Introduction |
|
xxii | |
|
Part 1 The Business Case for MPLS |
|
|
1 | (56) |
|
The Dynamics of Service Creation and Deployment |
|
|
3 | (28) |
|
Industry Dynamics and Challenges |
|
|
4 | (3) |
|
What About the Enterprise Market? |
|
|
7 | (2) |
|
Service Provider Business Engineering |
|
|
7 | (2) |
|
Business Drivers and Requirements |
|
|
9 | (5) |
|
|
10 | (1) |
|
Enterprise Motivations for Migrating to Layer 3 Services |
|
|
11 | (3) |
|
Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself |
|
|
14 | (4) |
|
|
15 | (1) |
|
|
16 | (2) |
|
Central Services with an Enterprise Campus |
|
|
18 | (1) |
|
Subscribing to a Managed Layer 3 MPLS VPN Service |
|
|
18 | (4) |
|
The Case for Building VPNs---Layer 2 or Layer 3 |
|
|
22 | (4) |
|
Existing Technologies---Frame Relay, ATM, and IP-Based Networks: What Can They Solve? |
|
|
26 | (1) |
|
|
26 | (2) |
|
Asynchronous Transfer Mode |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
The Scope of Service Types |
|
|
31 | (26) |
|
Overview of Layer 2 Services |
|
|
34 | (5) |
|
|
35 | (4) |
|
Next-Generation Network Overview and Interworking Functions |
|
|
39 | (3) |
|
|
42 | (3) |
|
|
45 | (3) |
|
|
48 | (7) |
|
|
55 | (2) |
|
Part 2 The Technical Case for MPLS |
|
|
57 | (46) |
|
Technology Overview: Making the Technology case for MPLS and Technology Details |
|
|
59 | (44) |
|
Available Technologies and Options |
|
|
60 | (2) |
|
Why MPLS? (High-Level Detail) |
|
|
62 | (4) |
|
MPLS and Quality of Service |
|
|
66 | (5) |
|
Differentiating Service with Traffic Engineering |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (3) |
|
|
74 | (1) |
|
|
75 | (8) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (2) |
|
Carrier Supporting Carrier and Inter-Provider Autonomous Systems |
|
|
83 | (1) |
|
|
84 | (7) |
|
|
91 | (4) |
|
|
95 | (6) |
|
|
101 | (2) |
|
Part 3 MPLS Services and Components |
|
|
103 | (198) |
|
|
105 | (34) |
|
|
108 | (3) |
|
|
111 | (9) |
|
Pseudowire Systems Architecture |
|
|
112 | (2) |
|
|
114 | (1) |
|
Layer 2 Transport Types (Like-to-Like) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
Configuration of Pseudowires |
|
|
118 | (2) |
|
|
120 | (3) |
|
|
121 | (1) |
|
Interworking Models and Applications |
|
|
121 | (2) |
|
Virtual Private LAN Service |
|
|
123 | (1) |
|
|
123 | (1) |
|
Provisioning and Signaling |
|
|
124 | (8) |
|
|
126 | (2) |
|
|
128 | (4) |
|
|
132 | (3) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (24) |
|
|
141 | (5) |
|
Separation of Routing Information Between VPNs |
|
|
141 | (1) |
|
Constrained Distribution of Routing Information |
|
|
142 | (2) |
|
Forwarding Packets Through the Network Core |
|
|
144 | (1) |
|
Packet Flow Through the Network |
|
|
145 | (1) |
|
|
146 | (2) |
|
|
148 | (1) |
|
|
149 | (5) |
|
Dedicated per-VPN Internet Access |
|
|
151 | (1) |
|
Shared PE---Internet and VPN |
|
|
151 | (1) |
|
Dedicated PE---Shared Backbone |
|
|
152 | (1) |
|
Managed Central Service---Shared Internet Access |
|
|
152 | (2) |
|
Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks |
|
|
154 | (2) |
|
|
154 | (1) |
|
Carrier Supporting Carrier |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (4) |
|
Making Applications and Services VRF-Aware |
|
|
158 | (1) |
|
VRF-Aware Address Management |
|
|
159 | (2) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Remote Access and IPSec Integration with MPLS VPNs |
|
|
163 | (14) |
|
|
164 | (9) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
Scalability and Network Convergence for Remote Access |
|
|
174 | (1) |
|
|
175 | (2) |
|
|
177 | (46) |
|
|
178 | (2) |
|
Security Overview and MPLS |
|
|
180 | (4) |
|
|
184 | (5) |
|
|
189 | (12) |
|
Internet/Extranet and MPLS Security |
|
|
197 | (4) |
|
|
201 | (7) |
|
MPLS VPN (BGP VPN) Security Issues and Options |
|
|
203 | (5) |
|
Layer 2 and Unmanaged VPN Service Considerations |
|
|
208 | (9) |
|
|
209 | (3) |
|
Carrier's Carrier Network and Inter-Autonomous Considerations |
|
|
212 | (3) |
|
Customer Edge Router Security Considerations |
|
|
215 | (2) |
|
Overall Best Practice Recommendations |
|
|
217 | (2) |
|
|
219 | (1) |
|
|
220 | (3) |
|
|
223 | (26) |
|
|
224 | (3) |
|
|
227 | (7) |
|
IGP Extensions and Distribution of Constraints |
|
|
227 | (1) |
|
|
228 | (2) |
|
Forwarding Packets Through the Network Core |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (2) |
|
TE Applications and Examples |
|
|
234 | (3) |
|
|
234 | (1) |
|
Inter-Autonomous System TE |
|
|
235 | (1) |
|
Quality of Service and TE |
|
|
236 | (1) |
|
Traffic Handling of Delay-Sensitive Traffic |
|
|
236 | (1) |
|
Protection and Restoration |
|
|
237 | (6) |
|
|
237 | (2) |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (1) |
|
Scalability of Protection Mechanisms |
|
|
242 | (1) |
|
|
243 | (1) |
|
MPLS Traffic Engineering and Multicast |
|
|
244 | (2) |
|
|
246 | (1) |
|
|
247 | (2) |
|
|
249 | (22) |
|
|
250 | (18) |
|
|
252 | (1) |
|
|
252 | (4) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (3) |
|
Traffic Engineering and DiffServ |
|
|
262 | (1) |
|
DiffServ-Aware Traffic Engineering |
|
|
262 | (3) |
|
MPLS QoS Service Examples |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
Traffic-Engineered Voice Model |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
Traffic Flows to MPLS DiffServ Mapping |
|
|
267 | (1) |
|
Tunnel-Based Admission Control |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (2) |
|
|
271 | (16) |
|
|
273 | (2) |
|
MPLS Multicast VPN Overview |
|
|
275 | (6) |
|
Multicast VPN Operational Details |
|
|
277 | (4) |
|
MPLS Multicast VPN Applications and Examples |
|
|
281 | (2) |
|
Multicast Security and Management Considerations |
|
|
283 | (2) |
|
|
285 | (1) |
|
|
285 | (2) |
|
|
287 | (14) |
|
|
290 | (1) |
|
|
290 | (9) |
|
|
292 | (1) |
|
Multiprotocol BGP Extensions |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
Virtual Routing and Forwading with IPv6 |
|
|
294 | (1) |
|
|
295 | (1) |
|
The Coexistence of IPv4 L3VPN and IPv6 L3VPN |
|
|
296 | (1) |
|
|
297 | (1) |
|
Inter-AS Networks for 6PE and v6VPNs |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
Part 4 Bringing Your MPLS Plan Together |
|
|
301 | (82) |
|
Network Management and Provisioning |
|
|
303 | (28) |
|
|
304 | (2) |
|
Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management |
|
|
306 | (2) |
|
|
307 | (1) |
|
VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms |
|
|
308 | (1) |
|
Dealing with Equal Cost Multipaths |
|
|
309 | (2) |
|
|
310 | (1) |
|
|
310 | (1) |
|
Virtual Circuit Connection Verification and Bidirectional Forwarding Detection |
|
|
311 | (3) |
|
A Word About Interworking OAM |
|
|
314 | (3) |
|
|
314 | (1) |
|
|
315 | (1) |
|
Encapsulation Types and Modes |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
Configuration Management for MPLS-Based Networks |
|
|
318 | (4) |
|
Accounting for MPLS-Based Networks |
|
|
322 | (1) |
|
Performance Management for MPLS-Based Networks |
|
|
323 | (1) |
|
Security Management for MPLS-Based Networks |
|
|
324 | (1) |
|
|
324 | (3) |
|
|
325 | (2) |
|
VRF-Aware Network Address Translation |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (2) |
|
Design Considerations: Putting it All Together |
|
|
331 | (26) |
|
|
332 | (7) |
|
IP Addressing: VRF-Aware DHCP |
|
|
334 | (1) |
|
|
335 | (3) |
|
Deployment Guideline Summary |
|
|
338 | (1) |
|
VRF-Aware Network Address Translation |
|
|
338 | (1) |
|
|
339 | (2) |
|
Inside-to-Outside Packet Flow |
|
|
340 | (1) |
|
Outside-to-Inside Packet Flow |
|
|
340 | (1) |
|
Deployment Guideline Summary |
|
|
341 | (1) |
|
Management, Provisioning, and Troubleshooting |
|
|
342 | (1) |
|
Equipment Scalability Versus Network Scalability |
|
|
343 | (11) |
|
Network Element Characteristics |
|
|
346 | (1) |
|
|
347 | (2) |
|
|
349 | (2) |
|
Management and Scalability |
|
|
351 | (1) |
|
Layer 2 VPNs---What to Expect |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (3) |
|
|
357 | (8) |
|
|
358 | (2) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
360 | (2) |
|
|
360 | (1) |
|
Customer Issues/Objectives |
|
|
360 | (1) |
|
The Account Team's Keys to Success |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
365 | (18) |
|
Integrating IP and Optical Networks (Transport Area) |
|
|
367 | (5) |
|
|
368 | (3) |
|
Bandwidth On-Demand Service |
|
|
371 | (1) |
|
Challenges Faced with G-MPLS and UCP |
|
|
371 | (1) |
|
|
372 | (2) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
Adaptive Networks for Integration of Voice and Video |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (2) |
|
|
375 | (1) |
|
Layer 2 VPNs Across Multiple Provider Networks |
|
|
375 | (1) |
|
VPLS Service Across a Non-Ethernet Last Mile |
|
|
375 | (1) |
|
Future Enhancements in Provisioning and Management |
|
|
376 | (1) |
|
Adaptive Self-Healing Networks |
|
|
376 | (1) |
|
Increasing Enterprise Deployment of MPLS |
|
|
377 | (1) |
|
|
377 | (1) |
|
So, What Is the Future of MPLS? |
|
|
378 | (1) |
|
A View from George Swallow |
|
|
378 | (2) |
|
A View from Adrian Farrell |
|
|
380 | (3) |
Index |
|
383 | |