Cart
Free US shipping over $10
Proud to be B-Corp

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services Zhuo Xu

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services By Zhuo Xu

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services by Zhuo Xu


$87.29
Condition - New
Only 2 left

Summary

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data.

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services Summary

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL by Zhuo Xu

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone

Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes this a reality. Virtual Private LAN Service (VPLS) is a pseudowire (PW) based, multipoint-to-multipoint layer 2 Ethernet VPN service provided by services providers By deploying a VPLS service to customers, the operator can focus on providing high throughput, highly available Ethernet bridging services and leave the layer 3 routing decision up to the customer.

Virtual Private LAN Services (VPLS) is quickly becoming the number one choice for many enterprises and service providers to deploy data communication networks. Alcatel-Lucent VPLS solution enables service providers to offer enterprise customers the operational cost benefits of Ethernet with the predictable QoS characteristics of MPLS.

Items Covered:

Building Converged Service Networks with IP/MPLS VPN Technology

IP/MPLS VPN Multi-Service Network Overview

Using MPLS Label Switched Paths as Service Transport Tunnels

Routing Protocol Traffi c Engineering and CSPF

RSVP-TE Protocol

MPLS Resiliency Secondary LSP

MPLS Resiliency RSVP-TE LSP Fast Reroute

Label Distribution Protocol

IP/MPLS VPN Service Routing Architecture

Virtual Leased Line Services

Virtual Private LAN Service

Hierarchical VPLS

High Availability in an IP/MPLS VPN Network

VLL Service Resiliency

VPLS Service Resiliency

VPLS BGP Auto-Discovery

PBB-VPLS

OAM in a VPLS Service Network

About Zhuo Xu

Zhuo (Frank) Xu is a recognized MPLS/VPLS service routing expert. A seasoned telecom professional, he holds several industry IP certifications including the distinction of being the world's first Alcatel-Lucent Service Routing Architect.

Table of Contents

Foreword xix

Introduction xxi

Part 1 IP/MPLS VPN Service Network Overview 1

Chapter 1 Building Converged Service Networks with IP/MPLS VPN Technology 3

1.1 The Increasing Demands on Service Provider Networks 4

1.2 MPLS Overview 6

1.3 The MPLS Value Proposition 8

1.4 MPLS Enables Converged Multi-Service Networks 11

1.5 MPLS-Enabled Business VPN Services 13

Summary 17

Chapter 2 IP/MPLS VPN Multi-Service Network Overview 19

2.1 IP/MPLS Layer 2 VPN Requirements 20

2.2 IP/MPLS Layer 2 VPN Services 21

2.3 Meeting the Service Network Requirements Using IP/MPLS VPN Architecture 26

2.4 IP/MPLS VPN-Enabled Applications 30

Summary 34

Part II IP/MPLS VPN Protocol Fundamentals 37

Chapter 3 Using MPLS Label Switched Paths as Service Transport Tunnels 39

3.1 Basic MPLS Concepts Review 40

3.2 Label Switch Path Types 51

3.3 LDP-LSP LDP Label Distribution 54

3.4 RSVP-TE LSPs 64

3.5 Configuring RSVP-TE LSP 81

Summary 90

Chapter 4 Routing Protocol Traffi c Engineering and CSPF 91

4.1 Introducing Traffi c Engineering 92

4.2 Introducing OSPF-TE 97

4.3 Introducing IS-IS TE 112

4.4 The CSPF Algorithm 119

4.5 RSVP-TE LSP Policy Control: Administrative Groups and SRLG Groups 125

Summary 135

Chapter 5 RSVP-TE Protocol 137

5.1 RSVP and RSVP-TE 138

5.2 RSVP-TE Signaling Procedure 141

5.3 RSVP-TE Messages and Objects 150

5.4 Make-Before-Break (MBB) 176

5.5 The RSVP-TE Hello Protocol 191

5.6 Reducing RSVP Refresh Overhead 196

5.7 RSVP MD5 Authentication 206

Summary 207

Chapter 6 MPLS Resiliency Secondary LSP 209

6.1 Ensuring Reliability with MPLS Resiliency 210

6.2 An Overview of Primary and Secondary LSPs 211

6.3 What Affects Convergence Performance? 217

6.4 Rules for Selecting Secondary LSPs 222

6.5 Case Study: Using Administrative Groups in Secondary LSPs 226

Summary 228

Chapter 7 MPLS Resiliency RSVP-TE LSP Fast Reroute 231

7.1 RSVP-TE LSP Resiliency 232

7.2 Fast Reroute Overview 235

7.3 Fast Reroute Architecture 244

7.4 One-to-One Backup 259

7.5 Facility Backup 267

7.6 Manual Bypass Tunnel 283

Summary 288

Chapter 8 Label Distribution Protocol 291

8.1 LDP Overview 292

8.2 LDP Session Establishment and Management 292

8.3 Using T-LDP to Signal Pseudowires for Layer 2 VPN Services 299

8.4 LDP Messages and TLVs 304

8.5 LDP over RSVP-TE Tunneling 307

Summary 334

Part III Ethernet VPN Services 337

Chapter 9 IP/MPLS VPN Service Routing Architecture 339

9.1 IP/MPLS VPN Service Network Infrastructure 340

9.2 Alcatel-Lucent Service Routing Architecture 347

9.3 Service Access Point and SAP Components 360

9.4 Service Distribution Paths and Transport Tunnels 365

9.5 Multiple Forwarding Paths in the Same SDP 378

9.6 Maximum Transmission Unit in a Service Network 391

9.7 IP/MPLS VPN Service Implementation Overview 412

Summary 414

Chapter 10 Virtual Leased Line Services 415

10.1 VLL Services Overview 416

10.2 VLL Services Architecture 420

10.3 Pseudowire Switching for VLL Services 434

10.4 VLL Example: Epipe Ethernet P2P VPN 445

10.5 VLL Connection Admission Control 453

Summary 461

Chapter 11 Virtual Private LAN Service 463

11.1 VPLS Service Overview 464

11.2 VPLS Architecture 467

11.3 VPLS Mesh-Pseudowires 476

11.4 VPLS Service Access Points 487

11.5 VPLS Forwarding Database Management 504

Summary 506

Chapter 12 Hierarchical VPLS 509

12.1 Hierarchical-VPLS Overview 510

12.2 Spoke-Pseudowire Details 517

12.3 H-VPLS Topologies 527

12.4 H-VPLS Design Case Study Where to Break the Mesh? 531

Summary 541

Chapter 13 High Availability in an IP/MPLS VPN Network 543

13.1 Building a Network with High Availability 544

13.2 Bidirectional Forwarding Detection 548

13.3 Link Aggregation Group Overview 557

13.4 Multi Chassis Link Aggregation Group 566

13.5 Traffic Load Balancing in Link Aggregation Groups 579

Summary 595

Chapter 14 VLL Service Resiliency 597

14.1 VLL Service Resiliency Overview 598

14.2 VLL Service Resiliency Using Pseudowire Redundancy 603

14.3 VLL Network Design Using MC-LAG with Pseudowire Redundancy 615

Summary 634

Chapter 15 VPLS Service Resiliency 635

15.1 Introduction to VPLS Service Resiliency 636

15.2 Access Resiliency 637

15.3 H-VPLS Backbone Resiliency 640

15.4 Using MAC-Flush to Avoid Blackholes 651

Summary 673

Part IV Advanced Ethernet VPN Topics 675

Chapter 16 VPLS BGP Auto-Discovery 677

16.1 VPLS BGP-AD Overview 678

16.2 BGP Auto-Discovery for LDP-VPLS 678

16.3 SDPs, Transport Tunnels, and Pseudowires Created Using BGP-AD 692

16.4 Using Pre-Provisioned SDPs 698

16.5 Using BGP-AD Import and Export Policies to Control the Forwarding Topology of VPLS 699

Summary 704

Chapter 17 PBB-VPLS 707

17.1 Provider Backbone Bridge Overview 708

17.2 PBB-VPLS Architecture 716

17.3 PBB-VPLS Learning and Forwarding 733

17.4 Controlling Flooding in PBB-VPLS 741

17.5 FDB Management in I-VPLS and B-VPLS 755

17.6 OAM in a PBB-VPLS Network 758

17.7 Service Resiliency in PBB-VPLS Networks 760

17.8 MAC-Flush in PBB-VPLS 762

17.9 PBB Epipe 766

Summary 770

Chapter 18 OAM in a VPLS Service Network 773

18.1 OAM Functional Overview 774

18.2 Ethernet in the First Mile (EFM) OAM (802.3ah) 776

18.3 Ethernet Connectivity Fault Management 787

18.4 OAM in an IP/MPLS VPN Service Network 804

18.5 OAM in VPLS Services 818

Summary 837

Appendix A Spanning Tree Protocol 839

A.1 Spanning Tree Protocol 841

A.2 Spanning Tree Protocol Variations 855

A.3 VPLS Service Loop Prevention with STP 869

A.4 Altered STP Behavior in the VPLS Core 876

A.5 Using VPLS STP to Eliminate Customer Forwarding Loops 880

A.6 Using VPLS STP to Block Redundant Spoke-Pseudowires in H-VPLS 883

A.7 LDP MAC-Flush in STP Convergence 884

A.8 Management VPLS 885

Appendix B RFC and IEEE Standards 897

Glossary 901

Index 917

Additional information

NPB9780470456569
9780470456569
0470456566
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL by Zhuo Xu
New
Paperback
John Wiley & Sons Inc
2009-12-18
992
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a new book - be the first to read this copy. With untouched pages and a perfect binding, your brand new copy is ready to be opened for the first time

Customer Reviews - Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services