31,376 views
67 votes
67 votes

An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: $245.248.128.0/20$. The ISP wants to give half of this chunk of addresses to Organization $A$, and a quarter to Organization $B$, while retaining the remaining with itself. Which of the following is a valid allocation of addresses to $A$ and $B$?

  1. $245.248.136.0/21 \text{ and } 245.248.128.0/22$
  2. $245.248.128.0/21 \text{ and }  245.248.128.0/22$
  3. $245.248.132.0/22 \text{ and }  245.248.132.0/21$
  4. $245.248.136.0/24 \text{ and }  245.248.132.0/21$

9 Answers

13 votes
13 votes
ans should be a) , the mask are /21 and/22 respectively, acc. to the half and quarter chunks requirement... and option b) can creat problem as address can get clashed between the two..
11 votes
11 votes

If take ip :245.248.128.0/21 then B have choice : 245.248.136.0/22 or 245.248.140.0/22

if A ip : 245.248.136.0/21 then B have choice : 245.248.128.0/22 or 245.248.132.0/22

 

So, correct answer A

0 votes
0 votes

Ans is A

edited by
Answer:

Related questions

2.6k
views
1 answers
2 votes
gatecse asked Dec 17, 2017
2,583 views
Generally, TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP becauseUDP is slower.DNS servers has to keep connections.DNS requests are generally very small and fit well within UDP segments.None of these.
44.3k
views
5 answers
40 votes
Kathleen asked Sep 22, 2014
44,325 views
What is the maximum height of any AVL-tree with $7$ nodes? Assume that the height of a tree with a single node is $0$.$2$3$4$5$
18.6k
views
5 answers
21 votes
Rucha Shelke asked Sep 17, 2014
18,633 views
Let S be an NP-complete problem and Q and R be two other problems not known to be in NP. Q is polynomial time reducible to S and S is polynomial-time ... following statements is true?R is NP-completeR is NP-hardQ is NP-completeQ is NP-hard
9.8k
views
5 answers
31 votes
Kathleen asked Sep 16, 2014
9,832 views
For a pipelined CPU with a single ALU, consider the following situationsThe ${j+1}^{st}$ instruction uses the result of the $j^{th}$ instruction as an ... of the above can cause a hazardI and II onlyII and III onlyIII onlyAll the three