Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks
Chapter 1: The Fundamentals of MPLS Networks and Data Flow
- Figure 1.1: IP Network
- Figure 1.2: IP Network with LERs and IP Packet with Shim Header Attached
- Figure 1.3: MPLS Shim Header and Format
- Figure 1.4: Label Switch Routers
- Figure 1.5: Label Switch Paths
- Figure 1.6: MPLS Network with Two FECs
- Figure 1.7: Ingress LER Attaches a Shim Header
- Figure 1.8: Label Swapping
- Figure 1.9: Stacked Labels with Tunneled Network
- Figure 1.10: MPLS Label Range Commands
- Figure 1.11: MPLS Forwarding Table Commands
- Figure 1.12: Network Trace for HTTP Port Number 80
- Figure 1.13: Network Trace for Port 25 E-Mail
- Figure 1.14: Network Trace for Port 20 FTP
- Figure 1.15: Frame 1
- Figure 1.16: Frame 9
- Figure 1.17: Open MPLS_basic File
Chapter 2: MPLS Label Distribution
- Figure 2.1: Label Switching in the Early Days
- Figure 2.2: Basic MPLS Network with Four Routers
- Figure 2.3: Independent Control
- Figure 2.4: Ordered Control (Pushed)
- Figure 2.5: Downstream on Demand (DOD)
- Figure 2.6: LSR with Cross-Connect Tables Populated
- Figure 2.7: Data Flow on LSP
- Figure 2.8: A Closer Look at the Router
- Figure 2.9: Full Network Diagram
- Figure 2.10: Creating the Interface
- Figure 2.11: Detailed View of LER1 Interface gi 2.2
- Figure 2.12: Detailed View of LER1 Local Interface Lo 0Create OSPF on Interfaces
- Figure 2.13: LER1 Global Routing
- Figure 2.14: LER1 Enable OSPF
- Figure 2.15: MPLS Added to Interface
- Figure 2.16: LDP Started
- Figure 2.17: Show LDP Sessions
- Figure 2.18: Show LDP Neighbor
- Figure 2.19: Hello Message for Exercise 2.2
Chapter 3: MPLS Signaling
- Figure 3.1: Backed-Up Express Lane
- Figure 3.2: MPLS with Three Paths
- Figure 3.3: MPLS with a Failed Path C
- Figure 3.4: MPLS with Congestion Caused by a Reroute
- Figure 3.5: MPLS Routing State Machines
- Figure 3.6: RSVP-TE PathRequest
- Figure 3.7: RSVP-TE Reservation
- Figure 3.8: RSVP-TE Path Setup
- Figure 3.9: RSVP-TE Details
- Figure 3.10: CR-LDP Frame Format
- Figure 3.11: CR-LDP Call Setup
- Figure 3.12: Simple RSVP Command Overview
- Figure 3.13: RSVP Path Request
- Figure 3.14: Previously Covered Commands
- Figure 3.15: Show LSP ALL
- Figure 3.16: Show LSP Verbose
- Figure 3.17: ERO Subobject Fields
- Figure 3.18: Four Reserved Values
- Figure 3.19: Unique RSVP Strict Path Commands
- Figure 3.20: Unique RSVP Strict Path Commands
- Figure 3.21: RSVP Loose Routing (View 1)
- Figure 3.22: RSVP with Loose Routing (View 2)
- Figure 3.23: Configuration Example 1
- Figure 3.24: Configuration Example 2
- Figure 3.25: RSVP Overview
- Figure 3.26: RSVP Detail
- Figure 3.27: Frame 4
- Figure 3.28: RSVP Path Request
Chapter 4: MPLS Network Reliance and Recovery
- Figure 4.1: Traffic Detour
- Figure 4.2: Heartbeat vs. Error Message Failure Detection
- Figure 4.3: Heartbeat Method
- Figure 4.4: Error Messages
- Figure 4.5: Standard Routing
- Figure 4.6: Network Failures
- Figure 4.7: One-to-One Redundancy
- Figure 4.8: One-to-Many Redundancy
- Figure 4.9: Fault-Tolerant Equipment
- Figure 4.10: RSVP-TE with Link Protection
- Figure 4.11: RSVP-TE with Node Protection
- Figure 4.12: Top-Level Configuration
- Figure 4.13: Configuration Example
- Figure 4.14: Previous RSVP Command
- Figure 4.15: Four Steps to Configure Back Path
- Figure 4.16: Detailed Syntax Commands for Secondary Path
- Figure 4.17: Path without a Failure
- Figure 4.18: Path After Failure
- Figure 4.19: Typical Router Configuration
- Figure 4.20: CLI Becomes Complex on Larger Networks
- Figure 4.21: The Cisco Tunnel Builder Solution
- Figure 4.22: Tunnel Builder Block Diagram
- Figure 4.23: Tunnel Builder Demo Setup, Part 1
- Figure 4.24: Tunnel Builder Demo Setup, Part 2
- Figure 4.25: Tunnel Builder Demo Setup, Part 3
Chapter 5: MPLS Traffic Engineering
- Figure 5.1: Express Lane
- Figure 5.2: Four Aspects of Traffic Engineering
- Figure 5.3: Over-Provisioning vs. Under-Provisioning
- Figure 5.4: Comparison of Over-Provisioning and Under-Provisioning
- Figure 5.5: Sample Network Diagram: Example 1
- Figure 5.6: Sample Network Failure
- Figure 5.7: Traffic Trends
- Figure 5.8: Voice with Silence Suppression
- Figure 5.9: Vocal Jazz Music (The Andrews Sisters Singing 'Boogie-Woogie Bugle Boy')
- Figure 5.10: OPNET MPLS Uses
- Figure 5.11: OPNET Services
- Figure 5.12: Key Features of OPNET MPLS Model
- Figure 5.13: Nonoptimized Network
- Figure 5.14: Optimized Network
Chapter 6: Introduction to MPlS and GMPLS
- Figure 6.1: GMPLS Advantages
- Figure 6.2: Data, ATM, SONET, and DWDM
- Figure 6.3: Network Types
- Figure 6.4: The Promise of GMPLS
- Figure 6.5: MPlS
- Figure 6.6: GMPLS, MPLS, and IP
- Figure 6.7: Network with Interfaces Added
- Figure 6.8: Neighbor Discovery
- Figure 6.9: Link Status Distribution
- Figure 6.10: Topology Information
- Figure 6.11: Path and Link Management Control
- Figure 6.12: Link Management
- Figure 6.13: SONET Matrix
Chapter 7: Virtual Private Networks and MPLS
- Figure 7.1: Mesh VPN Network
- Figure 7.2: VPN Using a Service Provider
- Figure 7.3: VPN Requirements
- Figure 7.4: End-to-End VPN Using a Secure Tunnel
- Figure 7.5: Types of VPN Tunnels
- Figure 7.6: GRE Header and GRE Packet
- Figure 7.7: IP-IP Header
- Figure 7.8: IPSec Frame
- Figure 7.9: L2TPv3
- Figure 7.10: MPLS Tunnel and Frame
- Figure 7.11: VPN Overlay Model
- Figure 7.12: Hub-and-Spoke Configuration with 4 Sites (Original Configuration)
- Figure 7.13: Adding Site 5 with a Hub and Spoke Design
- Figure 7.14: Adding Site 5 with a Fully Meshed Network
- Figure 7.15: Peer Model
- Figure 7.16: The Layers of VPNs (The VPN Tree)
- Figure 7.17: RFC 2547 Data Flow, Steps 1 and 2
- Figure 7.18: RFC 2547 Data Flow, Steps 3 and 4
- Figure 7.19: RFC 2547 Routing Exchange, Steps 1 and 2
- Figure 7.20: RFC 2547 Routing Exchange, Steps 3 and 4
- Figure 7.21: Independent IP Address
- Figure 7.22: Independent IP Address with Router Designator
- Figure 7.23: Virtual Routing Network Drawing
- Figure 7.24: VPN Tree
- Figure 7.25: VPWS Network Design
- Figure 7.26: VPLS Network
- Figure 7.27: IPLS Network
- Figure 7.28: Martini Block Diagram
- Figure 7.29: Martini Header
- Figure 7.30: Martini Header (Detailed)
- Figure 7.31: Martini Tunnels
- Figure 7.32: Kompella Routing and Forwarding Exchange
- Figure 7.33: Kompella Data Flow, Steps 1 and 2
- Figure 7.34: Kompella Data Flow, Steps 3 and 4
- Figure 7.35: AToM Network
- Figure 7.36: Example Network (1)
- Figure 7.37: Network Diagram (2)
- Figure 7.38: MPLS Block Diagram (3)
- Figure 7.39: Case Study 1
- Figure 7.40: Top-Level RFC2547 VPN Configuration
- Figure 7.41: Configuration Details for RFC 2547
- Figure 7.42: Layer-2 VPN Top Level
- Figure 7.43: Detailed VPN Configuration
- Figure 7.44: Top-Level VPLS Configuration
- Figure 7.45: Case Study 2
Chapter 8: Quality of Service Meets MPLS
- Figure 8.1: MOS Scale
- Figure 8.2: Dropped Packets vs. Network Utilization
- Figure 8.3: Latency Measurements
- Figure 8.4: Jitter Measurements
- Figure 8.5: Low Utilization with Low Errors
- Figure 8.6a: Network Under Test for Quality of Voice Calls
- Figure 8.6b: Percentage of Dropped Packets vs. Percentage of Load
- Figure 8.6c: MOS Score Is Inversely Proportional to Load
- Figure 8.7: QoS Markings for 802.1Q/p
- Figure 8.8: QoS Marked on the Network Layer DiffServ
- Figure 8.9: QoS Marked on the MPLS Shim Header
- Figure 8.10: Packets Marked in Three Places
- Figure 8.11: End-to-End QoS Marking
- Figure 8.12: End-to-End QoS with RSVP
- Figure 8.13: Applications Policing
- Figure 8.14: QoS - CoS
- Figure 8.15: CoS - QoS Mapping
- Figure 8.16: E-LSP /L-LSP
- Figure 8.17: Too Many Packets Trying to Enter Router
- Figure 8.18: Basic RED Rules
- Figure 8.19: Simple RED Queuing Response Curve
- Figure 8.20: Traffic to Be Queued
- Figure 8.21: Dropped Packet Percentages after RED Shaping
- Figure 8.22: The Problem with RED
- Figure 8.23: WRED Theory
- Figure 8.24: Priority Bits in IP Header
- Figure 8.25: QoS without Marked Packets
- Figure 8.26: Precedence Bits Marked
- Figure 8.27: ToS and DiffServ bits relationship
- Figure 8.28: Precedence Bit Mapping
- Figure 8.29: ToS Bits Copied to Exp Bits
- Figure 8.30: Detailed DiffServ Code Point Format
- Figure 8.31: Details of Bit Pattern for AF 11
- Figure 8.32: What Is Needed for End-to-End QoS?
- Figure 8.33: MPLS End-to-End QoS Process
- Figure 8.34: QoS per MPLS Elements
- Figure 8.35: Copy Bits Directly to and from Packets Traversing the LSP
- Figure 8.36: Setting the Exp Bits Using a Mapping Table
Chapter 9: MPLS Marketing
- Figure 9.1: How to Go Broke
- Figure 9.2: Questions in Marketing
- Figure 9.3: Three Types of Audience
- Figure 9.4: End-User Concerns
- Figure 9.5: What Service Providers Want
- Figure 9.6: The Vendor's Goal
- Figure 9.7: State of Carrier Market
- Figure 9.8: Strategies for Growth and Marketing
- Figure 9.9: VPN Sales
- Figure 9.10: Carrier Revenue
- Figure 9.11: One-Stop Carrier Shop
- Figure 9.12: Marketing Areas
- Figure 9.13: Core Provider Marketing Areas
- Figure 9.14: The VPN Rainbow
- Figure 9.15: Customers Want Value Added Services
- Figure 9.16: Five Major Drivers Behind VPNs
- Figure 9.17: ATM Sales Projections
- Figure 9.18: Marketing Fronts
- Figure 9.19: Zone of Success
- Figure 9.20: Unofficial MPLS Carrier List
- Figure 9.21: Acme Networks: Total Customers and Total Locations
- Figure 9.22: Total Revenue by Firm Size ($Millions)
- Figure 9.23: Atlanta Area Network Architecture
- Figure 9.24: Total Capex - All Edge Pops ($M)
- Figure 9.25: Total Central Office COGS ($K) (Rack Space, Security, Power, HVAC)
- Figure 9.26: Total Outage Related COGS (Outage-related customer services and SLA violations) ($M)
- Figure 9.27: Total VPN Service COGS ($M)
- Figure 9.28: Summary Operational Costs
- Figure 9.29: Total Overhead Costs ($M)
- Figure 9.30: Total Net Income: 2002-2006 ($M)
- Figure 9.31: Total NPV ($M)
- Figure 9.32: ROIC
Appendix A: Answer Key for Chapter Exercises
- Figure 1.12: Network Trace for HTTP Port Number 80
- Figure 1.13: Network Trace for Port 25 E-Mail
- Figure 1.14: Network Trace for Port 20 FTP
- Figure 1.15: Frame 1
- Figure 1.16: Frame 9
- Figure 1.17: Open MPLS_basic File
- Figure 2.19: Hello Message for Exercise 2.2
- Figure 3.25: RSVP Overview
- Figure 3.26: RSVP Detail
- Figure 3.28: Frame 4
- Figure 3.29: RSVP Path Request
- Figure 7.39: Case Study 1
- Figure 7.45: Case Study 2