MPLS Network Management

  • ID: 3025361
  • Book
  • 525 Pages
  • Elsevier Science and Technology
1 of 4
MPLS-enabled networks are enjoying tremendous growth, but practical information on managing MPLS-enabled networks has remained hard to find. Until now.

MPLS Network Management: MIBs, Tools, and Techniques is the first and only book that will help you master MPLS management technologies and techniques, as they apply to classic MPLS networks, traffic-engineered networks, and VPNs. Written by the co-author of most current MPLS management standards, it provides detailed, authoritative coverage of official MIBs, examining key topics ranging from syntax to access levels to object interaction. It also offers extensive consideration of third-party management interfaces, including tools for metering traffic and predicting traffic growth and behavior. If you're a network operator, network device engineer, or MPLS application developer, you need this book to get all you can out of all of MPLS's many capabilities.

The only book devoted entirely to the tools and techniques for controlling, monitoring, debugging, and optimizing MPLS-enabled networks.
Authoritative information from the co-author of most IETF MIBs relating to MPLS and GMPLS, PWE3, and PPVPN.
Covers both standards-based and proprietary management technologies.
Includes interviews with seminal figures in the development of MPLS.
Via a companion web site, provides information on late-breaking developments in MPLS management and links to additional resources.
To be followed by a second volume presenting best-practice case studies dealing with how real companies approach the management of their MPLS networks.
Note: Product cover images may vary from those shown
2 of 4
Chapter 1 Introduction
1.1 A Brief Introduction to MPLS
1.2 Applications of MPLS
1.3 Key Aspects of MPLS Network Management
1.4 Management Information Base Modules for MPLS
Interview: George Swallow

Chapter 2 Management Interfaces
2.1 The Basics of Management Interfaces
2.2 The Command Line Interface
2.3 CORBA
2.4 XML
2.5 Bulk File Transfer
2.6 The Simple Network Management Protocol (SNMP)
Interview: Arun Vishwanathan

Chapter 3 The MPLS Label Switching Router Management Information Base (MPLS-LSR MIB)
3.1 Who Should Use It
3.2 MPLS-LSR MIB at a Glance
3.3 Labels In, Labels Out
3.4 A Simple Example
3.5 The MPLS Interface Configuration Table
3.6 The InSegment Table
3.7 The MPLS OutSegment Table
3.8 The Cross-Connect Table
3.9 The Traffic Parameter Table
3.10 A Note about SNMP RowPointer Use
3.11 The Label Stack Table
3.12 Notifications
3.13 Scalability Issues with Notifications
3.14 Next Index
3.15 A Note about Indexing
Interview: Kireeti Kompella

Chapter 4 The MPLS Label Distribution Protocol MIB (MPLS-LDP MIB)
4.1 The Label Distribution Protocol
4.2 Managing LDP
4.3 Definition of Terms Used in the MIB
4.4 The LDP Identifier
4.5 LDP Entity Table
4.6 LDP Entity Configuration General Label Range Table
4.7 ATM Tables
4.8 Frame Relay Tables
4.9 LDP Entity Example
4.10 Gathering Statistics for Entities
4.11 LDP Peer Table
4.12 LDP Hello Adjacencies Table
4.13 LDP Session Table
4.14 LDP ATM Session Table
4.15 LDP Frame Relay Session Table
4.16 The LDP Session Statistics Table
4.17 The LDP Session Peer Address Table
4.18 Modification of Established LDP Sessions
4.19 Operational and Administrative Status
4.20 Mapping Tables
4.21 Cross-Connects FEC Table
4.22 Notifications
4.23 What the MIB Does Not Support
4.24 How the MIB Varies from the LDP Specification
4.25 Using the MPLS-LDP MIB with TDP
Interview: Joan Cucchiara

Chapter 5 The MPLS Forward Equivalency Class to Next-Hop Label Forward Entry MIB (MPLS-FTN MIB)
5.1 Who Should Use It
5.2 IP Traffic In, MPLS Labels Out
5.3 Forwarding Equivalency Classes
5.4 A Simple Example of FEC-to-NHLFE
5.5 MPLS FTN Table
5.6 MPLS FTN Map Table
5.7 MPLS FTN Performance Table
5.8 Another FTN Example
Interview: Bruce Davie

Chapter 6 The Interfaces MIB and MPLS
6.1 Who Should Use It
6.2 IF-MIB Overview
6.3 Evolution of the IF-MIB
6.4 Applying the IF-MIB to Classic MPLS Networks
6.5 Applying the IF-MIB to MPLS TE Networks
Interview: Adrian Farrel

Chapter 7 Offline Traffic Engineering
7.1 Traffic Engineering
7.2 Traffic Engineering in MPLS Networks
7.3 Deliberate MPLS TE Models
7.4 Tunnel Sizing
7.5 Tunnel Path Selection
7.6 Use of Offline TE for Backup Tunnels
7.7 The Traffic Engineering System
7.8 TE System Components
7.9 Input to Traffic Engineering Tools
7.10 TE Cycle Components
7.11 Offline versus Online Calculations
Interview: Ross Callon

Chapter 8 The MPLS Traffic Engineering MIB (MPLS-TE MIB)
8.1 Constraint-Based Routing
8.2 Signaling Constraint-Based Paths
8.3 MPLS-TE MIB Overview
8.4 Definition of Terms Used in the MIB
8.5 RowPointer Usage in MPLS-TE MIB
8.6 Scalars
8.7 The Tunnel Table
8.8 MPLS Tunnel Resource Table
8.9 The CR-LDP Resource Table
8.10 MPLS Tunnel Hop Table
8.11 The Actual Route Hop Table
8.12 The Computed Route Hop Table
8.13 The Tunnel Performance Table
8.14 IF-MIB Applicability
8.15 Tunnel Table and MPLS-LSR MIB Interaction
8.16 Multiple Tunnels across MPLS Network Example
8.17 Notifications
Interview: Harmen Van Der Linde

Chapter 9 NetFlow Accounting
9.1 NetFlow Overview
9.2 Flow-Based Accounting
9.3 NetFlow Architecture
9.4 NetFlow Data Export
9.5 Deploying NetFlow
9.6 NetFlow Accounting for MPLS
Interview: XiPeng Xiao

Chapter 10 Traffic Matrix Statistics
10.1 The Traffic Engineering Problem
10.2 Traffic Matrix Statistics Objectives
10.3 Traffic Engineering Domain of Interest
10.4 Traffic Characterization
10.5 Selecting Sampling Periods
10.6 Traffic Matrix Structure
10.7 Measurement Architecture Options
10.8 Cost and Performance Considerations
Interview: Danny McPherson

Chapter 11 The MPLS Virtual Private Networking MIB (PPVPN-MPLS-VPN MIB)
11.1 MPLS Virtual Private Networks (VPNs)
11.2 Definition of Terms Used in the MIB
11.3 The PPVPN-MPLS-VPN MIB at a glance
11.4 Scalar Objects
11.5 MplsVpnVrfTable
11.6 MplsVPNIfConfTable
11.7 MplsVPNPerfTable
11.8 MplsVpnVrfRouteTable
11.9 MplsVpnRouteTargetTable
11.10 MplsVpnVrfBgpNbrAddrTable
11.11 MplsVpnVrfBgpNbrPrefixTable
11.12 mplsVpnVrfSecTable
11.13 Notifications
11.14 Enterprise VPN Example
Interview: Cheenu Srinivasan

Chapter 12 Future Directions for MPLS Network Management
12.1 Generalized MPLS (GMPLS)
12.2 Pseudo-Wire Edge-to-Edge Emulation
12.3 New Developments in MPLS
12.4 IETF PPVPN Working Group VPN Management Standardization
12.5 DMTF
12.6 Concluding Remarks

Appendix A: IETF and Other Standards Bodies
Appendix B: MPLS-TC MIB

Glossary

Bibliography

Index
Concluding Remarks

Glossary
Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Nadeau, Thomas D.
Thomas D. Nadeau is VP/Principle Software Architect at CA Technologies where he is responsible for architecture and standards leadership around CA's network infrastructure management products. Prior to joining CA Technologies, Tom was a Distinguished Engineer at Huawei Technologies, Tom worked on projects involving IP, MPLS, MPLS-TP, Pseudowires, VPN/VPLS, video, Ethernet, cloud and grid computing, as well as content/media.Prior to Huawei, Tom was a Principle Network Architect at BT and Head of International Standards Prior to BT Tom worked at Cisco Systems where he was a Technical Leader responsible for the leadership, standardization and architecture of operations and management for MPLS-related components of Cisco IOS ® and IOS-XR ®. Tom is an active participant in the IETF, ITU, and IEEE. He is co-author numerous protocol, architecture and MIB documents in the MPLS, BFD, L2/L3 VPN, MPLS-TP, pseudo-wire, and traffic engineering areas, including being a co-author of over 30 IETF RFCs, numerous internet drafts, and ITU-T contributions.
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll