Books & Videos

Table of Contents

  1. Chapter 1 Introduction to MPLS and SDN

    1. The Internet

    2. ISP Example Topology

    3. MPLS

    4. OpenFlow

    5. SDN

    6. The SDN Era

  2. Chapter 2 The Four MPLS Builders

    1. LDP

    2. RSVP-TE

    3. IGP and SPRING

    4. BGP-Labeled Unicast

  3. Chapter 3 Layer 3 Unicast MPLS Services

    1. 6PE: IPv6 Transport in an IPv4/MPLS Core

    2. BGP/MPLS IP Virtual Private Networks

    3. Route Target Constraint

    4. Coupling MPLS Services to Transport Planes

  4. Chapter 4 Internet Multicast Over MPLS

    1. IP Multicast

    2. Classic Internet Multicast

    3. Signaling Join State Between Remote PEs

    4. Internet Multicast over MPLS with In-Band Multipoint LDP Signaling

  5. Chapter 5 Multicast VPN

    1. BGP Multicast VPN with mLDP Transport

    2. BGP Multicast VPN with RSVP-TE P2MP Transport

    3. BGP Multicast VPN with Ingress Replication

    4. CE Multihoming in BGP Multicast VPN

    5. BGP Multicast VPN with C-PIM ASM

    6. Noncongruent C-Unicast and C-Multicast

  6. Chapter 6 Point-to-Point Layer 2 VPNs

    1. L2VPN in a Nutshell

    2. VPWS Signaled with BGP

    3. VPWS Signaled with LDP

  7. Chapter 7 Virtual Private LAN Service

    1. Introduction to VPLS

    2. VPLS Signaled with BGP

    3. VPLS Signaled with LDP

    4. VLANs and Learning Domains in VPLS

    5. Integrated Routing and Bridging in VPLS

    6. Hierarchical VPLS

  8. Chapter 8 Ethernet VPN

    1. EVPN with MPLS Transport

    2. Ethernet VPN with VXLAN Transport

    3. Provider Backbone Bridging EVPN

  9. Chapter 9 Inter-Domain MPLS Services

    1. Inter-Domain Architectures

    2. Inter-AS Flavors

    3. Inter-AS Option A

    4. Inter-AS Option B

    5. Inter-AS Option C

    6. Carrier Supporting Carrier

    7. Inter-Domain RSVP-TE LSPs

  10. Chapter 10 Underlay and Overlay Architectures

    1. Overlays and Underlays

    2. Multiforwarder Network Devices

    3. Multichassis Network Devices

    4. Legacy Data Center Networking

    5. Data Center Underlays—Fabrics

    6. Network Virtualization Overlay

  11. Chapter 11 Network Virtualization Overlays

    1. OpenContrail in a Nutshell

    2. Case Study: A Private Cloud

    3. Communication Between Virtual Networks

    4. Network Virtualization Overlay: L2_L3 Mode

    5. Integrating Legacy L2 World into the NVO

  12. Chapter 12 Network Function Virtualization

    1. NFV in the Software-Defined Networking Era

    2. NFV Practical Use Case

    3. NFV Forwarding Plane

    4. NFV—VRF Layout Models

    5. NFV—Long Version of the Life of a Packet

    6. NFV Control Plane

    7. NFV Scaling and Redundancy

    8. Service Instance Flavors

  13. Chapter 13 Introduction to Traffic Engineering

    1. TE Protocols

    2. TE Information Distribution

    3. TE Static Constraints

    4. Egress Peer Engineering

  14. Chapter 14 TE Bandwidth Reservations

    1. TE Static Bandwidth Constraints

    2. TE Auto-Bandwidth

    3. Dynamic Ingress LSP Splitting/Merging

  15. Chapter 15 Centralized Traffic Engineering

    1. BGP Link-State

    2. PCEP

    3. PCC Label-Switched Path Signaling

    4. PCC Configuration

    5. PCE Use Cases

  16. Chapter 16 Scaling MPLS Transport and Seamless MPLS

    1. Scaling an IGP Domain

    2. Scaling RSVP-TE

    3. Intradomain LSP Hierarchy

    4. Interdomain Transport Scaling

    5. IGP-Less Transport Scaling

  17. Chapter 17 Scaling MPLS Services

    1. Hierarchical L3VPN

  18. Chapter 18 Transit Fast Restoration Based on the IGP

    1. Fast Restoration Concepts

    2. Loop-Free Alternates

    3. Extending LFA Backup Coverage

    4. Maximally Redundant Trees

  19. Chapter 19 Transit Fast Restoration Based on RSVP-TE

    1. RSVP-TE Path Protection

    2. RSVP-TE Facility (Node-Link) Protection

    3. RSVP-TE One-to-One Protection

    4. Transit Fast-Restoration Summary

  20. Chapter 20 FIB Optimization for Fast Restoration

    1. Next-Hop Hierarchy

    2. Preinstalled Next Hops to Multiple Egress PEs (PIC Edge)

  21. Chapter 21 Egress Service Fast Restoration

    1. Service Mirroring Protection Concepts

    2. Combined Protector/Backup Egress PE Model

    3. Separate (Centralized) Protector and Backup Egress PE Model

    4. Context-ID Advertisement Methods

    5. L3VPN PE→CE Egress Link Protection

    6. Layer 2 VPN Service Mirroring

    7. Egress Peer Engineering Protection

    8. Protection in Seamless MPLS Architecture

    9. Summary