what is flsm
Answers were Sorted based on User's Feedback
Answer / bhisham
A fixed-length subnet mask FLSM is a sequence of numbers of
unchanging length that streamlines packet routing within
the subnets of a proprietary network. A subnet can be a
geographically defined gateway with its network number,
that packet is routed to its ultimate destination using a
subnet number. The FLSM is usually a string of binary
digits shown over the subnet number, telling the router
which
| Is This Answer Correct ? | 28 Yes | 4 No |
Answer / mahesh
Fixed Length Subnet masks : This terminology is used to CLASSFUL Addressing. Let us take a ClassFul Address whic belongs to CLASS A.
It is defaultly assumed to have a Mask as 8. Only 8 bits for Network &&& remaing 24 bits for Host. So ., Routers assume this Mask when they got an Routing update from a Routing Protocol which is Class Ful [Ex: RIP V1] . If there is a Directly connected Network with different Mask ; then Routers assumes this mask.
| Is This Answer Correct ? | 0 Yes | 0 No |
Hi Can anybody tell me how I can get CCNA certificate for beginners
Subnet the class C network address 198.67.25.0 into eight subnets. Why are the ‘all ones’ and ‘all zeroes’ subnets not used ?
NFS server + Solaris client + Linux client, all connected at GigE to the same switch. The Linux client is fast but the Solaris client is slow. Explain troubleshooting steps
What exactly happens after each system call in sockets, both at the client and at the server.
Define Satellite Networks
which is true a)bridge connects dissimiler LAN and protocol insensitive b)router connects dissimiler LAN and protocol insensitive c)gateway connects dissimiler LAN and protocol insensitive d)none of the above
Explain different kinds of Switching techniques.
Differentiate between stop-and wait ARQ and Go-back-N protocol.
Differentiate between Link state and Distance Vector Routing algorithm.
What are the two reasons for using layered protocols?
What are the advantages of cell switching that is used in ATM?
If A sends a message to B with encryption then key is a)A public key b)B public key c)A private key d)B private key