Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communications engineering / telecommunications > Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL


     0     
5
4
3
2
1



International Edition


X
About the Book

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes this a reality. Virtual Private LAN Service (VPLS) is a pseudowire (PW) based, multipoint-to-multipoint layer 2 Ethernet VPN service provided by services providers By deploying a VPLS service to customers, the operator can focus on providing high throughput, highly available Ethernet bridging services and leave the layer 3 routing decision up to the customer. Virtual Private LAN Services (VPLS) is quickly becoming the number one choice for many enterprises and service providers to deploy data communication networks. Alcatel-Lucent VPLS solution enables service providers to offer enterprise customers the operational cost benefits of Ethernet with the predictable QoS characteristics of MPLS. Items Covered: Building Converged Service Networks with IP/MPLS VPN Technology IP/MPLS VPN Multi-Service Network Overview Using MPLS Label Switched Paths as Service Transport Tunnels Routing Protocol Traffi c Engineering and CSPF RSVP-TE Protocol MPLS Resiliency — Secondary LSP MPLS Resiliency — RSVP-TE LSP Fast Reroute Label Distribution Protocol IP/MPLS VPN Service Routing Architecture Virtual Leased Line Services Virtual Private LAN Service Hierarchical VPLS High Availability in an IP/MPLS VPN Network VLL Service Resiliency VPLS Service Resiliency VPLS BGP Auto-Discovery PBB-VPLS OAM in a VPLS Service Network

Table of Contents:
Foreword xix Introduction xxi Part 1 IP/MPLS VPN Service Network Overview 1 Chapter 1 Building Converged Service Networks with IP/MPLS VPN Technology 3 1.1 The Increasing Demands on Service Provider Networks 4 1.2 MPLS Overview 6 1.3 The MPLS Value Proposition 8 1.4 MPLS Enables Converged Multi-Service Networks 11 1.5 MPLS-Enabled Business VPN Services 13 Summary 17 Chapter 2 IP/MPLS VPN Multi-Service Network Overview 19 2.1 IP/MPLS Layer 2 VPN Requirements 20 2.2 IP/MPLS Layer 2 VPN Services 21 2.3 Meeting the Service Network Requirements Using IP/MPLS VPN Architecture 26 2.4 IP/MPLS VPN-Enabled Applications 30 Summary 34 Part II IP/MPLS VPN Protocol Fundamentals 37 Chapter 3 Using MPLS Label Switched Paths as Service Transport Tunnels 39 3.1 Basic MPLS Concepts Review 40 3.2 Label Switch Path Types 51 3.3 LDP-LSP — LDP Label Distribution 54 3.4 RSVP-TE LSPs 64 3.5 Configuring RSVP-TE LSP 81 Summary 90 Chapter 4 Routing Protocol Traffi c Engineering and CSPF 91 4.1 Introducing Traffi c Engineering 92 4.2 Introducing OSPF-TE 97 4.3 Introducing IS-IS TE 112 4.4 The CSPF Algorithm 119 4.5 RSVP-TE LSP Policy Control: Administrative Groups and SRLG Groups 125 Summary 135 Chapter 5 RSVP-TE Protocol 137 5.1 RSVP and RSVP-TE 138 5.2 RSVP-TE Signaling Procedure 141 5.3 RSVP-TE Messages and Objects 150 5.4 Make-Before-Break (MBB) 176 5.5 The RSVP-TE Hello Protocol 191 5.6 Reducing RSVP Refresh Overhead 196 5.7 RSVP MD5 Authentication 206 Summary 207 Chapter 6 MPLS Resiliency — Secondary LSP 209 6.1 Ensuring Reliability with MPLS Resiliency 210 6.2 An Overview of Primary and Secondary LSPs 211 6.3 What Affects Convergence Performance? 217 6.4 Rules for Selecting Secondary LSPs 222 6.5 Case Study: Using Administrative Groups in Secondary LSPs 226 Summary 228 Chapter 7 MPLS Resiliency — RSVP-TE LSP Fast Reroute 231 7.1 RSVP-TE LSP Resiliency 232 7.2 Fast Reroute Overview 235 7.3 Fast Reroute Architecture 244 7.4 One-to-One Backup 259 7.5 Facility Backup 267 7.6 Manual Bypass Tunnel 283 Summary 288 Chapter 8 Label Distribution Protocol 291 8.1 LDP Overview 292 8.2 LDP Session Establishment and Management 292 8.3 Using T-LDP to Signal Pseudowires for Layer 2 VPN Services 299 8.4 LDP Messages and TLVs 304 8.5 LDP over RSVP-TE Tunneling 307 Summary 334 Part III Ethernet VPN Services 337 Chapter 9 IP/MPLS VPN Service Routing Architecture 339 9.1 IP/MPLS VPN Service Network Infrastructure 340 9.2 Alcatel-Lucent Service Routing Architecture 347 9.3 Service Access Point and SAP Components 360 9.4 Service Distribution Paths and Transport Tunnels 365 9.5 Multiple Forwarding Paths in the Same SDP 378 9.6 Maximum Transmission Unit in a Service Network 391 9.7 IP/MPLS VPN Service Implementation Overview 412 Summary 414 Chapter 10 Virtual Leased Line Services 415 10.1 VLL Services Overview 416 10.2 VLL Services Architecture 420 10.3 Pseudowire Switching for VLL Services 434 10.4 VLL Example: Epipe — Ethernet P2P VPN 445 10.5 VLL Connection Admission Control 453 Summary 461 Chapter 11 Virtual Private LAN Service 463 11.1 VPLS Service Overview 464 11.2 VPLS Architecture 467 11.3 VPLS Mesh-Pseudowires 476 11.4 VPLS Service Access Points 487 11.5 VPLS Forwarding Database Management 504 Summary 506 Chapter 12 Hierarchical VPLS 509 12.1 Hierarchical-VPLS Overview 510 12.2 Spoke-Pseudowire Details 517 12.3 H-VPLS Topologies 527 12.4 H-VPLS Design Case Study — Where to Break the Mesh? 531 Summary 541 Chapter 13 High Availability in an IP/MPLS VPN Network 543 13.1 Building a Network with High Availability 544 13.2 Bidirectional Forwarding Detection 548 13.3 Link Aggregation Group Overview 557 13.4 Multi Chassis Link Aggregation Group 566 13.5 Traffic Load Balancing in Link Aggregation Groups 579 Summary 595 Chapter 14 VLL Service Resiliency 597 14.1 VLL Service Resiliency Overview 598 14.2 VLL Service Resiliency Using Pseudowire Redundancy 603 14.3 VLL Network Design Using MC-LAG with Pseudowire Redundancy 615 Summary 634 Chapter 15 VPLS Service Resiliency 635 15.1 Introduction to VPLS Service Resiliency 636 15.2 Access Resiliency 637 15.3 H-VPLS Backbone Resiliency 640 15.4 Using MAC-Flush to Avoid Blackholes 651 Summary 673 Part IV Advanced Ethernet VPN Topics 675 Chapter 16 VPLS BGP Auto-Discovery 677 16.1 VPLS BGP-AD Overview 678 16.2 BGP Auto-Discovery for LDP-VPLS 678 16.3 SDPs, Transport Tunnels, and Pseudowires Created Using BGP-AD 692 16.4 Using Pre-Provisioned SDPs 698 16.5 Using BGP-AD Import and Export Policies to Control the Forwarding Topology of VPLS 699 Summary 704 Chapter 17 PBB-VPLS 707 17.1 Provider Backbone Bridge Overview 708 17.2 PBB-VPLS Architecture 716 17.3 PBB-VPLS Learning and Forwarding 733 17.4 Controlling Flooding in PBB-VPLS 741 17.5 FDB Management in I-VPLS and B-VPLS 755 17.6 OAM in a PBB-VPLS Network 758 17.7 Service Resiliency in PBB-VPLS Networks 760 17.8 MAC-Flush in PBB-VPLS 762 17.9 PBB Epipe 766 Summary 770 Chapter 18 OAM in a VPLS Service Network 773 18.1 OAM Functional Overview 774 18.2 Ethernet in the First Mile (EFM) OAM (802.3ah) 776 18.3 Ethernet Connectivity Fault Management 787 18.4 OAM in an IP/MPLS VPN Service Network 804 18.5 OAM in VPLS Services 818 Summary 837 Appendix A Spanning Tree Protocol 839 A.1 Spanning Tree Protocol 841 A.2 Spanning Tree Protocol Variations 855 A.3 VPLS Service Loop Prevention with STP 869 A.4 Altered STP Behavior in the VPLS Core 876 A.5 Using VPLS STP to Eliminate Customer Forwarding Loops 880 A.6 Using VPLS STP to Block Redundant Spoke-Pseudowires in H-VPLS 883 A.7 LDP MAC-Flush in STP Convergence 884 A.8 Management VPLS 885 Appendix B RFC and IEEE Standards 897 Glossary 901 Index 917

About the Author :
Zhuo (Frank) Xu is a recognized MPLS/VPLS service routing expert. A seasoned telecom professional, he holds several industry IP certifications including the distinction of being the world's first Alcatel-Lucent Service Routing Architect.


Best Sellers


Product Details
  • ISBN-13: 9780470456569
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 234 mm
  • No of Pages: 992
  • Returnable: N
  • Sub Title: An Advanced Guide for VPLS and VLL
  • Width: 185 mm
  • ISBN-10: 0470456566
  • Publisher Date: 18 Dec 2009
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 48 mm
  • Weight: 1588 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
John Wiley & Sons Inc -
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!