MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization
暫譯: MPLS 與下一代網路:NGN 與企業虛擬化的基礎

Azhar Sayeed, Monique Morrow

  • 出版商: Cisco Press
  • 出版日期: 2005-12-01
  • 售價: $1,575
  • 貴賓價: 9.5$1,496
  • 語言: 英文
  • 頁數: 432
  • 裝訂: Paperback
  • ISBN: 1587201208
  • ISBN-13: 9781587201202
  • 相關分類: 雲端運算
  • 立即出貨 (庫存 < 3)

買這商品的人也買了...

商品描述

Description  

Understand the business case for deploying MPLS-based services and solutions

  • Provides network managers and architects a precise MPLS primer
  • Defines MPLS service problems and their associated solutions
  • Includes ROI models for MPLS-based solutions
  • Discusses pros and cons of various options for each MPLS service

Network managers often question the value that MPLS brings to their business environment. This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions. The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies. Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers. Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network. These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company's bottom-line. ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation. Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation. In short, you can use this comprehensive guide to understand and build a business case for the inclusion of MPLS in your network.

 

 

Table of Contents       

Contents

Introduction

Part I            The Business Case for MPLS                                        

Chapter 1        Dynamics of Service Creation and Deployment

Industry Dynamics and Challenges

What About the Enterprise Market?

Service Provider Business Engineering

Business Drivers and Requirements

Enterprise Customers

Enterprise Motivations for Migrating to Layer 3 Services

Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself

Do-It-Yourself

Enterprise Segmentation

Central Services with an Enterprise Campus

Subscribing to a Managed Layer 3 MPLS VPN Service

The Case for Building VPNs—Layer 2 or Layer 3

Existing Technologies—Frame Relay, ATM, and IP-Based Networks: What Can They Solve?

Frame Relay

Asynchronous Transfer Mode

The Internet Protocol

Service Examples

Summary

 

Chapter 2            The Scope of Service Types

Overview of Layer 2 Services

Ethernet Services

Next-Generation Network Overview and Interworking Functions

Layer 3 Services

Remote Access

Value-Added Services

Summary

 

Part 2                The Technical Case for MPLS

Chapter 3              Technology Overview: Making the Technology case for MPLS and Technology Details

Available Technologies and Options

Why MPLS? (High-Level Detail)

MPLS and Quality of Service

Differentiating Service with Traffic Engineering

Multicast

Benefits

MPLS Technology Details

Layer 3 VPNs

Peer-to-Peer Model

VRF and Its Function

MPLS Label Stack Role

Topologies

Carrier Supporting Carrier and Inter-Provider Autonomous Systems

Traffic Engineering

DiffServ

Layer 2 VPNs

Summary

 

Part 3                MPLS Services and Components

Chapter 4        Layer 2 VPNs

Taxonomy

Introducing AToM

Pseudowire Systems Architecture

Packet Forwarding

Layer 2 Transport Types (Like-to-Like)

Ethernet Service

Link Layer Service

Frame Relay Service

ATM Service117

Configuration of Pseudowires

Layer 2 Interworking

Interworking Modes

Interworking Models and Applications

Virtual Private LAN Service

Considerations for VPLS

Provisioning and Signaling

LDP Signaling

BGP Signaling

Benefits of L2VPNs

Inter-AS L2VPNs

Supported IETF Standards

Summary

Standards and References

 

Part 4              Layer 3 VPNs1

Chapter 5       Technology Overview

Separation of Routing Information Between VPNs

Constrained Distribution of Routing Information

Forwarding Packets Through the Network Core

Packet Flow Through the Network

Corporate Intranet

Corporate Extranet

Internet Access

Dedicated per-VPN Internet Access

Shared PE—Internet and VPN

Dedicated PE—Shared Backbone

Managed Central Service—Shared Internet Access

Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks

Inter-AS VPNs

Carrier Supporting Carrier

Heterogeneous Networks

Managed Central Services

Making Applications and Services VRF-Aware

VRF-Aware Address Management

Supported IETF Drafts

Summary

Standards and References:

 

Chapter 6                   Remote Access and IPSec Integration with MPLS VPNs

Technology Overview

Dial Access

Individual Access

CE Dial Backup Access

Dial-Out Access

DSL Access

Routed Encapsulation

Bridged Encapsulation

Cable Access

PE-CE Routing Protocols

Scalability and Network Convergence for Remote Access

Summary

 

Chapter 7             MPLS Security

Security and NGN

Security Overview and MPLS

MPLS VPN and Security

Attack Scenarios

Internet/Extranet and MPLS Security

IPSec

MPLS VPN (BGP VPN) Security Issues and Options

Layer 2 and Unmanaged VPN Service Considerations

Design Option Examples

Carrier’s Carrier Network and Inter-Autonomous Considerations

Customer Edge Router Security Considerations

Overall Best Practice Recommendations

Summary

Standards and References

 

Chapter 8             Traffic Engineering

Problem Statement

Technology Overview

IGP Extensions and Distribution of Constraints

Signaling of TE Tunnels

Forwarding Packets Through the Network Core

Sequence of Operation

TE Tunnel Maintenance

TE Applications and Examples

Intra-Area TE

Inter-Autonomous System TE

Quality of Service and TE

Traffic Handling of Delay-Sensitive Traffic

Protection and Restoration

Link Protection

Node Protection

Path Protection

Usage Scenarios

Scalability of Protection Mechanisms

Scaling MPLS TE

MPLS Traffic Engineering and Multicast

Standards and References

Summary

 

Chapter 9             Quality of Service

Problem Statement

IP QoS

QoS Building Blocks

IntServ

DiffServ

Packet Handling

The Hybrid Model

MPLS QoS

MPLS DiffServ

Traffic Engineering and DiffServ

DiffServ-Aware Traffic Engineering

MPLS QoS Service Examples

Point-to-Cloud Model

Olympic Service Model

Traffic-Engineered Voice Model

Virtual Leased Line

On-Demand QoS

MPLS and IntServ

Traffic Flows to MPLS DiffServ Mapping

Tunnel-Based Admission Control

Standards and References

Summary

 

Chapter 10             Mutlicasts and NGNs

Problem Statement

MPLS Multicast VPN Overview

Multicast VPN Operational Details

MPLS Multicast VPN Applications and Examples

Multicast Security and Management Considerations

Standards and References

Summary

 

Chapter 11             IPv6 and MPLS

Problem Statement

Technology Overview

IPv6 PE

Multiprotocol BGP Extensions

Packet Path

IPv6 VPNs (6VPE)

Route Tagging

Virtual Routing and Forwading with IPv6

Packet Path

The Coexistence of IPv4 L3VPN and IPv6 L3VPN

IPv6 Network Core

Inter-AS Networks for 6PE and v6VPNs

IPv6 QoS

MPLS QoS for IPv6

Management and IPv6

Summary

 

Part 4             Bringing Your MPLS Plan Together

Chapter 12     Network Management and Provisioning

Problem Statement

Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management

MPLS OAM

VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms

Dealing with Equal Cost Multipaths

Noncompliant Routers

LSR Self-Test

Virtual Circuit Connection Verification and Bidirectional Forwarding Detection

A Word About Interworking OAM

Any to Any

Local Switching

Encapsulation Types and Modes

ATM over MPLS

ATM N:1 Mode

ATM 1:1 Mode

AAL5 SDU Mode

AAL5 PDU Mode

Frame Relay over MPLS

Generic Failure Types

Interface Failure

Pseudowire Failures

Tunnel LSP Failures

Configuration Management for MPLS-Based Networks

Accounting for MPLS-Based Networks

Performance Management for MPLS-Based Networks

Security Management for MPLS-Based Networks

Per-VPN Management

IP Addressing

VRF-Aware Network Address Translation

Supported MIBs

Standards and References

Summary

 

Chapter 13             Design Considerations: Putting it All Together

VRF-Aware Feature

IP Addressing: VRF-Aware DHCP

DHCP Deployment Examples

Deployment Guideline Summary

VRF-Aware Network Address Translation

NAT-PE System Flow

Inside-to-Outside Packet Flow

Outside-to-Inside Packet Flow

Deployment Guideline Summary

Management, Provisioning, and Troubleshooting

Equipment Scalability Versus Network Scalability

Network Element Characteristics

Network Parameters

Network-Wide Scale

Management and Scalability

Layer 2 VPNs—What to Expect

Same Grade of Service

Planning and Sizing

Density

Management

Summary

 

Chapter 14             MPLS Case Studies

The Background on Equant

Equant Business Drivers

Equant Services

VPN Bridge Case Study

Background

Customer Issues/Objectives

The Account Team’s Keys to Success

Case Study Conclusion

Summary

 

Chapter 15             The Future of MPLS

Integrating IP and Optical Networks (Transport Area)

How Does it Work?

Bandwidth On-Demand Service

Challenges Faced with G-MPLS and UCP

Future Layer 3 Services

Label-Switched Multicast

Dynamic Encrypted VPNs

Content-Based Services

Adaptive Networks for Integration of Voice and Video

Security Enhancements

Future Layer 2 Services

ATM-MPLS Interworking

Layer 2 VPNs Across Multiple Provider Networks

VPLS Service Across a Non-Ethernet Last Mile

Future Enhancements in Provisioning and Management

Adaptive Self-Healing Networks

Increasing Enterprise Deployment of MPLS

Summary

 

So, What Is the Future of MPLS?

A View from George Swallow

A View from Adrian Farrell

Index  

商品描述(中文翻譯)

**描述**

了解部署基於MPLS的服務和解決方案的商業案例

- 為網路管理員和架構師提供精確的MPLS入門知識
- 定義MPLS服務問題及其相關解決方案
- 包含基於MPLS解決方案的投資回報率模型
- 討論每種MPLS服務的各種選項的優缺點

網路管理員經常質疑MPLS為其商業環境帶來的價值。本書為他們提供了一個精確的指南,以評估基於MPLS的應用和解決方案的好處。本書通過探索其他技術替代方案,包括它們的應用、好處和缺陷,指導網路管理員了解MPLS的商業案例。理解服務創建過程作為基於MPLS解決方案的基礎,在描述MPLS所提供的好處時至關重要。此外,本書探討了MPLS技術及其組件,提供了必要架構的概述,以獲取MPLS為服務提供商或企業網路帶來的真正優勢。這些優勢包括新的收入機會和總擁有成本的降低,對公司的底線產生積極影響。投資回報率模型和案例研究示例進一步確認了商業影響,幫助決策者為MPLS服務創建制定藍圖。特定方面如安全性、網路管理、高級服務及技術的未來,完整了本書,幫助決策者評估MPLS作為實施候選者。簡而言之,您可以使用這本綜合指南來理解並建立MPLS納入您網路的商業案例。

**目錄**

**內容**

引言

**第一部分** 商業案例為MPLS

**第1章** 服務創建和部署的動態
行業動態與挑戰
企業市場的情況如何?
服務提供商的商業工程
商業驅動因素和需求
企業客戶
企業遷移到第3層服務的動機
服務提供商與企業:外包與自建的戰鬥
自建
企業細分
擁有企業校園的中央服務
訂閱管理的第3層MPLS VPN服務
建立VPN的案例—第2層或第3層
現有技術—幀中繼、ATM和基於IP的網路:它們能解決什麼?
幀中繼
非同步傳輸模式
網際網路協議
服務示例
總結

**第2章** 服務類型的範疇
第2層服務概述
以太網服務
下一代網路概述及互通功能
第3層服務
遠端存取
增值服務
總結

**第二部分** MPLS的技術案例

**第3章** 技術概述:為MPLS提供技術案例及技術細節
可用技術和選項
為什麼選擇MPLS?(高層次細節)
MPLS與服務質量
用流量工程區分服務
多播
好處
MPLS技術細節
第3層VPN
對等模型
VRF及其功能
MPLS標籤堆疊角色
拓撲
承運商支持承運商及互提供者自治系統
流量工程
DiffServ
第2層VPN
總結

**第三部分** MPLS服務和組件

**第4章** 第2層VPN
分類法
介紹AToM
偽線系統架構
封包轉發
第2層傳輸類型(類似於類似)
以太網服務
鏈路層服務
幀中繼服務
ATM服務
偽線的配置
第2層互通
互通模式
互通模型和應用
虛擬私人LAN服務
VPLS的考量
配置和信號
LDP信號
BGP信號
L2VPN的好處
互AS L2VPN
支持的IETF標準
總結
標準和參考

**第四部分** 第3層VPN

**第5章** 技術概述
VPN之間路由信息的分離
路由信息的約束分發
通過網路核心轉發封包
網路中的封包流
企業內部網路
企業外部網路
網際網路存取
專用每VPN的網際網路存取
共享PE—網際網路和VPN
專用PE—共享骨幹
管理的中央服務—共享網際網路存取
將MPLS VPN擴展到多AS、多提供者和分層網路
互AS VPN
承運商支持承運商
異構網路
管理的中央服務
使應用和服務具備VRF感知
VRF感知的地址管理
支持的IETF草案
總結
標準和參考:

**第6章** 遠端存取與MPLS VPN的IPSec整合
技術概述
撥號存取
個別存取
CE撥號備份存取
撥號存取
DSL存取
路由封裝
橋接封裝
有線存取
PE-CE路由協議
遠端存取的可擴展性和網路融合
總結

**第7章** MPLS安全
安全性與NGN
安全概述與MPLS
MPLS VPN與安全性
攻擊場景
網際網路/外部網路與MPLS安全
IPSec
MPLS VPN(BGP VPN)安全問題和選項
第2層和未管理VPN服務考量
設計選項示例
承運商的承運商網路和互自治考量
客戶邊緣路由器安全考量
整體最佳實踐建議
總結
標準和參考

**第8章** 流量工程
問題陳述
技術概述
IGP擴展和約束的分發
TE隧道的信號
通過網路核心轉發封包
操作序列
TE隧道維護
TE應用和示例
區域內TE

最後瀏覽商品 (20)