What is subnetting and supernetting and its uses?
Answers were Sorted based on User's Feedback
Answer / pandi
subnetting used to divide a network into multiple networks.
but, supernetting used to a add multiple network into a
same network.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / nikhil
Answer to this Question
So what i have to do so that the all three subnet show
in routing table-- quite simple think and answer.
TURN OFF AUTO SUMMARIZATION FOR EIGRP
Router1 (config)# no auto=summary.
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / jitendera
Ok Pandi
I have one question for you and all of you guys
if Subneting is something like breaking a Single block of ip
in the multiple block of ip address and Suppernating is
combining the Multiple ip block in to single block am i wrong ?
Now the Question is that
i am using a Routing protocol say eigrp
and i am configuring like
router eigrp 100
network 10.10.10.0 0.0.0.0.255
network 10.10.20.0 0.0.0.0.255
network 10.10.30.0 0.0.0.0.255
now if i make the command
show ip route
it will show
10.0.0.0/16 has been thorugh EIGRP and there will no entry
of 10.10.20.0 and 10.10.30.0
1) So what i have to do so that the all three subnet show
in routing table-- quite simple think and answer
2) if you get the answer then tell me at last what is the
difference between Subnating and suppernating
Think like genius not like me :-)
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / ajun mukund
A subnet mask is used to identify which parts of the ip
address are the network parts and which parts are the host
parts.
e.g
IP 192.168.1.10
Subnet mask : 255.255.255.0
This indicates that the first 3 parts of the IP address are
used to identify the Network.
Let's take a class C mask of 255.255.255.0 - If we borrow 2
network bits, the mask changes to 255.255.252.0, this is
called Supernetting. If on the other hand we borrow two host
bits, the mask changes to 255.255.255.192, this is called
subnetting.
Supernetting therefore allows you to have more hosts on one
network, whilst subnetting allows you to have more inter
networks but with less hosts.
.... So without subnetting or supernetting these two
addresses would be on same network:
IP 192.168.1.10
Subnet mask : 255.255.255.0
IP 192.168.1.233
Subnet mask : 255.255.255.0
With Subnetting, we have borrowed one bit (from the host
part) which in binary looks like this 1000000, now this
splits the network into two networks so these addresses are
now on different networks.
IP 192.168.1.10
Subnet mask : 255.255.255.128
IP 192.168.1.233
Subnet mask : 255.255.255.128
With Supernetting, we borrow one bit from the network part
so the last two parts of subnet mask now look like this
11111110.00000000. These two are on the same network now
because the number of host addresses has increased.
IP 192.168.1.10
Subnet mask : 255.255.254.0
IP 192.168.2.125
Subnet mask : 255.255.254.0
| Is This Answer Correct ? | 0 Yes | 1 No |
What is the minimum request timer?
An autonomous system can only exist if all routers in that system meet which criteria? A. interconnected B. run the same routing protocol C. assigned same autonomous system number D. run IGRP only E. run RIP only
The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability
hello friend i have answerd more time of your question or doute.now i am seeing towards you for help,plz send the soln before monedya the problem is i have three router r1 and r2 and r3 they are conested in that maneer thai is r1---r2---r3---server | | server bothe server have diffrent ip now i have to implemnt access list on the r3 router in such a way that user from r1 can access only one server while user from r2 can access whole servre i ahve done it but both user of r1 and r2 uses all server i need help please help me this time? i have repalsced my firwall by r3 router so bacicaly i have to implement it on my firewall but you tell me on cisco router please help
Which of the following are Presentation Layer standards? A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC D.) NFS and SQL
What is the size of ipv4?
Which of the following is a layer 2 device? A.) Switch B.) Bridge C.) Repeater D.) Hub
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
Explain the difference between named and extended acl?
On which base distance vector choose best path?
Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric
Which command will enable CHAP authentication on a serial interface that is using PPP? A.) encapsulation chap B.) ppp chap C.) ppp enable chap D.) ppp encapsulation chap E.) ppp authentication chap F.) ppp chap enable