Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
Chapter 1 Introduction 1.1 A Brief Introduction to MPLS 1.2 Applications of MPLS 1.3 Key Aspects of MPLS Network Management 1.4 Management Information Base Modules for MPLS Interview: George Swallow
Chapter 2 Management Interfaces 2.1 The Basics of Management Interfaces 2.2 The Command Line Interface 2.3 CORBA 2.4 XML 2.5 Bulk File Transfer 2.6 The Simple Network Management Protocol (SNMP) Interview: Arun Vishwanathan
Chapter 3 The MPLS Label Switching Router Management Information Base (MPLS-LSR MIB) 3.1 Who Should Use It 3.2 MPLS-LSR MIB at a Glance 3.3 Labels In, Labels Out 3.4 A Simple Example 3.5 The MPLS Interface Configuration Table 3.6 The InSegment Table 3.7 The MPLS OutSegment Table 3.8 The Cross-Connect Table 3.9 The Traffic Parameter Table 3.10 A Note about SNMP RowPointer Use 3.11 The Label Stack Table 3.12 Notifications 3.13 Scalability Issues with Notifications 3.14 Next Index 3.15 A Note about Indexing Interview: Kireeti Kompella
Chapter 4 The MPLS Label Distribution Protocol MIB (MPLS-LDP MIB) 4.1 The Label Distribution Protocol 4.2 Managing LDP 4.3 Definition of Terms Used in the MIB 4.4 The LDP Identifier 4.5 LDP Entity Table 4.6 LDP Entity Configuration General Label Range Table 4.7 ATM Tables 4.8 Frame Relay Tables 4.9 LDP Entity Example 4.10 Gathering Statistics for Entities 4.11 LDP Peer Table 4.12 LDP Hello Adjacencies Table 4.13 LDP Session Table 4.14 LDP ATM Session Table 4.15 LDP Frame Relay Session Table 4.16 The LDP Session Statistics Table 4.17 The LDP Session Peer Address Table 4.18 Modification of Established LDP Sessions 4.19 Operational and Administrative Status 4.20 Mapping Tables 4.21 Cross-Connects FEC Table 4.22 Notifications 4.23 What the MIB Does Not Support 4.24 How the MIB Varies from the LDP Specification 4.25 Using the MPLS-LDP MIB with TDP Interview: Joan Cucchiara
Chapter 5 The MPLS Forward Equivalency Class to Next-Hop Label Forward Entry MIB (MPLS-FTN MIB) 5.1 Who Should Use It 5.2 IP Traffic In, MPLS Labels Out 5.3 Forwarding Equivalency Classes 5.4 A Simple Example of FEC-to-NHLFE 5.5 MPLS FTN Table 5.6 MPLS FTN Map Table 5.7 MPLS FTN Performance Table 5.8 Another FTN Example Interview: Bruce Davie
Chapter 6 The Interfaces MIB and MPLS 6.1 Who Should Use It 6.2 IF-MIB Overview 6.3 Evolution of the IF-MIB 6.4 Applying the IF-MIB to Classic MPLS Networks 6.5 Applying the IF-MIB to MPLS TE Networks Interview: Adrian Farrel
Chapter 7 Offline Traffic Engineering 7.1 Traffic Engineering 7.2 Traffic Engineering in MPLS Networks 7.3 Deliberate MPLS TE Models 7.4 Tunnel Sizing 7.5 Tunnel Path Selection 7.6 Use of Offline TE for Backup Tunnels 7.7 The Traffic Engineering System 7.8 TE System Components 7.9 Input to Traffic Engineering Tools 7.10 TE Cycle Components 7.11 Offline versus Online Calculations Interview: Ross Callon
Chapter 8 The MPLS Traffic Engineering MIB (MPLS-TE MIB) 8.1 Constraint-Based Routing 8.2 Signaling Constraint-Based Paths 8.3 MPLS-TE MIB Overview 8.4 Definition of Terms Used in the MIB 8.5 RowPointer Usage in MPLS-TE MIB 8.6 Scalars 8.7 The Tunnel Table 8.8 MPLS Tunnel Resource Table 8.9 The CR-LDP Resource Table 8.10 MPLS Tunnel Hop Table 8.11 The Actual Route Hop Table 8.12 The Computed Route Hop Table 8.13 The Tunnel Performance Table 8.14 IF-MIB Applicability 8.15 Tunnel Table and MPLS-LSR MIB Interaction 8.16 Multiple Tunnels across MPLS Network Example 8.17 Notifications Interview: Harmen Van Der Linde
Chapter 9 NetFlow Accounting 9.1 NetFlow Overview 9.2 Flow-Based Accounting 9.3 NetFlow Architecture 9.4 NetFlow Data Export 9.5 Deploying NetFlow 9.6 NetFlow Accounting for MPLS Interview: XiPeng Xiao
Chapter 10 Traffic Matrix Statistics 10.1 The Traffic Engineering Problem 10.2 Traffic Matrix Statistics Objectives 10.3 Traffic Engineering Domain of Interest 10.4 Traffic Characterization 10.5 Selecting Sampling Periods 10.6 Traffic Matrix Structure 10.7 Measurement Architecture Options 10.8 Cost and Performance Considerations Interview: Danny McPherson
Chapter 11 The MPLS Virtual Private Networking MIB (PPVPN-MPLS-VPN MIB) 11.1 MPLS Virtual Private Networks (VPNs) 11.2 Definition of Terms Used in the MIB 11.3 The PPVPN-MPLS-VPN MIB at a glance 11.4 Scalar Objects 11.5 MplsVpnVrfTable 11.6 MplsVPNIfConfTable 11.7 MplsVPNPerfTable 11.8 MplsVpnVrfRouteTable 11.9 MplsVpnRouteTargetTable 11.10 MplsVpnVrfBgpNbrAddrTable 11.11 MplsVpnVrfBgpNbrPrefixTable 11.12 mplsVpnVrfSecTable 11.13 Notifications 11.14 Enterprise VPN Example Interview: Cheenu Srinivasan
Chapter 12 Future Directions for MPLS Network Management 12.1 Generalized MPLS (GMPLS) 12.2 Pseudo-Wire Edge-to-Edge Emulation 12.3 New Developments in MPLS 12.4 IETF PPVPN Working Group VPN Management Standardization 12.5 DMTF 12.6 Concluding Remarks
Appendix A: IETF and Other Standards Bodies Appendix B: MPLS-TC MIB
Index Concluding Remarks
MPLS-enabled networks are enjoying tremendous growth, but practical information on managing MPLS-enabled networks has remained hard to find. Until now.
MPLS Network Management: MIBs, Tools, and Techniques is the first and only book that will help you master MPLS management technologies and techniques, as they apply to classic MPLS networks, traffic-engineered networks, and VPNs. Written by the co-author of most current MPLS management standards, it provides detailed, authoritative coverage of official MIBs, examining key topics ranging from syntax to access levels to object interaction. It also offers extensive consideration of third-party management interfaces, including tools for metering traffic and predicting traffic growth and behavior. If you're a network operator, network device engineer, or MPLS application developer, you need this book to get all you can out of all of MPLS's many capabilities.
The only book devoted entirely to the tools and techniques for controlling, monitoring, debugging, and optimizing MPLS-enabled networks.
Authoritative information from the co-author of most IETF MIBs relating to MPLS and GMPLS, PWE3, and PPVPN.
Covers both standards-based and proprietary management technologies.
Includes interviews with seminal figures in the development of MPLS.
Via a companion web site, provides information on late-breaking developments in MPLS management and links to additional resources.
To be followed by a second volume presenting best-practice case studies dealing with how real companies approach the management of their MPLS networks.
third party network operators and engineers implementing MPLS for various devices
- No. of pages:
- © Morgan Kaufmann 2004
- 19th December 2002
- Morgan Kaufmann
- Hardcover ISBN:
- Paperback ISBN:
- eBook ISBN:
"This book deserves to be read not just because it is the first book on MPLS network management, but because it focuses on solving the real problems network managers face." —From the Foreword by Bruce Davie, Cisco Fellow, Cisco Systems "With this book, Thomas Nadeau provides both the necessary foundation and intricate details required to effectively deploy and operate MPLS-enabled applications and networks." —Danny McPherson, TCB "This text should be required reading for anyone deploying an MPLS-enabled network. It guides the reader through the body of MPLS MIBs, providing a level of detail that is appropriate for both network operators and developers of network management software." —Ronald P. Bonica, Co-chairman, IETF CCAMP WG "Tom's effort is a needed and precious contribution for turning MPLS technology and applications into a winning factor in our networking business." —Marco Carugi, IETF PPVPN WG Co-Chair - France Telecom R&D "The author has succeeded in attracting readers by using clear and simple descriptions of problems and incorporating many informative figures...The author of this book has succeeded in finding a clever way to combine descriptions of general concepts and terms explained with educational passion and an enormous amount of MIB detail that is basically just excerpts from relevant standards and drafts." - IEEE Communications Magazine
Thomas D. Nadeau is Chief Architect of Open Source and Distinguished Engineer at Brocade Communications. Prior to that he was a Distinguished Engineer in The PSTD CTO Office at Juniper Networks where he is responsible for leading all aspects of Software Defined Networks and Network Programmability. Thomas received his BSCS from The University of New Hampshire, and a M.Sc. from The University of Massachusetts in Lowell, where he has been an Adjunct Professor of Computer Science since 2000 and teaches courses on the topic of data communications. He is also on the technical committee of several prominent networking conferences where he provides technical guidance on their content, as well as frequently presents.
Chief Architect Open Source Software, Distinguished Engineer
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.