answersLogoWhite

0


Best Answer

If the destination is 192.168.12.135. and the subnet mask is 255.255.255.224, the the packet is sent to your mom's house.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: The subnet mask 255.255.255.224 is applied to a packet with a destination IP address of 192.168.12.135 What subnet is the packet sent to?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the University of Cambridge Department of Applied Mathematics and Theoretical Physics email address?

Their email address is: enquiries@damtp.cam.ac.uk


You have applied for change of address and ECNR in passport office how much time it will take?

I have applied for ECNR and I got my passport delivered back in one week via post. for your info. I have applied in Hyderabad RPO.


How was Washington's farewell address applied in the monroe doctrine?

That They Didn't Want Alliance With Foreign Countries


What is one layer of security that can be applied to ARP cache entries that could aid countering ARP spoofing?

static gateway address


What is a scientific notation A?

Scientific notation in chemistry is regulated by IUPAC (International Union of Pure and Applied Chemistry). The URL address is at this link.


What is the address of College of Applied Education and Health Science Meerut?

College of Applied Education and Health Science Gangotri, Roorkee Road, Meerut, U.P. Tel: +91-0121-261200 *You can ask any query on my message board, i am lecturer there.


What name is given to encryption that is applied and reapplied at each end of each link in communication path?

Link LayerEnd-to-end encryption is an encryption technique that ensures all data coming from your computer to the destination is completely encrypted.


What name is given to encryption that is applied and reapplied at each end of each link in a communication path?

Link LayerEnd-to-end encryption is an encryption technique that ensures all data coming from your computer to the destination is completely encrypted.


How do you get an email adresse password?

well, if its like an email address like yahoo, or something like that, u would just apply to "forgot password" and then it'll ask you to type in the email address u applied with, and they will send you the password there.


How do you write an ACL for cisco routers?

Access-lists are used for limiting the traffic say mainly for security purpose. Using access-list you can deny or permit the traffic from source address based on standard access list or deny or permit the traffic by classification of source or destination ip address, or by protocols . these are written in sequential order. So order of statement is very important . We should be clear of what to permit or deny .. sample config Standard access-list Router(config)#access-list 5 <permit> or <deny> <source ip address> Extended access-list Router(config)#access-list 111 <permit> or <deny> <protocol> <source ip address> <destination ip address> After creating access-list it will not be useful without applying on the interface where the traffic runs along the path. these should be applied in inbound direction or outbound direction of the interface as per our requirement. Most importantly when u want make changes , copy to text editor or notepad , do changes on them and remove the access-list config in the router and copy them fresh from the notepad.


What is the definition for point of application?

The point of application is where the force is applied; it is a mark or coordinate address where this happens. In writing it could be a dot or mark such as a decimal point or full stop.


What are logical and physical address?

Through logical address the system identify a network (source to destination). after identifying the network physical address is used to identify the host on that network. The port address is used to identify the particular application running on the destination machine.Logical Address: An IP address of the system is called logical address. This address is the combnation of Net ID and Host ID. This address is used by network layer to identify a particular network (source to destination) among the networks. This address can be changed by changing the host position on the network. So it is called logical address.Physical address: Each system having a NIC(Network Interface Card) through which two systems physically connected with each other with cables. The address of the NIC is called Physical address or mac address. This is specified by the manficture company of the card. This address is used by data link layer.Port Address: There are many application running on the computer. Each application run with a port no.(logically) on the computer. This port no. for application is decided by the Karnal of the OS. This port no. is called port address.