Detect and Avoid IP Address Conflicts



IPv4 address conflicts are a common cause of problems with DHCP. No two computers on the network can have the same unicast IP address. If a computer is assigned the same unicast IPv4 address as another, one or both of the computers might become disconnected from the network.

To better detect and avoid potential conflicts, you can enable IPv4 address conflict detection by following these steps:

1. In the DHCP console, expand the node for the server you want to work with, right-click IPv4, and then click Properties.

2. On the Advanced tab, set Conflict Detection Attempts to a value other than 0. The value you enter determines the number of times the DHCP server checks an IP address before leasing it to a client. The DHCP server checks IP addresses by sending a ping request over the network.

Real World Example: A unicast IPv4 address is a standard IP address for class A, B, and C networks. When a DHCP client requests a lease, a DHCP server checks its pool of available addresses and assigns the client a lease on an available IPv4 address. By default, the server checks only the list of current leases to determine whether an address is available. It doesn’t actually query the network to see whether an address is in use.

Unfortunately, in a busy network environment, an administrator might have assigned this IPv4 address to another computer or an offline computer might have been brought online with a lease that it believes hasn’t expired, even though the DHCP server believes the lease has expired. Either way, you have an address conflict that will cause problems on the network. To reduce these types of conflicts, set the conflict detection to a value greater than 0

ISO-OSI 7 Layers

Layer 1 - Physical Layer ƒ
  • interface with the communications hardware and transmission medium. ƒ
  • transmission of an unstructured stream of data bits.

Layer 2 - Data-link  Layer ƒ
  • transmission of frames containing data and/or control information. ƒ
  • provides error control and flow control over the data link.

Layer 3 - Network  Layer ƒ
  • effective where the end-to-end path consists of a series of data links either within one subnetwork [WAN] or over a collection of subnetworks [internet]. ƒ
  • provides routing and relaying over the subnetwork[s].

Layer 4 - Transport  Layer ƒ
  • provides a reliable end-to-end transfer of data between the two communicating systems. ƒ
  • provides service independent of the underlying sub network[s]. ƒ
  • acts as a separator between the end system related protocols [interworking] and the sub network related protocols [interconnection].

Layer 5 - Session  Layer ƒ
  • manages the session [establishment, dialogue exchange, recovery, termination].

Layer 6 - Presentation  Layer ƒ
  • resolves differences in data representation in end systems. ƒ
  • provides common transfer syntax.

Layer 7 - Application  Layer ƒ
  • provides network services for user application processes. ƒ
  • file transfer, remote terminal access, messaging, remote job entry, management, security and directory services.