Hi, Jitendra thanks for letting me know my answer. I know
ip addressess classes & there subnet masks. Waht i want to
know is the exact address? Ex.In the organization there are
70 pcs which type of address we can use there what will be
the range for ip address?
Answers were Sorted based on User's Feedback
Answer / jitendera sinha
ok
according to you you have 70 computer in your org
that is
2^n-2>=70
that is 7 bit minimum reqirment for that host
so if you use class c address then mask should be
255.255.255.128/25
let if you are using 192.168.16.0/25 series ip
then you should give
default-gateway-192.168.16.1/25
and you can assign up to 192.168.16.126
this fulfill you requirement without wasting of soo much ip and some ip will be also available for future
this is the concept of vlsm but i am highly recommended that before assigning ip you should check what is the configuration of your network devise.
which class of ip is configured therer
u shuld provide ip according to yours conf
Is This Answer Correct ? | 2 Yes | 0 No |
If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through
What is Cisco's default encapsulation method on serial interfaces? A.) ANSI B.) Cisco C.) Q933a D.) HDLC
whats the routing protocol supporting in both juniper , cisco routers.
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node ID? A.) net 4a host 0002.1111.a999 B.) net a999 node 0002.1111 C.) net 0002.1111.a999 node 4a D.) net 0002.1111 node a999
8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS
What are characteristics of UDP A. It is reliable and acknowledged B. It is unreliable and acknowledged C. It is reliable and unacknowledged D. It is unreliable and unacknowledged
what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how to block some site on that which form user not able to access site and basic firwall config and why are we using firwall please jittendra explain it.can u send me doc of firwall in my gmail id - dsoni89@gmail.com
On which interface we always apply access-list?
What is the standard ISDN term for a native ISDN telephone? A.) ET B.) TE1 C.) TE2 D.) LE E.) TA
what is the basic rules for ACLs?
What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route