0% found this document useful (0 votes)
21 views47 pages

Ccs372 Students Lab Manual

The document is a lab manual for the Virtualization Laboratory course (CCS372) for B.Tech. Computer Science and Business Systems students at Ramco Institute of Technology. It outlines the vision and mission of the institute and department, course objectives, outcomes, and detailed lab exercises related to virtualization technologies using tools like VMware and Linux. The manual also includes instructions for students, evaluation criteria, and a preface acknowledging contributions to the manual's preparation.

Uploaded by

953622244002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views47 pages

Ccs372 Students Lab Manual

The document is a lab manual for the Virtualization Laboratory course (CCS372) for B.Tech. Computer Science and Business Systems students at Ramco Institute of Technology. It outlines the vision and mission of the institute and department, course objectives, outcomes, and detailed lab exercises related to virtualization technologies using tools like VMware and Linux. The manual also includes instructions for students, evaluation criteria, and a preface acknowledging contributions to the manual's preparation.

Uploaded by

953622244002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

CCS372 – VIRTUALIZATION LABORATORY

LAB MANUAL
Regulation- 2021

B.Tech. Computer Science and Business


Systems

III year / VI
semester
(CSBS)

Academic Year 2025-2026(Even Sem)

Department of Computer Science and Business System


RAMCO INSTITUTE OF TECHNOLOGY
MAY 2025

PREPARED BY APPROVED BY
Dr.M.Jeya Sundari, Dr.M.Gomathy Nayagam
AP/CSBS HOD/CSBS

1
VISION AND MISSION

Vision of the Institute


To evolve as an Institute of international repute in offering high-quality technical education,
Research and extension programmers in order to create knowledgeable, professionally competent
and skilled Engineers and Technologists capable of working in multi-disciplinary environment to
cater to the societal needs.
Mission of the Institute
To accomplish its unique vision, the Institute has a far-reaching mission that aims:
 To offer higher education in Engineering and Technology with highest level of quality,
Professionalism and ethical standards
 To equip the students with up-to-date knowledge in cutting-edge technologies, wisdom,
creativity and passion for innovation, and life-long learning skills
 To constantly motivate and involve the students and faculty members in the education
process for continuously improving their performance to achieve excellence.
Vision of the Department

To build competent, Industry-ready professionals to largely contribute to society, by imparting


knowledge in the domain of Computer Science and Business Systems.

Mission of the Department

 Furnish/Facilitate the department with world-class computing infrastructure and modern


teaching methodologies to produce highly proficient and globally competent Computer
Science and Business Systems professionals.

 Motivate the students and faculties in research and innovation and foster critical thinking
with the moral values in the recent technologies of Computer Science and Business Systems.

 Equip the students with the latest technologies to become ethically sound Computer Science
and Business Systems professionals and entrepreneurs.
Program Educational Objectives (PEOs)

 Graduate will have a successful career in IT, Business Development, Business Analytics, and
Intelligence, as well as technical and managerial responsibilities.

 Graduate will have the ability to pursue higher studies and research or become an

2
entrepreneur in the contemporary areas of Computer Science and Business Systems.

 Graduate will exhibit socially committed productive leadership with high ethical standards
and professionals making sound engineering and managerial decisions.
Program Outcomes (Pos)
Engineering Graduates will be able to:

o Engineering knowledge: Apply the knowledge of mathematics, science, engineering


fundamentals, and an engineering specialization to the solution of complex engineering
problems.

o Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.

o Design/development of solutions: Design solutions for complex engineering problems and


design system components or processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural, societal, and environmental
considerations.

o Conduct investigations of complex problems: Use research-based knowledge and research


methods including design of experiments, analysis and interpretation of data, and synthesis of the
information to provide valid conclusions.

o Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modeling to complex engineering activities
with an understanding of the limitations.

o The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to
the professional engineering practice.

o Environment and sustainability: Understand the impact of the professional engineering


solutions in societal and environmental contexts, and demonstrate the knowledge of, and need
for sustainable development.

o Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.

o Individual and team work: Function effectively as an individual, and as a member or leader in
diverse teams, and in multidisciplinary settings.

3
o Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.

o Project management and finance: Demonstrate knowledge and understanding of the


engineering and management principles and apply these to ones own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.

o Life-long learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.

Program Specific Outcomes (PSOs)

After successful completion of the degree, the students will be able to:

 Apply various cutting-edge technologies including Artificial Intelligence, Machine Learning/


Deep Learning, Cloud Computing, Cyber Security, and IOT to solve contemporary problems
with knowledge of management principles.
 Exhibit proficiency in Computation Statistics, Software development models, and business
skills through various professional societies and continuous learning to provide solutions to real-
world business problems.

 Apply appreciable knowledge of management skills cultured through Industry Interactions and
Real-time projects to practice as an ethical software engineer/ researcher in the domain of
Computer Science and Business Systems.

4
INSTRUCTIONS TO STUDENTS

 Students should wear Uniforms and Coats neatly during the lab session
 Students should maintain silence during lab hours; roaming around the lab during lab
session is not permitted
 Programs should be written in the manual and well prepared for the current exercise
before coming to the session
 Experiments should be completed within the Specified Lab Session
 Before Every Session, Last Session lab exercise & record should be completed and get it
verified by the faculty
 In the Record Note, Flow Chart and Outputs should be written on the left side, while
Aim, Algorithm & Result should be written on the right side.
 Programs (Printed) should be placed on the right side
 Marks for each lab exercise is awarded as follows:

Performance 25 Marks

Viva 10 Marks

Record 15 Marks

Total 50 Marks

5
PREFACE

This manual is prepared for Anna University Regulation R2021. This manual covers the
syllabus of Anna University with additional exercises in the basic programming concepts of
python programming which will helpful for the students.
Viva questions related to the exercise is included at the end of each lab exercise.
I acknowledged Dr.M.Gomathy Nayagam HOD/CSBS for the support to complete this
manual and also for providing valuable suggestions in preparing this students’ centric manual.
I would also like thank to other people who helped me in many ways.

6
CONTENTS

Syllabus
Course Objectives and Outcomes
CO Mapping with LAB Exercise
CO-PO and CO-PSO Mapping

Ex. No Name of the Lab Exercises


1 Create type 2 virtualization in VMWARE or any equivalent Open Source Tool.
Allocate memory and storage space as per requirement. Install Guest OS on
that VMWARE.
2 a. Shrink and extend virtual disk
b. Create, Manage, Configure and schedule snapshots
c. Create Spanned, Mirrored and Striped volume
d. Create RAID 5 volume
3 a. Desktop Virtualization using VNC
b. Desktop Virtualization using Chrome Remote Desktop
4 Create type 2 virtualization on ESXI 6.5 server
5 Create a VLAN in CISCO packet tracer

6 Install KVM in Linux

7 Create Nested Virtual Machine(VM under another VM)

7
ANNA UNIVERSITY: CHENNAI
AFFILIATED INSTITUTIONS – REGULATIONS 2021
COMPUTER SCIENCE AND BUSINESS SYSTEMS
SYLLABUS
COURSE OBJECTIVES:
 To Learn the basics and types of Virtualization
 To understand the Hypervisors and its types
 To Explore the Virtualization Solutions
 To Experiment the virtualization platforms

PRACTICAL EXERCISES:
Note: The examples suggested in each experiment are only indicative. The lab instructor is
expected to design other problems on similar lines. The Examination shall not be restricted to
the sample experiments listed here.
1. Create type 2 virtualization in VMWARE or any equivalent Open Source Tool. Allocate
memory and storage space as per requirement. Install Guest OS on that VMWARE.
2. a. Shrink and extend virtual disk
b. Create, Manage, Configure and schedule snapshots
c. Create Spanned, Mirrored and Striped volume
d. Create RAID 5 volume
3. a. Desktop Virtualization using VNC
b. Desktop Virtualization using Chrome Remote Desktop
4.Create type 2 virtualization on ESXI 6.5 server
5.Create a VLAN in CISCO packet tracer
6.Install KVM in Linux
7.Create Nested Virtual Machine (VM under another VM)
30 PERIODS
OUTCOMES:

On completion of the course, students will be able to:

CO1: Analyze the virtualization concepts and Hypervisor


CO2: Apply the Virtualization for real-world applications
CO3: Install & Configure the different VM platforms
CO4: Experiment with th he VM with various software

8
Department of Computer Science and Business Systems

Academic Year: 2023-2024 (Even Semester)

Course Objectives and Outcomes

Degree, Semester & Branch: VI Semester B.Tech CSBS

Course Code & Title: CSS372 & Virtualization Laboratory

Course Objectives:

1 To Learn the basics and types of Virtualization


2 To understand the Hypervisors and its types
3 To Explore the Virtualization Solutions
4 To Experiment the virtualization platforms
Course Outcomes:

On completion of the course, students will be able to:

CO1: Analyze the virtualization concepts and Hypervisor


CO2: Apply the Virtualization for real-world applications
CO3: Install & Configure the different VM platforms
CO4: Experiment with th he VM with various software

9
Expt. No
Title of Experiment Page

1 Install Guest OS on that VMWARE

Shrink and extend virtual disk

Create, Manage, Configure and schedule snapshots


2

Create Spanned, Mirrored and Striped volume

Create RAID 5 volume

Desktop Virtualization using VNC


3
Desktop Virtualization using Chrome Remote Desktop

4 Create type 2 virtualization on ESXI 6.5 server

5 Create a VLAN in CISCO packet tracer

6 Install KVM in Linux

Create Nested Virtual Machine(VM under another VM)


7

10
Exercise: 1

Create type 2 virtualization in VMWARE or any equivalent Open Source Tool. Allocate
memory and storage space as per requirement. Install Guest OS on that VMWARE

Aim:

To find the procedure to run VM of different configuration and Allocate memory and
storage space as per requirement.

Objective:
To learn the concepts of creating Type 2 virtualization.
To learn the process of installing Guest OS in VMware /Virtual Box
Software required:
● VMware Workstation / Virtual Box
● ISO image of the Guest OS
Description:

 Virtualization is a technology that enables the creation of virtual instances of


computer hardware platforms, operating systems, storage devices, and network
resources. These virtual instances, also known as virtual machines (VMs), function
as if they were independent physical resources.

 A VMware / Virtual Box is a software virtualization package that helps to install an


operating system as an application. This is the hypervisor (software) that allows
additional operating systems to be installed on the host machine, as a Guest OS, and run
in a virtual environment.

 Virtualization offers numerous benefits to organizations, including cost savings, improved


resource utilization, enhanced flexibility, and better disaster recovery capabilities, making it
an essential technology in modern industries.

Procedure:

Step 1: Download and Install VMware Workstation Player

11
Step 2: Create a New Virtual Machine Open VMware Workstation Player

Click on "Create a New Virtual Machine" or go to File > New Virtual Machine

Step 3: Virtual Machine Configuration Wizard


The Virtual machine configuration Wizard will appear. Choose “Typical”
configuration and click “Next”.

12
Step 4: Install Guest Operating System

 Choose the installation method for the guest OS. You can either install from a disc
or image file (ISO) or choose to install later. If you have the ISO file for your
guest OS, select it during this step
 Click “Next”

Step 5: Enter Guest OS Details

 Enter the name of your virtual machine and choose the location where you want to
save it.
 Select the appropriate guest operating system and version. For example, if you are
installing Windows 10, choose "Windows" as the guest OS and "Windows 10 x64" as
the version.
 Click "Next."

Step 6: Configure Virtual Machine Hardware

 Allocate memory: Choose how much RAM you want to allocate to the virtual
machine. Make sure to leave enough memory for your host OS to run smoothly as
well.
 Allocate storage: Choose whether to store the virtual disk as a single file or split into
multiple files. Specify the disk size, and you can also choose to allocate all disk space
now or let it grow as needed.
 Click "Next."
Step 8: Customize Hardware (Optional)
13
 If needed, you can customize the virtual machine's hardware settings like CPU cores,
network adapters, graphics memory, etc. Otherwise, you can leave them as default.
 Click "Finish" once you are satisfied with the settings.
Step 8: Install Guest OS

 Start the virtual machine you just created. The virtual machine will boot from the ISO
or installation media you provided earlier.
 Follow the standard installation process for your guest OS.
Step 9: Install VMware Tools (Optional but Recommended)

 After installin/ g the guest OS, it is advisable to install VMware Tools within the
guest OS. VMware Tools provides better integration between the host and guest OS,
enabling features like shared folders, improved graphics, and more.
In the same way, we can install windows OS also. The output screens for the virtual
machines of different configurations.

OUTPUT:

(i) Ubuntu Operating System in Virtual Machine


(ii) Windows7 Operating System in Virtual Machine

14
Real Time Application:
❖ Cloud computing: Virtualization technology creates virtual resources from
physical hardware.
❖ Software testing: Isolation allows developers to test software without
impacting the rest of the system.
❖ Malware investigations. VMs enable malware researchers to test malicious
programs in separate environments. Instead of spreading to the rest of the
infrastructure, a VM contains the malware for study.
❖ Disaster management. virtual machines are used to replicate a system in a
cloud environment.

RESULT: Thus, various configurations of Virtual machines has been created and run.

Viva Questions:

1. What is Type 2 virtualization?


It is virtualization that runs on a host operating system using software like VMware.
2. Why is memory allocation important in virtual machines?
Proper memory allocation ensures smooth performance for both the host and guest OS.
3. What is the purpose of VMware Tools in the virtual machine?
It improves performance and enables better integration between host and guest OS.
4. Which file format is used to store VMware virtual disk files?
The file format used is VMDK (Virtual Machine Disk).
5. What open-source tool can be used as an alternative to VMware?
Virtual Box or KVM are popular open-source alternatives.

15
Exercise: 2(a)

(a) Shrink and Extend Virtual Disk

Aim:

To find the procedure of Shrink a virtual disk involves reducing its size to reclaim
unused space and extend a virtual disk allows you to increase its size to accommodate more
data.

Objective:
To learn the concepts of shirking and extending virtual disks and snapshots

Software required:
VMware Workstation / Virtual Box

Description:

a. Shrink and extend virtual disk

 Shrinking a virtual disk involves reducing the allocated storage space of a


virtual disk file (.vmdk for VMware, .vhd/.vhdx for Hyper-V, etc.) by
removing unused space from within the disk. This process helps in optimizing
disk usage and reclaiming storage space on the host system.

 Extending a virtual disk involves increasing the allocated storage space of a


virtual disk file. This operation is necessary when additional storage capacity is
required for a virtual machine due to increased data requirements.

Procedure:

Shrink a Virtual Disk:

Step1: Inside the virtual machine, delete unnecessary files and empty the recycle
bin/trash to free up space.

Step 2: Defragment the virtual machine's disk to move all the data to the beginning of the
disk.

Step 3: Shutdown the virtual machine.

Step 4: On the host system, open the virtualization software

Step 5: Navigate to the virtual machine's settings or configuration.


16
Step 6: Select the virtual disk you want to shrink.

Step 7: Look for an option to shrink or compact the disk and follow the prompts.

Step 8: The process might take some time, and it's essential to back up your virtual machine
before proceeding, as data loss can occur in some cases.

Extend Virtual Disk:

Step 1: Shutdown the virtual machine.

Step 2: On the host system, open the virtualization software (e.g., VMware, Virtual Box).

Step 3: Navigate to the virtual machine's settings or configuration.

Step 4: Select the virtual disk you want to extend.


Step 5: Look for an option to increase or extend the disk and follow the prompts.

Step 6: Specify the new size for the virtual disk (make sure to allocate enough space for your
needs).

Step 7: The process might take some time, and it's crucial to back up your virtual machine
before proceeding, as extending the disk involves modifying the underlying file system.

Output:

17
18
Result:

Thus, the shrink and extend of virtual disk has been created and run Successfully.

Viva Question:

1. Which tool is used to shrink and extend virtual disks in VMware? (Ans: Disk Manager)
2. What file format is commonly used for VMware virtual disks? (Ans: VMDK)
3. What operation is performed to reduce the size of a virtual disk? (Ans: Shrink)
4. What process increases the capacity of a virtual disk? (Ans: Extend)
5. Which command-line tool can be used for advanced virtual disk management?
(Ans: vmware-vdiskmanager)

19
Exercise: 2(b)

(b) Create, Manage, Configure and schedule snapshots

Aim:

To find the procedure of Creating, managing, configuring, and scheduling snapshots is a


fundamental part of virtual machine management.

Objective:
To learn the concepts of creating, managing, configuring, and scheduling snapshots

Software required:
● VMware Workstation /VirtualBox

Description:
Creating, managing, configuring, and scheduling snapshots are essential tasks in
virtualization environments for maintaining data integrity, facilitating backups, and
enabling disaster recovery.

Procedure:
Step 1: Creating a Snapshot: To create a snapshot, follow these steps:

a. Select the virtual machine in the management interface (e.g., vSphere Client).
b. Right-click on the virtual machine and choose "Snapshot" or "Take Snapshot."

c. Provide a name and description for the snapshot.

d. Optionally, select the memory state to capture the virtual machine's running state
(requires the virtual machine to be powered off).

e. Click "OK" to create the snapshot.


Step 2: Managing Snapshots: Managing snapshots involves tasks such as viewing,
reverting, deleting, and consolidating snapshots.

a. Viewing Snapshots: To see the list of snapshots for a virtual machine, navigate to
the "Snapshots" tab in the virtual machine's details.

b. Reverting to a Snapshot: To revert a virtual machine to a specific snapshot, right-


click on the snapshot and choose "Revert to Snapshot." This action will roll back the virtual
machine to the state captured in the selected snapshot.

c. Deleting Snapshots: To delete a snapshot, right-click on the snapshot and choose


"Delete Snapshot." You can choose to delete the snapshot only or delete the snapshot and
consolidate its changes into the base virtual machine disk.

20
d. Consolidating Snapshots: If you have multiple snapshots, you can perform a
"Snapshot Consolidation" to merge all snapshots into the base disk. This helps to reduce
storage requirements and improves performance.

Step 3: Configuring Snapshot Settings: The snapshot settings allow you to define how
snapshots are managed and stored.

a. Snapshot Location: Configure the location where snapshot files are stored, which
can be on the same data store as the virtual machine or on a different storage location.
b. Snapshot Quiescent: Enable or disable the use of VMware Tools to quiesce the file
system inside the virtual machine before taking a snapshot. This helps ensure application
consistency during the snapshot.

Step 4: Scheduling Snapshots: Some virtualization platforms allow you to schedule


snapshots to be taken automatically at specific intervals.

a. Scheduled Snapshots: Navigate to the virtual machine's settings, find the


"Snapshot Schedule" option, and configure the frequency and retention
policy for automatic snapshots.
Output:

21
22
Result:

The procedure for creating, managing, configuring, and scheduling snapshots of virtual machines
was successfully identified and implemented. It ensures efficient virtual machine management
and data recovery.

Viva Questions:

1. What is the purpose of creating a snapshot in virtual machines?


A snapshot captures the current state of a virtual machine for backup or rollback
purposes.
2. How can you manage snapshots in VMware?
Snapshots can be managed through the VMware management interface by creating,
deleting, or reverting them.
3. What does configuring a snapshot involve?
Configuring a snapshot involves selecting the virtual machine state, memory, and disk
options to capture.
4. How do you schedule snapshots in VMware?
Snapshots can be scheduled using VMware's built-in task scheduler or automation tools
like PowerCLI
5. Why is it important to delete old snapshots?
Deleting old snapshots prevents excessive disk space usage and ensures the virtual
machine performs optimally.

Exercise: 2 (c)

(c) Create Spanned, Mirrored and Striped volume


Aim:
To create spanned, mirrored, and striped volumes in a Windows operating system.

Objective:

To learn the concepts of creating spanned, mirrored, and striped volumes in a Windows

Software required:

VMware Workstation / VirtualBox

DESCRIPTION:
 Spanned volumes combine multiple disks into one for increased capacity but lack
fault tolerance. Mirrored volumes duplicate data for redundancy, ensuring
availability but consuming more space. Striped volumes distribute data for faster
performance but offer no fault tolerance, risking data loss if a disk fails. Each
type has its advantages and trade-offs, catering to different storage needs.
Procedure:
23
Step 1: How to create a spanned volume:

a. Right-click on "This PC" or "My Computer" and select "Manage."

b. In the Computer Management window, click on "Disk Management" under


"Storage" in the left pane.

c. Identify the disks you want to use in the spanned volume. They should be
unallocated or have empty space available.

d. Right-click on the first disk and choose "New Spanned Volume."

e. Follow the on-screen instructions to select additional disks and allocate space for
the spanned volume.

f. Assign a drive letter or mount point to the new volume and format it with a file
system.

Step 2: How to create a mirrored volume:

a. Follow steps a to c from the spanned volume creation process to open Disk
Management.

b. Right-click on one of the disks you want to use in the mirror and choose "New
Mirrored Volume."

c. Select the additional disk(s) to mirror the first disk, and then allocate space for the
mirrored volume.

d. Assign a drive letter or mount point to the new volume and format it with a file
system. e. Windows will start the synchronization process, where data is copied from the
source disk to the mirror disk(s).

Step 3: How to create a striped volume:

a. Follow steps a to c from the spanned volume creation process to open Disk
Management.
b. Right-click on one of the disks you want to use in the stripe and choose "New
Striped Volume."

c. Select the additional disk(s) to include in the stripe, and then allocate space for the
striped volume. d. Assign a drive letter or mount point to the new volume and format it with a
file system.

Output:

24
Result:
Spanned, mirrored, and striped volumes were successfully created in the Windows
operating system. The implementation demonstrates efficient disk management and data
organization techniques.
25
Viva Question:

1. What is a spanned volume? (Answer: Extension)


2. Which RAID level is used for mirrored volumes? (Answer: RAID 1)
3. What is the primary benefit of a striped volume? (Answer: Performance)
4. Which tool is commonly used to create volumes in Windows? (Answer: Disk
Management)
5. What does RAID 0 provide in a striped volume? (Answer: Speed)

Exercise: 2(d)

(d) Create RAID 5 Volume:


Aim:

To create a RAID 5 volume using a hardware RAID controller or motherboard BIOS.

Objective:
To learn the concepts of creating spanned, mirrored, and striped volumes in a Windows

Software required:
● VMware Workstation

Description:

 A RAID 5 volume is a type of redundant array of independent disks (RAID)


configuration that provides data redundancy and performance improvements by
distributing data and parity information across multiple disks. RAID 5 volumes are
commonly used in environments where a balance of performance, fault tolerance, and
capacity efficiency is required, such as file servers, database servers, and virtualization
environments.

Working of RAID 5:

Striping: Data is divided into blocks, and each block is written across multiple disks in
the array. This striping improves read and write performance because data can be
accessed concurrently from multiple disks.

Parity Calculation: Parity information is calculated for each stripe of data. Parity is a
form of error- checking that allows the system to recover data if one of the disks in the
array fails. The parity information is distributed across all disks in the array.

Redundancy: Unlike RAID 0, which offers no redundancy, RAID 5 provides fault


tolerance by distributing parity across all disks. If one disk fails, data can be
26
reconstructed using the parity information stored on the remaining disks in the array.
This means that the array can continue to function even if one disk fails.

Procedure:

Step 1: Backup Data: Before creating the RAID 5 volume, back up all your critical data to
ensure it is safe in case of any unforeseen issues.

Step 2: Initialize and Convert Disks to Dynamic: If your disks are currently basic disks, you
need to convert them to dynamic disks to create a RAID 5 volume. Follow these steps:

a. Right-click on "This PC" or "My Computer" and select "Manage."

b. In the Computer Management window, click on "Disk Management" under


"Storage" in the left pane.

c. Identify the disks you want to use in the RAID 5 array. They should be unallocated
or have empty space available.

d. Right-click on each disk and select "Convert to Dynamic Disk." Repeat this for all
the disks you want to include in the RAID 5 array.

Step 3: Create the RAID 5 Volume: Once you have converted the disks to dynamic, you can
proceed to create the RAID 5 volume:

Right-click on one of the disks you want to use in the RAID 5 array.

a. Select "New Spanned Volume."

b. Follow the on-screen instructions to select the other disks you want to include in
the RAID 5 array. There should be at least three disks in total.

c. Allocate the desired amount of space for the RAID 5 volume. RAID 5 requires a
minimum of three disks, and the volume size will be the total capacity of all disks minus one
disk's worth of space. For example, if you have three 1TB disks, the RAID 5 volume will
have a total capacity of 2TB.

d. Assign a drive letter or mount point to the new RAID 5 volume and format it with
a file system.

Step 4: Initialize and Format the RAID 5 Volume: After creating the RAID 5 volume, you
need to initialize and format it:

a. When prompted, initialize the disks using the default partition style (usually
GPT).

b. Format the RAID 5 volume with your desired file system (e.g., NTFS) and assign a
drive letter or mount point.

Output:
27
Real Time Application:

❖ In real time projects disk shrinking to reclaim unused space and reduce the size of the
virtual disk file.

❖ Disk Extension: In a production environment hosting a database server, as the database


grows over time, the virtual disk storing the database files may approach its capacity limit.
By extending the disk's capacity, administrators can ensure uninterrupted operation of the
database server without needing to migrate data to a new disk.

❖ Snapshot: Before applying updates or patches to a critical application running in a


28
virtualized
environment, administrators can take a snapshot of the VM. If the updates cause
unexpected issues, they can quickly revert the VM to its previous state using the
snapshot, minimizing downtime and potential data loss.

❖ Spanned Volume: By spanning the disks, a larger logical volume can be created without
needing to migrate data or reconfigure the virtual machine's storage. This might be useful
to expand storage capacity for a VM without disrupting its operation.

❖ Mirrored Volume (RAID 1): By configuring a mirrored volume for the virtual disks
hosting these systems, you ensure that data remains accessible even if one disk fails.

❖ Striped Volume (RAID 0): in a virtualized data analytics environment, a


striped volume can accelerate data processing tasks by leveraging parallel disk
access.

❖ RAID 5: Useful in all Real Time video applications.

Result:

A RAID 5 volume was successfully created using a hardware RAID controller or


motherboard BIOS. This setup ensures data redundancy and improved read performance.

Viva Question:

1. What is RAID 5?
RAID 5 is a disk array that uses striping with parity for data redundancy and improved
performance.
2. What is the minimum number of drives required to create a RAID 5 volume?
A minimum of three drives is required to create a RAID 5 volume.
3. How does RAID 5 ensure data redundancy?
RAID 5 uses parity data distributed across all disks to protect against single-drive
failure.
4. What is the role of the hardware RAID controller in RAID 5?
The hardware RAID controller manages the RAID array, handling the parity calculation
and disk management.
5. What happens if a single drive fails in a RAID 5 setup?
The RAID 5 setup can continue to function normally, and the failed drive can be
replaced without data loss.

29
Exercise: 3 (a)

(a): Desktop Virtualization using VNC

Aim: To set up desktop virtualization using VNC (Virtual Network Computing) to remotely
access and control a desktop.

Procedure:

Step 1: Install VNC Server.

Step 2: Configure VNC Server: After installing the VNC server, you'll need to configure it
by setting a password or access control options to secure the remote access. Ensure that the
VNC server is running and ready to accept incoming connections.

Step 3: Install VNC Viewer.

Step 4: Connect to the Remote Desktop: Launch the VNC viewer and enter the IP address or
host name of the remote computer (the host) you want to connect to. If you have configured a
password or access control options on the VNC server, you will be prompted to enter the
credentials. Once authenticated, the VNC viewer establishes a connection to the remote
desktop.

Step 5: Control the Remote Desktop: After the connection is established, you will see the
remote desktop environment displayed in the VNC viewer. You can now interact with the
remote desktop as if you were physically sitting in front of it. You can run applications,
access files, and perform any tasks on the remote computer just as if you were using it
directly.

Output:

30
Result: Desktop virtualization using VNC has been successfully set up, allowing you to
remotely access and control the host computer's desktop from a client computer or device.
Viva Question :

1. What is VNC in desktop virtualization?


VNC (Virtual Network Computing) allows remote access and control of a desktop over a
network.
2. How does VNC work?
VNC works by transmitting screen images from the remote machine and receiving
keyboard and mouse inputs.
3. What is required to set up a VNC server?
A VNC server software must be installed on the host machine for remote desktop access.
4. Which VNC client software can be used to access the virtual desktop?
VNC Viewer or any compatible VNC client can be used to access the remote desktop.
31
5. What is a key advantage of using VNC for desktop virtualization?
VNC provides cross-platform access, allowing users to connect to virtual desktops
from various operating systems.

Exercise: 3 (b)

(a) Desktop Virtualization using Chrome Remote Desktop

Aim: To set up desktop virtualization using Chrome Remote Desktop to


remotely access and control a desktop.

Procedure:

Step 1: Install Chrome Remote Desktop Extension: Make sure you have the Google Chrome
web browser installed on both the computer you want to access remotely (the host) and the
computer or device you want to use for remote access (the client). Install the "Chrome
Remote Desktop" extension from the Chrome Web Store on both devices.

Step 2: Set Up Host Computer (Computer to be Accessed):

a. Open Google Chrome on the host computer.

b. In the address bar, type "chrome://apps" and press Enter.

c. Click on the "Chrome Remote Desktop" icon to open the application.

d. Follow the on-screen instructions to grant necessary permissions and set up


remote access for the host computer.

e. Create a secure PIN to use for remote access authentication.


Step 3: Access Host Computer (Client Device):

a. Open Google Chrome on the client device (the computer or device from which
you want to access the host computer remotely).

b. In the address bar, type "remotedesktop.google.com/access" and press


Enter.

c. Click on the "Access" button under the "Remote Access" section.

d. Sign in with your Google Account (the same account used on the host
computer).

Step 4: Choose the Host Computer:

32
a. After signing in, you should see a list of available computers set up for remote
access. Choose the host computer you want to access.

Step 5: Authenticate and Connect:

a. If you have set up a PIN for the host computer, you will be prompted to enter it to
authenticate the remote access.

b. Once authenticated, the remote connection will be established, and you


will see the host computer's desktop in the Chrome browser window.

Step 6: Control the Host Computer:

a. You can now interact with the host computer's desktop through the Chrome
browser on your client device. Use your mouse and keyboard to control the remote desktop.

b. To switch between full-screen and windowed mode, click the "Toggle full screen"
button on the top right corner of the remote desktop window.

Step 7: End the Remote Session: To end the remote session, click the "Stop Sharing"
button at the bottom of the remote desktop window.

Output:

33
Result: Desktop virtualization using Chrome Remote Desktop has been successfully set up,
enabling remote access and control of the host computer's desktop from a client computer or
device.

Viva Question:

1. What is Chrome Remote Desktop?


It is a tool for remotely accessing and controlling another computer using a web browser.
2. How do you install Chrome Remote Desktop?
Install the Chrome Remote Desktop app from the Chrome Web Store.
3. What do you need to use Chrome Remote Desktop?
A Google account and the Chrome browser are required.
4. Can Chrome Remote Desktop work on mobile devices?
Yes, it supports both Android and iOS devices.
5. How is Chrome Remote Desktop secured?
It uses a PIN code for secure access to remote computers.

Exercise: 4

Create type 2 virtualization on ESXI 6.5 server

Aim: To set up Type 2 virtualization on an ESXi 6.5 server, enabling the creation of
virtual machines within the ESXi environment.
Procedure:

Step 1: Install ESXi 6.5: First, you need to install VMware ESXi 6.5 on your server.

Step 2: Access ESXi Web Client: Once ESXi is installed and running, access the ESXi Web
Client through a web browser on a separate computer. Enter the IP address or hostname of
your ESXi server to log in to the management interface.

Step 3: Create a Virtual Machine: To create a virtual machine within ESXi, follow these

34
steps:

a. In the ESXi Web Client, navigate to the "Hosts and Clusters" view.

b. Select your ESXi server from the list of hosts.

c. Click on the "Create/Register VM" button or right-click on the host and choose
"New Virtual Machine."

d. The "Create New Virtual Machine" wizard will appear. Follow the steps in the
wizard to configure the virtual machine, including providing a name, selecting the guest
operating system, setting the desired resources (CPU,memory, disk space, etc.), and selecting
a storage location for the virtual machine files.

e. Finish the wizard, and the virtual machine will be created.


Step 4: Install Guest Operating System: Once the virtual machine is created, you can power
it on and install the guest operating system of your choice (e.g., Windows, Linux, etc.) using
an ISO image or CD/DVD.

Step 5: Access and Manage the Virtual Machine: After the guest operating system is
installed, you can access the virtual machine through the VMware Remote Console (VMRC)
or use remote access tools like VNC or RDP to interact with the guest operating system.

OUTPUT:

35
Result:

Type 2 virtualization was successfully created on the ESXi 6.5 server. This enables efficient
hosting of virtual machines with optimal resource utilization.

Viva Question:

1. What is Type 2 virtualization?


Type 2 virtualization runs on top of an existing host operating system.
2. Can you create Type 2 virtualization on ESXi 6.5?
No, ESXi is a Type 1 hypervisor, not a Type 2 hypervisor.
3. What is the main difference between Type 1 and Type 2 virtualization?
Type 1 runs directly on hardware, while Type 2 runs on an operating system.
4. What is required to create virtual machines on ESXi 6.5?
You need to use the vSphere Client to create and manage virtual machines on ESXi 6.5.
5. Is ESXi 6.5 used for personal or enterprise virtualization?
ESXi 6.5 is primarily used for enterprise-level virtualization.

36
Exercise: 5

Create a VLAN in CISCO packet tracer

Aim: To create a Virtual Local Area Network (VLAN) in Cisco Packet Tracer.

Procedure:

Step 1: Launch Cisco Packet Tracer: Start Cisco Packet Tracer and open a new or existing
project.

Step 2: Add Switches: Drag and drop switches from the "Switches" section of the "Devices"
pane onto the workspace. You can use any Cisco switch model available in Packet Tracer.
Step 3: Connect Switches: Connect the switches using Ethernet cables. Click on the Ethernet
interfaces of the switches and then click on the other switch's Ethernet interfaces to create
connections.

Step 4: Access the CLI: Double-click on the first switch to access its CLI (Command Line
Interface). The CLI window will open.

Step 5: Configure VLANs: Enter the configuration mode by typing the following command:

enable

configure terminal

Step 6: Create VLANs: To create VLANs, use the Vlan command followed by
the VLAN number. For example, to create VLAN 10 and VLAN 20, you would do:

vlan 10

vlan 20

Step 7: Assign Ports to VLANs: To assign ports to VLANs, use the command

I n t e r f a c e followed by the port number and then the switch port


access vlan command. For example, to assign port 1 to VLAN 10 and port 2 to VLAN 20, you
would do:

interface FastEthernet0/1

switchport mode access

switchport access vlan 10

interface FastEthernet0/2

switchport mode access

switchport access vlan 20


37
Step 8: Exit Configuration Mode: After assigning VLANs to the desired ports, exit the
configuration mode by typing exit.

Step 9: Save Configuration: Save the configuration by typing write or copy running-config
startup-config to make sure the changes are saved.
Step 10: Test VLANs: Now that you have created VLANs and assigned ports, you can test
the connectivity between devices connected to the switches. Devices in the same VLAN
should be able to communicate with each other, while devices in different VLANs should not
have direct communication unless you configure inter-VLAN routing.

Output:

38
Result:

A VLAN was successfully created in Cisco Packet Tracer. This setup enables network
segmentation and improves traffic management and security.
Viva Questions:

1. What is a VLAN?
A VLAN (Virtual Local Area Network) segments a network into smaller, isolated
broadcast domains.
2. How do you create a VLAN in Cisco Packet Tracer?
Use the "VLAN Database" in the Switch CLI to create a VLAN and assign a number.
3. What command is used to create a VLAN in the switch CLI?
The command is vlan [VLAN_ID].
4. How do you assign ports to a VLAN in Cisco Packet Tracer?
Use the switchport access vlan [VLAN_ID] command to assign ports to the VLAN.
5. Why are VLANs used in a network?
VLANs are used to improve network performance, security, and management by
isolating traffic.

Exercise :6

Install KVM in Linux

Aim: To install Kernel-based Virtual Machine (KVM) on a Linux system.

Procedure:

Step 1: Check Hardware Support: Before installing KVM, ensure that your system's CPU
supports hardware virtualization extensions (Intel VT-x or AMD- V). You can check this by
running the following command:
39
egrep -c '(vmx|svm)' /proc/cpuinfo

If the output is greater than zero (1 or more), it means your CPU supports hardware
virtualization.

Step 2: Install KVM Packages: The package names may vary depending on your Linux
distribution. Here are the package names for some popular distributions:

For Ubuntu/Debian:

sudo apt update


sudo apt install qemu-kvm libvirt-daemon-system libvirt-clients bridge- utils virt-
manager

For CentOS/RHEL:

sudo yum install qemu-kvm libvirt virt-install bridge-utils sudo

systemctl enable libvirtd

sudo systemctl start libvirtd

For Fedora:

sudo dnf install @virtualization sudo systemctl enable libvirtd sudo systemctl start

libvirtd
Step 3: Verify Installation: After installing the required packages, check if KVM kernel
modules are loaded correctly:

lsmod | grep kvm

The output should show


kvm and kvm_intel or
kvm_amd modules loaded
depending on your CPU.

40
Step 4: Configure Permissions: For non-root users to manage virtual machines
using KVM, add them to the libVirt group:

sudo usermod -aG libvirt <username>

Remember to log out and log back in for the changes to take effect.

Step 5: Enable Nested Virtualization (Optional): If you plan to run virtual machines with
nested virtualization (e.g., running KVM inside a KVM guest), you may need to enable
nested virtualization on the host. This step is only required if you intend to run virtual
machines with KVM as guests.

For Intel CPUs:

echo "options kvm-intel nested=1" | sudo tee /etc/modprobe.d/kvm- intel.conf

sudo modprobe -r kvm_intel


sudo modprobe kvm_intel

For AMD CPUs:

echo "options kvm-amd nested=1" | sudo tee /etc/modprobe.d/kvm- amd.conf

sudo modprobe -r kvm_amd sudo

modprobe kvm_amd

Step 6: Install and Configure Virt-Manager (Optional): Virt-Manager is a graphical user


interface tool to manage virtual machines using KVM. If you prefer a GUI interface, you can
install Virt-Manager:

For Ubuntu/Debian:

sudo apt install virt-manager

For CentOS/RHEL:

sudo yum install virt-manager

For Fedora:

sudo dnf install virt-manager

Once the installation is complete, you can start creating and managing virtual
machines using KVM. You can use command-line tools like graphical
virsh or a interface like Virt-Manager to interact with KVM.

Output:

41
42
Result:

KVM has been successfully installed on your Linux system. You can now use KVM to
create and manage virtual machines on your Linux host.

Viva Question:

1. What is KVM?
KVM (Kernel-based Virtual Machine) is a virtualization technology built into the Linux
kernel.
2. How do you install KVM on a Linux system?
Use the command sudo apt-get install qemu-kvm libvirt-bin bridge-utils to
install KVM.
3. What is required for KVM to work on a system?
The system must have hardware virtualization support (Intel VT-x or AMD-V).
4. How can you verify KVM installation on a Linux system?
Use the command kvm --version to check if KVM is installed correctly.
5. What is the role of libvirt in KVM?
Libvirt is a toolkit for managing virtualized platforms, providing management of KVM
virtual machines.

43
Exercise: 7

Create Nested Virtual Machine (VM under another VM)

Aim: To set up and run a virtual machine (VM) within another VM, also known as
nested virtualization.

Procedure:

Step 1: Enable Nested Virtualization: Before creating a nested VM, ensure nested
virtualization is enabled on the host VM (the VM that will run other VMs).

For VirtualBox:

Open VirtualBox and select the host VM from the list. Go to "Settings" > "System" >
"Processor" and check the "Enable Nested VT-x/AMD-V" option.
Step 2: Install an Operating System in the Host VM: Ensure you have an operating system
installed in the host VM. This will be the environment in which you'll run the nested VMs.

Step 3: Install VirtualBox within the Host VM: Inside the host VM, download and install
VirtualBox (or any other virtualization software you prefer) as if you were installing it on a
physical machine.

Step 4: Create the Nested VM: Now that you have VirtualBox installed within the host VM,
you can create a new VM inside it.

a. Open VirtualBox within the host VM.

b. Click on "New" to create a new VM.

c. Follow the VM creation wizard to set up the nested VM, including selecting the
guest operating system, allocating memory, creating a virtual hard disk, etc.

Step 4: Install the Guest Operating System in the Nested VM: With the nested VM created,
start it and install the guest operating system, just as you would with any regular VM
installation.

Step 5; Configure Networking (Optional): Depending on your requirements, you may need to
configure the networking of the nested VM to allow communication with other VMs or
external networks.

Step 6: Use the Nested VM: Once the nested VM is set up and the guest operating system is
installed, you can use it just like any other VM. Install applications, run tests, or perform any
tasks within the nested VM.

Output:
44
Result:
Thus, The Nested VMS have been created successfully.
Viva Question:

1. What is a nested virtual machine?


A nested virtual machine is a virtual machine running inside another virtual machine.
2. How do you enable nested virtualization in VMware?
Enable the "Virtualize Intel VT-x/EPT or AMD-V/RVI" option in the VM settings.
3. What is required for nested virtualization to work?
The host machine must support hardware virtualization (Intel VT-x or AMD-V).
4. Can nested virtualization be done in all hypervisors?
No, not all hypervisors support nested virtualization; VMware and KVM are examples
that do.
5. What is the use of nested virtualization?
It allows testing and development of virtual environments within virtual machines.

45
Content beyond the Syllabus:
Virtual Machine Optimization and Performance Tuning

Aim

To optimize and tune the performance of a virtual machine by adjusting its virtual hardware
settings and resource allocations, ensuring efficient resource utilization.

Procedure

1. Allocate Resources:
o Adjust CPU and memory allocation based on the workload of the virtual machine.
o Ensure that the virtual disk is large enough for the guest OS and applications.
2. Enable Hardware Virtualization:
o In the VM settings, enable features like Intel VT-x or AMD-V (depending on the
processor) for better CPU performance.
3. Optimize Storage:
o Use virtual disks in thin provisioning to save space and improve performance.
o Ensure proper disk I/O settings for storage-intensive tasks.
4. Adjust Network Settings:
o Use bridged networking for better speed and flexibility or NAT if using multiple VMs.
5. Install VMware Tools or Equivalent:
o Install guest additions or VMware Tools to improve guest OS performance and enable
features like better graphics, shared folders, and mouse integration.
6. Monitor Resource Usage:
o Use monitoring tools to track CPU, memory, and disk usage.
o Optimize based on observed performance bottlenecks.

Description

Virtual Machine optimization involves fine-tuning virtual hardware settings to improve


the performance of the guest operating system. Performance tuning includes adjusting CPU,
memory, and storage allocations, as well as network and disk configurations to meet the specific
needs of workloads and applications running within the VM.

46
Steps

1. Adjust Virtual CPU Allocation:


Go to VM settings, increase the number of virtual CPUs or the allocated CPU percentage
if needed.
2. Increase Memory Allocation:
In the VM settings, increase the allocated memory based on the guest OS requirements.
3. Configure Virtual Disk Settings:
Choose between thick or thin provisioning based on the storage space needed and desired
disk performance.
4. Enable Hyper-V or Nested Virtualization:
Enable this feature if you're running hypervisors within virtual machines.
5. Install VMware Tools or Guest Additions:
Ensure the guest OS has the appropriate tools for better integration and performance
optimization.
6. Monitor and Analyze Performance:
Use tools like Task Manager or Resource Monitor (for Windows) and top or htop (for
Linux) to track resource usage.

Output Screenshots

Screenshots would typically show:

 Virtual machine settings page showing CPU and memory allocation.


 Task Manager or Resource Monitor showing CPU and memory usage in the guest OS.
 VMware Tools installation prompt or equivalent in the guest OS.

Result

The virtual machine will run more efficiently, with resources allocated optimally, ensuring better
performance for the guest OS and applications. Monitoring will help identify any bottlenecks,
allowing for further optimizations as required.

47

You might also like