6 Oct 2022

81

Hot Standby Router Protocol (HSRP)

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 399

Pages: 1

Downloads: 0

Comparison of HSRPv1 and HSRPv2 

HSRPv1 has default values ranging from 0 to 255 while values for HSRPv2 ranges from 0 to 4095. The virtual MAC address for HSRPv1 is 0000. 0C07.ACXX (XX=HSRP) while the virtual MAC address for HSRPv2 is 0000. 0C9F.FXXX (XX=HSRP) (CISCO Systems, 2006). Hello packets of HSRPv1 are sent to multicast address 224.0.0.2 while those for virtual MAC address for HSRPv1 are sent to multicast address 224.0.0.102. The millisecond timer values for virtual HSRPv1 are not learned or advertised while those for HSRPv2 are learned and advertised (“CISCO Systems”, 2006). The HSRPv1 does not use HSRP active hello messages to isolate the router that sent the message since the source MAC address is the HSRP virtual MAC address. In contrast, HSRPv2 allows enhanced management and troubleshooting.

How HSRP Functions 

HSRP operates in six possible states; initial, learn, listen, speak, standby and active states. In the Listen state, the router listens for messages from the standby router or active router (Ur Rahman et al. 2017). Availability of messages in the active and standby router compels the local router to compare its parameters with those in the hello messages. The local router remains in listen state if the parameters of the active and standby router are better. If there are no messages from the active and standby routers, then the local router changes its state to speak and starts to send Hello messages. If several Hello messages are transmitted to the local router, the highest priority router becomes an active router (Ur Rahman et al. 2017). Also if the router’s priorities are same then the router with the highest IP address becomes the active router. The second-best selection of active router is the standby router, if there are two routers in the category then the router that is neither standby nor active goes to the listen state. An active router is replaced by a local router if local priority is higher than the active router and if preemption is not enabled in the local router.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The Reasons for a New Version OF HSRP (HSRPv2) 

The HSRPv2 is designed to solve restrictions in HSRPv1. It allows advertisement and learning of millisecond timer values contrary to version 1, in which millisecond timer values are neither advertised nor learned (Vladimir, 2017). The property of version 2 ensures stability of the HSRP groups in all cases. Also, HSRPv2 allow enhanced management and troubleshooting. HSRPv2 also uses the multicast address 224.0.0.102 to address the conflict of 224.0.0.2 in HSRPv1 (Vladimir, 2017).

References

CISCO Systems. (2006). Hot Standby Router Protocol Features and Functions.

Ur Rahman, Zia & Mukhtar, Safyan & Khan, Sajjad & Khan, Raees & Ullah, Zakir & Rashid, Reena & Ahmad, Waqas. (2017). Performance Evaluation of First HOP Redundancy Protocols (HSRP, VRRP & GLBP). Journal of Applied Environmental and Biological Sciences. 7. 268-278.

Vladimir V, J. H. (2017). First Redundancy Protocols in Omnet ++. A New FRIRPSs Available in ANSAINET .

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Hot Standby Router Protocol (HSRP).
https://studybounty.com/hot-standby-router-protocol-hsrp-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration