Module I
Module I
Task 1
Identification of peripherals of a PC, Laptop, Server and Smart Phones: Prepare a report
containing the block diagram along with the configuration of each component and its
functionality, Input/ Output devices, I/O ports and interfaces, main memory, cache memory and
secondary storage technologies, digital storage basics, networking components and speeds.
1. Input Unit:
Computers need to receive data and instruction in order to solve any problem. Therefore we need
to input the data and instructions into the computers. The input unit consists of one or more input
devices. Keyboard is the one of the most commonly used input device. Other commonly used
input devices are the mouse, floppy disk drive, magnetic tape, etc. All the input devices perform
the following functions.
2. Storage Unit:
The storage unit of the computer holds data and instructions that are entered through the input
unit, before they are processed. It preserves the intermediate and final results before these are sent
to the output devices. It also saves the data for the later use. The various storage devices of a
computer system are divided into two categories.
1. Primary Storage:
Stores and provides very fast.
This memory is generally used to hold the program being currently executed in the computer, the
data being received from the input unit, the intermediate and final results of the program.
The primary memory is temporary in nature.
The data is lost, when the computer is switched off. To store the data permanently, the data has to
be transferred to the secondary memory.
The cost of the primary storage is more compared to the secondary storage. Therefore most
computers have limited primary storage capacity.
2. Secondary Storage:
Secondary storage is used like an archive.
It stores several programs, documents, data bases etc.
The programs that you run on the computer are first transferred to the primary memory
before it is actually run. Whenever the results are saved, again they get stored in the secondary
memory.
The secondary memory is slower and cheaper than the primary memory. Some of the
commonly used secondary memory devices are Hard disk, CD, etc.
Memory Size:
All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is
represented by an 8 bit code.
The set of 8 bits is called a byte. A character occupies 1 byte space. A numeric occupies 2 byte
space. Byte is the space occupied in the memory.
The size of the primary storage is specified in KB (Kilobytes) or MB (Megabyte). One KB is
equal to 1024 bytes and one MB is equal to 1000KB.
The size of the primary storage in a typical PC usually starts at 16MB. PCs having 32 MB,
48MB, 128 MB, 256MB memory are quite common.
3.Output Unit:
The output unit of a computer provides the information and results of a computation to
outside world. Printers, Visual Display Unit (VDU) are the commonly used output devices.
Other commonly used output devices are floppy disk drive, hard disk drive, and magnetic
tape drive.
All calculations are performed in the Arithmetic Logic Unit (ALU) of the computer. It also does
comparisons and takes decision.
The ALU can perform basic operations such as addition, subtraction, multiplication, division, etc
and does logic operations viz, >, <, =, ‘etc.
Whenever calculations are required, the control unit transfers the data from storage unit to ALU
once the computations are done, the results are transferred to the storage unit by the control unit
and then it is send to the output unit for displaying results.
5.Control Unit:
It is responsible for directing and coordinating most of the computer system activities.
It does not execute instructions by itself.
It tells other parts of the computer system what to do.
It determines the movement of electronic signals between the main memory and arithmetic logic
unit as well as the control signals between the CPU and input/output devices.
The control unit and ALU of the computer are together known as the Central Processing Unit
(CPU).The CPU is like brain performs the following functions:
• It performs all calculations.
A PC may have CPU-IC such as Intel 8088, 80286, 80386, 80486, Celeron, Pentium, Pentium
Pro, Pentium II, Pentium III, Pentium IV, Dual Core, and AMD etc.
Components of CPU:
1. Power supply
2.Heat sink/fans.
3.Cabinet
4.Mother board
5.Processor
6.AGP
7.North bridge
8.South bridge
9.AGP
10.PCI slots
11.BIOS 12.CMOS
2.Heat Sinks/Fans:
As processors, graphics cards, RAM and other components in computers have Increased in speed
and power consumption, the amount of heat produced by these components as a side-effect of
normal operation has also increased.
These components need to be kept within a specified temperature range to prevent overheating,
instability, malfunction and damage leading to a shortened component lifespan.
3.Cabinet/Case:
A computer case (also known as a computer chassis, cabinet, box, tower, enclosure, housing,
system unit or simply case) is the eclosure that provides protection to all the components from
heat light and temperature.
