Why we are not using subnet mask of class A in class
C?before answering this question, just think upon if we do
this then we don't need to move to IPv6.
Answers were Sorted based on User's Feedback
Answer / s.m.feroz ahmed
Hi,
This is the Concept of Ip Addressing and this requires more
and more specific while assigning IP address Ip Addressing
is divided into 4 Class A,B,C,D where range of ip address
on which subnetting is done.So class A ip address Subnet
mask is 255.0.0.0 for class B it is 255.255.0.0 for Class C
255.255.255.0 and for class D it is hexa decimal which is
as 2^ .So for class C Ip addressing Subnet mask will always
be 255.255.255.0 range from 0 to 255 again like
255.255.255.0
255.255.255.1
255.255.255.2
255.255.255.3
255.255.255.4
|
|
|
|till 255.255.255.255.In this manner Ip addressing is
classified and the process of IP Addressing and Subnetting
is the main topic in Networking concept without the concept
of IP addressing noone can proceed further in Networking
field.
One will not accept entries into Ip addressing if Class C
Ip address and Subnet Mask of class A is assigned and will
through an error message.
| Is This Answer Correct ? | 3 Yes | 3 No |
Answer / jitendra
Good thought
But soory we can not do this one becoz the ip address is
not like some numric value and numric mask
in ip address each value determine the bit value (please
refefer the ip header topic in the ccna book)
or do one thing please write any ip address in the form of
binary format that is 0 and 1 format from there u will come
to know that why we canot replase the calss a mask with
class c mask
if we will do it then we have to change whole modern
physiss and we have to also devlaop the new binary consepts
and then i have to do engineering again quit impossible.
so we have to look towrds the ipv6
but this is a good thought
jitendra kumar sinha
Cisco system india private ltd
| Is This Answer Correct ? | 4 Yes | 7 No |
Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack
Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP
Why is network segmentation a good idea when managing a large network?
When we use interface mode?
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
What is Data, management, native, default,trunk and access vlan?
Identify the 3 Internet layer IP protocols? A.) NetBios B.) IPX C.) ARP D.) IP E.) RARP
What is the advantage of vlan?
The command 'debug ip rip' will do which of the following? A.) Show Neighbor Info. B.) Display RIP routing updates. C.) Show routing table changes. D.) Show all IP traffic. E.) This is not a valid router command. F.) Cause the router to respond with 'Ambiguous command'
Name the command we give on privilege mode for coming back to user execution mode?
what is ip address and what is the difference between the ip address and mac address why we are not using mac address instead of ip address
What is the command use to add a banner to a cisco router configuration?