Skip to main content

Explain the concept of subnetting the network.

48.Explain the concept of subnetting the network.
Ans.
1. Every IP network has two addresses that cannot be used –The network IP number itself and the broadcast addresses.

2. Every time we subnet we are creating these two unusable addresses, so the more subnet we have, the more IP addresses we lose.

3. We need to determine the subnetwork mask and network numbers. Subnetworking takes one or more of the available host bits and makes them appear as network bits to the local interfaces.

4. If we want to divide our Class C network into two subnetworks, we’d change the first host bits to ones, and this would give us a net mask of 255.255.255.192

5. Lastly, assign the appropriate numbers for the network, the broadcast address, and the IP addresses for each of the interfaces.

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Absolute Links vs. Relative Links – SEO Value

Absolute Links vs. Relative Links – SEO Value The debate between  absolute links and relative links  continues to live on in the SEO world. The individual significance of each has been contested, but it is widely regarded that absolute links provide better SEO value on the whole than relative links. Many believe that absolute links have less potential for getting messed up when search engines index your page. It shouldn’t really make a difference, but many conclude that this is reason enough. Read more...

What are the server and client security considerations?

72.What are the server and client security considerations? Ans. Server security considerations: 1. Always use the root_squash option in /etc/exports. 2. Enabled by default so do not disable it. 3. With root squashing clients root account can’t even access or change files that only server’s root account can change or access. Client security considerations: 1. Disable SUID (set UID) programs on NFS mounts using nosuid option. 2. Prevents server’s root account from creating an SUID root program on an exported FS, logging in to the clients as a normal user, and then using the UID root program to become root on the client.