100% found this document useful (3 votes)
2K views479 pages

Internet Technology and Web Design

web design book

Uploaded by

Lavkush Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
2K views479 pages

Internet Technology and Web Design

web design book

Uploaded by

Lavkush Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 479

Course : INTERNET TECHNOLOGY AND WEB DESIGN

Module : Introduction to Internet

TABLE OF CONTENT
UNIT NUMBER 1/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Syllabus

1.1 Objectives
1.2 Introduction to Internet
1.2.1 Internet
1.2.2 ARPANET and Internet history of the World Wide Web
1.2.3 Owners of the Internet
1.2.4 Anatomy of Internet
1.3 Growth of Internet
1.3.1 Growth of Internet
1.4 Basic Internet Terminology
1.4.1 Basic Internet Terminology
1.5 Net etiquette
1.5.1 Net etiquette
1.6 Internet Applications
1.6.1 Commerce on the Internet
1.6.2 Governance on the Internet
1.7 Impact of Internet on Society
1.7.1 Impact of Internet on Society
1.7.2 Crime on/through the Internet
1.8 Summary

1.9 Model Questions

Assessment 1

Assessment 2

References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.1 Objectives

Objectives
• At the end of this course, the user will be able to
 understand what is Internet.
 known about the anatomy of internet.
 understand about Net etiquette.
 known about the applications of internet
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.2 Introduction to Internet

Topic: 1.2.1 Internet

Internet
• The Internet is a global system of interrelated computer networks that use the
standard Internet Protocol suite (TCP/IP) to serve billions of users worldwide.
• The primary purpose of the internet is sharing of information and communicating
with remote PC's.
• The largest network of networks in the world, joining many government,
university and private computers together and providing an infrastructure for the
use of E-mail, bulletin boards, file archives, hypertext documents, database and
other computational resources.
• The Internet has extremely changed nearly every aspect of life by revolutionizing
how individuals and business,
 Access information and electronic files,
 Communication personally and professionally,
 Shop for products and services,
 Share resource.

FIG 1.1: Internet


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.2 Introduction to Internet

Topic: 1.2.2 ARPANET and Internet history of the World Wide Web

ARPANET and Internet history of the World Wide Web


• Origins in ARPANET
 ARPA (Advances Research Project Agency) started an experimental
Computer Network in January 2, 1969.
• Growth and Development of ARPANET
 In 1971, Ray Tomlinson developed e-mail and ARPANET includes more than
20 sites including Harvard.
 Vinton Cerf and Robert Kahn developed standard or protocol for
communications over a network TCP and IP in 1972.
 In 1981, the ARPANET linked 200 sites.
• ARPANET eventually lost its reason to survive as other special-internet networks
took its place.
• In 1990, ARPANET was eliminated, leaving behind a legacy of networks that
evolved into the internet.
• The Beginnings and Rise of the Web
 In 1991, Tim Berners-Lee created HyperText Markup Language (HTML),
Hypertext Transfer Protocol (HTTP), first Web browser and Web server.
 In 1993, Marc Andreessen and Eric Bina developed MOSAIC browser.
 In1994, Marc Andreessen and Jim Clark founded Netscape Communication
and Netscape Navigator browser.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.2 Introduction to Internet

Topic: 1.2.3 Owners of the Internet

Owners of the Internet


• No one actually owns the Internet and no single person or organization controls
the Internet in its entirely.
• The Internet is more of a concept than an actual physical entity, and it relies on a
physical infrastructure that connects networks to other networks.
• So who actually owns the Internet, if user think of the Internet as a unified, single
entity, then no one owns it.
• There are organizations that establish the Internet’s structure and how it works,
but they don't have any ownership over the Internet itself.
• No government can lay assert to owning the Internet, nor can any company.
• The Internet is like the telephone system, where no one owns the whole thing.
• But from another point of view, thousands of people and organizations own the
Internet.
• The Internet consists of lots of different bits and pieces, each has an owner.
• Some of these owners can control the quality and level of access user have to
the Internet. They might not own the entire system, but they can impact user's
Internet experience.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.2 Introduction to Internet

Topic: 1.2.4 Anatomy of Internet

Anatomy of Internet
• The Internet is an enormous group of computers linked by cable and satellites,
not controlled by any one authority, but all operating under common network
protocols.
• The term 'Internet' includes both the hardware and the software that enable
computers to communicate with each other.
• When information is sent across the Internet, the Transmission Control Protocol
(TCP) first breaks the information up into packets of data.
• The client computer sends those packets to the local network, Internet service
provider (ISP) or online service. From here, the packets travel through many
levels of networks, computers, and communications lines until they reach their
final destinations.
• Many types of hardware help the packets on their way. These are Hubs, Bridges,
Gateways, Repeaters, Routers, Servers, Client Computer, Cable / Satellite
Communications.
• All hardware units need common working methods, basic instructions called
protocols that specify to all parties how the data will be handled.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.3 Introduction to Internet

Topic: 1.3.1 Growth of Internet

Growth of Internet

NUMBER % WORLD INFORMATION


DATE
OF USERS POPULATION SOURCE
December,
16 millions 0.4 % IDC
1995
December,
36 millions 0.9 % IDC
1996
December,
70 millions 1.7 % IDC
1997
December,
147 millions 3.6 % C.I. Almanac
1998
December,
248 millions 4.1 % Nua Ltd.
1999
December,
719 millions 11.1 % Internet World Stats
2003
December,
817 millions 12.7 % Internet World Stats
2004
December,
1,018 millions 15.7 % Internet World Stats
2005
December,
1,093 millions 16.7 % Internet World Stats
2006
December,
1,319 millions 20.0 % Internet World Stats
2007
December,
1,574 millions 23.5 % Internet World Stats
2008
December,
1,802 millions 26.6 % Internet World Stats
2009
September,
1,971 millions 28.8 % Internet World Stats
2010
December, 2,267 millions 32.7 % Internet World Stats
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

2011
December,
2,497 millions 35.7 % I.T.U.
2012
December,
2,802 millions 39.0 % Internet World Stats
2013
March, 2014
2,937 millions 40.7 % Internet World Stats
(estimate)

FIG 1.2: Growth of Internet


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.4 Basic Internet Terminology

Topic: 1.4.1 Basic Internet Terminology

Basic Internet Terminology


• WWW, World Wide Web or Web
 It is an interactive collection of hypertext pages linked to one another. They
may include text, graphics and/or links to other spots in the Web.
• URL
 Uniform Resource Locator is the address of the web document currently
displayed on the monitor.
• Server
 Server is a computer that provides a service to another computer.
• Search Engine
 It finds web pages with specific content.
• ISP ( Internet Service Provider)
 An Internet service provider (ISP) is an organization that provides services for
accessing, using or participating in the Internet.
 Internet service providers may be organized in various forms, such as
commercial, community-owned, non-profit, or otherwise privately owned.
• Cookie
 Cookie is a file left on the computer by a website’s browser containing user
login, password, user preferences and other personalized information.
• Browser
 Software used to “browse” the Internet. Most common examples are Internet
Explorer and Netscape Navigator
• Domain Name
 Domain name is the unique name that identifies an Internet site
• HTML
 HyperText Markup Language is a standardized system for tagging text files to
achieve font, colour, graphic and hyperlink effects on World Wide Web pages.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• HTTP
 HyperText Transfer Protocol - This communication protocol used to connect
to Web servers on the Internet or on a local network (intranet).
• Uploading
 Uploading means data is being sent from your computer to the Internet.
 Examples of uploading include sending email, posting photos on a social
media site and using user webcam. Even clicking on a link on a web page
sends a tiny data upload.
• Downloading
 Downloading means your computer is receiving data from the Internet
 Examples of downloading include opening a web page, receiving email,
purchasing music files and watching online videos.
• FTP (File Transfer Protocol)
 The File Transfer Protocol (FTP) is the Internet facility for downloading and
uploading files.
 If user are uploading a file to another site, user must usually have permission
in advance to access the site and the directory where the file is to be placed.
• Bookmark
 It is a function used to save a web page location for future reference.
• ASCII (American Standard Code for Information Interchange)
 ASCII character encoding provides a standard way to represent characters
using numeric codes. These include upper and lower-case English letters,
numbers and punctuation symbols.
 Lower ASCII, between 32 and 127.
 Higher ASCII, between 128 and 255.
• Home page
 Home page is a page where the computer will go to when user initially log
onto the Internet.
• Link, Hyperlink
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 It is a text found on a web page which, when clicked, will take the user to
another web location.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.5 Net etiquette

Topic: 1.5.1 Net etiquette

Net etiquette
• Communicating with others through Internet without creating misunderstandings
can be challenging because, facial expressions and body language cannot be
interpreted on cyberspace.
• Therefore, attempt to safeguard against these misunderstandings, a technology
called Internet Etiquette is proposed.
• Internet Etiquette is a technology that governs the conduct which is socially
acceptable in an online or digital.
• Internet Etiquette’s is also called as "Netiquette".
• Good netiquette involves respecting others privacy and not doing anything online
that will annoy or frustrate other people.
• Most important areas where good netiquette is highly stressed are e-mail, online
chats, and newsgroups.
• For example, people that spam other users with unnecessary e-mails or flood
them with messages have very bad netiquette.
• The companies, without Internet Etiquette knowledge, could create corporate
embarrassment and can drain the employee.
Guide to Net Etiquette
• Before user join in a newsgroup or discussion board, always they should check
that their questions are relevant to the group. It is a good idea to watch the
conversation before user join in.
• Never respond to vulgar or threatening messages whether in chat, newsgroups
or message boards.
• Always user should leave if the conversation makes them uncomfortable.
• Never hold in a flame war. That is a noisy match (through text) conducted
between 2 or more people.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Never use capital letters to send an email. That is always considered to be


shouting on the Internet.
• Never say nasty or incorrect things about others especially in public forums,
newsgroups, or chat. These remain in many archives and user could be charged
with libel.
• User should never forward personal emails to others without checking with the
original sender first.
• Similarly, when forwarding an email to others, respect the privacy of the group of
friends or family. Do not publicly transmit all their email addresses. Learn to use
the BCC command that keeps email addresses private.
• Avoid overuse of emoticons as they really lose their cuteness when overused
and tend to irritate people.

FIG 1.3: Net etiquette


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.6 Internet Applications

Topic: 1.6.1 Commerce on the Internet

Commerce on the Internet


• The term Internet Commerce covers all commercial activity on the internet,
including auctioning, placing orders, making payments, transferring funds, and
collaborating with trading partners.
• Internet commerce is not a synonym for electronic commerce (e-commerce) but
one of its subsets.
• Internet commerce means the use of the global Internet for purchase and sale of
goods and services, including service and support after the sale.
• The internet may be an efficient mechanism for advertising and distributing
product information (sometime called brochure-ware in the trade).

FIG 1.4: Commerce on the Internet


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.6 Internet Applications

Topic: 1.6.2 Governance on the Internet

Governance on the Internet


• The term “Internet governance” embrace the key objectives of the 2005 World
Summit on the Information Society (WSIS).
• Internet governance is the development and function by Governments, the
private sector and civil society in their respective roles of shared principles,
norms, rules, decision-making procedures and programmes that shape the
evolution and use of the Internet.
• Internet governance covers a wide range of issues, from day-to-day technical
and operational workings of the Internet to public policy issues such as
combating crime on the Internet.

FIG 1.5: Governance on the Internet


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.7 Impact of Internet on Society

Topic: 1.7.1 Impact of Internet on Society

Impact of Internet on Society


• The Internet has a large impact on our society and on the way of living.
• In some cases, using the Internet can save a lot of money and time.
• Shopping on the Internet allows for instant price comparisons without leaving the
homes.
• Relationships have changed based on Internet access, e-mail, chat and instant
messages.
• People meet and get to know one another online, people can remain in closer
contact with friends and family and help keep everyone informed of special
events.
• Education has expanded to allowing people to get full degrees online without
leaving the comfort of their homes.
• The Internet can be used for soliciting contributions and fundraising. Political
action committees have made excellent use of sharing information and raising
funds using the Internet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.7 Impact of Internet on Society

Topic: 1.7.2 Crime on/through the Internet

Crime on/through the Internet


• Internet crime is any crime or illegal online action committed on the Internet,
through the Internet or using the Internet.
• The widespread Internet crime phenomenon encompasses multiple global levels
of legislation and failure to notice.
• In the continuously changing IT field, security experts are committed to
combating Internet crime through preventative technologies, such as intrusion
detection networks and packet sniffers.
• Internet crime is a strong branch of cybercrime.
• Identity theft, Internet scams and cyber stalking are the main types of Internet
crime. Because Internet crimes usually engage people from various geographic
areas, finding and punishing guilty participants is complicated.
• Types of Internet crime
 Cyber bullying and harassment
 Financial extortion
 Internet bomb threats
 Classified global security data theft
 Password trafficking
 Enterprise trade secret theft
 Personally data hacking
 Copyright violations, such as software piracy
 Counterfeit trademarks
 Illegal weapon trafficking
 Online child pornography
 Credit card theft and fraud
 Email phishing
 Domain name hijacking
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Virus spreading
• To prevent becoming an Internet crime, online awareness and common sense
are critical.
• Under any circumstances a user should not share personal information (like full
name, address, birth date and Social Security number) to unknown recipients.

FIG 1.6: Crime on the Internet


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.8 Summary

Topic: Summary

• In this course, user have learned about,


• Internet and their terminology.
• ARPANET and Internet history of the World Wide Web.
• Growth of Internet.
• Net etiquette.
• Internet Applications and their impact Society.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 1.9 Model Questions

Topic: Model Questions

Model Questions

• What is Internet?
• Explain the basic terminologies of internet.
• Write a brief note on growth of internet.
• What is Net etiquette?
• Explain internet applications.
• Explain about the impact of internet on society.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Assessment 1

1. When information is sent across the Internet, the ______________ first breaks the
information up into packets of data.
a) Transmission control protocol
b) User datagram protocol
c) Internet protocol
d) Session protocol
2. ______________ is the address of the web document currently displayed on the
monitor.
a) TCP
b) ISP
c) URL
d) UDP
3. _______ is a file left on the computer by a website’s browser containing user login,
password, user preferences and other personalized information.
a) Server
b) Cache
c) Backup
d) Cookie
4. The Internet facility for downloading and uploading files are called___________.
a) HTTP
b) FTP
c) ISP
d) URL
5. _____________ is a technology that governs the conduct which is socially
acceptable in an online or digital.
a) Internet
b) Internet crime
c) Internet etiquette
d) Internet theft

Answers:
1.a
2.c
3.d
4.b
5.b
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Assessment 2 (True/False)

1. Internet commerce is a synonym for electronic commerce (e-commerce) but one of


its subsets.
a) True
b) False
2. Internet crime is any crime or illegal online action committed on the Internet,
through the Internet or using the Internet.
a) True
b) False
3. An Internet service provider (ISP) is an organization that provides services for
accessing, using or participating in the Internet.
a) True
b) False

Answers:
1.b
2.a
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Books Referred

Internet Technology and Web Design by Isrd.

Internet Governance: A Grand Collaboration: an Edited Collection of Papers by United


Nations ICT Task Force.

Who Rules the Net?: Internet Governance and Jurisdiction edited by Adam D. Thierer,
Clyde Wayne.

Designing Systems for Internet Commerce by G. Winfield Treese, Lawrence C.


Stewart.
Course Name : INTERNET TECHNOLOGY AND WEB DESIGN
Module Name : TCP/IP Internet Technology and Protocol

TABLE OF CONTENT
UNIT NUMBER 2/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Syllabus

2.1 Objectives
2.2 Packet Switching Technology
2.2.1 Packet Switching Technology
2.3 Internet Protocols
2.3.1 Introduction to Internet Protocols
2.3.2 Transmission Control Protocol (TCP)
2.3.3 Internet Protocol (IP)
2.3.4 Router
2.4 Internet Addressing Scheme
2.4.1 IP Address
2.4.2 E-mail Addresses
2.4.3 Resource Addresses
2.5 Summary
2.6 Model Questions
Assessment 1
Assessment 2
References

Page | 2
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.1 Objectives

Objectives
• At the end of the course the student will be able to
 know about packet switching technology
 understand the concept of internet protocols
 learn the internet addressing scheme

Page | 3
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.2 Packet Switching Technology

Topic : 2.2.1 Packet Switching Technology

Packet Switching Technology


• Packet switching is a digital networking communication method that groups all
transmitted data regardless of content, type or structure – into suitably sized
blocks called packets.
• Packet switching is the dividing of messages into packets before they are sent,
transmitting each packet individually, and then reassembling them into the
original message once all of them have arrived at the intended destination.
• One fundamental way of differentiating networking technologies is on the basis of
the method they use to determine the path between devices over which
information will flow.
• In highly simplified terms, there are two approaches
 A path can be set up between the devices in advance or the data can be sent
as individual data elements over a variable path.
• In this network type, no specific path is used for data transfer.
• Instead, the data is chopped up into small pieces called packets and sent over
the network.
• The packets can be routed, combined or fragmented, as required to get them to
their eventual destination.
• On the receiving end, the process is reversed, the data is read from the packets
and re-assembled into the form of the original data.
• A packet-switched network is more analogous to the postal system than it is to
the telephone system (though the comparison isn't perfect.)
• An example is shown in FIG 2.1

Page | 4
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 2.1 : Packet Switching


• In a packet-switched network, no circuit is set up prior to sending data between
devices.
• Blocks of data, even from the same file or communication, may take any number
of paths as it travels from one device to another.

Page | 5
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.3 Internet Protocols

Topic : 2.3.1 Introduction to Internet Protocols

Introduction to Internet Protocols


• The internet protocol is a set of rules governing the format of data sent over the
internet or other network.
• The Internet protocols consist of a suite of communication protocols, of which the
two best known are
 Transmission Control Protocol (TCP)
 Internet Protocol (IP)
• The Internet protocol suite not only includes lower-layer protocols (such as TCP
and IP), but it also specifies common applications such as electronic mail,
terminal emulation, and file transfer.
• Internet protocols were first developed in the mid-1970s, when the Defense
Advanced Research Projects Agency (DARPA) became interested in establishing
a packet-switched network that would facilitate communication between
dissimilar computer systems at research institutions.
• With the goal of heterogeneous connectivity in mind, DARPA funded research by
Stanford University and Bolt, Beranek, and Newman (BBN). The result of this
development effort was the Internet protocol suite, completed in the late 1970s.
• TCP/IP later was included with Berkeley Software Distribution (BSD) UNIX and
has since become the foundation on which the Internet and the World Wide Web
(WWW) are based.
• Documentation of the Internet protocols (including new or revised protocols) and
policies are specified in technical reports called Request for Comments (RFCs),
which are published and then reviewed and analyzed by the Internet community.
• Protocol refinements are published in the new RFCs. To illustrate the scope of
the Internet protocols, following FIG maps many of the protocols of the Internet
protocol suite and their corresponding OSI layers.

Page | 6
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 2.2 : Internet Protocols span the complete range of OSI model layers

Page | 7
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.3 Internet Protocols

Topic : 2.3.2 Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP)


• The second transport layer protocol is TCP.
• TCP (Transmission Control Protocol) is a protocol that works with the Internet
Protocol (IP) to send packets of data between computers over the Internet.
• TCP establishes a full duplex virtual connection between two endpoints. Each
endpoint is defined by an IP address and a TCP port number. The operation of
TCP is implemented as a finite state machine.
• TCP/IP protocols are modeled in four layers.

TCP operation
• The primary purpose of the TCP is to provide reliable, securable logical circuit or
connection service between pairs of processes.
• To provide this service internet communication system requires facilities in the
following areas.
 Basic data transfer
 Reliability
 Flow control
 Multiplexing
 Connections
• Basic data transfer
 TCP is able to both transmit and receive data streams simultaneously, even
though this is opposite to the basic concept of data transmission in many
underlying network technologies.
 The TCP is able to transfer a continuous stream of data in each direction
between its users by packaging some number of data into segments for
transmission through the internet system.

Page | 8
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 In general, the TCPs decide when to block and forward data at their own
convenience.
 The data unit transmitted from TCP layer is referred to as a segment. The
size of the segments and the timing at which they are sent is generally left to
the TCP module.
 TCP applications request that the data is Pushed by instructing the TCP
module to deliver all data up to that point without Maximum Transmission Unit
(MTU).
• Reliability
 TCP assigns a sequence number to each byte transmitted and expects a
positive acknowledgment (ACK) from the receiving TCP.
 If the ACK is not received within the timeout interval, the data is then
retransmitted.
 The receiving TCP uses the sequence numbers to rearrange the segments
when they arrive out of order, and to eliminate duplicate segments.

Page | 9
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 2.3 : TCP data Transfer


 TCP provides reliable communication through a positive Acknowledgement
system.
• Flow Control
 TCP provides a means for the receiver to govern the amount of data sent by
the sender.
 This is achieved by returning a "window" with every ACK indicating a range of
acceptable sequence numbers beyond the last segment successfully
received.
 The window indicates an allowed number of octets that the sender may
transmit before receiving further permission.
• Multiplexing
 TCP is able to provide a connection oriented environment for many
simultaneous process within a single host.

Page | 10
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 TCP uses a set of ports which when concatenated with the IP address of the
host, provide a socket that uniquely identifies an application process
anywhere within the internet.
• Connections
 The reliability and flow control mechanisms described above require that
TCPs initialize and maintain certain status information for each data stream.
 The combination of this information, including sockets, sequence numbers,
and window sizes, is called a connection.
 Each connection is uniquely specified by a pair of sockets identifying its two
sides.
 When two processes wish to communicate, their TCP must first establish a
connection (initialize status information on both sides).
 When the communication is complete, the connection is terminated or closed
to free the resources for other uses.
TCP Header
• The TCP segment comprises of a header, and a variable length data area that
ultimately carries application data.
• TCP header at minimum is 20 bytes long and maximum 60 bytes.
• Source Port (16-bits): Identifies source port of the application process on the
sending device.
• Destination Port (16-bits): Identifies destination port of the application process
on the receiving device.
• Sequence Number (32-bits): Sequence number of data bytes of a segment in a
session.
• Acknowledgement Number (32-bits): When ACK flag is set, this number contains
the next sequence number of the data byte expect and works as
acknowledgement of the previous data received.
• Data Offset (4-bits): This field contains two meaning. First, it tells the size of TCP
header (32-bit words) Secondly, it indicates the offset of data in current packet in
the whole TCP segment.

Page | 11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Reserved (3-bits): Reserved for future use and all are set zero by default.
• Flags (1-bit each):
 NS: Nonce Sum bit is used by Explicit Congestion Notification signaling
process.
 CWR: When a host receives packet with ECE bit set, it sets Congestion
Windows Reduced to acknowledge that ECE received.
 ECE: has two meanings:
 If SYN bit is clear to 0, then ECE means that the IP packet has its CE
(congestion experience) bit set.
 If SYN bit is set to 1, ECE means that the device is ECT capable
 URG: indicates that Urgent Pointer field has significant data and should be
processed.
 ACK: indicates that Acknowledgement field has significance. If ACK is cleared
to 0, it indicates that packet does not contain any acknowledgement.
 PSH: when set, it is a request to the receiving station to PUSH data (as soon
as it comes) to the receiving application without buffering it.
 RST: Reset flag has many features:
 It is used to refuse an incoming connection.
 It is used to reject a segment.
 It is used to restart a connection.
 SYN: this flag is used to set up a connection between hosts.
 FIN: this flag is used to release a connection and no more data is exchanged
thereafter. Because packets with SYN and FIN flags have sequence
numbers, they are processed in correct order.
TCP Client/server model
• TCP is a peer-to-peer, connection-oriented protocol.
• There are no master/subordinate relationships. The applications, however,
typically use a client/server model for communications.
• A server is an application that offers a service to internet users. A client is a
requester of a service.

Page | 12
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• An application consists of both a server and a client part, which can run on the
same or on different systems.
• Users invoke the client part of the application, which builds a request for a
particular service and sends it to the server part of the application using TCP/IP
as a transport medium.
• The server is a program that receives a request, performs the required service,
and sends back the results in a reply.

Page | 13
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.3 Internet Protocols

Topic : 2.3.3 Internet Protocol (IP)

Internet Protocol (IP)


• The Internet Protocol (IP) is the primary network protocol by which data is sent
from one computer to another on the Internet.
• Each computer (known as a host) on the Internet has at least one IP address that
uniquely identifies it from all other computers on the Internet.
• The Functions of Internet Protocol include,
 Defining the Internet addressing schemes.
 Moving data between the Network access layer and Host-Host transport
layer.
 Performing fragmentation and reassembly of datagrams.
 Routing datagrams to remote host.
• There are currently two versions in Internet Protocol - IPV4 and IPV6.
Overview of Internet Protocol version 4
• Internet Protocol Version 4 (IPv4) is the fourth revision of the IP and a widely
used protocol in data communication over different kinds of networks.
• IPv4 is a connectionless protocol used in packet-switched layer networks, such
as Ethernet. It provides the logical connection between network devices by
providing identification for each device.
• Internet Protocol version 4 standard that features IP addresses four bytes (32
bits) in length. IPv4 uses four 1 byte decimal numbers, separated by a dot
(i.e. 192.168.1.1).
• There are many ways to configure IPv4 with all kinds of devices - including
manual and automatic configurations - depending on the network type.
• The Internet Protocol version 6 (IPv6) is more advanced and has better features
compared to IPv4. It has the capability to provide an infinite number of
addresses.

Page | 14
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• IPV6 is replacing IPv4 to accommodate the growing number of networks
worldwide and help solve the IP address problems.
• The newer Internet Protocol version 6 (IPv6) standard features addresses 16
bytes (128 bits) in length. IPv6 uses hexadecimal numbers that are separated by
colons (i.e. fe80::d4a8:6435:d2d8:d9f3b11).

FIG 2.4 : IPv4 address

Page | 15
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.3 Internet Protocols

Topic : 2.3.4 Router

Router
• Routing is the act of moving information across an internetwork from a source to
a destination.
• Along the way, at least one intermediate node typically is encountered.
• Routing is often contrasted with bridging, which might seem to accomplish
precisely the same thing to the casual observer.
• The primary difference between the two is that bridging occurs at Layer2 (the link
layer) of the OSI-reference model, whereas routing occurs at Layer 3 (the
network layer). This distinction provides routing and bridging with different
information to use in the process of moving information from source to
destination, so the two functions accomplish their tasks in different ways.
• Routing involves two basic activities
 Determining optimal routing paths
 Transporting information groups (typically called packets) through an
internetwork.
• In the context of the routing process, the latter of these is referred to as packet
switching.
• Although packet switching is relatively straightforward, path determination can be
very complex.
• Switching algorithms is relatively simple; it is the same for most routing protocols.
• In most cases, a host determines that it must send a packet to another host.
• Having acquired a router’s address by some means, the source host sends a
packet addressed specifically to a router’s physical (Media Access Control
(MAC)-layer) address, this time with the protocol (network layer) address of the
destination host.
• As it examines the packet’s destination protocol address, the router determines
that it either knows or does not know how to forward the packet to the next hop.

Page | 16
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• If the router does not know how to forward the packet, it typically drops the
packet.
• If the router knows how to forward the packet, however, it changes the
destination physical address to that of the next hop and transmits the packet.

FIG 2.5: Routing Process


• The example above shows two hosts communicating with each other using three
routers between them.
• If the three routers are part of the Internet, it will only work this way when both
hosts have valid public IP-addresses assigned to them.
• Network Address Translation(NAT)
 NAT, defined in RFC 1631, allows a host that does not have a valid registered
IP address to communicate with other hosts through the Internet.
 The hosts might be using private addresses or addresses assigned to
another organization.
 In either case, NAT allows these addresses that are not Internet-ready to

Page | 17
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
continue to be used and still allows communication with hosts across the
Internet.
 NAT achieves its goal by using a valid registered IP address to represent the
private address to the rest of the Internet.
 The NAT function changes the private IP addresses to publicly registered IP
addresses inside each IP packet.

FIG 2.6 : NAT functioning


• The router, performing NAT, changes the packet’s source IP address when
leaving the private organization and the destination address in each packet
forwarded back into the private network. (Network 200.1.1.0 is registered in this
FIG)
• The NAT feature, configured in the router labeled NAT, performs the translation.
• Overloading NAT with Port Address Translation (PAT)
 Some networks need to have most, if not all, IP hosts reach the Internet. If
that network uses private IP addresses, the NAT router needs a very large set
of registered IP addresses.
 With static NAT, for each private IP host that needs Internet access, user
need a publicly registered IP address.
 Overloading allows NAT to scale to support many clients with only a few
public IP addresses.
 The following figure details an example that helps make the logic behind

Page | 18
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
overloading.
 The top part of the figure shows a network with three different hosts
connecting to a web server using TCP. The bottom half of the figure shows
the same network later in the day, with three TCP connections from the same
client.
 All six connections connect to the server IP address (170.1.1.1) and WWW
port (80, the well-known port for web services).
 In each case, the server differentiates between the various connections
because their combined IP address and port numbers are unique.

FIG 2.7 : Overloading NAT

 NAT takes advantage of the fact that the server really doesn’t care if it has
one connection each to three different hosts or three connections to a single
host IP address. So, to support lots of inside private IP addresses with only a
few global, publicly registered IP addresses, NAT overload uses Port Address
Translation (PAT).
 Instead of just translating the IP address, it also translates the port number.

Page | 19
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 NAT overload can use more than 65,000 port numbers, allowing it to scale
well without needing very many registered IP addresses, in many cases, like
in small Office/Home Networks, needing only one.
 Taking the device called a 'router' by most users apart, it contains different
components.
 The following FIG show the different components out. These are a
hub/switch, the router and a DSL/Cable modem.

FIG 2.8 : Components of Router

Page | 20
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.4 Internet Addressing Scheme

Topic : 2.4.1 IP Address

IP Address
• As with any other network-layer protocol, the IP addressing scheme is integral to
the process of routing IP datagrams through an internetwork.
• Each IP address has specific components and follows a basic format. These IP
addresses can be subdivided and used to create addresses for subnetworks.
• Each host on a TCP/IP network is assigned a unique 32-bit logical address that
is divided into two main parts
 Network number
 Host number
• Network Number
 The network number identifies a network and must be assigned by the
Internet Network Information Center (InterNIC) if the network is to be part of
the Internet.
 An Internet Service Provider (ISP) can obtain blocks of network addresses
from the InterNIC and can itself assign address space as necessary.
• Host number
 The host number identifies a host on a network and is assigned by the local
network administrator.
• IP Address Format
 The 32-bit IP address is grouped eight bits at a time, separated by dots, and
represented in decimal format (known as dotted decimal notation).
 Each bit in the octet has a binary weight (128, 64, 32, 16, 8, 4, 2, 1).
 The minimum value for an octet is 0, and the maximum value for an octet is
255.
 The following FIG 2.9 shows the basic format of an IP address. An IP address
consists of 32 bits, grouped into four octets.

Page | 21
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 2.9 : IP Address format


• IP Address Classes
 IP addressing supports five different address classes: A, B,C, D, and E.
 Only classes A, B, and C are available for commercial use.
 The left-most (high-order) bits indicate the network class. The following table
provides reference information about the five IP address classes.

Page | 22
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 2.10 : Reference Information About the Five IP Address Classes

FIG 2.11 : IP address formats for commercial use


 The class of address can be determined easily by examining the first octet of
the address and mapping that value to a class range in the following table.

 In an IP address of 172.31.1.2, for example, the first octet is 172. Because


172 falls between 128 and 191, 172.31.1.2 is a Class B address

Page | 23
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 2.12 : First octet of each address class

Page | 24
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.4 Internet Addressing Scheme

Topic : 2.4.2 E-mail Addresses

E-mail Addresses
• Email is a message distributed by electronic means from one computer user to
one or more recipients via a network.
• One of the many similarities between email and regular mail is the need for
addressing.
• For a message to be delivered, it is necessary for the sender to specify the
recipient and provide a reasonable amount of information to indicate how and
where the recipient can be reached.
• In TCP/IP email, a standard electronic mail address format is used for this, and
support is also provided for alternative addressing schemes that may be used in
special cases.
• All communication on an internetwork requires some way of specifying the
identity of the intended recipient of the communication.
• Most application protocols, such as the File Transfer Protocol (FTP) and
Hypertext Transfer Protocol (HTTP), use conventional TCP/IP contracts, IP
addresses and port numbers to specify the destination of information to be sent.
• The IP address normally identifies a particular host computer, and the port
number indicates a software process or application running on that computer.
• E-mail, however uses a model for communication that differs from most
applications.
• Email is not sent from one machine to another, as a file is transferred using FTP.
Instead, it is sent from one user to another. This is critical to the operation of the
entire system.
• For one thing, it allows someone to retrieve email that has been sent from any
number of different client computers. This allows the recipient to receive email
even when traveling, for example.
• Since e-mail messaging is user-based, the addressing scheme must also user-

Page | 25
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
based.
• User cannot use conventional IP addresses and ports, so they need a distinct
system that specifies two primary pieces of information such as, who the user is
and where the user is located. These are, of course, analogous to a name and
address on a regular mail envelope.
• The idea of the user name is relatively straightforward but identifying the location
of the user is not.
• In regular mail, an address refers to a physical place. It would have been
possible to define email addresses in the same way, that is, to have an email
address refer to the user's client machine.
• However, recall the other important characteristic of email delivery, it is indirect
and based on the concept of a user's local Simple Mail Transfer Protocol (SMTP)
server holding received messages until they can be retrieved.
• The machine that the user employs to access their email may not even routinely
be connected to the Internet, and it may thus not be easy to identify. And they
also want a user to be able to access email from multiple machines.
• For all these reasons, people want addresses to identify not the user's specific
location at any particular time, but the place where the user's permanent mailbox
lives, on the user's SMTP server which is permanently connected to the Internet.

Page | 26
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.4 Internet Addressing Scheme

Topic : 2.4.3 Resource Addresses

Resource Addresses
• When user using the web their browser act as a client program on their behalf.
• In order to fulfill their request, their browser will contact server, and ask for either
information or a service of some type.
URL(Uniform Resource Locator)
• URLs provide a standard way to specify the exact location and name of just
about any Internet resource.
• In general, most, URLs have one of two common formats
 scheme://host_name/description
 scheme: description
• Example 1: http://www.bryanadams.com/bryan
 This example describes a particular web page on a computer.
 The URL begins with a name, indicating a specific type of resource.( The
name comes from the protocol used to send and receive such information :
Hypertext Transfer Protocol)
• URLs and Host Names
 List of schemes used with URLs are in the below table
 Some examples of URLs that contain a host name
 http://www.wendy.com/~wendy
 fttp://ftp.uu.net/usenet/news.answers/alt_tech/pointers.z
 telnet://nightmare.internet.com:1701/

Page | 27
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Scheme Meaning
ftp File accessed via file transfer protocol
gopher Gopher resource
http Hypertext resource
Mail to Mail a message to the specified
address
news Usenet newsgroup
telnet Interactive telnet session
wais Access a WAIS database

FIG 2.13 : List of URL Schemes


• URL and Port Numbers
 Each type of internet service has its own specific port number.
 Within a URL user only have to specify a port number if it is not the default for
that type of service.
 For example the default port number for Telnet is 23.
 The following two URLs are equivalent
 telnet://locis.loc.gov/
 telnet://locis.loc.gov:23/
 The HTTP service, by default, uses port 80.
 Similarly, the gopher service uses port 70.
 For instance, the following two URLs are equivalent. They both point to the
same hypertext resource, using port 80, on the computer named
www.wendy.com
 http://www.wendy.com/~wendy
 http://www.wendy.com:80/~wendy
• Path names
 Typical hypertext URL such as http://www.cathouse/humor/tech/data.from.bell
 The user can divide such URLs into three parts.
 The scheme (http:), the host name (in this case //www.cathouse.org/), and the
path_name (in this case cathouse/humor/tech/data.from.bell)

Page | 28
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 To analyze such a URL look at each of the parts
 The scheme (HTTP) identifies this resource as being hypertext.
 The host name is the name of the computer.
 The path name shows where on the host the hypertext resource is stored.

