Web essentials clients, servers and communication – the internet – basic inte...smitha273566
A website is a collection of web pages that can be accessed over the internet. It is hosted on a web server and viewed using web clients like browsers. Websites can be developed using languages like HTML, JavaScript, and PHP. The internet connects computers globally using TCP/IP and allows users to access websites by domain names that resolve to IP addresses. HTTP is the main protocol used to access websites. It establishes connections between clients and servers to request and transfer web pages and other content.
HTTP is the foundation of data communication for the World Wide Web. It is a protocol for transferring various forms of data between a client and server. HTTP works by establishing a TCP connection between a client and server, through which HTTP request and response messages are exchanged. These messages include request methods like GET and POST, as well as response status codes like 200 for success and 404 for not found. HTTP is a stateless protocol, but cookies and caching allow servers to identify users and reduce response times.
HTTP is the application-layer protocol for transmitting hypertext documents across the internet. It works by establishing a TCP connection between an HTTP client, like a web browser, and an HTTP server. The client sends a request to the server using methods like GET or POST. The server responds with a status code and the requested resource. HTTP is stateless, meaning each request is independent and servers do not remember past client interactions. Cookies and caching are techniques used to maintain some state and improve performance.
The document discusses several application layer protocols used in TCP/IP including HTTP, HTTPS, FTP, and Telnet. HTTP is used to access resources on the world wide web over port 80 and is stateless. HTTPS is a secure version of HTTP that encrypts communications over port 443. FTP is used to transfer files between hosts but sends data and passwords in clear text. Telnet allows users to access programs on remote computers.
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
The document discusses the application and presentation layers of the OSI model. It provides details on:
- The application layer protocols like HTTP, FTP, email and how they use the transport layer protocols TCP and UDP.
- The traditional client-server and new peer-to-peer paradigms used at the application layer.
- How the HTTP protocol works for the world wide web including URL structure, static/dynamic web documents, browser and server functions.
- The key components and functioning of specific application layer protocols - FTP for file transfer and email for electronic mail exchange.
HTTP is the application layer protocol that powers the World Wide Web. It allows for the transfer of various data types like text, images, videos, and sounds between a client and server. HTTP uses TCP and IP to establish connections and transfer packets of data between devices. Requests use methods like GET and POST, and responses include status codes to indicate success or errors. While HTTP is stateless, cookies allow servers to track users across multiple requests.
The document discusses several key concepts related to the internet and web technologies. It defines the internet as a worldwide collection of interconnected networks and devices that use common communication protocols. It describes the World Wide Web as the most well-known feature of the internet, allowing users to view rich multimedia content through web pages accessed via web browsers. Various internet protocols are also outlined, including HTTP, FTP, email, internet relay chat, Gopher, and WAIS.
It provides additional features like spell checking, grammar checking,
translation etc.
Networking: It handles all the networking tasks like establishing connection with
server, sending and receiving HTTP requests and responses.
UI Backend: It provides platform specific implementation for user interface.
Data Storage: It stores cookies, cache, bookmarks, history etc.
Plug-ins: It provides support for additional features like Flash, PDF, media players
etc.
JavaScript Interpreter: It interprets and executes the JavaScript code embedded in
web pages.
Browser Security: It provides security features like sandboxing, same-origin policy,
digital signatures etc.
Browser Extensibility: It allows third party extensions to add
Protocols define rules for formatting and transmitting data across networks. Common protocols include TCP/IP, HTTP, FTP, and SMTP. IP is the core Internet protocol that handles packet routing. TCP provides reliable data transmission and reassembles packets. HTTP is used for web pages, FTP for file transfer, and SMTP for email.
IT2255 Web Essentials - Unit I Website Basicspkaviya
Internet Overview – Fundamental computer network concepts – Web Protocols – URL – Domain Name – Web Browsers and Web Servers – Working principle of a Website – Creating a Website – Client-side and server-side scripting.
Protocols define rules for formatting and processing data on a network. Some common protocols are TCP/IP, HTTP, FTP, and SMTP. TCP/IP provides reliable data transmission and IP delivers packets across networks. HTTP is the protocol for the World Wide Web and FTP transfers files between hosts using two channels. SMTP is used for email over IP networks.
FTP uses ports 20 and 21 to transfer files between a client and server over TCP/IP networks like the internet. There are two transfer modes - active mode where the server connects to the client's data port, and passive mode where the client initiates both connections to the server's ports. HTTP is a request/response protocol used to transfer web pages over the internet, with clients like browsers making requests on port 80 to web servers, which respond with files, data, or error messages. Web servers translate URL paths to local file system paths and serve index files like index.html when directories are requested. HTTPS adds encryption and authentication to standard HTTP using port 443.
Protocols define rules for formatting and processing data on a network. Some common protocols are TCP/IP, HTTP, FTP, and SMTP. TCP/IP provides reliable data transmission and IP delivers packets across networks. HTTP is the protocol for the World Wide Web and FTP transfers files between hosts using two channels. SMTP is used for email over IP networks.
Protocols define rules for formatting and transmitting data over a network. Common protocols include TCP/IP, HTTP, FTP, and SMTP. TCP/IP provides reliable data transmission and IP specifies packet delivery. HTTP is the protocol for web pages and hyperlinks. FTP transfers files between hosts using separate channels for commands and data. SMTP enables email transmission over IP networks.
18CS52 VTU Computer Network & Security
MODULE 1-Part 1
Principles of Network Applications: Network Application Architectures, Processes Communicating, Transport Services Available to Applications, Transport Services Provided by the Internet, Application-Layer Protocols. The Web and HTTP: Overview of HTTP, Non-persistent and Persistent Connections, HTTP Message Format, User-Server Interaction: Cookies, Web Caching, The Conditional GET, File Transfer: FTP Commands & Replies, Electronic Mail in the Internet: SMTP, Comparison with HTTP, Mail Message Format, Mail Access Protocols
The document provides an overview of the history and workings of the internet. It discusses how ARPAnet was developed in the 1960s as a military network which later became the foundation for the commercial internet. It describes important internet protocols like TCP/IP, HTTP, and DNS. It also explains client-server architecture, IP addressing, URLs, web browsers, search engines, and common uses of the internet like email, e-commerce, and social media.
This document provides an overview of various application layer protocols including HTTP, HTTPS, SMTP, POP3, FTP, SFTP, SCP, Telnet, and SSH. It describes each protocol, including what they are used for and how they differ. Some key points:
- HTTP and HTTPS are used to access data on the world wide web, with HTTPS providing encryption for secure transactions.
- SMTP and POP3 are used for email, with SMTP sending messages between servers and POP3 allowing users to receive messages from their inbox.
- FTP and SFTP are used for file transfer, with SFTP encrypting data for security unlike regular FTP. SCP also provides secure file transfer.
- Tel
Network protocols allow connected devices to communicate regardless of differences. A protocol is a set of rules that govern all aspects of communication between peers. Common network protocols include TCP, UDP, ICMP, and HTTP. TCP establishes connections to reliably deliver data. UDP prioritizes speed over reliability. ICMP reports network errors while HTTP transfers web page content. Together these protocols enable the functioning of the internet.
This document provides an overview of how clients and servers interact and the features and functions of various server and client software. It discusses how web servers, email servers, FTP clients, Telnet clients, newsgroup clients, and gopher clients work and interact with their respective server software. It covers topics like protocols, interfaces, log files, virtual hosting, access control, and more for different types of client and server applications.
This document provides an overview of application layer protocols in the TCP/IP model. It discusses how the application layer provides services to users through logical connections. It describes standard protocols like HTTP and how nonstandard protocols can also be used. It explains the client-server and peer-to-peer paradigms used by application layer protocols to communicate. It provides details on the World Wide Web architecture and protocols like HTTP that power the web. It discusses web documents like static, dynamic, and active pages and how cookies can be used to maintain state across requests.
Introduction to the Internet and Web.pptxhishamousl
The document provides an introduction to the Internet and the World Wide Web. It defines the Internet as a global network of interconnected computer networks, and notes that no single entity controls it. It describes how the World Wide Web uses common protocols to allow computers to share text, graphics, and multimedia over the Internet. It also defines key concepts like URLs, domains, IP addresses, browsers, servers, and the client-server model.
The document provides an introduction to the Internet and World Wide Web. It describes how the Internet connects hundreds of thousands of networks globally through cyberspace rather than physical space. It does not have centralized management but relies on agreed standards. The Web consists of linked web pages hosted on servers and accessed via browsers using URLs. Information is found through search engines that allow searching by topic or keywords.
Presentation on Application layer_201.pdfprince2412001
A Network application is an application running on one host and provides a
communication to another application running on a different host.
▪ A network application development is writing programs that run on different
end systems and communicate with each other over the network.
▪ In the Web application there are two different programs that communicate with each other:
✔ Browser program running in the user's host.
✔ Web server program running in the Web server host.
Host
Host
2
Network Applications - Examples
▪ Email
▪ Web
▪ Remote Login
▪ P2P File Sharing
▪ Multi-user Network Games
▪ Streaming Stored Video (YouTube)
▪ Voice Over IP (Skype)
▪ Real-time Video Conference
▪ Social Networking
3
Network Application Architecture
1. Client-Server architecture
2. P2P (Peer to Peer) architecture
4
1. Client-Server Architecture
Client
Server:
✔ Its always-on host.
✔ It has a fixed IP address.
✔ Large cluster of host – Data Centers.
✔ E.g. Web Server
Client:
✔ It communicate with server.
✔ Its not like continuously connected.
