Log In
0 votes
A large number of consecutive IP address are available starting at Suppose that four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 addresses, respectively, and in that order.

what is the correct mask for the organization castle?

given answer:

my answer:

please correct me if my answer is wrong
in Computer Networks 542 views

How did you get @aambazinga .

Did you take 8000 first ?



no i have not taken 8000 first.

this is how i solved.

A: – written as

B: – written as

C: – written as

D: – written as


@Prateek Raghuvanshi

in your solution, tell me the network ID of B and C. if you find out, they come out to be the same. please check it once. and tell me is it possible to have two different subnets having the same network id?


@aambazinga yeah you are absolutely right , i made mistake .we can't take from 24 because both B and C will have same we have to take from 32.

could someone explain the process in detail?

1 Answer

0 votes

A: – written as (198.16.00000000.0 to 198.16.00001111.255)

B: – written as (198.16.00010000.0 to 198.16.00010111.255)

C: – written as (198.16.00100000.0 to 198.16.00101111.255)

D: – written as (198.16.01000000.0 to 198.16.01011111.255)

what is the correct mask for the organization castle?

This statement is not clear, kindly go through the addresses (bold are the network part and regular are the host part).

Related questions

1 vote
1 answer
Which of the following is/are restriction(s) in classless addressing? The number of addresses needs to be a power of $2$ The mask needs to be included in the address to define the block The starting address must be divisible by the number of addresses in the block All of the above
asked Jul 31, 2016 in Computer Networks jothee 1k views
0 votes
0 answers
Suppose that host A is connected to a router R1, R1 is connected to another router, R2, and R2 is connected to host B. Suppose that a TCP message that contains 900 bytes of data and 20 bytes of TCP header is passed to the IP code at host A for delivery ... they have not added IP header length while transmitting the packet. even though its not mentioned in the question, it has to be there, right?
asked Dec 27, 2018 in Computer Networks aambazinga 99 views
1 vote
0 answers
Which of the following risk may arise, when same key is used to encrypt directions of a communication channel, that are not present if using different keys in both direction? A Reflection attack B Denial of service C Eavesdropping attack D None of these
asked Nov 25, 2018 in Computer Networks Sandy Sharma 83 views