0% found this document useful (0 votes)
71 views15 pages

ASSIGNMENT

This document provides an introduction and overview of web servers and related topics for an open course assignment. It includes sections on personal web servers like IIS and Apache, how to install them, benefits of web servers, and introductions to security and identifying network stations. The submission is from a fifth semester B Com student for their Commerce with Computer Applications course.

Uploaded by

RAI SHORTS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views15 pages

ASSIGNMENT

This document provides an introduction and overview of web servers and related topics for an open course assignment. It includes sections on personal web servers like IIS and Apache, how to install them, benefits of web servers, and introductions to security and identifying network stations. The submission is from a fifth semester B Com student for their Commerce with Computer Applications course.

Uploaded by

RAI SHORTS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

1

ASSIGNMENT
SUBJECT: OPEN COURSE
TOPIC: INTRODUCTION TO WEB
SERVER

FROM: RAIYAN.S
ROLLNO: 29
B COM FIFTH SEMESTER
COMMERCE WITH COMPUTER
APPLICATION
TO: RAMZANA TEACHER
DATE OF SUBMISSION: 28/11/2022
2

UNIVERSITY INSTITUTION OF
TECHNOLOGY YEROOR

CONTENT
1. INTODUCTION TO WEBSERVER
2. INTRODUCTION TO PERSONAL
WEBSERVER & HOW TO INSTALL
3. INTRODUCTION TO INTERNET
INFORMATION SERVER & HOW
TO INSTALL
4. INTRODUCTION TO AOACHE WEB
SERVER & HOW TO INSTALL
APACHE WEBSERVER
5. BENEFITS OF WEBSERVER
6. INTRODUCTION TO SECURITY
3

7. INTERNET SECURITY
8. IDENTIFYING NETWORK
STATIONS

Introduction to Web Servers

A web server can be referred to as either the hardware (the


computer) or the software (the computer application) that
helps to deliver content that can be accessed through the
Internet. A web server is what makes it possible to be able to
access content like web pages or other data from anywhere as
long as it is connected to the internet. The hardware houses the
content, while the software makes the content accessible
through the internet. The most common use of web servers is
to host websites but there are other uses like data storage or
for running enterprise applications. There are also different
ways to request content from a web server. The most common
request is the Hypertext Transfer Protocol (HTTP), but there are
also other requests like the Internet Message Access Protocol
(IMAP) or the File Transfer Protocol (FTP).
4

Introduction to Personal Web Server


(PWS)

Personal Web Server is an abbreviation for Personal Web


Server, is Microsoft’s version of a Web server program for
individual PC users who want to share Web pages and other
files from their hard drive. PWS is a scaled-down version of
Microsoft’s more robust Web server, Internet Information
Server IIS. PWS can be used with a full-time Internet connection
to serve Web pages for a Web site with limited traffic. It can
also be used for testing a Web site offline or from a “staging”
site before putting it on a main Web site that is exposed to
larger traffic.
5

PWS can be used together with Microsoft’s FrontPage, a Web


site design product, to upload Web pages from a remote
location or to the local hard drive; to check for dead links; to
create directories; and to set permissions. PWS is frequently
used as part of the trend toward peer-to-peer exchange and
publishing.

HOW TO INSTALL PERSONAL WEB


SERVER (PWS)

There are two places you can get PWS, both of which are free. The Windows 98
CD includes it, and you can download it from the Microsoft web site. Downloading
from Microsoft.com

If you don’t have the windows 98 CD, you


can download the NT4 option Pack which, believe it or not, contains personal
Web Server for Windows 95 and 98. Be Aware that the download is 34mb, which
will take nearly 3 hours to download with a 28.8 modem.

To start the download, follow these steps:

1. Go to the microsoft.com web site.

2. Follow the instructions on the web site, choosing Windows 95 as the operating
system even if you're running on Windows 98.

3. After the download, the installation starts.

To install Microsoft Personal Web Server:


6

1. Insert your Windows 98 CD-ROM in your CD- ROM drive.

2. Click Start, and then click Run.

3. In the Open box, type the following path to the Setup.exe file, where x is the
letter of your CD- ROM drive: x:\add-ons\pws\setup.exe

4. Click OK.

5. Follow the instructions in Personal Web Server Setup.

INTRODUCTION TO INTERNET
INFORMATION SERVER (IIS)
Internet Information Server (IIS)
Internet Information Server is a web server application and set of feature
extension modules created by Microsoft for use with Microsoft Windows. It is the
most used web server after Apache HTTP Server. IIS 7.5 supports HTTP, HTTPS,
FTP, FTPS, SMTP and NNTP. It is an integral part of Windows Server family of
products, as well as all editions of Windows Vista and Windows 7, although some
features are not supported on client versions of Windows. IIS is not turned on by
default when Windows is installed.

Versions
 IIS 1.0, Windows NT 3.51 available as a free add- on

 IIS 2.0, Windows NT 4.0

 IIS 3.0, Windows NT 4.0 Service Pack 3 IIS 4.0, Windows NT 4.0

 Option Pack IIS 5.0, Windows 2000 IIS 5.1, Windows XP Professional and
Windows XP Media Center Edition
7

 (Requires retail CD) IIS 6.0, Windows Server 2003 and Windows XP Professional
x64 Edition

 IIS 7.0, windows server 2008 and windows Vista (Home premium, Business,
Enterprise and Ultimate editions

 IIS 7.5, Windows Server 2008 R2 and Windows 7

Features of Internet Information Server (IIS)

 HTTP modules – Used to perform tasks specific to HTTP in the request


processing pipeline, such as responding to information and inquiries
sent in client headers, returning HTTP errors, and redirecting requests.

 Security modules – Used to perform tasks related to security in the


request processing pipeline, such as specifying authentication schemes,
performing URL authorization, and filtering requests.

 Content modules – Used to perform tasks related to content in the


request processing pipeline, such as processing requests for static files,
returning a default page when a client does not specify a resource in a
request, and listing the contents of a directory.

 Compression modules – Used to perform tasks related to


compression in the request processing pipeline, such as compressing
responses, applying Gzip compression transfer coding to responses, and
performing pre-compression of static content.
8

 Caching modules – Used to perform tasks related to caching in the


request processing pipeline, such as storing processed information in.

 Logging and Diagnostics modules – Used to perform tasks related to


logging and diagnostics in the request-processing pipeline, such as
passing information and processing status to HTTP.sys for logging,
reporting events, and tracking requests currently executing in worker
processes.

HOW TO INSTALL INTERNET INFORMATION SERVER (IIS)


9
10

INTRODUCTION OF
APACHE WEB SERVER
Apache Web Server
Apache is generally recognized as the world's most popular Web server
(HTTP server). Originally designed for Unix servers, the Apache Web server has been ported to
Windows and other network operating systems (NOS). The name "Apache" derives from the
word "patchy" that the Apache developers used to describe early versions of their software.

The Apache Web server provides a full range of Web server features,
including CGI, SSL, and virtual domains. Apache also supports plug-in modules for extensibility.
Apache is reliable, free, and relatively easy to configure.

Apache is free software distributed by the Apache Software Foundation.


The Apache Software Foundation promotes various free and open source advanced Web
technologies.

FEATURES
 DBM database for authentication.
 Customized response to errors and problems.
 Support for CGI scripting.
 Multiple directory index directives.
 Content negotiation.
 Virtual hosts.

HOW TO INSTALL APACHE WEB SERVER

 Download Apache.
 Run the Apache installer.
 Enabling and disabling the Apache service.
 Changing the server name and administrator email address.
 Configuring Apache to accept Server Slide Includes (SSI).
11

 Save the configuration file and restart Apache.

BENEFITS OF WEB
SERVER

 Easy to deploy, manage and use.


 Virtual Hosting.
 Access control.
 A web server always provides the
opportunity to interact with the hosting
provider.
 Configuration.
 Flexibility.
 Download Capabilities.
 Sharing resources.
12

INTRODUCTION TO SECURITY
The protection of information and information systems from
unauthorized access, use, or disruption.

Security is prevention from harm:-

 Personal security is the protection of a person’s


livelihood.
 Information security (Info Sec) is the protection of
information from being accessed, used, misused,
modified, or destroyed by the wrong people.
 Computer Security (Cyber security) is information
security in the world of digital assets (software,
hardware, communication systems).
 Software Security is the study and application of
writing robust software that is secure.

An information system is secure if users are


unable to force it do things it was not intended to do, such as: divulge
confidential information, modify or erase protected data, slow to a
crawl, or crash.
13

Whether we are securing people, products, or


organizations, security is about asset protection. That which you are
protecting your assets against is called “Treads”.

INTERNET
SECURITY
Internet security is a term that describes security for activities and
transactions made over the internet. It’s a particular component of the
larger ideas of cyber security and computer security, involving topics
including browser security, online behavior and network security.

Types of internet security threats


Malware: Short for "malicious software," malware comes in several forms, including
computer viruses, worms, Trojans, and dishonest spyware.

Computer worm: A computer worm is a software program that copies itself from
one computer to the next. It does not require human interaction to create these
copies and can spread rapidly and in great volume.

Spam: Spam refers to unwanted messages in your email inbox. In some cases, spam
can simply include junk mail that advertises goods or services you aren't interested
in. These are usually considered harmless, but some can include links that will install
malicious software on your computer if they're clicked on.

Phishing: Phishing scams are created by cybercriminals attempting to solicit private


or sensitive information. They can pose as your bank or web service and lure you
into clicking links to verify details like account information or passwords.
14

Botnet: Botnet is a network of private computers that have been compromised.


Infected with malicious software, these computers are controlled by a single user
and are often prompted to engage in nefarious activities, such as sending spam
messages or denial-of-service (DoS) attacks.

IDENTIFIYING NETWORK
STATIONS
In an internet, networks are numbered and, within
each network, each network interface is numbered. Hence, it is possible to
identify each network station (computer) with at least one number which consists
of the network number followed by the interface number. This number is known
as the IP (Internet Protocol) number of the station. Stations which have more
than one network interface will have more than one IP number and have the
potential of forwarding packets of information from one network to another.
Messages are sent from one station to another station using message formats
consisting of a pair of items; (message-header, message-data).

Each message-header contains, among other items, the


IP number of the packet destination as well as the IP number of the packet source.
Packets are sent from one station to another along a route which is determined
network routers. Each router examines the destination address of each packet it
receives and consults a routing table to determine which connected network to
which it should be sent.Occasionally, routers will be so busy they cannot forward a
packet to another network, or there will be errors in the routing tables so that no
route is correct for a packet. In this case, the packet is simply discarded. This type
of delivery of packets is called best effort and is unreliable because packets may be
lost under certain circumstances. This is not a problem because network reliability
depends on higher level conventions, called network protocols, which attempt to
retransmit packets when lost.
15

IP numbers are used to identify internet hosts and must


be entered by users when accessing internet services such as Telnet, FTP, WEB
URL's, etc. Multi-digit numbers are difficult to enter into user interface programs
and recall from memory. Internet developers devised a Domain Name
System (DNS) which consists of a distributed hierarchical database of names which
may be used for most of the IP numbers on the Internet. Internet hosts are grouped
together into domains within an organization and networks are grouped together by
type, educational (EDU), commercial (COM), etc. Finally, the previously
mentioned types of networks are grouped together by country to form the top level
of the DNS database hierarchy. The DNS system automatically converts host
names, which are easier to remember, to actual IP numbers. An example of such
use occurs when you refer to the Apple Computer WEB site using the
URL http://www.apple.com.

You might also like