✔ May have dynamic IP addresses.
✔ Do not communicate directly with each other.
✔ E.g. PCs, Mobiles
Server
5
2. P2P Architecture
Peer
▪ Peers (end systems) directly communicate.
▪ Get peers request service from other peers, provide service to other peers.
✔ Self Scalability – New peers bring new service capacity, as well as new service demands.
▪ Peers are alternatingly connected and change IP addresses.
✔ Complex management 6
Peer
Peer
Process Communicating
▪ What is Process?
▪ A process is an instance of a program running in a computer.
▪ We can say that process is program under execution.
▪ Within same host, two processes communicate using inter-process communication (IPC).
▪ Process in different hosts communicate by exchanging messages.
▪ Client process: A process that initiates communication.
▪ Server process: A process that waits to be contacted.
Process P1
Process P2
7
Socket
▪ A process sends messages into, and receives messages from; the
network through a software interface called a socket.
▪ A process is similar to a house and its socket is similar to its door.
✔ Sending process passes message out door.
✔ Sending process relies on transport infrastructure on other side of door to deliver message to socket at receiving process.
Process
application
proce ss
transport
network
link
physical
application
proce ss
transport
network
link
physical
socket
controlled by app developer
controlled
by OS
Internet
Socket
8
Transport Services to Applications
▪ Recall that a socket is the interface between the application process and the transport layer protocol.
▪ For develop an application, choose available transport layer protocol.
▪ Pick the protocol with the services that best match the needs of your application.
The document provides an overview of technologies used in building websites and web applications. It discusses client-side technologies like HTML, CSS, JavaScript, and server-side technologies like PHP, ASP, and databases. It also defines key concepts like protocols (TCP, HTTP), browsers, the differences between the internet, intranet and how they are used.
It provides additional features like spell checking, grammar checking,
translation etc.
Networking: It handles all the networking tasks like establishing connection with
server, sending and receiving HTTP requests and responses.
UI Backend: It provides platform specific implementation for user interface.
Data Storage: It stores cookies, cache, bookmarks, history etc.
Plug-ins: It provides support for additional features like Flash, PDF, media players
etc.
JavaScript Interpreter: It interprets and executes the JavaScript code embedded in
web pages.
Browser Security: It provides security features like sandboxing, same-origin policy,
digital signatures etc.
Browser Extensibility: It allows third party extensions to add
Protocols define rules for formatting and transmitting data across networks. Common protocols include TCP/IP, HTTP, FTP, and SMTP. IP is the core Internet protocol that handles packet routing. TCP provides reliable data transmission and reassembles packets. HTTP is used for web pages, FTP for file transfer, and SMTP for email.
IT2255 Web Essentials - Unit I Website Basicspkaviya
Internet Overview – Fundamental computer network concepts – Web Protocols – URL – Domain Name – Web Browsers and Web Servers – Working principle of a Website – Creating a Website – Client-side and server-side scripting.
Protocols define rules for formatting and processing data on a network. Some common protocols are TCP/IP, HTTP, FTP, and SMTP. TCP/IP provides reliable data transmission and IP delivers packets across networks. HTTP is the protocol for the World Wide Web and FTP transfers files between hosts using two channels. SMTP is used for email over IP networks.
FTP uses ports 20 and 21 to transfer files between a client and server over TCP/IP networks like the internet. There are two transfer modes - active mode where the server connects to the client's data port, and passive mode where the client initiates both connections to the server's ports. HTTP is a request/response protocol used to transfer web pages over the internet, with clients like browsers making requests on port 80 to web servers, which respond with files, data, or error messages. Web servers translate URL paths to local file system paths and serve index files like index.html when directories are requested. HTTPS adds encryption and authentication to standard HTTP using port 443.
Protocols define rules for formatting and processing data on a network. Some common protocols are TCP/IP, HTTP, FTP, and SMTP. TCP/IP provides reliable data transmission and IP delivers packets across networks. HTTP is the protocol for the World Wide Web and FTP transfers files between hosts using two channels. SMTP is used for email over IP networks.
Protocols define rules for formatting and transmitting data over a network. Common protocols include TCP/IP, HTTP, FTP, and SMTP. TCP/IP provides reliable data transmission and IP specifies packet delivery. HTTP is the protocol for web pages and hyperlinks. FTP transfers files between hosts using separate channels for commands and data. SMTP enables email transmission over IP networks.
18CS52 VTU Computer Network & Security
MODULE 1-Part 1
Principles of Network Applications: Network Application Architectures, Processes Communicating, Transport Services Available to Applications, Transport Services Provided by the Internet, Application-Layer Protocols. The Web and HTTP: Overview of HTTP, Non-persistent and Persistent Connections, HTTP Message Format, User-Server Interaction: Cookies, Web Caching, The Conditional GET, File Transfer: FTP Commands & Replies, Electronic Mail in the Internet: SMTP, Comparison with HTTP, Mail Message Format, Mail Access Protocols
The document provides an overview of the history and workings of the internet. It discusses how ARPAnet was developed in the 1960s as a military network which later became the foundation for the commercial internet. It describes important internet protocols like TCP/IP, HTTP, and DNS. It also explains client-server architecture, IP addressing, URLs, web browsers, search engines, and common uses of the internet like email, e-commerce, and social media.
This document provides an overview of various application layer protocols including HTTP, HTTPS, SMTP, POP3, FTP, SFTP, SCP, Telnet, and SSH. It describes each protocol, including what they are used for and how they differ. Some key points:
- HTTP and HTTPS are used to access data on the world wide web, with HTTPS providing encryption for secure transactions.
- SMTP and POP3 are used for email, with SMTP sending messages between servers and POP3 allowing users to receive messages from their inbox.
- FTP and SFTP are used for file transfer, with SFTP encrypting data for security unlike regular FTP. SCP also provides secure file transfer.
- Tel
Network protocols allow connected devices to communicate regardless of differences. A protocol is a set of rules that govern all aspects of communication between peers. Common network protocols include TCP, UDP, ICMP, and HTTP. TCP establishes connections to reliably deliver data. UDP prioritizes speed over reliability. ICMP reports network errors while HTTP transfers web page content. Together these protocols enable the functioning of the internet.
This document provides an overview of how clients and servers interact and the features and functions of various server and client software. It discusses how web servers, email servers, FTP clients, Telnet clients, newsgroup clients, and gopher clients work and interact with their respective server software. It covers topics like protocols, interfaces, log files, virtual hosting, access control, and more for different types of client and server applications.
This document provides an overview of application layer protocols in the TCP/IP model. It discusses how the application layer provides services to users through logical connections. It describes standard protocols like HTTP and how nonstandard protocols can also be used. It explains the client-server and peer-to-peer paradigms used by application layer protocols to communicate. It provides details on the World Wide Web architecture and protocols like HTTP that power the web. It discusses web documents like static, dynamic, and active pages and how cookies can be used to maintain state across requests.
Introduction to the Internet and Web.pptxhishamousl
The document provides an introduction to the Internet and the World Wide Web. It defines the Internet as a global network of interconnected computer networks, and notes that no single entity controls it. It describes how the World Wide Web uses common protocols to allow computers to share text, graphics, and multimedia over the Internet. It also defines key concepts like URLs, domains, IP addresses, browsers, servers, and the client-server model.
The document provides an introduction to the Internet and World Wide Web. It describes how the Internet connects hundreds of thousands of networks globally through cyberspace rather than physical space. It does not have centralized management but relies on agreed standards. The Web consists of linked web pages hosted on servers and accessed via browsers using URLs. Information is found through search engines that allow searching by topic or keywords.
Presentation on Application layer_201.pdfprince2412001
A Network application is an application running on one host and provides a
communication to another application running on a different host.
▪ A network application development is writing programs that run on different
end systems and communicate with each other over the network.
▪ In the Web application there are two different programs that communicate with each other:
✔ Browser program running in the user's host.
✔ Web server program running in the Web server host.
Host
Host
2
Network Applications - Examples
▪ Email
▪ Web
▪ Remote Login
▪ P2P File Sharing
▪ Multi-user Network Games
▪ Streaming Stored Video (YouTube)
▪ Voice Over IP (Skype)
▪ Real-time Video Conference
▪ Social Networking
3
Network Application Architecture
1. Client-Server architecture
2. P2P (Peer to Peer) architecture
4
1. Client-Server Architecture
Client
Server:
✔ Its always-on host.
✔ It has a fixed IP address.
✔ Large cluster of host – Data Centers.
✔ E.g. Web Server
Client:
✔ It communicate with server.
✔ Its not like continuously connected.
✔ May have dynamic IP addresses.
✔ Do not communicate directly with each other.
✔ E.g. PCs, Mobiles
Server
5
2. P2P Architecture
Peer
▪ Peers (end systems) directly communicate.
▪ Get peers request service from other peers, provide service to other peers.
✔ Self Scalability – New peers bring new service capacity, as well as new service demands.
▪ Peers are alternatingly connected and change IP addresses.
✔ Complex management 6
Peer
Peer
Process Communicating
▪ What is Process?
▪ A process is an instance of a program running in a computer.
▪ We can say that process is program under execution.
▪ Within same host, two processes communicate using inter-process communication (IPC).
▪ Process in different hosts communicate by exchanging messages.
▪ Client process: A process that initiates communication.
▪ Server process: A process that waits to be contacted.
Process P1
Process P2
7
Socket
▪ A process sends messages into, and receives messages from; the
network through a software interface called a socket.
▪ A process is similar to a house and its socket is similar to its door.
✔ Sending process passes message out door.
✔ Sending process relies on transport infrastructure on other side of door to deliver message to socket at receiving process.
Process
application
proce ss
transport
network
link
physical
application
proce ss
transport
network
link
physical
socket
controlled by app developer
controlled
by OS
Internet
Socket
8
Transport Services to Applications
▪ Recall that a socket is the interface between the application process and the transport layer protocol.
▪ For develop an application, choose available transport layer protocol.
▪ Pick the protocol with the services that best match the needs of your application.
The document provides an overview of technologies used in building websites and web applications. It discusses client-side technologies like HTML, CSS, JavaScript, and server-side technologies like PHP, ASP, and databases. It also defines key concepts like protocols (TCP, HTTP), browsers, the differences between the internet, intranet and how they are used.
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...Infopitaara
A Boiler Feed Pump (BFP) is a critical component in thermal power plants. It supplies high-pressure water (feedwater) to the boiler, ensuring continuous steam generation.
⚙️ How a Boiler Feed Pump Works
Water Collection:
Feedwater is collected from the deaerator or feedwater tank.
Pressurization:
The pump increases water pressure using multiple impellers/stages in centrifugal types.
Discharge to Boiler:
Pressurized water is then supplied to the boiler drum or economizer section, depending on design.
🌀 Types of Boiler Feed Pumps
Centrifugal Pumps (most common):
Multistage for higher pressure.
Used in large thermal power stations.
Positive Displacement Pumps (less common):
For smaller or specific applications.
Precise flow control but less efficient for large volumes.
🛠️ Key Operations and Controls
Recirculation Line: Protects the pump from overheating at low flow.
Throttle Valve: Regulates flow based on boiler demand.
Control System: Often automated via DCS/PLC for variable load conditions.
Sealing & Cooling Systems: Prevent leakage and maintain pump health.
⚠️ Common BFP Issues
Cavitation due to low NPSH (Net Positive Suction Head).
Seal or bearing failure.
Overheating from improper flow or recirculation.
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...Infopitaara
A feed water heater is a device used in power plants to preheat water before it enters the boiler. It plays a critical role in improving the overall efficiency of the power generation process, especially in thermal power plants.
🔧 Function of a Feed Water Heater:
It uses steam extracted from the turbine to preheat the feed water.
This reduces the fuel required to convert water into steam in the boiler.
It supports Regenerative Rankine Cycle, increasing plant efficiency.
🔍 Types of Feed Water Heaters:
Open Feed Water Heater (Direct Contact)
Steam and water come into direct contact.
Mixing occurs, and heat is transferred directly.
Common in low-pressure stages.
Closed Feed Water Heater (Surface Type)
Steam and water are separated by tubes.
Heat is transferred through tube walls.
Common in high-pressure systems.
⚙️ Advantages:
Improves thermal efficiency.
Reduces fuel consumption.
Lowers thermal stress on boiler components.
Minimizes corrosion by removing dissolved gases.
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
How to use nRF24L01 module with ArduinoCircuitDigest
Learn how to wirelessly transmit sensor data using nRF24L01 and Arduino Uno. A simple project demonstrating real-time communication with DHT11 and OLED display.
This paper proposes a shoulder inverse kinematics (IK) technique. Shoulder complex is comprised of the sternum, clavicle, ribs, scapula, humerus, and four joints.
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
This presentation provides a high level insight about DFT analysis and test coverage calculation, finalizing test strategy, and types of tests at different levels of the product.
☁️ GDG Cloud Munich: Build With AI Workshop - Introduction to Vertex AI! ☁️
Join us for an exciting #BuildWithAi workshop on the 28th of April, 2025 at the Google Office in Munich!
Dive into the world of AI with our "Introduction to Vertex AI" session, presented by Google Cloud expert Randy Gupta.
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
With the increased use of Artificial Intelligence (AI) in malware analysis there is also an increased need to
understand the decisions models make when identifying malicious artifacts. Explainable AI (XAI) becomes
the answer to interpreting the decision-making process that AI malware analysis models use to determine
malicious benign samples to gain trust that in a production environment, the system is able to catch
malware. With any cyber innovation brings a new set of challenges and literature soon came out about XAI
as a new attack vector. Adversarial XAI (AdvXAI) is a relatively new concept but with AI applications in
many sectors, it is crucial to quickly respond to the attack surface that it creates. This paper seeks to
conceptualize a theoretical framework focused on addressing AdvXAI in malware analysis in an effort to
balance explainability with security. Following this framework, designing a machine with an AI malware
detection and analysis model will ensure that it can effectively analyze malware, explain how it came to its
decision, and be built securely to avoid adversarial attacks and manipulations. The framework focuses on
choosing malware datasets to train the model, choosing the AI model, choosing an XAI technique,
implementing AdvXAI defensive measures, and continually evaluating the model. This framework will
significantly contribute to automated malware detection and XAI efforts allowing for secure systems that
are resilient to adversarial attacks.
2. WEBSITE
• A website is defined as a collection of web pages linked together that
has a unique domain name, that can be accessed from anywhere
across the globe over internet.
• It is hosted by a web server and viewed by web clients
• It can be developed in HTML, JavaScript, DHTML, PHP, etc.
3. Internet
• Internet is a world-wide global system of interconnected computer
networks.
• Internet uses the standard Internet Protocol (TCP/IP).
• Every computer in internet is identified by a unique IP address.
• IP Address is a unique set of numbers (such as 110.22.33.114) which
identifies a computer location.
• A special computer DNS (Domain Name Server) is used to give name to
the IP Address so that user can locate a computer by a name.
• For example, a DNS server will resolve a name
http://www.tutorialspoint.com to a particular IP address to uniquely
identify the computer on which this website is hosted.
• Internet is accessible to every user all over the world.
4. Internet Evolution
• The concept of Internet was originated in 1969 and has undergone several
technological & Infrastructural changes as discussed below:
• The origin of Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
• ARPANET was developed by United States Department of Defense.
• Basic purpose of ARPANET was to provide communication among the various
bodies of government.
• Initially, there were only four nodes, formally called Hosts.
• In 1972, the ARPANET spread over the globe with 23 nodes located at different
countries and thus became known as Internet.
• By the time, with invention of new technologies such as TCP/IP protocols, DNS,
WWW, browsers, scripting languages etc.,Internet provided a medium to publish and
access information over the web.
6. Basic Internet Protocol:
• Transmission Control Protocol (TCP)
• TCP is a connection oriented protocol and offers end-to-end packet delivery. It acts as back bone for
connection.It exhibits the following key features:
• Transmission Control Protocol (TCP) corresponds to the Transport Layer of OSI Model.
• TCP is a reliable and connection oriented protocol.
• TCP offers:
• o Stream Data Transfer.
• o Reliability.
• o Efficient Flow Control
• o Full-duplex operation.
• o Multiplexing.
• TCP offers connection oriented end-to-end packet delivery.
• TCP ensures reliability by sequencing bytes with a forwarding acknowledgement number that indicates to
the destination the next byte the source expect to receive.
• It retransmits the bytes not acknowledged with in specified time period.
7. Internet Protocol (IP)
• Internet Protocol is connectionless and unreliable protocol. It ensures
no guarantee of successfully transmission of data. In order to make it
reliable, it must be paired with reliable protocol such as TCP at the
transport layer.
• Points to remember:
• The length of datagram is variable.
• The Datagram is divided into two parts: header and data.
• The length of header is 20 to 60 bytes.
• The header contains information for routing and delivery of the
packet.
8. User Datagram Protocol (UDP)
• Like IP, UDP is connectionless and unreliable protocol. It doesn‘t require
making a connection with the host to exchange data. Since UDP is
unreliable protocol, there is no mechanism for ensuring that data sent is
received. UDP transmits the data in form of a datagram.
• Points to remember:
• UDP is used by the application that typically transmit small amount of
data at one time.
• UDP provides protocol port used i.e. UDP message contains both source
and destination port number, that makes it possible for UDP software at
the destination to deliver the message to correct application program.
9. File Transfer Protocol (FTP)
• FTP is used to copy files from one host to another. FTP offers the
mechanism for the same in following manner:
• FTP creates two processes such as Control Process and Data Transfer
Process at both ends i.e. at client as well as at server.
• FTP establishes two different connections: one is for data transfer
and other is for control information.
• Control connection is made between control processes while Data
Connection is made between <="" b="">
• FTP uses port 21 for the control connection and Port 20 for the data
connection.
10. Trivial File Transfer Protocol (TFTP)
• Trivial File Transfer Protocol is also used to transfer the files but it transfers
the files without authentication. Unlike FTP, TFTP does not separate control
and data information. Since there is no authentication exists, TFTP lacks in
security features therefore it is not recommended to use TFTP. Key points
• TFTP makes use of UDP for data transport. Each TFTP message is carried in
separate UDP datagram.
• The first two bytes of a TFTP message specify the type of message.
• The TFTP session is initiated when a TFTP client sends a request to upload
or download a file.
• The request is sent from an ephemeral UDP port to the UDP port 69 of an
TFTP server.
11. World Wide Web
• The Web is the collection of machines (Web servers) on the Internet that provide
information,
• particularly HTML documents, via HTTP.
• Machines that access information on the Web are known as Web clients.
• A Web browser is software used by an end user to access the Web
12. Essential elements of the World Wide Web
are
• 1. web browsers - to surf the Web
• 2. server systems - to supply information to the browsers
• 3. computer networks – supports browser-server communication
13. What is a protocol and http?
• A Protocol is a standard procedure for defining and
regulating communication.
• i.e. TCP, UDP, HTTP, etc.
• HTTP is the foundation of data communication for
the World Wide Web
• The HTTP is the Web’s application-layer protocol for
transferring various forms of data between server and
client such as
• plaintext
• hypertext
• image
• videos and
• Sounds
• etc.
14. HTTP: Hypertext Transport Protocol
• HTTP is a form of communication protocol which specifies how web
clients and servers should communicate.
• The basic structure of HTTP follows a request-response model.
• A client always initiates a request message to the server; the server
generates a response message.
15. HTTP:
• It is the standard protocol for communication between web
browsers and web servers.
• It defines:
• how a client and server establish a connection,
• how the client requests data from the server
• how the server responds to that request
• how data is transferred from the server back to the client.
• and finally, how the connection is closed
• It assumes very little about a particular system, and does not keep
state between different message exchanges.
• This makes HTTP a stateless protocol.
• The communication usually takes place over TCP/IP,
• The default port for TCP/IP is 80, but other ports can also be
used.
16. Hypertext Transport Protocol (HTTP)
• HTTP is based on the request-response communication model:
• Client sends a request
• Server sends a response
• HTTP is a stateless protocol:
• The protocol does not require the server to remember anything about the
client between requests.
• If a particular client asks for the same object twice in a period of a few
seconds, the server does not respond by saying that it just served the object
to the client; instead, the server resends the object, as it has completely
forgotten what it did earlier.
17. HTTP overview (continued)
HTTP is “stateless” ??
• Server maintains no information about past client requests
• Server does not remember any previous requests.
• If a particular client asks for the same object twice in a period of a few
seconds,
• the server does not respond by saying that it just served the object to
the client;
• instead, the server resends the object, as it has completely forgotten
what it did earlier.
• protocols that maintain “state” are complex!
• past history (state) must be maintained
• if server/client crashes, their views of “state” may be inconsistent, must be
reconciled
HTTP: 2-17
18. How http works?
• HTTP is implemented in two programs:
• a client program and a server program,
executing on different end systems,
• talk to each other by exchanging HTTP
messages.
• The HTTP client first initiates a TCP
connection with the server. Once the
connection is established, the browser and
the server processes access TCP through
their socket interfaces.
19. HTTP
• Normally implemented over a TCP connection
• (80 is standard port number for HTTP)
• Typical browser-server interaction:
1. Client
• User enters Web address in browser
• Browser uses DNS to locate IP address
• Browser opens TCP connection to server
• Browser sends HTTP request over connection
2. Server
• Server sends HTTP response to browser over connection
3. Client
• Browser displays body of response in the client area of the browser
window
20. HTTP connections
non-persistent HTTP
• At most one object sent over TCP connection, connection then closed
• Downloading multiple objects required multiple connections
• Separate TCP connection is needed to serve each resource (object).
persistent HTTP
• Multiple objects can be sent over single TCP connection between client and server
• Single TCP connection is needed to serve multiple resources.
• Server leaves the connection open even after serving the request and closes connection on
timeout.
HTTP: 2-20
21. Non-persistent HTTP
suppose user enters URL:
1a. HTTP client initiatesTCP
connection to HTTP server
(process) at
www.just.edu.jo
on port 80
2. HTTP client sends HTTP request
message (containing URL) into TCP
connection socket. Message
indicates that client wants object
from the folders:
Web/SE432/se432.html
1b. HTTP server at host
www.just.edu.jo waiting forTCP
connection at port 80. “accepts”
connection, notifying client
3. HTTP server receives request
message, forms response message
containing requested object, and
sends message into its socket
time
(contains text, and a
references to style.css )
www.just.edu.jo/~zasharif/Web/SE432/se432.html
HTTP: 2-21
22. Non-persistent HTTP (cont.)
5. HTTP client receives response
message containing html file, displays
html. Parsing html file, finds 10
referenced jpeg objects
6. Steps 1-5 repeated for each of the
referenced objects
4. HTTP server closes TCP
connection.
