudero
He considers the case when even the pair communicating do not what to reveal where they are. One aspect of this is that he can splice in a new path (this is also important to allow mobility).
Ronnie Bodinger, An MPLS Connection Manager in an Edge Router
Daliang Wen, MPLS Label Distribution in an Edge Router
Kerry S. Lowe, Web based management of an Edge Router
All references from my report
- Extreme Networks, Leveraging MPLS to enhance network transport capabilities
http://www.extremenetworks.com/technology/whitepapers/MPLS.asp
Accessed on 2002-01-15.
- Extreme Networks, MPLS Installation and User Guide
http://www.extremenetworks.com/support/documentation/MPLSInstall.pdf
Accessed on 2002-02-01
- Extreme Networks, Tech Brief Extreme Networks VMAN
http://www.extremenetworks.com/technology/whitepapers/vMAN.asp
Accessed on 2002-02-04
- Extreme Networks, ExtremeWare Manual 6.2
http://www.extremenetworks.com/support/TechnicalDocumentationSoftware.asp
- Bay Networks, Spanning Tree Algorithm
http://support.baynetworks.com/library/tpubs/html/router/soft1000/bridge/2950A-19.html
Accessed on 2002-01-15.
- I. Pepelnjak and J. Guichard, MPLS and VPN Architecture, Cisco Press, Indianapolis, 2000
- E. Rosen and Y. Rekhter, BGP/MPLS VPNs, RFC 2547, 1999
- E. Rosen et al. Use of PE-PE IPsec in RFC2547 VPNs
http://www.ietf.org/internet-drafts/draft-ietf-ppvpn-ipsec-2547-01.txt
Accessed on 2002-05-15
- C. Davis, IPSec: Securing VPNs, McGraw-Hill, Berkeley, California, 2001
- P. Tomsu and G. Wieser, MPLS-Based VPNs, Prentice Hall, New Jersey, 2001
- P. Tomsu and G. Wieser, MPLS-Based VPNs, Prentice Hall, New Jersey, 2001, page 81
- ASL, Protocol Decode Chart
http://www.decodes.co.uk/content/chart.htm
Accessed on 2002-02-04
- IEEE Standard 802.1Q-1998, IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks, 1998
- T. Greene, RapidStream gets to the (Check) Point
http://www.nwfusion.com/news/2002/0121infra.html
Accessed on 2002-02-22
- A. Valencia, M. Littlewood, and T. Kolar, Cisco Layer Two Forwarding (Protocol) "L2F", RFC 2341, 1998
- K. Hamzeh, et al. Point-to-Point Tunneling Protocol (PPTP), RFC 2637, 1999
- W. Townsley, et al. Layer two Tunneling Protocol (L2TP), RFC 2661, 1999
- W. Townsley, et al. Layer two Tunneling Protocol Version 3 (L2TPv3), draft-ietf-l2tpext-l2tp-base-02.txt, March 2002
- Riverstone Networks, Riverstone Networks introduces new ring resiliency system for Ethernet access networks
http://www.riverstonenet.com/news/press/20011105-1.shtml
Accessed on 2002-03-22
- N. Slabakov, Spanning Tree: Death is Not an Option
http://www.riverstonenet.com/technology/spanning_tree.shtml
Accessed on 2002-03-25
- IEEE Standard 802.1w-2001, IEEE Standards for Local and Metropolitan Area Networks: Common specifications, Part 3 Amendment 2: Rapid reconfiguration, 2001
- D. Awduche, RSVP-TE: Extensions to RSVP for LSP Tunnels, RFC 3209, 2001
|