Summary

This chapter started with a discussion of common, available functionality such as security and IP addressing options. These capabilities are implemented in different ways with different protocols in the more-sophisticated architectures (or are not implemented at all in simple bridging). Building on the functionality overview, the enabling protocols were identified, and then, where present, were located in the protocol stacks and described in the connectivity discussions for each architecture. Each DSL network architecture also presented guidelines for consideration of implementation. Finally, outside the local loop DSL environment itself, virtual private networking and MPLS were described.

The following review questions allow you to test ...

Get End-to-End DSL Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.