MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization By Monique Morrow, Azhar Sayeed Publisher: Cisco Press Pub Date: November 06, 2006 Print ISBN-10: 1-58720-120-8 Print ISBN-13: 978-1-58720-120-2 Pages: 422 Table of Contents | Index Understand the business case for deploying MPLS-based services and solutions Provides network managers and architects a precise MPLS primer Defines MPLS service problems and their associated solutions Includes ROI models for MPLS-based solutions Discusses pros and cons of various options for each MPLS service Network managers often question the value that MPLS brings to their business environment This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company's bottom-line ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation In short, readers can to use this comprehensive guide to understand and build a business case for the inclusion of MPLS in their networks MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization By Monique Morrow, Azhar Sayeed Publisher: Cisco Press Pub Date: November 06, 2006 Print ISBN-10: 1-58720-120-8 Print ISBN-13: 978-1-58720-120-2 Pages: 422 Table of Contents | Index Copyright About the Authors About the Technical Reviewers Acknowledgments Icons Used in This Book Foreword Introduction Part 1: The Business Case for MPLS Chapter 1 The Dynamics of Service Creation and Deployment Industry Dynamics and Challenges What About the Enterprise Market? Business Drivers and Requirements Service Providers and Enterprise: The Battle of Outsourcing Versus Do-ItYourself Subscribing to a Managed Layer 3 MPLS VPN Service The Case for Building VPNsLayer 2 or Layer 3 Existing TechnologiesFrame Relay, ATM, and IP-Based Networks: What Can They Solve? Service Examples Summary Chapter 2 The Scope of Service Types Overview of Layer 2 Services Next-Generation Network Overview and Interworking Functions Layer 3 Services Remote Access Value-Added Services Summary Part 2: The Technical Case for MPLS Chapter 3 Technology Overview: Making the Technology Case for MPLS and Technology Details Available Technologies and Options Why MPLS? (High-Level Detail) MPLS and Quality of Service Benefits MPLS Technology Details Layer 3 VPNs Carrier Supporting Carrier and Inter-Provider Autonomous Systems Traffic Engineering DiffServ Layer 2 VPNs Summary Part 3: Mpl Services and Components Chapter 4 Layer 2 VPNs Taxonomy Introducing AToM Layer 2 Interworking Virtual Private LAN Service Provisioning and Signaling Benefits of L2VPNs Inter-AS L2VPNs Supported IETF Standards Summary Standards and References Chapter 5 Layer 3 VPNs Technology Overview Corporate Intranet Corporate Extranet Internet Access Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks Heterogeneous Networks Managed Central Services Supported IETF Drafts Summary Chapter 6 Remote Access and IPSec Integration with MPLS VPNs Technology Overview PE-CE Routing Protocols Scalability and Network Convergence for Remote Access Summary Chapter 7 MPLS Security Security and NGN Security Overview and MPLS MPLS VPN and Security Attack Scenarios IPSec Layer 2 and Unmanaged VPN Service Considerations Overall Best Practice Recommendations Summary Standards and References Chapter 8 Traffic Engineering Problem Statement Technology Overview TE Applications and Examples Protection and Restoration Scaling MPLS TE MPLS Traffic Engineering and Multicast Standards and References Summary Chapter 9 Quality of Service Problem Statement Standards and References Summary Chapter 10 Multicast and NGNs Problem Statement MPLS Multicast VPN Overview MPLS Multicast VPN Applications and Examples Multicast Security and Management Considerations Standards and References Summary Chapter 11 IPv6 and MPLS Problem Statement Technology Overview Management and IPv6 Summary Part 4: Bringing Your MPLS Plan Together Chapter 12 Network Management and Provisioning Problem Statement Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms Dealing with Equal Cost Multipaths Virtual Circuit Connection Verification and Bidirectional Forwarding Detection A Word About Interworking OAM Generic Failure Types Configuration Management for MPLS-Based Networks Accounting for MPLS-Based Networks Performance Management for MPLS-Based Networks Security Management for MPLS-Based Networks Per-VPN Management Standards and References Summary Chapter 13 Design Considerations: Putting it All Together VRF-Aware Feature NAT-PE System Flow Deployment Guideline Summary Management, Provisioning, and Troubleshooting Equipment Scalability Versus Network Scalability Summary Chapter 14 MPLS Case Studies The Background on Equant VPN Bridge Case Study Summary Chapter 15 The Future of MPLS Integrating IP and Optical Networks (Transport Area) Future Layer 3 Services Future Layer 2 Services Future Enhancements in Provisioning and Management Increasing Enterprise Deployment of MPLS Summary A View from George Swallow A View from Adrian Farrell Index Copyright MPLS and Next-Generation Networks Monique Morrow and Azhar Sayeed Copyright© 2007 Cisco Systems, Inc Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing November 2006 Library of Congress Cataloging-in-Publication Number: 2003115150 Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Cisco Press or Cisco Systems, Inc cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark Warning and Disclaimer This book is designed to provide information about Cisco Unity Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information is provided on an "as is" basis The authors, Cisco Press, and Cisco Systems, Inc shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community Readers' feedback is a natural continuation of this process If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through e-mail at feedback@ciscopress.com Please make sure to include the book title and ISBN in your message We greatly appreciate your assistance Corporate and Government Sales Cisco Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales For more information, please contact: U.S Corporate and Government Sales 1-800-382-3419 corpsales@pearsontechgroup.com For sales outside of the U.S please contact: International Sales international@pearsoned.com Publisher Paul Boger Executive Editor Brett Bartow Cisco Representative Anthony Wolfenden Cisco Press Program Manager Jeff Brady Managing Editor Patrick Kanouse Development Editor Betsey Henkels Project Editor and Copy Editor Deadline Driven Publishing Technical Editors Tom Nadeau, Christophe Masiero, and Joseph Fusco Team Coordinator Vanessa Evans Cover and Book Designer Louisa Adair Composition Tolman Creek Design Indexer Julie Bess Americas Headquarters Cisco Systems, Inc 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Asia Pacific Headquarters Cisco Systems, Inc 168 Robinson Road #28-01 Capital Tower Singapore 068912 www.cisco.com Tel: +65 6317 7777 Fax: +65 6317 7799 Europe Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: +31 0 800 020 0791 Fax: +31 0 20 357 1100 Cisco has more than 200 offices worldwide Addresses, phone numbers, and fax numbers are listed on the Cisco Website at WWW.cisco.com/go/offices ©2006 Cisco Systems, Inc All rights reserved CCVP, the Cisco logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Register, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Export logo, Cisco IOS Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity Enterprise/Solver, EtherChannel, EtherFast, EhterSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, GigaStick, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ Index [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] random early detection (RED) Real-Time Transport Protocol (RTP) RED (random early detection) remote access cable dial access dial backup individual PSTN access PE-CE dial-out DSL bridged encapsulation routed encapsulation network convergence PE-CE connection scalability VPNs return on investment (ROI) reverse path forwarding (RPF) ROI (return on investment) route tagging, IPv6 VPNs routed encapsulation, DSL remote access routing Layer 3 VPNs constrained information distribution information separation multipath noncompliance remote access, PE-CE connection RPF (reverse path forwarding) RTP (Real-Time Transport Protocol) Russian doll model Index [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] scalability BGP signaling equipment versus network element interaction management network-wide scale issues parameters Layer 3 VPNs hierarchical VPNs inter-AS VPNs LDP signaling MPLS TE network design considerations remote network access tunnel protection schedulers, traffic security attack scenarios best practice recommendations IPSec Layer 2 VPNs CE router security CsC networks design options layered management 2nd MPLS MPLS Layer 3 services MVPNs NGN (Next-Generation Networks) segmentation, networks self-healing networks, MPLS future server VPNs, network segmentation service provideers [See SPs (service providers).] services convergence, business drivers development technologies examples IEFT standards Layer 2 VPNs Ethernet NGN basics Layer 3 VPNs 2nd management failures fault management multipaths OAM interworking user concerns VCCV (Virtual Circuit Connection Verification) VRF-aware ping outsourcing decisions central services network segmentation TCO (total cost of ownership) remote access value-added shared central services [See managed central services, Layer 3 VPNs.] signaling Layer 2 VPNs BGP LDP tunnels, traffic engineering Simple Network Management Protocol (SNMP) SNMP (Simple Network Management Protocol) spatial gambling, network scalability SPs (service providers) 2nd business engineering enterprise markets Equant case study company background customer VPN bridge industry challenges Layer 3 VPNs services outsourcing decisions central services network segmentation TCO (total cost of ownership) service convergence, business drivers statistical guarantee Swallow, George switches, membership management Index [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] TCO (total cost of ownership), outsourcing decisions TCP (Transmission Control Protocol) TDM (time-division multiplexer) 2nd TE (traffic engineering) 2nd technologies benefits of MPLS DiffServ Layer 2 VPNs 2nd Layer 3 VPNs label stack role peer-to-peer model topologies VRF MPLS application QoS (quality of service) DiffServ multicast service development TE (traffic engineering) temporal gambling, network scalability time to market (TTM) time-division multiplexer (TDM) 2nd topologies, Layer 3 VPNs total cost of ownership (TCO), outsourcing decisions traffic DiffServ queuing traffic engineering application delay-sensitive traffic Inter-AS TE Intra-Area TE QoS IETF standards IP network operation IGP (Interior Gateway Protocol) packet forwarding tunnel signaling MPLS TE multicast scalability MPLS technologies tunnel operations link failures node protection path protection scalability usage scenarios Traffic Engineering with MPLS traffic specification (Tspec) traffic-engineered voice models, MPLS QoS Transmission Control Protocol (TCP) transmission, traffic troubleshooting network design trust, VPN bridge case study Tspec (traffic specification) TTM (time to market) tunnel mode QoS tunnels LSP failures protection operations link failures node protection path protection scalability usage scenarios TE (traffic engineering), signaling Index [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] UCP (Unified Control Plane) IP and optical network integration bandwidth on-demand service basics challenges UDP (User Data Protocol) Unified Control Plane [See UCP (Unified Control Plane).] uniform mode QoS User Data Protocol (UDP) user VPNs, network segmentation Index [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] value-added services, Layer 3 VPNs VCCV (Virtual Circuit Connection Verification) VHG (virtual home gateway) video, MPLS Layer 3 videoconferencing, value-added services virtual access interface, dial access Virtual Circuit Connection Verification (VCCV) virtual home gateway (VHG) virtual leased line, MPLS QoS virtual private LAN service [See VPLS (virtual private LAN service).] virtual private networks [See VPNs (virtual private networks).] virtual routing, IPv6 VPNs voice, MPLS Layer 3 VPLS (virtual private LAN service) [See also EMS (Ethernet Multipoint Service).] forwarding at remote node Layer 2 VPNs VPN bridges, customer case study account team success factors company background conclusions divestiture issues VPN Routing and Forwarding (VRF) VPN-IP PIM, MVPNs deployment VPNs (virtual private networks) dynamic encryption IPv6 IPv4 Layer 3 VPNs packet path route tagging virtual routing Layer 2 2nd AToM benefits inter-AS interworking like-to-like transport NGN basics provisioning reasons for building scalability services supported IETF standards taxonomy technologies VPLS Layer 3 corporate extranets corporate intranets heterogeneous networks IETF drafts Internet access MVPNs applications IETF drafts security considerations VRF (VPN Routing and Forwarding ) Index [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] weighted fair queuing (WFQ) weighted random early detection (WRED) WFQ (weighted fair queuing) WRED (weighted random detection) Index [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] zones of trust .. .MPLS and Next- Generation Networks: Foundations for NGN and Enterprise Virtualization By Monique Morrow, Azhar Sayeed Publisher: Cisco Press Pub Date: November 06, 2006 Print ISBN- 10: 1-58720-120-8... Virtual Circuit Connection Verification and Bidirectional Forwarding Detection A Word About Interworking OAM Generic Failure Types Configuration Management for MPLS- Based Networks Accounting for MPLS- Based Networks Performance Management for MPLS- Based Networks. .. Register, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Export logo, Cisco IOS Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity Enterprise/ Solver, EtherChannel, EtherFast, EhterSwitch, Fast