lesforgesdessalles.info Biography MPLS AND VPN ARCHITECTURES PDF

Mpls and vpn architectures pdf

Wednesday, December 26, 2018 admin Comments(0)

MPLS and VPN Architectures, CCIP Edition · Read more KnowledgeNet Advanced MPLS VPN Solutions (AMVS) Student Guide. Read more. MPLS and VPN Architectures, Volume II, begins with a brief refresher of the MPLS VPN. Architecture. Part II describes advanced MPLS VPN connectivity. Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide . While the basic unit of interconnection is the site, the MPLS VPN architecture.


Author: ERIKA TONIATTI
Language: English, Spanish, Japanese
Country: New Zealand
Genre: Art
Pages: 574
Published (Last): 14.06.2016
ISBN: 493-4-64343-819-9
ePub File Size: 27.70 MB
PDF File Size: 16.41 MB
Distribution: Free* [*Regsitration Required]
Downloads: 50234
Uploaded by: VETA

8. MPLS/VPN Architecture Overview. Case Study: Virtual Private Networks in SuperCom Service Provider Network. VPN Routing and Forwarding Tables. approach to preparing for that almighty lab, Cisco has opened doors proficiency with LAN and WAN MPLS and VPN Architectures Volume II, Cisco Press. lesforgesdessalles.info On Becoming Baby Wise: Giving Your Cisco Press CCIP MPLS and VPN lesforgesdessalles.info

Cisco Press port. ATM layer From a data plane perspective. One is designated as an maintaining Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. The solution in these is a based pseudowiretechnology emulation that products different vendors have3achieved an wouldfrom allow Layer 2equipment transport over a Layer excellent level of infrastructure. When you buy this means the book is available ISBN:

The advantage of Layer 2 For a majority of Service Providers. Frame2Relay has dominated the field of early VPN technologies. The PE services router then productivity gainscustomer and stores the tables along with the public Internet one private routing table for each routing information.

For instance. Reduce costs and extend the reach of your services by unifying your network architecture Gain from the first book to address Layer 2 VPN application utilizing Figure The customer gives up control of its routing to the service provider. As mentioned. To become truly scalable. The structure this book is focused on first introducing the backbones for private and communication.

Cisco of their infrastructures and simplify management. CCIE their networks. This results in service providers having to maintain separate networks for Layer 2 and Layer 3 traffic.

Layer CCIEface No. Master the world of Layer 2 VPNs to provide enhanced services and enjoy productivity The following types of servicegains providers would benefit from such a solution: Learnoffer about Layer 2 Virtual Private Networks VPNs and would like to Carriers that currently only circuit-based Layer 2 infrastructures expand Layer 3 infrastructure to sell more services Reduce costs and extend the reach of your services by unifying your architecture Service providersnetwork that currently offer only Layer 3 infrastructure and would like to cost effectively expand their offering of Layer 2 services Gain from the first book to address Layer 2 VPN application utilizing andoffer L2TPcircuit-based protocols Service providersboth that ATOM currently Layer 2 and IP-based Layer 3 services throughout separate infrastructures and would like to join the two to increase profitability Review strategies that allow large enterprise customers to enhance their service offerings while maintaining routing control For a majority of Service Providers.

For service providers. They cannot No. To support a customer's Layer 3 traffic. This might decrease ISBN: Instead of building a network architecture separate. In an enhanced Layer 2 VPN. The principal difference lies in how PE-CE router relations are handled.

Pub New. Reduce costs and extend the reach of your services by unifying your Figure illustrates a sample topology with Layer 2 VPN service. Another drawback of Layer 3 VPNsthe need for edge transport routers to support routing tables of every connected VPNis eliminated with enhanced Layer 2 VPNs because customer routing tables are not stored on the provider's network.

By combining Layer 2 transport with Layer 3. Enhanced Layer 2 VPNs offer service providers several major cost reductions on their existing infrastructure. CCIE without No. Reduce service provider's capital expenditures capex and expenses opex Layer 2 VPN Architectures introduces readers tooperational Layer 2 Virtual Private associated with offering numerous services to a customer through service consolidation Network VPN concepts. Wei Luo. By reducing customer networking complexity and cost.

Byand extranet complexity required in the -past. Ciscoproviders Press sized businesses. The solution in these cases is a Expand theirtechnology present Layer networks to further in their legacy that 2would allowwithout Layer 2having transport over a invest Layer 3 networks.

Service providers can also continue to make money from their existing investments. Service providers can sellofferings more bandwidth and betterrouting performance Layer 2 customers. Frame -Relay. Cisco Press On the customer side. All the provider needs to existing show is that CEcustomers. The structure of this book is focused on first introducing the allow an MPLS-enabled network to transport Layer 2 frames.

One such technique. By aggregating traffic ATM. Layer 2 VPN does not require storing a routing table for each site on the service provider's end. Additional investment in equipment is Reduce costs and extend the reach of your services by unifying your unnecessary because the existing customer hardware is sufficient. DeployedMaster edge platforms to customer networks continue to create the the world connecting of Layer 2 VPNs to provide enhanced services and enjoy circuits and interface with customer networks.

Gain from the first book to address Layer 2 VPN application utilizing both ATOM and L2TP protocols The configuration is simplified because only two endpoints must be configured and the Review thatwith allow large enterprise enhance rest is signaled across thestrategies core. Figure shows a sample enhanced Layer 2 VPN topology. Dmitry CCIE or working with it. This requires that the same transport type be at each end of the network.

Review strategies that allow large enterprise customers to enhance their service offerings while maintaining routing control For a majority of Service Providers. In the second phase. Reduce costs and extend the reach of your services by unifying your The first phase of Layernetwork 2 VPN development architecture in Cisco IOS Software supports like-to-like connectivity.

This chapternetwork describes the general architecture for pseudowire emulation and architecture networking solutions proposed in standardization organizations that sometimes compete with Gain from the Layer first book to architectures address Layerthat 2 VPN utilizing one another. Pseudowire Emulation Framework and Standards Publisher: Each of these parallel networks offers a specific service.

The solution in these cases is a Protocol layer and system architecture technology that would allow Layer 2 transport over a Layer 3 Transportinginfrastructure. Pseudowires are emulated circuits that carry service-specific ISBN: Parallel networks are not only expensive in terms of capital expense and operational costs.

Cisco Press 1 or Layer 2 circuit service. In other words. Pseudowire emulation service offerings maintaining routing control makes it possible to achieve this objective. This book assists readers looking to meet those requirements by explaining the Network Reference Model history and implementation details of the two technologies available from the Cisco Unified VPN suite: Reduce costs and extend the reach of your services by unifying your Because IP traffic has increasingly become the majority of the overall network communication.

The structure of this book is focused on first introducing the components in the pseudowire emulation architecture. Master the world of Layer 2 VPNs to provide enhanced and enjoy The motivation for pseudowire emulation comes from the desire to haveservices a converged network productivity that delivers multiple servicesgains that are currently provided by parallel or overlay networks.

To end customers and their devices. The structure of this book is focused on first introducing the reader to Layer 2 VPN benefits and implementation requirements and Payload layer comparing them to those of Layer 3 based VPNs. This kind technologies. Review that allow large enterprise customers to into enhance When pseudowire PDUs arrive strategies at the receiving PE device.

Each pseudowire has a demultiplexing value that is unique within a tunnel. Network devices use the PSN layer to determine the forwarding path of pseudowire packets. IPv6 addresses. It provides Master the world Layer 2 edge VPNs CE to provide services pseudowire emulation service to a of customer deviceenhanced that belongs to theand enjoy productivity gains administrative domain of the customer.

The pseudowire encapsulation layer consists of a pseudowire demultiplexing sublayer and an encapsulation sublayer. For form a majority of Service Providers. You can think of this path as a packet-switched tunnel that carries pseudowire packets.

One or more attachment circuits are used to connect a CE to the PE. This book Pseudowire emulation involvescase three protocol assists readers looking to meet those requirements by explaining the history and implementation details of the two technologies available from PSN layer the Cisco Unified VPN suite: The pseudowire demultiplexing sublayer provides a means to carry multiple pseudowires over a single packet-switched tunnel.

The encapsulation sublayer carries payload encapsulation information that is removed at the ingress PE device so that the receiving PE. This transparency helps to scale the backbone while new carriers would like to sell the lucrative Layer 2 number of emulated circuits. The solution in these cases is a can leave the core devicesover alone. You need to provision only the edge devices for new circuits. For example. Master the world of Layer 2 VPNs to provide enhanced services and enjoy productivity gains Figure Press Frame Relay packetsPub in the native form or simplified form.

Figure history and implementation ofarchitecture the two technologies available from shows an example of the general system architecture. In fact. This book circuits and emulated circuits is performed mostly inside PE devices. CCIE numbers placed in the encapsulation If necessary.

The structure of this book is focused on first introducing the reader to Layer 2 VPN benefits and implementation requirements and Figure The payload layer carries theCisco pseudowire payload in various forms.

ATM cells. Payload encapsulation information. PE devices use these procedures to establish pseudowires and packet forwarding paths. If it finds anand outgoing interface. Pseudowire protocol processor and network protocol processor Perform pseudowire and routing protocol signaling procedures respectively. The forwarding information that is obtained through the signaling procedures is distributed to the data plane so that the forwarding table can be populated.

The solution in these cases is a Native service processor and pseudowire encapsulation that deal technology that would allow Layer 2 transport over System a Layer modules 3 with the data packet manipulation.

This the book network forwarding engine looking looks uptothe address the IPv4. Depending on the of the PSN that carries the pseudowire traffic. Link layer protocol controller Performs line protocol signaling. The service offerings while maintaining routing control data plane componentstheir include the following: Network forwarding When aintroduces data packet is passed to the forwarding Layer 2 VPNengine Architectures readers to Layer 2 network Virtual Private engine fromNetwork the pseudowire encapsulation module.

The structure of this book is focused on first introducing the The control planereader components include following: Ethernet packets from CE devices can arrive in other native Review that bridged allow large enterprise customers to enhance encapsulations. Network VPN concepts. Native Service Processing Layerscenarios. The PSN infrastructure not only determines the network layer encapsulation for. When the network forwarding engine passes a pseudowire packet to the PEP. PE device progressively covering currently available solution in greater to identify the pseudowire.

CCIE packets before applying pseudowire encapsulation. Then the NSP associated with the outgoing attachment circuit determines whether media-specific framing needs to be applied to the PPP payload. By normalizing the their service offerings while maintaining routing control different forms of native packets into a single Ethernet frame format.

The structure of this book is focused on first introducing the corresponding pseudowire vice versa. Thethem transmitting is applied theas payload comparing to thosedemultiplexer of Layer 3 based VPNs. The solutioncontrol in these cases is a and encapsulation processing.

Cisco Press procedures. The rationale behind the out-of-band mechanism is that in this way. A pseudowire consists of arequirements transmitting and reader to and Layer 2 VPN benefits and implementation and a receiving demultiplexer.

The role of NSP is to remove the service-delimiting VLAN tag when receiving a Reduce costs and extend your services by unifying packet from the VLAN attachment circuit and to the add reach a localofservice-delimiting VLAN tagyour when it network architecture receives a packet from the pseudowire.

In other cases. Besides assists this information. ThisPE book learn about the emulated services from each other. If you are using MPLS. Some initial provisioning to be done manually even with is a services over their existing Layer 3has cores. The solution in these cases dynamic protocoltechnology signaling. This can be a labor-intensive customers. The structure of thistobook is 3 focused on first introducing the reader to Layer 2 VPN benefits and implementation requirements and Pseudowire setupcomparing often requires protocols or extending existing protocols themcreating to thosenew of Layer 3 based VPNs.

ByWei Luo. An auto-discoveryLayer mechanism utilizes an existing network distribution that is designed 2 VPN Architectures introduces readers to Layerscheme 2 Virtual Private for large-scale network operation and management. Thenand they configure them on on thelegacy PE devices manually technologies. This book categorizes pseudowire demultiplexer asCisco partPress of the pseudowire encapsulation based on its functionality for Publisher: You can trigger this setup through one of the following methods: Reduce costs and extend the reach of your services by unifying your network architecture Manual configuration Gain from the first book to address Layer 2 VPN application utilizing ATOM and L2TP protocols Dynamic protocolboth signaling strategies that allow large enterprise customers to enhance An autodiscoveryReview mechanism their service offerings while maintaining routing control The manual setup process is much like provisioning ATM permanent virtual circuits PVC in For a Layer majority of Service Providers.

In this case. When devices introductory case and comprehensive design scenarios. Cisco Press in the standardization process and Both draftsreaders are discussed in this chapter. That is. Virtual Private Wire IP cores. Under each technical area are several working groups where the actual work is done. Layer 2 Tunneling Protocol working group This working group is responsible for protocol extensions that support carrying multiple Layer 2 services over IP networks. The technical of the by topicby into severalyour areas.

March business interests.

Vpn pdf architectures and mpls

Sometimes the charter of a that arises allow large customers to enhance working group changesReview when astrategies new problem or theenterprise original problem evolves.

Theisworking focuses on Layer reader to Layerrather 2 VPNthan benefits and implementation requirements signaling and provisioning Layer 2 native service emulation. Because the majority of vendor and operator support and activity of pseudowire emulation happen in the IETF. Gain from the first book to address Layer 2 VPN application utilizing both L2TP protocols Working groups form as theATOM resultand of popular interests of solving a particular problem from the networking community and disband when the problem is resolved.

The two most debated proposals on introductory case studies and comprehensive design scenarios. This bookBOF pseudowire emulation"draft-martini" and "draft-kompella"first surfaced in this PWE3 assists lookinglater to meet those requirements by explaining the session.

They were known as "draft-martini" and "draft-kompella. ATM Forum. Because the baseline LDP not lucrative readily have the backbone new carriers would like todoes sell the Layer 2 necessary protocol element services for pseudowire signaling. The actual drafts do not exist in IETF anymore.

Unlike draft-martini. It also specifiestothe Review strategies that allow large enterprise customers enhance encapsulation methodstheir for each Layer 2 service. CCIE divided themselves into two camps based on the different design philosophies that were No. To a certain degree. ATM Cell. It is much like case sort studies and comprehensive design scenarios. This section lists productivity gains the pros and cons of each architecture and does not intend to advertise one method over the other.

The solution inextension these cases a A pseudowire is considered established when theLayer peering PE devices exchange information technology that would allow 2 transport over a Layer label 3 for the pseudowire. The For a majority of Service significant portion of their revenues architecture is concerned with creating andProviders.

The two drafts were focused on achieving emulation over MPLS-based packet networks. Others think the2architecture suffers the same of problems. Both drafts addressed the question of how to achieve pseudowire emulation over packet-based networks.

Frame then Relay. Learn about Layer 2 Virtual Private Networks VPNs draft-martini Reduce costs and extend the reach of your services by unifying your network architecture Gain from the first book to address Layer 2 VPN application utilizing The most significant characteristic of draft-martini is its simplicity and straightforwardness. Using LDP terminology.

Members of the networking community quickly ByWei Luo. CE range. The structure of this book is focused on first introducing the connected through a switched Frame Relay or ATM network. CCIE devices when theNo. VPN ID. Not exhaustively. The solution in these cases is a CE device a local matter. The smallest value in this label range is their service offerings while maintaining routing control called the label base. CCIEfull No. This is also known as the CE range. By such an arrangement.

Cisco Press In addition. Table compares the most noticeable characteristics of the two Layer 2 VPN architectures that are defined by draft-martini and draft-kompella.

AsArchitectures shown earlier in Figure Remote CE and PE devices do not need infrastructure. If a Layer 2 VPN consists only of sparse point-to-point connections. For each CE.

Each is extend then configured the services VPNs in which it participates. Master the world of Layer 2 VPNs to provide enhanced services and enjoy productivity gains To provision a Layer 2 VPN using the architecture that is defined in draft-kompella.

The basic premise for over-provisioning is that the attachment circuits between CE and PE devices are relatively cheap. Because technologies. In the latter case in which the comparing them to those of Layer 3 based VPNs. This book devices. In this respect. Table VPLS resembles. When receiving an Ethernet frame from a CE. The Layer 2 VPN architectures on pseudowire emulation generally define the procedures for setting up individual pseudowires and encapsulation methods for different Layer 2 services.

If it finds a match. This book VPWS is directly derived from pseudowire emulation. CCIE draft-martini draft-kompella No. Besides the basic history and implementation details of the two technologies available from pseudowire emulation service. Instead of acting as a point-to-point cross-connect between the attachment circuit and pseudowire.

In IPLS. The IETF and its working groups are the most active and widely respected Reduce that costsdevelop and extend the reach ofsolutions your services by unifyingemulation your standardization organizations frameworks and for pseudowire network architecture and Layer 2 VPN technology in general.

MPLS_VPN | Virtual Private Network | Multiprotocol Label Switching

It further productivity gains the various stages of processing in a pseudowire emulation system. Contents Within the network reference model. This chapter compared the most debated proposals on pseudowire emulation architectures and highlighted other Layer 2 VPN architectures that are Gain from the first book to address Layer 2 VPN application utilizing built on top of pseudowire emulation.

Master world of Layer 2 VPNs to provide enhanced services andexplained enjoy This chapter outlined thethe pseudowire protocol and encapsulation layering. Cisco Press networking technology that aims at transitioning traditional Layer 2 services much PSNs for operating cost reduction and new Pub Date: Learndeployment about Layerof2pseudowire Virtual Private Networks Even with the fast-growing emulation.

Reduce costs and extend the reach of your services by unifying your A handful of network equipment vendors have developed products that support various levels network architecture of pseudowire emulation. In the past few years. Cisco IOS Software introduces two flavors of pseudowire emulation: Review strategies that allow large enterprise customers to enhance their service offerings while maintaining routing control AToM For a majority of Service Providers.

The deployment of pseudowire emulation has started growing in the service provider space. Frame Relay and ATM also provide link Reviewcustomers strategieslike that allow large enterprise separations among different the leased line service. Frame Relay and ATM are the costarchitecture effective alternatives to the expensive and dedicated leased line service.

Frame Relay and ATM also provide multiplexing capability that services over circuits their existing cores. Framewith Relay and ATM legacy 2 and than Layerthe 3 networks would like to move toward a single customers can use moreLayer bandwidth CIR during traffic bursts as long as the network backbone while new carriers would like tocircuit sell the lucrative Layer 2 has available capacity.

CIR3 is the guaranteed minimal bandwidth customers. For which the leased line service normally does not provide. VPN are concepts. Frame and are still purchase derived from data and information voice services based legacy transport ATM customers typically a committed rate CIR on that allows traffic burst technologies. The structure of this book is focused on first introducing the Figure With the bandwidth oversubscription feature.

The solution these cases a be carries multiple logic or virtual over aLayer single3physical link. Service providers can offer these lower cost services to the their customers becauseLayer the Frame and ATM network Gain from first book to address 2 VPNRelay application utilizing infrastructure can be shared among many both ATOM and L2TPcustomers protocols while maintaining a comparable level of functionality and guarantee as the leased line service.

Press based on the following Pubtechnologies: This book providers often have to maintain separate networks for Layer 2 and Layer 3 traffic.

Vpn architectures and pdf mpls

Layer 2 VPNs network were built using leased lines. TheyLayer are a2huge revenue-generating source for service providers. The links that are Reduce costs and extend the reach of your services by unifying your depicted in the diagram represent logical connections. In this sense. Network Architecture SNA.

Press their remote access infrastructures and operations to wholesale service providers. When the total Master theservice world of Layer 2 VPNs to provide enhanced services and enjoy number of users increases. Internetwork Packet Exchange and AppleTalk.

Figure depicts a capacity in a more economic fashion VPDN network topology. The structure of this book is focused on first IPX. VPDNs are commonly used in wholesale remote-access environments. Without VPDNs. For large companies. VPDNs are a new source of revenue serving multiple business and individual customers with the same remote access network infrastructure.

The service Pub Date: The operating and upgrading cost Layer 2 VPN Architectures can be prohibitively expensive for small and medium-sized companies. This book assists readers looking to meet those requirements by explaining the Layer 2 Tunnel Protocol Version 2 L2TPv2 history and implementation details of the two technologies available from the Cisco suite: Cisco Press Date: Frame Relay Bridged or routed Frame Relay.

If the remote user needs to be tunneled to a remote home gateway. After the remote user is authenticated. The following is a brief description of how VPDN protocols operate: Layer 2 VPN Architectures 1. CCIE using eitherNo. This book encapsulation assists readers looking to meet those requirements by explaining the history and implementation details the two technologies available from DLSw SNA. A remote user or Luo. The home gateway authenticates the remote user carried in the VPDN session.

Layer Legacy VPN Comparison legacy 2 andLayer Layer 32networks would like to move toward a single backbone while new carriers would like to sell the lucrative Layer 2 Legacy Layer services over their existing Layer 3 cores. Now PPP frames can pass between the remote user and the home gateway.

L2TPv2 packets use IP. Protocol Frame Relay. Reduce costs and extend the reach of your services by unifying your 7. IP UDP. Review strategies that allow large enterprise customers to enhance For detailed configuration andofferings examples of the legacy Layer 2 VPNs. Upon network architecture successful authentication. The network access server receives the connection request from the remote user.

This converged MPLS infrastructure can provide bothenhanced Layer 2 and Layerand 3 services productivity that previously had to rely on gains separate networks.

In VPDN. Cisco Press service provider space. AToM derives from a series of efforts by service providers and network equipment vendors in an attempt to minimize the impact to Gain from the first book to address Layer 2 VPN application utilizing existing Layer 2 VPN services and create new service offerings with MPLS-enabled networks.

Besides providing the end-toReduce costs and extend the reach of your services by unifying your end connectivity of the same Layer 2 protocol. This bookYou establish a targeted LDP session by sending unicast hello packets rather than multicast assists readers looking to meet those requirements by explaining the hello packets during the LDP discovery phase. With Layer AToM. AToM Components progressively covering eachNetwork currently available solution in greater detail.

AToM is capable of interconnecting disparate network architecture Layer 2 protocols through Layer 2 interworking. In the context of pseudowire emulation. Figure shows the overview of an AToM packet. It also simplifies the operations on the transit routers. Creating such hierarchies allows aggregation multiplexing. For technologies. The bottom a specific orcores.

AToM takes of routing progressively covering each currently available solution inadvantage greater detail.

Cisco.Press.Layer.2.VPN.Architectures.Mar.2005.eBook-LiB.chm.pdf

Theand solution in these cases is a MPLS network. The P routers forward packets using the top label and are unaware of the existence of pseudowires.

The bottom label is usually known as the VC label Review or the pseudowire label. Unified suite: In such a way. The pseudowire labels are at the bottom of the label stack. Only PE routers need to maintain and manage the pseudowire labels for the virtual connections. The structure of this focused to onafirst introducing theof the overall operation reader cost structure.

Thelarge optional control customers word is nottopart of the strategies that allow enterprise enhance MPLS label stack. The flags in the Frame Relay headerssuch as are still derived from data and voice services based on legacy transport backward explicittechnologies. Bridging protocol support varies depending on the deployment model. The structure of this book focused on CLP. These modes determine the granularity of how ATM packets and cells should be classified and mapped to pseudowires.

ByFrame Relay. The3ATM flags. CE routers are the only Publisher: To Frame Relay customers. Table of ISBN: PE routers that forward Frame frames to different pseudowires strategies allow large Relay enterprise customers to enhance based on the receivingtheir interface andofferings the DLCIwhile value. VP mode.

The solution in these a service offering. QoS guarantee. Traffic engineering at solving problem that some parts cases of the is network technology that would allow Layer 2MPLS transport Layerengineering 3 are highly congested while others are underutilized.

Cisco Press. The structure of this book is focused on first introducing the Note reader to Layer 2 VPN benefits and implementation requirements and comparing to those Layer 3 based VPNs. This book introductory studiesisand comprehensive design scenarios. Such a migration allows the service providers to expand their network capacity and service portfolios Reduceon costs and extend the reach of your services by unifying your and protect their investment the existing network infrastructure.

Transitioning to the network architecture packet-based AToM pseudowire emulation has minimal impact to the existing Layer 2 VPN services. Jim Guichard. Volume I. Davie and Yakov Rekhter: Morgan Kaufmann Publishers. Technology and Applications by Bruce S. Volume II. Constraintbased routing is essentially a set of algorithms designed to find an optimal path with given Layerconfined 2 VPN Architectures introduces readers to The Layer 2 Virtual Private routing metrics while to the pre-established constraints.

This book go into details about why plaincase IP routing insufficient for traffic engineering. With appropriate software and hardware upgrades.

Layer 2 services typically come with service-level agreements SLA. When an operating problem occurs. The solution in these is a based pseudowiretechnology emulation that products different vendors have3achieved an wouldfrom allow Layer 2equipment transport over a Layer excellent level of infrastructure. This book Network Operation Complexity assists readers looking to meet those requirements by explaining the history and implementation details of the twoAToM technologies from The previous sections highlighted the advanced features that can offeravailable as the MPLSthe Cisco Unified VPN suite: The structure of this book is focused on first introducing network.

To reduce packet loss during routing transitions. An SLA is a Publisher: Ciscoprovider Press service guarantee that a service agrees to offer to its customer on availability. Establishing AToM pseudowires successfully requires the maximum transmission unit MTU settings of both attachment circuits connecting through the pseudowire to match. In the service provider space. It allocates the necessary network resources. For a single pseudowire. Making effective use of these features requires fine-tuning on the networkthe parameters reader tocharacteristics.

Mark resides in northern Virginia with his wife, Betsy, and son, Paul. Saeed Sardar is a software development and testing engineer working in the High Speed Switching group for Cisco Systems, responsible for all aspects of IOS services for catalyst family of products. His areas of specialty include Cisco Catalyst Multilayer switches, Cisco routers, intelligent LAN super cards, network protocols, and network operating systems.

He was also kind enough to act as one of the reviewers of the first edition of this book, making sure that the book thoroughly and correctly covers all relevant MPLS aspects. Every major project is a result of teamwork and this book is no exception.

We'd like to thank everyone who helped us in the writing process—the editorial and production team from Cisco Press, including but not limited to Christopher Cleveland, John Kane, and Amy Lewis, as well as our technical reviewers, Mark Gallo, and Saeed Sardar. Finally, this book would never have been written without the continuous support and patience of our families, especially our wives, Sadie and Karmen. In the meantime, the technology has matured to the stage where the majority of the forward-looking service providers use it to offer VPN services to their clients.

Another significant change triggering the need for the second edition was the rollout of official service provider training by Cisco Systems.

MPLS and VPN architectures

Because the authors of the book were closely involved in the training material development, the "Implementing Cisco MPLS" course offered by Cisco Learning Solution Providers worldwide closely maps to the structure of this book, making the book an excellent companion to the course. The service-provider training rollout was accompanied with a new service-provider specific career certification schema, introducing two new career certifications: CCIP Certification Process To meet a growing need for skills and talent from the telecommunications sector, Cisco Systems has formulated a new certification track: Communications and Services.

The certifications identify talented professionals who can plan, design, implement, or operate New World service provider networks. Certification exams qualify individuals who demonstrate competencies in infrastructure or access solutions in a Cisco end-to-end. The student must gain in-depth knowledge in a variety of service provider-related technologies and pass a number of written exams administered by Prometrics or VUE testing centers.

The entire CCIP certification path with the MPLS VPN technology being chosen as the elective technology is summarized in the following table, which lists all exams, corresponding recommended training, and recommended Cisco Press books. The exercises are usually part of instructor-led classroom training. If you decide to follow any other learning method, you can also perform the lab exercises in a remote lab environment. In fact, if the primary objective of this book were different, the book's title would be misleading; however, the methods used in this book to help you pass the MPLS elective exam are designed to also make you much more knowledgeable about how to do your job.

Although this book has many questions to help you prepare for the actual exam, they are not used to simply make you memorize as many questions and answers as you possibly can. All rights reserved. Provider Network P-Network: Frame Relay. Bandwidth must be provisioned on a site-to-site basis. Customer network and service provider network are wellisolated.

VCs have to be provisioned manually. Well-known and easy to implement. Service provider does not participate in customer routing. Implementing optimum routing requires a full mesh of VCs. The service provider participates in customer routing. PE routers carry all routes from all customers.

Guarantees optimum routing between customer sites. Only sites are provisioned. Easier to provision an additional VPN. The service provider needs detailed IP routing knowledge. The service provider becomes responsible for customer convergence. Each customer requires a dedicated router at each POP. All customers share the same provider-assigned or public address space. All customers share the same address space.

Performance is lower—each packet has to pass a packet filter. High maintenance costs are associated with packet filters. PE routers carry a separate set of routes for each customer similar to the dedicated PE router approach. Customers can use overlapping addresses. PE routers participate in customer routing. Wrong answer: How will PE routers exchange customer routing information?