how to find network ID from IP address?without using network
calc...
Answers were Sorted based on User's Feedback
Answer / anil
173.60.40.0/20
s
subnet: 255.255.240.0
So, we have 4bits in 3rd octet. It means 16.
Try to divide the 40/16.
40 is not divisible by 16 it means it's a valid Ip.
So., the netork id would be 16*2=32.
173.60.32.0/20 is the network ID.
| Is This Answer Correct ? | 39 Yes | 8 No |
Answer / prabhu
u can find the network Id by starting ip ranges
A class 0-127 network id 255.0.0.0
b class 128-191 network id 255.255.0.0
c class 192-223 network id 255.255.255.0
| Is This Answer Correct ? | 44 Yes | 22 No |
Answer / divyng acharya
first identify network bits from the given mask.make all
the host bits 0.keep the network bits as it is. you obtain
your network address
| Is This Answer Correct ? | 15 Yes | 4 No |
Answer / mayur
we can find the network id from ip subnet.suppose if we
take 173.16.20.0/20 .The subnet mask will be 255.255.240.0
the subneting is done in the 3rd octet so,if you
substract 256-240 = 16. 16+16=32 .20 comes in between
16 to 31 the network ip will be 173.16.16.0 as the last
ip i.e 32 is considerd as broadcast ip it is not
considered
| Is This Answer Correct ? | 15 Yes | 5 No |
Answer / mukesh thakur
U CAN FIND NETWORK ID BY 1ST OCTET OF IP ADDRESS IN IPV.4
CLASS A RANGE START FROM 0-127,
CLASS B 128-192
CLASS C 192-223
CLASS D USED FOR MULTICAST
CLASS E USED FOR EDUCATION AND RESEARCH
AND 127.0.0.1 IS USED FOR LOOP BACK ADDRESS
| Is This Answer Correct ? | 17 Yes | 12 No |
Answer / fun e
We can find the network ID from Ip using subnet.Suppose if
we take 192.168.20.0/20.
Now subnet is 255.255.240.0
Here we have 2 full octates and 4 bits in 3rd octet
position.I.e 16.
So the networks will come like this
192.168.1.0
192.168.16.0
192.168.32.0.....
Our ip address 192.168.20.0 is in 192.168.16.0 network.So
192.168.16.0 is the network ID.
| Is This Answer Correct ? | 12 Yes | 8 No |
Answer / mukesh
this is ur class B ip address because we check it from 1st
octet and 173 is comes between class b 128-191..
so u can check it from 1st octet
in class a 1 network id and 3 host id
in class b 2 network id 2 host id
in class c 3 network id 1 host id
| Is This Answer Correct ? | 10 Yes | 8 No |
Answer / kis
we can find the network id from ip subnet
suppose ip address is 192.16.20.0/20
subnet mask will be 255.255.240.0
as you can see three bytes are easy to determine.but second
byte need bit-wise AND operation.if two bits are both (1s)
the result will be (1)otherwise result will be zero.
write 20 and 240 in decimal form
128 64 32 16 8 4 2 1
20 : 0 0 0 1 0 1 0 0
240 : 1 1 1 1 0 0 0 0
----------------------------
16 : 0 0 0 1 0 0 0 0
| Is This Answer Correct ? | 5 Yes | 4 No |
Answer / cibin albin
the network id will be the first ip address of a particular
host ip address.For example if take ip address as
192.168.20.10 then the network address orNetwork ID will be
192.168.20.0
| Is This Answer Correct ? | 9 Yes | 9 No |
What does a router change in a packet when it forwards a packet to the next hop? * A: Destination physical address * B: Destination network address * C: Destination network address and the destination physical address
The default routing protocol for IPX is IPX RIP. How do you view the routing updates sent and received by the router? A.) debug ipx routing B.) debug ipx routing activity C.) debug rip D.) show ipx routing E.) sh ipx F.) debug ipx rip
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address
What is the difference between the communication and transmission?
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
Which 3 statements describe default encapsulation and LMI type configuration? A.) There are only four encapsulations and 3 LMI type options B.) The LMI type config term options C.) In release 11.3 the LMI type is autosensed D.) The default LMI is Cisco E.) IETF encap must be configured unless the connecting routers are both cisco
Differentiate between broadcast domain and collision domain
Which command will give the following output: Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int * 0 CTY - - - - - 0 0 0/0 - 1 AUX 9600/9600 - - - - - 0 0 0/0 - * 2 VTY - - - - - 2 0 0/0 - 3 VTY - - - - - 0 0 0/0 - 4 VTY - - - - - 0 0 0/0 - 5 VTY - - - - - 0 0 0/0 - 6 VTY - - - - - 0 0 0/0 -
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
Identify the 4 that are WAN technologies? A.) HDLC B.) FDDI C.) 802.5 D.) HSSI E.) SDLC F.) Frame Relay
What is the difference between unicast, multicast, broadcast, and anycast?
Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verify connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured