Selecting MPLS VPN Services

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

QoS

     application trust

    at Layer 2

         service requirements

     classes of service in SP IP core

     configuring on switch devices

    CoS

         ToS

     data traffic requirements

     device trust

    DiffServ

         Pipe tunneling mode

         Short-Pipe tunneling mode

         tunneling modes

         Uniform tunneling mode

     implementing

    LLQ

         bandwidth provisioning

    marking schemes

         as service provider selection criteria 2nd

     on backup connections

    on SP networks

         CoS requirements

         transparency requirements

     packet classification 2nd

     policing

     premigration considerations 2nd

     sample policy template

     service models

    service requirements

         bandwidth

         jitter

         packet delay

         packet loss

    subscriber network design

         baselines, creating

         developing 2nd

     traffic shaping

         FRTS

     trust boundaries

     trusted edge

     video traffic requirements

     voice traffic requirements

     VoIP bandwidth provisioning

QoS policies

QoS reporting

QoS signaling

quadruple-play service bundles

queuing

     TX ring buffer

queuing algorithms

     WRED

Категории