Exploring DHCP Protocol Administration: A Packet Tracer Simulation Study

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : June 14, 2024 at 2:48 pm | [if 1553 equals=””] Volume :01 [else] Volume :01[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 02 | Page : 1-11

n

n

n

n

n

n

By

n

[foreach 286]n

n

n

Sanskruti Karnewaer, Sushil Bakhtar

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Assistant Professor Department of Electronics and Telecommunication, Prof Ram Meghe College of Engineering and management, Amravati, Department of Electronics and Telecommunication, Prof Ram Meghe College of Engineering and management, Amravati Maharashtra, Maharashtra India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nThe following functions of DHCP are included to lessen network administration: TCP/IP setting that is automated and centralized. the capability of centrally defining TCP/IP setups. the use of DHCP options to allocate a complete range of additional TCP/IP configuration values. DHCP runs at the application layer of the TCP/IP stack. Although this essay will concentrate on Windows NT, another advantage of DHCP is that it is compatible with a wide range of hardware and software systems. The majority of TCP/IP client software implementations support DHCP, while DHCP server software is available on most operating systems. Moreover, connections can be established between any DHCP server and any DHCP client. It provides DHCP clients with TCP/IP setup information and dynamically assigns IP addresses to them. DNS addresses, subnet mask information, and IP addresses of default gateways are all included in this data.

n

n

n

Keywords: DHCP protocol, IP address, router, server, diffserv codepoints

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Radio Frequency Innovations(ijrfi)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Radio Frequency Innovations(ijrfi)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Sanskruti Karnewaer, Sushil Bakhtar. Exploring DHCP Protocol Administration: A Packet Tracer Simulation Study. International Journal of Radio Frequency Innovations. April 29, 2024; 01(02):1-11.

n

How to cite this URL: Sanskruti Karnewaer, Sushil Bakhtar. Exploring DHCP Protocol Administration: A Packet Tracer Simulation Study. International Journal of Radio Frequency Innovations. April 29, 2024; 01(02):1-11. Available from: https://journals.stmjournals.com/ijrfi/article=April 29, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n[if 992 not_equal=”Open Access”]

[/if 992]n[if 992 not_equal=”Open Access”] n


nn[/if 992]nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Lin, C. Su, T. and Wang, Z., 2011, “Summary of high-availability DHCP service solutions,” in 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), Shenzhen, pp. 1–5.
  2. Senecal, L., 2006, “Understanding and Preventing Attacks at Layer 2 of the OSI Reference Model,” in 4th Annual Communication Networks and Services Research Conference, pp.6–8.
  3. 2002, “DHCP servers subject to remote takeover,” Network Security, vol. 2002, no. 5, p. 3.
  4. Wilson, P., 2003, “Rogue Servers,” Network Security, vol. 2003, no. 8, pp. 16–18.
  5. Duangphasuk, S., Kungpisdan S., and Hankla, S., 2011 “Design and implementation of improved security protocols for DHCP using digital certificates,” in 17th IEEE International Conference on Networks (ICON), pp. 287–292.
  6. Brik, V., Stroik, J., & Banerjee, S. (2004). Debugging DHCP Performance. ACM, 257–262.
  7. Dai, J.-W., & Chiang, L.-F. (2007). A New Method to Detect Abnormal IP Address on DHCP. IEEE.
  8. Mcauley, A. J., & Manousakis, K. (2000). Self-Configuring Networks. IEEE, 315–319.
  9. Park, C.-J., Ahn, S.-J., Chung, J.-W., Lee, C.-H., & Park, C.-S. (1997). The Improvement for Integrity between DHCP and DNS. IEEE, 511–516.
  10. Wang, J.-H., & Lee, T.-L. (2002). Enhanced Intranet Administration in a DHCP-enabled Environment. IEEE.
  11. Droms, R., 1999, “Automated configuration of TCP/IP with DHCP,” IEEE Internet Computing, vol. 3, no. 4, pp. 45–53.
  12. “CoovaChilli”, http://coova.github.io/CoovaChilli.
  13. Yaibuates, M. and Chaisricharoen, R., 2014, “ICMP Based Malicious Attack Identification Method for DHCP,” in 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE), Chiang Rai, pp. 1–5.
  14. Braden, R., 1989, “Requirements for Internet Hosts-Communication Layers”, RFC 1122, pp. 42.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 01
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 02
Received April 8, 2024
Accepted April 18, 2024
Published April 29, 2024

n

n

n

n

n

n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]