larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

MPLS Fundamentals

eBook (Watermarked)

  • Your Price: $48.00
  • List Price: $60.00
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

  • Description
  • Sample Content
  • Updates
  • Copyright 2007
  • Dimensions: 7-3/8" x 9-1/8"
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-343327-7
  • ISBN-13: 978-0-13-343327-2

A comprehensive introduction to all facets of MPLS theory and practice

  • Helps networking professionals choose the suitable MPLS application and design for their network
  • Provides MPLS theory and relates to basic IOS configuration examples
  • The Fundamentals Series from Cisco Press launches the basis to readers for understanding the purpose, application, and management of technologies

MPLS has emerged as the new networking layer for service providers throughout the world. For many service providers and enterprises MPLS is a way of delivering new applications on their IP networks, while consolidating data and voice networks. MPLS has grown to be the new default network layer for service providers and is finding its way into enterprise networks as well. This book focuses on the building blocks of MPLS (architecture, forwarding packets, LDP, MPLS and QoS, CEF, etc.). This book also reviews the different MPLS applications (MPLS VPN, MPLS Traffic Engineering, Carrying IPv6 over MPLS, AToM, VPLS, MPLS OAM
etc.).
You will get a comprehensive overview of all the aspects of MPLS, including the building blocks, its applications, troubleshooting and a perspective on the future of MPLS.

Table of Contents

Introduction

Part I: Fundamentals of MPLS

Chapter 1 The Evolution of MPLS

Definition of MPLS

Pre-MPLS Protocols

Benefits of MPLS

                Bogus Benefit

                The Use of One Unified Network Infrastructure

                Better IP over ATM Integration

                BGP-Free Core

                Peer-to-Peer VPN Model Versus Overlay VPN Model0

                Overlay VPN Model0

                Peer-to-Peer VPN Model

                Optimal Traffic Flow

                Traffic Engineering

History of MPLS in Cisco IOS

                Tag Switching to MPLS

                MPLS Applications

Summary

Chapter Review Questions

Chapter 2 MPLS Architecture

 

Introducing MPLS Labels

                Label Stacking

                Encoding of MPLS

MPLS and the OSI Reference Model

Label Switch Router

Label Switched Path

Forwarding Equivalence Class

Label Distribution

                Piggyback the Labels on an Existing IP Routing Protocol

                Running a Separate Protocol for Label Distribution

Label Distribution with LDP

Label Forwarding Instance Base

MPLS Payload

MPLS Label Spaces

Different MPLS Modes

                Label Distribution Modes

                Label Retention Modes

                LSP Control Modes

Summary

Chapter Review Questions

Chapter 3 Forwarding Labeled Packets

Forwarding of Labeled Packets

                Label Operation

                IP Lookup Versus Label Lookup

                Load Balancing Labeled Packets

                Unknown Label

Reserved Labels

                Implicit NULL Label

                Explicit NULL Label

                Router Alert Label

                OAM Alert Label

Unreserved Labels

TTL Behavior of Labeled Packets

                TTL Behavior in the Case of IP-to-Label or Label-to-IP

                TTL Behavior in the Case of Label-to-Label

                TTL Expiration

MPLS MTU

                MPLS MTU Command

                Giant and Baby Giant Frames

                Giant Frames on Switches

                MPLS Maximum Receive Unit

Fragmentation of MPLS Packets

Path MTU Discovery

Summary

Chapter Review Questions

Chapter 4 Label Distribution Protocol

 

LDP Overview

LDP Operation

                The Discovery of LSRs That Are Running LDP

                LDP Session Establishment and Maintenance

                Number of LDP Sessions

                Advertising of Label Mappings

                Label Withdrawing

                Housekeeping by Means of Notification

Targeted LDP Session

LDP Authentication

Controlling the Advertisement of Labels via LDP

MPLS LDP Inbound Label Binding Filtering

LDP Autoconfiguration

MPLS LDP-IGP Synchronization

                How MPLS LDP-IGP Synchronization Works

                MPLS LDP-IGP Synchronization Configuration

MPLS LDP Session Protection

Summary

Chapter Review Questions

Chapter 5 MPLS and ATM Architecture

 

Brief Introduction to ATM

Label Encoding

Label Advertisement

                Downstream-on-Demand Label Advertisement

                LDP Control Mode for ATM

LDP for LC-ATM

                Label Space

                Loop Detection by LDP

                Loop Detection by Hop Count TLV

                TTL Manipulation

                Loop Detection by Path Vector TLV

                LDP Address Messages

                Blocking Label Requests

Aggregate Labels

VC-Merge

Non MPLS-Aware ATM Switches

Label Switch Controller

Multi-Virtual Circuit Tagged Bit Rate

                MPLS CoS

Frame Mode ATM

Reducing the Number of LVCs

Summary

Chapter Review Questions

Chapter 6 Cisco Express Forwarding

 

Overview of Cisco IOS Switching Methods

                Process Switching

                Fast Switching

                CEF Switching

Why Is CEF Needed in MPLS Networks?

What Are the Components of CEF?

                The Adjacency Table

                The CEF Table

Operation of CEF

Distributed CEF (DCEF)

CEF Switching Packets in Hardware

Load Balancing in CEF

Unequal Cost Load Balancing

Labeling IP Packets by CEF

Load Balancing Labeled Packets

Troubleshooting CEF

Summary

Chapter Review Questions

Part II: Advanced MPLS Topics

Chapter 7 MPLS VPN

 

Introduction to MPLS VPN

                Definition of a VPN

                VPN Models

                MPLS VPN Model

Architectural Overview of MPLS VPN

Virtual Routing Forwarding

                RD

                RTs

                VPNv4 Route Propagation in the MPLS VPN Network

                Packet Forwarding in an MPLS VPN Network

BGP

                BGP Multiprotocol Extensions and Capabilities

                BGP Extended Community: RT

                VPNv4 Routes

                BGP Carrying the Label

                RRs

                RR Group

                BGP Route Selection

                BGP Multipath

                Using Multiple RDs

Packet Forwarding

PE-CE Routing Protocols

                Connected Routes

                Static Routing

                RIP Version 2

                OSPF

                OSPF VRF Configuration

                OSPF Metric Propagation

                BGP Extended Communities for OSPF

                OSPF Network Design

                Sham Link

                Down Bit and Domain Tag

                EIGRP

                Configuration

                Pre-Bestpath POI

                EIGRP PE-CE with Backdoor Links

IS-IS

                eBGP

                Autonomous System Override

                allowas-in

Hub-and-Spoke

SOO

VRF Access

Internet Access

                Internet in a VPN

                Internet Access Through the Global Routing Table

                Internet Access Through the Global Routing Table with Static Routes

                Internet Access Through a Central VRF Site

Multi-VRF CE

                OSPF VRF-Lite Command

CE Management

Summary

Chapter Review Questions

Chapter 8 MPLS Traffic Engineering

 

The Need for MPLS TE

Overview of the Operation of MPLS TE

Distribution of TE Information

                Requirements for the IGP

                OSPF Extensions for TE

                IS-IS Extensions for TE

                Flooding by the IGP

Routing and Cost of a TE LSP

                Link TE Attributes

                Maximum Reservable Bandwidth

                Attribute Flags

                TE Metric

                Shared Risk Link Groups

                Maximum Reservable Sub-Pool Bandwidth

                MPLS TE Tunnel (Trunk) Attributes

                TE Tunnel Path Calculation

                Path Setup Option

                IP Explicit Address Exclusion

                Setup and Holding Priority

                Reoptimization

                Periodic Reoptimization

                Event-Driven Reoptimization

                Manual Reoptimization

Dual TE Metrics

PCALC

RSVP

                RSVP and Labels

                Record Route Object

                Other Information Carried by RSVP

                Putting It All Together

                Shared Explicit Style

                RSVP Messages

                PathTear

                ResvTear

                PathErr

                ResvErr

Link Manager

FRR

                FRR–Link Protection

                FRR–Node Protection

                SRLG Used by Backup Tunnels

                Multiple Backup Tunnels

Forwarding Traffic onto MPLS TE Tunnels

                Static Routing

                Policy-Based Routing

                Autoroute Announce

                Forwarding Adjacency

                Direct Mapping of AToM Traffic onto TE Tunnels

                Class-Based Tunnel Selection

                Cost Calculation of IGP Routes over TE Tunnels

                Default Cost Calculation

                Adjusting the Cost Calculation

                Load Balancing

MPLS TE and MPLS VPN

                TE Tunnels Between PE Routers

                TE Tunnel with P Router as Tail End Router

                VRF-to-TE Tunnel Routing

Summary

Chapter Review Questions

Chapter 9 IPv6 over MPLS

 

Introduction to IPv6

                The Driving Forces for IPv6

                Overview of the IPv6 Protocol

                The IPv6 Header

                The IPv6 Addressing

                Other IPv6 Novelties

                Overview of IPv6 Unicast Routing in Cisco IOS

                IPv6 RIP (RIPng)

                OSPF for IPv6 or OSPFv3

                IS-IS for IPv6

                EIGRP for IPv6

                Multiprotocol BGP Extensions for IPv6

                CEFv6

Carrying IPv6 over an MPLS Backbone

MPLS VPN Network Using IPv6 over IPv4 Tunnels on the CE Routers

Carrying IPv6 over an MPLS Backbone (6PE)

                Operation of 6PE

                Configuration of 6PE

                Verifying 6PE Operation

Carrying IPv6 in VPNs Across an MPLS Backbone (6VPE)

                Operation of 6VPE

                Configuration of 6VPE

                Verifying 6VPE Operation

                IPv6 Internet Access Through 6VPE

                Supported Features for 6VPE

Remarks for Both 6PE and 6VPE

                Route Reflectors

                Turning Off TTL Propagation on the PE Routers

                Load Balancing Labeled IPv6 Packets

                PHP

                BGP Functionality

Summary

Chapter Review Questions

Chapter 10 Any Transport over MPLS

Understanding the Need for AToM

Transporting Layer 2 Frames

AToM Architecture

                Data Plane of AToM

                Signaling the Pseudowire

                C-Bit

                PW Type

                Group ID

                PW ID

                Interface Parameters

                Signaling the Status of the Pseudowire

The Control Word

                Control Word Functions

                Pad Small Packets

                Carry Control Bits of the Layer 2 Header of the Transported Protocol

                Preserve the Sequence of the Transported Frames

                Facilitate the Correct Load Balancing of AToM Packets in the MPLS Backbone Network

                Facilitate Fragmentation and Reassembly

MPLS MTU in the MPLS Backbone

The Basic AToM Configuration

Transported Layer 2 Protocols

                HDLC

                PPP

                Frame Relay

                DLCI-to-DLCI

                Port-to-Port Mode (Port Trunking)

                ATM

                ATM AAL5

                ATM Cell Relay

                Single Cell Relay Mode

                Packed Cell Relay Mode

                Ethernet

                Ethernet Frame Format

                EoMPLS Forwarding

                VLAN ID Rewrite

                EoMPLS Scenario Examples

                Dot1q Tunneling (QinQ) over AToM

AToM Tunnel Selection

AToM and QoS

Summary

Chapter Review Questions

Chapter 11 Virtual Private LAN Service

 

The Need for VPLS

VPLS Architecture

VPLS Data Plane

VPLS Signaling

The Basic VPLS Configuration

Verifying the VPLS Operation

VPLS and Tunneling Layer 2 Protocols

                Tunneling Cisco Discovery Protocol

                Tunneling Spanning Tree Protocol

Trunk Port Between the CE and PE

Hierarchical VPLS

                H-VPLS with Dot1q Tunneling (QinQ) in the Access Layer

                H-VPLS with MPLS in the Access Layer

Quality of Service

Limiting MAC Addresses

Routing Peering

Summary

Chapter Review Questions

Chapter 12 MPLS and Quality of Service

 

DiffServ with IP Packets

DiffServ with MPLS Packets

Default MPLS QoS Behavior in Cisco IOS

DiffServ Tunneling Models

                Pipe Model

                Short Pipe Model

                Uniform Model

                Advantages of the DiffServ Tunneling Models

                How to Implement the Three DiffServ Tunneling Models

Recoloring the Packet

MQC Commands for MPLS QoS

Moving MPLS QoS from the PE to the CE Router

Implementing the DiffServ Tunneling Models in Cisco IOS

The Table-Map Feature

The Use of MPLS QoS for Ethernet over MPLS

Summary

Chapter Review Questions

Chapter 13 Troubleshooting MPLS Networks

 

Label Stack Depth

Verifying Label Switched Path

Tracerouting in MPLS Networks

                Tracerouting in an IP Network

                Label-Aware ICMP

                TTL Behavior in MPLS Networks

                Tracerouting in MPLS Networks

                Problems with Tracerouting in MPLS Networks

                mpls ip ttl-expiration pop Command

                no mpls ip propagate-ttl

MPLS MTU

Ping

Debug MPLS Packets

Debugging Load Balancing of Labeled Packets

Verifying MPLS on the Interface

Verifying Number of Bytes Label Switched

MPLS-Aware Netflow

Summary

Chapter Review Questions

Chapter 14 MPLS Operation and Maintenance

 

Requirements of MPLS OAM

                Detection and Diagnosis of Control and Data Plane Defects

                Detection of a Defect in a Label Switched Path (LSP)

                OAM Packets Flowing on the Same Path as MPLS Data Traffic

                Path Characterization

                Measurement of SLAs

                OAM Interworking

                MIBs

                Accounting

Router Alert Option and Router Alert Label

                Router Alert Label

OAM Alert Label

MPLS LSP Ping

                LSP Ping Protocol Details

                Target FEC Stack

                Downstream Mapping

                Interface and Label Stack TLV

                Errored TLVs TLV

                Reply TOS Byte

                LSP Ping Operation

                LSP Verification

                MPLS Ping in Cisco IOS

MPLS LSP Traceroute

                MPLS Traceroute in Cisco IOS

                Router Alert Label

Load Balancing

VCCV

IP Service Level Agreement

                VRF-Aware IP SLA

Netflow Accounting

SNMP/MIBs

                Context-Based Access for SNMP over MPLS VPN

                MPLS VPN MIBs

Syslog

                OAM Message Mapping

Summary

Chapter Review Questions

Chapter 15 The Future of MPLS

 

New MPLS Applications

Work at IETF

                MPLS Control Word

                FCS Retention

                AToM Fragmentation and Reassembly

                Circuit Emulation

                GMPLS

                OAM Protocols

                MPLS Labeled Multicast

The Proliferation of MPLS

Summary

Part III: Appendixes

Appendix A Answers to Chapter Review Questions

Appendix B Static MPLS Labels (online)

Index

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020