Book description
With a foreword by Yakov Rekhter
"Here at last is a single, all encompassing resource where the myriad applications sharpen into a comprehensible text that first explains the whys and whats of each application before going on to the technical detail of the hows."
Kireeti Kompella, CTO Junos, Juniper Networks
The authoritative guide to MPLS, now in its Third edition, fully updated with brand new material!
MPLS is now considered the networking technology for carrying all types of network traffic, including voice telephony, real-time video, and data traffic. In MPLS-Enabled Applications, Third Edition, the authors methodically show how MPLS holds the key to network convergence by allowing operators to offer more services over a single physical infrastructure. The Third Edition contains more than 170 illustrations, new chapters, and more coverage, guiding the reader from the basics of the technology, though all its major VPN applications.
MPLS Enabled-Applications contains up-to-date coverage of:
The current status and future potential of all major MPLS applications, including L2VPN, L3VPN, pseudowires and VPLS.
A new chapter with up to date coverage of the MPLS transport profile, MPLS-TP.
MPLS in access networks and Seamless MPLS, the new architecture for extending MPLS into the access, discussed in depth for both the unicast and the multicast case.
Extensive coverage of multicast support in L3VPNs (mVPNs), explaining and comparing both the PIM/GRE and the next generation BGP/MPLS solutions, and including a new chapter on advanced topics in next generation multicast VPNs.
A new chapter on advanced protection techniques, including detailed discussion of 50 ms end-to-end service restoration.
Comprehensive coverage of the base technology, as well as the latest IETF drafts, including topics such as pseudowire redundancy, VPLS multihoming, IRB and P2MP pseudowires.
MPLS-Enabled Applications will provide those involved in the design and deployment of MPLS systems, as well as those researching the area of MPLS networks, with a thoroughly modern view of how MPLS is transforming the networking world.
"Essential new material for those trying to understand the next steps in MPLS."
Adrian Farrel, IETF Routing Area Director
"MPLS-Enabled Applications takes a unique and creative approach in explaining MPLS concepts and how they are applied in practice to meet the needs of Enterprise and Service Provider networks. I consistently recommend this book to colleagues in the engineering, education and business community."
Dave Cooper, Chief IP Technologist, Global Crossing Ltd
Table of contents
- Cover
- Endorsement
- Half Title
- Series
- Title Page
- Copyright
- About the Authors
- Foreword
- Preface
- Acknowledgements
-
Part One
- 1: Foundations
-
2: Traffic Engineering With MPLS (MPLS-TE)
- 2.1 INTRODUCTION
- 2.2 THE BUSINESS DRIVERS
- 2.3 APPLICATION SCENARIOS
- 2.4 SETTING UP TRAFFIC-ENGINEERED PATHS USING MPLS-TE
- 2.5 USING THE TRAFFIC-ENGINEERED PATHS
- 2.6 DEPLOYMENT CONSIDERATIONS
- 2.7 USING TRAFFIC ENGINEERING TO ACHIEVE RESOURCE OPTIMIZATION
- 2.8 OFFLINE PATH COMPUTATION
- 2.9 CONCLUSION
- 2.10 REFERENCES
- 2.11 FURTHER READING
- 2.12 STUDY QUESTIONS
-
3: Protection And Restoration In MPLS Networks
- 3.1 INTRODUCTION
- 3.2 THE BUSINESS DRIVERS
- 3.3 FAILURE DETECTION
- 3.4 END-TO-END PROTECTION
- 3.5 LOCAL PROTECTION USING FAST REROUTE
- 3.6 LINK PROTECTION
- 3.7 NODE PROTECTION
- 3.8 ADDITIONAL CONSTRAINTS FOR THE COMPUTATION OF THE PROTECTION PATH
- 3.9 INTERACTION OF END-TO-END PROTECTION AND FAST REROUTE
- 3.10 DEPLOYMENT CONSIDERATIONS FOR LOCAL PROTECTION MECHANISMS
- 3.11 IP AND LDP FRR
- 3.12 CONCLUSION
- 3.13 REFERENCES
- 3.14 FURTHER READING
- 3.15 STUDY QUESTIONS
- 4: MPLS DiffServ-TE
- 5: Interdomain Traffic Engineering
-
6: MPLS Multicast
- 6.1 INTRODUCTION
- 6.2 THE BUSINESS DRIVERS
- 6.3 P2MP LSP MECHANISMS
- 6.4 LAN PROCEDURES FOR P2MP LSPs
- 6.5 COUPLING TRAFFIC INTO A P2MP LSP
- 6.6 MPLS FAST REROUTE
- 6.7 INGRESS REDUNDANCY FOR P2MP LSPs
- 6.8 P2MP LSP HIERARCHY
- 6.9 APPLICATIONS OF POINT-TO-MULTIPOINT LSPs
- 6.10 CONCLUSION
- 6.11 REFERENCES
- 6.12 STUDY QUESTIONS
-
Part Two
- 7: Foundations of Layer 3 BGP/MPLS Virtual Private Networks
-
8: Advanced Topics in Layer 3 BGP/MPLS Virtual Private Networks
- 8.1 INTRODUCTION
- 8.2 ROUTING BETWEEN CE AND PE
- 8.3 DIFFERENTIATED VPN TREATMENT IN THE CORE
- 8.4 ROUTE REFLECTORS AND VPNs
- 8.5 SCALABILITY DISCUSSION
- 8.6 CONVERGENCE TIMES IN A VPN NETWORK
- 8.7 SECURITY ISSUES
- 8.8 QoS IN A VPN SCENARIO
- 8.9 IPv6 VPNs
- 8.10 CONCLUSION
- 8.11 REFERENCES
- 8.12 FURTHER READING
- 8.13 STUDY QUESTIONS
- 9: Hierarchical and Inter-AS VPNs
-
10: Multicast in a Layer 3 VPN
- 10.1 INTRODUCTION
- 10.2 THE BUSINESS DRIVERS
- 10.3 mVPN – PROBLEM DECOMPOSITION
- 10.4 THE ORIGINAL MULTICAST SOLUTION − PIM/GRE mVPN (DRAFT-ROSEN)
- 10.5 NG MULTICAST FOR L3VPN – BGP/MPLS mVPN (NG mVPN)
- 10.6 COMPARISON OF PIM/GRE AND BGP/MPLS mVPNs
- 10.7 CONCLUSION
- 10.8 REFERENCES
- 10.9 FURTHER READING
- 10.10 STUDY QUESTIONS
-
11: Advanced Topics in BGP/MPLS mVPNs
- 11.1 INTRODUCTION
- 11.2 BGP/MPLS mVPN – INTER-AS OPERATIONS
- 11.3 SUPPORT OF PIM DM IN BGP/MPLS mVPN
- 11.4 DISCOVERING THE RP – AUTO-RP AND BSR SUPPORT IN BGP/MPLS mVPN
- 11.5 IMPLEMENTING EXTRANETS IN BGP/MPLS mVPN
- 11.6 TRANSITION FROM DRAFT-ROSEN TO BGP/MPLS mVPNs
- 11.7 SCALABILITY DISCUSSION
- 11.8 ACHIEVING MULTICAST HIGH AVAILABILITY WITH BGP/MPLS mVPN
- 11.9 INTERNET MULTICAST SERVICE USING THE BGP/MPLS mVPN TECHNOLOGY
- 11.10 CONCLUSION
- 11.11 REFERENCES
- 11.12 STUDY QUESTIONS
-
12: Layer 2 Transport over MPLS
- 12.1 INTRODUCTION
- 12.2 THE BUSINESS DRIVERS
- 12.3 COMPARISON OF LAYER 2 VPNs AND LAYER 3 VPNs
- 12.4 PRINCIPLES OF LAYER 2 TRANSPORT OVER MPLS
- 12.5 FORWARDING PLANE
- 12.6 CONTROL PLANE OPERATION
- 12.7 ADMISSION CONTROL OF LAYER 2 CONNECTIONS INTO NETWORK
- 12.8 FAILURE NOTIFICATION MECHANISMS
- 12.9 MULTI-HOMING
- 12.10 LAYER 2 INTERWORKING
- 12.11 CIRCUIT CROSS CONNECT (CCC)
- 12.12 POINT-TO-MULTIPOINT LAYER 2 TRANSPORT
- 12.13 OTHER APPLICATIONS OF LAYER 2 TRANSPORT
- 12.14 CONCLUSION
- 12.15 REFERENCES
- 12.16 STUDY QUESTIONS
-
13: Virtual Private LAN Service
- 13.1 INTRODUCTION
- 13.2 THE BUSINESS DRIVERS
- 13.3 VPLS MECHANISM OVERVIEW
- 13.4 FORWARDING PLANE MECHANISMS
- 13.5 CONTROL PLANE MECHANISMS
- 13.6 LDP AND BGP INTERWORKING FOR VPLS
- 13.7 INTERPROVIDER OPTION E FOR VPLS
- 13.8 OPERATIONAL CONSIDERATIONS FOR VPLS
- 13.9 CONCLUSION
- 13.10 REFERENCES
- 13.11 STUDY QUESTIONS
- Part Three
- Appendix A: Selected Backhaul Scenarios in MPLS-Based Access Networks
- Appendix B: MPLS Resources
- Appendix C: Solutions to Selected Study Questions
- Appendix D: Acronyms
- Index
Product information
- Title: MPLS-Enabled Applications: Emerging Developments and New Technologies, Third Edition
- Author(s):
- Release date: March 2011
- Publisher(s): Wiley
- ISBN: 9780470976135
You might also like
book
MPLS-Enabled Applications: Emerging Developments and New Technologies
Kireeti Kompella, Juniper Fellow, Juniper Networks. “Here at last is a single, all-encompassing resource where the …
book
Digital Communications: Fundamentals and Applications, 3rd Edition
The Best-Selling Introduction to Digital Communications: Thoroughly Revised and Updated for OFDM, MIMO, LTE, and More …
audiobook
Transformed
Help transform your business and innovate like the world's top tech companies! Transformed: Moving to the …
book
The Essential Guide to Telecommunication, 6th Edition
“Annabel Dodd has cogently untangled the wires and switches and technobabble of the telecommunications revolution and …