Network Redundancy Protocols

Redundancy is common point for today’s topologies.Especially in mission-critical networks that it is not acceptable that using only one gateway to reach a point. Because one gateway means single point of failure.

With multiple gateways, you can still reach the remote node even if that you connect fails. As soon as one of the gateway down, the link changes through other gateway. Here with the word gateway. I mean the router that router that you use to reach a point, or with redundancy, multiply routers that you can use.

Here, to connect one point to another, a virtual ip used,for example there are two routers that let you to connect another point.  You build redundancy protocol based neighbourship with only one virtual IP. This virtual IP is also configured on these two routers, if any failure occurs, the traffic is routed from failure to the back way.

There are some protocols for redundancy,these are:

1.      HSRP (Hot Standby Router Protocol)

2.      VRRP (Victual Router Redundancy Protocol)

3.      GLBP  (Gatewayload Balancing Protocol)

Two of the protocols above, HSRP and GLBP is a “Cisco proprietary” [pr‘prat()r]. You can use these only on Cisco devices.

Another protocol, the VRRP is a “standard based” protocol. You can sue this protocol in all vendor’s devices, like Juniper and Alcatel-Lucent.

We will discuss there of protocols with a lab example in the following articles.

So, keep on.

Thank you,

Arrow Yang

时间: 2024-10-29 00:09:47

Network Redundancy Protocols的相关文章

Chapel 2.Network interfaces

Note: Copy from TCP/IP Tutorial and Technical Overview (IBM Redbook GG24-3376-07)[000] 2.1 Ethernet and IEEE 802 local area networks (LANs) 2.1.1 Gigabit Ethernet 2.2 Fiber Distributed Data Interface (FDDI) 2.3 Serial Line IP (SLIP) 2.4 Point-to-Poin

Network management system scheduling for low power and lossy networks

In one embodiment, a network management system (NMS) determines an intent to initialize a request-response exchange with a plurality of clients in a low power and lossy network (LLN). In response, the NMS adaptively schedules corresponding responses

PPP

PPP is a protocol that is able to: handle authentication, compression, error detection, monitor link quality, logically bundles multiple serial connections together to share the load 1. Serial Point to point Overview There are three important serial

On-demand diverse path computation for limited visibility computer networks

In one embodiment, a source device detects a packet flow that meets criteria for multi-path forwarding, and forwards a probe packet on a primary path from the source device to a destination device, the probe packet carrying an indication to cause a p

Chapter 3 VXLAN/EVPN Forwarding Characteristics

Chapter 3 VXLAN/EVPN Forwarding Characteristics In this chapter, the following topics will be covered:  Enhanced BGP EVPN features such as ARP suppression, unknown unicast suppression, and optimized IGMP snooping  Distributed IP anycast gateway in th

欢迎你,企业架构CCIE,RS CCIEv5.0的升级版新时代迎合自动化运维的网工顶级认证

欢迎你,企业架构CCIE,作者乾颐堂安德 或许,这就是能力!想起一句电影台词,"股票是什么,股票是人类对未来的预测,预测对了你就是赢家,预测错了你就是输家",没错预测就是一种能力,2019年6月10日下午乾颐堂茶话会公开课,名字为"思科一出,谁与争锋!",其中的小道消息主要概括为"思科将发布新的CCIE,时间为2020年2月",果然在今天思科就发布了Glance,这个发布时间这么紧凑倒是我没想到的.好了,让我们来看看企业架构CCIE的不同吧,这是

Structure And Representation Of MIB Object Names - SNMP Tutorial

30.8 Structure And Representation Of MIB Object Names We said that ASN.1 specifies how to represent both data items and names. However, understanding the names used for MIBvariables requires us to know about the underlying namespace. Names used for M

Structure Of Management Information - SNMP Tutorial

30.6 The Structure Of Management Information In addition to the standards that specify MIB variables and their meanings, a separate standard specifies a set of rules used to define and identify MIB variables. The rules are known as the Structure of M

Summary - SNMP Tutorial

30.13 Summary Network management protocols allow a manager to monitor and control routers and hosts. A network management client program executing on the manager's workstation contacts one or more servers, called agents, running on the devices to be