0% found this document useful (0 votes)
2 views

UNIT 1_Internet and Web Programming_Internet and Web Programming.pptx

The document provides an overview of the Internet and World Wide Web, detailing their history, architecture, and communication methods. It explains key concepts such as TCP/IP protocols, the role of DNS, and the differences between intranet and extranet. Additionally, it discusses various communication tools available over the Internet, including instant messaging, VoIP, and social media platforms.

Uploaded by

adityapaul2022
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

UNIT 1_Internet and Web Programming_Internet and Web Programming.pptx

The document provides an overview of the Internet and World Wide Web, detailing their history, architecture, and communication methods. It explains key concepts such as TCP/IP protocols, the role of DNS, and the differences between intranet and extranet. Additionally, it discusses various communication tools available over the Internet, including instant messaging, VoIP, and social media platforms.

Uploaded by

adityapaul2022
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

Unit1- Internet and Web

By: Dr. Harshlata Vishwakarma


VIT Bhopal
• Introduction to Web System Internet
Overview- WWW - Web Protocols - Web
Browsers and Web Servers - Web System
Architecture – URL - Domain Name – Client
and Server-side Scripting.
History of Internet and World Wide Web
• In the late 1960s, one of the authors (HMD) was a graduate student at MIT. His research at MIT’s
Project MAC (now the Laboratory for Computer Science—the home of the World Wide Web
Consortium) was funded by ARPA—the Advanced Research Projects Agency of the Department
of Defense.
• The primary goals for ARPANET was to allow multiple users to send and receive information
simultaneously over the same communications paths (e.g., phone lines).
• The network operated with a technique called packet switching, in which digital data was sent in
small bundles called packets. The packets contained address, error-control and sequencing
information. The address information allowed packets to be routed to their destinations. The
sequencing information helped in reassembling the packets—
• which, because of complex routing mechanisms, could actually arrive out of order—into their
original order for presentation to the recipient. Packets from different senders were intermixed on
the same lines. This packet-switching technique greatly reduced transmission costs, as compared
with the cost of dedicated communications lines.
• The network was designed to operate without centralized control. If a portion of the network
failed, the remaining working portions would still route packets from senders to receivers over
alternative paths for reliability.
• The protocol for communicating over the ARPANET became known as TCP—the Transmission
Control Protocol. TCP ensured that messages were properly routed from sender to receiver and
that they arrived intact.
• As the Internet evolved, organizations worldwide were implementing their
own networks for both intraorganization (i.e., within the organization) and
interorganization (i.e., between organizations) communications.
• A wide variety of networking hardware and software appeared. One
challenge was to get these different networks to communicate.
• ARPA accomplished this with the development of IP—the Internet
Protocol, truly creating a “network of networks,” the current architecture
of the Internet. The combined set of protocols is now commonly called
TCP/IP.
• Initially Internet use was limited to universities and research instituiotns,
military, after some time for commercial purpose.
• The World Wide Web allows computer users to locate and view
multimedia-based documents on almost any subject over the Internet.
• Though the Internet was developed decades ago, the web is a relatively
recent creation.
• In 1989, Tim Berners-Lee of CERN (the European Organization for Nuclear
Research) began to develop a technology for
• sharing information via hyperlinked text documents. Berners-Lee called his
invention the HyperText Markup Language (HTML).
Internet
• Internet is defined as an Information super Highway, to access
information over the web. However, It can be defined in many
ways as follows:
• Internet is a world-wide global network system of interconnected
computer networks.
• Internet uses the standard Internet Protocol (TCP Transmission
Control Protocol/IP Internet Protocol). It uses optical fiber and
wireless techniques to establish the connection.
• Every computer in internet is identified by a unique IP address.
• IP Address is a unique set of numbers (such as 110.22.33.114)
which identifies a computer location.
• A special computer DNS (Domain Name Server) is used to give
name to the IP Address so that user can locate a computer by a
name.
• For example, a DNS server will resolve a
name http://www.amazon.com to a particular IP address to
uniquely identify the computer on which this website is hosted.
• Internet is accessible to every user all over the world and it is the
fastest mode of communication and data sharing.
• The internet is a global hub of computer networks — a network of
connections wherein users at any workstation may, with
authorization, receive data from every other system (and often
interact with users working on other computers).
• Internet infrastructure comprises optical fiber data transmission
cables or copper wires, as well as numerous additional networking
infrastructures, such as local Area Networks (LAN), wide area
networks (WAN), metropolitan area networks (MAN), etc.
Sometimes wireless services such as 4G and 5G or WiFi necessitate
similar physical cable installations for internet access.
• Internet Corporation for Assigned Names and Numbers (ICANN) in
the United States controls the internet and its associated
technologies, such as IP addresses.
• The concept of Internet was originated in 1969 and has undergone several
technological & Infrastructural changes as discussed below:

1. The origin of Internet devised from the concept of Advanced Research


Project Agency Network (ARPANET).

2. ARPANET was developed by United States Department of Defense.

3. Basic purpose of ARPANET was to provide communication among the


various bodies of government.

3. Initially, there were only four nodes, formally called Hosts.


4. In 1972, the ARPANET spread over the globe with 23 nodes located at
different countries and thus became known as Internet.
5. By the time, with invention of new technologies such as TCP/IP protocols,
DNS, WWW, browsers, scripting languages etc., Internet provided a
medium to publish and access information over the web.
• Advantages:
• Disadvantages:
How does the web work?
• When we discuss the internet in common parlance, we typically
refer to the web – although the two terms are not interchangeable.
• If the internet can be understood as a network of highways, then the
web will be the network of restaurants, toll booths, gas stations, etc.,
built along it.
• The main job of the internet is to access the web. However, it can
perform other tasks like supporting cloud storage on computers,
keeping the software as a service (SaaS) apps online, automatically
updating the computer’s time, etc.
• On the other hand, the web comprises multiple computers
connected to the internet called clients and servers.
• Clients are internet-connected devices of a web user (such as a
computer linked to Wi-Fi or a mobile phone) and the
online-accessing software installed on such systems (generally a
web browser).
• Servers store websites, applications, and their associated data and
activities. When a client device requests access to a website, a
replica of the webpage is received from the server to the client’s
computer. The webpage is then exhibited in the client’s web
browser.
• Data centers are there for storing the servers information.
• When a user inputs a domain name or uniform resource locator (URL)
in the browser, the domain name system (DNS server) is contacted to
get the actual IP address of the website’s server.
• The browser then transmits an HTTP or HTTPS request message back
to the server, asking the server to transmit a copy of the web page to
the client.
• This message and all other data transferred between the client and
server are sent via the TCP/IP protocol across your internet
connection.
• If the server authorizes the client’s request, it returns a “200 OK”
status code.
• The server then begins transmitting the site’s contents to the client as
a sequence of data packets.
• The browser constructs an entire web page from the packets and starts
displaying it.
• This request, response, and information exchange happens via the
internet infrastructure.
Internet Communication Image
• What Is Internet Communication?
• Internet communication enables you to communicate with people over the web. The
communication process takes place in any form, such as messages, voice, video calls, etc.
The biggest reason people are shifting towards this technology for communication is cost
savings.
• You will find several applications over the web that allow app-to-app, click-to-call, and
app-to-phone call services without imposing any calling charge for web interaction facility.
• WhatsApp, Skype, Google meet, and messenger are some of the most popular applications
that allow users easier access to communication services.
• Internet communication services not only benefit users but also help businesses to
communicate with overseas customers at the most cost-efficient price. Corporations have
agreed that they depend on the Internet for smoother functioning of their services.
• The Internet offers many advanced options that allow users to have seamless two-way
communication. The use of the internet in communication enables users to connect and
interact with others without facing any difficulties.
• Instant Messaging
• Instant messaging is a highly used online chat technology that allows
users to communicate with others in real time via an internet-based
chat room.
• These systems are specially designed communication tools that
enable users to have an uninterrupted communication facility when a
user login into a dedicated instant messaging system. Once he starts
his login session, he notifies other users about his presence. Instant
messaging tools allow users to chat with each other synchronously.
• The best thing about these communication tools is, they not only
save time but also allow users to have communication facilities
without paying a single penny. All they have to pay for internet
connection charges and they will be able to communicate with
others.
• Instant messaging is quite beneficial in several aspects. With the
help of these messaging tools, employees can connect with their
managers and colleagues to establish communication remotely.
• The messaging tool eliminates the need to place a call for accessing
information and helps you to have a much easier communication
interface for instant information sharing.
• Yahoo Messenger, Google Messenger, MSN, and Messenger
popular tools, that help users to communicate irrespective of their
geographical locations.
• VoIP And Internet Phone Service
• Internet telephone services utilize the Internet as a bridge that helps them to route
telephonic calls to designated numbers instead of traditional phone lines.
• The working functionality of voice over internet protocol (VoIP) is easily
understandable, and it sends voice packets using IP instead of PSPN (public
switch telephone network). Once the voice packets reach the pre-decided
destinations, it again gets converted into voice data for the receivers.
• Internet phone systems are widely being used by users and businesses that need
to communicate globally. They are cost-effective and allow you to call globally
without imposing high charges.
• Email
• As per a recent survey, you will be amazed to know that the number of active
email users will touch 4.3 billion by 2023. It is one of the most effective modes of
communication and an advanced way of exchanging media files. Users can have
the benefits of these communication facilities without paying any charges.
• Email is considered one of the most reliable and secure communication channels
today, which is why businesses prefer to communicate over email.
• Users can create their email ID through web portals like Microsoft Outlook, Gmail,
and Yahoo. You only need an active email ID if you want to communicate through
the same
• Social Media Platforms
• Social media, an integral part of our lives and is considered one of the most
popular internet communication methods today. You all will be aware of the social
media platforms like Facebook, Instagram, Twitter, WhatsApp, etc. These
channels have gained immense popularity among every age group.
• The social media platform helps users instantaneously communicate with others
and offers several features that enhance user experience while communicating.
Intranet
• Intranet is defined as private network of computers within an organization
with its own server and firewall. We can define Intranet as:
• The Intranet is a system in which multiple PCs are connected to each
other. PCs in intranet are not available to the world outside of the intranet.
• Usually each company or organization has their own Intranet network and
members/employees of that company can access the computers in their
intranet.
• Every computer in internet is identified by a unique IP address.
• Each computer in Intranet is also identified by a IP Address, which is
unique among the computers in that Intranet.

14
-June
Advantages:
• Communication: Intranet offers easy and cheap communication within an organization.
Employees can communicate using chat, e-mail or blogs.
• Time Saving: Information on Intranet is shared in real time.
• Collaboration: Information is distributed among the employees as according to
requirement and it can be accessed by the authorized users, resulting in enhanced
teamwork.
• Platform Independency: Intranet can connect computers and other devices with
different architecture.
• Cost Effective: Employees can see the data and other documents using browser rather
than printing them and distributing duplicate copies among the employees, which
certainly decreases the cost.
• Workforce Productivity: Data is available at every time and can be accessed using
company workstation. This helps the employees work faster.
• Business Management: It is also possible to deploy applications that support business
operations.
• Security: Since information shared on intranet can only be accessed within an
organization, therefore there is almost no chance of being theft.
• Specific Users: Intranet targets only specific users within an organization therefore,
Immediate Updates: once can exactly know whom he is interacting.
• Any changes made to information are reflected immediately to all the users.
INTRANET INTERNET Intranet applications are same
Localized Network Worldwide Network as that of Internet
Doesn’t have access Have access to applications.
to intranet (means network
two intranet can’t Intranet applications are also
communicate)
accessed through a web
More Expensive Less Expensive
browser.
More Safe Less Safe

More Reliability Less Reliability The only difference is that,


Intranet applications reside on
local server

while Internet applications


reside on remote server.
Extranet
• Extranet refers to network within an organization, using internet to connect to
the outsiders in controlled manner.
• It helps to connect businesses with their customers and suppliers and
therefore allows working in a collaborative manner.
• Implementation:
• Extranet is implemented as a Virtual Private Networks (VPN) because it uses
internet to connect to corporate organization and there is always a threat to
information security. VPN offers a secure network in public infrastructure
(Internet).
Key Points:
• The packet is encapsulated at boundary of networks in Internet Protocol
Security Architecture (IPSEC) complaint routers.
• It uses an encryption key to encapsulate packets and IP addresses as well.
• The packet is decoded only by the IPSEC complaint routers or servers.
• The message is sent over VPN via VPN Tunnel and this process is known as
tunneling.
VPN uses Internet Protocol Security Architecture (IPSEC) Protocol to provide
secure transactions by adding an additional security layer to TCP/IP protocol.
This layer is created by encapsulating the IP packet to a new IP packet as
shown in the following diagram:
• Extranet proves to be a successful model for all kind of
businesses whether small or big. Here are some of the
advantages of extranet for employees, suppliers, business
partners, and customers:

Where the extranet pages will be held i.e.


who will host the extranet pages.
In this context there are two choices:
1. Host it on your own server.
2. Host it with an Internet Service Provider
(ISP) in the same way as web pages.
But hosting extranet pages on your own
server requires high bandwidth internet
connection which is very costly.

>> Additional firewall security is required


if you host extranet pages on your own
server which result in a complex security
mechanism and increase work load.
Extranet Intranet
Internal network that can be accessed Internal network that can not be accessed
externally. externally.
Extranet is extension of company's Only limited users of a company.
Intranet.
For limited external communication Only for communication within a
between customers, suppliers and company.
business partners.
World Wide Web Consortium (W3C)
• In October 1994, Tim Berners-Lee founded an
organization—called the World Wide Web Consortium
(W3C)—devoted to developing nonproprietary, interoperable
technologies for the WorldWideWeb.
• One of theW3C’s primary goals is to make the web universally
accessible—regardless of ability, language or culture.
• The W3C home page (www.w3.org) provides extensive resources
on Internet and web technologies.
• Web technologies standardized by the W3C are called
Recommendations.
• W3C Recommendations include the
• Extensible HyperText Markup Language (XHTML),
• Cascading Style Sheets (CSS), HyperText Markup Language
(HTML—now considered a “legacy” technology) and the
Extensible Markup Language (XML).
• A recommendation is not an actual software product, but a
document that specifies a technology’s role, syntax rules and so
forth.
• A technical definition of the World Wide Web is : all the resources and users
on the Internet that are using the Hypertext Transfer Protocol (HTTP).
• The World Wide Web is the universe of network-accessible information.
• The World Wide Web is a way of exchanging information between
computers on the Internet, tying them together into a vast collection of
interactive multimedia resources.
• Internet and Web is not the same thing: Web uses internet to pass over the
information.
WWW Architecture
• WWW architecture is divided into several layers.
Identifiers and Character Set
• Uniform Resource Identifier (URI) is used to uniquely identify resources on the web
and UNICODE makes it possible to built web pages that can be read and write in human
languages.
Syntax
• XML (Extensible Markup Language) helps to define common syntax in semantic web.
Data Interchange
• Resource Description Framework (RDF) framework helps in defining core representation of data
for web. RDF represents data about resource in graph form.
Taxonomies
• RDF Schema (RDFS) allows more standardized description of taxonomies and
other ontological constructs.
Ontologies
• Web Ontology Language (OWL) offers more constructs over RDFS. It comes in following three
versions:
• OWL Lite for taxonomies and simple constraints.
• OWL DL for full description logic support.
• OWL for more syntactic freedom of RDF
Resource Description Framework
(RDF)
• RDF is a standard model for data interchange on the Web.
RDF has features that facilitate data merging even if the
underlying schemas differ, and it specifically supports the
evolution of schemas over time without requiring all the data
consumers to be changed.
• RDF extends the linking structure of the Web to use URIs to
name the relationship between things as well as the two ends
of the link (this is usually referred to as a “triple”).
• Using this simple model, it allows structured and
semi-structured data to be mixed, exposed, and shared across
different applications.
• This linking structure forms a directed, labeled graph, where
the edges represent the named link between two resources,
represented by the graph nodes.
• This graph view is the easiest possible mental model for RDF
and is often used in easy-to-understand visual explanations.
• How does RDF work?
• RDF is a standard way to make statements about resources. An RDF statement consists of three
components, referred to as a triple:
1. Subject is a resource being described by the triple.
2. Predicate describes the relationship between the subject and the object.
3. Object is a resource that is related to the subject.
• The subject and object are nodes that represent things. The predicate is an arc, because it represents
the relationship between the nodes.
• The RDF standard provides for three different types of nodes:
• Uniform Resource Identifier (URI) is a standardized format for identifying a resource, whether abstract
or physical. Uniform Resource Locator (URL) is a type of URI that is commonly used in RDF statements.
When W3C updated the RDF specification to version 1.1 in 2014, it added Internationalized Resource
Identifier (IRI) as a node type. IRIs are similar and complementary to URIs, enabling the use of
international character sets.
• Literal is a specific data value and can be a string, a date or a numerical value. Literal values are
expressed using the URI or IRI format.
• Blank node identifier is also known as an anonymous resource or a bnode. It represents a subject
about which nothing is known other than the relationship. Blank node identifiers use special syntax to
identify them.
Rules
• RIF and SWRL offers rules beyond the
constructs that are available
from RDFs and OWL. RIF is the
W3Consortium Rule Interchange Format.
It's an XML language for expressing rules
which computers can execute.

• Simple Protocol and RDF Query Language


(SPARQL) is SQL like language used for
querying RDF data and OWL Ontologies.

Proof
• All semantic and rules that are executed at
layers below Proof and their result will be used
to prove deductions.

Cryptography
Cryptography means such as digital signature
for verification of the origin of sources is used.

User Interface and Applications


• On the top of layer User interface and
Applications layer is built for user interaction.
Reference Model
• Reference Model offers a means of standardization which is acceptable
worldwide.
• Since people using the computer network are located over a wide physical
range and their network devices might have heterogeneous architect
• We have two reference models such as OSI model and TCP/IP reference
model, however, the OSI model is a hypothetical one but the TCP/IP is
absolutely practical module.
• OSI Model: OSI is acronym of Open System Interface. This model is
developed by the International organization of Standardization (ISO) and
therefore also referred as ISO-OSI Model.
• The OSI model consists of seven layers as shown in the diagram. Each layer
has a specific function, however each layer provide services to the layer
above.
Physical Layer
• Activating, maintaining and deactivating the physical connection.
• Defining voltages and data rates needed for transmission.
• Converting digital bits into electrical signal.
Data Link Layer
• Performs synchronization and error control for the information which is to be transmitted over the physical link. ;
Enables error detection, and adds error detection bits to the data which are to be transmitted.
Network Layer
• To route the signals through various channels to the other end.
• To act as the network controller by deciding which route data should take.
• To divide the outgoing messages into packets and to assemble incoming packets into messages for higher levels.
Transport Layer
• It decides if the data transmission should take place on parallel paths or single path.
• It performs multiplexing, splitting on the data.
• It breaks the data groups into smaller units so that they are handled more efficiently by the network layer.
• The Transport Layer guarantees transmission of data from one end to other end.
Session Layer
Manages the messages and synchronizes conversations between two different applications.
• It controls logging on and off, user identification, billing and session management.
Presentation Layer
• This layer makes it sure that the information is delivered in such a form that the receiving system will understand
and use it.
Application Layer
• It provides different services such as manipulation of information in several ways, retransferring the files of
information, distributing the results etc., The functions such as LOGIN or password checking are also performed
by the application layer.
• TCP/IP model is practical model and is used in the Internet.
• The TCP/IP model combines the two layers (Physical and Data link layer) into one layer
i.e. Host-to-Network layer.
Application Layer
• This layer is same as that of the OSI model and performs the following functions:
• It provides different services such as manipulation of information in several ways,
retransferring the files of information, distributing the results etc.
• The functions such as LOGIN or password checking are also performed by the
application layer.
• Protocols used: TELNET, FTP, SMTP, DN, HTTP, NNTP are the protocols employed in this
layer.
• Try to find the full form of the all these protocols???
Transport Layer
• It does the same functions as that of transport layer in OSI model.
• It uses TCP and UDP protocol for end to end transmission.
• TCP is reliable and connection oriented protocol.
• TCP also handles flow control.
• The UDP is not reliable and a connection less protocol also does not perform flow
control.
• Protocols used: TCP/IP and UDP (User Datagram Protocol) protocols are employed in
this layer.
• Find the difference between TCP and UDP protocol? ARPANET, SATNET, LAN, packet
radio
Internet Layer
• The function of this layer is to allow the host to insert packets into network and then
make them travel independently to the destination.
• However, the order of receiving the packet can be different from the sequence they
were sent. Protocols used: Internet Protocol (IP) is employed in Internet layer.
Host-to-Network Layer
• This is the lowest layer in TCP/IP model. The host has to connect to network using some
protocol, so that it can send IP packets over it.
• This protocol varies from host to host and network to network.
• Protocols used: ARPANET, SATNET, LAN, packet radio are the protocols which are used
in this layer.
Domain Name Server
• When DNS was not into existence, one had to download a Host file containing host names
and their corresponding IP address.
• But with increase in the number of hosts of internet, the size of host file also increased. This
resulted in increased traffic on downloading the file. To solve this problem the DNS system
was introduced.
• Domain Name System helps to resolve the host name to an address. It uses a hierarchical
naming scheme and distributed database of IP addresses and associated names.
• The domain name system (DNS) connects URLs with their IP address. With DNS, it’s possible to
type words instead of a string of numbers into a browser, allowing people to search for websites
and send emails using familiar names.
• When you search for a domain name in a browser, it sends a query over the internet to match the
domain with its corresponding IP. Once located, it uses the IP to retrieve the website’s content.
Most impressively, this whole process takes just milliseconds.
• https://www.namecheap.com/dns/what-is-dns-domain-name-system-definitio
n/
IP Address
• IP address is a unique logical address assigned to a machine over the network. An IP address
exhibits the following properties:
• IP address is the unique address assigned to each host present on Internet.
• IP address is 32 bits (4 bytes) long.
• IP address consists of two components: network component and host component.
• Each of the 4 bytes is represented by a number from 0 to 255, separated with dots. For
example 137.170.4.124
• IP address is 32-bit number while on the other hand domain names are easy to remember
names. For example, when we enter an email address we always enter a symbolic string such
as [email protected].
Uniform Resource Locator (URL)
• Uniform Resource Locator (URL) refers to a web address which uniquely identifies a document over
the internet.
• This document can be a web page, image, audio, video or anything else present on the web.
URL Types: There are two forms of URL as listed below:
• Absolute URL
• Relative URL
Absolute URL
• Absolute URL is a complete address of a resource on the web. This completed address comprises of
protocol used, server name, path name and file name.
• For example http:// www.amazon.com / electronics /index.htm. where:
• http is the protocol.
• amazon.com is the server name.
• index.htm is the file name.
• The protocol part tells the web browser how to handle the file. Similarly we have some other
protocols also that can be used to create URL are: FTP, https, Gopher, mailto, news
Relative URL
• Relative URL is a partial address of a webpage. Unlike absolute URL, the protocol and server part are
omitted from relative URL.
• Relative URLs are used for internal links i.e. to create links to file that are part of same website as the
WebPages on which you are placing the link.
• For example, to link an image on amazon.com/electronics/electronics_models, we can use the
relative URL which can take the form like /electronic/electronic_device_model.jpg.
Internet Services
• Internet Services allows us to access huge amount of information such as text, graphics, sound and
software over the internet. Diagram shows the four different categories of Internet Services.
• Communication Services: There are various Communication Services available that offer exchange
of information with individuals or groups. Services are:
1. ElectronicMail
Used to send electronic message over the internet.
2. Telnet
Used to log on to a remote computer that is attached to internet.
3. Newsgroup
Offers a forum for people to discuss topics of common interests.
4. Internet Relay Chat (IRC)
Allows the people from all over the world to communicate in real time.
5. Mailing Lists
Used to organize group of internet users to share common information through e-mail.
6. Internet Telephony (VoIP)
Allows the internet users to talk across internet to any PC equipped to receive the call.
7. Instant Messaging
Offers real time chat between individuals and group of people. Eg. Yahoo messenger, MSN
messenger.
Internet Connectivity
• Internet Service Provider (ISP) is a company offering access to internet. They offer various services:
• Internet Access, Domain name registration, Dial-up access, Leased line access
ISP Types:--
Access providers
• They provide access to internet through telephone lines, cable wi-fi or fiber optics.
Mailbox Provider
• Such providers offer mailbox hosting services.
Hosting ISPs
• Hosting ISPs offers e-mail, and other web hosting services such as virtual machines, clouds etc.
Virtual ISPs
• Such ISPs offer internet access via other ISP services.
Free ISPs
• Free ISPs do not charge for internet services.
Transmission Control Protocol (TCP)
• TCP is a connection oriented protocol and offers end-to-end packet
delivery. It acts as back bone for connection. It exhibits the following
key features:
• Transmission Control Protocol (TCP) corresponds to the Transport
Layer of OSI Model.
• TCP is a reliable and connection oriented protocol.
• TCP features:
– Stream Data Transfer.
– Reliability.
– Efficient Flow Control
– Full-duplex operation.
– Multiplexing.
• TCP offers connection oriented end-to-end packet delivery.
• TCP ensures reliability by sequencing bytes with a forwarding
acknowledgement number that indicates to the destination the next
byte the source expect to receive.
• It retransmits the bytes not acknowledged with in specified time
period.
TCP Services
• TCP offers following services to the processes at the application layer:
Stream Deliver Service
• TCP protocol is stream oriented because it allows the sending process to send data as
stream of bytes and the receiving process to obtain data as stream of bytes.
Sending and Receiving Buffers Service
• It may not be possible for sending and receiving process to produce and obtain data at
same speed, therefore, TCP needs buffers for storage at sending and receiving ends.
Bytes and Segments Service
• The Transmission Control Protocol (TCP), at transport layer groups the bytes into a packet.
This packet is called segment. Before transmission of these packets, these segments are
encapsulated into an IP datagram.
Full Duplex Service
• Transmitting the data in duplex mode means flow of data in both the directions at the
same time.
Connection Oriented Service
• TCP offers connection oriented service in the following manner:
• TCP of process-1 informs TCP of process – 2 and gets its approval.
• TCP of process – 1 and TCP of process – 2 and exchange data in both the two directions.
• After completing the data exchange, when buffers on both sides are empty, the two TCP’s
destroy their buffers.
Reliable Service
• For sake of reliability, TCP uses acknowledgement mechanism.
Internet Protocol (IP)
• Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee of
successfully transmission of data.
• In order to make it reliable, it must be paired with reliable protocol such as TCP at the
transport layer.
• Internet protocol transmits the data in form of a datagram as shown in the following
diagram:
• The length of datagram is variable.
• The Datagram is divided into two parts: header and data.
• The length of header is 20 to 60 bytes.
• The header contains information for routing and delivery of the packet.
User Datagram Protocol (UDP)
• UDP is connectionless and unreliable protocol. It doesn’t require making a
connection with the host to exchange data.
• Since UDP is unreliable protocol, there is no mechanism for ensuring that data
sent is received.
• UDP transmits the data in form of a datagram. The UDP datagram consists of five
parts as shown in the following diagram:

• Points to remember:
• UDP is used by the application that typically transmit small amount of data at one
time.
• UDP provides protocol port used i.e. UDP message contains both source and
destination port number, that makes it possible for UDP software at the
destination to deliver the message to correct application program.
File Transfer Protocol
• FTP is used to copy files from one host to another. FTP offers the mechanism for the
same in following manner:
• FTP creates two processes such as Control Process and Data Transfer Process at both
ends i.e. at client as well as at server.
• FTP establishes two different connections: one is for data transfer and other is for
control information.
• Control connection is made between control processes while Data Connection is made
between data transfer process
• FTP uses port 21 for the control connection and Port 20 for the data connection.
Hyper Text Transfer Protocol (HTTP)
• HTTP is a communication protocol. It defines mechanism for
communication between browser and the web server. It is also called
request and response protocol because the communication between
browser and server takes place in request and response pairs.
HTTP Request: HTTP request comprises of lines which contains:
• Request line
• Header Fields
• Message body
Key Points
• The first line i.e. the Request line specifies the request method
i.e. Get or Post.
• The second line specifies the header which indicates the domain name of
the server from where index.htm is retrieved.
HTTP Response
• Like HTTP request, HTTP response also has certain structure. HTTP
response contains:
• Status line
• Headers
• Message body
WWW Operation
• WWW works on client- server approach.
• Following steps explains how the web works:
• User enters the URL of the web page in the address bar of web
browser.
• Then browser requests the Domain Name Server for the IP address
corresponding to URL.
• After receiving IP address, browser sends the request for web page to
the web server using HTTP protocol which specifies the way the
browser and web server communicates.
• Then web server receives request using HTTP protocol and checks its
search for the requested web page. If found it returns it back to the
web browser and close the HTTP connection.
• Now the web browser receives the web page, It interprets it and
display the contents of web page in web browser’s window.
Web Page
• web page is a document available on world wide web. Web Pages are stored
on web server and can be viewed using a web browser.
• A web page can contain huge information including text, graphics, audio, video
and hyper links. These hyper links are the link to other web pages.
• Collection of linked web pages on a web server is known as website. There is
unique Uniform Resource Locator (URL) is associated with each web page.
Static Web page
• Static web pages are also known as flat or stationary web page. They are
loaded on the client’s browser as exactly they are stored on the web server.
Such web pages contain only static information. User can only read the
information but can’t do any modification or interact with the information.
• Static web pages are created using only HTML. Static web pages are only used
when the information is no more required to be modified.
• Examples of Static Websites
• The major examples of static websites are as follows:
• Documentation
• Developing Cache
• Website presentation
• Communication cache-scrapping buffer
• Forms
• Newsletter Contents
• Disaster page
• Recovery from disaster status
• Landing page/scales
• Blogs.
Dynamic Web page
• Dynamic web page shows different information at different point of time. It
is possible to change a portion of a web page without loading the entire
web page. It has been made possible using Ajax technology.
Server-side dynamic web page
• It is created by using server-side scripting.
• There are server-side scripting parameters that determine how to assemble
a new web page which also include setting up of more client-side
processing.
Client-side dynamic web page
• It is processed using client side scripting such as JavaScript. And then passed
in to Document Object Model (DOM).
Websites Types
• Internet Forums: An internet forum is message board where people can hold
conversation by posting messages. Domain Mea

Remember Points: .com COm

• A forum can contain several sub forums. .edu Educ

• Each of sub forums may contain a number of topics. .gov Gove

• Within a forum’s topic, each new discussion started is called a thread. .in Inter

• This thread can be replied by as many people as so wish. .mil Milit

Let’s Discuss: Blog, Ecommerce, Portfolio .net Netw

Domain Name: .org Non

A domain name is the part of your Internet address that comes after “www”.
• Domain Extensions: The final letter at end of internet address is known as top level
domain names.
• They are called top level because they are read from right to left, and the part after the
dot is the highest in a hierarchy.
• The following table shows the Generic Top-Level Domain names:

Assignment Question: Write all the domain names website examples with their application area.
Website Hosting
• Web hosting is a service of providing online space for storage of web pages.
• web hosting is the process of renting or buying space to house a website on the
World Wide Web. Website content such as HTML, CSS, and images has to be housed
on a server to be viewable online.
• A server is a computer that connects other web users to your site from anywhere in
the world. As the name implies, web hosting service providers have the servers,
connectivity, and associated services to host websites. By offering a variety of
hosting plans, they cover the spectrum of hosting needs, from small blogs and large
organizations.
• These web pages are made available via World Wide Web. The companies which
offer website hosting are known as Web hosts.
• The servers on which web site is hosted remain switched on 24 x7.
• These servers are run by web hosting companies. Each server has its own IP address.
• Since IP addresses are difficult to remember therefore, webmaster points their
domain name to the IP address of the server their website is stored on.
• It is not possible to host your website on your local computer, to do so you would
have to leave your computer on 24 hours a day.
• This is not practical and cheaper as well. This is where web hosting companies
comes in.
Types of Hosting
• Different types of hosting that can be availed as per the need:
1. Shared Hosting:
In shared hosting, the hosting company puts thousand of website on the same physical
server. Each customer has their own allocation of physical web space and a set of
bandwidth limit. As all websites share same physical memory, MYSQL server and Apache
server, one website on the server experiencing high traffic load will affect performance of all
websites on the server.
It is similar to renting a workstation in a busy, noisy, open plan office or co-working space. You have all the
modern conveniences: a desk, internet connection and some stationary and you share the space with
other co-workers including the kitchen, printer, and restroom. You can’t do any makeovers to the space
such as installing whiteboards etc. This is a popular option for launching small websites and not
appropriate for large-scale commercial projects.
2. Virtual Private Server (VPS)

It is also known as Virtual Dedicated Server. It is a server which is partitioned into


smaller servers.
In this customer is given their own partition, which is installed with its own operating
system.
Unlike shared hosting, VPS doesn’t share memory or processor time rather it allocates
certain amount of memory and CPU to use which means that any problem on a VPS
partition on the same drive will not affect other VPS customers.
3. Dedicated Server
In this kind of hosting, single dedicated server is setup for just one
customer.
It is commonly used by the businesses that need the power, control and
security that a dedicated server offers.

4. Reseller Hosting
A reseller acts as a middle man and sells hosting space of someone else’s
server.

5. Grid Hosting
Instead of utilizing one server, Grid Hosting spreads resources over a large
number of servers. It is quite stable and flexible.
The servers can be added or taken away from the grid without crashing
the system.
Search Engine Optimization
• Search Engine Optimization refers to set of activities that are performed to increase number of
desirable visitors who come to your site via search engine.
• These activities may include thing you do to your site itself, such as making changes to your text
and HTML code, formatting text or document to communicate directly to the search engine.
Types of SEO
1. White Hat SEO and
2. Black Hat or Spamdexing
Website monetization: refers to making money from the website. It is done by converting existing
traffic to a particular website into revenue.
Methods of Monetization
1. Display Advertising
• It refers to the banners and text ads. This method is good for the websites that have significant
traffic, valuable audience, relevant and active advertisers.
2. Affiliate Marketing
• It refers to steering the visitors to products and services of a third party merchant. It is good for
the websites that are product centric and have easy integration into content.
3. Lead generation
• It refers to capturing the customer information and selling it to a third party.
4. Email rental
• It refers to renting out your email lists to third parties. In this you will send an email on their
behalf to your distribution list.
Server Side /Client Side Scripting
Server Side: Client Side:
• This type of scripting usually occurs on a website’s • This type of scripting basically refers to the
back-end. code present in the HTML page of a client.
• Any random user won’t get access to view whatever • The client-side scripting usually attaches to
happens over here. the concerned browser in any language that’s
• It means that server-side scripting paves the way for a compatible with that browser.
website to its database along with all of its
• It helps work with the front end.
behind-the-scenes tasks that contribute to the
organization and running of the website. • It is visible to the users.
• In server-side scripting, you can customize the responses • The scripts are run on the client browser.
solely on the basis of the user requirements. • It runs on the user/client’s computer.
• It helps work with the back end. • It depends on the browser’s version.
• It doesn’t depend on the client. • It doesn’t interact with the server to process
• It runs on the web server. data.
• It helps provide a response to every request that comes in • Client side scripting involves languages such
from the user/client. as HTML, CSS, JavaScript.
• This is not visible to the client side of the application. • It helps reduce the load on the server.
• It requires the interaction with the server for the data to •
be process.
• Server side scripting requires languages such as PHP,
ASP.net, ColdFusion, Python, Ruby on Rails.
• It is considered to be a secure way of working with
applications.
• It can be used to customize web pages.
• It can also be used to provide dynamic websites.
Scripting Languages
• Scripting languages are like programming languages that allow us to write
programs in form of script. These scripts are interpreted not compiled and
executed line by line.
• Scripting language is used to create dynamic web pages.
Client-side Scripting
• Client-side scripting refers to the programs that are executed on client-side.
Client-side scripts contains the instruction for the browser to be executed in
response to certain user’s action.
• Client-side scripting programs can be embedded into HTML files or also can be
kept as separate files.
• Example:
(1) Javascript: It is a prototype based s cripting languages. It inherits its naming
conventions from java. All java script files are stored in file having .js extension.
(2) ActionScript: It is an object oriented programming language used for the
development of websites and software targeting Adobe flash player.
(3) Dart: It is an open source web programming language developed by Google. It
relies on source-to-source compiler to JavaScript.
(4) VBScript: It is an open source web programming language developed by
Microsoft. It is superset of JavaScript and adds optional static typing
class-based object oriented programming.
Client Side Scripting
• Server-side Scripting: acts as an interface for the client and also limit the
user a Sever-side scripting access the resources on web server.
• It can also collects the user’s characteristics in order to customize
response.
1. ASP: Active Server Pages (ASP)is server-side script engine to
create dynamic web pages. It supports Component Object
Model (COM) which enables ASP web sites to access
functionality of libraries such as DLL.
2. ActiveVFP: It is similar to PHP and also used for creating
dynamic web pages. It uses native Visual Foxpro language
and database.
3. ASP.net: It is used to develop dynamic websites, web
applications, and web services.
4. Java: Java Server Pages are used for creating dynamic web
applications. The Java code is compiled into byte code and
run by Java Virtual Machine (JVM).
5. Python: It supports multiple programming paradigms such
as object-oriented, and functional programming. It can also
be used as non-scripting language using third party tools
such as Py2exe or Pyinstaller.
6. WebDNA: It is also a server-side scripting language with an
embedded database system.
Web Browser
• Web Browser is an application software that allows us to view and explore
information on the web. User can request for any web page by just
entering a URL into address bar.
• Web browser can show text, audio, video, animation and more. It is the
responsibility of a web browser to interpret text and commands contained
in the web page.
• Earlier the web browsers were text-based while now a days
graphical-based or voice-based web browsers are also available. Following
are the most common web browser available today: GoogleChrome,
Opera, Firefox, Pagegrow, MicrosoftEdge, Brave, InternetExplorer, Safari,
etc.
Architecture
• There are a lot of web browser available in the market. All of them
interpret and display information on the screen however their capabilities
and structure varies depending upon implementation. But the most basic
component that all web browser must exhibit are listed below:
❑ Controller/Dispatcher
❑ Interpreter
❑ Client Programs
• Controller works as a control unit in CPU. It takes input from the keyboard
or mouse, interpret it and make other services to work on the basis of
input it receives.
• Interpreter receives the information from the controller and execute the
instruction line by line. Some interpreter are mandatory while some are
optional For example, HTML interpreter program is mandatory and java
interpreter is optional.
• Client Program describes the specific protocol that will be used to access a
particular service. Following are the client programs that are commonly
used:
• HTTP
• SMTP
• FTP
• NNTP
• POP
Web server
• Web server is a computer where the web content is stored.
Basically web server is used to host the web sites but there
exists other web servers also such as gaming, storage, FTP,
email etc.
• Web site is collection of web pages while web server is a
software that respond to the request for web resources. Web
Server Working
• Web server respond to the client request in either of the
following two ways:
1. Sending the file to the client associated with the requested
URL.
2. Generating response by invoking a script and communicating
with database
Concurrent Approach
• Concurrent approach allows the web server to handle multiple client requests at the same time. It can be
achieved by following methods:
1. Multi-process
2. Multi-threaded
3. Hybrid method.
Multi-processing
• In this a single process (parent process) initiates several single-threaded child processes and distribute
incoming requests to these child processes. Each of the child processes are responsible for handling single
request.
• It is the responsibility of parent process to monitor the load and decide if processes should be killed or
forked.
Multi-threaded
• Unlike Multi-process, it creates multiple single-threaded process.
Hybrid
• It is combination of above two approaches. In this approach multiple process are created and each
process initiates multiple threads. Each of the threads handles one connection. Using multiple threads in
single process results in less load on system resources.

Question: Write about the various servers like Apache, IIS, Lighttpd, Sun Java System Web
Server, Jigsaw Server

Amazon Web Server, NodeJS Server, Jango


Cloud Fnaire, Google Web Servers, Oracle,
Mixrosoft Web server, GeoServer, Jetty web server, Google Mail Server, Web Socket Server,
Personal, Distributed and Client/Server Computing
• In 1977, Apple Computer popularized personal computing. Computers
became so economical that people could buy them for their own personal
or business use.
• In 1981, IBM, the world’s largest computer vendor, introduced the IBM
Personal Computer.
• This quickly legitimized personal computing in business, industry and
government organizations, where IBM mainframes were heavily used.
Object Technology
• What are objects and why are they special?
• Actually, object technology is a packaging scheme that helps us
create meaningful software units.
• These can be large and are highly focused on particular
applications areas.
• There are date objects, time objects, paycheck objects, invoice
objects, audio objects, video objects, file objects, record objects
and so on.
• In fact, almost any noun can be reasonably represented as an
object.
• We live in a world of objects. Just look around you. There are cars,
planes, people, animals, buildings, traffic lights, elevators and the
like.
• Before object-oriented languages appeared, procedural
programming languages (such as Fortran, COBOL, Pascal, BASIC
and C) were focused on actions (verbs) rather than on things or
objects (nouns).
• A key problem with procedural programming is that the program units do
not effectively mirror real-world entities, so these units are not particularly
reusable.
• It’s not unusual for programmers to “start fresh” on each new project and
have to write similar software “from scratch.”
• This wastes time and money, as people repeatedly “reinvent the wheel.”
• With object technology, the software entities created (called classes), if
properly designed, tend to be reusable on future projects.
• Using libraries of reusable componentry can greatly reduce effort required
to implement certain kinds of systems.
JavaScript: Object-Based Scripting for the Web
• JavaScript is an object-based scripting language with strong support for
proper software engineering techniques.
• JavaScript was created by Netscape, the company that created the first
widely successful web browser.
• Both Netscape and Microsoft have been instrumental in the
standardization of JavaScript by ECMA International (formerly the
European Computer Manufacturers Association) as ECMA Script.
• <!DOCTYPE html> : It means that we are already telling
the browser that this is a html document.
• Meta Tags: data about data, it is used in SEO (Search
Engine Optimization). It is the way to increase you web
traffic.
• <meta charset=“UTF-8”> :This attribute declares the
page’s character encoding. Unicode transformation
format).
• <meta name=“viewport” > : according to device.
• <meta name=“description” > : for description purpose.
• <meta name=“keywords” >: for search engine
keywords.
• <meta name=“robots” >: For indexing and follow.
• Comment: <!– comment -- > ignorable sentences.
• <link rel=“stylesheet” href=“first.css”>
HTML
• HTML stands for Hyper Text Markup Language is used to create web pages as well as other types
of documents viewable in a web browser.
• HTML is a standard specified and maintained by World Wide Web Consortium.
• From its invention, HTML has evolved through different versions like HTML4.0, HTML5.0.
• The HTML editor is a Software tool to create and modify HTML documents. HTML editors can be
divided into three categories : Text editors, WYSIWYG editors and Online editors.
• HTML Text Editors
• Text HTML Editors can be divided into two categories : Basic Text Editor and Source Text Editor.
• Features of Basic Text Editor:
• 1. You can write simple text.
• 2. Besides basic file handling features (like new, open, copy, paste etc.) only some other features
like setting the font size, basic searching of a string etc are available.
• Examples of some of the Basic Text Editors are : Emacs, Nano, Notepad, SciTE, TextMate,
UltraEdit, vi, Vim etc.
• Features of Source Text Editor:
• 1. Syntax highlighting.
• 2. Templates.
• 3. Toolbars and keyboard shortcuts.
• 4. Insertion of common HTML elements (optional).
• 5. Wizards.
• 6. Tooltip prompts.
Components of a HTML page
• DOCTYPE: A Doctype declares the version of an HTML document.
• HTML Elements and Tags: A HTML Element may contain content (text,
image, video etc), attributes and other elements in an HTML document.
• HTML Attributes: An HTML Attribute sets either style or layout or content
related information for an HTML Element.
• HTML Comments: An HTML Comment excludes a part of the code from
being displayed in the browser.
• HTML Frames: An HTML Frame contains other HTML pages. In this way,
users can view several HTML pages in the same browser window.
HTML block level and inline elements
• In general, HTML elements can be divided into two categories : block level and inline
elements.
• 1. HTML block level elements can appear in the body of an HTML page.
• 2. It can contain another block level as well as inline elements.
• 3. By default, block-level elements begin on new lines.
• 4. block level elements create larger structures (than inline elements).
List of block level elements
• p
• h1, h2, h3, h4, h5, h6
• ol, ul
• pre
• address
• blockquote
• dl
• div
• fieldset
• form
• hr
• noscript
• table
Following is a list of HTML 4.01 elements

• dir : Directory list


• a : Anchor • isindex : Single line prompt • script : Script statements
• div : Division • kbd : Keyboard input
• abbr : Abbreviation • select : Option selector
• dl : Definition list • label : Label
• acronym : Acronym • small : Small text
• dt : Definition term • legend : Legend
• address : Address • span : Generic style or
• em : Emphasis • li : List Item language container
• applet : Applet
• fieldset : Form control • link : Media Independent link • strike : Strike through text
• b : Bold
Group • map : Client side image map
• base : Base URL • strong : Strong emphasis
• font : Font • menu : menu list
• base : Base Font Size • style : Style info
• form : Form • meta : Meta information
• bdo : Bi-Directional • sub : Subscript
• frame : Frame • noframes : No Frames
Override • noscript : No script • sup : Superscript
• frameset : Frameset
• big : Big • li : List Item • table : Table
• h1 : Header 1
• blockquote : Blockquote • noscript : No script • tbody : Table body
• h2 : Header 2
• body : Body • object : Object • td : Table data
• h3 : Header 3
• br : Break • ol : Ordered List • textarea : Textarea of a form
• h4 : Header 4
• button : Button • optgroup : Option group • tfoot : Table foot
• h5 : Header 5 • option : Select an option
• caption : Table caption • th : Table header cell
• h6 : Header 6 • p : Paragraph
• center : Center align • thead : Table header
• head : Head • param : Named property
• cite : Citation • title : Title of document
• hr : Horizontal Rule value
• code : Computer code • tr : Table row
• HTML : HTML document • pre : Preformatted text
• col : Table column • tt : Tele type
root • q : Quotation
• col : Table column group • s : Strike through text style • u : Underline text style
• i : Italics
• col : Table column group • samp : Sample program • ul : Unordered list
• iframe : Iframe
• dd : Definition output,Scripts • var : an instance of a variable
• img : Image
description or program argument
• input : Input
• del : Deleted text
• ins : Inserted text
• dfn : Instance definition
HTML inline elements
1. HTML inline level elements can appear in <!DOCTYPE HTML PUBLIC
"-//W3C//DTD HTML 4.01//EN"
the body of an HTML page.
"http://www.w3.org/TR/html4/
2. It can contain data and strict.dtd">
other inline elements. <html>
<head>
3. By default, inline elements do not begin <meta
on new lines. http-equiv="Content-Type"
4. inline elements create shorter structures content="text/html;
charset=iso-8859-1">
(than block level elements).
<title>Example of HTML block
List of inline elements level element</title>
• b, big, i, small, tt </head>
<body>
• abbr, acronym, cite, code, dfn, em, kbd, <p>w3resource <abbr
strong, samp, var title="Hyper Text Markup
Language">HTML</abbr>
• a, bdo, br, img, map, object, q, script,
tutorial.</p>
span, sub, sup </body>
• button, input, label, select, textarea </html>
HTML attribute
1. An HTML attribute is an associated property of an HTML element and used
to extend the capability of an HTML element.
2. HTML attributes (usually) have values and are written after a "=" after the
name of the attribute.
3. Attribute value pair is placed before the last ">" of an HTML start tag.
4. Any number of attribute value pairs (if they are applicable to that element)
separated by space (white space) can be used with an element.
5. In HTML 4.01, values of the attributes may be wrapped by double quotes,
which is not mandatory. But in XHTML it is mandatory.
6. HTML attribute names are case sensitive.
7. Values of HTML attributes are not case-sensitive.

Pictorial presentation of using HTML attribute


accept charset
• The purpose of the HTML accept-charset attribute is to specify the supported character sets
for a form.
• The accept-charset attribute specifies the character encodings that are to be used for the
form submission. The default value is the reserved string "UNKNOWN" (indicates that the
encoding equals the encoding of the document containing the <form> element)
Supported elements
• HTML accept-charset attribute supports form
• Syntax
• <form accept-charset="value" >.....</form>
Type of value
• Type of value of HTML accept-charset attribute is a valid character set (for example
ISO-8859-1).
Value
• A string representing a valid character set.
Default value
• There is no default value of HTML accept-charset attribute.

You might also like