Answers were Sorted based on User's Feedback
Answer / bhisham
A fixed-length subnet mask FLSM is a sequence of numbers of
unchanging length that streamlines packet routing within
the subnets of a proprietary network. A subnet can be a
geographically defined gateway with its network number,
that packet is routed to its ultimate destination using a
subnet number. The FLSM is usually a string of binary
digits shown over the subnet number, telling the router
|Is This Answer Correct ?||28 Yes||4 No|
Answer / mahesh
Fixed Length Subnet masks : This terminology is used to CLASSFUL Addressing. Let us take a ClassFul Address whic belongs to CLASS A.
It is defaultly assumed to have a Mask as 8. Only 8 bits for Network &&& remaing 24 bits for Host. So ., Routers assume this Mask when they got an Routing update from a Routing Protocol which is Class Ful [Ex: RIP V1] . If there is a Directly connected Network with different Mask ; then Routers assumes this mask.
|Is This Answer Correct ?||0 Yes||0 No|
What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.
Can a machine with a single DNS name have multiple IP addresses? If so give a possible example. If not then explain why not?
what does FTP and TFTP stands for ?
working of ping and goopher?
Hi i need one website name.Which is used to identify or find the system or person who or which are logged in to the Internet or working with Internet.We can watch and access their drives(memory) also through that website.Could you please tell me which is that website.Please answer me.Advance thanks
not able to connect to SBI Visa payment server...Getting message like "Server not found"...."proxy protected by firewall"....how to resolve this issue?
how many types of backups are there & explain them in theory mode & practical mode?
What exactly happens after each system call in sockets, both at the client and at the server.
What is the difference between TFTP and FTP application layer protocols?
What is packet switching ? Explain two different approaches of packet switching. ?
what are the different ways to acheive the network security?
Why do data link layer protocols position the checksum in the trailer and not in the header ?