Page | 29
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.5 Summary

Topic : Summary

Summary

• In this class, user have learn about

 The packet switching technology


 Types of internet protocols
 Internet addressing scheme

Page | 30
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 2.6 Model Questions

Topic : Model Questions

Model Questions
• What is packet switching?
• Explain TCP/IP
• Describe IP addressing
• Define e-mail and resource addresses

Page | 31
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
1. The ___________ is a set of rules governing the format of data sent over the
internet or other network.
a) Transmission control protocol
b) User datagram protocol
c) Internet protocol
d) Session protocol
2. In IP packet __________ specifies the length, in bytes, of the entire IP packet,
including the data and header.
a) IP Header Length
b) Total Length
c) Fragment Offset
d) Header Checksum
3. ____________indicates the upper-layer protocol receives incoming packets after IP
processing is complete.
a) Source address
b) Data
c) Protocol
d) Header Checksum
4. The ___________ identifies a host on a network and is assigned by the local
network administrator.
a) Source address
b) IP address classes
c) Network number
d) Host number
5. _________ the general form of the name of a file or directory, specifies a unique
location in a file system.
a) Source name
b) Path name
c) URL and Port number
d) Host number
Answers:
1.c
2.b
3.c
4.d
5.b

Page | 32
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)

1. Packet switching is a digital networking, communication method that groups all


transmitted data regardless of content.
a) True
b) False
2. The internet protocol is a set of rules governing the format of data sent over the
internet or other network.
a) True
b) False
3. In TCP packets data contains lower-layer information.
a) True
b) False

Answers:
1.a
2.a
3.b

Page | 33
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred

1. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference By


Charles M. Kozierok
2. Internet Protocols: Advances, Technologies and Applications by Subrata
Goswami

Page | 34
Course : INTERNET TECHNOLOGY AND WEB DESIGN

Module : Internet Connectivity

TABLE OF CONTENT
UNIT NUMBER 3/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Syllabus

3.1 Objectives
3.2 Internet Connectivity
3.3 Connectivity Types
3.3.1 Level One Connectivity
3.3.2 Level Two Connectivity
3.3.3 Level Three Connectivity
3.4 Setting up a Connection
3.4.1 Hardware Requirement
3.4.2 Selection of a Modem
3.4.3 Software Requirement
3.4.4 Modem Configuration
3.5 Internet accounts by ISP
3.5.1 Telephone line options
3.5.2 Protocol options
3.5.3 Service options
3.6 Summary
3.7 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.1 Objectives

Objectives
• At the end of this course, the user will be able to
 Understand what is Internet connectivity
 Known about how to set up the connection
 Understand about telephone line options
 Known about the protocol options
 Understand about the service options
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.2 Internet Connectivity

Topic: 3.2.1 Internet Connectivity

Internet Connectivity
• There are various type of connectivity to get hook on to internet.
• They all can be broadly classified into following category.
 Level one connection
 Level two connection
 Level three connection
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.3 Connectivity Types

Topic: 3.3.1 Level One Connectivity

Level One Connectivity


• Level One Connectivity is also known as Gateway access.
• It is the access to the Internet from a network that is not on the Internet.
• The gateway allows the two networks to "talk" to each other, but the users of
the Gateway internet are limited in their ability to fully access all of the tools
available on the Internet.
• With Level One connectivity, users are limited in what they can access on the
Internet by what their service provider allows them to access.
• Good examples of networks with Level One connectivity are America Online
(AOL), CompuServe, Prodigy, and many of the other commercial on-line
services.
• AOL is in effect, it has a great number of different programs that its
subscribers can use (like the chat rooms), but all of these programs run only
on the AOL network.
• AOL subscribers, and subscribers to most of the other commercial on-line
services, are lucky in that they can access some of the tools on the Internet
through their gateway.
• Many people with Level One connectivity only have e-mail access.

FIG 3.1: Gateway Access


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.3 Connectivity Types

Topic: 3.3.2 Level Two Connectivity

Level Two Connectivity


• Level Two connection is also known as Dial-up connection.
• This provides connection to Internet through a dial-up terminal connection.
• The computer, which provides Internet access, is known as ‘Host’ and the
computer that receives the access, is ‘Client’ or ‘Terminal’.
• The client computer uses modem to access a “host” and acts as if it is a
terminal directly connected to that host. 56K modem access is now widely
available and supported by most ISPs.
• It allows user to surf the Web at 56 Kbps with graphics.
• So this type of connection is also known as ‘Remote Modem Access’
connection.
• And the host to which the client gets connected is actually connected to the
Internet by a full time connection.
• In dial-up connection to Internet, Host carries all the command that are typed
on a client machine and forward them to Internet.
• It also receives the data or information from the Internet on behalf of the
‘Client’ and passes it to them.
• The client computer acts as a ‘dumb’ terminal connected to remote host.
• This type of connection can further be divided into three categories.

 Shell Connection

 TCP/IP Connection

 ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 3.2: Dial-up Connection

• Shell Connection

 In this type of Internet Connection, the user will get only textual matter of a
Web Page.

 This connection does not support Graphics display.

 Shell Accounts were the only type of Internet access available for many
years before the Internet entered in to the world of graphics and became
more users friendly.

• TCP/IP Connection

 Today’s graphical World Wide Web browsers provide easier access with
multimedia sound and pictures.

 The major difference between Shell and TCP/IP account is that, Shell
account can only display text and does not support graphics display,
whereas TCP/IP can display both.

• ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 ISDN (Integrated Services Digital Network) offers Internet connectivity at
speeds of up to 128 Kbps through the use of digital phone lines. ISDN is a
dial-up service that has been provided by telephone companies for many
years.

 To access any of these dial-up accounts you need the followings:

 Computer

 Modem

 Telephone Connection

 Shell or TCP/IP/ISDN account from the ISP

 Internet client software such as Internet browser


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.3 Connectivity Types

Topic: 3.3.3 Level Three Connectivity

Level Three Connectivity


• Leased connection is also known as direct Internet access or Level Three
connection.
• It is the secure, dedicated and most expensive, level of Internet connection.
• With leased connection, your computer is delicately and directly connected to
the Internet using high speed transmission lines.
• It is on-line twenty-four hours a day, seven days a week.
• It provides secure and private dedicated connection.
• It can be laid for people requiring extra high bandwidth.
• Provides symmetrical, uncontended high speed connection.
• It is reliable and dependable but it is very expensive to install.
• It is not suitable for single or home workers.

FIG 3.3: Leased Connection


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.4 Setting up a connection

Topic: 3.4.1 Hardware Requirement

Hardware Requirement
• Computer the minimum hardware requirements are as follows.
 Windows XP, Vista, or later
 1.0 GHz or faster processor
 1 or more gigabytes (GB) of RAM
 Sound card and speakers
 DVD drive
 Monitor capable of 24-bit color at 1,024 x 768 resolution or better
• Internet
 DSL or Cable connection through an Internet Service Provider (ISP).
 Account plans offering a minimum of 1.5 MB download and 512 upload speed
is recommended.
 AOL may require special set up with AOL tech support.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.4 Setting up a connection

Topic: 3.4.2 Selection of a Modem

Selection of a Modem
• While selecting a modem do the following.
• Check the service
 Depending on whether user has cable or DSL service, a user needs a
different kind of modem.
 If user is establishing new service, determine which type of broadband
service they have access to before purchasing a modem.
 Be sure that user is aware of the different features of the two types of
broadband Internet before making a decision or signing a broadband
contract.
• Ensure interfaces
 It is important that user select a robust broadband modem that is able to
connect to the device.
 Ensure that the prospective broadband modem is capable of connecting to
the device through one of its available interfaces such as USB, PC card,
serial port or PCI/ISA port.
 Check which interface is available for connection on the device before user
head to the store to make a purchase.
• Don't overlook leasing a modem
 One easy way to make a decision about the broadband modem is to lease
one from the Internet service provider.
 By leasing one, user is able to pay a low monthly fee and ensure that it is
suitable for the service.
 The Internet service provider is able to assist user in selecting a modem that
works well with both the device and the equipment for the best speed and
performance.
• Don't forget about price considerations
 If user is set on purchasing their own modem, set a price to pay before
heading to the store.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 An internal modem is priced the lowest, while external and USB modems are
more expensive.
 PC card modems are also an inexpensive choice to gain connectivity.
 Shop around within the price range to determine which is the best selection
for the budget
 Broadband modems bring with them lots of options and variety.
 Ensure that user is knowledgeable of all the necessary components to make
a smart decision when heading out to find a suitable modem to run the home
network.

FIG 3.4: Modem


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.4 Setting up a connection

Topic: 3.4.3 Software Requirement

Software Requirement
• Operating System
 Windows XP Pro or Home Edition. (Vista probably works but hasn’t tested
that yet. Mac or Linux may be OK but it cannot provide much support.)
• Security
 This is a very important concern. There will be those who will try to gain
access to the PC, perhaps by finding a way to crash the AED software and
get to the Desktop.
• Here are six security measures that can be taken.
 Minimal, Non-Administrator account
 Anti-Virus
 AED loop-forever script
 PC lock down software
 NO LINKS in content (that you create and add to your display)
 Hide the keyboard.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.4 Setting up a connection

Topic: 3.4.4 Modem Configuration

Modem Configuration
• This is the most important part and requires only one time customization.
• Connect the Modem to the Power Supply Adapter.
• Next connect the Ethernet Cable from the Modem Ethernet Port to the
Ethernet Port on the PC and wait for the PC/USB light to flash constantly.
This means that the Modem has successfully integrated to the LAN system.

FIG 3.5: Modem Configuration

• Now open up a Browser and in the Address Bar type http://192.168.1.1/. This
will take to the Modem Configuration page.
• Enter user name: admin and password: admin when prompted.
• If it fails to authenticate then check the ISP manual to get the user name and
password.
• Now click on the “Internet Connection” tab on the left.
• Once successfully logged in, the Modem will display the device info on the
screen.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.5 Internet Accounts by ISP

Topic: 3.5.1 Telephone line Options

Telephone line Options


Dial-up Connections
• Dial-up Internet access is a type of Internet connectivity that operates through
a standard telephone line.
• Dial-up access refers to connecting a device to a network via a modem and a
public telephone network.
• Dial-up access is just like a phone connection the only difference is that;
rather than people at the two ends computer devices are present.
• Dial-up access uses normal telephone lines thus the quality of the connection
is not always good and data rates are limited.
• Dial-up internet access is offered through a number of Internet Service
Provider (ISP).
• Most ISPs lease a set of telephone numbers, sometimes local, sometimes
national, that dial into network pipeline that feed into the Internet.
• Open joining a dial-up service, the subscriber chooses a user name and
password.
• Once the modem calls the phone number and makes a connection a
“handshake” takes place in which information is exchanged between the
computer modem and the remote server.
• The user name and password is supplied by the modem.
• This grants the user access through the dial-up gate way to the Internet.
• Dial-up service is least expensive but also the slowest type of Internet
access.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 3.6: Dial-up Connection


Connecting to Dial-Up Internet Accounts
• Click on Start and point to Control Panel.
• Click on Network and Internet Connections.
• Click on Network Connections.
• Click on Create a new connection.
• Click on Next.
• Select Connect to the Internet and Click Next.
• Select Set up my connection manually and Click Next.
• Select Connect using a dial-up modem and Click Next.
• In the open field type in “Setarnet” and Click Next.
• Type in the phone number for ISDN dialup and Click Next.
• Type in the “Username” and “Password” and Click Next.
• Click Finish and the Internet setup are complete.
Dedicated Access
• Dedicated Internet Access is a reliable and scalable worldwide Internet
access service.
• It is specifically designed to maximize today’s business-critical VPN
connectivity needs.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The ISPs managed Internet connectivity with a comprehensive suite of
services features, all at the fair market price required by global businesses.
• The key benefit of dedicated access is that it is cost effective and it provides
reliable internet access.
ISDN Connection
• ISDN is abbreviation of Integrated Services Digital Network.
• ISDN is an international communications standard for sending voice, video
and data over digital telephone lines or normal telephones wires.
• ISDN supports data transfer rates of 64 Kbps (i.e., 64000 bits per seconds).
• It is mostly designed for leased lines.
• Configuration allows for multiple types of terminations. It uses a Terminal
Adapter (TA) for termination and it is not a modem.
• There are two types of ISDN.

 Basic Rate Interface (BRI)

 Primary Rate Interface (PRI)

• Basic Rate Interface (BRI)


 It consists of 64 Kbps B-Channels and one D-Channels for transmitting
control information.

• Primary Rate Interface (PRI)


 It consists of 23 B-Channels and one D-Channel (U.S.)

• The original version of ISDN employs base band transmission.


• Another version, called B-ISDN, uses broadband transmission and is able to
support transmission rates of 1.5 Mbps. -ISDN requires fiber optic cables and
is not widely
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 3.7: ISDN Connection

ISDN Services
• ISDN telephony
• ISDN telecopy
• ISDN and analog terminals
• Call forwarding
• Call waiting
• CLIP (Calling Line Identification Presentation)
• CLIR (Calling Line Identification Restriction)
• Three-party conference
• Advice of change
• Malicious call identification

Advantages of ISDN
• Digital services with less error.
• Direct fast connection with no dialing.
• Higher bandwidth (Takes less time in downloading material).
• Supports multiple users.
• Able to use ISDN for more than one task.
Disadvantages of ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• ISDN is more expensive to install than a standard telephone.
• Not easy to set up.
• All exchanges do not provide ISDN service.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.5 Internet Accounts by ISP

Topic: 3.5.2 Protocol Options

Protocol Options
Secure Shell (SSH)
• Secure Shell or SSH is a network protocol that allows data to be exchanged
using a secure channel between two networked devices.
• It is used primarily on Linux and Unix based system to access shell accounts,
SSH was designed as a replacement for Telnet and other in secure remote
shells, which send information, notably passwords, in plain text, leaving them
open for interception.
• The encryption used by SSH provides confidentially and integrity of data over
an insecure network, such as the Internet.
• SSH is typically used to log into a remote machine and execute commands

FIG 3.8: Secure Shell (SSH)

SLIP
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of
the Internet Protocol designed to work over serial ports and modem
connections.
• SLIP (on PCs) has been largely replaced by the Point-to-Point Protocol
(PPP), which is better engineered, has more features and does not require its
IP address configuration to be set before it is established.
• SLIP does not provide error detection, therefore SLIP on its own is not
satisfactory over an error-prone dial-up connection.
• SLIP is a protocol for connection to the Internet via a dial-up connection.

FIG 3.9: SLIP


PPP
• Point-to-Point Protocol or PPP is a data link protocol commonly used to
establish a direct connection between two networking nodes.
• PPP originally emerged as are encapsulation protocol for transporting IP
traffic over Point-to-Point links.
• It is a protocol for communication between two computers using a serial
interface, typically a personal computer connected by phone line to a server.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• PPP is a full duplex protocol that can be used on various physical media,
including twisted pair or fiber optic lines or satellite transmission.
• PPP is usually preferred over the earlier de facto standard SLIP because it
can handle synchronous as well as asynchronous communication.
• PPP can share a line with other users and it has error detection that SLIP
lacks.

FIG 3.10: Point-to-Point Protocol


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.5 Internet Accounts by ISP

Topic: 3.5.3 Service Options

Service Options
E-mail
• E-mail (electronic mail) is the exchange of computer stored messages by
telecommunication.
• E-mail is a system of worldwide communication in which a computer user can
compose a message at one terminal that can be regenerated at the
recipient’s terminal when user Logs in.
• Thus E-mail is a system of sending and receiving messages electronically
over a network, as between personal computers.

FIG 3.11: E-Mail

WWW
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The World Wide Web (commonly abbreviated as WWW) is a system of
interlinked hypertext documents accessed via the Internet.
• The World Wide Web enabled the spread of information over the Internet
through an easy-to-use and flexible format.
• It thus played an important role in popularizing the use of internet.

FIG 3.12: World Wide Web


Firewall
• A firewall is a program or device that acts as a barrier to keep destructive
elements out of a network or specific computer.
• Firewalls are configured (in hardware, software, or both) with specific criteria
to block or prevent unauthorized access to a network.
• They work as filters for your network traffic by blocking incoming packets of
information that are seen as unsafe.
• In large corporations, if a firewall is not in place, thousands of computers
could be vulnerable to malicious attacks.
• Firewalls should be placed at every connection to the internet and are also
used to control outgoing web traffic as well in large organizations.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 3.13: Firewall


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.6 Summary

Topic: Summary

Summary
• In this class, user have learnt about,

 Levels of Internet connectivity

 Setting up a connection

 ISDN

 Internet accounts by ISP

 Dialup connections through the telephone system

 Dedicated connections through the telephone system.

 Protocol options and service options.


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 3.7 Model Questions

Topic: Model Questions

Model Questions
• Explain different levels of connectivity.
• What is ISDN?
• Explain the services of ISDN.
• Explain protocol options of Internet Accounts by ISP.
• Explain service options of Internet Accounts by ISP.
• Write short notes on ISPs.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1

1. Level One Connectivity is also known as _____________ access.


a) Network
b) Dial up
c) Internet
d) Gateway
2. In ______________ Internet Connection, the user will get only a textual matter of a
Web Page.
a) Shell
b) Dial up
c) TCP/IP
d) ISDN
3. ________ Internet access is a type of Internet connectivity that operates through a
standard telephone line.
a) Shell
b) Dial up
c) TCP/IP
d) ISDN
4. ____________ access is a reliable and scalable worldwide Internet access service.
a) Shell
b) ISDN connection
c) Dedicated access
d) ISDN services
5. Secure Shell or SSH is a __________ protocol that allows data to be exchanged
using a secure channel between two networked devices.
a) Network
b) Control
c) Internet
d) Gateway

Answers:

1.d
2.a
3.b
4.c
5.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Assessment 2 (True/False)

1. Point-to-Point Protocol or PPP is a transfer protocol commonly used to establish a


direct connection between two networking nodes.
a) True
b) False
2. E-mail (electronic mail) is the exchange of computer stored messages by
telecommunication.
a) True
b) False
3. A firewall is a program or device that acts as a barrier to keep destructive elements
out of a network or specific computer.
a) True
b) False

Answers:

1.b
2.a
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
1. Internet Technology and Web Design by Isrd.
Course : INTERNET TECHNOLOGY AND WEB DESIGN
Module : Internet Network

TABLE OF CONTENT
UNIT NUMBER 4/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Syllabus

4.1 Objectives
4.2 Network Definition
4.2.1 Network Definition
4.3 Common Terminologies
4.3.1 LAN
4.3.2 LAN Applications
4.3.3 WAN
4.3.4 WAN Connection Types
4.3.5 Node
4.3.6 Host
4.3.7 Workstation
4.3.8 Bandwidth
4.3.9 Interoperability
4.3.10 Network Administrator
4.3.11 Network Security
4.4 Network Components
4.4.1 Severs
4.4.2 Clients
4.4.3 Communication Media
4.5 Types of Network
4.5.1 Peer to Peer
4.5.2 Client Server
4.6 Addressing in Internet
4.6.1 DNS
4.6.2 Domain Name and their Organization
4.6.3 Understanding the Internet Protocol Address
4.7 Network Topologies
4.7.1 Bus
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

4.7.2 Star
4.7.3 Ring
4.8 Ethernet
4.8.1 Ethernet
4.9 FDDI
4.9.1 FDDI
4.10 ATM
4.10.1 ATM
4.11 Intranet
4.11.1 Intranet
4.12 Summary
4.13 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 4.1 Objectives

Objectives
• At the end of this course, the user will be able to
 Understand what is network
 Know about the network terminologies
 Know about the components of network
 Understand about network types
 Understand about the internet addressing
 Know about the network topology and their connections
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.2 Network Definition

Topic : 4.2.1 Network Definition

Network Definition
• A network is any collection of independent computers that communicate with one
another over a shared medium.
• A computer network is a collection of two or more connected computers.
• When these computers are joined in a network, people can share files and
peripherals such as modems, printers and tape backup drives.
• The computers on a network may be linked through cables, telephone
lines, radio waves, satellites etc.

FIG 4.1: Network


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.1 Local Area Network (LAN)

Local Area Network (LAN)


• LAN is a group of computers and network communication devices within a limited
geographical area such as home, school and office building.
• The devices used in this network can be connected via wired cable or wireless
links.

FIG 4.2: Local Area Network

• Depending on the needs of an organization and the type of technology used, a


LAN can be as simple as two PCs and a printer in someone's home office or it
can extend throughout a company and include audio and video peripherals.
• Currently, LAN size is limited to a few kilometers.
• LANs are designed to allow resources to be shared between personal computers
or workstations.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• The resources to be shared can include hardware (e.g., a printer), software (e.g.,
an application program), or data.
• The most common LAN topologies are bus, ring, and star. Early LANs had data
rates in the 4 to 16 megabits per second (Mbps) range.
• Wireless LANs are the newest evolution in LAN technology.
• LANs are configured in any one of two basic structures. Such as
 Peer-to-Peer
 Client/Server
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.2 LAN Applications

LAN Applications
• LANs are mostly used in office environment.
• In an office environment it is mainly used for three purposes.
 Sharing
 Interoffice Communication
 Internet Communication
• Sharing
 Sharing Hardware
 Users can be connected through Local Area Network to the single printer
or data storage.
 Jobs from each user are queued in that single printer.

FIG 4.3: Hardware Sharing


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Sharing Software
 Through LAN connection users can share programs such as accounting
programs, which is stored in a single machine.

FIG 4.4: Sharing of Software in LAN Network


 Sharing Data
 Sharing of large database between the users is also another big
advantage.
• Interoffice Communication
 The employee of a company can communicate with each other using this
network.
 Some of the LAN messenger is used within the office area are,
 Tonic
 CD Messenger
 Squiggle - A free, open source LAN Messenger
 Outlook Messenger
 These types of communication are sometimes more effective than voice
communication by phone, where users can save money.

• Internet Communication
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Another usage of LAN in an office environment is external communication, via


the internet.
 Each employee can use the LAN for the connection to the internet.

FIG 4.5: Sharing of Internet connection in office

 In the FIG 4.5 Host computer is connected to the modem and hub, through
hub. Now all the systems in the office get access to the internet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.3 Wide Area Network (WAN)

Wide Area Network (WAN)


• Wide Area Network (WAN) spans over a large geographical area such as
a state or a country.
• A Wide Area Network is different from MAN because of the distance
between each of the network.
• The best example of a WAN could be the Internet that is the largest network in
the world.

FIG 4.6: Wide Area Network (WAN)


• The world's most popular and longest Wide Area Network is an Internet.
• It makes communication of computers and users in one location with the
computers and users in another location.
• It covers long distance via telephone lines, fiber optic cables or satellite links.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• The protocol used in a WAN is TCP/IP (Transfer Control Protocol/) in


combination with the devices such as router, switches, firewall and modems.

FIG 4.7: WAN connection in the Modem


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.4 WAN Connection Types

WAN Connection Types


• The three different WAN connections that can be used to connect the LAN's
together are,

 Dedicated connection.
 Circuit switching.
 Packet switching.
• Dedicated connection

 This connection is also referred as point-to-point connection or leased


connection.
 It uses synchronous serial lines up to 45Mbps.

FIG 4.8: Dedicated connection


 No setup is made before transmission, it constantly transfers the data.
• Circuit switching

 The term circuit switching is same like a phone call.

FIG 4.9: Circuit switching


 No data can transfer before end to end connection is established.
 It is used for low-bandwidth data transfer.
 Examples of circuit-switched networks are
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Dial-up.
 ISDN (Integrated Service Digital Network).
• Packet switching

 Packet switching method allows user to share bandwidth with other


companies to save money.

FIG 4.10: Packet- switching


 The packet switching transfers packets across a carrier network.
 Speed can range from 56Kbps to T3 (45Mbps).
 Examples of packet switching are,
 Frame Relay,
 X.25 Network,
 Internet Protocol,
 Ethernet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.5 Node

Node
• A node is a system or device connected to a computer network.
• Nodes can be computers, Personal Digital Assistants (PDAs), cell phones, or
various other network appliances.
• For example, if a network connects a file server, five computers, and two printers,
there are eight nodes on the network.
• Each device on the network has a network address, such as a MAC address,
which uniquely identifies each device. This helps keep track of where data is
being transferred to and from on the network.

FIG 4.11: Node


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.6 Host

Host
• A host is one or more networked computers that have been setup to handle each
user visiting or requesting information.
• A host is responsible for many different responsibilities, for example, a host may
be responsible for handling each of the computer players in an online game or for
sending users a web page on the Internet.
• Each computer connected to the host computer is known as a client.

FIG 4.12: Host


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.7 Workstation

Workstation
• Workstation, a high-performance computer system that is basically designed for
a single user and has advanced graphics capabilities, large storage capacity, and
a powerful microprocessor (Central Processing Unit).
• A workstation is a name given to a single computer that is connected to another
computer or network.
• A workstation is more capable than a Personal Computer (PC) but is less
advanced than a mid-range computer.

FIG 4.13: Workstation


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.8 Bandwidth


Bandwidth
• The amount of information that can be transmitted through a communications
channel in a given amount of time that is, the capacity of the channel.
• It is often uttered in bits per second, or alternatively bytes per second, leading to
lots of confusion.
• Bandwidth figures are used to express the capacity of a network link or interface
(e.g., a 100Mbps Ethernet interface) or the rate of information transfer (e.g. a file
downloading at 3.2KB/s).
• When referring to user's own connection, bandwidth, communication speed
or connection speed is the total maximum capacity of the network or modem
connection.
• The more bandwidth a computer has, the faster it will be able to receive and
send information.
• A modem with a connection of 56kbps is nearly twice as fast as one 28.8kbps
and users with a broadband connection can get transfers speeds of
several MB every second, which is more than triple the speed of the fastest
modem.

FIG 4.14: Bandwidth


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.9 Interoperability

Interoperability
• Interoperability is the ability of different networks or programs to work or
communicate together without the need of additional tools or interfaces required
by the user.
• For example, most networks use TCP/IP, which is available on all operating
systems, computers and supported with most networks.
• In this current Internet age, it is important that networks of different type are able
to communicate with other types of network.
• Not being able to transfer data between networks may isolate a network and
decrease efficiency.

FIG 4.15: Interoperability


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.10 Network Administrator

Network Administrator
• A network administrator is an individual or group of individuals responsible for the
maintenance and operation of a network or server.
• A network administrator may be responsible for maintaining a network and may
be assigned to one or more of the below tasks.
• Network administrator responsibilities.
 Allocating and adding disk storage space.
 Designing or redesigning the network.
 Expanding the network.
 Helping employees with computer questions.
 Installing and upgrading computers and network equipment on the network.
 Managing filters and rules (e.g. ACL's, firewalls, QoS, SPAM filters).
 Monitoring the network.
 Resetting user names and passwords.
 Setting up a network, network device, or computers on the network.
 Testing a network for security vulnerabilities.
• Examples of network administrator certifications

 MCSA
 Network+
 CCNP
 CNA
 RHCE
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 4.16: Network Administrator


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.3 Common Terminologies

Topic : 4.3.11 Network Security

Network Security
• A specialized field in computer networking that involves securing a computer
network infrastructure.
• Network security is typically handled by a network administrator or system
administrator who implements the security policy, network
software and hardware needed to protect a network and the resources accessed
through the network from unauthorized access and also ensure employees to
have adequate access to the network and resources to work.
• A network security system typically relies on layers of protection and consists of
multiple components including networking monitoring and security software in
addition to hardware and appliances.
• All components work together to increase the overall security of the computer
network.

FIG 4.17: Network Security


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.4 Network Components

Topic : 4.4.1 Servers

Servers
• Server is just like any other computer of the network however it can be
distinguished with its large storage capacity and the role that is assigned to it.
• This is the administrator that controls functioning of other computers and
responsible for the division of labor among computers in a shared network.
• Main computer that provides services to other computers, which holds stored
files, programs and network operating system.

FIG 4.18: Server


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.4 Network Components

Topic : 4.4.2 Clients

Clients
• Any computer that is the part of a common network other than the server is
called as Client.
• The division is based on the storage capacity and responsibility of the computer.
• For example, a server has a large storage area and its responsibilities are pretty
different than client computers.
• The client computer access network and shared resources provided by the
server.
• It is less powerful than server computer.

FIG 4.19: Client


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.4 Network Components

Topic : 4.4.3 Communication Media

Communication Media
• Communication media interconnect the computers in a network.
• Different types of transmission media are,
 Wired or Bounded
 Twisted-pair wire
 Coaxial cable
 Optical fiber cable
 Wireless or Unbounded
 Wi-Fi
 Bluetooth
 Transmitter, Receiver
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.5 Types of Network

Topic : 4.5.1 Peer to Peer Network

Peer to Peer Network


• In Peer-to-Peer networking, there are no dedicated servers or hierarchy among
the computers.
• All of the computers are equal and therefore known as peers.
• Normally each computer serves as Client/Server and there is no one assigned to
be an administrator responsible for the entire network.
• Peer-to-peer networks are good choices for needs of small organizations where
the users are allocated in the same general area, security is not an issue and the
organization and the network will have limited growth within the foreseeable
future.

FIG 4.20: Peer-to-Peer Network

Advantages
• Easy and simple to set up, only requiring a hub or a switch to connect all
computers together.
• You can access any file on the computer as-long as it is set to a shared folder.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• If one computer fails to work, all the other computers connected to it still continue
to work.
Disadvantages
• Security is not good other than setting passwords for files that you don't want
people to access.
• If the connections are not connected to the computers properly, then there can
be problems accessing certain files.
• It does not run efficient if you have many computers, it is best to use two to eight
computers.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.5 Types of Network

Topic : 4.5.2 Client Server Network

Client Server Network


• The term Client/server refers to the concept of sharing the work involved in
processing data between the client computer and the most powerful server
computer.
• A client is the computer running a program that request the service from the
server.
• A server is a computer running a process that provides a service to other
computers when they request it.
• Client/server networks are more suitable for larger networks.
• A central computer or ‘server’ acts as the storage location for files and
applications shared on the network.
• Usually the server is a higher than average performance computer.
• The server also controls the network access of the other computers, which are
referred to as the 'client' computers.

FIG 4.21: Client Server Network

• For example, a LAN-based database application stores its data on a server,


which stands by, waiting for clients to request information from it.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Users of workstation computers run a database client program in which they


generate queries that request specific information in the database and transmit
those queries to the server.

FIG 4.22: Client server Network

• The server responds to the queries with the requested information and
transmits it to the workstations, which format it for display to the users.
• In this case, the workstations are responsible for providing a user interface
and translating the user input into a query language understood by the server.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• They are also responsible for taking the raw data from the server and
displaying it in a comprehensible form to the user.
Advantages of client / server
• All files are stored in a central location.
• Network peripherals are controlled centrally.
• Backups and network security is controlled.
• Users can easily access to the shared data.
Disadvantages of client / server
• A special network operating system is needed.
• The server is expensive to purchase and difficult to set up initially.
• If one of the servers goes down, all the users get affected and it may even
bring the whole network down.
• When there are frequent simultaneous client requests, servers severely get
overloaded, forming traffic congestion.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.6 Addressing in Internet

Topic : 4.6.1 Domain Name System (DNS)

Domain Name System (DNS)


• The Domain Name System (DNS) was originally invented to support the growth
of email communications on the ARPANET, and now supports the Internet on a
global scale.
• The DNS as a whole consists of a network of servers that map Internet domain
names like www.livinginternet.com to a local IP addresses.
• The DNS enables domain names to stay constant while the underlying network
topology and IP addresses change.
• This provides stability at the application level while enabling network applications
to find and communicate with each other using the Internet protocol no matter
how the underlying physical network changes.
• DNS uses a client/server network architecture.
• The Domain Name System (DNS) servers distribute the job of mapping domain
names to IP addresses among servers allocated to each domain.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 4.23: Domain Name System (DNS)


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.6 Addressing in Internet

Topic : 4.6.2 Domain Name and their Organization

Domain Name and their Organization


• Internet domain names are the alphanumeric identifiers, people use to refer to
hosts on the Internet, like "LivingInternet.com".
• The structure of Internet domain names was first described in RFC 819, and their
syntax was first described in RFC 822.
• Domain Names come in four main types as follows
 Top-level domains,
 Second-level domains,
 Third-level domains,
 Country domains.
• Top-level domains
 Internet domain names are organized by their levels, with the higher levels on
the right.
 Every domain name ends with a top-level domain label.
 For example, for the domain "www.twenty.net", the top-level domain is "net".
 Some of the Top-level Domains are
 gov - Government sites
 edu - Educational institutions
 org - Organizations (nonprofit)
 mil - Military sites
 com - Commercial business
 net - Network organizations
• Second-level domains
 Top-level Internet domains like ".com" are shared by all the organizations in
the domain.
 Second-level domain names like "yahoo.com" and "livinginternet.com" are
registered by individuals and organizations.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Second-level domains are the addresses commonly used to host Internet


applications like web hosting and email addressing.
 Excluding the top-level domain portion, second-level domain names can have
up to 61 characters. For many years, character were restricted to the 26
letters, 10 numbers, or the hyphen character, except the hyphen can't be the
first or last character.
• Third-level domains
 Third-level domain names are created by those that own second-level
domains.
 Third-level domains can be used to set up individual domains for specific
purposes, such as a domain for web access and one for mail, or a separate
site for a special purpose like
 www.livinginternet.com
 mail.livinginternet.com
 rareorchids.livinginternet.com
 Fourth-level and even higher Internet domains like
"www2.un.news.media.twenty.net" can be also be established. Three of four
levels is usually sufficient for most purposes.
• Country domains
 Each country in the world has its own top-level Internet domain with a unique
alphabetic designation.
 A few country domains are shown below.
 .in - India
 .au - Australia
 .ca - Canada
 .us - United States
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.6 Addressing in Internet

Topic : 4.6.3 Understanding the Internet Protocol Address

Understanding the Internet Protocol Address


• Internet Protocol (IP) address is shortly called as IP address.
• An IP address is an identifier for a computer or device on a TCP/IP network.
• Networks using the TCP/IP protocol route messages based on the IP address of
the destination.
What is My IP Address?

• To view the IP address user can use the ipconfig (IPCONFIG) command line
tool.
• Ipconfig displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)
settings.

• To launch the command prompt from a Windows-based computer click on Start -


> All Programs -> Accessories -> Command Prompt and type ipconfig and hit
Enter.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 4.24: Command Prompt

• User can also use Google search to find the IP address. Type what is my IP
address as a search box and Google will show the IP address of the computer
from which the query was received as the top search result.
The Format of an IP Address

• The format of an IP address is a 32-bit numeric address written as four numbers


separated by periods.
• Each number can be 0 to 255. For example, 1.160.10.240 could be an IP
address.
• The four numbers in an IP address are used in different ways to identify a
particular network and a host on that network.
• Within a remote network, user can assign IP addresses at random as long as
each one is unique. However, connecting a private network to the Internet
requires the use of registered IP addresses (called Internet addresses) to avoid
duplicates.
• An IP address can be static or dynamic.
• A static IP address will never change and it is a permanent Internet address.
• A dynamic IP address is a temporary address that is assigned each time a
computer or device accesses the Internet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.7 Network Topologies

Topic : 4.7.1 Bus Topology

Bus Topology
• Bus topology also called horizontal topology.
• In bus topology, multiple devices are connected one by one, by means of single
cable.

FIG 4.25: Bus topology

• When one computer sends a signal up the wire, all the computers on the network
receive the information, but only one accepts the information, the rest discard the
messages.
• The central cable is the backbone of this network and is known a bus.
• Bus is passive topology because it requires termination.
Advantages
• Easy to use and easy to install.
• Needs fewer physical connectivity devices.
• A repeater can also be used to extend a bus topology network.
• Low cost.
Disadvantages
• Heavy network traffic can slow a bus considerably.
• It is difficult to troubleshoot a bus.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Failure of a cable affects all devices on the network.


• Difficult to add new node.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.7 Network Topologies

Topic : 4.7.2 Star Topology

Star Topology
• A star topology consists of a number of devices connected by point-to-point links
to a central hub.
• In star topology, every node (computer workstation or any other peripheral) is
connected to a central node called a hub or switch.
• A star network consists of one central switch, hub or router, which acts as a
conduit to transmit messages.

FIG 4.26: Star topology

• All peripheral nodes may thus communicate with all others by transmitting to, and
receiving from, the central node only.
• The star topology reduces the damage caused by line failure by connecting all of
the systems to a central node.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• This is easy to control and traffic flow is simple.


• Data travels from the sender to central hub and then to the receiver.
Advantages
• Isolation of devices
 Each device is inherently isolated by the link that connects it to the hub.
 This makes the isolation of individual devices straightforward and amounts to
disconnecting each device from the others.
 This isolation also prevents any non-centralized failure from affecting the
network.
• Benefits from centralization
 It is easy to modify and add new nodes to a star network without disturbing
the rest of the network.
 Centralization also allows the inspection of traffic through the network.
 Easy to detect faults and to remove parts.
 No disruptions to the network when connecting or removing devices.
 Installation and configuration is easy.
 Failures of any node do not bring down the whole star network.
Disadvantages
• If the central hub fails, the whole network fails to operate.
• Each device requires its own cable segment.
• Installation can be moderately difficult, especially in the hierarchical network.
• Requires a large amount of cable to be connected.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.7 Network Topologies

Topic : 4.7.3 Ring Topology

Ring Topology
• In a ring topology, each computer is connected to the next computer; with last
one connected to the first.

FIG 4.27: Ring topology

• Data travel from node to node, with each node along the way handling every
packet.
• Because a ring topology provides only one pathway between any two nodes, ring
networks may be disrupted by the failure of a single link.
• The signals travel on the cable in only one direction.
• Each computer retransmits what it receives.
• Ring is an active network.
• In this, termination is not required.

Advantages
• Cable failures are easily found.
• Because every node is given equal access to the token, no one node can
monopolize the network.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Performs better than a bus topology under heavy network load.


• Does not require a central node to manage the connectivity between the
computers.
• Point to point line configuration makes it easy to identify and isolate faults.
• Due to the point to point line configuration of devices with a device on either side
(each device is connected to its immediate neighbor), it is quite easy to install
and reconfigure since adding or removing a device requires moving just two
connections.
Disadvantages
• Adding or removing nodes disrupts the network.
• It is difficult to troubleshoot a ring network.
• Failure of one node on the ring can affect the whole network.
• Cost of cable is more in ring network.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.8 Ethernet

Topic : 4.8.1 Ethernet

Ethernet
• Ethernet is a physical and data link layer technology for Local Area Network
(LANs).
• Ethernet was invented by engineer Robert Metcalfe.
• When first widely deployed in the 1980s, Ethernet supported a maximum
theoretical data rate of 10 megabits per second (Mbps).
• Later, Fast Ethernet standards increased this maximum data rate to 100Mbps.
• Gigabit Ethernet technology further extends peak performance up to 1000Mbps
and 10 Gigabit Ethernet technology also exists.
• Higher level network protocols like Internet Protocol (IP) use Ethernet as their
transmission medium. Data travels over Ethernet inside protocol units called
frames.
• The run length of individual Ethernet cables is limited to roughly 100 meters, but
Ethernet networks can be easily extended to link entire schools or office buildings
using network bridge devices.

FIG 4.28: Ethernet

• Ethernet Port
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 An Ethernet port is an opening on computer network equipment that Ethernet


cables plug into.
 These ports are alternatively called jacks or sockets.
 Ethernet ports accept cables with RJ-45 connectors.
• Ethernet Card
 An Ethernet card is one kind of network adapter. These adapters support
the Ethernet standard for high-speed network connections via cables.
 Ethernet cards are sometimes known as Network Interface Cards (NICs).

FIG 4.29: Ethernet Port FIG 4.30: Ethernet Card


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.9 FDDI

Topic : 4.8.1 FDDI

FDDI
• FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO standards for
data transmission on fiber optic lines in a Local Area Network (LAN) that can
extend in range up to 200 km (124 miles).
• The FDDI protocol is based on the token ring protocol.
• In addition to being large geographically, an FDDI local area network can support
thousands of users.
• FDDI is frequently used on the backbone for a Wide Area Network (WAN).
• An FDDI network contains two token rings, one for possible backup in case the
primary ring fails.
• The primary ring offers up to 100 Mbps capacity. If the secondary ring is not
needed for backup, it can also carry data, extending capacity to 200 Mbps.
• The single ring can extend the maximum distance, a dual ring can extend 100 km
(62 miles).

FIG 4.31: FDDI

Features of FDDI
• Number of stations: Up-to 1000 connections are allowed (500 and connected
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

stations).
• Total fiber path: Up-to 200 km of total fiber length is allowed.
• Data transmission rate: 100 Mbps.
• Optical transmission media: FDDI specifies multi-mode optical fiber.
Typical parameters of transmission medium are-
 Optical source-1300 nm LED
 Core diameter-62.5 micron
 Cladding diameter-125 micron
 Numerical aperture-0.275
 Bandwidth-500 MHz/km
Advantages
• High bandwidth.
• Security.
• Physical durability.
• Use of multiple tokens.
• System fault tolerance.
Disadvantages
• FDDI is a complex technology.
• FDDI is costly.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.10 ATM

Topic : 4.10.1 Asynchronous Transfer Mode (ATM)

Asynchronous Transfer Mode (ATM)


• Asynchronous Transfer Mode (ATM) is a streamlined packet transfer
interface. ATM also is a connection-oriented network.
• ATM uses packets of fixed size for the communication of data. These
packets are called as ATM cells.
• ATM is used for efficient data transfer over high-speed data networks.
• ATNI provides real time and non-real time services.
• The services provided are
 Synchronous TDM streams such as T-1.
 Services using the constant bit rates.
 Compressed voice and video.
 Traffic with specific quality requirement using the non-real time
variable bit rate.
 IP based services using available bit rate (ABR) and unspecified bit rate
(UBR) services.
• The ATM needs an adaption layer for supporting the information transfer
protocols that are not based on ATM.
• Cell Relay
 ATM is also known as cell relay.
 It has advantages of better reliability and fidelity, which allows
faster packet switching than X.25.
• Applications
 ATM was developed as a part of work on ISDN.
 But now it is used in non-ISDN system where the data rates are very high.
ATM Protocol Architecture (ATM Reference Model)
• ATM is a streamlined protocol. It has minimal error and flow control capabilities.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Hence the number of overhead bits required with each cell is reduced which
enables ATM to operate at high data rates.
• Also, due to the ATM cells of fixed size, the processing required at each node is
simplified. This also supports the use of ATM at high data rates.
• FIG 4.31 shows the ATM protocol architecture for an interface between user and
network.

FIG 4.32: ATM Protocol Architecture

• Layers in the ATM protocol model are


 Physical layer
 ATM layer
 ATM Adaption layer (AAL)
• Physical Layer
 The physical layer of the protocol involves the specification of a transmission
medium and signal-encoding scheme.
 The data rates specified at this layer are between 25.6 Mbps and 622.08
Mbps, but data rates higher and lower than these are possible.
• ATM Layer
 This layer is common to all the services that provide the packet transfer
capabilities.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 This layer defines the transmission of data in fixed size cells and it also
defines the use of logical connections.
• ATM Adaption Layer (AAL)
 This layer is a service dependent layer. It is used for supporting the
information transfer protocol not based on ATM.
 The AAL maps the higher layer information onto the ATM cell and cell is
transported over the ATM network.
• Planes in the ATM protocol model are
 User plane
 Control plane
 Management plane
• User plane
 It is used for transferring user information along with associated controls such
as flow control, error control etc.
• Control plane
 It is supported to perform the call control and connection control functions.
• Management plane
 It includes the plane management.
 The management plane performs management functions related to a system.
They include,
 Provision of coordination between all planes.
 Layer management.
 Management function relating to resources and parameters residing in its
protocol entities.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.11 Intranet

Topic : 4.11.1 Intranet

Intranet
• Intranet, extranet, and the Internet are all networks of networks.
• "Intra" means "internal" or "within," + network.
• The major difference between the three classes of networks is the aspect of
network traffic control (i.e., who are the participants in the network).

FIG 4.33: Intranet

• Intranets are owned by individual organizations (i.e., intra-enterprise systems).


• Some organizations operate their own network, and some outsource that function
to network operations groups (e.g., EDS, AT&T Data Solutions, etc.).
• A key characteristic of intranet implementation is that protected applications are
not visible to the Internet at large.
• Intranet access control relies heavily on the physical access point to the
corporate LAN.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Once physical access is gained into a corporate site, application access controls
are the only constraint on access to corporate resources.
• Secure intranets are separated from the Internet by means of a firewall system.
• Inbound Internet traffic is NOT allowed into the corporate security perimeter
except for e-mail.
• Outbound network traffic destined to the Internet from the intranet is not usually
filtered. Some corporations constrain outbound traffic to allow only Web-based
protocols (e.g., HTTP, FTP and IIOP).
• Some of the difference between an Intranet and Internet are the Quality of
Service (QoS) or lack of Service Level Agreements (SLAs) which describe
availability, bandwidth, latency and response time.
• Most Internet Service Providers (ISPs) and networking device vendors are
developing an Internet level of service capability.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.12 Summary

Topic : Summary

• In this class, we have learnt about,


 Networks and their terminologies.
 Network components.
 Types of network.
 Concept of Internet addressing.
 Network topologies, Ethernet, FDDI, ATM, Intranet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 4.13 Model Questions

Topic : Model Questions

Model Questions
• What is network?
• List out the network terminologies.
• Explain about network components.
• What are the types of network?
• Explain DNS.
• Brief notes on network topologies.
• Short note on Ethernet.
• Explain FDDI.
• Brief note on ATM.
• Explain Intranet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Assessment 1

1. Which type of network covers a limited geographic distance, such as an office,


building, or a group of buildings in close proximity to each other?
a) LAN
b) MAN
c) WAN
d) GAN
2. Each computer connected to the host computer is known as a ___________.
a) Server
b) Client
c) Source address
d) Destination address
3. The amount of information that can be transmitted through a communications
channel in a given time is called__________.
a) Bridge
b) Host
c) Workstation
d) Bandwidth
4. _________ networks are more commonly implemented where less than ten
computers are involved and where strict security is not necessary.
a) Peer-to-peer
b) Client/server
c) Domain name server
d) Application
5. In which OSI layers does the FDDI protocol operate?
a) Physical
b) Data link
c) Network
d) Both a and b

Answers:
1.a
2.b
3.d
4.a
5.b
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Assessment 2 (True/False)

1. In star topology a hub sends data packets (frames) to all the devices, and acts as a
signal repeater.
a) True
b) False
2. Ethernet is a physical and data link layer technology for Wide Area Network
(WANs).
a) True
b) False
3. The FDDI protocol is based on the token ring protocol.
a) True
b) False

Answers:
1.a
2.b
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Books Referred
1. Computer Networks - II by V.S.Bagad, I.A.Dhotre.
2. Computer Network by Bharat Bhushan Agarwal, Sumit Prakash Tayal.
3. Information Security Management Handbook, Fifth Edition by Harold F. Tipton,
Micki Krause.
4. Understanding TCP/IP: A Clear and Comprehensive Guide to TCP/IP Protocols
by Libor Dostálek, Alena Kabelová.
Course : INTERNET TECHNOLOGY AND WEB DESIGN

Module : Services on Internet

TABLE OF CONTENT
UNIT NUMBER 5/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Syllabus

5.1 Objectives
5.2 Services on Internet
5.2.1 Services on Internet
5.3 E-mail
5.3.1 Electronic mail
5.3.2 Types of E-mail
5.3.3 E-mail service provider
5.4 WWW
5.4.1 World Wide Web
5.5 Telnet
5.5.1 Telnet
5.5.2 Telnet Commands
5.6 FTP
5.6.1 File Transfer Protocol
5.7 IRC
5.7.1 Internet Relay Chat
5.7.2 IRC Networks
5.7.3 IRC Commands
5.8 Search Engine
5.8.1 Search Engine
5.8.2 Functions of Search Engine
5.8.3 Search Engine Optimization
5.9 Summary
5.10 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.1 Objectives

Objectives
• At the end of the course the user will be able to
 Know about the usage of Internet.
 Understand the several services of internet.
 Know about the E-Mail services.
 Understand the concept of Telnet.
 Know about the Search Engine.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.2 Services on Internet

Topic: 5.2.1 Services on Internet

Services on Internet

• Internet Service Providers (ISP) companies or institutions, which satellite or


optical connections with several major Internet node abroad and thus ensuring
high capacity connection to the rest of the Internet world.
• However, practice has shown that it can barely follow the needs of the growing
number of members of Internet communities.
• When selecting an ISP of significance is the number of services that it provides
to its customers.
• All services provided by e-mail, but do not provide any service to FTP,
newsgroups, renting space on the disc, certain program support and etc.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.3 E-mail

Topic: 5.3.1 Electronic mail

Electronic mail
• E-mail is a method of exchanging digital messages from a sender to one or more
recipients.
• E-mail is also called as Electronic mail.
• The first E-mail was sent by Ray Tomlinson in the year 1971.
• E-mail is operated with the help of Internet and other computer networks.
• The user can send message, attach files like word document, images etc.
through e-mail.
• Both the sender and the receiver should have an e-mail account to send and
receive mails.
• E-mail servers accept, forward, deliver and store messages.
• Early e-mail systems required both the sender and the receiver should be in
online at the same time to send and receive e-mails, which was like instant
messaging.
• But today's e-mail system is more efficient and convenient, as it based on a store
and forward model. That is the sender and receiver is not required to be in online
at the same time.
• Neither the users nor their computers are required to be online simultaneously;
they need connect only briefly, typically to an email server, for as long as it takes
to send or receive messages.
• An Internet E-mail message consists of three components,
 Message envelope
 Used to privately enclose the content of the E-mail.

 Message header
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Used to determine where a message is sent, and also records the specific
path the message follows as it passes through each mail server.
 Consists of fields such as From, To, CC, Subject, Date and other
information about the E-mail.
 Message body
 Used to enter the text, images or attachments to recipient(s).

FIG 5.1: Components of e-mail


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.3 E-mail

Topic: 5.3.2 Types Of E-mail

Types of E-mail
• E-mail types will get differ related to the purpose or message content in the e-
mail which is sent.
• E-mails can be sent to single or group of people.
• There are number of methods for clients to engage their audiences through
different types of E-mail communication, which will deliver varied benefits that
require different design and planning processes.
• The different types of e-mails are as follows
 Marketing E-mails
 It is used to send commercial messages to a group of people.
 This type of mails contains the messages to send advertisements, request
for business, solicit ask for sales or donations.
 Examples: Newsletters, Flash sales, sales etc.

FIG 5.2: Marketing e-mail


 Notification E-mail
 Notification E-mail allow user to notify every particular event happens.
They are also known as Trigger.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 More generally, the notification E-mail may be used in order to celebrate


or mark an event like promotions, mela etc.
 Notification E-mails are used to notify the customers about the offer, due
date, etc.
 Examples: Birthday e-mail, Greetings after a purchase, Feedback request,
Offer alerts, Bill alerts, etc.

FIG 5.3: Notification e-mail


 Transactional E-mail
 Transactional E-mail can be used in Business transactions.
 This E-mail is an expected information that the client wishes to check or
confirm.
 This type of E-mail is not intended to optimize the customer relationship,
but to define it and mark it out.
 Transactional E-mail is a type of one-to-one E-mail. It's different from bulk
E-mail, which goes to many people with the same content.
 Examples: Bank Transactions, Payment confirmation, Order status, etc.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 5.4: Transactional e-mail


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.3 E-mail

Topic: 5.3.3 E-mail Service Provider

E-mail Service Provider


• E-mail Service Provider (ESP) are the companies which offers email marketing
or bulk email services.
• An ESP will provide a separate user account to its user which is protected by the
password.
• It provides a separate memory space for its users in their server.
• The user can store their files and data in their allocated memory space using
their account.
• The user can send and receive mails using their accounts.
• Certain services provided by the ESP are as follows
 Tracking information.
 Showing the status of sent email.
 Creating recipients groups.
 Templates for sending mails.
 Notifying the new messages.
 Storing and deleting mails, etc.
• There are many different e-mail service providers. They are,
 Gmail.
 Hotmail.
 Outlook.com.
 Zoho mail.
 Yahoo mail.
 MSN mail.
 ICloud mail.
 AOL mail.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 5.5: E-mail service providers


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.4 WWW

Topic: 5.4.1 World Wide Web

World Wide Web


• World Wide Web (also called WWW or W3) is a hypertext-based information
system. It is the most important service provided by the internet.
• It is an internet-based hypermedia initiative for global information sharing. And it
is a major means of access to the internet resources.
• It was developed in 1989 by Tim Berners-Lee, and he is called as the father of
WWW.
• Any word in a hypertext document can be specified as a pointer to a different
hypertext document where more information pertaining to that word can be
found.
• The reader can open the second document by selecting the word only the part of
the linked document which contains relevant information will be displayed.
• The second document may itself contain links to further documents. The reader
need not know where the referenced documents are present.
• The linked documents may be located at different Internet sites. WWW can
handle different text formats and different methods of organizing information.
• WWW is a graphical hypertext way of using the Internet using the HTTP protocol
for transmitting Web pages and other information over the Internet, in principle,
between the server and the user's computer.
• The World Wide Web (W3) is the universe of network-accessible information, an
embodiment of human knowledge
• It has a body of software and a set of protocols and conventions.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 5.6: World Wide Web


• The three technologies which remain as foundation for today's web. They are,
 HTML
 Hyper Text Markup Language.
 The publishing format for the Web, including the ability to format
documents and link to other documents and resources.
 It is the standard markup language used to create web pages.
 HTML describes the structure of a website semantically along with cues
for presentation, making it a markup language rather than a programming
language.
 HTML elements form the building blocks of all websites. HTML allows
images and objects to be embedded and can be used to create interactive
forms.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 5.7: HTML sample code


 URI (Uniform Resource Identifier)
 It is a kind of “address” that is unique to each resource on the Web.
 It is a string of characters used to identify a name of a resource.
 Such identification enables interaction with representations of the resource
over a network, typically the World Wide Web.
 The URI syntax consists of a URI scheme name, such as http, ftp, etc.
followed by a colon character and then by a scheme-specific part.
 We can easily identify a resource with the help of URI in www.

FIG 5.8: Uniform Resource Identifier


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 HTTP (Hypertext Transfer Protocol)


 It allows the retrieval of linked resources from across the Web.
 HTTP has been in use by the World-Wide Web global information initiative
since 1990.
 HTTP is the protocol to exchange or transfer hypertext.
 The Hypertext Transfer Protocol (HTTP) is an application-level protocol for
distributed, collaborative, hypermedia information systems.
 It is a generic, stateless, protocol which can be used for many tasks
beyond its use for hypertext, such as name servers and distributed object
management systems, through extension of its request methods, error
codes and headers
 A feature of HTTP is the typing and negotiation of data representation,
allowing systems to be built independently of the data being transferred.

FIG 5.9: Hypertext Transfer Protocol


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.5 Telnet

Topic: 5.5.1 Telnet

Telnet
• It is a Internet service that allows the user logs on and runs on a remote
computer and use programs installed on the remote computer.
• Telnet is a terminal emulation that enables a user to connect to a remote host or
device using a telnet client.
• The term telnet may also refer to the software that implements the client part of
the protocol.
• Telnet client applications are available for virtually all computer platforms such as
Windows 95/98/NT/2000, Linux, UNIX, etc.
• Telnet enables a user to manage an account or device remotely. For example, a
user may telnet into a computer that hosts their website to manage his or her
files remotely

FIG 5.10: Telnet Application


• Telnet is a client-server protocol, based on a reliable connection-oriented
transport. Typically, this protocol is used to establish a connection to
Transmission Control Protocol (TCP) port number 23.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Telnet is considered insecure because it transfers all data in clear text. Which
means if a user was sniffing a network, it's very possible they could grab your
user name and password as they were being transmitted.
• Most implementations of Telnet have no authentication that would ensure
communication is carried out between the two desired hosts and not intercepted
in the middle.
• Several vulnerabilities have been discovered over the years in commonly used
Telnet daemons.
• These security-related shortcomings have seen the usage of the Telnet protocol
drop rapidly, especially on the public Internet, in favor of the Secure Shell (SSH)
protocol, first released in 1995
• Users who are concerned about the data being transmitted should consider SSH
as opposed to telnet.
• SSH provides much of the functionality of telnet, with the addition of strong
encryption to prevent sensitive data such as passwords from being intercepted,
and public key authentication, to ensure that the remote computer is actually who
it claims to be.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.5 Telnet

Topic: 5.5.2 Telnet Commands

Telnet Commands
• telnet
 To start Telnet Client and to enter the Telnet prompt.
 At the Telnet prompt, Telnet commands must be used.
• telnet [\\RemoteServer]
 Remote Server: Specifies the name of the server to which you want to
connect.
• quit
 To stop telnet client.
 User can abbreviate this command to q.
• open [\\RemoteServer] [Port]
 To connect Telnet Client to a remote computer.
 Port: Specifies the port that is needed to be used. If port is not specified, the
default port is assumed.
 User can abbreviate this command too.
• close [\\RemoteServer]
 To disconnect Telnet Client from a remote computer.
 \\RemoteServer: Specifies the name of the server that is needed to be
managed. If server is not specified, then local server is assumed.
 User can abbreviate this command to c.
• send [\\RemoteServer] [ao] [ayt] [esc] [ip] [synch] [?]
 To send Telnet Client commands.
 \\RemoteServer: Specifies the name of the server that is needed to be
managed. If server is not specified, then local server is assumed.
 ao: Aborts output command.
 ayt: Sends an "Are you there?" command.
 esc: Sends the current escape character.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 ip: Interrupts the process command.


 synch: Performs the Telnet sync operation.
 ?: Allows you to view the complete syntax for this command.
• display
 To view the current settings for the Telnet client.
 The display command lists the currently operating parameters for the Telnet
client.
• tlntadmn [\\RemoteServer] [-s] [-k{SessionID | all}] [-m {SessionID | all}
"Message"]
 To administer Telnet sessions
 \\RemoteServer: Specifies the name of the server that is needed to be
managed. If server is not specified, then local server is assumed.
 -s: Displays active Telnet sessions.
 -k { SessionID | all }: Terminates sessions. Type the session ID to terminate a
specific session, or type all to terminate all sessions.
 -m { SessionID | all } " Message ": Sends a message to one or more sessions.
Type the session ID to send a message to a specific session, or type all to
send a message to all sessions. Type the message that you want to send
between quotation marks (that is, "Message").
 /?: Displays help at the command prompt.
• tlntadmn [\\RemoteServer] config [port=IntegerValue]
 To set the Telnet port on a computer running Telnet Server.
 \\RemoteServer: Specifies the name of the server that is needed to be
managed. If server is not specified, then local server is assumed.
 port= IntegerValue: Sets the Telnet port. You must specify the port with an
integer smaller than 1,024.
 /? : Displays help at the command prompt.
• tlntadmn [\\RemoteServer] config [mode={console | stream}]
 To set the mode of operation on a computer running Telnet Server.
 \\ RemoteServer: Specifies the name of the server that is needed to be
managed. If server is not specified, then local server is assumed.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 mode= { console | stream }: Specifies the mode of operation.


 /? : Displays help at the command prompt.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.6 FTP

Topic: 5.6.1 File Transfer Protocol (FTP)

File Transfer Protocol (FTP)


• File Transfer Protocol (FTP) is a standard network protocol used to transfer files
from one host to another host over a TCP-based network, such as the Internet.
• FTP is built on a client-server architecture and uses separate control and data
connections between the client and the server.
• FTP users may authenticate themselves using a clear-text sign-in protocol but
can connect anonymously if the server is configured to allow it.
• Before the World Wide Web and FTP was the only way to transfer large files
between computers of Internet users.
• The first FTP client applications were interactive command-line tools,
implementing standard commands and syntax.
• Graphical user interface clients have since been developed for many of the
popular desktop operating systems in use today.

FIG 5.11: File Transfer Protocol


• The FTP protocol can handle text files with ASCII or EBCDIC character sets.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• The first FTP client applications were command-line applications developed


before operating systems had graphical user interfaces, and are still shipped with
most Windows, Unix, and Linux operating systems
• FTP is most commonly used to download a file from a server using the Internet
or to upload a file to a server.
• FTP works in the same way as HTTP for transferring Web pages from a server to
a user's browser and SMTP for transferring electronic mail across the Internet in
that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable
data transfer.

FIG 5.12: FTP client server structure


• FTP package provides all the tools needed to look at files and directories,
change to other directories, and transfer files from one system to another.
• FTP uses TCP to actually move the files.
• An FTP server authenticates the user via a simple user name and plain text
password.
• Some FTP servers also allow anonymous logins without passwords. There is an
RFC for security enhancements to FTP that is not widely deployed.
• Because FTP relies on TCP when transferring data, error recovery and flow
control is built in.
• Trivial File Transfer Protocol
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 It is primarily used to boot diskless workstations and to transfer boot images


to and from routers.
 It is generally used for automated transfer of configuration or boot files
between machines in a local environment.
 It uses a reduced feature set. In addition to its reduced size, It also uses UDP
instead of TCP, which makes for faster transfers but with no reliability.
 In TFTP the client initiates the communication by issuing a request to the
server. Then if the server grants the request, then the connection is opened
and file is sent in 512 bytes fixed blocks.

FIG 5.13: Trivial File Transfer Protocol

• Secure File Transfer Protocol


 It is used to transfer the file over an encrypted connection.
 SFTP clients are functionally similar to FTP clients, but they use different
protocols.
 SSH session is used to encrypt the connection, and then the file is transferred
using SFTP protocol.
 It is mainly used to transfer files between computers.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 5.14: Secure File Transfer Protocol


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.7 IRC

Topic: 5.7.1 Internet Relay Chat

Internet Relay Chat

• Internet Relay Chat is an Internet wide talk facility and this is one of the most
popular services available in the Internet.
• Internet Relay Chat is mainly used for serious discussions and this is done using
dedicated chat servers.
• It is an application layer protocol that facilitates transfer of messages in the form
of text and it is based on client/server model of networking.
• The user wants to install the IRC client program in his system to communicate to
chat servers and send message to other clients.
• The client software is available for every major operating systems.
• IRC is mainly designed for the group communication such as discussion forums.
• It also allows one to one communication with the help of private messages. And
even files can also be shared.

FIG 5.15: Internet Relay Chat


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.7 IRC

Topic: 5.7.2 IRC Networks

IRC Networks
• To connect and chat with other IRC users, the system must either have an IRC
client or a web interface that connects you to IRC servers.
• There are numerous software IRC clients that enable users to connect and
communicate to other IRC servers.
• There are numerous IRC networks which run various IRC servers administrated
by various groups of operators.
• But apart from these, the protocol exposed to IRC users is very similar and all of
them can be accessed by the same client software.
• The IRC networks are broadly classified into 5 types. Such as;
 Popular nets: It will have over 10,000 users.
 General nets: It will have over hundred to thousand people.
 Subject nets: Some people create their own groups, dedicated to their
subject.
 Local nets: Local topics will be discussed.
• Some of the largest IRC networks are as follows;
 IRCNet.
 freenode.
 QuakeNet.
 Undernet.
 EFnet.
 rizon.
 DALnet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 5.16: IRC Networks


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.7 IRC

Topic: 5.7.3 IRC Commands

IRC Commands
• IRC has a line-based structure for sending and receiving messages.
• Commands are entered by prefixing them with a '/'. Depending on the command,
these may either be handled entirely by the client, or passed directly to the
server, possibly with some modification.
• To connect and chat with other IRC users, you must either have an IRC client or
a web interface that connects you to IRC servers.
• There are numerous software IRC clients that enable users to connect and
communicate to other IRC servers. The commands are similar for most of the
servers and clients.
• Some of the IRC commands that can be used when connected to a IRC server
are as follows
 /nick (username): Changes your user name.
 /part (channel): Leaves the specified channel.
 /whowas (username): Shows information about a specified user that was in
earlier.
 /whois (username): Shows information about the specified user.
 /away (message) : Leaves a message to others as why the user left.
 /clear: Clears the text from the current window.
 /clearall: Clears all the text from all open windows on the screen.
 /dcc chat (username): Opens a chat window with the username that is
specified by the user.
 /msg (username) (message): Sends a message to the user of your choice
without anyone else seeing it.
 /ping (channel): Pings all the users in a specified channel.
 /help: Brings up a list of all the commands or the help window.
 /ignore (on/off) (username): Allows a user to ignore or unignore a user.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 /ignore (+/-) (username): An alternative to ignore or unignore a user.


 /join (#channel): Joins a particular chat group, and open's the chat in a new
windows.
 /me (action text): Allows to do different actions, Like showing the text in a
different color, etc.
 /query (username) (message): Opens a new chat window to this user and
then sends a private message.

FIG 5.17: IRC window


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.8 Search Engine

Topic: 5.8.1 Search Engine

Search Engine

• Search Engine is a program that searches for and identifies items in a database
that correspond to keywords or characters specified by the user.
• Search engines are programs that search documents for specified keywords and
returns a list of the documents where the keywords were found.
• The search engine is a web program that enables the users to enter words and
phrases to search, and scan the vast information on the web to locate sites that
matches the words or phrase.
• It is used especially for finding particular sites on the World Wide Web.
• It is an organization with a web site containing a huge database of web site
addresses.
• Search engines also maintain real-time information by running an algorithm on a
web-crawler.
• These Search engines make use of the computerized software apps such as
spiders, bots and robots that take a trip beside the Webs, and follow the links
from site to site and page to page.
• They index millions of sites on the Web, so that Web surfers can easily find Web
sites with the information we want.
• The User can locate useful or interesting web sites by using a search engine.
• When a query is typed in form of subject or a name that describes what user are
seeking, and the search engine provides with a list or selection of web site
addresses that fit the inquiry.
• The User can then simply click on an address to jump to that website.

• Some of the most popular search engines are as follow;


 Google.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Bing.
 Yahoo.
 Ask.
 AOL.
 MSN.
 AltaVista.
 Excite.
 About.com.

FIG 5.18: Popular Search Engines


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.8 Search Engine

Topic: 5.8.2 Functions of Search Engine

Functions of search engine


• Day by day the data stored in internet are being increasing. And People started
to post many things in internet.
• The Internet now has an immeasurable amount of valuable information.
• The Search engines are essential for sorting, ranking, locating and storing the
significance of information.
• Thus the dependence and requirement of more efficient search engines is widely
increased.
• The main functions of search engine is as follows;
 Crawling.
 Indexing.
 Storage.
 Results

FIG 5.19: Functions Of Search Engine


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Crawling
 The web spider or the crawler is a fundamental part of the search engine.
 The crawler is a vital software component of the search engine.
 It essentially sorts through the Internet to find website addresses and the
contents of a website for storage in the search engine database.
 Crawling can scan brand new information on the Internet or it can locate older
data.
 Crawlers have the ability to search a wide range of websites at the same time
and collect large amounts of information simultaneously. This allows the
search engine to find current content on an hourly basis.
 The web spider crawls until it cannot find any more information within a site,
such as further hyperlinks to internal or external pages.

FIG 5.20: Crawling web sites

• Indexing
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Once the search engine has crawled the contents of the Internet, it indexes
that content based on the occurrence of search keyword in each individual
website.
 This allows a particular search query and subject to be found easily.
 Keyword phrases are the particular group of words used by an individual to
search a particular topic.
 The indexing function of a search engine first excludes any unnecessary and
common articles such as “the,” “a” and “an.”
 After eliminating common text, it stores the content in an organized way for
quick and easy access.
 Search engine designers develop algorithms for searching the web according
to specific keywords and keyword phrases.
 Those algorithms match user generated keywords and keyword phrases to
content found within a particular website, using the index.

FIG 5.21: Indexing the crawled result

• Storage
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Storing web content within the database of the search engine is essential for
fast and easy searching.
 The amount of content available to the user is dependent on the amount of
storage space available.
 Larger search engines like Google and Yahoo are able to store amounts of
data ranging in the terabytes, offering a larger source of information available
for the user.

FIG 5.22: Storing web content in search engine database

• Results
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Finally the resulting hyperlinks to websites that matches the user search
keywords are displayed to the user as result.
 When the user type in a search term, the crawler runs through the index and
matches what he typed with other keywords.
 The final search result are fetched from the search engine database with the
help of search algorithms.
 Algorithms created by the search engine designers are used to provide the
most relevant data first.
 Each search engine has its own set of algorithms and therefore returns
different results.

FIG 5.23: Search result generated by search engine


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.8 Search Engine

Topic: 5.8.3 Search Engine Optimization (SEO)

Search Engine Optimization (SEO)


• Search Engine Optimization is the process of increasing the visibility of a website
or a web page in a search engine's natural search results.
• Search engine optimization is a methodology of strategies, techniques and
tactics used to increase the amount of visitors to a website by obtaining a high-
ranking placement in the search results page of a search engine
• It is the process of optimizing the web page contents to increase its relevance to
specific keywords and to remove barriers to the indexing activities of search
engines.
• SEO helps to ensure that a site is accessible to a search engine and improves
the chances that the site will be found by the search engine.
• SEO makes the website more efficient and visible top its users during the search.
• Usually the internet users prefer only the first page results of their search, they
won't be searching more pages. Thus it is important to make a website top
ranked in search engine's search result to get more traffic towards the web site.
• Some of the methods of SEO is as follows;
 Getting Indexed
 The search engines use crawlers to find pages during their search. Pages
that are linked from other search engine indexed pages do not need to be
submitted because they are found automatically.
 Preventing crawling
 Webmasters will instruct the spiders as not to crawl certain files or
directories, A page can be explicitly excluded from the search engine's
database. This is done to avoid the undesirable content in search indexes.
 Increasing prominence
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 It is done to increase the prominence of a web page within the search


result. It is done by cross linking between the pages of the same website
to provide more links to the important pages.

FIG 5.24: Search Engine Optimization


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 5.9 Summary

Topic: Summary

• In this course, user have learned about


 The services on Internet.
 The E-mail service and their types.
 The concept of World Wide Web.
 The Telnet and its commands.
 The concept of FTP.
 The Internet Relay Chat and commands.
 The Search Engines and its functions.
 The Search Engine Optimization.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 5.10 Model Questions

Topic : Model Questions

Model Questions
• What is meant by services available on internet?
• Explain about E-mail service and types?
• Define WWW?
• Explain the uses of Telnet?
• List some of basic Telnet commands?
• Define FTP?
• Define IRC?
• What are the uses of Search Engines?
• Define some of the functions of Search Engine?
• What is meant by SEO?
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Assessment 1
1. In Email________ is used to determine where a message is sent, and also records
the specific path the message follows as it passes through each mail server.
a) Message envelope
b) Message header
c) Message body
d) Message notification
2. _________ is a hypertext-based information system. And it is the most important
service provided by the internet.
a) WWW
b) HTTP
c) TCP
d) UDP
3. An Internet service that allows the user logs on and runs on a remote computer
and use programs installed on the remote computer is __________.
a) Intranet
b) HTTP
c) Telnet
d) FTP
4. ___________ is a program that searches for and identifies items in a database that
correspond to the keywords or characters specified by the user.
a) Intranet
b) Search engine
c) IRC
d) FTP
5. __________ is a standard network protocol used to transfer files from one host to
another host over a TCP-based network, such as the Internet.
a) Intranet
b) HTTP
c) Telnet
d) FTP
Answers:
1.c
2.a
3.c
4.b
5.d
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Assessment 2 (True/False)
1. The Hypertext Transfer Protocol (HTTP) is an application-level protocol for
distributed, collaborative, hypermedia information systems.
a) True
b) False
2. Notification E-mail allows user to notify every particular event happens.
a) True
b) False
3. The Message envelope is used to privately enclose the content of the E-mail.
a) True
b) False

Answers:
1.a
2.a
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Books Referred
1. The internet- a user guide (second edition) By K.L.James.
2. Programming Internet Email by David Wood.
3. Understanding TCP/IP: A Clear and Comprehensive Guide to TCP/IP Protocols
by Libor Dostálek, Alena Kabelová.
4. Network Analysis and Troubleshooting By J.Scott Haugdahl.
5. What Is Search Engine Optimization? By Mary D. Shore.
Course Name : Internet Technology and Web Design

Module Name : Electronic Mail

TABLE OF CONTENT
UNIT NUMBER 6/11
E-Content of
Internet Technology and Web Design

Syllabus

6.1 Objectives

6.2 Email Networks and Servers

6.2.1 Email Network and Severs

6.3 Email Protocol

6.3.1 SMTP (Simple Mail Transfer Protocol)


6.3.2 Post Office Protocol (POP3)

6.3.3 Internet Message Access Protocol 4 (IMAP4)

6.3.4 Multi-purpose Internet Mail Extension (MIME)

6.4 Structure of an Email

6.4.1 Email address

6.4.2 Email Header

6.4.3 Message Body and Attachments

6.5 Email Clients

6.5.1 Email Clients

6.5.2 Netscape Mail Clients

6.5.3 Outlook express

6.5.4 Web based Email

6.6 Email Encryption

6.6.1 Email Encryption

6.6.2 Address book

6.6.3 Signature File

6.7 Summary

6.8 Model Questions

Page | 2
E-Content of
Internet Technology and Web Design

Assessment 1

Assessment 2

References

Page | 3
E-Content of
Internet Technology and Web Design

Chapter : 6.1 Objectives

Objectives
• At the end of the course the users will gain knowledge on
 Overview of Email networks and servers
 Concept of Email protocols SMTP, POP3, IMAP4 and MIME6
 Email addressing, Email header, message body and attachments
 Netscape Email clients
 Outlook express and web based email
 Address book and signature file

Page | 4
E-Content of
Internet Technology and Web Design

Chapter : 6.2 Email Networks and Servers

Topic : 6.2.1 Email Network and Severs

Email Network
• There are email networks that are general to all and for all who share an interest
in sub-topics such as professional development.

• The networking email groups provide a forum for communication and discussion
among people with shared interests.

Email Servers
• A mail server is the computerized equivalent of friendly neighborhood mailman.

• Every email that is sent passes through a series of mail servers along its way to
its intended recipient.

• Although it may seem like a message is sent instantly - zipping from one PC to
another in the blink of an eye the reality is that a complex series of transfers
takes place.

• Without this series of mail servers, only be able to send emails to people whose
email address domains matched own (i.e., you could only send messages from
one example.com account to another example.com account.).

• Mail servers can be broken down into two main categories: outgoing mail servers
and incoming mail servers.

• Outgoing mail servers are known as SMTP, or Simple Mail Transfer Protocol,
servers.

• Incoming mail servers come in two main varieties. POP3, or Post Office Protocol,
version 3, servers are best known for storing sent and received messages on
PCs' local hard drives.

Page | 5
E-Content of
Internet Technology and Web Design

• IMAP, or Internet Message Access Protocol, servers always store copies of


messages on servers.

Page | 6
E-Content of
Internet Technology and Web Design

Chapter : 6.3 Email Protocol

Topic : 6.3.1 Email Protocol

Email Protocol
• Email protocols are the languages and rules that email servers and clients use to
communicate with each other and manage incoming and outgoing mail.
• These protocols are strictly defined and are in use in a variety of different email
clients.
• In addition, each email protocol has a unique way of managing email that is sent
and received from an email account.

Page | 7
E-Content of
Internet Technology and Web Design

Chapter : 6.3 Email Protocol

Topic : 6.3.1 SMTP (Simple Mail transfer Protocol)

SMTP (Simple Mail Transfer Protocol)


• SMTP stands for Simple Mail Transfer Protocol. It's a set of communication
guidelines that allow software to transmit email over the Internet.

• Most email software is designed to use SMTP for communication purposes when
sending email, and it only works for outgoing messages.

• When people set up their email programs, they will typically have to give the
address of their Internet service provider's SMTP server for outgoing mail.

• There are two other protocols - POP3 and IMAP - that are used for retrieving and
storing email.

• SMTP provides a set of codes that simplify the communication of email


messages between servers.

FIG 6.1: SMTP

• It's a kind of shorthand that allows a server to break up different parts of a


message into categories the other server can understand.

Page | 8
E-Content of
Internet Technology and Web Design

• Any email message has a sender, a recipient - or sometimes multiple recipients -


a message body, and usually a title heading.

• From the perspective of users, when they write an email message, they see the
slick interface of their email software, but once that message goes out on the
Internet, everything is turned into strings of text.

• This text is separated by code words or numbers that identify the purpose of
each section.

• The other purpose of SMTP is to set up communication rules between servers.

• For example, servers have a way of identifying themselves and announcing what
kind of communication they are trying to perform. There are also ways to handle
errors, including common things like incorrect email addresses.

• SMTP was created in the early 1980's and it was built around basic concepts of
server communication that go back to the 1970's.

• In those days, the Internet was a very closed community, mostly consisting of
scientist and government institutions.

• The greatest strengths of SMTP are reliability and simplicity. It's easy to set up
software that uses the SMTP communication rules, and it gets the job done.

• Messages either get to a recipient, or there is an error message that explains


why that wasn't possible.

• Nowadays most servers are slightly updated version of the SMTP protocol called
ESMTP (Extended Simple Mail Transfer Protocol).

• This was created to allow transmission of multimedia through email. When


someone sends a picture or music file through their email program, ESMTP
communication codes are used to identify the kind of data being transferred.

• Example command of SMTP

Page | 9
E-Content of
Internet Technology and Web Design

Server: 220 smtp2go.com ESMTP Exim

Client: HELO mydomain.com

Server: 250 Hello mydomain.com

Client MAIL FROM :< [email protected]>

Server: 250 Ok

Client: RCPT TO :<[email protected]>

Server: 250 Accepted

Client: Data

Server: 354 Enter message, ending with”.” on a line by itself

Client: Subject: sample message

Client: From: [email protected]

Client: To: [email protected]

Client:

Client: Greetings,

Client: Typed message (content)

Client: Goodbye.

Server: 250 OK

Client: Quit

Server: 221 www.sample.com closing connection

Page | 10
E-Content of
Internet Technology and Web Design

Chapter : 6.3 Email Protocol

Topic : 6.3.2 Post Office Protocol (POP3)

Post Office Protocol 3


• POP3 (Post Office Protocol 3) is the most recent version of a standard protocol
for receiving e-mail.

• POP3 is a client/server protocol in which e-mail is received and held for you by
your Internet server.

• POP3 is designed to delete mail on the server as soon as the user has
downloaded it.

• However, some implementations allow users or an administrator to specify that


mail be saved for some period of time.

POP3 Functionality
• POP3 has become increasingly sophisticated so that some administrators can
configure the protocol to "store" email on the server for a certain period of time,
which would allow an individual to download it as many times as they wished
within that given time frame.

• While mail servers can use alternate protocol retrieval programs, such as IMAP,
POP3 is extremely common among most mail servers because of its simplicity
and high rate of success.

• Although the newer version of POP offers more "features," at its basic level,
POP3 is preferred because it does the job with a minimum of errors.

Page | 11
E-Content of
Internet Technology and Web Design

FIG 6.2: POP3 Functionality


• POP3 is a basic method of storing and retrieving email, it can work with virtually
any email program, as long as the email program is configured to host the
protocol.

• Many popular email programs, including Eudora and Microsoft Outlook, are
automatically designed to work with POP3.

• Each POP3 mail server has a different address, which is usually provided to an
individual by their web hosting company.

Page | 12
E-Content of
Internet Technology and Web Design

Chapter : 6.3 Email Protocol

Topic : 6.3.3 Internet Message Access Protocol 4

Internet Message Access Protocol 4


• Internet Message Access Protocol is a protocol for retrieving e-mail messages
which can be used as an alternative to the POP3.

• The latest version IMAP4 is similar to POP3 but supports some additional
features.

• For example, with IMAP4, one can search through the e-mail messages for
keywords while the messages are still on mail server.

• The main difference between IMAP4 and POP3 is that with POP3 the messages
are only stored temporarily on the mail server until they are downloaded to the
email client where the messages are stored, manipulated, searched etc.

FIG 6.3: Difference between IMAP and POP3

• With IMAP4 the messages are stored permanently on the server, and they are
manipulated, searched etc. on the mail server.

• IMAP4 also makes it possible to have shared message folders because multiple
people can access the same IMAP4 account at the same time and read
messages at the same time as other people.

Page | 13
E-Content of
Internet Technology and Web Design

FIG 6.4: IMAP4

• IMAP is becoming more and more popular. The proliferation of smartphones,


laptops, tablets and other devices is making the demand for IMAP stronger than
ever.

• While POP will remain popular with people who only access their email via one
or two devices - and those who have slow connections to the Internet - IMAP is
sure to remain the protocol of choice for most of today's busy people.

Page | 14
E-Content of
Internet Technology and Web Design

Chapter : 6.3 Email Protocol

Topic : 6.3.4 Multi-purpose Internet Mail Extension(MMIE)

Multi-purpose Internet Mail Extension (MIME)

• MIME is a supplementary protocol that allows non-ASCII data to be sent through


SMTP.

• MIME is defined by IETF to allow transmission of non-ASCII data via email.

• MIME allows arbitrary data to be encoded in ASCII for normal transmission.

• All media types that are sent or received one the World Wide Web (www) are
encoded using different MIME types.

• Messages sent using MIME encoding includes information that describes the
type of data and the encoding that are used.

FIG 6.5: MIME

• MIME defines five headers.

 MIME – Version

 Content – Type

 Content – Transfer – Encoding

Page | 15
E-Content of
Internet Technology and Web Design

 Content – Id

 Content – Description

Mail Message header


• From : [email protected]

• To : [email protected]

• MIME – version :1.0

• Content – type : image/Jpg

• Content – Transfer – Encoding : base65

…..... Data for the message.......

…..... ….... …..... …..... ….....

…....... ….... …....... ….............

• Servers insert the MIME header at the beginning of any Web transmission.

• Clients use this header to select an appropriate "player" application for the type
of data the header indicates.

• Some of these players are built into the Web client or browser (for example, all
browsers come with GIF and JPEG image players as well as the ability to handle
HTML files); other players may need to be downloaded.

Page | 16
E-Content of
Internet Technology and Web Design

Chapter : 6.4 Structure of an Email

Topic : 6.4.1 Email address

Structure of Email
• An Internet E-mail message consists of three components,

 Message envelope.

 Used to privately enclose the content of the E-mail.

 Message header.

 Used to determine where a message is sent, and also records the specific
path the message follows as it passes through each mail server.

 Consists of fields such as From, To, CC, Subject, Date, and other
information about the E-mail.

 Message body.

 Used to enter the text, images or attachments to recipient(s).

Page | 17
E-Content of
Internet Technology and Web Design

Chapter : 6.4 Structure of an Email

Topic : 6.4.2 Email header

Email address

• An E-mail address is same as postal address.

• E-mail address identifies an “E-mail box” to which E-mail messages are to be


delivered.

• An e-mail address is composed of several elements, for example


"[email protected]".

• The first part of all E-mail is user group or department of a company or


organization, the "@" is divider of E-mail address and to the right is the domain
name of the user belong to i.e. "example.com".

FIG 6.6: E-mail address

Domain name
• A domain name is a unique name that identifies a website and it serves as an
address, which is used to access the website.

• Domain names provide an easy way to remember internet address which is


translated into its numeric address (IP address) by the domain name system
(DNS).

Page | 18
E-Content of
Internet Technology and Web Design

• Domain name is divided into three parts.

 Host-name, sub-domain: Indicates computer name or username.

 Second-level domain.

 Top-level domain: indicates the site hosting company is an


organization.

• Top-level domains are

 .gov - Government agencies

 .com - commercial business

 .edu - educational institutes

 .net - organizations that are non-profit.

 .int - International organizations like UNO, WHO etc.

 .in - India

User name
• To the left of the "@" character is the user name.

• The user name designates who at a domain is the owner of the E-mail address,
for example "rock".

Types of E-mail addressing


• There are actually three most common ways to establish a valid E-mail address.

• Creating a live E-mail account with mail provider like Gmail, Yahoo, Hotmail &
etc.

• Creating a virtual mailbox, or E-mail forwarding feature.

• Creating a personal domain E-mail with user domain.

Page | 19
E-Content of
Internet Technology and Web Design

Chapter : 6.4 Structure of an Email

Topic : 6.4.2 Email header

Email header
• The header, a set of lines containing information about the message's
transportation, such as the sender's address, the recipient's address, or
timestamps showing when the message was sent by intermediary servers to the
transport agents (MTAs), which act as a mail sorting office.

• In an e-mail, the body (content text) is always preceded by header lines that
identify particular routing information of the message, including the sender,
recipient, date and subject.

• Some headers are mandatory, such as the FROM, TO and DATE headers.
Others are optional, but very commonly used, such as SUBJECT and CC.

• Other headers include the sending time stamps and the receiving time stamps of
all mail transfer agents that have received and sent the message.

• In other words, any time a message is transferred from one user to another (i.e.
when it is sent or forwarded), the message is date/time stamped by a mail
transfer agent (MTA) - a computer program or software agent that facilitates the
transfer of email message from one computer to another.

• This date/time stamp, like FROM, TO, and SUBJECT, becomes one of the many
headers that precede the body of an email.

Header characteristics

Page | 20
E-Content of
Internet Technology and Web Design

• A single email header has some important characteristics, including perhaps the
most important part of an email - this is the KEY: VALUE pairs contained in the
header.

• Here is a breakdown of the most commonly used and viewed headers, and their
values:

 From: sender's name and email address

 To: recipient's name and email address

 Date: sent date/time of the email

 Subject: whatever text the sender entered in the Subject heading


before sending.

FIG 6.7: E-mail Header

Page | 21
E-Content of
Internet Technology and Web Design

Chapter : 6.4 Structure of an Email

Topic : 6.4.3 Message Body and Attachments

Message Body
• Message body contains the message, separated from the header by a line break.

• Used to enter the text, images or attachments to recipient(s).

Attachments
• An E-Mail attachment is a "File" that is attached to an E-Mail message.

• For example, attachments like a graphic, a spreadsheet, or a word processing


document can be attached to the mail message.

• Sending attachments can be a good way to transfer a copy of a file if the sender
and recipient have agreed on a format.

FIG 6.8: Message body and attachment

Tips for Sending Attachments


• There are many types of attachments that can be send via e-mail.

Page | 22
E-Content of
Internet Technology and Web Design

• Not all E-Mail systems handle attachments in the same way.

• If user is not sure what types of files a recipient can view, it is a good idea to use
one of the following file types to send your attachment.

Plain text
• Save file without formatting options such as bold and underline. All word
processors and text editors should be able to read a plain text document.

RTF
• Rich Text Format is a document format that is readable by most word
processors.

• The RTF file is a plain text file representation of a formatted document.

• RTF includes codes that the recipient's word processor uses to recreate the
formatted document.

PDF
• Portable Document Format is a file format that preserves all of the fonts,
formatting, colors, and graphics of a document.

Size of the attachment


• Limited to E-Mail Gmail can attach up to 25MB or it can be updated to Google
drive.

• When user send an attachment, that the recipient may have a restriction (or) limit
to the size of the attachment they receive.

If needed to send the same document multiple times, rename the File attachment
name each time
• Multiple versions of the same document can become confusing and occasionally
user might send different version of the document than what user had expected.

Page | 23
E-Content of
Internet Technology and Web Design

• A better way to manage multiple iterations of the same document is to change


rename the file name each time by adding a revision date and/ or time to the
filename.

• Each document name will be unique and it is easy to tell the most recent version
by name. Then the older versions can be deleted.

Common document type and attachment


• Microsoft Word .doc or .docx

• Microsoft Excel .xls or .xlsx

• Microsoft Power .ppt or .pps

• Word Perfect .wp

• Text only .txt

• Rich text format .rtf

• Portable Document format .pdf

• GIF Graphics .gif

• JPEG Graphics .jpg

• HTML Files .htm or .html

• Self-extracting Archive .sea

• Executable Files (Windows) .exe (only open if you know what it is)

• Visual Basic Script .vbs (only open if you know what it is).

Page | 24
E-Content of
Internet Technology and Web Design

Chapter : 6.5 Email Clients

Topic : 6.5.1 Email Clients

Email Client
• Email client is a desktop application that enables configuring one or more email
addresses to receive, read, compose and send emails from that email address(s)
through the desktop interface.

• It provides a central interface for receiving, composing and sending emails of


configured email address(s).

• Full featured Email clients are also available as part of the web browser suites
that Netscape communicator and Microsoft Internet Explorer.

• When choosing an Email package, keep the following,

 Is the Email clients interface user friendly

 Does the Email package have an electronic phone book, where you
can keep a list of an important email address

 Does the Email package have an ability to encode and decode the
files attached to an Email message

 Does an Email package have a spelling checker

• On a pre-defined time or when invoked manually by user, the email client fetches
new emails from the email service provider’s hosted and managed mailbox.

• These emails are delivered using the mail transfer agent (MTA) of an email
service provider.

• Similarly when sending emails, the email client uses Mail Submission Agent
(MSA) to deliver messages to the email server and further to the destination
email address.

Page | 25
E-Content of
Internet Technology and Web Design

• Moreover, email client can be used to configure multiple email addresses from
different email service providers.

• Microsoft Outlook, Mozilla Thunderbird and IBM Lotus Notes are popular
examples of email clients.

Page | 26
E-Content of
Internet Technology and Web Design

Chapter : 6.5 Email Clients

Topic : 6.5.2 Netscape Mail Clients

Netscape mail Clients


• Netscape messenger is the Email client packaged with Netscape Communicator.

• Netscape Communicator was an Internet suite produced by Netscape


Communications Corporation. Initially released in June 1997.

• It is a POP3 client, which means that unlike Webmail, it does NOT maintain a
constant connection to the mail server.

• This means that Netscape users must manually click the “Send/Receive” button,
or configure Netscape to check mail automatically at a specific interval.

• Messages retrieved with Netscape/POP3 clients are removed from the server
and are no longer available through Webmail or other computers, UNLESS they
are explicitly configured to “Leave Messages on the Server”.

Configuring Netscape Email accounts


• Step 1: In the Netscape Mail window, click on the Edit menu and then click on
Mail & Newsgroups Account Settings.

• Step 2: Next, click on the New Account button on the lower left side of the
Account Settings window.

Page | 27
E-Content of
Internet Technology and Web Design

FIG 6.9: Netscape Email account

• Step 3: The Account Wizard will now start. In the first window that appears,
select ISP or email provider and then click on the Next button.

• Step 4: In the following window, enter your full name in the Your Name text box.
Then enter your email address in the Email Address text box. Click on the Next
button to continue.

Page | 28
E-Content of
Internet Technology and Web Design

FIG 6.10: Netscape identity

• Step: 5 in the following window, select to use either the POP or IMAP protocols.
ITS recommends using IMAP by default. Click the Next button to continue.

Page | 29
E-Content of
Internet Technology and Web Design

FIG 6.11: Netscape server information

• Step 6: Now enter you’re UH username in the User Name text box. Click the
Next button to continue.

FIG 6.12: Netscape user names

• Step 7: Next, enter a name to describe this account. Click the Next button to
continue.

Page | 30
E-Content of
Internet Technology and Web Design

• Step 8: Finally, ensure that all the information you entered is correct, and click
the Finish button to exit the wizard.

Checking for new message


• To retrieve new messages, click the Get Msg icon on the toolbar.

• If you did not set the Remember Password option, you will be prompted to type
your password and click the OK button.

• A new email messages will now be transferred from the mail server to Inbox.

FIG 6.13: Netscape checking of new mail

Reading New Messages


• Highlight the Inbox by clicking on the word Inbox in the Folders frame.

• This will bring up a listing of Inbox messages in the Message Index frame. To
view a specific message, click on the message header.

Page | 31
E-Content of
Internet Technology and Web Design

• The message will now be displayed in the Message frame. To view messages in
a separate window, double-click the Email header.

Sending a new Message


• To send a message, click the New Msg button on the toolbar. This will bring up
the composition window.

• Type the address of the recipient in the To: field, type the subject in the Subject
field, and the message in the area below the subject line.

FIG 6.14: Sending a new mail

Replying to a Message
• To reply to any given message, view it and click on the Reply button on the
toolbar.

• A composition window will open, including the text of the original message. The
e-mail address of the recipient will already be filled in, as will the subject line.

• When the composing is completed, click the Send button.

Page | 32
E-Content of
Internet Technology and Web Design

Forwarding Messages
• To forward a message, view it and click the Forward button on the toolbar. A
composition window will appear.

• The original message will be included at the bottom of the forwarded email. User
must enter the recipient's email address in the field, but the Subject filled will
automatically be filled in.

• Enter a message in the message field or simply just send the forwarded
message as is. Click the Send button on the toolbar to forward the message.

Deleting Messages
• View the message you want to delete and click on the Delete button on the
toolbar. This will move the selected message to the Trash folder.

 For POP users: by default, deleted messages remain in the Trash folder until
you empty it. We can empty it by clicking File on the File menu, then selecting
Empty Trash.
 For IMAP users: there are several ways to handle deleting messages. These
can be set by click on the Edit menu, then Mail & Newsgroups Account
Settings, and then clicking on Server Settings. Choose the option for deleting
messages in the When I delete a message: drop down menu.

Page | 33
E-Content of
Internet Technology and Web Design

FIG 6.15: Deleting messages

Page | 34
E-Content of
Internet Technology and Web Design

Chapter : 6.5 Email Clients

Topic : 6.5.3 Outlook express

Outlook Express
• Microsoft Outlook is an email client and Personal Information Manager (PIM) that
is available as part of Microsoft's Office suite or as a standalone application.

FIG 6.16: Outlook icon

• The outlook is mostly used for sending, receiving and storing emails, it is called a
personal information management tool because it also includes calendar, tasks,
contacts, notes and also journal.

• It is also used to share your calendar with your family, friends and colleagues.

• Microsoft Outlook helps to organize all the stuff in one place.

• The outlook is designed to access multiple email accounts and show all the mails
in one place.

• It can also store email messages locally, so there won't be a need to access the
internet every time you need to check through your mails.

• This feature is useful in companies, where multiple users work together and can
schedule projects without overlapping other events or appointments.

Page | 35
E-Content of
Internet Technology and Web Design

• The combination of all these features together and the interaction between them
make Microsoft Outlook powerful.

To Set Up E-mail Account in Microsoft Outlook


• In Microsoft Outlook, from the E-mail Accounts menu, select Tools.

FIG 6.17: Adding Email account

• On the E-mail Accounts wizard window, select Add a new e-mail account, and
then click Next.

Page | 36
E-Content of
Internet Technology and Web Design

FIG 6.18: Adding mail account

• For your server type, select POP3 or IMAP, and then click Next.

FIG 6.19: Selecting server type

• On the Internet E-mail Settings (POP3/IMAP) window, enter your information as


follows:

User Name

Your first and last name.

E-mail Address

Your email address.

User Name

Your email address, again.

Password

Your email account password.

Page | 37
E-Content of
Internet Technology and Web Design

Incoming mail server (POP3)

POP, Pop.secureserver.net or IMAP, imap.secureserver.net.

Outgoing mail server (SMTP)

Smtpout.secureserver.net

FIG 6.20: POP3 mail setting

• On the Internet E-mail Settings window, go to the Outgoing Server tab.

• Select user outgoing server (SMTP) requires authentication.

• If you did not change the SMTP relay section, select Use same settings as my
incoming mail server. If you changed the user name and password in the SMTP
relay section of your Manage Email Accounts page, select Log on using and
enter the user name and password. The following example assumes you did not
change your SMTP relay section in your Manage Email Accounts page.

Page | 38
E-Content of
Internet Technology and Web Design

FIG 6.21: Outgoing server

• Go to the advanced tab, and then change the Outgoing server (SMTP) port to 80
or 3535.

• Click OK.

FIG 6.22: advanced setting

Page | 39
E-Content of
Internet Technology and Web Design

• Click Next.

• Click Finish.

FIG 6.23: Added new Email account

Creating a new Mail


• On the Home tab, in the new group, click New E-Mail. Keyboard shortcut to
create an email message, press CTRL+SHIFT+M.

• In the Subject box, type the subject of the message.

• Enter the recipients' email addresses or names in the To, Cc, or Bcc box.
Separate multiple recipients with a semicolon.

• To select recipients' names from a list in the Address Book, click To, Cc, or Bcc,
and then click the names that you want.

• After composed the message, click Send.

Creating and adding Signature

Page | 40
E-Content of
Internet Technology and Web Design

• In Outlook Web App, click Settings > Options.

• In Options, click Settings > Mail.

• Under Email signature, in the text box, type the signature you want to use. Use
the formatting bar to format the font as you want it to appear.

• If the user want signature to display at the bottom of all outgoing items, including
replies and forwards, select automatically include my signature on messages.

• If the option is not selected, signature can be added to the mail manually.

• Then Click Save.

Page | 41
E-Content of
Internet Technology and Web Design

Chapter : 6.5 Email Clients

Topic : 6.5.4 Web based Email

Web based Email


• Email addresses are commonly assigned by your Internet service provider (ISP),
but one can also obtain an email address through a website service. This is
known as web based email.

• Most people are familiar with setting up their email clients to receive mail through
their ISP.

• The client asks for a POP server (Post Office Protocol) in order to receive mail,
and a SMTP server (Standard Mail Transfer Protocol) in order to send mail.

• However, most email clients can also be used to collect web based email by
configuring the client to connect to an IMAP server (Internet Message Access
Protocol). The IMAP server is part of the host's package.

• Web based email has its advantages, especially for people who travel. Email can
be collected by simply visiting a website, negating the need for an email client, or
to logon from home.

• Some examples of web mail are:

 Yahoo! Mail
 Gmail
 Hotmail
 The web mail service provided with your web hosting
 The web mail service provided with your ISP (Internet Service Provider)
account

Page | 42
E-Content of
Internet Technology and Web Design

FIG 6.24: Web based email

• There are also some drawbacks to web based email, however.

• Security and privacy are the biggest issues. Most sites will explicitly state in the
privacy policy that no expectation of privacy shall exist, even if it is stated in other
sections of the policy that a goal of the site is to protect privacy.

• Security of the server is also less certain, compared to an ISP to which pay a fee
with a contractual promise to provide basic protections.

Page | 43
E-Content of
Internet Technology and Web Design

Chapter : 6.6 Email Encryption

Topic : 6.6.1 Email Encryption

Email Encryption
• Email encryption refers to an encryption and authentication mechanism of an
email message to prevent the contents from being read by an unauthorized
recipient.

• Email encryption methodology largely depends on public key cryptography


wherein users publish a public key that can be used by others to encrypt
messages.

• All this while keeping a secret private key to decrypt messages or to sign and
digitally encrypt messages they send.

• Following are some commonly used email encryption protocols:

 PGP
 S/MIME
 Identity based encryption
 Mail session encryption
 TLS

Page | 44
E-Content of
Internet Technology and Web Design

Chapter : 6.6 Email Encryption

Topic : 6.6.2 Address book

Address book
• An address book is a database that stores names, addresses and other contact
information for a computer user.
• The Address Book is a collection of address lists.
• Address Book is used to look up and select names, e-mail addresses, and
distribution lists.

FIG 6.25: Address book


• When a name is typed in the To or Cc box of an e-mail message, Microsoft
Outlook automatically checks to see if the name typed matches the names
present in the Address Book.
• If match is found, the result Display Name and E-Mail address are filled in and it
allows user to send the message.

Page | 45
E-Content of
Internet Technology and Web Design

• If there is no match found, the Names dialog box prompts user to create a
contact by clicking New Contact.

FIG 6.26: Adding new contact


• If more than one name contains the letters typed, an option is shown to the
desired name from the list.

Page | 46
E-Content of
Internet Technology and Web Design

Chapter : 6.6 Email Encryption

Topic : 6.6.3 Signature File

Signature File
• An e-mail signature is a block of text that is appended to the end of an e-mail
message send.
• Generally, a signature is used to provide the recipient with the name, e-mail
address, business contact information, or Web site URL.
• Some people, however, will use a signature to sign off their e-mail message with
a closing statement, funny quote or other message.
• A signature file, or sig as it is often called, can easily be created in most e-mail
clients.
• There is an option always attach the signature to all outgoing e-mails, or add the
signature in specific outgoing e-mails.

FIG 6.27: Signature

Page | 47
E-Content of
Internet Technology and Web Design

Chapter : 6.7 Summary

Topic : Summary

Summary
• In this class, we have discussed about
 Overview of Email networks and servers
 Concept of Email protocols SMTP, POP3, IMAP4 and MIME6
 Email addressing, Email header, message body and attachments
 Netscape Email clients
 Outlook express and web based email
 Address book and signature file

Page | 48
E-Content of
Internet Technology and Web Design

Chapter : 6.8 Model Questions

Topic : Model Questions

Model Questions
• What is email network and email server?
• Explain the following concepts of email protocol.
 SMTP
 POP3
 IMAP4
 MIME6
• Explain the structure of Email.
• Explain the configuration of Netscape and Outlook email clients.

Page | 49
E-Content of
Internet Technology and Web Design

Assessment 1

1. Simple mail transfer protocol (SMTP) utilizes _______ as the transport layer
protocol for electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
2. _______is a client/server protocol in which e-mail is received and held by the
Internet server.
a) SNMP
b) POP3
c) IMAP
d) SCTP
3. ____________ is a protocol for retrieving e-mail messages which can be used as
an alternative to the POP3.
a) SNMP
b) POP3
c) IMAP4
d) SCTP
4. ________ is a supplementary protocol that allows non-ASCII data to be sent
through SMTP.
a) SNMP
b) MIME
c) IMAP4
d) SCTP
5. An Internet E-mail message consists of ___________ components
a) Two
b) Three
c) Four
d) Five
Answers:
1.a
2.b
3.c
4.b
5.b

Page | 50
E-Content of
Internet Technology and Web Design

Assessment 2 (True/False)

1. Netscape messenger is the Email client packaged with Netscape Communicator.


a) True
b) False
2. Email encryption refers to an encryption and authentication mechanism of an email
message to prevent the contents
a) True
b) False
3. The message body contains the message, separated from the header by a line
break.
a) True
b) False

Answers:

1.a

2.a

3.a

Page | 51
E-Content of
Internet Technology and Web Design

Books Referred
1. Email by Janis Fisher Chan.
2. E-mail essentials by How to Make the Most of E-communication by Matt Haig.
3. E-mail rules by Nancy Flynn and Randolph Kahn.

Page | 52
Course Name : INTERNET TECHNOLOGY AND WEB DESIGN
Module Name : Current Trends On Internet

TABLE OF CONTENT
UNIT NUMBER 7/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Syllabus

7.1 Objectives
7.2 Current Trends On Internet
7.2.1. Current Trends On Internet
7.2.2. Languages
7.2.3. Internet Phone
7.2.4. Internet Video
7.2.5. Collaborative Computing
7.2.6. E-Commerce
7.3 Summary
7.4 Model Questions
Assessment 1
Assessment 2
References

Page | 2
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.1 Objectives

Objectives
• At the end of the course the student will be able to
 Know about current trends on internet
 Know about languages used for creating web pages
 Understand about internet phone
 Understand about internet video-playing
 Know about collaborative computing
 Understand about e-commerce.

Page | 3
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.2 Current Trends On Internet

Topic : 7.2.1 Current Trends On Internet

Current Trends on Internet


• Smart phone usage to access the Internet is still on the increase.

• Tablet usage is exploding (faster than uptake on PC’s ever!)

• Majority (97%) of mobile OSes are either iOS, Android or Windows mobile

• Video and Image sharing is on the rise (1.8B images a day shared!)

• Take a look at the following comparison which features a deep-dive into the
online landscape in 2002 and 2012.

 Internet Users

FIG 7.1 Internet Users in the year 2002 and 2012

Page | 4
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Internet Usage

FIG 7.2 Internet Usage per day in the year 2002 and 2012
• Total Websites

FIG 7.3 Total Websites in the year 2002 and 2012

• Web Browsers

Page | 5
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 7.4 Web browsers in the year 2002 and 2012


• Speeds

FIG 7.5 Internet Speed in the year 2002 and 2012

• Page Loading Time

Page | 6
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 7.6 Page Loading Time in the year 2002 and 2012

Page | 7
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.2 Current Trends On Internet

Topic : 7.2.2 Languages

Languages

• Here is a list of the ten most common languages are used to create web pages

 HTML, which is used to apply content to a website, such as text and images.

 CSS, which is used to add color and layout to website.

 JavaScript, which is used to add special effects to a website, such as


animation, or hover effects.

 RSS, which is used to create subscribe feeds, commonly used for blogs, but
also used for websites that update content often.

 Perl

 PHP

 Java

 ASP

 C#

 VB.NET

Page | 8
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.2 Current Trends On Internet

Topic : 7.2.3 Internet Phone

Internet Phone
1. The iPhone is an Internet and multimedia enabled smart phone designed and
marked by Apple Inc.

2. The iPhone functions as a camera phone (including text messages and visual
void mail), a portable media player (equivalent to a video iPod), and an Internet
client with e-mail, web browsing and Wi-Fi connectivity - using the phone's multi-
touch screen to render a virtual keyboard in lieu of a physical keyboard.

VOIP (Voice over Internet Protocol)


3. Voice over Internet Protocol (VOIP) is a general term for a family of transmission
technologies for delivery of voice communications over IP networks such as the
Internet or other packet switched networks.

4. IP telephony, Internet telephony Voice Over broadband (VoBB), broadband


telephony, broadband phone are some frequently encountered terms and
synonymous with VOIP.

5. Internet Telephony refers to communications services like voice, facsimile (fax),


Voice messaging applications that are transported via the Internet, rather than
the PUBLIC SWITCHES TELEPHONE NETWORK (PSTN).

Working of VOIP
• When user places a call, their computer or VoIP device converts their voice
signals to digital packets.

• Those packets travel through the internet until they reach the final destination.

• At last, the digital packets converts back to their voice signals.

Page | 9
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 During scenario 2 and 3 these processes take place:

 The call originates/ passes via a VIOP provider's server also known a soft-
switch.

 Once the provider bypasses the call, the call is sent to another provider
who receives the call through internet and then terminates/ delivers it to
the desired destination number.

• The following three methods of connections are shown in figures

 PC to PC

FIG 7.7 PC to PC Connection of VoIP

 PC to Phone

Page | 10
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 7.8 PC to Phone Connection of VoIP

 VOIP device to phone calls

Page | 11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 7.9 : VoIP device to phone calls Connection of VoIP


6. VOIP requirements

7. To make VOIP call user need

 Internet

 VOIP software and/or a software

 VOIP service provider

8. Internet network, VOIP works with many types of internet access, such as

 Dial-up

 Broadband DSL/ADSL and cable internet

 Wi-Fi

9. VoIP software and/or hardware

Page | 12
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 A software application known as a Soft-Phone is a dialer that you
download on your computer or laptop. Whenever you make computer
based phone calls, you are running a VOIP soft-phone application, Skype
for instance.

 By hardware we mean any VoIP hard phone equipment such as VoIP


analog telephone adapter, VoIP Gateway, IP-Phone and many others
types. Check VoIP devices link for some list of VoIP hardware.

10. VoIP Service Provider

 A VoIP provider, also known as Internet Phone Company and ITSP


(Internet Telephony Service Provider), is a company that provides VoIP
phone services and solutions, similar to your local telecom companies.

 But they use VoIP technology to transmit our data, voice and video
packets whereas traditional companies use PSTN lines.

11. Benefits of VOIP are

12. Operational Cost

 VOIP can be beneficial for reducing communication and infrastructure


costs.

 For example, routing phone calls over existing data networks to avoid the
need for separate voice and data networks.

13. Flexibility

 VOIP can facilitate tasks & provide services that may be more difficult to
implement using the PSTN.

 For example, the ability to transmit more than one telephone calls over
same broadband connection. This can make VOIP a simple way to add an
extra telephone line to a home or office.

Page | 13
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.2 Current Trends On Internet

Topic : 7.2.4 Internet Video

Internet Video
14. Internet video is the general field that deals with the transmission of video over
the Internet.

15. Video clips are short clips of video, usually a part of longer piece.

16. There are various websites which allow the users to watch various videos related
to all subjects throughout the world.

17. Example: Youtube.Com, Veoh.Com, Internet videomg.com, etc.

18. User can even download and upload personal videos on such video sites.

About YouTube
19. Probably the largest internet video phenomenon is YouTube (www.youtube.com).

20. It's a site like Google (which owns YouTube), but rather than an internet search
engine for information at large, it's only for videos.

21. YouTube user can find everything from Saturday night live clips to previews for
upcoming movies to strange homemade Lego flicks.

22. According to the New York Times, people post more than 100 million videos on
YouTube every day – 48 hours of video uploaded every minute, with over 3
billion video views every day.

23. Unfortunately, Google is losing an amazing amount of money on YouTube event


day because few advertisers want their ads displayed alongside such a weird
and unpredictable collection of videos.

24. In the Search bar, user can type a word or phrase related to the video that user
looking for and YouTube displays a list of possible videos, as shown in the FIG.

Page | 14
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 7.10 YouTube Webpage


25. Click the image or title to play the video.

26. Video-playing soft-ware is embedded in the website, so user need nothing but an
Internet connection to watch videos on YouTube.

27. If user want to share that video with their closest friends, user can click the share
link below the video to e-mail a link.

28. There are many options in YouTube website which favors user to use it. Some of
them are

29. Features of YouTube

 Better linking

Page | 15
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 If user want to link to a specific point in a video, just right-click the video
and select 'Copy video URL at current time'.

 When someone clicks on that URL, it will then take them to that specific
point.

 If user want to link to a specific point in a video, just right-click the video
and select 'Copy video URL at current time'.

 When someone clicks on that URL, it will then take them to that specific
point.

 Rewind-fast/forward

 If user want to rewind a video, just press the left arrow key on your
keyboard.

 To forward a video, press the right key. This is much quicker than the
using the mouse and dragging the cursor across.

 Watch later

 If user are in the middle of a video and need to stop watching it. User can
click on a Watch Later button that looks like a clock and it will save the
video for user to come back to.

 This way user don't have to keep searching for the same videos and it will
be waiting for user in your 'Watch Later' channel.

 Disable related

 If user don't want to see any related videos at the end of a clip, user can
disable them by adding the code "?rel=0" to the end of the URL in the
embed code.

 Repeat videos

Page | 16
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 If user want to repeat their favorite music videos, user can add the word
'repeater' in the URL straight after 'YouTube' to open it in an external site
that will play it back as often as you let it.

 User can also set it to play back just part of the video. It will look
something like 'www.youtuberepeater.com/watch?'

 Repeat videos

 If user want to narrow down their search results, user can use a number of
codes.

 Adding “HD” to their search query will return high-definition result while
“3D” will pull up three-dimensional content.

 Writing “long” will bring user videos longer than 20 minutes, while typing in
“short” will return content less than four minutes long.

 Typing in “channels” or “playlists” will just bring up those results, as will


“today” or “this week” to bring up more recent content.

 Search in other languages

 For the linguist or multilingual, there are options on YouTube to search in


different languages.

 All user have to do is scroll to the bottom of the page and change the
language options.

 The choices range from Hebrew to Marathi and for these foreign
languages with different characters, a special keyboard will appear in the
search options.

Page | 17
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 7.11 Search in Other Language in YouTube


 For languages such as Hebrew where it is written from right to left, the
position of the page changes too.

 Download a video-playing

 If user want to embed a video onto their own web page, press the 'Share'
button on the video and then go to 'Embed'.

 If user want to change the size of the video, user can pick a custom width
and it will automatically produce the required size for the video.'

 Poor connection

 If user have a poor connection and want to improve the quality of the
videos they are watching, use YouTube Feather.

 This beta viewing option removes some features and buttons on the video,
meaning they can buffer quicker and not leave user with slow loading.

Page | 18
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.2 Current Trends On Internet

Topic : 7.2.5 Collaborative Computing

Collaborative Computing
30. Collaborative Computing is the term that will replace the traditional idea of
"groupware".

31. Groupware as focuses on the asynchronous aspect of human collaboration.

32. E-Mail, Discussion List, list servers, and similar software products help people to
electronically exchange information.

33. In other words, these products electronically extend a letter, a fax, and a filing
cabinet.

34. Collaborative Computing is a term describing a variety of activities where people


interact with one another using desktops, laptops, palmtops, and sophisticated
digital cellular phones.

35. As computers are best at handling data and representing information, person-to-
person communication is enriched by an ability to share, modify, or
collaboratively create data and information.
Podcasting
36. A Podcast is a series of digital media files, usually either digital audio or video
that is made available for download via web syndication.
37. The syndication aspect of the delivery is what differentiates podcasts from other
ways of accessing files, such as simple download or streaming.
38. Streaming means that special client software applications known as podcatchers
(such as Apple Inc.'s iTunes or Nullsoft's Winamp) can automatically identify and
retrieve new files in a series when they are made available, by accessing a
centrally-maintained web feed that lists all files currently associated with that
particular podcast.

Page | 19
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
39. The files thus are automatically downloaded, then stored locally on the user's
computer or other device for offline use.
40. Like the term broadcast, podcast can refer either to the content itself or the
method by which the content is syndicate the latter is also called podcasting. A
podcaster is the person who creates the content.
41. Podcasting began to catch hold in late 2004, though the ability to distribute audio
and video files easily has been around since before the dawn of the Internet.
42. Many individuals and groups contributed to the emergence and popularity of
podcasts.
43. The first audio file format used was MP3. It is still widely used while better
(smaller files with same sound quality) format exist.
44. The term podcasting derives its name from Apple's iPod, but to create a podcast
or even to listen to one, user don't need to own an iPod, or any portable music
player for that matter.
45. In a nutshell, Podcasting is a new type of online media delivery. User publish
selected audio files via the Internet and allow their users to subscribe via an RSS
feed to automatically receive new files.

Video Conferencing
46. A video conference (also known as a video-tele-conference) is a set of interactive
telecommunication technology which allows two or more locations to interact via
two-way video and audio transmissions simultaneously.
47. It has also been called visual collaboration and is type of a group ware.

Page | 20
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 7.12 Video Conferencing


48. Components required for video tele-conferencing are:
 Video input - Video camera or web camera
 Video output - Computer monitor, television, projector
 Audio Input - Microphones
 Data Transfer media - Telephone Networks, LAN, Internet
Wireless Communication
49. Few technology prospects are as much attractive to mobile professionals as the
idea of any-place-any-time Internet access.

50. Quite recently, securing data without the use of wires was difficult.

51. But, improvements in wireless interconnect technologies have changed the


scenario.

52. The first is the mobile computing device itself. Pagers, cellphones, palm PCs,
hand-held PCs, and notebook PCs can all serve as platforms for wireless data
communications.

Page | 21
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.2 Current Trends On Internet

Topic : 7.2.6 E-Commerce

E-Commerce
53. E-Commerce is a set of integrated software components that provides a solution
for business to sell goods and services through an electronic catalog on the
Internet.

54. E-Commerce is ideal for both business-to-business and business- to-consumer


applications and integrates easily with company's existing business systems to
protect the IT investments.

55. E-Commerce extends beyond buying and selling to stream lining the entire
operations of an organization.

56. It enables a faster penetration into the market to turn around investments quickly
for lowering costs.

57. It enables strengthening of relationships with customers and partners by


marketing, sales, customer support staff and enables better communication with
suppliers.

58. E-Commerce allocation in business

59. The three major classes of business expected with E-Commerce applications
are

 Business to Business Applications

 Business to Consumer

 Consumer to Consumer Applications

60. Business to Business Applications

Page | 22
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 This includes wholesaling, where businesses sell goods and services to
other businesses on the web.

 With Internet based supply chain trading, businesses work closely to


streamline the supply of goods for production and distribution and improve
productivity.

61. Business to Consumer

 In business to consumer commerce, companies market physical goods to


consumers online in a more personalized dynamic environment.

 This includes the delivery of digital goods, software, electronic media and
information.

62. Consumer to Consumer Applications

 In consumer to consumer applications, the seller may sell his


service/goods by providing its information on the net. This information may
be evaluated by a buyer to carry out a transaction.

 Some advantages of E-Commerce are

o Global visibility of the organization

o Communication with collaborators

o The shortest and most cost effective fulfillment time

o Delivering the right products and services to the customer

o Improvement in supplier relationships

o Lower procurement costs

o Integrated quality and cost management

o Efficient warehouse management

Page | 23
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
o Lowest cost and on time delivery.

Page | 24
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.3 Summary

Topic : Summary

Summary

 In this class, user have learn about

• the current trend on internet

• languages used to create web pages

• internet phone

• internet video-playing and features of YouTube

• collaborative computing

• E-commerce.

Page | 25
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 7.4 Model Questions

Topic : Model Questions

Model Questions
 Describe about current trends on internet

 What are languages used to create web pages

 Explain about internet phone and internet video-playing

 What is collaborative computing

 Describe about e-commerce

Page | 26
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1
1. ____________ is used to add special effects to a website, such as animation, or
hover effects.
a) CSS
b) PHP
c) Javascript
d) HTML
2. ____________ is used to add color and layout to the website.
a) CSS
b) PHP
c) Javascript
d) HTML
3. _______________ is a general term for a family of transmission technologies for
delivery of voice communications over IP networks.
a) SNMP
b) STMP
c) VOIP
d) PSTN
4. A _________ is a series of digital media files, usually either digital audio or video
that is made available for download via web syndication.
a) Podcast
b) Data sync
c) Collaborative computing
d) Groupware
5. _______________ is a set of integrated software components that provides a
solution for business to sell goods and services through an electronic catalog on
the Internet.
a) e-governance
b) e-commerce
c) e-banking
d) None of the above

Answers:
1.c
2.a
3.c
4.a
5.b

Page | 27
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)

1. HTML is used to add special effects to a website, such as animation, or hover


effects.
a) True
b) False
2. A VoIP provider, also known as the Internet Phone Company and ITSP (Internet
Telephony Service Provider).
a) True
b) False
3. VOIP can facilitate tasks & provide services that may be more difficult to implement
using the PSTN.
a) True
b) False

Answers:
1.b
2.a
3.a

Page | 28
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
1. Internet Technology and Web Design by ISRD.

Page | 29
Course : INTERNET TECHNOLOGY AND WEB DESIGN

Module : Web Publishing and Browsing

TABLE OF CONTENT
UNIT NUMBER 8/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus

8.1 Objectives
8.2 Web Publishing
8.2.1 Overview
8.3 SGML
8.3.1 SGML
8.4 Web Hosting
8.4.1 Web Hosting
8.5 HTML
8.5.1 HTML
8.6 CGL
8.6.1 CGL
8.7 Documents Interchange Standards
8.7.1 Documents Interchange Standards
8.8 Components of Web Publishing Document management
8.8.1 Components of Web Publishing Document management
8.9 Web Page Design Consideration and Principles
8.9.1 Web Page Design Consideration
8.9.2 Web Page Design Principles
8.10 Search and Meta Search Engines
8.10.1 Search Engines
8.10.2 Meta Search Engines
8.11 WWW
8.11.1 WWW
8.12 Browser
8.12.1 Browser
8.13 HTTP
8.13.1 HTTP
8.14 Publishing Tools
8.14.1 Publishing Tools
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
8.15 Summary
8.16 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.1 Objectives

Objectives
• At the end of this course, the user will be able to
 Understand what is web publishing
 Known about the SGML
 Understand about Web Hosting
 Known about the HTML and CGL
 Understand about the Web Page Design and principles
 Known about the Web browsers and meta search engines
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.2 Web Publishing

Topic: 8.2.1 Overview

Overview
• Information publishing is the publishing of information on computer networks.

• A Web server is a good example of an information publishing system.

• The Web browser is the container into which web information is published.

• By far, the most practical way to publish information is with Web technologies.

• The Internet and intranets provide the platform for wide range of information
either internally or externally.

• Publishing information is more than creating content.

• It is also about managing security, document flow copyright and other factors.

• Document management is a science into itself which includes storing, tracking,


versioning, indexing and searching for a document.

• Web page are compound documents that can hold text and individual objects like
pictures, sounds, videos, Java applets, ActiveX controls and an electronic mail
message with an attachment such as a graphic.

• The original purpose of compound documents was to provide a single place


where users could store all the elements related to a document and if necessary,
send the document to someone else.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 8.1: Web Publishing


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.3 SGML

Topic: 8.3.1 SGML

SGML
• SGML (Standard Generalized Markup Language) is an international standard for
the definition of device-independent, system-independent methods of
representing texts in electronic form.
• SGML is a Meta language, that is, a means of formally describing a language, in
this case, a markup language.
• By markup language we mean a set of markup conventions used together for
encoding texts.
• A markup language must specify what markup is allowed, what markup is
required, how markup is to be distinct instead from text and what the markup
means SGML provides the means for doing the first three, documentation.

FIG 8.2: SGML


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.4 Web Hosting

Topic: 8.4.1 Web Hosting

Web Hosting
• If user visit any of the numerous sites that offer free space for the web pages,
user might tend to disagree.
• But it comes with a few strings attached.
• Firstly, these servers offer limited space.
• One way to overcome the limited space factor is to put up pages at multiple sites
and to link these pages.
• Secondly, the Web master puts banner advertisements on the pages over which
user have no control. That is how they earn revenue.
• Some sites require regular updation by their members else membership is
terminated.
• Thirdly, most of these sites cannot be used for commercial purposes. Of course,
there are exceptions.
• When the site designing is completed, visit any of the sites offering Web hosting
services and register as a member.
• Follow the online instructions and fill out the application form giving personal
details.
• Choose a member name and password.
• User might need to choose a member area also called a neighborhood or pod as
well.
• Web sites are organized into categories based on themes like Arts and
Literature, Computers, Music, etc.
• Within 24 hours user will receive an e-mail confirming the application.
• Read the instructions in the e-mail carefully because they will contain the
member name, password and Web site address.
• It may also have details on how to upload pages to sites.
• There are basically three things to consider while Web Hosting.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Server Reliability
 Enough Storage and Band Width
 E-Commerce Capability

FIG 8.3: Web Hosting


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.5 HTML

Topic: 8.5.1 HTML

HTML
• HTML stands for Hyper Text Markup Language, it is a language for describing
web pages.
• A markup language is a set of markup tags which describe document content.
• HTML documents contain HTML tags and plain text where documents are also
called web pages.
• HTML describes the Structure of a Page.
• HTML, by virtue of its SGML heritage, is a language for describing the structure
of a document, not its actual presentation.
• The idea here is that most documents have common elements—for example,
titles, paragraphs, and lists. Before start writing, user can identify and define the
set of elements in that document and give them appropriate names.
• The HTML page structure is depicted in the FIG

FIG 8.4: HTML


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.6 CGL

Topic: 8.6.1 CGL

CGL
• The CGL (Core OpenGL) API is lowest-level programming interface for the Apple
implementation of OpenGL.
• CGL supports free screen OpenGL drawing and drawing to pixel buffers, which
are a hardware-accelerated off-screen drawing location.
• Any Cocoa or carbon application can use CGL to get the most direct access to
system functionality.
• The Cocoa classes that support OpenGL and the AGL API are each built on top
of CGL.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.7 Documents Interchange Standards

Topic: 8.7.1 Documents Interchange Standards

Documents Interchange Standards


• Protocol uses different method of exchanging the information over the network.
• Connection-less and Connection–Oriented Protocols
 With server user make a connection and with HTTP it is a connection less
protocol.
 With a connection-oriented protocol, clients connect to the server, make a
request, get a response and then maintain the connection to handle future
requests.
 An example of a connection-oriented protocol is File Transfer Protocol (FTP).
 When user connects to an FTP server, the connection remains open after
user download a file.
 The maintenance of this connection consumes system resources.
 A server with too many open connections quickly gets over loaded.
 Consequently, many FTP servers are configured to allow only 250 open
connections at one time, so only 250 users can access the FTP server at
once.
 The drawback to connection-less protocol is that when the same client
requests more data, the connection must be re-established.
 To Web users, this means a delay whenever they request more information.
• Stateless and Stateful Protocol
 There are two kinds of protocols for the processed transactions on the
Internet.
 These are stateless and stateful protocols.
 In a stateless protocol, no information about a transaction is maintained after
a protocol, state information is kept even after a transaction has been
processed.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Servers using stateful protocols maintain the information about status of the
connection, processes running and status of the processes running.
 Usually, this state information resides in memory and consumes system
resources.
 When a client breaks a connection with a server running a stateful protocol,
the state information has to be cleared up and is often logged as well.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.8 Components of Web Publishing

Topic: 8.8.1 Components of Web Publishing

Components of Web Publishing


• There are various components of web publishing.
 Document management
 Hosting to Web
 Managing security
 Maintaining the site
 Copyright
Document Management
• Document management is a science into itself.
• The windows and Macintosh environments were important in developing the
concept of compound documents.
• A compound document starts as a document created in an application like
Microsoft Word, i.e., it starts as a text document.
• The document is viewed as a container that can hold objects such as graphics,
voice clips and video clips.
• These objects are either
 Embedded or
 Linked.
• Embedded Object
 As embedded object such as picture travels with the document but can still be
edited using an appropriate application.
• Linked Object
 A linked object may be stored in another location.
 The document simply contains a link to the object at that location and may
display it as well.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.9 Web Page Design Consideration and Principles

Topic: 8.9.1 Web Page Design Consideration

Web Page Design Consideration

• Designing an effective web site requires more than just gathering relevant
information and posting it on the web.

• Like a good paper or research presentation, a quality web project demands as


much attention to the selection, organization, and presentation of material as to
the underlying research itself.

• User should strive, above all, to be both clear and engaging in every aspect of
site design.

FIG 8.5: Web Page Design

• Here are some concrete suggestions for making the site a winner.

• Before Begin

 Consider the audience and the goals. User should have a clear sense of who
will be using the site (mostly college undergraduates) and what kind of
experience user are hoping to provide. What exactly are you trying to
accomplish here? Why is this important?

 Plan the site on paper first.


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 User can draw a "family tree" of pages with arrows indicating links. Or user
can make a hierarchical outline.

 Either way, it is essential to organize the information and lay out the
architecture of the site before attempting to implement the vision.

• Site Layout

 Strive for consistency. User want the project to have an identity, so all the
pages in the project should have a common feel, there should be consistency
among backgrounds, color schemes, navigational tools and tone of voice.

 This is especially important if user is dividing up the site's pages among


several team members. Otherwise, the project will seem like two or three
separate projects lumped together, rather than a single, unified whole.

 Provide a rich set of links within the site. Ideally, there should be multiple
ways for the user to navigate their pages.

 User should consider including a prominent 'home' link or icon on each page,
a menu or table of contents and highlighted links within textual material to
related information elsewhere on the site.

 Feel free, of course, also to provide links to other pages within ECE or
elsewhere on the web.

 Don't hide important information. Users don't like to click too many times to
find the information they want, if information is particularly important, make it
accessible up front.

 On any given page, remember that as with a newspaper, the top left corner is
the most prominent. See the National Geographic Website for a good
example.

• The web medium

 Provide opportunities for interaction.

 How is your site any different from a traditional print document?


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 How can you involve the reader in ways that non-digitized texts usually
cannot?

 Interactivity can be a compelling, innovative means of engaging your reader


and creating experiences that cannot be replicated in other media.

 Good examples are "Make Your Way as an 18th-Century Woman" site on


ECE and the site for the Louvre Museum in Paris.

 Avoid text-only pages. Ideally, a user should never encounter an entire


screen full of uninterrupted text in browsing the site. Again, take advantage of
the web medium!

 Don't sacrifice elegance for pizzazz. Just because you can make images fly
across the screen does not mean you necessarily should.

 Every design element of the site (colors, images, animation) ought to


correspond thematically with the content and goals of the project. See the
Enigma site for a representative example.

 Provide a link for every URL that mention in the site. If the bibliography or
notes include a citation for another website, list the URL in full, but make it
'clickable' as well so that the user can go directly to the site in question.

• The front door

 Give the site a descriptive title. The title should convey the content of the site
in a concise but engaging manner.

 Remember, the title is how the site will be identified on the ECE home pages.

 Ideally, it should pique the curiosity of users and prompt them to explore the
project pages.

 Include a brief introduction. This should be part of the site's home page, and
should explain the scope and purpose of the site.

 Once users have noticed the title and followed a link to the site, they will
expect quickly to find a further elaboration of the title, a brief paragraph or two
describing what the site is all about and what makes it interesting.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 User have caught the people's eye with the title, the introduction is the
chance to heighten their interest and persuade them to actually stick around
and explore.

 Make the site's home page as useful a starting point as possible.

 The viewer should be able to see at a glance what the site is about, how it is
laid out, and what kinds of resources and features it includes.

 Ideally, all of this information (along with your site title and introduction)
should be visible on a single fast-loading screen that requires a minimum of
scrolling.

• Accessibility

 Make sure your text is legible. Check the size, color, and font of all text within
the site to confirm that it can be easily read. Be especially careful of dark or
fancy backgrounds that make text hard to read.

 Make sure the site is platform independent. The site should be view-able on
both Mac and Windows machines using either of the most commonly
available browsers, Netscape and Explorer.

 Consider the needs of the viewers. Think about the bandwidth the site will
require.

 Keep in mind that not all users will have the luxury of an Ethernet connection.
Minimize the memory requirements of the site by compressing images and
other large files. And make sure all your images have ALT-TEXT behind
them.

 This makes the site accessible both to low-vision users and users with slow
modems who have turned the images off.

• The end game

 Thoroughly test the site.

 Ask a friend to sit down and explore the site. Ask them to think out loud and
watch them navigate the site. Do they get lost? Do they have trouble finding
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
links? Do they have trouble understanding the labels? Do they understand
the prose?

 Ideally, designer should elicit and incorporate feedback about the site in the
course of developing it as well as when it’s nearing completion.

 Be sure to test the site both of the most commonly used browsers, Netscape
and Internet Explorer.

 Check carefully for spelling and grammatical errors before posting the written
materials to the web.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.9 Web Page Design Consideration and Principles

Topic: 8.9.2 Web Page Design Principles

Web Page Design Principles


• Good Design Is Innovative.
• Good Design Makes a Product Useful.
• Good Design Is Aesthetic.
• Good Design Makes A Product Understandable.
• Good Design Is Unobtrusive.
• Good Design Is Honest.
• Good Design Is Long-lasting.
• Good Design Is Thorough Down to the Last Detail.
• Good Design Is Environmentally Friendly.
• Good Design Is as Little Design as Possible.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.10 Search Engine and Meta Search Engine

Topic: 8.10.1 Search Engines

Search Engines

• The search engine is a web program that enables the users to enter words and
phrases to search, and scan the vast information on the web to locate sites that
matches the words or phrase.

• A web search engine is a software system that is designed to search for


information on the World Wide Web.

• The User can locate useful or interesting web sites by using a search engine.

• This is an organization with a web site containing a huge database of web site
addresses.

• Search engines also maintain real-time information by running an algorithm on a


web-crawler.

• When a query is typed in form of subject or a name that describes what user are
seeking, and the search engine provides with a list or selection of web site
addresses that fit the enquiry.

• The User can then simply click on an address to jump to that website.

Search Engine Optimization (SEO)

• Search Engine Optimization is the process of increasing the visibility of a website


or a web page in a search engine's natural search results.

• It the process of optimizing the web page contents to increase its relevance to
specific keywords and to remove barriers to the indexing activities of search
engines.
• SEO makes the website more efficient and visible top its users during the search.

Web Search Engines


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• A web search engine is an interactive tool that helps locate documents on the
internet containing terms being searched by the user.

• Search engines use the bottom up approach for finding your way around the
web.

• You give a search engine, a list of keywords of phrases (called a query) and it
returns to you a list of web pages that contain those words or phrases.

• In other words, search engines are actually databases that contain references to
thousands of resources.

• Users are able to interact with the database, submitting queries that “ask” the
database if it contains resources that match specific criteria.

• Some search engines search only the title of web pages, some by uniform
resource locator (URL), some by words in each document in a web site and
some by combination of these.

• Each search engine has its own way deciding which of the web pages on its list
is most likely to be one that you are looking for.

• Some allow more complicated queries than others, where keywords can be
combined with Boolean (logical) operations, such as AND, OR and NOT, to
produce rather complicated queries.

• The rules combining these operations are called the syntax of the search engine.

• There is an art in designing queries that result in the search engine returning a
useful list to you.

• Given the vast number of web pages, a query that is too general may field
literally millions of web pages, most of them useless to you.

• A query that is too specific may miss many web pages that you would have liked
to see.

• Each engine is also defined as an on line utility that quickly searches thousands
of web documents for a word or phrase being searched.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
List of Search Engines

• Google

• Yahoo.

• Ask Jeeves.

• Duck Duck Go.

• Kosmix.

• Yebol.

• Bing

• Msn

FIG 8.6 : Search Engines


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 8.7: Search Engine Usage

Working of Search Engines

• Search engines are information retrieval system designed to help find information
stored on a computer system.

• There are many types of search engines but we would limit our discussion to
web search engines which search for information on World Wide Web.

• Search engine were started with an idea to ease the process of finding
information on the internet.

• A search engine consists of three parts.

• First part

 First part is the spider which is also called the crawler or bot.

 This spider part visits a web page, reads it and then follow links to other
pages within the site.

 This process is often referred to as 'Crawling' or 'Spidering'.

 Crawling of a website is done on the very regular basis. The spider visits a
website, following links from other website or website submission, it received.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 The content that spider finds is sent to its database or index as it is popularly
known.

 This index is like a huge book that contains a copy of web page or cache that
the spider finds out.

• Second part

 This constitutes the second part of a search engine. It also stores the
structure and the way pages are linked to each other.

 This information would be updated every time there is a change in content or


linking.

• Third part

 Third part of a search engine is search engine software that works behind the
interface when we use a search engine.

 This software will shift through the trillions on indexed pages to match the
search query that user has asked.

 The pages are ranked by search engines and the search results are based on
this ranking and relevance to search term.

 This is how a search engine determines what order shall be listed for a
particular search.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 8.10 Search and Meta Search Engines

Topic : 8.10.2 Meta Search Engines

Meta Search Engines

• Meta Search Engine is a search tool that sends user requests to several other
search engines and/or databases and aggregates the results into a single list or
displays them according to their source.

FIG 8.8 : Meta Search Engine


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Meta search engines enable users to enter search criteria once and access
several search engines simultaneously.

• Search engines provide fast retrieval of information of interest from the web.

• The problem of knowing where search engines are how to use them poses some
difficulties.

• Furthermore, empirical results indicate that only 45% of relevant results will likely
be returned by a single search engine that is, each has a recall rate of 45%.

• This limitation is compounded by the fact that the coverage of a typical search
engine is between only 5% - 30% of the web.

• Meta search engines are designed to mitigate such problems by accessing


multiple individual search engines.

• The System architecture of a meta search engine that contains the following
components

 Query Interface Module – Responsible for getting user's query input.

 Dispatch Module – Responsible for determining to which search engines a


specific query is sent.

 Knowledge-based Module – Used by the Dispatch module to perform


decision-making (optional).

 Interface Agents Module – Responsible for interacting with different search


engines using different query formats.

 Evaluation Module – Responsible for ranking results according to some


predefined evaluation methods (optional).

 Display Module – Responsible for displaying results.


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 8.9 : The Architecture of Meta Search Engine

• Meta search engines operate on the premise that the web is too large for any
one search engine to index it all and that more comprehensive search results
can be obtained by combining the results from several search engines.

• This also may save the user from having to use multiple search engines
separately. The process of fusion also improves the search result.

Web Meta Search Engines

• A Web Meta Searcher also known as mega indexes is a tool that helps users
locate information available via the World Wide Web.

• Meta Searches do not have their own database. Instead they have access to
other primary search engines.

• Web Meta searchers provide a single interface that enable users to search many
different search engines, indexes and databases simultaneously.

• There are a number of web searchers available.

• The content of search engines, indexes and databases vary, the same query
typed into several search engines is likely to produce different results.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• When searching a topic, users often want to see results from various sources.

• One way to compare the results of several search engines is to type and retype a
query into individual search engines one at a time. This can be very time
consuming.

• A Meta searcher helps to make this task more efficient by providing a single
interface where the query is typed in one and results can be obtained from
multiple search engines.

• Meta searchers are different from other search engines and indexes in the
following respects.

• Single search engine and indexes provide a collection or database of resources


that can be queried.

• Meta searchers do not provide a database i.e., these search engines do not
collect web pages, do not accept URL and do not classify or review web sites.

• Instead they provide service to search the database of several other search
engines at the same time to locate web pages that matches query given by the
user.

• Example of web meta searchers include

 All in one search

 clnet

 Cyperlands Web

 CUSI

 Electric Library

 Eureka

 Savvy Search

 ProFusion

 MetaCrawler
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 8.11 World Wide Web (WWW)

Topic : 8.11.1 World Wide Web (WWW)

Introduction to World Wide Web (WWW)


• World Wide Web (abbreviated as WWW or W3, commonly known as the web) is
a system of interlinked documents that are accessed via the internet.

FIG 8.10 : World Wide Web

• The term Internet and WWW are often used in everyday speech without much
distinction.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• In 1989 a small group of people led by Tim Berners-Lee at CERN (Conseil
European pour la Recherce Nucleaire or the European Laboratory for Particle
Physics) proposed a new protocol for the Internet as well as a system of
document access to use it.
• The intent of this new system, which the group named the World Wide Web, was
to allow scientists around the world to use the internet to exchange documents
describing their work.
Web or Internet
• It is important to understand that the Internet and the World Wide Web are not
the same thing.
• The internet is a collection of computers and other devices connected by
equipment that allows them to communicate with each other.
• The web is a collection of software and protocols that has been installed on
most, if not all, of the computers on the internet.
• The internet was quite useful before the web was developed and it is still useful
without it.
• However, it is now the case that most users of the internet use it through the
web.
• The internet is a global data communications system including hardware and
software infrastructure that provides connectivity between computers.
• In contrast, the web is one of the services provided via the internet.
• Web is a collection of interconnected documents and other resources, linked by
hyperlinks and URLs.
• Thus in short the web is an application running on the internet.
• Viewing a web page begins either by typing the URL of the page into a web
browser or by following hyperlinks to that page.
• The web browser then initiates a series of communication messages, behind the
screens, in order to fetch and display it.

World Wide Web (WWW)


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• World Wide Web (abbreviated as WWW or W3, commonly known as the web) is
a system of interlinked documents that are accessed via the internet.
• The term Internet and WWW are often used in everyday speech without much
distinction.
• With a web browser, one can view web pages that may contain text, images,
videos and other multimedia and navigate between them via hyperlinks.
• World Wide Web is a system of internet servers that support specially formatted
documents.
• The documents are formatted in a markup language called HTML (HyperText
Markup Language) that supports links to other documents, as well as graphics,
audio and video files.
• Web links are stored within the page itself and when you wish to “jump” to the
page that is linked, you select the “hotspot” or “anchor”. This technique is
sometimes called hypermedia or Hypertext.
 Provide a graphical interface.
 Allow you to create “links” from one piece of information to another.
 Can incorporate references to text, graphics, sound and movies (or
multimedia).
 “Understand” other Internet protocols, such as ftp, gopher and telnet.
• The World Wide Web is nonlinear with no top or no bottom. The meaning of
nonlinear is you do not have to follow a hierarchical path to information
resources.
Basic Elements of World Wide Web (WWW)
• The web is based on a Client/Server System. We use a web client to
communicate with the web server.
• A web server is a computer connected to the internet that runs a program (which
is also called web server) that takes responsibility for sorting, retrieving and
distributing some of the web files.
• A web client or web browser is a computer that request files from the web.
• URLs are used by web browsers to locate internet resources. A URL specifies
the protocol to be used in accessing the resource, the name of the server on
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
which the resource resides and optionally the path to a resource. For example,
http://www.nielit.in
• HyperText Transfer Protocol is the standard protocol that allows web clients
and servers to communicate. This protocol is used to carry requests from a
browser to a web server and to transport pages from the web server back to the
requesting browser.
• The HyperText Markup Language is the universal language of the web. It is
used for writing pages for the web. HTML allows text to include codes that define
fonts, layout, embedded graphics and HyperText Links. HTML can be compared
to word processing.
• You can tune into Web radio and TV Broadcasts and listen to live broadcasts
or call up older ones from the archives. The ability to send sound and video over
the internet also has other uses. It makes it possible to offer narrated web tours,
let buyers preview music or offer verbal descriptions of products.
• Full Multimedia, which include graphics, sound, video and animation is widely
available over the web. Using technologies such as Shockware and Java, these
presentations can be transferred to your computer.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 8.12 Browser

Topic : 8.12.1 Browser

Browser
• To access the World Wide Web, you use what is called a web browser.
• Browsers are sometimes also called web clients that use HyperText Transfer
Protocol to make request to web servers.
• When you follow a Hyperlink, the browser (acting like a client) sends a request to
a site on the internet.
• That site (acting like a server) returns a file which the browser then has to
display.
• When you run a web client i.e., web browsers, like Netscape communicator or
Microsoft's Internet Explorer on your computer, the client contacts a web server
and request information or resources.
• The web server locates and send the information to the web browser, which
displays the results. Thus browsers
 Allows you to enter the address of the site you want to jump to (called a URL
or uniform resource locator) or to jump there by clicking hotspots, high-lighted
words, buttons, pictures or icons called hyperlinks on your screen.
 Formats web documents for display on your screen.
 Allows you to backup and go forward through pages you have already visited.
 Allows you to copy text from the screen and paste it into a word processing
program.
 Allows you to print the document you see on the screen.
 Makes it possible to transfer files-text, graphics, movies, animations, sounds
and programs from other computers to your computer (called downloading)
also provides access to new groups.
 Allows you to send and receive e-mail and other internet services such as ftp
(file transfer protocol), gopher and Usenet news-groups.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Web Browsing Software
• A Web browser is a software application used for presenting and traversing the
information on World Wide Web, including Web Pages, images, video and other
necessary files (or) data required by users.
• Web Browser is not hardware, it is software.
• A web browser is a client side software program which communicates with
web servers on the internet and request information wanted by users. It also
enables uploading and downloading of files.
• The web address of a particular object published on the web is known as URL
(Uniform Resource Locator). Each object in the web is identified or searched with
the help of URL.
Popular Web Browsing Software
• The most popular web browsers access the globe

 Microsoft's Internet Explorer

 Google Chrome

 Firefox

 Apple Safari

 Opera
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 8.11 : Web Browsing Software Usage
Functions of Web Browser
• The web browser gets URL (Uniform Resource Locator) of the site and
understands the web address of DNS (Domain Name Server) hyperlinks.
• It identifies the web page and formats the web documents to display on the
screen.
• The Web browser helps users to have a history and go back & forward through
pages that have already visited.
• The web browser makes possible to copy text from the web page and paste it
into a word processing program (or) as desired by users.
• Web browser helps to print the web documents/pages.
• The web browser makes possible to transfer online documents to user's
computer called downloading.
• The web browser allows user to send and receive e-mails, through web mail.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 8.12 : Web Browser Functions

Purpose of Web Browsing Software


• Web browser software sends the required information to the web server and gets
the information, and then it displays the result on the user computer.
• Simply, Internet browsers are the tools we use to navigate through millions of
websites.
• A web browser has the ability to interpret or display many types of stored files
like HTML and other browser supported files even when they aren’t connected to
the internet.
• Especially in windows 2000, Internet Explorer is a built-in browser that enables
users to open most image files quickly.
• Web Browsers are used for businesses, marketing, education and information
gathers about subjects, medical, etc.,
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Web Browser makes it easier to get the most from the World Wide Web, whether
users are searching for new information or browsing the favorite web sites.
• Web browser helps the user to open several web pages at the same time.
• Web browser allows the user to maintain his visited web page history and also to
store the web pages as favorites.
• User can switch between many different web pages easily.

To Configure a Web Browser

• Configuring Internet Explorer to default settings

 Open the Internet Explorer and click the Explorer menu.


 Then select the Internet options menu. Internet options dialog box gets
opened.
 Then select the Advanced tab from internet options dialog box.
 Click the Reset button.
 Check the Delete personal settings option and then click the Reset button
from reset internet settings dialog box.
 Finally click the Close button.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 8.13 : Configuring Explorer

• Configuring chrome to default settings


 Open the Chrome browser and click on Chrome menu.
 Then select settings from the menu.
 Enter Reset browser in the search settings option.
 Then click the Reset browser settings button.
 From the dialog box click the Reset button.
 Then close the browser and open again.

FIG 8.14 : Configuring Chrome


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.13 HTTP

Topic: 8.13.1 HTTP

HTTP
• The Hypertext Transfer Protocol (HTTP) is an application-level protocol for
distributed, collaborative, hypermedia information systems.

• This is the foundation for data communication for the World Wide Web (ie.
internet) since 1990.

• HTTP is a generic and stateless protocol which can be used for other purposes
as well using extension of its request methods, error codes and headers.

• Basically, HTTP is a TCP/IP based communication protocol, which is used to


deliver data (HTML files, image files, query results etc.) on the World Wide Web.

• The default port is TCP 80, but other ports can be used.

• It provides a standardized way for computers to communicate with each other.

• HTTP specification specifies how clients request data will be constructed and
sent to the serve, and how servers respond to these requests.

Basic Features of HTTP

• There are following three basic features which makes HTTP a simple but
powerful protocol.
 HTTP is connection-less
 The HTTP client i.e. browser initiates an HTTP request and after a request
is made, the client disconnects from the server and waits for a response.
 The server process the request and re-establish the connection with the
client to send response back.
 HTTP is media independent
 This means, any type of data can be sent by HTTP as long as both the
client and server know how to handle the data content.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 This is required for client as well as server to specify the content type
using appropriate MIME-type.
 HTTP is stateless
 As mentioned above, HTTP is a connection-less and this is a direct result
that HTTP is a stateless protocol.
 The server and client are aware of each other only during a current
request. Afterwards, both of them forget about each other.
 Due to this nature of the protocol, neither the client nor the browser can
retain information between different requests across the web pages.
HTTP Architecture

• The HTTP protocol is a request/response protocol based on client/server based


architecture where web browser, robots and search engines, etc. act like HTTP
clients and Web server acts as server.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 8.15 : HTTP Protocol

• Client
 The HTTP client sends a request to the server in the form of a request
method, URI, and protocol version, followed by a MIME-like message
containing request modifiers, client information, and possible body content
over a TCP/IP connection.

• Server
 The HTTP server responds with a status line, including the message's
protocol version and a success or error code, followed by a MIME-like
message containing server information, entity Meta information, and possible
entity-body content.

HTTP Version

• HTTP uses a <major>.<minor> numbering scheme to indicate versions of the


protocol. The version of an HTTP message is indicated by an HTTP-Version field
in the first line.
• Here is the general syntax of specifying HTTP version number.
HTTP-Version = “HTTP” “/” 1*DIGIT “.” 1*DIGIT

• Example

HTTP/1.0
or
HTTP/1.1

Uniform Resource Identifiers (URI)

• Uniform Resource Identifiers (URI) is simply formatted, case-insensitive string


containing name, location etc to identify a resource, for example a website, a
web service etc.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• A general syntax of URI used for HTTP is as follows.

URI = “http:” “//” host [“:” port] [ abs_path [ “?” query ]]

• Here if the port is empty or not given, port 80 is assumed for HTTP and an
empty abs_path is equivalent to an abs_path of "/".
• The characters other than those in the reserved and unsafe sets are equivalent
to their ""%" HEX HEX" encoding.
• EXAMPLE

Date/Time Formats

• All HTTP date/time stamps must be represented in Greenwich Mean Time


(GMT), without exception.

• HTTP applications are allowed to use any of the following three representations
of date/time stamps:

Sun, 06 Nov 1994 08:49:37 GMT ; RFC 822, updated by RFC 1123
Sunday, 06-Nov-94 08:49:37 GMT ; RFC 850, obsoleted by RFC 1036
Sun Nov 6 08:49:37 1994 ; ANSI C's asctime() format

Character Sets

• User use character set to specify the character sets that the client prefers.

• Multiple character sets can be listed separated by commas. If a value is not


specified, the default is US-ASCII.

• Example, following are valid character sets


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
US-ASCII
or
ISO-8859-1
or
ISO-8859-7

Content Encodings

• A content encoding values indicate an encoding algorithm has been used to


encode the content before passing it over the network.

• Content coding’s are primarily used to allow a document to be compressed or


otherwise usefully transformed without losing the identity.

• All content-coding values are case-insensitive. HTTP/1.1 uses content-coding


values in the Accept-Encoding and Content-Encoding header fields which we will
see in subsequent chapters.

Example, following are valid encoding schemes.

Accept-encoding: gzip
or
Accept-encoding: compress
or
Accept-encoding: deflate

Media Types

• HTTP uses Internet Media Types in the Content-Type and Accept header fields
in order to provide open and extensible data typing and type negotiation.
• All the Media-type values are registered with the Internet Assigned Number
Authority ((IANA).
• Following is a general syntax to specify media type.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Media-type = type “/” subtype *(“;” parameter)

• The type, subtype, and parameter attribute names are case- insensitive.

• Example

Accept: image/gif

Language Tags

• HTTP uses language tags within the Accept-Language and Content-Language


fields.
• A language tag is composed of 1 or more parts. A primary language tag and a
possibly empty series of subtags.

Language-tag = primary-tag *(“-” subtag)

• White space is not allowed within the tag and all tags are case- insensitive.

• Example tags include,

En, en-US, en-cockney, i-cherokee, x-pig-latin

HTTP request header


• The information, in the form of a text record, that a user's browser sends to a
Web Server containing the details of what the browser wants and will accept
back from the server.

• The requestheader also contains the type, version and capabilities of the
browser that is making the request so that server returns compatible data.

• Upon receipt of the request header, the server will return an HTTP responce
header to the client that is attached to the file(s) being sent.
HTTP response header
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The information, in the form of a text record that a Web Server sends back to a
client's browser in response to receiving an HTTP request.
• The response header contains the date, size and type of file that the server is
sending back to the client and also data about the server itself. The header is
attached to the files being sent back to the client.
• Contrast with an HTTP request header.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.14 Publishing Tools

Topic: 8.14.1 Publishing Tools

Publishing Tools
• Hardware
 The most important item is the computer, which must have a modem or
network connection to allow access to the Internet.
 The type of computer will obviously be dependant on user's budget.
 The power of the computer (how fast it will run) depends on processor speed
and RAM (Random Access Memory). Most computers in schools use either
the PC (Windows) or the Macintosh operating system.
• Software
 User will need the following software before they begin creating the web
pages.
 A text editing package. For example, Notepad (Windows) or SimpleText
(Mac).
 Graphics processing software. For example, PaintShop Pro.
• A web browser
 The two most commonly used today are Microsoft Internet Explorer and
Netscape Navigator. It may be a good idea to have both these browsers on
the computer and to test the web pages on each.
Other Useful Tools
• Hardware
 A scanner, handy for including project work and/or photographs on your web
site. There are two main types: hand-held or flat-bed.
 Digital stills camera, simplifies the process of including high-quality photos
on the web site.
 Video camera, can be analogue or digital.

• Software
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 HTML editor
 Image mapping software
 Animation software
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.15 Summary

Topic: Summary

• In this course, user have learned about,


 Web publishing and their tools.
 SGML, HTML and CGL.
 Web hosting.
 Web page design consideration and principles.
 Search engines and Web browsers.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 8.16 Model Questions

Topic: Model Questions

Model Questions
• Explain Web publishing.
• What is SGML?
• What is Web hosting?
• What is CGL?
• Explain HTML.
• Explain web page design.
• Brief notes on web page design considerations.
• Explain the principles of web page design.

Assessment 1
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
1. The __________level programming interface for the Apple implementation of
OpenGL.
a) CSS
b) CGL
c) SGML
d) HTML
2. __________ is a search tool that sends user requests to several other search
engines and/or databases and aggregates the results into a single list
a) Meta search engine
b) CGL
c) SGML
d) Hyper search engine
3. __________ is a collection of interconnected documents and other resources,
linked by hyperlinks and URLs.
a) IP
b) FTP
c) Web
d) Host
4. ___________ is the standard protocol that allows web clients and servers to
communicate.
a) HTML
b) FTP
c) URL
d) HTTP
5. A web browser is a __________side software program which communicates with
web servers on the internet and request information wanted by users
a) Client
b) Server
c) Peer to peer
d) Host
Answers:
1.b
2.a
3.c
4.d
5.a

Assessment 2 (True/False)
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
1. The Hypertext Transfer Protocol (HTTP) is an application-level protocol for
distributed, collaborative, hypermedia information systems.
a) True
b) False
2. A web search engine is a hardware system that is designed to search for
information on the World Wide Web.
a) True
b) False
3. The World Wide Web is a system of interlinked documents that are accessed via
the internet.
a) True
b) False

Answers:
1.a
2.b
3.b

Books Referred
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
1. Cryptography and Network security principles and practice - by William
Stallings.
2. TCP/IP ultimate protocol guide by Philip M.Miller.
3. Wireless Network Security By Yang Xiao, Xuemin (Sherman) Shen, Ding-Zhu
Du.
4. Computer Security Handbook, Set edited by Seymour Bosworth, Michel E.
Kabay, Eric Whyne.
Course Name : Internet Technology and Web Design

Unit Name : HTML Programming Basics

TABLE OF CONTENT
UNIT NUMBER 9/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Syllabus

9.1 Objectives
9.2 HTML Page Structure
9.2.1 Introduction to HTML
9.2.2 HTML Editors
9.2.3 Overview of HTML Markup
9.2.4 Basic HTML Tags
9.2.4A Head Tags
9.2.4B Paragraph Tags
9.2.4C Line Break Tags
9.2.4D Centering Content
9.2.4E Preserver Formatting
9.3 HTML Attributes
9.3.1 HTML Attributes
9.4 HTML Text
9.4.1 HTML Text
9.5 HTML Links
9.5.1 HTML Links
9.6 HTML Document Tables
9.6.1 HTML Document Tables
9.7 HTML Frames
9.7.1 HTML Frames
9.7.1A Frames Tag Attribute
9.7.1B Creating Frames
9.7.2 Forms
9.7.2A Forms Attributes
9.8 HTML Images
9.8.1 HTML Images
9.9 Multimedia

Page | 2
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
9.9.1 Multimedia
9.10 HTML Exercises
9.10.1 HTML Exercises
9.10 Summary
9.11 Model Question

Assessment 1

Assessment 2

References

Page | 3
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.1 Objectives

Objectives
• At the end of the course the user will be able to
 Understand the concept of HTML page structure
 Understand the process of HTML Text
 Know the basics of HTML links
 Understand the concept of document tables
 Know the process of HTML frames
 Understand the process HTML images
 Know the basic operations of multimedia

Page | 4
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.1 Introduction to HTML

Introduction to HTML
• HTML is the acronym for Hyper Text Markup Language.
• HTML is the basic tool for designing a web page.
• It is a documentation language to mark the headings, title, table and forms.
• HTML is not case sensitive and can be easily updated after the file is created.
• To format a simple text file into HTML, the user creates tags that start and finish
with angle brackets.
• To end the formatting or change to another format, type the first angle bracket, a
backslash, then repeats the command and close the bracket.
• For example, <H1> Understanding HTML </H1> is the code used to create the
heading.
HTML History
• IBM wanted to set a documentation system in which we can mark the title,
headings, paragraphs and font type selections in the 1980s.
• They came out with a set of mark-up system called it General Markup Language
(GML).
• In 1986, International Standardizing Organization (ISO) took up this concept and
standardized it as Standard Generalized Markup Language (SGML).
• SGML is one of the early markup language. SGML is a system for organizing
and tagging elements of a document.
• SGML itself does not specify any particular formatting, rather, it specifies the
rules for tagging elements. These tags can then be interpreted to format
elements in different ways.
• In 1989 Tim Berners Lee and his team in the European Laboratory for Particle
Physics (CERR) designed the present form of the documentation language and
called it HTML.
World Wide Web

Page | 5
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• A web page is a document stored in the World Wide Web.
• Web pages are created using HTML. Each page contains the data to be included
in the web page and the HTML tags.
• The web browser understands these tags and displays the corresponding web
page.
• We browse the World Wide Web using a web browser.
• All text, graphics and design elements of a web page are "tagged" with codes
that instruct the web browser how to display the files.
• You can recognize these files easily because they contain the file extension of
'html' or 'htm'.
• Just consider the following hierarchy of HTML document.

FIG 9.1 : Hierarchy of HTML Document

Page | 6
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.2 HTML Editors

HTML Editors
• An HTML editor is a software application for creating web pages.
• Although the HTML markup of a web page can be written with any text editor,
specialized HTML editors can offer convenience and added functionality.
• For example, many HTML editors work not only with HTML, but also with related
technologies such as CSS, XML and JavaScript.
• In some cases they also manage communication with remote web servers via
FTP and WebDAV.
• Some commonly used HTML Editors are listed here under,
 Adobe Dreamweaver
 It is a web development application available for both MAC and Windows
operating system. Recent versions have incorporated support for web
technologies such as CSS, JavaScript and various server-side scripting
languages and frameworks including ASP.NET, ColdFusion, Java Server
Pages (JSP), and PHP.
 Visual Web Developer Express
 It is a freeware web development tool that allows developers to evaluate
the web development and editing capabilities of the other Visual Studio
2008 editions at no charge. Its main function is to create ASP.NET
websites. It has a WYSIWYG (What You See Is What You Get) interface,
drag-and-drop user interface designer, enhanced HTML & code editors; a
data base explorer; support for other web technologies (e.g., CSS,
JavaScript, XML).
 Microsoft FrontPage
 It is also known as Microsoft Office FrontPage, is a WYSIWYG HTML
editor and web site administration tool from Microsoft for the Microsoft

Page | 7
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Windows line of operating systems. It was branded as part of the
Microsoft Office suite from 1997 to 2003.

Page | 8
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.3 Overview of HTML

Overview of HTML
• Hypertext refers to the way in which web pages (HTML documents) are linked
together.
• Thus the link available on a web page are called Hypertext.
• As its name suggests, HTML is a Markup Language which means you use HTML
to simply "Markup" a text document with tags that tell a web browser how to
structure it to display.
• Originally, HTML was developed with the intent of defining the structure of
documents like headings, paragraphs, lists and so forth to facilitate the sharing of
scientific information between researchers.
• Now, HTML is being widely used to format web pages with the help of different
tags available in HTML language.
• A markup language such as HTML is simply a collection of codes elements in
this case that are used to indicate the structure and format of a document.
• The codes have meaning that is interpreted by a formatting program, often a
Web browser, which renders the document.
• Elements in HTML consist of alphanumeric tags within angle brackets.
• These tags usually come in pairs, but exceptions do exist.

Basic HTML Document

Page | 9
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• In its simplest form, following is an example of an HTML document,

• Save the file as mypage.html. Start your Internet browser. Select Open (or Open
Page) in the File menu of your browser.
• A dialog box will appear. Select Browse (or Choose File) and locate the html file
you just created - mypage.html - select it and click Open.
• Now you should see an address in the dialog box, for example
C:\MyDocuments\mypage.html.
• Click OK, and the browser will display the page.

FIG 9.2: Output of Sample HTML Program

Page | 10
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.4 Basic HTML Tags

Basic HTML Tags


• The document enclosed within the HTML Tags is identified as a web page.
• <HTML> is almost the first tag in an HTML page and </HTML> tag is the last tag.
• Everything else in the web page goes between these two tags and is technically
part of the <HTML> element.
• As told earlier, HTML is a markup language and makes use of various tags to
format the content.
• These tags are enclosed within angle braces <Tag Name>.
• Except few tags, most of the tags have their corresponding closing tags.
• For example <html> has its closing tag </html> and <body> tag has its closing
tag</body> tag etc.
• Any formatted text document is composed of a set of elements such as
paragraphs, headings and lists.
• Each element has to be surrounded by control information which tells the
presentation or printing software when to switch on a piece of formatting and
when to switch it off.
• In HTML, formatting is specified by using tags.
• For instance, the following example sets the text to the style h1 and switches that
style off before processing any more of the document.
• A number of points should be noted about HTML tags.
 Tags are delimited by angled brackets, <h1>.
 They are case sensitive for example, <HEAD>, <head> and <HEAD> are not
equivalent.
 In HTML up to version 4 tags were not case sensitive, XHTML is case
sensitive and furthermore, tags must be in lower case letters.
 Each element is terminated by an end tag.

Page | 11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 There are a few exceptions to this rule generally elements which never
contain content.
 Some characters have to be replaced in the text by escape sequences.
 If < was not escaped the software would attempt to process anything that
followed it as part of a tag.
 Therefore if you want to include such a character in your code you must
replace it with the escape sequence.
 White space, tabs and newlines are ignored by the browser, they can be used
to make the HTML source more readable without affecting the way that the
page is displayed.
 Actually they are not ignored, but multiple white spaces are replaced by a
single space, while newlines and tabs are treated as spaces.
 If a browser does not understand a tag it will usually ignore it.
• To learn HTML, you will need to study various tags and understand how they
behave while formatting a textual document.
• Learning HTML is simple as users have to learn the usage of different tags in
order to format the text or images to make a beautiful web page.
• An HTML element is defined by a starting tag. If the element contains other
content, it ends with a closing tag, where the element name is preceded by a
forward slash.
• So here <p>....</p> is an HTML element, <h1>...</h1> is another HTML element.
• There are some HTML elements which don't need to be closed, such as
<img.../>, <hr /> and <br /> elements.
• These are known as void elements.
• HTML documents consist of a tree of these elements and they specify how
HTML documents should be built, and what kind of content should be placed in
what part of an HTML document.
Tag Name Description
<A> Anchor Make Hyperlinks
<B> Bold Bold the text
<BODY> Body of HTML Document Where to start the document and place the
HTML codes

Page | 12
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
<BR> Line Break Force to change line
<CENTER Center Center alignment
>
<EM> Emphasis Emphasis the content
<FONT> Font Change font set up
<FORM> Form Insert a form inside the web page
<H1> Heading 1 Heading size
<HEAD> Heading of HTML Contains information about the page
document
<HR> Horizontal rule Create a horizontal line
<HTML> Hypertext markup language Begins the html document
<I> Italic Italic the text
<IMG> Image Image
<INPUT> Input field Insert a input field
<LI> List item Create a listed item in an unordered or
ordered list
<MENU> Menu Insert a menu in a web page
<OL> Ordered list Numbered the list
<P> Paragraph Create a line break and a space between
lines.
<TABLE> Table Insert a table inside a web page
<TD> Table data The cell of a table
<TH> Table header The header of a table
<TITLE> Document title The title in the title bar of the browser
<TR> Table row The row of a table
<U> Underline Underline the text
<UL> Unordered list Bullets the list
<STRIKE> Strike the text For making the text appears stroked out
<SUB> Subscript For making the text subscript
<SUP> Superscript For making the text superscript
<DFN> Definition For displaying text as a definition
<CITE> Citations For displaying citations and references

FIG 9.3 : List of Tags

Page | 13
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.4A Head Tags

Head Tags
• The Head tags are used to store information about the web page such as the title
of the page.
• Any document starts with a heading. You can use different sizes for your
headings.
• HTML also has six levels of headings, which use the elements <h1>, <h2>,
<h3>, <h4>, <h5>, and <h6>.
• While displaying any heading, browser adds one line before and one line after
that heading.
• Example program

• Output

Page | 14
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Title Tags
• The Title tags are used to enter a Title for the web page.
• This tag contains the title of the HTML document, which will appear in the web
browser's title bar and is used but search engines to refer to the document.
• Each <HEAD> element should include a <TITLE> element.

Page | 15
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.4B Paragraph Tags

Paragraph Tags
• The <p> tag offers a way to structure your text into different paragraphs.
• Each paragraph of text should go in between an opening <p> and a closing </p>
tag.
• Example Program

• Output

Page | 16
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.4C Line Break Tags

Line Break Tags


• Whenever you use the <br /> element, anything following it starts from the next
line.
• This tag is an example of an empty element, where you do not need opening and
closing tags, as there is nothing to go in between them.
• The <br /> tag has a space between the characters br and the forward slash.
• If you omit this space, older browsers will have trouble rendering the line break,
while if you miss the forward slash character and just use <br> it is not valid in
XHTML.
• Example Program

• Output

Page | 17
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.4D Centering Content

Centering Content
• You can use <center> tag to put any content in the center of the page or any
table cell.
• Example Program

• Output

Horizontal Lines
• Horizontal lines are used to visually break up sections of a document. The <hr>
tag creates a line from the current position in the document to the right margin
and breaks the line accordingly.
• Example Program

Page | 18
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

• Again <hr /> tag is an example of the empty element, where you do not need
opening and closing tags, as there is nothing to go in between them.
• The <hr /> element has a space between the characters hr and the forward
slash.
• If you omit this space, older browsers will have trouble rendering the horizontal
line, while if you miss the forward slash character and just use <hr> it is not valid
in XHTML.

Page | 19
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.2 HTML Page Structure

Topic : 9.2.4E Preserver Formatting

Preserver Formatting
• Sometimes you want your text to follow the exact format of how it is written in the
HTML document. In those cases, you can use the preformatted tag <pre>.
• Any text between the opening <pre> tag and the closing </pre> tag will preserve
the formatting of the source document.
• Example Program

• Output

Non-breaking Spaces
• Suppose you want to use the phrase "12 Angry Men." Here you would not want a
browser to split the "12, Angry" and "Men" across two lines.
• In cases where you do not want the client browser to break text, you should use
a non-breaking space entity & nbsp; instead of a normal space.

Page | 20
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• For example, when coding the "12 Angry Men" in a paragraph, you should use
something similar to the following code:
• Example Program

• Output

HTML Tag versus Element


• An HTML element is defined by a starting tag. If the element contains other
content, it ends with a closing tag.
• For example <p> is starting tag of a paragraph and </p> is closing tag of the
same paragraph but <p> this is paragraph</p> is a paragraph element.

Nested HTML Elements


• It is very much allowed to keep one HTML element inside another HTML
element,

• Example program

Page | 21
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

Page | 22
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.3 HTML Attributes

Topic : 9.3.1 HTML Attributes

HTML Attributes
• An attribute is used to define the characteristics of an HTML element and is
placed inside the element's opening tag.

FIG 9.4: Attributes of HTML Program


• Attributes names and attribute values are case sensitive. However, the World
Wide Web consortium (W3C) recommends lowercase attributes/attribute values
in their HTML4 recommendation.
• All attributes are made up of two parts. They are,
 Name
 Value
• Name Attribute
 The Name is the property you want to set. For example, the paragraph <p>
element in the example carries an attribute whose name is align, in which
you can use to indicate the alignment of paragraph on the page.
• Value Attribute
 The Value is what you want the value of the property to be set and always
put within quotations.
 The below example shows three possible values of align attribute. There are
such as,
 Left

Page | 23
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Right
 Center
• Example program

• Output

Core Attributes
• The four core attributes that can be used on the majority of HTML elements
(although not all) are,
 id
 title
 class
 style
• The id attribute
 The id attribute of an HTML tag can be used to uniquely identify any element
within an HTML page. There are two primary reasons that you might want to
use an id attribute on an element.
 If an element carries an id attribute as a unique identifier it is possible to
identify just that element and its content.

Page | 24
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 If you have two elements of the same name within a web page (or style
sheet), you can use the id attribute to distinguish between elements that
have the same name.
 Example

• The title attribute


 The title attribute gives a suggested title for the element. The syntax for the
title attribute is similar as explained for id attribute.
 The behavior of this attribute will depend upon the element that carries it,
although it is often displayed as a tooltip when cursor comes over the element
or while the element is loading.
 Example Program

 Output

• The class attribute


 The class attribute is used to associate an element with a style sheet, and
specifies the class of element.
 You will learn more about the use of the class attribute when you will learn
cascading style sheet (CSS).
 The value of the attribute may also be a space separated list of class names.
 Example program

Page | 25
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• The style attribute


 The style attribute allows you to specify cascading style sheet (CSS) rules
within the element.
 Example program

 Output

 At this point of time, we are not learning CSS, so just let's proceed without
bothering much about CSS.
 Here you need to understand what are HTML attributes and how they can be
used while formatting content.
Internationalization Attributes
• There are three internationalization attributes, which are available for most
(although not all) XHTML elements.
 dir
 lang
 xml:lang
• The dir attribute
 The dir attribute allows you to indicate to the browser the direction in which
the text should flow.
 The dir attribute can take one of two values, as you can see in the table that
follows.

Page | 26
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Value Meaning
ltr Left to right (default value)
rtl Right to left (for languages such as Hebrew or Arabic that are
read right to left.

FIG 9.5: The dir attribute value

 Example Program

 Output

 When dir attribute is used within the <html> tag, it determines how text will be
presented within the entire document.
 When used within another tag, it controls the text's direction for just the
content of that tag.
• The lang Attribute
 The lang attribute allows you to indicate the main language used in a
document, but this attribute was kept in HTML only for backwards
compatibility with earlier versions of HTML.
 This attribute has been replaced by the xml:lang attribute in new XHTML
documents.
 The values of the lang attribute are ISO-639 standard two-character language
codes. Check HTML Language Codes: ISO 639 for a complete list of
language codes.
 Example Program

Page | 27
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• The xml:lang Attribute


 The xml:lang attribute is the XHTML replacement for the lang attribute.
 The value of the xml:lang attribute should be an ISO-639 country code as
mentioned in previous section.
Generic Attributes
• Here's a table of some other attributes that are readily usable with many of the
HTML tags.

Page | 28
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 9.6: Generic attribute

Attributes Value Description


Align Top Specifies the alignment of an image according to
bottom surrounding elements
middle
left
right
Alt Text Specifies an alternate text for an image
Border Pixels Specifies the width of the border around an image.
Crossorigin Anonymous Allow images from third party sites that allow cross sign
use- access to be used with canvas
credentials

Page | 29
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Height Pixels Specifies the height of an image.


Hspace Pixels Specifies the whitespace on left and right side of an
image
Ismap Ismap Specifies an image as a server side image map
Longdes Url Specifies the URL to a document that contains a long
description of an image
Src Url Specifies the URL of an image
Usemap #mapname Specifies an image as a client side image map
Vspace Pixels Specifies the white space on top and bottom of an
image
Width Pixels Specifies the width of an image

FIG 9.7: Attributes Value and description

Page | 30
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.4 HTML Text

Topic : 9.4.1 HTML Text

HTML Text
• The text on HTML page can be altered in a number of ways.
• The actual font used can be changed to attempt to force the browser to use a
specific font and the look of the text can be changed for emphasis.
• Web page authors who are worried about issues of usability and who want to
create pages which work across different types of device frown upon the
elements in this section.
• It is a really good idea to use styles wherever possible.
• The forthcoming XHTML 2 recommendation even suggests that the style
attribute will disappear, to be replaced by a new element.
• Unfortunately many HTML editing tools still use the elements and attributes listed
here so the chances are that you will come across these at some point.
• Be aware that whenever you are able to write your code by hand, or if you have
user configurable tool, you should use styles.
• If you use a word processor, you must be familiar with the ability to make text
bold, italicized, or underlined; these are just three of the ten options available to
indicate how text can appear in HTML and XHTML.
Bold Text
• Anything that appears within <b>...</b> element, is displayed in bold.

• Example program

Page | 31
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

Italic Text
• Anything that appears within <i>...</i> element is displayed in italicized.
• Example program

• Output

Underlined Text
• Anything that appears within <u>...</u> element, is displayed with underlined.
• Example program

Page | 32
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

Strike Text
• Anything that appears within <strike>...</strike> element is displayed with strike
through, which is a thin line through the text.
• Example program

• Output

Monospaced font
• The content of a <tt>...</tt> element is written in monospaced font.
• Most of the fonts are known as variable-width fonts because different letters are
of different widths (for example, the letter 'm' is wider than the letter 'i').
• In a monospaced font, however, each letter has the same width.

• Example program

Page | 33
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

Superscript Text
• The content of a <sup>...</sup> element is written in superscript; the font size
used is the same size as the characters surrounding it but is displayed half a
character's height above the other characters.
• Example program

• Output

Subscript Text
• The content of a <sub>...</sub> element is written in subscript; the font size
used is the same as the characters surrounding it, but is displayed half a
character's height beneath the other characters.
• Example program

Page | 34
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

Inserted Text
• Anything that appears within <ins>...</ins> element is displayed as inserted text.
• Example program

• Output

Deleted Text
• Anything that appears within <del>...</del> element is displayed as deleted text.

• Example program

Page | 35
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

Larger Text
• The content of the <big>...</big> element is displayed one font size larger than
the rest of the text surrounding it.
• Example program

• Output

Smaller Text
• The content of the <small>...</small> element is displayed one font size smaller
than the rest of the text surrounding it.
• Example program

Page | 36
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

Grouping Content
• The <div> and <span> elements allow you to group together several elements
to create sections or subsections of a page.
• For example, you might want to put all of the footnotes on a page within a <div>
element to indicate that all of the elements within that <div> element relate to the
footnotes.
• You might then attach a style to this <div> element so that they appear using a
special set of style rules.

• Example program

Page | 37
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

• The <span> element, on the other hand, can be used to group inline elements
only.
• So, if you have a part of a sentence or paragraph which you want to group
together, you could use the <span> element as follows.
• Example program

• Output

Page | 38
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• These tags are commonly used with CSS to allow you to attach a style to a
section of a page.

Comment Lines
• HTML programming language has the facility to include comment lines for the
reference of the programmer.
• The comment will not appear in the web page. We include comments using the
<! ......> tag.
• The general format is,

• Example
• <! This part illustrates the product profile of the company >

Page | 39
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.5 HTML Links

Topic : 9.5.1 HTML Links

HTML Links
• The HTML <a> tag defines a hyperlink.
• An anchor tag (a) is used to define a link, but you also need to add something to
the anchor tag – the destination of the link.
• A hyperlink (or link) is a word, group of words, or image that you can click on to
jump to another document.
• When you move the cursor over a link in a Web page, the arrow will turn into a
little hand.
• The most important attribute of the <a> element is the href attribute, which
indicates the link's destination.
• By default, links will appear as follows in all browsers,
 An unvisited link is underlined and blue.
 A visited link is underlined and purple.
 An active link is underlined and red.
HTML Link Syntax
• The HTML code for a link is simple. It looks like this,

• The href attribute specifies the destination of a link.

HTML Links – The target Attribute


• The target attribute specifies where to open the linked document.
HTML Links – The id Attribute
• The id attribute can be used to create a bookmark inside a HTML document.
• Bookmarks are not displayed in any special way. They are invisible to the reader.
• Example

Page | 40
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

HTML Lists
• A list is any ordered set of data. HTML offers us several mechanisms for
specifying lists of information.
• Lists are a part of everyday life. To-do lists determine what to get done.
• Navigational routes provide turn-by-turn lists of directions. Recipes provide lists
of ingredients and lists of instructions.
• With a list for nearly everything, it’s easy to understand why they are also popular
online.
• When we want to use a list on a website, HTML provides three different types to
choose from,
 Unordered List
 Ordered List
 Description List

Page | 41
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Choosing which type of list to use or whether to use a list at all comes down to
the content and the most semantically appropriate option for displaying that
content.
• For example, we can choose what type of marker to use on a list. The marker
could be square, round, numeric, alphabetical, or perhaps nonexistent.
• Also, we can decide if a list should be displayed vertically or horizontally. All of
these choices play significant roles in the styling of our web pages.
• Unordered List
 An unordered list is simply a list of related items whose order does not matter.
 Creating an unordered list in HTML is accomplished using the unordered list
block-level element,<ul>.
 Each item within an unordered list is individually marked up using the list item
element,<li>.
 By default, most browsers add a vertical margin and left padding to the <ul>
element and precede each <li> element with a solid dot.
 Example program

 Output

• Ordered List
 The ordered list element, <ol>, works very much like the unordered list
element; individual list items are created in the same manner.

Page | 42
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 The main difference between an ordered list and an unordered list is that with
an ordered list, the order in which items are presented is important.
 Because the order matters, instead of using a dot as the default list item
marker, an ordered list uses numbers.
 Example Program

 Output

• Description List
 Another type of list seen online (but not as often as unordered or ordered
lists) is the description list.
 Description lists are used to outline multiple terms and their descriptions, as
in a glossary.
 Creating a description list in HTML is accomplished using the description list
block-level element, <dl>.
 Instead of using a <li> element to mark up list items, the description list
requires two block-level elements the description term element, <dt>, and the
description element, <dd>.
 A description list may contain numerous terms and descriptions, one after the
other.
 Additionally, a description list may have multiple terms per description, as well
as multiple descriptions per term.
 A single term may have multiple meanings and warrant multiple descriptions.
 Conversely, a single description may be suitable for multiple terms.

Page | 43
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 When adding a description list, the <dt> element must come before the <dd>
element.
 The definition term and the description that directly follows it correspond to
one another thus, the order of these elements is important.
 By default, the <dl> element will include vertical margins, just like the <ul>
and <ol>elements.
 Additionally, the <dd> element includes a left margin by default.

Page | 44
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.6 HTML Document Tables

Topic : 9.6.1 HTML Document Tables

HTML Document Tables


• The HTML table model allows authors to arrange data -- text, pre-formatted text,
images, links, forms, form fields, other tables, etc. -- into rows and columns of
cells.
• The table object represents an HTML <table> element.
• Each table may have an associated caption that provides a short description of
the table's purpose.
• Table rows may be grouped into a head, foot, and body sections, (via the
THEAD, TFOOT AND TBODY elements, respectively).
• Row groups convey additional structural information and may be rendered by
user agents in ways that emphasize this structure.
• User agents may exploit the head/body/foot division to support scrolling of body
sections independently of the head and foot sections.
• When long tables are printed, the head and foot information may be repeated on
each page that contains table data.
• Authors may also group columns to provide additional structural information that
may be exploited by user agents.
• Furthermore, authors may declare column properties at the start of a table
definition in a way that enables user agents to render the table incrementally
rather than having to wait for all the table data to arrive before rendering.
• Table cells may either contain "header" information or "data". Cells may span
multiple rows and columns.
• The HTML 4th table model allows authors to label each cell so that non-visual
user agents may more easily communicate heading information about the cell to
the user.

Page | 45
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Not only do these mechanisms greatly assist users with visual disabilities, they
make it possible for multi-model wireless browsers with limited display
capabilities (e.g., Web-enabled pagers and phones) to handle tables.
• Tables should not be used purely as a means to layout document content as this
may present problems when rendering to non-visual media.
• Additionally, when used with graphics, these tables may force users to scroll
horizontally to view a table designed on a system with a larger display.
• To minimize these problems, authors should use style sheets to control layout
rather than tables.
Access a Table object
• User can access a <table> element by using getElementById().

Create a Table object


• User can create a <table> element by using the document.createElement()
method.

Table object Collections

FIG 9.8: Table object collection

Page | 46
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Table Object Methods

FIG 9.9: Table object methods


Table object Properties
Property Description
Align Sets or returns the alignment of a table according to surrounding text
Background Sets or returns the background image of a table
Bgcolor Sets or returns the background color of a table
Border Sets or returns the width of the table border
Caption Returns the <caption> element of a table
Cellpadding Sets or returns the amount of space between the cell border and cell
content
Cellspacing Sets or returns the amount of space between the cells in a table
Frame Sets or returns which outer borders (of a table) that should be
displayed
Height Sets or returns table.
Rules Sets or returns which inner borders (between the cells) that should be
displayed in a table
Summary Sets or returns a description of the data in a table.
Tfoot Returns a reference to the <tfoot> element of a table
Thead Returns a reference to the <thead> element of a table
Width Sets or returns the width of the table

FIG 9.10: Table object property

Page | 47
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.7 HTML Frames

Topic : 9.7.1 HTML Frames

HTML Frames
• Frame is a typical layout on the web page by which a user can interact with the
web page.
• The browser window is called the container. It is possible to divide the container
into several frames and use each frame for displaying a different html document.
• Frames have the following characteristics.
 Each frame is given a name.
 Each frame will be targeted by a html document.
 Each frame resizes itself dynamically in response to the changes in the size
of visible client area.
• Typical component of forms are text field, text area, checkbox, radio buttons and
push buttons.
• HTML allows us to place these form components on the web page and send the
desired information to the destination server.
• Frames allow dividing the browser window into sub-regions.
• By displaying multiple documents, you can compare their data.
• You can also use frames to show index as links in one sub-region and the
corresponding document in their other sub-region.
• This way, the index will never go out of sight while browsing through the
document.
• Frames can divide the browser window horizontally or vertically.
• You can also nest a frame within another frame. You can display tables, links
forms and images through frames.
• To split the browser window, you need to create frames. Frames allow you to
display different HTML pages in one browser window.
• To create frames, you need to create a FRAME document, except that a
<FRAMESET> container replaces the <BODY> container.

Page | 48
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• A <FRAMESET> container describes the HTML document or frames that make
up the page.
• A standard frame has no BODY element and cannot contain tags that would
normally be placed in the BODY element.
• If they appear in the frame document, the <FRAMESET> tag is ignored.

Page | 49
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.7 HTML Frames

Topic : 9.7.1A Frames Tag Attribute

Frames Tag Attribute


• To display different HTML pages in different frames, you need to use the
<frame> tag.
• The <frame> tag has no matching end tag. The frame element, which uses the
<frame> tag has following attributes.
 SRC
 NAME
 MARGINWIDTH
 MARGINHEIGHT
 SCROLLING
 NORESIZE
 FRAMEBORDER
 FRAMESPACING
• The SRC Attribute
 The SRC attribute takes as its value the URL of the document to be displayed
in the frame.
 Frame without an SRC attribute are displayed as a blank space of the size of
the frame.
 Its value can be any URL. For example, src="/html/top_frame.htm" will load
an HTML file available in html directory.
• The NAME Attribute
 The NAME attribute is used to assign a name to a frame, so that it can be
targeted by links in other documents.
 The documents are usually from other frames in the same document.
 This attribute is optional by default all frames are unnamed.
 Names must begin with an alphanumeric character. Given below are certain
reserved names starting with an underscore.

Page | 50
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 There is no need to explicitly assign them to the NAME attribute. They need
to be specified with the TARGET attribute.
 It is used to indicate which frame a document should be loaded into.
 This is especially important when you want to create links in one frame that
load pages into an another frame, in which case the second frame needs a
name to identify itself as the target of the link.
 _blank: By specifying TARGET = "blank", the document will be loaded in a
new window. For example,
 Although these are reserved names for the NAME attribute of the FRAME
element, they are to be referred to using a <A> tag.
 It is used to target specific windows, allowing smoother transition between
framed documents and between framed and normal documents.
• The MARGINWIDTH Attribute
 The MARGINWIDTH attribute is used when the document author wants to
control the margin for the frame.
 It has to be specified as a pixel value. Margins cannot be less than one.
 This attribute allows you to specify the width of the space between the left
and right of the frame's borders and the frame's content. The value is given in
pixels. For example marginwidth="10".
• The MARGINHEIGHT Attribute
 This attribute allows you to specify the height of the space between the top
and bottom of the frame's borders and its contents.
 The value is given in pixels. For example marginheight="10".
• The SCROLLING Attribute
 This attribute describes if the frame should have a scroll-bar or not.
 This attribute controls the appearance of the scroll-bars that appear on the
frame.
 If the value is "yes", the scroll-bar will always be visible on the frame.
 The "no" value results in scroll-bars are needed and place them wherever
they are needed.
 The scrolling attribute is optional, by default, the value is "auto".

Page | 51
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The NORESIZE Attribute
 This attribute has no value. It is just a flag, which informs the user that the
frame is not re-sizable by the user.
 Users typically re-size the frames by dragging a frame edge to a new
position.
 If any of the frames adjacent to an edge is not re-sizable, than entire edge will
be restricted from moving.
 This will affect the re-sizability of other frames.
 The NORESIZE attribute is optional by default, all frames are re-sizable.
 By default you can re-size any frame by clicking and dragging on the borders
of a frame. The noresize attribute prevents a user from being able to re-size
the frame.
 For example noresize="noresize".
• The FRAMEBORDER Attribute
 This attribute allows control of the frame border display.
 With this attribute set to "0", the borders for the specific frame are not drawn.
 This attribute specifies whether or not the borders of that frame are shown, it
overrides the value given in the frame-border attribute on the <frameset> tag
if one is given, and this can take values either 1 (yes) or 0 (no).
• The FRAMESPACING Attribute
 This attribute allows the setting of extra space around frames to give the
appearance of floating frames.
 The "value" should be the distance required around the frame, in pixels.
 For example, <FRAME FRAMESPACING = "55" ...> would display the frame
with a spacing of 55 pixels.

Page | 52
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.7 HTML Frames

Topic : 9.7.1B Creating Frames

Creating Frames
• To use frames on a page we use <frameset> tag instead of <body> tag.
• The <frameset> tag defines how to divide the window into frames.
• The rows attribute of <frameset> tag defines horizontal frames and cols attribute
defines vertical frames.
• Each frame is indicated by <frame> tag and it defines which HTML document
shall open into the frame.
• Example program

• Output

Page | 53
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 9.11: Output of creating frames

• Example program

• Output

FIG 9.12: Output of creating frames

Page | 54
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Disadvantages of Frames
• There are few drawbacks with using frames, so it's never recommended to use
frames in your web pages. There are,
 Some smaller devices cannot cope with frames often because their screen is
not big enough to be divided up.
 Sometimes your page will be displayed differently on different computers due
to different screen resolution.
 The browser's back button might not work as the user hopes.
 There are still few browsers that do not support frame technology.
Browser Support for Frames
• If a user is using any old browser or any browser which does not support frames
then <noframes> element should be displayed to the user.
• So you must place a <body> element inside the <noframes> element because
the <frameset> element is supposed to replace the <body> element, but if a
browser does not understand <frameset> element then it should understand
what is inside the <body> element which is contained in a <noframes> element.
• You can put some nice message for your user having old browsers. For example
Sorry!! your browser does not support frames. As shown in the above example.
Frames names and target attributes
• One of the most popular uses of frames is to place navigation bars in one frame
and then load main pages into a separate frame.
• Let's see following example where a test.htm file has following code.

• Example program

Page | 55
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Here we have created two columns to fill with two frames.


• The first frame is 200 pixels wide and will contain the navigation menu bar
implemented by menu.htm file.
• The second column fills in remaining space and will contain the main part of the
page and it is implemented by main.htm file.
• For all the three links available in menubar, we have mentioned target frame as
main_page, so whenever you click any of the links in menubar, available link will
open in main_page.
• Example program

Page | 56
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 9.13: Output of target frames


Target Attributes
• One of the most popular uses of frames is to place navigation bars in one frame
and then load main pages into a separate frame.

FIG 9.14: Target Attributes option

Page | 57
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.7 HTML Frames

Topic : 9.7.2 Forms

Forms
• Forms are used to accept data from the user. This data can be personal
information from the user or some feedback from the user.
• Forms help to enhance the web site depending on the user's feedback. To create
a form, FORM element is required.
• It uses the opening and closing <FORM>......</FORM> tags.
• Different controls such as text box, option buttons, images and checkbox can be
put in a form.
• Forms cannot be nested, but a web page can contain more than one form.
• The actual working of a form involves the ACTION and the METHOD attribute to
be set.
• The ACTION attribute specifies the URL. The METHOD attribute can take up two
values - GET and POST.
• Both the values of the METHOD attribute work for the same purpose, with a
slight difference.
• When "Post" is used as the value of method attribute, the information is sent as a
block of data through an HTTP post transaction.
• When "GET" is used, the form information is added to the URL.
• The page is opened as if it were an anchor. The default value of the METHOD
attribute is "GET".
• HTML forms enable you to accept data over the internet. You can accept
feedback, conduct a web survey or collect information from the users using
HTML forms.
• The various form elements used to create an HTML form are,
o HTML Forms are required when you want to collect some data from the
site visitor.

Page | 58
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
o For example during user registration you would like to collect information
such as name, email address, credit card, etc.
o A form will take input from the site visitor and then will post it to a back-
end application such as CGI, ASP Script or PHP script etc.
o The back-end application will perform required processing on the passed
data based on defined business logic inside the application.
o There are various form elements available like text fields, text area fields,
drop-down menus, radio buttons, checkbox, etc.
o Syntax

Page | 59
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.7 HTML Frames

Topic : 9.7.2A Forms Attributes

Forms Attributes
• Apart from common attributes, following is a list of the most frequently used form
attributes.
HTML Form Controls
• There are different types of form controls that you can use to collect data using
HTML form,
 Text Input Controls
 Checkbox Controls
 Radio Box Controls
 Select Box Controls
 File Select Controls
 Hidden Controls
 Clickable Buttons
 Submit and Reset Button
Input Type Value of the Type Attributes Example
Checkbox “checkbox” <input type=”checkbox” name=a>
Radio button “radio” <input type=”radio” name=a>
Text field “text” <input type=”text” name=a>
Password field “password” <input type=”password” name=a>
Hidden field “hidden” <input type=”hidden” name=a>
Button “button” <input type=”button” name=a>
Submit button “submit” <input type=”submit” name=a>
Reset button “reset” <input type=”reset” name=a>

FIG 9.15: HTML form controls

• Text Input Controls


 There are three types of text input used on forms.

Page | 60
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Single Line Text Input Controls
 Password Input Controls
 Multi Line Text Input Controls

 Single Line Text Input Controls


 This control is used for items that require only one line of user input, such
as search boxes or names. They are created using HTML <input> tag.
 Example program

 Output

FIG 9.16: Output of single line text input control

 Password Input Controls


 This is also a single line text input but it masks the character as soon as a
user enters it. They are also created using HTML <input> tag.
 Example program

Page | 61
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

 Output

FIG 9.17: Output of password input control

 Attributes

FIG 9.18: Attributes of password input control

 Multi Line Input Controls

Page | 62
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 This is used when the user is required to give details that may be longer
than a single sentence. Multi line input controls are created using HTML
<textarea> tag.
 Example program

 Output

FIG 9.19: Output of multiple line input control

 Attributes

Page | 63
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 9.20: Attributes of multiple line input control

• Checkbox Controls
 Checkbox is used when more than one option is required to be selected.
 They are also created using HTML <input> tag but type attribute is set to
checkbox.
 Example program

 Output

FIG 9.21: Output of checkbox control

 Attributes

Page | 64
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 9.22: Attributes of checkbox control

• Radio Button Control


 Radio buttons are used when out of many options, just one option is required
to be selected.
 They are also created using HTML <input> tag but type attribute is set to
radio.
 Example program

 Output

FIG 9.23: Output of radio button control

 Attributes

Page | 65
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 9.24: Attribute of radio button control

• Select Box Control


 A select box, also called drop down box which provides option to list down
various options in the form of drop down list, from where a user can select
one or more options.
 Example Program

 Output

FIG 9.25: Output of select box control

 Attributes of <select> tag

Page | 66
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 9.26: Attributes of select tag


 Attributes of <option> tag

FIG 9.27: Attributes of option tag


• Field Upload Box
 If you want to allow a user to upload a file to your web site, you will need to
use a file upload box, also known as a file select box.
 This is also created using the <input> element but type attribute is set to file.
 Example Program

Page | 67
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Output

FIG 9.28: Output of field upload box


 Attributes

FIG 9.29: Attribute of field upload box

• Button Controls
 There are various ways in HTML to create clickable buttons.
 You can also create a clickable button using <input> tag by setting its type
attribute to button.
 The type attribute can take the following values:
 Example Program

 Output

Page | 68
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 9.30: Output of button control

• Hidden Form Controls


 Hidden form controls are used to hide data inside the page which later on
can be pushed to the server.
 This control hides inside the code and does not appear on the actual page.
 For example, following hidden form is being used to keep current page
number.
 When a user will click next page then the value of hidden control will be sent
to the web server and there it will decide which page has be displayed next
based on the passed current page.
 Example Program

 Output

FIG 9.31: Output of hidden form control

Page | 69
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.8 HTML Images

Topic : 9.8.1 HTML Images

HTML Images
• Images play an important part in a web site. They make our web pages appear
more eye catching and descriptive.
• A judicious use of images with text can make your web page quite appealing.
• In the following sections we will learn how to insert images to our web pages and
how to work with them properly to make the web page impressive.
• Always use images in jpeg or gif format since most of the browsers support these
two formats.
• The <img> tag is empty, which means that it contains attributes only and it has
no closing tag.
• To display an image on a page, you need to use the src attribute. Src stands for
"source".
• The value of the src attribute is the URL of the image you want to display on your
page.
• The IMG SRC tag is used for inserting images to a web page. The syntax of
defining an image.
• Syntax:

• Not only does the source attribute specify what image to use, but where the
image is located.
• The above image, graphics/chef.gif, means that the browser will look for the
image name chef.gif in a graphics folder in the same folder as the html document
itself.
• Images are the second aspect of a pleasant web experience.
• The problems with images are legion if they are not used wisely.

Page | 70
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• First, experienced or impatient web surfers often switch image loading off by
default, on their browsers.
• If your site relies on an image to get important information across, these people
may never see it.
• Second, loading images is a slow process and if you use too many, or your
images are too large, the download times can easily become intolerable.
• Browsers display a limited range of image types. You can only guarantee that
GIF and JPG will be displayed everywhere, although more and more browsers
are now able to display the PNG format, which was intended as a free
replacement for the GIF format when that was copyrighted.
• If you want high-quality, good compression and loss of colors use JPG, for
instance when displaying photographs.
• Generally, though GIFs are more common as they tend to be smaller files, lots of
software can manipulate them and can be animated.
Image attributes
• A picture or an image in the web page can be inserted using the <img> tag.
• The <img> tag has several attributes to inform the source, height of the picture,
width of the picture alignment etc.
 src
 Height
 Width
 Align
 alt
• src and alt
 The src attribute specifies the source of the picture. It gives the file name of
the picture file.
 The two parameters src and alt, define where to find the image and text to
display if the user agent cannot display the image (or is set not to display
images at all).

Page | 71
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 These two parameters comprise the minimal set of parameters for any image
tag.
 Here is an example of the image tag that will insert a computer image,
computer.jpg, into a document with the alternate text "A picture of a
computer".
• Height and Width
 The height and the width may be expressed in terms of either pixels of
percentage or units. The default is the pixels.
 Syntax
o Specifies that the width of the image should be NUMBER pixels.
o If no dimensions are specified for the image, the browser will insert the
image exactly as is, at the same size as you would view it in a picture
editor on your computer.
o The picture will load slightly faster if you specify the height and width so
that the browser does not have to determine it.
o User may also find it quicker and easier to specify a specific width and
height for the image in the HTML, rather than editting and resizing the
image on the computer.
• Align
 The align attribute can be used to align the picture.
Insert Image
• User can insert any image in the web page by using <img> tag.
• The <img> tag is an empty tag, which means that it can contain only list of
attributes and it has no closing tag.

• Syntax

• To try following example, let's keep our HTML file test.htm and image file
test.png in the same directory.

Page | 72
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Example program

• Output

FIG 9.32: Output of insert image

• User can use PNG, JPEG or GIF image file based on the comfort but make sure
user specify correct image file name in src attribute. Image name is always case
sensitive.
• The alt attribute is a mandatory attribute which specifies an alternate text for an
image, if the image cannot be displayed
Set Image Location
• Usually we keep all the images in a separate directory.
• So let's keep HTML file test.htm in our home directory and create a subdirectory
images inside the home directory where we will keep our image test.png.

• Example program
• So let's keep HTML file test.htm in our home directory and create a subdirectory
images inside the home directory where we will keep our image test.png.
• Assuming our image location is "image/test.png", try the following example

Page | 73
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

FIG 9.33: Output of set image location

Set Image Width/Height


• User can set image width and height based on the requirement using width and
height attributes.
• User can specify width and height of the image in terms of either pixels or
percentage of its actual size.
• Example program

• Output

Page | 74
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 9.34: Output of set image width/hieght


Set Image Border
• By default image will have a border around it, you can specify border thickness in
terms of pixels using border attribute.
• A thickness of 0 means, no border around the picture.
• Example program

• Output

FIG 9.35: Output of set image border


Set Image Alignment
• By default image will align at the left side of the page, but you can use align
attribute to set it in the center or right.
• Example program

Page | 75
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

• Output

FIG 9.36: Output of set image alignment

Page | 76
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.9 Multimedia

Topic : 9.9.1 Multimedia

Multimedia
• Multimedia is any combination of text, graphics, video, audio and animation in a
distributed format that consumers can interact with using a digital device.

FIG 9.37 : Multimedia


• Multimedia can be thought of as a super medium of sorts, because it represents
the blending together of previously distinct and non-combination, forms of human
expression.
• Multimedia computing has produced a revolution. The multimedia computer
captures all manner of worldly experience and even presents us with worlds of its
own.

Page | 77
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Revolutions displace traditional beliefs and practices. They also create entirely
new activities and products.
• The industrial revolution displaced traditional craftsmanship goods that had been
produced by hand in small shops were now made in factories by machines.
The multimedia revolution is also displacing tradition and ushering in new
products and activities.
• The defining elements of modern multimedia, including its different forms
 Non interactive
 Interactive
 Basic
 Hypermedia
 Adaptive
 Immersive
• The word multimedia comes from the Latin words “mults” which means
numerous a “media” which means middle or center.
• Multimedia, in the general sense, therefore, means “multiple intermediaries”
between the source and sink of information or “multiple means” by which
information is stored, transmitted, presented or perceived.
• The multiple means by which we can perceive information are the following,
 Text (e.g., book chapter, newspaper article)
 Image (e.g., photograph)
 Graphics (e.g., sketch, diagram)
 Sound (e.g., speech, music)
 Video (e.g., TV program, movie clip)
 Animation (e.g., animation clip)

Characteristics of Multimedia
• There is no general consensus on the exact definition of multimedia. Several
definitions have been proposed by authors with varying scopes.

Page | 78
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Multimedia is an interdisciplinary application oriented technology that capitalizes
on the multi-sensory nature of humans.
• The following as important characteristics of a multimedia presentation such as
 Multiple media
 Non linearity
 Scope of interactivity
 Integrity
 Digital Representation
Browser support
• The first web browsers had support for text only, limited to a single font in a
single color.
• Later came browsers with support for colors and fonts, and even support for
pictures.
• The support for sounds, animations, and videos is handled differently by various
browsers. Different types and formats are supported, and some formats requires
extra helper programs (plug-ins) to work.
Multimedia Formats
• Multimedia elements (like sounds or videos) are stored in media files.
• The most common way to discover the type of a file, is to look at the file
extension.
• When a browser sees the file extension .htm or .html, it will treat the file as an
HTML file.
• The .xml extension indicates an XML file, and the .css extension indicates a style
sheet file.
• Pictures are recognized by extensions like .gif, .png and .jpg.
• Multimedia files also have their own formats and different extensions like: .swf,
.wav, .mp3, .mp4, .mpg, .wmv, and .avi.
Common Video Formats
• MP4 is the new and upcoming format for the internet video.
Format File Description

Page | 79
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

MPEG .mpg MPEG. Developed by the Moving Picture Expert Group. The first
.mpeg popular on the web. Used to be supported by all browsers.
AVI .avi AVI (Audio Video Interleave). Developed by Microsoft. Commonly
used in video cameras and TV hardware. Plays well on Windows
computer, but not in web browsers.
WMV .wmv WMV (Windows Media Video). Developed by Microsoft.
Commonly used in video cameras and TV hardware. Plays well
on Windows computer, but not in web browsers.
QuickTime .mov QuickTime. Developed by Apple. Commonly used in video
cameras and TV hardware. Plays well on Apple computers, but
not in web browsers.
RealVideo .rm RealVideo. Developed by Real Media to allow video streaming
.ram with low bandwidths. It is still used for online video and Internet
TV, but does not play in web browsers.
Flash .swf Flash. Developed by Macromedia. Often requires an extra
.flv component (plug-in) to play in web browsers.
Ogg .ogg Theora Ogg. Developed by the Xiph.Org Foundation. Supported
by HTML5.
WebM .webm WebM. Developed by the web giants, Mozilla, Opera, Adobe, and
Google.
MPEG-4 or mp4 MP4. Developed by the Moving Pictures Expert Group. Based on
MP4 QuickTime. Commonly used in newer video cameras and TV
hardware.

FIG 9.38: Common video format


Sound Formats
• MP3 is the newest format for compressed recorded music.
• The term MP3 has become synonymous with digital music.

Format File Description


MIDI .mdi MIDI (Musical Instrument Digital Interface). Main format for all
.midi electronic music devices like synthesizers and PC sound cards.
MIDI files do not contain sound, but digital notes that can be
played by electronics. Plays well on all computers and music
hardware, but not in web browsers.
RealAudio .rm RealAudio. Developed by Real Media to allow streaming of audio
.ram with low bandwidths. Does not play in web browsers.
WMA .wma WMA (Windows Media Audio). Developed by Microsoft.

Page | 80
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Commonly used in music players. Plays well on Windows


computers, but not in web browsers.
AAC .aac AAC (Advanced Audio Coding). Developed by Apple as the
default format for iTunes. Plays well on Apple computers, but not
in web browsers.
WAV .wav WAV. Developed by IBM and Microsoft. Plays well on Windows,
Macintosh, and Linux operating systems.
Ogg .ogg Ogg. Developed by the Xiph.Org Foundation.
MP3 .mp3 MP3 files are actually the sound part of MPEG files. MP3 is the
most popular format for music players. Combines good
compression (small files) with high quality.
MP4 .mp4 MP4 is a video format, but can also be used for audio. MP4 video
is the upcoming video format on the internet. This leads to
automatic support for MP4 audio by all browsers.

FIG 9.39: Sound format

Page | 81
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 9.10 HTML Exercises

Topic : 9.10.1 HTML Exercises

HTML Exercises
• Create a webpage that prints your name to the screen.
• Create a webpage and set its title to "This is a webpage".
• Create a webpage that prints any text of your choosing to the screen, do not
include a head section in the code.
• Print two paragraphs that are both indented using &nbsp; command.
• Print two lists with any information you want. One list should be an ordered list,
the other list should be an unordered list.
• Prints an h1 level heading followed by a horizontal line whose width is 100%.
Below the horizontal line print a paragraph relating to the text in the heading.
• Print some deleted and inserted text of your choosing.
• Display five different images. Skip two lines between each image. Each image
should have a title.

Page | 82
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 9.10 Summary

Topic: Summary

• In this class, we have learn about,


 The concept of HTML page structure.
 The process of HTML Text.
 The basics of HTML links.
 The concept of document tables.
 The process of HTML frames.
 The process of HTML images.
 The process of basic operations of multimedia.

Page | 83
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 9.11 Model Questions

Topic: Model Questions

Model Questions

• Write about the concept of HTML page structure.


• Explain the process of HTML Structure.
• Define the basics of HTML links.
• Define the concept of document tables.
• Write about briefly HTML frames.
• Explain about HTML images.
• Explain the process of basic operations of multimedia.

Page | 84
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1

1. HTML markup language is a set of markup____________.


a) Attributes
b) Sets
c) Groups
d) Tags
2. Tags and test that are not directly displayed on the page are written in
__________section.
a) <html>
b) <head>
c) <title>
d) <body>
3. Which tag inserts a line horizontally on the web page?
a) <hr>
b) <line>
c) <line direction=”horizontal”>
d) <tr>
4. What is the correct HTML tag for inserting a line break?
a) <br>
b) <lb>
c) <break>
d) <newline>
5. A web page displays a picture. What tag was used to display that picture?
a) image
b) picture
c) src
d) img

Answers:
1.b
2.b
3.a
4.a
5.c

Page | 85
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)

1. HTML is a platform independent.


a) True
b) False
2. HTML tags can only be in uppercase.
a) True
b) False
3. To call an image in web page <img image=”test.png” alt=”test image”/> tag is used.
a) True
b) False

Answers:
1.a
2.b
3.a

Page | 86
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
1. HTML: The Complete Reference, Second Edition by Thomas A. Powell.
2. Internet Technology and Web Designer by ISRD Group.
3. Web Technology and Design by C. Xavier.
4. The Complete Reference – Web design by Thomas A. Powell – Tata McGraw
Hill Edition.
5. The Complete Reference – HTML and CSS by Thomas A. Powell – Tata
McGraw hill Edition.
6. Beginning Web Programming with HTML, XHTML and CSS by Jon Duckett.
7. An introduction to HTML and JavaScript for scientists and Engineers by Springer.
8. W3Schools (http://www.w3schools.com/html/)

Page | 87
Course Name : INTERNET TECHNOLOGY AND WEB DESIGN
Module Name: INTERACTIVE TOOLS

TABLE OF CONTENT
UNIT NUMBER 10/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Syllabus

10.1 Objectives
10.2 Interactive Tools
10.2.1 Interactive Tools
10.2.2 Active Server Pages (ASP)
10.2.3 VB Script
10.2.3A VB Script Variables and Constants
10.2.3B VB Script – Loops
10.2.4 Java and Front Page
10.2.5 Java Script
10.2.6 Flash
10.2.6A Working With Flash
10.2.6B Tools in Flash Player
10.2.6C Grouping
10.2.6D Layering
10.3 Summary
10.4 Model Questions
Assessment 1
Assessment 2
References

Page | 2
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.1 Objectives

Objectives
• At the end of the course the student will be able to
 Know about the interactive tools used for creating web page.

• Understand about the Active Server Pages (ASP)

• Know about VB (Visual Basic) Script, VB Script - variables, constants and


loops

• Understand about Java and Java Script

• Know about Flash and its tools

• Know about the grouping and layering in flash

Page | 3
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.1 Interactive Tools

Interactive Tools

• Interactivity tools are used to handle 'Forms', reply to user and interact
with server in view of user demand.

• The example of these tools are

 ASP

 ActiveXControls

 VB Script

 Java

 JavaScript

 Front Page

 Flash

• These tools have the potential to make the web pages really very
impressive.

Page | 4
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.2 Active Server Pages (ASP)

Active Server pages (ASP)

• Active Server Pages (ASP), also known as classic ASP or ASP Classic,
which was Microsoft's first server-side script engine for dynamically-
generated web pages.

• Initially released as an add-on to Internet Information Services (IIS) via


the Windows NT 4.0 option pack, it was subsequently included as a free
component of windows server (since the initial release of windows 2000
server).

• Active Server Pages (ASP) is a web oriented technology for creating


dynamic web pages.

• ASP is a Microsoft technology, and it works by allowing us the


functionality of a programming language.

• User writes programming codes that will generate the HTML for the Web
page dynamically.

• So, whenever a user browses to their web site and requests one of our
ASP pages, the ASP code is processed at that time by a special piece of
software-web server.

• This processing generate the HTML, which is then passed to the


browser and used to create the page itself, on the user's screen.

• Active Server Pages are text files that can contain not only text and
HTML tags as in standard web document but also commands contain
not only text and HTML tags as in standard web document but also
commands written in a scripting language that can be carried out on the
server.

Page | 5
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• All Active Server pages saved with an .asp extension and can be
accessed like standard URLs through a web browser such as Microsoft
Internet explorer or Netscape Navigator.

• The power of ASP lies in two facts

 First, the HTML is not created until the user wants to see the web
page.

 Second it does not care what the browser is being used for.

• To run ASP on a computer following softwares are required.

Requirements Software

In order to write ASP pages Need a text editor or other web


development tools such as Microsoft
Visual Studio 6.

In order to publish the pages Need a web server that supports ASP.
Internet information Server 5.0 is one of
the servers which supports ASP version
3.0 and is installed as part of windows
2000 Operating System.

In order to view and test the pages Need a web browser. It can be any
standard web browser that it available in
the market.

FIG 10.1: Software Requirement to run ASP

• ASP.Net use scripting languages, which are responsible to perform


operations in ASP pages.

• Sample Usage

 Any scripting languages compatible with Microsoft's Active Scripting


standard may be used in ASP.

Page | 6
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 The default scripting language is VB Script.

 Example of "Hello World" in VB Script.

<html>
<body>
<%Response Write “Hello World”%>
</body>
</html>

 Or in a simpler format

<html>
<body>
<%= “Hello World”%>
</body>
</html>

 The above examples print "Hello World" into the body of an HTML
document.

 Here's an example of how to connect to an Access Database.

<%
Set oConn = Server.CreateObject
("ADODB.Connection")
oConn.Open "DRIVER = (Microsoft Access Driver (*, mdb)); DBQ = "& Server MapPath
(DB.mdb")
Set rsUsers = Server.CreateObject ("ADODB.RecordSet")
rsUsers.Open "SELECT *FROM Users", oConn
%>

Page | 7
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.3 VB Script

VB Script

• Visual Basic is a language based on one of the most taught language


“BAISC” when first starting out with computers.

• VB Script is a subset of the Visual Basic for application programming


language for Internet Explorer.

• Visual Basic or VBA (Visual Basic Application) is used to create web


applications.

• JavaScript's syntax is arguably less intuitive and more obtuse than that
of VB Script and tends to be less forgiving of simple “mistakes” such as
case sensitivity.

• VB Script is an untyped language, which means that all variables are


variants and don't have an explicit type (such as integer or string).

• VB Script was introduced by Microsoft way back in 1996 and the first
version was 1.0. The Current Stable version of VB Script is 5.8, which is
available as part of IE8 or Windows 7.

• An example program for VB Script to print text as 'Hello World'.

<html>
<body>
<script language=”vbscript” type=”text/vbscript”>
document.write(“Hello World!”)
</script>
</body>
</html>

Page | 8
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Features of VB Script

• VB Script is a lightweight scripting language, which has a lightning fast


interpreter.

• VB Script, for the most part, is case insensitive. It has a very simple
syntax, easy to learn and to implement.

• Unlike C++ or Java, VB Script is an object-based scripting language and


NOT an Object-Oriented Programming language.

• It uses Component Object Model (COM) in order to access the elements


of the environment in which it is executing.

• Successful execution of VB Script can happen only if it is executed in


Host Environment such as Internet Explorer (IE), Internet Information
Services (IIS) and Windows Scripting Host (WSH).
Uses of VB Script

• The VB Script usage areas are aplenty and not restricted to the below
list.

 VB Script is used as a scripting language in one of the popular


Automation testing tools – Quick Test Professional abbreviated as
QTP.

 Windows Scripting Host, which is used mostly by Windows System


administrators for automating the Windows Desktop.

 Active Server Pages (ASP), a server side scripting environment for


creating dynamic web pages which uses VB Script or Java Script.

 VB Script is used for Client side scripting in Microsoft Internet


Explorer.

Page | 9
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Microsoft Outlook Forms usually runs on VB Script; however, the
application level programming relies on VBA (Outlook 2000
onwards).
Disadvantages of VB Script

• VB Script is used only by IE Browsers. Other browsers such as Chrome,


Firefox do not Support VB Script. Hence, JavaScript is preferred over
VB Script.

• VB Script has a Limited command line support.

• Since there is no development environment available by default,


debugging is difficult.

Page | 10
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.3A VB Script Variables and Constants

VB Script Variables and Constants

• Variable is a named memory location used to hold a value that can be


changed during the script execution.

• VB Script has only ONE fundamental data type, variant.

• Rules for declaring variables are

 Variable Name must begin with an alphabet.

 Variable names cannot exceed 255 characters.

 Variables should not contain a period (.)

 Variable names should be unique in the declared context.

• To declare variable

 Variables are declared using “dim” keyword. Since there is only one
fundamental data type, all the declared variables are variant by
default. Hence, a user need not mention the type of data during
declaration.

 For example, IntValue can be used as a String, Integer or even


arrays.

Dim Var

 Two or more declarations are separated by comma (,).

Dim Variable1, Variable2

Page | 11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The following example program for to declare variable and assign value
to it.

<!DOCtype html>
<html>
<body>

<%
Dim name
name=”Gupta”
Response.write(“Myname is: “ & name)
%>

</body>
</html>

• Output for above program is shown below

My name is: Gupta

VB Script Constants

• Constant is a named memory location used to hold a value that cannot


be changed during the script execution.

• If a user tries to change a constant value, the Script execution ends up


with an error. Constants are declared the same way the variables are
declared.

Page | 12
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.3B VB Script – Loops

VB Script – Loops

• There may be a situation when user needs to execute a block of code several
number of times.

• In general, statements are executed sequentially. The first statement in a function


is executed first, followed by the second, and so on.

• Programming languages provide various control structures that allow for more
complicated execution paths.

• A loop statement allows user to execute a statement or group of statements


multiple times and following is the general from of a loop statement in VB Script.

FIG 10.2 Working of Loop

• VB Script provides the following types of loops to handle looping requirements.

Page | 13
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Loop Type Description

For loop Executes a sequence of statements


multiple times and abbreviates the code
that manages the loop variable.

For...each loop This is executed if there is at least one


element in group and reiterated for each
element in a group

While...wend loop This tests the condition before executing


the loop body.

do...while loops The do...While statements will be executed


as long as condition is True. (I.e..,) The
loop should be repeated till the condition is
False.

do...until loops The do...Until statements will be executed


as long as condition is False. (i.e.,) The
Loop should be repeated till the condition
is True.

FIG 10.3: Loop types and its description

• The following example shows the For loop execution.

Page | 14
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

<!DOCTYPE html>
<html>
<body>
<%
For i = 0 to 5
response.write(“The number is “& I & “ <br>
“)
Next
%>

</body>
</html>

• The output for above script is shown below

The number is 0
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5

Page | 15
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.4 Java and Front Page

Java and Front Page

• Java is an advanced, standardized, object-oriented programming


language that can be used for many applications, not just web pages.

• Java has a unique quality, however that has made it particularly useful
for web pages.

 Programs written in java can run without modification on a broad


variety of computers (platforms) (I.e.) java is multiplatform or
platform-neutral.

• It can be used to create animated web pages that interact with the user
or pages that use the screen in unexpected ways.

• Java is a programming language originally developed by James Costing


at SUN MICROSYSTEMS and released in 1995 as a core component of
Sun Microsystems Java Platform.

• The language drives much of its syntax from C and C++ but has a
simpler object model and fever low level facilities.

• Java applications are typically compiled to byte code (class file) that can
run on any Java Virtual Machine (JVM) regardless of computer
architecture.

Primary Goals

• There are five primary goals in the creation of the Java language

 It should be “Simple, Object Oriented and familiar”.

 It should be “robust and secure”.

 It should be “architecture neutral and portable”.

Page | 16
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 It should execute with “high performance”.

 It should be “interpreted, threaded and dynamic”.

Java Features

Applet

• Java applets are programs that are embedded in other applications,


typically in a web page displayed in a web browser.

Servlet

• Java Servlet technology provides web developers with a simple,


consistent mechanism for extending the functionality of a web server
and for accessing existing business systems.

• Servlets are server-side JavaEE components that generate responses


(typically HTML pages) to requests (typically HTML pages) from clients.

• A servlet can almost be through of as an applet that runs on the server


side-without a face.

Java Server Page

• JSPs are Server-side JavaEE components that generate responses,


typically HTML pages, to HTTP requests from clients.

• JSP's embed Java code in an HTML page by using the special


delimiters <% and %>.

• A JSP is compiled to a Java Servlet, a Java application in its own right,


the first time it is accessed. After that, the generated servlet creates the
response.

Swing Application

• Swing is a graphical user interface library for the Java SE platform. It is


possible to specify a different look and feel through the pluggable look
and feel system of swing.

Page | 17
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Java program on the web can do everything as scripting language like
JavaScript can do and can generally do it faster.

• Java usually runs faster because the programs that are attached to Web
pages are in binary form (machine-readable form).

• Java is more useful as it is designed to work across the Internet (and


across networks in general).

• Java programs can use Internet services such as e-mail, file transfer
and telnet, as well as web services to interact with programs around the
world.

What are Java Applets?

• A Java Applet is small program written in the Java programming


language.

• Applets are contained in separate binary files called class files that must
be downloaded to their browser in additional to the HTML Web
pages.(Sometimes, the applet relies in turn on other binary files, called
library class files, that must also be downloaded.)

• Special instructions in the HTML code of the Web page file (the
<APPLET>) associate applet files with the Web page, and transmit data
to the applet that tells it how to operate.

How to get Applets?

• To write a Java applet, user must have good programming skills and
understand how to use a compiled object-oriented language.

• User also need same sorts of special tools that developers in other
sophisticated languages like C or C++ require: compilers, linkers,
libraries, debuggers, documentations and the like.

Page | 18
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The original collections of tools for this purpose is called the Java
Development Kit (by Sun Microsystems, who pioneered the Java
language) and is available at http://java.sun.com.

How to Use Applets?

• To use an applet with their webpage, user must add tags to their web
page and place the class file (the applet file) on their usually in the same
directory as their web page.

• Following is an example of one way the code is often written, using the
<APPLET> and </APPLET> tags.

• The example uses a hypothetical applet called sitemap. Class that


creates a graphical image displaying a table of contents (“site map”) for
their Web site.

<APPLET CODE=”sitemap.class” WIDTH=”400” HEIGHT=”400”>

<PARAM NAME=”bicolor” VALUE=”white”>

<PARAM NAME =”font” VALUE = “medium | bold”>

<PARAM NAME = “url” VALUE= “http://yoursite.com/”>

</APPLET>

Front Page

• FrontPage is a web page editor from Microsoft. It is a stand-alone


application that user can purchase separately.

Page | 19
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• FrontPage has many more features than FrontPage express. It allows to
view and manage the overall structure of their websites and create web
pages.

• A web site is a collection of related files that are linked together to form
an information unit that user can publish on web.

• FrontPage is their web navigation center, the place where users starts
and finish their work on the web.

• FrontPage web is simply a web site that was created in or is maintained


with FrontPage.

• When user construct a web site they can create individual web pages
and string them together with links so that visitors can easily jump from
pages to pages.

• FrontPage simplifies the process with built in website templates and


wizards.

FrontPage solution to web publishing

• User can create a web site from scratch using any text editor. The web
smart components of FrontPage 2000 that make the task easier for
users are

 Server Extension

 Add-on programs for web server software that make the server
FrontPage aware and able to interact more closely with FrontPage
webs.

 FrontPage View

 The different views of web that allow user to add, remove and
rename resources, keep all the hyperlinks upto date, edit web
pages in a powerful yet easy to use HTML editor are

 Page view – Reports view

Page | 20
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Navigation view – Hyperlink view

 Tasks view – Folder view

 Image Composer

 It is an Image editor that lets user to create, modify or import


images for any web site.

Page | 21
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.5 Java Script

Java Script

• JavaScript is a scripting language used to enable programmatic access


to objects within other applications.

• It is primarily used in the form of client-side JavaScript for the


development of dynamic websites.

• JavaScript, despite the name is essentially unrelated to the Java


Programming language even though the two do have superficial
similarities.

• JavaScript copies many Java names and naming connections.

• The following example shows the standards-confirming web page


containing JavaScript (using HTML syntax).

<html>
<head>
<title> Simple page </title>
</head>
<body>
<Script type = “text/JavaScript”>
document.write (“Hello World!!”);
</Script>
<noscript>
<P>Your browser either doesnot support
JavaScript,
or user have JavaScript turned off. </P>
</noscript>
</body>
</html>

Page | 22
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.6 Flash

Flash

• Flash Player is multimedia software that allows user to view interactive


content and applications on the web.

• Flash player software is used for creating vector graphics, animation,


games and rich internet applications (RIAs) that can be viewed, played
and executed.

• Flash is frequently used to add, streamed, video or audio players,


advertisement and interactive multimedia content to web pages,
although usage of Flash on websites is declining.

• Flash manipulates vector and raster graphics to provide animation of


text, drawings and still images.

• It allows bidirectional streaming of audio, video and it can capture user


input via mouse, keyboard, microphone and camera.

• Flash applications and animations can be programmed using the object-


oriented language called Action Script.

• Flash professional is the most popular authoring tool for creating the
Flash content, which also allows automation via the JavaScript Flash
language (JSFL).

• Flash player makes the Flash content accessible on various computer


systems, devices and is available free of charge for common web
browsers under a few of the major operating systems, some smart
phones and tablets and a few other electronic devices using Flash Lite.

• There are many options in Flash player some of them are

 Creating graphics

Page | 23
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Working with layers

 Adding motions, sound and text

Page | 24
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.6A Working With Flash

Working with Flash


Getting Started

• To begin, open Flash Professional 8. User will be presented with the


screen as shown in the following figure.

FIG 10.4 : Flash opening page

• Click Flash Document. The screen will appear like this.

Page | 25
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 10.5: Empty Flash First Page

• The upper left corner of the screen displays the Tools palette, which
contains tools that user can use to create or modify graphics and text.

• User can select a tool by clicking on it. Tool modifiers for the selected
tool display below the Tools palette. User can use modifiers to set tool
options.

• The Timeline appears in the upper portion of the screen. User can use
the Timeline to lay out the sequence of their move.

• The Stage displays in the center of the screen. User can create their
movie on the Stage.
The Grid

• While creating graphics, the grid is often helpful. To turn on the grid

 Choose view → Grid → Edit Grid from the menu. The Grid dialog box
opens.

Page | 26
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 10.6: The Grid Dialog box

 Click the Color box and select gray to have the grid lines display in
gray

 Choose Show Grid to cause the grid to display.

 Choose Snap to Grid to cause the edges of your graphic to align with
the grid lines.

 Set the Horizontal field to 20px to separate horizontal lines by 20


pixels.

 Set the Vertical field to 20px to separate vertical lines by 20 pixels.

 Set the Snap Accuracy to Normal.

 Click OK.
The Property Inspector

• In the Property inspector, user can set the attributes of objects as their
need. User will use the Property inspector frequently when working in
Flash Professional 8. To open the Property inspector:

 Choose Window → Properties → Properties from the menu. The


Property inspector appears at the bottom of the screen.

Page | 27
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 10.7: Collapse Icon

• The Property inspector is one of the panel found in Flash.

• When user is not working in a panel, they can collapse the panel.

• To collapse the Property inspector, click the Collapse icon. To open the
Property inspector again, click the Expand icon.

Page | 28
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.6B Tools in Flash Player

Tools in Flash Player


• The Oval Tool
 The Oval tool is used to draw an ellipse. That will turn the ellipse into
a symbol.

 To draw the ellipse

 Choose the Oval tool. There are two color boxes on the Modifier
panel.

 These color boxes are used to set the stroke and fill colors. The
stroke color outlines their drawing. The fill color fills the center of
their drawing.

FIG 10.8: The Oval Tools

 Click the Stroke Color box and then click the color black to choose
black as their stroke color.

 Click the Fill Color box and then click the color navy to choose
navy as their fill color.

Page | 29
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• User can also set the thickness of the stroke line in the Property
inspector. To set the thickness of the stroke line.

 If the Property inspector is not open, choose Window →


Properties → Properties from the menu. The Property inspector
appears at the bottom of the screen.

FIG 10.9: Property Inspector

 Choose Solid from the drop-down menu to select the type of line
that will outline their drawing.

 Type 3 in the Stroke Height field to set the line thickness.

 Click on the Stage and drag diagonally to draw the ellipse.

FIG 10.10 : Oval Shape

• The Pencil Tool

• The Pencil tool is to draw freehand shapes. To use pencil tool

 Choose View → Grid → Edit Grid from the menu.

 Deselect Snap to Grid.

 Click OK.

 Choose the Pencil tool.

Page | 30
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 10.11: Pencil Tool

 Click the Stroke color box and choose brown as the stroke color.

 Click the Fill color box and choose brown as the fill color.

 On the Modifier panel, if Object Drawing is selected, deselect


Object Drawing.

 On the Modifier panel, choose the Smooth option. This option


rounds the corners of their drawing.

FIG 10.12: Smooth option in Pencil tool

 For example, to draw the tree trunk. Make sure the starting point
and the ending point connect.

Page | 31
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 10.13: Example figure

 Choose the Paint Bucket tool. User can use the Paint Bucket tool
to fill enclosed areas with color.

FIG 10.14: Paint Bucket Tool

 Click inside the trunk to fill the trunk with color.

FIG 10.15: Example figure with color

Page | 32
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.6C Grouping

Grouping

• Grouping option is used to group two objects. User can also turn that
grouped object into a symbol.

 For example, choose the selection tool.

 Use the Selection tool to create a rectangle around the tree. This
selects the tree.

 Choose Modify → Group from the menu to make the treetop and the
tree trunk a single object.

 Choose Modify → Convert to Symbol from the menu. The Symbol


Properties box will open.

 Type Tree in the Name field.

 Choose Graphic as the Behavior type.

 Click OK. The tree now appears in the Library.

 Press the Delete key to remove the tree from the Stage.

Page | 33
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 10.16: Complete Image after Grouping

Page | 34
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.2 Interactive Tools

Topic : 10.2.6D Layering

Layering

• Layer is like a transparent sheet on which user can paints on it.

• User can see through each layer to the layers under it until they add
color. User can also add layers, delete layers, and change the position
of layers.

• Each layer is independent of all other layers. The layer that user are
currently working on is called the active layer. They can view layer
information on the Timeline.

• To renaming a Layer

 Click the layer to rename.

FIG 10.17: Renaming a layer

 Choose Modify → Timeline → Layer Properties from the menu. The


Layer Properties dialog box opens.

 Type layer name in the name field.

 Click OK.

• To add new layers

 For example, to create a new layer for the sky.

Page | 35
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 Choose Insert → Timeline → Layer from the menu to create a new
layer above the active layer.

 Choose Modify → Timeline → Layer Properties from the menu.


The Layer Properties dialog box opens.

 Type Sky in the Name field.

 Click OK.

 To create the Sky

 Make sure Sky is the active layer. When a layer is active, it is


highlighted and there is a pencil icon on the layer. User can click
on the layer name to make a layer active.

 Move to the Library panel. If the Library panel is not open, choose
Window → Library from the menu to open the Library.

 Click the icon next to Sky and drag a copy of Sky onto the Stage.

FIG 10.18: To add new layer

Page | 36
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

FIG 10.19: After adding new layer as sky

Page | 37
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.3 Summary

Topic : Summary

Summary

 In this class, user have learnt about

• The interactive tools used for creating web page.

• The Active Server Pages (ASP)

• VB Script, VB Script variables, constants and loops

• Java and Java Script

• Flash and its tools

• Grouping and layering in flash

Page | 38
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter : 10.4 Model Questions

Topic : Model Questions

Model Questions
 Describe interactive tools used to create web pages.

 Explain about ASP and its usage.

 What is VB Script and explain its variable, constants and loops with example.

 Design a webpage using JavaScript

 What are tools present in Flash player?

 Explain how to group two images into a single image in Flash player.

 How to create layers in Flash player?

Page | 39
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Assessment 1
1. Interactivity tools are used to handle ________ reply to user and interact with
server in view of user demand.
a) Forms
b) Sets
c) Groups
d) Tags
2. ____________ are a web oriented technology for creating dynamic web pages.
a) SAP
b) ASL
c) ASP
d) URL
3. VB Script is a subset of the Visual Basic for application ________________ for
Internet Explorer.
a) Scripting language
b) Markup language
c) Programming language
d) Object oriented programming language
4. JavaScript is a ____________ age used to enable programmatic access to objects
within other applications.
a) Scripting language
b) Markup language
c) Programming language
d) Object oriented programming language
5. ______________ is like a transparent sheet on which user can paint on it.
a) Groups
b) Layers
c) Grid
d) None of the above

Answers:
1.a
2.c
3.c
4.a
5.b

Page | 40
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)

1. Active Server Pages (ASP) is a web oriented technology for creating dynamic web
pages.
a) True
b) False
2. Visual Basic or VBA (Visual Basic Application) is used to create web portal.
a) True
b) False
3. Java is a programming language originally developed by James Costing at SUN
MICROSYSTEMS.
a) True
b) False

Answers:
1.a
2.b
3.a

Page | 41
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred
 Internet Technology and Web Design by ISRD.

 Micro media Flash 8 by Ellen Finkelstein and Gurdy Leete.

 Microsoft Front Page 2003 by Christian Crunlish, Kate J. Chase.

Page | 42
Course Name : INTERNET TECHNOLOGY AND WEB DESIGN

Module Name : Internet Security Management Concepts,

Information Privacy and Copyright Issues

TABLE OF CONTENT
UNIT NUMBER 11/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus

11.1 Objectives

11.2 Overview of Internet Security

11.2.1 Overview of Internet Security

11.2.2 Aspects and need of security

11.2.3 E-mail threats and Secure E-mail

11.3 Firewall

11.3.1 What is Firewall

11.4 Internet security and Management concepts

11.4.1 Internet security and Management concepts

11.5 Information privacy

11.5.1 Information privacy

11.6 Copyright issues

11.6.1 Copyright issues

11.7 Cryptography

11.7.1 Cryptography

11.8 Summary

11.9 Model Questions

Assessment 1

Assessment 2

References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN

Chapter: 11.1 Objectives

Objectives
• At the end of the course the users will
 Know about the internet security
 Know about Firewall and its types
 Understand about the Internet security management concept
 Know about information privacy
 Understand about the Copyright issues and Cryptography
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.2 Overview of Internet Security

Topic: 11.2.1 Overview of Internet Security

Overview of Internet Security


• Internet is a vast world of several computers in a very large network.
• The three words 'vast', 'several' and 'very large' don't allow us to deny the
importance of security in the field of data communication and networking.
• Internet security is used to protect websites and other electronic files from being
attacked by hackers and viruses.
• Security concerns are in some ways peripheral to normal business working, but
serve to highlight just how important it is that business users feel confident when
using IT systems.
• Simply because cyber criminals know that a successful attack is very profitable
and security will probably always be high on IT systems.
• Thus it means that cyber criminals will always strive hard to find new ways
around IT security and users will consequently need to be continually vigilant.
• In the computer industry, Internet security refers to the techniques for ensuring
the data stored in a computer cannot be read or compromised by any individuals
without authorization.
• Most security measures involve data encryption and passwords.
• When computer connects to a network and begins communicating with others, it
is taking a risk.
• Internet security involves the protection of a computer's internet account and files
from intrusion of an unknown user.
• Basic security measures which involves protection by passwords (a secret word
or phrase giving user access to system or a program), change of file permissions
and back up of computer's data.
• Thus it is clear that whenever decisions are to be made about how to enhance a
system, security will need to be held upper most among its requirements.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.2 Overview of Internet Security

Topic: 11.2.2 Aspects and need of security

Aspects and need of security


• The information security picture is changing and threats are expanding.
• Our business practices are being transformed and many security products are
evolving.
• These changes must be a part of our strategic thinking for the future.
Changing threats and consequences
• The fight is not against ''pranksters'' any more, but well financed and highly
motivated criminals.
• We still must protect against e-mailed viruses, but are now more concerned
about web based malicious software, self-propagating worms, attacks on
vulnerable applications.
Changing business needs
• The primary customers for electronic services are no longer state employees, but
citizens, organizations and business partners.
• To provide these services, user concentrate valued information in large database
linked to applications open to people all over the world.
• User must show close attention to server configuration, application security,
system and application patches, authentication and authorization, malicious
traffic and other things that may not have been big concerns before.
New tools and methods needed
• User still needs to filter out spam and e-mail viruses and install border
protections.
• User must also filter out malicious websites, apply patches quickly, develop
secure applications, lock down desktops, implement secure configurations and
remove unnecessary services from servers, use strong authentication, train
employees, isolate data stored and more.
Vendor products, services and pricing are changing
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• There is a trend toward bundling security tools and requiring purchase of the
bundle.
• Vendors are providing discounts when only their products are used, even when it
is contrary to best practice, example, using two different antivirus vendor's
products.
• Products which used for long years are no longer top performers.
• As product lines expand, support seems to decline and vendors push for long
term contracts to lock customers in.
• There is little price competition, except with a large volume purchase.
• Vendors are getting better at identifying threats and quickly updating their
products to stop them.
• Usually no clear best product or company surfaces and stays at the top.
• Core security products are becoming commodities with many customers
changing products regularly, rather than staying with the same product year after
year.
Security needs to be strategic
• Security is not an extra cost add-on.
• It must become part of the core service-delivery requirements.
• Expecting all agencies to learn about choose, implement, manage and maintain
new security measures independently is inefficient and costly.
• User need to develop long-term strategies that accomplish goals and then figure
out how to achieve them.
• Working collaboratively and strategically user can improve security, reduce
workloads and save money.
• It may allow us to take advantage of opportunities that user cannot individually.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.2 Overview of Internet Security

Topic: 11.2.3 E-mail threats and Secure E-mail

E-mail threats and Secure E-mail


• E-mail when sent across the internet is more like a post card.
• It can be intercepted at any stage and read by anybody who can lay his hands on
it.
• To ensure the secrecy of the message, the sender as well as the receiver should
agree on the secret key.
• There starts the problems, if user's intended recipient is in faraway country, then
user have to distribute the key first to him before user can send him the
message.
• And it presents a logistical problem, Public key cryptography was designed to
overcome this problem through what is known as public key private key pair.
• Another way to ensuring the secrecy of the e-mail messages is through the use of
a technique called singing a message.
Web security and Privacy concepts
• The control panel of our system provides us with 'Internet options' where we can
set the level of privacy and security of our web browsers.
• Using 'security options', user can block certain unwanted and unsecure sites.
• Using 'privacy option', user can select the zone for blocking cookies as per the
requirements.
What are cookies?
• The term “cookie” is derived “magic cookie”, a well-known concept in UNIX
computing.
• In simple computing terms a cookie is a small string of text stored on a user's
computer by a web browser.
• Cookie is a message given to a web browser by a web server which is stored by
the browser in a text file.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The message is then sent back to the server each time the browser request a
page from the server.
• The main purpose of cookies is to identify users and possibly prepare customized
web pages for them.
• Websites use cookies for different reasons:
 To collect demographic information about who is visiting the web site.
 To personalize the user's experience on the web site cookies help to store
personal information about you so that when you return to the site you have a
more personalized experience.
 To monitor advertisements.
• Thus cookies are text files that can be deleted at any time.
• They cannot be used to spread virus and can't access your hard drive.
• Cookies do not act maliciously on computer systems.
The Simple Network Management Protocol
• The simple network management protocol is a frame work for managing devices
in an internet using the TCP/IP protocol suite.
• It provides a set of fundamental operations for monitoring and maintaining on
internet.
• The SNMP uses the concept of a manager and agent.
• A manager is a host that runs the SNMP client program.
• A manager is a host that runs the SNMP server program.
• Management is done through simple interaction between manager and agent.
• The agent keeps performance information in a database.
• The manager has access to value in the database.
• SNMP is an application level protocol in which a few manager stations control a
set of agents.
• The protocol is designed at the application level so that it can monitor devices
made by different manufacturers and installed on different physical networks.
• SNMP frees the management tasks from both the physical characteristics of the
managed devices and underlying networking technology.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Management with SNMP is based on three basic ideas:
 A manager checks an agent by requesting information that reflects the
behavior of the agent.
 A manager forces an agent to perform a task by resulting values in agent
database.
 An agent contributes to the management process by warning the manager of
an unusual situation.
Role of SNMP
• SNMP has some very specific roles in network management.
• It defines the format of the packet to be sent from a manager to an agent.
• It also interprets the result and creates statistics.
• The packets exchanged contain the object variable names and their status
(values) SNMP is responsible for reading and changing these values.
VPN
• Virtual private network allows a computer to connect to a corporate LAN over the
internet.
• Virtual private network is an extremely important technology that is in wide spread
use.
• A VPN is carried over a shared or public network which is almost always the
internet and encrypts the message so that only the VPN client and server can
access it.
• The cost of VPN connections are much less than dedicated connections such as
WAN technologies because they take advantage of the art efficiency of the
Internet without compromising security.
VPN Connections
• These connections are used in two important ways:
 To establish WAN connection using VPN technology between two distant
networks that may be thousands of miles apart, but where each has some
way of accessing the internet.
 To establish remote access connections that enable remote users to access a
private network through a public network like the internet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 VPN’s support WAN connection in the same way as they support a remote
access connection.
VPN Protocols
• VPN connection must be connected to the internet using point-to-point protocols.
• Both sides must have a networking protocol in common.
• This protocol is usually IP, but can also be IPX, Net BEUI, or Apple talk.
• Both sides must set up a tunnel through their existing PPP connections, through
which their data packets will pass.
• The tunnel is formed using a tunneling protocol.
• The three important tunneling protocols used for VPN’s are point-to-point
tunneling protocol, Layer2 Tunneling Protocol and Internet Protocol Security.
• VPN Client
• VPN connection of both sides must be running compatible VPN software
compatible protocols.
• For a remote access VPN solution, the software you install depends on the VPN
itself.
• Dedicated VPN solutions also sell client software that you can distribute to users.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.3 Firewall

Topic: 11.3.1 What is Firewall

What is Firewall
• A computer network is a collection of autonomous computing devices sharing
data communications technology that enables them to exchange information.
• An internetwork is a set of individual networks, interconnected by the appropriate
devices, in such a way that they can behave as a single larger network.
• These definitions are built around the ideas of providing connectivity and making
information exchange possible, two goals achieved with undoubted success.
• Internetworking has definitely changed the way people live, learn, play and work.
• This is poetic and appealing but it is always important to remember that the
Internet also brings to the scene dangerous features such as anonymity, the
ability to remotely control computers, and automated task execution.
• There should be some means to compensate for the absence of natural
boundaries in the Internet.
• Within the realm of computer networks, a firewall is a security system that lends
itself to the task of isolating areas of the network and delimiting domains of trust.
• Building upon this initial state of isolation created by the firewall, access control
policies that specify the traffic types entitled to go from one domain to another
can be defined.
• The firewall act as a sort of conditional gateway.
• The criteria to permit traffic normally defined in the firewall policy and ideally,
should relate to what is stated in the security policy of the organization.
• FIG 11.1 depicts a simple scenario in which there is a firewall controlling access
from clients on the trusted domain to servers on the untrusted domain
 The enforced conditions corresponding to the question "Does my access
control policy allow...?" depends on the specific category of the firewall in
place.
 Each domain of trust can include one or more networks.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 A firewall is only capable of controlling traffic that passes through it.
 This implies that clear knowledge about the location of clients and servers in
the network is needed before beginning policy definition.

FIG 11.1 :Firewall and Security Domains


E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.4 Internet security and Management concepts

Topic: 11.4.1 Internet security and Management concepts

Internet security and Management concepts


• In internet, as you know that we are basically connecting our computer system to
another computer system.
• There is every likelihood that while doing this, some unauthorized person can also
get into it and access data.
• Manipulating security becomes more important when we use computer as
commercial transaction.
• User need to make sure that message are private and financial transactions are
secure.
Authentication
• It is the process of determining identify of a user who is attempting to access a
system.
• Also for security purpose, the verification and identify of a person or process is
necessary.
• Thus, it is the verification of the user's claim of identity by passwords, personal
challenge, response calculation or random password generator.
Authentication methods
• There are two primary models for token based user authentication systems.
 One time password systems: The user token displays a “current password”
which the user enters in any context that would require a conventional
password.
 The server system can calculate the password on demand and verify the
authentication request.
 Challenge/ Response systems: The user first receives a challenge generated
by the authentication server.
 The challenge is then copied by the user into his token.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 The token then calculate and displays a response which depends on the
challenge.
 The user then copies this response back into the application prompting for
authentication information.
• The server system calculates the expected response and compares with the
response submitted by the user.
• Since challenges are generated random by the server, attacks associated with
replaying authentication information are an issue for well-designed system.
• As the result, the server does not need to retain the information regarding which
“passwords” have been used.
• Some of the authentication methods are given in the following subsections.
Passwords
• Passwords are the most common form of computer security.
• Some networks require multiple level of passwords to gain access to various
servers or databases.
Callback
• Call is a security feature that works like when a user dials into a communication
server and enters the user name and password.
• The communication server then hangs up the modem connection, searches its
database to authentication the user and then calls the user back at a pre-defined
number.
Packet Filters
• Packet filters allow network administrators to limit a user's access to specific
services on the network.
• For example, a user may allowed to send electronic mail but not copy data files
from the network.
Authentication servers
• They can be set up in variety of ways, depending on the security scheme of the
network they are serving.
• The basic process of authenticating a user includes the following steps:
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
 A user dials into a network through a communication server or Network
Access Server (NAS).
 The NAS forwards the user identification and password to the Authentication
server.
 Then the authentication server validate the user and provides access
privileges to the network.
RADIUS (Remote Authentication Dial-up User Service)
• RADIUS is a system of distributed security that solves the problems associated
with meeting the security requirements of remote computing.
• The solution eliminates the need of hardware and provides access to a variety of
state of the art security solutions.
• Distributed security separates user authenticated data and authorization from the
communications process and creates a single central location for user
authentication data.
• RADIUS is freely available distributed security system developed by Lucent
Technologies.
• RADIUS provides an open and scalable client-server security system.
Authorization
• Authorization is the process of determining how an authenticated user is permitted
to use specific resources.
• An authorization mechanism automatically enforces a management policy
regarding resources object use.
• For example, in a computer system, resources typically includes data files,
operator commands, transaction I/O devices and program process.
• The specific rules for authorizing access to data objects usually enforce
confidentiality and integrity by either granting or denying access to read, modify
or create data records and by controlling the creation or deletion of data objects.
• While authentication control who can access network resources, authorization
says what they can do once they have access the resources.
• Authorization grants privileges to processes and users.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Authorization lets a security administrators control part of a network, for example,
directories and files on servers.
Auditing and Accountability
• Auditing is the process of data collection and analysis that allows administrators
and others, such as IT auditors, to verify that the users and authorization rules
are producing the intended results are defined in a company's business and
security policy.
• Individual accountability for attempts to violate the intended policy depends on
monitoring relevant security events, which initiates the auditing feedback
reporting loop.
• The monitoring process can be implemented as a continuous automatic function,
as an occasional verification that proper procedures are being followed.
• The auditing information may be used by security administrators, internal audit
personnel, external auditors, government regulatory officials and in legal
proceedings.
• To effectively analyze the security of a network and to respond to security
incidents, procedures should be established for collecting network activity data.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.5 Information privacy

Topic: 11.5.1 Information privacy

Information Privacy
• Privacy means the concepts in which the user data files such as stored files, e-
mails, etc. are not seen by any other persons without the user's permission.
• It is a private communication accomplished when the sender and intended
receiver can read the message.
E-mail Privacy
• When you send an e-mail, the message is broken into several packers and each
packet is sent through the Internet.
• Number of packets are dependent of the message. Each packet which is sent
over the Internet has Internet address of the sender and recipient's address.
• Packets of the single message may take different systems. This means the
content of the message and the address of the sender and receiver are
examined by all the systems through which each packet is routed. So, in the
absence of code and protection, e-mail could be very public.
• Most of the system administrators adopt a code under which they will not
examine someone's e-mail.
Electronic Communication Privacy Act
• Electronic Communication Privacy Act passed on 1986 for the privacy of e-mail.
It prohibits anyone to access to access e-mail messages without sender's
permission.
• It also prohibits individual's private accessed by government officer without legal
permission.
• This act allows system administrator to examine e-mail message only when it is
necessary for any operation or the security of the system.

Encryption
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• When you send a message to someone, the message is transmitted in the same
form you have typed it, whether it is illegal for someone to read it not.
• One way to avoid this, use encryption (in which message is sent to the receiver
in some secret code) the message can't be read unless the code and the method
of encryption is known to reader.
• This code is called key. The reader must know the key to decode the message
for reading.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.6 Copyright Issues

Topic: 11.6.1 Copyright Issues

Copyright Issues
• There is a tremendous number of files, document and images available on the
Internet. They can be viewed, saves in a file, print and passed on to others.
• We can create copy of any information which we can find on the Internet only
when it is legal for doing so.
• The right to copy or duplicate materials can be granted only by the owner of the
information. This is called the copyright.
• Many documents or fields on the Internet contain a statement that shows the
document is copyrighted.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.7 Cryptography

Topic: 11.7.1 Cryptography

Cryptography
• The word crypto is derived from the Greek world called Kryptos.

• Cryptography is a method of storing and transmitting data in a particular form so


that only those for whom it is intended can read and process it.
• The term is most often associated with scrambling plaintext (ordinary text,
sometimes referred to as cleartext) into ciphertext (a process called encryption),
then back again (known as decryption).

FIG 11.2: Cryptography Process

Plaintext
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• In cryptography, plain text refers to any message that is not encrypted. Contrast
with cipher text.

Encryption

• Encryption is the conversion of data into a form, called a ciphertext that cannot
be easily understood by unauthorized people.

Decryption

• Decryption is the process of converting encrypted data back into its original form,
so it can be understood.

Ciphertext

• Ciphertext (or Cyphertext) is the result of encryption performed on plaintext using


an algorithm, called a cipher.
Cryptanalysis

• Cryptanalysis refers to the study of ciphers, ciphertext or cryptosystems for


finding the plaintext and/ or key.
• Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text.
Cryptanalysis uses mathematical formulas to search for algorithm vulnerabilities
and break into cryptography or information security systems.
Cryptology

• Cryptology is the study of mathematics, linguistics, and other coding patterns.

Cryptology = Cryptography+Cryptanalysis

• Cryptology as number theory, and its application of formulas and algorithms, that
underpin the cryptography and cryptanalysis.

Encryption
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• Encryption is the process of converting the original data (plaintext) into some
other format using the key called cipher text/secret word system data into a
secret code.
• Encryption is the effective way to achieve data security.
• To read an encrypted file, you must have an access rights to the secret key that
enables you to decrypt it.
• Original data/decrypted data is referred to as plaintext, and Encrypted data is
referred to as cipher text.
• To understand the concept of encryption, refer FIG 1.2.

FIG 11.3: Encryption and Decryption process

Decryption

• Decryption is the reverse process of Encryption that converts the ciphertext into
plaintext information that has been encrypted in secret format.
• Recovering plaintext from ciphertext.
• Decryption requires a secret key to recover information.
• To understand the concept of decryption, refer FIG 11.3.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Ciphers

• Ciphers is a secret system of writing that you/we use to send message.


• It's an algorithm for converting plain text to ciphertext
• In the cipher, data has been encrypted.
• Ciphertext is unreadable until it has been converted into plaintext (decrypted)
with a key.

Key

• A key is a variable/ value that is applied using an algorithm to a string or block of


plain text to produce encrypted text or to decrypt the encrypted text.
• The information (key) used in cipher is known to sender / receiver only.
• The length of the key is a factor in considering how difficult it will be to decrypt
the text in a given message.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 11.8 Summary

Topic: Summary

Summary
• In this class, we have discussed about
 The internet security
 Firewall and its types
 The Internet security management concept
 Information privacy
 Copyright issues and Cryptography
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 11.9 Model Questions

Topic : Model Questions

Model Questions
• What is Internet security?
• Explain about firewalls and its types.
• Explain briefly about the Information security management concepts.
• Write about copyright issues.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 1

1. A ____________ is a message given to a web browser by a web server which is


stored by the browser in a text file.
a) Cache
b) Cookie
c) Temp
d) Hosts
2. ____________ allows a computer to connect to a corporate LAN over the internet.
a) VPN
b) FTP
c) HDN
d) ARP
3. ____________ hides the internal address and network topology of its protected
domain from outside
a) SAN
b) SAT
c) NAT
d) ARP
4. ____________ allow network administrators to limit a user's access to specific
services on the network.
a) Callback
b) Packet address
c) Authentication servers
d) RADIUS
5. ___________ is the conversion of data into a form, called a ciphertext that cannot
be easily understood by unauthorized people.
a) Encryption
b) Decryption
c) Cypertext
d) Plain text

Answers:
1.b
2.a
3.c
4.c
5.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Assessment 2 (True/False)

1. VPN connection must be connected to the internet using point-to-point protocols.


a) True
b) False
2. SNMP is an application level protocol in which a few manager stations control a set
of agents.
a) True
b) False
3. Authentication It is the process of determining identify of a user who is attempting to
access a system.
a) True
b) False

Answers:
1.a
2.a
3.a
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Books Referred

1. Internet & Web Design By Ramesh Bangia


2. Internet technology & Web Design by Tata McGraw-Hill Education

You might also like