JAVA Microproject
JAVA Microproject
3. Proposed methodology
In this project, we get information about shell scripting in Linux/Unix.
1
4. Action Plan
Plan Plan
Sr. Name of responsible
Detail of activity start finish
No. team members
date date
SANSKRUTI
1 Discuss the project with the project guide
BHAKARE
SANSKRUTI
4 Arrange all information in MS-word
BHAKARE
5. Resources used
1 computer Windows 10 1
1
3 textbook/manual OSY Operating Systems 22516
2
MICRO PROJECT REPORT
ON
Shell Script in Linux/Unix
What is Shell?
Kernel
Shell
3
Types of Shell:
1. The Bourne Shell: The prompt for this shell is $ and its derivatives are
listed below:
2. The C shell: The prompt for this shell is %, and its subcategories are:
4
“#!” is an operator named shebang which directs the script to the
interpreter's location. So, if we use”#! /bin/sh” the script gets directed to
the bourne-shell.
5
What are Shell Variables?
Variables store data in the form of characters and numbers. Likewise, Shell variables are
utilized to store information and they can be by the shell only.
For example, the following creates a shell variable and then prints it:
variable ="Hello"
echo $variable
#!/bin/sh
echo "what is your name?"
read name
echo "How do you do, $name?"
read remark
echo "I am $remark too!"
As you see, the program determined the value of the variable ‘name’ as
Joy and ‘remark’ as excellent. This is a simple script. You can create
advanced scripts which contain conditional statements, loops, and
6
functions. Shell scripting will make your life easy and Linux
administration a breeze.
Summary:
The kernel is the heart of the operating systems, and it communicates between
hardware and software
Shell is a program that interprets user commands through CLI like Terminal
The Bourne shell and the C shell are the most used shells in Linux
Linux Shell scripting is writing a series of commands for the shell to execute
Shell variables store the value of a string or a number for the shell to read
Shell scripting in Linux can help you make complex programs containing conditional
statements, loops, and functions
Basic Shell Scripting Commands in Linux: cat, more, less, head, tail, mkdir, cp, mv, rm,
touch, grep, sort, wc, cut, and, more.
1 computer Windows 10 1
7
Conclusion
A shell script is a text file that includes a sequence of commands for a UNIX-based operating
system. It is called a shell script because it combines a sequence of commands, that would
otherwise have to be typed into the keyboard one at a time, into a single script.
8
6.0 Resources Required:
9
MICRO PROJECT REPORT
ON
11
1. Software Microsoft - 1
Word
Star Topology
A star network is an implementation of a spoke–hub distribution
paradigm in computer networks. In a star network, every host is
connected to a central hub. In its simplest form, one central hub acts as a
conduit to transmit messages. The star network is one of the most
common computer network topologies.
The hub and hosts, and the transmission lines between them, form
a graph with the topology of a star. Data on a star network passes through
the hub before continuing to its destination. The hub manages and
controls all functions of the network. It also acts as a repeater for the data
flow.
The star topology reduces the impact of a transmission line failure by
independently connecting each host to the hub. Each host may thus
communicate with all others by transmitting to, and receiving from, the
hub. The failure of a transmission line linking any host to the hub will
result in the isolation of that host from all others, but the rest of the
network will be unaffected.
The main objective of this project is to discuss the advantages,
disadvantages and usage of star network topology. A topology is a
physical structure of a network. Star topology is a network structure
comprising a central node to which all other devices attached directly and
through which all other devices intercommunicate. The hub, leaf nodes
and the transmission lines between them form a graph with the topology
of a star.
12
Star is one of the most and oldest common topology in the local area
network. The design of star topology comes from telecommunication
system. In telephone system all telephone calls are managed by the
central switching station. Just like in star topology each workstation of
the network is connected to a central node, which is known as a hub. Hub
is a device where the whole linking mediums come together. It is
responsible of running all activities of the network. It also acts as a
repeater for the data flow. Generally when build a network using two or
more computers, you need a hub. It is possible to connect two computers
to each other directly without the need of a hub but when adding a third
computer in the network, we need a hub to allow a proper data
communication within the network. In a Star Network the whole network
is reliant on the hub.
Working
Devices such as file server, workstation and peripheral are all linked
to a hub. All the data passes through the hub. When a packet comes to the
hub it moves that packet to all the nodes linked through the hub but only
one node at a time successfully transmits it. Data on a star network
exceeds through the hub before continuing to its target. Different types of
cables are used to link computers such as twisted pair, coaxial cable and
fiber optics. The most common cable media in use for star topologies is
unshielded or shielded twisted pair copper cabling. One end of the cable
is plugged in local area network card while the other side is connected
with the hub.
Due to the centralization in star topology it is easy to monitor and
handle the network making it more advantageous. Since the whole
network is reliant on the hub, if the whole network is not working then
there could be a problem with the hub. The hub makes it easy to
troubleshoot by offering a single point for error connection at the same
time the reliance is also very high on that single point. The central
function is cost effective and easier to maintain.
Star topology also has some draw backs. If the hub encounters a
problem then the whole network falls short. In a Star Network Topology
it is possible to have all the important data backups on the hub in a
private folder and this way if the computer fails you can still use your
data using the next computer in the network and accessing the backup
files on the hub.
13
The star configuration is commonly used with twisted pair
cable and optical fiber cable. However, it can also be used with coaxial
cable as in, for example, a video routeLet’s say one computer wants to
send data to another computer.
The first computer will forward the information to the hub. The hub
will then check the address of the recipient computer, then forward the
message on.But the hub has no memory of its own, so when the first
computer sends over the information, the hub then needs to ask all the
other computers and ports which of them owns that address.This
procedure is called Address Resolution Protocol (or ARP for short).
Essentially it means that the hub can find the correct address of the
recipient computer and transfer the data to the right place.In terms of
cables, star topologies are sometimes implemented with Ethernet/cabled
structures, wireless routers, and other components. These additional
nodes are clients, and all link back to the central hub.
Diagram
14
Implementation
15
Advantages of star network
If any cable is not working then the whole network will not be
affected: in a star topology, each network device has a home run
of cabling back to a network hub, giving each device a separate
connection to the network. If there is a problem with a cable, it
will generally not affect the rest of the network. The most
common cable media in use for star topologies is unshielded
twisted pair copper cabling. If small numbers of devices are
utilized in this topology the data rate will be high. It is best for
short distance
17
Disadvantages of star network
If the hub or concentrator fails, nodes attached are disabled: The
primary disadvantage of a star topology is the high dependence of the
system on the functioning of the central hub. While the failure of an
individual link only results in the isolation of a single node, the failure of
the central hub renders the network inoperable, immediately isolating all
nodes.
The performance and scalability of the network also depend on the
capabilities of the hub. Network size is limited by the number of
connections that can be made to the hub, and performance for the whole
network is limited by its throughput. While in theory traffic between the
hub and a node is isolated from other nodes on the network, other nodes
may see a performance drop if traffic to another node occupies a
significant portion of the central node’s processing capability or
throughput.
The primary disadvantage of the star topology is the hub is a single
point of failure: If the hub were to fall short the whole network would fail
as a result of the hub being connected to every computer on the network.
There will be communication break down between the computers when
the hub fails.
Star topology requires more cable length: When the network is being
extended then there will be the need of more cables and this result in
intricate installation.
More Expensive than other topologies: it is expensive due to cost of
the hub. Star topology uses a lot of cables thus making it the most costly
network to set up as you also have to trunk to keep the cables out of harm
way. Every computer requires a separate cable to form the network. . A
common cable that is used in Star Network is the UTP or the unshielded
twisted pair cable. Another common cable that is used in star networks is
the RJ45 or the Ethernet cables
Applications
Star topology is a networking setup used with 10BASE-T cabling
(also called UTP or twisted-pair) and a hub. Each item on the network is
connected to the hub like points of a star. The protocols used with star
18
configurations are usually Ethernet or local-talk. Token Ring uses a
similar topology, called the star-wired ring.
Star Topology is the most common type of network topology that is
used in homes and offices. In the Star Topology there is a central
connection point called the hub which is a computer hub or sometimes
just a switch. In a Star Network the best advantage is when there is a
failure in cable then only one computer might get affected and not the
entire network.
Star topology is used to ease the probabilities of network failure by
connecting all of the systems to a central node. This central hub
rebroadcasts all transmissions received from any peripheral node to all
peripheral nodes on the network, sometimes including the originating
node. All peripheral nodes may thus communicate with all others by
transmitting to, and receiving from, the central node only.
Star network is used to transmit data across the central hub between
the network nodes. When a packet comes to the hub it transfers that
packet to all nodes connected through a hub but only one node at a time
successfully transmits it.
In local area networks where the star topology is used, each machine
is connected to a central hub. In contrast to the bus topology, the star
topology allows each machine on the network to have a point to point
connection to the central hub and there is no single point of failure. All of
the traffic which transverses the network passes through the central hub.
The hub acts as a signal booster or repeater which in turn allows the
signal to travel greater distances.
When it is important that your network have increased stability and
speed, the star topology should be considered. When you use a hub, you
get centralized administration and security control, low configuration
costs and easy troubleshooting. When one node or workstation goes
down, the rest of your network will still be functional.
Conclusion
19
A star network is a local area network in which all computers are
directly connected to a common central computer. Every workstation is
indirectly connected to every other through the central computer. In some
star networks, the central computer can also operate as a workstation
A Star Network Topology is best suited for smaller networks and
works efficiently when there is limited number of nodes. One has to
ensure that the hub or the central node is always working and extra
security features should be added to the hub because it s the heart of the
network. To expand a star topology network, you’ll need to add another
hub and go to a “star of stars” topology.
In a Star Network Topology it is possible to have all the important
data backups on the hub in a private folder and this way if the computer
fails you can still use your data using the next computer in the network
and accessing the backup files on the hub.
Ring Topology
A ring network is a network topology in which each node connects to
exactly two other nodes, forming a single continuous pathway for signals
through each node – a ring. Data travels from node to node, with each
node along the way handling every packet.
Rings can be unidirectional, with all traffic travelling either clockwise
or anticlockwise around the ring, or bidirectional (as in SONET/SDH).
Because a unidirectional ring topology provides only one pathway
between any two nodes, unidirectional ring networks may be disrupted by
the failure of a single link.[1] A node failure or cable break might isolate
every node attached to the ring. In response, some ring networks add a
"counter-rotating ring" (C-Ring) to form a redundant topology: in the
event of a break, data are wrapped back onto the complementary ring
before reaching the end of the cable, maintaining a path to every node
along the resulting C-Ring. Such "dual ring" networks include the ITU-
T's PSTN telephony systems network Signaling System No.
7 (SS7), Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI),
and Resilient Packet Ring. IEEE 802.5 networks – also known as IBM
Token Ring networks – avoid the weakness of a ring topology altogether:
they actually use a star topology at the physical layer and a media access
unit (MAU) to imitate a ring at the data-link layer.
All Signaling System No. 7 (SS7), and some SONET/SDH rings have
two sets of bidirectional links between nodes. This allows maintenance or
20
failures at multiple points of the ring usually without loss of the primary
traffic on the outer ring by switching the traffic onto the inner ring past
the failure points.
A ring topology is a network configuration where device connections
create a circular data path. Each networked device is connected to two
others, like points on a circle. Together, devices in a ring topology are
referred to as a ring network.
In a ring network, packets of data travel from one device to the next
until they reach their destination. Most ring topologies allow packets to
travel only in one direction, called a unidirectional ring network. Others
permit data to move in either direction, called bidirectional. The major
disadvantage of a ring topology is that if any individual connection in the
ring is broken, the entire network is affected. Ring topologies may be
used in either LANs (local area networks) or WANs (wide area
networks). Depending on the network card used in each computer of the
ring topology, a coaxial cable or an RJ-45 network cable is used to
connect computers together.
There are two types of the Ring Topology based on the data flow:
1) Unidirectional and,
2) Bidirectional
A Unidirectional ring topology handles data traffic in either clockwise
or anticlockwise direction. This data network, thus, can also be called as a
half-duplex network. A Unidirectional ring topology is thus easy to
maintain compared to the bidirectional ring topology.
Ex: SONET network, SDH network etc.
A SONET/ SDH is a standardized network protocol that transfers data
streams over optical fibers. Whereas, a bidirectional ring topology
handles data traffic in both the direction and can be a full-duplex
network.
Working
In a ring network each device (workstation, server, printer) is
connected to two other devices - this forms a ring for the signals to travel
around. Each packet of data on the network travels in one direction and
each device receives each packet in turn until the destination device
receives it. When the data is needed to reach at a specific node, then the
data packet goes through each of the intermediate nodes in the ring
21
topology network and when it reaches the destination node, it gets copied
at that system.
And when the data packet (after the packet passes through each node
or in a full circle) it gets returned to the sender’s node, and ultimately gets
removed from the transmission source station.
Moreover, the nodes of ring topology have equal access to network
media. But, this builds a conflict situation i.e. if one of the nodes (or
system) fails to transmit the data through itself, the entire network gets
failed.
Carefully consider the following picture for a better understanding of
working Information about Ring Topology. The picture shows a Ring
Network of six computers. For your convenience, there is an anti-
clockwise numbering of devices. But you can assign numbers in
clockwise direction too. There is absolutely nothing to worry about it.
When no device is communicating, Token will be circulating through
the Network. Let us suppose that in this scenario, Token is circulating in
anti-clockwise direction. Suppose Computer-1 (Sender) wants to send
data message to Computer-5 (Receiver). The whole communication will
take place in the following steps:
1. Sender will request for Token assignment for initiating
communication.
22
6. If the current computer address and destination address are not
same then the computer forwards the data message to the next
computer. For instance, again, Computer-2 will check the
destination address. Destination address is Computer-5. So, the
addresses don`t match and Computer-2 will forward the
message to Computer-3. Same process will be repeated at each
computer.
If the current computer address matches the destination address then
the computer will keep the data and release the Token. For example,
at Computer-5, both current address and destination address are the same.
So, Computer-5 will keep the the data and release the Token.
Diagram
23
Implementation
In this section, I am going to write down different steps for
constructing Ring Topology in Cisco Packet Tracer. I will also be
explaining each and every step for your proper understanding. I will
demonstrate every step with the help of picture. This will help you in
enhancing your learning. But before beginning this tutorial you should
fulfill following requirements:
Place Computers on Drawing Area (Step 1)
In this step you will need to place Computers or Computing
Devices on the main drawing area. You can find Computers easily in the
tools menu (bottom left corner). In the tools menu, find ‘End
Devices’ option to find Computing Devices. There are plenty of end
devices like Server, Laptop, Desktop, Tablet PC and many more that you
can use. Click on the end device you want to use. After clicking on the
device place your pointer on the drawing area. After that click again. You
will see clearly that device is placed on the drawing area. Repeat this
same process for placing any number of end devices you want. As
24
described earlier I have placed only four Desktop Computers for the sake
of convenience.
25
2. After selecting cable type, move to drawing area. Click on
the Computer and you will be able to see option menu. As we
are working with Ethernet Cable so we will select Fast
Ethernet from the menu. You will be able to see a black colored
line along-with mouse pointer.
Minimum collision.
Easy to manage.
26
Reduced chances of data collision as each node release a data
packet after receiving the token.
4.0 Robust:
Many nodes can be connected to the network making it robust. Ring
topology can support as many nodes as it can adjust.
5.0 Resource balance:
The network resources are equally distributed among the network. All
computers are given token equally and all computers share the data and
resources equally.
6.0 Repeaters:
27
The network can expand with more nodes with the help of repeaters
and boosters. The repeaters can boost the data and data can travels in the
long distance also.
7.0 Maintenance:
The maintenance of ring topology is easy as compared to bus
topology. There is no need for an administrator computer to control the
network. Troubleshooting in this network is also easy and cable damage
can be easily noticed in the ring topology.
28
2.0 The token is required:
All nodes require a token to send/receive data. So all the computers
have to wait for the empty token to reach them.
3.0 Slow than Ethernet:
Ring topology is slower in performance than Ethernet network. Ring
network uses coaxial cable or RJ-45 cable which is slower than Ethernet
cable.
4.0 Cable/node damage:
If cable damage then the whole network stops working. Also if any
node disconnects due to any problem then the whole network cease.
5.0 Old technology:
Ring topology was the first time used to network IBM computers.
Nowadays LAN become high speed and there is no need for ring
topology and it is old now.
6.0 Performance:
A ring network is slower than bus topology. Ring topology is also
difficult to scale. All computers have to be turned on to keep the network
working.
Application
Typically you will not find Ring Topology Examples in real life now-
a-days because it is massively replaced by Star Network. However, one
of the common example that still exists is SONET Rings. SONET stands
for Synchronous Optical Networking. It uses Fiber Optic Cables for
heavy load data transfers for long distances. You can simply
think SONET to be Fiber Optic Cable Ring Topology. It is highly
reliable Computer Network for synchronizing various branch offices of a
multi-national company. Due to the use of Fiber Optic Cable, it provides
the best data transfer speeds. SONET is one of the most
popular Applications of Ring Topology.
29
7.0 Skill Developed/ learning out of this Micro-Project:
Time Management.
Stress Management.
Study Skills.
Money Management.
Assertiveness Skills.
Well-Developed Self Care Skills.
Keeping Safe and Avoiding Risky Behaviors.
Seeking Assistance When Needed.
30