What is VLSM? Why we Create? When we Create? Implement VLSM
with example?

Answers were Sorted based on User's Feedback



What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / inder gulati

VLSM Stands for Variable Length Subnet mask.This method is
an advanced version of IP Subnet Zero Method of Subnetting.
It is used to reduce the wastege of IP address over a WAN

Is This Answer Correct ?    54 Yes 6 No

What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / asish mishra

VLSM is used for proper implimentation of IP addresses
without any loss.In real world this is used by the ISP to
Distribute the public Ip when asssigning the WAN links.
Basically companys who requires WAN link we need to use 2
IP addresses ,One at our terminal and another in ISP
terminal.But a single Class C address provides 254 valid
host addressses what to do with rest 252 addresses.Throgh
VlSM we can use it in 2 Valid host per subnet.Rest of all
addresses can also be distributed with a Separate block
size or 6,14,30,62 hst per subnet.

Is This Answer Correct ?    29 Yes 3 No

What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / shahid ahmed

Allows for the creation of efficient, scalable addressing
schemes.
One of the modifications that has helped to bridge the gap
between IPv4 and IPv6 (128bit)
RIP V1 for small networks – RIP V2 scalable by using VLSM
With VLSM, a network administrator can use a long mask on
networks with few hosts,
and a short mask on subnets with many hosts

Is This Answer Correct ?    15 Yes 1 No

What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / ranjeet

vlsm stand for variable length subnet mask. eigrp and rip v2
it supports.it is used to reduced the lack of ip address
after subneting if we want add more depart in org. for that
we have to need second mask so to get new mask we used vlsm

Is This Answer Correct ?    4 Yes 1 No

What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / mvctc computer network enginee

The Answer to your question is........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ Variable Length Subnet Masking. VLSM is basically subnetting a subnet. It was imoplemented around 1993.

Is This Answer Correct ?    1 Yes 0 No

What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / g.siba shankar reddy

VLSM Stands for Variable Length Subnet mask.It is used to
reduce the wastege of IP address over a WAN.RIP V1 for
small networks – RIP V2 scalable by using VLSM
With VLSM, a network administrator can use a long mask on
networks with few hosts,

Is This Answer Correct ?    3 Yes 3 No

What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / amit srivastav

vlsm is varible length subnet mask.it save the bandwidth in
comparison with subneting.

Is This Answer Correct ?    1 Yes 1 No

What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / ll

hi

Is This Answer Correct ?    4 Yes 11 No

What is VLSM? Why we Create? When we Create? Implement VLSM with example?..

Answer / harekrushna das

VLSM stands for Vairable lenth subnetwork . It bsically
need for the ISP , who used the wan . but its basic found
is as per oure requirement we use the ip address without
any loss or extra ip . so that the VLSM is need.
for subneting follow the CCNA book .

Is This Answer Correct ?    0 Yes 7 No

Post New Answer

More CCNA Interview Questions

Identify the command to display the IP routing table? A.) show route B.) show ip route C.) show ip table route D.) show ipx route

1 Answers  


What is a protocol

13 Answers   Network, TATA,


Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.

1 Answers  


Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint

3 Answers  


How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets

2 Answers  


Which is the protocol using multiple tcp/ip connections? SLIP or PPP

2 Answers   Sutherland,


What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP

2 Answers  


what is distance vector protocol link state protocol and what is the diffrence between them

6 Answers   HCL, Wipro,


Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged the are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination

1 Answers  


How do you get help on a command after you have received the % incomplete command response from a switch CLI? A. type "history" to review the prompt before the error B. enter a question mark to display all the console commands C. type help followed by the command to see command parameters D. reenter the command followed by a question mark to view keywords

1 Answers  


Which of the following provide correct information about a protocol at the transport layer of the OSI model? A.) UDP - Provides Connectionless datagrams service B.) TCP - Provides Connection Oriented Services C.) SMTP - Provides Mail Exchange D.) IP - Route determination E.) TCP - Provides Flow Control and Error Checking F.) FTP - Transfers of Files

2 Answers  


Who controls mac address uniqueness and how?

0 Answers  


Categories