Questions and Answers About Networking: Subnets and Hub

1327 Words3 Pages

Q1:- Identify and explain the advantages of subnet?

Answer: A subnet is a logical grouping of network devices. which mention which hosts a part of a sub network number are come with the subnet is divided into their respective networks virtually defined sections allows the administrator to gain a lot of network subnets. When there as any organization network divided i nto subnets allows it to be connected to the Internet with a single shared network address. Subnets outside an organization can obtain multiple Internet Correspondence between subnet masks and IP address ranges defined mathematical formulas. Professionals use calculators subnet masks and mapping between addresses .. There are many advantages subnet are as follows.

Advantages of subnet :-

(1) Trouble shooting:- Troubleshooting is easier with the help of the network sub because it is easier to find a problem in a large network to small network.

(2) Security :- packets should be routed between subnets is that providing security to the network. By evaluating the security of network communication between network devices work the same for each additional user. Subnet sensitive resources, it is more difficult to implement security measures. It authorizes a different host or subnet firewall needs to be deployed, critical functions such as security measures to ensure that the firewall allows. These servers and other networks can be configured for other subnets can be accessed.

(3) Invisible to the public Internet: The implementation of the sub-networks so that the internal division of the network into subnets is only visible within the organization; organization to the rest of the Internet is still just one big, flat, Network.

(4) No Need To Request New IP Addresses...

... middle of paper ...

... Temporal Key Integrity Protocol (TKIP) to wrap in WEP encryption techniques and advanced security to overcome most of its weaknesses. That is why data privacy is possible with the help of WPA security.

Key management:- WPA is characterized by generation system / Key Management combines strong authentication and data privacy functions. Keys are created after successful authentication and through the subsequent four-way handshake between the station and the access point.

Data integrity:- TKIP includes a message integrity code at the end of each plain text message to ensure that counterfeiting messages. In WPA it includes encryption algorithms to give protection to the data, cryptographic integrity checks to prevent message modification and replay, and dynamic key management algorithms. WPA describes the new security association concept associated with 802.11.

More about Questions and Answers About Networking: Subnets and Hub

Open Document