Atjaunināt sīkdatņu piekrišanu

E-grāmata: Third Networks and Services

  • Formāts: 544 pages
  • Izdošanas datums: 31-Jan-2017
  • Izdevniecība: Artech House Publishers
  • ISBN-13: 9781630814304
  • Formāts - PDF+DRM
  • Cena: 84,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 544 pages
  • Izdošanas datums: 31-Jan-2017
  • Izdevniecība: Artech House Publishers
  • ISBN-13: 9781630814304

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book presents applications of MEFs (Metro Ethernet Forum) Carrier Ethernet architecture and provides insight into building end-to-end systems with third network services like MPLS-TP, VPLS, and PBT. It highlights the pros and cons of lifecycle service orchestration (LSO), virtualization and cloud series for service providers and enterprise network owners.

The book also covers Ethernet protection like automatic protection switching (APS) entities, linear and ring protection and link aggregators. Readers will find chapters on provider bridges (PB) and information modeling along with a detailed overview of pseudowires and multisegment architectures, control planes and multisegment pseudowire setup mechanisms.

Recenzijas

The book presents a detailed and comprehensive view of the new Carrier Ethernet architecture. It incorporates the latest developments in related technologies with a wealth of insights. It is well structured and well written. The text is clear, concise and easy to read. This unique book is very timely and fills a big void in the literature. It provides a thorough treatment of the field addressing many aspects. It is and will be a valuable resource for the practitioners as well as a solid textbook for students and teachers. -- Prof. Mehmet Ulema * Manhattan College *

Foreword xvii
Nan Chen
Foreword xix
Michael Lanman
Preface xxi
Acknowledgments xxii
Chapter 1 Introduction and Overview
1(14)
1.1 Introduction
1(1)
1.2 Basic Ethernet
2(1)
1.3 Synchronization
2(1)
1.4 Pseudowires
2(1)
1.5 Protection
3(1)
1.6 Carrier Ethernet Architectures and Services
3(1)
1.7 Carrier Ethernet Traffic Management
4(1)
1.8 Ethernet Operations, Administrations and Maintenance (OAM)
5(1)
1.9 Circuit Emulation
6(1)
1.10 Ethernet Local Management Interface
7(1)
1.11 Provider Backbone Transport
7(2)
1.12 T-MPLS and MPLS-TP
9(2)
1.13 Virtual Private LAN Services
11(2)
1.14 Information Modeling
13(1)
1.15 The Third Network
14(1)
Chapter 2 Basic Ethernet
15(18)
2.1 Introduction
15(1)
2.2 CSMA/CD
16(1)
2.3 Full Duplex, PAUSE, Autonegotiation
17(1)
2.4 Repeaters and Hubs
17(1)
2.5 Bridges
18(1)
2.6 Switches
19(1)
2.7 Physical Layer
20(7)
2.7.1 10-Mbps Ethernet
22(1)
2.7.2 Fast Ethernet
22(1)
2.7.3 Gigabit Ethernet
22(1)
2.7.4 10-Gb, 40-Gb, and 100-Gb Ethernet
23(1)
2.7.5 LAN PHY
24(1)
2.7.6 LAN PHY/WAN PHY Sublayers
25(2)
2.8 Temperature Hardening
27(1)
2.9 Standards
27(1)
2.10 Ethernet Frame Types and the EtherType Field
27(5)
2.10.1 Ethernet Frames
28(1)
2.10.2 Ethernet Address
29(1)
2.10.3 Ethernet II or DIX
29(1)
2.10.4 IEEE 802.3
30(1)
2.10.5 IEEE 802.2
30(1)
2.10.6 SNAP
31(1)
2.11 Conclusion
32(1)
References
32(1)
Chapter 3 Synchronization
33(30)
3.1 Introduction
33(2)
3.2 Application Requirements
35(3)
3.3 Synchronization Standards
38(1)
3.4 NTP/SNTP
39(4)
3.5 Precision Time Protocol (IEEE 1588)
43(6)
3.6 Synchronous Ethernet Networks
49(11)
3.6.1 Clocking Methods for Synchronization
52(3)
3.6.2 Impact of Packet Network Impairments on Synchronization
55(1)
3.6.3 Stabilization Period
56(1)
3.6.4 IWF Synchronization Function
56(1)
3.6.5 PRC
57(1)
3.6.6 Operation Modes
58(1)
3.6.7 Frequency Accuracy of Slave Clock
59(1)
3.6.8 EEC
59(1)
3.7 Conclusion
60(3)
References
60(3)
Chapter 4 Pseudowires
63(22)
4.1 Introduction
63(1)
4.2 Protocol Layers
63(1)
4.3 Payload Types
64(1)
4.4 Pseudowire Architectures
65(6)
4.4.1 PWE3 Preprocessing
65(3)
4.4.2 Payload Convergence Layer
68(2)
4.4.3 PW Demultiplexer Layer and PSN
70(1)
4.4.4 Maintenance Reference Model
70(1)
4.5 Control Plane
71(2)
4.5.1 PWE3 over an IP PSN
72(1)
4.5.2 PWE3 over an MPLS PSN
73(1)
4.6 Multisegment Architecture
73(3)
4.7 Multisegment Pseudowire Setup Mechanisms
76(2)
4.7.1 LDPSP-PETLV
78(1)
4.8 Resiliency
78(1)
4.9 Quality of Service and Congestion Control
79(1)
4.10 Operations and Maintenance
79(2)
4.11 Security
81(1)
4.12 Conclusion
82(3)
References
83(2)
Chapter 5 Ethernet Protection
85(22)
5.1 Introduction
85(1)
5.2 APS Entities
86(1)
5.3 Linear Protection
87(8)
5.3.1 1 + 1 Protection Switching
88(2)
5.3.2 1:1 Protection Switching
90(1)
5.3.3 Protection Switching Triggers
91(1)
5.3.4 APS PDU Format
91(4)
5.4 Ring Protection
95(5)
5.4.1 Protection Switching
97(3)
5.5 Link Aggregation
100(6)
5.5.1 LAG Objectives
103(1)
5.5.2 Link Aggregation Operation
103(2)
5.5.3 LACP
105(1)
5.5.4 Limitations
106(1)
5.6 Conclusion
106(1)
References
106(1)
Chapter 6 Carrier Ethernet Architecture and Services
107(56)
6.1 Introduction
107(2)
6.2 Architecture
109(13)
6.2.1 Protocol Stack
110(4)
6.2.2 ETH Layer Characteristic Information (Ethernet Frame)
114(4)
6.2.3 ETH Layer Functions
118(2)
6.2.4 ETH Links
120(2)
6.3 Interfaces and Types of Connections
122(8)
6.3.1 UNI
122(2)
6.3.2 Ethernet Virtual Connection
124(2)
6.3.3 External Network-Network Interface (ENNI)
126(1)
6.3.4 Operator Virtual Connection
127(1)
6.3.5 VUNI/RUNI
127(3)
6.4 EVC Services and Attributes
130(14)
6.4.1 Ethernet Service Types
130(1)
6.4.2 Ethernet Service Definitions
131(4)
6.4.3 Common Attributes for EVC Services
135(5)
6.4.4 E-Line Services Attributes and Parameters
140(1)
6.4.5 E-LAN Services Attributes and Parameters
141(2)
6.4.6 E-Tree Services Attributes and Parameters
143(1)
6.5 OVC Services and Attributes
144(9)
6.5.1 Operator Services Attributes
149(4)
6.6 Single CEN and Multi-CEN L2CP (Processing for Single CEN and Multi-CEN)
153(8)
6.7 Conclusion
161(2)
References
161(2)
Chapter 7 Carrier Ethernet Traffic Management
163(36)
7.1 Introduction
163(1)
7.2 Policing
164(1)
7.3 Queuing, Scheduling, and Flow Control
165(1)
7.4 Three-CoS Model
166(1)
7.5 Service-Level Agreements
167(5)
7.5.1 Frame Delay Performance
167(2)
7.5.2 Frame Delay Range Performance
169(1)
7.5.3 Mean Frame Delay Performance
170(1)
7.5.4 Frame Delay Variation
170(1)
7.5.5 Frame Loss Ratio
171(1)
7.6 SLSs
172(6)
7.6.1 Multipoint CoS Performance Objectives
173(2)
7.6.2 Focused Overload
175(3)
7.7 Application-CoS-Priority Mapping
178(3)
7.7.1 CoS Identification
178(3)
7.7.2 PCP and DSCP Mapping
181(1)
7.8 Bandwidth Profile
181(7)
7.8.1 Bandwidth Profile Algorithms
183(3)
7.8.2 Models and Use Cases for Bandwidth Profiles
186(2)
7.9 CBS Values, TCP, and Shaping
188(9)
7.10 Conclusion
197(2)
References
198(1)
Bibliography
198(1)
Chapter 8 Carrier Ethernet Operation, Administration, Management, and Performance
199(70)
8.1 Introduction
199(3)
8.2 Link OAM
202(3)
8.3 Service OAM
205(2)
8.4 Maintenance Entities
207(1)
8.5 Maintenance Points
208(4)
8.6 OAM Addressing and Frame Format
212(3)
8.7 Continuity Check Message (CCM)
215(5)
8.8 Loopback and Reply Messages (LBM and LBR)
220(4)
8.9 Link Trace and Reply Messages (LTM and LTR)
224(3)
8.10 Ethernet Alarm Indication Signal (ETH-AIS)
227(2)
8.11 Ethernet Remote Defect Indication (ETH-RDI)
229(1)
8.12 Ethernet Locked Signal (ETH-LCK)
230(1)
8.13 Performance Measurements
231(2)
8.14 Performance Monitoring
233(1)
8.15 Frame Loss Measurements
234(4)
8.16 Availability
238(4)
8.17 Frame Delay Measurements
242(1)
8.18 Interframe Delay Variation Measurements
243(1)
8.19 Testing
244(19)
8.19.1 Y.1731 Testing
245(1)
8.19.2 RFC 2544
246(3)
8.19.3 Complete Service Testing
249(1)
8.19.4 Service Activation Testing
249(5)
8.19.5 SAT Control Protocol and Messages
254(9)
8.20 Performance Monitoring Solutions
263(3)
8.21 Security
266(1)
8.22 OAM Bandwidth
267(1)
8.23 Conclusion
267(2)
References
267(2)
Chapter 9 Circuit Emulation Services
269(14)
9.1 Introduction
269(2)
9.2 Circuit Emulation Functions
271(3)
9.3 Adaptation Function Headers
274(2)
9.4 Synchronization
276(1)
9.5 TDM Application Signaling
277(1)
9.6 CESoETH Defects and Alarms
278(2)
9.7 Performance Monitoring of CESoETH
280(1)
9.8 CESoETH Service Configuration
280(1)
9.9 Conclusion
281(2)
References
281(2)
Chapter 10 Carrier Ethernet Local Management Interface
283(14)
10.1 Introduction
283(3)
10.2 F.-LMT Messages
286(2)
10.3 E-LMI Message Elements
288(4)
10.4 E-LMI System Parameters and Procedures
292(3)
10.4.1 Periodic Polling Process
294(1)
10.5 UNI-C and N Procedures
295(1)
10.6 Conclusion
296(1)
References
296(1)
Chapter 11 Provider Bridges, Provider Backbone Bridges, and Provider Backbone Transport
297(24)
11.1 Introduction
297(1)
11.2 IEEE 802.1AB
298(6)
11.2.1 Architecture
299(1)
11.2.2 Principles of Operation
300(1)
11.2.3 802.1AB Frame Format
301(3)
11.3 Provider Backbone Bridges
304(8)
11.3.1 802.1ah Frame Format
305(2)
11.3.2 PBB Principles of Operation
307(1)
11.3.3 Provider Backbone Bridge Network
308(4)
11.4 Provider Backbone Transport
312(6)
11.4.1 Principles of Operation
313(2)
11.4.2 End-to-End Carrier Ethernet with Multiple PBT Domains and Single Domain
315(1)
11.4.3 PBB-TE Network
316(2)
11.4.4 PBT: MPLS Internetworking
318(1)
11.5 Conclusion
318(3)
References
318(3)
Chapter 12 Transport MPLS
321(14)
12.1 Introduction
321(2)
12.2 Differences from MPLS
323(1)
12.3 Architecture
324(4)
12.3.1 T-MPLS Interfaces
326(2)
12.4 T-MPLS Frame Structure
328(1)
12.5 T-MPLS Networks
328(5)
12.5.1 T-MPLS Protection
328(5)
12.6 Conclusion
333(2)
References
334(1)
Chapter 13 MPLS Transport Profile
335(30)
13.1 Introduction
335(3)
13.2 Frame Format
338(1)
13.3 Architecture
339(13)
13.3.1 Data Plane
340(3)
13.3.2 MPLS-TP Router Types
343(1)
13.3.3 Service Interfaces
343(2)
13.3.4 IP Transport Service
345(3)
13.3.5 Generic Associated Channel
348(1)
13.3.6 Control Plane
349(2)
13.3.7 Network Management
351(1)
13.4 OAM
352(9)
13.4.1 OAM Hierarchy
353(4)
13.4.2 OAM Functions for Proactive Monitoring
357(2)
13.4.3 Data Plane Loopback, RDI, AIS
359(1)
13.4.4 Client Failure Indication, Route Tracing, and Lock Instruct
360(1)
13.5 Protection Switching
361(1)
13.6 Security Considerations
361(1)
13.7 Conclusion
362(3)
References
362(3)
Chapter 14 Virtual Private LAN Services
365(28)
14.1 Introduction
365(5)
14.2 Data Plane
370(2)
14.2.1 VPLS Encapsulation
370(1)
14.2.2 Classification and Forwarding
370(1)
14.2.3 MAC Address Learning and Aging
371(1)
14.3 LDP-Based VPLS
372(12)
14.3.1 Flooding, Forwarding, and Address Learning
372(1)
14.3.2 Tunnel Topology
373(2)
14.3.3 Discovery
375(1)
14.3.4 LDP-Based Signaling
376(2)
14.3.5 Data Forwarding on an Ethernet PW
378(1)
14.3.6 Hierarchical VPLS
379(5)
14.4 BGP Approach
384(6)
14.4.1 Auto-Discovery
384(1)
14.4.2 Signaling
385(1)
14.4.3 BGP VPLS Operation
386(2)
14.4.4 Multi-AS VPLS
388(1)
14.4.5 Hierarchical BGP VPLS
389(1)
14.5 Security
390(1)
14.6 External Network-Network Interface
390(1)
14.7 Conclusion
391(2)
References
391(2)
Chapter 15 Information Modeling
393(72)
15.1 Introduction
393(2)
15.2 Information Modeling of Carrier Ethernet Services for EMS and NMS
395(40)
15.2.1 Management of EVC, OVC and ELMI and Discovery of Ethernet
397(2)
15.2.2 Carrier Ethernet Service OAM Configuration
399(1)
15.2.3 Carrier Ethernet Service Performance Management
400(1)
15.2.4 Carrier Ethernet Fault Management
400(2)
15.2.5 Common Management Objects for Carrier Ethernet Services
402(1)
15.2.6 Class Diagrams of ITU-T Q.840.1 Carrier Ethernet Management Entities
402(3)
15.2.7 Carrier Ethernet Management Entities
405(1)
15.2.8 ENNI and Virtual UNI Related Objects
405(1)
15.2.9 Fault Management Objects
406(2)
15.2.10 Performance Monitoring Objects
408(1)
15.2.11 ENNI and OVC MIBs
408(2)
15.2.12 SOAMFMMIB [ 16]
410(3)
15.2.13 SOAM PM MIB [ 24]
413(22)
15.3 Service-Level Information Modeling
435(9)
15.3.1 EVC
438(1)
15.3.2 OVC
439(1)
15.3.3 Carrier Ethernet External Interface
440(1)
15.3.4 UNI
440(1)
15.3.5 ENNI
441(1)
15.3.6 ENNI Service
442(1)
15.3.7 Egress Equivalence Class Identifier
443(1)
15.4 YANG Models for Carrier Ethernet Services
444(15)
15.4.1 SOAM YANG CFM Module [ 20]
446(6)
15.4.2 SOAM FM YANG Module
452(3)
15.4.3 PM YANG Module [ 39]
455(4)
15.5 Network Resource Model for Carrier Ethernet Services
459(2)
15.6 Conclusion
461(4)
References
463(2)
Chapter 16 Third Network
465(28)
16.1 Introduction
465(1)
16.2 Life-Cycle Service Orchestration
465(3)
16.3 LSO Management Abstractions and Constructs
468(2)
16.4 Virtualization
470(2)
16.5 Network Virtualization
472(1)
16.6 Virtualized Carrier Ethernet Services
473(6)
16.6.1 Components of Virtualized Carrier Ethernet Services
474(4)
16.6.2 Service Chaining for EPL
478(1)
16.7 Cloud Services Architectures
479(13)
16.7.1 Protocol Stacks and Interfaces
480(3)
16.7.2 Cloud Services
483(1)
16.7.3 Network as a Service
484(1)
16.7.4 Infrastructure as a Service
485(4)
16.7.5 Security as a Service
489(1)
16.7.6 Platform as a Service
490(1)
16.7.7 Software as a Service
490(1)
16.7.8 Communication as a Service
491(1)
16.8 Conclusion
492(1)
References
492(1)
About the Authors 493(2)
Index 495
Mehmet Toy is currently a distinguished member of technical staff (DMTS)at Verizon Communications and involved in SDN, NFV, and cloud architectures and standards. He received his Ph.D. in electrical and computer engineering from Stevens Institute of Technology, Hoboken, NJ.Hakki Candan Cankaya is a solutions architect and technical assurance lead at Fujitsu Network Communications. He is also an adjunct professor in the Computer Science and Engineering and Electrical Engineering department, Southern Methodist University, Dallas, Texas. He received his Ph.D. in computer engineering from Southern Methodist University and his M.S. and B.S. in computer engineering from Ege University, Izmir, Turkey.