Provides networking professionals crucial information for designing large-scale remote access solutions, including state-of-the-art Virtual Private Networks (VPNs) and business implementations. DLC: PPP (Computer network protocol).
"synopsis" may belong to another edition of this title.
Security may be the single biggest impediment to the truly distributed workforce, in which telecommuters and remote consultants can collaborate on equal terms with those on a local area network (LAN). Virtual private networks (VPNs), underpinned by robust and secure PPP and L2TP connections, are emerging as a solution. In PPP and L2TP: Remote Access Communications, Uyless Black (perhaps best known for his Voice Over IP), explains both connectivity solutions in terms that are a bit academic but clearly less so than the raw protocol specifications to which he makes frequent reference. You'll appreciate his approach if you're a step removed from the technicalities of L2TP and PPP (perhaps as a salesperson or manager), or if you're a network programmer looking for an introduction that will allow you to approach further research intelligently.
The most valuable parts of Black's book are those in which he describes the "conversations" that occur between network nodes. Using lots of prose and plenty of state diagrams, flow charts, and packet diagrams, the author makes it clear which node sends what signals, when and why, and how those signals affect the condition of the system as a whole. Though Black's explanations are in depth, you may want to supplement this book with others that provide more details about specific remote connectivity technologies. PPP Design and Debugging is the definitive work on its subject, while L2TP: Implementation and Operation has a lot of useful things to say about that emerging standard. IP Sec is worth studying too. --David Wall
Topics covered: PPP, Layer 2 Tunneling Protocol (L2TP), and their applications to distributed networking; explores the signals that make up the data link layer in depth to show how PPP establishes and controls connections with its Link Control Protocol (LCP) and Network Control Protocol (NCP); PPP security and Multilink Protocol (MP); and L2TP coverage includes information on the protocol's relationships with the IP Secure standard and physical networks of various kinds (including frame relay and Mobile PPP).From the Inside Flap:
This book is one in a series of books called, "Emerging Communications Technologies." As the name of the book implies, the focus is on the Point-to-Point Protocol, and the Layer 2 Tunneling Protocol (L2TP).
The subject matter of this book is vast and my approach is to provide a system view of the topic. In consonance with the intent of this series, this general survey also has considerable detail, but not to the level of detail needed to design a system. For that, I leave you to your project team and the various specifications that establish the standards.
This book is considered to be at an intermediate-to-advanced level. As such, it assumes the reader has a background in data communications and the internet protocol suite. Notwithstanding, for the new reader, I have provided several tutorials and guide you to them in the appropriate parts of the book.
I hope you find this book a valuable addition to your library. CREDITS
I have relied on several Internet Request for Comments (RFCs) and Internet Drafts in certain chapters in this book. In some cases, I have summarized the RFCs with a short tutorial, and in other cases, I have extracted key points from the documents. I have so noted these instances in the appropriate part of the book.
Keep in mind that the Internet Drafts are works in progress, and should be viewed as such. You should not use the drafts with the expectation that they will not change. Notwithstanding, if used as general tutorials, the Drafts discussed in this book are "final enough" to warrant their explanations.
For all the internet standards and draft standards the following applies:
Copyright The Internet Society (1998). All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included in all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.
"About this title" may belong to another edition of this title.
Book Description Prentice Hall 1999-10-15, 1999. TEXTBOOK BINDING. Book Condition: New. 0130224626 BRAND NEW. A portion of your purchase of this book will be donated to non-profit organizations. Over 1,000,000 satisfied customers since 1997! We ship daily M-F. Choose expedited shipping (if available) for much faster delivery. Delivery confirmation on all US orders. Bookseller Inventory # Z0130224626ZN
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801302246201.0
Book Description Hardcover. Book Condition: BRAND NEW. BRAND NEW. Fast Shipping. Prompt Customer Service. Satisfaction guaranteed. Bookseller Inventory # 0130224626BNA