EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

What is DHCP?

By Priya PedamkarPriya Pedamkar

Home » Software Development » Software Development Tutorials » Network Security Tutorial » What is DHCP?

What-is-DHCP

Understanding DHCP or Dynamic Host Configuration Protocol

DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol present in the application layer. With its help, an Internet Protocol IP address can be assigned to any device or node on a network dynamically so that they can communicate using this IP. Network administrators’ task is to a lot of IP addresses manually to all the devices in the network. However, in this, the task is automated and managed centrally rather than manually. Both the small local networks and the large enterprise networks implement it. The basic goal of it is to assign a unique IP address to hosts. It also provides other network addresses such as –

  • Subnet Mask
  • Router Address
  • DNS Address
  • Vendor Class Identifier

It comes in two different ways, i.e it comes as a client and as a server.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

History of DHCP

It is an extended version of BOOTP, more popularly known as Bootstrap Protocol, a network IP management protocol from 1985. The DHCP servers are capable enough to handle requests from the BOOTP clients if these clients are present in a network. Not only this, the DHCP is more advanced when compared to BOOTP.

How does it work?

When acting as a server, the DHCP server automatically assigns unique IP addresses alongside configuring other information of the network. In small businesses or homes, the DHCP server is none other than the router. However, in large networks, the DHCP server can be a single computer.

A very brief summary of what happens in the process is –

  • The client sends a request for an IP address from the host. The client can be any device sending the request, and the host can be a router.
  • The host will look for an available IP address and assign it to the client.
  • Using this IP address, the client will be able to communicate on the network.

Let us now look at this process in more detail. The steps mentioned below gives an in-depth view of it –

Popular Course in this category
All in One Software Development Bundle (600+ Courses, 50+ projects)600+ Online Courses | 3000+ Hours | Verifiable Certificates | Lifetime Access
4.6 (3,144 ratings)
Course Price

View Course

Related Courses
CDN Training (2 Courses)OSPF Training Program (2 Courses)Penetration Testing Training Program (2 Courses)
  1. The request sent by a device that is connected to a network with a DHCP server is called a DHCPDISCOVER request.
  2. This request is sent to the DHCP server in the form of a packet named DISCOVER. As soon as the DHCP server receives this packet, the server looks for an IP address for the device’s use. Once found, the server responds by sending a packet to the client called DHCPOFFER.
  3. The device or the client now has to respond to the server with a packet named DHCPREQUEST packet in acceptance of the chosen IP address. To this packet, the server sends an acknowledgement (ACK) to confirm back that the device can now use that specific IP address. It also states the validity of the particular IP address so that the device knows exactly when it has to get a new IP address.
  4. In cases where the server does not want the device to have the given IP address, it will not acknowledge the device’s request by sending a NAC.

Although the steps mentioned seem to be very time-consuming, these happen so quickly practically then one would not even realize. There is, of course, no need to have technical details of the process, and you can still get an IP address from the DHCP server just by reading.

How does it make working so easy?

A DHCP server has a pool of addresses for a device to get a valid network connection. It basically gives the scope, or range, of IP addresses within which the devices receive there address.

The second reason for the usefulness of DHCP is that many devices can connect to a network for a specified period of time, even without the need for any pool of available addresses. For example, consider 20 addresses defined by the DHCP server; 40, 80, 100 (or even more) devices can connect to the network as long as not more than 20 are using one of the available IP address simultaneously.

The commands like ipconfig will return the different IP addresses of your computer over time while using it as these addresses are provided to your computer network for a specified duration, also called a lease period. It is not necessary that the device with a manually assigned IP address cannot co-exist on the same network with the devices receiving their IP address dynamically. The manually assigned IP addresses are also called static IP address.

Advantages and Disadvantages of DHCP

Following below are some of the advantages and disadvantages given.

Advantages

It has many benefits because of which it is very popular. A few of the advantages of using it are mentioned below:

  • One can add new clients very easily to a network.
  • The IP addresses are managed centrally by the DHCP.
  • The IP addresses can be reused, thus minimizing the requirement of the total number of IP addresses.
  • The ease at which the IP address space present on the DHCP server can be reconfigured without the need for individually reconfiguring clients.
  • The network administrator can configure a network from a centralized area using a DHCP protocol method.

Disadvantages

Just like every coin has its pros and cons, there are disadvantages of using DHCP, which are mentioned below:

  • While assigning the IP addresses to different hosts, sometimes, conflicts in the IP addresses might occur.

Conclusion

The Dynamic Host Configuration Protocol is a crucial and critical network service that is a must-have as using It will help you as a System Administrator or a Network Administrator to deal with the clients by assigning tracking and re-assigning IP. Leaving the management besides, in case of any problems, you just need to stay connected to your server and to verify the settings rather than running between your clients.

Recommended Articles

This has been a guide to What is DHCP?. Here we have discussed the understanding of DHCP, how it works, along with the Advantages and Disadvantages. You may also have a look at the following articles to learn more –

  1. What is Groovy?
  2. What is JDK?
  3. What is JVM?
  4. Configuring DHCP Server

All in One Software Development Bundle (600+ Courses, 50+ projects)

600+ Online Courses

3000+ Hours

Verifiable Certificates

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Data Link Layer Services
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Vulnerability Assessment Tools
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • Daisy Chain Topology
    • Markov Logic Network
    • Security engineering
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - All in One Software Development Bundle (600+ Courses, 50+ projects) Learn More