Web hosting
Web hosting
Learning Objectives
1. Understand the basics of web hosting and its role in making websites accessible online.
2. Learn the process of registering and managing domains.
3. Understand the purpose and use of FTP (File Transfer Protocol) for managing website
files.
Definition: Web hosting is a service that allows individuals and organizations to make
their websites accessible via the internet. Hosting providers allocate space on their
servers to store website files.
How it Works:
o A website is composed of files (HTML, CSS, images, videos).
o These files need to be stored on a web server, which is a powerful computer
connected to the internet 24/7.
o When users type the website's URL in a browser, the hosting server delivers the
requested files to the user's device.
Shared Hosting:
o Multiple websites share the same server and resources.
o Pros: Affordable, easy to manage.
o Cons: Limited resources, slower performance during high traffic.
Virtual Private Server (VPS) Hosting:
o A single server is divided into virtual servers, offering more resources and
control.
o Pros: Better performance, more control.
o Cons: More expensive than shared hosting.
Dedicated Hosting:
o A whole server is dedicated to one website.
o Pros: Maximum performance and control.
o Cons: High cost, requires technical expertise.
Cloud Hosting:
o Websites are hosted on a network of servers in the cloud.
o Pros: Scalable, reliable, handles high traffic well.
o Cons: Costs can vary.
Managed Hosting:
o Hosting providers handle technical tasks like server maintenance and updates.
o Pros: Less management for the user.
o Cons: Costlier than unmanaged options.
Bandwidth: Determines the amount of data transferred between the website and its
visitors.
Storage: Amount of space available for website files.
Uptime: Percentage of time the server is operational (aim for 99.9% or higher).
Control Panel: Interface (e.g., cPanel, Plesk) for managing hosting settings and website
files.
Security: Features like firewalls, SSL certificates, and backups.
File Transfer Protocol (FTP): A standard protocol used to transfer files between a local
computer and a web server.
Purpose:
o Upload website files from a local machine to the hosting server.
o Download files from the server for editing or backup.
o Manage files directly on the server.
1. FTP Client:
o A software application (e.g., FileZilla, WinSCP) used to connect to the server.
o Requires the following credentials:
Host: Server address (e.g., ftp.example.com).
Username and Password: Provided by the hosting provider.
Port: Default FTP port is 21 (or 22 for secure connections like SFTP).
2. Secure FTP (SFTP):
o Secure File Transfer Protocol (SFTP) encrypts data during transfer, enhancing
security.
Uploading Files:
o Drag and drop files from the local computer to the server directory.
Downloading Files:
o Retrieve server files to the local computer for editing.
File Management:
o Rename, delete, or move files on the server.
3.4 Example: Uploading Files Using FileZilla
4. Take-Home Assignment
1. Explain the difference between shared hosting and VPS hosting. What are the advantages
and disadvantages of each? (20 marks)
2. Describe the process of registering a domain name and linking it to a web hosting
provider. Include an explanation of DNS settings. (20 marks)
3. What is FTP? How does it differ from SFTP? Provide a step-by-step guide for uploading
files using FTP. (20 marks)
4. Why is domain privacy important? How can it be enabled? (20 marks)
ANSWERS
Shared Hosting:
Definition: Multiple websites share the same server and its resources (CPU, RAM,
storage).
Advantages:
o Cost-effective, making it suitable for beginners or small websites.
o Simple setup and management, often handled by the hosting provider.
Disadvantages:
o Limited resources; performance may degrade if another site on the server
experiences high traffic.
o Limited control over server configuration.
o Security risks due to shared environment.
VPS Hosting:
Definition: A single server is divided into multiple virtual servers, each with dedicated
resources and functionality akin to a standalone server.
Advantages:
o Dedicated resources ensure better performance and reliability.
o Greater control over server settings, allowing customizations.
o Better security compared to shared hosting.
Disadvantages:
o Higher cost than shared hosting.
o Requires more technical knowledge for management and maintenance.
DNS (Domain Name System) translates domain names into IP addresses, directing
traffic to the correct server.
Key DNS records include:
o A Record: Points a domain to an IP address.
o CNAME Record: Maps subdomains to another domain.
o MX Record: Specifies mail servers for email routing.
What is FTP?
Definition: File Transfer Protocol (FTP) is used to transfer files between a client and a
server.
Key Features:
o Transfers files over a network.
o Does not encrypt data, making it less secure.
What is SFTP?
Definition: Secure File Transfer Protocol (SFTP) operates over SSH (Secure Shell),
encrypting the data during transfer.
Differences:
o SFTP is secure, while FTP lacks encryption.
o SFTP uses one port (SSH port), whereas FTP can require multiple ports.
When registering a domain, the registrant's contact details (name, email, phone number)
are published in the WHOIS database.
Risks of not enabling privacy:
o Increased spam and unsolicited communications.
o Risk of identity theft or targeted cyberattacks.
o Reduced personal privacy.
1. During domain registration, opt for a "domain privacy" or "WHOIS privacy" add-on.
2. If already registered, log in to the registrar's dashboard and purchase the privacy
protection service.
3. The registrar will mask personal details in the WHOIS database with generic information.
5. Exam Objectives
Key Topics:
1. On-Page SEO
2. Off-Page SEO
3. Technical SEO
Ensures that your website meets technical requirements for search engines.
Examples:
o Site Speed: Fast-loading websites rank better.
o Mobile-Friendliness: Ensure your site is responsive and works well on mobile
devices.
o Secure Website: Use HTTPS for a secure browsing experience.
o XML Sitemap: Help search engines crawl your website efficiently.
Why is SEO Important?
1. Increased Visibility: Higher rankings mean more people will find your site.
2. Improved User Experience: SEO involves optimizing navigation and usability.
3. Cost-Effective: Organic traffic is free compared to paid advertising.
4. Builds Credibility: Ranking high in search results improves trust with users.
5. Drives Targeted Traffic: SEO attracts users actively searching for your products or
services.
Conclusion
Understanding web hosting, domain registration, FTP and SEO is essential for launching and
managing a website. Web hosting provides the infrastructure to store and deliver your website,
domain names make your site accessible, and FTP enables seamless file management. Mastering
these concepts ensures you can effectively manage an online presence.
Further Reading
Cost Efficiency: Reduces the need for physical hardware and maintenance.
Flexibility: Allows businesses to adapt quickly to changes in demand.
Collaboration: Enables multiple users to work on the same resources in real time.
Security: Leading cloud providers invest heavily in robust security measures.
Cloud computing services are categorized into three primary models, each addressing different
needs.
Definition: Provides virtualized computing resources over the internet, such as servers,
storage, and networking.
Examples: Amazon EC2 (Elastic Compute Cloud), Google Compute Engine, Microsoft
Azure Virtual Machines.
Use Cases:
o Hosting websites and applications.
o High-performance computing.
o Data storage and backup.
Benefits:
o High scalability.
o No need to purchase physical servers.
o Users retain control over the operating system and applications.
Limitations:
o Requires technical expertise to configure and manage.
Definition: Provides software applications over the internet, accessible via a web browser
or app, without the need to install or maintain the software locally.
Examples: Google Workspace (Docs, Drive, Gmail), Salesforce, Microsoft Office 365.
Use Cases:
o Productivity tools.
o Customer relationship management (CRM).
o Enterprise resource planning (ERP).
Benefits:
o Accessible from anywhere.
o No software installation or updates required.
o Predictable subscription pricing.
Limitations:
o Limited control over application features.
o Dependency on internet connectivity.
3. Popular Cloud Service Providers
Overview: AWS is the largest cloud provider, offering a comprehensive range of cloud
services.
Key Services:
o Compute: Amazon EC2 (virtual servers).
o Storage: Amazon S3 (object storage), Amazon Glacier (archival storage).
o Database: Amazon RDS (relational database), DynamoDB (NoSQL database).
o AI & Machine Learning: Amazon SageMaker.
o Content Delivery: Amazon CloudFront.
Advantages:
o Wide range of services and tools.
o Global data centers.
o Flexible pricing options.
Use Cases:
o Hosting scalable web applications.
o Data analytics and processing.
6. Take-Home Assignment
1. Explain the differences between IaaS, PaaS, and SaaS. Provide examples of services for
each.
2. Compare and contrast AWS and Azure. What are their strengths and weaknesses in cloud
computing?
3. Describe how cloud computing supports scalability and cost-efficiency. Provide a real-
world use case to support your answer.
4. How can organizations ensure the security of their data on the cloud? Discuss at least
three strategies.
7. Exam Objectives
1. The definitions, features, and use cases of IaaS, PaaS, and SaaS.
2. Popular cloud providers (AWS, Azure) and their services.
3. Advantages and challenges of adopting cloud computing.
Conclusion
Cloud computing has revolutionized the way businesses operate by providing scalable, cost-
effective, and flexible IT solutions. Understanding the different service models (IaaS, PaaS,
SaaS) and the offerings of leading providers like AWS and Azure equips you to leverage the
cloud effectively in your professional and academic pursuits.
Further Reading
Learning Objectives
By the end of this lecture, students will:
1. Understand the importance of internet security and privacy in safeguarding online data.
2. Learn about encryption and SSL certificates and their roles in secure communication.
3. Explore common security threats such as phishing, malware, and more, and how to
mitigate them.
3. Security Threats
3.1 Common Internet Security Threats
1. Phishing:
o Fraudulent attempts to obtain sensitive information (e.g., passwords, credit card
numbers) by impersonating a trusted entity.
o Examples: Fake emails, websites, or messages designed to trick users.
o Prevention:
Verify the sender's email address.
Avoid clicking on suspicious links.
Use anti-phishing tools in browsers.
2. Malware:
o Malicious software designed to harm or exploit devices, networks, or data.
o Types:
Viruses: Attach to files and spread when executed.
Worms: Replicate themselves across networks.
Trojan Horses: Disguise themselves as legitimate software.
Ransomware: Encrypts files and demands payment for decryption.
o Prevention:
Install and update antivirus software.
Avoid downloading files from untrusted sources.
Regularly back up data.
3. Man-in-the-Middle (MITM) Attacks:
o Attackers intercept and alter communications between two parties.
o Prevention:
Use HTTPS websites.
Avoid public Wi-Fi or use VPNs.
4. SQL Injection:
o Attackers exploit vulnerabilities in web applications to execute malicious SQL
queries.
o Prevention:
Sanitize user inputs.
Use parameterized queries.
5. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks:
o Overload a server with requests, making it unavailable to legitimate users.
o Prevention:
Use DDoS protection services.
Monitor traffic for unusual patterns.
6. Spyware:
o Software that secretly collects user data and sends it to third parties.
o Prevention:
Use anti-spyware tools.
Avoid installing unknown software.
3.2 Importance of User Awareness
Many attacks exploit human error (e.g., clicking on malicious links).
Educating users about safe online practices significantly reduces risks.
5. Take-Home Assignment
Instructions: Answer the following questions. Each question is worth 20 marks.
1. Explain the role of encryption in internet security. Differentiate between symmetric
and asymmetric encryption.
2. What is an SSL certificate? How does it ensure secure communication?
3. Identify and explain three common security threats and suggest mitigation
strategies for each.
4. Discuss the importance of internet privacy and the steps users can take to safeguard
their personal information online.
6. Exam Objectives
The exam will assess:
1. The purpose and types of encryption.
2. Understanding of SSL/TLS certificates and their role in secure communication.
3. Awareness of security threats and appropriate mitigation strategies.
4. Importance of user practices in maintaining internet privacy.
Conclusion
Internet security and privacy are critical components of our digital lives. Encryption and SSL
certificates ensure secure communication, while being aware of common threats like phishing
and malware helps protect data and systems. Adopting best practices such as using strong
passwords and two-factor authentication ensures a safer online experience.
Further Reading
1. "Cryptography and Network Security: Principles and Practice" by William
Stallings.
2. OWASP Top 10 Security Threats.
3. SSL/TLS Explained by DigiCert.
Lecture Notes: Emerging Internet Technologies
Learning Objectives
By the end of this lecture, students will:
1. Understand the Internet of Things (IoT) and its applications.
2. Explore the integration of blockchain technology with the web.
3. Learn about the impact and use of Artificial Intelligence (AI) on the internet.
4. Take-Home Assignment
Instructions: Answer the following questions. Each question is worth 20 marks.
1. Explain the concept of IoT and describe three real-world applications.
The Internet of Things (IoT) refers to a network of physical devices—such as sensors,
vehicles, appliances, and other objects—embedded with software, sensors, and
connectivity that allow them to collect, exchange, and process data over the internet.
These devices can interact with each other and be controlled remotely, enabling
automation and improving efficiency in various industries and everyday life.
In simpler terms, IoT connects "things" (physical objects) to the internet, allowing them
to "talk" to each other and share data to perform tasks without human intervention.
Key Characteristics of IoT:
1. Connectivity: Devices are connected to the internet or each other, enabling
communication and data transfer.
2. Sensors and Actuators: IoT devices collect data from their environment (e.g.,
temperature, motion, location) through sensors and can take actions based on that data
using actuators.
3. Automation: IoT allows for automation of processes and tasks based on the data
gathered, often without the need for human input.
4. Data Processing and Analytics: The data gathered by IoT devices is processed and
analyzed, often in real time, to derive insights and improve decision-making.
3. Smart Cities
What it is: Smart city technologies leverage IoT devices to improve urban services,
enhance public safety, reduce energy consumption, and streamline traffic management.
Example: In a smart city, traffic lights might be connected to sensors that monitor traffic
flow. The lights can automatically adjust based on real-time traffic conditions, reducing
congestion and improving traffic flow. Additionally, smart streetlights can adjust their
brightness depending on the time of day or when motion is detected, conserving energy.
Other IoT systems in smart cities can include waste management systems that optimize
garbage collection routes based on real-time sensor data.
Benefits:
Improved traffic flow and reduced congestion.
Energy savings through efficient lighting and waste management.
Better resource management (e.g., water, electricity)
2. How does blockchain enable a decentralized web (Web 3.0)? Discuss its advantages
and challenges.
Blockchain and the Decentralized Web (Web 3.0)
Blockchain plays a key role in enabling Web 3.0, which is often referred to as the
decentralized web. Web 3.0 envisions a more user-centric internet where users have
control over their data, digital identities, and interactions without relying on centralized
authorities like big tech companies. Blockchain technology underpins many of the core
principles of Web 3.0 by offering decentralized, secure, and transparent systems for data
and transactions.
How Blockchain Enables Web 3.0
1. Decentralization of Data: In traditional web models (Web 2.0), large corporations
control much of the data, and users have little control over how their data is used. In Web
3.0, blockchain allows for decentralized storage, meaning data is not stored on
centralized servers but distributed across multiple nodes (computers) in a network. This
ensures that no single entity controls all the data, and users have more control over their
information.
2. Ownership and Control of Data: Blockchain allows individuals to own and control
their own data. With cryptographic keys, users can control access to their data and choose
who can view or use it, whether it's for social media, financial transactions, or other
online activities. This can help reduce the dependency on centralized platforms and
provide more privacy and security.
3. Smart Contracts: Web 3.0 relies on smart contracts, which are self-executing contracts
where the terms of the agreement are directly written into code. These contracts run on
blockchain networks (e.g., Ethereum) and automate transactions without the need for
intermediaries, allowing for more efficient and trustless interactions.
4. Tokenization: Blockchain supports the creation of digital assets or tokens, which can
represent ownership, rights, or other forms of value. These tokens can be used for
decentralized applications (dApps), games, finance (DeFi), and even governance.
Tokenization empowers users to participate in Web 3.0 by creating decentralized
economies and systems where users can earn, invest, or trade value directly.
5. Decentralized Identity (DID): Traditional online identity systems are controlled by
organizations like Facebook or Google. Blockchain-based identity solutions enable
decentralized identities, where users have sole control over their identity information,
allowing for more secure and private interactions across the web.
6. Decentralized Autonomous Organizations (DAOs): DAOs are organizations that are
governed by smart contracts on a blockchain. Members of a DAO typically have voting
rights based on their token holdings, and decisions are made collectively by the
community. DAOs promote decentralized governance, removing traditional centralized
management and giving power to users in a transparent manner.
3. Security Implications of AI
AI technologies (including machine learning, deep learning, and neural networks) are
increasingly being used in diverse fields such as healthcare, finance, and cybersecurity.
While AI offers many benefits, it introduces unique security challenges.
Key Security Concerns:
Adversarial Attacks: AI models, especially machine learning algorithms, can be
vulnerable to adversarial attacks, where small, carefully crafted changes to the input
data can mislead AI systems. For instance, modifying an image slightly can cause an AI
system to misclassify it. This can be exploited in areas like facial recognition,
autonomous vehicles, and cybersecurity.
Data Privacy and Bias: AI models often require vast amounts of data, much of which
may contain personal or sensitive information. Without proper data privacy measures,
this data could be exposed, leading to violations of user privacy. Moreover, AI models
trained on biased data can perpetuate or amplify existing biases, leading to unfair or
discriminatory outcomes.
Model Theft and Reverse Engineering: AI models can be stolen and reverse-
engineered for malicious purposes. For example, an attacker could steal a proprietary AI
model, modify it, and deploy it for malicious activities (e.g., in fraud detection systems or
recommendation algorithms).
Lack of Explainability: Many AI models, especially deep learning models, operate as
"black boxes," meaning their decision-making processes are not easily understood by
humans. This lack of transparency makes it difficult to detect security issues or identify
whether AI systems are being manipulated.
AI-Powered Cyber Attacks: AI can be used to automate cyberattacks, such as phishing,
identity theft, or hacking. AI-powered malware could adapt to security defenses in real-
time, making it more difficult for traditional security systems to defend against such
threats.
Mitigation Strategies:
Implement techniques to make AI systems explainable (e.g., using interpretable models
and techniques like LIME or SHAP).
Use adversarial training to make AI models more robust against adversarial attacks.
Ensure data privacy through encryption, anonymization, and secure data handling
practices.
Regularly audit AI models to ensure fairness and reduce bias.
Incorporate human oversight and intervention to detect and mitigate AI-driven cyber
threats.
Conclusion
5. Exam Objectives
The exam will test your understanding of:
1. The architecture and applications of IoT.
2. The role of blockchain technology in creating a decentralized web.
3. The impact of AI on internet-based systems and services.
4. Challenges and future trends in emerging internet technologies.
Conclusion
Emerging internet technologies like IoT, blockchain, and AI are transforming how we interact
with the digital world. IoT connects devices for smarter automation, blockchain offers a
decentralized and secure web ecosystem, and AI powers intelligent services that enhance user
experiences. Understanding these technologies is essential for leveraging their potential while
addressing associated challenges.
Further Reading
1. "Blockchain Basics: A Non-Technical Introduction in 25 Steps" by Daniel Drescher.
2. "Artificial Intelligence: A Guide to Intelligent Systems" by Michael Negnevitsky.
3. IoT for Beginners by Microsoft.
ANSWERS OF EXAM TEST
1. The Architecture and Applications of IoT (Internet of Things)
Architecture of IoT:
The architecture of an IoT system typically consists of several layers that work together
to enable connectivity, data collection, processing, and decision-making. These layers
include:
1. Perception Layer (Sensors and Devices):
o This is the physical layer where IoT devices, sensors, and actuators collect data
from the environment. These devices can include temperature sensors, motion
detectors, cameras, wearables, smart meters, and more. The perception layer is
responsible for data acquisition.
2. Network Layer (Connectivity):
o The network layer ensures the transmission of data collected by IoT devices to
other devices or servers. It uses various communication protocols such as Wi-Fi,
Bluetooth, Zigbee, 5G, LoRaWAN, etc. This layer connects the devices and
transmits the data to the next layer for processing.
3. Edge Layer (Edge Computing):
o Edge computing refers to processing data closer to the source (i.e., at or near the
IoT device) rather than sending it to a centralized cloud server. This reduces
latency and bandwidth usage. Some devices may perform basic processing at the
edge before transmitting the data to the cloud for deeper analysis.
4. Data Processing Layer (Cloud/Server Layer):
o This layer is where the heavy lifting occurs in terms of storing, processing, and
analyzing the data. It involves cloud servers or data centers that manage large
volumes of data and run analytics or machine learning models to extract valuable
insights.
5. Application Layer:
o This layer represents the final stage, where the data is presented in a usable form.
It involves the development of IoT applications such as smart homes, healthcare
monitoring systems, smart cities, and industrial automation systems.
Applications of IoT:
1. Smart Homes:
o IoT devices like smart thermostats, lighting, and security cameras are used in
homes to enhance convenience, energy efficiency, and security. These devices
can be controlled remotely via apps or voice assistants like Amazon Alexa or
Google Assistant.
2. Healthcare and Wearables:
o IoT enables remote patient monitoring through wearable devices that track vital
signs like heart rate, blood pressure, and glucose levels. These devices can alert
medical professionals to potential health risks in real-time, improving patient
outcomes.
3. Industrial IoT (IIoT):
o In industries, IoT is used for predictive maintenance, asset tracking, and
automation. Sensors on manufacturing equipment can predict when maintenance
is needed, minimizing downtime and optimizing operations.
4. Smart Cities:
o IoT technology is used to monitor and manage urban systems, including traffic
lights, waste management, energy consumption, and water distribution. For
example, smart traffic lights adjust to traffic patterns in real-time to reduce
congestion.