What is subnetting, Computer Networking

Assignment Help:

Q. What is Subnetting ?

Subnetting

  • IP addressing is hierarchical
  • First reach a device through its network id (netid)
  • Then reach the host itself using the second portion (hostid)
  • Since an organization may not have enough address, subnetting may be used to divide the network into smaller networks or sub networks.

Related Discussions:- What is subnetting

Shortest path tree and minimum-spanning tree, We studied Dijkstra's link-st...

We studied Dijkstra's link-state routing algorithm for computing the unicast paths that are individually the shortest paths from the source to all destinations. The union of these

Dns - protocol attacks, DNS - Protocol Attacks Generally, in the DNS p...

DNS - Protocol Attacks Generally, in the DNS protocol, flaws are based on the implementation issues. The three common issues are generally, associated which can be of one of t

Describe network topology and vpn, Describe Network Topology and VPN Ne...

Describe Network Topology and VPN Network Topology refers to the layout of a computer network. It presents how devices and cables are physically laid out, as well as how they j

Iso - organization for standardization, - The ISO (International Organisati...

- The ISO (International Organisation for Standardisation) is an International standards organisation responsible for a wide range of standards including many that are relevant to

Need for standards, Need for standards - Over the past couple of decade...

Need for standards - Over the past couple of decades several of the networks that were built used different hardware and software implementations therefore they were incompatib

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

Explain the diffrent types of security attacks, Q. Explain the diffrent typ...

Q. Explain the diffrent types of Security Attacks? Types of Security Attacks Passive Threats: - Traffic Analysis and - Release of Message Contents Active

Little spider, #question.what can we do with a spider when it red?.

#question.what can we do with a spider when it red?.

Verify network connectivity- ccna, Verify Network Connectivity Step 1: ...

Verify Network Connectivity Step 1: Use the ping command to determine network connectivity. You can determine network connectivity using the ping command.  Note: If pings

What is a protocol, What is a protocol? The term protocol refers to a s...

What is a protocol? The term protocol refers to a set of rules and process that govern the transmission of messages over a physical networking medium. The most common network p

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd