Solved

CIDR and supernetting

Posted on 2009-06-27
4
992 Views
Last Modified: 2012-05-07
What's d difference between supernetting and CIDR? Kindly summarize the following networks:
192.168.5.0/25
192.168.6.0/25
192.168.7.0/25
192.168.8.0/25
0
Comment
Question by:bobox00
  • 2
4 Comments
 
LVL 14

Accepted Solution

by:
uucknaaa earned 300 total points
ID: 24727642
Hi

CIFR is supernetting.  Here is a great discussion on the topic:

http://www.firewall.cx/supernetting-intro.php

adn from this chart:

http://www.firewall.cx/supernetting-chart.php

you can describe the networks.
0
 
LVL 9

Assisted Solution

by:jfer0x01
jfer0x01 earned 200 total points
ID: 24727959
Classless Inter Domain Sub netting

they are interchangeable terms

basically, you have the subnet range /25 on a class C ip address

therefore, you have 2 usable subnetts 192.168.5.0.0 and 192.168.5.128 for each ip range and 128 available hosts in each range (126 usable)

Jfer
0
 
LVL 9

Assisted Solution

by:jfer0x01
jfer0x01 earned 200 total points
ID: 24727960
Err

192.168.5.0 and 192.168.5.128 not 192.168.5.0.0
0
 

Author Closing Comment

by:bobox00
ID: 31597545
Thanks
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Opinions on email encryption & Voltage 3 118
Firewall port opening 2 73
wireshark 2 computers 8 72
Cisco ACS 5.4 "management" proc stuck in Restarting 2 76
In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question