Layer 3 availability mechanisms
Issue 3.4.1 June 2005
353
Layer 3 availability mechanisms
Routing protocols
Routing protocols allow routers to dynamically learn the topology of the network. Should the
topology of the network change, routing protocols update their internal topology table, which
allows them to route around failure.
There are two types of routing protocol, distance vector and link state. Distance vector
protocols, including RIP and IGRP, exchange their entire routing table periodically. To each
route, they add their metric (for RIP, this is “hop count”) and insert it in the routing table. If
updates fail to arrive before the router’s timer expires, it purges the route and looks for another
path. These protocols are usually slow to converge. See
Table 82: Sample convergence times
(single link failure)
on page 355.
Link-state protocols, such as OSPF, take a more holistic view of the network. They compute the
entire topology of the network and insert the best path to a destination in the routing table. Link
state protocols exchange their routing tables only once, when routers first establish a
relationship. After that, they only send updates. They also send hello messages periodically to
ensure that the other routers are still present. Link state protocols converge much more quickly
than distance vector protocols, and thus are generally better suited to networks that require high
availability.
VRRP and HSRP
Virtual Router Redundancy Protocol (VRRP) and the related Cisco proprietary Hot Standby
Router Protocol (HSRP) provide a mechanism to deal with router failure without disrupting
endpoints on the network. In essence, these protocols work by assigning a virtual IP address
and MAC address for the routers. This address is given to endpoints as their default gateway.
The two routers send periodic hello messages marked with a priority value between each other.
The high-priority router assumes the virtual address, and traffic flows through it. If the primary
router fails or its capabilities become degraded (such as if a WAN link fails), the secondary
router takes over. This is a useful mechanism to protect endpoints from router failures, and
works with IP Telephony endpoints.
Summary of Contents for Application Solutions
Page 1: ...Avaya Application Solutions IP Telephony Deployment Guide 555 245 600 Issue 3 4 1 June 2005 ...
Page 20: ...About This Book 20 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 21: ...Issue 3 4 1 June 2005 21 Section 1 Avaya Application Solutions product guide ...
Page 22: ...22 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 106: ...Call processing 106 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 124: ...Avaya LAN switching products 124 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 139: ...Issue 3 4 1 June 2005 139 Section 2 Deploying IP Telephony ...
Page 140: ...140 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 186: ...Traffic engineering 186 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 204: ...Security 204 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 228: ...Avaya Integrated Management 228 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 274: ...Reliability and Recovery 274 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 275: ...Issue 3 4 1 June 2005 275 Section 3 Getting the IP network ready for telephony ...
Page 276: ...276 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 356: ...Network recovery 356 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 366: ...Network assessment offer 366 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 367: ...Issue 3 4 1 June 2005 367 Appendixes ...
Page 368: ...Appendixes 368 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 394: ...Access list 394 Avaya Application Solutions IP Telephony Deployment Guide ...
Page 414: ...DHCP TFTP 414 Avaya Application Solutions IP Telephony Deployment Guide ...