Вы находитесь на странице: 1из 55

Computer Workshop-II BY .

Amit R Khaparde Dept : Information Technology College: NYSS College of Engineering & Research

LIST OF PRACTICAL Sr. No. 1 Name of Practical Introduction of Networking and Network Accessories. Practical Slot(s) 2

Installations of UNIX/LINIX using VMware.

12

Implementation of UNIX command for file System

29

Working On vi Editor Basic vi Command The file .exrc Vi options

30

Shell as an interpreter Shell Programming Shell Scripts Shell Command Control Structure Test command Expr command Interrupting command

37

49

Introduction to MS-office and Power point

52

Familiarity with internet & word wide web

53

1 Department of CSE/IT NYSSCOER

Computer Workshop-II

Practical 01 Aim: Introduction to the network accessories. Theory: A computer is: An electronic machine that can be programmed to accept data (input), and process it into useful information (output). Data is put in secondary storage (storage) for safekeeping or later use. The processing of input into output is directed by the software, but performed by the hardware. Network Definition A network can be defined as two or more computers connected together in such a way that they can share resources. The purpose of a network is to share resources. A resource may be: A file A folder A printer A disk drive Or just about anything else that exists on a computer. A network is simply a collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate. Networking is the term that describes the processes involved in designing, implementing, upgrading, managing and otherwise working with networks and network technologies. Advantages of networking Connectivity and Communication Data Sharing Hardware Sharing Internet Access Internet Access Sharing Data Security and Management Performance Enhancement and Balancing Entertainment Fundamental Network Classifications Local Area Networks (LANs): A local area network (LAN) is a computer network covering a small geographic area, like a home, office, or group of buildings

2 Department of CSE/IT NYSSCOER

Computer Workshop-II

Wide Area Networks (WANs) Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links.The largest and most well-known example of a WAN is the Internet. WANs are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations

Metropolitan Area Network (MAN) A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN). The term is applied to the interconnection of networks in a city into a single larger network (which may then also offer efficient connection to a wide area network). It is also used to 3 Department of CSE/IT NYSSCOER

Computer Workshop-II mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.

Intranet and Internet Specifications Intranet: An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. With tunneling, companies can send private messages through the public network, using the public network with special encryption/decryption and other security safeguards to connect one part of their intranet to another. Internet: is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

Client and Server computer role in networking Server computer is a core component of the network, providing a link to the resources necessary to perform any task. A server computer provides a link to the resources necessary to perform any task. The link it provides could be to a resource existing on the server itself or a resource on a client computer. Client computers normally request and receive information over the network client. Client computers also depends primarily on the central server for processing activities Client/Server Networking In this design, a small number of computers are designated as centralized servers and given the task of providing services to a larger number of user machines called clients

4 Department of CSE/IT NYSSCOER

Computer Workshop-II

Peer-to peer network A peer-to-peer network is a network where the computers act as both workstations and servers. great for small, simple, and inexpensive networks. In a strict peer-to-peer networking setup, every computer is an equal, a peer in the network. Each machine can have resources that are shared with any other machine. There is no assigned role for any particular device, and each of the devices usually runs similar software. Any device can and will send requests to any other.

5 Department of CSE/IT NYSSCOER

Computer Workshop-II

Hardware, Software and Networks Peripherals (device) Cables Network Interface Card (NIC) Repeater Hub Bridge Routers Switch

Cables Twisted Pair

CAT5 cable (twisted cable)

In twisted pair technology, two copper wires are strung between two points. The two wires are typically ``twisted'' together in a helix to reduce interference between the two conductors Twisting decreases the cross-talk interference between adjacent pairs in a cable. Typically, a number of pairs are bundled together into a cable by wrapping them in a tough protective sheath. It can carry both analog and digital signals. Actually, they carry only analog signals. However, the ``analog'' signals can very closely correspond to the square waves representing bits, so we often think of them as carrying digital data. Data rates of several Mbps common. It has spans distances of several kilometers. Its data rate determined by wire thickness and length. In addition, shielding to eliminate interference from other wires impacts signal-to-noise ratio, and ultimately, the data rate. Good, low-cost communication. Indeed, many sites already have twisted pair installed in offices - existing phone lines! Base band Coaxial With ``coax'', the medium consists of a copper core surrounded by insulating material and a braided outer conductor. The term base band indicates digital transmission (as opposed to broadband analog).

6 Department of CSE/IT NYSSCOER

Computer Workshop-II

Common ways to connect to a coaxial cable: . With vampire taps, a metal pin is inserted into the copper core. A special tool drills a hole into the cable, removing a small section of the insulation, and a special connector is screwed into the hole. The tap makes contact with the copper core.
With a T-junction, the cable is cut in half, and both halves connect to the T-junction. A Tconnector is analogous to the signal splitters used to hook up multiple TVs to the same cable wire.

Fiber Optics In fiber optic technology, the medium consists of a hair-width strand of silicon or glass, and the signal consists of pulses of light. For instance, a pulse of light means ``1'', lack of pulse means ``0''. It has a cylindrical shape and consists of three concentric sections: the core, the cladding, and the jacket

The core, innermost section consists of a single solid dielectric cylinder of diameter d1 and of refractive index n1. The core is surrounded by a solid dielectric cladding of refractive index n2 that is less than n1. As a consequence, the light is propagated through multiple total internal reflection. The core material is usually made of ultra pure fused silica or glass and the cladding is either made of glass or plastic. The cladding is surrounded by a jacket made of plastic. The jacket is used to protect against moisture, abrasion, crushing and other environmental hazards.

7 Department of CSE/IT NYSSCOER

Computer Workshop-II Network Interface Card (NIC)


NIC provides the physical interface between computer and cabling. It prepares data, sends data, and controls the flow of data. It can also receive and translate data into bytes for the CPU to understand. The following factors should be taken into consideration when choosing a NIC: Preparing data Sending and controlling data Configuration Drivers Compatibility Performance

In the computer, data moves along buses in parallel, as on a four-lane interstate highway. But on a network cable, data travels in a single stream, as on a one lane highway. This difference can cause problems transmitting and receiving data, because the paths traveled are not the same. It is the NICs job to translate the data from the computer into signals that can flow easily along the cable. It does this by translating digital signals into electrical signals (and in the case of fiber-optic NICs, to optical signals).For two computers to send and receive data, the cards must agree on several things. These include the following: - The maximum size of the data frames - The amount of data sent before giving confirmation - The time needed between transmissions - The amount of time needed to wait before sending confirmation - The amount of data a card can hold - The speed at which data transmits In order to successfully send data on the network, you need to make sure the network cards are of the same type and they are connected to the same piece of cable. The NICs configuration includes things like a manufacturers hardware address, IRQ address, Base I/O port address, and base memory address. Some may also use DMA channels to offer better performance. Each card must have a unique hardware address. If two cards have the same hardware addresses, neither one of them will be able to communicate. For the computer to use the network interface card, it is very important to install the proper device drivers. These drivers communicate directly with the network redirector and adapter. They operate in the Media Access Control sublayer of the Data Link layer of the OSI model. When choosing a NIC, use one that fits the bus type of your PC. If you have more than one type of bus in your PC (for example, a combination ISA/PCI), use an NIC that fits into the fastest type (the PCI, in this case). This is especially important in servers, as the NIC can very quickly become a bottleneck if this guideline isnt followed. The most important goal of the network adapter card is to optimize network performance and minimize the amount of time needed to transfer data packets across the network. There are several ways of doing this, including assigning a DMA channel, use of a shared memory adapter, and deciding to allow bus mastering. Repeaters Repeaters are very simple devices. They allow a cabling system to extend beyond its maximum allowed length by amplifying the network voltages so they travel farther. Repeaters 8 Department of CSE/IT NYSSCOER

Computer Workshop-II are nothing more than amplifiers and, as such, are very inexpensive. Repeaters can only be used to regenerate signals between similar network segments. For example, we can extend an Ethernet 10Base2 network to 400 meters with a repeater. But it cant connect an Ethernet and Token Ring network together with one. The main disadvantage to repeaters is that they just amplify signals. These signals not only include the network signals, but any noise on the wire as well. Eventually, if you use enough repeaters, you could possibly drown out the signal with the amplified noise. For this reason, repeaters are used only as a temporary fix.

Hubs Hubs are devices used to link several computers together. They repeat any signal that comes in on one port and copy it to the other ports (a process that is also called broadcasting). There are two types of hubs: active and passive. Passive hubs simply connect all ports together electrically and are usually not powered. Active hubs use electronics to amplify and clean up the signal before it is broadcast to the other ports. In the category of active hubs, there is also a class called intelligent hubs, which are hubs that can be remotely managed on the network.

Bridges They join similar topologies and are used to divide network segments.For example, with 200 people on one Ethernet segment, the performance will be mediocre, because of the design of Ethernet and the number of workstations that are fighting to transmit. If you divide the 9 Department of CSE/IT NYSSCOER

Computer Workshop-II segment into two segments of 100 workstations each, the traffic will be much lower on either side and performance will increase. If it is aware of the destination address, it is able to forward packets; otherwise a bridge will forward the packets to all segments. They are more intelligent than repeaters but are unable to move data across multiple networks simultaneously. Unlike repeaters, bridges can filter out noise. The main disadvantage to bridges is that they cant connect dissimilar network types or perform intelligent path selection. For that function, you would need a router.

Routers Routers are highly intelligent devices that connect multiple network types and determine the best path for sending data. The advantage of using a router over a bridge is that routers can determine the best path that data can take to get to its destination. Like bridges, they can segment large networks and can filter out noise. However, they are slower than bridges because they are more intelligent devices; as such, they analyze every packet, causing packetforwarding delays. Because of this intelligence, they are also more expensive. Routers are normally used to connect one LAN to another. Typically, when a WAN is set up, there will be at least two routers used.

10 Department of CSE/IT NYSSCOER

Computer Workshop-II Switch A network switch is a computer networking device that connects network segments. Low-end network switches appear nearly identical to network hubs, but a switch contains more "intelligence" (and a slightly higher price tag) than a network hub. Network switches are capable of inspecting data packets as they are received, determining the source and destination device of that packet, and forwarding it appropriately. By delivering each message only to the connected device it was intended for, a network switch conserves network bandwidth and offers generally better performance than a hub. A vital difference between a hub and a switch is that all the nodes connected to a hub share the bandwidth among themselves, while a device connected to a switch port has the full bandwidth all to itself. For example, if 10 nodes are communicating using a hub on a 10-Mbps network, then each node may only get a portion of the 10 Mbps if other nodes on the hub want to communicate as well. . But with a switch, each node could possibly communicate at the full 10 Mbps.

Conclusion: The importance of various components in networking is concluded. Review Questions: 1. 2. 3. 4. 5.


Why do you need internetworking? Why a repeater is called level-1 relay ? What is bridge? How it operates in the internetworking scenario ? Why spanning tree topology is necessary for routing using a bridge? What limitations of a bridge are overcome by a router?

11 Department of CSE/IT NYSSCOER

Computer Workshop-II

Practical 02 Aim: Installation of centos (UNIX) using VMware Theory : How to install centOS 5.4

Procedure :
Step 1 : Open VMware software by just mouse double click VMware Workstation icon on desktop. Then following window will be pop-up.

Step 2 : Click on New virtual machine the following window will be appear.

12 Department of CSE/IT NYSSCOER

Computer Workshop-II

Step 3 : Select typical (recommended) option and click on Next button.

Step 4 : Insert CentOS 5.4 disk into a CD-ROM Drive. The next window on VMware software will be appear then select option Installer Disk and click on Next button.

13 Department of CSE/IT NYSSCOER

Computer Workshop-II

Step 5 : Type the name of your new virtual machine and click on Browse button & select where you want to save your new virtual machine and then click on Next button.

Step 6 : Next popup window will shows some information about Disk Capacity read this information and then click on Store virtual disk as a single file option and click on Next button.

Step 7 : Next pop-up window will be shows some Hardware

14 Department of CSE/IT NYSSCOER

Computer Workshop-II
information & read this information and click on Finish button.

Step 8 : CentOS

installation process is being progress and within a few second next pop-up window will be appear on the screen.

15 Department of CSE/IT NYSSCOER

Computer Workshop-II
Step 9 : If you want to install or upgrade process in graphical mode then press <ENTER> key on the keyboard. Some process will be completed within a second and next windows will be pop-up.

Step 10 : Select Skip option to abort the disk checking process. Some process will be completed and next window will be appear on the screen.

16 Department of CSE/IT NYSSCOER

Computer Workshop-II

Step 11 : Click on Next button then select language English (English) on list box and click on Next button. The next window will be appear on the screen.

17 Department of CSE/IT NYSSCOER

Computer Workshop-II

Step 12 : Ignore warning message and select U.S. English in the list box and then click on Next button the next window will be pop-up.

Step 13 : Select Remove linux partition on selected drive and create default layout option on list box and then click on Next button.

18 Department of CSE/IT NYSSCOER

Computer Workshop-II
Step 14 : Next window will be shows Network devices information if you want to install server then click on Edit button and fill some information about networking otherwise just click on Next button the next window will be appear on the screen.

Step 15 : Click into the map and choose a region and then click on Next button. The next windows will be pop up on the screen.

19 Department of CSE/IT NYSSCOER

Computer Workshop-II
Step 16 : Enter the root password any as you wish 6-8 digit and click on Next button. Some process will be completed within a few second and next window will be pop-up.

Step 17 : If you wish to add some default centOS included software for general usage of internet then click on the box in a list and press Next button the next window will be pop-up.

20 Department of CSE/IT NYSSCOER

Computer Workshop-II Step 18 : Some process will be completed and next window will be pop-up.

Step 19 : Click on Next button.

21 Department of CSE/IT NYSSCOER

Computer Workshop-II

Step 20 : Setup is being progress and within 15-20 minute will be required to complete this process after completed the process next windows will be appear on the screen.

Step 21 :

Click on Reboot button.

22 Department of CSE/IT NYSSCOER

Computer Workshop-II

Step 22 : The centOS screen will be show on the screen and some process being progress in a few second next window will be pop-up.

23 Department of CSE/IT NYSSCOER

Computer Workshop-II

Step 23 :

Click on Forword Button.

Step 24 :

Next window will be pop-up and then again click on Next button.

24 Department of CSE/IT NYSSCOER

Computer Workshop-II
Step 25 : Next window will be pop-up select Data and Time and click on Forward button then next window will be appear on the screen.

Step 26 : Enter the username, fullname, password, conform password and remember this username & password and then click on Forward button next window will be pop-up.

25 Department of CSE/IT NYSSCOER

Computer Workshop-II
Step 27 : Some information shows on the screen about the sound card read this do nothing just click on Next button the next window will be pop-up.

26 Department of CSE/IT NYSSCOER

Computer Workshop-II

Step 28 : If you want to install any other software then click on Install button otherwise click on Finish button. The next window will be appear on the screen.

Step 29 : Enter the username and password on the window and press the Enter key on the keyboard.

27 Department of CSE/IT NYSSCOER

Computer Workshop-II Step 30 : The centOS 5.4 Desktop will be shown on the screen.

28 Department of CSE/IT NYSSCOER

Computer Workshop-II Practical No 3 Aim : Introduction to various Unix Operating System file system command . Theory : Operating system acts as the interface between the user and computer. Examples of operating system are DOS. Windows and Unix. Unlike DOS and Windows. Several users can use UNIX concurrently. It is a multi-user operating system other words, a single copy of the operating system installed on a single disk can serve the needs of hundreds of users. The UNIX system is heavily command-based i.e. you have to type in a few characters to frame a command and then press the <Enter> key for it to work. Following are the different UNIX File System Commands . Navigating the file system $ ls {directory} Shows directory listjng.Ifno "directory>' is specified, "Is" print the names of the files in the current directory. $ cd {dirname} Change current directory. Without a "dimame", it will return you to your home directory. Otherwise, it takes you to the directory named. "cd /" will take you to the root directory. $ pwd Shows current working directory path. $ mkdir a1 Will create directory in current working directory , provided you have write permission in current directory . $ rmdir a1 a1/b1 this command can remove a directory or directories in one shot $ man -k pattern Shows all manual entries which have "pattern" in their description man {section} name Shows the full manual page entry for "name, without a section number, "man" may give you any or all pages for that "name", for example "man write" will give you the manual pages for the write command and "man 2 write" will give you the system call for Write(usually from the C or Pascal programming language). 29 Department of CSE/IT NYSSCOER

Computer Workshop-II

Unix Ordinary File command

$ cat {filename} Print out (to the screen) the contents of the named file. Can also be used to concatenate files. Say you want file l and file 2 to be all together in one file named file3.If file l is first, then, "cat file l file2>file3" will produce the correct file 3. $ touch f1 Create an empty file f1 $ Cp {filename(s)} {path} Copies files from one directory/filename to another. cp fl f2 makes file f2 identical to f1 . cp*.c src/ copies all files that end in c into the src subdirectory. mkdir dirname Makes a sub-directory named dirname in the current directory. $ rm file 1 This command will remove file one , rm command is used to delete the file from current directory $ mv filename path Moves "filename" to path. This might consist of a simple renaming of the file, mv file1 file2, moving the file to a new directory, mv filel/tmp/, or both mv filel/mplfile2. more filename Displays the contents of a file with page breaks. Useful to use 'file' first so you don't display garbage $ who Shows who is currently logged on the system. The "w" command does the same thing, but gives slightly different info. $ cmp {filel} {fIle2} Compares the contents of two files from eachother. Reports the first different character found, and the line number. $ chmod {options} Changes the permission modes of a file. 30 Department of CSE/IT NYSSCOER

Computer Workshop-II wc Word, line, and character count Conclusion: All the file manipulation command been tested successfully.

31 Department of CSE/IT NYSSCOER

Computer Workshop-II Practical 4 Aim: Introduction to VI editor with examples Theory:


A Brief vi Session

vi commands are case-sensitive, which means that upper-case and lower-case commands are not the same command. For example, j moves the cursor down, but J combines two lines into one line. The word RETURN represents the action of pressing RETURN key. ESC indicates pressing the ESCAPE key. Also, sometimes you will see a keystroke like CTRL-F. CTRL-F means you hold down the key marked CONTROL or CTRL, and press F. The CTRL key acts in a manner similar to the SHIFT key.
Starting vi vi filename RETURN

where filename is the name of the file you want to edit. If the file does not exist, vi will create it for you. You can also start vi without giving any filename. In this case, vi will ask for one when you quit or save your work. vi uses a cursor to indicate where your next command or text insertion will take effect. The cursor is the small rectangle, which is the size of one character, and the character inside the rectangle is called the current character. At the bottom of the window, vi maintains an announcement line, called the modeline. The modeline lists the current line of the file, the filename, and its status.
Command Mode and Input Mode

vi has two modes, command mode and input mode. In command mode, characters you type perform actions like moving the cursor, cutting or copying text, or searching for some particular text. In input mode, you type to insert or overwrite text. When you start vi, it is in command mode. To switch from command to input mode, press the i key (you do not need to press RETURN). vi lets you insert text beginning at the current cursor location. To switch back to command mode, press ESC. You can also use ESC to cancel an unfinished command in command mode. Unfortunately, vi does not normally indicate which mode you are in. The next exercise turns on a mode indicator. If you are uncertain about the current mode, you can press ESC a few times. When vi beeps, you have returned to command mode.
Using ex Commands

When in vi command mode, typing : allows you to access the ex editor command set. There are a number of ex commands that you will want to use within the vi editor. ex commands are very powerful and can allow you to make some large changes to your files quite efficiently.

32 Department of CSE/IT NYSSCOER

Computer Workshop-II VI on Entry To return press <ESC> Key INPUT Mode COMMAN D Mode To return press I,I,o,O,r,R,s,S,a,A Key Re
Inserting Text

To return press: Key

EX Mode

To return press ENTER Key

While in input mode, you can enter text by typing normally. vi recognizes a few special keystrokes as you type. Command Meaning Backspace or Delete Erase the previous character CTRL-W Erase the previous word CTRL-U Erase the current line RETURN Start a new line Commands to Insert Text
Cursor Movement

You will clearly need to move the cursor around your file. You can move the cursor in command mode. vi has many different cursor movement commands. The four basic keys appear below. You can also use the backspace key (but not the DELETE key) and spacebar to move left and right, respectively. A table of additional movement commands appears below. Notice that vi has its own definitions of sentences and paragraphs, so understanding how vi recognizes them is useful. K h l j move up one line line move one character to the left line move one character to the right move down one line

sentence A sentence is all the characters between normal sentence punctuation marks:period (.), question mark (?), and exclamation point (!). A blank line also ends a sentence.

33 Department of CSE/IT NYSSCOER

Computer Workshop-II

line The text between two RETURN characters forms a line. Hence, it is possible to have lines which are wider than the vi display.paragraph A paragraph is a sequence of lines which are not interrupted by any blank lines. Thus, the sample document from the previous exercise has four paragraphs. Command B W e 0 $ ( ) { } H M L Cursor Moves to beginning of previous word beginning of next word end of current/next word (zero) or ^ beginning of line end of line beginning of current/previous sentence beginning of next sentence beginning of current/previous paragraph end of current paragraph top line on screen middle line on screen bottom line on screen

Deleting Text

Sometimes you will want to delete some of the text you are editing. To do so, first move the cursor so that it covers the first character of the group you want to delete, then type the desired command from the table below. Command Function x Delete only the current character db Delete from the current character to the beginning de Delete from the current character to the end of the current word dd Delete the current line dw Delete from the current character to the beginning of the next word D Delete to the end of the line of the current word

Notice that the second letter of the command specifies the same chunk of text that the cursor movement commands do. In fact, you can use delete with all of the cursor movement specifiers listed in Table 2 (e.g. dH would delete from the top line on the screen) to delete the desired chunk of text. Also, D is equivalent to d$.
Making Corrections

34 Department of CSE/IT NYSSCOER

Computer Workshop-II In other cases you will only need to change a single character or word, rather then deleting it. vi has change and replace functions, too. First move to the position where the change should begin (the desired line or the beginning of the desired word). Next type the proper command from the table below. Finally, enter the correct text, usually concluded with ESC (except for r). Command Function r Replace a single character with another one. No ESC necessary. R Overwrite characters starting from the current cursor position s S cw Substitute one or more characters for a single character Substitute the current line with a new one. Change word. vi displays a dollar sign ($) marking the end of the change portion. Overwrites to the end of the line.

The change command c works like the delete command; you can use the text portion specifiers listed in Table (e.g. dH would delete from the top line on the screen) that act as cursor movement commands to replace the selected text. C is equivalent to c$..
Undoing

Occasionally you will accidentally issue a command or delete some text and want to restore your text to the way it was before you issued that command. vi lets you undo the last text change with the undo command, which you execute by typing u. Note, however, that vi will only recover the last text change.
Joining Lines

Occasionally you will want to link two or more lines of text together, usually because deleting text has created a lot of empty space. The J command combines the current line with the line below it.
Saving Your Work

vi provides several means of saving your changes. Besides saving your work before quitting, its also a good idea to save your work periodically. Power failures or system crashes can cause you to lose work. From command mode, you type: :w RETURN to save your work (w is for write). Similarly, to quit vi use the command: :q RETURN 35 Department of CSE/IT NYSSCOER

Computer Workshop-II You can combine these two commands at once to write-and-quit by entering command mode and typing :wq RETURN A shorthand for the command mentioned above is ZZ (SHIFT ZZ:w command). To do so, type: :q! RETURN which tells vi to quit without saving. Use caution when abandoning vi in this manner because any changes you made will be permanently lost.

Conclusion: All the VI commands has been tested successfully

36 Department of CSE/IT NYSSCOER

Computer Workshop-II Practical 5 Aim : shell as an interpreter Theory : What is a Shell? What is a shell? A shell is a command interpreter. While this is certainly true it likely doesn't enlighten the reader any further. A shell is an entity that takes input from the user and deals with the computer rather than have the user deal directly with the computer. If the user had to deal directly with the computer he would not get much done as the computer only understands strings of 1's and 0's. While this is a bit of a misrepresentation of what the shell actually does (the idea of an operating system is neglected) it provides a rough idea that should cause the reader to be grateful that there is such a thing as a shell. A good way to view a shell is as follows. When a person drives a car, that person doesn't have to actually adjust every detail that goes along with making the engine run, or the electronic system controlling all of the engine timing and so on. All the user (or driver in this example) needs to know is that D means drive and that pressing accelerator pedal will make the car go faster or slower. The dashboard would also be considered part of the the shell since pertinent information relating to the user's involvement in operating the car is displayed there. In fact any part of the car that the user has control of during operation of the car would be considered part of the shell. I think the idea of what a shell is coming clear now. It is a program that allows the user to use the computer without him having to deal directly with it. It is in a sense a protective shell that prevents the user and computer from coming into contact with one another. Unix Commands versus Built in Shell Commands The Unix operating system comes with many commands that the user can use to interact with computer. Unix commands are simply programs (usually written in the C programming language) that are executed when called for. The usual place for the storage of these commands is the /usr/bin directory. The commands that are available on a particular machine will vary. There is a set number of standard commands that come with a Unix system, but there is no limit to the commands that may be available. An example of this is the more command. Typing more followed by a filename (preferably a text file) will cause the filename to be presented to the default output device a page at a time. Pressing the spacebar will display the next page, typing the enter-key will display the next line, and pressing the q will exit the program. This is how the man pages are displayed. Many users felt that this was too inflexible and along came another command found on many Unix systems called less. The less command is essentially the same as the more command with the exception that it allows the up and down arrow keys to be used to scroll around a document. Many of the Unix commands may be well known to the user while others may not. Some examples are ls, cd, grep, find and chmod to name just a select few. It is important to realize that while these commands might vary in syntax and usage somewhat from one platform of Unix to another, they are shell independent. Whether in the C shell or the Z shell, the grep command behaves the same. Remember to see how a particular command is used on a particular platform, the user can use the man command. Now each shell comes with its own set of built-in\ commands. These are commands that are local to the particular shell. Some examples of these are the history command in the C shell, and the export in the Bourne shell. Built-in commands can be taken as platform independent. It is important to keep in mind having said this that there is a possibility of slight variation between different versions of the shells themselves. This is inevitable, but for the purpose of this book a standarized shell is again 37 Department of CSE/IT NYSSCOER

Computer Workshop-II assumed. If there is any discrepency between this book and any particular shell, the man pages can again be referenced The Bourne Shell A Bit of History The Bourne shell is the obvious shell to examine first for two reasons. First and foremost, it was the first shell written. It was was written at Bell Laboratories, by Stephen Bourne. This makes the Bourne shell the foundation which all other shells are (at least in part) built on. In fact it will be seen that the shells covered in this book fall basically into two categories, or families, the Bourne family and the C shell family. The second reason to start with the Bourne shell is that it comes with all Unix systems, making it a good introductory shell purely on the basis of availability. Getting to Know the Bourne Shell If the user sits down and starts typing a few Unix commands he will be utilizing the shell that happens to be installed. A good place to start is to confirm that the resident shell is, in this case, the Bourne shell. To check if this is true, type the following command: echo $SHELL and the output should be /bin/sh indicating that the shell being used is indeed the Bourne shell. If this is not the case, and another shell is installed, the chsh command can be used to change the shell, or for the purpose of learning the shell, an interactive shell can be invoked using the sh command. While the default prompt for a non-root user in the Bourne shell is a $, this is not really a good way to determine the current active shell since in any shell the prompt can be changed. For the rest of the examples in this section a dollar sign will lead the text to emulate the prompt. Now that the current working shell is a Bourne shell, it can be examined in some detail. It is instructional to look at what exactly happens when a command is entered. The user types in any command on a line followed by the enter-key or return-key, for example, $ cp *.txt text_files <enter> This is a common enough command, it moves all of the files with a .txt extension from the current working directory to a subdirectory called text_files. The shell is set into action by the enter-key. It begins immediately by searching the Unix command for anything foreign to the command. For example it looks for variables, pipelines, other redirection characters and command separators - all of which will be covered in due time. The above example contains nothing but a simple Unix command so the shell passes the command to the operating system which then processes it. If any of the special characters mentioned above had been contained in the command, the shell would have handled them before passing the command off to the operating system. What if the command was too long for the terminal window? No problem. The input may look different to different users since some terminals will wrap longer 38 Department of CSE/IT NYSSCOER

Computer Workshop-II commands onto the next line, and others will adjust in such a way that the command will keep going to the right past the terminal boundary. In either case, the shell waits until the enter-key has been pressed before taking any action. There is a way however to enter a long command such that it will be broken at the end of the top line and continued on the next. This can be accomplished by typing a backslash (\) character before pressing return at the breakpoint, Multiple Commands Per Line One of the things that the Bourne shell looks for when a command is entered, is if there is more than one command entered. The most common way to have multiple commands entered on one line is to use the semicolon separator. This separator tells the shell to send each command to be processed in the order in which they appear, like the following: $ cd docs; mkdir old_docs; mv *.* old_docs <enter> which is the same as $ cd docs <enter> $ mkdir old_docs <enter> $ mv *.* old_docs <enter> Now suppose there is a situation where a user wants to have some commands carried out at the same time without having to wait for each to start. A particular situation that comes to mind is copying a several megabyte file (which can take minutes) while trying to do anything else. The following could be entered: $ cp big_file new_dir& rm *.o& who <enter> which is equivalent to $ cp big_file new_dir& <enter> $ rm *.o& <enter> $ who <enter> where the shell puts the command (plus arguments) before an ampersand into the background. In the above case it copies the big_file (in the background), it deletes all of the object files (in the background) and finally it runs the who command (in the foreground) . The Bourne shell also allows command grouping. Command grouping treats a group of commands as a unit and executes them as such in a subshell. To group commands enclose them in round parentheses () and separate the commands by semicolons. The grouped commands are executed in a subshell. For example, $ MY_name='Norm Buchanan' $ (MY_name='George Bush'; echo $MY_name) George Bush $ echo $MY_name 39 Department of CSE/IT NYSSCOER

Computer Workshop-II Norm Buchanan This example was chosen to demonstrate how command grouping works, but also to give a glimpse of variable scope or visibility (which will be covered in greater detail in section 2.7, variables). User defined variables are local to the current shell which means that they can not be accessed or altered in a subshell. This is why the variable MY_name returns to its original value as soon as the commands enclosed by the parentheses have been executed. These features lead quite naturally into more powerful features of the Bourne shell, or shells in general. Redirection and Pipelines The situation often arises where the user desires that the output of a command go to a file rather than to the screen, or that the output of a command go directly to another command. The Bourne shell provides a group of features to handle both situations. The shell recognizes the following redirection characters: the output (>), the input (<), the output append (>>), and the input from standard in (<<) (stdin is almost always the keyboard). The output (>) symbol sends the output of a command to a file as follows: $ ls -l >filename which will send the long listing of the current directory to the file called filename. The difference between the (>) and the (>>) is that the append (>>) symbol causes the output of the command to be directed to the end of the file if it already exists or else it creates the file. The standard output redirection operator (>) will create the file in order to write the output and if this file exists it will overwrite it. The input operator (<) causes the filename to the right of it to be used as input to the command. These can mixed up and used together such as the following example which counts the number of lines in a file called text_file and puts the result in a file called line_count: $ wc -l <text_file >line_count Another way to redirect output is with the use of file descriptors. File descriptors give numeric values to the three types of input and output (I/O): standard input (stdin) or the keyboard by default, standard out (stdout) or the screen by default, and standard error (stderr), error messages are also sent to the screen by default. Table 1.1 lists the file descriptor for each case: Type of i/o Default seating File description STDIN STDOUT STDERR KEYBOARD SCREEN SCREEN 0 1 2

To use these file descriptors to redirect output any of the following forms could be used:

40 Department of CSE/IT NYSSCOER

Computer Workshop-II $ command >&D redirects output to D, $ command <&D get input for command from D, $ command >&- closes standard output, and $ command <&- closes standard input, where D is one of the three file descriptors. Slightly more complicated I/O redirections can be constructed using file descriptors such as $ command 2>err.file which sends the error messages from the command to a file called err.file. Probably the most common use of file descriptors comes when the user's desire to send stdout and stderr to a file. This would be accomplished by the following: $ command out.file 2>&1 This will send both the output and error messages of the command to a file called out.file. While this is a slightly complicated command to remember, it is well worth the effort. Pipelines are used to pass the output from a command and feed it into another command to be processed. The symbol for a pipeline is |. A good illustration of using a pipeline might be to count the number of users logged onto the user's system which could be accomplished by $ who | wc -l Some command pipelines can be accomplished in more than one way. For example, $ cat text_file | wc -l gives the same result as $ wc -l <text_file Users can determine which method they prefer, but keystroke-conservation is usually the motivating factor. For either pipes or redirection, as many items as desired can be linked together, and pipes and redirection can be mixed on a command-line. Filename Substitution The shell allows the user to enter part of a file or several files without typing the filename explicitly. This is called filename substitution and it allows the user to significantly reduce the number of keystrokes entered. For example if someone wanted the listing of all the C source files in the current directory they could type $ ls *.c or perhaps all of the C files that start with the letter s: 41 Department of CSE/IT NYSSCOER

Computer Workshop-II $ ls s*.c The * symbol matches a group of characters, but the shell will also recognize two other substitution symbols for less general replacements, the ? and the []. The ? symbol is the character replacement. It will substitute a character into the question mark position of the string until all matches have been made or all the characters have been placed in the spot and no matches have been made. An even more specific substitution exists, the character set substitution. This allows the user to search for a very specific example such as the following: $ rm file[a-df].txt This example deletes the files: filea.txt, fileb.txt, filec.txt, filed.txt, filef.txt, but leaves filee.txt untouched (if such a file exists). If the negation symbol ! is used with the character set substitution, the enclosed characters can be explicitly avoided. This means that all strings not containing the substring will be chosen. Of course all of these substitution symbols can be used together as desired. Special Characters The previous section should clearly demonstrate that there are a number of characters that are special to the shell, and hence some extra measures must be taken when attempting to use them in a casual manner. For illustration of this point, imagine a directory containing the following files: Mail/ News/ a.out* prog.c utils/

and the user types, while in this directory, $ echo * Hello * Expecting the following output: * Hello * The user is shocked to see the actual output: Mail News a.out prog.c utils Hello Mail News a.out prog.c utils The shell has simply used its definition of the * symbol which differs greatly from the users definition of the same character. This is a common example of how care has to be taken when using shell special characters in strings. There are a few ways to handle this situation. The first solution, which is probably the easiest for this particular example, is to escape the *. This means that a backslash should be placed directly in front of the *. Escaping a character causes it to be treated by the shell as though it were simply a text character. Therefore the above example could be quickly corrected by entering the following: $ echo \* Hello \*

42 Department of CSE/IT NYSSCOER

Computer Workshop-II which would give the desired result. The result could also be achieved using single (left hand) or double quotation marks. When either single or double quotation marks enclose a string, the special characters (with the exception of the $ and right hand single quote (')) are taken to be string characters. An advantage of quotation marks over escape sequences is that if there are many special characters in a string, quotes will save keystrokes and thus time. Another advantage is that they recognize white space. An echo statement without quotation marks will not recognize spaces or tabs causing the following: $ echo \*\*Warning\*\* which will give as output: **Warning** Disk Space is Low A quick and easy fix would be $ echo '**Warning** Disk Space is Low' Disk Space is Low

and this would give the appropriate output. While both single and double quotes solve the above problems, they are different. The difference comes in handling variables, which will be covered shortly. The single quote will not substitute a variable into an expression whereas the double quote will. When deciding which of the methods to use, the complexity of the expression (i.e. how many special characters are used) should be looked at, as well as variable usage. Command substitution is a topic that ties up these last few sections. Command substitution allows the output of a command to be substituted into another command. For example, $ echo "There are `who | wc -l` users on the system" may give as output There are 13 users on the system The user now has the tools and flexibility to handle even the most specific or complicated command in the Bourne shell. Variables This is where the shell gets interesting. Variables add a level of generality to the environment. A variable is simply a name that acts as a placeholder for a value or set of values (an array which will be covered in later sections). In the Bourne shell there are four different types of variables:

User Defined - local (only accessible by the current shell), Parameters - command-line arguments, Environmental - special variables for the shell environment and Special - defined by shell. 43 Department of CSE/IT NYSSCOER

Computer Workshop-II User defined variables are fairly straightforward. In the Bourne shell they take the following form: $ size=1024 $ MY_ADDRESS=buchanan@phys.ualberta.ca $ greeting='Welcome to the Bourne shell' To access a variable, a $ must be placed in front of the variable name or else the shell will not realize that what follows is not a command. The shell will then attempt to execute the command and return an error message. An example of accessing a user defined variable is then $ echo You can e-mail me at $MY_ADDRESS You can e-mail me at buchanan@phys.ualberta.ca The above can be used to demonstrate the difference between single- and double-quote handling of strings. If single quotes are used to enclose the string, the shell will not make the variable substitution as it treats the $ as a text character rather than a signal that a variable is coming: $ echo 'You can e-mail me at $MY_ADDRESS' You can e-mail me at $MY_ADDRESS Double quotes however, will allow the shell to recognize the variable and pass its value to the echo command: $ echo "You can e-mail me at $MY_ADDRESS" You can e-mail me at buchanan@phys.ualberta.ca Variable names can be nested as well. This is another way to say that one variable can be set equal to another variable which contains another, etcetera. $ today=Tuesday $ day=$today $ echo The day of the week is $day The day of the week is Tuesday When assigning a value to a variable, it is important to leave no white space. This is because the assignment is terminated by white space, unless the appropriate quotation characters enclose the string value. This allows more than one variable assignment to be made on a single line: $ a=cat b=dog c=elephant It is important however to realize that the assignments are processed from right to left and therefore if the following assignments were made: $ VAR1=$VAR2 VAR2=hello the value of VAR1 would be hello whereas if the the order was reversed: 44 Department of CSE/IT NYSSCOER

Computer Workshop-II $ VAR1=hello VAR2=$VAR1 the value of VAR2 would be undefined. This is because VAR2 is assigned the value of VAR1 before VAR1 has been given a value. Variable assignments can also be removed using the unset command. For example, $ VAR="Hello" $ echo $VAR Hello $ unset VAR $ echo $VAR

Once a variable has been assigned a value, it can be easily referenced by the use of a dollar sign in front of the variable name as shown above. A user may wish to append a string directly to a string variable such as $ VAR=Tues $ echo $VARday which will return no value since no value has been assigned to VARday. The shell can not determine that the user meant to treat $VAR as a separate entity and hence it treated the the string as one complete variable name. This is because the shell uses white space when interpreting variable 22substitutions. However, if curly braces containing the variable name are placed within a string, the shell will handle the entire string as desired: $ VAR=Tues $ echo ${VAR}day Tuesday The Bourne shell also provides variations on the above variable substitution that allow alternative substitutions under certain conditions. There are four such conditional substitutions in the Bourne shell which are listed in table

Substitution format $ (var:-all_val) $ (var:=all_val) $ (var:+all_val) $ (var:?all_val)

Result If var has been assign a value , use that value or else use all_val If var has been assign a value , use that value or else use all_val and assign all_val to var If var has been assign a value , use that use all_val and if var has not been assign a value , use nothing If var has been assign a value , use that value or else use all_val and exit if in a shell programming , if all _valis empty print an error message to stderr 45 NYSSCOER

Department of CSE/IT

Computer Workshop-II

Parameters Parameters are another type of shell variable that carry information from the command-line. Any command can be broken up into parts. The first element of the command-line is always a program (either an executable or a shell script, which will be covered shortly). The following elements can be looked at as special values to be passed to the program. These values are called positional parameters and are stored in the variables $1 through $9. The parameter $0 is a special variable that always holds the name of the program. Positional parameters will be covered in more detail in the section on shell programming. Environmental Variables Environmental variables are variables that have special meaning to the shell. These are to be used to customize the environment for a particular user. These variables should be defined in the special program that is executed during login called the .profile (dot profile) file. Any defined variables would then be set until the end of the session unless explicitly unset or redefined. An example of a .profile file is included in the section on programming. To make these variables global (so that they maintain their value in any subshell) the export command must be used. For example if you use ---> for a prompt in the current shell and then start up a subshell, the prompt will be $ again. To remedy this situation use the export command: $ PS1="--->" $ export PS1 To see a list of environmental variables currently set and their settings, one can use the env command. A typical listing might be as follows: $ env COLUMNS=80 HOME=/users/smith LINES=24 LOGname=smith MAIL=/usr/mail/smith PATH=/bin:/usr/bin/:/users/smith/bin SHELL=/bin/sh TERM=vt100 Special Variables Special or builtin variables are define by the shell for use at any time. They are mostly used for shell programming .

46 Department of CSE/IT NYSSCOER

Computer Workshop-II Bourne Shell Programming Shell programming gives the shell a tremendous amount of power. Not only can groups of commands be used together in a shell program (or script), but the Bourne shell comes with a full programming language that allows such things as arithmetic calculations on variables, decision making or branching, and controlled looping. Unlike languages such as FORTRAN, PASCAL and C, shell scripts do not require compiling or linking. This means that there is no conversion of the source code down into machine language before execution. A script is really nothing more than a sequential list of instructions (some of which are Unix commands) that the shell interprets and executes. Each shell script is written using the particular syntax, or language, given in the following sections. After the script has been written to the users satisfaction, it is made to be an exectabule file using the chmod command. If, for example, a user had a file called my_script that contained a shell program he would do the following: chmod u+x my_script Notice that there is no special extension or any other feature to distinguish the script as a special program. A shell script can be given any name with any extension, and therefore it is convenient to give the scripts meaningful names to help the user remember their purpose. A script can also be run in a subshell by using the command sh script_name. The most simple shell script is one which contains a group of Unix commands to carry out a particular task. The following simple example is a script to backup all the files in the subdirectories above a directory named data. It first archives all of the subdirectories and files using the tar utility, it then compresses the archive file to conserve space, and finally copies the compressed archive to a remote disk for storage: #! /bin/sh # Backup is a sh script to back up all of my data tar cfv mydata.tar data/ compress mydata.tar cp mydata.tar.Z /dsk2/storage/ All but the top two lines of the shell script are ordinary Unix utilities. The second line does nothing, it is just a comment statement. In Unix shell scripts, the hash character signifies a comment statement, allowing text documentation to be left for future reference. This particular script is short and straightforward enough that documentation may not be required, but in larger scripts it can be essential in order to understand what the program does. Very few people can remember what exactly a program does more than a week after writing it. A well documented script is much nicer to debug, or modify, at a later date than a seemingly endless string of commands and other instructions. The first line is a special line that should be present at the beginning of any shell script written in any shell scripting language. The first two characters tell the shell that what follows is the path of the shell that the script was written under. The current shell will then start a subshell of the type contained in the first line (a Bourne shell in this example). After the script has been executed, control is returned to the original shell. After a glance over the above script, the reader may wonder what the difference is between a shell script and a group of commands, say a pipeline. Well, in this simple example there is not much difference, except for the fact that the same group of commands can be carried out by typing the name of the script rather than reentering them each time. This is the main reason for putting a small group of commands into a script. 47 Department of CSE/IT NYSSCOER

Computer Workshop-II Results : Bourne shell commands has been performed with an example successfully.

48 Department of CSE/IT NYSSCOER

Computer Workshop-II Practical 06 Aim : Basic Concept of Shell Programming. Theory : Why shell programming? Even though there are various graphical interfaces available for Linux the shell still is a very neat tool. The shell is not just a collection of commands but a really good programming language. You can automate a lot of tasks with it, the shell is very good for system administration tasks, you can very quickly try out if your ideas work which makes it very useful for simple prototyping and it is very useful for small utilities that perform some relatively simple tasks where efficiency is less important than ease of configuration, maintenance and portability.So let's see now how it works:

Creating a script There are a lot of different shells available for Linux but usually the bash (bourne again shell) is used for shell programming as it is available for free and is easy to use. So all the scripts we will write in this article use the bash (but will most of the time also run with its older sister, the bourne shell). For writing our shell programs we use any kind of text editor, e.g. nedit, kedit, emacs, vi.. as with other programming languages. The program must start with the following line (it must be the first line in the file): #!/bin/sh The #! characters tell the system that the first argument that follows on the line is the program to be used to execute this file. In this case /bin/sh is shell we use. When you have written your script and saved it you have to make it executable to be able to use it.To make a script executable type chmod +x filename Then you can start your script by typing: ./filename Comments Comments in shell programming start with # and go until the end of the line. We really recommend you to use comments. If you have comments and you don't use a certain script for some time you will still know immediately what it is doing and how it works. Variables As in other programming languages you can't live without variables. In shell programming all variables have the datatype string and you do not need to declare them. To assign a value to a variable you write:
varname=value

Control structures The "if" statement tests if the condition is true (exit status is 0, success). If it is the "then" part gets executed:
if ....; then .... elif ....; then ....

49 Department of CSE/IT NYSSCOER

Computer Workshop-II
else .... Fi

Most of the time a very special command called test is used inside if-statements. It can be used to compare strings or test if a file exists, is readable etc... The "test" command is written as square brackets " [ ] ". Note that space is significant here: Make sure that you always have space around the brackets. Examples:
[ [ [ [ -f "somefile" ] -x "/bin/ls" ] -n "$var" ] "$a" = "$b" ] : : : : Test Test Test Test if if if if somefile is a file. /bin/ls exists and is executable. the variable $var contains something the variables "$a" and "$b" are equal

Run the command "man test" and you get a long list of all kinds of test operators for comparisons and files. Using this in a shell script is straight forward:
#!/bin/sh if [ "$SHELL" = "/bin/bash" ]; then echo "your login shell is the bash (bourne again shell)" else echo "your login shell is not bash but $SHELL" fi

The variable $SHELL contains the name of the login shell and this is what we are testing here by comparing it against the string "/bin/bash" Select Statement The select statement is a bash specific extension and is very good for interactive use. The user can select a choice from a list of different values:
select var in ... ; do break done .... now $var can be used ....

Loop statement In the shell you have the following loop statements available:
while ...; do .... done

The while-loop will run while the expression that we test for is true. The keyword "break" can be used to leave the loop at any point in time. With the keyword "continue" the loop continues with the next iteration and skips the rest of the loop body. The for-loop takes a list of strings (strings separated by space) and assigns them to a variable:
for var in ....; do .... done

Command line arguments We have seen that $* and $1, $2 ... $9 contain the arguments that the user specified on the command line (The strings written behind the program name). So far we had only very few or rather simple command line syntax (a couple of mandatory arguments and the option -h for help). But soon you will discover that you need some kind of parser for more complex programs where 50 Department of CSE/IT NYSSCOER

Computer Workshop-II you define your own options. The convention is that all optional parameters are preceeded by a minus sign and must come before any other arguments (such as e.g file names). Conclusion: shell files are created and executed successfully.

51 Department of CSE/IT NYSSCOER

Computer Workshop-II Practical 07 Aim : Introduction To MS Word & Power point Presentations Theory : Definition: MS- Word is A window based Text Editor. Different bars available for MS word are The Menu Bar The Menu bar is directly below the Title bar and it displays the menu. The menu begins with the word file and continues with Edit, View, Insert, FQrmat, Tools, T~ble, Window, and Help. You use the menu to give instructions to the software. Microsoft Power Point is Presentation aid software developed by Microsoft The Formatting Toolbar Toolbars provide shortcuts to menu commands. The ruler is used to change the format of your document quickly. Performance Create documents using Mail Merge Mail merge is used to create letters, mailing labels, envelopes, or catalogs Step 1: Click on tools option of Menu bar and select Mail Merge Option Step 2: Open or create the main document Step 3: Open or create the data source Step 4: Edit the main document and insert merge fields Step 5: Merge the data into the main document Editing the presentation in outline view, Promoting and demoting text , Viewing a presentation in slide sorter view , Changing the slide order ,Deleting a slide , Adding a new slide , Viewing the complete slide show Viewing , the outline and speaker notes Printing the presentation , Changing the layout of a slide Creating shapes , Manipulating shapes , Adding a textbox , Using the slide master , Changing the slide , color scheme , Modifying bullets on the slide master , Modifying fonts on the slide master Adding text to the slide master , Adding a logo to the slide master Adding transition effects Adding build effects

Make any One Power Point Presentation of Picture story. A technical topic. A general Topic. (Minimum 10 slides)

52 Department of CSE/IT NYSSCOER

Computer Workshop-II

Practical 8 Aim: Introduction to Internet & World Wide Web Theory: Def: The Internet is a computer network made up of thousands of networks worldwide. All computers on the Internet communicate with one another using the Transmission Control Protocol/Inter.net Protocol suite, abbreviated to TCP/IP. Requirements for internet: a) PC b) Modem (External internal) c) Telephone Line. d) Mail account Application: An Internet user has access to a wide variety of services: Electronic mail, File transfer, Vast information resources, Multimedia displays, Real-time broadcasting, Shopping opportunities, Breaking news, and much more. The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol. .

COMPONENTS OF THE INTERNET 1) World Wide Web The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Use net News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTIP. These protocols will be explained later in ttis handout. The World Wide Web provides a single interface for accessing all these protoct>ls. This creates a convenient and user-friendly environment. 53 Department of CSE/IT NYSSCOER

Computer Workshop-II

2) E-Mail Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds. A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. 3) Telnet Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just A Telnet program must be installed on your local computer and configured to your Web browser in order to work. With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet. 4) FTP FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more. FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. 5) Chat & Messaging Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users call log into the "chat room" to exchange comments and information about the topics addressed on the site. With instant messaging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Onlines Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Conclusion : the study of various component of internet has been done successfully

54 Department of CSE/IT NYSSCOER

Computer Workshop-II Viva Voice: Q1. What do you mean by Internet explorer? Q2. What are the requirements for getting your PC Internet oriented? Q3. Define Internet Browser and Surfing. Q4. Give the significance of W W W . Q5. What do you understand by protocol. Q6. Surf for your college site. ' www.raisoni.net. Q7. What are the components of internet? Q8. Define computer Network.

55 Department of CSE/IT NYSSCOER

Вам также может понравиться