책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 일반
· ISBN : 9781587201202
· 쪽수 : 432쪽
· 출판일 : 2005-12-01
목차
Introduction xxii
Part 1 The Business Case for MPLS 1(56)
The Dynamics of Service Creation and Deployment 3(28)
Industry Dynamics and Challenges 4(3)
What About the Enterprise Market? 7(2)
Service Provider Business Engineering 7(2)
Business Drivers and Requirements 9(5)
Enterprise Customers 10(1)
Enterprise Motivations for Migrating to Layer 3 Services 11(3)
Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself 14(4)
Do-It-Yourself 15(1)
Enterprise Segmentation 16(2)
Central Services with an Enterprise Campus 18(1)
Subscribing to a Managed Layer 3 MPLS VPN Service 18(4)
The Case for Building VPNs---Layer 2 or Layer 3 22(4)
Existing Technologies---Frame Relay, ATM, and IP-Based Networks: What Can They Solve? 26(1)
Frame Relay 26(2)
Asynchronous Transfer Mode 27(1)
The Internet Protocol 28(1)
Service Examples 29(1)
Summary 30(1)
The Scope of Service Types 31(26)
Overview of Layer 2 Services 34(5)
Ethernet Services 35(4)
Next-Generation Network Overview and Interworking Functions 39(3)
Layer 3 Services 42(3)
Remote Access 45(3)
Value-Added Services 48(7)
Summary 55(2)
Part 2 The Technical Case for MPLS 57(46)
Technology Overview: Making the Technology case for MPLS and Technology Details 59(44)
Available Technologies and Options 60(2)
Why MPLS? (High-Level Detail) 62(4)
MPLS and Quality of Service 66(5)
Differentiating Service with Traffic Engineering 69(1)
Multicast 70(1)
Benefits 71(3)
MPLS Technology Details 74(1)
Layer 3 VPNs 75(8)
Peer-to-Peer Model 77(1)
VRF and Its Function 78(2)
MPLS Label Stack Role 80(1)
Topologies 81(2)
Carrier Supporting Carrier and Inter-Provider Autonomous Systems 83(1)
Traffic Engineering 84(7)
DiffServ 91(4)
Layer 2 VPNs 95(6)
Summary 101(2)
Part 3 MPLS Services and Components 103(198)
Layer 2 VPNs 105(34)
Taxonomy 108(3)
Introducing AToM 111(9)
Pseudowire Systems Architecture 112(2)
Packet Forwarding 114(1)
Layer 2 Transport Types (Like-to-Like) 115(1)
Ethernet Service 115(1)
Link Layer Service 116(1)
Frame Relay Service 116(1)
ATM Service 117(1)
Configuration of Pseudowires 118(2)
Layer 2 Interworking 120(3)
Interworking Modes 121(1)
Interworking Models and Applications 121(2)
Virtual Private LAN Service 123(1)
Considerations for VPLS 123(1)
Provisioning and Signaling 124(8)
LDP Signaling 126(2)
BGP Signaling 128(4)
Benefits of L2VPNs 132(3)
Inter-AS L2VPNs 135(1)
Supported IETF Standards 136(1)
Summary 137(1)
Standards and References 138(1)
Layer 3 VPNs 139(24)
Technology Overview 141(5)
Separation of Routing Information Between VPNs 141(1)
Constrained Distribution of Routing Information 142(2)
Forwarding Packets Through the Network Core 144(1)
Packet Flow Through the Network 145(1)
Corporate Intranet 146(2)
Corporate Extranet 148(1)
Internet Access 149(5)
Dedicated per-VPN Internet Access 151(1)
Shared PE---Internet and VPN 151(1)
Dedicated PE---Shared Backbone 152(1)
Managed Central Service---Shared Internet Access 152(2)
Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks 154(2)
Inter-AS VPNs 154(1)
Carrier Supporting Carrier 155(1)
Heterogeneous Networks 156(1)
Managed Central Services 157(4)
Making Applications and Services VRF-Aware 158(1)
VRF-Aware Address Management 159(2)
Supported IETF Drafts 161(1)
Summary 162(1)
Standards and References 162(1)
Remote Access and IPSec Integration with MPLS VPNs 163(14)
Technology Overview 164(9)
Dial Access 166(1)
Individual Access 167(1)
CE Dial Backup Access 168(1)
Dial-Out Access 169(1)
DSL Access 170(1)
Routed Encapsulation 171(1)
Bridged Encapsulation 171(1)
Cable Access 172(1)
PE-CE Routing Protocols 173(1)
Scalability and Network Convergence for Remote Access 174(1)
Summary 175(2)
MPLS Security 177(46)
Security and NGN 178(2)
Security Overview and MPLS 180(4)
MPLS VPN and Security 184(5)
Attack Scenarios 189(12)
Internet/Extranet and MPLS Security 197(4)
IPSec 201(7)
MPLS VPN (BGP VPN) Security Issues and Options 203(5)
Layer 2 and Unmanaged VPN Service Considerations 208(9)
Design Option Examples 209(3)
Carrier's Carrier Network and Inter-Autonomous Considerations 212(3)
Customer Edge Router Security Considerations 215(2)
Overall Best Practice Recommendations 217(2)
Summary 219(1)
Standards and References 220(3)
Traffic Engineering 223(26)
Problem Statement 224(3)
Technology Overview 227(7)
IGP Extensions and Distribution of Constraints 227(1)
Signaling of TE Tunnels 228(2)
Forwarding Packets Through the Network Core 230(1)
Sequence of Operation 231(1)
TE Tunnel Maintenance 232(2)
TE Applications and Examples 234(3)
Intra-Area TE 234(1)
Inter-Autonomous System TE 235(1)
Quality of Service and TE 236(1)
Traffic Handling of Delay-Sensitive Traffic 236(1)
Protection and Restoration 237(6)
Link Protection 237(2)
Node Protection 239(2)
Path Protection 241(1)
Usage Scenarios 242(1)
Scalability of Protection Mechanisms 242(1)
Scaling MPLS TE 243(1)
MPLS Traffic Engineering and Multicast 244(2)
Standards and References 246(1)
Summary 247(2)
Quality of Service 249(22)
Problem Statement 250(18)
IP QoS 252(1)
QoS Building Blocks 252(4)
IntServ 256(1)
DiffServ 257(1)
Packet Handling 258(1)
The Hybrid Model 258(1)
MPLS QoS 259(1)
MPLS DiffServ 259(3)
Traffic Engineering and DiffServ 262(1)
DiffServ-Aware Traffic Engineering 262(3)
MPLS QoS Service Examples 265(1)
Point-to-Cloud Model 265(1)
Olympic Service Model 265(1)
Traffic-Engineered Voice Model 266(1)
Virtual Leased Line 266(1)
On-Demand QoS 266(1)
MPLS and IntServ 267(1)
Traffic Flows to MPLS DiffServ Mapping 267(1)
Tunnel-Based Admission Control 268(1)
Standards and References 268(1)
Summary 269(2)
Mutlicasts and NGNs 271(16)
Problem Statement 273(2)
MPLS Multicast VPN Overview 275(6)
Multicast VPN Operational Details 277(4)
MPLS Multicast VPN Applications and Examples 281(2)
Multicast Security and Management Considerations 283(2)
Standards and References 285(1)
Summary 285(2)
IPv6 and MPLS 287(14)
Problem Statement 290(1)
Technology Overview 290(9)
IPv6 PE 292(1)
Multiprotocol BGP Extensions 292(1)
Packet Path 293(1)
IPv6 VPNs (6VPE) 294(1)
Route Tagging 294(1)
Virtual Routing and Forwading with IPv6 294(1)
Packet Path 295(1)
The Coexistence of IPv4 L3VPN and IPv6 L3VPN 296(1)
IPv6 Network Core 297(1)
Inter-AS Networks for 6PE and v6VPNs 297(1)
IPv6 QoS 298(1)
MPLS QoS for IPv6 299(1)
Management and IPv6 299(1)
Summary 300(1)
Part 4 Bringing Your MPLS Plan Together 301(82)
Network Management and Provisioning 303(28)
Problem Statement 304(2)
Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management 306(2)
MPLS OAM 307(1)
VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms 308(1)
Dealing with Equal Cost Multipaths 309(2)
Noncompliant Routers 310(1)
LSR Self-Test 310(1)
Virtual Circuit Connection Verification and Bidirectional Forwarding Detection 311(3)
A Word About Interworking OAM 314(3)
Any to Any 314(1)
Local Switching 315(1)
Encapsulation Types and Modes 315(1)
ATM over MPLS 315(1)
ATM N:1 Mode 315(1)
ATM I:1 Mode 316(1)
AALS SDU Mode 316(1)
AAL5 PDU Mode 316(1)
Frame Relay over MPLS 316(1)
Generic Failure Types 317(1)
Interface Failure 317(1)
Pseudo wire Failures 317(1)
Tunnel LSP Failures 318(1)
Configuration Management for MPLS-Based Networks 318(4)
Accounting for MPLS-Based Networks 322(1)
Performance Management for MPLS-Based Networks 323(1)
Security Management for MPLS-Based Networks 324(1)
Per-VPN Management 324(3)
IP Addressing 325(2)
VRF-Aware Network Address Translation 327(1)
Supported MIBs 327(1)
Standards and References 328(1)
Summary 329(2)
Design Considerations: Putting it All Together 331(26)
VRF-Aware Feature 332(7)
IP Addressing: VRF-Aware DHCP 334(1)
DHCP Deployment Examples 335(3)
Deployment Guideline Summary 338(1)
VRF-Aware Network Address Translation 338(1)
NAT-PE System Flow 339(2)
Inside-to-Outside Packet Flow 340(1)
Outside-to-Inside Packet Flow 340(1)
Deployment Guideline Summary 341(1)
Management, Provisioning, and Troubleshooting 342(1)
Equipment Scalability Versus Network Scalability 343(11)
Network Element Characteristics 346(1)
Network Parameters 347(2)
Network-Wide Scale 349(2)
Management and Scalability 351(1)
Layer 2 VPNs---What to Expect 352(1)
Same Grade of Service 352(1)
Planning and Sizing 353(1)
Density 353(1)
Management 354(1)
Summary 354(3)
MPLS Case Studies 357(8)
The Background on Equant 358(2)
Equant Business Drivers 359(1)
Equant Services 359(1)
VPN Bridge Case Study 360(2)
Background 360(1)
Customer Issues/Objectives 360(1)
The Account Team's Keys to Success 361(1)
Case Study Conclusion 362(1)
Summary 363(2)
The Future of MPLS 365(18)
Integrating IP and Optical Networks (Transport Area) 367(5)
How Does it Work? 368(3)
Bandwidth On-Demand Service 371(1)
Challenges Faced with G-MPLS and UCP 371(1)
Future Layer 3 Services 372(2)
Label-Switched Multicast 372(1)
Dynamic Encrypted VPNs 373(1)
Content-Based Services 373(1)
Adaptive Networks for Integration of Voice and Video 373(1)
Security Enhancements 374(1)
Future Layer 2 Services 374(2)
ATM-MPLS Interworking 375(1)
Layer 2 VPNs Across Multiple Provider Networks 375(1)
VPLS Service Across a Non-Ethernet Last Mile 375(1)
Future Enhancements in Provisioning and Management 376(1)
Adaptive Self-Healing Networks 376(1)
Increasing Enterprise Deployment of MPLS 377(1)
Summary 377(1)
So, What Is the Future of MPLS? 378(1)
A View from George Swallow 378(2)
A View from Adrian Farrell 380(3)
Index 383














