Academic literature on the topic 'DHCP-server'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'DHCP-server.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "DHCP-server"

1

Kadafi, Muamar, and Khusnawi Khusnawi. "Analisis Rogue DHCP Packets Menggunakan Wireshark Network Protocol Analyzer." Creative Information Technology Journal 2, no. 2 (2015): 165. http://dx.doi.org/10.24076/citec.2015v2i2.46.

Full text
Abstract:
Rogue DHCP server adalah salah satu pemanfaatan celah keamanan pada mekanisme konfigurasi alamat jaringan menggunakan DHCP. Rogue DHCP server memberikan konfigurasi alamat jaringan yang salah kepada client yang tergabung di dalam jaringan dengan tujuan menciptakan serangan jaringan berupa man in the middle, sehingga dapat menimbulkan ancaman terhadap privasi client yang tergabung di dalam jaringan.Penelitian difokuskan pada analisis DHCP packets seperti DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK yang melewati sebuah Bridge Mikrotik menggunakan aplikasi Wireshark Network Protocol Analyzer se
APA, Harvard, Vancouver, ISO, and other styles
2

Pradana, Dio Aditya, and Ade Surya Budiman. "The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack." IJID (International Journal on Informatics for Development) 10, no. 1 (2021): 38–46. http://dx.doi.org/10.14421/ijid.2021.2287.

Full text
Abstract:
DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at PT. Rekayasa Engineering found a vulnerability in the DHCP Server that has the potential to experience DHCP Rogue or DHCP Spoofing, where the client will fail to communicate with the authorized DHCP Server, as well as open the door for attackers to enter the network. For this reason, DHCP Snooping an
APA, Harvard, Vancouver, ISO, and other styles
3

Maneka, Alex Dangi, and Marak Luta Lapu Kahewu. "Analisis Keamanan Jaringan Local Area Network Perpustakaan Universitas Kristen Wira Wancana Sumba Mengunakan DHCP server Berbasic Cisco Packet Tracer." Reputasi: Jurnal Rekayasa Perangkat Lunak 2, no. 1 (2021): 42–47. http://dx.doi.org/10.31294/reputasi.v2i1.384.

Full text
Abstract:
Abstrak - Di dalam jurnal ini bertujuan memecahkan masalah metode saragan jaringan DHCP server yang merupakan fitur keamanan jaringan yang jarang digunakan orang, karena kurang mengetahui pentingnnya keamanan jaringan menyebapkan jaringan kurang meperhatikan masalah keamanan jaringan. Jurnal ini akan membahas bagaimana menangkal DHCP server dan bagaiman mengiplimentasi security tersebut fitur jaringan. Selain itu untuk Template Paper ini digunakan sebagai panduan untuk penulisan paper (makalah ilmiah) untuk publikasi di Jurnal-jurnal yang dikelola oleh Bina Sarana Informatika. Penulis paper ha
APA, Harvard, Vancouver, ISO, and other styles
4

Saputra, Brian Rinanto. "Simulasi Keamanan Jaringan Dengan Metode DHCP Snooping Dan VLAN Mengggunakan CISCO." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 4 (2022): 3481–88. http://dx.doi.org/10.35957/jatisi.v9i4.2730.

Full text
Abstract:
Jaringan komputer memiliki kelemahan karena akses jaringan hanya diberikan melalui DHCP server. Akibat yang dapat ditimbulkan dari hal tersebut adalah terjadinya DHCP Rogue yang merupakan server palsu yang memberikan alamat gateway yang salah pada komputer client sehingga komputer tidak dapat terhubung jaringan dan internet. dengan DHCP snooping diharapkan dapat membantu keamanan jaringan internet karena akses ke IP address atau MAC address yang telah terdaftar di router dan penyerang tidak bisa masuk ke dalam jaringan tersebut. Metode penelitian menggunakan Software Cisco Packet Tracer 8.0 de
APA, Harvard, Vancouver, ISO, and other styles
5

Purun, Elisa Stefano Franli, and Dian Widiyanto Chandra. "Analisis Keamanan DHCP Menggunakan RADIUS Accounting." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 9, no. 3 (2025): 906–12. https://doi.org/10.35870/jtik.v9i3.3667.

Full text
Abstract:
Setiap komputer membutuhkan dan harus memiliki IP Address untuk terhubung dengan pengguna jaringan komputer lainnya, IP Address akan dibagikan otomatis kepada pengguna jaringan menggunakan Router sebagai DHCP Server. Selain DHCP, Router memiliki layanan DHCP Accounting yang dapat meningkatkan keamanan jaringan dengan fitur AAA dan RADIUS Server yang dapat diimplementasikan dengan Freeradius. DHCP Accounting memiliki kemampuan akuntansi untuk transmisi pesan START dan STOP yang aman, namun kapasitas flash memori pada router C2691 sekitar 32 MB membuat layanan DHCP Accounting tidak akan berjalan
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmad Zaki Hamidi, Eki, Mufid Ridlo Effendi, and Nanang Ismail. "The Implementation of DHCP Relay Using Pox Controller on Openflow Protocol." International Journal of Engineering & Technology 7, no. 2.29 (2018): 821. http://dx.doi.org/10.14419/ijet.v7i2.29.14264.

Full text
Abstract:
The fastest of development in a network which is longer more complex, it needed developing and managing efficiently. On a network which has more computer, it needed effectivity of regulation of IP with DHCP server, many more of a subnet, has become DHCP Relay to be a solution. DHCP relay or agent relay is a protocol Bootstrap which is DHCP asks to have a message between client and server for DHCP to the different network. Software Defined Network (SDN) offers a new paradigm in network design, manage, and implementation, especially to support a needed and innovation in this case, which is longe
APA, Harvard, Vancouver, ISO, and other styles
7

Buamona, Nur Qamar, Mustamin Hamid, and Erwin Gunawan. "Analisis Dan Implmentasi Keamanan Jaringan Menggunakan Metode DHCP Snooping dan Swirch Port Security." Jurnal Teknik Informatika (J-Tifa) 6, no. 1 (2023): 23–31. http://dx.doi.org/10.52046/j-tifa.v6i2.1680.

Full text
Abstract:
Akses jaringan Internet sangat dibutuhkan oleh setiap kalangan bahkan sudah menjadi kebutuhan pokok bagi penggunanya dalam memperoleh informasi. Semakin banyaknya pengguna internet menyebabkan keamanan jaringan sangat dibutuhkan terutama jaringan internet pada instansi besar. Dengan tersebarnya jaringan internet tersebut maka sangat berpotensi akan adanya DHCP server palsu, hal ini bisa jadi menyebabkan client mendapatkan IP address bukan dari DHCP yang sebenarnya melainkan dari DHCP Server palsu tersebut dan juga dengan penggunaan Switch yang tersebar menyebabkan switch bisa di akses oleh sia
APA, Harvard, Vancouver, ISO, and other styles
8

Marzuki, Khairan, Mia Mubiatma, and Raisul Azhar. "OTOMASI MANAJEMEN VLAN INTERVLAN DAN DHCP SERVER PADA CISCO MENGGUNAKAN ANSIBLE." Jurnal Informatika dan Rekayasa Elektronik 4, no. 2 (2021): 171–80. http://dx.doi.org/10.36595/jire.v4i2.461.

Full text
Abstract:
Menurut Gartner (2018) terdapat 71 persen jaringan yang masih dikendalikan secara manual dimana salah satunya melalui Command Line Interface (CLI). Konfigurasi yang dilakukan secara manual akan memunculkan beragam permasalahan seperti sering terjadinya human error, dan waktu yang di butuhkan untuk konfigurasi tersebut cenderung lebih lama. Termasuk ketika melakukan konfigurasi Virtual Local Area Network (VLAN), InterVLAN dan Dynamic Host Configuration Protocol (DHCP) Server pada perangkat router maupun switch. Permasalahan lain yang muncul adalah lamanya waktu yang dibutuhkan ketika melakukan
APA, Harvard, Vancouver, ISO, and other styles
9

Razaque, Abdul, and Khaled Elleithy. "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment." Journal of Communications and Computer Engineering 3, no. 1 (2012): 15. http://dx.doi.org/10.20454/jcce.2013.426.

Full text
Abstract:
Mobile collaborative learning (MCL) is extremely recognized as focusing archetype in educational institutions. It demonstrates cerebral synergy of assorted collective minds. It handles several problems in order to motivate social activity for mutual communication. To advance and promote baseline for MCL; several supporting frameworks, architectures including number of different mobile applications have been introduced. But, no one has mainly focused to augment the security of those architectures. The paper handles issues of rogue DHCP server that highly affects network resources during MCL. Th
APA, Harvard, Vancouver, ISO, and other styles
10

Trombeta, Lucas, and Nunzio Torrisi. "DHCP Hierarchical Failover (DHCP-HF) Servers over a VPN Interconnected Campus." Big Data and Cognitive Computing 3, no. 1 (2019): 18. http://dx.doi.org/10.3390/bdcc3010018.

Full text
Abstract:
This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol (DHCP) algorithm over multiple interconnected local networks. The proposed model is open and used as an alternative to commercial solutions for a multi-campus institution with facilities in different regions that are interconnected point-to-point using a dedicated link. When the DHCP scope has to be managed and structured over multiple geographic locations that are VPN connected, it requires physical redundancy, which can be provided by a failover server. The proposed solution overcomes the limita
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "DHCP-server"

1

Juřena, Stanislav. "Univerzální linuxový server pro malé a střední firmy umožňující jednoduchý dohled nad sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217285.

Full text
Abstract:
The main object of this thesis was to design a computer network for small and medium companies which will be made among others from network server providing simple network control. The next task was to provide internet connection to subscribers of local area network, their security and access to common services. There had been discussed the choice of distribution of Linux operation system with regarding to demanded services, stability and long lasting operation in theoretical part. One part of the work is a theoretic preliminary to separate services, to the purpose of their using and to their
APA, Harvard, Vancouver, ISO, and other styles
2

Balestra, Davide. "Indirizzi IPv6 generati tramite funzioni hash: sperimentazione e documentazione." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19631/.

Full text
Abstract:
L'elaborato contiene la descrizione e la documentazione di tre sistemi virtuali del gruppo Virtual Square: HashDNS, OTIP e FQDNDHCP. Dopo aver fornito una descrizione dei dei sistemi avviene un'analisi del loro funzionamento ed implementazione valutandone gli aspetti critici. Dalle problematiche sorte in fase di analisi dell'implementazione attuale sorgono idee per una nuova implementazione più efficiente con l'ausilio di strutture dati intermedie. L'elaborato si conclude con una descrizione di come può essere implementata la nuova libreria per i sistemi analizzati.
APA, Harvard, Vancouver, ISO, and other styles
3

Breiler, Andre. "Differenzierte Bereitstellung von Internetdiensten in öffentlichen Bereichen der Universität." Master's thesis, Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100099.

Full text
Abstract:
Die vorliegende Arbeit entwickelt und implementiert ein System für die Bereitstellung von Internet-Diensten an öffentlichen Orten. Besonderer Wert wurde auf eine einfache Handhabung für den Nutzer, eine breite Unterstützung von Klienten und ein breites Spektrum möglicher Privilegien (von der vollen Internetkonnektivität bis zu einer Art Infoterminalstatus) gelegt.
APA, Harvard, Vancouver, ISO, and other styles
4

Vaľuš, Dávid. "Laboratorní úlohy pro výuku síťových technologií s použitím různých simulačních nástrojů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400933.

Full text
Abstract:
This diploma thesis focuses on the preparation of an operating system, a simulation environment and the creation of two laboratory exercises explaining network technologies. In the theoretical part protocols DHCP, FTP, TFTP, HTTP, and NAT service are described. The practical part focuses on the installation of ns-3 and GNS3 programmes and their utilization and settings on OS Ubuntu 18.10. Moreover, it deals with the preparation of laboratory exercises created in the simulation programmes mentioned above together with tutorials, self-check questions and HTTP server in the Python programming lan
APA, Harvard, Vancouver, ISO, and other styles
5

Мельник, Володимир Олегович, та Volodymyr Melnyk. "Розробка DHCP-сервера". Bachelor's thesis, 2021. http://elartu.tntu.edu.ua/handle/lib/35766.

Full text
Abstract:
Кваліфікаційна робота присвячена розробці програмного забезпечення на прикладі DHCP-сервера для автоматичної конфігурації клієнтів в локальних мережі. Мета роботи: розробити DHCP-сервер, який дозволить спростити процес підключення до локальної мережі, та моніторингу підключених клієнтів. В першому розділі кваліфікаційної роботи розглянуто DHCP-протокол, а саме його історію розвитку, алгоритм роботи, причини його використання. А також вибір інструментів, які використовувалися під час розробки. В другому розділі кваліфікаційної роботи розглянуто В другому розділі кваліфікаційної роботи розгля
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "DHCP-server"

1

Kania, Stefan. "Ausfallsicherer DHCP-Server." In Samba 4, 2nd ed. Carl Hanser Verlag GmbH & Co. KG, 2021. http://dx.doi.org/10.3139/9783446469785.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kania, Stefan. "Ausfallsicherer DHCP-Server." In Samba 4. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446457355.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vugt, Sander van. "Basic Network Services: xinetd, NTP, DNS, DHCP, and LDAP." In The Definitive Guide to SUSE Linux Enterprise Server 12. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6820-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"DHCP Server Management." In Managing Windows 2000 Network Services. Elsevier, 2000. http://dx.doi.org/10.1016/b978-192899406-0.50006-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

