Sie sind auf Seite 1von 10

DCCN 1

CSP-309

EXPERIMENT:-1
AIM:
Familiarization with Virtualization and Installation of VirtualBox and VM Player Virtualization
Software.

INTRODUCTION:

ABOUT VIRTUAL MACHINE:


A "virtual machine" was originally defined by Popek and Goldberg as "an efficient, isolated
duplicate of a real computer machine." Current use includes virtual machines that have no direct
correspondence to any real hardware.

The physical, "real-world" hardware running the VM is generally referred to as the 'host', and the
virtual machine emulated on that machine is generally referred to as the 'guest'. A host can
emulate several guests, each of which can emulate different operating systems and hardware
platforms.

In computing, a virtual machine (VM) is an emulation of a computer system. Virtual machines


are based on computer architectures and provide functionality of a physical computer. Their
implementations may involve specialized hardware, software, or a combination.
There are different kinds of virtual machines, each with different functions:

 System virtual machines (also termed full virtualization VMs) provide a substitute for a
real machine. They provide functionality needed to execute entire operating systems.
A hypervisor uses native execution to share and manage hardware, allowing for multiple
environments which are isolated from one another, yet exist on the same physical machine.
Modern hypervisors use hardware-assisted virtualization, virtualization-specific hardware,
primarily from the host CPUs.
 Process virtual machines are designed to execute computer programs in a platform-
independent environment.
Some virtual machines, such as QEMU, are designed to also emulate different architectures and
allow execution of software applications and operating systems written for another CPU or
architecture. Operating-system-level virtualization allows the resources of a computer to be
partitioned via the kernel's support for multiple isolated user space instances, which are usually
called containers and may look and feel like real machines to the end users.
ABOUT PING:
Ping is a basic Internet program that allows a user to verify that a particular IP address exists and
can accept requests.

1
DCCN 2
CSP-309

Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually
operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to
a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting
to test connectivity and determine response time.

SCREENSHOT:

Installation step:

2
DCCN 3
CSP-309

3
DCCN 4
CSP-309

PINGING :

4
DCCN 5
CSP-309

5
DCCN 6
CSP-309

EXPERIMENT:-2

AIM:
Configuring IPv4 addresses in Windows and Networking and sharing files between Windows
Systems

INTRODUCTION:

ROUTER:
In packet-switched networks such as the internet, a router is a device or, in some cases, software
on a computer, that determines the best way for a packet to be forwarded to its destination.
A router connects networks. Based on its current understanding of the state of the network it is
connected to, a router acts as a dispatcher as it decides which way to send each information
packet. A router is located at any gateway (where one network meets another), including
each point-of-presence on the internet. A router is often included as part of a network switch.

6
DCCN 7
CSP-309

How does a router work?:


A router may create or maintain a table of the available routes and their conditions and use this
information along with distance and cost algorithms to determine the best route for a given
packet. Typically, a packet may travel through a number of network points with routers before
arriving at its destination. Routing is a function associated with the network layer(Layer 3) in the
standard model of network programming, the Open Systems Interconnection (OSI) model. A
Layer 3 switch is a switch that can perform routing functions.

An edge router is a device located at the boundary of a network that connects to other networks,
wide area networks or the internet. For home and business computer users who have high-speed
internet connections such as cable, satellite or DSL, a router can act as a hardware firewall.
Many engineers believe that the use of a router provides better protection against hacking than a
software firewall because no computer internet protocol addresses are directly exposed to the
internet. This makes port scans (a technique for exploring weaknesses) essentially impossible. In
addition, a router does not consume computer resources, which a software firewall does.
Commercially manufactured routers are easy to install and are available for hard-wired or
wireless networks.

A switch in an Ethernet-based LAN reads incoming TCP/IP data packets/frames containing


destination information as they pass into one or more input ports. The destination information in
the packets is used to determine which output ports will be used to send the data on to its
intended destination.

Switches are similar to hubs, only smarter. A hub simply connects all the nodes on the network --
communication is essentially in a haphazard manner with any device trying to communicate at
any time, resulting in many collisions. A switch, on the other hand, creates an electronic tunnel
between source and destination ports for a split second that no other traffic can enter. This results
in communication without collisions.
Switches are similar to routers as well, but a router has the additional ability to forward packets
between different networks, whereas a switch is limited to node-to-node communication on the
same network.
How switch work:
Switches are a key component of many business networks, as they connect multiple PCs,
printers, access points, phones, lights, servers, and other hardware. Switches allow you to send
and receive information (such as email) and access shared resources in a smooth, efficient,
highly secure, and transparent manner.
HUB:
A hub, also called a network hub, is a common connection point for devices in a network. Hubs
are devices commonly used to connect segments of a LAN. The hub contains multiple ports.

7
DCCN 8
CSP-309

When a packetarrives at one port, it is copied to the other ports so that all segments of the LAN
can see all packets.
What Hubs Do:
Hubs and switches serve as a central connection for all of your network equipment and handles a
data type known as frames. Frames carry your data. When a frame is received, it is amplified and
then transmitted on to the port of the destination PC.

Image: Hub and wireless hub network icons

SCREENSHOT:

8
DCCN 9
CSP-309

9
DCCN 10
CSP-309

10

Das könnte Ihnen auch gefallen