Answer Posted / sheshdhar dueby
------------------------------------------------------------
--------------------
CIDR = Prefix length.
VLSM is taking a subnetted address and re-subnetting one of
the subnetted networks.
IE, if you have 192.168.10.0/27, you have networks:
192.168.10.0
192.168.10.32
192.168.10.64
192.168.10.96
etc.
You can take (for example) 192.168.10.32/27, and make it
192.168.10.32/29, thus Varying the Length of the Subnet
Mask. You can now have networks:
192.168.10.32
192.168.10.40
192.168.10.48
192.168.10.56
If we assume 192.168.10.64 is in use, as are all the
addresses that follow in the original /27 scheme, then you
have to stop there. If the .64 address scheme is not being
used you can keep going with the smaller subnet size until
you reach an address that is in use. Obviously you can't
duplicate addresses...
| Is This Answer Correct ? | 2 Yes | 1 No |
Post New Answer View All Answers
List the layers of the osi reference model?
can anyone post apache webserver and tomcat server questions and answers it is very helpful to me please
What is star topology?
Tell me what can be done to fix signal attenuation problems?
Explain the difference between csma/cd and csma/ca?
senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.
HI all of u dear freind i dont know abot u but instead of i want to requeste to all , if u have any job in ur mind than pls contact me or forword me . i hv complet my B.A. , CCNA ,MCSA, my contact no 09958737018 and id is mak_alam000@rediffmail.com , ur freind maksud alam
Define the role of ieee in computer networking?
one client is uanble to connect web server it is located in some remote location what are the problems how to troubleshoot the problem
Define the proper termination rate for utp cables?
how do u share printer through FTP(fire transfer protocol)?
What is the importance of authentication?
Define tracert?
Please list the types of Firewalls, Routers, Switches, Servers, you manage?
How dynamic host configuration protocol aid in network administration?