Third Networks and Services 1st Edition by Mehmet T. Toy; Hakki Candan Cankaya – Ebook PDF Instant Download/Delivery: 163081430X, 9781630814304
Full download Third Networks and Services 1st Edition after payment

Product details:
ISBN 10: 163081430X
ISBN 13: 9781630814304
Author: Mehmet T. Toy; Hakki Candan Cankaya
This comprehensive new resource presents applications of MEF’s (Metro Ethernet Forum) Carrier Ethernet architecture and provides insight into building end-to-end systems with third network services like MPLS-TP, VPLS, and PBT. This book includes new use cases and explores the new MEF/CEN specifications, services, and applications. While providing a look into lifecycle service orchestration (LSO), virtualization, and cloud series, this book highlights the pros and cons of these technologies for service providers and enterprise network owners. Pseudowires architectures, control planes, mutisegment architecture, and multisegment pseudowire setup mechanisms are explained. Ethernet protection is explored, including Automatic Protection Switching (APS) entities, linear protection, ring protection, and link aggregations. This book covers Carrier Ethernet Traffic Management, Carrier Ethernet Operation Administration Management and Performance (OAMP), Circuit Emulation Services (CES), and Carrier Ethernet Local Management Interface (E-LIM). Full chapters on Provider Bridges (PB), Provider Backbone Bridges (PBB), Provider Backbone Transport (PBT), and information modeling are also included in this invaluable resource.
Table of contents:
CHAPTER 1. Introduction and Overview
1.1 Introduction
1.2 Basic Ethernet
1.3 Synchronization
1.4 Pseudowires
1.5 Protection
1.6 Carrier Ethernet Architectures and Services
1.7 Carrier Ethernet Traffic Management
1.8 Ethernet Operations, Administration and Maintenance (OAM)
1.9 Circuit Emulation
1.10 Ethernet Local Management Interface
1.11 Provider Backbone Transport
1.12 T-MPLS and MPLS-TP
1.13 Virtual Private LAN Services
1.14 Information Modeling
1.15 The Third Network
CHAPTER 2. Basic Ethernet
2.1 Introduction
2.2 CSMA/CD
2.3 Full Duplex, PAUSE, Autonegotiation
2.4 Repeaters and Hubs
2.5 Bridges
2.6 Switches
2.7 Physical Layer
2.7.1 10-Mbps Ethernet
2.7.2 Fast Ethernet
2.7.3 Gigabit Ethernet
2.7.4 10-Gb, 40-Gb, and 100-Gb Ethernet
2.7.5 LAN PHY
2.7.6 LAN PHY/WAN PHY Sublayers
2.8 Temperature Hardening
2.9 Standards
2.10 Ethernet Frame Types and the EtherType Field
2.10.1 Ethernet Frames
2.10.2 Ethernet Address
2.10.3 Ethernet II or DIX
2.10.4 IEEE 802.3
2.10.5 IEEE 802.2
2.10.6 SNAP
2.11 Conclusion
References
CHAPTER 3. Synchronization
3.1 Introduction
3.2 Application Requirements
3.3 Synchronization Standards
3.4 NTP/SNTP
3.5 Precision Time Protocol (IEEE 1588)
3.6 Synchronous Ethernet Networks
3.6.1 Clocking Methods for Synchronization
3.6.2 Impact of Packet Network Impairments on Synchronization
3.6.3 Stabilization Period
3.6.4 IWF Synchronization Function
3.6.5 PRC
3.6.6 Operation Modes
3.6.7 Frequency Accuracy of Slave Clock
3.6.8 EEC
3.7 Conclusion
References
CHAPTER 4. Pseudowires
4.1 Introduction
4.2 Protocol Layers
4.3 Payload Types
4.4 Pseudowire Architectures
4.4.1 PWE3 Preprocessing
4.4.2 Payload Convergence Layer
4.4.3 PW Demultiplexer Layer and PSN
4.4.4 Maintenance Reference Model
4.5 Control Plane
4.5.1 PWE3 over an IP PSN
4.5.2 PWE3 over an MPLS PSN
4.6 Multisegment Architecture
4.7 Multisegment Pseudowire Setup Mechanisms
4.7.1 LDP SP-PE TLV
4.8 Resiliency
4.9 Quality of Service and Congestion Control
4.10 Operations and Maintenance
4.11 Security
4.12 Conclusion
References
CHAPTER 5. Ethernet Protection
5.1 Introduction
5.2 APS Entities
5.3 Linear Protection
5.3.1 1 + 1 Protection Switching
5.3.2 1:1 Protection Switching
5.3.3 Protection Switching Triggers
5.3.4 APS PDU Format
5.4 Ring Protection
5.4.1 Protection Switching
5.5 Link Aggregation
5.5.1 LAG Objectives
5.5.2 Link Aggregation Operation
5.5.3 LACP
5.5.4 Limitations
5.6 Conclusion
References
CHAPTER 6. Carrier Ethernet Architecture and Services
6.1 Introduction
6.2 Architecture
6.2.1 Protocol Stack
6.2.2 ETH Layer Characteristic Information (Ethernet Frame)
6.2.3 ETH Layer Functions
6.2.4 ETH Links
6.3 Interfaces and Types of Connections
6.3.1 UNI
6.3.2 Ethernet Virtual Connection
6.3.3 External Network-Network Interface (ENNI)
6.3.4 Operator Virtual Connection
6.3.5 VUNI/RUNI
6.4 EVC Services and Attributes
6.4.1 Ethernet Service Types
6.4.2 Ethernet Service Definitions
6.4.3 Common Attributes for EVC Services
6.4.4 E-Line Services Attributes and Parameters
6.4.5 E-LAN Services Attributes and Parameters
6.4.6 E-Tree Services Attributes and Parameters
6.5 OVC Services and Attributes
6.5.1 Operator Services Attributes
6.6 Single CEN and Multi-CEN L2CP (Processing for Single CEN and Multi-CEN)
6.7 Conclusion
References
CHAPTER 7. Carrier Ethernet Traffic Management
7.1 Introduction
7.2 Policing
7.3 Queuing, Scheduling, and Flow Control
7.4 Three-CoS Model
7.5 Service-Level Agreements
7.5.1 Frame Delay Performance
7.5.2 Frame Delay Range Performance
7.5.3 Mean Frame Delay Performance
7.5.4 Frame Delay Variation
7.5.5 Frame Loss Ratio
7.6 SLSs
7.6.1 Multipoint CoS Performance Objectives
7.6.2 Focused Overload
7.7 Application-CoS-Priority Mapping
7.7.1 CoS Identification
7.7.2 PCP and DSCP Mapping
7.8 Bandwidth Profile
7.8.1 Bandwidth Profile Algorithms
7.8.2 Models and Use Cases for Bandwidth Profiles
7.9 CBS Values, TCP, and Shaping
7.10 Conclusion
References
Bibliography
CHAPTER 8. Carrier Ethernet Operation, Administration, Management, and Performance (OAM)
8.1 Introduction
8.2 Link OAM
8.3 Service OAM
8.4 Maintenance Entities
8.5 Maintenance Points
8.6 OAM Addressing and Frame Format
8.7 Continuity Check Message (CCM)
8.8 Loopback and Reply Messages (LBM and LBR)
8.9 Link Trace and Reply Messages (LTM and LTR)
8.10 Ethernet Alarm Indication Signal (ETH-AIS)
8.11 Ethernet Remote Defect Indication (ETH-RDI)
8.12 Ethernet Locked Signal (ETH-LCK)
8.13 Performance Measurements
8.14 Performance Monitoring
8.15 Frame Loss Measurements
8.16 Availability
8.17 Frame Delay Measurements
8.18 Interframe Delay Variation Measurements
8.19 Testing
8.19.1 Y.1731 Testing
8.19.2 RFC 2544
8.19.3 Complete Service Testing
8.19.4 Service Activation Testing
8.19.5 SAT Control Protocol and Messages
8.20 Performance Monitoring Solutions
8.21 Security
8.22 OAM Bandwidth
8.23 Conclusion
References
CHAPTER 9. Circuit Emulation Services
9.1 Introduction
9.2 Circuit Emulation Functions
9.3 Adaptation Function Headers
9.4 Synchronization
9.5 TDM Application Signaling
9.6 CESoETH Defects and Alarms
9.7 Performance Monitoring of CESoETH
9.8 CESoETH Service Configuration
9.9 Conclusion
References
CHAPTER 10. Carrier Ethernet Local Management Interface
10.1 Introduction
10.2 E-LMI Messages
10.3 E-LMI Message Elements
10.4 E-LMI System Parameters and Procedures
10.4.1 Periodic Polling Process
10.5 UNI-C and N Procedures
10.6 Conclusion
References
CHAPTER 11. Provider Bridges, Provider Backbone Bridges, and Provider Backbone Transport
11.1 Introduction
11.2 IEEE 802.1AB
11.2.1 Architecture
11.2.2 Principles of Operation
11.2.3 802.1AB Frame Format
