Premium Essay

Dynamic Host Configuration Protocol

In: Computers and Technology

Submitted By aaspivey
Words 425
Pages 2
DHCP:

DynamicHostConfigurationProtocol
In simple terms, DHCP determines if your IP is static or dynamic and the length of time an IP address is assigned.
Dynamic Host Configuration Protocol is controlled by a DHCP server. Your router can be a DHCP server…and if you’re on a home network, it most likely serves this purpose.

Read more: http://www.whatismyip.com/ip-faq/what-is-dhcp/#ixzz2SFrnB7wR
I know this might be confusing because the word dynamic is in the term, but just because you have DHCP enabled on your computer doesn’t mean you can’t be assigned a static IP. DHCP enabled on your computer simply means you’re letting a DHCP server assign its IP. Having it enabled DOES NOT mean it’s a DHCP server.
A true DHCP server (not your Linksys router) gives the LAN Admin a ton of control with IP assigning.
Ever print to a network printer? Ever wonder how that printer keeps its network assignment? Each network device has a MAC address. You can assign a static IP at the server to a specific MAC address. This allows the network printer to always get the same IP even after it reboots and without assigning the IP at the printer. If you print the network configuration at the printer, it will probably tell you that DHCP is enabled and no static IP is assigned. That’s because the IP assignment is handled at the server.
Your ISP has a DHCP server. They can assign IPs by modem MAC addresses. When your modem comes online, it communicates to the network indicating it is looking for an IP address. The DHCP server listens to this communication and starts talking to the modem. The modem then transmits its MAC address to the DHCP server. At that point, either an IP has been reserved for the modem or one is assigned at that time. Hence cloning your MAC address to get a new IP from your ISP.
Routers and DHCP – Under the General Setup or LAN Setup tab in your router, you’ll see…...

Similar Documents

Premium Essay

Deterining Subnet Configuration

...DETERMINING SUBNET CONFIGURATION Determining Subnet Configuration for Variety of Networks Alvin Miles AIU Online 09/20/2012 Determining Subnet Configuration for Variety of Networks In this final week IP assignment we are given some IP addresses and are ask several questions on anything from what is the broadcast address of this IP, what are the range of valid host IP addresses, to subnet ranges. Before we go too deep in trying to answer these questions I must first explain what classful routing protocol is as this will help explain some of my answers. In classful routing protocol all your networks will be using different classes and are separated only by a router (Lewis, 2011). Also classful routing protocol will only look at IP addresses and not the subnet mask. This is a problem as you can’t change the subnet mask in any of your network (Lewis, 2011). Most networks today use the classless routing protocol. This protocol supports VLSM and different sizes network within the same IP address class (Lewis, 2011). The first IP address we are given is 12.2.201.2, from this we are ask the question of what is the network address or network number? The network address would fall within the Class “A” and would give us 12.0.0.0. The second question asks us to find out what the broadcast address of the IP address 211.106.32.0 that has a subnet mask of 255.255.255.224. To get the broadcast address we will need to find out how many subnets and hosts that we have with......

Words: 1211 - Pages: 5

Premium Essay

Nat Configuration

...with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Quick Start Steps for Configuring and Deploying NAT When you configure NAT, it is sometimes difficult to know where to begin, especially if you are new to NAT. These steps guide you to define what you want NAT to do and how to configure it: 1. Define NAT inside and outside interfaces. ♦ Do users exist off multiple interfaces? ♦ Are there multiple interfaces going to the internet? 2. Define what you're trying to accomplish with NAT. ♦ Are you trying to allow internal users to access the internet? ♦ Are you trying to allow the internet to access internal devices (such as a mail server or web server)? ♦ Are you trying to redirect TCP traffic to another TCP port or address? ♦ Are you using NAT during a network transition (for example, you changed a server's IP address and until you can update all the clients you want the non−updated clients to be able to access the server using the original IP address as well as allow the updated clients to access the server using the new address)? ♦ Are you using NAT to allow overlapping networks to communicate? 3. Configure NAT in order to accomplish what you defined above. Based on what you defined in step 2, you need determine which of the following features to use: ♦ Static NAT ♦ Dynamic NAT ♦ Overloading ♦ Any......

Words: 3234 - Pages: 13

Free Essay

Implementing Firewall Configurations

...Implementing Firewall Configurations Robert Collazo Rasmussen College Implementing Firewall Configurations First he would like me to use a host firewall in which case I would then use the Windows Firewall. Windows Firewall with Advanced Security includes a host-based firewall component that is a protective boundary for the local computer, which monitors and restricts information that travels between your computer and its attached networks or the Internet. It provides an important line of defense against someone who might try to access your computer without your permission. Then he would like me to be able to configure, maintain and monitor rules for multiple profiles, notifications and authenticated exceptions and he would also like me to be able to create and manage inbound and outbound rules and with windows firewall I can accomplish both of these task because Windows Firewall with Advanced Security works by examining the source and destination addresses, source and destination ports, and protocol numbers of a packet, and then comparing them to the rules that are defined by the administrator. When a rule matches a network packet then the action specified in the rule (to allow or block the packet) is taken. Windows Firewall with Advanced Security also lets you allow or block network packets based on whether they are protected by IPsec authentication or encryption. Then I could also have capabilities of Data encryption and connection security rules with Windows......

Words: 344 - Pages: 2

Free Essay

Routing Protocol Comparison

...Introduction 1 2.1 Industry Standard protocols vs. Proprietary protocols: 2 3.0 Technical Background 2 3.1 Types Of Routing Protocols 2 3.1.1 Static Routing 2 3.1.2 Distance Vector Protocols 3 3.1.3 Link-State Protocols 4 3.1.4 Advanced Distance Vector Protocol 5 3.1.5 Path Vector Protocols 5 4.0 Protocol Decision Criteria 5 5.0 OSPF 8 6.0 EIGRP 18 7.0 Analysis 21 8.0 Recommendation 22 9.0 References 23 9.1 URLs 23 9.1.1 OSPF 23 9.1.2 EIGRP 24 9.2 Books 24 9.2.1 OSPF 24 9.2.2 EIGRP 24 Executive Summary The network is based on the TCP/IP protocol, which permits the efficient routing of data packets based on their IP address. Cisco routers are used at various points in the network to control and forward the data. Alcatel OmniSwitch switch/routers are also used in the Site 2 facilities. At the current point a decision is being made by on whether to keep the existing Alcatel infrastructure in the Site 2 facility or migrate that equipment to similar Cisco equipment as exists in Site 1. The current Alcatel equipment is experiencing severe problems such as hardware failures, power supply failures, operating system memory leaks resulting in reboots. If the decision is made to upgrade the Alcatel switch/routers then an evaluation will need to be made on what the proper routing protocol should be running......

Words: 8531 - Pages: 35

Free Essay

Routing Protocol

...Introduction 1 2.1 Industry Standard protocols vs. Proprietary protocols: 2 3.0 Technical Background 2 3.1 Types Of Routing Protocols 2 3.1.1 Static Routing 2 3.1.2 Distance Vector Protocols 3 3.1.3 Link-State Protocols 4 3.1.4 Advanced Distance Vector Protocol 5 3.1.5 Path Vector Protocols 5 4.0 Protocol Decision Criteria 5 5.0 OSPF 8 6.0 EIGRP 18 7.0 Analysis 21 8.0 Recommendation 22 9.0 References 23 9.1 URLs 23 9.1.1 OSPF 23 9.1.2 EIGRP 24 9.2 Books 24 9.2.1 OSPF 24 9.2.2 EIGRP 24 Executive Summary The network is based on the TCP/IP protocol, which permits the efficient routing of data packets based on their IP address. Cisco routers are used at various points in the network to control and forward the data. Alcatel OmniSwitch switch/routers are also used in the Site 2 facilities. At the current point a decision is being made by on whether to keep the existing Alcatel infrastructure in the Site 2 facility or migrate that equipment to similar Cisco equipment as exists in Site 1. The current Alcatel equipment is experiencing severe problems such as hardware failures, power supply failures, operating system memory leaks resulting in reboots. If the decision is made to upgrade the Alcatel switch/routers then an evaluation will need to be made on what the proper routing protocol should be running......

Words: 8531 - Pages: 35

Premium Essay

Basic Switch Configuration

...Basic Switch Configuration Switch>enable Switch# Examine the current running configuration file. Switch#show running-config Examine the current contents of NVRAM: Switch#show startup-config Examine the characteristics of the virtual interface VLAN1: Switch#show interface vlan1 Switch#show ip interface vlan1 Examine the following version information that the switch reports. Switch#show version Examine the default properties of the FastEthernet interface used by PC1. Switch#show interface fastethernet 0/18 Switch#show vlan examine the contents of the flash directory. Switch#dir flash: or Switch#show flash Switch#dir flash:c2960-lanbase-mz.122-25.SEE3 To save the contents of the running configuration file to non-volatile RAM (NVRAM), issue the the command copy running-config startup-config. Switch#copy running-config startup-config S1#configure terminal S1(config)#hostname S1 S1(config)#exit S1#configure terminal S1(config)#line console 0 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#line vty 0 15 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#exit S1(config)#enable secret class First, you will create the new VLAN 99 on the switch. Then you will set the IP address of the switch to 172.17.99.11 with a subnet mask of 255.255.255.0 on the internal virtual interface VLAN 99. S1(config)#vlan 99 S1(config-vlan)#exit S1(config)#interface vlan99 %LINEPROTO-5-UPDOWN: Line protocol on Interface......

Words: 873 - Pages: 4

Premium Essay

Protocols

...LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP)...

Words: 996 - Pages: 4

Premium Essay

List of Protocols

...List of network protocols (OSI model) This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite. This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e | பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX,......

Words: 1041 - Pages: 5

Premium Essay

Internet Protocol Configuration

...auto-summary int s0/0/0 ip summary-address eigrp 100 10.2.0.0 255.255.0.0 ip dhcp pool B2_VLAN10 network 10.2.10.0 255.255.255.0 default-router 10.2.10.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN20 network 10.2.20.0 255.255.255.0 default-router 10.2.20.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN30 network 10.2.30.0 255.255.255.0 default-router 10.2.30.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN88 network 10.2.88.0 255.255.255.0 default-router 10.2.88.1 dns-server 10.0.1.4 exit ip dhcp excluded-address 10.2.10.1 10.2.10.10 ip dhcp excluded-address 10.2.20.1 10.2.20.10 ip dhcp excluded-address 10.2.30.1 10.2.30.10 ip dhcp excluded-address 10.2.88.1 10.2.88.24 B3 Router>en Router#conf t Enter configuration commands, one per line.  End with CNTL/Z. Router(config)#hostname B3 B3(config)#int s0/0/0 B3(config-if)#ip address 10.255.255.10 255.255.255.252 B3(config-if)#no sh B3(config-if)#encapsulation frame B3(config-if)#encapsulation frame-relay ietf B3(config-if)#frame-relay lmi-type ansi B3(config-if)#exit B3(config)# B3(config)#ip route 0.0.0.0 0.0.0.0 10.255.255.9 B3(config)#router eigrp 100 B3(config-router)#passive-interface fa0/0.10 B3(config-router)#passive-interface fa0/0.20 B3(config-router)#passive-interface fa0/0.30 B3(config-router)#passive-interface fa0/0.99 B3(config-router)#network 10.0.0.0 B3(config-router)#no auto-summary B3(config-router)#int s0/0/0 B3(config-if)#ip summary-address eigrp 100......

Words: 3046 - Pages: 13

Free Essay

Network Protocols

...The importance of communication protocols: Unless Patton Fuller Community Hospital has an agreement between the two communicating parties information may get lost or un-communicated. This agreement is called the protocol. Communications protocols usually have a number of parts, Handshake, encoding method, compressions methods, packet / frame structure, and addressing.. This is why protocols are often defined by standards bodies, but some protocols SSL can be used widely even though they are not specifically from a standards body. A protocol must be implemented to enable effective, efficient communication by using a set of rules. Protocols are also described as hardware or software components that carry out the OSI model guidelines for transferring information on a network In short - if we don't have a protocol we won't be able to communicate between different devices. Identify the protocols in your design and provide rationale for your decision Define the overall network architecture. The design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used May refer only to the access method in a LAN, such as Ethernet or Token Ring Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in......

Words: 1950 - Pages: 8

Free Essay

Client Server Configuration

...7 Assignment 1 Client Server Configuration Unit 7 Assignment 1 Client Server Configuration Robert D Williams ITT-Tech MR. Brockman NT1230 Client Server Networking Friday, February 10, 2012 The hardware side should be set up with raided hard disks preferable in as a raid 6. There should be at least two NICs for each server to ensure that connectivity is not lost. IT recommends that we have at least three hours of a backup power available. In order to cut costs IT would like to if more then one server is required to set up virtual servers. The server roles that we network administration recommends would include, active directory services for security to ensure that they only authorized persons are accessing the system and to help to make sure that if necessary encrypt the information so that if the system is breached the information stays secure. An active directory domain services so that IT can manage the system better. This would include user profiles and is a required to add other services that will be needed as well. An active directory domain rights service is recommend to help ensure that only the users that need certain information have access to it. This also enables us to limit what some users can do with the information such as look or modify the information in a file. An application server, so that all employees will have access to needed programs to get their jobs done. A dynamic host control protocol and a domain name server are...

Words: 589 - Pages: 3

Free Essay

Nt2670 - Installation and Configuration of Ms

...therefore only a computer capable of running the 64 bit version of 2008. Once that is done named the server (mailitsupport.com), set the clock and it’s configured to be a stand alone with default settings. Configure Your Static IP Address The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use DHCP.  Since we will be configuring this computer to be a domain controller, you must change the IP address of the computer to be a static IP address which should be done via View Network Connections" in the Server Manager screen.  This will display the list of active network interfaces. a. Double click on your network adaptor to display the adaptors status. b. Press the Properties button. c. Highlight "Internet Protocol Version 4 (TCP/IPv4)" and then press the Properties button. d. Change the radio button to "Use the following IP address" and enter an IP address you want to use for this server. I chose to assign this server the internal IP address "192.168.1.25". The firewall appliance is set as a gateway at the IP address "192.168.1.1".  e. Press OK to save your changes. If IP v6 is needed, follow the same process as in IP v4 or else IP v6 set to the default setting of DHCP. DO NOT DISABLE IP V6 or else the Exchange Hub Transport Service will not start. Activate Auto Update Now activate Domain Controller for auto update by clicking on the link "Configure Updates”; selecting the option to have Windows automatically install......

Words: 2240 - Pages: 9

Free Essay

Protocols

...LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control:  000 - last fragment;  001 - not last fragment;  010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which upper-layer protocol......

Words: 1379 - Pages: 6

Premium Essay

Troubleshooting Intervlan Routing and Host Configuration Issues

...Lab Title Configure and verify interVLAN routing using a router on a stick Your Name: Cruz Galvan DSI Number: D40495378 NETW204 DeVry University Date: 20160123 Professor Name: Mario Kosseifi Table of Contents Introduction 3 Procedure 3 Results 3 Application and Analysis 3 Questions 3 Conclusion and Recommendation 4 Lessons Learned 4 References 4 Introduction Discuss what you will do in this lab. Provide some background information on the main idea in this lab and discuss the purpose of the lab activity. We will be troubleshooting interVLAN routing and host configuration issues. From reading through this lab I will be using my troubleshooting skills and knowledge I have learned so far to fix some of the problems that are occurring in this network. Procedure How did you go about implementing the lab activity? Describe the steps you took to ensure that the final implementation meets the original business goal. For example, did you design a new IP scheme and assign IP addresses to devices based on a given range of IP addresses? Did you assign IP addresses manually, dynamically, or both? Did you name devices based on location? Did you or would you connect switches first or routers first, why? Did you configure the end devices or the infrastructure devices first? What was the plan to verify that the network work? Note that the procedure must take into consideration not only the steps you took to implement the lab solution but also the...

Words: 671 - Pages: 3

Free Essay

Essential Protocol

...Essential Network Protocols Modern computer networking leverages many components to enable computers on one network (or opposite side of the world) to communicate with a computer on a different network (or other side of the world). Of the components that enable network communication, there are several in the TCP/IP suite of protocols that work in the background to provide reliable Internet connection and data transport every day for millions of computers worldwide. Internet protocol or IP is an essential component of modern internetwork communication. IP is a connectionless protocol that provides neither fault tolerance nor error correction. It is also not responsible for the setup or teardown of network communications. The primary job assigned to IP is logical addressing and routing as it resides at layer 3 (the Network layer) of the OSI model. While every host on the network has a hardware address (also called a MAC address), hosts can only communicate with other hosts in the same broadcast domain using MAC addressing. For internetwork communication, a logical, unique network address is required so that the devices forwarding network traffic (primarily routers), can determine the source and destination and best route to forward data packets. The ARP or Address Resolution Protocol enables devices on a single network, in a single broadcast domain, to find the hardware or MAC address of a device on the network given the IP......

Words: 1258 - Pages: 6