Detection of Duplicate IP Addresses by Microsoft TCP/IP

Last reviewed: October 27, 1997
Article ID: Q120599

The information in this article applies to:

  • Microsoft Windows NT operating system version 3.1
  • Microsoft Windows NT Advanced Server version 3.1
  • Microsoft Windows NT Workstation versions 3.5 and 4.0
  • Microsoft Windows NT Server versions 3.5 and 4.0
  • Microsoft Lan Manager 2.2 and later
  • Microsoft Windows for Workgroups version 3.11
  • Microsoft TCP/IP-32 for Windows for Workgroups, version 3.11

NOTE: This article applies to all Microsoft TCP/IP network protocols.

SUMMARY

The TCP/IP protocol may fail to start if another system using the same IP address is detected on the network. All the TCP/IP protocols currently shipping (as of 9/20/94) can detect duplicate IP addresses in most cases. The following information details how this happens and how to recognize duplicate addresses in a network trace.

MORE INFORMATION

Each computer running TCP/IP uses a cache that contains mappings between IP addresses and media access control (MAC) or network adapter addresses on the network. The cache is maintained by the address resolution protocol (ARP) and is dynamic. When a connection attempt is made from one computer to another, the calling computer looks in its ARP cache for the target computer's IP/MAC address entry, and then builds an outgoing frame directed to the MAC address of the target computer.

If the target computer's IP address is not in the cache, the calling system broadcasts an ARP frame onto the network. The ARP frame contains the IP address of the target computer, and requests its MAC address. If the target computer exists on the local sub-net then an ARP reply will be returned to the calling computer, which updates its cache accordingly. The cache must contain correct mappings for communications to function.

At system startup, when the IP protocol initializes, it sends an ARP request containing its own MAC and IP address so that other computers can update their ARP caches. If there is already a computer using the IP address, the "older" computer will respond with an ARP reply containing its MAC and IP address, indicating a conflict. Unfortunately, many other computers may have already updated their ARP caches with the new mapping. At that point, the "younger" computer that is initializing needs to do two things:

   1. Repair the ARP cache on all affected computers.
   2. Cease using the duplicate address.

Computers running Microsoft TCP/IP will send out a new ARP broadcast to re- map the ARP cache on all affected computers. This new ARP will contain the MAC address and IP address of the older owner of the IP address. After sending this ARP, the IP protocol on the younger machine will report the problem to the user and the stack will shut down. The stack should not be re-started until a unique address is obtained. Note that the computer may still function at this point if another protocol such as NetBEUI is loaded.

Below is a network trace illustrating this behavior. It was captured on a Token Ring network.

Network Trace Illustrating Handling of Duplicate IP Addresses

  1. At IP protocol startup, an ARP package is sent by the younger computer:

    Frame  Time    Src MAC Addr  Dst MAC Addr   Protocol  Description
    1      1.166   4000DDDD1111  BROADCAST      ARP_RARP  ARP: Request,
                                                          Target IP:
    
11.1.9.221

+ FRAME: Base frame properties

  TOKENRING: Length =  50, Priority Normal (No token) LLC Frame
    + TOKENRING: Access control = 24 (0x18) Repeated, Frame, Priority:
      Normal (No token)
    + TOKENRING: Frame control = 64 (0x40), LLC Frame
    + TOKENRING: Destination address : FFFFFFFFFFFF
    + TOKENRING: Source address      : 4000DDDD1111
      TOKENRING: Frame length : 50 (0x0032)
      TOKENRING: Tokenring data: Number of data bytes remaining = 36
                 (0x0024)
+ LLC: UI DSAP=0xAA SSAP=0xAA C + SNAP: ETYPE = 0x0806
  ARP_RARP: ARP: Request, Target IP: 11.1.9.221
      ARP_RARP: Hardware Address Space = 6 (0x6)
      ARP_RARP: Protocol Address Space = 2048 (0x800)
      ARP_RARP: Hardware Address Length = 6 (0x6)
      ARP_RARP: Protocol Address Length = 4 (0x4)
      ARP_RARP: Opcode = 1 (0x1)
      ARP_RARP: Sender's Hardware Address = 4000DDDD1111
      ARP_RARP: Sender's Protocol Address = 11.1.9.221
      ARP_RARP: Target's Hardware Address = FFFFFFFFFFFF
      ARP_RARP: Target's Protocol Address = 11.1.9.221

  • The older computer already using that address responds directly to the younger computer with an ARP reply:

    Frame  Time    Src MAC Addr  Dst MAC Addr   Protocol  Description
    2      1.166   APRICT093738  4000DDDD1111   ARP_RARP  ARP: Reply, Target
                                                          IP: 11.1.9.221
    
    Target
                                                          Hdwr Addr:
                                                          4000DDDD000
    
    
    + FRAME: Base frame properties
      TOKENRING: Length =  50, Priority Normal (No token) LLC Frame
        + TOKENRING: Access control = 16 (0x10) Original, Frame, Priority:
          Normal (No token)
        + TOKENRING: Frame control = 64 (0x40), LLC Frame
        + TOKENRING: Destination address : 4000DDDD1111
        + TOKENRING: Source address      : 0000C9093951
          TOKENRING: Frame length : 50 (0x0032)
          TOKENRING: Tokenring data: Number of data bytes remaining = 36
                     (0x0024)
    
    + LLC: UI DSAP=0xAA SSAP=0xAA C + SNAP: ETYPE = 0x0806
      ARP_RARP: ARP: Reply, Target IP: 11.1.9.221 Target Hdwr Addr:
                     4000DDDD1111
          ARP_RARP: Hardware Address Space = 6 (0x6)
          ARP_RARP: Protocol Address Space = 2048 (0x800)
          ARP_RARP: Hardware Address Length = 6 (0x6)
          ARP_RARP: Protocol Address Length = 4 (0x4)
          ARP_RARP: Opcode = 2 (0x2)
          ARP_RARP: Sender's Hardware Address = 0000C9093951
          ARP_RARP: Sender's Protocol Address = 11.1.9.221
          ARP_RARP: Target's Hardware Address = 4000DDDD1111
          ARP_RARP: Target's Protocol Address = 11.1.9.221
    
    

  • The younger computer realizes its mistake, and broadcasts a corrective ARP to map all ARP caches back to the MAC address of the older computer:

    Frame  Time    Src MAC Addr   Dst MAC Addr  Protocol  Description
    3      1.168   4000DDDD1111   BROADCAST     ARP_RARP  ARP: Request,
                                                          Target IP:
    
    11.1.9.221

    + FRAME: Base frame properties

      TOKENRING: Length =  50, Priority Normal (No token) LLC Frame
        + TOKENRING: Access control = 24 (0x18) Repeated, Frame, Priority:
                     Normal (No token)
        + TOKENRING: Frame control = 64 (0x40), LLC Frame
        + TOKENRING: Destination address : FFFFFFFFFFFF
        + TOKENRING: Source address      : 4000DDDD1111
          TOKENRING: Frame length : 50 (0x0032)
          TOKENRING: Tokenring data: Number of data bytes remaining = 36
                     (0x0024)
    
    + LLC: UI DSAP=0xAA SSAP=0xAA C + SNAP: ETYPE = 0x0806
      ARP_RARP: ARP: Request, Target IP: 11.1.9.221
          ARP_RARP: Hardware Address Space = 6 (0x6)
          ARP_RARP: Protocol Address Space = 2048 (0x800)
          ARP_RARP: Hardware Address Length = 6 (0x6)
          ARP_RARP: Protocol Address Length = 4 (0x4)
          ARP_RARP: Opcode = 1 (0x1)
          ARP_RARP: Sender's Hardware Address = 0000C9093951    <----|
          ARP_RARP: Sender's Protocol Address = 11.1.9.221      <----|
          ARP_RARP: Target's Hardware Address = FFFFFFFFFFFF         |
          ARP_RARP: Target's Protocol Address = 11.1.9.221           |
                                                                     |
                                                                     |
                       Here the IP address gets mapped back to the older
                       computer's MAC address.
    
    

    Windows NT version 4.0 Service Pack 3

    Microsoft changed the way a Windows NT TCPIP computer reacts to a duplicate IP address with Service Pack 3. This change has not been made in any of the other TCPIP stacks. The new method of resolving duplicate IP addresses is as follows:

    1. The "new" machine broadcasts an ARP request with its own MAC address and
    IP address.

    1. The "older" computer will send an ARP reply directly back to the "newer"
    computer, indicating a conflict.

    1. The "newer" computer will not initialize its TCP/IP stack.

    2. The "older" computer will send an ARP broadcast with its own MAC address
    and IP address to ensure other computers have a correct ARP cache entry for the IP address that was in conflict.


  • Additional query words: prodtcp32 wfw wfwg 3.10 3.50 4.00
    Keywords : NTSrvWkst nttcp wfwg kbnetwork
    Version : 3.10 3.50 4.00
    Platform : winnt


    THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

    Last reviewed: October 27, 1997
    © 1998 Microsoft Corporation. All rights reserved. Terms of Use.