MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization
暫譯: MPLS 與下一代網路:NGN 與企業虛擬化的基礎
Azhar Sayeed, Monique Morrow
- 出版商: Cisco Press
- 出版日期: 2005-12-01
- 售價: $1,575
- 貴賓價: 9.5 折 $1,496
- 語言: 英文
- 頁數: 432
- 裝訂: Paperback
- ISBN: 1587201208
- ISBN-13: 9781587201202
-
相關分類:
雲端運算
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$580$458 -
$2,390$2,271 -
$2,275$2,161 -
$2,560$2,432 -
$2,730$2,594 -
$490$382 -
$490Introduction to Wireless and Mobile Systems, 2/e
-
$3,250$3,088 -
$2,030$1,929 -
$550$435 -
$760$600 -
$550$495 -
$300$270 -
$1,800$1,710 -
$2,900$2,755 -
$1,176Broadband Optical Access Networks and Fiber-to-the-Home: Systems Technologies and Deployment Strategies
-
$3,040$2,888 -
$690$587 -
$880$695 -
$620$490 -
$490$417 -
$560$476 -
$2,970$2,822 -
$2,260$2,147 -
$352SDN 核心技術剖析和實戰指南
商品描述
Description
Understand the business case for deploying MPLS-based services and solutions
- Provides network managers and architects a precise MPLS primer
- Defines MPLS service problems and their associated solutions
- Includes ROI models for MPLS-based solutions
- Discusses pros and cons of various options for each MPLS service
Network managers often question the value that MPLS brings to their business environment. This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions. The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies. Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers. Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network. These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company's bottom-line. ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation. Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation. In short, you can use this comprehensive guide to understand and build a business case for the inclusion of MPLS in your network.
Table of Contents
Contents
Introduction
Part I The Business Case for MPLS
Chapter 1 Dynamics of Service Creation and Deployment
Industry Dynamics and Challenges
What About the Enterprise Market?
Service Provider Business Engineering
Business Drivers and Requirements
Enterprise Customers
Enterprise Motivations for Migrating to Layer 3 Services
Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself
Do-It-Yourself
Enterprise Segmentation
Central Services with an Enterprise Campus
Subscribing to a Managed Layer 3 MPLS VPN Service
The Case for Building VPNs—Layer 2 or Layer 3
Existing Technologies—Frame Relay, ATM, and IP-Based Networks: What Can They Solve?
Frame Relay
Asynchronous Transfer Mode
The Internet Protocol
Service Examples
Summary
Chapter 2 The Scope of Service Types
Overview of Layer 2 Services
Ethernet Services
Next-Generation Network Overview and Interworking Functions
Layer 3 Services
Remote Access
Value-Added Services
Summary
Part 2 The Technical Case for MPLS
Chapter 3 Technology Overview: Making the Technology case for MPLS and Technology Details
Available Technologies and Options
Why MPLS? (High-Level Detail)
MPLS and Quality of Service
Differentiating Service with Traffic Engineering
Multicast
Benefits
MPLS Technology Details
Layer 3 VPNs
Peer-to-Peer Model
VRF and Its Function
MPLS Label Stack Role
Topologies
Carrier Supporting Carrier and Inter-Provider Autonomous Systems
Traffic Engineering
DiffServ
Layer 2 VPNs
Summary
Part 3 MPLS Services and Components
Chapter 4 Layer 2 VPNs
Taxonomy
Introducing AToM
Pseudowire Systems Architecture
Packet Forwarding
Layer 2 Transport Types (Like-to-Like)
Ethernet Service
Link Layer Service
Frame Relay Service
ATM Service117
Configuration of Pseudowires
Layer 2 Interworking
Interworking Modes
Interworking Models and Applications
Virtual Private LAN Service
Considerations for VPLS
Provisioning and Signaling
LDP Signaling
BGP Signaling
Benefits of L2VPNs
Inter-AS L2VPNs
Supported IETF Standards
Summary
Standards and References
Part 4 Layer 3 VPNs1
Chapter 5 Technology Overview
Separation of Routing Information Between VPNs
Constrained Distribution of Routing Information
Forwarding Packets Through the Network Core
Packet Flow Through the Network
Corporate Intranet
Corporate Extranet
Internet Access
Dedicated per-VPN Internet Access
Shared PE—Internet and VPN
Dedicated PE—Shared Backbone
Managed Central Service—Shared Internet Access
Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks
Inter-AS VPNs
Carrier Supporting Carrier
Heterogeneous Networks
Managed Central Services
Making Applications and Services VRF-Aware
VRF-Aware Address Management
Supported IETF Drafts
Summary
Standards and References:
Chapter 6 Remote Access and IPSec Integration with MPLS VPNs
Technology Overview
Dial Access
Individual Access
CE Dial Backup Access
