SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011



     Customized Dynamic Host Configuration Protocol
                                      Mr. Sadananda M P and Mr. Sudeep Manohar
                                       Encore Software Private Ltd., Bangalore, India
                                              Email: sadanand119@gmail.com
                              Jawaharlal Nehru National College of Engineering, Shimoga, India
                                            Email: sudeep_mansh@yahoo.com


Abstract - The Dynamic Host Configuration Protocol (DHCP)              Requirements RFCs. After obtaining the parameters via DHCP,
provides a framework for passing configuration information             a DHCP client will be able to exchange packets with any other
to hosts on a UDP network.  Computers that  are connected  to          host in the network.
IP networks must be configured before they can communicate
                                                                           Not all of these parameters are required for a newly
with other hosts. The most essential information needed is
an IP address. DHCP eliminates the manual task by a network
                                                                       initialized client. A client and server may negotiate for the
administrator. DHCP is based on the Bootstrap Protocol                 transmission of only those parameters required by the client
(BOOTP), adding the capability of automatic allocation of              or specific to a particular subnet. DHCP allows but does not
reusable network addresses and additional configuration                require the configuration of client parameters not directly
options. DHCP captures the behavior of BOOTP relay agents,             related to the IP protocol. DHCP also does not register newly
and DHCP participants can interoperate with BOOTP                      configured clients with the Domain Name System (DNS).
participants. Proposed system, i.e., Customized DHCP aims
to give the security for DHCP, which was not present in the                               II. THE DORA PROCESS
older one and it uses UDP instead of TCP thus reducing the
number of fields as compared to the old DHCP, in turn which                DORA stands for Discover, Offer, Request and
decreases the execution time and still providing the basic             Acknowledge. DORA is the process which is used by DHCP
functionality of the usual DHCP.                                       for allotting the IP address. It is a four way communication
                                                                       between the Client and Server. The DORA concept is shown
Index Terms – DHCP, BOOTP, DORA, Lease file, security, CUnit,
                                                                       in the fig. 1.
TCP, UDP and IP address.

                       I. INTRODUCTION
    DHCP was first defined as a standards track protocol
in RFC 1531 in October 1993, as an extension to the Bootstrap
Protocol (BOOTP). The motivation for extending BOOTP was
that BOOTP required manual intervention to add configuration
information for each client, and did not provide a mechanism
for reclaiming unused IP addresses.
    Dynamic Host Configuration Protocol automates network-
parameter assignment to network devices from one or more
DHCP servers. Even in small networks, DHCP is useful
because it makes it easy to add new machines to the network.
When a DHCP configured client (a computer or any other
network-aware device) connects to a network, the DHCP client
sends a broadcast query requesting necessary information
from a DHCP server. The broadcast message is sent because
the server address is not known to the client initially.
    The DHCP server manages a pool of IP addresses and
information about client configuration parameters such
as default gateway, domain name, the name servers, other
servers such as time servers, and so forth. On receiving a                                Figure 1. DORA concept
valid request, the server assigns the computer an IP address,          The steps involved in the DORA concept are as below
a lease (length of time the allocation is valid), and other IP         a) Client makes a UDP Broadcast to the server with a
configuration parameters, such as the subnet mask and                  DHCPDiscover, or Discover packet.
the default  gateway.  The query is typically initiated                b) DHCP offers to the client. The server sends a DHCP Offer
immediately         after booting, and must complete before the        including the IP address and other configuration parameters
client can initiate IP-based communication with other hosts.           (DHCP Options).
DHCP is designed to supply DHCP client systems with the                c) In response to the offer Client requests the server. The
configuration parameters that are defined in the Host                  client replies DHCPRequest, unicast to the server, requesting
© 2011 ACEEE                                                      16
DOI: 01.IJCOM.02.03. 548
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011


the offered address.                                                   Only requesting clients with a MAC address listed in this
d) The server sends DHCPAck acknowledging the request                  table will be allocated an IP address.
which is the clients final permission to take the address as           Any of the above methods can be used, but in Customized
offered. Before sending the ack the server checks once again           DHCP implementation, dynamic allocation method is used to
where the offered address is still available and that the              provide quick allocation of IP      addresses to the clients..
parameters match the clients request. After allotting the IP
                                                                       C. Protocols Used
the server marks the address taken.
                                                                           1) Internet Protocol: The Internet Protocol (IP) is the
                    III. CUSTOMIZED DHCP                               principal communications protocol used for relaying
                                                                       datagram (packets) across an inter-network using the Internet
    In the Customized DHCP, the four way communication is              Protocol Suite. IP is the primary protocol in the Internet
reduced to two way communication. Instead of the DORA                  Layer of the Internet Protocol Suite and has the task of
concept, a new concept is being used which has only two                delivering datagram from the source host to the destination
steps, request and response. The code length is reduced by             host solely based on their addresses. For this purpose, IP
removing the unnecessary fields in the packet which increases          defines addressing methods and structures for datagram
the speed of execution thus decreasing the time taken to               encapsulation. Fig. 2 shows the structure of a IP packet.
allot the IP address.                                                  2)     User Datagram Protocol: The User Datagram Protocol
    Here UDP is used instead of TCP and thus decreasing                (‘UDP) is one of the core members of the Internet Protocol
the number of fields in the packet. The Customized DHCP                Suite. With UDP, computer applications can send messages,
provides security in which, the protocol can detect any                in this case referred to as datagram, to other hosts on an
unauthorized client trying to connect to the network and can           Internet Protocol (IP) network      without requiring prior
keep the user away from trusted network.                               communications to set up special transmission channels or
This security feature implemented in Customized DHCP is                data paths. UDP applications use datagram sockets to
not available in the usual DHCP and it is an added feature in          establish host-to-host communications. An application binds
the Customized DHCP. For the security feature                          a socket to its endpoint of data transmission, which is a
implementation, a secret code is used in the client, which             combination of an IP address and a service port. Fig. 3
should match with the server’s secret code.                            shows the UDP packet structure.

                     IV. IMPLEMENTATION
A. Project Functional Overview
    The Customized DHCP assigns IP address based on the
range assigned by admin. The range may vary according
to admin. Within the range the server should generate
random IP address and assign to the client and it also provides
static IP address based on client interest. For the static IP
address the client should specify the MAC address and server
hostname with same IP       address.
B. IP Address Allocation Methods
Depending on the implementation, the DHCP server may have
three methods of allocating IP-addresses:
Dynamic allocation: A network admin assigns a range of IP
addresses to DHCP, and each client computer on the LAN is
configured to request an IP address from the DHCP                                        Figure 2. Internet Protocol
server during network       initialization. The request-and-
grant process uses a lease concept with a controllable time
period,      allowing the DHCP server to reclaim (and then
reallocate) IP addresses that are not renewed.
Automatic allocation: The DHCP server permanently assigns
a free IP address to a requesting client from the range defined
by the administrator. This is like dynamic allocation, but the
DHCP server keeps a table of past IP address assignments,                             Figure 3. User Datagram Protocol
so that it can preferentially assign to a client the same IP           3) Bootstrap Protocol: In computer networking, the Boot-
address that the client previously had.                                strap Protocol, or BOOTP, is a network protocol used by a
Static allocation: The DHCP server allocates an IP address           network client to obtain an IP address from a configuration
based on a table with MAC address/IP             address pairs,        server. The BOOTP protocol was originally defined in RFC
which are manually filled in by the network administrator.             951. BOOTP is usually used during the bootstrap process
© 2011 ACEEE                                                      17
DOI: 01.IJCOM.02.03. 548
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011


when a computer is starting up. A BOOTP configuration server          for available IP and assigns dynamically to the client.
assigns an IP address to each client from a pool of addresses.
                                                                      E. Workflow Diagram
BOOTP uses the User Datagram Protocol (UDP) on IPv4 net-
works only. Fig. 4 shows the BOOTP packet structure.                     The work flow diagram shown in Fig. 6 describes the full
4) Ethernet frame: A data packet on an Ethernet link is called        functionality of the project. In Customized DHCP two way
an Ethernet frame. A frame begins with   Preamble and Start           communications takes place. Client will broadcast the request
Frame Delimiter. Following which, each Ethernet frame                 with all basic information of the client system. The server will
continues with an Ethernet header featuring destination and           receive the request and reads all the client information. It
source MAC addresses. The middle section of the frame is              validates the secret code and checks whether the client is
payload data including any headers for other protocols                authorized user or not.        Finally the server unicasts the
(e.g. Internet Protocol) carried in the frame. The frame ends         response to the intended client system with the IP address
with a 32-bit cyclic redundancy check which is used to detect         and other configuration settings.
any corruption of data in transit. Fig. 5 shows Ethernet Frame        F. Customized DHCP Configuration Structure File
structure.
                                                                      Host abc
                                                                      {
                                                                              Hardware Ethernet xx:xx:xx:xx:xx:xx
                                                                              Fixed address 192.168.5.20;
                                                                              Optioned Hostname abc;
                                                                      }

                                                                      Subnet 192.168.5.0 netmask 255.255.255.0
                                                                      {
                                                                               Range 192.168.5.3 to 192.168.5.254;
                                                                               Optional subnet mask 255.255.255.0;
                                                                               Optional broadcast address 192.168.5.254;
                                                                               Optional routes 192.168.5.1;
                                                                               Optional domain name server 10:20:30:40;
                                                                               }




                 Figure 4. Bootstrap Protocol




                                                                                        Figure 6. Work Flow Diagram
                   Figure 5. Ethernet frame
                                                                      By refereeing above structure there are two parts.
D. How It Works                                                       Part 1 (Host abc)
 Initially client and server communicate each other by              Used for static IP address.
creating sockets.                                                     Uses Static allocation to allot the IP addresses.
 Server system has to retrieve client’s mandatory                   Part 2 (Subnet)
configuration detail (MAC address).                                   A network administrator assigns a range of IP  addresses
Client has to retrieve necessary information and fill the           to DHCP.
same in Ethernet frame, IP, UDP and BOOTP.                            The DHCP server permanently assigns a dynamic IP address
For the transmission of datagram to the remote destination          to a requesting client from the range.
it uses broadcast with parsing data mechanism.
The server will receive the request packet from client then
binds address with the port address.
Server receives all the information send by client and check
© 2011 ACEEE                                                     18
DOI: 01.IJCOM.02.03. 548
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011


G. Providing security for DHCP server.                                    IP address. Thus, the implementation provides two category
Host abc                                                                  of IP address allocation which provides security for the clients
{                                                                         which are connected using the first range of IP addresses.
        Hardware Ethernet xx:xx:xx:xx:xx:xx;                              The implementation depicts the function of a firewall. Hence
        Fixed address 192.168.5.20;                                       the Customized DHCP acts as a firewall which identifies the
        Optioned Hostname abc;                                            unauthorized clients.
        Server Hostname xyz;                                              H. Leased File
}
                                                                              DHCP servers update their databases frequently. It is
                                                                          very hard to maintain the consistency among these
Subnet 192.168.5.0 netmask 255.255.255.0
                                                                          databases. When the server system reboots, since the hard
{
                                                                          disk is not in the working condition, the database can not be
         Range 192.168.5.3 to 192.168.5.254;
                                                                          used to store the information. So the LEASED FILE is used in
         Optional subnet mask 255.255.255.0; Optional
                                                                          cache memory to store the information of IP addresses. It
         broadcast address 192.168.5.254;
                                                                          holds file structure which contains the IP addresses, MAC
         Optional routes 192.168.5.1;
                                                                          addresses and leased time of the each individual system.
         Optional domain name server 10:20:30:40;
                                                                          This file structure is stored in the server’s cache memory.
         Server Hostnames xyz;
                                                                          Whenever admin reboots the system the information stored
}
                                                                          in the file structure will be automatically erased. Before
    DHCP security structure includes an extra field, the server
                                                                          allotting any IP address for a client which has made a request,
hostname as the secret code. When client broadcasts the
                                                                          the server first check the list of IP address allotment, which
request with all the basic information, the client has to send
                                                                          has already been made, and then decides which IP address
the specified secret code of the server. The server will receive
                                                                          to be allotted to the client. So, using file structure to store
the request and compares the host name. If the server
                                                                          the data has overcome the problem present in using a
hostname matches, then server will assign the first range of
                                                                          database.
IP address. If it does not match, then the server will assign
second range of IP address. First ranges have the authority
                                                                                                   V. TESTING
to access all the data from the server or the organization, but
the second range will require some access permission. The                 A. Introduction
diagram is Fig. 7 shows the two levels of security given to                   Testing is an important phase in the development life cycle
users.                                                                    of the product. This is the phase where all the types of errors
                                                                          are detected. Errors that are found and corrected are recorded
                                                                          for future references. Thus, a series of testing is performed
                                                                          on the system before it is ready to use.
                                                                          B. CUnit Test
                                                                              CUnit is a lightweight system for writing, running and
                                                                          administering unit tests in C. It provides C    programmers
                                                                          a basic testing functionality with a flexible variety of user
                                                                          interfaces. CUnit is built as a static library which is linked
                                                                          with the user’s testing code. It uses a simple framework for
                                                                          building test structures, and provides a rich set of assertions
                                                                          for testing common data types. In addition, several different
                                                                          interfaces are      provided for running tests and reporting
                                                                          results.
         Figure 7. Customized DHCP security architecture                  B. Test Cases
    Any other client who is unauthorized will not be knowing                  The implementation is tested using CUnit test module. It
the server hostname, which is kept secret within the network              provides various test cases on which the implementation is
perimeter. If such a client tries to request the server, it can be        tested upon and in all the test positive results have been
easily identified, since the server      hostname will not be             obtained. Table. I shows the list of various test cases that
there in the request part. Thus the request it is denied from             are considered while testing.
giving the access permissions, but still, it is allotted with an




© 2011 ACEEE                                                         19
DOI: 01.IJCOM.02.03.548
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011

                    TABLE I. TEST    CASES                                          VI. FUTURE ENHANCEMENT
                                                                     Though the Customized DHCP is added with some new
                                                                 features, it still lacks some features that are yet to be
                                                                 implemented.
                                                                 The project is sufficiently working in command prompt.
                                                                 But it would be more user friendly if it runs in a GUI
                                                                 environment.
                                                                 Security can be upgraded to level three, i.e., a third range of
                                                                 IP addresses can be given to one more category of clients
                                                                 which increases the ease of     authorization.

                                                                                        VII. CONCLUSION
                                                                     The implementation of Customized Dynamic Host
                                                                 Configuration Protocol provides security feature and also
                                                                 reduces the number of communication messages between
                                                                 the client and the server. Also by using UDP most of the
                                                                 unnecessary fields are removed, thereby enhancing the
                                                                 efficiency in terms of execution time taken. The customized
                                                                 DHCP provides high level of security by authorizing the
                                                                 hostname sent by the client to the server. Thus the customized
                                                                 DHCP works like a firewall or a Intrusion Detection System
                                                                 which detection intrusions and provides security. Hence the
                                                                 customized DHCP provides an efficient way for allotting IP
                                                                 addresses to the client systems by reducing the
                                                                 communication between the client and server and by
                                                                 increasing the level of security.

                                                                                           REFERENCES
                                                                 [1] Behrouz A Forouzan, “Data Communications and Networking”,
                                                                 4th ed., New York: Tata McGraw Hill, 2006, pp. 618-620.
                                                                 [2] Nader F Mir, “Computer and Communication Networks”, 3rd
C. Run Summary                                                   ed., Pearson Education, 2009, pp. 174.
   The overall testing run summary of the tests conducted        [3] William Stallings, “Data and Computer Communications”, 8th
is shown in the Table. II. In all the test types the             ed., New Jersey: Prentice Hall, pp. 34 – 40.
implementation found to be positive without any negative         [4] Behrouz A Forouzan, “TCP/IP Protocol Suite”, 2nd ed., New
results.                                                         York: Tata McGraw Hill, 2003, pp. 481 – 490.
                                                                 [5] W. Richard Stevens, “UNIX Network Programming”, 2 nd ed.,
                   TABLE II. R UN   SUMMARY                      vol 1.
                                                                 [6] Brian W Kernighan and Dennis M Ritchie, “ The C
                                                                 Programming Language”, 2nd ed., Prentice Hall, 1988.




© 2011 ACEEE                                                20
DOI: 01.IJCOM.02.03. 548

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012
 
DHCP Server & Client Presentation
DHCP Server & Client PresentationDHCP Server & Client Presentation
DHCP Server & Client Presentation
 
Dynamic Host Configuration Protocol
Dynamic Host Configuration ProtocolDynamic Host Configuration Protocol
Dynamic Host Configuration Protocol
 
Dhcp edu
Dhcp eduDhcp edu
Dhcp edu
 
Wintel ppt for dhcp
Wintel ppt for dhcpWintel ppt for dhcp
Wintel ppt for dhcp
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Dhcp server
Dhcp serverDhcp server
Dhcp server
 
Investigation of dhcp packets using wireshark
Investigation of dhcp packets using wiresharkInvestigation of dhcp packets using wireshark
Investigation of dhcp packets using wireshark
 
DHCP
DHCPDHCP
DHCP
 
DHCP Protocol
DHCP ProtocolDHCP Protocol
DHCP Protocol
 
Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopes
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
dynamic host configuration protocol
dynamic host configuration protocoldynamic host configuration protocol
dynamic host configuration protocol
 
Dhcp presentation 01
Dhcp presentation 01Dhcp presentation 01
Dhcp presentation 01
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Dhcp
DhcpDhcp
Dhcp
 
DHCP
DHCPDHCP
DHCP
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentation
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
 
DHCP and NIS
DHCP and NISDHCP and NIS
DHCP and NIS
 

Andere mochten auch

A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...IDES Editor
 
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterThe Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterIDES Editor
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksIDES Editor
 
Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...IDES Editor
 
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...IDES Editor
 
Extending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityExtending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityIDES Editor
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationIDES Editor
 
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...IDES Editor
 

Andere mochten auch (8)

A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
 
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterThe Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected Networks
 
Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...
 
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
 
Extending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityExtending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent Mobility
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
 
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
 

Ähnlich wie Customized Dynamic Host Configuration Protocol

Ähnlich wie Customized Dynamic Host Configuration Protocol (20)

zuiqui_DHC.ppt
zuiqui_DHC.pptzuiqui_DHC.ppt
zuiqui_DHC.ppt
 
14047721
1404772114047721
14047721
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocol
 
DHCP
DHCPDHCP
DHCP
 
Dhcp with cisco
Dhcp with ciscoDhcp with cisco
Dhcp with cisco
 
Configurar dhcp en router cisco
Configurar dhcp en router ciscoConfigurar dhcp en router cisco
Configurar dhcp en router cisco
 
Dhcp
DhcpDhcp
Dhcp
 
Tutorial on dhcp
Tutorial on dhcp Tutorial on dhcp
Tutorial on dhcp
 
DHCP.pptx
DHCP.pptxDHCP.pptx
DHCP.pptx
 
Networking DHCP server Setup Reports
Networking DHCP server Setup ReportsNetworking DHCP server Setup Reports
Networking DHCP server Setup Reports
 
Dhcp server configuration
Dhcp server configurationDhcp server configuration
Dhcp server configuration
 
DHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACERDHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACER
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
 
DHCP
DHCPDHCP
DHCP
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
DHCP
DHCPDHCP
DHCP
 
Durai presentation of dhcp
Durai presentation of dhcpDurai presentation of dhcp
Durai presentation of dhcp
 
Dhcp by lalit bhati
Dhcp by lalit bhatiDhcp by lalit bhati
Dhcp by lalit bhati
 
IP Layer.pptx
IP Layer.pptxIP Layer.pptx
IP Layer.pptx
 
13 - DHCP Service.ppt
13 - DHCP Service.ppt13 - DHCP Service.ppt
13 - DHCP Service.ppt
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Customized Dynamic Host Configuration Protocol

  • 1. ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 Customized Dynamic Host Configuration Protocol Mr. Sadananda M P and Mr. Sudeep Manohar Encore Software Private Ltd., Bangalore, India Email: sadanand119@gmail.com Jawaharlal Nehru National College of Engineering, Shimoga, India Email: sudeep_mansh@yahoo.com Abstract - The Dynamic Host Configuration Protocol (DHCP) Requirements RFCs. After obtaining the parameters via DHCP, provides a framework for passing configuration information a DHCP client will be able to exchange packets with any other to hosts on a UDP network.  Computers that  are connected  to host in the network. IP networks must be configured before they can communicate Not all of these parameters are required for a newly with other hosts. The most essential information needed is an IP address. DHCP eliminates the manual task by a network initialized client. A client and server may negotiate for the administrator. DHCP is based on the Bootstrap Protocol transmission of only those parameters required by the client (BOOTP), adding the capability of automatic allocation of or specific to a particular subnet. DHCP allows but does not reusable network addresses and additional configuration require the configuration of client parameters not directly options. DHCP captures the behavior of BOOTP relay agents, related to the IP protocol. DHCP also does not register newly and DHCP participants can interoperate with BOOTP configured clients with the Domain Name System (DNS). participants. Proposed system, i.e., Customized DHCP aims to give the security for DHCP, which was not present in the II. THE DORA PROCESS older one and it uses UDP instead of TCP thus reducing the number of fields as compared to the old DHCP, in turn which DORA stands for Discover, Offer, Request and decreases the execution time and still providing the basic Acknowledge. DORA is the process which is used by DHCP functionality of the usual DHCP. for allotting the IP address. It is a four way communication between the Client and Server. The DORA concept is shown Index Terms – DHCP, BOOTP, DORA, Lease file, security, CUnit, in the fig. 1. TCP, UDP and IP address. I. INTRODUCTION DHCP was first defined as a standards track protocol in RFC 1531 in October 1993, as an extension to the Bootstrap Protocol (BOOTP). The motivation for extending BOOTP was that BOOTP required manual intervention to add configuration information for each client, and did not provide a mechanism for reclaiming unused IP addresses. Dynamic Host Configuration Protocol automates network- parameter assignment to network devices from one or more DHCP servers. Even in small networks, DHCP is useful because it makes it easy to add new machines to the network. When a DHCP configured client (a computer or any other network-aware device) connects to a network, the DHCP client sends a broadcast query requesting necessary information from a DHCP server. The broadcast message is sent because the server address is not known to the client initially. The DHCP server manages a pool of IP addresses and information about client configuration parameters such as default gateway, domain name, the name servers, other servers such as time servers, and so forth. On receiving a Figure 1. DORA concept valid request, the server assigns the computer an IP address, The steps involved in the DORA concept are as below a lease (length of time the allocation is valid), and other IP a) Client makes a UDP Broadcast to the server with a configuration parameters, such as the subnet mask and DHCPDiscover, or Discover packet. the default  gateway.  The query is typically initiated b) DHCP offers to the client. The server sends a DHCP Offer immediately after booting, and must complete before the including the IP address and other configuration parameters client can initiate IP-based communication with other hosts. (DHCP Options). DHCP is designed to supply DHCP client systems with the c) In response to the offer Client requests the server. The configuration parameters that are defined in the Host client replies DHCPRequest, unicast to the server, requesting © 2011 ACEEE 16 DOI: 01.IJCOM.02.03. 548
  • 2. ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 the offered address. Only requesting clients with a MAC address listed in this d) The server sends DHCPAck acknowledging the request table will be allocated an IP address. which is the clients final permission to take the address as Any of the above methods can be used, but in Customized offered. Before sending the ack the server checks once again DHCP implementation, dynamic allocation method is used to where the offered address is still available and that the provide quick allocation of IP addresses to the clients.. parameters match the clients request. After allotting the IP C. Protocols Used the server marks the address taken. 1) Internet Protocol: The Internet Protocol (IP) is the III. CUSTOMIZED DHCP principal communications protocol used for relaying datagram (packets) across an inter-network using the Internet In the Customized DHCP, the four way communication is Protocol Suite. IP is the primary protocol in the Internet reduced to two way communication. Instead of the DORA Layer of the Internet Protocol Suite and has the task of concept, a new concept is being used which has only two delivering datagram from the source host to the destination steps, request and response. The code length is reduced by host solely based on their addresses. For this purpose, IP removing the unnecessary fields in the packet which increases defines addressing methods and structures for datagram the speed of execution thus decreasing the time taken to encapsulation. Fig. 2 shows the structure of a IP packet. allot the IP address. 2) User Datagram Protocol: The User Datagram Protocol Here UDP is used instead of TCP and thus decreasing (‘UDP) is one of the core members of the Internet Protocol the number of fields in the packet. The Customized DHCP Suite. With UDP, computer applications can send messages, provides security in which, the protocol can detect any in this case referred to as datagram, to other hosts on an unauthorized client trying to connect to the network and can Internet Protocol (IP) network without requiring prior keep the user away from trusted network. communications to set up special transmission channels or This security feature implemented in Customized DHCP is data paths. UDP applications use datagram sockets to not available in the usual DHCP and it is an added feature in establish host-to-host communications. An application binds the Customized DHCP. For the security feature a socket to its endpoint of data transmission, which is a implementation, a secret code is used in the client, which combination of an IP address and a service port. Fig. 3 should match with the server’s secret code. shows the UDP packet structure. IV. IMPLEMENTATION A. Project Functional Overview The Customized DHCP assigns IP address based on the range assigned by admin. The range may vary according to admin. Within the range the server should generate random IP address and assign to the client and it also provides static IP address based on client interest. For the static IP address the client should specify the MAC address and server hostname with same IP address. B. IP Address Allocation Methods Depending on the implementation, the DHCP server may have three methods of allocating IP-addresses: Dynamic allocation: A network admin assigns a range of IP addresses to DHCP, and each client computer on the LAN is configured to request an IP address from the DHCP Figure 2. Internet Protocol server during network       initialization. The request-and- grant process uses a lease concept with a controllable time period, allowing the DHCP server to reclaim (and then reallocate) IP addresses that are not renewed. Automatic allocation: The DHCP server permanently assigns a free IP address to a requesting client from the range defined by the administrator. This is like dynamic allocation, but the DHCP server keeps a table of past IP address assignments, Figure 3. User Datagram Protocol so that it can preferentially assign to a client the same IP 3) Bootstrap Protocol: In computer networking, the Boot- address that the client previously had. strap Protocol, or BOOTP, is a network protocol used by a Static allocation: The DHCP server allocates an IP address network client to obtain an IP address from a configuration based on a table with MAC address/IP address pairs, server. The BOOTP protocol was originally defined in RFC which are manually filled in by the network administrator. 951. BOOTP is usually used during the bootstrap process © 2011 ACEEE 17 DOI: 01.IJCOM.02.03. 548
  • 3. ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 when a computer is starting up. A BOOTP configuration server for available IP and assigns dynamically to the client. assigns an IP address to each client from a pool of addresses. E. Workflow Diagram BOOTP uses the User Datagram Protocol (UDP) on IPv4 net- works only. Fig. 4 shows the BOOTP packet structure. The work flow diagram shown in Fig. 6 describes the full 4) Ethernet frame: A data packet on an Ethernet link is called functionality of the project. In Customized DHCP two way an Ethernet frame. A frame begins with   Preamble and Start communications takes place. Client will broadcast the request Frame Delimiter. Following which, each Ethernet frame with all basic information of the client system. The server will continues with an Ethernet header featuring destination and receive the request and reads all the client information. It source MAC addresses. The middle section of the frame is validates the secret code and checks whether the client is payload data including any headers for other protocols authorized user or not. Finally the server unicasts the (e.g. Internet Protocol) carried in the frame. The frame ends response to the intended client system with the IP address with a 32-bit cyclic redundancy check which is used to detect and other configuration settings. any corruption of data in transit. Fig. 5 shows Ethernet Frame F. Customized DHCP Configuration Structure File structure. Host abc { Hardware Ethernet xx:xx:xx:xx:xx:xx Fixed address 192.168.5.20; Optioned Hostname abc; } Subnet 192.168.5.0 netmask 255.255.255.0 { Range 192.168.5.3 to 192.168.5.254; Optional subnet mask 255.255.255.0; Optional broadcast address 192.168.5.254; Optional routes 192.168.5.1; Optional domain name server 10:20:30:40; } Figure 4. Bootstrap Protocol Figure 6. Work Flow Diagram Figure 5. Ethernet frame By refereeing above structure there are two parts. D. How It Works Part 1 (Host abc)  Initially client and server communicate each other by Used for static IP address. creating sockets. Uses Static allocation to allot the IP addresses.  Server system has to retrieve client’s mandatory Part 2 (Subnet) configuration detail (MAC address). A network administrator assigns a range of IP  addresses Client has to retrieve necessary information and fill the to DHCP. same in Ethernet frame, IP, UDP and BOOTP. The DHCP server permanently assigns a dynamic IP address For the transmission of datagram to the remote destination to a requesting client from the range. it uses broadcast with parsing data mechanism. The server will receive the request packet from client then binds address with the port address. Server receives all the information send by client and check © 2011 ACEEE 18 DOI: 01.IJCOM.02.03. 548
  • 4. ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 G. Providing security for DHCP server. IP address. Thus, the implementation provides two category Host abc of IP address allocation which provides security for the clients { which are connected using the first range of IP addresses. Hardware Ethernet xx:xx:xx:xx:xx:xx; The implementation depicts the function of a firewall. Hence Fixed address 192.168.5.20; the Customized DHCP acts as a firewall which identifies the Optioned Hostname abc; unauthorized clients. Server Hostname xyz; H. Leased File } DHCP servers update their databases frequently. It is very hard to maintain the consistency among these Subnet 192.168.5.0 netmask 255.255.255.0 databases. When the server system reboots, since the hard { disk is not in the working condition, the database can not be Range 192.168.5.3 to 192.168.5.254; used to store the information. So the LEASED FILE is used in Optional subnet mask 255.255.255.0; Optional cache memory to store the information of IP addresses. It broadcast address 192.168.5.254; holds file structure which contains the IP addresses, MAC Optional routes 192.168.5.1; addresses and leased time of the each individual system. Optional domain name server 10:20:30:40; This file structure is stored in the server’s cache memory. Server Hostnames xyz; Whenever admin reboots the system the information stored } in the file structure will be automatically erased. Before DHCP security structure includes an extra field, the server allotting any IP address for a client which has made a request, hostname as the secret code. When client broadcasts the the server first check the list of IP address allotment, which request with all the basic information, the client has to send has already been made, and then decides which IP address the specified secret code of the server. The server will receive to be allotted to the client. So, using file structure to store the request and compares the host name. If the server the data has overcome the problem present in using a hostname matches, then server will assign the first range of database. IP address. If it does not match, then the server will assign second range of IP address. First ranges have the authority V. TESTING to access all the data from the server or the organization, but the second range will require some access permission. The A. Introduction diagram is Fig. 7 shows the two levels of security given to Testing is an important phase in the development life cycle users. of the product. This is the phase where all the types of errors are detected. Errors that are found and corrected are recorded for future references. Thus, a series of testing is performed on the system before it is ready to use. B. CUnit Test CUnit is a lightweight system for writing, running and administering unit tests in C. It provides C programmers a basic testing functionality with a flexible variety of user interfaces. CUnit is built as a static library which is linked with the user’s testing code. It uses a simple framework for building test structures, and provides a rich set of assertions for testing common data types. In addition, several different interfaces are provided for running tests and reporting results. Figure 7. Customized DHCP security architecture B. Test Cases Any other client who is unauthorized will not be knowing The implementation is tested using CUnit test module. It the server hostname, which is kept secret within the network provides various test cases on which the implementation is perimeter. If such a client tries to request the server, it can be tested upon and in all the test positive results have been easily identified, since the server hostname will not be obtained. Table. I shows the list of various test cases that there in the request part. Thus the request it is denied from are considered while testing. giving the access permissions, but still, it is allotted with an © 2011 ACEEE 19 DOI: 01.IJCOM.02.03.548
  • 5. ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 TABLE I. TEST CASES VI. FUTURE ENHANCEMENT Though the Customized DHCP is added with some new features, it still lacks some features that are yet to be implemented. The project is sufficiently working in command prompt. But it would be more user friendly if it runs in a GUI environment. Security can be upgraded to level three, i.e., a third range of IP addresses can be given to one more category of clients which increases the ease of authorization. VII. CONCLUSION The implementation of Customized Dynamic Host Configuration Protocol provides security feature and also reduces the number of communication messages between the client and the server. Also by using UDP most of the unnecessary fields are removed, thereby enhancing the efficiency in terms of execution time taken. The customized DHCP provides high level of security by authorizing the hostname sent by the client to the server. Thus the customized DHCP works like a firewall or a Intrusion Detection System which detection intrusions and provides security. Hence the customized DHCP provides an efficient way for allotting IP addresses to the client systems by reducing the communication between the client and server and by increasing the level of security. REFERENCES [1] Behrouz A Forouzan, “Data Communications and Networking”, 4th ed., New York: Tata McGraw Hill, 2006, pp. 618-620. [2] Nader F Mir, “Computer and Communication Networks”, 3rd C. Run Summary ed., Pearson Education, 2009, pp. 174. The overall testing run summary of the tests conducted [3] William Stallings, “Data and Computer Communications”, 8th is shown in the Table. II. In all the test types the ed., New Jersey: Prentice Hall, pp. 34 – 40. implementation found to be positive without any negative [4] Behrouz A Forouzan, “TCP/IP Protocol Suite”, 2nd ed., New results. York: Tata McGraw Hill, 2003, pp. 481 – 490. [5] W. Richard Stevens, “UNIX Network Programming”, 2 nd ed., TABLE II. R UN SUMMARY vol 1. [6] Brian W Kernighan and Dennis M Ritchie, “ The C Programming Language”, 2nd ed., Prentice Hall, 1988. © 2011 ACEEE 20 DOI: 01.IJCOM.02.03. 548