11.3 Provider Backbone Bridges
11.3.1 802.1ah Frame Format
11.3.2 PBB Principles of Operation
11.3.3 Provider Backbone Bridge Network
11.4 Provider Backbone Transport
11.4.1 Principles of Operation
11.4.2 End-to-End Carrier Ethernet with Multiple PBT Domains and Single Domain
11.4.3 PBB-TE Network
11.4.4 PBT: MPLS Internetworking
11.5 Conclusion
References
CHAPTER 12. Transport MPLS
12.1 Introduction
12.2 Differences from MPLS
12.3 Architecture
12.3.1 T-MPLS Interfaces
12.4 T-MPLS Frame Structure
12.5 T-MPLS Networks
12.5.1 T-MPLS Protection
12.6 Conclusion
References
CHAPTER 13. MPLS Transport Profile
13.1 Introduction
13.2 Frame Format
13.3 Architecture
13.3.1 Data Plane
13.3.2 MPLS-TP Router Types
13.3.3 Service Interfaces
13.3.4 IP Transport Service
13.3.5 Generic Associated Channel
13.3.6 Control Plane
13.3.7 Network Management
13.4 OAM
13.4.1 OAM Hierarchy
13.4.2 OAM Functions for Proactive Monitoring
13.4.3 Data Plane Loopback, RDI, AIS
13.4.4 Client Failure Indication, Route Tracing, and Lock Instruct
13.5 Protection Switching
13.6 Security Considerations
13.7 Conclusion
References
CHAPTER 14. Virtual Private LAN Services
14.1 Introduction
14.2 Data Plane
14.2.1 VPLS Encapsulation
14.2.2 Classification and Forwarding
14.2.3 MAC Address Learning and Aging
14.3 LDP-Based VPLS
14.3.1 Flooding, Forwarding, and Address Learning
14.3.2 Tunnel Topology
14.3.3 Discovery
14.3.4 LDP-Based Signaling
14.3.5 Data Forwarding on an Ethernet PW
14.3.6 Hierarchical VPLS
14.4 BGP Approach
14.4.1 Auto-Discovery
14.4.2 Signaling
14.4.3 BGP VPLS Operation
14.4.4 Multi-AS VPLS
14.4.5 Hierarchical BGP VPLS
14.5 Security
14.6 External Network-Network Interface
14.7 Conclusion
References
CHAPTER 15. Information Modeling
15.1 Introduction
15.2 Information Modeling of Carrier Ethernet Services for EMS and NMS
15.2.1 Management of EVC, OVC and ELMI and Discovery of Ethernet
15.2.2 Carrier Ethernet Service OAM Configuration
15.2.3 Carrier Ethernet Service Performance Management
15.2.4 Carrier Ethernet Fault Management
15.2.5 Common Management Objects for Carrier Ethernet Services
15.2.6 Class Diagrams of ITU-T Q.840.1 Carrier Ethernet Management Entities
15.2.7 Carrier Ethernet Management Entities
15.2.8 ENNI and Virtual UNI Related Objects
15.2.9 Fault Management Objects
15.2.10 Performance Monitoring Objects
15.2.11 ENNI and OVC MIBs
15.2.12 SOAM FM MIB
15.2.13 SOAM PM MIB
15.3 Service-Level Information Modeling
15.3.1 EVC
15.3.2 OVC
15.3.3 Carrier Ethernet External Interface
15.3.4 UNI
15.3.5 ENNI
15.3.6 ENNI Service
15.3.7 Egress Equivalence Class Identifier
15.4 YANG Models for Carrier Ethernet Services
15.4.1 SOAM YANG CFM Module
15.4.2 SOAM FM YANG Module
15.4.3 PM YANG Module
15.5 Network Resource Model for Carrier Ethernet Services
15.6 Conclusion
References
CHAPTER 16. Third Network
16.1 Introduction
16.2 Life-Cycle Service Orchestration
16.3 LSO Management Abstractions and Constructs
16.4 Virtualization
16.5 Network Virtualization
16.6 Virtualized Carrier Ethernet Services
16.6.1 Components of Virtualized Carrier Ethernet Services
16.6.2 Service Chaining for EPL
16.7 Cloud Services Architectures
16.7.1 Protocol Stacks and Interfaces
16.7.2 Cloud Services
16.7.3 Network as a Service
16.7.4 Infrastructure as a Service
16.7.5 Security as a Service
16.7.6 Platform as a Service
16.7.7 Software as a Service
16.7.8 Communication as a Service
16.8 Conclusion
People also search for:
7p networks
network 6
6′ networks llc
0 network
xfinity third party access
third-party service
Tags: Mehmet T Toy, Hakki Candan Cankaya, Third, Networks, Services


