ARP And The Dynamic Host Configuration Protocol

Decent Essays
1. Read the paper; http://www.garykessler.net/library/tcpip.html. Based on this paper (supplement as needed with other material from the Internet), please answer the following.

Solution:
 Define ARP – one sentence summary is sufficient

ARP is an acronym for Address Resolution Protocol which is a network layer protocol used to convert or map IP address into physical address like MAC address.

 Explain the difference between network and machine addresses

A network address is a unique address which is used as identifier for a node/computer on a network which is internet or intranet. IP address is one of the best known example of network address.
Machine address is unique identifier for a host which is also known as Host number. Machine address
…show more content…
As name suggests it is used to dynamically assigning the IP address to network machines .So, we don’t need to assign IP manually. DHCP protocol is used by networking equipment’s. e.g. routers.

How DHCP works:-
Dynamic IP address will be generated and assigned from pool of network. It assigns that IP address which are expired. This is done using DHCP server. The high level working of DHCP has mentioned below:
a) The network which is connected to your machine, request for IP address to DHCP server.
b) On request, DHCP server allocates an IP address to machine. Here, machine is acting as DHCP client.
c) Once the machine gets IP address, then machine responds back to server that it has verified and accepted the IP address.
d) Then DHCP server updates network server with IP address and required configurations for machine.
e) Finally, DHCP server sends acknowledgement to client that it has given IP address for certain amount of time.
…show more content…
The following command can be added in crontab to add an entry of our script in CRON to run once a day 12:00 pm

00 12 * * * . ~/.profile ;~/script_Q2.sh 1>~/script_Q2_cron.log 2>~/script_Q2_cron.err

Explanation:
# 00 12 -- indicates that script_Q2.sh will be executed on 12:00 pm
# * -- on 3rd place indicates that script_Q2.sh will be executed on every month
# * -- on 4th place indicates that script_Q2.sh will be executed on every day of every month
# * -- on 5th place indicates that script_Q2.sh will be executed on every day of every week ( sunday , monday and so on ......)
# . ~/.profile -- to load the user specific environment
# ~/script_Q2.sh -- to execute our script
# 1>~/script_Q2_cron.log -- to log STANDARD OUTPUT
# 2>~/script_Q2_cron.err -- to log STANDARD ERROR

The config file as an input to be read by the script is defined as:

Related Documents

  • Decent Essays

    TCP/IP And OSI Models

    • 957 Words
    • 4 Pages

    b. The two primary protocols are TCP and IP. c. IP provides logical addressing and routing…

    • 957 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    So if you have several computers on a subnet you can prioritize the applications as well as the devices. 9. (5 points) How does HTTP use TCP and DNS use UDP? The computer will open a HTTP session by opening a TCP connection to the HTTP server. The computer will then send a request to the server, the server responds and sends the data to the HTTP server.…

    • 766 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 7

    • 1416 Words
    • 6 Pages

    Each packet of data that is sent, contains the unique IP address of the workstation that the data is meant for. The network card identifies the workstation using the IP address and sends the packet to the designated computeréworkstation. 16. After a message has been read, what happens to the token and the message? After a message has been read, the receiving workstation removes the message from the token and then it sends a signal along the network that the token is available.…

    • 1416 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    If you have a business, customers can find you online via a web address. Web page - A document commonly written in Hypertext Markup Language (HTML) that is accessible through the Internet. Protocol - A defined set of rules and regulations that determine how data is transmitted in telecommunications and computer networking HTTP - (Hypertext Transfer Protocol) The foundation of data communication for the World Wide Web. Enterprise network - A private network built by a company so they can interconnect between other company sites. They can share data and status updates, etc.…

    • 1494 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    To fully understand how servers and clients are able to exchange information across the Internet we must understand the workings of the most widely used protocol used in computing. That protocol is the TCP/IP protocol and associated common set of rules for addressing. IP addresses The TCP/IP protocol suite uses an Internet address, or IP address, to identify each network interface on the network. Devices can have more that one interface connected to the network. Each interface must have a unique IP address that identifies that interface.…

    • 1895 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Run the ipconfig command to analyze the IP address and subnet that gives the addressing schema for the network. 2. What information can you retrieve from the Domain Name System (DNS)? From the DNS, the following information can be retrieved a. Number of servers and workstations deployed on the network.…

    • 648 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    The Importance Of Firewall

    • 1169 Words
    • 5 Pages

    For example: One computer in Canada and second one in New Zealand TCP/IP is also defining that how can data format and also give IP address to that data. It is also decide route of data means it’s also work with the help of router give path to data one computer to other computer. 1.11 DHCP (Dynamic Host Configuration Protocol) : Whenever we want to configure a network we have to assign IP address to all computers in our network. If we are creating small network it is easy to assign an IP address manually but if we want to develop a large network we can assign IP address with the help of DHCP server. DHCP server provides automatically IP address to all computers and other information such as default gateway and DNS server address to the computers.…

    • 1169 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    In addition there was another thing that William Yeager did that help us not only creating the router ,but also the multiprotocol system that made to create the IPV4 and IPV6 that most our routers use that connects to all other routing to the main server of each local area that can be useful for the router to communicate with websites on the internet and find a match for that site and code to recognize to store as memory for the next search for this specific one("History of the Router | EHow." Subscribe to Our RSS. N.p., n.d. Web. 15 Jan.).…

    • 1350 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    IPv6 IPsec can be used for protection and control levels and data levels between two routers. Cisco IOS software also offers a mechanism for protecting transmitted data between two routers using a new tunnel type that uses IPv6 IPsec. IKEv1 is used to manage the key. Figure 5.3 shows the topology in which this option is used between two routers A and…

    • 274 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    IPv4 and IPv6’s main difference In order to transit the network configuration to IPv6, the company needs to understand the different features and functions between IPv4 and IPv6. Both Internet protocols support the network layer of the OSI model. The main differences of two protocols are provided in the section. The detail functionalities and operations of IPv4 can be found in RFC 791. IPv6 specification is in the RFC 2460.…

    • 771 Words
    • 4 Pages
    Decent Essays