what is the binary value of loop back address
Answers were Sorted based on User's Feedback
As we everybody know.. Loop back address is
127.0.0.0 (Entire network address)
Here -
First Octate - 127
Second Octate - 0
Third Octate - 0
Forth Octate - 0
Convert those in binary - Using (128 64 32 16 8 4 2 1) code....
First Octate - 0 1 1 1 1 1 1 1
Second Octate - 0 0 0 0 0 0 0 0
Thirde Octate - 0 0 0 0 0 0 0 0
Fourth Octate - 0 0 0 0 0 0 0 0
So binary add of loopback address -
01111111 00000000 00000000 00000000
Note:
0 : Zero designate the corresponding decimal code value zero.
1 : One designate the corresponding decimal code value that
decimal number.
| Is This Answer Correct ? | 8 Yes | 4 No |
First of all 127.0.0.1 is the correct loopback address.
In binary that would be 01111111.00000000.00000000.00000001
(DEF)Loopback is a communication channel with only one endpoint. TCP/IP networks specify a loopback that allows client software to communicate with server software on the same computer. users can specify an IP address, usually 127.0.0.1, which will point back to the computer's TCP/IP network configuration. The range of addresses for loopback functionality is the range of 127.0.0.0 to 127.255.255.255. Similar to ping, loopback enables a user to test one's own network to ensure the IP stack is functioning properly.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / jitendera kumar
no sahin it is not wrong it is correct but that value is
not given in to the option
so i marked it wrong
i think iot may be 7
explantion
scince loopback is 127.0.0.1
so in that frst bit is always off
remanig 7
thus aqll bit are on thus the nuric value of lopback
address might be 7
but but but i am not dam sure this time i am also confused
not little bit much more.so do not get it that it is wright
i am 30%sure that it migh be
| Is This Answer Correct ? | 0 Yes | 0 No |
How cud u say binary value of 1st octate, coz we know IP
address consist of four octate, each of 8 bits.
XXXXXXXX.XXXXXXXX.XXXXXXXX.XXXXXXXX
I don't think it wud be a justified answer if we say "7".
coz he is nt asking the binary bit of first octate. so we hv
to take or assume the conventional 4 octate criteria.
Hi.. Jitendera, this may open up some more question.
heheheheh..!!!!
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jitendera kumar sinha
actualr sahin
my argue based on that consept
that is loop back address is 127.0.0.1
let consider its wild mask that is
0.255.255.255
that is match exct value of 1st octaet and three octet may
have value
try to ping 127.4.5.6
u will get reply through 127.0.0.1
ok that is 127 n/w bit is resved for the nic card
functionaly staus and we refred as it loop back address
now
scinselast three octet have any value then we are not aware
of that
scine first octet is fix for n/w id 127
then
from our most convanonal rule
128 64 32 16 8 4 2 1
0 1 1 1 1 1 1 1=127 that is 7 bit
scince that was in option so i mark it
i know u r corect but that option are not present in answer
sheet
and i am not bale to write that opton on answer sheet and
then mark
ha a ha haaaa
so i apply my wrong/wright consept and mark 7
i donot know it was wright or not so i placed it on all
interview .com
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / nikhil maggu
jeetu kaha se uthaye h ye sare questions tune???
n yeah guys 1 more query
0.xxx.xxx.xxx ye ips kya use hote h if yes then in which
scenario????
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / nikhil maggu
OK got the same
0.0.0.0 is used for default routing
but can we use sumthing like "0.0.0.xxx", in any
parctice????????
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jitu
han bhia nikhil
actualy if you use 0.0.0.xxx(1 to 255) then it will act as
wild mask bit
and you can use it
1 ospf routing protocol
2 access list
| Is This Answer Correct ? | 0 Yes | 0 No |
frends i am suffring from newfolder.exe virus in my server 2000 win how i have to remove it plz help me Jitendera sinha
What are the two types of transmission technology use in ccna?
Frame relay technology works on which layer of osi model?
What are the types of communication in ipv6 ?
What is Cisco's default encapsulation method on serial interfaces? A.) ANSI B.) Cisco C.) Q933a D.) HDLC
Can Anybody tell me if I wanna block all MP3,video sites from cisco 2600 router,how shall i proceed with ACL's?? Please post the steps for the following alonge with detail. Thanks to you all ..appriciated
Suppose there are 3 pc's pc1 pc2 and pc3 all are connected with each other pc 1 is able to ping pc2 and pc3 but pc2 and pc 3 not able to ping pc 1 then what is an issue troubleshoot it?
As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events
What are four benefits that can result from applying ISDN networking? (Choose four) A. Full time connectivity across the ISDN is spoofed by Cisco IOS routers using dial on demand routing (DDR) B. Small Once and Home Once sites can be economically supported with ISDN Basic Rate Interface (BRI) servkps C. ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone Network (PSTIC) backbone D. ISDN can be used as a backup service for a leased line connection between the remote and central chaps E. Modem racking and cabling can be eliminated by integration of digital modem cards on Cisco IOS Network Acess Servers (NAS)
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter