1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
4 years ago
12

____ gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can there

fore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.
Computers and Technology
2 answers:
Sedbober [7]4 years ago
7 0

<u>Classless Inter-Domain Routing</u> gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can therefore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

<u>Explanation</u>:

A router is a networking device that helps in connecting multiple networks. <em><u>Classless Inter-Domain Routing (CIDR) </u></em>is used for creating IP addresses and IP routing. CIDR was introduced in the year 1993 by <em><u>“The Internet Engineering Task Force”</u></em>. The classful network design was replaced by CIDR in the Internet.

The IP addresses are responsible for sending the particular information packets to specific computers. Classless inter-domain routing helps in improving the allocation of IP addresses.

poizon [28]3 years ago
7 0

<u>Classless Inter-Domain Routing </u>gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can therefore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

Explanation:

CIDR refers to the  Classless Inter-Domain Routing

It  is  a type of an IP addressing scheme that improves the allocation of IP addresses. It it ignores the traditional A, B, and C class designations for IP addresses and can therefore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

The problem with the old method of IP routing was that  an error would occurred  whenever  an organization required more than 254 host machines and hence it would no longer fall into class C category  but it will fall in  class B category . which meant that   the organization needs to use a class B license even if they have less than 65,535 hosts. thus if an organization  requires only  2,500 hosts, they end up  wasting 63,000 hosts by holding a class B license which further  decrease the availability of IPv4 addresses .

You might be interested in
You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP
Ivan

Answer:

Option B (Static NAT) would be the correct choice.

Explanation:

  • Static NAT seems to be a method of NAT methodology used to navigate as well as monitor internet usage from some kind of specific public IP address to something like a private IP address.
  • Everything always allows the provision of web access to technology, repositories including network equipment inside a protected LAN with an unauthorized IP address.

Some other decisions made aren't relevant to the situation in question. So the above alternative is indeed the right one.

8 0
3 years ago
Generally speaking, the _______ the risk, the _______ the potential return or loss
givi [52]
<span>The correct answer is higher for both blank spaces.

We all know the famous saying: "No risk, no reward". What is true is the higher your risk you also have a higher degree of reaping a higher rewards. But the opposite is also true, the more you risk the more you stand to lose. In stockbroker business this is best exemplified, as you can se brokers trying to predict the stock market in order to make greater profits. Gambling is also the good example of this. </span>
6 0
3 years ago
Read 2 more answers
What is technology and how does it work?
Yuki888 [10]
Technology is what we use today to access internet and social media!!!
8 0
4 years ago
This network passes data most of the time, but sometimes for reasons unknown to the junior network engineer in charge of monitor
Kaylis [27]

Answer:

The characteristic that is violated is Availability.

Explanation:

  • The network is passing data at mostly, it means performance is good. Junior network engineer is doing his job well then there is minimum chance of network failure or lack of manageability.
  • The scalability; range of computing capabilties can be managed by the engineer.
  • However, sometimes the core router might get crashed due to unavailability of the network that is not under the control of the engineer.

8 0
3 years ago
FREE 10 POINTS THE EASIEST QUESTION EVER I AM NEW SO I DONT KNOW HOW TO MARK SOMEONE THE BRAINLEAST ????????????????????????????
umka2103 [35]

Usually you can just report the question as useless or just report in in general. But I myself have read some answers and they dont even pertain to the question, it confuses me alot

8 0
4 years ago
Read 2 more answers
Other questions:
  • Assume that an int variable age has been given a value. Assume further that the user has just been presented with the following
    14·1 answer
  • Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.
    6·2 answers
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the databas
    6·1 answer
  • A check list should be based on that apply to your industry.
    11·2 answers
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • Which of the following is a message sent from one person to another using the Internet?
    13·2 answers
  • How to disable Fortinet?
    12·1 answer
  • Which best describes how information is sent on the internet?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!