Solved

IP Address

Posted on 2002-03-18
3
176 Views
Last Modified: 2010-04-11
Hi,
Is an IP address released each time a machine is shut down and restarted? How does a static or dynamic address play into the equation? Thank you,
D
0
Comment
Question by:dingo11
  • 2
3 Comments
 
LVL 8

Accepted Solution

by:
scraig84 earned 100 total points
ID: 6877905
With a static address, there is no concept of release and renew as it is just on the machine you put it on.  If you are asking if another machine can use that IP address while one is off, the answer is yes - but that is a very bad practice and often will have consequences.

With a dynamic address, the DHCP server has a lease period, and will not give an address out to another machine for the duration of the lease.  When a computer is shut off, the DHCP is not contacted.  However, when a machine is turned back on, it will contact the DHCP server to make sure it is there and verify the lease.  Depending on the client, it may just go ahead and renew the lease at this point.  Otherwise, it will typically wait until 1/2 of the lease duration has expired, and go ahead and try to renew the lease at that point.  If it is unsuccessful, it will wait until 3/4 of the lease has expired, then 7/8 and so on.  If the machine does not successfully renew the lease before it expires (if it shut off for example), the lease is terminated and the address goes back to the available pool to be handed out again, and it is likely the machine will get a new IP address when it is turned back on.

Hope that helps.
0
 
LVL 8

Expert Comment

by:scraig84
ID: 6877916
Here is a good resource also:

http://www.dhcp-handbook.com/dhcp_faq.html
0
 

Author Comment

by:dingo11
ID: 6889341
Thanks, sorry about taking a while I had an some urgent matters pop up. Have a great day,
d
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now