Disadvantages of Dynamic Host Configuration Protocol (Essay Sample)
Research and share at least three of the common faults or disadvantages of implementing DHCP on a local area network. For each of the faults you list, suggest how it could be overcome, resolved, or avoided
Research to learn the major steps and considerations required to configure a DNS server on a network server, either a Windows 2016 Server or a Linux server - your choice. You should have at least six steps identified in this process for either operating system
DNS is only one part of many that make the Internet what it is. Advancement in its underlying technologies, such as IPv6 and its impact on the protocols and services of the TCP/IP suite, communication, compression, and encryption to name a few, have opened the discussion on where we may see the Internet going in the future, near or far. Will the current DNS structure remain valid for the Future-Net? If not, what changes could you see?
Networks
Disadvantages of Dynamic Host Configuration Protocol (DHCP)
DHCP automation poses a security risk in the event of a rogue DHCP server getting introduced into the network. The network personnel would not have control of a rogue network that could provide IP addresses to those connecting to the network. In addition, users connected to the rogue DHCP can have their information intercepted when using the rogue DHCP. A rogue DHCP can be solved by troubleshooting, using a network sniffer, looking into sFlow data, or Syslog tools. Prevention is achieved by checking for misconfigured and conflicting IP addresses.
Another problem with DHCP is a single point of failure if only one DHCP server is operational. This issue forms a junction where one issue can cascade into system-wide problems causing connected computers to try and fail at obtaining IP addresses. This problem is addressed by using failover clustering, split scopes, or standby servers.
Another problem with DHCP is its packets cannot travel across routers. This issue necessitates a relay agent that enables the server to handle leases on both network segments. A relay agent receives broadcasts packet forwarding them as unicast to the DHCP server. This problem has long been addressed through a relay agent.
Other Topics:
- The Challenge of CybersecurityDescription: Abstract- Cybersecurity is one of the concerns that contemporary organizations have been dealing with for quite a long time. Having heavily secured computer and information system is such a great goal for many companies. This concern has become apparent as the use of IT in organizational functions ...3 pages/≈825 words| No Sources | APA | IT & Computer Science | Essay |
- I.T Security Group at ElectromedDescription: Technology is always on the move in terms of changes as new developments are continuously coming in to the spotlight and it is important to adapt to these changes. The IT security industry has experienced these prevailing changes and improvements first hand. In fact, depending on what choices are made, ...8 pages/≈2200 words| 5 Sources | APA | IT & Computer Science | Essay |
- Role of Computer Cookies in MarketingDescription: When trying to comprehend the role of cookies in marketing, it is essential to define what they are; cookies are tiny files stored in a person's (user) computer to retain a small amount of information specific to that particular client and website (Shawn, 2007). With affiliate marketing, cookies are vital...3 pages/≈825 words| 3 Sources | APA | IT & Computer Science | Essay |