Active Directory: An Overview. (1999, June). In Windows IT Pro. Retrieved 05:13, February 24, 2008, from http://www.windowsitlibrary.com/Content/155/07/1.html Hein, Gary. Active Directory: How Does It Measure Up?.
Networking Channel Tips. Retrieved May 25, 2008, from Search Network Chennel .com: http://searchnetworkingchannel.techtarget.com/tip/0,289483,sid100_gci1230006,00.html Mitchell, B. (1999). Swith (network switch). Retrieved May 22, 2008, from computer networking about.com: http://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htm Varadarajan, S. (2006).
But a new technology called Multiprotocol Label Switching (MPLS) is changing all that. With MPLS, you can support all the above applications on an IP network without having to run large subsets of the network with completely different transport mechanisms, routing protocols, and addressing plans. Although the standard is a work in progress, many vendors and service providers are announcing MPLS products and services. As such, now seems like a good time to learn how the technology works, how it can be deployed, and what issues still need to be addressed. MPLS operates at an OSI Model layer that is generally considered to lie between traditional definitions of Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a "Layer 2.5" protocol.
Survey on Routing Techniques supporting Mobility in Sensor Networks [online]. Available: http://www.hindawi.com/journals/asp/2009/750657.htm1.  B.WANG, J. ZHANG, W. CHEN, and Y.fei GUO, “A Fast Reroute Mechanism for RIP Protocol,” Circuits, Communications and Systems, 2009. PACCS '09. Pacific-Asia Conference, pp.
(2006, 01). SSH Protocol Architecture. Retrieved from IETF: http://www.ietf.org/rfc/rfc4251.txt Nieminen, M. (2006, 07). SearchSecurity. Retrieved from Techtarget: http://searchsecurity.techtarget.com/definition/Transport-Layer-Security-TLS Pintello, T. (2013).
Internet Ware Cloud Computing :Challenges Available at: http://arxiv.org/ftp/arxiv/papers/1004/1004.1746.pdf [Accessed 06 May 2011]. Goldworm, B & Skamarock, A. 2007. Blade Servers and Virtualization . Indiana : Wiley Publishing Hurwitz, J. Bloor, R. Kaufman, M. & Halper, F. , 2010.
Available at: http://www.information-management.com/authors/1073510.html (accessed December 1, 2013) Shepherd, J. 2004. Information Management. Data Migration Strategies. Available at: http://www.information-management.com/authors/30632.html (accessed December 1, 2013) Sudipto, D. Nishumura, S. Agrawal, D. A, E, Abbadi (2010).
Available: http://www.accel-networks.com/blog/index.php?q=/2009/09/what-is-layer-2-and-why-should-you-care.htm. Last accessed 23 March 2010. Kozierok, C M. (2005). Data link layer (layer 2). Available: http://www.tcpipguide.com/free/t_DataLinkLayerLayer2.htm.
http://lists.w3.org/Archives/Public/public-html/2010Jan/0107.html  Ian Hickson. (2009, October) HTML5 at Last Call. [Online]. http://blog.whatwg.org/html5-at-last-call  John Dowdell. (2009, June) Adobe on HTML5.
“W3C Architecture domain”, Naming and Addressing: URI’s, URL’s. Messmer, ellen. (Jun, 2013). “Network world” Garthner reveals Top 10 IT Security Myths. Retrived from: http://www.networkworld.com/article/2167176/lan-wan/gartner-reveals-top-10-it-security-myths.html R.Fielding (June, 1999).