Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MPLS-Enabled Applications: Emerging Developments and New Technologies

Buy
Our aim in writing this book was to describe the latest developments
in MPLS. The field is moving so fast that some new applications of
MPLS have already been deployed in production networks, yet are
not described anywhere in book form. In many cases, the only
available resources are the IETF drafts which list the extensions
that vendors must implement in order to produce interoperable
implementations. These documents often assume familiarity with
the problem at hand and omit the details on why a particular solution
has been chosen or what are the pros and cons of using it. This book
attempts to fill this gap and provide the reader with an understanding
of both the problem and why the solution looks the way
it does.

Therefore, when we describe the protocol mechanisms underpinning
an MPLS application, the emphasis is on giving an overview of
the protocol machinery without delving into the bits and bytes of
each protocol message. This allows us to convey the concepts without
making it difficult to see the wood for the trees. Also, some of the
mechanisms that we write about are currently being defined, so some
of the details of the protocol messages may change, but the concepts
are less likely to. References at the end of each chapter point to the
documents describing the message formats and processing rules.

Although we both happen to work for the same router vendor, the
book is not vendor-specific. Occasionally we point out some vendorspecific
quirks, if they are relevant to the discussion at hand or aid in
understanding any particular topic. Many of the topics discussed are
still under discussion and debate in the IETF, and naturally sometimes
our personal views on one topic or another may be stated more
strongly than the opposing view.
(HTML tags aren't allowed.)

Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
Server Disk Management in a Windows Environment
Server Disk Management in a Windows Environment

Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server downtime. Combine this fact with the skyrocketing TCO of data storage management, and it is apparent that server disk management is a subject deserving of much more scrutiny.

...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...

DirectX 3D Graphics Programming Bible
DirectX 3D Graphics Programming Bible
Microsoft DirectX 7 gives you the APIs you need to create cutting-edge Windows 3D games and simulations using C or C++. With helpful tutorials, plenty of illustrations, and a minimum of math, this unique guide shows you how to master these APIs and take your graphics programming to the next level, whether you're an animation beginner or a veteran...
JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
Orthopaedic Key Review Concepts
Orthopaedic Key Review Concepts
Many changes have occurred in recent years to produce an increase in the amount of orthopaedic informationтАФinformation which residents will ultimately see in their conferences, on their in-training examination, and during their boards. Today's residents can access this information from a myriad of sources: the AAOS, the...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy