how to find network ID from IP address?without using network
calc...
Answers were Sorted based on User's Feedback
Answer / niraj mishra
Hello friends,
When you are talking about /20, that means the host derived
from 3rd octet, the subnet in binary will as
11111111.11111111.11110000.00000000
so in third octet 1 start from 16 position so block size
will 16, now if we have given the ip 173.16.20.0/20, so it
means that it belongs to the network 173.16.16.0 and
possible ip address will as 172.16.16.1 to 172.16.16.30,
because 172.16.16.31 will broadcast address.
In other word we can say that we just have to check block
size in appropriate octet, which will the proper network
address..... please reply am i right
Is This Answer Correct ? | 3 Yes | 5 No |
Answer / satyendra kumar
we see the first octet of the IP.which shows the network id .
Is This Answer Correct ? | 0 Yes | 3 No |
Which of the following are valid WAN terms? A.) DTE B.) DCE C.) Demarc D.) CPE
Which three functions are supported by connection oriented servkps? (Choose three) A. connection parameters are synchronized B. any loss or duplication of packets can be corrected C. the data packet is independently routed and the service does not guarantee the packet will be processed in order D. a data communication path is established between a requesting entity and the peer device on the remote end system
What are the different types of passwords that you can use in cisco routers?
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A. 4 B. 30 C. 60 D. 62 E. 112 F. 124
What is the difference between csma/cd and csma/ca?
4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN
what is distance vector protocol link state protocol and what is the diffrence between them
What is an advantage of local area network (LAN) segmentation? A. smaller collision domains B. elimination of broadcasts C. decreased cost of implementation D. larger number of users within the same domain
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
Which 2 commands shows the Cisco IOS filename? A.) show IOS B.) show ver C.) show flash D.) show mem E.) show NVRAM