Skip to main content

HOW TO WORK DHCP?


Dynamic Host Configuration Protocol, a protocol that allows a DHCP server to automatically set TCP/IP network configuration for a client computer.


How does work DHCP?


1.Whenever a client computer boots up, it broadcasts a DHCPDISCOVER massage.

 it doesn't matter where the client is in airport, at home, in a desert, or in a jungle

 it would send this packet looking for a DHCP server. 

 And the client has no idea if there is any DHCP server closeby therefore broadcast the only way you may

notice the destination IP address is 255.255.255.255.

DHCPDISCOVER packet simply says "Hello", is there any DHCP server out there? I want to connect the Internet."

2.supose there is a DHCP server close by and it hears the DHCPDISCOVER massage. the DHCP server responds with a DHCPOFFER massage.

  It is a broadcast UDP packet.

  It simply replies :"I hear you. I can lease you this IP address and this subnet mask, so that you can connect to the local network.

  And I also tell you IP address of your 

  default getaway, and DNS servers so that you can go to internet. your lease is 2 days. of course, you can renew the lease after 2 days."

3.The DHCP client responds with a DHCPREQUEST It simply says: "I accept all these TCP/IP information and I accept lease term for 2 days.

  Thank you very much"

4.DHCP server replies with a DHCPACK Massage. It is basically a acknowledgement packet. It is simply says:" OK let's do these. You go ahead use the network,

  and I register your

  MAC address and IP address and other information in my DHCP database."



Summary.

DHCP is a dynamic way of giving a client computer network connection credentials communications between a DHCP server and clients are broadcast, UDP, not TCP.

The client users port 68, and server users port 67.


Last I want you to try this : start your windows command prompt if you are a windows user, type in ipconfig/release, then

 reload or refresh your favorite browser to see what happens.




Issue:


No internet connection in DHCP Environment:


type in ipconfig/renew, hit enter key and then reload or refresh your browser, you would see the internet is back.


Comments

Popular posts from this blog

Access Controls Lists(ACL)

Access Controls   Lists(ACL): ACL is a set of rules which will allow or deny the traffic moving through the router. It is a layer 3 security which controls the flow of traffic from one router to another. It is also called as packet filtering firewall. ACL is two type: 1.Standard ACL: standard access controls   Lists(ACLs) are the oldest type of access control lists. Standard IP access lists are used to permit/deny traffic only based on source IP address of the IP datagram packets. Standard Access Control list can be created by using the access-list IOS command. Function: The access list number range is 1 -99 Can block a network, host and subnet Two way communication is stopped All services are blocked. Implemented closest to the destination. Filtering is done based on only source IP address. 2.Extended ACL: Extended Access Control Lists allow you to permit or deny traffic from specific IP addresses to a specific destination IP address and por...

OSI Layer

Compare and contrast OSI and TCP/IP models : 1.Physical Layer:      it is responsible for moving data form one node to the next.  Function: I. Transmission media II. Types of encoding III. Data rate{no of bits sent each sec} IV. Synchronization of bits. V. Line configuration (Example: point to point , multipoint) VI. Topology (Bus,Star,Ring,Mesh) VII. Transmission (simplex ,half duplex, full duplex) 2.Data like Layer:      it transforms the physical layer into a reliable link. Function: I.Framing: conversion of bits to frames. framing are working in four methods can be used to mark the start to end of frame. i) Character Count: ii) Flag bytes with byte/character staffing iii) Starting and ending flags, with bits staffing iv) Physical bye coding valuations. II.  Physical addressing : header is adding to frame. III. Flow control IV. Error control V. Access control 3.Network Layer:      Re...