Details

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services


Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services

An Advanced Guide for VPLS and VLL
1. Aufl.

von: Zhuo Xu

53,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 19.11.2009
ISBN/EAN: 9780470594063
Sprache: englisch
Anzahl Seiten: 992

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone <p>Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes this a reality. Virtual Private LAN Service (VPLS) is a pseudowire (PW) based, multipoint-to-multipoint layer 2 Ethernet VPN service provided by services providers By deploying a VPLS service to customers, the operator can focus on providing high throughput, highly available Ethernet bridging services and leave the layer 3 routing decision up to the customer.</p> <p>Virtual Private LAN Services (VPLS) is quickly becoming the number one choice for many enterprises and service providers to deploy data communication networks. Alcatel-Lucent VPLS solution enables service providers to offer enterprise customers the operational cost benefits of Ethernet with the predictable QoS characteristics of MPLS.</p> <p><b>Items Covered:</b></p> <p>Building Converged Service Networks with IP/MPLS VPN Technology</p> <p>IP/MPLS VPN Multi-Service Network Overview</p> <p>Using MPLS Label Switched Paths as Service Transport Tunnels</p> <p>Routing Protocol Traffi c Engineering and CSPF</p> <p>RSVP-TE Protocol</p> <p>MPLS Resiliency — Secondary LSP</p> <p>MPLS Resiliency — RSVP-TE LSP Fast Reroute</p> <p>Label Distribution Protocol</p> <p>IP/MPLS VPN Service Routing Architecture</p> <p>Virtual Leased Line Services</p> <p>Virtual Private LAN Service</p> <p>Hierarchical VPLS</p> <p>High Availability in an IP/MPLS VPN Network</p> <p>VLL Service Resiliency</p> <p>VPLS Service Resiliency</p> <p>VPLS BGP Auto-Discovery</p> <p>PBB-VPLS</p> <p>OAM in a VPLS Service Network</p>
<p>Foreword xix</p> <p>Introduction xxi</p> <p><b>Part 1 IP/MPLS VPN Service Network Overview 1</b></p> <p><b>Chapter 1 Building Converged Service Networks with IP/MPLS VPN Technology 3</b></p> <p>1.1 The Increasing Demands on Service Provider Networks 4</p> <p>1.2 MPLS Overview 6</p> <p>1.3 The MPLS Value Proposition 8</p> <p>1.4 MPLS Enables Converged Multi-Service Networks 11</p> <p>1.5 MPLS-Enabled Business VPN Services 13</p> <p>Summary 17</p> <p><b>Chapter 2 IP/MPLS VPN Multi-Service Network Overview 19</b></p> <p>2.1 IP/MPLS Layer 2 VPN Requirements 20</p> <p>2.2 IP/MPLS Layer 2 VPN Services 21</p> <p>2.3 Meeting the Service Network Requirements Using IP/MPLS VPN Architecture 26</p> <p>2.4 IP/MPLS VPN-Enabled Applications 30</p> <p>Summary 34</p> <p><b>Part II IP/MPLS VPN Protocol Fundamentals 37</b></p> <p><b>Chapter 3 Using MPLS Label Switched Paths as Service Transport Tunnels 39</b></p> <p>3.1 Basic MPLS Concepts Review 40</p> <p>3.2 Label Switch Path Types 51</p> <p>3.3 LDP-LSP — LDP Label Distribution 54</p> <p>3.4 RSVP-TE LSPs 64</p> <p>3.5 Configuring RSVP-TE LSP 81</p> <p>Summary 90</p> <p><b>Chapter 4 Routing Protocol Traffi c Engineering and CSPF 91</b></p> <p>4.1 Introducing Traffi c Engineering 92</p> <p>4.2 Introducing OSPF-TE 97</p> <p>4.3 Introducing IS-IS TE 112</p> <p>4.4 The CSPF Algorithm 119</p> <p>4.5 RSVP-TE LSP Policy Control: Administrative Groups and SRLG Groups 125</p> <p>Summary 135</p> <p><b>Chapter 5 RSVP-TE Protocol 137</b></p> <p>5.1 RSVP and RSVP-TE 138</p> <p>5.2 RSVP-TE Signaling Procedure 141</p> <p>5.3 RSVP-TE Messages and Objects 150</p> <p>5.4 Make-Before-Break (MBB) 176</p> <p>5.5 The RSVP-TE Hello Protocol 191</p> <p>5.6 Reducing RSVP Refresh Overhead 196</p> <p>5.7 RSVP MD5 Authentication 206</p> <p>Summary 207</p> <p><b>Chapter 6 MPLS Resiliency — Secondary LSP 209</b></p> <p>6.1 Ensuring Reliability with MPLS Resiliency 210</p> <p>6.2 An Overview of Primary and Secondary LSPs 211</p> <p>6.3 What Affects Convergence Performance? 217</p> <p>6.4 Rules for Selecting Secondary LSPs 222</p> <p>6.5 Case Study: Using Administrative Groups in Secondary LSPs 226</p> <p>Summary 228</p> <p><b>Chapter 7 MPLS Resiliency — RSVP-TE LSP Fast Reroute 231</b></p> <p>7.1 RSVP-TE LSP Resiliency 232</p> <p>7.2 Fast Reroute Overview 235</p> <p>7.3 Fast Reroute Architecture 244</p> <p>7.4 One-to-One Backup 259</p> <p>7.5 Facility Backup 267</p> <p>7.6 Manual Bypass Tunnel 283</p> <p>Summary 288</p> <p><b>Chapter 8 Label Distribution Protocol 291</b></p> <p>8.1 LDP Overview 292</p> <p>8.2 LDP Session Establishment and Management 292</p> <p>8.3 Using T-LDP to Signal Pseudowires for Layer 2 VPN Services 299</p> <p>8.4 LDP Messages and TLVs 304</p> <p>8.5 LDP over RSVP-TE Tunneling 307</p> <p>Summary 334</p> <p><b>Part III Ethernet VPN Services 337</b></p> <p><b>Chapter 9 IP/MPLS VPN Service Routing Architecture 339</b></p> <p>9.1 IP/MPLS VPN Service Network Infrastructure 340</p> <p>9.2 Alcatel-Lucent Service Routing Architecture 347</p> <p>9.3 Service Access Point and SAP Components 360</p> <p>9.4 Service Distribution Paths and Transport Tunnels 365</p> <p>9.5 Multiple Forwarding Paths in the Same SDP 378</p> <p>9.6 Maximum Transmission Unit in a Service Network 391</p> <p>9.7 IP/MPLS VPN Service Implementation Overview 412</p> <p>Summary 414</p> <p><b>Chapter 10 Virtual Leased Line Services 415</b></p> <p>10.1 VLL Services Overview 416</p> <p>10.2 VLL Services Architecture 420</p> <p>10.3 Pseudowire Switching for VLL Services 434</p> <p>10.4 VLL Example: Epipe — Ethernet P2P VPN 445</p> <p>10.5 VLL Connection Admission Control 453</p> <p>Summary 461</p> <p><b>Chapter 11 Virtual Private LAN Service 463</b></p> <p>11.1 VPLS Service Overview 464</p> <p>11.2 VPLS Architecture 467</p> <p>11.3 VPLS Mesh-Pseudowires 476</p> <p>11.4 VPLS Service Access Points 487</p> <p>11.5 VPLS Forwarding Database Management 504</p> <p>Summary 506</p> <p><b>Chapter 12 Hierarchical VPLS 509</b></p> <p>12.1 Hierarchical-VPLS Overview 510</p> <p>12.2 Spoke-Pseudowire Details 517</p> <p>12.3 H-VPLS Topologies 527</p> <p>12.4 H-VPLS Design Case Study — Where to Break the Mesh? 531</p> <p>Summary 541</p> <p><b>Chapter 13 High Availability in an IP/MPLS VPN Network 543</b></p> <p>13.1 Building a Network with High Availability 544</p> <p>13.2 Bidirectional Forwarding Detection 548</p> <p>13.3 Link Aggregation Group Overview 557</p> <p>13.4 Multi Chassis Link Aggregation Group 566</p> <p>13.5 Traffic Load Balancing in Link Aggregation Groups 579</p> <p>Summary 595</p> <p><b>Chapter 14 VLL Service Resiliency 597</b></p> <p>14.1 VLL Service Resiliency Overview 598</p> <p>14.2 VLL Service Resiliency Using Pseudowire Redundancy 603</p> <p>14.3 VLL Network Design Using MC-LAG with Pseudowire Redundancy 615</p> <p>Summary 634</p> <p><b>Chapter 15 VPLS Service Resiliency 635</b></p> <p>15.1 Introduction to VPLS Service Resiliency 636</p> <p>15.2 Access Resiliency 637</p> <p>15.3 H-VPLS Backbone Resiliency 640</p> <p>15.4 Using MAC-Flush to Avoid Blackholes 651</p> <p>Summary 673</p> <p><b>Part IV Advanced Ethernet VPN Topics 675</b></p> <p><b>Chapter 16 VPLS BGP Auto-Discovery 677</b></p> <p>16.1 VPLS BGP-AD Overview 678</p> <p>16.2 BGP Auto-Discovery for LDP-VPLS 678</p> <p>16.3 SDPs, Transport Tunnels, and Pseudowires Created Using BGP-AD 692</p> <p>16.4 Using Pre-Provisioned SDPs 698</p> <p>16.5 Using BGP-AD Import and Export Policies to Control the Forwarding Topology of VPLS 699</p> <p>Summary 704</p> <p><b>Chapter 17 PBB-VPLS 707</b></p> <p>17.1 Provider Backbone Bridge Overview 708</p> <p>17.2 PBB-VPLS Architecture 716</p> <p>17.3 PBB-VPLS Learning and Forwarding 733</p> <p>17.4 Controlling Flooding in PBB-VPLS 741</p> <p>17.5 FDB Management in I-VPLS and B-VPLS 755</p> <p>17.6 OAM in a PBB-VPLS Network 758</p> <p>17.7 Service Resiliency in PBB-VPLS Networks 760</p> <p>17.8 MAC-Flush in PBB-VPLS 762</p> <p>17.9 PBB Epipe 766</p> <p>Summary 770</p> <p><b>Chapter 18 OAM in a VPLS Service Network 773</b></p> <p>18.1 OAM Functional Overview 774</p> <p>18.2 Ethernet in the First Mile (EFM) OAM (802.3ah) 776</p> <p>18.3 Ethernet Connectivity Fault Management 787</p> <p>18.4 OAM in an IP/MPLS VPN Service Network 804</p> <p>18.5 OAM in VPLS Services 818</p> <p>Summary 837</p> <p>Appendix A Spanning Tree Protocol 839</p> <p>A.1 Spanning Tree Protocol 841</p> <p>A.2 Spanning Tree Protocol Variations 855</p> <p>A.3 VPLS Service Loop Prevention with STP 869</p> <p>A.4 Altered STP Behavior in the VPLS Core 876</p> <p>A.5 Using VPLS STP to Eliminate Customer Forwarding Loops 880</p> <p>A.6 Using VPLS STP to Block Redundant Spoke-Pseudowires in H-VPLS 883</p> <p>A.7 LDP MAC-Flush in STP Convergence 884</p> <p>A.8 Management VPLS 885</p> <p>Appendix B RFC and IEEE Standards 897</p> <p>Glossary 901</p> <p>Index 917</p>
<b>Zhuo (Frank) Xu</b> is a recognized MPLS/VPLS service routing expert. A seasoned telecom professional, he holds several industry IP certifications including the distinction of being the world's first Alcatel-Lucent Service Routing Architect.
This guide is a must read for any network engineer interested in IP/MPLS technologies and Carrier Ethernet Layer 2 VPN services. Discover what it takes to optimize an IP/MPLS-based VPN network's reliability, performance, and flexibility. Learn about the core components of an IP/MPLS VPN Service Architecture, and enhance your network with new service-carrying IP/MPLS technologies such as RSVP-TE, Fast Reroute, and secondary LSP. Get a thorough knowledge of the two core Ethernet Layer 2 VPN services: Virtual Private LAN Service (VPLS) and Virtual Leased Line (VLL). Explore advanced topics such as Service Resiliency, BGP Auto-discovery, Provider Backbone Bridging, and OAM for VPLS and learn how to implement them in your network. <p>"An extremely valuable tool for anyone involved in the design, operation, and maintenance of MPLS-based networks. The reader will walk away with a clear and practical understanding of all aspects of the complexities associated with MPLS network operations. I highly recommend that this text be part of any MPLS network engineer's library."<br /> —<b>Gary Horn</b>, Director, Enterprise Architecture and Network Security, Advocate Health Care</p> <p>"A thorough and solid publication that reflects Alcatel-Lucent's industry-leading and innovative approaches to Layer 2 Services. An invaluable asset for any network designer/architect."<br /> —<b>Ray Miller, Jr.</b>, Senior Network Engineer, Sting Communications</p>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €