CN OneGo
CN OneGo
Aim : To implement Star Topology using Hub using Cisco Packet Tracer.
Introduction –
In a Star Topology, each device has a dedicated point to point link only with a central
device (controller) called Hub. The devices are not connected directly to each other. It is one
of most prevalent computer network configurations. All the peripheral devices are called
clients, while the central network device serves as a server.
Advantages –
1. Centralized management of the network, through the use of the central computer,
HUB or Switch.
2. Easy to add another computer to the network.
3. If one computer on the network fails, the rest of the network continues to function
normally.
4. The Star topology is used in Local Area Networks [LAN].
1
Disadvantages –
1. Can have a higher cost to implement as the cost of hub is very high.
2. If the central device fails complete network gets affected.
3. Mobility of devices get affected due to central device.
4. The central hub determines the performance and number of nodes the network can
handle.
Working of Hub –
The Hub is a less smart device. It works on Open System Interconnection (OSI) model.
They connect multiple devices to it. The hub cannot filter data i.e. it cannot identify the
destination of data. So the hub broadcasts data or message to every computer or other devices
altogether connected to it. And it ensures that it will reach to its intended destination that
generates a lot of traffic on the network.
2
Result –
3
Experiment – 2
Aim : To implement Star Topology using Switch using Cisco Packet Tracer.
Objective –
In a Star Topology, each device has a dedicated point to point link only with a central
device (controller). In this experiment, we will use Switch . The devices are not connected
directly to each other. It is one of most prevalent computer network configurations. All the
peripheral devices are called clients, while the central network device serves as a server.
Advantages –
1. Centralized management of the network, through the use of the central computer,
HUB or Switch.
2. Easy to add another computer to the network.
3. If one computer on the network fails, the rest of the network continues to function
normally.
4
4. The Star topology is used in Local Area Networks [LAN].
Disadvantages –
1. Can have a higher cost to implement as the cost of Switch is very high.
2. If the central device fails complete network gets affected.
3. Mobility of devices get affected due to central device.
4. The central Switch determines the performance and number of nodes the network
can handle.
Working of Switch –
The Switch is a very smart device. It works on Open System Interconnection (OSI)
model. They connect multiple devices to it. When a data frame arrives at any port of a network
switch, it examines the destination address, performs necessary checks and sends the frame to
the corresponding device(s). It supports unicast, multicast as well as broadcast
communications. It uses MAC addresses (addresses of medium access control sublayer) to send
data packets to selected destination ports. When a packet enters the switch, the switch reads its
header, then matches the destination address or addresses and sends the packet out through the
appropriate ports that lead to the destination devices. Transmission mode is full duplex, i.e.
communication in the channel occurs in both the directions at the same time. Due to this
collision do not occur. Switches generally have higher number of ports as well. And it uses
packet switching techniques to receive or send data packets (data or messages) from the source
to destination device. As we know Switches use MAC addresses to identify the destination
devices, but in case if MAC address is not known then the message or data packet is flooded
to all ports (connected devices).
5
Result –
6
Experiment – 3
Aim: To Connect, configure and route devices in a network using Static
Routing Protocol.
THEORY –
Static routing is a form of routing that occurs when a router uses a manually configured
routing entry rather than information from a dynamic routing traffic. In many cases, static
routes are manually configured by a network admin. by adding in entries into a routing table,
though this might not always both cases. In static routing, static routes are fixed and do not
change. Static routing is usually used on a router to maximize routing efficiency and to provide
backups in the event that dynamic routing information fails to be exchange.
Merits –
1. In static routing, routes remain static configured by admin.
2. Use less bandwidth than dynamic routes (dynamic routing discussed in
experiment)
3. No CPU cycles are required to calculate and analyse routing updates.
Demerits –
1. Since static routes are manually configured by network admin so it is error
prone (error might be made by admin while configuring or routing network).
2. Static routing is not fault tolerance. This means that when there is a change in
the network or failure occurs between two statically defined devices, traffic will not
be re-routed automatically.
3. Administrative overhead is more in case of static routing.
4. Static routes typically take precedence over routes configured with a dynamic
routing protocol. This means that static routes may prevent routing protocols from
working as intended. A solution is to modify administrative distance.
7
Figure 3.1: Interconnection of two networks using Routers
Uses –
1. You should use a static route in environments where network traffic is predictable
and where network des is simple.
2. Static routes are useful for specifying a gateway of last resort (a default router to
which all un-r table packets are sent).
8
Router Commands –
Router 0:
Continue with configuration dialog? [yes/no): no
Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#ip address 10.0.0.2 255.0.0.0
Router(config-if)#no shut
Router(config-if)#
Router(config-if)#exit
Router(config)#
Router(config)#int s2/0
Router(config-if)#ip address 30.0.0.1 255.0.0.0
Router(config-if)#no shut
Router(config-if)#
Router(config-if)#exit
Router(config)#
Router 1:
Continue with configuration dialog? [yes/no): no
9
Press RETURN to get started!
Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#ip address 20.0.0.2 255.0.0.0
Router(config-if)#no shut
Router(config-if)#
Router(config-if)#exit
Router(config)#
Router(config)#int s2/0
Router(config-if)#ip address 30.0.0.2 255.0.0.0
Router(config-if)#no shut
Router(config-if)#
Router(config-if)#exit
Router(config)#
10
Result –
Figure 3.2: Result of sending messages from pc0 to different pc’s of another network
11
Experiment – 4
Aim: To demonstrate the Dynamic Routing Configuration using RIP Protocol.
THEORY –
Dynamic Routing: Dynamic routing is a networking technique that provides optimal
data routing. Unlike static routing, dynamic routing enables routers to select paths according
to real-time logical network layout changes. Dynamic routing uses multiple algorithms and
protocols.
RIP Protocol: Routing Information Protocol (RIP) is a dynamic routing protocol that
uses hop count as a routing metric to find the best path between the source and the destination
network. It is a distance-vector routing protocol that has an AD value of 120 and works on the
Network layer of the OSI model. RIP uses port number 520
Hop Count –
Hop count is the number of routers occurring in between the source and destination
network. The path with the lowest hop count is considered as the best route to reach a network
and therefore placed in the routing table. RIP prevents routing loops by limiting the number of
hops allowed in a path from source and destination. The maximum hop count allowed for RIP
is 15 and a hop count of 16 is considered as network unreachable.
Features of RIP –
12
4. Routers always trust routing information received from neighbour routers. This is also
known as Routing on rumours.
Router Commands –
Router 0:
Would you like to enter the initial configuration dialog? [yes/no]: n
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface fa0/0
Router(config-if)#ip address 10.0.0.3 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Router(config-if)#exit
Router(config)#interface se2/0
Router(config-if)#ip address 30.0.0.1 255.0.0.0
Router(config-if)#no shutdown
13
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router#
%LINK-5-CHANGED: Interface Serial2/0, changed state to up
Router 1:
Would you like to enter the initial configuration dialog? [yes/no]: n
Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface fa0/0
Router(config-if)#ip address 20.0.0.3 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Router(config-if)#exit
Router(config)#interface se2/0
Router(config-if)#ip address 30.0.0.2 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface Serial2/0, changed state to up
Router(config-if)#exit
Router(config)#router rip
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changed state to up
Router(config-router)#network 10.0.0.0
Router(config-router)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router#
14
Result –
Figure 4.2: Result of sending messages from pc2 to different pc’s of another network
15
Experiment – 5
Aim: To implement Routing Information Protocol (RIP) Version 2 using Cisco
Packet Tracer.
Theory: Routing Information Protocol (RIP) protocol are the intradomain (interior) routing
protocol which is based on distance vector routing and it is used inside an autonomous system.
Routers and network links are called node. The first column of routing table is destination
address.
RIP Version 2 –
Due to some deficiencies in the original RIP specification, RIP version 2 was developed in
1993. It supports classless Inter-Domain Routing (CIDR) and has the ability to carry subnet
information, its metric is also hop count and max hop count 15 is the same as rip version 1. It
supports authentication and does subnetting and multicasting. An auto summary can be done
on every router. In RIPv2 Subnet masks are included in the routing update. RIPv2 multicasts
the entire routing table to all adjacent routers at the address 224.0.0.9, as opposed to RIPv1
which uses broadcast (255.255.255.255).
Merits:
1) It’s a standardized protocol.
2) It’s VLSM compliant.
3) Provides fast convergence.
16
4) It sends triggered updates when the network changes.
5) Works with snapshot routing – making it ideal for dial networks.
Demerits:
1) Max hop count of 15, due to the ‘count-to-infinity’ vulnerability.
2) It works only on hop count.
3) No concept of neighbours.
4) Exchanges entire table with all neighbours every 30 seconds (except in the case
of a triggered update).
IP Configuration:
Router1 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0
17
Router2 –
Router(config-if)#no shutdown Router(config-if)#exit Router(config)#interface serial 0/0/0
Router(config-if)#ip address 10.0.0.1 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/1 Router(config-if)#ip address
12.0.0.1 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#
Router3 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.3.1 255.255.255.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/0 Router(config-if)#ip address
11.0.0.2 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/1 Router(config-if)#ip address
12.0.0.2 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#
RIP v2 CONFIGURATION:
Router1 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router rip
18
Router(config-router)#version 2
Router(config-router)#network 10.0.0.0
Router(config-router)#network 12.0.0.0
Router(config-router)#network 192.168.1.0 Router(config-router)#exit
Router(config)#
Router2 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 10.0.0.0
Router(config-router)#network 11.0.0.0
Router(config-router)#network 192.168.2.0 Router(config-router)#exit
Router(config)#
Router3 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 11.0.0.0
Router(config-router)#network 12.0.0.0
Router(config-router)#network 192.168.3.0 Router(config-router)#exit
Router(config)#
19
RESULT:
20
Experiment – 6
Aim: To implement Open Shortest Path First Routing Protocol (OSPF) using
Cisco Packet Tracer.
THEORY: Open Shortest Path First (OSPF) is one of the Interior Gateway Protocol (IGP),
which helps to find the best routing path between the source and the destination router using
its own shortest path first (SPF) algorithm. It is a Link-state routing protocol that is used to
distribute routing information about data packets within a large Autonomous System.
When it is configured, it listens to its neighbours in the networks, and it gathers all the link
state data available. This data is then used to make a topology map that contains all available
paths in the network. This database is saved for use, and we call it Link State Database.
Once the Link State Database is made, it is used to calculate the shortest path to
subnets/networks using an algorithm known as Shortest Path First, developed by Edgar W
Dijkstra. OSPF creates 3 tables:
•Routing Table: It contains currently working best paths that will be used to forward traffic
between two neighbours.
•Neighbour Table: This contains all discovered Open Short Path First neighbours.
•Topology Table: This one contains the entire road map of the network. This road map includes
all the available Open Short Path First routers and keeps calculated data about best and
alternative paths.
21
Merits:
1) Open Short Path First is easily scalable, meaning with a very little amount of
hassle, we can scale it to use in a very big network.
2) Open Shortest Path First Protocol has full support for subnets.
3) Open Short Path First sends small hello packets to verify link operations and ignore
transferring large tables.
4) In Open Short Path First, routes can be tagged to ease interoperation with arbitrary
values.
5) Open Short Path First is able to route packets based on their type of service field.
Demerits:
1) It is a processor-intensive protocol to use.
2) Because it maintains more than one copy of routing information, it consumes more
memory.
3) It is a more complex protocol to understand and learn compared to other Internet
Protocols.
22
IP Configuration:
Router1 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/0 Router(config-if)#ip address
10.0.0.1 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/1 Router(config-if)#ip address
12.0.0.1 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#
Router2 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.2.1 255.255.255.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/0 Router(config-if)#ip address
10.0.0.2 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/1 Router(config-if)#ip address
11.0.0.1 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#
Router3 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.3.1 255.255.255.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/0 Router(config-if)#ip address
11.0.0.2 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/1 Router(config-if)#ip address
12.0.0.2 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#
23
OSPF Configuration:
Router1 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router ospf
1
Router(config-router)#network 10.0.0.0 0.255.255.255 area 0
Router(config-router)#network 12.0.0.0 0.255.255.255 area 0
Router(config-router)#network 192.168.1.0 0.0.0.255 area 0 Router(config-router)#exit
Router(config)#
Router2 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router ospf
1
Router(config-router)#network 10.0.0.0 0.255.255.255 area 0
Router(config-router)#network 11.0.0.0 0.255.255.255 area 0
Router(config-router)#network 192.168.2.0 0.0.0.255 area 0 Router(config-router)#exit
Router(config)#
Router3 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router ospf
1
Router(config-router)#network 11.0.0.0 0.255.255.255 area 0
Router(config-router)#network 12.0.0.0 0.255.255.255 area 0
Router(config-router)#network 192.168.3.0 0.0.0.255 area 0 Router(config-router)#exit
Router(config)#
24
RESULT:
25
Experiment – 7
Aim: To implement Enhanced Interior Gateway Routing Protocol (EIGRP)
using Cisco Packet Tracer.
Theory: Enhanced Interior Gateway Routing Protocol (EIGRP) is a dynamic routing protocol
used for routers’ decisions and configuration. EIGRP only sends incremental updates, which
in short reduces the workload of the routers and the amount of information transmitted. EIGRP
is a classic hybrid protocol that supports classless routing, it supports automatic & manual
summarization on an EIGRP enabled interface. It uses metrics like bandwidth, load and delays
to calculate the shortest optimal network route.
It provides MD5 authentication on routers running EIGRP and also has a maximum hop count
close to 255. EIGRP performs load balancing over the equal-cost path and un-equal cost path.
Merits:
1) It supports both IPV4 and IPV6 networks.
2) It reduces network traffic by making use of ‘need-based’ updates.
3) EIGRP with protocol-dependent modules can route several different layer
protocols.
26
4) EIGRP configuration was designed to be easy to configure.
5) With EIGRP Autonomous number and network command, EIGRP can be enabled.
6) EIGRP is the protocol that performs unequal cost load balancing.
7) If the destination has more than one link, it will identify the variance between the
links.
Demerits:
1) EIGRP routing protocol can only be accessible with the CISCO network devices.
2) EIGRP is a distance vector routing protocol, and it relies on routes provided by
neighbours.
3) It does not support future applications as it is not extensible.
IP Configuration:
Router1 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0 Router(config-if)#no shutdown
27
Router(config-if)#exit Router(config)#interface serial 0/0/0 Router(config-if)#ip address
10.0.0.1 255.0.0.0 Router(config-if)#no shutdown
Router2 –
Router(config-if)#exit Router(config)#
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.2.1 255.255.255.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/0 Router(config-if)#ip address
10.0.0.2 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/1 Router(config-if)#ip address
11.0.0.1 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#
Router3 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.3.1 255.255.255.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#interface serial 0/0/0 Router(config-if)#ip address
11.0.0.2 255.0.0.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#
EIGRP Configuration:
Router1 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router
eigrp 10
Router(config-router)#network 192.168.1.0
Router(config-router)#network 10.0.0.0 Router(config-router)#exit Router(config)#
28
Router2 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router
eigrp 10
Router(config-router)#network 192.168.2.0
Router(config-router)#network 10.0.0.0
Router(config-router)#network 11.0.0.0 Router(config-router)#exit Router(config)#
Router3 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#router
eigrp 10
Router(config-router)#network 192.168.3.0
Router(config-router)#network 11.0.0.0 Router(config-router)#exit Router(config)#
29
RESULT:
30
Experiment – 8
Aim: To implement Dynamic Host Configuration Protocol (DHCP) using Cisco
Packet Tracer.
Components:
1) DHCP Server: It is typically a server or a router that holds the network
configuration information.
2) DHCP Client: It is the endpoint that gets the configuration information from the
server like any computer or mobile.
31
3) DHCP Relay Agent: If you have only one DHCP Server for multiple LAN’s then
the DHCP relay agent present in every network will forward the DHCP request
to the servers. This because the DHCP packets cannot travel across the router.
Hence, the relay agent is required so that DHCP servers can handle the request
from all the networks.
4) IP address pool: It contains the list of IP address which are available for
assignment to the client.
5) Subnet Mask: It tells the host that in which network it is currently present.
6) Lease Time: It is the amount of time for which the IP address is available to the
client. After this time the client must renew the IP address.
7) Gateway Address: The gateway address lets the host know where the gateway is
to connect to the internet.
Merits:
1) It is easy to implement and automatic assignment of an IP address means an
accurate IP address.
2) The manual configuration of the IP address is not required. Hence, it saves time
and workload for the network administrators.
3) Duplicate or invalid IP assignments are not there which means there is no IP
address conflict.
4) It is a great benefit for mobile users as the new valid configurations are
automatically obtained when they change their network.
Demerits:
1) As the DHCP servers have no secure mechanism for the authentication of the
client so any new client can join the network. This possesses security risks like
unauthorized clients being given IP address and IP address depletion from
unauthorized clients.
2) The DHCP server can be a single point of failure if the network has only one
DHCP server.
32
Addressing Table No. 8:
IP Configuration:
Router1 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface
fastEthernet 0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0 Router(config-if)#no shutdown
Router(config-if)#exit Router(config)#
DHCP Configuration:
Router1 –
Router>enable Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router(config)#ip dhcp
pool abhay
Router(dhcp-config)#network 192.168.1.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.1.1
Router(dhcp-config)#dns-server 192.168.1.10 Router(config-router)#exit
Router(config)#ip dhcp excluded-address 192.168.1.1 192.168.1.10 Router(config)#
33
RESULT:
34
Experiment – 9
Aim: To implement Teletype Network Protocol (TELNET) using Cisco Packet
Tracer.
Theory: Telnet is a simple, text-based network protocol that is used for accessing remote
computers over TCP/IP networks like the Internet. It is a network protocol used to virtually
access a computer and to provide a two-way, collaborative and text-based communication
channel between two machines. It follows a user command Transmission Control
Protocol/Internet Protocol (TCP/IP) networking protocol for creating remote sessions. On the
web, Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP) simply enable
users to request specific files from remote computers, while, through Telnet, users can log on
as a regular user with the privileges they are granted to the specific applications and data on
that computer.
Merits:
1) Telnet Clients are versatile.
2) It can be used Cross-platform.
3) Unlimited access to target resources.
35
Demerits:
1) It can cause encrypted data exchange.
2) Full access to resources makes it easier for hackers.
3) Only few servers can be reached via Telnet.
IP Configuration:
Router1 –
Router>enable
Router# configure terminal
Router(config)#host R1
R1(config)#int f0/0
R1(config-if)#ip address 192.168.0.1 255.255.255.0
R1(config-if)#no shutdown
Router2 –
Router>enable
Router# configure terminal
Router(config)#host R2
R2(config)#int f0/0
R2(config-if)#ip address 192.168.0.2 255.255.255.0
R2(config-if)#no shutdown
36
TELNET Configuration:
Router2 –
R2(config-if)#exit
R2(config)#line vty 0 15
R2(config-line)#password pass1
R2(config-line)#login
R2(config-line)#exit
R2(config)#enable password enablepass1
R2(config)#
Router1 –
R1(config-if)#exit
R1(config)#exit
R1#telnet 192.168.0.2
Trying 192.168.0.2 …Open
37
r3#enable
Password:
r3#sh users
Line User Host(s) Idle Location
* 134 vty 0 idle 00:00:00 192.168.0.1
RESULT:
Thus using Telnet, we could access distant server using current server. In this
experiment we could change the host name of Router2 using Router1.
38