MPLS-Enabled Applications : Emerging Developments and New Technologies.

By: Minei, InaContributor(s): Lucek, JulianMaterial type: TextTextSeries: Wiley Series on Communications Networking and Distributed Systems SerPublisher: New York : John Wiley & Sons, Incorporated, 2010Copyright date: ©2010Edition: 3rd edDescription: 1 online resource (629 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780470976166Subject(s): Extranets (Computer networks) | MPLS standardGenre/Form: Electronic books.Additional physical formats: Print version:: MPLS-Enabled Applications : Emerging Developments and New TechnologiesDDC classification: 621.382/16 LOC classification: TK5105.573 -- .M56 2011ebOnline resources: Click to View
Contents:
Intro -- MPLS-Enabled Applications -- Contents -- About the Authors -- Foreword -- Preface -- Acknowledgements -- Part One -- 1 Foundations -- 1.1 Historical perspective -- 1.2 Current trends -- 1.3 MPLS mechanisms -- 1.3.1 Forwarding plane mechanisms -- 1.3.2 Control plane mechanisms -- 1.3.3 Transport of IPv6 over an IPv4 MPLS core -- 1.4 Conclusion -- 1.5 References -- 1.6 Further reading -- 1.7 Study questions -- 2 Traffic Engineering with MPLS (MPLS-TE) -- 2.1 Introduction -- 2.2 The business drivers -- 2.3 Application scenarios -- 2.4 Setting up traffic-engineered paths using MPLS-TE -- 2.4.1 LSP priorities and preemption -- 2.4.2 Information distribution - IGP extensions -- 2.4.3 Path calculation - CSPF -- 2.4.4 Path setup - RSVP extensions and admission control -- 2.5 Using the traffic-engineered paths -- 2.6 Deployment considerations -- 2.6.1 Scalability -- 2.6.2 Reservation granularity -- 2.6.3 Routing challenges -- 2.7 Using traffic engineering to achieve resource optimization -- 2.7.1 Autobandwidth - dealing with unknown bandwidth requirements -- 2.7.2 Sharing links between RSVP and other traffic - dealing with unknown bandwidth availability -- 2.7.3 Other methods for optimization of transmission resources in MPLS networks -- 2.8 Offline path computation -- 2.9 Conclusion -- 2.10 References -- 2.11 Further reading -- 2.12 Study questions -- 3 Protection and Restoration in MPLS Networks -- 3.1 Introduction -- 3.2 The business drivers -- 3.3 Failure detection -- 3.4 End-to-end protection -- 3.4.1 Control over the traffic flow following a failure -- 3.4.2 Requirement for path diversity -- 3.4.3 Double-booking of resources -- 3.4.4 Unnecessary protection -- 3.4.5 Nondeterministic switchover delay -- 3.5 Local protection using fast reroute -- 3.5.1 Case (i): link protection, for the facility protection case.
3.5.2 Case (ii): link protection, for the 1:1 protection case -- 3.5.3 Case (iii): node protection, for the facility protection case -- 3.5.4 Case (iv): node protection, for the 1:1 protection case -- 3.6 Link protection -- 3.6.1 What happens before the failure -- 3.6.2 What happens after the failure -- 3.7 Node protection -- 3.8 Additional constraints for the computation of the protection path -- 3.8.1 Fate sharing -- 3.8.2 Bandwidth protection -- 3.8.3 Bandwidth protection and DiffServ -- 3.9 Interaction of end-to-end protection and fast reroute -- 3.10 Deployment considerations for local protection mechanisms -- 3.10.1 Scalability considerations -- 3.10.2 Evaluating a local protection implementation -- 3.10.3 The cost of bandwidth protection -- 3.11 IP and LDP FRR -- 3.11.1 The tunnel-based approach -- 3.11.2 The alternate-path approach -- 3.12 Conclusion -- 3.13 References -- 3.14 Further reading -- 3.15 Study questions -- 4 MPLS DiffServ-TE -- 4.1 Introduction -- 4.2 The business drivers -- 4.3 Application scenarios -- 4.3.1 Limiting the proportion of traffic from a particular class on a link -- 4.3.2 Maintaining relative proportions of traffic on links -- 4.3.3 Providing guaranteed bandwidth services -- 4.4 The DiffServ-TE solution -- 4.4.1 Class types -- 4.4.2 Path computation -- 4.4.3 Path signaling -- 4.4.4 Bandwidth constraint models -- 4.4.5 Overbooking -- 4.4.6 The DiffServ in DiffServ-TE -- 4.4.7 Protection -- 4.4.8 Tools for keeping traffic within its reservation limits -- 4.4.9 Deploying the DiffServ-TE solution -- 4.5 Extending the DiffServ-TE solution with multiclass LSPs -- 4.6 Conclusion -- 4.7 References -- 4.8 Further reading -- 4.9 Study questions -- 5 Interdomain Traffic Engineering -- 5.1 Introduction -- 5.2 The business drivers -- 5.3 Setting up interdomain TE LSPs -- 5.3.1 Path setup -- 5.3.2 Path computation.
5.3.3 Reoptimization -- 5.3.4 Protection and fast reroute -- 5.4 Interprovider challenges -- 5.5 Comparison of the LSP setup methods -- 5.6 Conclusion -- 5.7 References -- 5.8 Further reading -- 5.9 Study questions -- 6 MPLS Multicast -- 6.1 Introduction -- 6.2 The business drivers -- 6.3 P2MP LSP mechanisms -- 6.3.1 Forwarding plane mechanisms -- 6.3.2 Control plane mechanisms -- 6.4 LAN procedures for P2MP LSPs -- 6.4.1 Upstream label allocation -- 6.5 Coupling traffic into a P2MP LSP -- 6.5.1 Coupling Layer 2 traffic into a P2MP LSP -- 6.5.2 Coupling IP unicast traffic into a P2MP LSP -- 6.5.3 Coupling IP multicast traffic into a P2MP LSP -- 6.6 MPLS fast reroute -- 6.7 Ingress redundancy for P2MP LSPs -- 6.8 P2MP LSP hierarchy -- 6.8.1 P2MP LSP hierarchy forwarding plane operation -- 6.8.2 P2MP LSP hierarchy control plane operation -- 6.9 Applications of point-to-multipoint LSPs -- 6.9.1 Application of P2MP TE to broadcast TV distribution -- 6.9.2 Application of P2MP LSPs to L3VPN multicast -- 6.9.3 Application of P2MP LSPs to VPLS -- 6.10 Conclusion -- 6.11 References -- 6.12 Study questions -- Part Two -- 7 Foundations of Layer 3 BGP/MPLS Virtual Private Networks -- 7.1 Introduction -- 7.2 The business drivers -- 7.3 The overlay VPN model -- 7.4 The peer VPN model -- 7.5 Building the BGP/MPLS VPN solution -- 7.5.1 VPN routing and forwarding tables (VRFs) -- 7.5.2 Constrained route distribution -- 7.5.3 VPN-IPv4 addresses and the route distinguisher (RD) -- 7.5.4 The route target (RT) -- 7.5.5 The solution so far - what is missing? -- 7.5.6 VPN label -- 7.6 Benefits of the BGP/MPLS VPN solution -- 7.7 References -- 7.8 Further reading -- 7.9 Study questions -- 8 Advanced Topics in Layer 3 BGP/MPLS Virtual Private Networks -- 8.1 Introduction -- 8.2 Routing between CE and PE -- 8.3 Differentiated VPN treatment in the core.
8.4 Route reflectors and VPNs -- 8.5 Scalability discussion -- 8.5.1 Potential scaling bottlenecks -- 8.5.2 The cost of growing the VPN network -- 8.6 Convergence times in a VPN network -- 8.6.1 Convergence time for a customer route change -- 8.6.2 Convergence time for a failure in the provider's network -- 8.7 Security issues -- 8.7.1 Can traffic from one VPN 'cross over' into another VPN? -- 8.7.2 Can a security attack on one VPN affect another VPN? -- 8.7.3 Can a security attack against the service provider's infrastructure affect the VPN service? -- 8.8 QoS in a VPN scenario -- 8.9 IPv6 VPNs -- 8.10 Conclusion -- 8.11 References -- 8.12 Further reading -- 8.13 Study questions -- 9 Hierarchical and Inter-AS VPNs -- 9.1 Introduction -- 9.2 Carriers' carrier - service providers as VPN customers -- 9.2.1 ISP as a VPN customer -- 9.2.2 VPN service provider as a VPN customer - hierarchical VPN -- 9.3 Multi-AS backbones -- 9.3.1 Option A: VRF-to-VRF connections at the ASBR -- 9.3.2 Option B: EBGP redistribution of labeled VPN-IPv4 routes -- 9.3.3 Option C: multihop EBGP redistribution of labeled VPN-IPv4 routes between the source and destination AS, with EBGP redistribution of labeled IPv4 routes from one AS to the neighboring AS -- 9.4 Interprovider QoS -- 9.5 Conclusion -- 9.6 References -- 9.7 Further reading -- 9.8 Study questions -- 10 Multicast in a Layer 3 VPN -- 10.1 Introduction -- 10.2 The business drivers -- 10.3 mVPN - problem decomposition -- 10.4 The original multicast solution - PIM/GRE mVPN (draft-rosen) -- 10.4.1 PIM/GRE mVPN - routing information distribution using PIM C-instances -- 10.4.2 PIM/GRE mVPN - carrying multicast traffic across the core using multicast distribution trees -- 10.4.3 Properties of the PIM/GRE mVPN solution -- 10.5 NG multicast for L3VPN - BGP/MPLS mVPN (NG mVPN).
10.5.1 Requirements for support of PIM-SM SSM in an mVPN -- 10.5.2 BGP/MPLS mVPN - carrying multicast mVPN routing information using C-multicast routes -- 10.5.3 BGP/MPLS mVPN - carrying traffic across the provider network using inter-PE MPLS tunnels -- 10.5.4 BGP/MPLS mVPN - inter-PE tunnels - inclusive and selective tunnels -- 10.5.5 BGP/MPLS mVPN - carrying traffic from several mVPNs onto the same inter-PE tunnel -- 10.5.6 BGP/MPLS mVPN - creating inter-PE tunnels using BGP autodiscovery routes -- 10.5.7 Requirements for support of PIM ASM in an mVPN -- 10.5.8 BGP/MPLS mVPN - carrying mVPN active source information using BGP source active autodiscovery routes -- 10.6 Comparison of PIM/GRE and BGP/MPLS mVPNs -- 10.6.1 VPN model used -- 10.6.2 Protocol used in the control plane -- 10.6.3 Data-plane mechanisms -- 10.6.4 Service provider network as a 'LAN' -- 10.6.5 Deployment considerations -- 10.7 Conclusion -- 10.8 References -- 10.9 Further reading -- 10.10 Study questions -- 11 Advanced Topics in BGP/MPLS mVPNs -- 11.1 Introduction -- 11.2 BGP/MPLS mVPN - inter-AS operations -- 11.3 Support of PIM DM in BGP/MPLS mVPN -- 11.4 Discovering the RP - auto-RP and BSR support in BGP/MPLS mVPN -- 11.5 Implementing extranets in BGP/MPLS mVPN -- 11.6 Transition from draft-rosen to BGP/MPLS mVPNs -- 11.7 Scalability discussion -- 11.7.1 PIM/GRE mVPN control plane scaling -- 11.7.2 BGP/MPLS mVPN control plane scaling -- 11.8 Achieving multicast high availability with BGP/MPLS mVPN -- 11.8.1 Live-Standby multicast delivery using BGP/MPLS mVPN -- 11.8.2 Live-Live multicast delivery using BGP/MPLS mVPN -- 11.8.3 Comparison of the Live-Live and Live-Standby multicast high-availability schemes -- 11.9 Internet multicast service using the BGP/MPLS mVPN technology -- 11.10 Conclusion -- 11.11 References -- 11.12 Study questions -- 12 Layer 2 Transport over MPLS.
12.1 Introduction.
Summary: With a foreword by Yakov Rekhter "Here at last is a single, all encompassing resource where the myriad applications sharpen into a comprehensible text that first explains the whys and whats of each application before going on to the technical detail of the hows." -Kireeti Kompella, CTO Junos, Juniper Networks The authoritative guide to MPLS, now in its Third edition, fully updated with brand new material! MPLS is now considered the networking technology for carrying all types of network traffic, including voice telephony, real-time video, and data traffic. In MPLS-Enabled Applications, Third Edition, the authors methodically show how MPLS holds the key to network convergence by allowing operators to offer more services over a single physical infrastructure. The Third Edition contains more than 170 illustrations, new chapters, and more coverage, guiding the reader from the basics of the technology, though all its major VPN applications. MPLS Enabled-Applications contains up-to-date coverage of: The current status and future potential of all major MPLS applications, including L2VPN, L3VPN, pseudowires and VPLS. A new chapter with up to date coverage of the MPLS transport profile, MPLS-TP. MPLS in access networks and Seamless MPLS, the new architecture for extending MPLS into the access, discussed in depth for both the unicast and the multicast case. Extensive coverage of multicast support in L3VPNs (mVPNs), explaining and comparing both the PIM/GRE and the next generation BGP/MPLS solutions, and including a new chapter on advanced topics in next generation multicast VPNs. A new chapter on advanced protection techniques, including detailed discussion of 50 ms end-to-end service restoration. Comprehensive coverage of the base technology, as well as the latest IETF drafts, including topics such as pseudowire redundancy, VPLS multihoming, IRB and P2MPSummary: pseudowires. MPLS-Enabled Applications will provide those involved in the design and deployment of MPLS systems, as well as those researching the area of MPLS networks, with a thoroughly modern view of how MPLS is transforming the networking world. "Essential new material for those trying to understand the next steps in MPLS." -Adrian Farrel, IETF Routing Area Director "MPLS-Enabled Applications takes a unique and creative approach in explaining MPLS concepts and how they are applied in practice to meet the needs of Enterprise and Service Provider networks. I consistently recommend this book to colleagues in the engineering, education and business community." -Dave Cooper, Chief IP Technologist, Global Crossing Ltd.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- MPLS-Enabled Applications -- Contents -- About the Authors -- Foreword -- Preface -- Acknowledgements -- Part One -- 1 Foundations -- 1.1 Historical perspective -- 1.2 Current trends -- 1.3 MPLS mechanisms -- 1.3.1 Forwarding plane mechanisms -- 1.3.2 Control plane mechanisms -- 1.3.3 Transport of IPv6 over an IPv4 MPLS core -- 1.4 Conclusion -- 1.5 References -- 1.6 Further reading -- 1.7 Study questions -- 2 Traffic Engineering with MPLS (MPLS-TE) -- 2.1 Introduction -- 2.2 The business drivers -- 2.3 Application scenarios -- 2.4 Setting up traffic-engineered paths using MPLS-TE -- 2.4.1 LSP priorities and preemption -- 2.4.2 Information distribution - IGP extensions -- 2.4.3 Path calculation - CSPF -- 2.4.4 Path setup - RSVP extensions and admission control -- 2.5 Using the traffic-engineered paths -- 2.6 Deployment considerations -- 2.6.1 Scalability -- 2.6.2 Reservation granularity -- 2.6.3 Routing challenges -- 2.7 Using traffic engineering to achieve resource optimization -- 2.7.1 Autobandwidth - dealing with unknown bandwidth requirements -- 2.7.2 Sharing links between RSVP and other traffic - dealing with unknown bandwidth availability -- 2.7.3 Other methods for optimization of transmission resources in MPLS networks -- 2.8 Offline path computation -- 2.9 Conclusion -- 2.10 References -- 2.11 Further reading -- 2.12 Study questions -- 3 Protection and Restoration in MPLS Networks -- 3.1 Introduction -- 3.2 The business drivers -- 3.3 Failure detection -- 3.4 End-to-end protection -- 3.4.1 Control over the traffic flow following a failure -- 3.4.2 Requirement for path diversity -- 3.4.3 Double-booking of resources -- 3.4.4 Unnecessary protection -- 3.4.5 Nondeterministic switchover delay -- 3.5 Local protection using fast reroute -- 3.5.1 Case (i): link protection, for the facility protection case.

3.5.2 Case (ii): link protection, for the 1:1 protection case -- 3.5.3 Case (iii): node protection, for the facility protection case -- 3.5.4 Case (iv): node protection, for the 1:1 protection case -- 3.6 Link protection -- 3.6.1 What happens before the failure -- 3.6.2 What happens after the failure -- 3.7 Node protection -- 3.8 Additional constraints for the computation of the protection path -- 3.8.1 Fate sharing -- 3.8.2 Bandwidth protection -- 3.8.3 Bandwidth protection and DiffServ -- 3.9 Interaction of end-to-end protection and fast reroute -- 3.10 Deployment considerations for local protection mechanisms -- 3.10.1 Scalability considerations -- 3.10.2 Evaluating a local protection implementation -- 3.10.3 The cost of bandwidth protection -- 3.11 IP and LDP FRR -- 3.11.1 The tunnel-based approach -- 3.11.2 The alternate-path approach -- 3.12 Conclusion -- 3.13 References -- 3.14 Further reading -- 3.15 Study questions -- 4 MPLS DiffServ-TE -- 4.1 Introduction -- 4.2 The business drivers -- 4.3 Application scenarios -- 4.3.1 Limiting the proportion of traffic from a particular class on a link -- 4.3.2 Maintaining relative proportions of traffic on links -- 4.3.3 Providing guaranteed bandwidth services -- 4.4 The DiffServ-TE solution -- 4.4.1 Class types -- 4.4.2 Path computation -- 4.4.3 Path signaling -- 4.4.4 Bandwidth constraint models -- 4.4.5 Overbooking -- 4.4.6 The DiffServ in DiffServ-TE -- 4.4.7 Protection -- 4.4.8 Tools for keeping traffic within its reservation limits -- 4.4.9 Deploying the DiffServ-TE solution -- 4.5 Extending the DiffServ-TE solution with multiclass LSPs -- 4.6 Conclusion -- 4.7 References -- 4.8 Further reading -- 4.9 Study questions -- 5 Interdomain Traffic Engineering -- 5.1 Introduction -- 5.2 The business drivers -- 5.3 Setting up interdomain TE LSPs -- 5.3.1 Path setup -- 5.3.2 Path computation.

5.3.3 Reoptimization -- 5.3.4 Protection and fast reroute -- 5.4 Interprovider challenges -- 5.5 Comparison of the LSP setup methods -- 5.6 Conclusion -- 5.7 References -- 5.8 Further reading -- 5.9 Study questions -- 6 MPLS Multicast -- 6.1 Introduction -- 6.2 The business drivers -- 6.3 P2MP LSP mechanisms -- 6.3.1 Forwarding plane mechanisms -- 6.3.2 Control plane mechanisms -- 6.4 LAN procedures for P2MP LSPs -- 6.4.1 Upstream label allocation -- 6.5 Coupling traffic into a P2MP LSP -- 6.5.1 Coupling Layer 2 traffic into a P2MP LSP -- 6.5.2 Coupling IP unicast traffic into a P2MP LSP -- 6.5.3 Coupling IP multicast traffic into a P2MP LSP -- 6.6 MPLS fast reroute -- 6.7 Ingress redundancy for P2MP LSPs -- 6.8 P2MP LSP hierarchy -- 6.8.1 P2MP LSP hierarchy forwarding plane operation -- 6.8.2 P2MP LSP hierarchy control plane operation -- 6.9 Applications of point-to-multipoint LSPs -- 6.9.1 Application of P2MP TE to broadcast TV distribution -- 6.9.2 Application of P2MP LSPs to L3VPN multicast -- 6.9.3 Application of P2MP LSPs to VPLS -- 6.10 Conclusion -- 6.11 References -- 6.12 Study questions -- Part Two -- 7 Foundations of Layer 3 BGP/MPLS Virtual Private Networks -- 7.1 Introduction -- 7.2 The business drivers -- 7.3 The overlay VPN model -- 7.4 The peer VPN model -- 7.5 Building the BGP/MPLS VPN solution -- 7.5.1 VPN routing and forwarding tables (VRFs) -- 7.5.2 Constrained route distribution -- 7.5.3 VPN-IPv4 addresses and the route distinguisher (RD) -- 7.5.4 The route target (RT) -- 7.5.5 The solution so far - what is missing? -- 7.5.6 VPN label -- 7.6 Benefits of the BGP/MPLS VPN solution -- 7.7 References -- 7.8 Further reading -- 7.9 Study questions -- 8 Advanced Topics in Layer 3 BGP/MPLS Virtual Private Networks -- 8.1 Introduction -- 8.2 Routing between CE and PE -- 8.3 Differentiated VPN treatment in the core.

8.4 Route reflectors and VPNs -- 8.5 Scalability discussion -- 8.5.1 Potential scaling bottlenecks -- 8.5.2 The cost of growing the VPN network -- 8.6 Convergence times in a VPN network -- 8.6.1 Convergence time for a customer route change -- 8.6.2 Convergence time for a failure in the provider's network -- 8.7 Security issues -- 8.7.1 Can traffic from one VPN 'cross over' into another VPN? -- 8.7.2 Can a security attack on one VPN affect another VPN? -- 8.7.3 Can a security attack against the service provider's infrastructure affect the VPN service? -- 8.8 QoS in a VPN scenario -- 8.9 IPv6 VPNs -- 8.10 Conclusion -- 8.11 References -- 8.12 Further reading -- 8.13 Study questions -- 9 Hierarchical and Inter-AS VPNs -- 9.1 Introduction -- 9.2 Carriers' carrier - service providers as VPN customers -- 9.2.1 ISP as a VPN customer -- 9.2.2 VPN service provider as a VPN customer - hierarchical VPN -- 9.3 Multi-AS backbones -- 9.3.1 Option A: VRF-to-VRF connections at the ASBR -- 9.3.2 Option B: EBGP redistribution of labeled VPN-IPv4 routes -- 9.3.3 Option C: multihop EBGP redistribution of labeled VPN-IPv4 routes between the source and destination AS, with EBGP redistribution of labeled IPv4 routes from one AS to the neighboring AS -- 9.4 Interprovider QoS -- 9.5 Conclusion -- 9.6 References -- 9.7 Further reading -- 9.8 Study questions -- 10 Multicast in a Layer 3 VPN -- 10.1 Introduction -- 10.2 The business drivers -- 10.3 mVPN - problem decomposition -- 10.4 The original multicast solution - PIM/GRE mVPN (draft-rosen) -- 10.4.1 PIM/GRE mVPN - routing information distribution using PIM C-instances -- 10.4.2 PIM/GRE mVPN - carrying multicast traffic across the core using multicast distribution trees -- 10.4.3 Properties of the PIM/GRE mVPN solution -- 10.5 NG multicast for L3VPN - BGP/MPLS mVPN (NG mVPN).

10.5.1 Requirements for support of PIM-SM SSM in an mVPN -- 10.5.2 BGP/MPLS mVPN - carrying multicast mVPN routing information using C-multicast routes -- 10.5.3 BGP/MPLS mVPN - carrying traffic across the provider network using inter-PE MPLS tunnels -- 10.5.4 BGP/MPLS mVPN - inter-PE tunnels - inclusive and selective tunnels -- 10.5.5 BGP/MPLS mVPN - carrying traffic from several mVPNs onto the same inter-PE tunnel -- 10.5.6 BGP/MPLS mVPN - creating inter-PE tunnels using BGP autodiscovery routes -- 10.5.7 Requirements for support of PIM ASM in an mVPN -- 10.5.8 BGP/MPLS mVPN - carrying mVPN active source information using BGP source active autodiscovery routes -- 10.6 Comparison of PIM/GRE and BGP/MPLS mVPNs -- 10.6.1 VPN model used -- 10.6.2 Protocol used in the control plane -- 10.6.3 Data-plane mechanisms -- 10.6.4 Service provider network as a 'LAN' -- 10.6.5 Deployment considerations -- 10.7 Conclusion -- 10.8 References -- 10.9 Further reading -- 10.10 Study questions -- 11 Advanced Topics in BGP/MPLS mVPNs -- 11.1 Introduction -- 11.2 BGP/MPLS mVPN - inter-AS operations -- 11.3 Support of PIM DM in BGP/MPLS mVPN -- 11.4 Discovering the RP - auto-RP and BSR support in BGP/MPLS mVPN -- 11.5 Implementing extranets in BGP/MPLS mVPN -- 11.6 Transition from draft-rosen to BGP/MPLS mVPNs -- 11.7 Scalability discussion -- 11.7.1 PIM/GRE mVPN control plane scaling -- 11.7.2 BGP/MPLS mVPN control plane scaling -- 11.8 Achieving multicast high availability with BGP/MPLS mVPN -- 11.8.1 Live-Standby multicast delivery using BGP/MPLS mVPN -- 11.8.2 Live-Live multicast delivery using BGP/MPLS mVPN -- 11.8.3 Comparison of the Live-Live and Live-Standby multicast high-availability schemes -- 11.9 Internet multicast service using the BGP/MPLS mVPN technology -- 11.10 Conclusion -- 11.11 References -- 11.12 Study questions -- 12 Layer 2 Transport over MPLS.

12.1 Introduction.

With a foreword by Yakov Rekhter "Here at last is a single, all encompassing resource where the myriad applications sharpen into a comprehensible text that first explains the whys and whats of each application before going on to the technical detail of the hows." -Kireeti Kompella, CTO Junos, Juniper Networks The authoritative guide to MPLS, now in its Third edition, fully updated with brand new material! MPLS is now considered the networking technology for carrying all types of network traffic, including voice telephony, real-time video, and data traffic. In MPLS-Enabled Applications, Third Edition, the authors methodically show how MPLS holds the key to network convergence by allowing operators to offer more services over a single physical infrastructure. The Third Edition contains more than 170 illustrations, new chapters, and more coverage, guiding the reader from the basics of the technology, though all its major VPN applications. MPLS Enabled-Applications contains up-to-date coverage of: The current status and future potential of all major MPLS applications, including L2VPN, L3VPN, pseudowires and VPLS. A new chapter with up to date coverage of the MPLS transport profile, MPLS-TP. MPLS in access networks and Seamless MPLS, the new architecture for extending MPLS into the access, discussed in depth for both the unicast and the multicast case. Extensive coverage of multicast support in L3VPNs (mVPNs), explaining and comparing both the PIM/GRE and the next generation BGP/MPLS solutions, and including a new chapter on advanced topics in next generation multicast VPNs. A new chapter on advanced protection techniques, including detailed discussion of 50 ms end-to-end service restoration. Comprehensive coverage of the base technology, as well as the latest IETF drafts, including topics such as pseudowire redundancy, VPLS multihoming, IRB and P2MP

pseudowires. MPLS-Enabled Applications will provide those involved in the design and deployment of MPLS systems, as well as those researching the area of MPLS networks, with a thoroughly modern view of how MPLS is transforming the networking world. "Essential new material for those trying to understand the next steps in MPLS." -Adrian Farrel, IETF Routing Area Director "MPLS-Enabled Applications takes a unique and creative approach in explaining MPLS concepts and how they are applied in practice to meet the needs of Enterprise and Service Provider networks. I consistently recommend this book to colleagues in the engineering, education and business community." -Dave Cooper, Chief IP Technologist, Global Crossing Ltd.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

Powered by Koha