MPLS-Enabled Applications : Emerging Developments and New Technologies

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

MPLS holds the key to network convergence "Here at last is a single, all-encompassing resource where the myriad applications sharpen into a comprehensible text." Kireeti Kompella, Juniper Fellow, Juniper Networks "This should be the textbook for MPLS courses, both for training of experienced networking professionals and for universities." Loa Andersson, Acreo AB, IAB-member and IETF MPLS working group co-chair "MPLS-Enabled Applications is a must-read for anyone involved in enterprise or service-provider networks." Dave Cooper, Sr. Manager IP Engineering, Global Crossing, Ltd. The capability of Multiprotocol Label Switching (MPLS) to identify traffic based on its label at forwarding time, coupled with its ability to force traffic down pre-established paths, has created a whole range of new applications while enabling scaling of existing applications.  To highlight the emerging developments, Ina Minei and Julian Lucek cover traffic engineering, L3VPNs (Layer 3 Virtual Private Networks), pseudowires, VPLS (Virtual Private LAN Service), and much more.  They methodically illustrate how MPLS holds the key to network convergence by allowing operators to offer more services over a single physical infrastructure and how it can reduce the cost of the network by streamlining operations.  With over a hundred illustrations and thirteen in-depth chapters MPLS-Enabled Applications documents why MPLS is now considered the networking technology for carrying all types of network traffic, including voice telephony, real-time video, and the many types of data traffic.  MPLS-Enabled Applications: Provides an authoritative, comprehensive overview of the current status and future potential of MPLS applications, including the latest IETF drafts. Examines all the major applications, including L3VPN, L2VPN, VPLS and pseudowires. Explains how to apply MPLS and tailor it to fit specific scenarios. Examines the scaling requirements of equipment at different points in the network under different deployment scenarios. Offers inclusive coverage of point-to-multipoint label switched paths, DiffServ-aware traffic engineering and QoS, inter-domain traffic engineering and path computation elements, route target filtering, and the latest developments in multicast support for L3VPNs. Covers the management and troubleshooting of MPLS networks and associated services, to enable high availability. MPLS-Enabled Applications will provide those involved in the design and deployment of MPLS systems, as well as those researching the area of MPLS networks, with a thoroughly modern view of how MPLS is transforming the networking world.

Author(s): Ina Minei Julian Lucek
Year: 2005

Language: English
Pages: 432

MPLS-Enabled Applications......Page 6
Contents......Page 10
About the Authors......Page 16
Foreword......Page 18
Preface......Page 22
Acknowledgements......Page 26
Part One......Page 30
1.1 Historical perspective......Page 32
1.2 Current trends......Page 34
1.3 MPLS mechanisms......Page 35
1.3.1 Forwarding plane mechanisms......Page 37
1.3.2 Control plane mechanisms......Page 41
1.5 References......Page 63
1.6 Further reading......Page 65
2.1 Introduction......Page 66
2.2 The business drivers......Page 67
2.3 Application scenarios......Page 68
2.4.1 LSP priorities and preemption......Page 71
2.4.2 Information distribution – IGP extensions......Page 72
2.4.3 Path calculation – CSPF......Page 74
2.4.4 Path setup – RSVP extensions and admission control......Page 77
2.5 Using the traffic-engineered paths......Page 80
2.6.1 Scalability......Page 84
2.6.2 Reservation granularity......Page 86
2.6.3 Routing challenges......Page 87
2.7 Using traffic engineering to achieve resource optimization......Page 88
2.7.2 Sharing links between RSVP and other traffic – dealing with unknown bandwidth availability......Page 89
2.7.3 Other methods for optimization of transmission resources in MPLS networks......Page 91
2.8 Offline path computation......Page 92
2.10 References......Page 95
2.11 Further reading......Page 96
3.1 Introduction......Page 98
3.2 The business drivers......Page 99
3.3 Failure detection......Page 100
3.4 End-to-end protection......Page 102
3.5 Local protection using fast reroute......Page 104
3.6 Link protection......Page 107
3.6.1 What happens before the failure......Page 108
3.6.2 What happens after the failure......Page 113
3.7 Node protection......Page 115
3.8.1 Fate sharing......Page 117
3.8.2 Bandwidth protection......Page 119
3.8.3 Bandwidth protection and DiffServ......Page 122
3.9 Interaction of end-to-end protection and fast reroute......Page 123
3.10.1 Scalability considerations......Page 124
3.10.2 Evaluating a local protection implementation......Page 127
3.10.3 The cost of bandwidth protection......Page 130
3.11 IP and LDP FRR......Page 132
3.13 References......Page 137
3.14 Further reading......Page 138
4.1 Introduction......Page 140
4.2 The business drivers......Page 141
4.3.1 Limiting the proportion of traffic from a particular class on a link......Page 142
4.3.2 Maintaining relative proportions of traffic on links......Page 144
4.4.1 Class types......Page 145
4.4.2 Path computation......Page 146
4.4.4 Bandwidth constraint models......Page 149
4.4.5 Overbooking......Page 155
4.4.6 The DiffServ in DiffServ-TE......Page 157
4.4.7 Protection......Page 158
4.4.8 Tools for keeping traffic within its reservation limits......Page 159
4.4.9 Deploying the DiffServ-TE solution......Page 161
4.5 Extending the DiffServ-TE solution with multiclass LSPs......Page 162
4.7 References......Page 163
4.8 Further reading......Page 164
5.1 Introduction......Page 166
5.2 The business drivers......Page 167
5.3 Setting up interdomain TE LSPs......Page 168
5.3.1 Path setup......Page 169
5.3.2 Path computation......Page 174
5.3.3 Reoptimization......Page 185
5.3.4 Protection and fast reroute......Page 186
5.4 Interprovider challenges......Page 189
5.5 Comparison of the LSP setup methods......Page 190
5.7 References......Page 191
5.8 Further reading......Page 193
6.1 Introduction......Page 194
6.2 The business drivers......Page 195
6.3.1 Forwarding plane mechanisms......Page 197
6.3.2 Control plane mechanisms......Page 198
6.4 LAN procedures for P2MP LSPs......Page 207
6.5.1 Coupling Layer 2 traffic into a P2MP LSP......Page 210
6.5.3 Coupling IP multicast traffic into a P2MP LSP......Page 211
6.6 MPLS fast reroute......Page 214
6.7.1 Application of P2MP TE to broadcast TV distribution......Page 216
6.7.2 Application of P2MP LSPs to L3 VPN multicast......Page 219
6.7.3 Application of P2MP LSPs to VPLS......Page 220
6.9 References......Page 221
Part Two......Page 224
7.1 Introduction......Page 226
7.2 The business drivers......Page 227
7.3 The overlay VPN model......Page 228
7.4 The peer VPN model......Page 230
7.5.1 VPN routing and forwarding tables (VRFs)......Page 233
7.5.2 Constrained route distribution......Page 235
7.5.3 VPN-IPv4 addresses and the route distinguisher (RD)......Page 236
7.5.4 The route target (RT)......Page 238
7.5.5 The solution so far – what is missing?......Page 244
7.5.6 VPN label......Page 245
7.6 Benefits of the BGP/MPLS VPN solution......Page 250
7.8 Further reading......Page 251
8.2 Routing between CE and PE......Page 252
8.3 Route reflectors and VPNs......Page 257
8.4.1 Potential scaling bottlenecks......Page 262
8.4.2 The cost of growing the VPN network......Page 265
8.5 Convergence times in a VPN network......Page 270
8.5.2 Convergence time for a failure in the provider’s network......Page 271
8.6 Security issues......Page 272
8.7 QoS in a VPN scenario......Page 274
8.8 Multicast in a VPN......Page 276
8.8.1 The original multicast solution......Page 277
8.8.2 Improving the existing multicast solution......Page 282
8.10 References......Page 287
8.11 Further reading......Page 288
9.1 Introduction......Page 290
9.2 Carriers’ carrier – service providers as VPN customers......Page 291
9.2.1 ISP as a VPN customer......Page 293
9.2.2 VPN service provider as a VPN customer – hierarchical VPN......Page 298
9.3 Multi-AS backbones......Page 302
9.3.1 Option A: VRF-to-VRF connections at the ASBR......Page 303
9.3.2 Option B: EBGP redistribution of labeled VPN-IPv4 routes......Page 304
9.3.3 Option C: multihop EBGP redistribution of labeled VPN-IPv4 routes between the source and destination AS, with EBGP redistribution of labeled IPv4 routes from one AS to the neighboring AS......Page 306
9.4 Interprovider QoS......Page 307
9.7 Further reading......Page 309
10.2 The business drivers......Page 312
10.3 Comparison of Layer 2 VPNs and Layer 3 VPNs......Page 315
10.4 Principles of Layer 2 transport over MPLS......Page 316
10.5 Forwarding plane......Page 318
10.5.1 ATM cell......Page 320
10.5.3 Frame relay......Page 321
10.6 Control plane operation......Page 322
10.6.1 LDP signaling scheme......Page 323
10.6.2 BGP-based signaling and autodiscovery scheme......Page 324
10.6.3 Comparison of BGP and LDP approaches to Layer 2 transport over MPLS......Page 329
10.7 Failure notification mechanisms......Page 330
10.8 Layer 2 interworking......Page 331
10.9 Circuit cross connect (CCC)......Page 332
10.10 RSVP signaling for interdomain pseudowires......Page 334
10.11 Other applications of Layer 2 transport......Page 338
10.12 Conclusion......Page 340
10.13 References......Page 341
11.2 The business drivers......Page 344
11.3 VPLS mechanism overview......Page 346
11.4 Forwarding plane mechanisms......Page 350
11.4.1 Forwarding of unicast frames......Page 351
11.4.2 Broadcast and multicast frames......Page 354
11.5 Control plane mechanisms......Page 355
11.5.1 LDP-based signaling......Page 356
11.5.2 BGP signaling and autodiscovery......Page 360
11.5.3 Comparison of LDP and BGP for VPLS control plane implementation......Page 368
11.5.4 Operational considerations......Page 373
11.6 Conclusion......Page 374
11.7 References......Page 375
12.2 Management – why and what......Page 376
12.3.1 Reporting and handling nonsilent failures......Page 378
12.3.2 Detecting silent failures – MPLS OAM......Page 380
12.3.3 Troubleshooting failures......Page 391
12.4.1 Preventing configuration errors......Page 395
12.4.2 Detecting and reporting misconfigurations......Page 398
12.5 Visibility......Page 403
12.7 References......Page 404
12.8 Further reading......Page 405
13.1 Introduction......Page 408
13.2 Network convergence......Page 409
13.3 Interaction with client edge equipment......Page 414
13.4 Interprovider capability......Page 415
13.5 MPLS in the access network......Page 416
13.6 MPLS in the enterprise......Page 417
13.7 Final remarks......Page 418
13.8 References......Page 419
Acronyms......Page 420
Index......Page 430