Dynamic Host Configuration Protocol: A Micro Project Report On

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

A

Micro Project Report


On
Dynamic Host Configuration Protocol
Submitted by:-

I. Kartik Pramod Patel

II. Seema Gotiram Korade

III. Sanket Deoba Deore

IV. Abhijeet Vijay Chaudhari


____________________________

Under the Guidance of:-

Proff. Prashant Gawande


__________________________________

In the Partial Fulfilment of Fourth Semester of Diploma in Information Technology

Department of Information Technology


Sandip Polytechnic
Mahiravani, Nashik - 422213

Affiliated to
Maharashtra StateBoard of Technical Education
Academic Year 2020-2021

Maharashtra State
Board of Technical Education

Certificate

This is to certify that: Abhijeet Vijay Chaudhari Roll No. 32


of Fourth Semester of Diploma in Information Technology of Institute, Sandip
Polytechnic (Code:1167) has completed the Micro Project satisfactorily in subject
Computer Networking (CNE) for the academic year 2020- 2021 as prescribed in the
curriculum.

Place: Nashik Enrollment No: 1911670454

Date: ……………………… Exam. Seat No: 357155

Subject Teacher Head of the Department Principal


Introduction
The transmission medium layout used to link devices is the physical topology of the network. For
conductive or
fiber optical mediums, this refers to the layout of cabling, the locations of nodes, and the links between the
nodes
and the cabling.[1] The physical topology of a network is determined by the capabilities of the network
access
devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or
telecommunication circuits.
In contrast, logical topology is the way that the signals act on the network media, or the way that the data
passes
through the network from one device to the next without regard to the physical interconnection of the
devices. A
network's logical topology is not necessarily the same as its physical topology. For example, the original
twisted
pair Ethernet using repeater hubs was a logical bus topology carried on a physical star topology. Token ring
is a
logical ring topology, but is wired as a physical star from the media access unit. Physically, AFDX can be a
cascaded star topology of multiple dual redundant Ethernet switches; however, the AFDX Virtual links are
modeled as time-switched single-transmitter bus connections, thus following the safety model of a single
transmitter bus topology previously used in aircraft. Logical topologies are often closely associated with
media
access control methods and protocols. Some networks are able to dynamically change their logical topology
through configuration changes to their routers and switches.

Wired technologies
The orders of the following wired technologies are, roughly, from slowest to fastest transmission speed.
 Coaxial cable is widely used for cable television systems, office buildings, and other work-sites for local
area
networks. The cables consist of copper or aluminum wire surrounded by an insulating layer (typically a
flexible material with a high dielectric constant), which itself is surrounded by a conductive layer. The
insulation helps minimize interference and distortion. Transmission speed ranges from 200 million bits per
second to more than 500 million bits per second.
 ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a
high-speed (up to 1 Gigabit/s) local area network.
 Signal traces on printed circuit boards are common for board-level serial communication, particularly
between certain types integrated circuits, a common example being SPI.
 Ribbon cable (untwisted and possibly unshielded) has been a cost-effective media for serial protocols,
especially within metallic enclosures or rolled within copper braid or foil, over short distances, or at lower
data rates. Several serial network protocols can be deployed without shielded or twisted pair cabling, that is,
with "flat" or "ribbon" cable, or a hybrid flat/twisted ribbon cable, should EMC, length,
and bandwidth constraints permit: RS-232, [6] RS-422, RS-485, [7] CAN, [8] GPIB, SCSI, [9] etc.
 Twisted pair wire is the most widely used medium for all telecommunication. [10] Twisted-pair cabling
consist
of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires
twisted into pairs. Computer network cabling (wired Ethernet as defined by IEEE 802.3) consists of 4 pairs
of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted
together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2
million bits per second to 10 billion bits per second. Twisted pair cabling comes in two forms:
unshieldedtwisted pair (UTP) and shielded twisted-pair (STP). Each form comes in several category ratings,
designed
for use in various scenarios.
 An optical fiber is a glass fiber. It carries pulses of light that represent data. Some advantages of optical
fibers
over metal wires are very low transmission loss and immunity from electrical interference. Optical fibers can
simultaneously carry multiple wavelengths of light, which greatly increases the rate that data can be sent,
and
helps enable data rates of up to trillions of bits per second. Optic fibers can be used for long runs of cable
carrying very high data rates, and are used for undersea cables to interconnect continents.

Wireless technologies
 Terrestrial microwave – Terrestrial microwave communication uses Earth-based transmitters and receivers
resembling satellite dishes. Terrestrial microwaves are in the low gigahertz range, which limits all
communications to line-of-sight. Relay stations are spaced approximately 50 km (30 mi) apart.
 Communications satellites – Satellites communicate via microwave radio waves, which are not deflected
by
the Earth's atmosphere. The satellites are stationed in space, typically in geostationary orbit 35,786 km
(22,236 mi) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice,
data, and TV signals.
 Cellular and PCS systems use several radio communications technologies. The systems divide the region
covered into multiple geographic areas. Each area has a low-power transmitter or radio relay antenna device
to relay calls from one area to the next area.
 Radio and spread spectrum technologies – Wireless local area networks use a high-frequency radio
technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread
spectrum technology to enable communication between multiple devices in a limited area. IEEE
802.11 defines a common flavor of open-standards wireless radio-wave technology known as Wi-Fi.
 Free-space optical communication uses visible or invisible light for communications. In most cases, line-of
sight propagation is used, which limits the physical positioning of communicating devices.

DHCP
Dynamic Host Configuration Protocol
DHCP (Dynamic Host Configuration Protocol) is a network
management protocol used to dynamically assign an Internet Protocol
(IP) address to any device, or node, on a network so they can
communicate using IP. DHCP automates and centrally manages these
configurations rather than requiring network administrators to manually
assign IP addresses to all network devices. DHCP can be implemented
on small local networks, as well as large enterprise networks.

DHCP will assign new IP addresses in each location when devices are
moved from place to place, which means network administrators do
not have to manually configure each device with a valid IP address or
reconfigure the device with a new IP address if it moves to a new
location on the network. Versions of DHCP are available for use in IP
version 4 (IPv4) and IP version 6 (IPv6). IPv6 became an industry
standard in 2017 -- nearly 20 years after its specifications were first
published.
While the adoption rate of IPv6 was slow, by July 2019, more than
29% of Google users were making inquiries using IPv6.

How DHCP works


DHCP runs at the application layer of the Transmission Control
Protocol/IP (TCP/IP) stack to dynamically assign IP addresses to DHCP
clients and to allocate TCP/IP configuration information to DHCP
clients. This includes subnet mask information, default gateway IP
addresses and domain name system (DNS) addresses.

DHCP is a client-server protocol in which servers manage a pool of


unique IP addresses, as well as information about client configuration
parameters, and assign addresses out of those address pools. DHCP
enabled clients send a request to the DHCP server whenever they
connect to a network.

Clients configured with DHCP broadcast a request to the DHCP server


and request network configuration information for the local network to
which they're attached. A client typically broadcasts a query for this
information immediately after booting up. The DHCP server responds to
the client request by providing IP configuration information previously
specified by a network administrator. This includes a specific IP address,
as well as a time period -- also called a lease -- for which the allocation
is valid. When refreshing an assignment, a DHCP client requests the
same parameters, but the DHCP server may assign a new IP address
based on policies set by administrators. DHCP clients can also be
configured on an Ethernet interface.

A DHCP server manages a record of all the IP addresses it allocates to


network nodes. If a node is relocated in the network, the server identifies
it using its Media Access Control (MAC) address, which prevents the
accidental configuration of multiple devices with the same IP address.
Configuring a DHCP server also requires the creation of a configuration
file, which stores network information for clients.

DHCP is not a routable protocol, nor is it a secure one. DHCP is limited


to a specific local area network, which means a single DHCP server per
LAN is adequate or two servers for use in case of a failover. Larger
networks may have a wide area network (WAN) containing multiple
individual locations. Depending on the connections between these points
and the number of clients in each location, multiple DHCP servers can
be set up to handle the distribution of addresses. If network
administrators want a DHCP server to provide addressing to
multiple subnets on a given network, they must configure DHCP relay
services located on interconnecting routers that DHCP requests have to
cross. These agents relay messages between DHCP clients and servers
located on different subnets.

DHCP lacks any built-in mechanism that would enable clients and
servers to authenticate each other. Both are vulnerable to deception --
one computer pretending to be another -- and to attack, where rogue
clients can exhaust a DHCP server's IP address pool.

When managing many DHCP servers or DHCP servers in a WAN, users


can make use of a command line. Users should also be aware that
starting, stopping and restarting will affect the running of the daemon.

Components

DHCP is made up of numerous components, such as the DHCP server,


client and relay. The DHCP server -- typically either a server or router --
is a networked device that runs on the DHCP service. The DHCP server
holds IP addresses, as well as related information pertaining to
configuration. The DHCP client is a device -- such as a computer or
phone -- that can connect to a network and communicate with a DHCP
server. The DHCP relay will manage requests between DHCP clients
and servers. Typically, relays are used when an organization has to
handle large or complex networks. Other components include the IP
address pool, subnet, lease and DHCP communications protocol.

DHCP uses and functions

DHCP is used to distribute IP addresses within a network and to


configure the proper subnet mask, default gateway and DNS server
information on the device.

DHCP, including RFC (Request for Comments) 8415 -- the draft version
released in November 2018 -- can also be used by ordinary electronic
devices whose manufacturers want them to be part of the internet of
things (IoT). DHCP is one method of connecting a device -- such as
refrigerators and lawn sprinkler systems -- to the internet using a
Manufacturer Usage Description (MUD), suggested by the Internet
Engineering Task Force (IETF).

An individual may also confuse DNS with Windows Internet Naming


Service (WINS) servers. A WINS server is used to accomplish the same
goal but in a different way using a different protocol. WINS is part of
Microsoft networking topology but is not largely used today -- DNS has
replaced WINS.

Security

One of the key vulnerabilities of DHCP has been the use of so


called man in the middle (MitM) attacks, in which the attacker secretly
intercepts and relays messages between two parties who believe they are
communicating directly with each other.

DHCP servers have also been the subject of multiple memory corruption
vulnerabilities. In these, attackers have targeted the Windows DHCP
Server service. When successful, the attacks can lead to a full
compromise of Microsoft Active Directory (AD). One such
vulnerability, patched by Microsoft, was the Common Vulnerabilities
and Exposures (CVE)-2019-0725 Windows DHCP Server Remote Code
Execution (RCE) Vulnerability.

DHCP poses security risks

The DHCP protocol requires no authentication so any client can join a


network quickly. Because of this, it opens up a number of security risks,
including unauthorized servers handing out bad information to clients,
unauthorized clients being given IP addresses and IP address depletion
from unauthorized or malicious clients.

Since the client has no way of validating the authenticity of a DHCP


server, rouge ones can be used to provide incorrect network information.
This can cause denial-of-service attacks or man-in-the-middle attacks
where a fake server intercepts data that can be used for malicious
purposes. Conversely, because the DHCP server has no way of
authenticating a client, it will hand out IP address information to any
device that makes a request. A threat actor could configure a client to
continually change its credentials and quickly exhaust all available IP
addresses in the scope, preventing company endpoints from accessing
the network.

The DHCP specification does addresses some of these issues. There is a


Relay Agent Information Option that enables engineers to tag DHCP
messages as they arrive on the network. This tag can be used to control
access to the network. There is also a provision to authenticate DHCP
messages, but key management can be complicated and has held back
adoption. The use of 802.1x authentication, otherwise known as network
access control (NAC), can be used to secure DHCP. Most of the leading
network vendors support NAC, and it has become significantly simpler
to deploy.

Benefits of DHCP servers


In addition to simplified management, the use of a DHCP server
provides other benefits. These include:

Accurate IP configuration: The IP address configuration
parameters must be exact and when dealing with inputs such as
“192.168.159.3”, it’s easy to make a mistake. Typographical errors
are typically very difficult to troubleshoot and the use of a DHCP
server minimizes that risk.

Reduced IP address conflicts: Each connected device must have an
IP address. However, each address can only be used once and a
duplicate address will result in a conflict where one or both of the
devices cannot be connected. This can happen when addresses are
assigned manually, particularly when there are a large number of
endpoints that only connect periodically, such as mobile
devices. The use of DHCP ensures that each address is only used
once.
Automation of IP address administration: Without DHCP, network
administrators would need to assign and revoke addresses
manually. Keeping track of which device has what address can be
an exercise in futility as it’s nearly impossible to understand when
devices require access to the network and when they leave. DHCP
allows this to be automated and centralized so network
professionals can manage all locations from a single location.

Efficient change management: The use of DHCP makes it very
simple to change addresses, scopes or endpoints. For example, an
organization may want to change its IP addressing scheme from
one range to another. The DHCP server is configured with the new
information and the information will be propagated to the new
endpoints. Similarly, if a network device is upgraded and replaced,
no network configuration is required.
Group Members Details

Sr. No Name of Group Members Roll No Enrollment No Seat No.

1 Kartik Pramod Patel 01 1711670209 357124

2 Seema Gotiram Korade 07 1911670429 357130

3 Sanket Deoba Deore 25 1911670447 357148

4 Abhijeet Vijay Chaudhari 32 1911670454 357155


Weekly Progress Report

Signature of
Sr. No Week Activity Performed Date
Guide
1 1st Week Topic Discussion 07/04/2021

2 2nd Week Topic Selection 07/04/2021

3 3rd Week Collection of Data 28/04/2021

4 4th Week Collection of Data 28/04/2021

5 5th Week Analysis of Collected Data 28/04/2021

Design of Website/Creation of
6 6th Week 05/05/2021
Video/Animation
Development of Website/Creation of
7 7th Week 12/05/2021
Video/Animation
Making of Website/Creation of
8 8th Week 19/05/2021
Video/Animation

9 9th Week Testing 02/06/2021

10 10th Week Compilation of Report 02/06/2021

11 11th Week Compilation of Presentation 05/06/2021

12 12th Week Presentation of Seminar 05/06/2021

13 13th Week Final Submission 09/06/2021


Evaluation Sheet for the Micro Project

Academic Year: 2020-2021 Subject & Subject Code: COMPUTER NETWORK (22417)
Course & Course Code: IF4I Name of the Faculty: Proff. Prashant Gawande
Semester: IV

Title of Micro Project: Dynamic Host Configuration Protocol

COs addressed by Micro Project:

1. Prepare images using different colour models


2. Edit images using graphics processing tools
3. Build website with multimedia contents
4. Develop 2D Animation
5. Develop 3D Animation

Comments/suggestions about team work /leadership/inter-personal communication (if any)-

…………………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Roll Marks out of ___ Marks out of ____ for Total


Name of Student
No. for performance performance in oral/ Marks
in group activity presentation

32 Abhijeet Vijay Chaudhari

Name & Signature of Faculty Name & Signature of HOD

You might also like