Siva CCV Record Final
Siva CCV Record Final
The aim of this study is to explore and analyze the NIST (National Institute of Standards and
Technology) model of cloud computing, examining its conceptual framework, key components,
and their interrelationships. This investigation seeks to provide a comprehensive understanding of
the NIST model's structure and its implications for cloud computing architecture and deployment.
THEORY:
The NIST cloud computing definition is widely accepted as a valuable contribution toward
providing a clear understanding of cloud computing technologies and cloud services. It provides a
simple and unambiguous taxonomy of three service models available to cloud consumers: cloud
software as a service (SaaS), cloud platform as a service (PaaS), and cloud infrastructure as a
service (IaaS). It also summarizes four deployment models describing how the computing
infrastructure that delivers these services can be shared: private cloud, community cloud, public
cloud, and hybrid cloud.
Finally, the NIST definition also provides a unifying view of five essential characteristics that all
cloud services exhibit: on demand self-service, broad network access, resource pooling, rapid
elasticity, and measured service. These services and their delivery are at the core of cloud
computing. In the cloud computing model, the primary focus is a more economic method of
providing higher quality and faster services at a lower cost to the users. In the traditional IT service
delivery model, there is a large emphasis on procuring, maintaining and operating the necessary
hardware and related infrastructure. The cloud computing model enables CIOs, IT project
managers and procurement officials to direct their attention to innovative service creation for the
customers.
22TK0050/ B.Tech-CSE(ICB)
Figure 1 presents an overview of the NIST cloud computing reference architecture, which
identifies the major actors, their activities and functions in cloud computing. The diagram depicts
a generic high-level architecture and is intended to facilitate the understanding of the requirements,
uses, characteristics and standards of cloud computing.
PROCEDURE:
Literature Review: Conduct an extensive review of academic papers, industry reports, and official
NIST documentation to gather insights into the NIST model of cloud computing. Conceptual
Analysis: Break down the NIST model into its fundamental components, including essential
characteristics, service models, and deployment models.
Comparative Study: Compare the NIST model with other prevalent cloud computing models,
such as the ISO/IEC 17788 and the Cloud Security Alliance (CSA) model, to identify similarities,
differences, and areas of convergence.
Case Studies: Analyze real-world case studies and implementations of cloud computing
architectures based on the NIST model to understand its practical applications and challenges.
Expert Interviews: Conduct interviews with experts in cloud computing architecture and
standards to gather qualitative insights into the strengths and limitations of the NIST model.
Quantitative Analysis: Employ quantitative methods, such as surveys or data analysis, to assess
the adoption rate and effectiveness of the NIST model within the industry.
Documentation Analysis: Scrutinize official NIST publications, guidelines, and white papers
related to cloud computing to elucidate the rationale behind the development and evolution of the
NIST model.
Synthesis: Synthesize findings from the literature review, conceptual analysis, case studies,
interviews, and quantitative analysis to develop a comprehensive understanding of the NIST model
of cloud computing.
Conceptual Framework: Provide a detailed overview of the NIST model's conceptual framework,
including its essential characteristics, service models (IaaS, PaaS, SaaS), and deployment models
(public, private, hybrid, community).
Comparison Analysis: Present a comparative analysis of the NIST model with other cloud
computing models, highlighting its unique features, advantages, and potential areas for
improvement.
Case Study Insights: Share insights from real-world case studies, illustrating how organizations
have implemented cloud computing architectures based on the NIST model, along with associated
benefits and challenges.
Expert Perspectives: Summarize insights gathered from expert interviews, showcasing expert
opinions on the effectiveness, relevance, and future prospects of the NIST model in the context of
cloud computing.
Adoption Rate: Provide quantitative data on the adoption rate of the NIST model within the
industry, along with factors influencing adoption and perceived benefits.
Recommendations: Offer recommendations for practitioners, policymakers, and researchers
based on the study's findings, outlining potential areas for further refinement or extension of the
NIST model to address emerging challenges and technological advancements in cloud computing.
22TK0050/ B.Tech-CSE(ICB)
RESULT:
The Study of NIST model of cloud computing , examining its conceptual framework, key
components, and their inter-relationships successfully studied and completed successfully.
22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this project is to establish a virtualization environment capable of hosting
multiple operating systems on a single physical machine. By leveraging virtualization
technology, this endeavor seeks to enable efficient resource utilization, facilitate software
testing and development, and enhance system flexibility and scalability.
Required Tools:
Procedures:
Hypervisor Installation: Install and configure the chosen hypervisor software on the host
machine following the vendor's instructions.
Virtual Machine Creation: Use the hypervisor's management interface to create virtual
machines, specifying parameters such as CPU cores, RAM allocation, disk space, and
network settings.
22TK0050/ B.Tech-CSE(ICB)
Configuration and Updates:
Configure network settings, such as IP addressing and DNS resolution, within each
operating system instance to enable communication with other virtual machines and
external networks.
Install software updates, patches, and drivers as needed to ensure the stability and security
of each operating system environment.
Integration and Testing: Test inter-operability and compatibility between different
operating system instances by configuring networking, file sharing, and application
deployment scenarios.
Backup and Recovery: Implement backup strategies for virtual machine data and
configurations to prevent data loss in case of system failures or corruption.
Operating System Deployment: Install and configure various operating systems, including
Windows and Linux distributions, within separate virtual machine instances.
Resource Utilization: Monitor resource usage metrics such as CPU, memory, and disk
utilization to ensure optimal performance and resource allocation across virtual machines.
22TK0050/ B.Tech-CSE(ICB)
OUTPUT:
Step 1. To download and install the VMware product, visit the official website of VMware.
https://www.vmware.com/in.html
Step 2. Click on Free Product Trials & Demo >> Workstation Pro. You will be redirected to
the download page.
22TK0050/ B.Tech-CSE(ICB)
Step 3. Once the download is complete, run the .exe to install VMware Workstation. A popup will
appear.
22TK0050/ B.Tech-CSE(ICB)
Step 5. Accept the terms and click Next
Step 6. On the next screen, It will ask for additional features; it is not mandatory to check this box.
Click on Next.
22TK0050/ B.Tech-CSE(ICB)
Step 7. On the next screen, some checkboxes are populated; check them as per your requirement.
Click on Next.
22TK0050/ B.Tech-CSE(ICB)
Step 9. At this step, you can see installation taking place. The installation will take some time; wait
for it to install properly.
Step 11. Upon Finishing, the window will close, and You can see VMware Workstation installed
icon on your Desktop.
22TK0050/ B.Tech-CSE(ICB)
Step 12. For the first time opening, if you have not entered the License key in step 7, it will ask for a
license key. You can go for the trial version, free for 15 to 30 days. Click on Continue. Make sure you
have Admin rights for this in Windows.
At this stage, you will get the final installation message. Click on Finish.
22TK0050/ B.Tech-CSE(ICB)
Finally, this will open a window of VMware Workstation Pro.
RESULT:
Thus the created Virtualization environment and install various operating system is
verified and completed successfully.
22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this project is to design and implement an Infrastructure as a Service (IaaS) platform
utilizing existing resources. This implementation will enable users to provision and manage virtualized
computing infrastructure, including virtual machines, storage, and networking, through a centralized
management interface.
Introduction:
What is Infrastructure as a Service (IaaS)?
Infrastructure as a Service (IaaS) is a cloud computing model that provides virtualized
computing resources over the internet. It allows users to provision and manage virtual
machines (VMs), networking, and storage without investing in physical hardware.
Prerequisites:
Before starting the lab, ensure you have the following:
• A computer with at least 16GB RAM, 100GB free disk space, and a 64-bit processor with
virtualization support.
• Installed VMware Workstation Pro / VMware ESXi.
• ISO images of the operating systems you want to install (e.g., Windows Server, Ubuntu
Server, or CentOS).
• A basic understanding of networking and operating systems.
22TK0050/ B.Tech-CSE(ICB)
Step 2: Create a Virtual Machine (VM)
1. Open VMware Workstation and click on Create a New Virtual Machine.
2. Choose Typical installation and click Next.
3. Select Installer disc image file (ISO) and browse for the OS ISO file.
4. Configure VM settings:
• Name: Assign a name (e.g., "Ubuntu-Server")
• Disk Size: Allocate at least 20GB (adjust based on OS requirements)
• Memory: Assign 4GB RAM or more
• Processor: Set at least 2 cores
5. Click Finish to create the VM.
6. Start the VM and complete the OS installation process.
22TK0050/ B.Tech-CSE(ICB)
Step 3: Configure Networking for the VM
1. Open VMware and select your VM.
2. Go to Settings > Network Adapter.
3. Choose Bridged Networking (for direct access to the host network) or NAT (for internet
access through the host machine).
4. Save settings and restart the VM.
5. Verify connectivity using ping google.com (for internet access) or ifconfig / ip a to check
the assigned IP.
22TK0050/ B.Tech-CSE(ICB)
Step 5: Install Virtualization Tools
1. In VMware, go to VM > Install VMware Tools.
2. Follow the installation guide inside the VM (helps with performance and screen
resolution).
22TK0050/ B.Tech-CSE(ICB)
Step 6: Automate VM Deployment (IaaS Feature) 1.
Clone existing VMs for quick deployment:
• Right-click on VM → Manage → Clone
• Select Full Clone (creates an independent copy)
2. Use VMware templates for standardization:
• Convert VM into a template for future use
22TK0050/ B.Tech-CSE(ICB)
Step 8: Enable Remote Access to VMs
1. Install SSH Server on Linux (sudo systemctl enable ssh)
2. Enable Remote Desktop Connection for Windows VMs.
3. Use VMware Remote Console for GUI-based access.
Conclusion:
By following these steps, you have successfully implemented an Infrastructure as a Service
(IaaS) environment using VMware. This lab provides a foundational understanding of how cloud
providers set up and manage virtualized resources.
22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this project is to simulate and configure identity management within a private cloud
infrastructure using OpenStack. This involves setting up authentication, authorization, and user
management functionalities to control access to cloud resources and services. The simulation will enable
the understanding and testing of various identity management features and policies within a controlled
environment
Prerequisites:
Before starting this lab, ensure you have:
• A machine with at least 16GB RAM, 100GB disk space, and a 64-bit processor.
• Installed OpenStack via DevStack or PackStack.
• Access to OpenStack Dashboard (Horizon) or CLI.
• Basic knowledge of Linux and networking.
Step-by-Step Guide to Simulating Identity Management Using OpenStack:
22TK0050/ B.Tech-CSE(ICB)
Step 2: Explore Keystone (OpenStack Identity Service)
1. Log in to the OpenStack CLI:
source openrc admin admin openstack
token issue
2. View available services:
openstack service list
3. Verify Keystone API endpoints:
openstack endpoint list
22TK0050/ B.Tech-CSE(ICB)
Step 4: Create and Manage Projects and Roles
1. Create a new project (tenant):
openstack project create --domain default new_project
2. Assign a user to the project:
openstack role add --user newuser --project new_project member
3. Verify project assignments:
openstack role assignment list --user newuser
22TK0050/ B.Tech-CSE(ICB)
Step 6: Test Access Control and Authentication
1. Log out of Horizon and log in as newuser.
2. Try accessing different projects to verify permissions.
3. Use OpenStack CLI to authenticate as newuser:
source openrc newuser new_project openstack
token issue
Conclusion:
By following this lab, you have successfully simulated Identity Management using OpenStack’s
Keystone service. This hands-on experience demonstrates how cloud providers implement
authentication, role-based access control, and multi-tenancy security.
22TK0050/ B.Tech-CSE(ICB)
Aim:
To explore and demonstrate the use of Storage as a Service (StaaS) for remote file access by
implementing a web-based interface that allows users to upload, retrieve, and manage files stored
in a cloud storage environment.
Introduction:
Storage as a Service (StaaS) is a cloud computing model where storage resources are provided
over the internet or a private cloud. In OpenStack, Swift is the object storage service that allows
users to store and retrieve files remotely via a web interface.
In this lab, you will:
• Set up OpenStack Swift
• Create and manage containers
• Upload, download, and access files remotely using the Horizon Web Interface
Prerequisites:
Before starting this lab, ensure that:
• You have OpenStack installed (via DevStack, PackStack, or a cloud provider).
• OpenStack Horizon Dashboard is accessible.
• Swift is enabled in your OpenStack environment.
• A user account with access to OpenStack Swift is available.
Step-by-Step Lab Guide:
22TK0050/ B.Tech-CSE(ICB)
Step 2: Create a Storage Container
1. Click on + Create Container.
2. Enter a Container Name (e.g., my-storage).
3. Choose Access Control:
• Private: Only authenticated users can access it.
• Public: Anyone can access it via a URL.
4. Click Create to confirm.
22TK0050/ B.Tech-CSE(ICB)
Step 4: Access Files via Web URL
1. If the container is public, get the file URL:
• Click on the More dropdown beside the uploaded file.
• Select Copy URL and open it in a web browser.
2. If the container is private, authenticate using an OpenStack Swift client like curl or
OpenStack CLI.
22TK0050/ B.Tech-CSE(ICB)
Step 5: Download a File from OpenStack Swift
1. Click on the More dropdown beside the file.
2. Click Download to save it to your local system.
Conclusion:
You have successfully explored Storage as a Service (StaaS) using OpenStack Swift!
• Created a storage container
• Uploaded and accessed files via the web
• Downloaded and deleted files
• Used CLI for advanced interactions
This lab helps you understand how cloud storage services work and how users can access their
files remotely via a web interface.
22TK0050/ B.Tech-CSE(ICB)
Aim:
To deploy a basic web application on commercial cloud AWS using AWS Elastic Beanstalk and
assess the ease of deployment and accessibility of the deployed application.
Experiment Setup:
• Web Application: Develop a simple Flask web application that displays "Hello,
World!" when accessed.
• AWS Account: Ensure you have an AWS account to access AWS services.
• AWS Elastic Beanstalk: Utilize AWS Elastic Beanstalk, a service that simplifies the
deployment, management, and scaling of web applications and services.
• Deployment Configuration: Configure Elastic Beanstalk environment with necessary
settings, including selecting the programming language, platform version, and
instance type.
• Access Testing: Test the accessibility of the deployed application by accessing its
URL.
Procedures:
1. Go to Microsoft 365 Admin center and log in using your credentials.
2. From the navigation menu on the left, go to Settings > Integrated apps, and then select Get
apps.
22TK0050/ B.Tech-CSE(ICB)
3. In the admin center AppSource window, search for Adobe Acrobat for Microsoft 365.
From the search results, locate Adobe Acrobat for Microsoft 365 and click Get it now.
22TK0050/ B.Tech-CSE(ICB)
5. In the Deploy New App window, select Adobe Acrobat for Microsoft 365, and then click
Next.
6. You can add the users you want the app to be deployed to. Select the desired option and
click Next.
22TK0050/ B.Tech-CSE(ICB)
7. Acrobat app requests permissions before deployment. Click Accept permissions.
8. A new app permissions window pops up. Enter your Microsoft login credentials if
prompted, and then click Accept.
22TK0050/ B.Tech-CSE(ICB)
9. The Deploy New App window confirms the Permissions accepted. Click Next.
22TK0050/ B.Tech-CSE(ICB)
11. Click Done when the deployment is completed.
12. You will see Adobe Acrobat for Microsoft 365 listed in the list of Integrated apps.
Result:
Thus the Deploy web applications on commercial cloud executed successfully
22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this project is to demonstrate the usage of various AWS (Amazon Web Services)
components, including EC2 (Elastic Compute Cloud), S3 (Simple Storage Service), SimpleDB,
and DynamoDB, for managing virtual machine (VM) instances within a cloud environment. This
project will showcase the provisioning, configuration, and utilization of VM instances alongside
these AWS services to illustrate their functionalities and integration capabilities.
Procedure:
S3 Bucket Creation:
• Create S3 buckets to store data objects and files, setting access permissions and versioning
options as needed.
• Upload sample data files or objects to S3 buckets using the AWS Management Console or
AWS CLI.
SimpleDB Setup:
• Create SimpleDB domains to store structured data in the form of key-value pairs.
• Define attribute names and data types for SimpleDB domains and populate them with
sample data.
DynamoDB Configuration:
• Create DynamoDB tables to store semi-structured or NoSQL data, specifying primary keys
and read/write capacity units.
• Insert sample records into DynamoDB tables to demonstrate data storage and retrieval
operations.
22TK0050/ B.Tech-CSE(ICB)
EC2 Instance Access and Integration:
• Connect to EC2 instances via SSH or remote desktop protocols to demonstrate interactive
access and management capabilities.
• Install AWS CLI or SDKs (Software Development Kits) on EC2 instances to interact with
other AWS services programmatically.
S3 Bucket Creation:
• Create S3 buckets and upload data objects, demonstrating storage and retrieval
functionalities.
22TK0050/ B.Tech-CSE(ICB)
Testing and Validation:
• Validate the functionality, performance, and access controls of EC2 instances and AWS
services through comprehensive testing scenarios.
OUTPUT:
22TK0050/ B.Tech-CSE(ICB)
5. In the Instance Type section, select the t2.micro instance type (default) or a larger
instance type if needed. Note: the t2.micro instance type is elegible for the free tier. In regions
where t2.micro is unavailable, you can use a t3.micro* instance under the free tier.
6. In the Key Pair (login) section, select the key pair name that you created in step 2 of the
prerequisite section prerequisite section from the drop-down list.
7. In the Network Settings section, under the Firewall (security groups) choose the Select
existing security group radio button. Then, under the Common Security Groups dropdown
list, select the security group you created in step 3 of the prerequisite section.
22TK0050/ B.Tech-CSE(ICB)
Important
If the Auto-assign public IP setting is set to Disabled, click on the Edit button on the
topright of this section panel and change this setting to Enabled.
8. In the Configure storage section, select the default amount of storage for this instance.
9. Now, on the far right select the Launch Instance.
10. A confirmation page lets you know that your instance has successfully launched. In the
topmost menu which reads EC2 > Instances > Launch an instance, select the Instances
menu item to view the instances console window.
11. On the Instances screen, you can view the status of the launched instance. The instance
should automatically be running after launch, but if not select the instance row checkbox and
then select the Instance State menu item at the top. Select Start Instance to start the virtual
machine.
22TK0050/ B.Tech-CSE(ICB)
12. With the instance row selected, click the Connect button in the top menu.
13. On the Connect to instance page, select the RDP client tab. Select the Download remote
desktop file and save the .rdp file somewhere on your local computer.
14. Next, select the Get password button.
15. Choose Upload private key file and navigate to the private key (.pem) file that you created
when you launched the instance.
16. Choose Decrypt Password. The console displays the default administrator password for the
instance under Password, replacing the Get password link shown previously. Save this
password in a safe place. This passord is required to connect to the instance.
17. Select Download remote desktop file to save the .rdp file to your local computer. You will
need this file when you connect to your instance using the Remote Desktop Connect app.
Result:
Thus To create and access VM instances and demonstrate various components such as EC2,
S3, Simple DB, DynamoDB using AWS is executed successfully.
22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this case study is to provide a comprehensive understanding of fog computing,
including its implementation strategies and real-world applications. By examining various use
cases and deployment scenarios, this study aims to elucidate the role of fog computing in
extending cloud capabilities to the edge of the network, enhancing latency-sensitive applications,
and enabling efficient data processing and analytics in distributed environments.
Procedure:
Literature Review:
• Conduct a review of academic papers, industry reports, and technical documentation to
gather insights into the concepts, architectures, and principles of fog computing.
• Explore foundational research papers, standards documents (e.g., IEEE 1934), and
whitepapers from industry leaders (e.g., Cisco, Intel) to understand the evolution and
significance of fog computing.
Conceptual Framework:
• Define the fundamental principles and components of fog computing, including edge
devices, fog nodes, fog layers, and connectivity protocols.
• Examine the architectural differences between fog computing and traditional cloud
computing models, highlighting advantages such as reduced latency, improved bandwidth
utilization, and enhanced privacy and security.
22TK0050/ B.Tech-CSE(ICB)
Lessons Learned:
• Synthesize insights and lessons learned from the case studies to derive best practices and
recommendations for fog computing implementation and adoption.
• Identify common challenges, pitfalls, and trade-offs associated with fog computing
deployments and propose strategies for mitigating risks and maximizing benefits.
Future Directions:
• Discuss emerging trends and future directions in fog computing research and development,
such as edge AI (Artificial Intelligence), 5G integration, blockchain integration, and
federated fog architectures.
• Highlight potential opportunities for innovation and collaboration in advancing fog
computing technologies and applications across various domains.
Technical Specifications:
• Include technical specifications of fog computing architectures, such as hardware
requirements, communication protocols, and software frameworks.
Cost-Benefit Analysis:
• Assess the cost-effectiveness and ROI (Return on Investment) of fog computing solutions
compared to traditional cloud-based approaches.
Regulatory Compliance:
• Discuss implications of fog computing on data privacy, security, and regulatory
compliance, considering regional and industry-specific requirements.
Result:
Thus the Case Study on Fog Computing: Implementation and Applications is studied.
22TK0050/ B.Tech-CSE(ICB)
MINI PROJECT
22TK0050/ B.Tech-CSE(ICB)
AIM:
To Install a C Compiler on the Virtual Machine and execute a Factorial program in C Language.
PROCEDURE:
1.Launch the virtual box and open the virtual machine .
2. Run the following command in the virtual machine terminal.
$ sudo apt-get update
$ sudo apt-get install gcc
• It will install all the necessary packages for gcc complier.
3. Type the C program in the text editor and save the file with .c extention.
#include<stdio.h>
void main()
{
int n,fact=1;
int i=1;
printf("Enter a positive integer:");
scanf("%d",&n);
if(n==0)
{
fact=1;
}
else
{
while(i<=n)
{
fact*=i;
i++;
}
printf("The factorial of %d is %d ",n,fact);
}
}
22TK0050/ B.Tech-CSE(ICB)
4. Compile and Run the C Program
cc fact.c
./a.out
22TK0050/ B.Tech-CSE(ICB)
Output:
Result:
Thus the C program was successfully executed on the Virtual machine and the output is
verified.
22TK0050/ B.Tech-CSE(ICB)
AIM:
To Install a C Compiler on the Virtual Machine and execute a GCD program in C Language.
PROCEDURE:
1.Launch the virtual box and open the virtual machine.
2. Run the following command in the virtual machine terminal.
$ sudo apt-get update
$ sudo apt-get install gcc
• It will install all the necessary packages for gcc complier.
3. Type the C program in the text editor and save the file with .c extention.
Sample Program: //GCD
#include <stdio.h>
#include<conio.h>
int gcd(int a, int b) {
return b == 0 ? a : gcd(b, a % b);
}
int main() {
int a, b;
printf("Enter two numbers: ");
scanf("%d %d", &a, &b);
printf("GCD is %d\n", gcd(a, b));
return 0;
}
4. Compile and Run the C Program
cc gcd.c
./a.out
22TK0050/ B.Tech-CSE(ICB)
Output:
Result:
Thus the C program was successfully executed on the Virtual machine and the output is
verified.
22TK0050/ B.Tech-CSE(ICB)
AIM:
To Install a C Compiler on the Virtual Machine and execute a Number Palindrome program in C
Language.
PROCEDURE:
1.Launch the virtual box and open the virtual machine.
2. Run the following command in the virtual machine terminal.
$ sudo apt-get update
$ sudo apt-get install gcc
• It will install all the necessary packages for gcc complier.
3. Type the C program in the text editor and save the file with .c extention.
#include <stdio.h>
int main() {
int num, reversed = 0, original, remainder;
original = num;
while (num != 0) {
remainder = num % 10;
reversed = reversed * 10 + remainder;
num /= 10;
}
if (original == reversed)
printf("The number is a palindrome.\n");
else
printf("The number is not a palindrome.\n");
return 0;
}
4. Compile and Run the C Program
cc palindrome.c
./a.out
22TK0050/ B.Tech-CSE(ICB)
Output:
Result:
Thus the C program was successfully executed on the Virtual machine and the output is
verified.
22TK0050/ B.Tech-CSE(ICB)
AIM:
To Install a C Compiler on the Virtual Machine and execute a Load Balancing algorithm round
robin program in C Language.
PROCEDURE:
1.Launch the virtual box and open the virtual machine .
2. Run the following command in the virtual machine terminal.
$ sudo apt-get update
$ sudo apt-get install gcc
• It will install all the necessary packages for gcc complier.
3. Type the C program in the text editor and save the file with .c extention.
Sample Program: //LoadBalancing.c
#include <stdio.h>
int main() {
const char* servers[] = {"Server1", "Server2", "Server3"};
int serverCount = sizeof(servers) / sizeof(servers[0]);
int currentIndex = 0;
for (int i = 0; i < 10; i++) {
printf("Request %d: Routed to %s\n", i + 1, servers[currentIndex]);
currentIndex = (currentIndex + 1) % serverCount;
}
return 0;}
22TK0050/ B.Tech-CSE(ICB)
Output:
Result:
Thus the C program was successfully executed on the Virtual machine and the output is
verified.
22TK0050/ B.Tech-CSE(ICB)