Preface |
|
xi | |
Acknowledgements |
|
xiii | |
|
PART I ARCHITECTURES AND PROTOCOLS FOR SERVICE AUTOMATION |
|
|
1 | (186) |
|
|
3 | (16) |
|
|
3 | (10) |
|
On IP Networks in General, and Routers in Particular |
|
|
3 | (2) |
|
On the Usefulness of Dynamic Routing Protocols in IP Networks |
|
|
5 | (2) |
|
On the Inability of an IGP to Address Interdomain Communication Needs |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
10 | (3) |
|
Context and Motivation of this Book |
|
|
13 | (3) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
How this Book is Organized |
|
|
16 | (1) |
|
What Is and What Should Never Be |
|
|
16 | (3) |
|
|
16 | (3) |
|
|
19 | (8) |
|
|
19 | (1) |
|
Deriving Policies into Rules and Configuration Tasks |
|
|
19 | (2) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
Policy and Device Configuration |
|
|
21 | (1) |
|
Policy-based Management Model |
|
|
22 | (5) |
|
Reaching a Policy Decision |
|
|
24 | (1) |
|
Requirements for a PEP-PDP Communication Protocol |
|
|
24 | (1) |
|
|
25 | (2) |
|
The RADIUS Protocol and its Extensions |
|
|
27 | (34) |
|
|
27 | (17) |
|
Protocol Structure and Messages |
|
|
28 | (8) |
|
|
36 | (3) |
|
Authorization and Provisioning with RADIUS |
|
|
39 | (5) |
|
|
44 | (17) |
|
|
44 | (3) |
|
|
47 | (2) |
|
|
49 | (2) |
|
Using RADIUS for Assignment, Prioritization and Filtering with VLANs |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (2) |
|
|
55 | (4) |
|
|
59 | (2) |
|
|
61 | (30) |
|
Learning from RADIUS Deficiencies |
|
|
61 | (4) |
|
|
62 | (1) |
|
Authentication Requirements |
|
|
63 | (1) |
|
Authorization Requirements |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
Diameter: Main Characteristics |
|
|
65 | (6) |
|
Diameter Network Entities |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (2) |
|
|
70 | (1) |
|
Peer Connection Maintenance for Reliable Transmissions |
|
|
71 | (1) |
|
|
71 | (5) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (2) |
|
|
76 | (1) |
|
Diameter Network Access Application (NASREQ) |
|
|
76 | (5) |
|
|
77 | (1) |
|
Enhanced Authorization Parameters |
|
|
78 | (2) |
|
Enhanced Authorization Examples |
|
|
80 | (1) |
|
Diameter Credit Control Application |
|
|
81 | (1) |
|
Diameter in NGN/IMS Architecture for QoS Control |
|
|
82 | (9) |
|
|
82 | (3) |
|
QoS Control in ETSI/TISPAN Architecture |
|
|
85 | (5) |
|
|
90 | (1) |
|
The Common Open Policy Service (COPS) Protocol |
|
|
91 | (14) |
|
A New Scheme for Policy-based Admission Control |
|
|
91 | (1) |
|
A Client-Server Architecture |
|
|
92 | (2) |
|
|
94 | (3) |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
97 | (3) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
Summary of COPS Operations |
|
|
100 | (1) |
|
Use of COPS in Outsourcing Mode |
|
|
101 | (1) |
|
Use of COPS in Provisioning Mode |
|
|
101 | (3) |
|
On the Impact of Provisioning Mode on COPS Operations |
|
|
102 | (1) |
|
On the Impact of Provisioning Mode on PEP-PDP Exchanges |
|
|
103 | (1) |
|
Security of COPS Messages |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (70) |
|
|
105 | (4) |
|
|
105 | (1) |
|
Motivations for Introducing NETCONF |
|
|
106 | (1) |
|
NETCONF, an IETF Initiative |
|
|
107 | (1) |
|
Missions of the IETF NETCONF Working Group |
|
|
107 | (1) |
|
NETCONF-related Literature |
|
|
108 | (1) |
|
|
109 | (1) |
|
NETCONF Protocol Overview |
|
|
109 | (22) |
|
|
110 | (4) |
|
|
114 | (1) |
|
|
114 | (2) |
|
NETCONF Communication Phases |
|
|
116 | (1) |
|
|
117 | (1) |
|
NETCONF Capability Exchange |
|
|
118 | (2) |
|
|
120 | (9) |
|
|
129 | (2) |
|
NETCONF Protocol Operations |
|
|
131 | (22) |
|
Retrieve Configuration Data |
|
|
135 | (2) |
|
|
137 | (1) |
|
Delete Configuration Data |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (3) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Validate Configuration Data |
|
|
146 | (2) |
|
Commit Configuration Changes |
|
|
148 | (1) |
|
Discard Changes of Configuration Data |
|
|
149 | (1) |
|
NETCONF Notification Procedure |
|
|
149 | (4) |
|
NETCONF Transport Protocol |
|
|
153 | (9) |
|
NETCONF as Transport-independent Protocol |
|
|
153 | (1) |
|
Transport Protocol Alternatives |
|
|
153 | (9) |
|
|
162 | (9) |
|
|
163 | (2) |
|
|
165 | (1) |
|
Writable-Running Capability |
|
|
166 | (1) |
|
Candidate Configuration Capability |
|
|
167 | (1) |
|
Confirmed Commit Capability |
|
|
167 | (1) |
|
|
168 | (1) |
|
Distinct Startup Capability |
|
|
169 | (1) |
|
Rollback on Error Capability |
|
|
170 | (1) |
|
|
171 | (1) |
|
Configuring a Network Device |
|
|
171 | (2) |
|
|
173 | (2) |
|
|
173 | (2) |
|
Control and Provisioning of Wireless Access Points (CAPWAP) |
|
|
175 | (12) |
|
CAPWAP to Address Access Point Provisioning Challenges |
|
|
176 | (1) |
|
CAPWAP Concepts and Terminology |
|
|
176 | (4) |
|
Objectives: What do we Expect from CAPWAP? |
|
|
180 | (2) |
|
CAPWAP Candidate Protocols |
|
|
182 | (1) |
|
|
183 | (3) |
|
|
186 | (1) |
|
|
186 | (1) |
|
PART II APPLICATION EXAMPLES OF SERVICE AUTOMATION AND DYNAMIC RESOURCE PROVISIONING TECHNIQUES |
|
|
187 | (64) |
|
Dynamic Enforcement of QoS Policies |
|
|
189 | (10) |
|
|
189 | (4) |
|
What is Quality of Service, Anyway? |
|
|
189 | (3) |
|
The Need for Service Level Specifications |
|
|
192 | (1) |
|
|
193 | (1) |
|
Enforcing QoS Policies in Heterogeneous Environments |
|
|
193 | (6) |
|
SLS-inferred QoS Policy Enforcement Schemes |
|
|
193 | (4) |
|
Policy Rules for Configuring DiffServ Elements |
|
|
197 | (1) |
|
|
198 | (1) |
|
Dynamic Enforcement of IP Traffic Engineering Policies |
|
|
199 | (12) |
|
|
199 | (1) |
|
Terminology Considerations |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
COPS-PR Usage of the IP TE Client-Type |
|
|
204 | (1) |
|
Scalability Considerations |
|
|
205 | (1) |
|
A Tentative Metric Taxonomy |
|
|
205 | (1) |
|
Reporting the Enforcement of an IP Traffic Engineering Policy |
|
|
206 | (1) |
|
|
206 | (1) |
|
COPS Usage for IP TE Accounting Purposes |
|
|
207 | (4) |
|
|
208 | (3) |
|
Automated Production of BGP/MPLS-based VPN Networks |
|
|
211 | (16) |
|
|
211 | (1) |
|
|
212 | (2) |
|
Use of Policies to Define Rules |
|
|
214 | (1) |
|
Instantiation of IP VPN Information Model Classes |
|
|
214 | (1) |
|
Policy Components of an IP VPN Information Model |
|
|
215 | (6) |
|
Physical Components of an IP VPN Information Model |
|
|
216 | (1) |
|
Virtual Components of an IP VPN Information Model |
|
|
217 | (1) |
|
|
218 | (3) |
|
Dynamic Production of IP VPN Services |
|
|
221 | (1) |
|
Context of a Multidomain Environment |
|
|
222 | (2) |
|
|
222 | (1) |
|
|
223 | (1) |
|
Possible Extensions of the VPN Model |
|
|
224 | (3) |
|
|
224 | (3) |
|
Dynamic Enforcement of Security Policies in IP/MPLS Environments |
|
|
227 | (12) |
|
Enforcing Security Policies for Web-based Access Control |
|
|
227 | (8) |
|
Enforcing Security Policies in Companies with 802.IX |
|
|
235 | (4) |
|
|
238 | (1) |
|
|
239 | (12) |
|
|
239 | (2) |
|
Current Issues with Configuration Procedures |
|
|
239 | (1) |
|
Towards Service-driven Configuration Policies |
|
|
240 | (1) |
|
Towards the Standardization of Dynamic Service Subscription and Negotiation Techniques |
|
|
241 | (5) |
|
|
241 | (1) |
|
|
241 | (1) |
|
A Service-oriented Architecture |
|
|
242 | (1) |
|
Publishing and Accessing Services |
|
|
243 | (1) |
|
Example of Automated IP VPN Service Composition |
|
|
244 | (2) |
|
Introducing Self-organizing Networks |
|
|
246 | (5) |
|
What is a Self-organizing Network? |
|
|
246 | (1) |
|
Characteristics of SON Networks and Devices |
|
|
247 | (1) |
|
|
248 | (1) |
|
SON Algorithms and How to Use Them for Enhancing Dynamic Policy Enforcement Schemes |
|
|
248 | (1) |
|
SON-inferred Business Opportunities |
|
|
249 | (1) |
|
|
249 | (2) |
|
|
251 | (78) |
|
Appendix 1 XML Schema for NETCONF RPCs and Operations |
|
|
253 | (16) |
|
Appendix 2 XML Schema for NETCONF Notifications |
|
|
269 | (4) |
|
Appendix 3 Example of an IP Traffic Engineering Policy Information Base (IP TE PIB) |
|
|
273 | (24) |
|
Appendix 4 Example of an IP TE Accounting PIB |
|
|
297 | (14) |
|
Appendix 5 Description of Classes of an IP VPN Information Model |
|
|
311 | (18) |
|
|
311 | (1) |
|
A5.2 Policy Class Definitions |
|
|
311 | (18) |
Index |
|
329 | |