Cisco Knowledge Suite Cisco SystemsCisco Press
   

   
Home
MyCKS
Cutting Edge
Certification
Core Reference
Guided Learning
   
Networking Architecture
LAN
WAN
Switching
Internet Protocols (IP)
Network Protocols
Transport and Application Protocols
Desktop Protocols
Security and Troubleshooting
Network Resources and Management
Integrated Services
 

ATM Networks and Security

by Eva Bozoki - May 30, 2000

ATM Networks and Security

1. Introduction

 

2. ATM Connections

 

3. ATM Protocol Basics

 

4. Attacks

 

5. Security Measures

 

6. Placement of the User Plane Security Services

 

7. Secure Call Setup Protocol

 

8. Conclusion

 

Acknowledgement

 

References

 

About the Author

 
   

8. Conclusion

ATM technology has come of age. Not only is its popularity increasing, but it is also quickly becoming the underlying technology for high-speed networks. ATM is flexible enough to deliver different classes of traffic (voice, video, or user data), each with different QoS, and then to deliver that traffic at low or high speeds. ATM is also increasingly used to carry other protocols (such as IP over ATM or voice over ATM). As a result, providing network integrity and secure communication, including authentication and privacy, is paramount. A great deal of work was already done in this respect, but some problems must be solved, and all concerned parties must accept interoperability standards.

 

Previous | Next

 

 

Breaking News

One of the primary architects of OpenCable, Michael Adams, explains the key concepts of this initiative in his book OpenCable Architecture.

Expert Advice

Ralph Droms, Ph.D., author of The DHCP Handbook and chair of the IETF Dynamic Host Configuration Working Group, guides you to his top picks for reliable DHCP-related information.

Just Published

Residential Broadband, Second Edition
by George Abe

Introduces the topics surrounding high-speed networks to the home. It is written for anyone seeking a broad-based familiarity with the issues of residential broadband (RBB) including product developers, engineers, network designers, business people, professionals in legal and regulatory positions, and industry analysts.

             
     

From the Brains at InformIT

|

Contact Us

|

Copyright, Terms & Conditions

|

Privacy Policy

 

© Copyright 2000 InformIT. All rights reserved.