Campus Network Based on VRRP Redundancy and Reliability

Article Preview

Abstract:

With the dramatic increase in amount of information in campus network, the security and high reliability of access data have become urgent requirements on redundancy reliability design of campus network. This paper adopts the technology of VRRP and takes advantages of double backup sets and router to process the design and configuration. As is shown in the experiment, when one device fails, the other ones can still complete relevant operations under the conditions of double backup sets. Therefore, the redundancy reliability design of campus network can be realized through the technology of VRRP double backup sets.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2007-2011

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Baoqing Pu. A Solution to Improve Reliability of Campus Network by VRRP. Journal of Gansu Normal College, pp. (2011).

Google Scholar

[2] Dong Wang. Router Redundancy and Load Balance of Campus Network Governed by the VRRP. Journal of Chongqing University of Science and Technology(Natural Science Edition), (2010).

Google Scholar

[3] Yingguo Zhu, Senlin Jiang. The Construction of High Reliability Data Center of Colleges and Universities Based on VRRP. Journal of Wuxi Institute of Technology, 2008, pp.45-46.

Google Scholar

[4] Lan Zhang, Junliang Wang. On the Application of VRRP in Enterprise Network. Science and Technology Innovation Herald, 2010, pp.249-251.

Google Scholar

[5] Fenge-Wang and Chang-xing-Zhu, HSRP Protocol Based on High Reliable Redundant Campus Network Design , Communications and Information Processing , Communications in Computer and Information Science, 2012, pp.107-114.

DOI: 10.1007/978-3-642-31968-6_13

Google Scholar

[6] C. Nuangjamnong, S. P. Maj and D. Veal. Resource Redundancy – A Staffing Factor using SFIA , Innovations and Advances in Computer Sciences and Engineering, 2010, pp.31-35.

DOI: 10.1007/978-90-481-3658-2_6

Google Scholar