Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: The Fundamentals of MPLS Networks and Data Flow
Figure 1.1: IP Network
Figure 1.2: IP Network with LERs and IP Packet with Shim Header Attached
Figure 1.3: MPLS Shim Header and Format
Figure 1.4: Label Switch Routers
Figure 1.5: Label Switch Paths
Figure 1.6: MPLS Network with Two FECs
Figure 1.7: Ingress LER Attaches a Shim Header
Figure 1.8: Label Swapping
Figure 1.9: Stacked Labels with Tunneled Network
Figure 1.10: MPLS Label Range Commands
Figure 1.11: MPLS Forwarding Table Commands
Figure 1.12: Network Trace for HTTP Port Number 80
Figure 1.13: Network Trace for Port 25 E-Mail
Figure 1.14: Network Trace for Port 20 FTP
Figure 1.15: Frame 1
Figure 1.16: Frame 9
Figure 1.17: Open MPLS_basic File
Chapter 2: MPLS Label Distribution
Figure 2.1: Label Switching in the Early Days
Figure 2.2: Basic MPLS Network with Four Routers
Figure 2.3: Independent Control
Figure 2.4: Ordered Control (Pushed)
Figure 2.5: Downstream on Demand (DOD)
Figure 2.6: LSR with Cross-Connect Tables Populated
Figure 2.7: Data Flow on LSP
Figure 2.8: A Closer Look at the Router
Figure 2.9: Full Network Diagram
Figure 2.10: Creating the Interface
Figure 2.11: Detailed View of LER1 Interface gi 2.2
Figure 2.12: Detailed View of LER1 Local Interface Lo 0Create OSPF on Interfaces
Figure 2.13: LER1 Global Routing
Figure 2.14: LER1 Enable OSPF
Figure 2.15: MPLS Added to Interface
Figure 2.16: LDP Started
Figure 2.17: Show LDP Sessions
Figure 2.18: Show LDP Neighbor
Figure 2.19: Hello Message for Exercise 2.2
Chapter 3: MPLS Signaling
Figure 3.1: Backed-Up Express Lane
Figure 3.2: MPLS with Three Paths
Figure 3.3: MPLS with a Failed Path C
Figure 3.4: MPLS with Congestion Caused by a Reroute
Figure 3.5: MPLS Routing State Machines
Figure 3.6: RSVP-TE PathRequest
Figure 3.7: RSVP-TE Reservation
Figure 3.8: RSVP-TE Path Setup
Figure 3.9: RSVP-TE Details
Figure 3.10: CR-LDP Frame Format
Figure 3.11: CR-LDP Call Setup
Figure 3.12: Simple RSVP Command Overview
Figure 3.13: RSVP Path Request
Figure 3.14: Previously Covered Commands
Figure 3.15: Show LSP ALL
Figure 3.16: Show LSP Verbose
Figure 3.17: ERO Subobject Fields
Figure 3.18: Four Reserved Values
Figure 3.19: Unique RSVP Strict Path Commands
Figure 3.20: Unique RSVP Strict Path Commands
Figure 3.21: RSVP Loose Routing (View 1)
Figure 3.22: RSVP with Loose Routing (View 2)
Figure 3.23: Configuration Example 1
Figure 3.24: Configuration Example 2
Figure 3.25: RSVP Overview
Figure 3.26: RSVP Detail
Figure 3.27: Frame 4
Figure 3.28: RSVP Path Request
Chapter 4: MPLS Network Reliance and Recovery
Figure 4.1: Traffic Detour
Figure 4.2: Heartbeat vs. Error Message Failure Detection
Figure 4.3: Heartbeat Method
Figure 4.4: Error Messages
Figure 4.5: Standard Routing
Figure 4.6: Network Failures
Figure 4.7: One-to-One Redundancy
Figure 4.8: One-to-Many Redundancy
Figure 4.9: Fault-Tolerant Equipment
Figure 4.10: RSVP-TE with Link Protection
Figure 4.11: RSVP-TE with Node Protection
Figure 4.12: Top-Level Configuration
Figure 4.13: Configuration Example
Figure 4.14: Previous RSVP Command
Figure 4.15: Four Steps to Configure Back Path
Figure 4.16: Detailed Syntax Commands for Secondary Path
Figure 4.17: Path without a Failure
Figure 4.18: Path After Failure
Figure 4.19: Typical Router Configuration
Figure 4.20: CLI Becomes Complex on Larger Networks
Figure 4.21: The Cisco Tunnel Builder Solution
Figure 4.22: Tunnel Builder Block Diagram
Figure 4.23: Tunnel Builder Demo Setup, Part 1
Figure 4.24: Tunnel Builder Demo Setup, Part 2
Figure 4.25: Tunnel Builder Demo Setup, Part 3
Chapter 5: MPLS Traffic Engineering
Figure 5.1: Express Lane
Figure 5.2: Four Aspects of Traffic Engineering
Figure 5.3: Over-Provisioning vs. Under-Provisioning
Figure 5.4: Comparison of Over-Provisioning and Under-Provisioning
Figure 5.5: Sample Network Diagram: Example 1
Figure 5.6: Sample Network Failure
Figure 5.7: Traffic Trends
Figure 5.8: Voice with Silence Suppression
Figure 5.9: Vocal Jazz Music (The Andrews Sisters Singing 'Boogie-Woogie Bugle Boy')
Figure 5.10: OPNET MPLS Uses
Figure 5.11: OPNET Services
Figure 5.12: Key Features of OPNET MPLS Model
Figure 5.13: Nonoptimized Network
Figure 5.14: Optimized Network
Chapter 6: Introduction to MP
l
S and GMPLS
Figure 6.1: GMPLS Advantages
Figure 6.2: Data, ATM, SONET, and DWDM
Figure 6.3: Network Types
Figure 6.4: The Promise of GMPLS
Figure 6.5: MP
l
S
Figure 6.6: GMPLS, MPLS, and IP
Figure 6.7: Network with Interfaces Added
Figure 6.8: Neighbor Discovery
Figure 6.9: Link Status Distribution
Figure 6.10: Topology Information
Figure 6.11: Path and Link Management Control
Figure 6.12: Link Management
Figure 6.13: SONET Matrix
Chapter 7: Virtual Private Networks and MPLS
Figure 7.1: Mesh VPN Network
Figure 7.2: VPN Using a Service Provider
Figure 7.3: VPN Requirements
Figure 7.4: End-to-End VPN Using a Secure Tunnel
Figure 7.5: Types of VPN Tunnels
Figure 7.6: GRE Header and GRE Packet
Figure 7.7: IP-IP Header
Figure 7.8: IPSec Frame
Figure 7.9: L2TPv3
Figure 7.10: MPLS Tunnel and Frame
Figure 7.11: VPN Overlay Model
Figure 7.12: Hub-and-Spoke Configuration with 4 Sites (Original Configuration)
Figure 7.13: Adding Site 5 with a Hub and Spoke Design
Figure 7.14: Adding Site 5 with a Fully Meshed Network
Figure 7.15: Peer Model
Figure 7.16: The Layers of VPNs (The VPN Tree)
Figure 7.17: RFC 2547 Data Flow, Steps 1 and 2
Figure 7.18: RFC 2547 Data Flow, Steps 3 and 4
Figure 7.19: RFC 2547 Routing Exchange, Steps 1 and 2
Figure 7.20: RFC 2547 Routing Exchange, Steps 3 and 4
Figure 7.21: Independent IP Address
Figure 7.22: Independent IP Address with Router Designator
Figure 7.23: Virtual Routing Network Drawing
Figure 7.24: VPN Tree
Figure 7.25: VPWS Network Design
Figure 7.26: VPLS Network
Figure 7.27: IPLS Network
Figure 7.28: Martini Block Diagram
Figure 7.29: Martini Header
Figure 7.30: Martini Header (Detailed)
Figure 7.31: Martini Tunnels
Figure 7.32: Kompella Routing and Forwarding Exchange
Figure 7.33: Kompella Data Flow, Steps 1 and 2
Figure 7.34: Kompella Data Flow, Steps 3 and 4
Figure 7.35: AToM Network
Figure 7.36: Example Network (1)
Figure 7.37: Network Diagram (2)
Figure 7.38: MPLS Block Diagram (3)
Figure 7.39: Case Study 1
Figure 7.40: Top-Level RFC2547 VPN Configuration
Figure 7.41: Configuration Details for RFC 2547
Figure 7.42: Layer-2 VPN Top Level
Figure 7.43: Detailed VPN Configuration
Figure 7.44: Top-Level VPLS Configuration
Figure 7.45: Case Study 2
Chapter 8: Quality of Service Meets MPLS
Figure 8.1: MOS Scale
Figure 8.2: Dropped Packets vs. Network Utilization
Figure 8.3: Latency Measurements
Figure 8.4: Jitter Measurements
Figure 8.5: Low Utilization with Low Errors
Figure 8.6a: Network Under Test for Quality of Voice Calls
Figure 8.6b: Percentage of Dropped Packets vs. Percentage of Load
Figure 8.6c: MOS Score Is Inversely Proportional to Load
Figure 8.7: QoS Markings for 802.1Q/p
Figure 8.8: QoS Marked on the Network Layer DiffServ
Figure 8.9: QoS Marked on the MPLS Shim Header
Figure 8.10: Packets Marked in Three Places
Figure 8.11: End-to-End QoS Marking
Figure 8.12: End-to-End QoS with RSVP
Figure 8.13: Applications Policing
Figure 8.14: QoS - CoS
Figure 8.15: CoS - QoS Mapping
Figure 8.16: E-LSP /L-LSP
Figure 8.17: Too Many Packets Trying to Enter Router
Figure 8.18: Basic RED Rules
Figure 8.19: Simple RED Queuing Response Curve
Figure 8.20: Traffic to Be Queued
Figure 8.21: Dropped Packet Percentages after RED Shaping
Figure 8.22: The Problem with RED
Figure 8.23: WRED Theory
Figure 8.24: Priority Bits in IP Header
Figure 8.25: QoS without Marked Packets
Figure 8.26: Precedence Bits Marked
Figure 8.27: ToS and DiffServ bits relationship
Figure 8.28: Precedence Bit Mapping
Figure 8.29: ToS Bits Copied to Exp Bits
Figure 8.30: Detailed DiffServ Code Point Format
Figure 8.31: Details of Bit Pattern for AF 11
Figure 8.32: What Is Needed for End-to-End QoS?
Figure 8.33: MPLS End-to-End QoS Process
Figure 8.34: QoS per MPLS Elements
Figure 8.35: Copy Bits Directly to and from Packets Traversing the LSP
Figure 8.36: Setting the Exp Bits Using a Mapping Table
Chapter 9: MPLS Marketing
Figure 9.1: How to Go Broke
Figure 9.2: Questions in Marketing
Figure 9.3: Three Types of Audience
Figure 9.4: End-User Concerns
Figure 9.5: What Service Providers Want
Figure 9.6: The Vendor's Goal
Figure 9.7: State of Carrier Market
Figure 9.8: Strategies for Growth and Marketing
Figure 9.9: VPN Sales
Figure 9.10: Carrier Revenue
Figure 9.11: One-Stop Carrier Shop
Figure 9.12: Marketing Areas
Figure 9.13: Core Provider Marketing Areas
Figure 9.14: The VPN Rainbow
Figure 9.15: Customers Want Value Added Services
Figure 9.16: Five Major Drivers Behind VPNs
Figure 9.17: ATM Sales Projections
Figure 9.18: Marketing Fronts
Figure 9.19: Zone of Success
Figure 9.20: Unofficial MPLS Carrier List
Figure 9.21: Acme Networks: Total Customers and Total Locations
Figure 9.22: Total Revenue by Firm Size ($Millions)
Figure 9.23: Atlanta Area Network Architecture
Figure 9.24: Total Capex - All Edge Pops ($M)
Figure 9.25: Total Central Office COGS ($K) (Rack Space, Security, Power, HVAC)
Figure 9.26: Total Outage Related COGS (Outage-related customer services and SLA violations) ($M)
Figure 9.27: Total VPN Service COGS ($M)
Figure 9.28: Summary Operational Costs
Figure 9.29: Total Overhead Costs ($M)
Figure 9.30: Total Net Income: 2002-2006 ($M)
Figure 9.31: Total NPV ($M)
Figure 9.32: ROIC
Appendix A: Answer Key for Chapter Exercises
Figure 1.12: Network Trace for HTTP Port Number 80
Figure 1.13: Network Trace for Port 25 E-Mail
Figure 1.14: Network Trace for Port 20 FTP
Figure 1.15: Frame 1
Figure 1.16: Frame 9
Figure 1.17: Open MPLS_basic File
Figure 2.19: Hello Message for Exercise 2.2
Figure 3.25: RSVP Overview
Figure 3.26: RSVP Detail
Figure 3.28: Frame 4
Figure 3.29: RSVP Path Request
Figure 7.39: Case Study 1
Figure 7.45: Case Study 2
< Day Day Up >
Previous page
Table of content
Next page
Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks
ISBN: 1932266003
EAN: 2147483647
Year: 2003
Pages: 138
Authors:
Syngress
,
Rick Gallaher
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Process Maturity Framework and Quality Standards
Complexity Metrics and Models
An Example of Module Design Metrics in Practice
Satisfaction with Company
Establishing the Alignment Principle
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Address Resolution Protocol (ARP)
Internet Control Message Protocol (ICMP)
Transmission Control Protocol (TCP) Data Flow
File and Printer Sharing
Internet Protocol Security (IPSec)
InDesign Type: Professional Typography with Adobe InDesign CS2
Pasting Text
Controlling Widows and Orphans
Up Next
Up Next
Sheared Type
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Phase 1 Readiness Assessment
Phase 2 Engagement (Creating Pull)
First Wave Service Projects
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Computer Network Hardware
Designing and Installing Distributed Audio Systems
Distributed Video Basics
User Interfaces
Integrating the Connected Home
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies