SlideShare une entreprise Scribd logo
1  sur  15
Presented By
===========

Ashish Malik
M.Tech - Information Security & Computer Forensics (SRM University)
   The process of starting a computer system is
    known as bootstrapping.
   The sequence begins with code in ROM
     It loads an image in RAM
   Two approaches to obtain an image :
     Embedded System
      ▪ ROM code use n/w support to locate & download image.
     Conventional Computer
      ▪ ROM code loads image from well-known place on disk.
   Loaded image is not configured according to
    the specific physical hardware.
   It does not contain any networking details.
   Early implementation of TCP/IP provided
    separate mechanism to obtain configuration
    information e.g. RARP to obtain IP address.
   When subnet masks were introduced, ICMP
    address mask message were added to obtain
    a subnet mask.
   Advantage
     Flexibility
     Computer decides which item to obtain from local
      disk and which to obtain over the n/w.
   Disadvantage
     Network traffic and delay
     Computer issues request messages to server. Each
      response returns a small value (IP). Networks
      enforce min. packet size, so most of the space in
      each packet is wasted.
   It was invented to supply more than one item
    of configuration information in a single step.
   BOOTP server provide several pieces of
    information at once like :
     Computers IP address
     Server’s name and IP address
     IP address of a default router
   BOOTP uses IP to send request and receive
    response.
   How BOOTP uses Unconfigured IP ?

   It’s design allow IP to broadcast an IP
    datagram request before all values have been
    configured.
   Destination address used : all 1’s
   Source address used : all 0’s
   BOOTP responds either via broadcast
    message or via MAC address.
   BOOTP uses UDP so messages can be
    delayed, lost or duplicated.
   BOOTP requires that UDP use checksums.
   To handle datagram loss, BOOTP uses
    technique of timeout & retransmission.
   BOOTP uses a two-step bootstrap procedure:
      ▪ It only provides client with the information needed to
        obtain an image.
      ▪ Client then uses TFTP to obtain the image.
     BOOTP was designed for a static environment.
     With advent of networking and portable
      PC’s, BOOTP does not adapt to such situations as
      info. can not be exchanged quickly.
     Hence we needed another protocol, DHCP.
   Dynamic Host Configuration Protocol
   It was devised to automate the configuration.
   It use plug-and-play networking to join a new
    network and obtain an IP address.
   DHCP server can be configured to have two
    type of addresses :
     Permanent addresses
      ▪ Assigned to server computers.
     Pool of addresses
      ▪ These are to be allocated on demand.
   Addresses assigned on demand are not
    permanent.
   DHCP issues a lease on the address for a
    finite period of time.
   If lease expires, computer must renegotiate
    with the DHCP server.
   If an event cause all computers to restart at
    same time, DHCP uses the same technique as
    BOOTP to avoid flooding with requests.
     i.e. waiting for a random amount of time.
   This protocol has two steps :
     Broadcast DHCP discover message
     Send request to server that responded
   To avoid repeating above steps, DHCP uses
    caching.
Thank You

Contenu connexe

Tendances

Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopesjocelyn_tanner
 
DHCP Server & Client Presentation
DHCP Server & Client PresentationDHCP Server & Client Presentation
DHCP Server & Client Presentationraini
 
DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)Netwax Lab
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol AMahmmoud Mahdi
 
Dhcp presentation 01
Dhcp presentation 01Dhcp presentation 01
Dhcp presentation 01maverick4489
 
Dynamic Host Configuration Protocol
Dynamic Host Configuration ProtocolDynamic Host Configuration Protocol
Dynamic Host Configuration Protocolgueste98b36
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012Abaady Sahal
 
dynamic host configuration protocol
dynamic host configuration protocoldynamic host configuration protocol
dynamic host configuration protocolkinish kumar
 
Dhcp windows server 2012
Dhcp windows server 2012Dhcp windows server 2012
Dhcp windows server 2012Taha99
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)Faisal Jatt
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentationSaqib Malik
 

Tendances (20)

Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopes
 
DHCP Server & Client Presentation
DHCP Server & Client PresentationDHCP Server & Client Presentation
DHCP Server & Client Presentation
 
DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)
 
Dhcp
DhcpDhcp
Dhcp
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Dhcp presentation 01
Dhcp presentation 01Dhcp presentation 01
Dhcp presentation 01
 
Dynamic Host Configuration Protocol
Dynamic Host Configuration ProtocolDynamic Host Configuration Protocol
Dynamic Host Configuration Protocol
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012
 
Dhcp
DhcpDhcp
Dhcp
 
Wintel ppt for dhcp
Wintel ppt for dhcpWintel ppt for dhcp
Wintel ppt for dhcp
 
DHCP
DHCPDHCP
DHCP
 
Linux05 DHCP Server
Linux05 DHCP ServerLinux05 DHCP Server
Linux05 DHCP Server
 
dynamic host configuration protocol
dynamic host configuration protocoldynamic host configuration protocol
dynamic host configuration protocol
 
DHCP
DHCPDHCP
DHCP
 
Dhcp windows server 2012
Dhcp windows server 2012Dhcp windows server 2012
Dhcp windows server 2012
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
 
Dhcp server
Dhcp serverDhcp server
Dhcp server
 
Dhcp edu
Dhcp eduDhcp edu
Dhcp edu
 
Dhcp
DhcpDhcp
Dhcp
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentation
 

En vedette (8)

Ch07
Ch07Ch07
Ch07
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
 
Chapter 19: Logical Addressing
Chapter 19: Logical AddressingChapter 19: Logical Addressing
Chapter 19: Logical Addressing
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
IGMP
IGMPIGMP
IGMP
 
Address mapping
Address mappingAddress mapping
Address mapping
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Similaire à Bootstrapping with bootp and dhcp

BOOTP computer science for multiproc.ppt
BOOTP computer science for multiproc.pptBOOTP computer science for multiproc.ppt
BOOTP computer science for multiproc.pptnaghamallella
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdfBIT DURG
 
Customized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolCustomized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolIDES Editor
 
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
Reply  needed 1TCPIP is a networking protocol suite that Micros.docxReply  needed 1TCPIP is a networking protocol suite that Micros.docx
Reply needed 1TCPIP is a networking protocol suite that Micros.docxsodhi3
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxMUHAMMADATTAURREHMAN7
 
A day in the life of a Web Request
A day in the life of a Web RequestA day in the life of a Web Request
A day in the life of a Web RequestMD.ANISUR RAHMAN
 
Data communication part 7
Data communication part 7Data communication part 7
Data communication part 7Alex Fernandez
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer NumericalsManisha Keim
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
BOOTP and DHCP.ppt
BOOTP and DHCP.pptBOOTP and DHCP.ppt
BOOTP and DHCP.pptanik301
 
data communication protocol
data communication protocoldata communication protocol
data communication protocolRamla Sheikh
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image DvdSusan Cox
 

Similaire à Bootstrapping with bootp and dhcp (20)

BOOTP computer science for multiproc.ppt
BOOTP computer science for multiproc.pptBOOTP computer science for multiproc.ppt
BOOTP computer science for multiproc.ppt
 
IP Layer.pptx
IP Layer.pptxIP Layer.pptx
IP Layer.pptx
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
 
Dhcp
DhcpDhcp
Dhcp
 
DHCP.pptx
DHCP.pptxDHCP.pptx
DHCP.pptx
 
Customized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolCustomized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration Protocol
 
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
Reply  needed 1TCPIP is a networking protocol suite that Micros.docxReply  needed 1TCPIP is a networking protocol suite that Micros.docx
Reply needed 1TCPIP is a networking protocol suite that Micros.docx
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
 
PACE-IT: DHCP in the Network - N10 006
PACE-IT: DHCP in the Network - N10 006 PACE-IT: DHCP in the Network - N10 006
PACE-IT: DHCP in the Network - N10 006
 
DHCP
DHCPDHCP
DHCP
 
Poster presentation
Poster presentationPoster presentation
Poster presentation
 
A day in the life of a Web Request
A day in the life of a Web RequestA day in the life of a Web Request
A day in the life of a Web Request
 
Data communication part 7
Data communication part 7Data communication part 7
Data communication part 7
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer Numericals
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
BOOTP and DHCP.ppt
BOOTP and DHCP.pptBOOTP and DHCP.ppt
BOOTP and DHCP.ppt
 
data communication protocol
data communication protocoldata communication protocol
data communication protocol
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Bootstrapping with bootp and dhcp

  • 1. Presented By =========== Ashish Malik M.Tech - Information Security & Computer Forensics (SRM University)
  • 2. The process of starting a computer system is known as bootstrapping.  The sequence begins with code in ROM  It loads an image in RAM  Two approaches to obtain an image :  Embedded System ▪ ROM code use n/w support to locate & download image.  Conventional Computer ▪ ROM code loads image from well-known place on disk.
  • 3. Loaded image is not configured according to the specific physical hardware.  It does not contain any networking details.  Early implementation of TCP/IP provided separate mechanism to obtain configuration information e.g. RARP to obtain IP address.  When subnet masks were introduced, ICMP address mask message were added to obtain a subnet mask.
  • 4. Advantage  Flexibility  Computer decides which item to obtain from local disk and which to obtain over the n/w.  Disadvantage  Network traffic and delay  Computer issues request messages to server. Each response returns a small value (IP). Networks enforce min. packet size, so most of the space in each packet is wasted.
  • 5. It was invented to supply more than one item of configuration information in a single step.  BOOTP server provide several pieces of information at once like :  Computers IP address  Server’s name and IP address  IP address of a default router  BOOTP uses IP to send request and receive response.
  • 6. How BOOTP uses Unconfigured IP ?  It’s design allow IP to broadcast an IP datagram request before all values have been configured.  Destination address used : all 1’s  Source address used : all 0’s  BOOTP responds either via broadcast message or via MAC address.
  • 7. BOOTP uses UDP so messages can be delayed, lost or duplicated.  BOOTP requires that UDP use checksums.  To handle datagram loss, BOOTP uses technique of timeout & retransmission.
  • 8.
  • 9. BOOTP uses a two-step bootstrap procedure: ▪ It only provides client with the information needed to obtain an image. ▪ Client then uses TFTP to obtain the image.  BOOTP was designed for a static environment.  With advent of networking and portable PC’s, BOOTP does not adapt to such situations as info. can not be exchanged quickly.  Hence we needed another protocol, DHCP.
  • 10. Dynamic Host Configuration Protocol  It was devised to automate the configuration.  It use plug-and-play networking to join a new network and obtain an IP address.  DHCP server can be configured to have two type of addresses :  Permanent addresses ▪ Assigned to server computers.  Pool of addresses ▪ These are to be allocated on demand.
  • 11. Addresses assigned on demand are not permanent.  DHCP issues a lease on the address for a finite period of time.  If lease expires, computer must renegotiate with the DHCP server.  If an event cause all computers to restart at same time, DHCP uses the same technique as BOOTP to avoid flooding with requests.  i.e. waiting for a random amount of time.
  • 12.
  • 13. This protocol has two steps :  Broadcast DHCP discover message  Send request to server that responded  To avoid repeating above steps, DHCP uses caching.
  • 14.