What is VLSM ?
Answers were Sorted based on User's Feedback
Answer / ankit.hcl
VLSM stand for Variable Length Subnet Mask.VLSM originally
defined in RFC 1812, allows you to apply different subnet
masks to the same class address space.
Remember that the best subnet mask for point-to-point links
is 255.255.255.252(130).
VLSM allows you to use more than one subnet mask for given
class address.Remember the two major advantages of VLSM:
More efficient use of address and route
summarization/aggregation.
| Is This Answer Correct ? | 51 Yes | 2 No |
Answer / javed khan
Variable Length Subnet Masking - VLSM - is a technique that allows network administrators to divide an IP address space into subnets of different sizes, unlike simple same-size Subnetting.
| Is This Answer Correct ? | 2 Yes | 1 No |
Answer / ponr277
VLSM is used for to avoid the drawbacks of classful network. For Eg. If you divide two subnets in the network. one network have 30 system and another network have only 10 system the remaining bits are wasted and the scaning time also not quickeer in smallest subnet. to avoid this type of drawback we should use VLSM.
| Is This Answer Correct ? | 0 Yes | 1 No |
Answer / nasruddin khan
a vlsm is sequence of numbers of varable length that
stremlines packet routing within the subnet of a proprietary
network. a subnet can be geographiclly defined local area
network.alternatively a subnet may define security boundries,
departmental boundries multicast zone or hardware security
parameters
| Is This Answer Correct ? | 2 Yes | 6 No |
What are the ranges of private ips?
You are conferring a Frame Relay router with subinterfaces on interface Serial 0 Which subinterfaces numbers could you use for this configuration? A. 1 and 2 B. 0 2 and 0 3 C. 1 0 and 1 1 D. 0 1 a and 0 1
What is the utility of ping?
You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? A. 10101100 00010000 B. 00000010 10100000 C. 10101100 00000000 D. 11100000 11110000
Which command do you use to set the Secret password to 'roundwood'? A.) enable login roundwood B.) enable password roundwood C.) enable privilege roundwood D.) enable secret= roundwood E.) enable secret login roundwood F.) enable secret roundwood
what does the clock rate do?
Differentiate full-duplex from half-duplex.
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connnections D.) Path selection E.) MAC address examination F.) Network monitoring
What are the advantages of using switches?
On a network design project you determine that a new testing application requires multiple hosts. These hosts must be capable of sharing data between each host and an enterprise server at 10 Mobs bandwidth. Other divisions in the company use applications that require less than 2 Mobs bandwidth of the enterprise server. What is your most economical recommendation? A. That existing 10BaseT hubs be replaced with 1 00BaseT hubs to improve overall performance B. That a router can separate the testing application from the rest of the network, thus allowing the testing application more bandwidth. C. That a switch be installed, so that the enterprise server can be provided a 100 Mobs pod and each of the testing application hosts can be given dedicated 10 Mobs pods] D. That a bridge be placed between the enterprise server and all other users with the exception of the testing application
i want to ask one question that why u guys are not posting the questions is any thing wrong please post question for your and others including me knowledge
Explain how many ways to access router?