Literatura académica sobre el tema "DHCP"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "DHCP".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "DHCP"

1

Pradana, Dio Aditya, and Ade Surya Budiman. "The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack." IJID (International Journal on Informatics for Development) 10, no. 1 (2021): 38–46. http://dx.doi.org/10.14421/ijid.2021.2287.

Texto completo
Resumen
DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at PT. Rekayasa Engineering found a vulnerability in the DHCP Server that has the potential to experience DHCP Rogue or DHCP Spoofing, where the client will fail to communicate with the authorized DHCP Server, as well as open the door for attackers to enter the network. For this reason, DHCP Snooping and DHCP Alert methods are implemented. DHCP Snooping will ensure that every data traffic has been filtered and directed to the registered interface. Meanwhile, the use of DHCP Alert is required in monitoring data traffic during the Discover, Offer, Request, and Acknowledge (DORA) process. In the tests performed, DHCP Snooping and DHCP Alert managed to anticipate attacks that tried to placed DHCP Rogue on the network infrastructure. DHCP Alert, configured on the proxy router, ensures that the DORA process can only occur between an authorized DHCP server and a client. DHCP Snooping test also shows that communication from clients can only be replied to by Trusted DHCP Server. The existence of DHCP Snooping and DHCP Alert makes the host configuration fully controlled by the authorized DHCP Server.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Kadafi, Muamar, and Khusnawi Khusnawi. "Analisis Rogue DHCP Packets Menggunakan Wireshark Network Protocol Analyzer." Creative Information Technology Journal 2, no. 2 (2015): 165. http://dx.doi.org/10.24076/citec.2015v2i2.46.

Texto completo
Resumen
Rogue DHCP server adalah salah satu pemanfaatan celah keamanan pada mekanisme konfigurasi alamat jaringan menggunakan DHCP. Rogue DHCP server memberikan konfigurasi alamat jaringan yang salah kepada client yang tergabung di dalam jaringan dengan tujuan menciptakan serangan jaringan berupa man in the middle, sehingga dapat menimbulkan ancaman terhadap privasi client yang tergabung di dalam jaringan.Penelitian difokuskan pada analisis DHCP packets seperti DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK yang melewati sebuah Bridge Mikrotik menggunakan aplikasi Wireshark Network Protocol Analyzer sebelum dan setelah adanya Rogue DHCP server di dalam jaringan DHCP, sehingga dapat diamati bagaimana DHCP server asli dan Rogue DHCP server saling bertukar paket DHCP dengan DHCP client yang selanjutnya dilakukan analisis terhadap Rogue DHCP packets.Dari hasil analisis didapatkan informasi parameter-parameter yang terkandung di dalam Rogue DHCP Packets yang difungsikan untuk membangun sistem keamanan jaringan DHCP berupa monitoring dan pencegahan terhadap Rogue DHCP Server menggunakan DHCP Alert yang dikombinasikan dengan Firewall Filter Rule pada sebuah Bridge Mikrotik, dengan diperoleh hasil bahwa sistem dapat mendeteksi dan mencegah adanya Rogue DHCP Server di dalam jaringan DHCP berbasis IPv4.Rogue DHCP server is one of exploiting security holes in the mechanism of configuration the network address using DHCP. Rogue DHCP server provides incorrect configuration network address to a client who joined in the network with the aim of creating a network attacks such as “man in the middle”, so it can pose a threat to client privacy who joined in the network.The research focused on the analysis of DHCP packets such as DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK which passes through a Bridge Mikrotik using Wireshark Network Protocol Analyzer application before and after the Rogue DHCP server in the DHCP network, so it can be observed how the original DHCP server and Rogue DHCP Server exchanging packets with a DHCP Client and then make an analysis of the Rogue DHCP packets.The result of analysis obtained information of parameters that contained in the Rogue DHCP Packets that enabled to build a DHCP network security system in the form of monitoring and prevention of Rogue DHCP server using DHCP Alert combined with Firewall Filter Rule on a Bridge Mikrotik, with result that the system can detect and prevent existence of Rogue DHCP Server in the DHCP based IPv4 network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Ariyadi, Tamsir. "Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN)." INOVTEK Polbeng - Seri Informatika 3, no. 2 (2018): 147. http://dx.doi.org/10.35314/isi.v3i2.455.

Texto completo
Resumen
Keamanan jaringan telah menjadi perhatian lebih karena pesatnya pertumbuhan dan perluasan Internet. Sementara ada beberapa cara untuk memberikan keamanan pada layer application, transport, atau network layers, data link layer (Layer 2) keamanan belum bisa diterapkan secara maksimal. protokol data link layer yang digunakan dalam Local Area Network (LAN) tidak dirancang dengan keamanan yang secara signature. Dynamic Host Control Protocol (DHCP) adalah salah satu jaringan yang paling banyak digunakan untuk konfigurasi host yang bekerja dalam data menghubungkan lapisan. DHCP rentan terhadap sejumlah serangan, seperti serangan DHCP rogue Server, serangan DHCP Starvation, dan serangan DHCP Snooping. Pembahasan prototype terhadap keamanan jaringan yang disebut Mitigasi Keamanan Dynamic Host Control Protocol (DHCP) Untuk Mengurangi Serangan pada Local Area Network (LAN).
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Ali, Salim M., and Ammar A. Shareef. "DESIGNING A SECURE NETWORK SOLUTION AGAINST DHCP ATTACKS." Iraqi Journal of Information and Communications Technology 1, no. 1 (2021): 45–57. http://dx.doi.org/10.31987/ijict.1.1.175.

Texto completo
Resumen
DHCP is an important aspect in small and large networks, since it facilitates the IP configuration of computers. However, DHCP is vulnerable to different attacks; therefore, the essential objective of this paper is to propose solutions against DHCP attacks. The paper gives an explanation about how DHCP works and understand the handshake mechanism and give a brief summary about DHCP attack, how they occur and how they affect the security of the enterprise since a leakage of sensitive Information could happen, which threatens the enterprise's security or a denial of service that immobilizes the network. Three effective countermeasures are looked up and tested against DHCP attacks, and each one successfully prevented the attack.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Ahmad Zaki Hamidi, Eki, Mufid Ridlo Effendi, and Nanang Ismail. "The Implementation of DHCP Relay Using Pox Controller on Openflow Protocol." International Journal of Engineering & Technology 7, no. 2.29 (2018): 821. http://dx.doi.org/10.14419/ijet.v7i2.29.14264.

Texto completo
Resumen
The fastest of development in a network which is longer more complex, it needed developing and managing efficiently. On a network which has more computer, it needed effectivity of regulation of IP with DHCP server, many more of a subnet, has become DHCP Relay to be a solution. DHCP relay or agent relay is a protocol Bootstrap which is DHCP asks to have a message between client and server for DHCP to the different network. Software Defined Network (SDN) offers a new paradigm in network design, manage, and implementation, especially to support a needed and innovation in this case, which is longer more complex..
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Sarip, Nfn, and Arief Setyanto. "Packet Filtering Based On Differentiated Services Code Point For DHCP Starvation Attacks Prevention." Journal Pekommas 4, no. 2 (2019): 137. http://dx.doi.org/10.30818/jpkm.2019.2040204.

Texto completo
Resumen
The use of the internet today has become a necessity, the most commonly used media to connect to the internet is a Wireless LAN network. For easy access to the network, DHCP service become a standard feature that must exist, because ordinary users no longer need to think about procedures for configuring IP addresses, all of which have been done automatically by the DHCP service. But it turns out that there is a security threat to DHCP service, namely DHCP Starvation attacks that can be exhausting the availability of IP addresses in DHCP service so that the configuration of IP address automatically can no longer be done on the client. Various methods such as authentication, cryptography, and machine learning are used by researchers in preventing DHCP Starvation attacks, but the issue of effectiveness and efficiency still opens up further research opportunities. In this research, packet filtering methods based on DSCP code applied to the Netfilter system are used to do prevention of DHCP Starvation attacks, this method has proven to be very effective in making prevention and more efficient when applied on small scale wireless networks such as at office networks and internet cafe.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Jäger, G., and W. Zhang. "An Effective Algorithm for and Phase Transitions of the Directed Hamiltonian Cycle Problem." Journal of Artificial Intelligence Research 39 (November 30, 2010): 663–87. http://dx.doi.org/10.1613/jair.3109.

Texto completo
Resumen
The Hamiltonian cycle problem (HCP) is an important combinatorial problem with applications in many areas. It is among the first problems used for studying intrinsic properties, including phase transitions, of combinatorial problems. While thorough theoretical and experimental analyses have been made on the HCP in undirected graphs, a limited amount of work has been done for the HCP in directed graphs (DHCP). The main contribution of this work is an effective algorithm for the DHCP. Our algorithm explores and exploits the close relationship between the DHCP and the Assignment Problem (AP) and utilizes a technique based on Boolean satisfiability (SAT). By combining effective algorithms for the AP and SAT, our algorithm significantly outperforms previous exact DHCP algorithms, including an algorithm based on the award-winning Concorde TSP algorithm. The second result of the current study is an experimental analysis of phase transitions of the DHCP, verifying and refining a known phase transition of the DHCP.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Trombeta, Lucas, and Nunzio Torrisi. "DHCP Hierarchical Failover (DHCP-HF) Servers over a VPN Interconnected Campus." Big Data and Cognitive Computing 3, no. 1 (2019): 18. http://dx.doi.org/10.3390/bdcc3010018.

Texto completo
Resumen
This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol (DHCP) algorithm over multiple interconnected local networks. The proposed model is open and used as an alternative to commercial solutions for a multi-campus institution with facilities in different regions that are interconnected point-to-point using a dedicated link. When the DHCP scope has to be managed and structured over multiple geographic locations that are VPN connected, it requires physical redundancy, which can be provided by a failover server. The proposed solution overcomes the limitation placed on the number of failover servers as defined in the DHCP failover (DHCP-F) protocol, which specifies the use of one primary and one secondary server. Moreover, the presented work also contributes to improving the DHCP-F specification relative to a number of practical workarounds, such as the use of a virtualized DHCP server. Therefore, this research assumes a recovery strategy that is based on physical servers distributed among different locations and not centralized as clustered virtual machines. The proposed method was evaluated by simulations to investigate the impact of this solution in terms of network traffic generated over the VPN links in order to keep the failover service running using the proposed approach.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Walker, H. C., K. A. McEwen, P. Boulet, E. Colineau, and F. Wastin. "Magnetic susceptibility of DHCP." Physica B: Condensed Matter 359-361 (April 2005): 1156–58. http://dx.doi.org/10.1016/j.physb.2005.01.313.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Prem, M., and G. Krexner. "Martensitic phase transitions HCP – DHCP and DHCP – FCC in Co 0.85 at% Fe." Physica B: Condensed Matter 276-278 (March 2000): 927–28. http://dx.doi.org/10.1016/s0921-4526(99)01596-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "DHCP"

1

Molerón, Bermudez Daniel, and Capilla Sergio Sánchez-Camacho. "Distributed DHCP for WMNs using IPv6." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-996.

Texto completo
Resumen
<p>In a Wireless Mesh Network (WMN) exists mobile nodes which have an</p><p>unpredictable behaviour, i.e. they can join, leave and free move around the</p><p>network. For this reason, a static network configuration is not proper for them. A</p><p>distributed Dynamic Host Configuration Protocol (DHCP) is needed due to the</p><p>unavailability of a centralized server in a network placed over a vast extension.</p><p>This report shows a Distributed DHCP for WMNs using IPv6 (Internet Protocol</p><p>version 6). It is fault tolerant, robust and durable. The algorithm was created using</p><p>counters Bloom filters as data structure. After, a complete simulation of the system</p><p>was done. The simulations showed that using 24 servers with 16Mbits of memory</p><p>each one is possible to manage around 9000000 clients without adding an excessive</p><p>network load. Therefore, the DDHCPv6 could be in a near future the host</p><p>configuration protocol in WMN.</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Roy, Christian 1977. "An alternative approach to identifying stolen network clients using DHCP /." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98783.

Texto completo
Resumen
Computer theft is a mounting problem despite prevention strategies already in place. The marketplace currently offers post-theft solutions but most depend on software in place on the stolen item. This is a critical vulnerability as it places the theft recovery technology in the hands of the thief.<br>This thesis is an investigation into the feasibility of abandoning this limitation by moving the theft recovery technology into the server, beyond the hands of the thief.<br>The contents are divided into two complimentary sections. The first is the creation of a theft detecting DHCP server with acceptable performance levels for production environments. The second involves investigation into the ramifications of widespread adoption of such a server by exploring the countermeasures open to an adversary. Questions of difficulty and reliability of such techniques are explored, in both hardware and software. Also discussed is the possibly of countering such countermeasures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Прокоф’єв, П. С. "Графiчний iнтерфейс налаштування протоколу DHCP в мережах з підтримкою IPv6". Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/79556.

Texto completo
Resumen
Cтворено графічний інтерфейс в якому можна ввести вхідні дані, а саме IP адреси на інтерфейсах, і в результаті виконання обрахунків отримати налаштування протоколу DHCP в мережах з підтримкою IPv6. Через буфер обміну їх можливо скопіювати, як на віртуальні маршрутизатори в симуляторі Cisco Packet Tracer, так і на реальне мережеве обладнання.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Trombeta, Lucas. "Solução de redundância múltipla de servidores DHCP utilizando redes definidas por software." reponame:Repositório Institucional da UFABC, 2016.

Buscar texto completo
Resumen
Orientador : Prof. Dr. Nunzio Marco Torrisi<br>Dissertação (mestrado) - Universidade Federal do ABC, Programa de Pós-Graduação em Ciência da Computação, 2016.<br>As redes de computadores estão sofrendo mudanças ao longo dos últimos anos e várias tecnologias vem sendo implementadas com o intuito de renovar a forma de comunicação entre os dispositivos, quer sejam mudanças em meio físico (como aumento largura de banda devido a tecnologia de fibra ótica e novas tecnologias de comunicação wireless), quer sejam mudanças no modo de comunicação (diminuição do overhead de cabeçalhos, novos protocolos de comunicação(HTTP2), utilização de software para definir comportamento de rede. Um dos poucos pontos em que essas mudanças tecnológicas não interferiram foi no modo com o qual os dispositivos recebem seu endereço de rede, que ainda é através de um servidor DHCP. Dado este fato e a evolução do modelo tradicional de rede para redes definidas por software, este trabalho foi desenvolvido utilizando as funções presentes tanto no protocolo DHCP quanto nas Redes Definidas por Software criando uma solução de redundância múltipla do serviço de DHCP.<br>Computer networks are changing over the last few years, many technologies are being implemented as a way to renew how hosts should communicate between themselves. Some physical changes: increase of bandwidth through fiber optics technology, new wireless protocol; some software changes: decreasing protocol header overhead, new communication protocols(HTTP2), use of software to define network behavior. On the other hand, the way of network devices gets their IP address inside a network is one of the few features that those technology changes did not interfere, devices¿ IP addresses are still delivered by a DHCP server. Through these facts and the evolution of traditional computer networks to software defined networks, this work was developed merging some software defined network functions with DHCP functions in order to raise a new multiple redundancy DHCP service solution.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Мороз, Е. В. "Інформаційно-комунікаційна технологія налаштування корпоративних мультисервісних мереж". Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86865.

Texto completo
Resumen
Розроблено веб-орієнтовану інформаційну систему в яку можна ввести дані: ip-адреси та маски для всіх інтерфейсів. Проект було розроблено на основі мови програмування Python та Java Script. Також використовувались HTML і CSS. Дане рішення реалізовано згідно вимог замовника.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Demerjian, Jacques. "Services d'autorisation et Intégration au protocole d'attribution dynamique des adresses." Paris, ENST, 2004. http://www.theses.fr/2004ENST0036.

Texto completo
Resumen
La sécurité est un enjeu majeur des technologies numériques modernes. Avec le développement de l'Internet, les besoins de sécurité sont de plus en plus importants. Le développement d'applications Internet telles que le commerce électronique implique de nouveaux besoins comme, l'identification des entités communicantes, l'authentification des entités, l'anonymat du propriétaire du certificat, la procuration, etc. Qu'il s'agisse de données médicales, fiscales ou bancaires, le besoin en sécurité est essentiel afin de crédibiliser le système, tout en respectant à la fois les besoins des utilisateurs et des applications. Cette sécurité a néanmoins un prix : celui de l'établissement de la confiance entre les partenaires en communication. La confiance des utilisateurs passe par la sécurisation des transactions, par exemple au moyen d'une procédure de certification, et la reconnaissance des signatures électroniques. Malgré la diversité des certificats numériques existants (certificat d'identité X509, SPKI, certificat d'attributs, etc. ), ils sont encore limités, génériques et répondent ainsi insuffisamment aux besoins spécifiques des applications électroniques et des utilisateurs. D'où la nécessité de spécifier une nouvelle approche pour la génération de certificats numériques répondant à ces exigences, légers, simplifiés et plus ouverts que ceux existants. Les travaux de recherche présentés dans cette thèse consistent à proposer une nouvelle approche pour la génération de certificats numériques pour contribuer aux services d'autorisation, puis à intégrer cette contribution au protocole d'attribution dynamique des adresses DHCP afin de renforcer sa sécurité. ﷡﷡﷡﷡﷡<br>Security is a major stake of modern numerical technologies. With the development of the Internet, the needs for security are increasingly becoming more important than ever before. The development of Internet applications such as e-business, medical applications or videoconference, implies new needs such as, identification of the communicating entities, integrity of the exchanged messages, confidentiality of the transaction, authentication of the entities, anonymity of the certificate owner, procuration, etc. Whether they are medical, tax or banking related data, the requirement in security is essential in order to give credibility to the system, while respecting at the same time users' and applications' needs. This security has nevertheless a price: that of the establishment of trust between communicating partners. Users' trust goes through transactions security, for example by means of a certification procedure, and the recognition of electronic signatures. Despite the diversity of existing certificates (X. 509 identity certificate, SPKI, attributes certificate, etc), they are still limited, generic and thus, meet insufficiently the specific needs of electronic applications and users. Hence, the need for specifying a new approach for the generation of certificates answering these requirements, light, simplified and more open than those existing. The research tasks presented in this thesis consist in proposing a new approach for the generation of certificates to contribute to the authorization services, then to integrate this contribution to DHCP (Dynamic Host Configuration Protocol) in order to reinforce its security
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Holubovský, Petr. "Management výkonnosti a optimalizace VoIP technologie." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-259801.

Texto completo
Resumen
The diploma thesis focuses on the VoIP technology optimization and performance management. The diploma thesis presents the theoretical basis of IP telephony and measurement of its quality. The thesis primarily deals with practical measurements of VoIP calls quality. Asterisk softswitch, various types of IP phones and simulated degradation of signal using Linux software router are used for measurements. Procedural diagram of VoIP technology real deployment is designed based on these measurements.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Pecho, Ladislav. "Vytvoření modulu jádra a konfigurace síťového serveru pro operační systém Linux." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218670.

Texto completo
Resumen
The goal of my work is to create two computer labs lessons. The first one is a guide in writing a simple Linux kernel module, and in making a file inside the procfs filesystem. The content of the file can be decided as late as at the moment of reading. The second lesson describes the configuration of a server which allows a computer to boot over network. DHCP server is used with a TFTP server for file transfers which are both handled by the dnsmasq program. The example configuration will display a menu on the client station. It is possible to select to boot either a Linux kernel, floppy disk image, Linux network installer, diagnostic tool Memtest, or a text mode game Grub Invaders. The chosen bootloader is pxelinux from the syslinux project.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Filippi, Geoffrey George. "A High-Availability Architecture for the Dynamic Domain Name System." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/32869.

Texto completo
Resumen
A High-Availability Architecture for the Dynamic Domain Name System <p> DNS, DDNS, BGP, anycast, DHCP, replication, LDAP, multi-master, high-availability, reliability <p> The Domain Name System (DNS) provides a mapping between host names and Internet Protocol (IP) addresses. Hosts that are configured using the Dynamic Host Configuration Protocol (DHCP) can have their assigned IP addresses updated in a Dynamic DNS (DDNS). DNS and DDNS are critical components of the Internet. Most applications use host names rather than IP addresses, allowing the underlying operating system (OS) to translate these host names to IP addresses on behalf of the application. When the DDNS service is unavailable, applications that use DNS cannot contact the hosts served by that DDNS server. Unfortunately, the current DDNS implementation cannot continue to operate under failure of a master DNS server. Although a slave DNS server can continue to translate names to addresses, new IP addresses or changes to existing IP addresses cannot be added. Therefore, those new hosts cannot be reached by the DDNS. <p> A new architecture is presented that eliminates this single point of failure. In this design, instead of storing resource records in a flat text file, all name servers connect to a Lightweight Directory Access Protocol (LDAP) directory to store and retrieve resource records. These directory servers replicate all resource records across each other using a multi-master replication mechanism. The DHCP servers can add records to any of the functioning DNS servers in event of an outage. In this scheme, all DNS servers use the anycast Border Gateway Protocol (BGP). This allows any of the DNS servers to answer queries sent to a single IP address. The DNS clients always use the same IP address to send queries. The routing system removes routes to non-functional name servers and delivers the request to the closest (according to network metrics) available DNS server. <p> This thesis also describes a concrete implementation of this system that was created to demonstrate the viability of this solution. A reference implementation was built in a laboratory to represent an Internet Service Provider (ISP) with three identical regions. This implementation was built using Quagga as the BGP routing software running on a set of core routers and on each of the DNS servers. The Berkeley Internet Name Daemon (BIND) was used as an implementation of the DNS. The BIND Simplified Database Backend (SDB) interface was used to allow the DNS server to store and retrieve resource records in an LDAP directory. The Fedora Directory Server was used as a multi-master LDAP directory. DHCP service was provided by the Internet Systems Consortium's (ISC) DHCP server. The objectives for the design were high-availability, scalability and consistency. These properties were analyzed using the metrics of downtime during failover, replication overhead, and latency of replication. The downtime during failover was less than one second. The precision of this metric was limited by the synchronization provided by the Network Time Protocol (NTP) implementation used in the laboratory. The network traffic overhead for a three-way replication was shown to be only 3.5 times non-replicated network traffic. The latency of replication was also shown to be less than one second. The results show the viability of this approach and indicate that this solution should be usable over a wide area network, serving a large number of clients.<br>Master of Science
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Meyer, Ralph. "Analyse dynamischer Hostkonfiguration auf Basis von IPv6." [S.l. : s.n.], 2001. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10047783.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "DHCP"

1

Droms, Ralph. The DHCP handbook. 2nd ed. Sams, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Droms, Ralph. DHCP Handbook, The. Pearson Education, 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Droms, Ralph. The DHCP handbook. 2nd ed. Sams, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Thompson, Robert Bruce. Dynamic Host Configuration Protocol (DHCP). O'Reilly & Associates, Inc., 1998.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

fer, Carsten Scha. Das DHCP-Handbuch: Ein Leitfaden zur Planung, Einfu hrung und Administration von DHCP. Addison-Wesley, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

DHCP: A guide to dynamic TCP/IP network configuration. Prentice Hall PTR, 1999.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Droms, Ralph. The DHCP handbook: Understanding, deploying, and managing automated configuration services. Macmillan Technical Pub., 1999.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

1964-, Shiblī ʻĀṣim Shahnavāz, ред. Dhūp dhūp safar: Naẓmaun̲ kā majmūʻah. Is̲bāt va Nafī Pablīkeshanz, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Sudha. Katar dhup. Prabhat, 1988.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Niẓāmī, K̲h̲ālid. Dhūp chāʼon̲. Naishnal Insṭīṭiyūṭ āf Kashmīr Sṭaḍīz (NIKS), 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "DHCP"

1

Vazquez, Antonio. "DHCP." In Learn CentOS Linux Network Services. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2379-6_5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Both, David. "DHCP." In Using and Administering Linux: Volume 3. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5485-1_3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Srivastava, Amit Kumar, and Arun Kumar Misra. "Plugging DHCP Security Holes Using S-DHCP." In Advances in Computing and Information Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31513-8_23.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kania, Stefan. "Ausfallsicherer DHCP-Server." In Samba 4. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446457355.008.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Majumdar, Saugat, Dhananjay Kulkarni, and Chinya V. Ravishankar. "DHCP Origin Traceback." In Distributed Computing and Networking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17679-1_35.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Horley, Edward. "IPv6 and DHCP." In Practical IPv6 for Windows Administrators. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6371-5_9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Kania, Stefan. "Ausfallsicherer DHCP-Server." In Samba 4, 2nd ed. Carl Hanser Verlag GmbH & Co. KG, 2021. http://dx.doi.org/10.3139/9783446469785.008.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Buchanan, Bill. "SNMP, Wins and DHCP." In Handbook of Data Communications and Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4757-0905-6_37.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Demerjian, Jacques, and Ahmed Serhrouchni. "DHCP Authentication Using Certificates." In Security and Protection in Information Processing Systems. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_30.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Buchanan, William J. "SNMP, WINS and DHCP." In Mastering Microsoft Windows, Novell NetWare and UNIX. Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-14968-1_6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "DHCP"

1

Akashi, Shigeo, and Yao Tong. "Classification of DHCP Spoofing and Effectiveness of DHCP Snooping." In International Conference on Advances in Computer Technology, Information Science and Communications. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0008099002330238.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Giordano, Silvia, Davide Lenzarini, Alessandro Puiatti, and Salvatore Vanini. "Enhanced DHCP client." In the second workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1287791.1287809.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Brik, Vladimir, Jesse Stroik, and Suman Banerjee. "Debugging DHCP performance." In the 4th ACM SIGCOMM conference. ACM Press, 2004. http://dx.doi.org/10.1145/1028788.1028822.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Tripathi, Nikhil, and Neminath Hubballi. "Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack." In 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS). IEEE, 2015. http://dx.doi.org/10.1109/ants.2015.7413661.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Tong, Yao, and Shigeo Akashi. "A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping." In DSIT 2019: 2019 2nd International Conference on Data Science and Information Technology. ACM, 2019. http://dx.doi.org/10.1145/3352411.3356103.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Dinu, Dumitru Daniel, and Mihai Togan. "DHCP server authentication using digital certificates." In 2014 10th International Conference on Communications (COMM). IEEE, 2014. http://dx.doi.org/10.1109/iccomm.2014.6866756.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Khadilkar, Manas, Nick Feamster, Matt Sanders, and Russ Clark. "Usage-based dhcp lease time optimization." In the 7th ACM SIGCOMM conference. ACM Press, 2007. http://dx.doi.org/10.1145/1298306.1298315.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Papapanagiotou, Ioannis, Erich M. Nahum, and Vasileios Pappas. "Configuring DHCP leases in the smartphone era." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2398776.2398814.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Lin, Changsheng, Tian Su, and Zhiqian Wang. "Summary of high-availability DHCP service solutions." In Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155886.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Korkmaz, Mehmet Halis, and Cemal Kose. "Port-based DHCP server design with authentication." In 2017 25th Signal Processing and Communications Applications Conference (SIU). IEEE, 2017. http://dx.doi.org/10.1109/siu.2017.7960334.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "DHCP"

1

T'Joens, Y., C. Hublet, and P. De. DHCP reconfigure extension. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3203.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Lemon, T., and Q. Wu. Relay-Supplied DHCP Options. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6422.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Lear, E., and P. Eggert. Timezone Options for DHCP. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4833.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Fujisawa, K. DHCP for IEEE 1394. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2855.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Droms, R. Authentication for DHCP Messages. Edited by W. Arbaugh. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3118.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Jiang, S., S. Krishnan, and T. Mrugalski. Privacy Considerations for DHCP. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7819.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Johnson, R., J. Kumarasamy, K. Kinnear, and M. Stapp. DHCP Server Identifier Override Suboption. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5107.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Patrick, M. DHCP Relay Agent Information Option. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3046.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Droms, R. Interoperation Between DHCP and BOOTP. RFC Editor, 1993. http://dx.doi.org/10.17487/rfc1534.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Huitema, C., T. Mrugalski, and S. Krishnan. Anonymity Profiles for DHCP Clients. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7844.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía