what is difference between subnet-mask and wildcard mask?
Answers were Sorted based on User's Feedback
Subnet Mask:
Subnet mask is a 32 bits value which
differentiate the host portion & network portion of an IP
address.
Where network portion is designate by the 1's & host portion
0's.
Wild card Mask:
Wild card mask defines which IP addresses are
allowed & which are blocked.
Where 0's defines the accurate match where non zero value
defines any value on the corresponding octete.
Is This Answer Correct ? | 30 Yes | 5 No |
Answer / jitendera sinha
well shahin good to see you here again
subnet mask---subnet mask is the value which determine from
which class the ip address is realted.
wild mask-- Wild card mask defines which IP addresses are
allowed & which are blocked and used in extended access
list and ospf also.
Is This Answer Correct ? | 7 Yes | 2 No |
Answer / sarbjeet sohi
Subnet-mask is used to match contigous bits, means in subnet mask there is no 1 after 0. Its always from high (1's) to low (0's).
EXAMPLE:- subnetmask-----255.255.0.0
BInary----- 11111111.11111111.00000000.00000000
In above example there is continous 1's and continous 0's
It cannot be like this :-
11111111.00000000.11111111.00000000 = 255.0.255.0
Because subnet mask is used only for the classful and when CIDR comes WILDCARD mask is launched. The above bit pattern in WCM tells to match 2nd and 4th octect.1st and 3rd can be ignored.
Is This Answer Correct ? | 1 Yes | 2 No |
Answer / s.m.feroz ahmed
Hi,
Subnet mask is classified on class A,B,C,D,E at present we
are making use of class C ip addressing and the series of
class C starts from 191 to 227 so depending on class subnet
mask is defined for Class A subnet mask is 255.255.255.0
for Class B it is 255.255.0.0 and class C it is 255.0.0.0
and wildcard mask is just opposite to Subnet mask and it is
defined as 0.0.0.255 .
Is This Answer Correct ? | 6 Yes | 9 No |
Answer / anshul johari
SUBNET- MASK IS A 32-BIT IP ADDRESS. AND IP ADDRESS TWO
DIVIDED NETWORK ID AND HOST ID. AND SUBNET MASK A SETTING IN
ALL BITS REPRESENTED "1" IS SIGNIFICANT AND "0" IS IN-
SIGNIFICANT.
WILDCARD MASK IS NOTHING BUT OPPOSITE TO SUBNET MASK SUBNET
MASK A SETTING IN ALL BITS REPRESENTED "0" IS SIGNIFICANT AND
"1" IS IN-SIGNIFICANT.
Is This Answer Correct ? | 8 Yes | 12 No |
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
How does L2TP process?
What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels
What is the command for change serial cost?
Name the protocol which can do load balancing on unequal cost also?
What are the different types of the password used in securing a cisco router?
What was the key reason the International Organization for Standardization released the OSI model? A. users could access network servers faster B. different vendor networks could work with each other C. the industry could create a standard for how computers work D. network administrators could increase the overall speed of their network
The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability
What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC