DHCP Dora process is handling by a SERVER called DHCP SERVER that dynamically distributes network configuration parameter, such as IP Addresses for interface or services. It is a Standardized network protocol used on INTERNET PROTOCOL in the network. AboutDHCP SERVER , it can be a ROUTER that SERVER enables computers to request IP Address and networking parameter automatically and no need manual configuration.
What is DHCP?
In any network, if a host wants to communicate with another host, then it must have a unique IP address for it. Whether it is a local area network or a wide area network. The work of DHCP is to assign an IP address to the hosts. DHCP is a client/server protocol.DHCP portnumber is 67 and 68.DHCP clientwork on port number 67 andDHCP serverwork on port number 68.
DHCP work as a client – Server Model, here SERVER handling the clients. DHCP employs a connectionless service model using UDP (User Datagram Protocol). Two UDP port used in DHCP process, 67 UDP port is the destination port of a server and 68 UDP port used by the client.
DHCP SERVER – DHCP SERVER working in same networking it means it provides IPs in the same network. DHCP SERVER automatically provides the IPs to clients. DHCP server manages a pool of IPs & information about client such parameter DEFAULT GATEWAY, DOMAIN NAME, SERVER NAME, & TIME SERVER.
How does DHCP Dora process work?
DHCP operation divides into 4 phases.
IP Lease Offer
IP Lease Request
IP lease Acknowledgement
This DHCP operation calledDORA Process.
Note*For example I used unicast IP Address.
First I am telling you about DORA process in DHCP
Discovery ( DHCP discover ):
By this message interaction start between server and client. Discovery sent by a client that is connected to a local subnet. While send discovery destination address is broadcast 255.255.255.255 and source address is 0.0.0.0.
OFFER ( DHCP offer ):
Offer is a response to Discovery message by DHCP server to DHCP client. It contains network configuration setting for the client like an IP address offer to client 10.1.1.1.
REQUEST ( DHCP request ):
A response to Offer is indicating that client has accepted the network configuration. It means to accept the offer by DHCP server with IP 10.1.1.1. this message sent by the client with destination address 255.255.255.255 and source address is 10.1.1.1.
ACKNOWLEDGE ( DHCP ack ):
After the request message or accept the IP by DHCP SERVER, server sent an ACK to the client. This message clear to the client that now you can start using the network.
This four-phase of DORA process and describe how IP assign to a Client by DHCP server. By default Receiver or client receive IP from DHCP SERVER for 24 Hour. By using time connectivity is fine or message always going unicast.
After 50% time (12 hours):Connectivity is ok then IP is renewing 24 hours, if no then time going on.
After 75% time (18 hours):Connectivity is ok then IP is renewing for 24 hours, if no then left time going on continues.
After 100% time (24 Hour):Connectivity is ok then IP is renewing for 24 hours if connectivity no then IP got by APIPA 169.254.255.0.
Automatic Private IP Address 169.254.255.0. APIPA work in some situation:
When DHCP SERVER not available.
When connectivity is not there with network If DHCP SERVER has any problem.
Advantage of APIPA
It works same as DHCP SERVER
It stops unwanted Broadcast.
How to configure DHCP and pool
Router(config)#ip DHCP pool vlan10
Router(DHCP-config)#network 192.168.10.0 /24
Router# show IP DHCP pool (By this command check the pool status)
Above blog is all about DHCP. From this, you can clarify that what is DHCP and how its function in networking. DHCP is mostly asking in an interview (Domestic and MNC companies). May it help you, after you read this blog I am sure you can describe the DHCP and How to operate DHCP or DHCP server and what is the relation of SERVER and CLIENT and DORA process etc.
Hello, Myself Bhabesh, living in Bengaluru, Karnataka, India. I’m a Penetration Tester, Cyber Security Analyst, Threats hunter, Vulnerability founder, Bug Bounty hunter, System Hacker, Exploiting expert, Android hacker, Reverse Engineer, Malware Analyst, SIEM or UTM & SOC Analyst, Security Researcher with great innovation and latest technology gadgets.
View all posts by B4cKD00₹