If you are building your own computer selecting the case will be one of your first choices to
make: the type of case, its size, orientation, tc.
4.Motherboard:
The motherboard is the key circuit board holding the essential processing parts of a Computer.
It allows all the parts of your computer to receive power and Communicate with one another.
It is usually screwed to the case along its largest face, which could be the bottom or the side of
the case depending on the form factor and orientation.
Attached directly to the motherboard are the CPU, RAM, expansion cards, networking, video,
and audio components.
5.Processor/Socket:
An integrated circuit (IC) supplied on a single silicon chip. It’s function is to control all the
computers functions. The main processor manufacturers are: AMD & INTEL
Short for accelerated graphics port, AGP is an advanced port designed for video cards and 3D
accelerators.
Developed by Intel and introduced in August 1997, AGP introduces a dedicated point-to-point
channel that allows the graphics controller direct access to the system memory.
Below is an illustration of what the AGP slot may look like on your motherboard.
7.North bridge
Northbridge is an integrated circuit responsible for communications between the CPU interface,
AGP, and the memory.
Unlike the Southbridge, the Northbridge is directly connected to these components and acts like a
"bridge" for the Southbridge chip to communicate with the CPU, RAM, and graphics controller
8.South bridge
The south bridge is an IC on the motherboard responsible for the hard drive controller, I/O
controller and integrated hardware.
Integrated hardware can include the sound card and video card if on the motherboard, USB, PCI,
ISA, IDE, BIOS, and Ethernet.
9.ATX Power connector
ATX power connectors are designed to connect a computer’s power supply to a motherboard.
They are constructed of metal pins laid throughout a nylon matrix.
10.PCI Slots
Short for Basic Input/Output System, the BIOS (pronounced bye-oss) is a ROM chip found on
motherboards that allows you to access and set up your computer system at the most basic level.
The picture below is an example of what a BIOS chip may look like on a computer motherboard.
The example picture below is of an early AMIBIOS, a type of BIOS manufactured by AMI.
12.CMOS(complementary metal-oxide-semiconductor)
CMOS is an onboard, battery powered semiconductor chip inside computers that stores
information.This information ranges from the system time and date to system hardware settings
for your computer.
An output device is any device used to send data from a computer to another device or user.
Most computer data output that is meant for humans is in the form of audio or video.
Thus, most output devices used by humans are in these categories.
Examples include monitors, projectors, speakers, headphones and printers.
Serial port - a 9-pin port. Often called Com ports - Com1, Com2 etc. Mice and
external modems were connected to these ports. They are turquoise in colour.
Parallel port - a 25-pin port used to connect printers, scanners, external hard disks etc. to
the computer. Burgundy in colour, they are often called LPT ports - LPT1, LPT2 etc.
Video port - used to connect a monitor to the computer system. There are two types:
o VGA port - This is a 15-pin port and is blue in colour. It is an analogue port and is being
replaced by the DVI port.
o DVI port - white in colour, it is a digital port. This means that no conversion is necessary
between the computer and the monitor and that means that images can be produced more quickly
on the monitor.
PS/2 port - used to connect keyboards and mice to the computer. The keyboard port is purple
and the mouse port is green
Modem port - used to connect a modem to a telephone line. RJ11 is the technical term for the
port.
USB port- Intended to replace Serial, Parallel and PS/2 ports with a single standard. 127 devices
can be connected to a single USB port.
Ethernet port - used to connect to a network. Known as RJ45, it is larger than a modem port.
Audio ports - used to input and output audio from the computer. Three mini jack ports but there
may be more:
Light blue - Line in - connect external devices
Lime - Connect the speakers to this port.
Pink - Connect a microphone to this port.
Cache memory, also called CPU memory, is high-speed static random access memory (SRAM)
that a computer microprocessor can access more quickly than it can access regular random access
memory (RAM).
This memory is typically integrated directly into the CPU chip or placed on a separate chip that
has a separate bus interconnect with the CPU.
The purpose of cache memory is to store program instructions and data that are used repeatedly
in the operation of programs or information that the CPU is likely to need next.
The computer processor can access this information quickly from the cache rather than having to
get it from computer's main memory.
Fast access to these instructions increases the overall speed of the program.
Hard disk
The hard disk drive is the main, and usually largest, data storage hardware device in a computer.
The operating system, software titles, and most other files are stored in the hard disk drive.
Floppy disk
A floppy disk drive (FDD), or floppy drive, is a hardware device that reads data storage
information.
It was invented in 1967 by a team at IBM and was one of the first types of hardware storage that
could read/write a portable device.
FDDs are used for reading and writing on removable floppy discs.
Floppy disks are now outdated, and have been replaced by other storage devices such as USB and
network file transfer.
Flash drive
Alternatively referred to as a USB flash drive, data stick, pen drive, memory unit, keychain drive
and thumb drive, a jump drive is a portable storage device.
It is often the size of a human thumb (hence the name), and connects to a computer via a USB
port.
Flash drives are an easy way to store and transfer information between computers and range in
sizes from 2 GB to 1 TB.
SD card
Short for Secure Digital card, the SD card is one of the more common types of memory cards
used with electronics.
The SD technology is used by over 400 brands of electronic equipment and over 8000 different
models, including digital cameras and cell phones.
It is considered the industry standard due to the wide use.
Types of SD cards : The three versions of the SD card, along with their physical dimensions, are
shown below.
SD - 32mm x 24mm x 2.1mm.
MiniSD - 21.5mm x 20mm x 1.4mm.
MicroSD - 15mm x 11mm x 1.0mm.
Compact Disk
Abbreviated as CD, a compact disc is a flat, round, optical storage medium invented by James
Russell.
The first CD was created at a Philips factory in Germany on August 17, 1982.
NOTE:When referring to a round CD, DVD, or Blu-ray it is known as a "disc" and not a "disk."
If you are referring to a magnetic media such as a floppy disk or a hard disk drive, it is called to
as a "disk" and not a "disc."
DVD:
Short for digital versatile disc or digital video disc, a DVD or DVD-ROM is a disc capable of
storing a significant amount more data than a standard compact disc.
DVDs are widely used for storing and viewing movies and other data.
The picture of the Matrix DVD movie disc is an example of a DVD movie. CD/DVD drives that
utilize both of these discs were first sold in 1997.
You may wonder how digital storage can hold so much information in a small space.
The answer is that you can pack more data into the same amount of space using binary code of
zeroes and ones instead of analog signals such as voltage levels or magnetic fields.
In contrast to analog forms of storing information, such as sound waves or photographs, digital
data does not fluctuate continuously but instead consists of discrete values (for example, 1's or
0's).
Digital storage stores information (including text, video, and audio) as long as the data is reduced
into a series of symbols representing the content.
The advantage of digital storage is that it can hold much more information, take up less space,
and be created in a shorter amount of time than analog storage methods.
When you take a photo with your digital camera, it's stored in the camera's memory card until
you transfer it to a computer or another device.
The same is true for any digital audio or video file: it's stored on an electronic device and must
be transferred before use.
You still have a copy elsewhere if something happens to your computer, hard drive, or other
device containing the data.
Digital files are easier to access than analog ones because they don't require physical reading
access.
i. Optical Disks
Examples: CDs, DVDs, DVD-Rs, DVD+Rs, CD+Rs, and Blu-Ray
Optical disks are often used for backing up, storing, or sharing information.
Optical disks easily store data such as photographs, movies, audio files, and non-changing data.
While optical disks are often thought of as a long-lasting solution to digital storage, the lifetime
of optical disks has not been proven.
Unlike profesional made CDs, in which the data is recorded onto the disc by stamping pits into
the plastic, home-burned disks use chemicals that are burned by the laser.
Transferring data onto new disks every 5-10 years is a good practice to preserve information.
Networking components
Computer network components include the major parts that are needed to install a network
both at the office and home level.
Before delving into the installation process, you should be familiar with each part so that you
could choose and buy the right component that fits with your network system.
These hardware components include cable, Hub, Switch, NIC (network interface
card), modem and router.
Depending on the type of network you are going to install, some of the parts can be
eliminated. For example, in a wireless network you don’t need cables, hubs so on.
Computer network is a group of two or more computers that connect with each other to
share a resource. Sharing of devices and resources is the purpose of computer network. You can
share printers, fax machines, scanners, network connection, local drives, copiers and other
resources.
2. Hub
Hub is a device that splits a network connection into multiple computers. It is like a distribution
center.
When a computer request information from a network or a specific computer, it sends the request
to the hub through a cable.
The hub will receive the request and transmit it to the entire network. Each computer in the
network should then figure out whether the broadcast data is for them or not
Currently Hubs are becoming obsolete and replaced by more advanced communication devices
such as Switchs and Routers.
3. Switch
Switch is a telecommunication device grouped as one of computer network components. Switch
is like a Hub but built in with advanced features.
It uses physical device addresses in each incoming messages so that it can deliver the message to
the right destination or port.
Like Hub, switch don’t broadcast the received message to entire network, rather before sending it
checks to which system or port should the message be sent.
In other words switch connects the source and destination directly which increases the speed of
the network.
Both switch and hub have common features: Multiple RJ-45 ports, power supply and connection
lights.
Cable is one way of transmission media which can transmit communication signals. The wired
network typology uses special type of cable to connect computers on a network.
There are a number of solid transmission Media types, which are listed below. - Twisted pair
wire
It is classified as Category 1, 2, 3, 4, 5, 5E, 6 and 7. Category 5E, 6 and 7 are high-speed cables
that can transmit 1Gbps or more. -
i. Coaxial cable
Coaxial cable more resembles like TV installation cable. It is more expensive than twisted-pair
cable but provide high data transmission speed.
ii. Fiber-optic cable
It is a high-speed cable which transmits data using light beams through a glass bound fibers.
Fiber-optic cable is high data transmission cable comparing to the other cable types. But the cost
of fiber optics is very expensive which can only be purchased and installed on governmental
level.
5. Router
When we talk about computer network components, the other device that used to connect a
LAN with an internet connection is called Router.
When you have two distinct networks (LANs) or want to share a single internet connection to
multiple computers, we use a Router
In most cases, recent routers also include a switch which in other words can be used as a switch.
You don’t need to buy both switch and router, particularly if you are installing small business and
home networks
There are two types of Router: wired and wireless. The choice depends on your physical
office/home setting, speed and cost.
6. Modems
A modem enables you to connect your computer to the available internet connection over the
existing telephone line.
Like NIC, Modem is not integrated with a computer motherboard. It comes as separate part
which can be installed on the PCI slots found on motherboard.
A modem is not necessary for LAN, but required for internet connection such as dial-up and DSL
There are some types of modems, which differs in speed and transmission rate. Standard PC
modem or Dial-up modems (56Kb data transmission speed), Cellular modem (used in a laptop
that enables to connect while on the go), cable modem (500 times faster than standard modem)
and DSL Modems are the most popular.
TASK 2:
PROCEDURE:
1. Keep on press the delete button and go to advanced BIOS feature [ BIOS- Basic Input Output
System ]
2. And go to boot sequence. Select first boot drivers. CD ROM and press F10 to save the bios
feature. Yes and then enter. Press any key to boot from CD. Press enter to setup windows XP. F8 = To
agree the license.
3. Press ESC to don‘t repair the windows XP setup.
4. Press ‗p‘to delete the previous partitions. Then press enter.
5. Press ‗L‘to delete the partition.
6. Press ‗C‘to create the partition in the UN partition space.
7. Press enter to setup windows XP on the selected items.
1. Insert the Windows XP CD into your computer and restart your computer. If prompted to start
from the CD, press SPACEBAR. If you miss the prompt (it only appears for a few seconds), restart your
computer to try again.
23
2. Windows XP Setup begins. During this portion of setup, your mouse will not work, so you
must use the keyboard. On the Welcome to Setup page, press ENTER.
3. On the Windows XP Licensing Agreement page, read the licensing agreement. Press the
PAGEDOWN key to scroll to the bottom of the agreement. Then press F8.
24
4. This page enables you to select the hard disk drive on which Windows XP will be installed.
Once you complete this step, all data on your hard disk drive will be removed and cannot be recovered. It
is extremely important that you have a recent backup copy of your files before continuing. When you
have a backup copy, press D, and then press L when prompted. This deletes your existing data. Press
ENTER to select Un partitioned space, which appears by default.
5. Press ENTER again to select Format the partition using the NTFS file system, which
appears by default.
25
6. Windows XP erases your hard disk drive using a process called formatting and then copies
the setup files. You can leave your computer and return in 20 to 30 minutes.
7. Windows XP restarts and then continues with the installation process. From this point forward,
you can use your mouse. Eventually, the Regional and Language Options page appears. Click next to
accept the default settings. If you are multilingual or prefer a language other than English, you can change
language settings after setup is complete
26
8. On the Personalize Your Software page, type your name and your organization name. Some
programs use this information to automatically fill in your name when required. Then, click Next.
9. On the Your Product Key page, type your product key as it appears on your Windows XP CD
case. The product key is unique for every Windows XP installation. Then, click Next.
27
10. On the Computer Name and Administrator Password page, in the Computer name box, type
a name that uniquely identifies your computer in your house, such as FAMILYROOM or TOMS. You
cannot use spaces or punctuation. If you connect your computer to a network, you will use this computer
name to find shared files and printers. Type a strong password that you can remember in the
Administrator password box, and then retype it in the Confirm password box. Write the password
down and store it in a secure place. Click Next.
11. On the Date and Time Settings page, set your computer‘s clock. Then, click the Time Zone
down arrow, and select your time zone. Click Next.
28
12. Windows XP will spend about a minute configuring your computer. On the
Networking Settings page, click Next.
14. Windows XP will spend 20 or 30 minutes configuring your computer and will
29
automatically restart when finished. When the Display Settings dialog appears, click OK
15. When the Monitor Settings dialog box appears, click OK.
16. The final stage of setup begins. On the Welcome to Microsoft Windows page, click Next.
17. On the Help protect your PC page, click Help protect my PC by turning on Automatic
Updates now. Then, click
30
18. Windows XP will then check if you are connected to the Internet: If you are connected to the
Internet, select the choice that describes your network connection on the Will this computer connect to
the Internet directly, or through a network? Page. If you‘re not sure, accept the default selection, and
click Next
19. If you use dial-up Internet access, or if Windows XP cannot connect to the Internet, you can
connect to the Internet after setup is complete. On the How will this computer connect to the Internet?
Page, click Skip.
31
20. Windows XP Setup displays the Ready to activate Windows? Page. If you are connected to
the Internet, click Yes, and then click Next. If you are not yet connected to the Internet, click No, click
Next, and then skip to step 24. After setup is complete, Windows XP will automatically remind you to
activate and register your copy of Windows XP
21. On the Ready to register with Microsoft? Page, click Yes, and then click Next.
22. On the collecting registration information page, complete the form. Then, click Next.
32
23. On the Who will use this computer? page, type the name of each person who will use the
computer. You can use first names only, nicknames, or full names. Then click Next. To add users after
setup is complete or to specify a password to keep your account private, read Create and customize user
accounts.
33
Congratulations! Windows XP setup is complete. TEST DATA: No Test data for this Experiment
34
II. AIM: To install Linux in system
Software Requirement: Linux Compact Discs
Hardware Requirement: Personal computer
PROCEDURE:
1. Language Selection
Using your mouse select the language you would prefer to use for the installation
Click next to continue.
3. Mouse Configuration:
If you have a PS/2, USB or Bus mouse you do not need to pick a port and device. If you have a
serial mouse, you should choose the correct port and device that your serial mouse is on.
The Emulate 3 buttons checkbox allows you to use a two-button mouse as if it had three
buttons. If you select this check box you can emulate a third ―middleǁ button by pressing both mouse
buttons simultaneously.
4. Installation Type:
Choose the type of installation you would like to perform.
Your options are Personal desktop, Workstation, Server, Custom and upgrade
35
6. Partitioning your system:
If you chose automatic partitioning and did not select Review skip ahead
If you choose automatic partitioning and selected review you can either accept the current
partition settings (click next) or modify the setup using Disk Druid, the manual partition tool.
If you choose manual partition with disk skip ahead.
At this point you must tell the installation program where to install Linux. This is done by
defining mount points for one or more disk partitions in which Linux will be installed.
7. Adding Partitions:
To add a new partition select new button, a dialogue box appears. Select the options and click ok.
Boot loader is the first software program that runs when a computer starts. The installation
program provides two boot loaders GRUB ( GR and Unified Boot Loader) which is the default and
LILO
If you do not want GRUB as your boot loader click Change Boot Loader.
You can then choose to install LILO or choose not to install boot loader at all by clicking Do not
install boot loader on the change boot loader button.
Network devices are automatically detected and displayed in Network Devices list,
Select a network device and click Edit
Here you can configure IP address and net mask of the device.
9. Firewall configuration:
36
Evolution of OS
Operating System is a type of software that acts as an interface between the user and the
hardware.
It is responsible to handle various critical functions of the computer or any other machine.
Various tasks that are handled by OS are file management, task management, garbage
management, memory management, process management, disk management, I/O management,
peripherals management, etc.
Operating Systems, has evolved in past years. It went through several changes before getting
its original form.
These changes in the operating system are known as the evolution of operating systems.
The evolution of the operating system went through four generations. Let us see these
generations in detail:
Note:
First Generation of Operating Systems: Vacuum Tubes and Plugboards. ...
Second Generation of Operating Systems: Transistors and Batch Systems. ...
Third Generation of Operating Systems: Integrated Circuits and Multiprogramming. ...
Fourth Generation of Operating Systems: Personal Computers.
Software
Software is a set of instructions, data or programs used to operate computers and execute
specific tasks.
It is the opposite of hardware, which describes the physical aspects of a computer.
Software is a generic term used to refer to applications, scripts and programs that run on a
device.
37
Task 3: This task covers basic commands and system administration in Linux, including bas
Linux commands in bash, ping, ssh, ifconfig, scp, netstat, ipstat, nslookup, traceroute, telne
host, ftp, arp, wget,route.
1. Tcpdump
7. ftp
8. ssh
9. ifconfig
10. ethtool
11. netstal
12. route
13. traceroute
38
The Green Box Represents The Input. The Red Box Represents The Output. 1. “ping” command in Linux
ping command in Linux is a very useful command to check network connectivity between two servers.
The full form of ping is Packet InterNet Groper. ping command in Linux or UNIX is used to check the
connectivity status between two network resources like servers or switches or routers. [Windows
cmd/Linux cmd/Online cmd]
39
3. “dig” command in Linux
dig command in Linux is another useful Linux networking command. dig stands for domain information
groper and is a flexible tool. dig is a Linux command-line tool for interrogating DNS name servers.
dig performs DNS lookups and displays the answers returned from the name server’s primary and
secondary queries.
Most DNS administrators use the dig tool to troubleshoot DNS-related problems because of its
flexibility, ease of use, and clarity of output compared to other tools. [Linux cmd]
40
5. “telnet” command in Linux
telnet command in Linux is used to communicate with another host using the TELNET protocol. It is
known as a teletype network in the networking arena used to connect remote hosts. telnet port number in
Linux is 21. [Linux cmd]
By default, most of the Linux system telnet and FTP are always restricted due to their natural to have
vulnerability. If you want to use ftp you can use secure FTP programs like vsftpd. [Linux cmd]
41
7. “ssh” command in Linux
ssh command in Linux is a command which you need to access to any server security. ssh is a short form
of secure shell. This is widely used to connect the remote server. The ssh port number in Linux is
Unlike all other remote connectivity tools, it is the safest one. [Windows cmd/Linux cmd/Online cmd]
Syntax: $ ssh <remote host>/<remote IP>
If you simply type ifconfig it will display network configuration like below. It saves all the network
configurations in
/etc/sysconfig/network-scripts/ifcfg-eth0 interface wise. [Windows cmd/Linux cmd/Online cmd]
Syntax: $ ifconfig
42
9. “ethtool” command in Linux
ethtool command in Linux is a really important tool to verify the physical connectivity status and all other
properties of the interface cards.
[Linux cmd]
Syntax: $ sudo ethtool eth0 (eth0 is the first Ethernet Interface)
43
11. “route” command in Linux
route command in Linux is another useful command to display and modify IP routing configurations.
[Linux cmd]
Syntax: $ sudo rout
44
13. “tcpdump” command in Linux
tcpdump command in Linux is a really helpful command if you want to track traffic to a specific network
to find out any issue related to the network.
You can simply type tcpdump to see network statistics. This will be helpful to print all packets arriving at
or departing from server1.
[Linux cmd]
This will copy a file from your local server to the target server in the home directory. [Linux cmd]
45
15.“hostname” command in Linux
hostname command in Linux does the work as its name. If you need to check your server name you can
simply type hostname and it will print the hostname for you.
[Windows cmd/Linux cmd/Online cmd] Syntax: $ hostname
46
17. “host” command in Linux
host command in Linux is used for DNS (Domain Name System) lookup operation. In simple words, this
command is used to find the IP address of a particular domain name or if you want to find out the domain
name of a particular IP address the host command becomes handy. [Linux cmd]
the Net-tools package along with many other notable networking commands (such as ifconfig). The arp
command has since been replaced by the IP neighbour command. The IP command suite was introduced in
Linux 2.2. [Windows cmd/Linux cmd/Online cmd.
47
TASK 4
Every student should individually set up and configuring a new Virtual Machine and Exporting and
packaging an existing Virtual Machine into a portable format.
Theory:
Oracle VM VirtualBox comes in many different packages, and installation depends on your host OS. If you
have installed software before, installation should be straightforward. On each host platform, Oracle VM
VirtualBox uses the installation method that is most common and easy to use.
Base package. The base package consists of all open source components and is licensed under the
GNU General Public License V2.
Extension packs. Additional extension packs can be downloaded which extend the functionality of
the Oracle VM VirtualBox base package. The extension pack provides the following added functionality:
o VirtualBox Remote Desktop Protocol (VRDP) support
o Host webcam pass through
o Disk image encryption with AES algorithm.
o Cloud integration features.
Procedure:
● Windows hosts. In the Programs menu, click on the item in the VirtualBox group. On some
Windows platforms, you can also enter VirtualBox in the search box of the Start menu.
● macOS hosts. In the Finder, double-click on the VirtualBox item in the Applications folder. You
may want to drag this item onto your Dock.
● Linux or Oracle Solaris hosts. Depending on your desktop environment, an Oracle VM
VirtualBox item may have been placed in either the System or System Tools group of your Applications
menu. Alternatively, you can enter VirtualBox in a terminal window.
When you start Oracle VM VirtualBox, the VirtualBox Manager interface is shown.
VirtualBox Manager is the user interface for Oracle VM VirtualBox. You can use VirtualBox Manager to
create, configure, and manage your virtual machines.
This section describes the main features of the VirtualBox Manager user interface. Subsequent sections and
chapters describe how to use VirtualBox Manager to perform tasks in Oracle VM VirtualBox.
When you start Oracle VM VirtualBox, the VirtualBox Manager window is displayed.
48
VirtualBox Manager, Showing Welcome Screen After Initial Startup
49
The main components of the VirtualBox Manager window are as follows:
● The machine list. The left pane of the VirtualBox Manager window lists all your virtual
machines. If you have not yet created any virtual machines, this list is empty.
● The Details pane. The pane on the right displays the properties of the currently selected virtual
machine. If you do not have any machines yet, the pane displays a welcome message.
The toolbar buttons on the Details pane can be used to create and work with virtual machines.
● Help Viewer. A window that displays context-sensitive help topics for VirtualBox Manager tasks.
A toolbar at the top of the Details pane contains buttons that enable you to configure the selected virtual
machine, or to create a new virtual machine.
● New. Creates a new virtual machine, and adds it to the machine list.
● Add. Adds an existing virtual machine to the machine list.
● Settings. Displays the Settings window for the virtual machine, enabling you to make
configuration changes.
● Discard. For a running virtual machine, discards the saved state for the virtual machine and closes
it down.
● Show/Start. For a running virtual machine, Show displays the virtual machine window. For a
stopped virtual machine, Start displays options for powering up the virtual machine.
50
Creating Your First Virtual Machine
Click New in the VirtualBox Manager window. The Create Virtual Machine wizard is shown, to guide
you through the required steps for setting up a new virtual machine (VM).
Use this page to specify a name and operating system (OS) for the virtual machine and to change the
storage location used for VMs.
● Name. A name for the new VM. The name you enter is shown in the machine list of VirtualBox
Manager and is also used for the virtual machine's files on disk.
Be sure to assign each VM an informative name that describes the OS and software running on the VM.
For example, a name such as Windows 10 with Visio.
● Folder. The location where VMs are stored on your computer, called the machine folder. The
default folder location is shown.
Ensure that the folder location has enough free space, especially if you intend to use the snapshots feature.
See also “The Machine Folder”.
● ISO Image. Select an ISO image file. The image file can be used to install an OS on the new
virtual machine or it can be attached to a DVD drive on the new virtual machine.
● Type and Version. These fields are used to select the OS that you want to install on the new virtual
machine.
51
The supported OSes are grouped into types. If you want to install something very
unusual that is not listed, select the Other type. Depending on your selection, Oracle VM
VirtualBox will enable or disable certain VM settings that your guest OS may require. This
is particularly important for 64-bit guests. It is therefore recommended to always set this
field to the correct value.
If an ISO image is selected and Oracle VM VirtualBox detects the operating system
for the ISO, the Type and Version fields are populated automatically and are disabled.
● Base Memory. Select the amount of RAM that Oracle VM VirtualBox should
allocate every time the virtual machine is started. The amount of memory selected here will
be taken away from your host machine and presented to the guest OS, which will report this
size as the virtual machines installed RAM.
Caution
Choose this setting carefully. The memory you give to the VM will not be available
to your host OS while the VM is running, so do not specify more than you can spare.
For example, if your host machine has 4 GB of RAM and you enter 2048 MB as
the amount of RAM for a particular virtual machine, you will only have 2 GB left for all the
other software on your host while the VM is running. If you run two VMs at the same time,
even more memory will be allocated for the second VM, which may not even be able to start
if that memory is not available.
On the other hand, you should specify as much as your guest OS and your
applications will require to run properly. A guest OS may require at least 1 or 2 GB of
memory to install and boot up. For best performance, more memory than that may be
required.
Always ensure that the host OS has enough RAM remaining. If insufficient RAM
remains, the system might excessively swap memory to the hard disk, which effectively
brings the host system to a standstill.
As with other Create Virtual Machine wizard settings, you can change this setting
later, after you have created the VM.
52
● Processor(s). Select the number of virtual processors to assign to the VM.
It is not advised to assign more than half of the total processor threads from the host
machine.
● Enable EFI. Enables Extensible Firware Interface (EFI) booting for the guest OS.
53
Create a Virtual Hard Disk Now. Creates a new empty virtual hard disk image,
located in the VM's machine folder.
o Disk Size. Use the slider to select a maximum size for the hard disk in the new
VM.
Pre-Allocate Full Size. This setting determines the type of image file used for the
disk image. Select this setting to use a fixed-size file for the disk image. Deselect this setting
to use a dynamically allocated file for the disk image.
Dynamically allocated file. This type of image file only grows in size when the
guest actually stores data on its virtual hard disk. Therefore, this file is small initially. As the
drive is filled with data, the file grows to the specified size.
Fixed-size file. This type of image file immediately occupies the file specified,
even if only a fraction of that virtual hard disk space is actually in use. While occupying
much more space, a fixed-size file incurs less overhead and is therefore slightly faster than a
dynamically allocated file.
Use an Existing Hard Disk File. Enables you to select an existing disk image file
to use with the new VM.
The drop-down list presented in the window lists all disk images which are known
54
by Oracle VM VirtualBox. These disk images are currently attached to a virtual machine, or
have been attached to a virtual machine.
Alternatively, click on the small folder icon next to the drop-down list. In the Hard
Disk Selector window that is displayed, click Add to select a disk image file on your host
disk.
● Do Not Add a Virtual Hard Disk. The new VM is created without a hard disk.
After having selected or created your image file, click Next to go to the next wizard
page.
Exporting an Appliance in OVF Format The following steps show how to export an
On the initial Virtual Machines page, you can combine several VMs into an OVF
2. The Format Settings page enables you to configure the following settings:
● Format: Selects the Open Virtualization Format value for the output files.
The Oracle Cloud Infrastructure value exports the appliance to Oracle Cloud
Infrastructure.
You can edit settings for the virtual appliance. For example, you can change the
name of the virtual appliance or add product information, such as vendor details or license
text.Double-click the appropriate field to change its value.
55