Solved

CCNA: Cross Over Cable vs 255.255.255.0 (subnet mask)

Posted on 2009-07-13
1
376 Views
Last Modified: 2012-05-07
Hi,

1) This is related to the CCNA exam.
2) At one of the prep test, there is a case like this:
- Two PCs can get connection each other by using the Cross Over Cable or using the Subnet Mask 255.255.255.0

3) My questions: i) Could you explain why  using the subnet mask 255.255.255.0 (and i believe, it is still using the Straight cable instead of Cross Over Cable) would be able to connect the above two PCs?, ii) Is there any relationship between the Cross Over Cable and the Subnet Mask of 255.255.255.0

4) Thank you

tjie
0
Comment
Question by:tjie
1 Comment
 
LVL 19

Accepted Solution

by:
nodisco earned 500 total points
ID: 24846183
hi

The ability to connect the 2 pcs together is not determined by what subnet mask you use - as long as you have the same one.  Subnetting is a way of splitting your ip space into common "chunks" where all nodes that reside in a subnet can see each other without having to be routed.

In other words, if you connect both pcs using
192.168.1.1 255.255.255.0 and 192.168.1.2 255.255.255.0
or
10.0.0.1 255.0.0.0 and 10.0.0.2 255.0.0.0
they will still work - as long as their subnets are the same.  

FYI - you do use a cross over cable for connecting PC to PC.

If you have 2 PCs to connect together via a switch/hub, then you use straight through cables

hth
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the hope of saving someone else's sanity... About a year ago we bought a Cisco 1921 router with two ADSL/VDSL EHWIC cards to load balance local network traffic over the two broadband lines we have, but we couldn't get the routing to work consi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question