Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Tuesday, 25 February 2014
On 19:56 by Unknown in ccna discovery, ccna exploration, CCNA1, CCNA2, CCNA3, CCNA4, ip address, network, vlsm No comments
Configure
the network using VLSM.
Definition - What does Variable Length Subnet Mask (VLSM) mean?
A Variable Length Subnet Mask
(VLSM) is a numerical masking sequence, or IP address subset, based on
overall network requirements. A VLSM allows a network administrator to
use long masks for networks with few hosts and short masks for networks
with multiple hosts. A VLSM is used with a VLSM router and must have
routing protocol support.
A VLSM is also known as a classless Internet Protocol (IP) address.
A VLSM is also known as a classless Internet Protocol (IP) address.
Techopedia explains Variable Length Subnet Mask (VLSM)
Key VLSM features include:
- Simple network configuration
- Network IP addressing through empty subnet filling
- Greater efficiency than fixed-length subnet masks (FLSM)
- Streamlined routing, where a router functions only with a VLSM sequence, versus a full IP address
- Intermediate System to Intermediate System Protocol (IS-IS)
- Border Gateway Protocol (BGP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Cisco's Open Shortest Path First (OSPF)
Description: There are 2 switches (Switch 0 and Switch 1) joined
together, also attached with 3 end devices. Switch0 has 2 PC’s having network 1
and 1 PC having network 2. Switch1 has 1 PC having network 1 and 2 PC’s having
network 2. As it is VLSM, PC can only communicate with other PC that is
attached to another switch provided they should have the same network. PC with
one network cannot communicate with PC having different network also if they
are attached to the same switch.
Solution:
The given topology is:
Steps:
Following
are the PC’s attached to switch0:
Configuring steps for PC0:
Network 1
Ip address: 192.16.10.1
Subnet mask:
255.255.255.248
Configuring steps for PC1:
Network 1
Ip address: 192.16.10.2
Subnet mask:
255.255.255.248
Configuring steps for PC2:
Network 2
Ip address: 192.16.10.9
Subnet mask:
255.255.255.248
Following are the PC’s attached to
switch1:
Configuring steps for PC3:
Network 2
Ip address: 192.16.10.10
Subnet mask:
255.255.255.248
Configuring steps for PC4:
Network 2
Ip address: 192.16.10.11
Subnet mask:
255.255.255.248
Configuring steps for PC5:
Network 1
Ip address: 192.16.10.3
Subnet mask:
255.255.255.248
Output:
Ping command from PC4 to PC0 and PC2
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment