From: Joe Chang (changjoe@earthlink.net)
Date: Wed Feb 12 2003 - 14:54:51 GMT-3
Generally, bit matching operations will need to be expressed in terms of
inverse masks.
----- Original Message -----
From: "ccie2be" <ccie2be@nyc.rr.com>
To: "Group Study" <ccielab@groupstudy.com>
Sent: Wednesday, February 12, 2003 1:44 PM
Subject: Inverse Mask versus Network mask
> Hi,
>
> I don't know how many people have this same problem but I have a difficult
> time remembering which type of mask is needed under which circumstance.
While
> I know that, at least sometimes, it's not an issue because the help (?)
system
> will tell you which type of mask to use is this true 100% of the time? If
> this isn't true 100% of the time, has anyone discovered (or is it
documented
> anywhere) under what circumstances one just has know which type of mask is
> needed?
>
> Has anyone found an easy way to remember when an inverse mask or network
mask
> must be used or come up with general guidelines?
>
> If, as I'm sure will happen under the stress of the lab exam, I mistakenly
use
> the wrong type of mask, is there anything I can do to quickly detect this
> mistake so that I don't waste alot of time chasing my tail?
>
> thanks, Jim
> .
.
This archive was generated by hypermail 2.1.4 : Sat Mar 01 2003 - 11:06:20 GMT-3