Sie sind auf Seite 1von 4

Assignment-1 CIS-192 10 Marks

Questions: -
Ques. 1. What is the relevance of Subnetting? Explain the process of Subnetting.

Ques. 2. What is the difference between public IP and Private IP.

Ques. 3. What are the different reserve address ranges in Class A, B, C.

Ques. 4. What is Network ID and Broadcast ID?

Ques. 5. What is the role of a 2511 Cisco Access Server. How it is useful if we have

multiple routers to configure.

Answers: -
Answer 1.

Subnetting means how many computers with unique IP addresses can be available in the network.
This is determined, again, by its subnet mask. The number of computers is determined by
subtracting the last value in the subnet mask from 256. A 255.255.255.0 subnet mask has a last value
of 0, thus there are 256 maximum computers available. A 255.255.255.240 can host a maximum of
16 computers.

The importance of Subnetting are as follows: -

 Improves Network Performance and Speed: Subnetting enables you to ensure that information
remains in the subnetted network or broadcast domain, which allows other subnets to maximize
their speed and effectiveness. Subnetting also divides your network’s broadcast domains, enabling
you to control traffic flow as well as increasing network performance. It means that we are better off-
limiting traffic to a single subnet instead of letting it move from subnet to subnet.
 IP SUBNETTING =

 Reduces Network Congestion: Subnetting ensures that traffic destined for a device within a
subnet stays in that subnet, which reduces congestion. Through strategic placement of subnets, you
can help reduce your network’s load and more efficiently route traffic. Using a router to move traffic
between subnets results in no broadcast traffic or any information that doesn’t need to be routed
being moved to other subnets. Because the amount of traffic within each subnet is reduced, the
speed of each subnet is increased, which controls network congestion.

 Simplifying the process: Subnetting networks can break up large networks into smaller networks
which results in a simpler and narrower troubleshooting process.

The process of Subnetting large networks into smaller ones is known as Subnet Masking.
Subnet masking is typically used in large organizations that have different departments for each
operation. For example, an organization can use the 192.168.1.0 network for its internal or intranet
hosts. Certain administrative departments like Human Resources or Accounts, may want to be in a
restricted part of the network as they deal with sensitive personal information like employee data or
payroll information. As the default subnet mask of any Class C network is 255.255.255.0, every
computer in the network can communicate directly, store information, and send messages amongst
themselves. Subnet masking can be used to isolate the networks of various departments that
require a level of secrecy and isolation.
The Different Types of Networks
Generally, networks can be classified into three broad types or “classes” depending on their size.
 Class A: The biggest and broadest class of networks falls under the Class A type. They can consist
of up to 224 nodes and have an address ranging from 1.0000 to 126.0.0.0. The zeros get replaced
by the respective node addresses.
 Class B: They are smaller in comparison as compared to the Class A type of networks. Network
addresses range from 128.0.0.0 to 191.0.0.0. The last two zeros are replaced by the respective
node addresses.
 Class C: These are the smallest of networks that have a capacity of 254 nodes at the most. The
address range is from 192.0.0.0 to 223.0.0.0.

Answer 2.
Difference btw Public IP and Private IP address is as follows:
Public IP address is the address that is assigned to a computing device to allow direct access over
the Internet. A web server, email server and any server device directly accessible from the Internet
are candidate for a public IP address. A public IP address is globally unique and can only be assigned
to a unique device.

Therefore, A Private IP address is the address space allocated by Network Information System (Inter
NIC) to allow organizations to create their own private network. There are three IP blocks (Class A,
Class B and Cass C) reserved for a private use. The computers, tablets and smartphones lying inside
your home, and the personal computers within an organization are usually assigned private IP
addresses. A network printer residing in your home is assigned a private address so that only your
family can print to own printer and not anybody else.

Answer 3.
Different Address Ranges of Class A, B, C, D & E:-

Answer 4.
Network address is first address in the network and it is used for identification network segment. All
the IP addresses, using the same network address part, are in the same network segment. Because
network address is first address in the network, it cannot be random IP address, but it must mach
with network mask in a binary view, for last bits in the network address must be zeros, as long as
mask has zeros.

Broadcast address is the last address in the network, and it is used for addressing all the nodes in
the network at the same time. It means that IP packet, where the destination address is broadcast
address, is sent to all nodes of the IP network. It is important for remote announcements in network
segment. In some cases, it is used for attacking purposes by hackers or can cause problems in bigger
network segments.
Answer 5.

 The 2511 router allows for a maximum of 16 devices to be remotely accessible. The 2509 is an 8-
port access server and the 2511 is a 16-port access server. Accordingly, you can connect either up
to 8 or 16 devices to the corresponding access server.

o *Note: The 2509, 2510, 2511 and 2512 models do the same thing. But only
the 2509 and 2511 are Ethernet based. It enables organizations to connect
devices with an RS-232, RS-422 or RS-485 serial interface to a local area
network (LAN).

o It can be very simple device that do not offer any security functionality, such
as data encryption and user authentication. The primary application
scenario is to enable serial devices to access network server applications, or
vice versa, where security of the data on the LAN is not generally an issue.

o There are also many terminal servers on the market that have highly
advanced security functionality to ensure that only qualified personnel can
access various servers and that any data that is transmitted across the LAN,
or over the Internet, is encrypted.

Das könnte Ihnen auch gefallen