| | | Copyright |
| | | About the Authors |
| | | About the Technical Reviewers |
| | | Acknowledgments |
| | | Icons Used in This Book |
| | | Foreword |
| | | Introduction |
| | | Part 1: The Business Case for MPLS |
| | | | Chapter 1. The Dynamics of Service Creation and Deployment |
| | | | Industry Dynamics and Challenges |
| | | | What About the Enterprise Market? |
| | | | Business Drivers and Requirements |
| | | | Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself |
| | | | Subscribing to a Managed Layer 3 MPLS VPN Service |
| | | | The Case for Building VPNsLayer 2 or Layer 3 |
| | | | Existing TechnologiesFrame Relay, ATM, and IP-Based Networks: What Can They Solve? |
| | | | Service Examples |
| | | | Summary |
| | | | Chapter 2. The Scope of Service Types |
| | | | Overview of Layer 2 Services |
| | | | Next-Generation Network Overview and Interworking Functions |
| | | | Layer 3 Services |
| | | | Remote Access |
| | | | Value-Added Services |
| | | | Summary |
| | | Part 2: The Technical Case for MPLS |
| | | | Chapter 3. Technology Overview: Making the Technology Case for MPLS and Technology Details |
| | | | Available Technologies and Options |
| | | | Why MPLS? (High-Level Detail) |
| | | | MPLS and Quality of Service |
| | | | Benefits |
| | | | MPLS Technology Details |
| | | | Layer 3 VPNs |
| | | | Carrier Supporting Carrier and Inter-Provider Autonomous Systems |
| | | | Traffic Engineering |
| | | | DiffServ |
| | | | Layer 2 VPNs |
| | | | Summary |
| | | Part 3: Mpl Services and Components |
| | | | Chapter 4. Layer 2 VPNs |
| | | | Taxonomy |
| | | | Introducing AToM |
| | | | Layer 2 Interworking |
| | | | Virtual Private LAN Service |
| | | | Provisioning and Signaling |
| | | | Benefits of L2VPNs |
| | | | Inter-AS L2VPNs |
| | | | Supported IETF Standards |
| | | | Summary |
| | | | Standards and References |
| | | | Chapter 5. Layer 3 VPNs |
| | | | Technology Overview |
| | | | Corporate Intranet |
| | | | Corporate Extranet |
| | | | Internet Access |
| | | | Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks |
| | | | Heterogeneous Networks |
| | | | Managed Central Services |
| | | | Supported IETF Drafts |
| | | | Summary |
| | | | Chapter 6. Remote Access and IPSec Integration with MPLS VPNs |
| | | | Technology Overview |
| | | | PE-CE Routing Protocols |
| | | | Scalability and Network Convergence for Remote Access |
| | | | Summary |
| | | | Chapter 7. MPLS Security |
| | | | Security and NGN |
| | | | Security Overview and MPLS |
| | | | MPLS VPN and Security |
| | | | Attack Scenarios |
| | | | IPSec |
| | | | Layer 2 and Unmanaged VPN Service Considerations |
| | | | Overall Best Practice Recommendations |
| | | | Summary |
| | | | Standards and References |
| | | | Chapter 8. Traffic Engineering |
| | | | Problem Statement |
| | | | Technology Overview |
| | | | TE Applications and Examples |
| | | | Protection and Restoration |
| | | | Scaling MPLS TE |
| | | | MPLS Traffic Engineering and Multicast |
| | | | Standards and References |
| | | | Summary |
| | | | Chapter 9. Quality of Service |
| | | | Problem Statement |
| | | | Standards and References |
| | | | Summary |
| | | | Chapter 10. Multicast and NGNs |
| | | | Problem Statement |
| | | | MPLS Multicast VPN Overview |
| | | | MPLS Multicast VPN Applications and Examples |
| | | | Multicast Security and Management Considerations |
| | | | Standards and References |
| | | | Summary |
| | | | Chapter 11. IPv6 and MPLS |
| | | | Problem Statement |
| | | | Technology Overview |
| | | | Management and IPv6 |
| | | | Summary |
| | | Part 4: Bringing Your MPLS Plan Together |
| | | | Chapter 12. Network Management and Provisioning |
| | | | Problem Statement |
| | | | Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management |
| | | | VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms |
| | | | Dealing with Equal Cost Multipaths |
| | | | Virtual Circuit Connection Verification and Bidirectional Forwarding Detection |
| | | | A Word About Interworking OAM |
| | | | Generic Failure Types |
| | | | Configuration Management for MPLS-Based Networks |
| | | | Accounting for MPLS-Based Networks |
| | | | Performance Management for MPLS-Based Networks |
| | | | Security Management for MPLS-Based Networks |
| | | | Per-VPN Management |
| | | | Standards and References |
| | | | Summary |
| | | | Chapter 13. Design Considerations: Putting it All Together |
| | | | VRF-Aware Feature |
| | | | NAT-PE System Flow |
| | | | Deployment Guideline Summary |
| | | | Management, Provisioning, and Troubleshooting |
| | | | Equipment Scalability Versus Network Scalability |
| | | | Summary |
| | | | Chapter 14. MPLS Case Studies |
| | | | The Background on Equant |
| | | | VPN Bridge Case Study |
| | | | Summary |
| | | | Chapter 15. The Future of MPLS |
| | | | Integrating IP and Optical Networks (Transport Area) |
| | | | Future Layer 3 Services |
| | | | Future Layer 2 Services |
| | | | Future Enhancements in Provisioning and Management |
| | | | Increasing Enterprise Deployment of MPLS |
| | | | Summary |
| | | | A View from George Swallow |
| | | | A View from Adrian Farrell |
| | | Index |