This book introduces the ins and outs, architecture, and application areas of Multiprotocol Label Switching (MPLS) technology. The content includes the use of algorithms and IP control protocols, Ipsilon IP switching, Cisco's label switching, MPLS core protocol (LDP), and QOS. The main methods, as well as the method of using MPLS to establish VPN, etc. are rich in content, illustrated and illustrated. It is a complete reference manual for MPLS and can be used as a reference for network designers and developers.
Introduction As the epitome of the rapid development of technological innovation in the Internet, the concept of "Internet Age" has been widely known by now. Multi-protocol label switching technology-MPLS is the fastest growing technology in the network era. When writing our first book on label switching technology, we only described possible future directions for MPLS because at that time MPLS was still in the early stages of definition and standardization. We didn't even dare put the term MPLS on the cover for fear that few people would know what MPLS was. MPLS has now become a fundamentally important technology in the Internet, and publishing a book on the subject is clearly timely (if not late). Some of the largest Internet service providers have adopted MPLS in their networks to solve problems such as traffic engineering and provide IP services over ATM backbone networks. Virtual Private Networks (VPNs) based on MPLS have emerged and the first users of these services have enthusiastically adopted this new technology. Most high-end routers now seamlessly support MPLS and have demonstrated interoperability. . Despite these successes of MPLS, there are still people who don't know much about MPLS. Some people even mistakenly believe that the main attraction of label switching is that it can be implemented efficiently and therefore improves forwarding performance; others attribute the improvement in forwarding performance to the success of high-speed IP lookup algorithms and hardware, thus arguing that MPLS Doesn't provide any value at all. In this book, we have correctly explained what MPLS is and how MPLS works, and also introduced in detail some of the advantages of MPLS. While these advantages do not imply that MPLS should be used in every network in the world, their sheer importance is a cause for concern for the vast majority of large network operators and those who must purchase network services from service providers. We have tried to make this book easy to understand and accessible to the general public. We assume that most readers will already have some familiarity with IP routing, but we provide some background knowledge in this area where appropriate. More advanced readers will be able to skip those sections that discuss routing standards. We discuss some pretty advanced routing functionality in the last two chapters, but readers without a strong background in routing need not read this. Likewise, this book's discussion of Quality of Service (QoS) may be too brief for readers looking for a comprehensive guide to this topic, however some more experienced readers may skip this overview of the topic. We hope this book will be valuable to network designers and engineers in both service provider and enterprise environments who need to understand MPLS well enough to decide whether MPLS is a possibility in their networks. Alternative options available. This book will provide a wealth of knowledge about label switching compared to other technologies (such as traditional routing and Layer 2 switching) and weigh different options for one technology. This will allow you to make an informed judgment about what role (if possible) MPLS will play in your network. This book will also provide engineers developing MPLS products with some useful knowledge in this field. The information here will make it easier to understand the detailed technical information that can be found in Internet drafts, Requests for Comments (RFCs), and documentation provided by various MPLS vendors. In areas where standards are not yet complete, you may have concerns about whether to adopt the methods currently recommended or wait until future standards are finalized. About the structure of this book The chapters of this book are divided into three parts: Introduction and Overview: Chapter 1 and Chapter 2. ?Details of two previous techniques: Chapter 3 and Chapter 4. ?MPLS Protocol and Application: Chapter 5 to Chapter 8. In Chapter 1 we discussed the need to invent label switching in general and MPLS in particular. We describe the many problems that label switching technology aims to solve and its brief history, which has attracted so much attention. Chapter 2 describes the overall structural issues of the entire field of label switching. There are certain basic similarities between MPLS and some of the label switching technologies that preceded it, such as the use of forwarding algorithms and IP control protocols. Additionally, the designer of any label switching approach must make some of the same, key structural choices, such as choosing between control-driven and data-driven label allocation. We discuss the divergence of these choices. Chapters 3 and 4 provide detailed descriptions of the two most important technologies that are precursors to MPLS products. The first of these technologies is Ipsilon's IP switching, which is the biggest reason why label switching is famous in the networking industry. The second technology is Cisco's label switching. Many basic concepts of MPLS originate from label switching. By analyzing these two technologies in detail, we see that there are many design choices and make some of the factors that shape MPLS design clearer. In Chapter 5 we begin the detailed description of MPLS by discussing the basics of the MPLS architecture and some core protocols, especially the Label Distribution Protocol (LDP). We described the role of MPLS in supporting quality of service in Chapter 6 and explained how the two main QOS methods in the Internet (integrated services and differentiated services) are supported in an MPLS network. Chapter 7 explains the use of MPLS for constraint-based routing and discusses the range of protocols that may be used in this application. Finally, Chapter 8 describes one method of establishing a VPN using MPLS. In this book, we discuss different approaches and a variety of design judgments. We try to remain as objective and unbiased as possible in our analysis. Because we are involved in the design and standardization process of certain protocols, preference for certain design choices is inevitable. However, we have tried to present the different approaches objectively and avoid "overhyping" MPLS, allowing you to draw your own conclusions.
Multi-protocol label switching
Preface Chapter 1 Introduction
1.1 Reasons for the emergence of MPLS
1.1.1 Growth and Evolution of the Internet
1.1.2 Price and performance
1.1.3 IP integration on ATM
1.1.4 Extend routing function
1.2 Historical review of MPLS
1.2.1 IP on ATM
1.2.2 Toshiba’s cell switching router
1.2.3 IP switching
1.2.4 Flag exchange
1.2.5 IBM’s ARIS
1.2.6 Multiprotocol Label Switching Working Group
1.3 Summary
1.4 Reference Information Chapter 2 Basic Concepts
2.1 Network layer routing function devices
2.1.1 Forwarding Equivalence Class
2.1.2 Provide consistent routing
2.2 Label switching forwarding function device
2.2.1 What is a label
2.2.2 Forwarding table of label switching
2.2.3 Carrying labels in packets
2.2.4 Label switching forwarding algorithm
2.2.5 Single forwarding algorithm
2.2.6 Forwarding granularity
2.2.7 Multi-protocol: upper-layer multi-protocol and lower-layer multi-protocol
2.2.8 Label switching and forwarding function devices: Summary
2.3 Label switching control function devices
2.3.1 Local binding and remote binding
2.3.2 Upstream binding and downstream binding
2.3.3 “Free” label
2.3.4 Establishing and canceling label binding: control-driven and data-driven label binding
2.3.5 Distribution tag binding information: what are the options
2.3.6 Multicast considerations
2.3.7 Handling routing transients
2.4 Edge devices
2.5 The relationship between label switching and network layer addressing and routing
2.6 Summary
2.7 Reference Information Chapter 3 IP Switching
3.1 IP switching overview
3.2 Ipsilon flow management protocol
3.2.1 IFMP Adjacency Protocol
3.2.2 IFMP redirection protocol
3.2.3 Encapsulation of redirected streams
3.2.4 IFMP and security
3.2.5 IFMP and TTL
3.3 Universal switch management protocol
3.3.1 GSMP Adjacency Protocol
3.3.2 GSMP Connection Management Protocol
3.4 Implementation
3.5 Summary
3.6 Reference Information Chapter 4 Flag Exchange
4.1 Overview
4.1.1 Support destination-based routing
4.1.2 Improving routing scalability through routing knowledge architecture
4.1.3 Multicast
4.1.4 RSVP using flag exchange
4.1.5 Explicit routing
4.2 Flag exchange on ATM
4.2.1 Carrying flag information
4.2.2 Destination-based forwarding
4.3 Flag encapsulation on non-ATM links
4.4 Handling flag failures
4.5 Handling forwarding loops during routing transients
4.6 Logo Distribution Agreement
4.7 Summary
4.8 Reference Information Chapter 5 MPLS Core Protocol
5.1 Origin and Charter of the Working Group
5.2 MPLS architecture
5.2.1 Orderly control versus independent control
5.2.2 Loop detection and prevention
5.3 Packaging
5.4 Label distribution
5.4.1 Label Distribution Protocol
5.4.2 Using BGP label distribution
5.5 ATM issues
5.6 Multicast
5.7 Summary
5.8 Reference Information Chapter 6 Service Quality
6.1 Integration Services and RSVP
6.1.1 Overview of Integration Services
6.1.2 MPLS supports RSVP
6.1.3 RSVP and scalability
6.2 Differentiated Services
6.2.1 Overview of Differentiated Services
6.2.2 MPLS supports differentiated services
6.3 Explicit congestion notification
6.3.1 ECN Overview
6.3.2 MPLS supports ECN
6.4 Summary
6.5 For reference information, read Chapter 7 Constraint-Based Routing
7.1 Overview
7.2 Functional devices based on constraint routing
7.2.1 Constrained shortest path first
7.2.2 MPLS as a forwarding mechanism
7.2.3 RSVP extension
7.2.4 CR-LDP
7.2.5 OSPF and IS-IS extensions
7.2.6 Comparison between CR-LDP and RSVP
7.3 Application to traffic engineering
7.3.1 Description of the problem
7.3.2 Using ATM or Frame Relay to solve traffic engineering
7.3.3 Why ordinary IP routing is not enough
7.3.4 Using MPLS constraint-based routing to solve traffic engineering
7.4 Application to fast rerouting
7.4.1 Route convergence of ordinary IP routing
7.4.2 Using fast rerouting based on constrained routing
7.5 Application to QoS
7.5.1 The relationship between QoS and routing
7.5.2 LSP with guaranteed bandwidth
7.6 Summary
7.7 Reference Information Chapter 8 Virtual Private Networks
8.1 What is VPN
8.2 Superposition model
8.3 Peer-to-Peer Model
8.4 Constrained distribution of routing information
8.5 Multiple forwarding tables
8.6 VPN-IP address
8.7 MPLS as a forwarding mechanism
8.8 Scalability
8.9 Security
8.10 QoS support
8.11 Advanced Topics
8.11.1 Internet Service Provider as User
8.11.2 BGP/MPLS VPN service provider as user
8.11.3 Operation with multiple providers
8.12 Summary
8.13 Reference Information Conclusion Glossary