ebook img

MPLS-Enabled Applications PDF

608 Pages·2011·8.61 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview MPLS-Enabled Applications

P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come ‘While MPLS is in itself simple, its apparent complexity lies in the proliferation of applications, which shows no signs of ceasing. To make things worse, catching up involves reading a large number of documents written by various authors at various times in various styles. Here at last is a single, all encompassing resource where the myriad applications sharpen into a comprehensible text that first explains the whys and whats of each application before going on to the technical detail of the hows.’ Kireeti Kompella, CTO Junos, Juniper Networks ‘MPLS-Enabled Applications thoroughly covers the MPLS base technology and applications on MPLS-enabled IP networks. It guides you to a comprehensive understanding of stan- dards, problems, and solutions in networking with MPLS. Before it had been necessary to go through material from many different sources, here we have everything in one place. All the MPLS protocols are covered, as are the applications of these protocols. This should be the textbook for MPLS courses, both for training of experienced networking professionals and for universities.’ Loa Andersson, Ericsson AB and IETF MPLS working group co-chair ‘Although over ten years old, MPLS technology continues to evolve to meet the developing requirements of network operators and the advancing aspirations of network users. It is important that a book like this should continue to be updated in step with the changes to MPLS, and this new revision includes essential new material for those trying to understand the next steps in MPLS.’ Adrian Farrel, IETF Routing Area Director ‘This book continues to be the industry and academic state-of-the-art on explaining the foundation and nuances of MPLS technology. It is extremely well written and tackles all of the most modern extensions of MPLS technology. If you are interested in how the internet works, it will be a well-worn read. It should be on every internet practitioner’s bookshelf.’ Dave Ward, IETF WG chair: BFD, Softwires, ISIS, HIP ‘This is the MPLS text that the industry has been waiting for. On one hand, the text presents MPLS technology clearly enough that the reader can absorb its content in a few easy sittings. On the other hand, the text provides a sufficiently in-depth treatment that even an MPLS expert can learn from it. The authors offer a clear and complete description of MPLS, its inner workings and its applications, in a manner that could only be achieved by persons who have been significant contributors to the MPLS development effort. Every network operator who has deployed or is considering the deployment of MPLS technology should read this book. It is appropriate reading for everyone from the CTO to the tier 1 NOC engineer.’ Ron Bonica, Juniper Networks, Co-director IETF Operations and Management Area ‘MPLS-Enabled Applications provides excellent insight on how recently developed solutions can help address challenges for providing multicast in MPLS-based VPNs. The in-depth coverage of recent advances in MPLS technology that provide multicast support in L2 and L3 VPNs is essential to anyone needing to deploy both basic use cases and advanced scenarios as well.’ Thomas Morin, Network Architect at France Telecom Orange ‘This is a highly recommended book for network design engineers who want to update themselves with the latest MPLS development, or those who want to learn this technology thoroughly. In addition to the impressive technology coverage and depth, the book is also a delightful reading!’ Lei Wang, Department manager Mobile IP Transport, Telenor MPLS-Enabled Applications: Emerging Developments and New Technologies Third Edition Ina Minei and Julian Lucek © 2011 John Wiley & Sons, Ltd P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come ‘MPLS-Enabled Applications is an excellent read for network engineers involved in the design of MPLS networks and services. It can serve as an introduction to MPLS networking or as a reference book for the advanced engineer. It discusses practical issues that must be considered in the design of MPLS networks and services, including MPLS-TE, MPLS-IPVPNs and MPLS L2VPNs. It also discusses current topics that are still evolving in the industry such as inter-AS/area MPLS-TE, point-to-multipoint LSPs and IPVPN multicast, providing a good overview of the issues being addressed and the current industry direction.’ Nabil N. Bitar, Principal member of Technical Staff and lead network architect, Verizon ‘MPLS-Enabled Applications: Emerging Developments and New Technologies second edi- tion, by Ina Minei and Julian Lucek, presents the current state-of-the-art in the specification, development, and application of MPLS and its related technologies. I believe, the readers will find the book to be a very valuable resource. I am pleased to see that the third edition of this book covers contemporary topics in the Internet industry such as MPLS-TP.’ Bijan Jabbari, PhD, Founder of Isocore, and Professor of Electrical Engineering, George Mason University ‘This is the MPLS book that I reference the most and recommend to all my colleagues. It is written in an easy-to-follow approach that starts with basic concepts and then gradually ramps to advanced topics. It is timely in its coverage of new developments such as MPLS-TP and BGP/MPLS mVPNs, yet exhaustive by addressing all aspects of MPLS including the newer advances. I have personally used this book to architect designs such as broadcast video over IP/MPLS, hierarchical video-on-demand library distribution using BGP/MPLS mVPN, and a MPLS-based network supporting triple-play services over a BGP and PIM-free Core.’ Mazen Khaddam, Principal lead network architect, network architecture group, Cox communications ‘This book is a wonderfully comprehensive overview of not just the underlying technol- ogy, but also the many use case applications of MPLS. It’s a must have for networking professionals.’ Dorian Kim, Director of Network Development, NTT America ‘MPLS-Enabled Applications takes a unique and creative approach in explaining MPLS con- cepts and how they are applied in practice to meet the needs of Enterprise and Service Provider networks. I consistently recommend this book to colleagues in the engineering, education and business community.’ Dave Cooper, Chief IP Technologist, Global Crossing Ltd. ‘This book presents clear, comprehensive descriptions of the various scenarios in which the MPLS toolkit can be used to provide reliable and quality connectivity. It includes background information, detailed explanations on how to enable different services and applications, and precise technical and operational considerations. Business drivers for emerging technologies are discussed as well as practical and real deployment scenarios. Highlighting the hottest trends in the industry, this invaluable book describes how best to fit the pieces of the puzzle together to efficiently enable new applications and services.’ Nurit Sprecher, Senior specialist, Packet Transport Evolution, Nokia Siemens Networks P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come MPLS-Enabled Applications P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come WILEY SERIES IN COMMUNICATIONS NETWORKING & DISTRIBUTED SYSTEMS Series Editors: David Hutchison, Lancaster University, Lancaster, UK Serge Fdida, Universit´e Pierre et Marie Curie, Paris, France Joe Sventek, University of Glasgow, Glasgow, UK The ‘Wiley Series in Communications Networking & Distributed Systems’ is a series of expert-level, technically detailed books covering cutting-edge research, and brand new developments as well as tutorial-style treatments in network- ing, middleware and software technologies for communications and distributed systems. The books will provide timely and reliable information about the state- of-the-art to researchers, advanced students and development engineers in the Telecommunications and the Computing sectors. Other titles in the series: Wright: Voice over Packet Networks 0-471-49516-6 (February 2001) Jepsen: Java for Telecommunications 0-471-49826-2 (July 2001) Sutton: Secure Communications 0-471-49904-8 (December 2001) Stajano: Security for Ubiquitous Computing 0-470-84493-0 (February 2002) Martin-Flatin: Web-Based Management of IP Networks and Systems 0-471-48702-3 (September 2002) Berman, Fox, Hey: Grid Computing. Making the Global Infrastructure a Reality 0-470- 85319-0 (March 2003) Turner, Magill, Marples: Service Provision. Technologies for Next Generation Commu- nications 0-470-85066-3 (April 2004) Welzl: Network Congestion Control: Managing Internet Traffic 0-470-02528-X (July 2005) Raz, Juhola, Serrat-Fernandez, Galis: Fast and Efficient Context-Aware Services 0-470- 01668-X (April 2006) Heckmann: The Competitive Internet Service Provider 0-470-01293-5 (April 2006) Dressler: Self-Organization in Sensor and Actor Networks 0-470-02820-3 (November 2007) Berndt: Towards 4G Technologies: Services with Initiative 0-470-01031-2 (March 2008) Jacquenet, Bourdon, Boucadair: Service Automation and Dynamic Provisioning Tech- niques in IP/MPLS Environments 0-470-01829-1 (March 2008) Gurtov: Host Identity Protocol (HIP): Towards the Secure Mobile Internet 0-470-99790-7 (June 2008) Boucadair: Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-enabled Net- works 0-470-77072-4 (January 2009) Fitzek: Mobile Peer to Peer (P2P): A Tutorial Guide 0-470-69992-2 (June 2009) Shelby: 6LoWPAN: The Wireless Embedded Internet 0-470-74799-4 (November 2009) Stavdas: Core and Metro Networks 0-470-51274-1 (February 2010) G´omez Herrero, van der Ven, Network Mergers and Migrations: Junos R⃝ Design and Implementation 0-470-74237-2 (March 2010) Jacobsson, Niemegeers, Heemstra de Groot, Personal Networks: Wireless Networking for Personal Devices 0-470-68173-X (June 2010) P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come MPLS-Enabled Applications Emerging Developments and New Technologies Third Edition Ina Minei Juniper Networks Julian Lucek Juniper Networks John Wiley & Sons, Ltd P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come This edition first published 2011 C⃝ 2011 John Wiley & Sons, Ltd. Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Library of Congress Cataloging-in-Publication Data Minei, Ina. MPLS-enabled applications : emerging developments and new technologies / Ina Minei, Julian Lucek. p. cm. Includes bibliographical references and index. ISBN 978-0-470-66545-9 (pbk.) 1. MPLS standard. 2. Extranets (Computer networks) I. Lucek, Julian. II. Title. TK5105.573.M56 2010 621.382′16–dc22 2010029550 A catalogue record for this book is available from the British Library. ISBN: 9780470665459 (P/B) ePDF ISBN: 9780470976166 oBook ISBN: 9780470976173 ePub ISBN: 9780470976135 Set in 10/12pt Palatino by Aptara Inc., New Delhi, India. P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come Contents About the Authors xix Foreword xxi Preface xxv Acknowledgements xxxi Part One 1 Foundations 3 1.1 Historical perspective 3 1.2 Current trends 5 1.3 MPLS mechanisms 6 1.3.1 Forwarding plane mechanisms 7 1.3.2 Control plane mechanisms 11 1.3.3 Transport of IPv6 over an IPv4 MPLS core 32 1.4 Conclusion 35 1.5 References 35 1.6 Further reading 36 1.7 Study questions 36 2 Traffic Engineering with MPLS (MPLS-TE) 39 2.1 Introduction 39 2.2 The business drivers 39 2.3 Application scenarios 40 2.4 Setting up traffic-engineered paths using MPLS-TE 43 2.4.1 LSP priorities and preemption 43 2.4.2 Information distribution – IGP extensions 44 2.4.3 Path calculation – CSPF 46 2.4.4 Path setup – RSVP extensions and admission control 49 P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come viii CONTENTS 2.5 Using the traffic-engineered paths 51 2.6 Deployment considerations 54 2.6.1 Scalability 54 2.6.2 Reservation granularity 56 2.6.3 Routing challenges 57 2.7 Using traffic engineering to achieve resource optimization 57 2.7.1 Autobandwidth – dealing with unknown bandwidth requirements 58 2.7.2 Sharing links between RSVP and other traffic – dealing with unknown bandwidth availability 59 2.7.3 Other methods for optimization of transmission resources in MPLS networks 60 2.8 Offline path computation 61 2.9 Conclusion 64 2.10 References 65 2.11 Further reading 65 2.12 Study questions 65 3 Protection and Restoration in MPLS Networks 67 3.1 Introduction 67 3.2 The business drivers 68 3.3 Failure detection 69 3.4 End-to-end protection 70 3.4.1 Control over the traffic flow following a failure 71 3.4.2 Requirement for path diversity 71 3.4.3 Double-booking of resources 72 3.4.4 Unnecessary protection 72 3.4.5 Nondeterministic switchover delay 72 3.5 Local protection using fast reroute 73 3.5.1 Case (i): link protection, for the facility protection case 75 3.5.2 Case (ii): link protection, for the 1:1 protection case 77 3.5.3 Case (iii): node protection, for the facility protection case 78 3.5.4 Case (iv): node protection, for the 1:1 protection case 79 3.6 Link protection 81 3.6.1 What happens before the failure 82 3.6.2 What happens after the failure 87 3.7 Node protection 89 3.8 Additional constraints for the computation of the protection path 91 3.8.1 Fate sharing 91 3.8.2 Bandwidth protection 93 3.8.3 Bandwidth protection and DiffServ 96 P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come CONTENTS ix 3.9 Interaction of end-to-end protection and fast reroute 97 3.10 Deployment considerations for local protection mechanisms 98 3.10.1 Scalability considerations 98 3.10.2 Evaluating a local protection implementation 101 3.10.3 The cost of bandwidth protection 103 3.11 IP and LDP FRR 105 3.11.1 The tunnel-based approach 107 3.11.2 The alternate-path approach 108 3.12 Conclusion 110 3.13 References 111 3.14 Further reading 111 3.15 Study questions 111 4 MPLS DiffServ-TE 113 4.1 Introduction 113 4.2 The business drivers 114 4.3 Application scenarios 115 4.3.1 Limiting the proportion of traffic from a particular class on a link 115 4.3.2 Maintaining relative proportions of traffic on links 117 4.3.3 Providing guaranteed bandwidth services 117 4.4 The DiffServ-TE solution 117 4.4.1 Class types 117 4.4.2 Path computation 118 4.4.3 Path signaling 121 4.4.4 Bandwidth constraint models 122 4.4.5 Overbooking 127 4.4.6 The DiffServ in DiffServ-TE 129 4.4.7 Protection 130 4.4.8 Tools for keeping traffic within its reservation limits 131 4.4.9 Deploying the DiffServ-TE solution 132 4.5 Extending the DiffServ-TE solution with multiclass LSPs 133 4.6 Conclusion 134 4.7 References 134 4.8 Further reading 135 4.9 Study questions 135 5 Interdomain Traffic Engineering 137 5.1 Introduction 137 5.2 The business drivers 137 5.3 Setting up interdomain TE LSPs 139 5.3.1 Path setup 140 5.3.2 Path computation 144 P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come x CONTENTS 5.3.3 Reoptimization 154 5.3.4 Protection and fast reroute 155 5.4 Interprovider challenges 157 5.5 Comparison of the LSP setup methods 158 5.6 Conclusion 159 5.7 References 160 5.8 Further reading 161 5.9 Study questions 161 6 MPLS Multicast 163 6.1 Introduction 163 6.2 The business drivers 164 6.3 P2MP LSP mechanisms 165 6.3.1 Forwarding plane mechanisms 165 6.3.2 Control plane mechanisms 167 6.4 LAN procedures for P2MP LSPs 176 6.4.1 Upstream label allocation 177 6.5 Coupling traffic into a P2MP LSP 178 6.5.1 Coupling Layer 2 traffic into a P2MP LSP 179 6.5.2 Coupling IP unicast traffic into a P2MP LSP 179 6.5.3 Coupling IP multicast traffic into a P2MP LSP 180 6.6 MPLS fast reroute 181 6.7 Ingress redundancy for P2MP LSPs 183 6.8 P2MP LSP hierarchy 184 6.8.1 P2MP LSP hierarchy forwarding plane operation 186 6.8.2 P2MP LSP hierarchy control plane operation 187 6.9 Applications of point-to-multipoint LSPs 187 6.9.1 Application of P2MP TE to broadcast TV distribution 188 6.9.2 Application of P2MP LSPs to L3VPN multicast 191 6.9.3 Application of P2MP LSPs to VPLS 193 6.10 Conclusion 193 6.11 References 193 6.12 Study questions 195 Part Two 7 Foundations of Layer 3 BGP/MPLS Virtual Private Networks 199 7.1 Introduction 199 7.2 The business drivers 200 7.3 The overlay VPN model 201 7.4 The peer VPN model 202 7.5 Building the BGP/MPLS VPN solution 205 7.5.1 VPN routing and forwarding tables (VRFs) 205 7.5.2 Constrained route distribution 207 P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come CONTENTS xi 7.5.3 VPN-IPv4 addresses and the route distinguisher (RD) 208 7.5.4 The route target (RT) 209 7.5.5 The solution so far – what is missing? 215 7.5.6 VPN label 216 7.6 Benefits of the BGP/MPLS VPN solution 221 7.7 References 222 7.8 Further reading 222 7.9 Study questions 223 8 Advanced Topics in Layer 3 BGP/MPLS Virtual Private Networks 225 8.1 Introduction 225 8.2 Routing between CE and PE 225 8.3 Differentiated VPN treatment in the core 230 8.4 Route reflectors and VPNs 231 8.5 Scalability discussion 235 8.5.1 Potential scaling bottlenecks 236 8.5.2 The cost of growing the VPN network 238 8.6 Convergence times in a VPN network 243 8.6.1 Convergence time for a customer route change 243 8.6.2 Convergence time for a failure in the provider’s network 244 8.7 Security issues 244 8.7.1 Can traffic from one VPN ‘cross over’ into another VPN? 245 8.7.2 Can a security attack on one VPN affect another VPN? 245 8.7.3 Can a security attack against the service provider’s infrastructure affect the VPN service? 246 8.8 QoS in a VPN scenario 246 8.9 IPv6 VPNs 248 8.10 Conclusion 251 8.11 References 251 8.12 Further reading 252 8.13 Study questions 252 9 Hierarchical and Inter-AS VPNs 255 9.1 Introduction 255 9.2 Carriers’ carrier – service providers as VPN customers 256 9.2.1 ISP as a VPN customer 257 9.2.2 VPN service provider as a VPN customer – hierarchical VPN 262 P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come xii CONTENTS 9.3 Multi-AS backbones 266 9.3.1 Option A: VRF-to-VRF connections at the ASBR 266 9.3.2 Option B: EBGP redistribution of labeled VPN-IPv4 routes 268 9.3.3 Option C: multihop EBGP redistribution of labeled VPN-IPv4 routes between the source and destination AS, with EBGP redistribution of labeled IPv4 routes from one AS to the neighboring AS 269 9.4 Interprovider QoS 271 9.5 Conclusion 272 9.6 References 272 9.7 Further reading 273 9.8 Study questions 273 10 Multicast in a Layer 3 VPN 275 10.1 Introduction 275 10.2 The business drivers 276 10.3 mVPN – problem decomposition 278 10.4 The original multicast solution− PIM/GRE mVPN (draft-rosen) 279 10.4.1 PIM/GRE mVPN – routing information distribution using PIM C-instances 280 10.4.2 PIM/GRE mVPN – carrying multicast traffic across the core using multicast distribution trees 281 10.4.3 Properties of the PIM/GRE mVPN solution 283 10.5 NG multicast for L3VPN – BGP/MPLS mVPN (NG mVPN) 286 10.5.1 Requirements for support of PIM-SM SSM in an mVPN 286 10.5.2 BGP/MPLS mVPN – carrying multicast mVPN routing information using C-multicast routes 287 10.5.3 BGP/MPLS mVPN – carrying traffic across the provider network using inter-PE MPLS tunnels 292 10.5.4 BGP/MPLS mVPN – inter-PE tunnels – inclusive and selective tunnels 292 10.5.5 BGP/MPLS mVPN – carrying traffic from several mVPNs onto the same inter-PE tunnel 294 10.5.6 BGP/MPLS mVPN – creating inter-PE tunnels using BGP autodiscovery routes 295 10.5.7 Requirements for support of PIM ASM in an mVPN 299 P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come CONTENTS xiii 10.5.8 BGP/MPLS mVPN – carrying mVPN active source information using BGP source active autodiscovery routes 300 10.6 Comparison of PIM/GRE and BGP/MPLS mVPNs 303 10.6.1 VPN model used 303 10.6.2 Protocol used in the control plane 304 10.6.3 Data-plane mechanisms 305 10.6.4 Service provider network as a ‘LAN’ 306 10.6.5 Deployment considerations 306 10.7 Conclusion 307 10.8 References 307 10.9 Further reading 308 10.10 Study questions 309 11 Advanced Topics in BGP/MPLS mVPNs 311 11.1 Introduction 311 11.2 BGP/MPLS mVPN – inter-AS operations 311 11.3 Support of PIM DM in BGP/MPLS mVPN 316 11.4 Discovering the RP – auto-RP and BSR support in BGP/MPLS mVPN 317 11.5 Implementing extranets in BGP/MPLS mVPN 319 11.6 Transition from draft-rosen to BGP/MPLS mVPNs 322 11.7 Scalability discussion 325 11.7.1 PIM/GRE mVPN control plane scaling 325 11.7.2 BGP/MPLS mVPN control plane scaling 326 11.8 Achieving multicast high availability with BGP/MPLS mVPN 328 11.8.1 Live-Standby multicast delivery using BGP/MPLS mVPN 329 11.8.2 Live-Live multicast delivery using BGP/MPLS mVPN 332 11.8.3 Comparison of the Live-Live and Live-Standby multicast high-availability schemes 335 11.9 Internet multicast service using the BGP/MPLS mVPN technology 335 11.10 Conclusion 337 11.11 References 338 11.12 Study questions 338 12 Layer 2 Transport over MPLS 341 12.1 Introduction 341 12.2 The business drivers 341 12.3 Comparison of layer 2 VPNs and layer 3 VPNs 344 P1: OTE/OTE/SPH P2: OTE fm JWST021-Minei October 16, 2010 13:34 Printer Name: Yet to Come xiv CONTENTS 12.4 Principles of layer 2 transport over MPLS 345 12.5 Forwarding plane 347 12.5.1 ATM cell 349 12.5.2 ATM AAL5 349 12.5.3 Frame relay 350 12.5.4 Ethernet 350 12.6 Control plane operation 351 12.6.1 Original LDP signaling scheme 351 12.6.2 BGP-based signaling and autodiscovery scheme 353 12.6.3 LDP signaling with BGP autodiscovery 357 12.6.4 Comparison of BGP and LDP approaches to Layer 2 transport over MPLS 358 12.7 Admission control of layer 2 connections into network 360 12.8 Failure notification mechanisms 361 12.9 Multi-homing 362 12.9.1 BGP case 362 12.9.2 LDP case 364 12.10 Layer 2 interworking 365 12.11 Circuit cross connect (CCC) 365 12.12 Point-to-multipoint Layer 2 transport 366 12.12.1 Point-to-multipoint CCC 367 12.12.2 Layer 2 Multicast VPNs 367 12.13 Other applications of Layer 2 transport 368 12.14 Conclusion 370 12.15 References 370 12.16 Study questions 371 13 Virtual Private LAN Service 373 13.1 Introduction 373 13.2 The business drivers 373 13.3 VPLS mechanism overview 375 13.4 Forwarding plane mechanisms 379 13.4.1 Forwarding of unicast frames 379 13.4.2 Broadcast and multicast frames 382 13.5 Control plane mechanisms 384 13.5.1 LDP-based signaling 384 13.5.2 BGP signaling and autodiscovery 389 13.5.3 Comparison of LDP and BGP for VPLS control plane implementation 396 13.5.4 IGMP and PIM snooping 399 13.5.5 Use of multicast trees in VPLS 401 13.6 LDP and BGP interworking for VPLS 406 13.7 Interprovider Option E for VPLS 413 13.7.1 Comparison of interprovider schemes for VPLS 415

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.