Lab1_IoT
Lab1_IoT
Introduction:
This lab focuses on setting up a Raspberry Pi by installing an operating system (OS), which is
essential software that manages hardware resources and provides a platform for running
applications. We will also verify user credentials to ensure that the system is configured
correctly, and that the user has the appropriate access rights.
In addition, we will gather important network information, such as the Internet Protocol (IP)
address, a unique identifier for the Raspberry Pi within a network, and the subnet mask, which
Furthermore, we will configure Secure Shell (SSH) for remote access, a network protocol that
enables secure communication between devices over an unsecured network. This allows us to
manage the Raspberry Pi remotely, controlling it from another computer without the need for
particularly useful for headless setups, where the Raspberry Pi operates without direct user
interface devices.
CSC3329 Lab Report
• A Raspberry Pi
• A microSD card
• An internet connection
system image. We made sure to choose the correct version for our needs.
card.
• After inserting the microSD card into our computers using the card reader, we selected
the OS image, chose the correct drive for the microSD card, and started the flashing
password access, as it was easier to set up and more secure. We also changed the
computers and inserted it into the microSD card slot on the Raspberry Pi.
• Finally, we connected the power supply to the Raspberry Pi to boot it up, and the OS
• After powering up the Raspberry Pi, we observed the PWR and ACT indicator lights.
The PWR light signifies that the Raspberry Pi is receiving power, and it should
remain solid. The ACT light, on the other hand, blinks to indicate that the system is
• Once the ACT light showed consistent activity, signaling that the operating system
had successfully booted, we knew the Raspberry Pi was ready for use.
Below are images of the Raspberry Pi during and after the booting process:
CSC3329 Lab Report
PWR and ACT lights are on: Booting PWR light on: Ready for use
CSC3329 Lab Report
o With SSH enabled and the Raspberry Pi connected to the "auiguest" Wi-Fi
network, we opened a terminal on our computer and used the ssh command to
o We used the username "Hiba" and the IP address assigned to the Raspberry Pi
current logged-in user. We ran the whoami command, which displayed "Hiba"
o To retrieve the IP address and subnet mask of the Raspberry Pi, we ran the
▪ Subnet Mask: The mask used to divide the IP address into network and
host portions.
o With the command line connected and credentials verified, we tested our
Conclusion:
configuring it for remote access via SSH. By utilizing public key authentication, we enhanced
security and ease of access, while changing the username and connecting to a common Wi-Fi
information such as the IP address and subnet mask, and we demonstrated the ability to
manage the Raspberry Pi entirely through the command line without any direct peripherals.
This lab provided a hands-on experience in system setup, network configuration, and remote
system management, building a solid foundation for future projects involving Raspberry Pi