MPLS-Enabled Applications Emerging Developments and New Technologies

"Here at last is a single, all-encompassing resource where the myriad applications sharpen into a comprehensible text." Kireeti Kompella, Juniper Fellow, Juniper Networks. The authoritative guide to MPLS, now in its second edition, fully updated with brand new material! Multiprotocol Label...

Descripción completa

Detalles Bibliográficos
Autor principal: Minei, Ina (-)
Otros Autores: Lucek, Julian
Formato: Libro electrónico
Idioma:Inglés
Publicado: Chicester : Wiley 2008.
Edición:2nd ed
Colección:Wiley Series on Communications Networking & Distributed Systems
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627761906719
Tabla de Contenidos:
  • MPLS-Enabled Applications; Contents; About the Authors; Foreword; Preface; Acknowledgements; Part One; 1 Foundations; 1.1 Historical perspective; 1.2 Current trends; 1.3 MPLS mechanisms; 1.3.1 Forwarding plane mechanisms; 1.3.2 Control plane mechanisms; 1.3.3 Transport of IPv6 over an IPv4 MPLS core; 1.4 Conclusion; 1.5 References; 1.6 Further reading; 1.7 Study questions; 2 Traffic Engineering with MPLS (MPLS-TE); 2.1 Introduction; 2.2 The business drivers; 2.3 Application scenarios; 2.4 Setting up traffic-engineered paths using MPLS-TE; 2.4.1 LSP priorities and preemption
  • 2.4.2 Information distribution - IGP extensions2.4.3 Path calculation - CSPF; 2.4.4 Path setup - RSVP extensions and admission control; 2.5 Using the traffic-engineered paths; 2.6 Deployment considerations; 2.6.1 Scalability; 2.6.2 Reservation granularity; 2.6.3 Routing challenges; 2.7 Using traffic engineering to achieve resource optimization; 2.7.1 Autobandwidth - dealing with unknown bandwidth requirements; 2.7.2 Sharing links between RSVP and other traffic - dealing with unknown bandwidth availability; 2.7.3 Other methods for optimization of transmission resources in MPLS networks
  • 2.8 Offline path computation2.9 Conclusion; 2.10 References; 2.11 Further reading; 2.12 Study questions; 3 Protection and Restoration in MPLS Networks; 3.1 Introduction; 3.2 The business drivers; 3.3 Failure detection; 3.4 End-to-end protection; 3.4.1 Control over the traffic flow following a failure; 3.4.2 Requirement for path diversity; 3.4.3 Double-booking of resources; 3.4.4 Unnecessary protection; 3.4.5 Nondeterministic switchover delay; 3.5 Local protection using fast reroute; 3.5.1 Case (i): link protection, for the facility protection case
  • 3.5.2 Case (ii): link protection, for the 1:1 protection case3.5.3 Case (iii): node protection, for the facility protection case; 3.5.4 Case (iv): node protection, for the 1:1 protection case; 3.6 Link protection; 3.6.1 What happens before the failure; 3.6.2 What happens after the failure; 3.7 Node protection; 3.8 Additional constraints for the computation of the protection path; 3.8.1 Fate sharing; 3.8.2 Bandwidth protection; 3.8.3 Bandwidth protection and DiffServ; 3.9 Interaction of end-to-end protection and fast reroute; 3.10 Deployment considerations for local protection mechanisms
  • 3.10.1 Scalability considerations3.10.2 Evaluating a local protection implementation; 3.10.3 The cost of bandwidth protection; 3.11 IP and LDP FRR; 3.11.1 The tunnel-based approach; 3.11.2 The alternate-path approach; 3.12 Conclusion; 3.13 References; 3.14 Further reading; 3.15 Study questions; 4 MPLS DiffServ-TE; 4.1 Introduction; 4.2 The business drivers; 4.3 Application scenarios; 4.3.1 Limiting the proportion of traffic from a particular class on a link; 4.3.2 Maintaining relative proportions of traffic on links; 4.3.3 Providing guaranteed bandwidth services; 4.4 The DiffServ-TE solution
  • 4.4.1 Class types