The DHCP Handbook: Understanding, Deploying, and Managing Automated Configuration Services

Overview

DHCP is an authoritative overview and expert guide to the set up and management of a DHCP server. The book begins with a thorough technical introduction to DHCP—how it was developed, how it interacts with other protocols such as TCP/IP, etc. Part II discusses how DHCP operates; including initial configurations, handling rebooting and lease extension, and DHCP relay agents. In Part III, the authors share their expertise on the efficient use of DHCP in different environments. Part IV covers the technical ...
See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (14) from $1.99   
  • New (1) from $50.00   
  • Used (13) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$50.00
Seller since 2014

Feedback rating:

(113)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

DHCP is an authoritative overview and expert guide to the set up and management of a DHCP server. The book begins with a thorough technical introduction to DHCP—how it was developed, how it interacts with other protocols such as TCP/IP, etc. Part II discusses how DHCP operates; including initial configurations, handling rebooting and lease extension, and DHCP relay agents. In Part III, the authors share their expertise on the efficient use of DHCP in different environments. Part IV covers the technical intricacies of the interaction between DHCP servers and clients, and how to optimally manage each relationship. The final section covers network hardware, inter-server communication, security, SNMP, and IP mobility. The book concludes with several appendices that provide a rich resource for networking professionals working with DHCP.
Read More Show Less

Product Details

Meet the Author


Ralph Droms, Ph.D., is an educator, Consultant, and author. He is the chair of the IETF Dynamic Host Configuration (DHC) Working Group on automated configuration of networked computers and is an Associate Professor of Computer Science at Bucknell University. Ralph organized the DHC Working Group in 1989. He has chaired the working group since its inception and is a key contributor to the design and development of DHCP. Ralph is also editor of the DHCP RFCs and continues to participate in the evolution of DHCP. Previously, Ralph was a member of the computer science faculty at Pennsylvania State University. He has also been on the research staff at IBM and Burroughs (Unisys). Since joining the Computer Science Department at Bucknell in 1987, Ralph has guided students through the study of TCP/IP internetworking, operating systems, and computer architecture. He also served as Co-Director of the computer center at Bucknell, where he supervised the design and implementation of the campus-wide multi-protocol network. As a consultant in network architecture and infrastructure design, Ralph works with large and small companies on a variety of TCP/IP issues including network architecture, server strategies and configurations, and the use of DHCP, DNS, and other technologies in network management.

Ted Lemon is the author of the Internet Software Consortium DHCP Distribution, a popular Open Source distribution that includes a DHCP server, DHCP client, and relay agent. He started programming in 1977, when he decided to make a few changes to the Star Trek game, and has been working in the computer industry since 1983. Ted first encountered the DHCP protocol whileworking as a network administrator at Digital Equipment Corporation in the early 1990s, and he has been active in the IETF DHC Working Group since 1996. He is convinced that, while answering questions on the ISC DHCP mailing lists, he has answered roughly half of the questions ever asked about DHCP, and he was motivated to work on this book in hopes of being able to help answer these questions more efficiently. He currently works for Internet Engines, Inc., developing the latest version of the ISC DHCP distribution.

Read More Show Less

Read an Excerpt


Chapter 1: An Introduction to DHCP

The Dynamic Host Configuration Protocol (DHCP) automates the process of configuring new and existing devices on TCP/IP networks. DHCP performs many of the same functions a network administrator carries out when connecting a computer to a network. DHCP enables a program to automatically manage policy decisions and bookkeeping tasks. Replacing manual configuration by a program adds flexibility, mobility, and control to networked computer configurations.

This chapter provides an overview of how network administrators allocate, manage, and configure IP addresses, and shows how they can use DHCP to accomplish these same tasks. It also introduces some of the basic terminology required to understand the capabilities that the protocol provides and examines some reasons for, and caveats about, using DHCP.

1.1 Configuring Devices on the Network

Any network administrator using TCP/IP can testify that manually configuring computers attached to a network is a time-consuming and error-prone process. Indeed, at almost any site-regardless of whether DHCP is in use the address assignment and configuration process is automated in some way.

One of the authors of this book, Ted Lemon, worked as a network administrator at the Digital Equipment Corporation (DEC) campus in Palo Alto, California, before DHCP was available to simplify the tasks of address management and configuration. The DEC campus used a central IP address administration system, which was based on a single list, or host table, of computers, IP addresses, and Domain Name System (DNS) names for the entire network.

In order to help introduce you to the task that a DHCP server performs, we will first describe to you, from Ted's perspective, what network administrators did before DHCP became widely available.

As part of the network administration task, we updated the host table with new computers as they were added to the network and changed the entries for computers as their names and addresses changed. Periodically, we ran a shell script on the host table to update the DNS server database. We configured individual computers manually, from the entries in the host table, by physically walking up to each computer and entering the configuration information.

Users had a variety of questions about connecting their computers to the campus network. Usually, they wanted to know what IP address they could use for their computer. To respond to such questions, we asked the following:

  • Who are you?
  • Is this a new device, or was it connected to the network before?
  • What is its old IP address?
  • Where do you need to install this device?
  • In what department do you work?

1.1.1 IP Address Allocation

After we obtained this information, we decided whether to give the user an IP address. It was usually easy to make this decision; if the user was an employee or contractor working in a DEC Palo Alto building, then we gave the user an address. Next we decided what IP address to assign the user. To do this, we had to know what network segments were present at the site, which segment or segments were available in the user's office, and how those network segments were configured.

If we supported a single network segment with a single IP subnet, answering these questions would have been simple, and everyone would have been allocated addresses from that subnet. However, the DEC Palo Alto campus network consisted of many network segments, routed together through a backbone network. Thus, it was a bit more difficult to assign IP addresses. In essence, each network administrator had to remember which network segments were available in which buildings, on which floors, and, in some cases, in which offices. If our memories were faulty, the address allocation was not successful, and we had to perform the process again.

After we determined the network segment to which the user's computer would be attached, we determined whether any IP addresses were available on it and chose one for the user. If not-and this was often the case-then we examined the host table for addresses that appeared to be no longer in use. Occasionally, we configured a new network segment and moved some devices to it to expand the pool of available addresses.

1.1.2 Configuration Information

  • The addresses of the default routers for the network segment to which the device was to be connected
  • The addresses of a primary and secondary domain name server that the device would use
  • The subnet mask and broadcast address

If the device needed specific network services that were not used by all devices on the network, we also informed the user how to access those services and programmed that information into the device. For example, we manually configured a diskless Network File System (NFS) client's NFS mount information, and usually gave different information to each diskless NFS client.

1.1.3 Configuring Network Devices

In general, we got network configuration information into devices in two ways. When configuring a knowledgeable user's machine, we gave the information directly to that user; thus, it took a minute or two to configure a machine over the phone or via a single email message exchange. However, for users who could not configure their own machines, this process took some time. We had to determine where the user was, walk to that user's station (possibly in a different building), log in as root, type the necessary information, restart the machine, and then verify that it worked correctly.

1.1.4 Moving Devices to Different Network Segments

From time to time, a user would move from one office to another, or a user's machine would move from a lab into an office. If the network segment (or segments) to which the user's devices were attached was not available in the new location, we would de-allocate the IP addresses previously assigned to those devices and allocate them new ones on the network segment (or segments) available in the new location.

1.1.5 Moving or Adding Network Services

As organizations within DEC Palo Alto grew, it was not uncommon for us to add new facilities such as printers, name servers, and Network Time Protocol (NTP) servers to the network and then manually configure the addresses for each client. Because we did not always have time to modify the configurations of existing functioning clients, we disseminated information about new network services when new machines were installed or when users complained that, for example, they couldn't access printers closest to their cubicles.

1.1.6 Renumbering the Network

As the organization grew, we restructured the network. On one occasion, the entire DEC corporate network number changed from Class B (128.45.0.0) to Class A (16.0.0.0). This necessitated changing the IP address of every network device on the Palo Alto campus-more than 1,000 computers. Because we did not have an automatic configuration mechanism, network administrators had to renumber the machines, a process that consisted of walking to every machine and manually changing its IP address. Because people worked odd hours at DEC Palo Alto, we often forced people out of the buildings as we updated the machines. We, then, waited for problem reports indicating which machines were renumbered incorrectly.

1.1.7 Reclaiming Disused IP Addresses

Machines for which we allocated IP addresses eventually failed, moved out of our jurisdiction, or were reassigned to different users and reinstalled, at which time the machines lost their old identities. When we were aware of these transitions, we easily updated our records and reclaimed the IP addresses belonging to such machines. However, if the transfer occurred without our knowledge, then we were not aware that these IP addresses were no longer in use.

In such cases, we had no reliable way to determine whether an IP address was no longer in use. Although we often used the ping command (ICMP Echo Request/Reply protocol) to determine whether an address was still in use, no response to such a command unfortunately indicated only that the address was not in use at that moment. The address could have been configured in a device that was powered off. We eventually found ways of handling this problem. First, we tried to locate the person who owned the device for which the IP address was allocated. If we couldn't find the owner of the device, we pinged a suspect IP address periodically for about a month, and if we did not receive a response during that period, we reclaimed the address. Occasionally someone powered up a device that was disused for a few months, and the new device to which the old device's IP address was assigned started behaving erratically...

Read More Show Less

Table of Contents

Preface 1
1 An Introduction to DHCP 9
2 An Example of DHCP in Operation 23
3 Configuring the DHCP Server 33
4 Configuring TCP/IP Stacks 47
5 DHCP Client-Server Model 63
6 The Format of DHCP Messages 73
7 Transmitting DHCP Messages 87
8 DHCP Message Exchanges 99
9 DHCP Options 117
10 Theory of Operation of a DHCP Server 147
11 The Microsoft DHCP Server 155
12 The ISC DHCP Server 171
13 Configuring a DHCP Server 197
14 Client Identification and Fixed-Address Allocation 219
15 Setting Up a Reliable DHCP Service 235
16 Tuning Your DHCP Service 251
17 Conditional Behavior 269
18 Automatic DHCP Client Registration 285
19 DHCP Clients 297
20 Setting Up DHCP in a Small Office or Home 315
21 Authentication of DHCP Clients and Servers 327
22 DHCP/DNS Interaction 341
23 Debugging Problems with DHCP 353
24 The DHCP Database 369
25 Communication between DHCP Servers 387
26 Guiding the Evolution of DHCP 397
27 DHCP for IPv6 407
App. A Microsoft DHCP Server Examples 421
App. B ISC DHCP Server Configuration File Reference 437
App. C The DHCP Message Format 463
App. D DHCP Options Summary 467
App. E Other DHCP Resources 481
App. F: Bibliography 485
App. G: Lists of Related RFCs 489
App. H DHCP Server and Operating System Versions 491
App. I: Glossary 499
Index 513
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)