Solved

DHCP

Posted on 2004-09-06
1
323 Views
Last Modified: 2012-10-17
How does a DHCP server, configured with 10s of scopes, knows which scope to use to lease an IP address to a DHCP client, which may be on a different subnet.

Thanks in advance.

Hamid


0
Comment
Question by:htavakko
1 Comment
 
LVL 5

Accepted Solution

by:
Chireru earned 500 total points
ID: 11992759
DHCP uses broadcast in order to work.  (the machines broadcast a request because they have no proper IP yet, and the DHCP server broadcasts back an offer, etc).  If they are not on the same network, the broadcasts will not get through.  (broadcasts will not be routed between subnets or different networks).

Therefore, there is an in-between service, usually running on the router between the networks called a "DHCP agent".  The DHCP agent catches any DHCP broadcast requests, and forwards them unicast to the DHCP server, which tells the DHCP what subnet they are on.

So, if the host is on one of the networks the DHCP server is attached to, it knows because it's connected to them.  If it's not directly connected, the DHCP relay agent will tell it what network it's connected to. (derrived by the agent's IP address).
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Server 2008 Server 2003 Server 2000 12 643
Windows 7 7 258
Install Window 2012 Domain on 9 125
Screen Mirroring 7 53
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now