Review of First Hop Redundancy Protocol and Their Functionalities

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - May Issue 2013 by IJCTT Journal
Volume-4 Issue-5                           
Year of Publication : 2013
Authors :Priyanka Dubey, Shilpi Sharma, Aabha Sachdev

MLA

Priyanka Dubey, Shilpi Sharma, Aabha Sachdev"Review of First Hop Redundancy Protocol and Their Functionalities"International Journal of Computer Trends and Technology (IJCTT),V4(5):1080-1084 May Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - In this paper, we are focusing on data link layer protocols. First, when designing a network, one of the most important things to focus on when is designing a network on how to deal with failure. A major part of this research is trying to explore First Hop Redundancy Protocol and providing as much redundancy and security into the network as financially possible, while also maintaining performance and manageability. From the client’s view, the first set of the network they deal without, outside of their local subnet, is the default gateway; if this gateway goes down, then access to an entire network outside their own network would go down. One good ways to deal with this is to implement a first hop redundancy protocol. On Cisco equipment, there are a couple of different options to choose from, including Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP) and Gateway Load Balancing Protocol (GLBP). This defines the complete overview and differences of these protocols.

 

References-
[1] T. Li Juniper Networks, B. Cole Juniper Networks, P. Morton Cisco Systems, D. Li Cisco Systems, RFC 2281 March 1998.
[2] R. Rivest MIT Laboratory for Computer Science and RSA Data Security, Inc. RFC 1321,April 1992
[3] Deering, S., "ICMP Router Discovery Messages", RFC 1256, September 1991.
[4] United States Patent. Patent Number: 5,473,599. Standby Router Protocol. Date of Patent: Dec. 5, 1995.
[5] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.
[6] Deepakumara J., Heys H.M. and Venkatesan R., FPGA Implementation of MD5 Hash Algorithm, Canadian Conference on Electrical and Computer Engineering, 2001, vol. 2, pp. 919-924, 2001.
[7] Alok Kumar Kasgar, Jitendra Agrawal, Satntosh Shahu, “New modified 256-bit MD5 Algorithm with SHA Compression Function”, March 2012

Keywords — FHRP, HSRP, VRRP, GLBP, MD5.