Atjaunināt sīkdatņu piekrišanu

E-grāmata: MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization

  • Formāts: 432 pages
  • Izdošanas datums: 06-Nov-2006
  • Izdevniecība: Cisco Press
  • Valoda: eng
  • ISBN-13: 9781587054228
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 26,30 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 432 pages
  • Izdošanas datums: 06-Nov-2006
  • Izdevniecība: Cisco Press
  • Valoda: eng
  • ISBN-13: 9781587054228
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Understand the business case for deploying MPLS-based services and solutions





Provides network managers and architects a precise MPLS primer Defines MPLS service problems and their associated solutions Includes ROI models for MPLS-based solutions Discusses pros and cons of various options for each MPLS service

Network managers often question the value that MPLS brings to their business environment. This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions. The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies. Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers. Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network. These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company's bottom-line. ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation. Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation. In short, you can use this comprehensive guide to understand and build a business case for the inclusion of MPLS in your network.

Papildus informācija

Network managers often question the value that MPLS brings to their business environment. This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions. The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies. Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers. Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network. These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company's bottom-line. ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation. Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation. In short, readers can to use this comprehensive guide to understand and build a business case for the inclusion of MPLS in their networks.
Introduction xxii
Part 1 The Business Case for MPLS
1(56)
The Dynamics of Service Creation and Deployment
3(28)
Industry Dynamics and Challenges
4(3)
What About the Enterprise Market?
7(2)
Service Provider Business Engineering
7(2)
Business Drivers and Requirements
9(5)
Enterprise Customers
10(1)
Enterprise Motivations for Migrating to Layer 3 Services
11(3)
Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself
14(4)
Do-It-Yourself
15(1)
Enterprise Segmentation
16(2)
Central Services with an Enterprise Campus
18(1)
Subscribing to a Managed Layer 3 MPLS VPN Service
18(4)
The Case for Building VPNs---Layer 2 or Layer 3
22(4)
Existing Technologies---Frame Relay, ATM, and IP-Based Networks: What Can They Solve?
26(1)
Frame Relay
26(2)
Asynchronous Transfer Mode
27(1)
The Internet Protocol
28(1)
Service Examples
29(1)
Summary
30(1)
The Scope of Service Types
31(26)
Overview of Layer 2 Services
34(5)
Ethernet Services
35(4)
Next-Generation Network Overview and Interworking Functions
39(3)
Layer 3 Services
42(3)
Remote Access
45(3)
Value-Added Services
48(7)
Summary
55(2)
Part 2 The Technical Case for MPLS
57(46)
Technology Overview: Making the Technology case for MPLS and Technology Details
59(44)
Available Technologies and Options
60(2)
Why MPLS? (High-Level Detail)
62(4)
MPLS and Quality of Service
66(5)
Differentiating Service with Traffic Engineering
69(1)
Multicast
70(1)
Benefits
71(3)
MPLS Technology Details
74(1)
Layer 3 VPNs
75(8)
Peer-to-Peer Model
77(1)
VRF and Its Function
78(2)
MPLS Label Stack Role
80(1)
Topologies
81(2)
Carrier Supporting Carrier and Inter-Provider Autonomous Systems
83(1)
Traffic Engineering
84(7)
DiffServ
91(4)
Layer 2 VPNs
95(6)
Summary
101(2)
Part 3 MPLS Services and Components
103(198)
Layer 2 VPNs
105(34)
Taxonomy
108(3)
Introducing AToM
111(9)
Pseudowire Systems Architecture
112(2)
Packet Forwarding
114(1)
Layer 2 Transport Types (Like-to-Like)
115(1)
Ethernet Service
115(1)
Link Layer Service
116(1)
Frame Relay Service
116(1)
ATM Service
117(1)
Configuration of Pseudowires
118(2)
Layer 2 Interworking
120(3)
Interworking Modes
121(1)
Interworking Models and Applications
121(2)
Virtual Private LAN Service
123(1)
Considerations for VPLS
123(1)
Provisioning and Signaling
124(8)
LDP Signaling
126(2)
BGP Signaling
128(4)
Benefits of L2VPNs
132(3)
Inter-AS L2VPNs
135(1)
Supported IETF Standards
136(1)
Summary
137(1)
Standards and References
138(1)
Layer 3 VPNs
139(24)
Technology Overview
141(5)
Separation of Routing Information Between VPNs
141(1)
Constrained Distribution of Routing Information
142(2)
Forwarding Packets Through the Network Core
144(1)
Packet Flow Through the Network
145(1)
Corporate Intranet
146(2)
Corporate Extranet
148(1)
Internet Access
149(5)
Dedicated per-VPN Internet Access
151(1)
Shared PE---Internet and VPN
151(1)
Dedicated PE---Shared Backbone
152(1)
Managed Central Service---Shared Internet Access
152(2)
Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks
154(2)
Inter-AS VPNs
154(1)
Carrier Supporting Carrier
155(1)
Heterogeneous Networks
156(1)
Managed Central Services
157(4)
Making Applications and Services VRF-Aware
158(1)
VRF-Aware Address Management
159(2)
Supported IETF Drafts
161(1)
Summary
162(1)
Standards and References
162(1)
Remote Access and IPSec Integration with MPLS VPNs
163(14)
Technology Overview
164(9)
Dial Access
166(1)
Individual Access
167(1)
CE Dial Backup Access
168(1)
Dial-Out Access
169(1)
DSL Access
170(1)
Routed Encapsulation
171(1)
Bridged Encapsulation
171(1)
Cable Access
172(1)
PE-CE Routing Protocols
173(1)
Scalability and Network Convergence for Remote Access
174(1)
Summary
175(2)
MPLS Security
177(46)
Security and NGN
178(2)
Security Overview and MPLS
180(4)
MPLS VPN and Security
184(5)
Attack Scenarios
189(12)
Internet/Extranet and MPLS Security
197(4)
IPSec
201(7)
MPLS VPN (BGP VPN) Security Issues and Options
203(5)
Layer 2 and Unmanaged VPN Service Considerations
208(9)
Design Option Examples
209(3)
Carrier's Carrier Network and Inter-Autonomous Considerations
212(3)
Customer Edge Router Security Considerations
215(2)
Overall Best Practice Recommendations
217(2)
Summary
219(1)
Standards and References
220(3)
Traffic Engineering
223(26)
Problem Statement
224(3)
Technology Overview
227(7)
IGP Extensions and Distribution of Constraints
227(1)
Signaling of TE Tunnels
228(2)
Forwarding Packets Through the Network Core
230(1)
Sequence of Operation
231(1)
TE Tunnel Maintenance
232(2)
TE Applications and Examples
234(3)
Intra-Area TE
234(1)
Inter-Autonomous System TE
235(1)
Quality of Service and TE
236(1)
Traffic Handling of Delay-Sensitive Traffic
236(1)
Protection and Restoration
237(6)
Link Protection
237(2)
Node Protection
239(2)
Path Protection
241(1)
Usage Scenarios
242(1)
Scalability of Protection Mechanisms
242(1)
Scaling MPLS TE
243(1)
MPLS Traffic Engineering and Multicast
244(2)
Standards and References
246(1)
Summary
247(2)
Quality of Service
249(22)
Problem Statement
250(18)
IP QoS
252(1)
QoS Building Blocks
252(4)
IntServ
256(1)
DiffServ
257(1)
Packet Handling
258(1)
The Hybrid Model
258(1)
MPLS QoS
259(1)
MPLS DiffServ
259(3)
Traffic Engineering and DiffServ
262(1)
DiffServ-Aware Traffic Engineering
262(3)
MPLS QoS Service Examples
265(1)
Point-to-Cloud Model
265(1)
Olympic Service Model
265(1)
Traffic-Engineered Voice Model
266(1)
Virtual Leased Line
266(1)
On-Demand QoS
266(1)
MPLS and IntServ
267(1)
Traffic Flows to MPLS DiffServ Mapping
267(1)
Tunnel-Based Admission Control
268(1)
Standards and References
268(1)
Summary
269(2)
Mutlicasts and NGNs
271(16)
Problem Statement
273(2)
MPLS Multicast VPN Overview
275(6)
Multicast VPN Operational Details
277(4)
MPLS Multicast VPN Applications and Examples
281(2)
Multicast Security and Management Considerations
283(2)
Standards and References
285(1)
Summary
285(2)
IPv6 and MPLS
287(14)
Problem Statement
290(1)
Technology Overview
290(9)
IPv6 PE
292(1)
Multiprotocol BGP Extensions
292(1)
Packet Path
293(1)
IPv6 VPNs (6VPE)
294(1)
Route Tagging
294(1)
Virtual Routing and Forwading with IPv6
294(1)
Packet Path
295(1)
The Coexistence of IPv4 L3VPN and IPv6 L3VPN
296(1)
IPv6 Network Core
297(1)
Inter-AS Networks for 6PE and v6VPNs
297(1)
IPv6 QoS
298(1)
MPLS QoS for IPv6
299(1)
Management and IPv6
299(1)
Summary
300(1)
Part 4 Bringing Your MPLS Plan Together
301(82)
Network Management and Provisioning
303(28)
Problem Statement
304(2)
Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management
306(2)
MPLS OAM
307(1)
VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms
308(1)
Dealing with Equal Cost Multipaths
309(2)
Noncompliant Routers
310(1)
LSR Self-Test
310(1)
Virtual Circuit Connection Verification and Bidirectional Forwarding Detection
311(3)
A Word About Interworking OAM
314(3)
Any to Any
314(1)
Local Switching
315(1)
Encapsulation Types and Modes
315(1)
ATM over MPLS
315(1)
ATM N:1 Mode
315(1)
ATM I:1 Mode
316(1)
AALS SDU Mode
316(1)
AAL5 PDU Mode
316(1)
Frame Relay over MPLS
316(1)
Generic Failure Types
317(1)
Interface Failure
317(1)
Pseudo wire Failures
317(1)
Tunnel LSP Failures
318(1)
Configuration Management for MPLS-Based Networks
318(4)
Accounting for MPLS-Based Networks
322(1)
Performance Management for MPLS-Based Networks
323(1)
Security Management for MPLS-Based Networks
324(1)
Per-VPN Management
324(3)
IP Addressing
325(2)
VRF-Aware Network Address Translation
327(1)
Supported MIBs
327(1)
Standards and References
328(1)
Summary
329(2)
Design Considerations: Putting it All Together
331(26)
VRF-Aware Feature
332(7)
IP Addressing: VRF-Aware DHCP
334(1)
DHCP Deployment Examples
335(3)
Deployment Guideline Summary
338(1)
VRF-Aware Network Address Translation
338(1)
NAT-PE System Flow
339(2)
Inside-to-Outside Packet Flow
340(1)
Outside-to-Inside Packet Flow
340(1)
Deployment Guideline Summary
341(1)
Management, Provisioning, and Troubleshooting
342(1)
Equipment Scalability Versus Network Scalability
343(11)
Network Element Characteristics
346(1)
Network Parameters
347(2)
Network-Wide Scale
349(2)
Management and Scalability
351(1)
Layer 2 VPNs---What to Expect
352(1)
Same Grade of Service
352(1)
Planning and Sizing
353(1)
Density
353(1)
Management
354(1)
Summary
354(3)
MPLS Case Studies
357(8)
The Background on Equant
358(2)
Equant Business Drivers
359(1)
Equant Services
359(1)
VPN Bridge Case Study
360(2)
Background
360(1)
Customer Issues/Objectives
360(1)
The Account Team's Keys to Success
361(1)
Case Study Conclusion
362(1)
Summary
363(2)
The Future of MPLS
365(18)
Integrating IP and Optical Networks (Transport Area)
367(5)
How Does it Work?
368(3)
Bandwidth On-Demand Service
371(1)
Challenges Faced with G-MPLS and UCP
371(1)
Future Layer 3 Services
372(2)
Label-Switched Multicast
372(1)
Dynamic Encrypted VPNs
373(1)
Content-Based Services
373(1)
Adaptive Networks for Integration of Voice and Video
373(1)
Security Enhancements
374(1)
Future Layer 2 Services
374(2)
ATM-MPLS Interworking
375(1)
Layer 2 VPNs Across Multiple Provider Networks
375(1)
VPLS Service Across a Non-Ethernet Last Mile
375(1)
Future Enhancements in Provisioning and Management
376(1)
Adaptive Self-Healing Networks
376(1)
Increasing Enterprise Deployment of MPLS
377(1)
Summary
377(1)
So, What Is the Future of MPLS?
378(1)
A View from George Swallow
378(2)
A View from Adrian Farrell
380(3)
Index 383


Monique Jeanne Morrow is currently a Distinguished Consulting Engineer at CiscoSystems, Inc. She has more than 20 years experience in IP internetworking that includesdesign, implementation of complex customer projects, and service development for serviceproviders. Monique has been involved in developing managed network services, such asremote access and LAN switching in a service provider environment. Monique has workedfor both enterprise and service provider companies in the U.S. and in Europe. In 1999,Monique led the engineering project team for one of the first MPLS-VPN deployments fora European service provider. Monique has presented in various conferences on the topic of MPLS. Additionally, Monique is coauthor of the book Designing IP-Based Services: Solutions for Vendors and Service Providers Monique is also the coauthor of MPLS VPN Security and MPLS forDecision Makers She is working on a book that presents enterprise drivers and concerns for IP-based service delivery. Monique is active in both the IETF and ITU-T SG 13 with a focus on OAM. She has a masters of science degree in telecommunications management and an MBA. Additionally, Monique is vice chair of IPsphere Forum. Monique is currently engaged in MPLS OAM standards development and has been engaged in international carrier discussions on the topic. Monique was a co-guest editor of a special issue of the IEEE Communications Magazine on the subject of OAM in MPLSBasedNetworks, which was published in October 2004. She was also a guest editor of aspecial issue of the IEEE Communications Magazine on the subject of Challenges inEnabling Inter-Provider Service Quality on the Internet, published in June 2005 and on thesubject of, GMPLS: The Promise of the Next Generation Optical Control Plane,published in July 2005. Finally, Monique is working on NGN for service providers andGRID technology.

Azhar Sayeed is currently the director of product management for the Cisco NetworkSoftware and Systems Group. He has more than 16 years of networking andcommunications industry experience. Azhar is currently responsible for productmanagement and roll out of MPLS, Layer 2 and Layer 3 VPNs, broadband technologies IProuting, and Qo) features in Cisco IOS software. Cisco IOS software is the network systemsoftware that powers the majority of Cisco hardware platforms.Prior to joining Cisco in 1998, Azhar worked for Cabletron Systems as aproduct line manager for the ATM group. He designed and implemented productdevelopment strategies and brought products to market. He has held additionalindustry positions including that of an ATM aviator with Digital EquipmentCorporation where he supported presale operations of the High PerformanceNetworks group for Digital.Azhar started his career as a field engineer, installing X.25 and Frame Relaygear for large service provider and enterprise networks. Since then, he has beeninvolved with ATM and MPLS in DEC, Cabletron, and Cisco.Azhar has published several research papers from his masters thesis anddozens of magazine articles on MPLS and QoS. He has been invited to speak atseveral conferences, such as MPLS 2002 through MPLS 2005. He has also spokenat MPLS Con 2002, Broadband Year, Comdex, N+I, Supercomm, APRICOT,MPLS World Congress, and so on.Azhars interests include network protocols and wireless and broadbandtechnologies. Azhar holds a bachelors degree in electronics and communicationsand a masters degree in electrical engineering. He is also a member of IEEE andIEEE communications society.