List of Figures

 < Day Day Up > 



Chapter 1: The Fundamentals of MPLS Networks and Data Flow

Figure 1.1: IP Network
Figure 1.2: IP Network with LERs and IP Packet with Shim Header Attached
Figure 1.3: MPLS Shim Header and Format
Figure 1.4: Label Switch Routers
Figure 1.5: Label Switch Paths
Figure 1.6: MPLS Network with Two FECs
Figure 1.7: Ingress LER Attaches a Shim Header
Figure 1.8: Label Swapping
Figure 1.9: Stacked Labels with Tunneled Network
Figure 1.10: MPLS Label Range Commands
Figure 1.11: MPLS Forwarding Table Commands
Figure 1.12: Network Trace for HTTP Port Number 80
Figure 1.13: Network Trace for Port 25 E-Mail
Figure 1.14: Network Trace for Port 20 FTP
Figure 1.15: Frame 1
Figure 1.16: Frame 9
Figure 1.17: Open MPLS_basic File

Chapter 2: MPLS Label Distribution

Figure 2.1: Label Switching in the Early Days
Figure 2.2: Basic MPLS Network with Four Routers
Figure 2.3: Independent Control
Figure 2.4: Ordered Control (Pushed)
Figure 2.5: Downstream on Demand (DOD)
Figure 2.6: LSR with Cross-Connect Tables Populated
Figure 2.7: Data Flow on LSP
Figure 2.8: A Closer Look at the Router
Figure 2.9: Full Network Diagram
Figure 2.10: Creating the Interface
Figure 2.11: Detailed View of LER1 Interface gi 2.2
Figure 2.12: Detailed View of LER1 Local Interface Lo 0Create OSPF on Interfaces
Figure 2.13: LER1 Global Routing
Figure 2.14: LER1 Enable OSPF
Figure 2.15: MPLS Added to Interface
Figure 2.16: LDP Started
Figure 2.17: Show LDP Sessions
Figure 2.18: Show LDP Neighbor
Figure 2.19: Hello Message for Exercise 2.2

Chapter 3: MPLS Signaling

Figure 3.1: Backed-Up Express Lane
Figure 3.2: MPLS with Three Paths
Figure 3.3: MPLS with a Failed Path C
Figure 3.4: MPLS with Congestion Caused by a Reroute
Figure 3.5: MPLS Routing State Machines
Figure 3.6: RSVP-TE PathRequest
Figure 3.7: RSVP-TE Reservation
Figure 3.8: RSVP-TE Path Setup
Figure 3.9: RSVP-TE Details
Figure 3.10: CR-LDP Frame Format
Figure 3.11: CR-LDP Call Setup
Figure 3.12: Simple RSVP Command Overview
Figure 3.13: RSVP Path Request
Figure 3.14: Previously Covered Commands
Figure 3.15: Show LSP ALL
Figure 3.16: Show LSP Verbose
Figure 3.17: ERO Subobject Fields
Figure 3.18: Four Reserved Values
Figure 3.19: Unique RSVP Strict Path Commands
Figure 3.20: Unique RSVP Strict Path Commands
Figure 3.21: RSVP Loose Routing (View 1)
Figure 3.22: RSVP with Loose Routing (View 2)
Figure 3.23: Configuration Example 1
Figure 3.24: Configuration Example 2
Figure 3.25: RSVP Overview
Figure 3.26: RSVP Detail
Figure 3.27: Frame 4
Figure 3.28: RSVP Path Request

Chapter 4: MPLS Network Reliance and Recovery

Figure 4.1: Traffic Detour
Figure 4.2: Heartbeat vs. Error Message Failure Detection
Figure 4.3: Heartbeat Method
Figure 4.4: Error Messages
Figure 4.5: Standard Routing
Figure 4.6: Network Failures
Figure 4.7: One-to-One Redundancy
Figure 4.8: One-to-Many Redundancy
Figure 4.9: Fault-Tolerant Equipment
Figure 4.10: RSVP-TE with Link Protection
Figure 4.11: RSVP-TE with Node Protection
Figure 4.12: Top-Level Configuration
Figure 4.13: Configuration Example
Figure 4.14: Previous RSVP Command
Figure 4.15: Four Steps to Configure Back Path
Figure 4.16: Detailed Syntax Commands for Secondary Path
Figure 4.17: Path without a Failure
Figure 4.18: Path After Failure
Figure 4.19: Typical Router Configuration
Figure 4.20: CLI Becomes Complex on Larger Networks
Figure 4.21: The Cisco Tunnel Builder Solution
Figure 4.22: Tunnel Builder Block Diagram
Figure 4.23: Tunnel Builder Demo Setup, Part 1
Figure 4.24: Tunnel Builder Demo Setup, Part 2
Figure 4.25: Tunnel Builder Demo Setup, Part 3

Chapter 5: MPLS Traffic Engineering

Figure 5.1: Express Lane
Figure 5.2: Four Aspects of Traffic Engineering
Figure 5.3: Over-Provisioning vs. Under-Provisioning
Figure 5.4: Comparison of Over-Provisioning and Under-Provisioning
Figure 5.5: Sample Network Diagram: Example 1
Figure 5.6: Sample Network Failure
Figure 5.7: Traffic Trends
Figure 5.8: Voice with Silence Suppression
Figure 5.9: Vocal Jazz Music (The Andrews Sisters Singing 'Boogie-Woogie Bugle Boy')
Figure 5.10: OPNET MPLS Uses
Figure 5.11: OPNET Services
Figure 5.12: Key Features of OPNET MPLS Model
Figure 5.13: Nonoptimized Network
Figure 5.14: Optimized Network

Chapter 6: Introduction to MPlS and GMPLS

Figure 6.1: GMPLS Advantages
Figure 6.2: Data, ATM, SONET, and DWDM
Figure 6.3: Network Types
Figure 6.4: The Promise of GMPLS
Figure 6.5: MPlS
Figure 6.6: GMPLS, MPLS, and IP
Figure 6.7: Network with Interfaces Added
Figure 6.8: Neighbor Discovery
Figure 6.9: Link Status Distribution
Figure 6.10: Topology Information
Figure 6.11: Path and Link Management Control
Figure 6.12: Link Management
Figure 6.13: SONET Matrix

Chapter 7: Virtual Private Networks and MPLS

Figure 7.1: Mesh VPN Network
Figure 7.2: VPN Using a Service Provider
Figure 7.3: VPN Requirements
Figure 7.4: End-to-End VPN Using a Secure Tunnel
Figure 7.5: Types of VPN Tunnels
Figure 7.6: GRE Header and GRE Packet
Figure 7.7: IP-IP Header
Figure 7.8: IPSec Frame
Figure 7.9: L2TPv3
Figure 7.10: MPLS Tunnel and Frame
Figure 7.11: VPN Overlay Model
Figure 7.12: Hub-and-Spoke Configuration with 4 Sites (Original Configuration)
Figure 7.13: Adding Site 5 with a Hub and Spoke Design
Figure 7.14: Adding Site 5 with a Fully Meshed Network
Figure 7.15: Peer Model
Figure 7.16: The Layers of VPNs (The VPN Tree)
Figure 7.17: RFC 2547 Data Flow, Steps 1 and 2
Figure 7.18: RFC 2547 Data Flow, Steps 3 and 4
Figure 7.19: RFC 2547 Routing Exchange, Steps 1 and 2
Figure 7.20: RFC 2547 Routing Exchange, Steps 3 and 4
Figure 7.21: Independent IP Address
Figure 7.22: Independent IP Address with Router Designator
Figure 7.23: Virtual Routing Network Drawing
Figure 7.24: VPN Tree
Figure 7.25: VPWS Network Design
Figure 7.26: VPLS Network
Figure 7.27: IPLS Network
Figure 7.28: Martini Block Diagram
Figure 7.29: Martini Header
Figure 7.30: Martini Header (Detailed)
Figure 7.31: Martini Tunnels
Figure 7.32: Kompella Routing and Forwarding Exchange
Figure 7.33: Kompella Data Flow, Steps 1 and 2
Figure 7.34: Kompella Data Flow, Steps 3 and 4
Figure 7.35: AToM Network
Figure 7.36: Example Network (1)
Figure 7.37: Network Diagram (2)
Figure 7.38: MPLS Block Diagram (3)
Figure 7.39: Case Study 1
Figure 7.40: Top-Level RFC2547 VPN Configuration
Figure 7.41: Configuration Details for RFC 2547
Figure 7.42: Layer-2 VPN Top Level
Figure 7.43: Detailed VPN Configuration
Figure 7.44: Top-Level VPLS Configuration
Figure 7.45: Case Study 2

Chapter 8: Quality of Service Meets MPLS

Figure 8.1: MOS Scale
Figure 8.2: Dropped Packets vs. Network Utilization
Figure 8.3: Latency Measurements
Figure 8.4: Jitter Measurements
Figure 8.5: Low Utilization with Low Errors
Figure 8.6a: Network Under Test for Quality of Voice Calls
Figure 8.6b: Percentage of Dropped Packets vs. Percentage of Load
Figure 8.6c: MOS Score Is Inversely Proportional to Load
Figure 8.7: QoS Markings for 802.1Q/p
Figure 8.8: QoS Marked on the Network Layer DiffServ
Figure 8.9: QoS Marked on the MPLS Shim Header
Figure 8.10: Packets Marked in Three Places
Figure 8.11: End-to-End QoS Marking
Figure 8.12: End-to-End QoS with RSVP
Figure 8.13: Applications Policing
Figure 8.14: QoS - CoS
Figure 8.15: CoS - QoS Mapping
Figure 8.16: E-LSP /L-LSP
Figure 8.17: Too Many Packets Trying to Enter Router
Figure 8.18: Basic RED Rules
Figure 8.19: Simple RED Queuing Response Curve
Figure 8.20: Traffic to Be Queued
Figure 8.21: Dropped Packet Percentages after RED Shaping
Figure 8.22: The Problem with RED
Figure 8.23: WRED Theory
Figure 8.24: Priority Bits in IP Header
Figure 8.25: QoS without Marked Packets
Figure 8.26: Precedence Bits Marked
Figure 8.27: ToS and DiffServ bits relationship
Figure 8.28: Precedence Bit Mapping
Figure 8.29: ToS Bits Copied to Exp Bits
Figure 8.30: Detailed DiffServ Code Point Format
Figure 8.31: Details of Bit Pattern for AF 11
Figure 8.32: What Is Needed for End-to-End QoS?
Figure 8.33: MPLS End-to-End QoS Process
Figure 8.34: QoS per MPLS Elements
Figure 8.35: Copy Bits Directly to and from Packets Traversing the LSP
Figure 8.36: Setting the Exp Bits Using a Mapping Table

Chapter 9: MPLS Marketing

Figure 9.1: How to Go Broke
Figure 9.2: Questions in Marketing
Figure 9.3: Three Types of Audience
Figure 9.4: End-User Concerns
Figure 9.5: What Service Providers Want
Figure 9.6: The Vendor's Goal
Figure 9.7: State of Carrier Market
Figure 9.8: Strategies for Growth and Marketing
Figure 9.9: VPN Sales
Figure 9.10: Carrier Revenue
Figure 9.11: One-Stop Carrier Shop
Figure 9.12: Marketing Areas
Figure 9.13: Core Provider Marketing Areas
Figure 9.14: The VPN Rainbow
Figure 9.15: Customers Want Value Added Services
Figure 9.16: Five Major Drivers Behind VPNs
Figure 9.17: ATM Sales Projections
Figure 9.18: Marketing Fronts
Figure 9.19: Zone of Success
Figure 9.20: Unofficial MPLS Carrier List
Figure 9.21: Acme Networks: Total Customers and Total Locations
Figure 9.22: Total Revenue by Firm Size ($Millions)
Figure 9.23: Atlanta Area Network Architecture
Figure 9.24: Total Capex - All Edge Pops ($M)
Figure 9.25: Total Central Office COGS ($K) (Rack Space, Security, Power, HVAC)
Figure 9.26: Total Outage Related COGS (Outage-related customer services and SLA violations) ($M)
Figure 9.27: Total VPN Service COGS ($M)
Figure 9.28: Summary Operational Costs
Figure 9.29: Total Overhead Costs ($M)
Figure 9.30: Total Net Income: 2002-2006 ($M)
Figure 9.31: Total NPV ($M)
Figure 9.32: ROIC

Appendix A: Answer Key for Chapter Exercises

Figure 1.12: Network Trace for HTTP Port Number 80
Figure 1.13: Network Trace for Port 25 E-Mail
Figure 1.14: Network Trace for Port 20 FTP
Figure 1.15: Frame 1
Figure 1.16: Frame 9
Figure 1.17: Open MPLS_basic File
Figure 2.19: Hello Message for Exercise 2.2
Figure 3.25: RSVP Overview
Figure 3.26: RSVP Detail
Figure 3.28: Frame 4
Figure 3.29: RSVP Path Request
Figure 7.39: Case Study 1
Figure 7.45: Case Study 2



 < Day Day Up > 



Rick Gallagher's MPLS Training Guide. Building Multi-Protocol Label Switching Networks
Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks
ISBN: 1932266003
EAN: 2147483647
Year: 2003
Pages: 138

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net