Topic > Questions and Answers on Networking: Subnetting and Hubs

Q1:- Identify and explain the benefits of subnetting? Answer: A subnet is a logical grouping of network devices. which mentions which hosts are part of a subnet the number provided with the subnet divided into the respective networks, virtually defined sections allows the administrator to get many network subnets. When there is a network of any organization divided into subnets it allows you to connect to the Internet with a single shared network address. Subnets outside an organization can get multiple Internet matches between subnet masks and IP address ranges defined with mathematical formulas. Professionals use calculators, subnet masks, and address mappings. The advantages of the subnet are as follows. Advantages of Network Subnet:-(1) Troubleshooting:- Troubleshooting is easier with the help of Network Subnet because it is easier to find a problem from a large network to a small network.(2) Security: i Packets must be routed between subnets to ensure network security. By evaluating the security of network communication between network devices, it works the same way for each additional user. Sensitive subnet resources, it is more difficult to implement security measures. Authorizes the need to deploy a different host or subnet firewall, critical functions such as security measures to ensure the firewall allows. These servers and other networks can be configured to access other subnets.(3) Invisible to the public Internet: the implementation of subnets so that the internal division of the network into subnets is visible only within the organization; compared to the rest of the Internet it's still just one big flat network.(4) You don't need to ask for new IP addresses... half of the paper... Temporal Key Integrity Protocol (TKIP) to wrap in WEP encryption techniques and security advanced to overcome most of its weaknesses. That's why data privacy is possible with the help of WPA security. Key Management: - WPA is characterized by a key generation/management system that combines strong authentication and data confidentiality functions. Keys are created after successful authentication and through the subsequent four-way handshake between the station and the access point. Data Integrity: - TKIP includes a message integrity code at the end of each plain text message to ensure that messages are spoofed. WPA includes encryption algorithms to protect data, cryptographic integrity checks to prevent message modification and replay, and dynamic key management algorithms. WPA describes the new concept of security association associated with 802.11.