time
24. HTTP request message: general format
• Structure of the request:
1. start line/request
2. header field(s)
3. blank line/empty
4. optional body
25. Example: HTTP request message
• HTTP request message:
• ASCII (human-readable format)
request line
(GET, POST,
HEAD commands)
header
lines
carriage return,
line feed at start
of line indicates
end of header lines
GET /~zasharif/Web/SE432/SE432.html HTTP/1.1rn
Host: www.just.edu.jorn
User-Agent: Firefox/3.6.10rn
Accept: text/html,application/xhtml+xmlrn
Accept-Language: en-us,en;q=0.5rn
Accept-Encoding: gzip,deflatern
Accept-Charset: ISO-8859-1,utf-8;q=0.7rn
Keep-Alive: 115rn
Connection: keep-alivern
rn
carriage return character
line-feed character
26. HTTP Request: Start Line
• Start line
• Example: GET /~zasharif/Web/SE432/SE432.html HTTP/1.1
• Three space-separated parts:
• HTTP request method
• Request-URI (Uniform Resource Identifier)
• Request-URI is the portion of the requested URI that follows the host name (which is
supplied by the required Host header field)
• In addition to http, some other URL schemes are https, ftp, mailto, and file
• HTTP version
• We will cover 1.1, in which version part of start line must be exactly as shown
27. HTTP Request: Common Request Methods
• GET
• Used if link is clicked or address typed in browser
• No message-body in request with GET method
• POST
• Used when submit button is clicked on a form
• Form information contained in the message-body of request
• HEAD
• Requests that only header fields (no body) be returned in the response
28. HTTP Request: Header field(s)
• Header field structure:
• Field-name : Field-value
• Syntax
• Field name is not case sensitive
• Field value may continue on multiple lines by starting continuation lines with white space
• Field values may contain MIME types, quality values, and wildcard characters(*’s)
• Multipurpose Internet Mail Extensions (MIME)
• Standardized way to indicate the nature and format of a document (IETF RFC 6838)
• Convention for specifying content type of a message
• In HTTP, typically used to specify content type of the body of the response
• MIME content type syntax:
• top-level type / subtype
• Examples: text/html, image/jpeg
• Example header field with quality values:
accept: text/xml,text/html;q=0.9,text/plain;q=0.8,
image/jpeg,
image/gif;q=0.2,*/*;q=0.1
29. HTTP Request: Common header fields
• Host: host name from URL (required)
• User-Agent: type of browser sending request
• Accept: MIME types of acceptable documents
• Connection: value close tells server to close connection after single
request/response
• Content-Type: MIME type of (POST) body, normally application/x-www-
form-urlencoded
• Content-Length: bytes in body
• Referrer: URL of document containing link that supplied URI for this HTTP
request
30. HTTP Response
• Structure of the response:
1. status line
2. header field(s)/lines
3. blank line
4. optional body
30
31. Example: HTTP response message
status line
(protocol
status code
status phrase)
header
lines
data, e.g.,
requested
HTML file
HTTP/1.1 200 OKrn
Date: Sun, 26 Sep 2010 20:09:20 GMTrn
Server: Apache/2.0.52 (CentOS)rn
Last-Modified: Tue, 30 Oct 2007 17:00:02 GMTr
n
ETag: "17dc6-a5c-bf716880"rn
Accept-Ranges: bytesrn
Content-Length: 2652rn
Keep-Alive: timeout=10, max=100rn
Connection: Keep-Alivern
Content-Type: text/html; charset=ISO-8859-1rn
rn
data data data data data ...
32. HTTP Response: Common header fields
• Connection, Content-Type, Content-Length
• Date: date and time at which response was generated (required)
• Location: alternate URI if status is redirection
• Last-Modified: date and time the requested resource was last modified on the
server
• Expires: date and time after which the client’s copy of the resource will be out-of-
date
• ETag: a unique identifier (hashcode) for this version of the requested resource
(changes if resource changes)
33. HTTP Response: Status Codes
• The client can initiate requests to the server.
• In return, the server responds with status codes and message payloads
• (i.e. index.html)
• The status code is important and tells the client how to interpret the server response
• The HTTP specification defines certain number ranges for specific types of
responses
• Three-digit number
• First digit is class of the status code:
• 1xx: Informational Messages
• 2xx: Successful
• 3xx: Redirection
• 4xx: Client Error
• 5xx: Server Error
• Other two digits provide additional information
• See http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
And https://www.w3.org/Protocols/rfc2616/rfc2616.html
34. Common Status Codes
• 200 OK
• Everything worked, here’s the data
• 301 Moved Permanently
• requested object moved, new location specified later in this msg (Location:)
• 302 Moved temporarily
• URL temporarily out of service, keep the old one but use this one for now
• 400 Bad Request
• There is a syntax error in your request
• 403 Forbidden
• You can’t do this, and we won’t tell you why
• 404 Not Found
• No such document
• 408 Request Time-out, 504 Gateway Time-out
• Request took too long to fulfill for some reason
• 505 HTTP Version Not Supported
35. Web Client
• Web client is a software that accesses a web server by
sending an HTTP request message and processing the
resulting HTTP response.
• Web Browser is a typical web client.
• IE, Firefox, Safari, etc
• Browser-Wars
• En.wikipedia.org/wiki/Browser_wars
• Each company trying to add features and performance to its
browser in order to increase its market share.
36. Server
• The primary feature of every web server is to accept
HTTP request from web client and return an
appropriate resource (if available) in the HTTP
response.
1. Wait for connection requests from a client.
2. Receive an HTTP request.
3. Finding the requested file and creates an HTTP
response that contains the file in the body of the
response message.