Selecting MPLS VPN Services

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

backdoor links

backhoe fade

backscatter traceback 2nd

backup connections

     QoS implementations

bandwidth

     of CE-to-PE links

     QoS service requirement

bandwidth consumption

bandwidth provisioning for LLQ

bandwidth requirements for services

     conversational/realtime services

     interactive services

     noninteractive services

     streaming services

     triple-play service bundles

baselines

     creating

best-effort data traffic

best-effort service 2nd

best-effort service model

BGP

     CE-to-PE routing configuration

    convergence

         tuning

     deploying in Site Type A sites

         high availability issues

     deploying in Site Type B sites

     deploying in Site Type C sites 2nd

     deploying in Site Type D sites

Bidir-PIM

black-hole filtering

     enterprise network susceptibility to

bogons

Bollapragada, Vijay

botnets

     architecture of

     attacks, automating

     identification tools

boundary ACLs

bulk background traffic

bulk data

Категории