| | Copyright |
| | About the Authors |
| | About the Technical Reviewers |
| | Acknowledgments |
| | Icons Used in This Book |
| | Foreword |
| | Introduction |
| | Part 1: The Business Case for MPLS |
| | | Chapter 1. The Dynamics of Service Creation and Deployment |
| | | Industry Dynamics and Challenges |
| | | What About the Enterprise Market? |
| | | Business Drivers and Requirements |
| | | Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself |
| | | Subscribing to a Managed Layer 3 MPLS VPN Service |
| | | The Case for Building VPNsLayer 2 or Layer 3 |
| | | Existing TechnologiesFrame Relay, ATM, and IP-Based Networks: What Can They Solve? |
| | | Service Examples |
| | | Summary |
| | | Chapter 2. The Scope of Service Types |
| | | Overview of Layer 2 Services |
| | | Next-Generation Network Overview and Interworking Functions |
| | | Layer 3 Services |
| | | Remote Access |
| | | Value-Added Services |
| | | Summary |
| | Part 2: The Technical Case for MPLS |
| | | Chapter 3. Technology Overview: Making the Technology Case for MPLS and Technology Details |
| | | Available Technologies and Options |
| | | Why MPLS? (High-Level Detail) |
| | | MPLS and Quality of Service |
| | | Benefits |
| | | MPLS Technology Details |
| | | Layer 3 VPNs |
| | | Carrier Supporting Carrier and Inter-Provider Autonomous Systems |
| | | Traffic Engineering |
| | | DiffServ |
| | | Layer 2 VPNs |
| | | Summary |
| | Part 3: Mpl Services and Components |
| | | Chapter 4. Layer 2 VPNs |
| | | Taxonomy |
| | | Introducing AToM |
| | | Layer 2 Interworking |
| | | Virtual Private LAN Service |
| | | Provisioning and Signaling |
| | | Benefits of L2VPNs |
| | | Inter-AS L2VPNs |
| | | Supported IETF Standards |
| | | Summary |
| | | Standards and References |
| | | Chapter 5. Layer 3 VPNs |
| | | Technology Overview |
| | | Corporate Intranet |
| | | Corporate Extranet |
| | | Internet Access |
| | | Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks |
| | | Heterogeneous Networks |
| | | Managed Central Services |
| | | Supported IETF Drafts |
| | | Summary |
| | | Chapter 6. Remote Access and IPSec Integration with MPLS VPNs |
| | | Technology Overview |
| | | PE-CE Routing Protocols |
| | | Scalability and Network Convergence for Remote Access |
| | | Summary |
| | | Chapter 7. MPLS Security |
| | | Security and NGN |
| | | Security Overview and MPLS |
| | | MPLS VPN and Security |
| | | Attack Scenarios |
| | | IPSec |
| | | Layer 2 and Unmanaged VPN Service Considerations |
| | | Overall Best Practice Recommendations |
| | | Summary |
| | | Standards and References |
| | | Chapter 8. Traffic Engineering |
| | | Problem Statement |
| | | Technology Overview |
| | | TE Applications and Examples |
| | | Protection and Restoration |
| | | Scaling MPLS TE |
| | | MPLS Traffic Engineering and Multicast |
| | | Standards and References |
| | | Summary |
| | | Chapter 9. Quality of Service |
| | | Problem Statement |
| | | Standards and References |
| | | Summary |
| | | Chapter 10. Multicast and NGNs |
| | | Problem Statement |
| | | MPLS Multicast VPN Overview |
| | | MPLS Multicast VPN Applications and Examples |
| | | Multicast Security and Management Considerations |
| | | Standards and References |
| | | Summary |
| | | Chapter 11. IPv6 and MPLS |
| | | Problem Statement |
| | | Technology Overview |
| | | Management and IPv6 |
| | | Summary |
| | Part 4: Bringing Your MPLS Plan Together |
| | | Chapter 12. Network Management and Provisioning |
| | | Problem Statement |
| | | Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management |
| | | VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms |
| | | Dealing with Equal Cost Multipaths |
| | | Virtual Circuit Connection Verification and Bidirectional Forwarding Detection |
| | | A Word About Interworking OAM |
| | | Generic Failure Types |
| | | Configuration Management for MPLS-Based Networks |
| | | Accounting for MPLS-Based Networks |
| | | Performance Management for MPLS-Based Networks |
| | | Security Management for MPLS-Based Networks |
| | | Per-VPN Management |
| | | Standards and References |
| | | Summary |
| | | Chapter 13. Design Considerations: Putting it All Together |
| | | VRF-Aware Feature |
| | | NAT-PE System Flow |
| | | Deployment Guideline Summary |
| | | Management, Provisioning, and Troubleshooting |
| | | Equipment Scalability Versus Network Scalability |
| | | Summary |
| | | Chapter 14. MPLS Case Studies |
| | | The Background on Equant |
| | | VPN Bridge Case Study |
| | | Summary |
| | | Chapter 15. The Future of MPLS |
| | | Integrating IP and Optical Networks (Transport Area) |
| | | Future Layer 3 Services |
| | | Future Layer 2 Services |
| | | Future Enhancements in Provisioning and Management |
| | | Increasing Enterprise Deployment of MPLS |
| | | Summary |
| | | A View from George Swallow |
| | | A View from Adrian Farrell |
| | Index |