What is subnetting and supernetting and its uses?
Answers were Sorted based on User's Feedback
Answer / pandi
subnetting used to divide a network into multiple networks.
but, supernetting used to a add multiple network into a
same network.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / nikhil
Answer to this Question
So what i have to do so that the all three subnet show
in routing table-- quite simple think and answer.
TURN OFF AUTO SUMMARIZATION FOR EIGRP
Router1 (config)# no auto=summary.
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / jitendera
Ok Pandi
I have one question for you and all of you guys
if Subneting is something like breaking a Single block of ip
in the multiple block of ip address and Suppernating is
combining the Multiple ip block in to single block am i wrong ?
Now the Question is that
i am using a Routing protocol say eigrp
and i am configuring like
router eigrp 100
network 10.10.10.0 0.0.0.0.255
network 10.10.20.0 0.0.0.0.255
network 10.10.30.0 0.0.0.0.255
now if i make the command
show ip route
it will show
10.0.0.0/16 has been thorugh EIGRP and there will no entry
of 10.10.20.0 and 10.10.30.0
1) So what i have to do so that the all three subnet show
in routing table-- quite simple think and answer
2) if you get the answer then tell me at last what is the
difference between Subnating and suppernating
Think like genius not like me :-)
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / ajun mukund
A subnet mask is used to identify which parts of the ip
address are the network parts and which parts are the host
parts.
e.g
IP 192.168.1.10
Subnet mask : 255.255.255.0
This indicates that the first 3 parts of the IP address are
used to identify the Network.
Let's take a class C mask of 255.255.255.0 - If we borrow 2
network bits, the mask changes to 255.255.252.0, this is
called Supernetting. If on the other hand we borrow two host
bits, the mask changes to 255.255.255.192, this is called
subnetting.
Supernetting therefore allows you to have more hosts on one
network, whilst subnetting allows you to have more inter
networks but with less hosts.
.... So without subnetting or supernetting these two
addresses would be on same network:
IP 192.168.1.10
Subnet mask : 255.255.255.0
IP 192.168.1.233
Subnet mask : 255.255.255.0
With Subnetting, we have borrowed one bit (from the host
part) which in binary looks like this 1000000, now this
splits the network into two networks so these addresses are
now on different networks.
IP 192.168.1.10
Subnet mask : 255.255.255.128
IP 192.168.1.233
Subnet mask : 255.255.255.128
With Supernetting, we borrow one bit from the network part
so the last two parts of subnet mask now look like this
11111110.00000000. These two are on the same network now
because the number of host addresses has increased.
IP 192.168.1.10
Subnet mask : 255.255.254.0
IP 192.168.2.125
Subnet mask : 255.255.254.0
| Is This Answer Correct ? | 0 Yes | 1 No |
You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 Answers Intel, Quark, Wipro,
Explain isakmp ?
Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version
MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation
Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels
9. Which STP state prevents the use of looped paths? A. Blocking B. Listening C. Learning D. Forwarding
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable
Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination
What is the key advantage of using a switches?
As the system administrator, you enter the following commands at the command prompt: ipx routing access-list 800 permit 2b 4d int e0 ipx network 4d ipx access-group 800 out int e1 ipx network 2b int e2 ipx network 3c What did these command accomplish? A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0. B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0. C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.