Selecting MPLS VPN Services

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

packet classification 2nd

packet delay

     QoS service requirement

packet loss

     causes of

     QoS service requirement

packets

     out-of-sequence reordering

    with spoofed bogon addresses

         tracking

PAP (Password Authentication Protocol)

passive fault management

     customer traffic monitoring

     network events, capturing

password management

PE

     automated configuration

PE routers

     route limiting

PE-CE links

     monitoring

PE-PE links

     monitoring

PE-to-CE routing

     with EIGRP

         metric propagation

         multiple VRF support

per-customer firewalls within provider network

per-destination load balancing

per-packet load balancing

performance characteristics

     incorporating into SLAs

performance issues

     troubleshooting

performance targets

     for conversational/realtime services

     for interactive services

     for streaming services

performance-reporting portals

performing site surveys

     required tasks

PIM

     Bidir-PIM

     default interface configuration mode

     SSM

PIM-DM

PIM-SM 2nd

     RP

Pipe mode MPLS tunneling

Pipe tunneling mode

plaintext password authentication

point-to-point technologies

policing

policing traffic

policy-based routing

positioning

     multicast boundaries

PPP (Point-to-Point Protocol)

PPPoA (Point-to-Point Protocol over Ethernet)

PPPoE (Point-to-Point Protocol over Ethernet)

prefragmentation

premigration considerations

     relating to coverage and topology

     relating to customer edge route management

     relating to hosting capability

     relating to inter-provider IP/VPN implementation

     relating to Internet access

     relating to IP telephony call agenet

     relating to IP telephony PSTN integration

     relating to IPv6

     relating to MTU

     relating to multicast capability

     relating to network access

     relating to QoS capability 2nd

     relating to remote access

     relating to routign protocol capability

    relating to routing protocol capability

         SLAs

     relating to security

     relating to software deployment process

preparing for attacks

proactive fault management

     on service provider network 2nd

         case study 2nd

proactive monitoring 2nd 3rd 4th 5th

     of PE-PE LSPs 2nd

project management methods

propagation delay

protecting against Internet worms 2nd

provider WAN infrastructure

     susceptibility to attacks

provisioning

     CE provisioning

     PE configuration

     zero-touch deployment

provisioning VoIP bandwidth

provisionless VPWS-based services

public Frame Relay networks

     bandwidth sharing

pull model

push model

Категории