Solved

CIDR and supernetting

Posted on 2009-06-27
4
1,006 Views
Last Modified: 2012-05-07
What's d difference between supernetting and CIDR? Kindly summarize the following networks:
192.168.5.0/25
192.168.6.0/25
192.168.7.0/25
192.168.8.0/25
0
Comment
Question by:bobox00
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 14

Accepted Solution

by:
uucknaaa earned 300 total points
ID: 24727642
Hi

CIFR is supernetting.  Here is a great discussion on the topic:

http://www.firewall.cx/supernetting-intro.php

adn from this chart:

http://www.firewall.cx/supernetting-chart.php

you can describe the networks.
0
 
LVL 9

Assisted Solution

by:jfer0x01
jfer0x01 earned 200 total points
ID: 24727959
Classless Inter Domain Sub netting

they are interchangeable terms

basically, you have the subnet range /25 on a class C ip address

therefore, you have 2 usable subnetts 192.168.5.0.0 and 192.168.5.128 for each ip range and 128 available hosts in each range (126 usable)

Jfer
0
 
LVL 9

Assisted Solution

by:jfer0x01
jfer0x01 earned 200 total points
ID: 24727960
Err

192.168.5.0 and 192.168.5.128 not 192.168.5.0.0
0
 

Author Closing Comment

by:bobox00
ID: 31597545
Thanks
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question