Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

GOVT. ENGG.

COLLEGE AJMER

DHCP: Dynamic Host Configuration Protocol


Abstract. 2. Introduction. 3. Benefits.
1.

1. Abstract:Dynamic Host Configuration Protocol automates network-parameter assignment to network devices from one or more DHCP servers. Even in small networks, DHCP is useful because it makes it easy to add new machines to the network. When a DHCP-configured client (a computer or any other network-aware device) connects to a network, the DHCP client sends a broadcast query requesting necessary information from a DHCP server. The DHCP server manages a pool of IP addresses and information about client configuration parameters such as default gateway, domain name, the name servers, other servers such as time servers, and so forth. On receiving a valid request, the server assigns the computer an IP address, a lease (length of time the allocation is valid), and other IP configuration parameters, such as the subnet mask and the default gateway. The query is typically initiated immediately after booting, and must complete before the client can initiate IP-based communication with other hosts.

2. Introduction:The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address, and a default route and routing prefix. In addition to IP addresses, DHCP also provides other configuration information, particularly the IP addresses of local caching DNS resolvers, network boot servers, or other service hosts.

3. Benefits:DHCP operations fall into four basic phases: IP discovery, IP lease offer, IP request, and IP lease acknowledgement so it works for management of dynamic IP addresses. DHCP eliminates the manual task by a network administrator. It also provides a central database of devices that are connected to the network and eliminates duplicate resource assignments.

Submitted By:
Kapil Soni 08CE40 Final Year 8 t h Semester (CE)

You might also like