answersLogoWhite

0

http://www.tcpipguide.com/free/t_DHCPGeneralOperationandClientFiniteStateMachine.htm

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What protocol does PPP use to identify the Network layer protocol?

Network Control Protocol is uses to identify the Network layer protocol used in the packet


Difference between intranet internet?

Internet is a world wide network that uses TCP/IP [Transmission Control Protocol/Internet Protocol] protocol . It is not owned by a person or an organisation .Intranet is a private network that also uses TCP/IP protocol . It is owned by a person or an organisation .


Which protocol would you use to set up a news server?

A news server uses NNTP protocol (Network News Transfer Protocol).


What is the difference between network layer and network layer protocol?

A network layer refers to one of the actual 7 layers. The network layer protocol is actually the system it uses, possibly the order that the layers are done by?


What kind of protocol is used by laptop network interfaces?

The network interface normally uses an Ether-net protocol, and these devices offer both input and output capability.


What networking protocols uses a 32-bit address that defines both the network and the host?

The networking protocol that uses a 32-bit address is an IP (Internet Protocol).


Ping uses which internet layer protocol?

Ping uses ICMP, and therefore resides at layer 3 (Network layer)


What network layer protocol layer does the traceroute utility use to obtain its information about paths between a source and destonation?

It uses ICMP protocol - Internet Control Message Protocol


Is a protocol that defines how a network uses radio signals to communicate with a tag attached to an object?

RFID


How do you set default root in a router by using dynamic routing?

If the network uses the RIP protocol, router A will determine that all paths have equal cost. If the network uses the RIP protocol, router A will update only the A-C-E path in its routing table. If the network uses the EIGRP routing protocol, router A will determine that path A-D-E has the lowest cost. If both RIP and EIGRP protocols are configured on router A, the router will use the route information that is learned by the RIP routing protocol.


The network uses windows xp and cisco equipment the security protocol that is used is wep with 64-bit encryption which action can be recommended to the technician for securing the network?

Upgrade to the LEAP wireless security protocol.


How does a token ring work?

3. Unlike Ethernet, Token Ring uses a ring topology whereby the data is sent from one machine to the next and so on around the ring until it ends up back where it started. It also uses a token passing protocol which means that a machine can only use the network when it has control of the Token, this ensures that there are no collisions because only one machine can use the network at any given time.