AVPNAdvanced Vpn
AVPNATM (Automated Teller Machine) Virtual Private Network
AVPNAT&T Virtual Private Network
References in periodicals archive ?
The policing parameter assignment function sets the parameters used in AVPN traffic control.
This policy also needs the support of a CCM to regulate access to the AVPN, resulting in an additional overhead in the private domain.
In this strategy, AVPN access control is regulated by the public network.
From all the preceding considerations, it follows that the architecture of an ATM XC must have a large degree of flexibility to be able to support the emerging AVPN strategies [1, 2].
As we shall see, bandwidth management will depend on the AVPN strategy used.
Connectionless traffic is handled by AVPN in the same way as bursty traffic, with the basic difference that an idle VC must be assigned to the incoming datagram.
From the preceding considerations, it is clear that the management of an AVPN requires close collaboration between the LCM, the CCM, and the public ATM network manager.
The AVPN to be embedded in the mesh topology comprises the six encircled nodes.
However, when the ATM residual capacities are of the same order as the AVPN traffic flows, the resulting virtual topology tends to include more links, since the traffic must be split over multiple paths.
The cost advantage increases dramatically as the AVPN size increases.
For example, gateways might have to be installed to link AVPNs so that traffic can flow from one AVPN to another.