You are previewing MPLS-Enabled Applications: Emerging Developments and New Technologies.
O'Reilly logo
MPLS-Enabled Applications: Emerging Developments and New Technologies

Book Description

“Here at last is a single, all-encompassing resource where the myriad applications sharpen into a comprehensible text.” Kireeti Kompella, Juniper Fellow, Juniper Networks.

The authoritative guide to MPLS, now in its second edition, fully updated with brand new material!

Multiprotocol Label Switching (MPLS) is now considered the networking technology for carrying all types of network traffic, including voice telephony, real-time video, and data traffic. In MPLS-Enabled Applications, the Second Edition, the authors methodically show how MPLS holds the key to network convergence by allowing operators to offer more services over a single physical infrastructure. The Second Edition contains more than 150 illustrations, new chapters, and more coverage, guiding the reader from the basics of the technology, including signaling protocols, traffic engineering and fast reroute, though all its major applications.

MPLS Enabled-Applications, Second Edition, contains comprehensive up-to-date coverage of:

  • the current status and the future potential of all major MPLS applications, including L3VPNs (Layer 3 Virtual Private Networks), L2VPNs (Layer 2 Virtual Private Networks), pseudowires and VPLS .  (Virtual Private LAN Service).

  • extensive discussion of multicast support over MPLS, including a new chapter dedicated to multicast in VPNs, explaining both the PIM/GRE (Protocol Independent Multicast  / Generic Routing Encapsulation) and the next generation BGP/MPLS solutions, new material on support of multicast in VPLS, a much-expanded chapter on MPLS multicast and a section perations and management (OAM) tools for point-to-multipoint LSPs.

  • a new chapter on MPLS in access networks, as well as coverage of the use of MPLS in mobile and data communication networks. 

  • interoperation of LDP(Label Distribution Protocol) and BGP (Border Gateway Protocol) based VPLS.

  • comprehensive  coverage of the base technology, as well as the latest IETF drafts

With a foreword by Yakov Rekhter

Table of Contents

  1. Copyright
  2. About the Authors
  3. Foreword
  4. Preface
  5. Acknowledgements
  6. Part One
    1. Foundations
      1. HISTORICAL PERSPECTIVE
      2. CURRENT TRENDS
      3. MPLS MECHANISMS
      4. CONCLUSION
      5. REFERENCES
      6. FURTHER READING
      7. STUDY QUESTIONS
    2. Traffic Engineering with MPLS (MPLS-TE)
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. APPLICATION SCENARIOS
      4. SETTING UP TRAFFIC-ENGINEERED PATHS USING MPLS-TE
      5. USING THE TRAFFIC-ENGINEERED PATHS
      6. DEPLOYMENT CONSIDERATIONS
      7. USING TRAFFIC ENGINEERING TO ACHIEVE RESOURCE OPTIMIZATION
      8. OFFLINE PATH COMPUTATION
      9. CONCLUSION
      10. REFERENCES
      11. FURTHER READING
      12. STUDY QUESTIONS
    3. Protection and Restoration in MPLS Networks
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. FAILURE DETECTION
      4. END-TO-END PROTECTION
      5. LOCAL PROTECTION USING FAST REROUTE
      6. LINK PROTECTION
      7. NODE PROTECTION
      8. ADDITIONAL CONSTRAINTS FOR THE COMPUTATION OF THE PROTECTION PATH
      9. INTERACTION OF END-TO-END PROTECTION AND FAST REROUTE
      10. DEPLOYMENT CONSIDERATIONS FOR LOCAL PROTECTION MECHANISMS
      11. IP AND LDP FRR
      12. CONCLUSION
      13. REFERENCES
      14. FURTHER READING
      15. STUDY QUESTIONS
    4. MPLS DiffServ-TE
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. APPLICATION SCENARIOS
      4. THE DiffServ-TE SOLUTION
      5. EXTENDING THE DiffServ-TE SOLUTION WITH MULTICLASS LSPs
      6. CONCLUSION
      7. REFERENCES
      8. FURTHER READING
      9. STUDY QUESTIONS
    5. Interdomain Traffic Engineering
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. SETTING UP INTERDOMAIN TE LSPs
      4. INTERPROVIDER CHALLENGES
      5. COMPARISON OF THE LSP SETUP METHODS
      6. CONCLUSION
      7. REFERENCES
      8. FURTHER READING
      9. STUDY QUESTIONS
    6. MPLS Multicast
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. P2MP LSP MECHANISMS
      4. LAN PROCEDURES FOR P2MP LSPS
      5. COUPLING TRAFFIC INTO A P2MP LSP
      6. MPLS FAST REROUTE
      7. INGRESS REDUNDANCY FOR P2MP LSPs
      8. P2MP LSP HIERARCHY
      9. APPLICATIONS OF POINT-TO-MULTIPOINT LSPs
      10. CONCLUSION
      11. REFERENCES
      12. STUDY QUESTIONS
  7. Part Two
    1. Foundations of Layer 3 BGP/MPLS Virtual Private Networks
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. THE OVERLAY VPN MODEL
      4. THE PEER VPN MODEL
      5. BUILDING THE BGP/MPLS VPN SOLUTION
      6. BENEFITS OF THE BGP/MPLS VPN SOLUTION
      7. REFERENCES
      8. FURTHER READING
      9. STUDY QUESTIONS
    2. Advanced Topics in Layer 3 BGP/MPLS Virtual Private Networks
      1. INTRODUCTION
      2. ROUTING BETWEEN CE AND PE
      3. DIFFERENTIATED VPN TREATMENT IN THE CORE
      4. ROUTE REFLECTORS AND VPNs
      5. SCALABILITY DISCUSSION
      6. CONVERGENCE TIMES IN A VPN NETWORK
      7. SECURITY ISSUES
      8. QoS IN A VPN SCENARIO
      9. IPv6 VPNs
      10. CONCLUSION
      11. REFERENCES
      12. FURTHER READING
      13. STUDY QUESTIONS
    3. Hierarchical and Inter-AS VPNs
      1. INTRODUCTION
      2. CARRIERS' CARRIER - SERVICE PROVIDERS AS VPN CUSTOMERS
      3. MULTI-AS BACKBONES
      4. INTERPROVIDER QoS
      5. CONCLUSION
      6. REFERENCES
      7. FURTHER READING
      8. STUDY QUESTIONS
    4. MULTICAST IN A LAYER 3 VPN
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. mVPN - PROBLEM DECOMPOSITION
      4. THE ORIGINAL MULTICAST SOLUTION - PIM/GRE mVPN (DRAFT-ROSEN)
      5. NG MULTICAST FOR L3VPN - BGP/MPLS mVPN (NG mVPN)
      6. COMPARISON OF PIM/GRE AND BGP/MPLS mVPNS
      7. CONCLUSION
      8. REFERENCES
      9. FURTHER READING
      10. STUDY QUESTIONS
    5. Layer 2 Transport over MPLS
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. COMPARISON OF LAYER 2 VPNs AND LAYER 3 VPNs
      4. PRINCIPLES OF LAYER 2 TRANSPORT OVER MPLS
      5. FORWARDING PLANE
      6. CONTROL PLANE OPERATION
      7. ADMISSION CONTROL OF LAYER 2 CONNECTIONS INTO NETWORK
      8. FAILURE NOTIFICATION MECHANISMS
      9. LAYER 2 INTERWORKING
      10. CIRCUIT CROSS CONNECT (CCC)
      11. OTHER APPLICATIONS OF LAYER 2 TRANSPORT
      12. CONCLUSION
      13. REFERENCES
      14. STUDY QUESTIONS
    6. Virtual Private LAN Service
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. VPLS MECHANISM OVERVIEW
      4. FORWARDING PLANE MECHANISMS
      5. CONTROL PLANE MECHANISMS
      6. LDP AND BGP INTERWORKING FOR VPLS
      7. OPERATIONAL CONSIDERATIONS FOR VPLS
      8. CONCLUSION
      9. REFERENCES
      10. STUDY QUESTIONS
    7. MPLS Management
      1. INTRODUCTION
      2. MANAGEMENT - WHY AND WHAT
      3. DETECTING AND TROUBLESHOOTING FAILURES
      4. CONFIGURATION ERRORS
      5. VISIBILITY
      6. CONCLUSION
      7. REFERENCES
      8. FURTHER READING
      9. STUDY QUESTIONS
    8. MPLS in Access Networks
      1. INTRODUCTION
      2. THE BUSINESS DRIVERS
      3. MODELS FOR MPLS DEPLOYMENT IN ACCESS NETWORKS
      4. CONCLUSIONS
      5. REFERENCES
      6. STUDY QUESTIONS
    9. Conclusions
      1. INTRODUCTION
      2. NETWORK CONVERGENCE
      3. INTERACTION WITH CLIENT EDGE EQUIPMENT
      4. INTERPROVIDER CAPABILITY
      5. MPLS IN THE DATA COMMUNICATIONS NETWORK (DCN)
      6. MPLS IN MOBILE NETWORKS
      7. MPLS IN THE ENTERPRISE
      8. FINAL REMARKS
      9. REFERENCES
    10. MPLS Resources
    11. Solutions to Selected Study Questions
    12. Acronyms