Question

-What are the benefits of Variable Length Subnet Masks (VSLMs)? -Of the four diagnostic steps used...

-What are the benefits of Variable Length Subnet Masks (VSLMs)?

-Of the four diagnostic steps used in the book, where would you find the most issues? Does one step cause more issues than others?

-Are invalid hosts labeled in your network a big issue? What can happen if this persists?

-What are your biggest fears with IP addressing? Where do you think this may be the biggest holdup in administration?

Please type the full answer. Thanks

no the questions are completed it

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.Benefits of VSLMs: They allow the segmentation of classless network into smaller part irrespective of fulfilling division into equal parts. This makes the use of address space efficently without wasting the allocated and defined space.

2.Of the four diagnostic steps the most of the issue is founded in step two that is:Gather more details, eliminate variables because it contains various sub components which are needed to b fulfilled like error messages, event logs and many more in order to move towards further step.

3.Yes,invalid hosts labeled in your network is a big issue as if the host labels are not correct than it definitely throw error as the address to reach the host network would get diverted and confused and even the time used for searching would b wasted and that would completely effect on the whole network.

4.The biggest fear with IP addressing is that is up assign is valid and is accessed by some other valid user then it may create data manipulation to some unknown IP address and this may threaten our privacy and even if our IP is known to someone than there might b change of our data getting into hands of other.  This may be the biggest holdup in administration as the data is endangered and might create the risk of losing the access of stealing of information which might be proven as the biggest risk for the administration as it would holdup the things in a bad way.

Add a comment
Know the answer?
Add Answer to:
-What are the benefits of Variable Length Subnet Masks (VSLMs)? -Of the four diagnostic steps used...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • I need Summary of this Paper i dont need long summary i need What methodology they used , what is the purpose of this...

    I need Summary of this Paper i dont need long summary i need What methodology they used , what is the purpose of this paper and some conclusions and contributes of this paper. I need this for my Finishing Project so i need this ASAP please ( IN 1-2-3 HOURS PLEASE !!!) SPECIAL ARTICLES tole of Monetary Policy C Rangarajan What should be the objectives of monetary policy? Does the objective of price stability conflict with the goal of achieving...

  • What happened on United flight 3411?What service expectations do customers have of airlines such ...

    What happened on United flight 3411?What service expectations do customers have of airlines such as United and How did these expectations develop over time? Thank You! In early April 2017, United Airlines (United), one of the largest airlines in the world, found itself yet again in the middle of a service disaster this time for forcibly dragging a passenger off an overbooked flight. The incident was to become a wake-up call for United, forcing it to ask itself what to...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT