Why we are not using subnet mask of class A in class
C?before answering this question, just think upon if we do
this then we don't need to move to IPv6.
Answers were Sorted based on User's Feedback
Answer / s.m.feroz ahmed
Hi,
This is the Concept of Ip Addressing and this requires more
and more specific while assigning IP address Ip Addressing
is divided into 4 Class A,B,C,D where range of ip address
on which subnetting is done.So class A ip address Subnet
mask is 255.0.0.0 for class B it is 255.255.0.0 for Class C
255.255.255.0 and for class D it is hexa decimal which is
as 2^ .So for class C Ip addressing Subnet mask will always
be 255.255.255.0 range from 0 to 255 again like
255.255.255.0
255.255.255.1
255.255.255.2
255.255.255.3
255.255.255.4
|
|
|
|till 255.255.255.255.In this manner Ip addressing is
classified and the process of IP Addressing and Subnetting
is the main topic in Networking concept without the concept
of IP addressing noone can proceed further in Networking
field.
One will not accept entries into Ip addressing if Class C
Ip address and Subnet Mask of class A is assigned and will
through an error message.
| Is This Answer Correct ? | 3 Yes | 3 No |
Answer / jitendra
Good thought
But soory we can not do this one becoz the ip address is
not like some numric value and numric mask
in ip address each value determine the bit value (please
refefer the ip header topic in the ccna book)
or do one thing please write any ip address in the form of
binary format that is 0 and 1 format from there u will come
to know that why we canot replase the calss a mask with
class c mask
if we will do it then we have to change whole modern
physiss and we have to also devlaop the new binary consepts
and then i have to do engineering again quit impossible.
so we have to look towrds the ipv6
but this is a good thought
jitendra kumar sinha
Cisco system india private ltd
| Is This Answer Correct ? | 4 Yes | 7 No |
Which of the following is a layer 2 device? A.) Switch B.) Bridge C.) Repeater D.) Hub
Is hsrp is cisco proprietary or introduced by ieee?
Hi,can anyone explain me in brief about ccna security. waiting for your answer
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? A. ICMP B. UDP C. TCP D. TFTP E. FTP
What does the term Base refer to in 100BaseT A. cabling type B. singnal type C. 100 mode type D. spectrum used E. speed category
What is LSA? How many types of LSA used by OSPF version 2??
What is the usage of service password encryption?
Choose the following that are benefits to segmenting with router: A.) Flow Control B.) Manageability C.) Multiple Active Paths D.) Explicit packet lifetime control
Identify the 4 that are not LAN technologies? A.) HDLC B.) FDDI C.) 802.5 D.) HSSI E.) SDLC F.) Frame Relay
Whith the hierarchical numbering of IP addressing what determines the spoon of the address that will identify the network number? A. subnet mask B. dots between octets C. class of the first octet D. assignments of DHCP E. address resolution process