SHINDER, D., T. SHINDER, and T. HINKLE. "DHCP Server Management." In Managing Windows 2000 Network Services. Elsevier, 2000. http://dx.doi.org/10.1016/b978-192899406-0/50006-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"DHCP Server Deployment Strategies." In IP Address Management. John Wiley & Sons, Inc., 2010. http://dx.doi.org/10.1002/9780470880654.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"8 Ausfallsicherer DHCP-Server." In Samba 4, 3rd ed. Carl Hanser Verlag GmbH & Co. KG, 2025. https://doi.org/10.3139/9783446484498.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Managing Windows 2000 DHCP Server." In Mission Critical Windows 2000 Server Administration. Elsevier, 2000. http://dx.doi.org/10.1016/b978-192899416-9/50017-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Miscellaneous Tools." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch010.

Full text
Abstract:
This chapter discusses different essential ethical hacking tools developed by various researchers in detail. Tools discussed here include Netcat network analysis tool, Macof from Dsniff suit toolset for DOS attack, Yersinia for dhcp starvation attack, Dnsspoof tool for MITM attacks, Ettercap for network-based attacks, Cain and Abel, Sslstrip tool, and SEToolkit. These tools are used for carrying out DOS attack, DHCP starvation attack, DNS spoofing attack, session hijacking attacks, social engineering attacks, and many other network-based attacks. Also, the detailed steps to configure WAMP server as part of ethical hacking lab setup is also discussed in this chapter in order to simulate web application-based attacks. There are large numbers of ethical hacking tools developed by the researchers working in this domain for computer security, network security, and web server security. This chapter discusses some of the essential tools in detail.
APA, Harvard, Vancouver, ISO, and other styles
10

"Configuring DHCP." In MCSA Windows Server 2016 Complete Study Guide. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549260.ch12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "DHCP-server"

1

Dinu, Dumitru Daniel, and Mihai Togan. "DHCP server authentication using digital certificates." In 2014 10th International Conference on Communications (COMM). IEEE, 2014. http://dx.doi.org/10.1109/iccomm.2014.6866756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tripathi, Nikhil, and Neminath Hubballi. "Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack." In 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS). IEEE, 2015. http://dx.doi.org/10.1109/ants.2015.7413661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Korkmaz, Mehmet Halis, and Cemal Kose. "Port-based DHCP server design with authentication." In 2017 25th Signal Processing and Communications Applications Conference (SIU). IEEE, 2017. http://dx.doi.org/10.1109/siu.2017.7960334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jony, Asaduzzaman, and Muhammad Nazrul Islam. "An Effective Technique to Automatically Detect and Neutralize Rogue DHCP Server." In 2023 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD). IEEE, 2023. http://dx.doi.org/10.1109/icict4sd59951.2023.10303033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chatterjee, T. "Configuration of DNS server with cryptographic algorithm for secure DNS and DHCP updates." In 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT 2012). IEEE, 2012. http://dx.doi.org/10.1109/icccnt.2012.6395990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Syafei, Wahyul Amien, Yosua Alvin Adi Soetrisno, and Agung Budi Prasetijo. "Simple Smart Algorithm for Flexibility of Dynamic Allocation in DHCP Server for SOHO Wireless Router." In 2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM). IEEE, 2020. http://dx.doi.org/10.1109/cenim51130.2020.9297852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramkissoon, Amit. "Investigating Public IP Address Assignment in Infrastructureless Social Networks." In 10th International Conference on Human Interaction and Emerging Technologies (IHIET 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1004032.

Full text
Abstract:
An Internet Protocol (IP) address is a logical address that is used by the router to identify a device on a network. An IP version 4 (IPv4) address is composed of 32 bits that are split into 4 octets of 8 bits each. Each IPv4 address is encoded using decimal notation giving the address the appearance of being composed of 4 integers. As such IPv4 addresses range from 0.0.0.0 to 255.255.255.255 with 232 or 4294967296 possible addresses. An IP version 6 (IPv6) address is composed of 128 bits that are split into 8 octets of 16 bits each. Each IPv6 address is encoded using hexadecimal notation givi
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "DHCP-server"

1

Johnson, R., J. Kumarasamy, K. Kinnear, and M. Stapp. DHCP Server Identifier Override Suboption. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Swamy, N., G. Halwasia, and P. Jhingran. Client Identifier Option in DHCP Server Replies. RFC Editor, 2013. http://dx.doi.org/10.17487/rfc6842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Luehrs, K., R. Woundy, J. Bevilacqua, and N. Davoust. Key Distribution Center (KDC) Server Address Sub-option for the Dynamic Host Configuration Protocol (DHCP) CableLabs Client Configuration (CCC) Option. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!