Skip to main content

Explain submit mask and subnetting and advantages.

47.Explain submit mask and subnetting and advantages.
Ans.
1. The network mask is also called the subnet mask. All network nits were set to one and the host bits were to zero. This is the standard format for all the network masks.
E.g.
Class C 11111111 11111111 11111111 00000000
Class B 11111111 11111111 00000000 00000000
Class A 11111111 00000000 00000000 00000000

2. A subnet enable us to use one IP address and split it up so that it can be used on a several physically connected local network, it’s a big advantage, as the number of IP numbers available is rapidly diminishing.

3. We can have the multiple subnetted networks connected to the outside world with just one IP address.

4. By splitting the IP address, it can be used on sites that need multiple connections; splitting the address eliminates the problems of high traffic and difficult manageability.

5. Subnetting also increases security by separating into local networks.


Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Discuss security issues in Network File system.

71.Discuss security issues in Network File system. Ans. 1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network. 2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible. 3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control. 4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts. 5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted. 6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security. ...