CS5001NI Networks and Operating System
Assessment Weightage & Type
20% Individual Coursework
Year and Semester
2018-19 Autumn / 2018-19 Spring
Student Name: Ashutosh Chaurasia
London Met ID: 17032168
College ID: NP01NT4S180019
Assignment Due Date: 15th April 2019
Assignment Submission Date: 15th April 2019
Word Count (Task B): 1540
I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline for my assignment to be accepted and marked. I am fully
aware that late submissions will be treated as non-submission and a mark of zero will be awarded.
,Acknowledgement:
I would like to thank and express my sincere gratitude towards Islington College
and London Metropolitan University for giving us this coursework about UNIX Shell
Scripting and to learn more about it and different network protocols and the I/O
system structure. I would also like to thank my module leader Mr. Bijay Limbu
Senihang for teaching us about the various technical networking terms involved in
this project and providing us with different types of educational resources. He
helped us a lot through this coursework.
I would also like to thank our teacher Mr. Suryansh Mathema for guiding us through
this coursework without whom it would have been difficult for us to complete this
coursework on time. He helped us creating the script file for this script program.
Last not but not the least, I would like thanks my parents for supporting me through
this and helping me to complete this coursework.
,Abstract:
This document contains a brief introduction to shell scripting and UNIX shell
followed by the source code of the program and its various test cases of both valid
and invalid input. Since UNIX is one of multi-client and multiprocessing working
frameworks, UNIX has its answer for the framework asset the board. The UNIX
piece handles practically all the essential issues identified with procedure the
executives, memory the board, document framework, and I/O framework, and give
all around characterized framework programs that have the obvious task of
obligation so as to permit client projects to call them with framework calls.
, Contents
1. Task A: ................................................................................................................................................. 1
1.1. Introduction:................................................................................................................................. 1
1.1.1. Aims and Objective: ............................................................................................................... 1
1.2. Script: ........................................................................................................................................... 2
1.3. Testing: ........................................................................................................................................ 7
1.3.1. For valid inputs: .................................................................................................................. 7
3.1.2. For Invalid Inputs: .................................................................................................................. 13
1.4. Contents of three files:............................................................................................................. 17
1.5. Conclusion: ................................................................................................................................ 18
2. Task B: Technical Report ................................................................................................................ 19
2.1. Introduction:............................................................................................................................... 19
2.2. Aims and Objective: ................................................................................................................. 20
2.3. Body of the report: .................................................................................................................... 20
2.3.1. Network connection protocol: ......................................................................................... 20
2.3.2. UNIX Communication: ..................................................................................................... 22
2.3.3. Security Aspect of UNIX OS: .......................................................................................... 23
2.3.4. I/O system Structure: ....................................................................................................... 24
2.3.5. I/O Disk Scheduling: ........................................................................................................ 25
2.3.6. I/O Device Handler: .......................................................................................................... 26
2.4. Conclusion: ................................................................................................................................ 27
3. References: .......................................................................................... Error! Bookmark not defined.
4. Appendix: ........................................................................................................................................... 29
4.1. Appendix- A: .............................................................................................................................. 29
4.1.1. Types of Linux Shells:...................................................................................................... 29
4.1.2. Bash Scripting: .................................................................................................................. 29
4.2. Appendix- B: .............................................................................................................................. 29
4.2.1. Interrupts:........................................................................................................................... 29
4.2.2. Polling Scheme: ................................................................................................................ 30
4.2.3. Interrupt Nesting: .............................................................................................................. 30
4.2.4. Direct Memory Access (DMA): ....................................................................................... 31