Buy Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone

Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes this a reality. Virtual Private LAN Service (VPLS) is a pseudowire (PW) based, multipoint-to-multipoint layer 2 Ethernet VPN service provided by services providers By deploying a VPLS service to customers, the operator can focus on providing high throughput, highly available Ethernet bridging services and leave the layer 3 routing decision up to the customer.

Virtual Private LAN Services (VPLS) is quickly becoming the number one choice for many enterprises and service providers to deploy data communication networks. Alcatel-Lucent VPLS solution enables service providers to offer enterprise customers the operational cost benefits of Ethernet with the predictable QoS characteristics of MPLS.

Items Covered:

Building Converged Service Networks with IP/MPLS VPN Technology

IP/MPLS VPN Multi-Service Network Overview

Using MPLS Label Switched Paths as Service Transport Tunnels

Routing Protocol Traffi c Engineering and CSPF

RSVP-TE Protocol

MPLS Resiliency — Secondary LSP

MPLS Resiliency — RSVP-TE LSP Fast Reroute

Label Distribution Protocol

IP/MPLS VPN Service Routing Architecture

Virtual Leased Line Services

Virtual Private LAN Service

Hierarchical VPLS

High Availability in an IP/MPLS VPN Network

VLL Service Resiliency

VPLS Service Resiliency

VPLS BGP Auto-Discovery

PBB-VPLS

OAM in a VPLS Service Network



Table of Contents:

Foreword xix

Introduction xxi

Part 1 IP/MPLS VPN Service Network Overview 1

Chapter 1 Building Converged Service Networks with IP/MPLS VPN Technology 3

1.1 The Increasing Demands on Service Provider Networks 4

1.2 MPLS Overview 6

1.3 The MPLS Value Proposition 8

1.4 MPLS Enables Converged Multi-Service Networks 11

1.5 MPLS-Enabled Business VPN Services 13

Summary 17

Chapter 2 IP/MPLS VPN Multi-Service Network Overview 19

2.1 IP/MPLS Layer 2 VPN Requirements 20

2.2 IP/MPLS Layer 2 VPN Services 21

2.3 Meeting the Service Network Requirements Using IP/MPLS VPN Architecture 26

2.4 IP/MPLS VPN-Enabled Applications 30

Summary 34

Part II IP/MPLS VPN Protocol Fundamentals 37

Chapter 3 Using MPLS Label Switched Paths as Service Transport Tunnels 39

3.1 Basic MPLS Concepts Review 40

3.2 Label Switch Path Types 51

3.3 LDP-LSP — LDP Label Distribution 54

3.4 RSVP-TE LSPs 64

3.5 Configuring RSVP-TE LSP 81

Summary 90

Chapter 4 Routing Protocol Traffi c Engineering and CSPF 91

4.1 Introducing Traffi c Engineering 92

4.2 Introducing OSPF-TE 97

4.3 Introducing IS-IS TE 112

4.4 The CSPF Algorithm 119

4.5 RSVP-TE LSP Policy Control: Administrative Groups and SRLG Groups 125

Summary 135

Chapter 5 RSVP-TE Protocol 137

5.1 RSVP and RSVP-TE 138

5.2 RSVP-TE Signaling Procedure 141

5.3 RSVP-TE Messages and Objects 150

5.4 Make-Before-Break (MBB) 176

5.5 The RSVP-TE Hello Protocol 191

5.6 Reducing RSVP Refresh Overhead 196

5.7 RSVP MD5 Authentication 206

Summary 207

Chapter 6 MPLS Resiliency — Secondary LSP 209

6.1 Ensuring Reliability with MPLS Resiliency 210

6.2 An Overview of Primary and Secondary LSPs 211

6.3 What Affects Convergence Performance? 217

6.4 Rules for Selecting Secondary LSPs 222

6.5 Case Study: Using Administrative Groups in Secondary LSPs 226

Summary 228

Chapter 7 MPLS Resiliency — RSVP-TE LSP Fast Reroute 231

7.1 RSVP-TE LSP Resiliency 232

7.2 Fast Reroute Overview 235

7.3 Fast Reroute Architecture 244

7.4 One-to-One Backup 259

7.5 Facility Backup 267

7.6 Manual Bypass Tunnel 283

Summary 288

Chapter 8 Label Distribution Protocol 291

8.1 LDP Overview 292

8.2 LDP Session Establishment and Management 292

8.3 Using T-LDP to Signal Pseudowires for Layer 2 VPN Services 299

8.4 LDP Messages and TLVs 304

8.5 LDP over RSVP-TE Tunneling 307

Summary 334

Part III Ethernet VPN Services 337

Chapter 9 IP/MPLS VPN Service Routing Architecture 339

9.1 IP/MPLS VPN Service Network Infrastructure 340

9.2 Alcatel-Lucent Service Routing Architecture 347

9.3 Service Access Point and SAP Components 360

9.4 Service Distribution Paths and Transport Tunnels 365

9.5 Multiple Forwarding Paths in the Same SDP 378

9.6 Maximum Transmission Unit in a Service Network 391

9.7 IP/MPLS VPN Service Implementation Overview 412

Summary 414

Chapter 10 Virtual Leased Line Services 415

10.1 VLL Services Overview 416

10.2 VLL Services Architecture 420

10.3 Pseudowire Switching for VLL Services 434

10.4 VLL Example: Epipe — Ethernet P2P VPN 445

10.5 VLL Connection Admission Control 453

Summary 461

Chapter 11 Virtual Private LAN Service 463

11.1 VPLS Service Overview 464

11.2 VPLS Architecture 467

11.3 VPLS Mesh-Pseudowires 476

11.4 VPLS Service Access Points 487

11.5 VPLS Forwarding Database Management 504

Summary 506

Chapter 12 Hierarchical VPLS 509

12.1 Hierarchical-VPLS Overview 510

12.2 Spoke-Pseudowire Details 517

12.3 H-VPLS Topologies 527

12.4 H-VPLS Design Case Study — Where to Break the Mesh? 531

Summary 541

Chapter 13 High Availability in an IP/MPLS VPN Network 543

13.1 Building a Network with High Availability 544

13.2 Bidirectional Forwarding Detection 548

13.3 Link Aggregation Group Overview 557

13.4 Multi Chassis Link Aggregation Group 566

13.5 Traffic Load Balancing in Link Aggregation Groups 579

Summary 595

Chapter 14 VLL Service Resiliency 597

14.1 VLL Service Resiliency Overview 598

14.2 VLL Service Resiliency Using Pseudowire Redundancy 603

14.3 VLL Network Design Using MC-LAG with Pseudowire Redundancy 615

Summary 634

Chapter 15 VPLS Service Resiliency 635

15.1 Introduction to VPLS Service Resiliency 636

15.2 Access Resiliency 637

15.3 H-VPLS Backbone Resiliency 640

15.4 Using MAC-Flush to Avoid Blackholes 651

Summary 673

Part IV Advanced Ethernet VPN Topics 675

Chapter 16 VPLS BGP Auto-Discovery 677

16.1 VPLS BGP-AD Overview 678

16.2 BGP Auto-Discovery for LDP-VPLS 678

16.3 SDPs, Transport Tunnels, and Pseudowires Created Using BGP-AD 692

16.4 Using Pre-Provisioned SDPs 698

16.5 Using BGP-AD Import and Export Policies to Control the Forwarding Topology of VPLS 699

Summary 704

Chapter 17 PBB-VPLS 707

17.1 Provider Backbone Bridge Overview 708

17.2 PBB-VPLS Architecture 716

17.3 PBB-VPLS Learning and Forwarding 733

17.4 Controlling Flooding in PBB-VPLS 741

17.5 FDB Management in I-VPLS and B-VPLS 755

17.6 OAM in a PBB-VPLS Network 758

17.7 Service Resiliency in PBB-VPLS Networks 760

17.8 MAC-Flush in PBB-VPLS 762

17.9 PBB Epipe 766

Summary 770

Chapter 18 OAM in a VPLS Service Network 773

18.1 OAM Functional Overview 774

18.2 Ethernet in the First Mile (EFM) OAM (802.3ah) 776

18.3 Ethernet Connectivity Fault Management 787

18.4 OAM in an IP/MPLS VPN Service Network 804

18.5 OAM in VPLS Services 818

Summary 837

Appendix A Spanning Tree Protocol 839

A.1 Spanning Tree Protocol 841

A.2 Spanning Tree Protocol Variations 855

A.3 VPLS Service Loop Prevention with STP 869

A.4 Altered STP Behavior in the VPLS Core 876

A.5 Using VPLS STP to Eliminate Customer Forwarding Loops 880

A.6 Using VPLS STP to Block Redundant Spoke-Pseudowires in H-VPLS 883

A.7 LDP MAC-Flush in STP Convergence 884

A.8 Management VPLS 885

Appendix B RFC and IEEE Standards 897

Glossary 901

Index 917



About the Author :
Zhuo (Frank) Xu is a recognized MPLS/VPLS service routing expert. A seasoned telecom professional, he holds several industry IP certifications including the distinction of being the world's first Alcatel-Lucent Service Routing Architect.


Best Sellers


Product Details
  • ISBN-13: 9780470594063
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • Sub Title: An Advanced Guide for VPLS and VLL
  • ISBN-10: 0470594063
  • Publisher Date: 19 Nov 2009
  • Binding: Digital (delivered electronically)
  • No of Pages: 992


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
John Wiley & Sons Inc -
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!