Internet Technology and Web Design
Internet Technology and Web Design
TABLE OF CONTENT
UNIT NUMBER 1/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
1.1 Objectives
1.2 Introduction to Internet
1.2.1 Internet
1.2.2 ARPANET and Internet history of the World Wide Web
1.2.3 Owners of the Internet
1.2.4 Anatomy of Internet
1.3 Growth of Internet
1.3.1 Growth of Internet
1.4 Basic Internet Terminology
1.4.1 Basic Internet Terminology
1.5 Net etiquette
1.5.1 Net etiquette
1.6 Internet Applications
1.6.1 Commerce on the Internet
1.6.2 Governance on the Internet
1.7 Impact of Internet on Society
1.7.1 Impact of Internet on Society
1.7.2 Crime on/through the Internet
1.8 Summary
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of this course, the user will be able to
understand what is Internet.
known about the anatomy of internet.
understand about Net etiquette.
known about the applications of internet
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Internet
• The Internet is a global system of interrelated computer networks that use the
standard Internet Protocol suite (TCP/IP) to serve billions of users worldwide.
• The primary purpose of the internet is sharing of information and communicating
with remote PC's.
• The largest network of networks in the world, joining many government,
university and private computers together and providing an infrastructure for the
use of E-mail, bulletin boards, file archives, hypertext documents, database and
other computational resources.
• The Internet has extremely changed nearly every aspect of life by revolutionizing
how individuals and business,
Access information and electronic files,
Communication personally and professionally,
Shop for products and services,
Share resource.
Topic: 1.2.2 ARPANET and Internet history of the World Wide Web
Anatomy of Internet
• The Internet is an enormous group of computers linked by cable and satellites,
not controlled by any one authority, but all operating under common network
protocols.
• The term 'Internet' includes both the hardware and the software that enable
computers to communicate with each other.
• When information is sent across the Internet, the Transmission Control Protocol
(TCP) first breaks the information up into packets of data.
• The client computer sends those packets to the local network, Internet service
provider (ISP) or online service. From here, the packets travel through many
levels of networks, computers, and communications lines until they reach their
final destinations.
• Many types of hardware help the packets on their way. These are Hubs, Bridges,
Gateways, Repeaters, Routers, Servers, Client Computer, Cable / Satellite
Communications.
• All hardware units need common working methods, basic instructions called
protocols that specify to all parties how the data will be handled.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Growth of Internet
2011
December,
2,497 millions 35.7 % I.T.U.
2012
December,
2,802 millions 39.0 % Internet World Stats
2013
March, 2014
2,937 millions 40.7 % Internet World Stats
(estimate)
• HTTP
HyperText Transfer Protocol - This communication protocol used to connect
to Web servers on the Internet or on a local network (intranet).
• Uploading
Uploading means data is being sent from your computer to the Internet.
Examples of uploading include sending email, posting photos on a social
media site and using user webcam. Even clicking on a link on a web page
sends a tiny data upload.
• Downloading
Downloading means your computer is receiving data from the Internet
Examples of downloading include opening a web page, receiving email,
purchasing music files and watching online videos.
• FTP (File Transfer Protocol)
The File Transfer Protocol (FTP) is the Internet facility for downloading and
uploading files.
If user are uploading a file to another site, user must usually have permission
in advance to access the site and the directory where the file is to be placed.
• Bookmark
It is a function used to save a web page location for future reference.
• ASCII (American Standard Code for Information Interchange)
ASCII character encoding provides a standard way to represent characters
using numeric codes. These include upper and lower-case English letters,
numbers and punctuation symbols.
Lower ASCII, between 32 and 127.
Higher ASCII, between 128 and 255.
• Home page
Home page is a page where the computer will go to when user initially log
onto the Internet.
• Link, Hyperlink
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
It is a text found on a web page which, when clicked, will take the user to
another web location.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Net etiquette
• Communicating with others through Internet without creating misunderstandings
can be challenging because, facial expressions and body language cannot be
interpreted on cyberspace.
• Therefore, attempt to safeguard against these misunderstandings, a technology
called Internet Etiquette is proposed.
• Internet Etiquette is a technology that governs the conduct which is socially
acceptable in an online or digital.
• Internet Etiquette’s is also called as "Netiquette".
• Good netiquette involves respecting others privacy and not doing anything online
that will annoy or frustrate other people.
• Most important areas where good netiquette is highly stressed are e-mail, online
chats, and newsgroups.
• For example, people that spam other users with unnecessary e-mails or flood
them with messages have very bad netiquette.
• The companies, without Internet Etiquette knowledge, could create corporate
embarrassment and can drain the employee.
Guide to Net Etiquette
• Before user join in a newsgroup or discussion board, always they should check
that their questions are relevant to the group. It is a good idea to watch the
conversation before user join in.
• Never respond to vulgar or threatening messages whether in chat, newsgroups
or message boards.
• Always user should leave if the conversation makes them uncomfortable.
• Never hold in a flame war. That is a noisy match (through text) conducted
between 2 or more people.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Virus spreading
• To prevent becoming an Internet crime, online awareness and common sense
are critical.
• Under any circumstances a user should not share personal information (like full
name, address, birth date and Social Security number) to unknown recipients.
Topic: Summary
Model Questions
• What is Internet?
• Explain the basic terminologies of internet.
• Write a brief note on growth of internet.
• What is Net etiquette?
• Explain internet applications.
• Explain about the impact of internet on society.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
1. When information is sent across the Internet, the ______________ first breaks the
information up into packets of data.
a) Transmission control protocol
b) User datagram protocol
c) Internet protocol
d) Session protocol
2. ______________ is the address of the web document currently displayed on the
monitor.
a) TCP
b) ISP
c) URL
d) UDP
3. _______ is a file left on the computer by a website’s browser containing user login,
password, user preferences and other personalized information.
a) Server
b) Cache
c) Backup
d) Cookie
4. The Internet facility for downloading and uploading files are called___________.
a) HTTP
b) FTP
c) ISP
d) URL
5. _____________ is a technology that governs the conduct which is socially
acceptable in an online or digital.
a) Internet
b) Internet crime
c) Internet etiquette
d) Internet theft
Answers:
1.a
2.c
3.d
4.b
5.b
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
Answers:
1.b
2.a
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
Who Rules the Net?: Internet Governance and Jurisdiction edited by Adam D. Thierer,
Clyde Wayne.
TABLE OF CONTENT
UNIT NUMBER 2/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
2.1 Objectives
2.2 Packet Switching Technology
2.2.1 Packet Switching Technology
2.3 Internet Protocols
2.3.1 Introduction to Internet Protocols
2.3.2 Transmission Control Protocol (TCP)
2.3.3 Internet Protocol (IP)
2.3.4 Router
2.4 Internet Addressing Scheme
2.4.1 IP Address
2.4.2 E-mail Addresses
2.4.3 Resource Addresses
2.5 Summary
2.6 Model Questions
Assessment 1
Assessment 2
References
Page | 2
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of the course the student will be able to
know about packet switching technology
understand the concept of internet protocols
learn the internet addressing scheme
Page | 3
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 4
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 5
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 6
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 2.2 : Internet Protocols span the complete range of OSI model layers
Page | 7
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
TCP operation
• The primary purpose of the TCP is to provide reliable, securable logical circuit or
connection service between pairs of processes.
• To provide this service internet communication system requires facilities in the
following areas.
Basic data transfer
Reliability
Flow control
Multiplexing
Connections
• Basic data transfer
TCP is able to both transmit and receive data streams simultaneously, even
though this is opposite to the basic concept of data transmission in many
underlying network technologies.
The TCP is able to transfer a continuous stream of data in each direction
between its users by packaging some number of data into segments for
transmission through the internet system.
Page | 8
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
In general, the TCPs decide when to block and forward data at their own
convenience.
The data unit transmitted from TCP layer is referred to as a segment. The
size of the segments and the timing at which they are sent is generally left to
the TCP module.
TCP applications request that the data is Pushed by instructing the TCP
module to deliver all data up to that point without Maximum Transmission Unit
(MTU).
• Reliability
TCP assigns a sequence number to each byte transmitted and expects a
positive acknowledgment (ACK) from the receiving TCP.
If the ACK is not received within the timeout interval, the data is then
retransmitted.
The receiving TCP uses the sequence numbers to rearrange the segments
when they arrive out of order, and to eliminate duplicate segments.
Page | 9
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 10
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
TCP uses a set of ports which when concatenated with the IP address of the
host, provide a socket that uniquely identifies an application process
anywhere within the internet.
• Connections
The reliability and flow control mechanisms described above require that
TCPs initialize and maintain certain status information for each data stream.
The combination of this information, including sockets, sequence numbers,
and window sizes, is called a connection.
Each connection is uniquely specified by a pair of sockets identifying its two
sides.
When two processes wish to communicate, their TCP must first establish a
connection (initialize status information on both sides).
When the communication is complete, the connection is terminated or closed
to free the resources for other uses.
TCP Header
• The TCP segment comprises of a header, and a variable length data area that
ultimately carries application data.
• TCP header at minimum is 20 bytes long and maximum 60 bytes.
• Source Port (16-bits): Identifies source port of the application process on the
sending device.
• Destination Port (16-bits): Identifies destination port of the application process
on the receiving device.
• Sequence Number (32-bits): Sequence number of data bytes of a segment in a
session.
• Acknowledgement Number (32-bits): When ACK flag is set, this number contains
the next sequence number of the data byte expect and works as
acknowledgement of the previous data received.
• Data Offset (4-bits): This field contains two meaning. First, it tells the size of TCP
header (32-bit words) Secondly, it indicates the offset of data in current packet in
the whole TCP segment.
Page | 11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Reserved (3-bits): Reserved for future use and all are set zero by default.
• Flags (1-bit each):
NS: Nonce Sum bit is used by Explicit Congestion Notification signaling
process.
CWR: When a host receives packet with ECE bit set, it sets Congestion
Windows Reduced to acknowledge that ECE received.
ECE: has two meanings:
If SYN bit is clear to 0, then ECE means that the IP packet has its CE
(congestion experience) bit set.
If SYN bit is set to 1, ECE means that the device is ECT capable
URG: indicates that Urgent Pointer field has significant data and should be
processed.
ACK: indicates that Acknowledgement field has significance. If ACK is cleared
to 0, it indicates that packet does not contain any acknowledgement.
PSH: when set, it is a request to the receiving station to PUSH data (as soon
as it comes) to the receiving application without buffering it.
RST: Reset flag has many features:
It is used to refuse an incoming connection.
It is used to reject a segment.
It is used to restart a connection.
SYN: this flag is used to set up a connection between hosts.
FIN: this flag is used to release a connection and no more data is exchanged
thereafter. Because packets with SYN and FIN flags have sequence
numbers, they are processed in correct order.
TCP Client/server model
• TCP is a peer-to-peer, connection-oriented protocol.
• There are no master/subordinate relationships. The applications, however,
typically use a client/server model for communications.
• A server is an application that offers a service to internet users. A client is a
requester of a service.
Page | 12
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• An application consists of both a server and a client part, which can run on the
same or on different systems.
• Users invoke the client part of the application, which builds a request for a
particular service and sends it to the server part of the application using TCP/IP
as a transport medium.
• The server is a program that receives a request, performs the required service,
and sends back the results in a reply.
Page | 13
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 14
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• IPV6 is replacing IPv4 to accommodate the growing number of networks
worldwide and help solve the IP address problems.
• The newer Internet Protocol version 6 (IPv6) standard features addresses 16
bytes (128 bits) in length. IPv6 uses hexadecimal numbers that are separated by
colons (i.e. fe80::d4a8:6435:d2d8:d9f3b11).
Page | 15
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Router
• Routing is the act of moving information across an internetwork from a source to
a destination.
• Along the way, at least one intermediate node typically is encountered.
• Routing is often contrasted with bridging, which might seem to accomplish
precisely the same thing to the casual observer.
• The primary difference between the two is that bridging occurs at Layer2 (the link
layer) of the OSI-reference model, whereas routing occurs at Layer 3 (the
network layer). This distinction provides routing and bridging with different
information to use in the process of moving information from source to
destination, so the two functions accomplish their tasks in different ways.
• Routing involves two basic activities
Determining optimal routing paths
Transporting information groups (typically called packets) through an
internetwork.
• In the context of the routing process, the latter of these is referred to as packet
switching.
• Although packet switching is relatively straightforward, path determination can be
very complex.
• Switching algorithms is relatively simple; it is the same for most routing protocols.
• In most cases, a host determines that it must send a packet to another host.
• Having acquired a router’s address by some means, the source host sends a
packet addressed specifically to a router’s physical (Media Access Control
(MAC)-layer) address, this time with the protocol (network layer) address of the
destination host.
• As it examines the packet’s destination protocol address, the router determines
that it either knows or does not know how to forward the packet to the next hop.
Page | 16
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• If the router does not know how to forward the packet, it typically drops the
packet.
• If the router knows how to forward the packet, however, it changes the
destination physical address to that of the next hop and transmits the packet.
Page | 17
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
continue to be used and still allows communication with hosts across the
Internet.
NAT achieves its goal by using a valid registered IP address to represent the
private address to the rest of the Internet.
The NAT function changes the private IP addresses to publicly registered IP
addresses inside each IP packet.
Page | 18
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
overloading.
The top part of the figure shows a network with three different hosts
connecting to a web server using TCP. The bottom half of the figure shows
the same network later in the day, with three TCP connections from the same
client.
All six connections connect to the server IP address (170.1.1.1) and WWW
port (80, the well-known port for web services).
In each case, the server differentiates between the various connections
because their combined IP address and port numbers are unique.
NAT takes advantage of the fact that the server really doesn’t care if it has
one connection each to three different hosts or three connections to a single
host IP address. So, to support lots of inside private IP addresses with only a
few global, publicly registered IP addresses, NAT overload uses Port Address
Translation (PAT).
Instead of just translating the IP address, it also translates the port number.
Page | 19
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
NAT overload can use more than 65,000 port numbers, allowing it to scale
well without needing very many registered IP addresses, in many cases, like
in small Office/Home Networks, needing only one.
Taking the device called a 'router' by most users apart, it contains different
components.
The following FIG show the different components out. These are a
hub/switch, the router and a DSL/Cable modem.
Page | 20
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
IP Address
• As with any other network-layer protocol, the IP addressing scheme is integral to
the process of routing IP datagrams through an internetwork.
• Each IP address has specific components and follows a basic format. These IP
addresses can be subdivided and used to create addresses for subnetworks.
• Each host on a TCP/IP network is assigned a unique 32-bit logical address that
is divided into two main parts
Network number
Host number
• Network Number
The network number identifies a network and must be assigned by the
Internet Network Information Center (InterNIC) if the network is to be part of
the Internet.
An Internet Service Provider (ISP) can obtain blocks of network addresses
from the InterNIC and can itself assign address space as necessary.
• Host number
The host number identifies a host on a network and is assigned by the local
network administrator.
• IP Address Format
The 32-bit IP address is grouped eight bits at a time, separated by dots, and
represented in decimal format (known as dotted decimal notation).
Each bit in the octet has a binary weight (128, 64, 32, 16, 8, 4, 2, 1).
The minimum value for an octet is 0, and the maximum value for an octet is
255.
The following FIG 2.9 shows the basic format of an IP address. An IP address
consists of 32 bits, grouped into four octets.
Page | 21
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 22
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 23
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 24
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
E-mail Addresses
• Email is a message distributed by electronic means from one computer user to
one or more recipients via a network.
• One of the many similarities between email and regular mail is the need for
addressing.
• For a message to be delivered, it is necessary for the sender to specify the
recipient and provide a reasonable amount of information to indicate how and
where the recipient can be reached.
• In TCP/IP email, a standard electronic mail address format is used for this, and
support is also provided for alternative addressing schemes that may be used in
special cases.
• All communication on an internetwork requires some way of specifying the
identity of the intended recipient of the communication.
• Most application protocols, such as the File Transfer Protocol (FTP) and
Hypertext Transfer Protocol (HTTP), use conventional TCP/IP contracts, IP
addresses and port numbers to specify the destination of information to be sent.
• The IP address normally identifies a particular host computer, and the port
number indicates a software process or application running on that computer.
• E-mail, however uses a model for communication that differs from most
applications.
• Email is not sent from one machine to another, as a file is transferred using FTP.
Instead, it is sent from one user to another. This is critical to the operation of the
entire system.
• For one thing, it allows someone to retrieve email that has been sent from any
number of different client computers. This allows the recipient to receive email
even when traveling, for example.
• Since e-mail messaging is user-based, the addressing scheme must also user-
Page | 25
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
based.
• User cannot use conventional IP addresses and ports, so they need a distinct
system that specifies two primary pieces of information such as, who the user is
and where the user is located. These are, of course, analogous to a name and
address on a regular mail envelope.
• The idea of the user name is relatively straightforward but identifying the location
of the user is not.
• In regular mail, an address refers to a physical place. It would have been
possible to define email addresses in the same way, that is, to have an email
address refer to the user's client machine.
• However, recall the other important characteristic of email delivery, it is indirect
and based on the concept of a user's local Simple Mail Transfer Protocol (SMTP)
server holding received messages until they can be retrieved.
• The machine that the user employs to access their email may not even routinely
be connected to the Internet, and it may thus not be easy to identify. And they
also want a user to be able to access email from multiple machines.
• For all these reasons, people want addresses to identify not the user's specific
location at any particular time, but the place where the user's permanent mailbox
lives, on the user's SMTP server which is permanently connected to the Internet.
Page | 26
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Resource Addresses
• When user using the web their browser act as a client program on their behalf.
• In order to fulfill their request, their browser will contact server, and ask for either
information or a service of some type.
URL(Uniform Resource Locator)
• URLs provide a standard way to specify the exact location and name of just
about any Internet resource.
• In general, most, URLs have one of two common formats
scheme://host_name/description
scheme: description
• Example 1: http://www.bryanadams.com/bryan
This example describes a particular web page on a computer.
The URL begins with a name, indicating a specific type of resource.( The
name comes from the protocol used to send and receive such information :
Hypertext Transfer Protocol)
• URLs and Host Names
List of schemes used with URLs are in the below table
Some examples of URLs that contain a host name
http://www.wendy.com/~wendy
fttp://ftp.uu.net/usenet/news.answers/alt_tech/pointers.z
telnet://nightmare.internet.com:1701/
Page | 27
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Scheme Meaning
ftp File accessed via file transfer protocol
gopher Gopher resource
http Hypertext resource
Mail to Mail a message to the specified
address
news Usenet newsgroup
telnet Interactive telnet session
wais Access a WAIS database
Page | 28
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
To analyze such a URL look at each of the parts
The scheme (HTTP) identifies this resource as being hypertext.
The host name is the name of the computer.
The path name shows where on the host the hypertext resource is stored.
Page | 29
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Topic : Summary
Summary
Page | 30
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Model Questions
• What is packet switching?
• Explain TCP/IP
• Describe IP addressing
• Define e-mail and resource addresses
Page | 31
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
1. The ___________ is a set of rules governing the format of data sent over the
internet or other network.
a) Transmission control protocol
b) User datagram protocol
c) Internet protocol
d) Session protocol
2. In IP packet __________ specifies the length, in bytes, of the entire IP packet,
including the data and header.
a) IP Header Length
b) Total Length
c) Fragment Offset
d) Header Checksum
3. ____________indicates the upper-layer protocol receives incoming packets after IP
processing is complete.
a) Source address
b) Data
c) Protocol
d) Header Checksum
4. The ___________ identifies a host on a network and is assigned by the local
network administrator.
a) Source address
b) IP address classes
c) Network number
d) Host number
5. _________ the general form of the name of a file or directory, specifies a unique
location in a file system.
a) Source name
b) Path name
c) URL and Port number
d) Host number
Answers:
1.c
2.b
3.c
4.d
5.b
Page | 32
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
Answers:
1.a
2.a
3.b
Page | 33
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
Page | 34
Course : INTERNET TECHNOLOGY AND WEB DESIGN
TABLE OF CONTENT
UNIT NUMBER 3/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
3.1 Objectives
3.2 Internet Connectivity
3.3 Connectivity Types
3.3.1 Level One Connectivity
3.3.2 Level Two Connectivity
3.3.3 Level Three Connectivity
3.4 Setting up a Connection
3.4.1 Hardware Requirement
3.4.2 Selection of a Modem
3.4.3 Software Requirement
3.4.4 Modem Configuration
3.5 Internet accounts by ISP
3.5.1 Telephone line options
3.5.2 Protocol options
3.5.3 Service options
3.6 Summary
3.7 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of this course, the user will be able to
Understand what is Internet connectivity
Known about how to set up the connection
Understand about telephone line options
Known about the protocol options
Understand about the service options
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Internet Connectivity
• There are various type of connectivity to get hook on to internet.
• They all can be broadly classified into following category.
Level one connection
Level two connection
Level three connection
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Shell Connection
TCP/IP Connection
ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Shell Connection
In this type of Internet Connection, the user will get only textual matter of a
Web Page.
Shell Accounts were the only type of Internet access available for many
years before the Internet entered in to the world of graphics and became
more users friendly.
• TCP/IP Connection
Today’s graphical World Wide Web browsers provide easier access with
multimedia sound and pictures.
The major difference between Shell and TCP/IP account is that, Shell
account can only display text and does not support graphics display,
whereas TCP/IP can display both.
• ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
ISDN (Integrated Services Digital Network) offers Internet connectivity at
speeds of up to 128 Kbps through the use of digital phone lines. ISDN is a
dial-up service that has been provided by telephone companies for many
years.
Computer
Modem
Telephone Connection
Hardware Requirement
• Computer the minimum hardware requirements are as follows.
Windows XP, Vista, or later
1.0 GHz or faster processor
1 or more gigabytes (GB) of RAM
Sound card and speakers
DVD drive
Monitor capable of 24-bit color at 1,024 x 768 resolution or better
• Internet
DSL or Cable connection through an Internet Service Provider (ISP).
Account plans offering a minimum of 1.5 MB download and 512 upload speed
is recommended.
AOL may require special set up with AOL tech support.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Selection of a Modem
• While selecting a modem do the following.
• Check the service
Depending on whether user has cable or DSL service, a user needs a
different kind of modem.
If user is establishing new service, determine which type of broadband
service they have access to before purchasing a modem.
Be sure that user is aware of the different features of the two types of
broadband Internet before making a decision or signing a broadband
contract.
• Ensure interfaces
It is important that user select a robust broadband modem that is able to
connect to the device.
Ensure that the prospective broadband modem is capable of connecting to
the device through one of its available interfaces such as USB, PC card,
serial port or PCI/ISA port.
Check which interface is available for connection on the device before user
head to the store to make a purchase.
• Don't overlook leasing a modem
One easy way to make a decision about the broadband modem is to lease
one from the Internet service provider.
By leasing one, user is able to pay a low monthly fee and ensure that it is
suitable for the service.
The Internet service provider is able to assist user in selecting a modem that
works well with both the device and the equipment for the best speed and
performance.
• Don't forget about price considerations
If user is set on purchasing their own modem, set a price to pay before
heading to the store.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
An internal modem is priced the lowest, while external and USB modems are
more expensive.
PC card modems are also an inexpensive choice to gain connectivity.
Shop around within the price range to determine which is the best selection
for the budget
Broadband modems bring with them lots of options and variety.
Ensure that user is knowledgeable of all the necessary components to make
a smart decision when heading out to find a suitable modem to run the home
network.
Software Requirement
• Operating System
Windows XP Pro or Home Edition. (Vista probably works but hasn’t tested
that yet. Mac or Linux may be OK but it cannot provide much support.)
• Security
This is a very important concern. There will be those who will try to gain
access to the PC, perhaps by finding a way to crash the AED software and
get to the Desktop.
• Here are six security measures that can be taken.
Minimal, Non-Administrator account
Anti-Virus
AED loop-forever script
PC lock down software
NO LINKS in content (that you create and add to your display)
Hide the keyboard.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Modem Configuration
• This is the most important part and requires only one time customization.
• Connect the Modem to the Power Supply Adapter.
• Next connect the Ethernet Cable from the Modem Ethernet Port to the
Ethernet Port on the PC and wait for the PC/USB light to flash constantly.
This means that the Modem has successfully integrated to the LAN system.
• Now open up a Browser and in the Address Bar type http://192.168.1.1/. This
will take to the Modem Configuration page.
• Enter user name: admin and password: admin when prompted.
• If it fails to authenticate then check the ISP manual to get the user name and
password.
• Now click on the “Internet Connection” tab on the left.
• Once successfully logged in, the Modem will display the device info on the
screen.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
ISDN Services
• ISDN telephony
• ISDN telecopy
• ISDN and analog terminals
• Call forwarding
• Call waiting
• CLIP (Calling Line Identification Presentation)
• CLIR (Calling Line Identification Restriction)
• Three-party conference
• Advice of change
• Malicious call identification
Advantages of ISDN
• Digital services with less error.
• Direct fast connection with no dialing.
• Higher bandwidth (Takes less time in downloading material).
• Supports multiple users.
• Able to use ISDN for more than one task.
Disadvantages of ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• ISDN is more expensive to install than a standard telephone.
• Not easy to set up.
• All exchanges do not provide ISDN service.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Protocol Options
Secure Shell (SSH)
• Secure Shell or SSH is a network protocol that allows data to be exchanged
using a secure channel between two networked devices.
• It is used primarily on Linux and Unix based system to access shell accounts,
SSH was designed as a replacement for Telnet and other in secure remote
shells, which send information, notably passwords, in plain text, leaving them
open for interception.
• The encryption used by SSH provides confidentially and integrity of data over
an insecure network, such as the Internet.
• SSH is typically used to log into a remote machine and execute commands
SLIP
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of
the Internet Protocol designed to work over serial ports and modem
connections.
• SLIP (on PCs) has been largely replaced by the Point-to-Point Protocol
(PPP), which is better engineered, has more features and does not require its
IP address configuration to be set before it is established.
• SLIP does not provide error detection, therefore SLIP on its own is not
satisfactory over an error-prone dial-up connection.
• SLIP is a protocol for connection to the Internet via a dial-up connection.
Service Options
E-mail
• E-mail (electronic mail) is the exchange of computer stored messages by
telecommunication.
• E-mail is a system of worldwide communication in which a computer user can
compose a message at one terminal that can be regenerated at the
recipient’s terminal when user Logs in.
• Thus E-mail is a system of sending and receiving messages electronically
over a network, as between personal computers.
WWW
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The World Wide Web (commonly abbreviated as WWW) is a system of
interlinked hypertext documents accessed via the Internet.
• The World Wide Web enabled the spread of information over the Internet
through an easy-to-use and flexible format.
• It thus played an important role in popularizing the use of internet.
Topic: Summary
Summary
• In this class, user have learnt about,
Setting up a connection
ISDN
Model Questions
• Explain different levels of connectivity.
• What is ISDN?
• Explain the services of ISDN.
• Explain protocol options of Internet Accounts by ISP.
• Explain service options of Internet Accounts by ISP.
• Write short notes on ISPs.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
Answers:
1.d
2.a
3.b
4.c
5.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
Answers:
1.b
2.a
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
1. Internet Technology and Web Design by Isrd.
Course : INTERNET TECHNOLOGY AND WEB DESIGN
Module : Internet Network
TABLE OF CONTENT
UNIT NUMBER 4/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
4.1 Objectives
4.2 Network Definition
4.2.1 Network Definition
4.3 Common Terminologies
4.3.1 LAN
4.3.2 LAN Applications
4.3.3 WAN
4.3.4 WAN Connection Types
4.3.5 Node
4.3.6 Host
4.3.7 Workstation
4.3.8 Bandwidth
4.3.9 Interoperability
4.3.10 Network Administrator
4.3.11 Network Security
4.4 Network Components
4.4.1 Severs
4.4.2 Clients
4.4.3 Communication Media
4.5 Types of Network
4.5.1 Peer to Peer
4.5.2 Client Server
4.6 Addressing in Internet
4.6.1 DNS
4.6.2 Domain Name and their Organization
4.6.3 Understanding the Internet Protocol Address
4.7 Network Topologies
4.7.1 Bus
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
4.7.2 Star
4.7.3 Ring
4.8 Ethernet
4.8.1 Ethernet
4.9 FDDI
4.9.1 FDDI
4.10 ATM
4.10.1 ATM
4.11 Intranet
4.11.1 Intranet
4.12 Summary
4.13 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of this course, the user will be able to
Understand what is network
Know about the network terminologies
Know about the components of network
Understand about network types
Understand about the internet addressing
Know about the network topology and their connections
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Network Definition
• A network is any collection of independent computers that communicate with one
another over a shared medium.
• A computer network is a collection of two or more connected computers.
• When these computers are joined in a network, people can share files and
peripherals such as modems, printers and tape backup drives.
• The computers on a network may be linked through cables, telephone
lines, radio waves, satellites etc.
• The resources to be shared can include hardware (e.g., a printer), software (e.g.,
an application program), or data.
• The most common LAN topologies are bus, ring, and star. Early LANs had data
rates in the 4 to 16 megabits per second (Mbps) range.
• Wireless LANs are the newest evolution in LAN technology.
• LANs are configured in any one of two basic structures. Such as
Peer-to-Peer
Client/Server
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
LAN Applications
• LANs are mostly used in office environment.
• In an office environment it is mainly used for three purposes.
Sharing
Interoffice Communication
Internet Communication
• Sharing
Sharing Hardware
Users can be connected through Local Area Network to the single printer
or data storage.
Jobs from each user are queued in that single printer.
Sharing Software
Through LAN connection users can share programs such as accounting
programs, which is stored in a single machine.
• Internet Communication
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
In the FIG 4.5 Host computer is connected to the modem and hub, through
hub. Now all the systems in the office get access to the internet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Dedicated connection.
Circuit switching.
Packet switching.
• Dedicated connection
Dial-up.
ISDN (Integrated Service Digital Network).
• Packet switching
Node
• A node is a system or device connected to a computer network.
• Nodes can be computers, Personal Digital Assistants (PDAs), cell phones, or
various other network appliances.
• For example, if a network connects a file server, five computers, and two printers,
there are eight nodes on the network.
• Each device on the network has a network address, such as a MAC address,
which uniquely identifies each device. This helps keep track of where data is
being transferred to and from on the network.
Host
• A host is one or more networked computers that have been setup to handle each
user visiting or requesting information.
• A host is responsible for many different responsibilities, for example, a host may
be responsible for handling each of the computer players in an online game or for
sending users a web page on the Internet.
• Each computer connected to the host computer is known as a client.
Workstation
• Workstation, a high-performance computer system that is basically designed for
a single user and has advanced graphics capabilities, large storage capacity, and
a powerful microprocessor (Central Processing Unit).
• A workstation is a name given to a single computer that is connected to another
computer or network.
• A workstation is more capable than a Personal Computer (PC) but is less
advanced than a mid-range computer.
Interoperability
• Interoperability is the ability of different networks or programs to work or
communicate together without the need of additional tools or interfaces required
by the user.
• For example, most networks use TCP/IP, which is available on all operating
systems, computers and supported with most networks.
• In this current Internet age, it is important that networks of different type are able
to communicate with other types of network.
• Not being able to transfer data between networks may isolate a network and
decrease efficiency.
Network Administrator
• A network administrator is an individual or group of individuals responsible for the
maintenance and operation of a network or server.
• A network administrator may be responsible for maintaining a network and may
be assigned to one or more of the below tasks.
• Network administrator responsibilities.
Allocating and adding disk storage space.
Designing or redesigning the network.
Expanding the network.
Helping employees with computer questions.
Installing and upgrading computers and network equipment on the network.
Managing filters and rules (e.g. ACL's, firewalls, QoS, SPAM filters).
Monitoring the network.
Resetting user names and passwords.
Setting up a network, network device, or computers on the network.
Testing a network for security vulnerabilities.
• Examples of network administrator certifications
MCSA
Network+
CCNP
CNA
RHCE
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Network Security
• A specialized field in computer networking that involves securing a computer
network infrastructure.
• Network security is typically handled by a network administrator or system
administrator who implements the security policy, network
software and hardware needed to protect a network and the resources accessed
through the network from unauthorized access and also ensure employees to
have adequate access to the network and resources to work.
• A network security system typically relies on layers of protection and consists of
multiple components including networking monitoring and security software in
addition to hardware and appliances.
• All components work together to increase the overall security of the computer
network.
Servers
• Server is just like any other computer of the network however it can be
distinguished with its large storage capacity and the role that is assigned to it.
• This is the administrator that controls functioning of other computers and
responsible for the division of labor among computers in a shared network.
• Main computer that provides services to other computers, which holds stored
files, programs and network operating system.
Clients
• Any computer that is the part of a common network other than the server is
called as Client.
• The division is based on the storage capacity and responsibility of the computer.
• For example, a server has a large storage area and its responsibilities are pretty
different than client computers.
• The client computer access network and shared resources provided by the
server.
• It is less powerful than server computer.
Communication Media
• Communication media interconnect the computers in a network.
• Different types of transmission media are,
Wired or Bounded
Twisted-pair wire
Coaxial cable
Optical fiber cable
Wireless or Unbounded
Wi-Fi
Bluetooth
Transmitter, Receiver
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Advantages
• Easy and simple to set up, only requiring a hub or a switch to connect all
computers together.
• You can access any file on the computer as-long as it is set to a shared folder.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• If one computer fails to work, all the other computers connected to it still continue
to work.
Disadvantages
• Security is not good other than setting passwords for files that you don't want
people to access.
• If the connections are not connected to the computers properly, then there can
be problems accessing certain files.
• It does not run efficient if you have many computers, it is best to use two to eight
computers.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The server responds to the queries with the requested information and
transmits it to the workstations, which format it for display to the users.
• In this case, the workstations are responsible for providing a user interface
and translating the user input into a query language understood by the server.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• They are also responsible for taking the raw data from the server and
displaying it in a comprehensible form to the user.
Advantages of client / server
• All files are stored in a central location.
• Network peripherals are controlled centrally.
• Backups and network security is controlled.
• Users can easily access to the shared data.
Disadvantages of client / server
• A special network operating system is needed.
• The server is expensive to purchase and difficult to set up initially.
• If one of the servers goes down, all the users get affected and it may even
bring the whole network down.
• When there are frequent simultaneous client requests, servers severely get
overloaded, forming traffic congestion.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• To view the IP address user can use the ipconfig (IPCONFIG) command line
tool.
• Ipconfig displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)
settings.
• User can also use Google search to find the IP address. Type what is my IP
address as a search box and Google will show the IP address of the computer
from which the query was received as the top search result.
The Format of an IP Address
Bus Topology
• Bus topology also called horizontal topology.
• In bus topology, multiple devices are connected one by one, by means of single
cable.
• When one computer sends a signal up the wire, all the computers on the network
receive the information, but only one accepts the information, the rest discard the
messages.
• The central cable is the backbone of this network and is known a bus.
• Bus is passive topology because it requires termination.
Advantages
• Easy to use and easy to install.
• Needs fewer physical connectivity devices.
• A repeater can also be used to extend a bus topology network.
• Low cost.
Disadvantages
• Heavy network traffic can slow a bus considerably.
• It is difficult to troubleshoot a bus.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Star Topology
• A star topology consists of a number of devices connected by point-to-point links
to a central hub.
• In star topology, every node (computer workstation or any other peripheral) is
connected to a central node called a hub or switch.
• A star network consists of one central switch, hub or router, which acts as a
conduit to transmit messages.
• All peripheral nodes may thus communicate with all others by transmitting to, and
receiving from, the central node only.
• The star topology reduces the damage caused by line failure by connecting all of
the systems to a central node.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Ring Topology
• In a ring topology, each computer is connected to the next computer; with last
one connected to the first.
• Data travel from node to node, with each node along the way handling every
packet.
• Because a ring topology provides only one pathway between any two nodes, ring
networks may be disrupted by the failure of a single link.
• The signals travel on the cable in only one direction.
• Each computer retransmits what it receives.
• Ring is an active network.
• In this, termination is not required.
Advantages
• Cable failures are easily found.
• Because every node is given equal access to the token, no one node can
monopolize the network.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Ethernet
• Ethernet is a physical and data link layer technology for Local Area Network
(LANs).
• Ethernet was invented by engineer Robert Metcalfe.
• When first widely deployed in the 1980s, Ethernet supported a maximum
theoretical data rate of 10 megabits per second (Mbps).
• Later, Fast Ethernet standards increased this maximum data rate to 100Mbps.
• Gigabit Ethernet technology further extends peak performance up to 1000Mbps
and 10 Gigabit Ethernet technology also exists.
• Higher level network protocols like Internet Protocol (IP) use Ethernet as their
transmission medium. Data travels over Ethernet inside protocol units called
frames.
• The run length of individual Ethernet cables is limited to roughly 100 meters, but
Ethernet networks can be easily extended to link entire schools or office buildings
using network bridge devices.
• Ethernet Port
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FDDI
• FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO standards for
data transmission on fiber optic lines in a Local Area Network (LAN) that can
extend in range up to 200 km (124 miles).
• The FDDI protocol is based on the token ring protocol.
• In addition to being large geographically, an FDDI local area network can support
thousands of users.
• FDDI is frequently used on the backbone for a Wide Area Network (WAN).
• An FDDI network contains two token rings, one for possible backup in case the
primary ring fails.
• The primary ring offers up to 100 Mbps capacity. If the secondary ring is not
needed for backup, it can also carry data, extending capacity to 200 Mbps.
• The single ring can extend the maximum distance, a dual ring can extend 100 km
(62 miles).
Features of FDDI
• Number of stations: Up-to 1000 connections are allowed (500 and connected
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
stations).
• Total fiber path: Up-to 200 km of total fiber length is allowed.
• Data transmission rate: 100 Mbps.
• Optical transmission media: FDDI specifies multi-mode optical fiber.
Typical parameters of transmission medium are-
Optical source-1300 nm LED
Core diameter-62.5 micron
Cladding diameter-125 micron
Numerical aperture-0.275
Bandwidth-500 MHz/km
Advantages
• High bandwidth.
• Security.
• Physical durability.
• Use of multiple tokens.
• System fault tolerance.
Disadvantages
• FDDI is a complex technology.
• FDDI is costly.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Hence the number of overhead bits required with each cell is reduced which
enables ATM to operate at high data rates.
• Also, due to the ATM cells of fixed size, the processing required at each node is
simplified. This also supports the use of ATM at high data rates.
• FIG 4.31 shows the ATM protocol architecture for an interface between user and
network.
This layer defines the transmission of data in fixed size cells and it also
defines the use of logical connections.
• ATM Adaption Layer (AAL)
This layer is a service dependent layer. It is used for supporting the
information transfer protocol not based on ATM.
The AAL maps the higher layer information onto the ATM cell and cell is
transported over the ATM network.
• Planes in the ATM protocol model are
User plane
Control plane
Management plane
• User plane
It is used for transferring user information along with associated controls such
as flow control, error control etc.
• Control plane
It is supported to perform the call control and connection control functions.
• Management plane
It includes the plane management.
The management plane performs management functions related to a system.
They include,
Provision of coordination between all planes.
Layer management.
Management function relating to resources and parameters residing in its
protocol entities.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Intranet
• Intranet, extranet, and the Internet are all networks of networks.
• "Intra" means "internal" or "within," + network.
• The major difference between the three classes of networks is the aspect of
network traffic control (i.e., who are the participants in the network).
• Once physical access is gained into a corporate site, application access controls
are the only constraint on access to corporate resources.
• Secure intranets are separated from the Internet by means of a firewall system.
• Inbound Internet traffic is NOT allowed into the corporate security perimeter
except for e-mail.
• Outbound network traffic destined to the Internet from the intranet is not usually
filtered. Some corporations constrain outbound traffic to allow only Web-based
protocols (e.g., HTTP, FTP and IIOP).
• Some of the difference between an Intranet and Internet are the Quality of
Service (QoS) or lack of Service Level Agreements (SLAs) which describe
availability, bandwidth, latency and response time.
• Most Internet Service Providers (ISPs) and networking device vendors are
developing an Internet level of service capability.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Topic : Summary
Model Questions
• What is network?
• List out the network terminologies.
• Explain about network components.
• What are the types of network?
• Explain DNS.
• Brief notes on network topologies.
• Short note on Ethernet.
• Explain FDDI.
• Brief note on ATM.
• Explain Intranet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
Answers:
1.a
2.b
3.d
4.a
5.b
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
1. In star topology a hub sends data packets (frames) to all the devices, and acts as a
signal repeater.
a) True
b) False
2. Ethernet is a physical and data link layer technology for Wide Area Network
(WANs).
a) True
b) False
3. The FDDI protocol is based on the token ring protocol.
a) True
b) False
Answers:
1.a
2.b
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
1. Computer Networks - II by V.S.Bagad, I.A.Dhotre.
2. Computer Network by Bharat Bhushan Agarwal, Sumit Prakash Tayal.
3. Information Security Management Handbook, Fifth Edition by Harold F. Tipton,
Micki Krause.
4. Understanding TCP/IP: A Clear and Comprehensive Guide to TCP/IP Protocols
by Libor Dostálek, Alena Kabelová.
Course : INTERNET TECHNOLOGY AND WEB DESIGN
TABLE OF CONTENT
UNIT NUMBER 5/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
5.1 Objectives
5.2 Services on Internet
5.2.1 Services on Internet
5.3 E-mail
5.3.1 Electronic mail
5.3.2 Types of E-mail
5.3.3 E-mail service provider
5.4 WWW
5.4.1 World Wide Web
5.5 Telnet
5.5.1 Telnet
5.5.2 Telnet Commands
5.6 FTP
5.6.1 File Transfer Protocol
5.7 IRC
5.7.1 Internet Relay Chat
5.7.2 IRC Networks
5.7.3 IRC Commands
5.8 Search Engine
5.8.1 Search Engine
5.8.2 Functions of Search Engine
5.8.3 Search Engine Optimization
5.9 Summary
5.10 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of the course the user will be able to
Know about the usage of Internet.
Understand the several services of internet.
Know about the E-Mail services.
Understand the concept of Telnet.
Know about the Search Engine.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Services on Internet
Electronic mail
• E-mail is a method of exchanging digital messages from a sender to one or more
recipients.
• E-mail is also called as Electronic mail.
• The first E-mail was sent by Ray Tomlinson in the year 1971.
• E-mail is operated with the help of Internet and other computer networks.
• The user can send message, attach files like word document, images etc.
through e-mail.
• Both the sender and the receiver should have an e-mail account to send and
receive mails.
• E-mail servers accept, forward, deliver and store messages.
• Early e-mail systems required both the sender and the receiver should be in
online at the same time to send and receive e-mails, which was like instant
messaging.
• But today's e-mail system is more efficient and convenient, as it based on a store
and forward model. That is the sender and receiver is not required to be in online
at the same time.
• Neither the users nor their computers are required to be online simultaneously;
they need connect only briefly, typically to an email server, for as long as it takes
to send or receive messages.
• An Internet E-mail message consists of three components,
Message envelope
Used to privately enclose the content of the E-mail.
Message header
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Used to determine where a message is sent, and also records the specific
path the message follows as it passes through each mail server.
Consists of fields such as From, To, CC, Subject, Date and other
information about the E-mail.
Message body
Used to enter the text, images or attachments to recipient(s).
Types of E-mail
• E-mail types will get differ related to the purpose or message content in the e-
mail which is sent.
• E-mails can be sent to single or group of people.
• There are number of methods for clients to engage their audiences through
different types of E-mail communication, which will deliver varied benefits that
require different design and planning processes.
• The different types of e-mails are as follows
Marketing E-mails
It is used to send commercial messages to a group of people.
This type of mails contains the messages to send advertisements, request
for business, solicit ask for sales or donations.
Examples: Newsletters, Flash sales, sales etc.
Telnet
• It is a Internet service that allows the user logs on and runs on a remote
computer and use programs installed on the remote computer.
• Telnet is a terminal emulation that enables a user to connect to a remote host or
device using a telnet client.
• The term telnet may also refer to the software that implements the client part of
the protocol.
• Telnet client applications are available for virtually all computer platforms such as
Windows 95/98/NT/2000, Linux, UNIX, etc.
• Telnet enables a user to manage an account or device remotely. For example, a
user may telnet into a computer that hosts their website to manage his or her
files remotely
• Telnet is considered insecure because it transfers all data in clear text. Which
means if a user was sniffing a network, it's very possible they could grab your
user name and password as they were being transmitted.
• Most implementations of Telnet have no authentication that would ensure
communication is carried out between the two desired hosts and not intercepted
in the middle.
• Several vulnerabilities have been discovered over the years in commonly used
Telnet daemons.
• These security-related shortcomings have seen the usage of the Telnet protocol
drop rapidly, especially on the public Internet, in favor of the Secure Shell (SSH)
protocol, first released in 1995
• Users who are concerned about the data being transmitted should consider SSH
as opposed to telnet.
• SSH provides much of the functionality of telnet, with the addition of strong
encryption to prevent sensitive data such as passwords from being intercepted,
and public key authentication, to ensure that the remote computer is actually who
it claims to be.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Telnet Commands
• telnet
To start Telnet Client and to enter the Telnet prompt.
At the Telnet prompt, Telnet commands must be used.
• telnet [\\RemoteServer]
Remote Server: Specifies the name of the server to which you want to
connect.
• quit
To stop telnet client.
User can abbreviate this command to q.
• open [\\RemoteServer] [Port]
To connect Telnet Client to a remote computer.
Port: Specifies the port that is needed to be used. If port is not specified, the
default port is assumed.
User can abbreviate this command too.
• close [\\RemoteServer]
To disconnect Telnet Client from a remote computer.
\\RemoteServer: Specifies the name of the server that is needed to be
managed. If server is not specified, then local server is assumed.
User can abbreviate this command to c.
• send [\\RemoteServer] [ao] [ayt] [esc] [ip] [synch] [?]
To send Telnet Client commands.
\\RemoteServer: Specifies the name of the server that is needed to be
managed. If server is not specified, then local server is assumed.
ao: Aborts output command.
ayt: Sends an "Are you there?" command.
esc: Sends the current escape character.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Internet Relay Chat is an Internet wide talk facility and this is one of the most
popular services available in the Internet.
• Internet Relay Chat is mainly used for serious discussions and this is done using
dedicated chat servers.
• It is an application layer protocol that facilitates transfer of messages in the form
of text and it is based on client/server model of networking.
• The user wants to install the IRC client program in his system to communicate to
chat servers and send message to other clients.
• The client software is available for every major operating systems.
• IRC is mainly designed for the group communication such as discussion forums.
• It also allows one to one communication with the help of private messages. And
even files can also be shared.
IRC Networks
• To connect and chat with other IRC users, the system must either have an IRC
client or a web interface that connects you to IRC servers.
• There are numerous software IRC clients that enable users to connect and
communicate to other IRC servers.
• There are numerous IRC networks which run various IRC servers administrated
by various groups of operators.
• But apart from these, the protocol exposed to IRC users is very similar and all of
them can be accessed by the same client software.
• The IRC networks are broadly classified into 5 types. Such as;
Popular nets: It will have over 10,000 users.
General nets: It will have over hundred to thousand people.
Subject nets: Some people create their own groups, dedicated to their
subject.
Local nets: Local topics will be discussed.
• Some of the largest IRC networks are as follows;
IRCNet.
freenode.
QuakeNet.
Undernet.
EFnet.
rizon.
DALnet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
IRC Commands
• IRC has a line-based structure for sending and receiving messages.
• Commands are entered by prefixing them with a '/'. Depending on the command,
these may either be handled entirely by the client, or passed directly to the
server, possibly with some modification.
• To connect and chat with other IRC users, you must either have an IRC client or
a web interface that connects you to IRC servers.
• There are numerous software IRC clients that enable users to connect and
communicate to other IRC servers. The commands are similar for most of the
servers and clients.
• Some of the IRC commands that can be used when connected to a IRC server
are as follows
/nick (username): Changes your user name.
/part (channel): Leaves the specified channel.
/whowas (username): Shows information about a specified user that was in
earlier.
/whois (username): Shows information about the specified user.
/away (message) : Leaves a message to others as why the user left.
/clear: Clears the text from the current window.
/clearall: Clears all the text from all open windows on the screen.
/dcc chat (username): Opens a chat window with the username that is
specified by the user.
/msg (username) (message): Sends a message to the user of your choice
without anyone else seeing it.
/ping (channel): Pings all the users in a specified channel.
/help: Brings up a list of all the commands or the help window.
/ignore (on/off) (username): Allows a user to ignore or unignore a user.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Search Engine
• Search Engine is a program that searches for and identifies items in a database
that correspond to keywords or characters specified by the user.
• Search engines are programs that search documents for specified keywords and
returns a list of the documents where the keywords were found.
• The search engine is a web program that enables the users to enter words and
phrases to search, and scan the vast information on the web to locate sites that
matches the words or phrase.
• It is used especially for finding particular sites on the World Wide Web.
• It is an organization with a web site containing a huge database of web site
addresses.
• Search engines also maintain real-time information by running an algorithm on a
web-crawler.
• These Search engines make use of the computerized software apps such as
spiders, bots and robots that take a trip beside the Webs, and follow the links
from site to site and page to page.
• They index millions of sites on the Web, so that Web surfers can easily find Web
sites with the information we want.
• The User can locate useful or interesting web sites by using a search engine.
• When a query is typed in form of subject or a name that describes what user are
seeking, and the search engine provides with a list or selection of web site
addresses that fit the inquiry.
• The User can then simply click on an address to jump to that website.
Bing.
Yahoo.
Ask.
AOL.
MSN.
AltaVista.
Excite.
About.com.
• Crawling
The web spider or the crawler is a fundamental part of the search engine.
The crawler is a vital software component of the search engine.
It essentially sorts through the Internet to find website addresses and the
contents of a website for storage in the search engine database.
Crawling can scan brand new information on the Internet or it can locate older
data.
Crawlers have the ability to search a wide range of websites at the same time
and collect large amounts of information simultaneously. This allows the
search engine to find current content on an hourly basis.
The web spider crawls until it cannot find any more information within a site,
such as further hyperlinks to internal or external pages.
• Indexing
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Once the search engine has crawled the contents of the Internet, it indexes
that content based on the occurrence of search keyword in each individual
website.
This allows a particular search query and subject to be found easily.
Keyword phrases are the particular group of words used by an individual to
search a particular topic.
The indexing function of a search engine first excludes any unnecessary and
common articles such as “the,” “a” and “an.”
After eliminating common text, it stores the content in an organized way for
quick and easy access.
Search engine designers develop algorithms for searching the web according
to specific keywords and keyword phrases.
Those algorithms match user generated keywords and keyword phrases to
content found within a particular website, using the index.
• Storage
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Storing web content within the database of the search engine is essential for
fast and easy searching.
The amount of content available to the user is dependent on the amount of
storage space available.
Larger search engines like Google and Yahoo are able to store amounts of
data ranging in the terabytes, offering a larger source of information available
for the user.
• Results
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Finally the resulting hyperlinks to websites that matches the user search
keywords are displayed to the user as result.
When the user type in a search term, the crawler runs through the index and
matches what he typed with other keywords.
The final search result are fetched from the search engine database with the
help of search algorithms.
Algorithms created by the search engine designers are used to provide the
most relevant data first.
Each search engine has its own set of algorithms and therefore returns
different results.
Topic: Summary
Model Questions
• What is meant by services available on internet?
• Explain about E-mail service and types?
• Define WWW?
• Explain the uses of Telnet?
• List some of basic Telnet commands?
• Define FTP?
• Define IRC?
• What are the uses of Search Engines?
• Define some of the functions of Search Engine?
• What is meant by SEO?
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
1. In Email________ is used to determine where a message is sent, and also records
the specific path the message follows as it passes through each mail server.
a) Message envelope
b) Message header
c) Message body
d) Message notification
2. _________ is a hypertext-based information system. And it is the most important
service provided by the internet.
a) WWW
b) HTTP
c) TCP
d) UDP
3. An Internet service that allows the user logs on and runs on a remote computer
and use programs installed on the remote computer is __________.
a) Intranet
b) HTTP
c) Telnet
d) FTP
4. ___________ is a program that searches for and identifies items in a database that
correspond to the keywords or characters specified by the user.
a) Intranet
b) Search engine
c) IRC
d) FTP
5. __________ is a standard network protocol used to transfer files from one host to
another host over a TCP-based network, such as the Internet.
a) Intranet
b) HTTP
c) Telnet
d) FTP
Answers:
1.c
2.a
3.c
4.b
5.d
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
1. The Hypertext Transfer Protocol (HTTP) is an application-level protocol for
distributed, collaborative, hypermedia information systems.
a) True
b) False
2. Notification E-mail allows user to notify every particular event happens.
a) True
b) False
3. The Message envelope is used to privately enclose the content of the E-mail.
a) True
b) False
Answers:
1.a
2.a
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
1. The internet- a user guide (second edition) By K.L.James.
2. Programming Internet Email by David Wood.
3. Understanding TCP/IP: A Clear and Comprehensive Guide to TCP/IP Protocols
by Libor Dostálek, Alena Kabelová.
4. Network Analysis and Troubleshooting By J.Scott Haugdahl.
5. What Is Search Engine Optimization? By Mary D. Shore.
Course Name : Internet Technology and Web Design
TABLE OF CONTENT
UNIT NUMBER 6/11
E-Content of
Internet Technology and Web Design
Syllabus
6.1 Objectives
6.7 Summary
Page | 2
E-Content of
Internet Technology and Web Design
Assessment 1
Assessment 2
References
Page | 3
E-Content of
Internet Technology and Web Design
Objectives
• At the end of the course the users will gain knowledge on
Overview of Email networks and servers
Concept of Email protocols SMTP, POP3, IMAP4 and MIME6
Email addressing, Email header, message body and attachments
Netscape Email clients
Outlook express and web based email
Address book and signature file
Page | 4
E-Content of
Internet Technology and Web Design
Email Network
• There are email networks that are general to all and for all who share an interest
in sub-topics such as professional development.
• The networking email groups provide a forum for communication and discussion
among people with shared interests.
Email Servers
• A mail server is the computerized equivalent of friendly neighborhood mailman.
• Every email that is sent passes through a series of mail servers along its way to
its intended recipient.
• Although it may seem like a message is sent instantly - zipping from one PC to
another in the blink of an eye the reality is that a complex series of transfers
takes place.
• Without this series of mail servers, only be able to send emails to people whose
email address domains matched own (i.e., you could only send messages from
one example.com account to another example.com account.).
• Mail servers can be broken down into two main categories: outgoing mail servers
and incoming mail servers.
• Outgoing mail servers are known as SMTP, or Simple Mail Transfer Protocol,
servers.
• Incoming mail servers come in two main varieties. POP3, or Post Office Protocol,
version 3, servers are best known for storing sent and received messages on
PCs' local hard drives.
Page | 5
E-Content of
Internet Technology and Web Design
Page | 6
E-Content of
Internet Technology and Web Design
Email Protocol
• Email protocols are the languages and rules that email servers and clients use to
communicate with each other and manage incoming and outgoing mail.
• These protocols are strictly defined and are in use in a variety of different email
clients.
• In addition, each email protocol has a unique way of managing email that is sent
and received from an email account.
Page | 7
E-Content of
Internet Technology and Web Design
• Most email software is designed to use SMTP for communication purposes when
sending email, and it only works for outgoing messages.
• When people set up their email programs, they will typically have to give the
address of their Internet service provider's SMTP server for outgoing mail.
• There are two other protocols - POP3 and IMAP - that are used for retrieving and
storing email.
Page | 8
E-Content of
Internet Technology and Web Design
• From the perspective of users, when they write an email message, they see the
slick interface of their email software, but once that message goes out on the
Internet, everything is turned into strings of text.
• This text is separated by code words or numbers that identify the purpose of
each section.
• For example, servers have a way of identifying themselves and announcing what
kind of communication they are trying to perform. There are also ways to handle
errors, including common things like incorrect email addresses.
• SMTP was created in the early 1980's and it was built around basic concepts of
server communication that go back to the 1970's.
• In those days, the Internet was a very closed community, mostly consisting of
scientist and government institutions.
• The greatest strengths of SMTP are reliability and simplicity. It's easy to set up
software that uses the SMTP communication rules, and it gets the job done.
• Nowadays most servers are slightly updated version of the SMTP protocol called
ESMTP (Extended Simple Mail Transfer Protocol).
Page | 9
E-Content of
Internet Technology and Web Design
Server: 250 Ok
Client: Data
Client:
Client: Greetings,
Client: Goodbye.
Server: 250 OK
Client: Quit
Page | 10
E-Content of
Internet Technology and Web Design
• POP3 is a client/server protocol in which e-mail is received and held for you by
your Internet server.
• POP3 is designed to delete mail on the server as soon as the user has
downloaded it.
POP3 Functionality
• POP3 has become increasingly sophisticated so that some administrators can
configure the protocol to "store" email on the server for a certain period of time,
which would allow an individual to download it as many times as they wished
within that given time frame.
• While mail servers can use alternate protocol retrieval programs, such as IMAP,
POP3 is extremely common among most mail servers because of its simplicity
and high rate of success.
• Although the newer version of POP offers more "features," at its basic level,
POP3 is preferred because it does the job with a minimum of errors.
Page | 11
E-Content of
Internet Technology and Web Design
• Many popular email programs, including Eudora and Microsoft Outlook, are
automatically designed to work with POP3.
• Each POP3 mail server has a different address, which is usually provided to an
individual by their web hosting company.
Page | 12
E-Content of
Internet Technology and Web Design
• The latest version IMAP4 is similar to POP3 but supports some additional
features.
• For example, with IMAP4, one can search through the e-mail messages for
keywords while the messages are still on mail server.
• The main difference between IMAP4 and POP3 is that with POP3 the messages
are only stored temporarily on the mail server until they are downloaded to the
email client where the messages are stored, manipulated, searched etc.
• With IMAP4 the messages are stored permanently on the server, and they are
manipulated, searched etc. on the mail server.
• IMAP4 also makes it possible to have shared message folders because multiple
people can access the same IMAP4 account at the same time and read
messages at the same time as other people.
Page | 13
E-Content of
Internet Technology and Web Design
• While POP will remain popular with people who only access their email via one
or two devices - and those who have slow connections to the Internet - IMAP is
sure to remain the protocol of choice for most of today's busy people.
Page | 14
E-Content of
Internet Technology and Web Design
• All media types that are sent or received one the World Wide Web (www) are
encoded using different MIME types.
• Messages sent using MIME encoding includes information that describes the
type of data and the encoding that are used.
MIME – Version
Content – Type
Page | 15
E-Content of
Internet Technology and Web Design
Content – Id
Content – Description
• To : [email protected]
• Servers insert the MIME header at the beginning of any Web transmission.
• Clients use this header to select an appropriate "player" application for the type
of data the header indicates.
• Some of these players are built into the Web client or browser (for example, all
browsers come with GIF and JPEG image players as well as the ability to handle
HTML files); other players may need to be downloaded.
Page | 16
E-Content of
Internet Technology and Web Design
Structure of Email
• An Internet E-mail message consists of three components,
Message envelope.
Message header.
Used to determine where a message is sent, and also records the specific
path the message follows as it passes through each mail server.
Consists of fields such as From, To, CC, Subject, Date, and other
information about the E-mail.
Message body.
Page | 17
E-Content of
Internet Technology and Web Design
Email address
Domain name
• A domain name is a unique name that identifies a website and it serves as an
address, which is used to access the website.
Page | 18
E-Content of
Internet Technology and Web Design
Second-level domain.
.in - India
User name
• To the left of the "@" character is the user name.
• The user name designates who at a domain is the owner of the E-mail address,
for example "rock".
• Creating a live E-mail account with mail provider like Gmail, Yahoo, Hotmail &
etc.
Page | 19
E-Content of
Internet Technology and Web Design
Email header
• The header, a set of lines containing information about the message's
transportation, such as the sender's address, the recipient's address, or
timestamps showing when the message was sent by intermediary servers to the
transport agents (MTAs), which act as a mail sorting office.
• In an e-mail, the body (content text) is always preceded by header lines that
identify particular routing information of the message, including the sender,
recipient, date and subject.
• Some headers are mandatory, such as the FROM, TO and DATE headers.
Others are optional, but very commonly used, such as SUBJECT and CC.
• Other headers include the sending time stamps and the receiving time stamps of
all mail transfer agents that have received and sent the message.
• In other words, any time a message is transferred from one user to another (i.e.
when it is sent or forwarded), the message is date/time stamped by a mail
transfer agent (MTA) - a computer program or software agent that facilitates the
transfer of email message from one computer to another.
• This date/time stamp, like FROM, TO, and SUBJECT, becomes one of the many
headers that precede the body of an email.
Header characteristics
Page | 20
E-Content of
Internet Technology and Web Design
• A single email header has some important characteristics, including perhaps the
most important part of an email - this is the KEY: VALUE pairs contained in the
header.
• Here is a breakdown of the most commonly used and viewed headers, and their
values:
Page | 21
E-Content of
Internet Technology and Web Design
Message Body
• Message body contains the message, separated from the header by a line break.
Attachments
• An E-Mail attachment is a "File" that is attached to an E-Mail message.
• Sending attachments can be a good way to transfer a copy of a file if the sender
and recipient have agreed on a format.
Page | 22
E-Content of
Internet Technology and Web Design
• If user is not sure what types of files a recipient can view, it is a good idea to use
one of the following file types to send your attachment.
Plain text
• Save file without formatting options such as bold and underline. All word
processors and text editors should be able to read a plain text document.
RTF
• Rich Text Format is a document format that is readable by most word
processors.
• RTF includes codes that the recipient's word processor uses to recreate the
formatted document.
PDF
• Portable Document Format is a file format that preserves all of the fonts,
formatting, colors, and graphics of a document.
• When user send an attachment, that the recipient may have a restriction (or) limit
to the size of the attachment they receive.
If needed to send the same document multiple times, rename the File attachment
name each time
• Multiple versions of the same document can become confusing and occasionally
user might send different version of the document than what user had expected.
Page | 23
E-Content of
Internet Technology and Web Design
• Each document name will be unique and it is easy to tell the most recent version
by name. Then the older versions can be deleted.
• Executable Files (Windows) .exe (only open if you know what it is)
• Visual Basic Script .vbs (only open if you know what it is).
Page | 24
E-Content of
Internet Technology and Web Design
Email Client
• Email client is a desktop application that enables configuring one or more email
addresses to receive, read, compose and send emails from that email address(s)
through the desktop interface.
• Full featured Email clients are also available as part of the web browser suites
that Netscape communicator and Microsoft Internet Explorer.
Does the Email package have an electronic phone book, where you
can keep a list of an important email address
Does the Email package have an ability to encode and decode the
files attached to an Email message
• On a pre-defined time or when invoked manually by user, the email client fetches
new emails from the email service provider’s hosted and managed mailbox.
• These emails are delivered using the mail transfer agent (MTA) of an email
service provider.
• Similarly when sending emails, the email client uses Mail Submission Agent
(MSA) to deliver messages to the email server and further to the destination
email address.
Page | 25
E-Content of
Internet Technology and Web Design
• Moreover, email client can be used to configure multiple email addresses from
different email service providers.
• Microsoft Outlook, Mozilla Thunderbird and IBM Lotus Notes are popular
examples of email clients.
Page | 26
E-Content of
Internet Technology and Web Design
• It is a POP3 client, which means that unlike Webmail, it does NOT maintain a
constant connection to the mail server.
• This means that Netscape users must manually click the “Send/Receive” button,
or configure Netscape to check mail automatically at a specific interval.
• Messages retrieved with Netscape/POP3 clients are removed from the server
and are no longer available through Webmail or other computers, UNLESS they
are explicitly configured to “Leave Messages on the Server”.
• Step 2: Next, click on the New Account button on the lower left side of the
Account Settings window.
Page | 27
E-Content of
Internet Technology and Web Design
• Step 3: The Account Wizard will now start. In the first window that appears,
select ISP or email provider and then click on the Next button.
• Step 4: In the following window, enter your full name in the Your Name text box.
Then enter your email address in the Email Address text box. Click on the Next
button to continue.
Page | 28
E-Content of
Internet Technology and Web Design
• Step: 5 in the following window, select to use either the POP or IMAP protocols.
ITS recommends using IMAP by default. Click the Next button to continue.
Page | 29
E-Content of
Internet Technology and Web Design
• Step 6: Now enter you’re UH username in the User Name text box. Click the
Next button to continue.
• Step 7: Next, enter a name to describe this account. Click the Next button to
continue.
Page | 30
E-Content of
Internet Technology and Web Design
• Step 8: Finally, ensure that all the information you entered is correct, and click
the Finish button to exit the wizard.
• If you did not set the Remember Password option, you will be prompted to type
your password and click the OK button.
• A new email messages will now be transferred from the mail server to Inbox.
• This will bring up a listing of Inbox messages in the Message Index frame. To
view a specific message, click on the message header.
Page | 31
E-Content of
Internet Technology and Web Design
• The message will now be displayed in the Message frame. To view messages in
a separate window, double-click the Email header.
• Type the address of the recipient in the To: field, type the subject in the Subject
field, and the message in the area below the subject line.
Replying to a Message
• To reply to any given message, view it and click on the Reply button on the
toolbar.
• A composition window will open, including the text of the original message. The
e-mail address of the recipient will already be filled in, as will the subject line.
Page | 32
E-Content of
Internet Technology and Web Design
Forwarding Messages
• To forward a message, view it and click the Forward button on the toolbar. A
composition window will appear.
• The original message will be included at the bottom of the forwarded email. User
must enter the recipient's email address in the field, but the Subject filled will
automatically be filled in.
• Enter a message in the message field or simply just send the forwarded
message as is. Click the Send button on the toolbar to forward the message.
Deleting Messages
• View the message you want to delete and click on the Delete button on the
toolbar. This will move the selected message to the Trash folder.
For POP users: by default, deleted messages remain in the Trash folder until
you empty it. We can empty it by clicking File on the File menu, then selecting
Empty Trash.
For IMAP users: there are several ways to handle deleting messages. These
can be set by click on the Edit menu, then Mail & Newsgroups Account
Settings, and then clicking on Server Settings. Choose the option for deleting
messages in the When I delete a message: drop down menu.
Page | 33
E-Content of
Internet Technology and Web Design
Page | 34
E-Content of
Internet Technology and Web Design
Outlook Express
• Microsoft Outlook is an email client and Personal Information Manager (PIM) that
is available as part of Microsoft's Office suite or as a standalone application.
• The outlook is mostly used for sending, receiving and storing emails, it is called a
personal information management tool because it also includes calendar, tasks,
contacts, notes and also journal.
• It is also used to share your calendar with your family, friends and colleagues.
• The outlook is designed to access multiple email accounts and show all the mails
in one place.
• It can also store email messages locally, so there won't be a need to access the
internet every time you need to check through your mails.
• This feature is useful in companies, where multiple users work together and can
schedule projects without overlapping other events or appointments.
Page | 35
E-Content of
Internet Technology and Web Design
• The combination of all these features together and the interaction between them
make Microsoft Outlook powerful.
• On the E-mail Accounts wizard window, select Add a new e-mail account, and
then click Next.
Page | 36
E-Content of
Internet Technology and Web Design
• For your server type, select POP3 or IMAP, and then click Next.
User Name
E-mail Address
User Name
Password
Page | 37
E-Content of
Internet Technology and Web Design
Smtpout.secureserver.net
• If you did not change the SMTP relay section, select Use same settings as my
incoming mail server. If you changed the user name and password in the SMTP
relay section of your Manage Email Accounts page, select Log on using and
enter the user name and password. The following example assumes you did not
change your SMTP relay section in your Manage Email Accounts page.
Page | 38
E-Content of
Internet Technology and Web Design
• Go to the advanced tab, and then change the Outgoing server (SMTP) port to 80
or 3535.
• Click OK.
Page | 39
E-Content of
Internet Technology and Web Design
• Click Next.
• Click Finish.
• Enter the recipients' email addresses or names in the To, Cc, or Bcc box.
Separate multiple recipients with a semicolon.
• To select recipients' names from a list in the Address Book, click To, Cc, or Bcc,
and then click the names that you want.
Page | 40
E-Content of
Internet Technology and Web Design
• Under Email signature, in the text box, type the signature you want to use. Use
the formatting bar to format the font as you want it to appear.
• If the user want signature to display at the bottom of all outgoing items, including
replies and forwards, select automatically include my signature on messages.
• If the option is not selected, signature can be added to the mail manually.
Page | 41
E-Content of
Internet Technology and Web Design
• Most people are familiar with setting up their email clients to receive mail through
their ISP.
• The client asks for a POP server (Post Office Protocol) in order to receive mail,
and a SMTP server (Standard Mail Transfer Protocol) in order to send mail.
• However, most email clients can also be used to collect web based email by
configuring the client to connect to an IMAP server (Internet Message Access
Protocol). The IMAP server is part of the host's package.
• Web based email has its advantages, especially for people who travel. Email can
be collected by simply visiting a website, negating the need for an email client, or
to logon from home.
Yahoo! Mail
Gmail
Hotmail
The web mail service provided with your web hosting
The web mail service provided with your ISP (Internet Service Provider)
account
Page | 42
E-Content of
Internet Technology and Web Design
• Security and privacy are the biggest issues. Most sites will explicitly state in the
privacy policy that no expectation of privacy shall exist, even if it is stated in other
sections of the policy that a goal of the site is to protect privacy.
• Security of the server is also less certain, compared to an ISP to which pay a fee
with a contractual promise to provide basic protections.
Page | 43
E-Content of
Internet Technology and Web Design
Email Encryption
• Email encryption refers to an encryption and authentication mechanism of an
email message to prevent the contents from being read by an unauthorized
recipient.
• All this while keeping a secret private key to decrypt messages or to sign and
digitally encrypt messages they send.
PGP
S/MIME
Identity based encryption
Mail session encryption
TLS
Page | 44
E-Content of
Internet Technology and Web Design
Address book
• An address book is a database that stores names, addresses and other contact
information for a computer user.
• The Address Book is a collection of address lists.
• Address Book is used to look up and select names, e-mail addresses, and
distribution lists.
Page | 45
E-Content of
Internet Technology and Web Design
• If there is no match found, the Names dialog box prompts user to create a
contact by clicking New Contact.
Page | 46
E-Content of
Internet Technology and Web Design
Signature File
• An e-mail signature is a block of text that is appended to the end of an e-mail
message send.
• Generally, a signature is used to provide the recipient with the name, e-mail
address, business contact information, or Web site URL.
• Some people, however, will use a signature to sign off their e-mail message with
a closing statement, funny quote or other message.
• A signature file, or sig as it is often called, can easily be created in most e-mail
clients.
• There is an option always attach the signature to all outgoing e-mails, or add the
signature in specific outgoing e-mails.
Page | 47
E-Content of
Internet Technology and Web Design
Topic : Summary
Summary
• In this class, we have discussed about
Overview of Email networks and servers
Concept of Email protocols SMTP, POP3, IMAP4 and MIME6
Email addressing, Email header, message body and attachments
Netscape Email clients
Outlook express and web based email
Address book and signature file
Page | 48
E-Content of
Internet Technology and Web Design
Model Questions
• What is email network and email server?
• Explain the following concepts of email protocol.
SMTP
POP3
IMAP4
MIME6
• Explain the structure of Email.
• Explain the configuration of Netscape and Outlook email clients.
Page | 49
E-Content of
Internet Technology and Web Design
Assessment 1
1. Simple mail transfer protocol (SMTP) utilizes _______ as the transport layer
protocol for electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
2. _______is a client/server protocol in which e-mail is received and held by the
Internet server.
a) SNMP
b) POP3
c) IMAP
d) SCTP
3. ____________ is a protocol for retrieving e-mail messages which can be used as
an alternative to the POP3.
a) SNMP
b) POP3
c) IMAP4
d) SCTP
4. ________ is a supplementary protocol that allows non-ASCII data to be sent
through SMTP.
a) SNMP
b) MIME
c) IMAP4
d) SCTP
5. An Internet E-mail message consists of ___________ components
a) Two
b) Three
c) Four
d) Five
Answers:
1.a
2.b
3.c
4.b
5.b
Page | 50
E-Content of
Internet Technology and Web Design
Assessment 2 (True/False)
Answers:
1.a
2.a
3.a
Page | 51
E-Content of
Internet Technology and Web Design
Books Referred
1. Email by Janis Fisher Chan.
2. E-mail essentials by How to Make the Most of E-communication by Matt Haig.
3. E-mail rules by Nancy Flynn and Randolph Kahn.
Page | 52
Course Name : INTERNET TECHNOLOGY AND WEB DESIGN
Module Name : Current Trends On Internet
TABLE OF CONTENT
UNIT NUMBER 7/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
7.1 Objectives
7.2 Current Trends On Internet
7.2.1. Current Trends On Internet
7.2.2. Languages
7.2.3. Internet Phone
7.2.4. Internet Video
7.2.5. Collaborative Computing
7.2.6. E-Commerce
7.3 Summary
7.4 Model Questions
Assessment 1
Assessment 2
References
Page | 2
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of the course the student will be able to
Know about current trends on internet
Know about languages used for creating web pages
Understand about internet phone
Understand about internet video-playing
Know about collaborative computing
Understand about e-commerce.
Page | 3
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Majority (97%) of mobile OSes are either iOS, Android or Windows mobile
• Video and Image sharing is on the rise (1.8B images a day shared!)
• Take a look at the following comparison which features a deep-dive into the
online landscape in 2002 and 2012.
Internet Users
Page | 4
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Internet Usage
FIG 7.2 Internet Usage per day in the year 2002 and 2012
• Total Websites
• Web Browsers
Page | 5
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 6
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 7.6 Page Loading Time in the year 2002 and 2012
Page | 7
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Languages
• Here is a list of the ten most common languages are used to create web pages
HTML, which is used to apply content to a website, such as text and images.
RSS, which is used to create subscribe feeds, commonly used for blogs, but
also used for websites that update content often.
Perl
PHP
Java
ASP
C#
VB.NET
Page | 8
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Internet Phone
1. The iPhone is an Internet and multimedia enabled smart phone designed and
marked by Apple Inc.
2. The iPhone functions as a camera phone (including text messages and visual
void mail), a portable media player (equivalent to a video iPod), and an Internet
client with e-mail, web browsing and Wi-Fi connectivity - using the phone's multi-
touch screen to render a virtual keyboard in lieu of a physical keyboard.
Working of VOIP
• When user places a call, their computer or VoIP device converts their voice
signals to digital packets.
• Those packets travel through the internet until they reach the final destination.
Page | 9
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
During scenario 2 and 3 these processes take place:
The call originates/ passes via a VIOP provider's server also known a soft-
switch.
Once the provider bypasses the call, the call is sent to another provider
who receives the call through internet and then terminates/ delivers it to
the desired destination number.
PC to PC
PC to Phone
Page | 10
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Internet
8. Internet network, VOIP works with many types of internet access, such as
Dial-up
Wi-Fi
Page | 12
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
A software application known as a Soft-Phone is a dialer that you
download on your computer or laptop. Whenever you make computer
based phone calls, you are running a VOIP soft-phone application, Skype
for instance.
But they use VoIP technology to transmit our data, voice and video
packets whereas traditional companies use PSTN lines.
For example, routing phone calls over existing data networks to avoid the
need for separate voice and data networks.
13. Flexibility
VOIP can facilitate tasks & provide services that may be more difficult to
implement using the PSTN.
For example, the ability to transmit more than one telephone calls over
same broadband connection. This can make VOIP a simple way to add an
extra telephone line to a home or office.
Page | 13
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Internet Video
14. Internet video is the general field that deals with the transmission of video over
the Internet.
15. Video clips are short clips of video, usually a part of longer piece.
16. There are various websites which allow the users to watch various videos related
to all subjects throughout the world.
18. User can even download and upload personal videos on such video sites.
About YouTube
19. Probably the largest internet video phenomenon is YouTube (www.youtube.com).
20. It's a site like Google (which owns YouTube), but rather than an internet search
engine for information at large, it's only for videos.
21. YouTube user can find everything from Saturday night live clips to previews for
upcoming movies to strange homemade Lego flicks.
22. According to the New York Times, people post more than 100 million videos on
YouTube every day – 48 hours of video uploaded every minute, with over 3
billion video views every day.
24. In the Search bar, user can type a word or phrase related to the video that user
looking for and YouTube displays a list of possible videos, as shown in the FIG.
Page | 14
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
26. Video-playing soft-ware is embedded in the website, so user need nothing but an
Internet connection to watch videos on YouTube.
27. If user want to share that video with their closest friends, user can click the share
link below the video to e-mail a link.
28. There are many options in YouTube website which favors user to use it. Some of
them are
Better linking
Page | 15
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
If user want to link to a specific point in a video, just right-click the video
and select 'Copy video URL at current time'.
When someone clicks on that URL, it will then take them to that specific
point.
If user want to link to a specific point in a video, just right-click the video
and select 'Copy video URL at current time'.
When someone clicks on that URL, it will then take them to that specific
point.
Rewind-fast/forward
If user want to rewind a video, just press the left arrow key on your
keyboard.
To forward a video, press the right key. This is much quicker than the
using the mouse and dragging the cursor across.
Watch later
If user are in the middle of a video and need to stop watching it. User can
click on a Watch Later button that looks like a clock and it will save the
video for user to come back to.
This way user don't have to keep searching for the same videos and it will
be waiting for user in your 'Watch Later' channel.
Disable related
If user don't want to see any related videos at the end of a clip, user can
disable them by adding the code "?rel=0" to the end of the URL in the
embed code.
Repeat videos
Page | 16
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
If user want to repeat their favorite music videos, user can add the word
'repeater' in the URL straight after 'YouTube' to open it in an external site
that will play it back as often as you let it.
User can also set it to play back just part of the video. It will look
something like 'www.youtuberepeater.com/watch?'
Repeat videos
If user want to narrow down their search results, user can use a number of
codes.
Adding “HD” to their search query will return high-definition result while
“3D” will pull up three-dimensional content.
Writing “long” will bring user videos longer than 20 minutes, while typing in
“short” will return content less than four minutes long.
All user have to do is scroll to the bottom of the page and change the
language options.
The choices range from Hebrew to Marathi and for these foreign
languages with different characters, a special keyboard will appear in the
search options.
Page | 17
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Download a video-playing
If user want to embed a video onto their own web page, press the 'Share'
button on the video and then go to 'Embed'.
If user want to change the size of the video, user can pick a custom width
and it will automatically produce the required size for the video.'
Poor connection
If user have a poor connection and want to improve the quality of the
videos they are watching, use YouTube Feather.
This beta viewing option removes some features and buttons on the video,
meaning they can buffer quicker and not leave user with slow loading.
Page | 18
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Collaborative Computing
30. Collaborative Computing is the term that will replace the traditional idea of
"groupware".
32. E-Mail, Discussion List, list servers, and similar software products help people to
electronically exchange information.
33. In other words, these products electronically extend a letter, a fax, and a filing
cabinet.
35. As computers are best at handling data and representing information, person-to-
person communication is enriched by an ability to share, modify, or
collaboratively create data and information.
Podcasting
36. A Podcast is a series of digital media files, usually either digital audio or video
that is made available for download via web syndication.
37. The syndication aspect of the delivery is what differentiates podcasts from other
ways of accessing files, such as simple download or streaming.
38. Streaming means that special client software applications known as podcatchers
(such as Apple Inc.'s iTunes or Nullsoft's Winamp) can automatically identify and
retrieve new files in a series when they are made available, by accessing a
centrally-maintained web feed that lists all files currently associated with that
particular podcast.
Page | 19
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
39. The files thus are automatically downloaded, then stored locally on the user's
computer or other device for offline use.
40. Like the term broadcast, podcast can refer either to the content itself or the
method by which the content is syndicate the latter is also called podcasting. A
podcaster is the person who creates the content.
41. Podcasting began to catch hold in late 2004, though the ability to distribute audio
and video files easily has been around since before the dawn of the Internet.
42. Many individuals and groups contributed to the emergence and popularity of
podcasts.
43. The first audio file format used was MP3. It is still widely used while better
(smaller files with same sound quality) format exist.
44. The term podcasting derives its name from Apple's iPod, but to create a podcast
or even to listen to one, user don't need to own an iPod, or any portable music
player for that matter.
45. In a nutshell, Podcasting is a new type of online media delivery. User publish
selected audio files via the Internet and allow their users to subscribe via an RSS
feed to automatically receive new files.
Video Conferencing
46. A video conference (also known as a video-tele-conference) is a set of interactive
telecommunication technology which allows two or more locations to interact via
two-way video and audio transmissions simultaneously.
47. It has also been called visual collaboration and is type of a group ware.
Page | 20
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
50. Quite recently, securing data without the use of wires was difficult.
52. The first is the mobile computing device itself. Pagers, cellphones, palm PCs,
hand-held PCs, and notebook PCs can all serve as platforms for wireless data
communications.
Page | 21
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
E-Commerce
53. E-Commerce is a set of integrated software components that provides a solution
for business to sell goods and services through an electronic catalog on the
Internet.
55. E-Commerce extends beyond buying and selling to stream lining the entire
operations of an organization.
56. It enables a faster penetration into the market to turn around investments quickly
for lowering costs.
59. The three major classes of business expected with E-Commerce applications
are
Business to Consumer
Page | 22
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
This includes wholesaling, where businesses sell goods and services to
other businesses on the web.
This includes the delivery of digital goods, software, electronic media and
information.
Page | 23
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
o Lowest cost and on time delivery.
Page | 24
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Topic : Summary
Summary
• internet phone
• collaborative computing
• E-commerce.
Page | 25
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Model Questions
Describe about current trends on internet
Page | 26
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
1. ____________ is used to add special effects to a website, such as animation, or
hover effects.
a) CSS
b) PHP
c) Javascript
d) HTML
2. ____________ is used to add color and layout to the website.
a) CSS
b) PHP
c) Javascript
d) HTML
3. _______________ is a general term for a family of transmission technologies for
delivery of voice communications over IP networks.
a) SNMP
b) STMP
c) VOIP
d) PSTN
4. A _________ is a series of digital media files, usually either digital audio or video
that is made available for download via web syndication.
a) Podcast
b) Data sync
c) Collaborative computing
d) Groupware
5. _______________ is a set of integrated software components that provides a
solution for business to sell goods and services through an electronic catalog on
the Internet.
a) e-governance
b) e-commerce
c) e-banking
d) None of the above
Answers:
1.c
2.a
3.c
4.a
5.b
Page | 27
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
Answers:
1.b
2.a
3.a
Page | 28
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
1. Internet Technology and Web Design by ISRD.
Page | 29
Course : INTERNET TECHNOLOGY AND WEB DESIGN
TABLE OF CONTENT
UNIT NUMBER 8/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
8.1 Objectives
8.2 Web Publishing
8.2.1 Overview
8.3 SGML
8.3.1 SGML
8.4 Web Hosting
8.4.1 Web Hosting
8.5 HTML
8.5.1 HTML
8.6 CGL
8.6.1 CGL
8.7 Documents Interchange Standards
8.7.1 Documents Interchange Standards
8.8 Components of Web Publishing Document management
8.8.1 Components of Web Publishing Document management
8.9 Web Page Design Consideration and Principles
8.9.1 Web Page Design Consideration
8.9.2 Web Page Design Principles
8.10 Search and Meta Search Engines
8.10.1 Search Engines
8.10.2 Meta Search Engines
8.11 WWW
8.11.1 WWW
8.12 Browser
8.12.1 Browser
8.13 HTTP
8.13.1 HTTP
8.14 Publishing Tools
8.14.1 Publishing Tools
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
8.15 Summary
8.16 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.1 Objectives
Objectives
• At the end of this course, the user will be able to
Understand what is web publishing
Known about the SGML
Understand about Web Hosting
Known about the HTML and CGL
Understand about the Web Page Design and principles
Known about the Web browsers and meta search engines
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.2 Web Publishing
Overview
• Information publishing is the publishing of information on computer networks.
• The Web browser is the container into which web information is published.
• By far, the most practical way to publish information is with Web technologies.
• The Internet and intranets provide the platform for wide range of information
either internally or externally.
• It is also about managing security, document flow copyright and other factors.
• Web page are compound documents that can hold text and individual objects like
pictures, sounds, videos, Java applets, ActiveX controls and an electronic mail
message with an attachment such as a graphic.
SGML
• SGML (Standard Generalized Markup Language) is an international standard for
the definition of device-independent, system-independent methods of
representing texts in electronic form.
• SGML is a Meta language, that is, a means of formally describing a language, in
this case, a markup language.
• By markup language we mean a set of markup conventions used together for
encoding texts.
• A markup language must specify what markup is allowed, what markup is
required, how markup is to be distinct instead from text and what the markup
means SGML provides the means for doing the first three, documentation.
Web Hosting
• If user visit any of the numerous sites that offer free space for the web pages,
user might tend to disagree.
• But it comes with a few strings attached.
• Firstly, these servers offer limited space.
• One way to overcome the limited space factor is to put up pages at multiple sites
and to link these pages.
• Secondly, the Web master puts banner advertisements on the pages over which
user have no control. That is how they earn revenue.
• Some sites require regular updation by their members else membership is
terminated.
• Thirdly, most of these sites cannot be used for commercial purposes. Of course,
there are exceptions.
• When the site designing is completed, visit any of the sites offering Web hosting
services and register as a member.
• Follow the online instructions and fill out the application form giving personal
details.
• Choose a member name and password.
• User might need to choose a member area also called a neighborhood or pod as
well.
• Web sites are organized into categories based on themes like Arts and
Literature, Computers, Music, etc.
• Within 24 hours user will receive an e-mail confirming the application.
• Read the instructions in the e-mail carefully because they will contain the
member name, password and Web site address.
• It may also have details on how to upload pages to sites.
• There are basically three things to consider while Web Hosting.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Server Reliability
Enough Storage and Band Width
E-Commerce Capability
HTML
• HTML stands for Hyper Text Markup Language, it is a language for describing
web pages.
• A markup language is a set of markup tags which describe document content.
• HTML documents contain HTML tags and plain text where documents are also
called web pages.
• HTML describes the Structure of a Page.
• HTML, by virtue of its SGML heritage, is a language for describing the structure
of a document, not its actual presentation.
• The idea here is that most documents have common elements—for example,
titles, paragraphs, and lists. Before start writing, user can identify and define the
set of elements in that document and give them appropriate names.
• The HTML page structure is depicted in the FIG
CGL
• The CGL (Core OpenGL) API is lowest-level programming interface for the Apple
implementation of OpenGL.
• CGL supports free screen OpenGL drawing and drawing to pixel buffers, which
are a hardware-accelerated off-screen drawing location.
• Any Cocoa or carbon application can use CGL to get the most direct access to
system functionality.
• The Cocoa classes that support OpenGL and the AGL API are each built on top
of CGL.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.7 Documents Interchange Standards
• Designing an effective web site requires more than just gathering relevant
information and posting it on the web.
• User should strive, above all, to be both clear and engaging in every aspect of
site design.
• Here are some concrete suggestions for making the site a winner.
• Before Begin
Consider the audience and the goals. User should have a clear sense of who
will be using the site (mostly college undergraduates) and what kind of
experience user are hoping to provide. What exactly are you trying to
accomplish here? Why is this important?
Either way, it is essential to organize the information and lay out the
architecture of the site before attempting to implement the vision.
• Site Layout
Strive for consistency. User want the project to have an identity, so all the
pages in the project should have a common feel, there should be consistency
among backgrounds, color schemes, navigational tools and tone of voice.
Provide a rich set of links within the site. Ideally, there should be multiple
ways for the user to navigate their pages.
User should consider including a prominent 'home' link or icon on each page,
a menu or table of contents and highlighted links within textual material to
related information elsewhere on the site.
Feel free, of course, also to provide links to other pages within ECE or
elsewhere on the web.
Don't hide important information. Users don't like to click too many times to
find the information they want, if information is particularly important, make it
accessible up front.
On any given page, remember that as with a newspaper, the top left corner is
the most prominent. See the National Geographic Website for a good
example.
Don't sacrifice elegance for pizzazz. Just because you can make images fly
across the screen does not mean you necessarily should.
Provide a link for every URL that mention in the site. If the bibliography or
notes include a citation for another website, list the URL in full, but make it
'clickable' as well so that the user can go directly to the site in question.
Give the site a descriptive title. The title should convey the content of the site
in a concise but engaging manner.
Remember, the title is how the site will be identified on the ECE home pages.
Ideally, it should pique the curiosity of users and prompt them to explore the
project pages.
Include a brief introduction. This should be part of the site's home page, and
should explain the scope and purpose of the site.
Once users have noticed the title and followed a link to the site, they will
expect quickly to find a further elaboration of the title, a brief paragraph or two
describing what the site is all about and what makes it interesting.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
User have caught the people's eye with the title, the introduction is the
chance to heighten their interest and persuade them to actually stick around
and explore.
The viewer should be able to see at a glance what the site is about, how it is
laid out, and what kinds of resources and features it includes.
Ideally, all of this information (along with your site title and introduction)
should be visible on a single fast-loading screen that requires a minimum of
scrolling.
• Accessibility
Make sure your text is legible. Check the size, color, and font of all text within
the site to confirm that it can be easily read. Be especially careful of dark or
fancy backgrounds that make text hard to read.
Make sure the site is platform independent. The site should be view-able on
both Mac and Windows machines using either of the most commonly
available browsers, Netscape and Explorer.
Consider the needs of the viewers. Think about the bandwidth the site will
require.
Keep in mind that not all users will have the luxury of an Ethernet connection.
Minimize the memory requirements of the site by compressing images and
other large files. And make sure all your images have ALT-TEXT behind
them.
This makes the site accessible both to low-vision users and users with slow
modems who have turned the images off.
Ask a friend to sit down and explore the site. Ask them to think out loud and
watch them navigate the site. Do they get lost? Do they have trouble finding
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
links? Do they have trouble understanding the labels? Do they understand
the prose?
Ideally, designer should elicit and incorporate feedback about the site in the
course of developing it as well as when it’s nearing completion.
Be sure to test the site both of the most commonly used browsers, Netscape
and Internet Explorer.
Check carefully for spelling and grammatical errors before posting the written
materials to the web.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.9 Web Page Design Consideration and Principles
Search Engines
• The search engine is a web program that enables the users to enter words and
phrases to search, and scan the vast information on the web to locate sites that
matches the words or phrase.
• The User can locate useful or interesting web sites by using a search engine.
• This is an organization with a web site containing a huge database of web site
addresses.
• When a query is typed in form of subject or a name that describes what user are
seeking, and the search engine provides with a list or selection of web site
addresses that fit the enquiry.
• The User can then simply click on an address to jump to that website.
• It the process of optimizing the web page contents to increase its relevance to
specific keywords and to remove barriers to the indexing activities of search
engines.
• SEO makes the website more efficient and visible top its users during the search.
• Search engines use the bottom up approach for finding your way around the
web.
• You give a search engine, a list of keywords of phrases (called a query) and it
returns to you a list of web pages that contain those words or phrases.
• In other words, search engines are actually databases that contain references to
thousands of resources.
• Users are able to interact with the database, submitting queries that “ask” the
database if it contains resources that match specific criteria.
• Some search engines search only the title of web pages, some by uniform
resource locator (URL), some by words in each document in a web site and
some by combination of these.
• Each search engine has its own way deciding which of the web pages on its list
is most likely to be one that you are looking for.
• Some allow more complicated queries than others, where keywords can be
combined with Boolean (logical) operations, such as AND, OR and NOT, to
produce rather complicated queries.
• The rules combining these operations are called the syntax of the search engine.
• There is an art in designing queries that result in the search engine returning a
useful list to you.
• Given the vast number of web pages, a query that is too general may field
literally millions of web pages, most of them useless to you.
• A query that is too specific may miss many web pages that you would have liked
to see.
• Each engine is also defined as an on line utility that quickly searches thousands
of web documents for a word or phrase being searched.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
List of Search Engines
• Yahoo.
• Ask Jeeves.
• Kosmix.
• Yebol.
• Bing
• Msn
• Search engines are information retrieval system designed to help find information
stored on a computer system.
• There are many types of search engines but we would limit our discussion to
web search engines which search for information on World Wide Web.
• Search engine were started with an idea to ease the process of finding
information on the internet.
• First part
First part is the spider which is also called the crawler or bot.
This spider part visits a web page, reads it and then follow links to other
pages within the site.
Crawling of a website is done on the very regular basis. The spider visits a
website, following links from other website or website submission, it received.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
The content that spider finds is sent to its database or index as it is popularly
known.
This index is like a huge book that contains a copy of web page or cache that
the spider finds out.
• Second part
This constitutes the second part of a search engine. It also stores the
structure and the way pages are linked to each other.
• Third part
Third part of a search engine is search engine software that works behind the
interface when we use a search engine.
This software will shift through the trillions on indexed pages to match the
search query that user has asked.
The pages are ranked by search engines and the search results are based on
this ranking and relevance to search term.
This is how a search engine determines what order shall be listed for a
particular search.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 8.10 Search and Meta Search Engines
• Meta Search Engine is a search tool that sends user requests to several other
search engines and/or databases and aggregates the results into a single list or
displays them according to their source.
• Search engines provide fast retrieval of information of interest from the web.
• The problem of knowing where search engines are how to use them poses some
difficulties.
• Furthermore, empirical results indicate that only 45% of relevant results will likely
be returned by a single search engine that is, each has a recall rate of 45%.
• This limitation is compounded by the fact that the coverage of a typical search
engine is between only 5% - 30% of the web.
• The System architecture of a meta search engine that contains the following
components
• Meta search engines operate on the premise that the web is too large for any
one search engine to index it all and that more comprehensive search results
can be obtained by combining the results from several search engines.
• This also may save the user from having to use multiple search engines
separately. The process of fusion also improves the search result.
• A Web Meta Searcher also known as mega indexes is a tool that helps users
locate information available via the World Wide Web.
• Meta Searches do not have their own database. Instead they have access to
other primary search engines.
• Web Meta searchers provide a single interface that enable users to search many
different search engines, indexes and databases simultaneously.
• The content of search engines, indexes and databases vary, the same query
typed into several search engines is likely to produce different results.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• When searching a topic, users often want to see results from various sources.
• One way to compare the results of several search engines is to type and retype a
query into individual search engines one at a time. This can be very time
consuming.
• A Meta searcher helps to make this task more efficient by providing a single
interface where the query is typed in one and results can be obtained from
multiple search engines.
• Meta searchers are different from other search engines and indexes in the
following respects.
• Meta searchers do not provide a database i.e., these search engines do not
collect web pages, do not accept URL and do not classify or review web sites.
• Instead they provide service to search the database of several other search
engines at the same time to locate web pages that matches query given by the
user.
clnet
Cyperlands Web
CUSI
Electric Library
Eureka
Savvy Search
ProFusion
MetaCrawler
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 8.11 World Wide Web (WWW)
• The term Internet and WWW are often used in everyday speech without much
distinction.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• In 1989 a small group of people led by Tim Berners-Lee at CERN (Conseil
European pour la Recherce Nucleaire or the European Laboratory for Particle
Physics) proposed a new protocol for the Internet as well as a system of
document access to use it.
• The intent of this new system, which the group named the World Wide Web, was
to allow scientists around the world to use the internet to exchange documents
describing their work.
Web or Internet
• It is important to understand that the Internet and the World Wide Web are not
the same thing.
• The internet is a collection of computers and other devices connected by
equipment that allows them to communicate with each other.
• The web is a collection of software and protocols that has been installed on
most, if not all, of the computers on the internet.
• The internet was quite useful before the web was developed and it is still useful
without it.
• However, it is now the case that most users of the internet use it through the
web.
• The internet is a global data communications system including hardware and
software infrastructure that provides connectivity between computers.
• In contrast, the web is one of the services provided via the internet.
• Web is a collection of interconnected documents and other resources, linked by
hyperlinks and URLs.
• Thus in short the web is an application running on the internet.
• Viewing a web page begins either by typing the URL of the page into a web
browser or by following hyperlinks to that page.
• The web browser then initiates a series of communication messages, behind the
screens, in order to fetch and display it.
Browser
• To access the World Wide Web, you use what is called a web browser.
• Browsers are sometimes also called web clients that use HyperText Transfer
Protocol to make request to web servers.
• When you follow a Hyperlink, the browser (acting like a client) sends a request to
a site on the internet.
• That site (acting like a server) returns a file which the browser then has to
display.
• When you run a web client i.e., web browsers, like Netscape communicator or
Microsoft's Internet Explorer on your computer, the client contacts a web server
and request information or resources.
• The web server locates and send the information to the web browser, which
displays the results. Thus browsers
Allows you to enter the address of the site you want to jump to (called a URL
or uniform resource locator) or to jump there by clicking hotspots, high-lighted
words, buttons, pictures or icons called hyperlinks on your screen.
Formats web documents for display on your screen.
Allows you to backup and go forward through pages you have already visited.
Allows you to copy text from the screen and paste it into a word processing
program.
Allows you to print the document you see on the screen.
Makes it possible to transfer files-text, graphics, movies, animations, sounds
and programs from other computers to your computer (called downloading)
also provides access to new groups.
Allows you to send and receive e-mail and other internet services such as ftp
(file transfer protocol), gopher and Usenet news-groups.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Web Browsing Software
• A Web browser is a software application used for presenting and traversing the
information on World Wide Web, including Web Pages, images, video and other
necessary files (or) data required by users.
• Web Browser is not hardware, it is software.
• A web browser is a client side software program which communicates with
web servers on the internet and request information wanted by users. It also
enables uploading and downloading of files.
• The web address of a particular object published on the web is known as URL
(Uniform Resource Locator). Each object in the web is identified or searched with
the help of URL.
Popular Web Browsing Software
• The most popular web browsers access the globe
Google Chrome
Firefox
Apple Safari
Opera
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 8.11 : Web Browsing Software Usage
Functions of Web Browser
• The web browser gets URL (Uniform Resource Locator) of the site and
understands the web address of DNS (Domain Name Server) hyperlinks.
• It identifies the web page and formats the web documents to display on the
screen.
• The Web browser helps users to have a history and go back & forward through
pages that have already visited.
• The web browser makes possible to copy text from the web page and paste it
into a word processing program (or) as desired by users.
• Web browser helps to print the web documents/pages.
• The web browser makes possible to transfer online documents to user's
computer called downloading.
• The web browser allows user to send and receive e-mails, through web mail.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTTP
• The Hypertext Transfer Protocol (HTTP) is an application-level protocol for
distributed, collaborative, hypermedia information systems.
• This is the foundation for data communication for the World Wide Web (ie.
internet) since 1990.
• HTTP is a generic and stateless protocol which can be used for other purposes
as well using extension of its request methods, error codes and headers.
• The default port is TCP 80, but other ports can be used.
• HTTP specification specifies how clients request data will be constructed and
sent to the serve, and how servers respond to these requests.
• There are following three basic features which makes HTTP a simple but
powerful protocol.
HTTP is connection-less
The HTTP client i.e. browser initiates an HTTP request and after a request
is made, the client disconnects from the server and waits for a response.
The server process the request and re-establish the connection with the
client to send response back.
HTTP is media independent
This means, any type of data can be sent by HTTP as long as both the
client and server know how to handle the data content.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
This is required for client as well as server to specify the content type
using appropriate MIME-type.
HTTP is stateless
As mentioned above, HTTP is a connection-less and this is a direct result
that HTTP is a stateless protocol.
The server and client are aware of each other only during a current
request. Afterwards, both of them forget about each other.
Due to this nature of the protocol, neither the client nor the browser can
retain information between different requests across the web pages.
HTTP Architecture
• Client
The HTTP client sends a request to the server in the form of a request
method, URI, and protocol version, followed by a MIME-like message
containing request modifiers, client information, and possible body content
over a TCP/IP connection.
• Server
The HTTP server responds with a status line, including the message's
protocol version and a success or error code, followed by a MIME-like
message containing server information, entity Meta information, and possible
entity-body content.
HTTP Version
• Example
HTTP/1.0
or
HTTP/1.1
• Here if the port is empty or not given, port 80 is assumed for HTTP and an
empty abs_path is equivalent to an abs_path of "/".
• The characters other than those in the reserved and unsafe sets are equivalent
to their ""%" HEX HEX" encoding.
• EXAMPLE
Date/Time Formats
• HTTP applications are allowed to use any of the following three representations
of date/time stamps:
Sun, 06 Nov 1994 08:49:37 GMT ; RFC 822, updated by RFC 1123
Sunday, 06-Nov-94 08:49:37 GMT ; RFC 850, obsoleted by RFC 1036
Sun Nov 6 08:49:37 1994 ; ANSI C's asctime() format
Character Sets
• User use character set to specify the character sets that the client prefers.
Content Encodings
Accept-encoding: gzip
or
Accept-encoding: compress
or
Accept-encoding: deflate
Media Types
• HTTP uses Internet Media Types in the Content-Type and Accept header fields
in order to provide open and extensible data typing and type negotiation.
• All the Media-type values are registered with the Internet Assigned Number
Authority ((IANA).
• Following is a general syntax to specify media type.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Media-type = type “/” subtype *(“;” parameter)
• The type, subtype, and parameter attribute names are case- insensitive.
• Example
Accept: image/gif
Language Tags
• White space is not allowed within the tag and all tags are case- insensitive.
• The requestheader also contains the type, version and capabilities of the
browser that is making the request so that server returns compatible data.
• Upon receipt of the request header, the server will return an HTTP responce
header to the client that is attached to the file(s) being sent.
HTTP response header
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The information, in the form of a text record that a Web Server sends back to a
client's browser in response to receiving an HTTP request.
• The response header contains the date, size and type of file that the server is
sending back to the client and also data about the server itself. The header is
attached to the files being sent back to the client.
• Contrast with an HTTP request header.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.14 Publishing Tools
Publishing Tools
• Hardware
The most important item is the computer, which must have a modem or
network connection to allow access to the Internet.
The type of computer will obviously be dependant on user's budget.
The power of the computer (how fast it will run) depends on processor speed
and RAM (Random Access Memory). Most computers in schools use either
the PC (Windows) or the Macintosh operating system.
• Software
User will need the following software before they begin creating the web
pages.
A text editing package. For example, Notepad (Windows) or SimpleText
(Mac).
Graphics processing software. For example, PaintShop Pro.
• A web browser
The two most commonly used today are Microsoft Internet Explorer and
Netscape Navigator. It may be a good idea to have both these browsers on
the computer and to test the web pages on each.
Other Useful Tools
• Hardware
A scanner, handy for including project work and/or photographs on your web
site. There are two main types: hand-held or flat-bed.
Digital stills camera, simplifies the process of including high-quality photos
on the web site.
Video camera, can be analogue or digital.
• Software
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML editor
Image mapping software
Animation software
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.15 Summary
Topic: Summary
Model Questions
• Explain Web publishing.
• What is SGML?
• What is Web hosting?
• What is CGL?
• Explain HTML.
• Explain web page design.
• Brief notes on web page design considerations.
• Explain the principles of web page design.
Assessment 1
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
1. The __________level programming interface for the Apple implementation of
OpenGL.
a) CSS
b) CGL
c) SGML
d) HTML
2. __________ is a search tool that sends user requests to several other search
engines and/or databases and aggregates the results into a single list
a) Meta search engine
b) CGL
c) SGML
d) Hyper search engine
3. __________ is a collection of interconnected documents and other resources,
linked by hyperlinks and URLs.
a) IP
b) FTP
c) Web
d) Host
4. ___________ is the standard protocol that allows web clients and servers to
communicate.
a) HTML
b) FTP
c) URL
d) HTTP
5. A web browser is a __________side software program which communicates with
web servers on the internet and request information wanted by users
a) Client
b) Server
c) Peer to peer
d) Host
Answers:
1.b
2.a
3.c
4.d
5.a
Assessment 2 (True/False)
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
1. The Hypertext Transfer Protocol (HTTP) is an application-level protocol for
distributed, collaborative, hypermedia information systems.
a) True
b) False
2. A web search engine is a hardware system that is designed to search for
information on the World Wide Web.
a) True
b) False
3. The World Wide Web is a system of interlinked documents that are accessed via
the internet.
a) True
b) False
Answers:
1.a
2.b
3.b
Books Referred
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
1. Cryptography and Network security principles and practice - by William
Stallings.
2. TCP/IP ultimate protocol guide by Philip M.Miller.
3. Wireless Network Security By Yang Xiao, Xuemin (Sherman) Shen, Ding-Zhu
Du.
4. Computer Security Handbook, Set edited by Seymour Bosworth, Michel E.
Kabay, Eric Whyne.
Course Name : Internet Technology and Web Design
TABLE OF CONTENT
UNIT NUMBER 9/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
9.1 Objectives
9.2 HTML Page Structure
9.2.1 Introduction to HTML
9.2.2 HTML Editors
9.2.3 Overview of HTML Markup
9.2.4 Basic HTML Tags
9.2.4A Head Tags
9.2.4B Paragraph Tags
9.2.4C Line Break Tags
9.2.4D Centering Content
9.2.4E Preserver Formatting
9.3 HTML Attributes
9.3.1 HTML Attributes
9.4 HTML Text
9.4.1 HTML Text
9.5 HTML Links
9.5.1 HTML Links
9.6 HTML Document Tables
9.6.1 HTML Document Tables
9.7 HTML Frames
9.7.1 HTML Frames
9.7.1A Frames Tag Attribute
9.7.1B Creating Frames
9.7.2 Forms
9.7.2A Forms Attributes
9.8 HTML Images
9.8.1 HTML Images
9.9 Multimedia
Page | 2
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
9.9.1 Multimedia
9.10 HTML Exercises
9.10.1 HTML Exercises
9.10 Summary
9.11 Model Question
Assessment 1
Assessment 2
References
Page | 3
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of the course the user will be able to
Understand the concept of HTML page structure
Understand the process of HTML Text
Know the basics of HTML links
Understand the concept of document tables
Know the process of HTML frames
Understand the process HTML images
Know the basic operations of multimedia
Page | 4
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Introduction to HTML
• HTML is the acronym for Hyper Text Markup Language.
• HTML is the basic tool for designing a web page.
• It is a documentation language to mark the headings, title, table and forms.
• HTML is not case sensitive and can be easily updated after the file is created.
• To format a simple text file into HTML, the user creates tags that start and finish
with angle brackets.
• To end the formatting or change to another format, type the first angle bracket, a
backslash, then repeats the command and close the bracket.
• For example, <H1> Understanding HTML </H1> is the code used to create the
heading.
HTML History
• IBM wanted to set a documentation system in which we can mark the title,
headings, paragraphs and font type selections in the 1980s.
• They came out with a set of mark-up system called it General Markup Language
(GML).
• In 1986, International Standardizing Organization (ISO) took up this concept and
standardized it as Standard Generalized Markup Language (SGML).
• SGML is one of the early markup language. SGML is a system for organizing
and tagging elements of a document.
• SGML itself does not specify any particular formatting, rather, it specifies the
rules for tagging elements. These tags can then be interpreted to format
elements in different ways.
• In 1989 Tim Berners Lee and his team in the European Laboratory for Particle
Physics (CERR) designed the present form of the documentation language and
called it HTML.
World Wide Web
Page | 5
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• A web page is a document stored in the World Wide Web.
• Web pages are created using HTML. Each page contains the data to be included
in the web page and the HTML tags.
• The web browser understands these tags and displays the corresponding web
page.
• We browse the World Wide Web using a web browser.
• All text, graphics and design elements of a web page are "tagged" with codes
that instruct the web browser how to display the files.
• You can recognize these files easily because they contain the file extension of
'html' or 'htm'.
• Just consider the following hierarchy of HTML document.
Page | 6
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML Editors
• An HTML editor is a software application for creating web pages.
• Although the HTML markup of a web page can be written with any text editor,
specialized HTML editors can offer convenience and added functionality.
• For example, many HTML editors work not only with HTML, but also with related
technologies such as CSS, XML and JavaScript.
• In some cases they also manage communication with remote web servers via
FTP and WebDAV.
• Some commonly used HTML Editors are listed here under,
Adobe Dreamweaver
It is a web development application available for both MAC and Windows
operating system. Recent versions have incorporated support for web
technologies such as CSS, JavaScript and various server-side scripting
languages and frameworks including ASP.NET, ColdFusion, Java Server
Pages (JSP), and PHP.
Visual Web Developer Express
It is a freeware web development tool that allows developers to evaluate
the web development and editing capabilities of the other Visual Studio
2008 editions at no charge. Its main function is to create ASP.NET
websites. It has a WYSIWYG (What You See Is What You Get) interface,
drag-and-drop user interface designer, enhanced HTML & code editors; a
data base explorer; support for other web technologies (e.g., CSS,
JavaScript, XML).
Microsoft FrontPage
It is also known as Microsoft Office FrontPage, is a WYSIWYG HTML
editor and web site administration tool from Microsoft for the Microsoft
Page | 7
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Windows line of operating systems. It was branded as part of the
Microsoft Office suite from 1997 to 2003.
Page | 8
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Overview of HTML
• Hypertext refers to the way in which web pages (HTML documents) are linked
together.
• Thus the link available on a web page are called Hypertext.
• As its name suggests, HTML is a Markup Language which means you use HTML
to simply "Markup" a text document with tags that tell a web browser how to
structure it to display.
• Originally, HTML was developed with the intent of defining the structure of
documents like headings, paragraphs, lists and so forth to facilitate the sharing of
scientific information between researchers.
• Now, HTML is being widely used to format web pages with the help of different
tags available in HTML language.
• A markup language such as HTML is simply a collection of codes elements in
this case that are used to indicate the structure and format of a document.
• The codes have meaning that is interpreted by a formatting program, often a
Web browser, which renders the document.
• Elements in HTML consist of alphanumeric tags within angle brackets.
• These tags usually come in pairs, but exceptions do exist.
Page | 9
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• In its simplest form, following is an example of an HTML document,
• Save the file as mypage.html. Start your Internet browser. Select Open (or Open
Page) in the File menu of your browser.
• A dialog box will appear. Select Browse (or Choose File) and locate the html file
you just created - mypage.html - select it and click Open.
• Now you should see an address in the dialog box, for example
C:\MyDocuments\mypage.html.
• Click OK, and the browser will display the page.
Page | 10
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
There are a few exceptions to this rule generally elements which never
contain content.
Some characters have to be replaced in the text by escape sequences.
If < was not escaped the software would attempt to process anything that
followed it as part of a tag.
Therefore if you want to include such a character in your code you must
replace it with the escape sequence.
White space, tabs and newlines are ignored by the browser, they can be used
to make the HTML source more readable without affecting the way that the
page is displayed.
Actually they are not ignored, but multiple white spaces are replaced by a
single space, while newlines and tabs are treated as spaces.
If a browser does not understand a tag it will usually ignore it.
• To learn HTML, you will need to study various tags and understand how they
behave while formatting a textual document.
• Learning HTML is simple as users have to learn the usage of different tags in
order to format the text or images to make a beautiful web page.
• An HTML element is defined by a starting tag. If the element contains other
content, it ends with a closing tag, where the element name is preceded by a
forward slash.
• So here <p>....</p> is an HTML element, <h1>...</h1> is another HTML element.
• There are some HTML elements which don't need to be closed, such as
<img.../>, <hr /> and <br /> elements.
• These are known as void elements.
• HTML documents consist of a tree of these elements and they specify how
HTML documents should be built, and what kind of content should be placed in
what part of an HTML document.
Tag Name Description
<A> Anchor Make Hyperlinks
<B> Bold Bold the text
<BODY> Body of HTML Document Where to start the document and place the
HTML codes
Page | 12
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
<BR> Line Break Force to change line
<CENTER Center Center alignment
>
<EM> Emphasis Emphasis the content
<FONT> Font Change font set up
<FORM> Form Insert a form inside the web page
<H1> Heading 1 Heading size
<HEAD> Heading of HTML Contains information about the page
document
<HR> Horizontal rule Create a horizontal line
<HTML> Hypertext markup language Begins the html document
<I> Italic Italic the text
<IMG> Image Image
<INPUT> Input field Insert a input field
<LI> List item Create a listed item in an unordered or
ordered list
<MENU> Menu Insert a menu in a web page
<OL> Ordered list Numbered the list
<P> Paragraph Create a line break and a space between
lines.
<TABLE> Table Insert a table inside a web page
<TD> Table data The cell of a table
<TH> Table header The header of a table
<TITLE> Document title The title in the title bar of the browser
<TR> Table row The row of a table
<U> Underline Underline the text
<UL> Unordered list Bullets the list
<STRIKE> Strike the text For making the text appears stroked out
<SUB> Subscript For making the text subscript
<SUP> Superscript For making the text superscript
<DFN> Definition For displaying text as a definition
<CITE> Citations For displaying citations and references
Page | 13
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Head Tags
• The Head tags are used to store information about the web page such as the title
of the page.
• Any document starts with a heading. You can use different sizes for your
headings.
• HTML also has six levels of headings, which use the elements <h1>, <h2>,
<h3>, <h4>, <h5>, and <h6>.
• While displaying any heading, browser adds one line before and one line after
that heading.
• Example program
• Output
Page | 14
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Title Tags
• The Title tags are used to enter a Title for the web page.
• This tag contains the title of the HTML document, which will appear in the web
browser's title bar and is used but search engines to refer to the document.
• Each <HEAD> element should include a <TITLE> element.
Page | 15
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Paragraph Tags
• The <p> tag offers a way to structure your text into different paragraphs.
• Each paragraph of text should go in between an opening <p> and a closing </p>
tag.
• Example Program
• Output
Page | 16
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Page | 17
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Centering Content
• You can use <center> tag to put any content in the center of the page or any
table cell.
• Example Program
• Output
Horizontal Lines
• Horizontal lines are used to visually break up sections of a document. The <hr>
tag creates a line from the current position in the document to the right margin
and breaks the line accordingly.
• Example Program
Page | 18
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
• Again <hr /> tag is an example of the empty element, where you do not need
opening and closing tags, as there is nothing to go in between them.
• The <hr /> element has a space between the characters hr and the forward
slash.
• If you omit this space, older browsers will have trouble rendering the horizontal
line, while if you miss the forward slash character and just use <hr> it is not valid
in XHTML.
Page | 19
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Preserver Formatting
• Sometimes you want your text to follow the exact format of how it is written in the
HTML document. In those cases, you can use the preformatted tag <pre>.
• Any text between the opening <pre> tag and the closing </pre> tag will preserve
the formatting of the source document.
• Example Program
• Output
Non-breaking Spaces
• Suppose you want to use the phrase "12 Angry Men." Here you would not want a
browser to split the "12, Angry" and "Men" across two lines.
• In cases where you do not want the client browser to break text, you should use
a non-breaking space entity & nbsp; instead of a normal space.
Page | 20
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• For example, when coding the "12 Angry Men" in a paragraph, you should use
something similar to the following code:
• Example Program
• Output
• Example program
Page | 21
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Page | 22
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML Attributes
• An attribute is used to define the characteristics of an HTML element and is
placed inside the element's opening tag.
Page | 23
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Right
Center
• Example program
• Output
Core Attributes
• The four core attributes that can be used on the majority of HTML elements
(although not all) are,
id
title
class
style
• The id attribute
The id attribute of an HTML tag can be used to uniquely identify any element
within an HTML page. There are two primary reasons that you might want to
use an id attribute on an element.
If an element carries an id attribute as a unique identifier it is possible to
identify just that element and its content.
Page | 24
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
If you have two elements of the same name within a web page (or style
sheet), you can use the id attribute to distinguish between elements that
have the same name.
Example
Output
Page | 25
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Output
At this point of time, we are not learning CSS, so just let's proceed without
bothering much about CSS.
Here you need to understand what are HTML attributes and how they can be
used while formatting content.
Internationalization Attributes
• There are three internationalization attributes, which are available for most
(although not all) XHTML elements.
dir
lang
xml:lang
• The dir attribute
The dir attribute allows you to indicate to the browser the direction in which
the text should flow.
The dir attribute can take one of two values, as you can see in the table that
follows.
Page | 26
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Value Meaning
ltr Left to right (default value)
rtl Right to left (for languages such as Hebrew or Arabic that are
read right to left.
Example Program
Output
When dir attribute is used within the <html> tag, it determines how text will be
presented within the entire document.
When used within another tag, it controls the text's direction for just the
content of that tag.
• The lang Attribute
The lang attribute allows you to indicate the main language used in a
document, but this attribute was kept in HTML only for backwards
compatibility with earlier versions of HTML.
This attribute has been replaced by the xml:lang attribute in new XHTML
documents.
The values of the lang attribute are ISO-639 standard two-character language
codes. Check HTML Language Codes: ISO 639 for a complete list of
language codes.
Example Program
Page | 27
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 28
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 29
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 30
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML Text
• The text on HTML page can be altered in a number of ways.
• The actual font used can be changed to attempt to force the browser to use a
specific font and the look of the text can be changed for emphasis.
• Web page authors who are worried about issues of usability and who want to
create pages which work across different types of device frown upon the
elements in this section.
• It is a really good idea to use styles wherever possible.
• The forthcoming XHTML 2 recommendation even suggests that the style
attribute will disappear, to be replaced by a new element.
• Unfortunately many HTML editing tools still use the elements and attributes listed
here so the chances are that you will come across these at some point.
• Be aware that whenever you are able to write your code by hand, or if you have
user configurable tool, you should use styles.
• If you use a word processor, you must be familiar with the ability to make text
bold, italicized, or underlined; these are just three of the ten options available to
indicate how text can appear in HTML and XHTML.
Bold Text
• Anything that appears within <b>...</b> element, is displayed in bold.
• Example program
Page | 31
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Italic Text
• Anything that appears within <i>...</i> element is displayed in italicized.
• Example program
• Output
Underlined Text
• Anything that appears within <u>...</u> element, is displayed with underlined.
• Example program
Page | 32
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Strike Text
• Anything that appears within <strike>...</strike> element is displayed with strike
through, which is a thin line through the text.
• Example program
• Output
Monospaced font
• The content of a <tt>...</tt> element is written in monospaced font.
• Most of the fonts are known as variable-width fonts because different letters are
of different widths (for example, the letter 'm' is wider than the letter 'i').
• In a monospaced font, however, each letter has the same width.
• Example program
Page | 33
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Superscript Text
• The content of a <sup>...</sup> element is written in superscript; the font size
used is the same size as the characters surrounding it but is displayed half a
character's height above the other characters.
• Example program
• Output
Subscript Text
• The content of a <sub>...</sub> element is written in subscript; the font size
used is the same as the characters surrounding it, but is displayed half a
character's height beneath the other characters.
• Example program
Page | 34
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Inserted Text
• Anything that appears within <ins>...</ins> element is displayed as inserted text.
• Example program
• Output
Deleted Text
• Anything that appears within <del>...</del> element is displayed as deleted text.
• Example program
Page | 35
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Larger Text
• The content of the <big>...</big> element is displayed one font size larger than
the rest of the text surrounding it.
• Example program
• Output
Smaller Text
• The content of the <small>...</small> element is displayed one font size smaller
than the rest of the text surrounding it.
• Example program
Page | 36
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Grouping Content
• The <div> and <span> elements allow you to group together several elements
to create sections or subsections of a page.
• For example, you might want to put all of the footnotes on a page within a <div>
element to indicate that all of the elements within that <div> element relate to the
footnotes.
• You might then attach a style to this <div> element so that they appear using a
special set of style rules.
• Example program
Page | 37
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
• The <span> element, on the other hand, can be used to group inline elements
only.
• So, if you have a part of a sentence or paragraph which you want to group
together, you could use the <span> element as follows.
• Example program
• Output
Page | 38
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• These tags are commonly used with CSS to allow you to attach a style to a
section of a page.
Comment Lines
• HTML programming language has the facility to include comment lines for the
reference of the programmer.
• The comment will not appear in the web page. We include comments using the
<! ......> tag.
• The general format is,
• Example
• <! This part illustrates the product profile of the company >
Page | 39
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML Links
• The HTML <a> tag defines a hyperlink.
• An anchor tag (a) is used to define a link, but you also need to add something to
the anchor tag – the destination of the link.
• A hyperlink (or link) is a word, group of words, or image that you can click on to
jump to another document.
• When you move the cursor over a link in a Web page, the arrow will turn into a
little hand.
• The most important attribute of the <a> element is the href attribute, which
indicates the link's destination.
• By default, links will appear as follows in all browsers,
An unvisited link is underlined and blue.
A visited link is underlined and purple.
An active link is underlined and red.
HTML Link Syntax
• The HTML code for a link is simple. It looks like this,
Page | 40
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML Lists
• A list is any ordered set of data. HTML offers us several mechanisms for
specifying lists of information.
• Lists are a part of everyday life. To-do lists determine what to get done.
• Navigational routes provide turn-by-turn lists of directions. Recipes provide lists
of ingredients and lists of instructions.
• With a list for nearly everything, it’s easy to understand why they are also popular
online.
• When we want to use a list on a website, HTML provides three different types to
choose from,
Unordered List
Ordered List
Description List
Page | 41
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Choosing which type of list to use or whether to use a list at all comes down to
the content and the most semantically appropriate option for displaying that
content.
• For example, we can choose what type of marker to use on a list. The marker
could be square, round, numeric, alphabetical, or perhaps nonexistent.
• Also, we can decide if a list should be displayed vertically or horizontally. All of
these choices play significant roles in the styling of our web pages.
• Unordered List
An unordered list is simply a list of related items whose order does not matter.
Creating an unordered list in HTML is accomplished using the unordered list
block-level element,<ul>.
Each item within an unordered list is individually marked up using the list item
element,<li>.
By default, most browsers add a vertical margin and left padding to the <ul>
element and precede each <li> element with a solid dot.
Example program
Output
• Ordered List
The ordered list element, <ol>, works very much like the unordered list
element; individual list items are created in the same manner.
Page | 42
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
The main difference between an ordered list and an unordered list is that with
an ordered list, the order in which items are presented is important.
Because the order matters, instead of using a dot as the default list item
marker, an ordered list uses numbers.
Example Program
Output
• Description List
Another type of list seen online (but not as often as unordered or ordered
lists) is the description list.
Description lists are used to outline multiple terms and their descriptions, as
in a glossary.
Creating a description list in HTML is accomplished using the description list
block-level element, <dl>.
Instead of using a <li> element to mark up list items, the description list
requires two block-level elements the description term element, <dt>, and the
description element, <dd>.
A description list may contain numerous terms and descriptions, one after the
other.
Additionally, a description list may have multiple terms per description, as well
as multiple descriptions per term.
A single term may have multiple meanings and warrant multiple descriptions.
Conversely, a single description may be suitable for multiple terms.
Page | 43
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
When adding a description list, the <dt> element must come before the <dd>
element.
The definition term and the description that directly follows it correspond to
one another thus, the order of these elements is important.
By default, the <dl> element will include vertical margins, just like the <ul>
and <ol>elements.
Additionally, the <dd> element includes a left margin by default.
Page | 44
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 45
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Not only do these mechanisms greatly assist users with visual disabilities, they
make it possible for multi-model wireless browsers with limited display
capabilities (e.g., Web-enabled pagers and phones) to handle tables.
• Tables should not be used purely as a means to layout document content as this
may present problems when rendering to non-visual media.
• Additionally, when used with graphics, these tables may force users to scroll
horizontally to view a table designed on a system with a larger display.
• To minimize these problems, authors should use style sheets to control layout
rather than tables.
Access a Table object
• User can access a <table> element by using getElementById().
Page | 46
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Table Object Methods
Page | 47
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML Frames
• Frame is a typical layout on the web page by which a user can interact with the
web page.
• The browser window is called the container. It is possible to divide the container
into several frames and use each frame for displaying a different html document.
• Frames have the following characteristics.
Each frame is given a name.
Each frame will be targeted by a html document.
Each frame resizes itself dynamically in response to the changes in the size
of visible client area.
• Typical component of forms are text field, text area, checkbox, radio buttons and
push buttons.
• HTML allows us to place these form components on the web page and send the
desired information to the destination server.
• Frames allow dividing the browser window into sub-regions.
• By displaying multiple documents, you can compare their data.
• You can also use frames to show index as links in one sub-region and the
corresponding document in their other sub-region.
• This way, the index will never go out of sight while browsing through the
document.
• Frames can divide the browser window horizontally or vertically.
• You can also nest a frame within another frame. You can display tables, links
forms and images through frames.
• To split the browser window, you need to create frames. Frames allow you to
display different HTML pages in one browser window.
• To create frames, you need to create a FRAME document, except that a
<FRAMESET> container replaces the <BODY> container.
Page | 48
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• A <FRAMESET> container describes the HTML document or frames that make
up the page.
• A standard frame has no BODY element and cannot contain tags that would
normally be placed in the BODY element.
• If they appear in the frame document, the <FRAMESET> tag is ignored.
Page | 49
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 50
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
There is no need to explicitly assign them to the NAME attribute. They need
to be specified with the TARGET attribute.
It is used to indicate which frame a document should be loaded into.
This is especially important when you want to create links in one frame that
load pages into an another frame, in which case the second frame needs a
name to identify itself as the target of the link.
_blank: By specifying TARGET = "blank", the document will be loaded in a
new window. For example,
Although these are reserved names for the NAME attribute of the FRAME
element, they are to be referred to using a <A> tag.
It is used to target specific windows, allowing smoother transition between
framed documents and between framed and normal documents.
• The MARGINWIDTH Attribute
The MARGINWIDTH attribute is used when the document author wants to
control the margin for the frame.
It has to be specified as a pixel value. Margins cannot be less than one.
This attribute allows you to specify the width of the space between the left
and right of the frame's borders and the frame's content. The value is given in
pixels. For example marginwidth="10".
• The MARGINHEIGHT Attribute
This attribute allows you to specify the height of the space between the top
and bottom of the frame's borders and its contents.
The value is given in pixels. For example marginheight="10".
• The SCROLLING Attribute
This attribute describes if the frame should have a scroll-bar or not.
This attribute controls the appearance of the scroll-bars that appear on the
frame.
If the value is "yes", the scroll-bar will always be visible on the frame.
The "no" value results in scroll-bars are needed and place them wherever
they are needed.
The scrolling attribute is optional, by default, the value is "auto".
Page | 51
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The NORESIZE Attribute
This attribute has no value. It is just a flag, which informs the user that the
frame is not re-sizable by the user.
Users typically re-size the frames by dragging a frame edge to a new
position.
If any of the frames adjacent to an edge is not re-sizable, than entire edge will
be restricted from moving.
This will affect the re-sizability of other frames.
The NORESIZE attribute is optional by default, all frames are re-sizable.
By default you can re-size any frame by clicking and dragging on the borders
of a frame. The noresize attribute prevents a user from being able to re-size
the frame.
For example noresize="noresize".
• The FRAMEBORDER Attribute
This attribute allows control of the frame border display.
With this attribute set to "0", the borders for the specific frame are not drawn.
This attribute specifies whether or not the borders of that frame are shown, it
overrides the value given in the frame-border attribute on the <frameset> tag
if one is given, and this can take values either 1 (yes) or 0 (no).
• The FRAMESPACING Attribute
This attribute allows the setting of extra space around frames to give the
appearance of floating frames.
The "value" should be the distance required around the frame, in pixels.
For example, <FRAME FRAMESPACING = "55" ...> would display the frame
with a spacing of 55 pixels.
Page | 52
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Creating Frames
• To use frames on a page we use <frameset> tag instead of <body> tag.
• The <frameset> tag defines how to divide the window into frames.
• The rows attribute of <frameset> tag defines horizontal frames and cols attribute
defines vertical frames.
• Each frame is indicated by <frame> tag and it defines which HTML document
shall open into the frame.
• Example program
• Output
Page | 53
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Example program
• Output
Page | 54
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Disadvantages of Frames
• There are few drawbacks with using frames, so it's never recommended to use
frames in your web pages. There are,
Some smaller devices cannot cope with frames often because their screen is
not big enough to be divided up.
Sometimes your page will be displayed differently on different computers due
to different screen resolution.
The browser's back button might not work as the user hopes.
There are still few browsers that do not support frame technology.
Browser Support for Frames
• If a user is using any old browser or any browser which does not support frames
then <noframes> element should be displayed to the user.
• So you must place a <body> element inside the <noframes> element because
the <frameset> element is supposed to replace the <body> element, but if a
browser does not understand <frameset> element then it should understand
what is inside the <body> element which is contained in a <noframes> element.
• You can put some nice message for your user having old browsers. For example
Sorry!! your browser does not support frames. As shown in the above example.
Frames names and target attributes
• One of the most popular uses of frames is to place navigation bars in one frame
and then load main pages into a separate frame.
• Let's see following example where a test.htm file has following code.
• Example program
Page | 55
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 56
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 57
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Forms
• Forms are used to accept data from the user. This data can be personal
information from the user or some feedback from the user.
• Forms help to enhance the web site depending on the user's feedback. To create
a form, FORM element is required.
• It uses the opening and closing <FORM>......</FORM> tags.
• Different controls such as text box, option buttons, images and checkbox can be
put in a form.
• Forms cannot be nested, but a web page can contain more than one form.
• The actual working of a form involves the ACTION and the METHOD attribute to
be set.
• The ACTION attribute specifies the URL. The METHOD attribute can take up two
values - GET and POST.
• Both the values of the METHOD attribute work for the same purpose, with a
slight difference.
• When "Post" is used as the value of method attribute, the information is sent as a
block of data through an HTTP post transaction.
• When "GET" is used, the form information is added to the URL.
• The page is opened as if it were an anchor. The default value of the METHOD
attribute is "GET".
• HTML forms enable you to accept data over the internet. You can accept
feedback, conduct a web survey or collect information from the users using
HTML forms.
• The various form elements used to create an HTML form are,
o HTML Forms are required when you want to collect some data from the
site visitor.
Page | 58
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
o For example during user registration you would like to collect information
such as name, email address, credit card, etc.
o A form will take input from the site visitor and then will post it to a back-
end application such as CGI, ASP Script or PHP script etc.
o The back-end application will perform required processing on the passed
data based on defined business logic inside the application.
o There are various form elements available like text fields, text area fields,
drop-down menus, radio buttons, checkbox, etc.
o Syntax
Page | 59
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Forms Attributes
• Apart from common attributes, following is a list of the most frequently used form
attributes.
HTML Form Controls
• There are different types of form controls that you can use to collect data using
HTML form,
Text Input Controls
Checkbox Controls
Radio Box Controls
Select Box Controls
File Select Controls
Hidden Controls
Clickable Buttons
Submit and Reset Button
Input Type Value of the Type Attributes Example
Checkbox “checkbox” <input type=”checkbox” name=a>
Radio button “radio” <input type=”radio” name=a>
Text field “text” <input type=”text” name=a>
Password field “password” <input type=”password” name=a>
Hidden field “hidden” <input type=”hidden” name=a>
Button “button” <input type=”button” name=a>
Submit button “submit” <input type=”submit” name=a>
Reset button “reset” <input type=”reset” name=a>
Page | 60
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Single Line Text Input Controls
Password Input Controls
Multi Line Text Input Controls
Output
Page | 61
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Output
Attributes
Page | 62
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
This is used when the user is required to give details that may be longer
than a single sentence. Multi line input controls are created using HTML
<textarea> tag.
Example program
Output
Attributes
Page | 63
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Checkbox Controls
Checkbox is used when more than one option is required to be selected.
They are also created using HTML <input> tag but type attribute is set to
checkbox.
Example program
Output
Attributes
Page | 64
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Output
Attributes
Page | 65
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Output
Page | 66
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 67
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Output
• Button Controls
There are various ways in HTML to create clickable buttons.
You can also create a clickable button using <input> tag by setting its type
attribute to button.
The type attribute can take the following values:
Example Program
Output
Page | 68
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 9.30: Output of button control
Output
Page | 69
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML Images
• Images play an important part in a web site. They make our web pages appear
more eye catching and descriptive.
• A judicious use of images with text can make your web page quite appealing.
• In the following sections we will learn how to insert images to our web pages and
how to work with them properly to make the web page impressive.
• Always use images in jpeg or gif format since most of the browsers support these
two formats.
• The <img> tag is empty, which means that it contains attributes only and it has
no closing tag.
• To display an image on a page, you need to use the src attribute. Src stands for
"source".
• The value of the src attribute is the URL of the image you want to display on your
page.
• The IMG SRC tag is used for inserting images to a web page. The syntax of
defining an image.
• Syntax:
• Not only does the source attribute specify what image to use, but where the
image is located.
• The above image, graphics/chef.gif, means that the browser will look for the
image name chef.gif in a graphics folder in the same folder as the html document
itself.
• Images are the second aspect of a pleasant web experience.
• The problems with images are legion if they are not used wisely.
Page | 70
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• First, experienced or impatient web surfers often switch image loading off by
default, on their browsers.
• If your site relies on an image to get important information across, these people
may never see it.
• Second, loading images is a slow process and if you use too many, or your
images are too large, the download times can easily become intolerable.
• Browsers display a limited range of image types. You can only guarantee that
GIF and JPG will be displayed everywhere, although more and more browsers
are now able to display the PNG format, which was intended as a free
replacement for the GIF format when that was copyrighted.
• If you want high-quality, good compression and loss of colors use JPG, for
instance when displaying photographs.
• Generally, though GIFs are more common as they tend to be smaller files, lots of
software can manipulate them and can be animated.
Image attributes
• A picture or an image in the web page can be inserted using the <img> tag.
• The <img> tag has several attributes to inform the source, height of the picture,
width of the picture alignment etc.
src
Height
Width
Align
alt
• src and alt
The src attribute specifies the source of the picture. It gives the file name of
the picture file.
The two parameters src and alt, define where to find the image and text to
display if the user agent cannot display the image (or is set not to display
images at all).
Page | 71
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
These two parameters comprise the minimal set of parameters for any image
tag.
Here is an example of the image tag that will insert a computer image,
computer.jpg, into a document with the alternate text "A picture of a
computer".
• Height and Width
The height and the width may be expressed in terms of either pixels of
percentage or units. The default is the pixels.
Syntax
o Specifies that the width of the image should be NUMBER pixels.
o If no dimensions are specified for the image, the browser will insert the
image exactly as is, at the same size as you would view it in a picture
editor on your computer.
o The picture will load slightly faster if you specify the height and width so
that the browser does not have to determine it.
o User may also find it quicker and easier to specify a specific width and
height for the image in the HTML, rather than editting and resizing the
image on the computer.
• Align
The align attribute can be used to align the picture.
Insert Image
• User can insert any image in the web page by using <img> tag.
• The <img> tag is an empty tag, which means that it can contain only list of
attributes and it has no closing tag.
• Syntax
• To try following example, let's keep our HTML file test.htm and image file
test.png in the same directory.
Page | 72
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Example program
• Output
• User can use PNG, JPEG or GIF image file based on the comfort but make sure
user specify correct image file name in src attribute. Image name is always case
sensitive.
• The alt attribute is a mandatory attribute which specifies an alternate text for an
image, if the image cannot be displayed
Set Image Location
• Usually we keep all the images in a separate directory.
• So let's keep HTML file test.htm in our home directory and create a subdirectory
images inside the home directory where we will keep our image test.png.
• Example program
• So let's keep HTML file test.htm in our home directory and create a subdirectory
images inside the home directory where we will keep our image test.png.
• Assuming our image location is "image/test.png", try the following example
Page | 73
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
• Output
Page | 74
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Page | 75
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Output
Page | 76
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Multimedia
• Multimedia is any combination of text, graphics, video, audio and animation in a
distributed format that consumers can interact with using a digital device.
Page | 77
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Revolutions displace traditional beliefs and practices. They also create entirely
new activities and products.
• The industrial revolution displaced traditional craftsmanship goods that had been
produced by hand in small shops were now made in factories by machines.
The multimedia revolution is also displacing tradition and ushering in new
products and activities.
• The defining elements of modern multimedia, including its different forms
Non interactive
Interactive
Basic
Hypermedia
Adaptive
Immersive
• The word multimedia comes from the Latin words “mults” which means
numerous a “media” which means middle or center.
• Multimedia, in the general sense, therefore, means “multiple intermediaries”
between the source and sink of information or “multiple means” by which
information is stored, transmitted, presented or perceived.
• The multiple means by which we can perceive information are the following,
Text (e.g., book chapter, newspaper article)
Image (e.g., photograph)
Graphics (e.g., sketch, diagram)
Sound (e.g., speech, music)
Video (e.g., TV program, movie clip)
Animation (e.g., animation clip)
Characteristics of Multimedia
• There is no general consensus on the exact definition of multimedia. Several
definitions have been proposed by authors with varying scopes.
Page | 78
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Multimedia is an interdisciplinary application oriented technology that capitalizes
on the multi-sensory nature of humans.
• The following as important characteristics of a multimedia presentation such as
Multiple media
Non linearity
Scope of interactivity
Integrity
Digital Representation
Browser support
• The first web browsers had support for text only, limited to a single font in a
single color.
• Later came browsers with support for colors and fonts, and even support for
pictures.
• The support for sounds, animations, and videos is handled differently by various
browsers. Different types and formats are supported, and some formats requires
extra helper programs (plug-ins) to work.
Multimedia Formats
• Multimedia elements (like sounds or videos) are stored in media files.
• The most common way to discover the type of a file, is to look at the file
extension.
• When a browser sees the file extension .htm or .html, it will treat the file as an
HTML file.
• The .xml extension indicates an XML file, and the .css extension indicates a style
sheet file.
• Pictures are recognized by extensions like .gif, .png and .jpg.
• Multimedia files also have their own formats and different extensions like: .swf,
.wav, .mp3, .mp4, .mpg, .wmv, and .avi.
Common Video Formats
• MP4 is the new and upcoming format for the internet video.
Format File Description
Page | 79
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
MPEG .mpg MPEG. Developed by the Moving Picture Expert Group. The first
.mpeg popular on the web. Used to be supported by all browsers.
AVI .avi AVI (Audio Video Interleave). Developed by Microsoft. Commonly
used in video cameras and TV hardware. Plays well on Windows
computer, but not in web browsers.
WMV .wmv WMV (Windows Media Video). Developed by Microsoft.
Commonly used in video cameras and TV hardware. Plays well
on Windows computer, but not in web browsers.
QuickTime .mov QuickTime. Developed by Apple. Commonly used in video
cameras and TV hardware. Plays well on Apple computers, but
not in web browsers.
RealVideo .rm RealVideo. Developed by Real Media to allow video streaming
.ram with low bandwidths. It is still used for online video and Internet
TV, but does not play in web browsers.
Flash .swf Flash. Developed by Macromedia. Often requires an extra
.flv component (plug-in) to play in web browsers.
Ogg .ogg Theora Ogg. Developed by the Xiph.Org Foundation. Supported
by HTML5.
WebM .webm WebM. Developed by the web giants, Mozilla, Opera, Adobe, and
Google.
MPEG-4 or mp4 MP4. Developed by the Moving Pictures Expert Group. Based on
MP4 QuickTime. Commonly used in newer video cameras and TV
hardware.
Page | 80
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 81
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
HTML Exercises
• Create a webpage that prints your name to the screen.
• Create a webpage and set its title to "This is a webpage".
• Create a webpage that prints any text of your choosing to the screen, do not
include a head section in the code.
• Print two paragraphs that are both indented using command.
• Print two lists with any information you want. One list should be an ordered list,
the other list should be an unordered list.
• Prints an h1 level heading followed by a horizontal line whose width is 100%.
Below the horizontal line print a paragraph relating to the text in the heading.
• Print some deleted and inserted text of your choosing.
• Display five different images. Skip two lines between each image. Each image
should have a title.
Page | 82
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Topic: Summary
Page | 83
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Model Questions
Page | 84
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
Answers:
1.b
2.b
3.a
4.a
5.c
Page | 85
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
Answers:
1.a
2.b
3.a
Page | 86
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
1. HTML: The Complete Reference, Second Edition by Thomas A. Powell.
2. Internet Technology and Web Designer by ISRD Group.
3. Web Technology and Design by C. Xavier.
4. The Complete Reference – Web design by Thomas A. Powell – Tata McGraw
Hill Edition.
5. The Complete Reference – HTML and CSS by Thomas A. Powell – Tata
McGraw hill Edition.
6. Beginning Web Programming with HTML, XHTML and CSS by Jon Duckett.
7. An introduction to HTML and JavaScript for scientists and Engineers by Springer.
8. W3Schools (http://www.w3schools.com/html/)
Page | 87
Course Name : INTERNET TECHNOLOGY AND WEB DESIGN
Module Name: INTERACTIVE TOOLS
TABLE OF CONTENT
UNIT NUMBER 10/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
10.1 Objectives
10.2 Interactive Tools
10.2.1 Interactive Tools
10.2.2 Active Server Pages (ASP)
10.2.3 VB Script
10.2.3A VB Script Variables and Constants
10.2.3B VB Script – Loops
10.2.4 Java and Front Page
10.2.5 Java Script
10.2.6 Flash
10.2.6A Working With Flash
10.2.6B Tools in Flash Player
10.2.6C Grouping
10.2.6D Layering
10.3 Summary
10.4 Model Questions
Assessment 1
Assessment 2
References
Page | 2
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of the course the student will be able to
Know about the interactive tools used for creating web page.
Page | 3
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Interactive Tools
• Interactivity tools are used to handle 'Forms', reply to user and interact
with server in view of user demand.
ASP
ActiveXControls
VB Script
Java
JavaScript
Front Page
Flash
• These tools have the potential to make the web pages really very
impressive.
Page | 4
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Active Server Pages (ASP), also known as classic ASP or ASP Classic,
which was Microsoft's first server-side script engine for dynamically-
generated web pages.
• User writes programming codes that will generate the HTML for the Web
page dynamically.
• So, whenever a user browses to their web site and requests one of our
ASP pages, the ASP code is processed at that time by a special piece of
software-web server.
• Active Server Pages are text files that can contain not only text and
HTML tags as in standard web document but also commands contain
not only text and HTML tags as in standard web document but also
commands written in a scripting language that can be carried out on the
server.
Page | 5
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• All Active Server pages saved with an .asp extension and can be
accessed like standard URLs through a web browser such as Microsoft
Internet explorer or Netscape Navigator.
First, the HTML is not created until the user wants to see the web
page.
Second it does not care what the browser is being used for.
Requirements Software
In order to publish the pages Need a web server that supports ASP.
Internet information Server 5.0 is one of
the servers which supports ASP version
3.0 and is installed as part of windows
2000 Operating System.
In order to view and test the pages Need a web browser. It can be any
standard web browser that it available in
the market.
• Sample Usage
Page | 6
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
The default scripting language is VB Script.
<html>
<body>
<%Response Write “Hello World”%>
</body>
</html>
Or in a simpler format
<html>
<body>
<%= “Hello World”%>
</body>
</html>
The above examples print "Hello World" into the body of an HTML
document.
<%
Set oConn = Server.CreateObject
("ADODB.Connection")
oConn.Open "DRIVER = (Microsoft Access Driver (*, mdb)); DBQ = "& Server MapPath
(DB.mdb")
Set rsUsers = Server.CreateObject ("ADODB.RecordSet")
rsUsers.Open "SELECT *FROM Users", oConn
%>
Page | 7
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
VB Script
• JavaScript's syntax is arguably less intuitive and more obtuse than that
of VB Script and tends to be less forgiving of simple “mistakes” such as
case sensitivity.
• VB Script was introduced by Microsoft way back in 1996 and the first
version was 1.0. The Current Stable version of VB Script is 5.8, which is
available as part of IE8 or Windows 7.
<html>
<body>
<script language=”vbscript” type=”text/vbscript”>
document.write(“Hello World!”)
</script>
</body>
</html>
Page | 8
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Features of VB Script
• VB Script, for the most part, is case insensitive. It has a very simple
syntax, easy to learn and to implement.
• The VB Script usage areas are aplenty and not restricted to the below
list.
Page | 9
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Microsoft Outlook Forms usually runs on VB Script; however, the
application level programming relies on VBA (Outlook 2000
onwards).
Disadvantages of VB Script
Page | 10
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• To declare variable
Variables are declared using “dim” keyword. Since there is only one
fundamental data type, all the declared variables are variant by
default. Hence, a user need not mention the type of data during
declaration.
Dim Var
Page | 11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The following example program for to declare variable and assign value
to it.
<!DOCtype html>
<html>
<body>
<%
Dim name
name=”Gupta”
Response.write(“Myname is: “ & name)
%>
</body>
</html>
VB Script Constants
Page | 12
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
VB Script – Loops
• There may be a situation when user needs to execute a block of code several
number of times.
• Programming languages provide various control structures that allow for more
complicated execution paths.
Page | 13
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 14
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
<!DOCTYPE html>
<html>
<body>
<%
For i = 0 to 5
response.write(“The number is “& I & “ <br>
“)
Next
%>
</body>
</html>
The number is 0
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5
Page | 15
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Java has a unique quality, however that has made it particularly useful
for web pages.
• It can be used to create animated web pages that interact with the user
or pages that use the screen in unexpected ways.
• The language drives much of its syntax from C and C++ but has a
simpler object model and fever low level facilities.
• Java applications are typically compiled to byte code (class file) that can
run on any Java Virtual Machine (JVM) regardless of computer
architecture.
Primary Goals
• There are five primary goals in the creation of the Java language
Page | 16
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
It should execute with “high performance”.
Java Features
Applet
Servlet
Swing Application
Page | 17
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Java program on the web can do everything as scripting language like
JavaScript can do and can generally do it faster.
• Java usually runs faster because the programs that are attached to Web
pages are in binary form (machine-readable form).
• Java programs can use Internet services such as e-mail, file transfer
and telnet, as well as web services to interact with programs around the
world.
• Applets are contained in separate binary files called class files that must
be downloaded to their browser in additional to the HTML Web
pages.(Sometimes, the applet relies in turn on other binary files, called
library class files, that must also be downloaded.)
• Special instructions in the HTML code of the Web page file (the
<APPLET>) associate applet files with the Web page, and transmit data
to the applet that tells it how to operate.
• To write a Java applet, user must have good programming skills and
understand how to use a compiled object-oriented language.
• User also need same sorts of special tools that developers in other
sophisticated languages like C or C++ require: compilers, linkers,
libraries, debuggers, documentations and the like.
Page | 18
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The original collections of tools for this purpose is called the Java
Development Kit (by Sun Microsystems, who pioneered the Java
language) and is available at http://java.sun.com.
• To use an applet with their webpage, user must add tags to their web
page and place the class file (the applet file) on their usually in the same
directory as their web page.
• Following is an example of one way the code is often written, using the
<APPLET> and </APPLET> tags.
</APPLET>
Front Page
Page | 19
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• FrontPage has many more features than FrontPage express. It allows to
view and manage the overall structure of their websites and create web
pages.
• A web site is a collection of related files that are linked together to form
an information unit that user can publish on web.
• FrontPage is their web navigation center, the place where users starts
and finish their work on the web.
• When user construct a web site they can create individual web pages
and string them together with links so that visitors can easily jump from
pages to pages.
• User can create a web site from scratch using any text editor. The web
smart components of FrontPage 2000 that make the task easier for
users are
Server Extension
Add-on programs for web server software that make the server
FrontPage aware and able to interact more closely with FrontPage
webs.
FrontPage View
The different views of web that allow user to add, remove and
rename resources, keep all the hyperlinks upto date, edit web
pages in a powerful yet easy to use HTML editor are
Page | 20
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Navigation view – Hyperlink view
Image Composer
Page | 21
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Java Script
<html>
<head>
<title> Simple page </title>
</head>
<body>
<Script type = “text/JavaScript”>
document.write (“Hello World!!”);
</Script>
<noscript>
<P>Your browser either doesnot support
JavaScript,
or user have JavaScript turned off. </P>
</noscript>
</body>
</html>
Page | 22
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Flash
• Flash professional is the most popular authoring tool for creating the
Flash content, which also allows automation via the JavaScript Flash
language (JSFL).
Creating graphics
Page | 23
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Working with layers
Page | 24
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 25
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The upper left corner of the screen displays the Tools palette, which
contains tools that user can use to create or modify graphics and text.
• User can select a tool by clicking on it. Tool modifiers for the selected
tool display below the Tools palette. User can use modifiers to set tool
options.
• The Timeline appears in the upper portion of the screen. User can use
the Timeline to lay out the sequence of their move.
• The Stage displays in the center of the screen. User can create their
movie on the Stage.
The Grid
• While creating graphics, the grid is often helpful. To turn on the grid
Choose view → Grid → Edit Grid from the menu. The Grid dialog box
opens.
Page | 26
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Click the Color box and select gray to have the grid lines display in
gray
Choose Snap to Grid to cause the edges of your graphic to align with
the grid lines.
Click OK.
The Property Inspector
• In the Property inspector, user can set the attributes of objects as their
need. User will use the Property inspector frequently when working in
Flash Professional 8. To open the Property inspector:
Page | 27
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• When user is not working in a panel, they can collapse the panel.
• To collapse the Property inspector, click the Collapse icon. To open the
Property inspector again, click the Expand icon.
Page | 28
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Choose the Oval tool. There are two color boxes on the Modifier
panel.
These color boxes are used to set the stroke and fill colors. The
stroke color outlines their drawing. The fill color fills the center of
their drawing.
Click the Stroke Color box and then click the color black to choose
black as their stroke color.
Click the Fill Color box and then click the color navy to choose
navy as their fill color.
Page | 29
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• User can also set the thickness of the stroke line in the Property
inspector. To set the thickness of the stroke line.
Choose Solid from the drop-down menu to select the type of line
that will outline their drawing.
Click OK.
Page | 30
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Click the Stroke color box and choose brown as the stroke color.
Click the Fill color box and choose brown as the fill color.
For example, to draw the tree trunk. Make sure the starting point
and the ending point connect.
Page | 31
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Choose the Paint Bucket tool. User can use the Paint Bucket tool
to fill enclosed areas with color.
Page | 32
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Grouping
• Grouping option is used to group two objects. User can also turn that
grouped object into a symbol.
Use the Selection tool to create a rectangle around the tree. This
selects the tree.
Choose Modify → Group from the menu to make the treetop and the
tree trunk a single object.
Press the Delete key to remove the tree from the Stage.
Page | 33
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 34
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Layering
• User can see through each layer to the layers under it until they add
color. User can also add layers, delete layers, and change the position
of layers.
• Each layer is independent of all other layers. The layer that user are
currently working on is called the active layer. They can view layer
information on the Timeline.
• To renaming a Layer
Click OK.
Page | 35
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Choose Insert → Timeline → Layer from the menu to create a new
layer above the active layer.
Click OK.
Move to the Library panel. If the Library panel is not open, choose
Window → Library from the menu to open the Library.
Click the icon next to Sky and drag a copy of Sky onto the Stage.
Page | 36
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Page | 37
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Topic : Summary
Summary
Page | 38
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Model Questions
Describe interactive tools used to create web pages.
What is VB Script and explain its variable, constants and loops with example.
Explain how to group two images into a single image in Flash player.
Page | 39
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
1. Interactivity tools are used to handle ________ reply to user and interact with
server in view of user demand.
a) Forms
b) Sets
c) Groups
d) Tags
2. ____________ are a web oriented technology for creating dynamic web pages.
a) SAP
b) ASL
c) ASP
d) URL
3. VB Script is a subset of the Visual Basic for application ________________ for
Internet Explorer.
a) Scripting language
b) Markup language
c) Programming language
d) Object oriented programming language
4. JavaScript is a ____________ age used to enable programmatic access to objects
within other applications.
a) Scripting language
b) Markup language
c) Programming language
d) Object oriented programming language
5. ______________ is like a transparent sheet on which user can paint on it.
a) Groups
b) Layers
c) Grid
d) None of the above
Answers:
1.a
2.c
3.c
4.a
5.b
Page | 40
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
1. Active Server Pages (ASP) is a web oriented technology for creating dynamic web
pages.
a) True
b) False
2. Visual Basic or VBA (Visual Basic Application) is used to create web portal.
a) True
b) False
3. Java is a programming language originally developed by James Costing at SUN
MICROSYSTEMS.
a) True
b) False
Answers:
1.a
2.b
3.a
Page | 41
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
Internet Technology and Web Design by ISRD.
Page | 42
Course Name : INTERNET TECHNOLOGY AND WEB DESIGN
TABLE OF CONTENT
UNIT NUMBER 11/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
11.1 Objectives
11.3 Firewall
11.7 Cryptography
11.7.1 Cryptography
11.8 Summary
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Objectives
• At the end of the course the users will
Know about the internet security
Know about Firewall and its types
Understand about the Internet security management concept
Know about information privacy
Understand about the Copyright issues and Cryptography
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.2 Overview of Internet Security
What is Firewall
• A computer network is a collection of autonomous computing devices sharing
data communications technology that enables them to exchange information.
• An internetwork is a set of individual networks, interconnected by the appropriate
devices, in such a way that they can behave as a single larger network.
• These definitions are built around the ideas of providing connectivity and making
information exchange possible, two goals achieved with undoubted success.
• Internetworking has definitely changed the way people live, learn, play and work.
• This is poetic and appealing but it is always important to remember that the
Internet also brings to the scene dangerous features such as anonymity, the
ability to remotely control computers, and automated task execution.
• There should be some means to compensate for the absence of natural
boundaries in the Internet.
• Within the realm of computer networks, a firewall is a security system that lends
itself to the task of isolating areas of the network and delimiting domains of trust.
• Building upon this initial state of isolation created by the firewall, access control
policies that specify the traffic types entitled to go from one domain to another
can be defined.
• The firewall act as a sort of conditional gateway.
• The criteria to permit traffic normally defined in the firewall policy and ideally,
should relate to what is stated in the security policy of the organization.
• FIG 11.1 depicts a simple scenario in which there is a firewall controlling access
from clients on the trusted domain to servers on the untrusted domain
The enforced conditions corresponding to the question "Does my access
control policy allow...?" depends on the specific category of the firewall in
place.
Each domain of trust can include one or more networks.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
A firewall is only capable of controlling traffic that passes through it.
This implies that clear knowledge about the location of clients and servers in
the network is needed before beginning policy definition.
Information Privacy
• Privacy means the concepts in which the user data files such as stored files, e-
mails, etc. are not seen by any other persons without the user's permission.
• It is a private communication accomplished when the sender and intended
receiver can read the message.
E-mail Privacy
• When you send an e-mail, the message is broken into several packers and each
packet is sent through the Internet.
• Number of packets are dependent of the message. Each packet which is sent
over the Internet has Internet address of the sender and recipient's address.
• Packets of the single message may take different systems. This means the
content of the message and the address of the sender and receiver are
examined by all the systems through which each packet is routed. So, in the
absence of code and protection, e-mail could be very public.
• Most of the system administrators adopt a code under which they will not
examine someone's e-mail.
Electronic Communication Privacy Act
• Electronic Communication Privacy Act passed on 1986 for the privacy of e-mail.
It prohibits anyone to access to access e-mail messages without sender's
permission.
• It also prohibits individual's private accessed by government officer without legal
permission.
• This act allows system administrator to examine e-mail message only when it is
necessary for any operation or the security of the system.
Encryption
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• When you send a message to someone, the message is transmitted in the same
form you have typed it, whether it is illegal for someone to read it not.
• One way to avoid this, use encryption (in which message is sent to the receiver
in some secret code) the message can't be read unless the code and the method
of encryption is known to reader.
• This code is called key. The reader must know the key to decode the message
for reading.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.6 Copyright Issues
Copyright Issues
• There is a tremendous number of files, document and images available on the
Internet. They can be viewed, saves in a file, print and passed on to others.
• We can create copy of any information which we can find on the Internet only
when it is legal for doing so.
• The right to copy or duplicate materials can be granted only by the owner of the
information. This is called the copyright.
• Many documents or fields on the Internet contain a statement that shows the
document is copyrighted.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.7 Cryptography
Cryptography
• The word crypto is derived from the Greek world called Kryptos.
Plaintext
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• In cryptography, plain text refers to any message that is not encrypted. Contrast
with cipher text.
Encryption
• Encryption is the conversion of data into a form, called a ciphertext that cannot
be easily understood by unauthorized people.
Decryption
• Decryption is the process of converting encrypted data back into its original form,
so it can be understood.
Ciphertext
Cryptology = Cryptography+Cryptanalysis
• Cryptology as number theory, and its application of formulas and algorithms, that
underpin the cryptography and cryptanalysis.
Encryption
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Encryption is the process of converting the original data (plaintext) into some
other format using the key called cipher text/secret word system data into a
secret code.
• Encryption is the effective way to achieve data security.
• To read an encrypted file, you must have an access rights to the secret key that
enables you to decrypt it.
• Original data/decrypted data is referred to as plaintext, and Encrypted data is
referred to as cipher text.
• To understand the concept of encryption, refer FIG 1.2.
Decryption
• Decryption is the reverse process of Encryption that converts the ciphertext into
plaintext information that has been encrypted in secret format.
• Recovering plaintext from ciphertext.
• Decryption requires a secret key to recover information.
• To understand the concept of decryption, refer FIG 11.3.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Ciphers
Key
Topic: Summary
Summary
• In this class, we have discussed about
The internet security
Firewall and its types
The Internet security management concept
Information privacy
Copyright issues and Cryptography
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 11.9 Model Questions
Model Questions
• What is Internet security?
• Explain about firewalls and its types.
• Explain briefly about the Information security management concepts.
• Write about copyright issues.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
Answers:
1.b
2.a
3.c
4.c
5.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)
Answers:
1.a
2.a
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred