You are on page 1of 9

ASSIGNMENT # 1 Of

Open Source Technologies


Submitted To:Miss Mandeep Kaur Submitted By:Ankush Gupta MCA Course Code 304 Roll-No 14

Department:-Computer Applications

L. P. U
1 |Page

Part-A Q1:- How can we manage the conflict regarding port number, among multiple servers on single system. Ans:- In some cases, you might want to run multiple mysqld servers on the same
machine. You might want to test a new MySQL release while leaving your existing production setup undisturbed. Or you might want to give different users access to different mysqld servers that they manage themselves. To run multiple servers on a single machine, each server must have unique values for several operating parameters. These can be set on the command line or in option files.

At least the following options must be different for each server:

--port=port_num
--port controls the port number for TCP/IP connections. (Alternatively, if the host has multiple network addresses, you can use --bind-address to cause different servers to listen to different interfaces.)

--socket=path
--socket controls the Unix socket file path on Unix and the name of the named pipe on Windows. On Windows, it is necessary to specify distinct pipe names only for those servers that support named-pipe connections.

--shared-memory-base-name=name
This option currently is used only on Windows. It designates the sharedmemory name used by a Windows server to permit clients to connect using shared memory. It is necessary to specify distinct shared-memory names only for those servers that support shared-memory connections.

--pid-file=file_name
This option is used only on Unix. It indicates the path name of the file in which the server writes its process ID.

2 |Page

Q:2 I have made a software using GNU. Now I want to release it as a product under my name. What are the prerequisites for doing so? Ans:- The GNU General Public License is a free, copyleft license for software
and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too.

The prerequisites are:1. Source Code:- The source code for a work means the preferred form of the
work for making modifications to it. Object code means any non-source form of a work. The Corresponding Source for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.

2. Basic Permissions:- All rights granted under this License are granted for the
term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its
3 |Page

content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law. You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.

3. Additional Terms:- Additional permissions are terms that supplement the


terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions. When you convey a copy of a covered work, you may at your option remove any additional permission from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms:

Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it. Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version.

4 |Page

Limiting the use for publicity purposes of names of licensors or authors of the material. Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks. Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.

4. Revised Versions of this License:- The Free Software Foundation may


publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License or any later version applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.

Q3:- Give an example to show that free software and open source software are two different concepts. Ans:- Open Source Software and Free Software are the two movements that
have sprung up to counter the rapid trend of commercialized proprietary software. Open Source is the source code of the software is freely available for other people to see and study. In truth, the scale of open source software has more provisions than just having a visible source code. There are a lot of definitions for Free Software, the most common of which is freeware, or software that you do
5 |Page

not have to pay for to use. However, the Free Software movement specifies that the freedom in free software extends far beyond the cost of the software. Basically, a user can do anything to Free Software, as long as the resulting software is also free. Free Software is a stricter code sharing method compared to Open Source, which allows the maker of the code to specify certain conditions, to enable the legal use and distribution of the software. The coder of Open Source software can specify whether a user is allowed to redistribute the modified code or not. This is not possible with Free Software, as it specifically indicates that the modified code derived from Free Software, should also be released as Free Software. Another aspect that Free Software advocates point out about Open Source software, is the practice of some companies to market their software as Open Source, but having the majority of the functions as proprietary software sold at a price. So, even though the main software is licensed as Open Source software, you will still need to pay in order to get the full functionality. Free Software is not allowed to work with proprietary software, thereby eliminating the possibility of the term Free Software being used in a misleading manner.

The main differences are:1. Free Software is Open Source Software, but Open Source software may not necessarily be Free Software. 2. Open Source allows the coder more control over his program compared to Free Software. 3. Open Source software can work with other proprietary software, while Free Software does not allow the same.

Part-B Q:1 Which three types of server configurations are offered by the MySQL?
6 |Page

Ans:- Three types of server configurations are:- There are three


different server types available to choose from. The server type that you choose affects the decisions that the MySQL Server Instance Configuration Wizard makes with regard to memory, disk, and processor usage.

Developer Machine:- Choose this option for a typical desktop workstation where
MySQL is intended only for personal use. It is assumed that many other desktop applications are running. The MySQL server is configured to use minimal system resources.

Server Machine:- Choose this option for a server machine where the MySQL
server is running alongside other server applications such as FTP, email, and Web servers. The MySQL server is configured to use a moderate portion of the system resources. that is intended to run only the MySQL server. It is assumed that no other applications are running. The MySQL server is configured to use all available system resources.

Dedicated MySQL Server Machine:- Choose this option for a server machine

7 |Page

Q:2 Can you control the number of concurrent connections to a MySQL server? If yes then how? Ans:- Yes we can control the number of concurrent connections to a MySQL
server.

We can control connections:- In the /etc/my.cnf, you can set the value like
this:max_connections=500 max_user_connections=12 Max connections is the maximum connections that can be made to the Mysql server and max_user connection is the maximum a user can make to the Mysql server.

Q:3 What if I remove all the contents from a log file? For how long time that file will remain blank? Ans:- Log File:- It contain 2 log File:1. Error Log:- The server error log, whose name and location is set by the
ErrorLog directive, is the most important log file. This is the place where Apache httpd will send diagnostic information and record any errors that it encounters in processing requests. It is the first place to look when a problem occurs with starting the server or with the operation of the server, since it will often contain details of what went wrong and how to fix it. The first item in the log entry is the date and time of the message. The second entry lists the severity of the error being reported. The LogLevel directive is used to control the types of errors that are sent to the error log by restricting the severity level. The third entry gives the IP address of the client that generated the error.

How long time that file will remain blank:-

If we remove all the content from error log then the file remain empty till the error come in the server when an error come then a entry of error with the date and time automatically entered in this log file.
8 |Page

2. Access log:-

The server access log records all requests processed by the server. The location and content of the access log are controlled by the CustomLog directive. The LogFormat directive can be used to simplify the selection of the contents of the logs. This section describes how to configure the server to record information in the access log.

How long time that file will remain blank:-

If we remove all the content from access log then the file remain empty till we run the apache server. An entry with date and time of accessing will automatically entered in the access file.

9 |Page

You might also like