Sie sind auf Seite 1von 1

CS307 Assignment 7

------------------
Assigned: 7/10/13. Due: 7/10/13.
Work in teams of 2 students. Each team must do Ex. 1 and Ex. 2.n
where n = (r mod 4)+1 and r is the sum of the numeric parts of your
roll numbers.
This assignment involves installing multiple guest OSes on VirtualBox
and configuring networking between them.
1. Install at least 4 guest OSes on Virtual Box. Run varying numbers
of CPU-hogging programs in some/all of these and note the %CPU used
by the Virtual Box processes in the host OS, and the %CPU for the
CPU hogs as reported by each guest OS. What conclusions can you
draw?
2.1 Run a pattern of pings between the OSes. Estimate the number of
packets that should be received/transmitted by each. Verify that
this indeed happens.
Now, setup the routing tables on the OSes so that they form a
ring. Repeat the pattern of pings and again verify that
measurements correlate with theory.
2.2 Configure a fictitious DNS domain for the 4 guest OSes. Setup a
primary DNS server on one and a secondary server on another.
Populate the zone file with at least 20 entries. Configure one of
the OSes to use the primary and the other to use the secondary (in
/etc/resolv.conf). Verify that both get the same results for
lookups. Now, modify an entry in the primary. How long does it
take for the entry to propagate to the secondary? Shutdown the
primary. Does the secondary respond to queries? In all cases,
note whether responses are "authoritative" or "non-authoritative".
2.3 Configure syslog on each of the guest OSes to log messages on one
guest OS. A second guest OS is running an important service, so
its messages must be printed on the console. The remaining guest
OSes are less important and their messages should go into files,
one for each OS. What happens to log messages if syslogd on the
logging OS is stopped? Configure log rotation and verify that it
occurs. (You may need to manually change the date/time on the
logging OS for rotation to take place.)
2.4 Configure the firewall on a guest OS to control access to various
services such as ping, ssh, ftp and telnet. Try various settings
such as Allow, Deny, Reject. For each, what is the effect seen by
the user on another OS who tries to use the service via the
appropriate client? What does nmap show in each case? Run "ping
-f" on all the other 3 OSes to the OS with the firewall. How much
%CPU is consumed responding? Now, block pings and see if this
reduces the CPU load. Configure the firewall to log all packets.
What happens to the %CPU?

Das könnte Ihnen auch gefallen