Home > Store

VRRP: Increasing Reliability and Failover with the Virtual Router Redundancy Protocol

Register your product to gain access to bonus material or receive a coupon.

VRRP: Increasing Reliability and Failover with the Virtual Router Redundancy Protocol

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2003
  • Edition: 1st
  • Book
  • ISBN-10: 0-201-71500-7
  • ISBN-13: 978-0-201-71500-2

"A detailed and clearly written book that is an invaluable resource to all VRRP users and implementers."
--Scott Bradner, Senior Technical Consultant, Harvard University

By employing the Virtual Router Redundancy Protocol (VRRP), administrators can ensure that their networks remain up and running, thereby eliminating expensive downtime. Using VRRP to avoid network outages is essential to building accessible, robust networks, and central to the implementation of successful disaster recovery models. Written by experts who contributed to the design of the VRRP protocol and participated actively in its deployment, VRRP: Increasing Reliability and Failover with the Virtual Router Redundancy Protocol is your best introduction to this powerful high-availability tool.

VRRP examines the general characteristics of the protocol and its usage. The emphasis is on translating the protocol specification into a tutorial form ideal for day-to-day users of VRRP. In addition to introducing the technology, this book provides an in-depth analysis, featuring extensive material on configuring, managing, and troubleshooting VRRP. Precursors to this protocol, such as Cisco's HSRP and DEC's IPSTP, are also discussed. Various vendor-specific extensions to VRRP--and their use in solving specific high-availability problems not addressed by VRRP--are also examined.

Network administrators and managers, protocol implementers, practicing professionals, researchers, and students exploring the area of high availability will gain a solid understanding of the core concepts of reliability and redundancy based on VRRP, as well as the particulars of the VRRP protocol and how to implement it.

The appendixes provide the necessary background for networking and TCP/IP, the full text of VRRP MIB, a study of actual VRRP implementations and an analysis of public-domain software available for VRRP over Linux, an overview of the VRRP state machine using SDL flowcharts and UML diagrams, and an analysis of the protocol through formal logic.



0201715007B09052002

Sample Content

Online Sample Chapters

VRRP and Network Technologies

VRRP Overview

Downloadable Sample Chapter

Click below for Sample Chapter(s) related to this title:
Sample Chapter 2

Table of Contents



Preface.


Acknowledgments.

I. VRRP IN PERSPECTIVE.

1. Networking, Availability, and VRRP.

Availability and Networking.

Networking and Availability.

Virtual Router Redundancy.

Summary.

2. VRRP Overview.

The Case for VRRP.

Basic Concepts and Configurations.

Load Sharing.

Multiple Backups.

Ownership.

Virtual Routers Without Owner.

One Backup Protecting Two Masters.

Virtual Routers with Multiple IP Addresses.

Failure Cases.

A Few Words About Router Virtuality.

Case Studies.

Summary.

II. A CLOSER LOOK AT VRRP.

3. VRRP Messages.

Message Format.

Message Exchange.

Sniffed Data from VRRP Messages.

Summary.

4. VRRP in Action.

VRRP State Machine.

VRRP State Machine in Motion.

VRRP Operations.

Summary.

5. VRRP and Network Technologies.

VRRP over Ethernet.

VRRP and Learning Bridges.

VRRP over FDDI.

VRRP over Token Ring.

VRRP over ATM LANE.

Summary.

6. VRRP and VPNs.

VRRP and Firewalls.

VRRP and Tunnels.

Trade-Offs in VPN Availability.

Summary.

III. MANAGING VRRP.

7. SNMP Management.

VRRP MIB Organization.

Illustrative Cases.

A Closer Look at the VRRP Operations Table.

Configuring VRRP Operation Tables.

Associated IP Address Table.

A Pseudo Command Set for VRRP Configurations.

VRRP Statistics.

VRRP Notifications.

Browsing SNMP MIB.

SNMP Management of VRRP: Operational Issues.

Summary.

8. VRRP Configuration and Craft Person Interface.

CLI Hierarchy.

Configuration of CLI Commands.

Basic VRRP Configuration.

Monitoring and Troubleshooting Using CLI.

Summary.

9. VRRP Configuration Using a Graphical User Interface.

Nortel Networks' Site Manager.

Configuring VRRP on Nortel Networks Contivity Extranet Switch.

Nortel Networks' Accelar Device Manager.

Monitoring VRRP Using HP Openview.

Summary.

IV. VRRP: PAST AND FUTURE.

10. Precursors to VRRP.

Cisco's HSRP.

Digital Equipment Corporation's IP Standby Protocol.

Summary.

11. Future of VRRP.

Extensions to VRRP.

VRRP for Advanced High Availability.

Future of VRRP: VRRP and IPv6.

Future of High Availability: Clustering and Beyond.

Summary.

V. APPENDIXES.

Appendix A. Networking and TCP/IP Overview.

Layering the Network.

Forwarding the Data.

Controlling the Network.

Securing the Network.

Managing the Network.

Appendix B. VRRP MIB (from RFC 2787).
Appendix C. VRRP in the Public Domain.
Appendix D. SDL Overview and Flowcharts for VRRP.

Graphical Representations.

VRRP State Machine Transitions.

Appendix E. VRRP from a Logical Point of View.

Approach and Notation.

Logical Laws and Equivalences Used in the Discussions.

About Our Formal Perspective.

Concepts.

Protocol Assertions.

Explications for State Machine.

Norms.

List of Symbolic Assertions and Norms.

Appendix F. UML Overview and Diagrams for VRRP.

State Diagrams.

Sequence Diagrams.

VRRP State Diagram.

VRRP Sequence Diagram.

References.
Index. 0201715007T09052002

Preface

With the explosion of the Internet, computers have become ubiquitous and the networks to connect them have become as pervasive and as critical as a telephone connection. Many businesses depend on their networks to conduct their day-to-day operations, to offer their services and often times to sell their products. Further, the global reach of the Internet crossing language and geographic barriers has resulted in businesses needing to be open to serve one part of the world while the other part sleeps. Consequently, it has become critical for networks to be up and available 24 hours a day, seven days a week to serve a global customer base.

Network failures result in losses of hundreds of millions of dollars to businesses each year. These network failures can happen as a result of failure of a single network device or because of a disaster striking the area where the key network devices are housed. According to a study by a major analyst group, the network outages may cost a business up to $200,000 per minute. The stakes may even be higher than the monetary damage. Here is a good way to relate to the impact of unavailability: A user may be satisfied with 99.9% availability of his network. But 0.1% unavailability can be very damaging in other contexts. The following list highlights the potential impact if the availability was only 99.9%:

  • 12 newborns would be given to the wrong parents each day.
  • 291 pacemaker operations would be performed incorrectly.
  • 315 entries in Webster's Dictionary would be misspelled.
  • 3056 copies of tomorrow's Wall Street Journal would be missing one of the three sections.
  • 18,322 pieces of mail would be mishandled every hour.
  • 20,000 incorrect drug prescriptions would be written each year.
  • 103,260 income tax returns will be processed incorrectly during the year. (Please not mine unless it results in a big refund!)
  • 114,500 mismatched pairs of shoes would be shipped each year.
  • 880,000 credit cards would have incorrect cardholder information on their magnetic strips.
  • 2.5 million books would be shipped with the wrong covers.
  • 5.5 million cases of soft drinks produced would be flat.

Scary, isn't it? A very convincing argument for taking network availability seriously since it may very well be the foundation for any one of the listed situations.

For the Internet to preserve its vital status for the business, every part of the Internet needs to be robust and every network attached to the Internet must be reachable at all times. As a result, high availability, redundancy, traffic sharing and disaster recovery have become major concerns, a high priority for network professionals determined to build accessible, robust networks

There are several aspects to building a robust and reliable network that can survive a large-scale disaster, component, link, and device failures. One important technique in achieving this goal has been to build networks with redundant physical components and associated protocols that let the components, appear as a single entity to the rest of the network while sharing the network traffic load. Virtual Router Redundancy Protocol (VRRP) is such a protocol that enables multiple physical routers to appear as a single entity to the hosts on the network even when they are physically away from each other, thereby avoiding loss of network availability in case of disaster or a router failure and removing the need for cumbersome reconfiguration of hosts.

OBJECTIVES OF THE BOOK

This book presents VRRP, one of the instruments in the toolkit of a network administrator used for dealing with certain aspects of network availability, disaster recovery and redundancy, namely the challenges of keeping the network services available to the hosts attached to a LAN during times of network failures. The book gives an overview of VRRP by discussing a series of configuration examples and deployment scenarios and describing the specific details of protocol implementation for various types of LAN technologies. The main objectives of the book are as follows:

  • To describe the general characteristics of VRRP and its usage over various LAN technologies with an emphasis on translating the protocol specification into a tutorial form for ease of understanding by the day-to-day users of VRRP such as network administrators, engineers tasked with implementing the protocol for a commercial product and students interested in high availability.
  • To provide sufficient background material so that this book is self-contained and can be read without the need for other refresher books for LAN and IP technologies.
  • To discuss real-life deployment scenarios, security and management issues related to the usage of VRRP while articulating the high availability problems that are not solved by VRRP.

ORGANIZATION OF THE BOOK

The book is organized into four parts: Introduction and VRRP overview; Detailed Analysis of VRRP; Configuring, managing, and troubleshooting VRRP; and VRRP Precursors, Extensions and Futures. The book has an additional Appendix section.

  • Part I consists of Chapters 1 and 2. Chapter 1 deals with the introduction to Availability and a general overview of networking in the context of availability. Chapter 2 outlines the problems not solved by technologies prior to VRRP and provides a overview and explanation of VRRP concepts using various deployment examples.
  • Part II comprises Chapters 3,4,5 and 6. Chapter 3 describes the various VRRP messages and protocol exchange in detail and provides real life packet captures of VRRP packets to get familiarized with the protocol for network administrators. Chapter 4 dives into the gut of the VRRP state machine and provides a detailed discussion of VRRP in action in various deployment scenarios. In Chapter 5, we focus on VRRP over various LAN technologies such as Ethernet, Token Ring, FDDI and ATM LANE. This section discusses the implementation issues and differences with VRRP in the context of these LAN technologies. Finally, Chapter 6 touches upon VRRP in the presence of Virtual Private Networks (VPNs)
  • Part III spans Chapters 7 through 9. Chapter 7 focuses on the VRRP MIB and SNMP. Chapter 8 provides various vendor configurations using Command Line Interface (CLI) and provides a detailed discussion of VRRP configuration and troubleshooting with various vendor devices and outlines the actual CLI commands and error messages with deployment examples. Chapter 9 focuses on configuration and monitoring of various vendor devices using the Graphical User Interface (GUI).
  • Part IV includes Chapters 10 and 11. Chapter 10 focuses on the pre-cursors to VRRP in the arena of High Availability and discusses Cisco's HSRP and DECs IPSTB Protocols. A table of comparison of benefits between VRRP and these protocols is also provided. Chapter 11 wraps up with a look at various vendor specific extensions to VRRP to solve specific problems not solved by VRRP and looks into the crystal ball to the future of high availability such as VRRP and Mobile IP, IPv6 and Clustering.
  • The Appendix Section is comprised of 6 Appendixes. Appendix A is an extensive tutorial/refresher on Layering, OSI layering, Layer 2 technologies, and Layer 3 technologies. It also provides a refresher on Network Management and Security. Appendix B contains the exact VRRP MIB from RFC 2787. Appendix C contains an example of an actual public domain implementation of VRRP in C programming language with explanations of what each code segment does. Appendix D contains Specification and Description Language (SDL) and flow chart implementations of the VRRP state machine. Appendix E looks at VRRP Protocol description from a formal logic perspective and uses predicate calculus and deontic logic to explain the protocol. Finally, Appendix F implements the VRRP state machine using the Unified Modeling Language (UML).

INTENDED AUDIENCE

This book targets a broad range of readers interested in redundancy and high availability and the use of network protocols to provide redundancy and high availability:

Network Administrators and managers: This book gives an overview of high availability issues and how VRRP specifically contributes to ensuring high availability in the LAN segment. This book contains numerous examples of network configurations using VRRP and ways in which to monitor and debug VRRP. The book further illustrates various practical network configurations, issues, and gotchas with manageability. It provides GUI and CLI configuration examples of various vendors of VRRP that the reader can use right away. This book also highlights the problems that are not solved by VRRP, thereby creating awareness for the need for other tools to complement this protocol.
Target Sections: Part I, Part III, and Part IV with Part II and Appendix II as reference material. Appendix A would be useful as refresher material.
Protocol Implementers: This book details the innards of the VRRP RFC by using different representational techniques such as state machines, SDL flow charts, and UML sequence diagrams for easy understanding of the protocol. It points out critical design issues that development engineers may encounter while implementing the protocol. The Appendixes further explain the formal aspects of the protocol for the expert reader and contains concise background material on SDL and UML. A public domain VRRP implementation is also discussed in detail with a detailed walk through of the source code.
Target Sections: Part I, Part II, and Part IV, Appendices B, C, D, and F with Chapter 7 as reference material.
Students, Researchers, and Professionals exploring the area of High Availability: With its full set of appendices, this book is fairly self contained, encompassing an overview section of basic TCP/IP concepts required for understanding VRRP and providing a detailed and simple explanation of VRRP in its overview chapters.
Target Sections: Entire book starting with Appendices as needed.


0201715007P05172002

Index

Click below to download the Index file related to this title:
Index

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020