wat is last assignable host address in 209.165.201.0/27 network?
Answers were Sorted based on User's Feedback
Answer / vipin.lathawal
209.165.201.30 / 255.255.255.224 will be the Last IP
address in This Subnet
Is This Answer Correct ? | 43 Yes | 10 No |
Answer / pankaj dubey
subnet mask=255.255.255.224, range=32
and subent=209.165.201.192-209.165.201.223
and valid host=209.165.201.193-209.165.201.222
Is This Answer Correct ? | 14 Yes | 9 No |
Answer / ashraf .kalu
209.165.201.0/27
209.165.201.11100000
209.165.201.224
255.255.255.224
256-224=32
1rst subnet : 209.165.201.32
1rst valid ip : 209.165.201.33
lst valid ip : 209.165.201.62
Broad cast address : 209.165.201.63
next subnet : 209.165.201.64
Is This Answer Correct ? | 7 Yes | 2 No |
Answer / anantharaman
209.165.201.254 is the last assignable host address. we cant
assign 209.165.201.255 coz it s the broadcast address. /27
means jump wud be 32.
N/W address Host add range Broadcast addr
209.16.201.0 209.16.201.1-209.16.201.30 209.16.201.31
209.16.201.32 209.16.201.33-209.16.201.62 209.16.201.63
209.16.201.64 209.16.201.65-209.16.201.94 209.16.201.95
209.16.201.96 209.16.201.97-209.16.201.126 209.16.201.127
209.16.201.128 209.16.201.129-209.16.201.158 209.16.201.159
209.16.201.160 209.16.201.161-209.16.201.190 209.16.201.191
209.16.201.192 209.16.201.193-209.16.201.222 209.16.201.223
209.16.201.224 209.16.201.225-209.16.201.254 209.16.201.255
here yo can see the last host addr is 209.16.201.254.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / anantharaman
209.165.201.223/27 this ll be de last host address.. as
255.255.255.224 is the subnet mask, the first 3 portions
define the network portions and the last portion defines the
host portion so the possible host address ranges b'ween
1-224.. of this 1st address wud be the network address and
the last 1 be the broadcast address..so the available host
address ranges from 1-223,and the last host adddress would
be 209.165.201.223
Is This Answer Correct ? | 3 Yes | 2 No |
Answer / anantharaman
excuse me vipin.. tat s not de ip address. yo ve given de
subnet mask .. read de question carefully vipin..
Is This Answer Correct ? | 1 Yes | 2 No |
Tell us the name of best path in eigrp protocol?
Suppose there are 3 pc's pc1 pc2 and pc3 all are connected with each other pc 1 is able to ping pc2 and pc3 but pc2 and pc 3 not able to ping pc 1 then what is an issue troubleshoot it?
What is default size of hello packets in ospf?
Explain what is the default behavior of access-list?
A company running RIP V1 protocol on their 2 seperate networks, each nw has 14 routers, if the two nw wants to be merged with each other total no of routers will be 28. but rip metric is hop count(15). What needs to be done if this setup needs to be work ?
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic
Hey Folks how are you i guess some of guys are newly visitors of this site so let me introduce my self. I am jitendera kumar sinha working for cisco system (india)( Network engineer L2) and i was also a regular Visitors of this site and i have provided lots of answer and i do not know how many are correct :-) By the way i am here again to learn some thing and share my knowledge which is beyond CCNA Scope and and it is some where related to ccnp ( switching )and ccnp Security as i am pursuing ccnp security so i am going to start the topics from switching and will share my knowledge and try to brush-up my knowledge.... so let me know any topic in switching where you are facing difficulty and i will try to solve it so please post one topic and i will reply weekly as i am getting time on Sunday only
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode
what is leased line and if any issue occur what will u do thai is trouble shootin occurs let leased line is down
1 Answers Aptron, Cisco, HCL, Volvo,
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
What are some standards supported by the Presentation layer?