To connect to a network and the internet, every device needs an IP address. Imagine a network administrator working at a massive university having to manually type a unique IP address into 10,000 different student laptops. It would be impossible.
DHCP solves this problem. It is a network management protocol that automatically and dynamically assigns IP addresses and network configuration parameters to devices the moment they connect to a network.
When you connect your phone to a new Wi-Fi network, it goes through a 4-step invisible conversation with the DHCP server known as DORA:
Because DHCP requests are broadcasted openly, attackers can perform DHCP Spoofing. An attacker sets up a fake ("Rogue") DHCP server on the network. When your phone asks for an IP, the fake server replies first, giving your phone a valid IP but secretly altering the routing info. All your traffic is then routed directly through the hacker's computer (a classic Man-in-the-Middle attack).
When a network administrator sets up a DHCP server, they define a Scope. A scope is simply the specific range of IP addresses the server is allowed to hand out (e.g., from 192.168.1.100 to 192.168.1.200).
An IP conflict occurs when two devices on the same network are accidentally using the exact same IP address. This completely breaks network connectivity for both devices. This usually happens due to poor configuration:
192.168.1.150) to a printer..150 from the DHCP server's scope pool..150.What is the name of the 4-step process DHCP uses to assign an IP address to a new device?