MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization [illustrated edition] 1587201208, 9781587201202

The book appears to be a compilation of white paper drafts by different people - no clear purposes for solutions, featur

344 43 4MB

English Pages 400 Year 2006

Report DMCA / Copyright

DOWNLOAD PDF FILE

Recommend Papers

MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization [illustrated edition]
 1587201208, 9781587201202

  • Commentary
  • CHM to pdf conversion - needs improvement
  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization By Monique Morrow, Azhar Sayeed

!

" • • • • ( '

'

( )* % & '" # * +, * % & # " '

" " )* *

)# ' ## "

% & * ' . '" "

# $

" ## "

"

% & "

"

'" # " "

#

' *(

% &

# *

" % &

#

% & "

'"

' )

% & .

$

#

"

( $

)

. " " ! % & #' ( " % & / * . ) # % & " $ " *# .# ' ' ' ( " " " # ' % & '" # ' # ( ) ' " ( ' ## " ( # " # ' $ *# " " *# $0 * +, * " $ *# " * *# " # " * ) " # % & '" " # " " # " " " $. ( )* * . ' " '" " " *# ). # " * ) % & " *# * . " " *# ' " " % & ( ) #

"

$

$

Copyright About the Authors About the Technical Reviewers Acknowledgments Icons Used in This Book Foreword Introduction Part 1: The Business Case for MPLS Chapter 1. The Dynamics of Service Creation and Deployment Industry Dynamics and Challenges What About the Enterprise Market? Business Drivers and Requirements Service Providers and Enterprise: The Battle of Outsourcing Versus Do-It-Yourself Subscribing to a Managed Layer 3 MPLS VPN Service The Case for Building VPNsLayer 2 or Layer 3 Existing TechnologiesFrame Relay, ATM, and IP-Based Networks: What Can They Solve? Service Examples Summary Chapter 2. The Scope of Service Types Overview of Layer 2 Services Next-Generation Network Overview and Interworking Functions Layer 3 Services Remote Access Value-Added Services Summary Part 2: The Technical Case for MPLS Chapter 3. Technology Overview: Making the Technology Case for MPLS and Technology Details Available Technologies and Options Why MPLS? (High-Level Detail) MPLS and Quality of Service Benefits MPLS Technology Details Layer 3 VPNs Carrier Supporting Carrier and Inter-Provider Autonomous Systems Traffic Engineering DiffServ Layer 2 VPNs Summary Part 3: Mpl Services and Components Chapter 4. Layer 2 VPNs Taxonomy

Introducing AToM Layer 2 Interworking Virtual Private LAN Service Provisioning and Signaling Benefits of L2VPNs Inter-AS L2VPNs Supported IETF Standards Summary Standards and References Chapter 5. Layer 3 VPNs Technology Overview Corporate Intranet Corporate Extranet Internet Access Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks Heterogeneous Networks Managed Central Services Supported IETF Drafts Summary Chapter 6. Remote Access and IPSec Integration with MPLS VPNs Technology Overview PE-CE Routing Protocols Scalability and Network Convergence for Remote Access Summary Chapter 7. MPLS Security Security and NGN Security Overview and MPLS MPLS VPN and Security Attack Scenarios IPSec Layer 2 and Unmanaged VPN Service Considerations Overall Best Practice Recommendations Summary Standards and References Chapter 8. Traffic Engineering Problem Statement Technology Overview TE Applications and Examples Protection and Restoration Scaling MPLS TE MPLS Traffic Engineering and Multicast Standards and References Summary Chapter 9. Quality of Service Problem Statement Standards and References Summary Chapter 10. Multicast and NGNs

Problem Statement MPLS Multicast VPN Overview MPLS Multicast VPN Applications and Examples Multicast Security and Management Considerations Standards and References Summary Chapter 11. IPv6 and MPLS Problem Statement Technology Overview Management and IPv6 Summary Part 4: Bringing Your MPLS Plan Together Chapter 12. Network Management and Provisioning Problem Statement Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms Dealing with Equal Cost Multipaths Virtual Circuit Connection Verification and Bidirectional Forwarding Detection A Word About Interworking OAM Generic Failure Types Configuration Management for MPLS-Based Networks Accounting for MPLS-Based Networks Performance Management for MPLS-Based Networks Security Management for MPLS-Based Networks Per-VPN Management Standards and References Summary Chapter 13. Design Considerations: Putting it All Together VRF-Aware Feature NAT-PE System Flow Deployment Guideline Summary Management, Provisioning, and Troubleshooting Equipment Scalability Versus Network Scalability Summary Chapter 14. MPLS Case Studies The Background on Equant VPN Bridge Case Study Summary Chapter 15. The Future of MPLS Integrating IP and Optical Networks (Transport Area) Future Layer 3 Services Future Layer 2 Services Future Enhancements in Provisioning and Management Increasing Enterprise Deployment of MPLS Summary A View from George Swallow A View from Adrian Farrell

Index

Copyright ! %

-

%

#$

(

34

" 12

5

"

#

$ $

* .

"

$ " 6

7

89 #

.

1 * $ #

:94:

! 1

' # $* . * . " #

$ $

' *

&

1*

"

"

! /

"

)* $ # * " " . " ' $ *. ( -

"

4

4

"

* " #$ . ( # * ' (

#

$ "

. *

:;9568

9

$

"

*

4

; ;

Trademark Acknowledgments 1

* * ' "" "

) $" # 2 * $ $

## # "$ '

)

(

*

" ! *

" * '" *

)

$

) * .

'" * " "

)

) )

Warning and Disclaimer ) * ) *#

*

$ (

# )

* * . " # " ) * #

# $

#

' " *#

' '

* ""

< * "

< $ #

)

" ! #

$ 7' .

.

# * *

" $# * " * $ "" *# $

$ (

.

$

"

$

" $

$

"

$

* .

"

Feedback Information 1

"

. 7 "

' ' "

"

#* " " **

+ " **

0

>

(

#

" (( "

$ ##

" " # " . * *

" -

")

"

# *# .$ " * )

$ " *

")=" " # *

$

#

) " ' ' $

$

' "

) *

" $

"

-

$

#

$

'

$

).

(

* )

"

"

Corporate and Government Sales " "

# /

"

*

$% % " #

*

.#

& =#

(

'

#

- -+ ' & / + * '+

?

6

64

: 8

"

=#

" *

( $> ?

1

$

") @ $A

+ &0 + * B

&

"

'

) ' * ) + , &

2 (

$

" '

-

1 1

-

#" * !

.

)(

"

! "

/

+

"

# "

#. *

. 7' &

)

) # 1

' %

.

?

# /

"

)

3 "

$

4 5) * . " * ' . 1 8; : 5 9

5 > ? ! 1 ((( " " " * : 6 ;49 : 6 ;; 7 C9 65D / : 6 ;49 : 3

6 4 5) " $ * . " 96 + + E46 # ( # 968 4 ((( " " " * F9; 9 5 5555 / F9; 9 5 5588 +)

& "

A A

4

5) * # ) ( 8 A 1* * $

((( F / F " *

B

# " " " * 6 4 58 4 ;5 *

4

" ( " >

(

1 777%

.# %

* . 8- 8 66

34 9 " $ * . " 1 ' B . " . " * ) " $ * . "G > $> > ). & ' . $. & '" * ) " $ * . "G 1"" + .1 . H. $ . 1. . 7. . 1. . . " . " ( )7 # . " , " . " $ * . " $ * # . " $ * . " ! $ 7 # I ' .7 .7 / .7 ( " ./ #. / (% ( ./ * .J ' .J "). A * & ). K . , . I B. K 7 # . K . K + " " . K ") $. & *. & ) $ . % " . %JH. ( ) 1" *$. ( )+ . ") . H. " .+ %!H. " # . . %1+ . ")> . / > $ " L K . * ) " $ * . " I ! " " 1

* # " '

(

) *

" * (

#

>

# *# $

#

#

$ #

#

(

"

$

" *#

$ C 9 8+D

Dedications 5) " ( $ " 1 $. *$ # ' * ( '

'

) ' B

*$ # ' $ ' #

* ( 2 )$

, A

% (( *# ( '

M

' # # ( ' # " *$ * $ * * *$ ( * G *$ ( 1 NG *$ # ' . " . ## * . ( ) G *$ % 2 " * ) " ' ' # *$ " * * #. " . # ( * ) # ( $ $$ . ( $ * . *$ $BN $@ * $

39* ' ( ( *$ )

0 *

" * 1 . " $

" *

About the Authors 5) : " " $ 7 $ * . " * 4 $ # " ( " . *# * " *# " * # N " . ' #* '" # ' % ' ' ' * ( ) '" . " * "" &1 ( " # ' ' * % ( ) # " *# ! 7 # 888. % * % & B # $* 7 # '" % %

-

#

'

"

"

% * 1

-

%

-

" ' " " $. % -

0

"

#"

% &

'" '" # ' # N " # '

1

$.

) %

"

"

" ) '" #

"

( '"

" )

) '

7 / ! " ** " '" " # $

#

'

J /

( * *

"

,1% % 1

*

' #* #" % ( " # " ! N "

( ) A " " # % % & C " A .4 D '( ' ( & ) C% @ * . 4 4D

* &* " # " $. B ( "" A # " . ' * *

1"

0 " '" # ' " # ) / " " A ( ) H # N " #

$

)(

.%

" '

" "

0

B *

* # #*

" . " #

* 7" ** "

# " .

!

7( ) 7## '" " H 4;. / * + O& ( #. " # *2 #

'" " % & $. &1 * ) . "$"

"

0

7-

'"

(

" * * " $ 7" % & ." 888. % / "

# # *

.%

( .%

* '" .

" # " ##

.

#

' "

"#

# .

'

/+. 1 %.

.

) $' "

(

)

" % ( / " *# " " *@ (

" 1

/ " ' " " ! ' $. J1

"

. *7

/ " * 0 J7 7&. / " .

% 1

Acknowledgments > ( ") ( * # # ( ' * )# * $ *# $ " $ * . * " * A * "). ' . # #. J * . 1 > ## . )( ' ( > " " ' ( . * " $ * .? / " . # % 7$ $" ' " $ > ( ) ) ' ( * # # ) # " 1 $. ( ( ) ") ( " $ * ' ( ' " C ) ( $D $ G?*J " G J $ 2 N )G % ") G J ( (G ? 1#" G A + ) G ? ) M> ( ) ) " .'" # $ * " $ * ) * ' $ $ " ( ( ) / $. ( * " * + A . $A ) . (. ? * " " . ** ( ) $( ) ) # " # " J "

.

( G+#

)

Icons Used in This Book [View full size image]

Command Syntax Conventions "

" ' "

'

# , "



'

"

" ** ** + (

"

" **

C D

* #

$

) **

"

+

) $(

$

( • •

" B

"

( " $ ' .*

* "

## $ " $ "

' '

*

• • •

-

") " " *

RS (

PQ " ")

" # " " PR SQ "

* -

"

" (

#

Foreword 889.

" 2

" $

. " C D1

4

2 $ '

" (

*

) * " # ( " ( " " ** " # ## *# *

" . ( " # " .% # '" ' '" #

> $ % & " ' " * $ # * " *D * " ) # '

(

) CB

D

" -

" # *

A

N •





$T ( " .% &

4

*

% &

J '

(

" * ) ( ( " C% & D. 4; '" # ' " % & # $ % & *

" *

$ *

" * * #. * % & C

(

#

2#"

$ *#

*"

(

% &

J% &

F ,# "

"

*# " % &

$

888. " *J '" " % & ' # . .' " . ' ( ) '" # 2 ## $* ## " % & " *# ' '" & ' 1 * " ' ' $. ' $. ( )# * " B '" ' " " '" % & B 7'" ( " " # " ## " 7( " * * ( ) '" ( " B " # " ' ' % & # ' " '" ' * " '" * " # # * " " . " '" .* " . " . " *" * ' " .' . " # $ ? # 0 A " # ' " $ ' 0 B # '" # ' *



. " & %

"

# ( ) (

' ( # ' " " " * " * ' " $ ' " CK D. ' . ' . ( ' " * " * ' " ## " " " '" # ' ) * * " * ! * $. " ' # ") ( ) ( # ' '" '" "

'"

' ' & $ "

(

( "

'" # /

,/ $ 1 %

"

*

#

'" % & '" " (*

* % & * " **

"

" "

" 2 '

7 /

" • $ (

) '" ' "

>

#

'"

* ). % % % & " $ # " " ** ( '" # ' ( .# " " # " # " # " # " * * # " )(

'"

"

7 $

" .'" # * . "

#$

2

( ' " #

12

$ $" $.

(

. ' " ' $ $

)

$

' '

;

' '

.

$ ( ## "

(" # .

##

'

$

$ * $.

*% &

Introduction % & %

" * 4; ( )

" $ " " & $ 4 '" # ' # " * # ' & $ B . *# * " * # * # ( ) . " ' % & " $ "

*

$

. ( )* " ' * $ " ") / *# . $" " $. $" ( '" '" & $ 4 & $ " $ " " ( " ' ( " $" / ' * ) " ' ' ' ( " '" * * . ( )* * . " ) " # " (& $ 4 & $ '"

.

* * ) ") # $* " *# * * *

" '"

.

* "

& $ '

'"

*

. "

(

' % & . " " '" #

'" # ' " " & $ 4 # # ")

$

#

"

(

)

"

'" ( )

' * ( $ " . $ . " $ ( #" ( )* " % &

" '"

(

Who Should Read This Book? # * '" #

$ '

" # "

# $* " $ ( '

)* * % &

*

$ $ "

) " . " " $ . " )

, . * '" " " ( '" " ** "

" *

)# ' ## "

' *(

#

% & "

.

(

% &

$

#

.

."

' )

"

)* #

"

( $

)

' . " ## " . . " " ! '" " # " % & #' ( " % & ) # % & " $ " *# .# ' ( ' ' ( " " " $ # ' % & '" # ' # ( ) ' " ( ' ## " ( # " # ' $ *# " " *# $0 * + ' * C+, D * " $ *# " * *# " # " * ) " # % & '" " # " " # " . " " $. ( )* * . ' " '" . " $ " *# ). # " * ) % & " *# *

How This Book Is Organized )

'

* N

.< # $* •

# ' *#



.

4.
1 " " ' $ " % & '" . " ' & $ % & B " " >1 " " ' $" *
* * * ". . ( ) ( * # " $ # " * TA (* " $ # '" T> # " * " " # " "$. # " * * ' #

" # *T A ( * " " # $ * * '"

Enterprise Segmentation > $

• • •

* ( * $# B

#

@ @ '@

/

$ !'

7

# ' '" * " *# *

; -)

# '

# " # ""

/ ( " #

) ".

' * '"

E% +

*

'

*

&

. * ' " *# "

## " B

2 *

$

(

" "

'"

.

" "

*

/

2

-

( )T "

'

" (

*# .

@

)

( . " B&1 < ( '" .( ( " " # /

) '9

[View full size image]

"

"

.B

< # (

#

# ##

$.

*

* "" "" ,

" ** " "

"

" ) $

## " * ( ) $ # # $ "

*

# ' " " & $ 4 .( " ) # * # # ( ) ' # # ( 2 * ' " ( " D # " ( )( " #

" *# / (

" ( " (

$ *

" & $

( $

&

4 & $

) ( )

.

. #

'

*

) ' $ " *# $ # $ & $ C & $ 4 * $# ( & $ * ( " ' $( C ' & $ 4 ( "

( *

) D" "

.( '

*

"

Central Services with an Enterprise Campus ,

* *# # " # ( ' $B 2 '" # ' " B . $ # "" B . " " *# ( # "" * " *# " ** ( ## " " # ' ( ) $ B

" " *

2 ( $ '" #

'" '

$ #

& $ "

% &

B "

" *# $ '

$

"

$# " * * # ' " B

" *# . " ** # * . -

B "

#

" '

( 2

" ( #

'

B "

$

(

" *

G

" *#

* .

"

"

"

.

2

" " "

$ '" B B&1 . ( " # *

2 '"

. " .

* ##

C B

$

" **

" (

"* 2 ( ( B D.

" (

( " ( " "

. '"

$ #

" (

D

)

$# " 2 # " " B C - ' ' (

Subscribing to a Managed Layer 3 MPLS VPN Service ,

*

(

" '"

* (

& $ " * '" # ' . # ( # " % & # " "

( ) $ # " $ ." " " . " * . " # # " * " " " " " ** " ( # $T % " C+ D. 7 J+ . , /. J . " # 7 J+ . # "

*

" * '" # ' . " * ## " /

"

#

#

"

.

$.

*

'" '

( " * " #

"

"

-

* "

#

"

* " > * " >

##

$ *

CJ+7D

* *

*

/

'

'" # " # '" # ' " + ## $ ## 7 /

"

*

'"

.

" "

B

"

"

". * " "

. $

% & # "

.

'

##

( • • •

+ > (

#

( (

• • • • •

>

* "

#

&1 ). I .* # " TA ("

.

* ) $" '

## '" # "( "

# ) "

$ ' ' $ % &

' (

. *

' #

" )

" ) #*

(

(

*# * * 0 ( ) % & # % & " % & ( " ' )T 1 $. ( " T> " * " * ' T, ( '" T * # " &1 T '" #

'

"

" #

. $

")

(

" " ## # $* & $ C J B D '" T > " " '" # ' ## " " # ## " . " K .* " . '" " # T '" ' * " # T # " ' * ) # # $ # % # " " $. ( '" # ' *# * < < &1 T '" # ' " ( '" T 1 *# # $* '" # ' 0 " * " 2 & $ % & B * '" T # ' $ # ' " # " '" # $* T

• • • • • • • • •

• •

• • • • • • • •

>

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

#

'

"

" % &

, #

"

'" #

"

' '

.$ *

-

* # " * 0 ## "

(

## " ( # B T1 # " (& $ % # " ( '" # ' * 1 . '" # ' ' $ ( * " " * T ! . $ A " $ 1"" * " A 11 ( " A 11 " " " ' # # ( " " * ' *# " " ( " * $ * * " # "

" *

(

/ $ &

.

.

T

T

'" *# . # " ' & $ B '"

$ *# . $ 1" CA 11D ( N A 11 2 $ .

"

(

* # '

$ "

A 11 C7 D.

*

#

# * -

)

2 $.

"

1 '" # ' # ' " *# ( T
1 " "$

) " ( '" .

Chapter 2. The Scope of Service Types "

# '" ' # ' ' ' "" G ' '" . " * * '" . ( ## " $ " # " ' * '" " # :. 1 D " * " # (

( "" " *# *

"

$0 " "

$* *

" #

J

% &

B

#

'

" 7

" # " ' ( $" ' '

# .

$ $ # * (

(

* ) *

'" 4G & $ G . ' * *# . # * & $ .
$ ' " C7> D # # ( '" G 7 + $ ' " C7+ D # * # '" ' $ " ' $( ( 7 1"" & $ '" / 4 # " 7+ . ( " * $ * / * + $ / * + $( ) # "# # * ' " " C B D " " " .( # ( " + ., / * + $ ( ) '" ( " " # # $ " ( - ' 7+ B&1 + ( '" # ' # " B&1 * / * + $ )" " C & D. ( " $ ' # # " " " * # * - #* C 7D " # ' $ '" # ' ( " " *# * $ / * + $ 1 %

# " # " # $ '" # '

'

" " *# . 7

; -)

1*

#

* ( (

( "

* " B&1 " " # 7

. " " * * 1

C /

* +

%+ *

# 7

D 1 %"

$

'" # ' 1"" & $ * 7 & / 4 4 " ( * ' * # C # $ " " " 7 . '" # " " (

'"

( *# *

%+ *

$

, ' 0

7

' + C7 +D. ( " '" " 7+ 7 + # ' ** 2 7 + '" " * 0 .( " " %D # " " ' $ C+ +D . " * # " " # # # # A# '

# '

; -)

)

,

-

7

% # ' " C7% D " ** $ ' # ' &1 ' " CB & D '" ( 7 + $% # ' " C7+% D # ' * " # $. ) 7> 7 +. ( / 4 7% '" ( 7 1"" & $ '" " ** '" # $* @ $ 7+% " $ $" " ' $ & $ 4 '" # ' ( ) " * %1 . " * B&1 . 7" '" # " # "" * %1 >1 * ( ) ' 7 ' H. ( H" / * + $ &. *#

; -)

E% + *

)' &

[View full size image]

/

4 :

; -)

**

2

%+ *

'" "

2

@ F

"

< 0

E3

[View full size image]

0

0

Next-Generation Network Overview and Interworking Functions $. '" # ' ' # $ &4B ( " ## * # '" < $ *" '" # $* " " ./ * + $ * . " # $ * $ / * + $B " " ' " " * " * $ 1 $# " / * + $ # " $ " # * " / * " G ( ' . " * '" C # ' I% & (

%

# ) . *# " ' '" ./ * + $ # ( " # " # D"

'" # ' " " / " #

)

"

; -)

$

!

=3

' / * + $ 1 %. ( ) " # < * # ' ( ( " # " $. * * " "

## 4 ;

$ **

( 8

"

"

"$. "

.

( "$. '

# $

'

'"

"

'" '" . '" ##

' 2

"

#

)&&

- 3''

< J 7D > ) J # # ( * " * 7 " ( " # * & $ 4 " # . " $ " " ( 7 # ' C 7D & +$ , > 1 # ( $# # ( . # "

# * & $ 4 " # ( ) " * " # * (

* ' ' '

C )

) D

* ) * " *

# " "

# )

( ( "

"

"$ 1 % ( " * " "

)C *

( • • •

'

" $#

# "$

"

* ( " . # " 1 %. / * + $. 7 * $# " # '

.

• • •

" **

)

$

#

" * 1

. #

" "

"

& $ ( ) #

'" * "

#

4

#

$"

1 % / * + $ / * + $ 7 1 % 7 # $*

*

"

" '

" ## *

$ (

" *

/

*# . " " " # / * + ' % & * # ' "" . * N $ " # # "

# 8 # #

" "

H ' % & & $ 4B ' % & # $ " '" " # ' " " A ( ' .& $ 4B ' ( ' ## "" # ) '" $ / * + $ '" % & * , * " #" $ ( $# '" . B "$ ' " . / . " "* $

"* " "

##

"$.

*

"

' & $ 4% & B $ ' * & $ 4 *# '" # " . /+. 1 %. H4; ( ' " *

/

* +

(. "$ " " 0 & $ 41 % ") '" # ' ' " " $* ") $ . '" # ' 0 ( " 1 %. / * + $. 7 . &* " ( ) * & $ 4" " * . " * ) +

"

5) & " ' $ # T

6 "

> '

* " # % & # # ( "

$

!# # '



( (

&4B

$ &4B

(

• •

)D

1 % ' % & C1 % % & D / * + $ ' % & C/+ % & D 7 ' % & C7 % & D

1 $ * '" " ' "

"

( *

$

1 %

' ## *1 % " ' $ * " " ' $ # " "

'"

)

'" # ' - #*

I% & "

'

*

,

• •

& # ' + * 7 # " #

• " #

:

A (* " ( * # ' T ' ' 0% $ '" # ' ( '" . * * ( ) ' % $ '" # ' ) ' $ % & ' * # '" ' * ' $ * 7 '" '6 ) 5) & G +H .# ' .* * . ## # . " " ' " " ' $"

$

6

"

"

$

& $

4B

"

'" *

'" .

"

7 " "

'

% &

Layer 3 Services ** • • • • • •

& $

% &

& $

% &

B

'"

"

(

B

"

'"

K

7 + * B

'" "

"

"" '"

"

#

"

"

1B "

7 "B

( B "

*#

$. (

'"

& $

% &

B

'" " # ' N " " . & $ % & B ' " * " * & $ 4 ' $ " # # $ '" 1

$. '"

"

B *

" # ( " '" .

" **

" "B 2

( .& $

'

"

C' D# ' $" " ' $( *# ' " $ # $ $ '" # ' $ $" " ' $ ## # $* I' " I'

'" "

'

2

.

"

"

#

B & $ " # $ '" "

" J B '

(

'"

$ .& $ 4 '"

" ## " '" % & " *

% & & $ 4

)

& $ "

$

' B . & $ '" 4 '"

' # # ) '

"

*

* " * " $ "

( #

" * " * " " " " B 888 7 # # ' ## "

'

.$ & $ # " ,D '" # ' . " I% & ( ) # '" .' " '

# * # I,# '" .*

.( "

"

#

'

"

* $ & $ % & " * '" " # " * & $ •

. # '" $

.

#

& $ 4B " # " " $. # ") ( & $ * ' " * *

") & $ C &D # . * * ) * "" ' . # 9

; -)

*

%A

& $

% & B " . " & $ "" B ' > / $ C> / D " ( # $ * ( B ' "" &" * * # / 4 9 #" ." . & + * ""

,

3

< '

[View full size image]

1

( .

3.

% &

"

"$

# ' # $# " # B " "

; -)

%

" (

)

). "

" $ /

A66

'" ' " 4 5

3

[View full size image]

" $# (

*

'"

&

@

/

$. '" # ' '" ' '" ( *# "

#

" * " " ") # & $ % & B " $ * C *# . ") # "$D ' & / " # 1 $. " * ") # ( )# * " $ * ") # ( #

; -)

%

2

#)&

,

[View full size image]

" "

# ## # # ' $ *

4 6# ("

'" -

'

A&

*

Value-Added Services B

.( . " *# '" '" # ' $ " ' & $ % & B " $ 1 $. * " $ ( '" . "" .B ( ' " B . ' '" " # $ & $ % & B " $ ## $ * ' # ' '" " ' ' # # $ '" & $ % & B " $ 1 '" # ' " *# * * " '" . " B ( A + IB++ ' "$. B ( 1 . * " B / " "" . ( " 7 ( ) . " . * $ '" # ' $ # / 4 8 ( *# " "" '"

; -)

%

)

(

3

[View full size image]

'" C "

" D#

'" ") . '" C D( " '" '

'" # '

' " #

" " B

' . !+& * 1 & $

# * . *# % &

B

"

$

; -)

(

/

4

%(

@

'

84

-< .

* [View full size image]

'

"

; -)

"

B " '" # '

%(

@

*# * *

* @ 2 -


"

# .

$# '" D

# 2

" '

'" #

/

/ * + $ * + $*

B C& $ 4 & $ 4 B '" # ' # $. . '" '

B

# -

* +

"

$

(

)

$C

* '" ) '" .( " " * ( ( # " * ' ' B " *# $ B " *# $. * . ## "

* ) '" # '

D '" * 7

* " *

* & $ ' '" . # $T '" # ' * # ' *# . B ( ; ( * # 2 B " ' CB # ' " B > ( $ . '" # ' * # ' '" # ' " 1 . " # ' B * " . " ' " $# " * B ( ' '" *

/

'" ./ * + $ & $ 4" "( * ) " * ( *# * ( " # ' # ' # # " B * '" # ' G # # B # $ * C 7D .$ ' " CK D # " . 2 / '" # ' .& $ 4' " " $

#

" *

" #

$6 X

* 4 "

* "

$. " / * + $. '" # ' * B * 44; B D. '" # ' * # $ '" # ' H B * " " * # " * "" # '" # ' " $ '" " " . % & " " " *

Why MPLS? (High-Level Detail) %

#

## "

"

( " ( % &

" # ")

. " * % & $

# % & ( ) .

/7 * # % " * ## *

" # #

" " . # ") ( " " " # G . # ") ( # ( ).

*# * * " # % & * &+ & * /7

1 & " * 2

* " /7 ( "

# ") & .

7 / +/ . 1 % & * # " " # " - ' " " C/7 D $. . $ ( ) C& +D ( "

( " " /7 , 1 /7 . # ") (

( .

#

& + ( "

*

"

$ " ## % &

"

; -)

# ")

. & " > " " *# 1 % & $

E

%

'4

" " & + ( # ") & + % &

* 7 " & + $2 # * & + " & + # # . ( & % & ' & $ 4 / 4 #" ## "

% &

6

[View full size image]

*

#

. .

$ #'

* '

# ## ( "

*

" * $ # ") # ( " % &

$

( " "

'

" "

#

/7 *# # ")

" *# *

"

" ##

*

" # & & # & $ " " " ) $ . + $. 1 % B . ' " " # ") . " " 1% ' " " CB D " / 7 " . # C *D # " . * * * 2 ( # " * " ( ) $ # ** 2 * " * /

* # ")

(

; -)

E E%

"

7

6 4 . " . " " # " # CB D ' . ./ . " ( ) & +# * " # ") " *

A&

[View full size image]

* * '

# (

" *

% &

./

#

"

)

1 # #

'

$*

. "

( " " # $ " $% & "

• •

I " 2!

& @ /



• •

I

#

# " 1 '

" & $ -

" # ")

#

" $

% & *

"

# *D.

" (

'

#

# ") *

"

) $

( #

# # ")

$

D # *

( ## *# .

C **

" # $ # # * ## " 7 *# ## " (

"

*# * $ '" * " ( ( J ( $ " C J D . '" # ' " J " ( '" # ' B '" "

66 " ' . " ' # $ ' # $ # )' ) " # " " /7 # " " ) " " " / * + $. 1 %. 7 " "" # " . 1 ( ) . *# *

" -

C *

#

"

(

. #

# %

G

"

'

#

* " (

/7 )( "

"

* " ( $# " C %D ' 4

* " *

(

"

" %

/7 .A .

' ' "$ ( ) '" . & ' & ) CA & D. ( )' ' $ "" # ' " ** % & " * ' ' * *



!

'9 $

*# * " " # . # " $ ( 1

' "

'

' $2

# "

* *# )

< < * C $ ## # *

% & " # " $ & C $ " " *

* "

*

) # " $ # * "

J% & *

H

' (. % & ( ## * ## . " * # * ) " $ # *2 " * ' (

* # "

*

" $ . " " " ( ) ,# " " * "# * " J% & # $* ) " # " $# ' * " " ' C # ' D

G! (

$ /

" "

$ # " $

* "* #

' (

( ) " 1 $ ## $ * " .

"

)

# " " " # * ( ' " # " $ ( ) " . * # " . * * ( ) " *# # .( * $ * ' ( * ( ( ) # D ) ( . ' ( .$ " " *# . $ " ' " # " $

# " *# "

' .(

$ # * '

*# .

+ $ #

" ' $

# . (

$ "

"

)* #

) (

" "

" D * *

#

" $

" $

" (

MPLS and Quality of Service /

K . '" " # " ) #

' *#

$ 1 "$ (

& ) $ * * • •

( "

'" * C &D " + ' C 7 / +/ 44

+ " #

"

) C' + B D ' +( * ,

"

'D # " ( " ' " CJ D " C+ B D $. $ D - ' '" $ ( ) A # ") "" $ * "# * * * $ # ") " " " *# " ( " . ## " ## $ ( )( * " $ # * < )$ ") < " $ " ( ) (# " $ ( # * " * *# * &

0 5) ) " * " 7 -* 6 5) ) " # " $ ( " " ( '" " " ## # * " $

'

C

( -

.

#

$-

G7;IH ' . ( ( # # ( .$

,

" '

$ (

&

*

( $ ) ' "" ' # ")

$ #

" '

* # ' "

# * ' ( $ & $ *# * *# # " ") C # ' $ " D D' " " ' "" / ## " ' " ' " '" " " ( (# ' # "

$.

* "

# " '

" ## "

( " ( ) * # $ . "" " .( " ( '" # ' "$. '" # ' " ) . ' .% & # # ( & /7 ( * #

$

*# * ' " " ' # ") ( ). * * ## " * ) ( # $ %B ## ## " $ .+ $ . K ") * B

( #

% & ' '" #

"

# ' " # $ $ '" # * . " " . *

" " # # $' " ' " B. > ( %

'" # ' # $ & $ 4B " % ( " * " 1 % " $ * & $ 4 '" . " / * + $. 1 %. .A & . 7 / ./ + # ' ( ) " # " A / $. J% & " # $ $ 2 ( * ( ) '" " * # " . " # " * ( # ( " ) $ ' J% & *# * * " ( J% & " ") * . " J% & ( ) .

** # $'

$. % &

*

'"

; -)

E

%

"

$ '" " "

'" # ' *# * #" /

; )

6

" # '" 9

@ ')

3

$

' '

# $

MPLS Technology Details "

*

(% & " ' " / 5 " " " *# " & $ '" G& $ 4B GB ' * " J% & G ) $" # " . " C& D. J . + B . . " ' # ' $ " # . ) $ # ( # " * C # D " # # * ## " ' # * & $ '"

B

'

## "



"

*# *

I *# * $ '" .( " " 0 E@ ! J '" # " " ( J # " " 1 66 -! ( ) # " $ " 2 )' ) ( # ' 4 %#

• •

• •

0

"

@ $ # "

" " %

$

"

& $ B . '9.

; -)

(

'

.* ( " . " J% &

E

%3

'" * " & ( # ' 0 '" # /7

" (

(

)(

'

"

*

/

"

/7 "

"

" (

)

G /7

4" " ' % & . " ** & $ 4B . . " & $ 4B '"

$ & $ "

4

. $

.

'"

"

"

)

D

"

+ B # *2

"

"

*

* .

,

& $ " .K

% &

/7 "

* ") *

#* ' " $# . " #" % & ' " G " G &1 ' " CB & DG '9. & " '" " 1 * % & " " # ") * C " # # $ "

6

3

[View full size image]

#

.

& $

'" 4B

.

Layer 3 VPNs 1' # ' " ( 1B ' * # ' # " # " B * N " " # " . ' * # ") .N

( (

)" ( ) ( 2 . ' # "$ " " . . " $ " ' 2 " ( ) # " ( 1 '" " ' " *# # " . B " " * " $ # " *# $. '" # ' " ( " # # " * &1 *# . ( ) ' $C * . # . D. * * * * ( . . * * * "$ (

!

" ( $# "

* * "

" ' $

"

% & "

"

$

' " '"

" '

" " " $*

'

$* . ( ' . 2 ' " " # *2 . ' $. *# * " # CJ+7D # " ( )" " *#

; -)

'

E

%

.# '

'

(

) ( # $ $ * * ' $ $ 1 % '" .( " $ ' & $ 4 " # * " $# " $ # *2 * * " " N " " " "

*

# "

1

"

-

(

/

* + ") ' " ( ") . " . * & $ $

" '

' *#

$*

' 0

(

'

& $

'

/

6

" * ;)''0

$ '

*

# '

0

@

Peer-to-Peer Model #

#

# " * '

* *

( * .

)

" " * * -

'" * "

B

." * # ' " " ( '" # ' " *# " * * # ' # * ". # * ' '" # ' 0 J # " # "

'" ' % & " " ** * . % & B # & $ * # " J # B " % & B " " C 7D # ' C 7D # ' C D ' ) (

"

' $* ' " * $ " " * 0 - #* * ## * 7 " " % ' . 2 # * * * * " * B ( " *# (

#

" * "

" 1 "

" . B '" # '

* B

1

" 0 *

* ")

" * # " " $ # " "

' B

" " " $



* B " G " *

!'

' "

7# B

7*

% &

)

-

"

; -)

6

* B D

B

*#

E

%

* " *

'" # )

"" @ "

(

' "



* "

0

"

% &

7.

$

B

#

'

0

( B

C

D

7

': *# " " ( B+/ * #

(

*#

#

# ' " " $"

G@,;H * ' *

&'

"

C 7

/

#"

'

8

' "

"

## D

C

" 1

'

" " /

B $. ' " *C $ &

)

$. $ ' #

" (

* 7

"

" (

C .0 % & 7

(

B ##

% &

D .

1" (

"B # $ G " * $

"

-

7 "

## $

"

'" 1 D

.

* # # ) "

1 4. ? J "

.B

" " * # D# "

# 7

+ #

. "

.

.

/ *# . $ " C ' ## * .( " ( " * ( ) "

7

*# * B+/

%

& "

7 B&1

" ) "

"

" " # " *

$

7 1

" %

'

&

$" B+/

B+/

"

##

#

7

#

B+/ " "

0

2

>

# $

% "

* " " "

" "

/

"

:

; -)

"

(

E

&

*#

%

)'

B+/ #

* " B+/. "

" " *# '

#

"

K

%

B+/

# $*

@,;8@,;

+3

*

)

< A&

'

' [View full size image]

>

' B "

" > ##

'

"

.(

##

& $

#

"

"

'

*# B+/0

% &

" % & B *# * 1 " " . # " " $

B

J

$#

#

. "

" *

#

#

*

Carrier Supporting Carrier and Inter-Provider Autonomous Systems % & B " " " " 1 / *# . B " " ' $ % & B ( B * # * " B * ") * * # ' B ** 2 1 '" # *

; -)

E

%(

*# * * '" # ' # # ' 0% & ( # ' '" " $ / ' #

3

* ''

[View full size image]

; -)

E

%

)

0

6(

[View full size image]

3

A&

' " # "

$

'" #

. .

. ") #

-

*# $ ' ;

9

" ")

.( % &

* (

" )

*# *

'"

Traffic Engineering " ' ( ) ( "

# . #

) . *

• • • • •

( "

' $

( 7 "

( . 2 #

+ +

# (


D ( #

" (

#

( C 7D $#


2

# ") &4 B ( J # &4 B > ) J # >7 > ) . # . " # # # " I# ( " # ") ( ). ( ) J # " " ' $ # '

" " ( ' & $ 4" " " ( • • • • • •

"

* " *

C 7D " "

J

# &4B #

&4

# ' C1 D 1 1 "

C 7D $

7 7 B&1 / * + $ & 1 % B IB A

& '

" C D" & ) CA & D )

"

# $ "

>7 (

"

• •

") ' * ' I7 " "

. " * '

, 7 C , D ) % # C %D "

" " " "

7

"

( & ) L

#

(

C >D " " " " " ' "

>

& $ 4 ( ( )C D * " * " ( .

7

'"

*

'

7

#

.

(

#

*

* " # * 7

# ( " * "

"

/

( 7 " " ) " * % . & $ 4 * .( ( # ( # I% & ( ) &4 # " " # , $ ( * " #

( # # ") " (

'"

.

% & ")

& $ % &

$" ( 74 7

4B & $

.

I7 I

: 4

*

.

$#

( " * " " / : ( & $ 4 . " * " * . " ' ' # ( . # # *

## * ## * " " 74 * 4B

#

$ " # # ") ( "

* % & . ( " #

1

1 * %

C&

D

Introducing AToM 1

%

1 $ # * ' * " * 1 % " " * * % > ( " # * #

' % & % & ( "

$

& " % . * & ' * / * + $

* )

* " * % & ") & $ $ * % ' #*

*

$

)

" # '

4B $ 1

1

%

& % &

%" *

"

(

" .( & ' ** " . ". ' $ / * + $ '" " * I% & ( ) # $* % " .( ) ( " . # $# ' * " % & " # $# ( * * # N ". * ( " ( * ( ' 1 % 11&; * " % & ( ) * " " # / * + $ ' % & . 1 % 11&; ' % & " * # ( 1 % ' % & " # $ # *# 2 " " # ' & $ 4 * & $ 4 # . " 7 B&1 . 1 % " . * . A & ' & ) CA & D * * ) *. ( # * ." " $1 % 1 7 / ( # . " ' ( $ "" # " " * " () ( * # ( % & ( ) # * " * ) ( * & " %

% ' # (

( $ ( " ' " CB > D $ ' # " * # - ' " C ) ) D # # $# & $ 4 * *

*$ ' ( $# ' # ' &1 # ( " " * B > " $ # $# . ( ) * # $#

*

/ : 4. $ " '" ' # ' ' " CB & D B > " " * '" C D . # ' ' ' * # $# " C $ $D " 7

Pseudowire Systems Architecture &

" /

" : :

* +

*# $B

/

* + ' ( )

$ ' *

% & "

(

(

)

* '

B

(

/

; -)

%;

, ' 0

1

*

'A

"

[View full size image]

1 &

* 4

74 4 (

#

' &

)

% & 8 74. 74 ' * 7 74 " # #( &

(

).

J & 74. ' # ; .8 . , ( " #

&

(" &

(

" * 4

& &

4

,

1

* 7 #

/

" " $ 4 4.

&

% & ;

( " # " ' $ ,

.

74 ' ' % &

: : "

7 .

(

* (

&

"

-

# 4 # ,

74.

"

&

" 4

&

(

.

4

#

(

4.

74 "

-

"

(

" #

(

" ( 7 # *

# 74

( " * 7 " * 7

4

!# #

" ( " (

( #

&

&

4

.

"

4

&

4 4.

"

7 . "

7 & (

74 - '

#

" " "

C/7 D

( #

(

# B $# . 74

# ( )

( ( # ( ' $) ( ( " " ". $ " .

(

" J & # ") (

#

G

4

#

(

* $

( # 74 ' # $

7 ) "

4 (

(

7 # # : : 7 74 4 ( $) ( % & & A ( ' .( &4 '" . # $ " " /

$

Packet Forwarding >

#

" *# . * " ( / * + $ * ( 7 1 * " ' & " ' . ## " ( C+ 7 / +/ 86;. +/ : 6;. +/ :::5. +/ :::6 D " ( : $ " $ * . &4 . " * * " ' ## " " / * + $. " ( " ( / * + $ ( # " " " C/7 D. ")( # " " " C 7 D. " C 7D. " ** I # C I+D # ( *# G " " '

* $. * " ' & 4. 4 *# * ( % & # ") D ( 74 J & ( 74 ; $ 7 ( *# ; % & # ") ( ( ." . ( % & * 4 & $ ( ## ; ( 8 4 * ( " ' # $ 74. ( " # * 4. ( , # . 4 # ( # ( # ") 74 74 ) # # ( . " 2 * " & 4 . * ' . " * $ . ( # $ / * + $ & 4 ( * $ & 4 4. 74 " 2 4 ( ## # $ . * # .& $ 4 * " ( " # ") ( ) C

" B&1 A &

C

" # " ( " ) .1 %B

* &4 " " # ") " ,1%

# # "

$ # IB

# (

.

$# . *

B&1 1 % 11&;

. # " 2 . * # #

" D.

7 .

*

*

" " . * * ## # 4. < ( )%

* " C,1%D ( * * '

* ,1% " %
B & 7 $# * $# " $ * B&1 # * # B . " ( " 7 " " " *# " ,1% * * ##

" " * .

") "

"). $

") . $ .

)

#

## " * * * ")

$ A ( ' . *

* . (

Benefits of L2VPNs '

& $

" •



'

I% &

"

'

.

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



4B (











# * )' IA & ' % & " ") " * * # # " * # ( ) *# . # ' 1 " " ") & " * * , " , " " # $ * # ' # ' " * - #* * # # . $ " # " $ ' " $ ") (" " * * " # , & -! ( ) ' " # $. * # " '" " # ' / *# . # ' 7 # / * + $ ( ) # " # $ " " * '" # ' ( '" # ' / * + $ 1 %" " ( # ' # $ " $ $ " " ( $# " ' # ' . ( ( '" # ' 7* ' ' ) # ! 1 %. # # ) " 1 % / * + $ ( ) ## " " " " " C ,D ' " ) # ' * . H .# ' $" 1 % '" ." ( " " " ' ( ). ( " # ' & $ & $ 4" # $ 1 & 3 7 " " ' $ # # * # B & ( '" # ' & $ 47 '" * " " # 1 ' $. # " # $ $7 " " ' $ " * " ' ( # - * * -* & & # 1 $& $ 4 ( )" # ' $ " ( , :6 * ' ( " $ / *# . / * + $ ( ) ( , :6 " ( . " $ 1 % , 84 " ( ' * $' * * * # 7 J # > & $ 4" " . " ) * ( " $ " ( 7 ! I% & ( ). ( " ( ) " # , 596 * & $ 4 & $ "" $

2 " / "

& $ 4B ' % & " * * ' " $ " ' ") , ( . * ( ) * ( " *# " * > '" # ' ( )C J D & $ ' " . &4B " * " " '" # . I% & # ' " '

# * # ' & $ 4 # "

' # # "

'" ' J

.

Inter-AS L2VPNs >

# '" # # 1 G '" # * "

' ( " ' *

. "

( " 7 * 1 " (

#

"

( 1 *

( 1

+4

"

$

(

* 7

* #

*. " +

& *

$

( " $

# #

$( "

$ *

' " * *# .

1 '

*

(

"

/

%(

7 " $ ' * " ( 7 * ' 7 . &

7 #

4.

; -)

" "

L

* (

'

#

#

74.

#

"" "

( 1

+ . ( "

. $

1

/ (

# (

: ;

3

)

"

[View full size image]

# # *

* & $ ( ( (

" 4" # *

1

"

( $ #

) " #

(

+

*

# " "

" *# $( $ * # '

" 1 + # " ' &1 (

" $

*

Supported IETF Standards " 0

*# * 2 J #. ( &4B > ) J ( 7 / • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

+/ +/

1

1 %

#

%

B & B &

7 / +/

#

" ' $ " *

7 / ") # " $

#

7 / >7 > ) $ ##

)

8 9. 7 D< :::6. 7 1 " " < +/ : 85. 7 D< 7 / * + * $< D ,1% % % ##
#

#

*

'

' B

J

% & $ B *

7

*. " I * " # '

#

/ .$

* % " $ B ': # ( ) $ " $ * " &+ # # B+/ ( * # ( " # (

7

':

B # # * "

"

* "

: 9:

"

'

'

( " ' $( B

" #

+

*

*

#

6

1

(

-

': #

-

'

$

. $ . $'

B

" 7 / +/

B

.B

$ & B " *

FB -

C+ D * # )

B +

*

# " J D J " ** $ J # .# " ' # "

$

"

'

# *

"

J C% C &+ D 1 " '

7

$ $

$

) # ")

( "

# (

#

" $# A ( ' . # ## " . " # " * " # ' " # "$ " B * "

/

#

# #

" . " -

"

&

.

" -

* * " # * # (

# #

J

$

"

(

' J

"

$

7 .

/

;

Forwarding Packets Through the Network Core 1

C(

. " * J " C J D 7 *# * " C+ "

7

* #* J "

D 1 D.

( $

B

# 7

A ( ' "

.

' ,

# ") $ J

/. #

. 7 J+ . " . "

( $

+ &

+ B "

7 $

7 (

( " # ") D

B

C B

*

#

G

( # ")

C& (

$

"

(

* & ") + * *

* B ")

"

& #

*

*

D

#

(

'

# *

' ' # ") % &

7

*

"

7 # $ # ") B

"

J

.

B

Packet Flow Through the Network #

(

# ")

"

; -)

$.

/

%.

'

; 4

*

[View full size image]

7

B

1 ' 7 C 7

"

( ) ( (

"

7

#

# # ") *( " B

& J (

*D # B + / , # ( " "

"

(

7 D*

*

. # ")

#(

* # ")

7

7 ( ( # ") 7 7 ( D # ") #

# ") 7 > " ' . 7 (* *# ( )" # ")

B

7 ( J . "

(

* '" . 7 # # ) # B

&

" 7 # J .

* ' " * * '

$

"

7 ( # ( 7 $ 7' 7 B " ' # ") . 7 *# B .( " B # ") ( B 7 *# ( C B C 7 * J ( * & ** * ## #* . ) # B . (

* > "

"

7

( ( # $# " ' " * "" J J & * " ' $ J " A ( ' . & ( " ' $ J " . J ( " ' J " C J #" D # ' * ' B * # ' " ( ) > ' " ' " ( " " # .< 1 < &1

Corporate Intranet % &

B

( $ "

#

" #

"

' ( "

# "

* ( ) % & ( ( •

) " ##

)*

* * * * ( *

• • " •

# '

#

# ( ) C>1 D $ . $" ' ' &" " " ' $ * # # " . ' ' " % & B >1 . * * (

( )* " # ## # $# . )7 . / * + $. C D. A & ' CA & D. ") ' , 7 C , D. 1 % # * # B&1 &1 % & B 7 # * # * % & # " " % & B # $ *" # " " 7 7 # " # " # " " * # # ' ( ) % & B " * " $ '

# *

# * $ $

K * $ * *

• • % &

(

# ' " *

"

% &

• • • •

• •

" B

"

" ) C&1 D ") ' * ( " * #

(

B

"

"

#

' ' " CK

"

$

$

#

'

$

-

*

7 B

* B

% &

D* ## ( % & B # $ " $" " " ' $ " $ # " (# # ) B

# $" # #

" & )

$*

.

"

" ' $

"

( • • • •





% & B&1 + *

##

) & B B+/ % & B 7 7 "" " * ## % & B $ * " " "" " " $ 7 " " " * # B . " " " B " " * # C 7D B 1 $ " $ *" # " C, /. . + '4. J . 7 J+ D " ( 7 7 " . " 1 B ## C D. " " B ( ) # * # # # ' ( ) / 1 .# 7 / +/ : 9: " 7 $ ) ( * " B .$ "

* ##

"

• •

"

% & B " " ( B . ' . B # ( ) 7 " '" ( ( ) * $ " B I * 7 " ## * B A " . " $ *# $ " * '" $* B ': ' * ' J ## # .$ " $ * # ) B # " " * " &I" $ * ## * ## # $ B+/ * " . " B&1 B+/ * ## B+/ ( 111

.

Corporate Extranet 1 *# * " # $ ( " *# * " $ / *# . * * * ( " # " ** " ( " " ** " " . " " * * " " ** - ") $ " ' $( . ## . * " " 1 * ( " *# * " $ > "

% &

B

. " ** (

"

$

$ &

"

" 0

##

4 I 9 I 9 I 9 1

"

$

")

I 9 * $# " # ' # " * . $

" '

""

/

"" I 9

B+/.

# *

*

*

"

# ") ) ((

+ # ' " "

*

" .

/

' " " *# *

(

0 # ")

B+/G

") 4 I 9

" "

( " N

; -)

$ $#

E% (

*#

B+/

' *

&

% & (

*#

-, )

[View full size image]

" *# " ' $

( "

( ) I 9. 7 ( 4 I 9 ##

. # ")

; *# .

$

"

B

"

@,;

/ * ' * #

$ 0

.$ 7

Internet Access 1 *# '" " * ' ( $ ( " # ' " * " " " * (B "" ( $ % & B " * * * ' ( # & /

$ ; :

( $ "" $"

" ; ;D

; -)

B

"" ""

B ( ( . ( ( $ " " ' $

" "

B

"

( $ 2 *

( $

3

# B

'" ( $G * ' '"

GA&

%(

3

GA&

C

H

[View full size image]

E

7 " '

[View full size image]

; -)

B *# B

.

( $

' * "

% &

'

'

(

%;

( #

H

• • • •

,# ,# ,# ,#

&

" 4

#

" : %

"

B

""

7

B ")

7 "

'"

""

"

Dedicated Per-VPN Internet Access 1

(

/

; :. * B

"" ' ' ( ) * " ( ( $ " " ' $ B " ## $ $ B " * # $ " " " ' $ *# . B # ' # " ' " B # ' ( ) B

B

" "

#

*

" B

"

'" 1

# " $ "

"

" " ' $

B " " ' $. * $# ' . * " " # # '

*

Shared PEInternet and VPN *

" " " "

" ' $ B "

$ " .

"

*#

7 B+/. *

)"

"

7 B

.

( $" B C &

B " D

* I

$

"

*

B

" 1 I "

" (

"

1 B (

# & .B . *# * 7 ( $ D B . "

CAK '

" ' $ ## * " $. 7 . ( " $ #

' $

"

# B

"

.

"

(

* (

"

" "

"

7

'

7 " B #

* -

" " $#

" B

7(

' " ' $

"

7

* *

"

C D (

#

"

$

"

'

" " " ( $

7

' "

( $

*# . " " ' $ A ( ' . # " ' *

$ " " " '

( B

( *# * 7

"

"

"

#

$(

Dedicated PEShared Backbone # " #

B

' " * ") " ' $ " ( B $

" &

B ""

" ' $( "

" $

7 " # $ B A ( ' . $ ( # C& D * # B * . " J ( #

(

" ' $# ' *2 ( " *# " " ' $ / * B " * B

* "

"

7"

" 7*

$

#

*

" 7

. $

7" $ ) " ' ( * ( )" ( # & * # " " $ B 7 & 7 " ( )" *# $ J " " ' $ 7 7

"

* "

* B

$

B

"

7* * ' (. " $* # " "

" #

A ( '

. "

*

Managed Central ServiceShared Internet Access * * ) (

& ( 7"

) B+/

' '"

( B+/ "

* # * ( $I 7 *

B+/ ( " $ C 1 D.

'" *"A ( .

*

' 1

B *

(

$B * I 9

'

"" C A D. # C, 1 D ( D " B+/ "

'" *

#

#

# ' # " B " B 1

* C 1 ., 1 . (

# " # " C $ I 9

* D. B+/

B

(

1 . .

7" * " "

" 1

(

* # .# '

* "" # '

'" " * ( ) ' B "

( $ ( $ 7" $ *

"

'

" ' $ B " # ' ( ( $ "

B $

"

" #

$

"

(

*

). ? J " # .

' " * $ # "$ "

"

)

" * $

"" # #

(

*

.

' *

# (



.%" "

.B

$ &

*

4

" %

@

$

*#

'

( D "

( #



"

. *

"*

"

"



"

" " "

B B+/ CB ( $ 7" " ' $

B

.

' "

" *

&

$** %

-

%

(

.

" /

" " .

1 % #

.

Scaling MPLS VPNs to Multi-AS, Multi-Provider, and Hierarchical Networks 1 $B * *

" B

" * # ) ! " $. * # B * B * ( ) * ## A " . ( ) * " * (% & B " . *# $ ' B # $* * D # B * C[ D B $* " # "" ** " * ( "" ( )

# " " C[ " (

$*

#

> *

B *

# ##

( J

"

* #

) . "

% & . J

B

" *

) B * C1 D # '

$

'

( .(

0

DB $ "

' (

)

J+7 *

". B

( (

" #

$ *

C

"

B " * 2 >

(

( ) *

$* # * . 1 (

B $

'

* "

" (

"

*

$

*

Inter-AS VPNs +/

: 9:

"

"

$ "*

" ' $ • • •

B

1

") ") B ': " ': "

"

*

#

1 * 1 ( "

" +/ 4;:5

" *#

* ' " * ( '

" ' $

(

1

#

* 1

$

*

# ( " B+/

+ (

#

B&1 # " ' $ " *# . 1 + 4 ( 1 + 1 " 1 1 + ' +. ( ) " # ' A

B

(

* " " "

% & "

( B 1 ")

+ " ") " ( 1

1 1 * "

1 ")

" +

" +4

+ +

B

# .

1 "

") ' B B "

/ " "

" B

" " ' $. 1 + " B . B " # * # 1 . B B: * # 7 ( / ( 1 * * # N B . * . $ # B

': # 1 ( * # " "

*

" (

# " '

" ' $ ## " ' $* . 1 +

(

' ':

"

" "

( "

B

7 " *

$ # ' 1 " 1

' #

': B

" . "

" ' $ ' # " ' 1 # # . " J " " # * * ( " 1 "

* # ' * ( ) ' " *

B

* +

': *

': #

1

.

$ " " $

+

* ': $

( ':

( ") > ( $ .% & B " " ( ) * ) ** * % & B " ' " # $ * $" $

*

"

Carrier Supporting Carrier 1

*

"

* C B

" D

# " " B

. " J

"

"

7 C .( 7 7

0

" ( )

" "

( " $ (

'" ' # " " # $ & ($

" .B (

"

)

" $ " "

"

$ * ( )* '" # ' "

"

* !

7 " / ' #

"

$ 7 "

)

# * "

" " B '" * % & B B ( " * " ( # " " B . " "

" >

" " $.

( )* '" . B " * B * # " * * '" # ( ) C&1 " *

"

B

"

" 0

B

$ B #

" " "

% & " *

B

#

' B 7 D

#

' $ #

(

" $ # "

" 4;:5 $

+/

.

" " " ' $

" "

7

"

* . ) " " * B *# . $ # " D( B ( # '

( . " 4 $ $ "

" '"

% &

/

*# . * # * * '" # " * * C * # ' '" . D ' " ( ) ( ) * * $. " # " * $ B * ( ( B $ " " ' $. B .

* ). ? J "

" " .

$ 0 ,

# B

Heterogeneous Networks .(

' % &

*

A ( ' % &

# .$

* ( " #

* ( )

% & J+7 % & % &

1 7

#

&4

'

# ( "

"

* *#

"

.

/ % &

':

# * " $

. ( .

" '"

" * . * "

( #

"

*# . % & # ") " " " ( ) # ' " # " " (" ( " $ ( ) % & % & # ") % & ( ) " . ' ( ) . # ") ( $ # " $ "

)

" A ( '

.

J "

% &

' ( ) * ##

" . '

&4 '

(

* "

"

$ #

" ' ( +/ : 9:

7 / "

" $ #

$ ( " *

* (

B 7

" #

'"

# #

# " B "# " " *

'

% & "

(

' ( (

)

B "

*

)

)

" * 7 J .N J

" B

(

$ $

)" $

* % & $

/ #

' % & * )

"

7

"

( ' (

* D

*

" *#

)

7 *

J

"

#

*# (

*"

*" *

# ")

*# 7

( $

B

!

B

* $

% & "

"

" ; 4.

"

.

" "

B

': "

"

( ) % & A " .( ( " # C& ' % & "* ' ( $

% & )(

( B

% & * ( )

B

' "

$ 7 B

( " % &

"

( ) % &

" • • • •

( ) *# ( )

)

B

# ") $# 0 #

$.

Managed Central Services >

B+/ B+/ "" " # " . " 1 ." * "# ( " *# # " '" C '" $B ) (

B

#

( #

' * * "

*

"

& (

% & B ( % & " $

( # $ (

B

• • • • • • • •

"

"

(

%

"

(

'"

"

'" #

*

1 * ) " '" " B ' #

* $

B "

B+/ " *# ' # " " # (

" ' $ "

'

" # B

$

B (

D

" # $

B+/

") " * 7 > * >

(

'

$

'"

" * ) *

$

* *

"

% * "$ "

+ % %

* $ $ ""

" ,

* *

7 "

# ' " B+/

" "

*

K

B

$

'"

$# " " " . $ *# $ * ) B

B

'" "

"

"

" "

2

'"

$ * B+/

(

.

Making Applications and Services VRF-Aware " ( ## ' "

'"

( ( (

( ( D

CB > * * *B

)

*

' "

# .

" ## B

"

'" (

G#

*

-

"

" "

B

) * * *B 1 B ( . ' " # B # B ( B ) #G " ( ' B #

B+/ ,

" . '" " " "

( ( /

* . # ") *# . ## ' " " A 4 * # * G *B 1 ( B+/

(

.

' " "

-

*

* * ) # " *# * ) $ B+/ " # " $ J * B+/ ( • • • • • • •

B ' "

( (

B+/ B+/ B+/ B+/ B+/ B+/ B+/

( ( ( ( ( ( (

( ( $ "

) ## "

#

"

-

B+/ ( $ *# * " & $ ( *

*

.

# ##

-

* *

B+/ $

B .( ' *# # "

*

C 1 .

A

(

., 1 .

A

B+/ "

+

$D

1 ( A + IB++ CB IA 4 I%J * * # "$ #

+

+

C% C

.

"$

J

(

" D " D

( $ % D

"

VRF-Aware Address Management & "

* *

" *

# # B " ' '" A 1"

#

*

* ( " # $ ' *B " ( ( "

*

* '"

1

" '" " " * (

A

" A

*

. 1 B+/ ( $ *

.

# " "

* *

'" '"

#

# #

'" # ' ' '

"

# ")

B

* "

( # $ " ' $

(

* * " * ( # " * / " # '" . " ( $ ' * I 9 *B 1' I 9 * *# * * & ( B+/ ( 1 B+/ ( A I A + $

# $ B+/ ( 1 ( $ ' 1 " > " A . ## A " $ 2 B * . " A #$ A #$ #$ B " " *

A *

'" A & B # ( *

(

*

"

"

* " .

1 "

A "

* $

-

A .

+

$

(

(

B B " ( " "

7

7

( A

* A

A ' " ' . * # "#

#

'

A B

7. "

' "

1 7 B

1 # $

B+/ .

( 7

(

. ' # . (

" ( $ . $* ) #

"

'"

+

/

; 9

; 5

%

-

; -)

"

2 6

[View full size image]

; -)

%

-

36

@,; 3"

[View full size image]

% '

I" * ' "

.$

'" $

'

#

" B

(% &

" * )

( $ " ' $ #

'" # ' *

Supported IETF Drafts % &

& B

( ( "

' " #

$ B

"

#

4;:5 ## 1 . +/ : 9: # J+7

' ( "

* * " ## ' ' B . (% & B "

7 / +/ 4;:5 " * +/ 4;:5 ( +/ : 9: +/ : 9: ## " '

Summary "

# B J L % # & B B ( ) "

( % & ' ' " ( B " ' $

" ( ) % & & B ( ( ) '" " ( B '" " " ' $ " # # (% & $ * * $ * * # ' $ " ( ) " 7 * & $. $ ' (' '" " ( % & & B * " '" L

& B ' (

"

"

(

*

Standards and References J " #

. ? *. ? .

1#" "

.

'

#

N )

$ &

Chapter 6. Remote Access and IPSec Integration with MPLS VPNs #

' " ' $.

" "

( " # * " ' /

* *

" "

*

" ' $

"

# + *

(

D* $# ' " * "" " ( ) 7 # " * " N " ' $ * $ * "" " 1 " " # * " * "" " " ' $. " " * *

( $

'" # "" "

+ * " " ' #

B

# ' * B ) C>1 D " *

" "

'

C D# " ' $ * " # B ""

"

( " ""

" " )

# .

(

*

) CB

' (. $ " # B " # B $ # #( B "*

"" *

/ % &

"

"" '"

&. " (

" " *

# *# . " * "" B # '

"

#

'

" " $#

*#

.

(

"

& $

*

( B

% &

Technology Overview . *

.( "

*

" C 7D

*

- ") $ " " " $ *

"

; -)

%,

" * ( ""

"

# (

3

## # " " $. '" " '" # ' ( . ## " . /

* ( $

)

J "

" "

' ' "

" # "

"

# (

'" # ' $ " ** " # * " # *# * " *C D. * $

" *

$ 1

#

(

$

)

* .

#

" J

" ""

*

.

* $ "

" '

" #

,

$. " $ ) ' *# " ( # $ * , $ 1 , $ # " $ " $ * . 7, /, * # $ " *# ' # # < " < ( " " *# " $ ' $ $ * * * ( " 1 " *# $0 "" $ * # " # $ * . $ * " . " ( ' ( ' $ $ ' * " $ " "" , $ ' ( # * . % & " $ # " # ' # # " * ( )

$

Security Overview and MPLS >

)

* ")

" $

$" " # . $ * ( T< * * $ . *# . " $ N ( 0 #. . " . )* ' ' $ " . # G # " $ " ( ) # *

*

"

-

"

$* ' "

7

$

" (

% &

B " $ " $# " % $ *. * ( ' (# "

- ' " ( " $# ( )

B -

" $ , " # . # "

# .( ( '

*

*

. (

" )

.

$

. .% & $ " *

$

* # ' " '

$C N

B #

" (

"

% & B * 0 #

) * '

# ' "

% &

' '

'" # ' # & .( " *# . # $ " " $C * ") * "" " * % & .

$ .

" B

.

$

$"

/

" B

* / ( ) ") ( )

" '"

# "

$ ( ) $ * " "

" $

$ # " *# " D

$"

* D

( ) * *

$ '

' ( * ( * '" # ' 0 # # " ' * . *# . * B '" # ' . ) $ . * '" # " *# % & B *# *

" * ( " " ( )2 * " ! 7 " 2 ( " $ # "$ * . * $" " ( $ " " $ 2 ' ' # * " 2 ' " * " * * . # " $ * " $ # " ' $ *" # " " 7 $ * " # " " * $ " * " ' '

'

* * * " *#

*# . * 7'

, $

*

" $# " #

) $ $ ) $ " #

" *

" #

' /

' * # " ' * *

"

,

*. " '"

" $# * (

# $ " $# ' " " $#

#

" *

. #

"

" ) $ "

" $# *

*

'

" $# ) $ A ( ' . . " ")

(

#

.

'

$

*(

'

#

"

" # $ (

*

""

$ *

*# * *

(

' #

##$

) "

.

,

. #

1 ( "

( ) < *

* $ * '

.

$#

# *

"

'

(# N " " .< # ' " * . "

M/ 2

$. $

' '

"

# * . ' $ ' " ( * * " " . " $ ' " ' " ' # " 1* ## " $ * < " $ " # " ' < " $ # "$ * " * " $* ( $ * # " ' % $ " % & B " $ ' " ** " $ $2 " " , *# $" * " * ( ) " * B " '" # ' " ( "" # # ") * '" # ' ( ) " * " ' # * " # ' C 7D. B # ( $ " " . . % & " " " " " . . " # * * " # # *. ( " " "" $ " $ " " " " # " " $

7' * # # " # ' # '

"

.( (

.( ). $

( •

)

* * *# ( # "

" '

B

$ " , " .

$

" * # ( (

$ ( *

' $

'

'

"

$ *

$2

. * .$

" "



, "

.

" "

$

. A ( '

.

*# "

*

T *

' **

$ #

' (

*.

" " *#

3 * ) '* ) * # " " " $# # $. 0 * G " % & B . * # " " +/ 4;:5 ( &' 6 * * ) '* *# * ( " " * " $ *# * ** # $ A& * 6 / " $# # $. ) $ ' ' G ( ) . *# ( ) # (



1 %.

$"

" # " #

(

)

% &

B $

0

$ "

*

$ •

6 "

' 0 $C * .$ "

-

0

'

*

#

"

"# D >

' 0 " $

) $

( "

# "

$#

#

*

-

( " " $# # $ *#

*# "

/ $ # . . ## "

/ #

*# #

"

% & #

" * D

C" •

. 6 " $

"

• ( # $

$B *

"

" $

1 % *

* $

$

(

#

(

$

# '

(

*

(

) ) " " ** # " " " " ' . " " *# ) . *# # ( ) " *# $ $ $# " ") "" ' . ") * ' " * ( )

*.

' #

"

" " # "

'

$ #

6

# * (

')

") # * " " $

$* "

"

' "#

*#

# A ( ' .( ## # C AD

") # * $

% &

* ).

$ % &

)

) "

( ""

* # "

'

B

2 2 . '

# (

. '

& * ' $

$

* A ( ' (

,'

*# . * $ $" $ ' * *# . ( ' . ' $" $

) * B

"" ") # *

*#

'" $" / * + $ " *

' " # '

* #

" $ '

$

$ " # * "

$ $*

" ** G ( ' . A ' # # "#

" " .* $ ' "

$ '

$ .

$ $

, 4B . " " ' # "

MPLS VPN and Security ,

% & % &

" "

B

B "

*

#

. "

# " "

'

#

$ J B > # "

. * "

$

#

' B

$#

.% &

" " ' "

B

" % & *

% & ( ). $# " $ #

' " * ' "

$ * ( ). " * ## " " " " * *

"

" B

. (

. "

"

"





$' " '" # ' B " * " % & ' ( " $ " " * ( ) $* "

B

* $ *# " $ , 1 % ( ). ( * ' " " " " A ( ' . ' " " " ' " ' " * " " , % & ( ). # ( " " ( ) " ( ( " " " # ' " *# $ " A ( ' . " * 1 '" # ' " * " $ B " * * $ (

' " # " $( '" " " # % & " $. " # % & " ( ( " " # " " "

"

$ *# . * " *

"

"

-

*

B

# '

" (

* " "

-

*

* % & # ") ' ' ' '

$ $

)

'" " #

")

*

' "

$ ( $

#

6 -) " . " " " " $

# " " % & B * ## . " " " " $ "" A ( ' . $ # " * " " " . @ 6 ' 0 ' # ") ' % & " % & " '" *# " " # $ B '" # ' C D " ' % & " C

" *# * $# " $

' "

&

' #

# /

"

" " " *# . . 7.

. "

$

# " ** # *

" 7 " )

"

$

# 0

" # '

.

B *#

(

) * # ( $ # '" # ' " ## # $ ". "

B '

$

" " $#

" •

3

# # 6

D *

")

#

(

B # ")

#

)-* # "" B . ") " # % & ) B . '" ' ( ' .( " # % & ' B " B

") ")

.

" # " "

)

" * B

% & " " # ")

"

% &

" "

" ) * ") "

"

"

"

"

"

"

$ "

*

% & B ' (

'

$ ")

( ' "

" ( "" # '" # ' * " # $ " ""

-

"

* % &

*

" "

"

$ "

$)

) 0 7' $ ") * B " # ( # ") ( B # ") .( " " # ( B

#

(

>

% &

*

$ *

1



(

'

(

" % & G

* $

"

B

")

) ." )

" ( ) *#

7(

( ")

$ '

#

"

#

$

#

(

(

#

% #

$

#

' "

#" B

"

$

1

'

* ' * '

%

B

)

B % &

'" B "

/ ! 5

* + $. " *#

$ "

1 % # "

"

0 & 31 8;

2 " , ' 0 31 8; , ' 0

,

) #

4

-

-

6 * ) )

6 (

&

' 0

&

6

+

+

6@

L

L

L

L

L

L

' 0 % &

+

"

"

(% & # • • • J

#

# II((( * " & $

B + A B "

#" # # C J D *#

#

" $# "

"

/ ( " "

#

% &

$

B

D#

#

#

* " % & D

#

*# * # 5 5 4D '" # ' 7 " * *# . * * )

; -)

IO'Z 9O Z "

B

L

-

O Z' B

'"

*

"D ") "

% &

G$ *

(

Z

C

& $ " .( #

B

" * " *IT

" C

%& #

%3

'

"

B

#

( " * *

. '" # ' ' % & " $C *# . ' " " " * J ( $ " * (

"

") "

" ")

.

(

$

#

" "

Attack Scenarios ' '

"

$ "

2 "

* 2

* "

#

2

1 " *#

*

( * "

. " *# ' " '" / " "

% & .$

"$D * " * " # " " * $ " * / *# . * " * * " . $ # # * $ # * " * $ $ . " *# * * ) " $ " . " 2 "" ( ) # " . * ) . ( ) " . ' * 1 ( ) # " C , D '" # ' # # $ * ( ) " ## ,1% " $# "

$ *

$

C

"

"

*

% &

"

$#

2

B * *#

.

$

* "

2

'

# *

.

B (

> " $ . " ( ) ( . * " ") " ( ) . " 1+ # ." ( " ' % & B ' / * + $ A ( ' . # . " * * " " * B . 2 * * " # " " *# / * + $ & ) " C & D' " " ( ## * B # " $ " " ' $2 ") C&1 D ( " "

" 1 $B $2 "



(

)



. " (

.



/

5

"

* .

$ % &

"

' ( % & B

)

B

" '" .

B B 6

'

#

6

"

"

*

)

G. # / '" # '

#" " " * # * $ '

* "

H6

"

#

$

(

/

*# . *

B /

)

.

"

.

*# .

*# .

*( " B '

*

B

.

* "

C D. #

* "

" * B

.

*

$

# " "B C4D. "

C D (

)

*

.

' "

.

. "

( ) B

- #* *#

E% 3

#

"

.$

"

# ")

B

; -)

[View full size image]

1

* "" & $ 4 # ") (

/

$0 .

5 :

( "

C4D. $* . (

'9 # ") * *

") ) .

#

) .

; -)

$" * C D > # "

" $ " * #

"

#

%

'

. " $

)

B B C D. $ ' " ** " 2 . " 2 ( " ( ) * $ *

*

' "

#

$ (

.

': # ") ( ) #

*

0

63

[View full size image]

#

" B " "

% &

B

'

*

. (

# "

$

"

(

)

* # "

"#

#

'

# ' B > % &

"

.

$

#

"

A ( ' . * % & '" # " * * *

" '

1

" # * " B .( "

% & 7

.

") B

"

. B (

(

.

*

*

"

A ( '

.

") B

"

)

" ' $# # * " ' B

* #

B

.

1

)

"

"

B "

)

.

" "

) $

" *

")

2

(

( *

B * (

" .

"

B

* #

.

A ( ' . ## " $ / *# . B " "

B

*

'

'

# ") "

$

"

"

. ")

") .

( ") " ").

7 7. '

")

" $

B & : 9:. < J I% & B ( ). B " * " " • •

( .

)

6 '

6

% & *

"*

$

' "

"

* " $

. C/

" D

' (

"

111 .

7"

#

$

' *

.

"

' * (

1 %

( " '" #

" , " '" # ' ( / * + $

(

" *

$*

) .

. 111.

*

'

"

" *#

" (

" .

" " " $ - ' ( ) A ( ' . ) # $ ( ) . # " " ( B % & " # $' ") * . # " ## # $ " " " $" % & " . " " $ # " *# * .B . 1 ' . ' ( " ' " ' # ' * # * A ( ' . # * " '

'

##

'

* % & B " 1 $#

- #* " *# $# " $#

" * "

"

"

B "

) .

'"

- #* " " $*

" % &

#

# $*

*

" ""

B

"

) #

(

"

B

. ) $# " B

$*

)

,

*

" .

. " " *#

" ( )

" .(

" $

* " " B

"

") "

## # " $ * " *# $. ( * " ' "* ' " CK D * '" '

% & " * " " " $ "

( ( "

"

( ) ") * B 2 # ") . " " * # "# ## # ' " # " . ) * C &1D

. ' * * " "

)

") * B

B

$ "

" '" # " * "

$" '

7

1 "

' $ $"

""

$

"

*# -

* " " / *#

*

B+/ 5

( " " **

'

B+/ ) #

+ &' , ) 1

(

$ "

CB+/D B

" ' $# " "

* "

' # )0 B

.

B

"

7 *# " ** (

" " . #

7 " C & D ( B+/ - #* C 7D "

.

" .

*# " " B+/

A # " ' B+/

% -

6 -) + , )

6 1"

"

. " ( B+/ ( .

7

@,; " *

ip vrf bank_A rd 1234:10 route-target both 1234:33 ip vrf bank_B rd 1234:11 route-target both 1234:34 interface serial 0/1 ip vrf forwarding bank_A interface serial 0/3 ip vrf forwarding bank_B

1 4

+ *

* ( )

(

#

""

$ $# " " **

(" #

&'

(

(

%( @,;

6 -)

7 & A ) 1.

" " 7 .# ( 7 * * B IB ( # ( ' * * G . B 1 " B *# # " $ ( . " $ * B B " $" " * " * B ' $ * # $ " ' " (

" "

* $ *# " *#

* # '

" # "

( *

'

* " "

*# .

#

.

#

* " ") B "

$ ( " *

"

" *

"

" " ( "

# " . # " .

. (

*

* * ( "

*

$ $ ' $ ##

B

. .

*#

(

A ( ' . $# * " '" # ' . # # $ ) ( * " '

'

# "

* # ' )

( " * ( " . 1

# )1

'

" * $

$

*

# * .

"

"

# *# * "

,

*

*# ( # '

"

" "

' "

'" # .

# (

'" # ' ) $

' "

(

'" . #

"

# ' * " # " " . # " " " J $. , , . $

. * " *

*

" ' $

$

" * "

* "" # $

)

" $ $ #

"

#

" *#

) #

A

# (

# " " .* $ * " * " " ' * " " * " ( , " 1

(

$

( ). )

( " * " . " " $ # ( " "

# "

" *

*

#

" .

.

"

.

$

( '

* )* . 111

( * '

$

/ * * # * "

)

'

$

.

* $

*

" '

,

# *

" * . * $ ( )

"

/

I / "

$ *

$

"

% & . * # * $ * ( # " ) B . N B ( ) # " *# # * " $# *

'

#

"# $ $# $.

1 # ' (

( ") ,'

.

"

) #

. $

, (

)"

Internet/Extranet and MPLS Security $# * $" * " *# # ' (. ( ( ) /

$

* $

; #

( ) # $* . " *# $" ". . " $. * " * *< .< ( " ( " '" # ' ( )% & * ( ) ( , " ; # " *

* # $ "

' *

$

"

#

"

$

$ ' (

1

2 * '

'" # "

'

)

' (

#

( $ ## # # "# * # " " $. ") * " '" # ' ( ) ( . " ' ( ( * #

.

"

"

" /

. "

* "

* .(

$ * . (

"" '" # ' *

$ .

"

'" # ' # * $ .

*

" *

$

"

$

"

/

. #

" #

( ) * . " +/ 4645 C

" #

'

"

# " "" (

% & B " ' $ " ' $ * #

"

" ' " $ # '

" "

1

#

#



"# #

(



*

"

6 $*

-

) 7

" #1 . " B "



1

" . *

$

" 2

.

)

" 2

#

.

2

. " " $ " " $ # ) " # ' " # 2

$

$*

$ " B *(

"

.

"

*

* 2 "

$

"

"

"

*

.

$

."

*#

$ )

# $*

" $

" (

* N $ #

B

@

"

"

(

% &

#

#

$B " * ( " '"

'"

*

* ( $

" 1

%

) .

## $

1* 9 # ' 1* " > 2 ;



(

* "

* ' % & B % & # ' . "

# $

" $ ## $ 6D

.

#

"" *

"

% &

(

(

""

#

#

.( "

% &

B

'" •





1 B ( # '

( ' '" # ' * " " ' $ ' B . ") B * * B # $* . " / * + $ 1 % 1 * % & B B " *# * " * 0 " # $* " $ ( . " $ # ( > * " * B ( # $ " " $ " . ( " $ # " " # ( * ( $ *

**

")

*

$. ( # " " " #

2 $ "

. .

#

"

( $ "

' .

"

B % & " (

( ). ( " % & " ' $"

* " .( $# " .#

"

$

" "

$

" " # $

" ' $ "

$

" ' $ ( 2 " " " ' $ " $ . "

(

.

#

$2 *

-

"

$

'

1 % (

"

) $ *

'

( "

*

( "

'" # # * ( )

. "

' "

"

* " # B

'

$

*

") 2

"

*

B

.

*

"

(

2

$

.

B

# ' " $"

(

'

*

"" ## " " *# 0 *# " " * " " ( ) '" # ' (" $" #

" ") ' ' "

.

)

% & # . (

"

"

$

( ) ' $ *# " ' * " # " *# " A ( ' . # " '" . " ## *

'" # ' " $ # " " ") .$ * " # C " # ' ( )D ' ( , " . C " . * ") # D " " $# " $ ' ( "( " . # * " $ * N 1 # * "$ N " .* ( # " "# * " $

$

" .

'

" -

*#

"

) $

"

* " ## "

-

. % &

" " 7 " " " . " # " * + $

/

#

, *

*

B % & % &

"

# ' B *# " $

'

2

.

"

$ '

2

*# " # '

"

$"

" " # ( 1 % & B

* B

"

") # " ' ' ( '"

* ' . '

* ( • • •

$ 1

( ) ( )(

#

7

7 " *#

"

"

" $.

'

# "

( ( $. '

" "

' $' ( ) "

$

#

(

( ' $" " # " "

' N

)

$

" $ ##

*

( '" #

" "

*

*

" "

0

#

(

" ' " "

" # . . '"

. ""

" ** '

## " $

D.

. "" ( #

'" # '

' ")

*

D

'

#

*# " " "

"

"

* " * $

"

* "

'

$# " "

##

" "

" " # * " * * $

## # ( * *2

"

" * $ ")

"" ( ""

%Y '

"

# " (

* ##

*2

" " 7

.

. 7.

") 7 "

7

"

'

.

$# #

$

" **

$

$. .(

7

* "

(

1 ( 1 ( 1 ( ## "

' ( $

"" *# " "

" $

( "

*

2

$( ")

$* " 7

*

'

" "

$ " *# *

$

""

7 '"

( *

#

" 7 "

*

(

'" ' " " ( *# *

"

# ' '

" (

7

# " '

# " ' "

'

J

$ "

'" B+/ "

- ")

" " **

) '

7

(

) #

.

(

* *

$

"

"$ .

"

" $" .

*B "

*

(

"

B * "* "

(

*

( D*

""

" #

.( " "

"

"

A ( ' . C% & IB " " $ ( # " * * "

" 7

#

#

' # $*

" '

# 7

#

• • •

" $

( # $ # #

"

""

'

"

# 2

B

B

"

"

"

C * '

"

B " $

"

7 B 1 ( . # "

' -

"

) 2

( "$ " ** %Y

#

( #

"

7 $# '

#

'"

7

"

"

#

B

C (

B ) *#

#

")

#

.

.* $" # '

*# * # " $

" " " (

C 1 D '"

#

'

* " * 1

. "

(

)

' -

* " "

( ) $" *

*# * $

IPSec " % & " *# 9. " ( C # * 7# # / $ " " " # " ' # ") ( " # ( " # C& D. J+7 1 * 66

*

" D.

- " **

"

# ")

6 &

(

66

*

) " @,;

" &

"

$

B

""

7. " B " ( . $# " $ ' ) (

*

B

B

':

.

" " # ") B

(

B

B # " "# # " " " (

B

# '" #

'

"

# " ':

"

""

** 1 A +

# "

* ' $B

B ':

"

7

> " • • •

" B

2

# " % & "

" ")

% & # "

"

$

-

*

(

7



*# $

$

B

). " *# * "# " ' "D ( ) ( ) D 1

"

(

#

$"

' ' C

"" ( )D )' " D C# $. * " $ ' "

$ ( * " ") $

C C

* ' "

* #

.(

$ A ( ' (

$ . *

(

* ( *2 # '

( "

" $. " *# *

$

( #

(

# " '" # ' ' ## . ( )*



'

0 "

"

)

" #

'

$

" $ .

$

$ ' (# " . " " " *# $ "

2

(

" '"

* '

*

'

$. ""

* C &1D " *# * " * * '" ( "

" (

"

"

'"

# " # # " ' ( #

## $

*

) " *# " ") $ '"

"

"

") $. " **

$ " *

. #

'

.

" .* 7 7 % B

) * # " ' " * "

'" #

• • • •

* *2 " " * $ $. ( $ (

$# .

$ ' *( "

* ""

( (

. $

" '

$.

*

$

*

#

" '

*

"

*

• • • • • • •

7 ## 7 7 ' 7 # 7 #

* (

0 "

"

#

"

# " '

)

*

'"

(

I #

(

$

# I $

) '" # #

'

'" # " **

' &1

"

* *

( )# * $ # * $ $ " * " * " * " * " *# * # " * * '" # ' $ " * ( ) ( " 0 " * % " * I# " " * " *# * # " * * * '" # ' ( )

Layer 2 and Unmanaged VPN Service Considerations $. ' $ #

$#

# $ " "

' "

$ "

"

#

' ' * ( ' " " '

" "

*

" $ C

$# " "

" 7

*

"

" * "

D "

D

"

7. #

" "

- #* $ " $ * (

" * "

#

* " " " "

*

" '

7 # (

* "

/ * + $ $" $ ( " # " # " " " .* )

# $ " $. ""

"

' $

A ( ' ( "

$ "

#

$

1 %. (

. # $ " $#

-

$

# $ " "

"

""

C B "

B *

'



( "

' #

'

'"

#

&1 . $ * # # " * # * " * $# " $. # * " # C $. ' '" " " # " '" * * B ( " $ " $( " . " ## *# " ## " ( ) #

)

& ' -0 "

. $

*# " * # ' * "

Design Option Examples % & B # $*

7

# $ " $

' " *

.

")

B B

"" # " * (

"

$ " *# * ( ) * " $" ""

(

( '

(

" D"

" $ -

.$ " ' $ *

## # " 7 # "

) . $* #

* '" (

*

B&1 #

"

( $

* " ) *

*

.

7 * 1 " > - ") $

-

C B D

( " " " ** " *

" " * " $

'

"

, " #

) ' "

"

#

7 #

(

# (

'

" 2

. "

$

"

"

*

* ""

$'

B C 1 D "

/ $ N

" "

"

## * " *# * 4) & #



"

# ""

*# . #

# " (

" ' & ' -0 "

'" $#

*# . " # ' % & " " ( ## " "

( '" # '

(

# )

.

#

" *#

" '

B ""

"

'

'

"

'" * I 1 * " * " " ( # ) . ##

$

# " "

'" # "

"

* • • •

' . * 0 " .

" " ) $# ' * (

B

'

" # A ( ' . " # ( )#

# " * " . $# "

. ( $

7

" " ** *# * > " 7"

1"" ( (

(

7 "

• #

' "

*

* 0 * "

7

*

"

' ")

* "

.

*

J

" *

(

"

*#

"

#

0 *

.

-

( #

0

B

" "

0 7

$

* $ '" # # " # " " # $* '" # ' * . "

" " "

* *# " "

*

*

# " ""

(

* 0 " J *

#

"

" ) " *

' . *

*

# ( B

#

* • •

" "

* # * ## ' *

# •

"

" *# $ C D ' "" * # ( ) " ** " $ " * * ( # ' * N $ " ' $C " ( "" * ( * * $

'" $.

* #

*

' $

* (

"

*

* "

" *

)

" ' $ # ' '"

3 0 0 & ' -0 > "# " " ** " ( . $ $" " ' $* ## # *# # $ *# * * % & # # " ' *# I # # " C+ D * ( ' B

# ' (

1

' *

# 7

#

"

# $"

*# *

/



* # % & B ) "" $* B

J $ $ D

"

* .

#

" "

(

# " 1"

* B " $ " * 1 * * C # # " "" # * ( ) * ' " * $ " ** " " $# ' " * " 0 ( ) ' * * " * *

)

• • • / "

$* '

' ( "

* " "

* " $

.

#

# * 7

#

( 1

*

"

*

B

( "

( " $ # ) " "# # " ' D. ( $ * * 7 . * " # ( " * # * C & $ % & B # ' D 7 " ( * (

*

* # 7 ( ) # * 7

'

A ( ' *

' *

'

" (

# * $

) #

"

" .

* 0 # * 0

) $"

"

#

' *

*

*

#

"

*

(

( +

" *# ' % *2 #

*

"

I *

# " ' . $ ##

"

# " & $ " # ' # " C D * " # " * .

• -

J $

0 # "

• •

"

"

* *

* "

* ( B

'

*

*# "

(

#

7 '" #

"

* "

" *

"

( $ .

( *

7 #

"

&1

#

"

# "

7 & $

4 (

# "

'

""

)

$

7

" " ( '

" # "

$

'

Carrier's Carrier Network and Inter-Autonomous Considerations 0 B # '

C

D '

( *

) " .

" " ' " ( " * " * 0 " *# $ 1 # ' % & B '" * # " " ( ). * " " " 1 " . ( ) '

' ( # " " " $ '" # ' # $ " * .( ( * ' " # " *# . * * ' " * A ( ' . * " * 0 " # # ' " * " " ( " $# * -

* " $ * ' # # ( $.

" "

" #

' ( * *

"

" '

0

"

"

*

' ( "

.

% * "

*

* $ "" *# * * " * ## B " $ $ "

* (

# )

'

"

* "

( • • •

" "

. $# "

#

' " .

" ( * ##

$

$#

"

. "

&1 $

$

( " (

7

" *

* # ' *# * $

(

*

*

"

.

$" G

" "

" $ .

* "

* "

( .

* * "" " & $ 4 "

" & $

4

2 *

*

".

7

#

"

" . *

" " *#

*

!

*

1+ "

$

# * *

2 $

"

"

"

" $ "

" *#

""

( $" ( )

.

4 ) "

" $ "" . $

& $

## " # "

"

7

" *

'

#

"

"

& $ '

*

.

"

" $ *# " 4 . 1+ ( *

"

*

* " 4

"

' " *

-

"

#

#

" ' $ $# " & $ .& $ *

$

$ #

## " $ ' $" * ( ( ( ) ( $" *# $ 0 # # & $ ' * ( " * 0 ( ) & $ 4 ' " $# # * ' * . " * # & $ " ".# $ * B&1 . 7& $ ( 7 ) ") # & $ '" " * & $ "" ( ( ( ) *# * ( " * " # ( " ( ) " *# "

" $

"" *#

"

"

.( *

1

" . (

#

&1 (

"

$

# " ' $

( (

+

$ &

B

## "

"

B *

B

* B .

'

" . *# . " ## # " " ) # " * # & $ 4 ( ) " * ' "" * " . .

*

B

C

#

.

" " & $

' "

" * & $ * &4 # C " 1 % &

B&1 & $ 4 # " . * ") ( 4 *

.K

B

"

G

$

1

# ") B+/ "

"

"

* •

.

#

*

7 " '

"

* *#

$

# " "

" ' $ " & # $. * # ' 7' # $

" "

" ' $ 1. #

#

.

: 9:

*

"

" **

# #

$

. #

* "

. .1 $ I

' . $ * $ *. # '

'

" * $ "

* + *# * * " # # "

#

$

' "

B $) (

" *

"

" ' $( " $ " " " * #

# * J

" .

( # .

#

'

" *

"

(

C *

' # (

"

'

(

( N "

*

# 1

' ( " '

"

+/

+

$ +

(

"

( 1

7 '

"

* * N "

*# .

(

" "

" "

"

" ' $* "

"

1

/

D

(

#

* "

"

' "

#

' *# "

*

,# . " ' $ ( " * ' " # 1 )

> " ' " *# I # ## " D

##

"

" * ': 1

& $

( **

( # #

* "

# B

. 7

# # . # ' " * " * ## * . " B " " ' $ ' ' " . * # * $ *

1

,#

*

" * * * $

*

,# ")

'

'

* *# . # #

.

'

#

4

D

$

# " * ( $ " " ' $" ( )* #

-

*

2 "

(

( " * + ( 7 ( " B " " * # " " ' $' ' $ " ' 1 +

# $ 7

'

* ) A ( ' .

*

$ "

"

*

" *# " " B

"

"

(

' "



" *# " " # '

*

" *

"

$ # "

7 " * ' " B * $ * " * * " * $ * * " * ( C D! ' .( " # ' .* " " ( " * $ # ' G C4D ' $# " " " * N $ B # 1 " * * * E7 " " 7 ( ) & * * " ) & * ' B ( N " * $ * " ** " * " " * 0 # ' 0 ' " ( " B # " * . ( ' . * # ' # B+/ " ' 7 ( ' B " * 1 B % # $* " ** " ( # 1 ") ") B+/ * ' # * " $ ,# " # $ 1 * ( " # ' * * ' * " .( $ " $ " " * " " # ' '" *

"



Customer Edge Router Security Considerations / + '

7

. (

/ 7 *#

+ /

" # ") + /

0

" 7

"

( *

$ •

" * "

( " ( * # *

*

" " * * . B

7

K *

" '

$ '



$ ## " '

7 ( + /* " * " "'

#'

" C $"

#

. *

# ") ( # ( ( )

* " * 1 *# $

$

! "

" * ")

0

7

# ") 7/

"

" "" D#

" ' ( "

*

" *

*# * ## # **

"

7

. " .

'

"

"

' $ *( " (

"

# ) #

C + /D

# ") 0 # ") "

"

" (

' #

" (

"

# )"

"

(

.(

"

#

) &

" *

( ) A ( ' . * (

% & $

" # "

"

"

7 * "

B

"

.

" *

7 (*

" '"

* (

(

( ) A ( ' . # . $ # * 1 '

( ( "

" ' " . '

*# "

* " * # ")

## *

( "

7

7*

N " #

"

#

"

( ##

$

7 ( * " ' * # *# . * # " * B * # ' " $ # . " *# # ' "$ ( * *# " '" # ' A 7 " $ # " " * ( 7 7. * & $ # * . " . ( # " # " " ( & $ ## $ $ % & B ( ) A ( ' . % ' ' # ( # " # * ' " $ $ *# " *# . " " " " ( " • •

(

"

*

'

"

* #

*

"

$

# G 7 / *

"

&

" $ # " "

(

B . " "

* $ *" ' * 7 7" " " " " (

* '

$

"

/

!

2 •

'

N " # *

( "

) # " "

"

"

( .

#

* " $* '" # ' D $. $ J " " # $ $# " $ $ $ J # # % & B " * * * " * J G ." ' * * *# / # " $. 7. +/ " ** 7 + / ) # " " 7 0 7 " " 7 0 7 " " + / *# ' $ " " * # ") "" ' " *( " ( " ' C $ " ") 7/ D # ( " # ")

C

*# *

" C

$ ;65 ;

7 :

4.

"

D

$

" # " **

Overall Best Practice Recommendations ( •

/



!

** " " 7 7

) •

• • •

#

"

(

#

" "

% &

(

"

# *

*

#

B

"

""

"

1 *# * " D " # $* * # * # . # $ 2

/ # '

.

( 1 " # '

$(

") $( $ * D. $ 1

1 #

# $*

$ C1 & D

"

*

" . J J ( * " *. " % ; C% ;D 7 " # 7 7 ) ( # " * B *# * & " C& D ( / B+/. * * * * # # ( B ! J * * *# " " * " * ( " * ,



/ B

C 7F D.

2

# "

( " C% ;D " ' $* J

"

") B+/ *# * C " # * # C( " * " " ( " # / * * '

. *# *

'

1 ,

*

$

&1

C( B&1

" **

"

# ")

"

" **

"

"

"

"

"

"

"

/

'

B&1

D.

/

5 9 # $*

5 5 % &

**

; -)

; -)

2

#

" "

"

%2

%

)

- *

[View full size image]

$

" **

)

0A

"

Summary " J

# ' "

"

" " "

$( J ' ' ( " . *# * # % & " " ** * # ") " "

$# #

% & > '

. C J

B

• • • •

B

"

'

# #

" " "

" 1

' # $

1

# ' - ' / * + $ "

"

" ( ) " " " $ ( "

*

"

$

B

% & ")

.

$ #

% & (

+/

" B #

$

# " '"

" "

: 9:. % &

B

"D

B

( * ' " % &

"

"

" $.

** " # B

'

1 "

" $. *

C

* "

"

"

.% & B 1 %

>

#

#

B

.

"

D"

* ( ) # *# 1 . # $ > # B ' " **

"

$ " *#

$ -

1 " "

#

' " *#

B * #

& $

% &

4

0 ." " /

* *

) " .

( " *

"

"

" 1* B . '

B '

$ B

( ) ( )

" #

"

$( " $

(

) *# *

"

"

Standards and References .%

% %

+/

: 6 1

$

+/

: 9: J I% &

+/

4 64+

4% ;1

+/

4 ;:,

/(

+/

4 6;

% &

+/

% &

+/

4:

J 4


# " 1 " * .

* -

"

"

& "

$ " $

#

# "

.*

* + B #

"

#

(

2

7

*

"

$ $

" * # "

"

(

" 1

( (" .

" #

2

>

(

#

( * ( $* 2 ( '

( " "" # "

-

# (

'

.

(#

*

* #

. *

"

#

N "

7

(

" "

*

2

" "

" " ( ( ' #

""

'

$

"

$

( # " * # " * ( "

#

# % ' " 1 " #

*

.

( *

7

% $* 7

%

#

(

# " " *# " / % &

% & " * C J! (

" . . $7 ",

7 ( )* %D # " # '

$. $ #

* $ # ' 7 " * ) # *2 " # *2 " # " ' . # $ " " ) # ' # *2 " " " # ' ( ) * $ # " $ # "

" 4

")

'

"

' $

( " 1N $

*

2 C

"

'

* % * " # " "

" ** " " 0 " * " *# # # " * # * " # 7

# *2 )( . 4 4D " C & D *

$ "

") # # *

' " 7&

'

TE Applications and Examples $ (

' )'

( 7 # " $

" *#

( ( -

" (

7 #

" ( 7

"

7 "

* * "

# (

" #

# 7 K

*

$"

# " $ *

"

# " .

( " $

$

*

G

#

* #

( 7

#

#

) * ) / *# . # " $# " ( )

( ) $ * . A ( 7 "

"

* "

'

" .(

7

"

" (

* " K

( 1

# $

$

$ ) ) #

( "

*

##

" (

*

7

"

"

) ( ). % &

*

" # "

(

$(

* )

$

*

(

Intra-Area TE > * 7 ' .

.

% & (

" "

7 ) J

* *

J "

' #

'

( #

" '

" " *# $ # " . #

" *#

$' #

$

# *

7 '
# )# " # ")

) # * $ # ") " . " '

:

; -)

%

#

.

"

. *# " * ") #

) ") # ") # ( $ * # * ( /

. $ 6

[View full size image]

/

# # . *# . ( $ ( ( # " % ' " 1 " ' / 6 :. # " ' >

"" '

(

' " * # $ # " ) ( ' " ' ' " ' # * $ " ( ' ") # (# " # " ) ( * '

. "

(

% &

# ") ") # " ( # % & # ") $. "

/

#

(

, 7

(

*

) '

" ) " )

*# (

( A

" *

( "

#

" ") # #

!#

" " .

"

. # * " ( $

") # * * " #

'

( $

# "

* $

*

.

# *

, 7 )# " #

#

"

" # .

#

# (

# # ")

Node Protection )#

$

( '

(

' ( *# " # * $

(

" )

'

*

" ' ") # " ) # * $

"

C &+D

(

% &

' " ) ( # " " (

" # ")

") # * *

# " $ ") # . D ( # # * *# ") #

" # $ * % & # ") ( " / 6 ;

#C ") # "

#

" # " * "

#

#D A ( ' . $* ' ") #

C

$ ") # " $

" $

"

; -)

.

" *#

% [View full size image]

1 $ . "

#

*# " $. ( " * # " # * $ ( $ ( # ' ") # # " ( 1 ( *. " ( ( #

" '

' "

* $ .

(

>

# ")

##

'

$ .

C ") #

)

( (L # "

"

*

"

$

*#

*# . ( '

* 1 " (L

"

# $

# *

.

"

' (

$ "

'

" ' L ) ' # ")

#

" # (L )

*1

) $ D ( .

. (

$

'

# * "

$

G (

. $#

(L *

)

(

( "

Path Protection $# # * ( $ 1 % # * $ .

* # 6 9

" # (

* " ' # "

) .

*. " #

#

"

; -)

%

"

.

#

* ") # $ * "

$

#

* ( B )

C

)

D ") # #

.

$ # " ") # * ' # * $ ( /

*

[View full size image]

% "

$ " * .

*

") # " ") # ") # *# ") #

* # * A ( '

" # * $ ( ' $# * $ # # "

* # ") # (" *

$ .

" "

"

.

* $

# ( "

)

#

*

" #

7

* "

*

. "

Usage Scenarios % &

/++ "

*

# $ ") #

. ). *

. .

( #

#

*# A . )

# # # /++

% &

( #

(

7 # / # *

"

" #

,

(

# * #

"

" # $*

7 (

# *

$

$ # # * $ ") # ) . # * $ ") # * )# " ' % &

> " # $ (

#

1 ( ) ") # "

" $

$

$

" )

Scalability of Protection Mechanisms "

#

* " # " $"

" * " & )# " 7 7I * $ -

* 7I

#

"

##

*. $

") # " ") ( " ' $# " ") # ") #

" . ") #

* #

" ") #

#

.(

* -

"

" *# (

. V* & ) #

" "

) % "

#

( $

"

# )

'

$ $ .

"

"

( * " $* ( )(

*

" $

) )

# * "

* (

") # )

* ( # ") # (

-

-

## #

" .

Z

*

* .( #

$

" $

)

#

"

" ##

*

* *

* " *#

" * .

" ' $. ( *

" ' $

" ' $ -

" (

*

*. ") #

") #

"

# # # * $ # $ .

"

*

* #

# # )

.

#

* # * " #

# *

# " " "

$

") # * " # * *

") # "

"

" *

#

* #

*

(

.

*

.

* ( #

* /

*# .

(

)

+

"

=,

4

*

" # * $ ") # # " ' * ( )(

2

/ *

B #

") # " *

# *

"

" ( $0 1 %

* . * . G ( ' . ( # # .

/

* *

") # " *

"

. ( 1 %I/ * + $ ( B * * + $ ( )

2

" * * .

* *

2

(

* ) '

( '

$ #

'

' * # " B

Scaling MPLS TE ,

* " ** 0 *< % &

' 0< 1" % & . $# / %

7

"

"

"

"

7 " ;.

+ B

"

# ' 0< L 7

"

.+ B

7

#

" (

(

#

.

("

"

A ( ' #

.

*

"

#

% &

7 "

" "

##

$

% &

.

. " * * *

#

'

"

*

* ). %

( (

"

7 '

"

"

*

# $ '

A ( '

* "

.

# "

,

T

.

( #

0 *< %

-

(# " # "

"

.(

' 0< L . * # " ( ' * * 1 * .( *

#

"

" '

*

$

# " *

%

% &

#

0 *< + B

,

$

(

+ B $.

#

( ' " ( ( )" " " ( ( " " . ' " " ( ( ( ( ' .+ B % & 7 *+ B '" C 'D '. + B ' # *# ' G % & 7+ B " ' # " . $ 7' * " " ( ( , # ( ** $. + B ( ( " # 4 * # "

,

# -

" ** N "

. '

# ." #

#

( "

*# *

"

7

# "

$

(

1 *

MPLS Traffic Engineering and Multicast 1 *

* "

## "

% &

'

(

)

'

' $ #

#

* #* A

"

" *#

1 $

* 1 A* +7 B * .

& *

# ' #

#

.% & * # " 1 A*

#

(

"

" $. * " + " ' * # 7 ( (

+ B * " .$

#

%

% & "

) "

' *

# * (

#

. *

. * "

#

' * $

*

; -)

& " % & 7" # ") # "

#* 7

#

" ' $ > +7 B * . " " # * " # * (

*( "

( "

)' & [View full size image]

C

/

1

66

") "

(

.

" 6 5D

* *

+ -

-

*# . (

*

"

" *

1 A* 1 (

. (L +7 B * "

* (

). #

*

" 1 A # # * "

)

$ ") +7 B * ( * +7 B * ( " * * (L ) ( +7 B * * " +7 B * " # "

")

# " "

$

)

# " # " (

)

" # " * * # " " "

.

(L

).

< < ") ( ( +7 B * *1 ' ") +7 B ' ") ( ' ' " " * * C
"

J $

#

#

*

.

% ( 7

"

* J

.( "

% "

**

* B 7 J

.

"

(

# "

* #

#

7



# ' " " ' $' J *

"

. + /"

*

7 #

% # $ # $

%

'

" # $*

" "

) #

' "

. *

" "

L # # ' * 0 * ( )

( ). # " %B A ( ' .* " * * " * 0 0 * " ( ) / * " # ") * $

MPLS Multicast VPN Applications and Examples " ## " # ' " #

"

( $

. 0 0 *

##

$

"

"

# "

' A

0 0

" " ( * N " *# 0 0 $ * . ## * " . # "" *# " # # " " # ' $ ( ) '" # ' $# " $. " " C " * D 0 0 ( " ( .# )C D # ) # ) ( " * # I # ) > * # # ) . " ** - #* C 7D " $ # ( " * " ' # ( $ # ( " " .$ * * C " * " ' D 7 # ' " $ " .

$. * " " " ** " $ " G ## 0 0

0 0

"

" **

1

( (

) . #

B *# * "

; -)

' 5# /

* *

) #

*

' "

' "

*

* #

(

* " *# "

* $ * . ' ( %B * .

" *# B. '

'

' 5. (

" "

"

%

)

)'

"

+ 3

# $ '" # " " # *

# '

)

" # * ] *

" ]4

* 0 0

$" #

$

N

( # $ " " $ ' " * " $ A 0 0 " ' ## " * * , ## " %B " * " # $ / 9 '" * " 1 & " # * G ( '" $ *" 2 # * "

'

@

< +66 2

[View full size image]

"

*

$

6

; -)

% A&

9

-@

.

[View full size image]

)

.0

)'

Multicast Security and Management Considerations 1 #

*

'" $

" " . # +/

*

"

" B

.

*

"

" % & "

"

+ 7 # + " / ")

#

* "

C +D

.

#

7 D(

B "

7

+ )

)

$

"

.

*#

* * * #

. "

-

$ "

#

G

,

"

# %B+/

.

*

$ B

G

"

# * * ")

"

" #

(

" .$

"

* "

# *B

%" *

"

.

"

.

* "

(

#

"

I# '

B "

"

#(

"

+

N

"

""

'

" '

" '

*

"

")

7

&* ' P + /QD &*



7 #

"C '"

"

• •

*

%* " ## % * ( $ 7 " B " * "

" *

2

* #"

"

*

$. ( * ( B . * " ! " % # ")

. "

**

7 " B "



"

"

(

1 # %B

"

$

: 9:

• • • • •

" *

# )

(

2' " $"

#

* *

" '"

C

" "

" '

I

P1 &QD #

(

'

#

C1 & '

" 2'

D #

C+ D

* 7

" I#

" "

C "" "

.$ " I " '

")

. CV.JD N

#

# (

") # #*

(

*

( G

# # * "" # .

. " **

&&

-

2' '

+ C 1

+

D

*

* (

# # * "

C

" *

"

." " ' $ " ") ## # *# . 6 " '' " "

' # # &'

#* &

* D

( # * %

7 / ' ' ( " " "

$

Standards and References 1 * % & I J %B •

( B

"

$ $

# @ ( .)

• •

" "

##

)' -

%

). 7 /

* *

% %

( "

'# *" ' #* # $ %B

.
' '9 9B 7 / C *

.( ) # '9

(

) ( #

$ ' ( '9

(

" * " *

' ## & " $(

" '9

"* + B (

D* '9

&

'9 " )( 7

"

'9 # #

&

7 #

'9

#

" "

(

9 7. J

7

+ B $

" " (

9B 7

# & " * ## #

7

'9 " # .& " # .&

. J + B ( 9 7

.

" '9 # . "

* ## * -

(

'

"

#

.

'

" #

"

"

'9

'9 # # " . 2 .

"

*

) *

.

': # "

(

% & (

'

Inter-AS Networks for 6PE and v6VPNs 1 " # * $ ( 7 C1 +D ': '9 : 9: ## $



2

$ *# * C1 D ( ) # * * ': # * ': '9

#

-B

#&

# " @

& " 1

( ':. ( •

( ': # ( ( '9 $

* -1 &

# ' * * " "

'9 (

'9 •

" '9 1 .

+ #

( ) * " $ * 1 + * " * " *

"

" " '9

" # B "

(

'9 .

+

* " 1 $+ ( +/ $ "

" "

(

B+/

(

1

+

'" " 1 " ( B '9 . * " ( " 1

# ") # " 1 + ( # B 1 + * '9 " # & * . $ ': # " $ ' ( 1 ") ' '9 " " C++D " 1 * . ") * '9 '" ) # " ' # $ 1 $ *# $ * " ++ "

(

1

) ## 1

+ 7 $

+

0 ': 7 (

( '9

':

*

IPv6 QoS K " # '9 * "

* $

'9. "" "

': ':

$

'"

$. "

. .

# ': G *

4:

' * +/ ( $

$ '9 ( ) # $ '9 "" % & ( ). " .# " . " .

)

1 "

' $ " . "

'9

" #

.

*

( ( "

G *

6 * '"

* ##

* " " # 8.

(

' " *# L * # " "

" % &

L

* '"

*

( # " * " ( $ #

$ #

)

' .(

" *

# ' " ( # " "

( $ "" " * " .

.

"

"

(

"

) CB $

" *# "

B

*$ * ' I% & " # " *

"

" '" & ' "

#

D" " ' $# * )7 # C 7D ' " CK D " " *# " * % & I

(

1 %" ( ) " $.

(

)

* I% &

"

,1% " *# # " .* . ' $ &1 ## " " * # " *# ' ## " A ' * * ( ) * " ** " ** C & D ." . "" . G

" *

" ( $

*

(

( )* G #

( ) &1 * ( *

. (

# * " ' , " ' $ ) ( ( " ( # ( ) (



J

' )

• •

# ' ( )

' " . 1 %. / * * & # * '" ' ' % & $ # ' * $ "

" # * # "

" % & 7* % * # ' " *# % & ." " # C/ 1 D % & 7*

* "

. "" %

*

( ) .# * " . " "

" (

$

)

/

4

G

" *#

; -)

*

%

#"

"

-

3

#

*

)

[View full size image]

%

% & ' # *

" '

> *

"

> "

" %

'

*# * ( ) *# * * ( )

" *#

.

* "

*

# $* # ' " ** ## " * " * "

. (

" .# ' ) . " " / 1 # "

# " / 1 * # % & ,1% ( ) > " ** " ( * * * " * . " & # . " . ' " " " " ' $' " CB BD. > " * " * . " " ( " C / D. & + . ,1% * * ## C ( ) ,1% * D # % & ,1% ) > # ' ' ' ( B # ' ' " C D * "" # * " * " * $ ( " , '" & ' 1 * C " &1D *

* * B

/ 1

" ; C%

2 # " *

B

* ## *

"

( ;D (

*# * * * B * *#

" ** "

" #

& $

#

$* "

* .

"

"

B . * $ J ( ) # .

B

* "

"

#

>

*

%

%

*

*

*

" / (

$. ( #

# '

' )

' (

$

C% D " ' $ '

## "

% &

(

)

Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management '

" #

* ( % # * -

" * " )

% & * * * / 1 *

" $ N " ' * " $

$

*

*

% & # * *

) $ " " $

( I% &

$ $* "

* )

' " ' ) (

(

-

* '"

*2

% & #

# ) $

,1% % * &

)

#

"

MPLS OAM ,1% •





#

'

(

H 1 $ ,1% ) & " " # # " $ " . " " ' " 7 % " # 1* A3 * " ## (

" #

. G

'

'9 # '

6 )

# " $ $

#

" # &

' $

'

"

*

&

* "

* " $ * % & & 1 ## " * # " '

" .( " * . $. # " C7 % D # -

* )' )&& 5) ' )' & * 7 % ' & " " $ * # " . ,1% * " * " ' $ # * # ( * * ! $. *. $ " " # " # # " $ " " ". * 1* ' 0 ' "* 6 ') 1 " ' ( $ " * # * " # $ * ## " $ " !#

" & + &

*

" *

# * "

) & . " ( )* * $& $ 4" " . & $ 4 ' *

-

*

" $ "

*I * / &

" )

*# .

'

# "

&1 .

"

N ,

. #

' "$ D

'

"$. * % ' (. $

# ") '" # # "

'

) $

* "

# N

( ) ' ' . # ") .

$ C 1

VRF-Aware ICMP Ping and LSP Ping/Trace Mechanisms B+/

(

# ) #. *

# ")

*

#

$

" $ .(

# ' "

L " " # " " $ * " $

"

"

" (

" (

)

* % & % & $ # #

$ * '

# $* ! *

. " # " *# % & & ' $ #

# #

* (

# ") ( " "

" - ' # " * " ' *

% & " " & & +. ( " # & + *

" " /7 #

" . " "

# " * ' #

. " / /7

%

% &

C #

(

I

"

# "

2 "

$ "

. " * &

'

"

$ # # ") ") " * . "

' '" .# *

" # ( $

" .# " "

" ' $' # $

% &

" B+/

. ""

2

" '

'

(

& # #

.

/7

'

"

" #

" ". #

" # ") .

/7

# #

"

"

#

B+/

(

"

.

$

"

" &

$ C/7 D

"

" $ B+/ (

* ' ( )

"

D "

"

% & " /7 > # % & " ' & # *

" ' $

# & +. -

#

" "

(

& + C

"

.

'

"

#

& # I " # ' & > & ' % & " # / % & . # ' " ( ) % & ( ) I " # * % & # $ % & ( )

'

" ** " -

*# * #

"

% & # # # # ") *

*# ( )

# #

" B+/

(

# ") *# * * & + " # % # ") C # % # ") " * #

# 7 .

( " D # ")

"

" B+/ .

B+/ #

/7 D

* *# . # * #

# " ") "

# #

" ( * *

")

" " # ' C

'

# D

(

)

* " " *

&D % &

% &

#

(

,1% " #

*

C

"

#

( #

'

* #

"

'

Dealing with Equal Cost Multipaths /

-

$. & .& "

' ' # *

) #

/7 " ") # #

$&

* # "

. "

" ' 45I6 *

"

"

*

& +

' * *" # ")

* " /

' $

#

" .

*

-

< . % & # " # ")

#

"

(

#

" " " '

.

" " & +# '

"

" "

# < "

#

"

(

I

" % & " & + "

*

(

"

.

*

% & *&

" '

"

Noncompliant Routers "

% & & +

" * $ * #$ 4

#

I " /7 ") " * * & + * " & + (

**

2

1 + -

&

'

*

" *# ( " . # ## % & # . #$ & + ## % & # . #$ & $. & + " ( & Z F . F 4. F) # ** ## % & " -

#

"

"

%

-81

" % &

"

)

")

*

% & B

$

#

" % !

"

% &

% &

&

#

C

% &

&

"

% &

&

"

&

#

#

% D

" # #

" ' $" $

# "

"

' #

% &

" #

& + ' # "

#

( .

#

*

' * .

") "

2

1## "

': &

#

.B

': #

7 % & 7. B .% & 7 /

+/

" " ' $ 7 ## "

% &

#

.% &

: 58

LSR Self-Test & +

(

# $ )

"

* ' 7 % * ) (

$ ' * " * & + *

" * #

' ( .*

'

$

* 1 & + .( " C / & + #

" " # . " 7 % " & + % & *& + . $* # ) ( A ( ' . & +. * ) #

$ < '

4 4D

$

' #

'

" #

" * ' (

%

,

'6 1

" % & ( ) .$ $ " * / ( "* " * " # I " B B. / # ' " ** 2 B B. / " "

1 + -

*

'

%

1

$

) # "

,

0

6@

@ 3&&' "

* ' *

#

(

$#

(

% & & # " C 7 7" " ' $D.

* B

B #

# ")

( (

"

'"

C >D

( " *# " *# # ( "

% &

' 0

'

"

B

*

" ** #

" *#

"

B

B

B "

># $

& 4 4

" $#

!

#

$# 4 ! $# 1## "

"

>"

(

% &

%

& $

# ")

#

4

&

#

'

% &

/+ % & . 1 % % & . 7 % & 7 /

#(

>

'

'" # B+/ (

'"

' #

7 "

! !

.

"

% & B .( ,1% . " % & # I "

# "

.%

"

4

'""'

# B+/

I (

% &

#

.

# " (

$

" #

* I "

7

'

" (

B "

"

#

I

,1%. "

.

1

*#

*

" ' $ " ' $ (

B 7

' B

' ! :

* *

I#

I $

"

&

*

#"

"

( #

"

"

" * "

"

/

" " #

# ") ( ! #

# / "

B "

% & B

B " "

&

B B ( * #

B / #

*

( & + "

7 "

*2

#

*

#

"

* " ( (

"

' %

% &

1 / . # ") # "

# # ")

*#

" (

' #

1

" # ! * # 56: :84;4 9;; ;. ( " # ") " 56; B B / " " *# * B B " ( # # ( , # ( % & & * " * " * / * G . / *# * $ ' " ' ( * / " " # ' ( # / $. . / " ' ( " ' * 4 " *# B B / * ( * " " *# * B B " # # ( B B / * ( ) ' % & ( ) . $# % & . ". &4 . J+7.

1

'

%

E% @

@ 2;.

) @

/

B #

B

L

B

B

L

@ " ,'

"

/

@ "$

L

A & (

/

A Word About Interworking OAM >

" * " " C1 D # ( C >D $# . &4B * " # * C ) ) D. # " # 7' # ( ) . * * ) ( ) ( ) " # > # # ( ) * ( " * " " " "$ 1 % ( )C ( )D # ( * * " " "$ ( )

* .

'"

( • • •

$#

)

) &4B

'

" * &4 ' ' " C1 D

% &

1 % % & /+ % & 7 % &

Any to Any 1 $ *

$ &4B $

* & $

( #

)

C"

(

4

'

'" *

# '" . " $#

"

#

**

$

$ "

• • •

1 % /+ /+ 7 1 % 7

1

" . 1 %. /+. 7 D" '

. 1 '"

# . # "

* #

#

(

Local Switching > "

1 %

&4B

"

"

*

*

.

&

Encapsulation Types and Modes ATM over MPLS * " D % & I •

1 %

.

1 %" ( (

) *

" 7 * $. "

( *

* ## $#

CB . B . #

D

# * # ")

> C

" "

*

$

"

'



1 %

*

CB IB D

* # ") • •

*

##

"

# ")

#

"

"$

*

$. (

" #

1 % 1 %

!* !*

C C

11&;D 11&;D

ATM N:1 Mode " # ( " .

#

## " " # B IB * * *

" " # ")

"

* "

*

* . ' ") * ##

# B IB $B .B . * " B >

# >

"

$. *

ATM 1:1 Mode *

.

" "

B >. >

* ## I B >

B

>

" 1 %B

$ B

1 %B "

B '

*

AAL5 SDU Mode 11&; " #

!

" # "

*

" "

*

$

11&;

$ 11&; '" 11&; *

!

11&; . "

! .

B + .

"

# AAL5 PDU Mode # * # * 1 %

$ ## " ## " 1 % $ * ' " $ ## "

* " # 11&; "

' $ #

$ 1 % ,1%

Frame Relay over MPLS $. ( *

#

#

/

* +

$ '

% & •

A #



B

* . / * + $" > C " " D ( 7 /+ # * # ' # ( # " *# /+ * " . ' ' $ 7G " 7

1 >" # A ( '

$ .

* "

$

. *

' '

"

( " 0 * " "

" (

* ##

7# * "

. ") /+ B ' /+

" " **

$ "" ""

. # (

. " $ "" #

" ,1%

$" *

I 7'

"

$

. #

( " $ # *

." ) . ,1% ( *

.

Generic Failure Types " )

(

"

" "

$# "

( .#

" (

% & .

&

"

Interface Failure "

'

.

"

"" C J D

( " "$.

* .

) N "

.

, 7 1 . 7 7 ) J ( $

$ "" "

$ &

Pseudowire Failures >

( •

>



>



&

) N " "$ ' # % & ,1% & #

)

#

# J

"

'

(

""

7

" "

(

*

( ) "

" % &

,1%

"

"

. >

"

B

B. % & .

Tunnel LSP Failures 1 $ J % & " / "

" N "

#

*

"

" "

% & ' (

'

.

"

"

)

& &

'

"

" (

# " "

( ) (

#

"

"

#

$.

* #

$

"

" (

'"

( • • • • • •

' " " $ D ** ' $# >/D % * * ' # *# $ " " ' ' " * " "

$ # (

* )

"

" ' $ ' * # # # $D * * ( " W [ >W [ " *

" C C

*# . "

(

"$

"

* "

#

C

' ( " "

D

)

C

*



* % &

>

)

(

.$ * ##

)

" * " '"

*

"

* * ## "

" (

$(

) ,1% # $ 1 $

,1% #

'

Configuration Management for MPLS-Based Networks # $ " # . ( ) * "" '" # " *# ' # ' * B '" '" # ' G

; -)

% & B '" # " ( # $* .* " . '" * # " " ' ' # * ) / " *# '" - ") $ " ' $# .# ' $ / 4 *# $ # . * # $*

E%

* "

-

* " * . ( ' . # " "

-

(

)

* # '"

.

* ''

. % &

-

[View full size image]

*

#

#

• • • • • • & $

. B 1 1 &

B

* " * * ## * "

'

(

,1% 7 '" " ,1% '" #

*& $

"

(

)

'"

#

7.

" " ' "

$

# '"

& $

" ' * % .#

4B

**

"

"

'" #

'

"

( '"

# 4 "" # ' /

" .

& $

B & $

" * ( " & $ B # " "

" $

. *



. '" # $

'

B % & %

% & 7

# * 1

2

"$ %

' B "

• •

'" # ' $. .7

- #* 7 * "

* "

'" '"

&1 C7 D B

* # " ""



*

" '

% &

# *

(

$#

7' *# " 1 % & . * 1 $ # *

C

.

'

B

)*

" " * " *

*

)

7 ( (

- ") $. " "

$ "

". 1 % '

% & . B

"

7*

*

>

'

"

$ ' '"

C7B

DG

)

.

.

( " ( " % & B " $ ( " ' $ - ") $ $2 . # " " * " ( ) # " C , D B ' (

"

" $ "

"

* +

" * .

7

"

$ .

/

#

( "

" $ *# $. # ' " * & $ B # ' $ " C J :D. . ## " " # B ( )

" 7 C & DG

*

#

C 7D " * *# * ( $

.

'" " & $ &1 .

'

B .*

.

% & % & " *

.

" ' $

"

D % & B

( " ' *

"

B * +

J .

#

" #

'

'" # ' '" # $ "" " * '" ## $ * C D & $ 4 % &

"

#

#

"

# " *#

(

& $ 1 %. /

* "

"

"

"



" B "

# "

" " & $ '" # ' 0 ( ) C & $ 4D B " " ' ( J ( $

& $

# ,

.

#

(

#

& $

$ '" # ' . " " ' $

" "

"

*

(

B

" $" # * * ' % ' "

"

" - ") $ # * " '

. % &

"

$ "

* '" ' " "$" ' ( ) . "

$ , # '

$ .

/

,

"

*

* ** '" #

"

*

( • •

* # " '

"

. " " CH%& ' ,

0

" '

( A

D

#

'

" *

*

## "

"

*

*

" $"

.

'

"

#

$

*

"

"

( "

#I

B+/ #I

(

(

B+/

* C*

B+/

/ "

.

#I

$

* '

" . B+/. C

%

#

$

* "

" .

$ " '"

."

*

' "

$# • • •

D

(

.

B

)"

"

#

.

B&1 D. "

" *# "

#

'

.

*

" & $ 4 "" % & B & $ 47 "" * B&1 7 + $ ' " C7+ D. 7 > % & B '" " $ ## % $" * " '" 1

*

"

B&1

$' *

.*

.

" " & $ 7

' " C7> D. " % * & $ 47

$ *# " * "

$" *

* "" 4 "" '" "

* $"

"

.

*

*#

" #I ( B&1 # ( '" #I (

% & B & " I ( "

( # &4 B

" ' * " * " '" # $ . ( ) # " " # $ '" 1" ' ' ' '" -

$ " "

# "

( #

) / , "

" '

#

"

, / "

& " ** % &

B

( '"

#

"

)

'" .

"

#

*

" 7

7 * * )
#

.

"

( "

Network-Wide Scale A '

"

' $



#

"

* *

"

' ' ( ) " * " ( ( ) ( /

$ ( # "

(

* )

# *# * ' *# * ( ) * # B+/ ( '" " * $ (

* ( ) (

"

( ) " ** $

*

"

(

)

*

C* ' ( )DA ' $ A ( ' .( * ' # " . # $ " " " " $# * * '" " " '" " # " * $ ' " $ # ) '" " " # # " " . * " * ) " '" ## # $ . '" ## # B+/ '" " # " * $

.

.

* # /



#

"" # # '

'

*

*

" 1 #" $ " # ). ( / * J ( # * ( # A ( ' . * # " ## # '" * * J * ( ) " * 7 . ' * J * # + " ( " B 7 " " " " # " $( 7 . $" # $# ( * 7 , 7 . $ # $( ( " * 7 " * J 7 " J # " # * ( )" ' " ( ( " *# * J . $ " ' " " $ A # ) ' * % / * + $ 1 %B # ) . ( % & & B . * " " ' $ * * " A ( ' .( B . * " . " " * *# . " * # ) * ( " * * "



* " " #

" J

"

.

Management and Scalability ( ) ## "

*

*

. $ . & ) * * '" $ * % " #

# ") (

" ,

%

. ## ##

" " "

(

* B # $ # A ' # ' 7 " " B * " " ** $* " * " $ N "

< # * * *

"

##

) ' (

" )

I * # (

; * # '

*

* * *. * $( % "" # # # ' &7 % ## ( " * # B # " '" A ( ' . ( ( )* * C %D # $ # " % "" $ " ' % " ( ) *

( ) " $ * " *# 1 * * $. *

( ( # ' ,# * $

)

# 7

" * ( )

$ (

C* * $ * D " $ $ , " ( " " # " . ( . ( ) " $" " ' $ ( ) " $ '" A ( ' . $ * " . *# $ $ ' " * $ *0 * $ % ' . # ( * * .( # # # ' $ *. ( # * " 1 * '" " ' $ * * $

&

"

* * " * ) '

" "

> *# ( (

J . # ) # "

( ) *

*

# ") ( ' * " / ## P% 7Q

' "

* # * + * ( )

.

B ( $"

( *

" * # '