UNIT-2
UNIT-2
History:
The WWW was initiated by CERN (European library for Nuclear Research) in
1989.
It is a project created, by Timothy Berner Lee in 1989, for researchers to work
together effectively at CERN. is an organization, named the World Wide Web
Consortium (W3C), which was developed for further development of the web.
This organization is directed by Tim Berner’s Lee, aka the father of the web.
WWW Operation
WWW works on client- server approach. Following steps explains how the web
works:
1. User enters the URL (say, http://www.gmail.com) of the web page in the
address bar of web browser.
2. Then browser requests the Domain Name Server for the IP address
corresponding to www.gmail.com.
3. After receiving IP address, browser sends the request for web page to the
web server using HTTP protocol which specifies the way the browser and
web server communicates.
4. Then web server receives request using HTTP protocol and checks its
search for the requested web page. If found it returns it back to the web
browser and close the HTTP connection.
5. Now the web browser receives the web page, It interprets it and display
the contents of web page in web browser’s window.
The WWW is mainly a distributed client/server service where a client using the
browser can access the service using a server. The Service that is provided is
distributed over many different locations commonly known as sites/websites.
Each website holds one or more documents that are generally referred to as web
pages.
Where each web page contains a link to other pages on the same site or at other
sites. These pages can be retrieved and viewed by using browsers.
In the above case, the client sends some information that belongs to site A. It
generally sends a request through its browser (It is a program that is used to fetch
the documents on the web) and also the request generally contains other
information like the address of the site, web page(URL).
The server at site A finds the document then sends it to the client. After that
when the user or say the client finds the reference to another document that
includes the web page at site B.
The reference generally contains the URL of site B. And the client is interested to
take a look at this document too. Then after the client sends the request to the
new site and then the new page is retrieved.
Components
1.Client/Browser
The Client/Web browser is basically a program that is used to communicate with
the webserver on the Internet.
Each browser mainly comprises of three components and these are:
1. Controller
2. Interpreter
3. Client Protocols
The Controller mainly receives the input from the input device, after that it uses
the client programs in order to access the documents.
After accessing the document, the controller makes use of an interpreter in order
to display the document on the screen.
An interpreter can be Java, HTML, javascript mainly depending upon the type of
the document.
The Client protocol can be FTP, HTTP, TELNET.
2.Server
The Computer that is mainly available for the network resources and in order to
provide services to the other computer upon request is generally known as
the server.
The Web pages are mainly stored on the server.
Whenever the request of the client arrives then the corresponding document is
sent to the client.
The connection between the client and the server is TCP.
It can become more efficient through multithreading or multiprocessing.
Because in this case, the server can answer more than one request at a time.
3.URL
4.HTML
HTML is an abbreviation of Hypertext Markup Language.
It is generally used for creating web pages.
It is mainly used to define the contents, structure, and organization of the web
page.
5.XML
XML is an abbreviation of Extensible Markup Language. It mainly helps in order
to define the common syntax in the semantic web.
Advantages of WWW
It mainly provides all the information for Free.
Provides rapid Interactive way of Communication.
It is accessible from anywhere.
It has become the Global source of media.
It mainly facilitates the exchange of a huge volume of data
Disadvantages of WWW
It is difficult to prioritize and filter some information.
There is no guarantee of finding what one person is looking for.
There occurs some danger in case of overload of Information.
There is no quality control over the available data.
There is no regulation.
TCP
TCP (Transmission Control Protocol) is one of the main protocols of the Internet
protocol suite. It lies between the Application and Network Layers which are used
in providing reliable delivery services.
It is a connection-oriented protocol for communications that helps in the
exchange of messages between different devices over a network. The Internet
Protocol (IP), which establishes the technique for sending data packets between
computers, works with TCP.
Working
To make sure that each message reaches its target location intact, the TCP model
breaks down the data into small bundles which is known as packets and
afterward reassembles the packets into the original message on the opposite
end. Sending the information in packets of information makes it simpler to
maintain efficiency as opposed to sending everything in one go.
After a particular message is broken down into packets, these packets may travel
along multiple routes.
For example, when a user requests a web page on the internet, somewhere in
the world, the server processes that request and sends back an HTML Page to
that user. The server makes use of a protocol called the HTTP Protocol. The HTTP
then requests the TCP layer to set the required connection and send the HTML
file.
Now, the TCP breaks the data into small packets and forwards it toward the
Internet Protocol (IP) layer. The packets are then sent to the destination through
different routes.
The TCP layer in the user’s system waits for the transmission to get finished and
acknowledges once all packets have been received.
Advantages
It is a reliable protocol.
It provides an error-checking mechanism as well as one for recovery.
It gives flow control.
It makes sure that the data reaches the proper destination in the exact order that
it was sent.
Open Protocol, not owned by any organization or individual.
It assigns an IP address to each computer on the network and a domain name to
each site thus making each device site to be distinguishable over the network.
Disadvantages
TCP is made for Wide Area Networks, thus its size can become an issue for small
networks with low resources.
TCP runs several layers so it can slow down the speed of the network.
It is not generic in nature. Meaning, it cannot represent any protocol stack other
than the TCP/IP suite. E.g., it cannot work with a Bluetooth connection.
201 – Introduction to Internet & HTML Page 7
Unit – 2 World Wide Web
IP
IP stands for internet protocol. Internet Protocols are a set of rules that governs
the communication and exchange of data over the internet. Both the sender and
receiver should follow the same protocols in order to communicate the data. Any
language has its own set of vocabulary and grammar which we need to know if
we want to communicate in that language.
Similarly, over the internet whenever we access a website or exchange some data
with another device then these processes are governed by a set of rules called
the internet protocols.
Need
It may be that the sender and receiver of data are parts of different networks,
located in different parts of the world having different data transfer rates. So, we
need protocols to manage the flow control of data, access control of the link
being shared in the communication channel.
Suppose there is a sender X who has a data transmission rate of 10 Mbps. And,
there is a receiver Y who has a data receiving rate of 5Mbps. Since the rate of
receiving the data is slow so some data will be lost during transmission.
In order to avoid this, the receiver Y needs to inform sender X about the speed
mismatch so that the sender X can adjust its transmission rate.
Similarly, the access control decides the node which will access the link shared in
the communication channel at a particular instant of time. If not the transmitted
data will collide if many computers send data simultaneously through the same
link resulting in the corruption or loss of data.
UDP
The User Datagram Protocol (UDP) is simplest Transport Layer communication
protocol available of the TCP/IP protocol suite.
It involves minimum amount of communication mechanism. UDP is said to be an
unreliable transport protocol but it uses IP services which provides best effort
delivery mechanism.
In UDP, the receiver does not generate an acknowledgement of packet received
and in turn, the sender does not wait for any acknowledgement of packet sent.
This shortcoming makes this protocol unreliable as well as easier on processing.
Need
A question may arise, why do we need an unreliable protocol to transport the
data? We deploy UDP where the acknowledgement packets share significant
amount of bandwidth along with the actual data.
For example, in case of video streaming, thousands of packets are forwarded
towards its users. Acknowledging all the packets is troublesome and may contain
huge amount of bandwidth wastage.
The best delivery mechanism of underlying IP protocol ensures best efforts to
deliver its packets, but even if some packets in video streaming get lost, the
impact is not big and can be ignored easily. Loss of few packets in video and voice
traffic sometimes goes unnoticed.
FTP
FTP stands for File transfer protocol.
FTP is a standard internet protocol provided by TCP/IP used for transmitting the
files from one host to another.
It is mainly used for transferring the web page files from their creator to the
computer that acts as a server for other computers on the internet.
201 – Introduction to Internet & HTML Page 9
Unit – 2 World Wide Web
It is also used for downloading the files to computer from other servers.
Need
Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems.
For example, two systems may have different file conventions. Two systems may
have different ways to represent text and data. Two systems may have different
directory structures.
FTP protocol overcomes these problems by establishing two connections
between hosts. One connection is used for data transfer, and another connection
is used for the control connection.
HTTP
ISP stands for Internet Service Provider which is a term used to refer to a
company that provides internet access to people who pay the company or
subscribe to the company for the same.
For their services, the customers have to pay the internet service provider a
nominal fee which varies according to the amount of data they actually use or
the data plan which they purchase.
An Internet Service Provider is also known as an Internet Access Provider or an
online service provider. An Internet Service Provider is a must if one wants to
connect to the internet.
Dial up connection
Dial-up refers to an Internet connection that is established using a modem. The
modem connects the computer to standard phone lines, which serve as the data
transfer medium.
When a user initiates a dial-up connection, the modem dials a phone number of
an Internet Service Provider (ISP) that is designated to receive dial-up calls.
The ISP then establishes the connection, which usually takes about ten seconds
and is accompanied by several beeping and a buzzing sound.
After the dial-up connection has been established, it is active until the user
disconnects from the ISP. Typically, this is done by selecting the “Disconnect”
option using the ISP’s software or a modem utility program.
If a dial-up connection is interrupted by an incoming phone call or someone
picking up a phone in the house, the service may also be disconnected.
Dial-up connections are very slow (speed between 28 K and 56K) and are the
oldest connections. The only real benefit of a dial up connection is that it is very
economical for low amount of usage.
Wireless
Wireless, or Wi-Fi, does not use telephone lines or cables to connect to the
internet. Instead, it uses radio frequency.
Wireless is an always on connection and it can be accessed from just about
anywhere.
Speeds vary, and the range is between 5 Mbps and 20 Mbps.
It is more expensive than DSL and Cable.
Cellular
Cellular technology provides wireless Internet access through mobile phones.
The speeds of this network will depends upon the service provider, but the most
common are 3G and 4G speeds.
Fiber optic
Fiber optic broadband uses fiber optic cables to send data. This technology
means the internet service is very, very fast, reliable and secure.
Fiber optic connection offers speed up to 10Gbps with symmetrical upload and
download bandwidth.
List of ISP
Reliance Jio
Vodafone Idea
Airtel
BSNL
Hathway
Search Engine
A search engine is a software that is accessed on the internet to assist a user to
search its query on the world wide web. The search engine is helpful as it carries
out a systematic search on the web and displays the results that best match the
user’s query
It refers to a huge database of internet resources such as web pages,
newsgroups, programs, images etc. It helps to locate information on World Wide
Web.
User can search for any information by passing query in form of keywords or
phrase. It then searches for relevant information in its database and return to
the user.
Generally there are three basic components of a search engine as listed below:
o Web Crawler
o Database
o Search Interfaces
Web crawler
It is also known as spider or bots. It is a software component that traverses the
web to gather information.
Database
All the information on the web is stored in database. It consists of huge web
resources.
Search Interfaces
This component is an interface between user and the database. It helps the user
to search through the database.
Working
Following are the steps that are performed by the search engine:
The search engine looks for the keyword in the index for predefined database
instead of going directly to the web to search for the keyword.
It then uses software to search for the information in the database. This software
component is known as web crawler.
Once web crawler finds the pages, the search engine then shows the relevant
web pages as a result. These retrieved web pages generally include title of page,
size of text portion, first several sentences etc.
Example : google, bing, ask,AtlaVista, AOL.search, Alexa, yahoo etc
Web Server
Web server is a dedicated computer where the web content is stored. Basically
web server is used to host the web sites but there exists other web servers also
such as gaming, storage, FTP, email etc.
When client sends request for a web page, the web server search for the
requested page if requested page is found then it will send it to client with an
HTTP response.
If the requested web page is not found, web server will the send an HTTP
response:Error 404 Not found.
If client has requested for some other resources then the web server will contact
to the application server and data store to construct the HTTP response.
Working:
1. First, any web user is required to type the URL of the web page in the address
bar of your web browser.
2. With the help of the URL, your web browser will fetch the IP address of your
domain name either by converting the URL via DNS (Domain Name System)
or by looking for the IP in cache memory. The IP address will direct your
browser to the web server.
3. After making the connection, the web browser will request for the web page
from the web server with the help of an HTTP request.
4. As soon as the web server receives this request, it immediately responds by
sending back the requested page or file to the web browser HTTP.
201 – Introduction to Internet & HTML Page 15
Unit – 2 World Wide Web
5. If the web page requested by the browser does not exist or if there occurs
some error in the process, the web server will return an error message.
6. If there occurs no error, the browser will successfully display the webpage.
Example : IIS – Microsoft Internet Information Services, Apache, wamp, xamp etc.
News Group
There exist a number of newsgroups distributed all around the world. These are
identified using a hierarchical naming system in which each newsgroup is
assigned a unique name that consists of alphabetic strings separated by periods.
The leftmost portion of the name represents the top-level category of the
newsgroup followed by subtopic. The subtopic can further be subdivided and
subdivided even further (if needed).
For example, the newsgroup comp.lang.C++ contains discussion
on C++ language. The leftmost part comp classifies the newsgroup as one that
contains discussion of computer related topics. The second part identifies one of
the subtopic lang that related to computer languages. The third part identifirs
one of the computer languages, in this case C++.
E-mail
Email stands for Electronic Mail. It is a method to sends messages from one
computer to another computer through the internet. It is mostly used in
business, education, technical communication, document interactions
It is the information sent electronically between two of more people over a
network. It involves a sender and receiver/s.
E-mail Address : Each user of email is assigned a unique name for his email
account. This name is known as E-mail address. Different users can send and
receive messages according to the e-mail address.
E-mail is generally of the form username@domainname. For example,
[email protected] is an e-mail address where abc123 is username and
gmail.com is domain name.
The username and the domain name are separated by @ (at) symbol. E-mail
addresses are not case sensitive. Spaces are not allowed in e-mail address.
E-mail Message Components
E-mail message include different components: E-mail Header, Greeting, Text, and
Signature. These components are described in the following diagram.
Email Header
The header part comprises of following fields.
o From
o Date
o To
o Subject
o CC
o BCC
From : The From field indicates the sender’s address i.e. who sent the e-mail.
Date : The Date field indicates the date when the e-mail was sent.
To : The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject : The Subject field indicates the purpose of e-mail. It should be precise
and to the point.
CC : CC stands for Carbon copy. It includes those recipient addresses whom we
want to keep informed but not exactly the intended recipient.
BCC : BCC stands for Blind Carbon Copy. It is used when we do not want one or
more of the recipients to know that someone else was copied on the message.
Email Body :
Greeting : Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Text : It represents the actual content of the message.
Signature : This is the final part of an e-mail message. It includes Name of Sender,
Address, and Contact Number.
Working :
Email working follows the client server approach. In this client is the mailer i.e.
the mail application or mail program and server is a device that manages emails.
Following example will take you through the basic steps involved in sending and
receiving emails and will give you a better understanding of working of email
system:
o Suppose person A wants to send an email message to person B. Person A
composes the messages using a mailer program i.e. mail client and then
select Send option.
o The message is sent to person B’s mail server through Simple Mail Transfer
Protocol.
o The mail server stores that email message on disk.
o Now, suppose person B is running a POP client and knows how to
communicate with B’s mail server.
o It will periodically check POP server that if any new email has arrived for
B.As in this case, person B has sent an email for person B, so email is
forwarded over the network to B’s PC. This is message is now stored on
person B’s PC.
The following diagram gives pictorial representation of the steps discussed
above:
E-Learning
E-learning is a type of learning conducted digitally via electronic media, typically
involving the internet.
It can be accessed via most electronic devices including a computer, laptop,
tablet or smartphone, making it a versatile and easy way for students to learn
wherever they are. E-learning resources come in a variety of forms – from
software programmes and digital courses to interactive online platform and
apps.
Benefits
o It is cost effective and saves time.
o It is available 24/7 anywhere.
o It is easy to track progress of the course.
o It offers user-friendly and interactive interface.
Following are some common types of e-learning methods
Online certification
It is also possible to do online certification on specialized courses which add value
to your qualification. Many companies offer online certification on a number of
technologies.
Online Seminar
Online seminar is the one which is conducted over the internet. It is a live seminar
and allows the attendees to ask questions via Q&A panel onscreen.
Webinar
Webinar is a web based seminar or workshop in which presentation is delivered
over the web using conferencing software. The audio part of webinar is delivered
through teleconferencing.
Conferencing
Online conferencing is also a kind of online seminar in which two or more people
are involved. It is also performed over the internet. It allows the business persons
to do meeting online.
E-Banking
E-banking is a product designed for the purposes of online banking that enables
you to have easy and safe access to your bank account. E-banking is a safe, fast,
easy and efficient electronic service that enables you access to bank account and
to carry out online banking services, 24 hours a day, and 7 days a week.
E-banking is the result of the internet and e-commerce. E-Banking is a service
provided by the banks, in which a customer is allowed to conduct transactions
using the internet. It is an electronic payment system that allows
users(customers) of any financial institutions(banks, insurance companies,
brokerage firms, etc.) to perform financial transactions using the internet.
Usually, this service is offered by banks which gives their customers the facilities
of online banking through which they can have access to their accounts within
a few seconds and click.
Online Banking includes the facilities such as Account Statements, Fund
transfers, Account Opening, Financial Product Information, etc.
There is no need for any human operator to respond to the customers. The
banks have a centralized database and everything is automated. It lowers the
banking cost and strengthens the banking relationship by adding value to the
service.
It provides banking services via the internet and it is end-to-end encrypted,
which means it is completely safe and secure. It also promotes
paperless/cashless financial transactions.
E-Governance
Electronic Governance or E-Governance is the application of Information and
Communication Technology (ICT) for providing government services,
interchange of statistics, communication proceedings, and integration of
various independent systems and services. Through the means of e-
governance, government services are made available to citizens in a suitable,
systematic, and transparent mode
Types of E-Governance:
Government-to-Citizen (G2C): The Government-to-citizen mentions the
government services that are acquired by the familiar people. Most of the
government services come under G2C. Similarly, the primary aim of
Government-to-citizen is to supply facilities to the citizens. It also helps ordinary
people to minimize the time and cost to carry out a transaction. A citizen can
retrieve the facilities anytime from anywhere.
Government-to-business (G2B): Government-to-business is the interchange of
services between Government and Business firms. It is productive for both
government and business firms. It also contains many services interchanged
between business sectors and government. Similarly, Government-to-business
provides timely business information. A business organization can have easy
and easy online access to government agencies. It upgrades the efficiency and
quality of communication and transparency of government projects.
Social Networking
Social Networking refers to grouping of individuals and organizations together
via some medium, in order to share thoughts, interests, and activities.
There are several web based social network services are available such as
facebook, twitter, linkedin, Google+ etc. which offer easy to use and interactive
interface to connect with people with in the country an overseas as well. There
are also several mobile based social networking services in for of apps such as
Whatsapp, hike, Line etc.
Following are the areas where social networking has become most popular:
Online Marketing
Website like facebook allows us to create a page for specific product,
community or firm and promiting over the web.
Online Jobs
Website like linkedin allows us to create connection with professionals and
helps to find the suitable job based on one’s specific skills set.
Online News
On social networking sites, people also post daily news which helps us to keep
us updated.
Chatting
Social networking allows us to keep in contact with friends and family. We can
communicate with them via messages.
Share Picture, Audio and video
One can share picture, audio and video using social networking sites.
Instant Messaging
Instant messaging (IM), form of text-based communication in which two
persons participate in a single conversation over their computers or mobile
devices within an Internet-based chatroom.
Unlike chat with multiple people talking at once, IM requires an IM client
(program) and only lets you directly talk with someone online and in
your buddy list. With these programs, you are notified when a friend is online
and available to chat.
Example: Google hangouts, MSN Web Messanger, Yahoo! Messanger, google
talk,facebook messanger, snapchat, wtsappchat etc.
IRC
Internet Relay Chat (IRC) is an Internet application that was developed by Jakko
Oikarinen in Finland.
Chat is the most convenient immediate way to communicate with others via
Internet. There are a number of topics called “channels” through which you can
chat with many people all over the world. After joining channel, you can see
what other people on this channel type on their keyboards.
In that situation, everyone on this channel can see whatever you type on your
keyboard. You can also hold individual conversations with someone. Channels
get live on different servers around the world. Some servers have only a few
channels, while others have many of them.
Model used for IRC :
IRC follows client-server model. It means that both client and server software
are required in order to use it. Many IT (Information Technology) clients are
available for different kinds of computers, so whether you have a PC,
Macintosh, or UNIX work-section, you will be able to use IRC.
Working on IRC :
When you want to chat, first you have to make a connection to Internet and
then start your client software. After that, you need to log on to IRC server
which is located on Internet. There are many IRC servers are located all over the
world. Those IRC servers are connected together in network so that they can
communicate with each other.
Video Conference
Basically, video conference enables the user to connect each other from different
locations by both video and audio transmission at the same time, using
telecommunication technology.
We can say that it is a type of online meeting where people meet live on the
audio-visual call. Video conference is also called video teleconference. It is more
effective and efficient than the audio conference calls, as we can see the facial
expression of the people which help us to connect them more easily rather than
voice calls where only we can hear a voice. But, there are some problems, like
setting video conference needs devices and all.
Technology requirement of video conference:
o Computer with access to internet connection
o Browser
o Speakers
o Microphone(for both audio and video conference)
o Web camera (for only video conference)