0% found this document useful (0 votes)
25 views

Web Design and Programming CH-1

The document provides an overview of computers, programming languages, the history and characteristics of the World Wide Web from versions 1.0 to 3.0, the differences between programming and scripting, and network architectures including peer-to-peer and client-server.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Web Design and Programming CH-1

The document provides an overview of computers, programming languages, the history and characteristics of the World Wide Web from versions 1.0 to 3.0, the differences between programming and scripting, and network architectures including peer-to-peer and client-server.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

WEB DESIGN AND

PROGRAMMING
CHAPTER ONE
OVERVIEW OF THE INTERNET AND WWW
• 1.1 What is computer
• Computer is a device that can perform computations and make logical
decisions billions times more than human.
• A computer has 2 basic types of operations
• Logical unit
• Arithmetical unit
• Computers process data under the control of sets of instructions
called computer programs. These programs guide the computer through
orderly sets of actions specified by people called computer
programmers.
OVERVIEW OF THE INTERNET AND WWW
• 1.2 Programming language
• Programmers write instructions in various programming languages,
some directly understandable by computers and others requiring
intermediate translation steps. Hundreds of computer languages are
in use today. These may be divided into three general types:
1. Machine languages
2. Assembly languages
3. High-level languages
• The process of compiling a high-level language program into machine
language can take a considerable amount of computer time.
OVERVIEW OF THE INTERNET AND WWW
• 1.3 History of the web
• The Web, formerly referred to as the World Wide Web, is the pages/sites you see when
you log online. The Internet is a series of interconnected computer systems the Web
functions on, plus the medium allows files and e-mails to travel along.
• Web 1.0
• Basically, this first version of the Web consisted of a few people creating web pages and
content and web pages for a large group of readers, allowing them to access facts, information,
and content from the sources.
• Or you can sum up Web 1.0 like this: it was designed to help people better find information. This
web version dealt was dedicated to users searching for data. This web version is sometimes
called “the read-only Web” because it lacks the necessary forms, visuals, controls, and
interactivity we enjoy on today’s Internet.
• People use the term “Web 1.0” to describe the earliest form of the Internet. Users saw the
first example of a worldwide network that hinted at future digital communication and
information-sharing potential.
OVERVIEW OF THE INTERNET AND WWW
• Here are a few characteristics found in Web 1.0:
• It’s made up of static pages connected to a system via hyperlinks
• It has HTML 3.2 elements like frames and tables
• HTML forms get sent through e-mail
• The content comes from the server's file system, not a relational
database management system
• It features GIF buttons and graphics
OVERVIEW OF THE INTERNET AND WWW
• Web 2.0
• If Web 1.0 was made up of a small number of people generating content for a
larger audience, then Web 2.0 is many people creating even more content for a
growing audience. Web 1.0 focused on reading; Web 2.0 focused on participating
and contributing.
• This Internet form emphasizes User-Generated Content (UGC), ease of use,
interactivity, and improved compatibility with other systems and devices. Web 2.0
is all about the end user's experience. Consequently, this Web form was
responsible for creating communities, collaborations, dialogue, and social media.
As a result, Web 2.0 is considered the primary form of web interaction for most
of today's users.
• If Web 1.0 was called “the read-only Web,” Web 2.0 is known as “the participative
social Web.” Web 2.0 is a better, more enhanced version of its predecessor,
incorporating web browser technologies such as JavaScript frameworks.
OVERVIEW OF THE INTERNET AND WWW
• Here’s a breakdown of typical Web 2.0 characteristics:
• It offers free information sorting, allowing users to retrieve and classify data collectively
• It contains dynamic content that responds to the user’s input
• It employs Developed Application Programming Interfaces (API)
• It encourages self-usage and allows forms of interaction like:
• Podcasting
• Social media
• Tagging
• Blogging
• Commenting
• Curating with RSS
• Social networking
• Web content voting
• It’s used by society at large and not limited to specific communities.
• Mobile Internet access and the rise of social networks have contributed to a dramatic upturn in Web 2.0’s growth.
This explosion is also fueled by the rampant popularity of mobile devices such as Android-powered devices and
iPhones.
• In addition, Web 2.0's growth made it possible for apps such as Tik Tok, Twitter, and YouTube to expand and
dominate the online landscape.
OVERVIEW OF THE INTERNET AND WWW
• Web 3.0
• When trying to figure out the definitive web 3.0 meaning, we need to look into the future.
Although there are elements of Web 3.0 currently available today, it still has a way to go before
it reaches full realization.
• Web 3.0, which is also referred to as Web3, is built on a foundation consisting of the core ideas of
decentralization, openness, and more excellent user utility. Web 1.0 is the "read-only Web," Web
2.0 is the "participative social Web," and Web 3.0 is the "read, write, execute Web."
• This Web interaction and utilization stage moves users away from centralized platforms like
Facebook, Google, or Twitter and towards decentralized, nearly anonymous platforms. This
idealized version didn’t quite pan out due to technological limitations, like how expensive and
complicated it is to convert human language into something readily understood by computers.
• Web 3.0 ultimately lets users interact, exchange information, and securely conduct financial
transactions without a centralized authority or coordinator. As a result, each user becomes a
content owner instead of just a content user.
OVERVIEW OF THE INTERNET AND WWW
• 1.4 Programming Vs Scripting
• A scripting language is essentially a type of programming language that you
don't have to compile. Typically, scripting languages are less complex than
traditional programming languages, making them easier for beginners to learn.
Scripts are often short and use simple syntax, and they usually hide details
like data storage and memory from the end user. There are two main
categories of scripting languages:
• Server-side scripting languages: You can use server-side scripting languages
to develop scripts that run through a server rather than a browser. Some
common server-side scripting languages are PHP and Ruby.
• Client-side scripting languages: You can use client-side scripting languages to
run script on the client side, such as on a browser. Server-side scripts can send
client-side scripting languages from the server, and some common examples
are JavaScript and CSS.
OVERVIEW OF THE INTERNET AND WWW
• A programming language is a language that you can use to write
instructions for a computer in a syntax that the computer can
understand. This can allow you to develop computer programs that can
solve problems and complete tasks. You can also use scripting
languages within programs to build on programming language
components. The two main categories of programming languages are:
• High-level programming languages: High-level programming languages
are programming languages that have high levels of abstraction and
symbols to simplify programming. Some common high-level programming
languages are Java, SQL and C++.
• Low-level programming languages: Low-level programming languages
work directly with computer hardware and processors. An example of a
low-level programming language is a machine language.
OVERVIEW OF THE INTERNET AND WWW
• 1.5 Network Architecture
• Peer-to-Peer Architecture
• In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is
no real hierarchy in this network, all computers are considered equal and all have the same abilities to
use the resources available on this network. Instead of having a central server which would act as the
shared drive, each computer that’s connected to this network would act as the server for the files
stored on it.
• Advantages of a peer-to-peer network
• Does not require a dedicated server which means its less costly.
• If one computer stops working, the other computers connected to the network will continue working.
• Installation and setup is quite painless because of the built-in support in modern operating systems.
• Disadvantages of a peer-to-peer network
• Security and data backups are to be done to each individual computer.
• As the numbers of computers increases on a P2P network… performance, security, and access becomes
a major headache.
OVERVIEW OF THE INTERNET AND WWW
• Client/Server Architecture
• Client-server architecture, architecture of a computer network in which many clients
(remote processors) request and receive service from a centralized server (host computer).
In a client/server network, a centralized, really powerful computer(server) acts as a hub in
which other computers or workstations(clients) can connect to. This server is the heart of
the system, which manages and provides resources to any client that requests them.
• Advantages of a client/server network
• Resources and data security are controlled through the server.
• Not restricted to a small number of computers.
• Server can be accessed anywhere and across multiple platforms.
• Disadvantages of a client/server network
• Can become very costly due to the need of a server as well as networking devices such as
hubs, routers, and switches.
• If and when the server goes down, the entire network will be affected.
• Technical staff needed to maintain and ensure network functions efficiently.
OVERVIEW OF THE INTERNET AND WWW
• 1.6 Universal Protocols
• Internet Protocols are a set of rules that governs the communication and exchange of
data over the internet. Both the sender and receiver should follow the same protocols
in order to communicate the data. In order to understand it better, let’s take an
example of a language. Any language has its own set of vocabulary and grammar
which we need to know if we want to communicate in that language. Similarly, over the
internet whenever we access a website or exchange some data with another device
then these processes are governed by a set of rules called the internet protocols.
• An IP address represents an Internet Protocol address. A unique address that
identifies the device over the network. It is almost like a set of rules governing the
structure of data sent over the Internet or through a local network. An IP address
helps the Internet to distinguish between different routers, computers, and websites.
It serves as a specific machine identifier in a specific network and helps to improve
visual communication between source and destination.
OVERVIEW OF THE INTERNET AND WWW
• Types of Protocols
• TCP/IP
• FTP
• HTTP
• HTTPS
• SMTP
• SFTP
• IPV4
• IPV6
OVERVIEW OF THE INTERNET AND WWW
• 1.7 DNS and URL
• The Domain Name System (DNS) is the phonebook of the Internet. Humans access
information online through domain names, like nytimes.com or espn.com. Web browsers
interact through Internet Protocol (IP) addresses. DNS translates domain names to IP
addresses so browsers can load Internet resources.
• Each device connected to the Internet has a unique IP address which other machines use
to find the device. DNS servers eliminate the need for humans to memorize IP addresses
such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as
2400:cb00:2048:1::c629:d7a2 (in IPv6).
• DNS Hierarchy
• The DNS hierarchy is comprised of the following elements:
• 1) Root Level
• 2) Top Level Domains
• 3) Second Level Domains
• 4) Sub-Domain
OVERVIEW OF THE INTERNET AND WWW
• DNS Root Zone
• The DNS root zone is the highest level in the DNS hierarchy tree. The root name servers are very important
because they are the first step in resolving a domain name. The root zone contains the following:
• 1) Organizational hierarchy such as .com, .net, .org.
• 2) Geographic hierarchy such as .uk, .fr, .pe.
• Top Level Domains
• The next level in the DNS hierarchy is Top level domains. There are many TLDs available at the moment. As we
have seen the TLDs are classified as two sub categories. They are organizational hierarchy and geographic
hierarchy. Let us see each in detail.
• Organizational Hierarchy
• Domain Purpose
• com Commercial organizations
• edu Educational institutions
• gov Government institutions
• mil Military groups
• net Major network support centers
• org Nonprofit organizations and others
• int International organizations
OVERVIEW OF THE INTERNET AND WWW
• Geographic hierarchy
• In the geographic hierarchy, each country is assigned with two letter codes. These codes are used to
identify countries.
• For example, take the domain name www.ethiotelecom.et
• Second Level Domains
• The next level in the DNS hierarchy is the Second Level Domains. This is the domain that is directly
below the tld. This is the main part of the domain name. It can vary according to the buyer. There
are no limits here as the tlds. Once the domain is available anyone can purchase it. If the domain is
unavailable at the moment, same 2nd level name with other tlds is the best option.
• For example: www.jju.edu.et
• Sub-domain
• The sub-domain is the next level in the DNS hierarchy. The sub-domain can be defined as the domain
that is a part of the main domain. The only domain that is not also a sub-domain is the root domain.
Suppose two domains. one.example.com and two.example.com. Here, both the domains are the sub-
domains of the main domain example.com and the example.com is also a subdomain of the com top level
domain.
OVERVIEW OF THE INTERNET AND WWW
• URL stands for Uniform Resource Locator. A URL is nothing more
than the address of a given unique resource on the Web. In theory,
each valid URL points to a unique resource. Such resources can be an
HTML page, a CSS document, an image, etc. In practice, there are
some exceptions, the most common being a URL pointing to a resource
that no longer exists or that has moved. As the resource
represented by the URL and the URL itself are handled by the Web
server, it is up to the owner of the web server to carefully manage
that resource and its associated URL.
• URL Anatomy
• https://www.ethiotel.et:80/telebirr?q=createAccount
OVERVIEW OF THE INTERNET AND WWW
•1.8 Internet Threats
• Denial-of-Service (DoS) Attacks: A DoS attack is an attempt to make a computer or network resource
unavailable to users. They can be carried out using various methods, including flooding the target
with requests or traffic or exploiting vulnerabilities in the network or system.
• Distributed Denial-of-Service (DDoS) Attacks: A DDoS attack is similar to a DoS attack, but multiple
computers or devices, known as zombies, are used to carry out the attack. A large number of
requests or traffic from the zombies can overwhelm the target, thus denying access to legitimate
users.
• Malware: Malware or malicious software refers to any type of software that is designed to damage
or disrupt a computer system. Viruses, worms, and Trojans are some examples of malware.
• Phishing: Phishing is a type of social engineering attack that attempts to trick users into revealing
sensitive information, like passwords or credit card numbers. Such attacks are often carried out by
email and may include links to fake websites that look identical to the real website
OVERVIEW OF THE INTERNET AND WWW
• SQL Injection: SQL injection attacks exploit vulnerabilities in web
applications that use Structured Query Language (SQL) to
communicate with databases. By injecting malicious SQL code into
these vulnerable applications, attackers can gain access to
sensitive data or even take control of the entire database.
• MITM: are a common type of cybersecurity attack that allows
attackers to eavesdrop on the communication between two
targets. The attack takes place in between two legitimately
communicating hosts, allowing the attacker to “listen” to a
conversation they should normally not be able to listen to, hence
the name “man-in-the-middle.”
END

You might also like