Dial-Out Access
DSL Access
Routed Encapsulation
Bridged Encapsulation
Cable Access
PE-CE Routing Protocols
Scalability and Network Convergence for Remote Access
Summary
Chapter 7 MPLS Security
Security and NGN
Security Overview and MPLS
MPLS VPN and Security
Attack Scenarios
Internet/Extranet and MPLS Security
IPSec
MPLS VPN (BGP VPN) Security Issues and Options
Layer 2 and Unmanaged VPN Service Considerations
Design Option Examples
Carrier’s Carrier Network and Inter-Autonomous Considerations
Customer Edge Router Security Considerations
Overall Best Practice Recommendations
Summary
Standards and References
Chapter 8 Traffic Engineering
Problem Statement
Technology Overview
IGP Extensions and Distribution of Constraints
Signaling of TE Tunnels
Forwarding Packets Through the Network Core
Sequence of Operation
TE Tunnel Maintenance
TE Applications and Examples
Intra-Area TE
Inter-Autonomous System TE
Quality of Service and TE
Traffic Handling of Delay-Sensitive Traffic
Protection and Restoration
Link Protection
Node Protection
Path Protection
Usage Scenarios
Scalability of Protection Mechanisms
Scaling MPLS TE
MPLS Traffic Engineering and Multicast
Standards and References
Summary
Chapter 9 Quality of Service
Problem Statement
IP QoS
QoS Building Blocks
IntServ
DiffServ
Packet Handling
The Hybrid Model
MPLS QoS
MPLS DiffServ
Traffic Engineering and DiffServ
DiffServ-Aware Traffic Engineering
MPLS QoS Service Examples
Point-to-Cloud Model
Olympic Service Model
Traffic-Engineered Voice Model
Virtual Leased Line
On-Demand QoS
MPLS and IntServ
Traffic Flows to MPLS DiffServ Mapping
Tunnel-Based Admission Control
Standards and References
Summary
Chapter 10 Mutlicasts and NGNs
Problem Statement
MPLS Multicast VPN Overview
Multicast VPN Operational Details
MPLS Multicast VPN Applications and Examples
Multicast Security and Management Considerations
Standards and References
Summary
Chapter 11 IPv6 and MPLS
Problem Statement
Technology Overview
IPv6 PE
Multiprotocol BGP Extensions
Packet Path
IPv6 VPNs (6VPE)
Route Tagging
Virtual Routing and Forwading with IPv6
Packet Path
The Coexistence of IPv4 L3VPN and IPv6 L3VPN
IPv6 Network Core
Inter-AS Networks for 6PE and v6VPNs
IPv6 QoS
MPLS QoS for IPv6
Management and IPv6
Summary
Part 4 Bringing Your MPLS Plan Together
Chapter 12 Network Management and Provisioning
Problem Statement
Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management
MPLS OAM
VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms
Dealing with Equal Cost Multipaths
Noncompliant Routers
LSR Self-Test
Virtual Circuit Connection Verification and Bidirectional Forwarding Detection
A Word About Interworking OAM
Any to Any
Local Switching
Encapsulation Types and Modes
ATM over MPLS
ATM N:1 Mode
ATM 1:1 Mode
AAL5 SDU Mode
AAL5 PDU Mode
Frame Relay over MPLS
Generic Failure Types
Interface Failure
Pseudowire Failures
Tunnel LSP Failures
Configuration Management for MPLS-Based Networks
Accounting for MPLS-Based Networks
Performance Management for MPLS-Based Networks
Security Management for MPLS-Based Networks
Per-VPN Management
IP Addressing
VRF-Aware Network Address Translation
Supported MIBs
Standards and References
Summary
Chapter 13 Design Considerations: Putting it All Together
VRF-Aware Feature
IP Addressing: VRF-Aware DHCP
DHCP Deployment Examples
Deployment Guideline Summary
VRF-Aware Network Address Translation
NAT-PE System Flow
Inside-to-Outside Packet Flow
Outside-to-Inside Packet Flow
Deployment Guideline Summary
Management, Provisioning, and Troubleshooting
Equipment Scalability Versus Network Scalability
Network Element Characteristics
Network Parameters
Network-Wide Scale
Management and Scalability
Layer 2 VPNs—What to Expect
Same Grade of Service
Planning and Sizing
Density
Management
Summary
Chapter 14 MPLS Case Studies
The Background on Equant
Equant Business Drivers
Equant Services
VPN Bridge Case Study
Background
Customer Issues/Objectives
The Account Team’s Keys to Success
Case Study Conclusion
Summary
Chapter 15 The Future of MPLS
Integrating IP and Optical Networks (Transport Area)
How Does it Work?
Bandwidth On-Demand Service
Challenges Faced with G-MPLS and UCP
Future Layer 3 Services
Label-Switched Multicast
Dynamic Encrypted VPNs
Content-Based Services
Adaptive Networks for Integration of Voice and Video
Security Enhancements
Future Layer 2 Services
ATM-MPLS Interworking
Layer 2 VPNs Across Multiple Provider Networks
VPLS Service Across a Non-Ethernet Last Mile
Future Enhancements in Provisioning and Management
Adaptive Self-Healing Networks
Increasing Enterprise Deployment of MPLS
Summary
So, What Is the Future of MPLS?
A View from George Swallow
A View from Adrian Farrell
Index
商品描述(中文翻譯)
**描述**
了解部署基於MPLS的服務和解決方案的商業案例
- 為網路管理員和架構師提供精確的MPLS入門知識
- 定義MPLS服務問題及其相關解決方案
- 包含基於MPLS解決方案的投資回報率模型
- 討論每種MPLS服務的各種選項的優缺點
網路管理員經常質疑MPLS為其商業環境帶來的價值。本書為他們提供了一個精確的指南,以評估基於MPLS的應用和解決方案的好處。本書通過探索其他技術替代方案,包括它們的應用、好處和缺陷,指導網路管理員了解MPLS的商業案例。理解服務創建過程作為基於MPLS解決方案的基礎,在描述MPLS所提供的好處時至關重要。此外,本書探討了MPLS技術及其組件,提供了必要架構的概述,以獲取MPLS為服務提供商或企業網路帶來的真正優勢。這些優勢包括新的收入機會和總擁有成本的降低,對公司的底線產生積極影響。投資回報率模型和案例研究示例進一步確認了商業影響,幫助決策者為MPLS服務創建制定藍圖。特定方面如安全性、網路管理、高級服務及技術的未來,完整了本書,幫助決策者評估MPLS作為實施候選者。簡而言之,您可以使用這本綜合指南來理解並建立MPLS納入您網路的商業案例。
**目錄**
**內容**
引言
**第一部分** 商業案例為MPLS
**第1章** 服務創建和部署的動態
行業動態與挑戰
企業市場的情況如何?
服務提供商的商業工程
商業驅動因素和需求
企業客戶
企業遷移到第3層服務的動機
服務提供商與企業:外包與自建的戰鬥
自建
企業細分
擁有企業校園的中央服務
訂閱管理的第3層MPLS VPN服務
建立VPN的案例—第2層或第3層
現有技術—幀中繼、ATM和基於IP的網路:它們能解決什麼?
幀中繼
非同步傳輸模式
網際網路協議
服務示例
總結
**第2章** 服務類型的範疇
第2層服務概述
以太網服務
下一代網路概述及互通功能
第3層服務
遠端存取
增值服務
總結
**第二部分** MPLS的技術案例
**第3章** 技術概述:為MPLS提供技術案例及技術細節
可用技術和選項
為什麼選擇MPLS?(高層次細節)
MPLS與服務質量
用流量工程區分服務
多播
好處
MPLS技術細節
第3層VPN
對等模型
VRF及其功能
MPLS標籤堆疊角色
拓撲
承運商支持承運商及互提供者自治系統
流量工程
DiffServ
第2層VPN
總結
**第三部分** MPLS服務和組件
**第4章** 第2層VPN
分類法
介紹AToM
偽線系統架構
封包轉發
第2層傳輸類型(類似於類似)
以太網服務
鏈路層服務
幀中繼服務
ATM服務
偽線的配置
第2層互通
互通模式
互通模型和應用
虛擬私人LAN服務
VPLS的考量
配置和信號
LDP信號
BGP信號
L2VPN的好處
互AS L2VPN
支持的IETF標準
總結
標準和參考
**第四部分** 第3層VPN
**第5章** 技術概述
VPN之間路由信息的分離
路由信息的約束分發
通過網路核心轉發封包
網路中的封包流
企業內部網路
企業外部網路
網際網路存取
專用每VPN的網際網路存取
共享PE—網際網路和VPN
專用PE—共享骨幹
管理的中央服務—共享網際網路存取
將MPLS VPN擴展到多AS、多提供者和分層網路
互AS VPN
承運商支持承運商
異構網路
管理的中央服務
使應用和服務具備VRF感知
VRF感知的地址管理
支持的IETF草案
總結
標準和參考:
**第6章** 遠端存取與MPLS VPN的IPSec整合
技術概述
撥號存取
個別存取
CE撥號備份存取
撥號存取
DSL存取
路由封裝
橋接封裝
有線存取
PE-CE路由協議
遠端存取的可擴展性和網路融合
總結
**第7章** MPLS安全
安全性與NGN
安全概述與MPLS
MPLS VPN與安全性
攻擊場景
網際網路/外部網路與MPLS安全
IPSec
MPLS VPN(BGP VPN)安全問題和選項
第2層和未管理VPN服務考量
設計選項示例
承運商的承運商網路和互自治考量
客戶邊緣路由器安全考量
整體最佳實踐建議
總結
標準和參考
**第8章** 流量工程
問題陳述
技術概述
IGP擴展和約束的分發
TE隧道的信號
通過網路核心轉發封包
操作序列
TE隧道維護
TE應用和示例
區域內TE