{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:34:40Z","timestamp":1760240080796,"version":"build-2065373602"},"reference-count":17,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T00:00:00Z","timestamp":1551744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol (DHCP) algorithm over multiple interconnected local networks. The proposed model is open and used as an alternative to commercial solutions for a multi-campus institution with facilities in different regions that are interconnected point-to-point using a dedicated link. When the DHCP scope has to be managed and structured over multiple geographic locations that are VPN connected, it requires physical redundancy, which can be provided by a failover server. The proposed solution overcomes the limitation placed on the number of failover servers as defined in the DHCP failover (DHCP-F) protocol, which specifies the use of one primary and one secondary server. Moreover, the presented work also contributes to improving the DHCP-F specification relative to a number of practical workarounds, such as the use of a virtualized DHCP server. Therefore, this research assumes a recovery strategy that is based on physical servers distributed among different locations and not centralized as clustered virtual machines. The proposed method was evaluated by simulations to investigate the impact of this solution in terms of network traffic generated over the VPN links in order to keep the failover service running using the proposed approach.<\/jats:p>","DOI":"10.3390\/bdcc3010018","type":"journal-article","created":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T11:19:50Z","timestamp":1551784790000},"page":"18","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["DHCP Hierarchical Failover (DHCP-HF) Servers over a VPN Interconnected Campus"],"prefix":"10.3390","volume":"3","author":[{"given":"Lucas","family":"Trombeta","sequence":"first","affiliation":[{"name":"Center of Mathematics, Computing and Cognition, Federal University of ABC, Campus S\u00e3o Bernardo do Campo, S\u00e3o Paulo 09606-070, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1273-7152","authenticated-orcid":false,"given":"Nunzio Marco","family":"Torrisi","sequence":"additional","affiliation":[{"name":"Center of Mathematics, Computing and Cognition, Federal University of ABC, Campus S\u00e3o Bernardo do Campo, S\u00e3o Paulo 09606-070, Brazil"}]}],"member":"1968","published-online":{"date-parts":[[2019,3,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Droms, R. (1997). Dynamic Host Configuration Protocol, Network Working Group. RFC 2131.","DOI":"10.17487\/rfc2131"},{"key":"ref_2","unstructured":"Union, I.T. (2011). ICT Statistics, United Nations. Technical Report."},{"key":"ref_3","unstructured":"Droms, R. (2003). DHCP Failover, Network Working Group. RFC 1654."},{"key":"ref_4","unstructured":"McAuley, A., and Manousakis, K. (2000, January 22\u201325). Self-configuring networks. Proceedings of the IEEE 21st Century Military Communications Conference (MILCOM 2000), Los Angeles, CA, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"413","DOI":"10.3390\/fi4020413","article-title":"Principles of Eliminating Access Control Lists within a Domain","volume":"4","author":"Davies","year":"2012","journal-title":"Future Internet"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Umeno, S., and Lynch, N. (2010, January 22\u201326). Automated Formal Verification of the DHCP Failover Protocol Using Timeout Order Abstraction. Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), Oxford, UK.","DOI":"10.1109\/ICECCS.2010.14"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-031-02003-2","article-title":"The theory of timed I\/O automata","volume":"1","author":"Kaynar","year":"2010","journal-title":"Synth. Lect. Distrib. Comput. Theory"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Fan, R., Droms, R., Griffeth, N., and Lynch, N. (2007). The DHCP failover protocol: A formal perspective. Formal Techniques for Networked and Distributed Systems\u2013FORTE 2007, Springer.","DOI":"10.1007\/978-3-540-73196-2_14"},{"key":"ref_9","unstructured":"Lemon, T., Stevens, R., Volz, B., and Gonczi, S. (2001). DHC Load Balancing Algorithm, Network Working Group. RFC 3074."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1145\/78973.78978","article-title":"Fast Hashing of Variable-length Text Strings","volume":"33","author":"Pearson","year":"1990","journal-title":"Commun. ACM"},{"key":"ref_11","first-page":"4","article-title":"On the Deployment of DHCP","volume":"9","author":"Kelley","year":"2018","journal-title":"J. Comput. Sci. Softw. Eng."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Lin, C., Su, T., and Wang, Z. (2011, January 28\u201330). Summary of high-availability DHCP service solutions. Proceedings of the 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), Shenzhen, China.","DOI":"10.1109\/ICBNMT.2011.6155886"},{"key":"ref_13","unstructured":"Alcatel-Lucent (2007). Implementing DHCP Redundancy to Sustain Critical Operations 031960-00[R], Alcatel-Lucent Inc.. Technical Report."},{"key":"ref_14","unstructured":"Cisco (2005). Cisco CNS Network Registrar User\u2019s Guide OL-6240-01[R], Cisco Systems Inc.. Technical Report."},{"key":"ref_15","unstructured":"Incognito (2006). DHCP Failover with IP Commander[R], Incognito Software Inc.. Technical Report."},{"key":"ref_16","unstructured":"Incognito (2006). DHCP Failover: Requirements of a High-Performance System[R], Incognito Software Inc.. Technical Report."},{"key":"ref_17","unstructured":"Droms, R.E., and Lemon, T. (2002). The DHCP Handbook, Pearson Education."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/3\/1\/18\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:36:20Z","timestamp":1760186180000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/3\/1\/18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,5]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,3]]}},"alternative-id":["bdcc3010018"],"URL":"https:\/\/doi.org\/10.3390\/bdcc3010018","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2019,3,5]]}}}