GMPLS (eBook)
400 Seiten
Elsevier Science (Verlag)
978-0-08-045647-8 (ISBN)
This book begins by defining GMPLS's place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers.
+ Written by two industry researchers at the forefront of the development of GMPLS.
+ Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering.
+ Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection.
+ Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs.
+ Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system.
The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively. This book begins by defining GMPLS's place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers. - Written by two industry researchers at the forefront of the development of GMPLS. - Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering. - Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection. - Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs. - Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system.
GMPLS Architecture and Applications 3
The Morgan Kaufmann Series in Networking 4
Dedication 7
About the Authors 9
Contents 11
Preface 19
Acknowledgments 27
C H A P T E R 1 Multiprotocol Label Switching 29
1.1 Some History 29
1.2 Label Switching 30
1.2.1 Application of MPLS to Existing Switching Networks 32
1.2.2 Label Stacking 32
1.3 Signaling Protocols 34
1.4 Further Reading 35
C H A P T E R 2 An Overview of Transport Networks 37
2.1 Transport 37
2.2 Transport Technologies 38
2.2.1 Gigabit Ethernet 39
2.2.2 Time Division Multiplexing 39
2.2.3 Wavelength Division Multiplexing 41
2.2.4 Fiber Switching 42
2.3 Transport Network Topologies 43
2.3.1 Simple Rings 43
2.3.2 Bidirectional and Protected Rings 44
2.3.3 Interconnected Rings and Meshed Rings 45
2.3.4 Point-to-Point Links 46
2.3.5 Mesh Networks 48
2.4 Functional Components and Planes 49
2.5 Further Reading 51
C H A P T E R 3 From MPLS to GMPLS 53
3.1 The Origins of GMPLS 53
3.1.1 Lambda Switching 54
3.1.2 Generalizing the Technology 54
3.2 Basic GMPLS Requirements 56
3.2.1 What is a Label? 56
3.2.2 Switching Types 57
3.2.3 What is a Label Switched Path? 57
3.2.4 What is Bandwidth? 58
3.2.5 Bidirectionality of Transport Connections 59
3.2.6 Separation of Control and Data Planes 60
3.2.7 Tunneling and Hierarchies 60
3.3 Further Reading 62
C H A P T E R 4 GMPLS Signaling 63
4.1 Introduction to Signaling 63
4.1.1 Addressing 65
4.2 Basic GMPLS Signaling 66
4.2.1 Sessions, Tunnels, and LSPs 66
4.2.2 LSP Routes 68
4.2.3 Labels and Resources 70
4.3 LSP Establishment and Maintenance 72
4.3.1 Basic Messages 73
4.3.2 RSVP-TE Messages and Objects 73
4.3.3 LSP Establishment 75
4.3.4 Reliable Message Delivery 76
4.3.5 LSP Maintenance 77
4.3.6 Error Cases 80
4.3.7 LSP Teardown 82
4.3.8 LSP Modification 82
4.3.9 Bidirectional LSPs 84
4.4 Fine Control of Label Allocation 84
4.5 Other Signaling Objects 87
4.6 Multiple Domains 88
4.7 Further Reading 89
C H A P T E R 5 GMPLS Routing 91
5.1 Routing in IP and Traffic Engineered Networks 91
5.2 Basic Traffic Engineering Data 92
5.3 GMPLS Routing Information 93
5.4 Overview of IP Routing Protocols 95
5.4.1 Operation of Routing Protocols in GMPLS Networks 96
5.5 Protocol-Specific Extensions 98
5.5.1 OSPF 98
5.5.2 IS-IS 98
5.6 Advanced Features 99
5.6.1 Graceful Shutdown 99
5.6.2 Inter-Domain Traffic Engineering 100
5.7 Further Reading 102
C H A P T E R 6 Link Management 103
6.1 Links, Control Channels, and Data Channels 103
6.2 The Link Management Protocol 104
6.2.1 LMP Messages 105
6.2.2 Control Channel Management 106
6.2.3 Link Discovery and Verification 108
6.2.4 Link Capabilities 109
6.2.5 Fault Isolation 110
6.2.6 Authentication 112
6.2.7 Implications for Traffic Engineering and Link Bundling 112
6.3 Device-Level Resource Discovery 114
6.3.1 LMP-WDM 115
6.4 Further Reading 115
C H A P T E R 7 GMPLS and Service Recovery 117
7.1 Failures in Transport Networks 118
7.2 Network Survivability Definitions 118
7.3 Service Recovery Cycle 120
7.4 Service Recovery Classes 123
7.5 Recovery Levels and Scopes 125
7.6 Span Recovery 127
7.6.1 Dedicated Unidirectional 1+1 Span Protection 128
7.6.2 Dedicated Bidirectional 1+1 Span Protection 129
7.6.3 Dedicated 1:1 Span Protection with Extra Traffic 130
7.6.4 Shared M:N Span Protection 133
7.6.5 Enhanced Span Protection 135
7.7 Path Recovery 137
7.7.1 Path Recovery Domain 137
7.7.2 End-to-End Path Recovery 139
7.7.3 Path Segment Recovery 150
7.7.4 Combining Segment and End-to-End Recovery 161
7.7.5 Fast Re-Route 163
7.8 Control Plane Recovery 169
7.8.1 Control Plane Failures 170
7.8.2 Control Plane Re-Synchronization via Signaling 172
7.8.3. Control Plane Restoration Using Local Databases 172
7.8.4 Control Plane Restoration Using Data Plane State 173
7.8.5 Managing Control Plane Partitioned LSPs 174
7.9 Further Reading 180
C H A P T E R 8 GMPLS and Traffic Engineering 183
8.1 Evolution of Traffic Engineering 183
8.1.1 Traffic Engineering Through Modifying Network Link Metrics 185
8.1.2 Traffic Engineering Through ECMP 186
8.1.3 Traffic Engineering Through Service Type Based Routing 187
8.1.4 Traffic Engineering Using Overlays 188
8.1.5 Traffic Engineering Based on MPLS 189
8.2 Traffic Engineering in Transport Networks 190
8.2.1 Traffic Engineering in Photonic Networks 194
8.3 GMPLS Traffic Engineering Definitions 195
8.3.1 TE Link Attributes 199
8.4 GMPLS Traffic Engineering Protocols 206
8.4.1 OSPF-TE 207
8.4.2 ISIS-TE 208
8.5 Traffic Engineering Link Bundling 209
8.6 Traffic Engineering Regions and Switching Layers 210
8.6.1 Virtual Network Topology 215
8.6.2 Hierarchical LSP Protection 217
8.6.3 Adaptation Capabilities 218
8.7 Inter-Domain Traffic Engineering 219
8.7.1 Path Computation with Limited TE Visibility 219
8.7.2 Provisioning of Inter-Domain LSPs 223
8.7.3 Handling Inter-Domain LSP Setup Failures 224
8.8 Service Path Re-Optimization 225
8.9 Further Reading 226
C H A P T E R 9 GMPLS Path Computation 227
9.1 Definitions 227
9.2 Transport Network Graph Representation 228
9.3 Basic Single Source Algorithms 230
9.3.1 Bellman-Ford Algorithm 232
9.3.2 Dijkstra Algorithm 233
9.3.3 Modified Dijkstra Algorithm 237
9.3.4 Breadth First Search Algorithm 238
9.3.5 Johnson Algorithm 239
9.4 K Shortest Paths Algorithm 241
9.5 Diverse Path Computation 244
9.5.1 Simple Two-Step Approach 246
9.5.2 Computation of Two Edge-Disjoint Paths 247
9.5.3 Computation of Two Vertex-Disjoint Paths 248
9.5.4 Computation of Two Best-Disjoint Paths 251
9.5.5 Computation of K (K > 2) Edge-, Vertex-, Best-Disjoint Paths
9.5.6 Computing Physically Disjoint Paths 259
9.6 Further Reading 260
C H A P T E R 1 0 Constraint-Based Path Computation 261
10.1 Attributes Within the Network 262
10.1.1 Link Attributes 262
10.1.2 Path Attributes 263
10.2 Path Computation Constraints 264
10.2.1 Handling of Exclusions 264
10.2.2 Handling of Link-Type Constraints 266
10.2.3 Handling of Inclusions 266
10.2.4 Handling of Path-Type Constraints 270
10.3 Optical Trails in Transparent Networks 275
10.4 Further Reading 285
C H A P T E R 1 1 Point-to-Multipoint GMPLS 287
11.1 GMPLS Point-to-Multipoint Traffic Engineering 287
11.1.1 TE Point-to-Multipoint Related Definitions 290
11.2 Point-to-Multipoint Tree Computation 292
11.2.1 P2MP-Related Advertisements 295
11.3 Signaling Point-to-Multipoint Tunnels 296
11.3.1 P2MP Tunnel Setup 296
11.3.2 Processing Leaf Descriptors 299
11.3.3 P2MP Tunnel Teardown 300
11.3.4 Handling of Failures 300
11.4 P2MP Tunnel Decomposition 301
11.4.1 Tunnel Re-Merge 303
11.4.2 Limited Branching Capability Problem 306
11.5 Grafting and Pruning 308
11.6 Advanced Features 310
11.6.1 Hierarchical P2MP Tunnels 310
11.6.2 Inter-Domain P2MP Tunnels 310
11.6.3 Multi-Layer P2MP Tunnels 314
11.6.4 Leaf-Initiated Join and Drop Procedures 317
11.6.5 P2MP Service Recovery 319
11.6.6 P2MP Tunnel Re-Optimization 321
11.7 Further Reading 322
C H A P T E R 1 2 Layer One Virtual Private Networks 323
12.1 Layer One Point-to-Point Services 323
12.2 Layer One VPN Deployment Scenarios 328
12.2.1 Multi-Service Backbone 328
12.2.2 Carrier’s Carrier 331
12.2.3 Layer One Resource Trading 331
12.2.4 Complex Layer One VPN 332
12.3 Resource-Sharing Models 335
12.4 Layer One VPN Functional Model 337
12.5 Layer One VPN Service Models 338
12.6 GMPLS-Based Layer One VPN Offerings 342
12.6.1 GVPNs 343
12.6.2 GMPLS Overlays 349
12.7 Further Reading 352
C H A P T E R 1 3 Architectural Models 353
13.1 The Internet’s End-to-End Model 354
13.1.1 How Far Can You Stretch an Architectural Principle? 355
13.2 GMPLS Service Models 357
13.2.1 The Peer Model 357
13.2.2 The Overlay Model 358
13.2.3 The Hybrid Model 359
13.3. The ITU-T’s ASON Architecture 360
13.3.1 Nodes, Links, and Subnetworks 361
13.3.2 Reference Points 363
13.3.3 Calls and Connections 365
13.3.4 Abstract Functional Entities 366
13.3.5 Managing Connectivity Across Subnetworks 369
13.3.6 Network Layers and Technology Types 371
13.4 GMPLS and ASON Networks 372
13.4.1 The OIF UNI Protocol Extensions 372
13.4.2 The ITU-T’s UNI and E-NNI Protocols 374
13.4.3 Applying the GMPLS Overlay Model 375
13.4.4 Calls and Connections in GMPLS 377
13.4.5 Contrasting GMPLS and ASON 378
13.5 Further Reading 378
C H A P T E R 1 4 Provisioning Systems 381
14.1 Structure of Management 382
14.1.1 Management Tools 382
14.2 Management Networks 384
14.3 Proprietary Management Interfaces 384
14.4 Standardized Management Protocols 385
14.5 Web Management 388
14.6 Alarms and Events 389
14.7 Further Reading 390
C H A P T E R 1 5 GMPLS MIB Modules 391
15.1 MPLS TE MIB Management 391
15.2 GMPLS MIB Modules 392
15.3 GMPLS LSR Management 393
15.4 GMPLS Traffic Engineering LSP Management 395
15.5 The TE Link MIB Module 397
15.6 The LMP MIB Module 398
15.7 The Interfaces MIB Module 400
15.8 Further Reading 401
Glossary 403
Index 423
Erscheint lt. Verlag | 20.12.2005 |
---|---|
Sprache | englisch |
Themenwelt | Sachbuch/Ratgeber ► Natur / Technik ► Fahrzeuge / Flugzeuge / Schiffe |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Informatik ► Software Entwicklung ► User Interfaces (HCI) | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Wirtschaft ► Betriebswirtschaft / Management | |
ISBN-10 | 0-08-045647-2 / 0080456472 |
ISBN-13 | 978-0-08-045647-8 / 9780080456478 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich