MPLS-Enabled Applications: Emerging Developments and New Technologies / Edition 3

MPLS-Enabled Applications: Emerging Developments and New Technologies / Edition 3

4.7 11
by Ina Minei, Julian Lucek

View All Available Formats & Editions

ISBN-10: 0470665459

ISBN-13: 9780470665459

Pub. Date: 03/08/2011

Publisher: Wiley

With a foreword by Yakov Rekhter

"Here at last is a single, all encompassing resource where the myriad applications sharpen into a comprehensible text that first explains the whys and whats of each application before going on to the technical detail of the hows."
Kireeti Kompella, CTO Junos, Juniper Networks

The authoritative guide


With a foreword by Yakov Rekhter

"Here at last is a single, all encompassing resource where the myriad applications sharpen into a comprehensible text that first explains the whys and whats of each application before going on to the technical detail of the hows."
Kireeti Kompella, CTO Junos, Juniper Networks

The authoritative guide to MPLS, now in its Third edition, fully updated with brand new material!

MPLS is now considered the networking technology for carrying all types of network traffic, including voice telephony, real-time video, and data traffic. In MPLS-Enabled Applications, Third Edition, the authors methodically show how MPLS holds the key to network convergence by allowing operators to offer more services over a single physical infrastructure. The Third Edition contains more than 170 illustrations, new chapters, and more coverage, guiding the reader from the basics of the technology, though all its major VPN applications.

MPLS Enabled-Applications contains up-to-date coverage of:

  • The current status and future potential of all major MPLS applications, including L2VPN, L3VPN, pseudowires and VPLS.
  • A new chapter with up to date coverage of the MPLS transport profile, MPLS-TP.
  • MPLS in access networks and Seamless MPLS, the new architecture for extending MPLS into the access, discussed in depth for both the unicast and the multicast case.
  • Extensive coverage of multicast support in L3VPNs (mVPNs), explaining and comparing both the PIM/GRE and the next generation BGP/MPLS solutions, and including a new chapter on advanced topics in next generation multicast VPNs.
  • A new chapter on advanced protection techniques, including detailed discussion of 50 ms end-to-end service restoration.
  • Comprehensive coverage of the base technology, as well as the latest IETF drafts, including topics such as pseudowire redundancy, VPLS multihoming, IRB and P2MP pseudowires.

MPLS-Enabled Applications will provide those involved in the design and deployment of MPLS systems, as well as those researching the area of MPLS networks, with a thoroughly modern view of how MPLS is transforming the networking world.

"Essential new material for those trying to understand the next steps in MPLS."
—Adrian Farrel, IETF Routing Area Director

"MPLS-Enabled Applications takes a unique and creative approach in explaining MPLS concepts and how they are applied in practice to meet the needs of Enterprise and Service Provider networks. I consistently recommend this book to colleagues in the engineering, education and business community."
—Dave Cooper, Chief IP Technologist, Global Crossing Ltd

Product Details

Publication date:
Wiley Series on Communications Networking & Distributed Systems Series , #36
Product dimensions:
6.40(w) x 9.50(h) x 1.40(d)

Table of Contents

About the Authorsxiii
Part 11
1.1Historical perspective3
1.2Current trends5
1.3MPLS mechanisms6
1.3.1Forwarding plane mechanisms8
1.3.2Control plane mechanisms12
1.6Further reading36
2Traffic Engineering with MPLS (MPLS-TE)37
2.2The business drivers38
2.3Application scenarios39
2.4Setting up traffic-engineered paths using MPLS-TE42
2.4.1LSP priorities and preemption42
2.4.2Information distribution - IGP extensions43
2.4.3Path calculation - CSPF45
2.4.4Path setup - RSVP extensions and admission control48
2.5Using the traffic-engineered paths51
2.6Deployment considerations55
2.6.2Reservation granularity57
2.6.3Routing challenges58
2.7Using traffic engineering to achieve resource optimization59
2.7.1Autobandwidth - dealing with unknown bandwidth requirements60
2.7.2Sharing links between RSVP and other traffic - dealing with unknown bandwidth availability60
2.7.3Other methods for optimization of transmission resources in MPLS networks62
2.8Offline path computation63
2.11Further reading67
3Protection and Restoration in MPLS Networks69
3.2The business drivers70
3.3Failure detection71
3.4End-to-end protection73
3.5Local protection using fast reroute75
3.6Link protection78
3.6.1What happens before the failure79
3.6.2What happens after the failure84
3.7Node protection86
3.8Additional constraints for the computation of the protection path88
3.8.1Fate sharing88
3.8.2Bandwidth protection90
3.8.3Bandwidth protection and DiffServ93
3.9Interaction of end-to-end protection and fast reroute94
3.10Deployment considerations for local protection mechanisms95
3.10.1Scalability considerations95
3.10.2Evaluating a local protection implementation98
3.10.3The cost of bandwidth protection101
3.11IP and LDP FRR103
3.14Further reading109
4MPLS DiffServ-TE111
4.2The business drivers112
4.3Application scenarios113
4.3.1Limiting the proportion of traffic from a particular class on a link113
4.3.2Maintaining relative proportions of traffic on links115
4.3.3Providing guaranteed bandwidth services116
4.4The DiffServ-TE solution116
4.4.1Class types116
4.4.2Path computation117
4.4.3Path signaling120
4.4.4Bandwidth constraint models120
4.4.6The DiffServ in DiffServ-TE128
4.4.8Tools for keeping traffic within its reservation limits130
4.4.9Deploying the DiffServ-TE solution132
4.5Extending the DiffServ-TE solution with multiclass LSPs133
4.8Further reading135
5Interdomain Traffic Engineering137
5.2The business drivers138
5.3Setting up interdomain TE LSPs139
5.3.1Path setup140
5.3.2Path computation145
5.3.4Protection and fast reroute157
5.4Interprovider challenges160
5.5Comparison of the LSP setup methods161
5.8Further reading164
6Point-to-Multipoint LSPs165
6.2The business drivers166
6.3P2MP LSP mechanisms168
6.3.1Forwarding plane mechanisms168
6.3.2Control plane mechanisms169
6.4LAN procedures for P2MP LSPs178
6.5Coupling traffic into a P2MP LSP181
6.5.1Coupling Layer 2 traffic into a P2MP LSP181
6.5.2Coupling IP unicast traffic into a P2MP LSP182
6.5.3Coupling IP multicast traffic into a P2MP LSP182
6.6MPLS fast reroute185
6.7Applications of point-to-multipoint LSPs187
6.7.1Application of P2MP TE to broadcast TV distribution187
6.7.2Application of P2MP LSPs to L3 VPN multicast190
6.7.3Application of P2MP LSPs to VPLS191
Part 2195
7Foundations of Layer 3 BGP/MPLS Virtual Private Networks197
7.2The business drivers198
7.3The overlay VPN model199
7.4The peer VPN model201
7.5Building the BGP/MPLS VPN solution204
7.5.1VPN routing and forwarding tables (VRFs)204
7.5.2Constrained route distribution206
7.5.3VPN-IPv4 addresses and the route distinguisher (RD)207
7.5.4The route target (RT)209
7.5.5The solution so far - what is missing?215
7.5.6VPN label216
7.6Benefits of the BGP/MPLS VPN solution221
7.8Further reading222
8Advanced Topics in Layer 3 BGP/MPLS Virtual Private Networks223
8.2Routing between CE and PE223
8.3Route reflectors and VPNs228
8.4Scalability discussion233
8.4.1Potential scaling bottlenecks233
8.4.2The cost of growing the VPN network236
8.5Convergence times in a VPN network241
8.5.1Convergence time for a customer route change242
8.5.2Convergence time for a failure in the provider's network242
8.6Security issues243
8.7QoS in a VPN scenario245
8.8Multicast in a VPN247
8.8.1The original multicast solution248
8.8.2Improving the existing multicast solution253
8.11Further reading259
9Hierarchical and Inter-AS VPNs261
9.2Carriers' carrier - service providers as VPN customers262
9.2.1ISP as a VPN customer264
9.2.2VPN service provider as a VPN customer - hierarchical VPN269
9.3Multi-AS backbones273
9.3.1Option A: VRF-to-VRF connections at the ASBR274
9.3.2Option B: EBGP redistribution of labeled VPN-IPv4 routes275
9.3.3Option C: Multihop EBGP redistribution of labeled VPN-IPv4 routes between the source and destination AS, with EBGP redistribution of labeled IPv4 routes from one AS to the neighboring AS277
9.4Interprovider QoS278
9.7Further reading280
10Layer 2 Transport over MPLS283
10.2The business drivers283
10.3Comparison of Layer 2 VPNs and Layer 3 VPNs286
10.4Principles of Layer 2 transport over MPLs287
10.5Forwarding plane289
10.5.1ATM cell291
10.5.2ATM AAL5292
10.5.3Frame relay292
10.6Control plane operation293
10.6.1LDP signaling scheme294
10.6.2BGP-based signaling and autodiscovery scheme295
10.6.3Comparison of BGP and LDP approaches to Layer 2 transport over MPLS300
10.7Failure notification mechanisms301
10.8Layer 2 interworking302
10.9Circuit cross connect (CCC)303
10.10RSVP signaling for interdomain pseudowires305
10.11Other applications of Layer 2 transport309
11Virtual Private LAN Service315
11.2The business drivers315
11.3VPLS mechanism overview317
11.4Forwarding plane mechanisms321
11.4.1Forwarding of unicast frames322
11.4.2Broadcast and multicast frames325
11.5Control plane mechanisms326
11.5.1LDP-based signaling327
11.5.2BGP signaling and autodiscovery331
11.5.3Comparison of LDP and BGP for VPLS control plane implementation339
11.5.4Operational considerations344
12MPLS Management347
12.2Management - why and what347
12.3Detecting and troubleshooting failures349
12.3.1Reporting and handling nonsilent failures349
12.3.2Detecting silent failures - MPLS OAM351
12.3.3Troubleshooting failures362
12.4Configuration errors366
12.4.1Preventing configuration errors366
12.4.2Detecting and reporting misconfigurations369
12.8Further reading376
13.2Network convergence380
13.3Interaction with client edge equipment385
13.4Interprovider capability386
13.5MPLS in the access network387
13.6MPLS in the enterprise388
13.7Final remarks389

Customer Reviews

Average Review:

Post to your social network


Most Helpful Customer Reviews

See all customer reviews

MPLS-Enabled Applications: Emerging Developments and New Technologies 4.7 out of 5 based on 0 ratings. 10 reviews.
Anonymous More than 1 year ago
Iiiiiim baaaaaaack
Anonymous More than 1 year ago
Not to make you feel uncomfortable, but I know someone with the name Sebastian. Who are you?
Anonymous More than 1 year ago
Sat down and sighed looking at all the people
Anonymous More than 1 year ago
Anonymous More than 1 year ago
13 baby!
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
I have to go now. I'll be on around 11 a.m. my time.
Anonymous More than 1 year ago
He watched Catty.
Anonymous More than 1 year ago