0% found this document useful (0 votes)
28 views27 pages

Cloud Computing Final Lab File

Uploaded by

ajaynaulakha07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views27 pages

Cloud Computing Final Lab File

Uploaded by

ajaynaulakha07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

#Introduction to Packet Tracer :-

Common Uses:

● Network Design: Build and test networks before


deploying them.
● Protocol Implementation: Configure and test various
network protocols like RIP, OSPF, EIGRP.
● Security Practice: Practice firewall configurations,
VPNs, and network security measures.
Key Features of Packet Tracer:

1. Network Simulation: It allows users to create a variety of networks with routers,


switches, computers, and other networking devices.
2. Visualization: You can visualize how data moves across the network, including packet
flow and the working of network protocols (e.g., TCP/IP).
3. Multi-User Collaboration: Users can connect to each other’s simulations for
collaborative network designs and troubleshooting.
4. Real-Time and Simulation Modes: In real-time mode, devices behave as if they were in
a real-world environment. Simulation mode slows down the network's operation, helping
users observe how data moves step by step.
1:-Network Topologies. (Including explanation of Simple PDU &
Complex PDU.

Network Topologies

Network topologies refer to the arrangement of various elements (links, nodes, etc.) in a
computer network. The topology determines the layout and the structure of the network and how
data flows between devices.

1. Types of Network Topologies


There are different ty[pes of topology in our computer network through which
Multisystem are connected with another system in different ways.
a. Bus Topology:

● Structure: All devices are connected to a single central cable, known as a bus.
● Advantages:
○ Simple to implement and requires less cable.
○ Easy to extend.
● Disadvantages:
○ Difficult to troubleshoot.
○ A single point of failure (the bus cable) can bring down the entire network.
○ Limited bandwidth.

b. Ring Topology:
● Structure: Devices are connected in a circular fashion, with each device having exactly
two neighbors.
● Advantages:
○ Data travels in one direction, reducing the chance of packet collisions.
○ Performs better than bus topology under heavy load.
● Disadvantages:
○ A break in the ring can disrupt the entire network.
○ Troubleshooting and network management can be challenging.

c. Star Topology:

● Structure: All devices are connected to a central hub or switch.


● Advantages:
○ Easy to manage and troubleshoot.
○ Failure of a single device doesn't affect the network.
● Disadvantages:
○ Requires more cable compared to bus or ring topology.
○ If the central hub fails, the entire network goes down.

d. Mesh Topology:
● Structure: Each device is connected to every other device in the network.
● Advantages:
○ Provides high redundancy and reliability.
○ Can handle high traffic since multiple devices can transmit data simultaneously.
● Disadvantages:
○ Expensive due to the large amount of cabling required.
○ Complex setup and maintenance.

e. Tree Topology:

● Structure: A hybrid topology that combines elements of star and bus topologies.
Devices are arranged in a hierarchical fashion.
● Advantages:
○ Scalable and easy to extend.
○ Centralized management.
● Disadvantages:
○ If the backbone (main cable) fails, it can affect the entire network.
○ Difficult to configure and maintain.

f. Hybrid Topology:

● Structure: A combination of two or more different types of topologies.


● Advantages:
○ Flexible and scalable.
○ Can be tailored to the needs of the network.
● Disadvantages:
○ Complex to design and implement.
○ Expensive.

2:- Connecting 3 networks using routers. Also, configure DHCP and DNS
server.

RIP (Routing Information Protocol) is a distance-vector routing protocol used to determine the
best path to a destination network by using hop count as the metric. RIP is relatively simple and
is suitable for small to medium-sized networks.

Scenario

Let's assume the following three networks are connected using three routers, and you want to
use RIP to enable IP routing between them.

● Network 1 (Office 1):


○ Network Address: 192.168.1.0/24
○ Router 1 Interface IP: 192.168.1.1
● Network 2 (Office 2):
○ Network Address: 192.168.2.0/24
○ Router 2 Interface IP: 192.168.2.1
● Network 3 (Office 3):
○ Network Address: 192.168.3.0/24
○ Router 3 Interface IP: 192.168.3.1
-🌐IP routing by RIP:-

3. Configuration of different Application services (SMTP)


Configuring Application Services, such as Simple Mail Transfer Protocol (SMTP), involves
setting up the service to send and receive emails over the internet. SMTP is the standard
protocol used by email clients and servers for email transmission. Below is a general guide on
configuring an SMTP service in various environments and applications.

1. SMTP Configuration in Web Applications

If you're integrating email services into web applications (e.g., PHP, Python, or Node.js), you'll
typically need to configure SMTP details in the app’s environment or configuration file.
Common SMTP Parameters:

● SMTP Host: The server address of the email provider (e.g., smtp.gmail.com for Gmail).
● SMTP Port: The communication port (e.g., 587 for TLS, 465 for SSL, 25 for non-secure).
● SMTP Authentication: Username and password for authenticating the email service.
● Encryption Type: TLS (Transport Layer Security) or SSL (Secure Sockets Layer).

4. Configuration of Hub and Switch using CPT.

A hub - is a simple networking device used to connect multiple


computers or other network devices in a local area network (LAN). It
operates at the physical layer (Layer 1) of the OSI model and serves
as a central point for data transmission.

Switch-
A network switch is a hardware device that connects multiple
devices within a local area network (LAN), enabling efficient data
communication among them. Operating primarily at the data link
layer (Layer 2) of the OSI model, switches manage the flow of data
by forwarding packets to their intended destinations based on Media
Access Control (MAC) addresses.
#Diagram of HUB.

#Diagram of SWITCH.
5. Study on VMware
Here’s a study guide for working with VMware,
covering each of these aspects. I'll provide high-level
steps for each, assuming you're using VMware
Workstation or VMware vSphere.

a. **Creating a VM (Ubuntu)**

1. **Open VMware**: Start VMware Workstation or


access VMware vSphere.
2. **Create New VM**:
- In VMware Workstation, select **File > New
Virtual Machine**.
- In vSphere, right-click on the host or cluster, and
choose **New Virtual Machine**.
3. **Configuration**: Choose typical or custom
configuration based on your needs.
4. **Install OS**:
- Select **Linux** as the OS, then **Ubuntu** from
the drop-down.
- Choose an ISO file or connect to a physical disc
with the Ubuntu installer.
5. **Customize Resources**: Allocate resources
such as CPU, memory, and storage.
6. **Finish**: Complete the setup and power on the
VM to start the Ubuntu installation.

b. **Networking on VM (Ubuntu)**

1. **Network Type**:
- **Bridged**: VM uses the host network adapter
and gets an IP from the network.
- **NAT (Network Address Translation)**: VM
accesses the internet via the host's IP.
- **Host-only**: VM can only communicate with the
host and other VMs on the host-only network.
2. **Configure in VMware**:
- Right-click on the VM and select **Settings >
Network Adapter**.
- Choose the network type (Bridged, NAT, or
Host-only).
3. **Inside Ubuntu VM**:
- Check network settings with `ifconfig` or `ip a`.
- Configure network settings in `/etc/netplan` if
static IP is needed.

c. **Merging and Splitting Disks on VM**


1. **Merging Disks**:
- In vSphere, power off the VM, then use the **Edit
Settings** option.
- Combine multiple virtual disks by creating a new
single large disk and migrating data.
2. **Splitting Disks**:
- Use the VMware Disk Management tool to split
large disks into smaller segments.
- Power off the VM, go to **Edit Settings > Hard
Disk > Expand**.

d. **Cloning the Guest OS**

1. **Power Off VM**.


2. **Clone**:
- In VMware Workstation, right-click the VM and
select **Manage > Clone**.
- In vSphere, right-click on the VM and choose
**Clone > Clone to Virtual Machine**.
3. **Configuration**: Name the clone, select a target
location, and specify any configuration changes
needed.

e. **Deploying VM with Template**


1. **Create Template**:
- Power off a VM with all desired configurations.
- Right-click the VM, select **Template > Convert
to Template**.
2. **Deploy from Template**:
- Right-click the template, choose **Deploy VM
from this Template**.
- Specify a new name, location, and storage
options.

f. **Creating Snapshots**

1. **Snapshot Creation**:
- Right-click the VM and select **Snapshot > Take
Snapshot**.
- Name the snapshot, add a description, and
choose memory and quiesce options.
2. **Managing Snapshots**:
- Use **Snapshot Manager** to view, revert, or
delete snapshots as needed.

g. **Managing Users, Groups, Permissions, and


Roles**
1. **User Management**:
- In vSphere, go to **Administration > Users and
Groups**.
- Add, modify, or remove users as required.
2. **Roles and Permissions**:
- Define roles (e.g., Administrator, VM Operator).
- Assign roles to users or groups for different
access levels.

---

This covers a broad outline of each task. Let me


know if you’d like detailed steps for a specific item!
6. steps of installation of any operating system.

Installing an operating system (OS) generally follows a structured set


of steps, whether it’s Windows, Linux, or macOS. Here’s a universal
guide for installing any OS:

---

1. **Prepare Installation Media**


- **Download OS Image**: Obtain the official ISO image of the OS
(e.g., from the OS’s website).
- **Create Bootable Media**:
- Use a USB drive (at least 8GB) or DVD.
- Tools like **Rufus** (Windows), **Etcher** (macOS, Linux), or
**UNetbootin** can help make the USB bootable with the OS image.

2. **Boot from Installation Media**


- **Insert the USB/DVD** and restart the computer.
- **Access Boot Menu**:
- Access the boot menu by pressing keys like **F12, F2, Esc, or
Del** during startup (depends on the device).
- **Select Boot Device**:
- Choose the USB/DVD drive as the boot source.

3. **Start the OS Installer**


- The computer should now boot into the OS installer from the
USB/DVD.
- Follow the installer prompts, choosing the **language**,
**keyboard layout**, and **region**.

4. **Choose Installation Type**


- **Clean Installation**: Erases all previous data and installs the OS
from scratch.
- **Upgrade**: Retains files, settings, and applications but installs
the newer OS version.
- **Custom Install**: Allows advanced users to configure specific
installation settings (e.g., partitioning).

5. **Partition the Hard Drive**


- **Automatic (Recommended)**: The installer partitions the disk
based on default settings.
- **Manual Partitioning**: Choose or create partitions (useful if
dual-booting).
- Common partitions include **/ (root)**, **/home** (for user files),
and **swap** (virtual memory) on Linux, or **System** and
**Primary** partitions on Windows.

6. **Choose Install Location**


- Select the destination drive for the OS installation (if multiple drives
are available).

7. **Begin Installation**
- **Review Settings** and confirm any final prompts.
- **Install the OS**: The installer will copy files, set up the
bootloader, and configure the OS.
- **Wait for Completion**: Installation time varies depending on
hardware and OS version.

8. **Configure Basic Settings**


- After installation, follow any setup prompts:
- **Time zone**, **user account**, **password**, and **network
settings**.
- Additional options may include privacy settings or enabling
location services.

9. **Complete Installation and Restart**


- **Remove Installation Media** when prompted.
- **Restart the Computer**: Let it boot into the newly installed OS.
10. **Install Updates and Drivers**
- **Connect to the Internet** and download any updates to ensure
your OS has the latest security patches.
- **Install drivers** for hardware (especially graphics, audio, and
network drivers) to ensure full functionality.

7. Installation of AWS

1. Create an AWS Account

1. Visit the AWS Website: Go to aws.amazon.com.


2. Sign Up:
○ Click Create an AWS Account.
○ Enter your email, password, and account name.
3. Add Billing Information:
○ Add a payment method (credit card/debit card). AWS
requires this for account verification, even if you only use
free-tier services.
4. Verify Identity:
○ AWS will send a code to your phone for verification.
5. Select a Support Plan:
○ Choose Basic (Free) if you’re just getting started
2

. Access AWS Services

Now you’re ready to start using AWS! Here’s how to access some
services:

● AWS Console: Sign in and access services like EC2 (for virtual
machines), S3 (for storage), RDS (for managed databases),
etc.
● AWS CLI: Use commands like aws ec2
describe-instances to interact with EC2.
● AWS SDK: Write code to access AWS services in your chosen
programming language.
8. Describe instances of EC2
Amazon EC2 (Elastic Compute Cloud) instances are virtual servers
provided by AWS. They are the core compute units within AWS,
allowing you to run applications, store data, and deploy workloads in
the cloud. EC2 offers various instance types optimized for different
use cases and divided into several families. Here’s an overview of
EC2 instance types:

1. General Purpose Instances

● Use Case: Versatile workloads like web servers, development


and testing environments, small databases, and applications that
require a balance of CPU, memory, and networking resources.
● Examples:
○ t4g, t3, t3a (Burstable Performance Instances):
Cost-effective, ideal for workloads with occasional,
unpredictable bursts of usage.
○ m7g, m6i, m5, m5a: Provide a balance of compute,
memory, and networking, suitable for many applications.

2. Compute Optimized Instances

● Use Case: Applications that require high compute power, such


as high-performance web servers, batch processing, scientific
modeling, and game servers.
● Examples:
○ c7g, c6i, c5, c5a: These provide high CPU resources for
compute-heavy applications.

3. Memory Optimized Instances

● Use Case: Ideal for memory-intensive applications, like


high-performance databases, real-time big data processing, and
in-memory caching applications.
● Examples:
○ r7g, r6i, r5, r5a: Designed for memory-bound applications.
○ x2idn, x2iedn: Very high memory configurations for
large-scale databases.
○ u-6tb1, u-9tb1, u-12tb1 (High Memory Instances):
Intended for applications like SAP HANA that need large
amounts of memory.

4. Storage Optimized Instances

● Use Case: Applications requiring high, sequential read/write


access to large datasets, such as databases, data warehouses,
and analytics applications.
● Examples:
○ i4i, i3, i3en (I/O Optimized Instances): Designed for
workloads needing high-performance storage.
○ d3, d3en: Optimized for dense storage applications.
5. Accelerated Computing Instances

● Use Case: Applications that benefit from hardware accelerators,


including GPU (Graphics Processing Units) and FPGA (Field
Programmable Gate Arrays), often used for AI/ML, graphics
rendering, and scientific computing.
● Examples:
○ p4, p3: Instances with GPUs for machine learning and
graphics-intensive workloads.
○ g5, g4ad, g4dn: Instances with GPUs optimized for
inference and graphics.
○ f1: Instances with FPGAs for applications requiring custom
hardware acceleration.

9. Describe how to launch a Microsoft Windows


AWS EC2 instance.

Step 1: Log in to AWS Management Console

1. Open the AWS Management Console.


2. Log in with your AWS credentials.

Step 2: Navigate to EC2 Service

1. In the console, search for EC2 in the search bar.


2. Click on the EC2 service to open the EC2 dashboard.

Step 3: Launch an Instance

1. On the EC2 dashboard, click Launch Instance.


2. Click Launch Instance again on the next page.
Step 4: Choose an Amazon Machine Image (AMI)

1. Under the Quick Start tab, look for a Microsoft Windows Server image.
2. Select the version you prefer (e.g., Windows Server 2022, 2019).
3. Ensure the image is labeled as Free Tier Eligible if you're using AWS free
tier.
Step 5: Choose an Instance Type

1. Select an instance type based on your needs (e.g., t2.micro for the free
tier).
2. Click Next: Configure Instance Details.

Step 6: Configure Instance Details

1. Leave most of the settings at their default.


2. If needed, adjust the Number of Instances or Network Settings.
3. Click Next: Add Storage.

Step 7: Add Storage

1. Specify the size of the storage volume (default is 30 GB for free tier).
2. You can increase storage if needed but note the additional costs.
3. Click Next: Add Tags.

Step 8: Add Tags (Optional)

1. Add tags to help identify your instance. For example:


○ Key: Name
○ Value: My Windows Instance
2. Click Next: Configure Security Group.
Step 9: Configure Security Group

1. Create a new security group or select an existing one.


2. Add a rule to allow RDP (Remote Desktop Protocol) access:
○ Type: RDP
○ Protocol: TCP
○ Port Range: 3389
○ Source: My IP (to restrict access to your current IP) or 0.0.0.0/0
(open access, not recommended for security reasons).
3. Click Review and Launch.

Step 10: Review and Launch

1. Review all the settings you’ve configured.


2. Click Launch.

Step 11: Create or Select a Key Pair

1. Choose Create a new key pair if you don’t already have one.
○ Name the key pair and download the .pem file. This is crucial for
accessing your instance.
2. If you have an existing key pair, select it from the dropdown.
3. Confirm and click Launch Instance.
Step 12: Connect to Your Instance

1. Return to the EC2 Dashboard and locate your instance.


2. Wait for the instance state to change to Running.
3. Select the instance and click Connect at the top.
4. Choose the RDP Client tab.
5. Download the Remote Desktop File and use it to connect.
6. Retrieve the administrator password:
○ Click Get Password, upload the .pem file, and decrypt the password.
7. Use the RDP file, enter the password, and connect to your instance.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy