0% found this document useful (0 votes)
39 views15 pages

WD - CH 1 Á

Uploaded by

pateljainish136
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
39 views15 pages

WD - CH 1 Á

Uploaded by

pateljainish136
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 15
| e — { EB Basics of www | * World Wide Web(WWW) is a collection of software and Correspong used to access the resources over the network, nding prog : © The world wide web contains huge amount of documents, ima 6% resources which can be accessed using the hyperlinks, Thus ey F through the Web, History of WWW « The Scent of WWW was introduced by Sir Tim Berners-Lee at the Euro Organization for Nuclear Research (CERN), He built » person be ANd oy Use j * In 1990, Berners-Lee introduced the tools such as HyperText Transfer Prot, (HTTP), HyperText Markup Language (HTML) and the web browser. co] * In 1994, the World Wide Web Consortium (W3C) was founded by Bemers-Lee This organisation was built for creating standards and recommendations ., improve the quality of the Web. Berners-Lee made the Web available freely, with no patents. And then at the end of 1994 a large number of websites got activated with popular web services, * During 1996-1998, trade marketing started using WWW. The term E-commerce got introduced during this period only. * During 1999-2000, many entrepreneurs started selling their ideas using the dotcom boom. * From 2002- till date, the WWW has got an evolving nature due to various development such as online-booking, efficient search engines and agent based technologies, Facebook, social networking sites and so on. HTTP Protocol Methods and Headers TEE Hyper TextTransfer Protocol (HTTP) takes part in web browser and web = communication. Hence it is called a communication protocol. The basic feature of HTT TECHNICAL PUBLICATIONS® - An up thrust for knowledge ) = Scanned with CamScanner Web Development 1-3 Introduction protocol is that it follows the request Tesponse model. The client makes a request for desired web page by giving the URL in the address bar. This request is submitted to the web server and then web server gives the response to the web browser by returning the required web page. HTTP Request Message Structure The basic structure of request message is given by following general form -
Let us discuss this structure in detail. Start line The start line consists of three parts which are separated by a single space. These parts are- 1) Request method 2) Request-URI 3) HTTP version Let us discuss them in detail. 1) Request method The method defines the CONNECT method which is used during the web browser and server communication. It is always written in Upper Case letters. The primary method in HTTP is GET. The GET method is used when - 1. You type a URL in address bar. 2. When you click on some hyperlink which is present in the document. 3. When browser downloads images for display within a HTML document, There is another commonly used method and i.e. POST. The POST method is typically used to send an information collected from a user form. Various methods used by HTTP are as given below - TECHNICAL PUBLICATIONS® - An up thrust for knowledge Scanned with CamScanner x i red re de is accepted WS anew subordinate oy the d for operations that have side effects d, For example, transferring Money from, ther has side effects and should Rot be HITP headers in response to xe information sent in Uniform is a stri identify the names & i Resource Identifier(URD is a string used to identify : seinen tere The URLs a combination of URL and URN. The URL 8 if Locator and URN stands for Uniform Resource Name. The denotes the URL and specific name of the place or a person or item denotes the ee rl ase ne ~& ‘URI consists of tv parts, the part before the colon : denotes the scheme 2” n . insensitive but generally a depends upon the scheme. The URIs are case = er and ower case. If the URI is written in the form of http: then it is both an ‘are some other URI which can also be used as URL. For example Scanned with CamScanner eb 3) HTTP version The first HTTP version was HTTP/0.9 but the official version of HTTP was HTTP/1.1 Header Fields and message body The host header filed is associated with the http request. The header fields are in the form of field name and field value. Thus typical structure of http request is given be following example - Startling GETipub WTP 1.1 ‘Hostwww.vtubooks.com ‘accent:texthtml.videorx-mng image/png, image/ipeg acceptlanguage.en-us.en ‘connection ke=p-alive ‘keep-alive'500 ‘contect-length:10 Header fields Blank line Message body Fig. 1.2.1 HTTP request message structure KEREHTTP Response Message Structure ‘The structure of response message is similar to the request message structure. It is as Scanned with CamScanner server side scripting useful for displaying the text [ERI Functions Defined by Web Browser Various functions of web browser are - 1 Reformat the URL and send a valid HITTP request. 2: ‘When user gives the address of particular web site it is in the form of domain name. ‘The web browser coverts the DNS to corresponding IP address. th the Web browser while processing 3. ‘The web browser establishes a connection wi the user's request. 4 ‘The web browsers send the HTTP request to the web server. io The web server processes the HTTP request sent by the web browser and returns the desired web page to the client machine. The web browser on the client’s machine displays this web page in appropriate format. 6. Most of the web browsers automatically store(Cache) the recently visited web pages. This feature is called Cache control. EE Architecture of Web Browser See) The web browser architecture consists of various layers such as Parser/Interpreter Layer, Rendering Engine, Browser Engine, and user interface. The user interface is the top most layer which contains the web browser. The web browser has various menus/tools such as Address bar, Bookmarks, Settings and so on. The user executes web page in the web browser. For executing this web document sometimes the plugins or Add-ons are required. These are supported by the browser engine. The data cache stores the recently referred web documents. At the base of this architecture is the Interpreter/Parser layer. The Rendering Engine submits the web documents to this layer. If the web document is XML document then XML parser parses it. If any error in the script is present then it is highlighted. In this layer the web document is processed for checking its validity. Scanned with CamScanner Web Development 1-14 User interface Browser engine Web documents Rendering engine Javascript interpreter Fig. 1.4.1 Browser architecture Web Site Structure Introduction * The Web site structure can be created by considering major web pages of the website. See Fig. 1.4.2 on next page. Explain the architecture of the browser. In the research phase the design team starts working on the look and feel of the web pages. The technical team gathers and analyses the technology infrastructure of organization. It also find out the limitations and constraints of the intended audience. The design sketches pool the collective knowledge of design team, technical team and information architect. It is a simple design sketch created for the website of E-marketing. The information of particular product can be viewed on the website. For purchasing it, user can add it to cart. Scanned with CamScanner mene) ‘to know about slowing is the Scanned with CamScanner Web Development 1-13 Introduction Step 2: Step 3: transfer protocol which tells the web browser that user wishes to communicate with web server on port 80. Port 80 is reserved for the communication between web server and web browser. The second part is the server address. This tells the web browser which server it needs to contact in order to retrieve the information you are looking for. The web browser communicates with a Domain Name Server (DNS) to find out the IP Address for the website. All communications on the Internet use IP addresses for communications. Using the numeric address for accessing the web server is avoided because it is easier to remember textual information than that of numeric one. Hence normally the web server's addresses are textual. The third part of this address denotes the resource user wants to see. The web browser, having found the IP address it needs by communicating with the name server, then sends a request directly to the web server, using port 80, asking for the file home.aspx. The web server sends the html for this page back to user’s web browser, which reads the HTML tags and formats them for viewing on your screen. If there are additional files needed in order to show the web page (like some images, for example) the web browser makes additional requests for each of these. Request cameras Response ee Web server Web browser / Web client Scanned with CamScanner ‘means it is Scanned with CamScanner Web Development 1-15 Introduction HEEB Functions of Web Server + The primary task of web server is to monitor communications port on the host machine. It accepts the HTTP command using this port and performs the ‘operation specified by the commands. Besides this primary task, web servers support more than one site on computer potentially reducing the cost of each site and making their maintenance more convenient. ‘There is a concept of proxy server intended to provide more services of web server.The proxy server is a server which serves the requests made by the clients by forwarding those requests to the corresponding servers. The proxy servers sometimes can alter the clients’ requests. The proxy servers are mostly used to control, monitor or unbound the network traffic. Some proxy servers cache the requested data. This helps in quick serving of the request when the demand for the previously read data is made. Using Proxy server setting an organization can block certain sites so that controlling of network traffic can be possible. Although web servers were originally designed to support HTTP protocol, there are web servers which support ftp, Gopher, News and mail, protocols. Scanned with CamScanner 3. Integrity 6. Availability -establ the proof of y identified using Mr-PQR and if there comes will get transferred from This will happen 4° called as fabrication Scanned with CamScanner eb Development 1-19 Introduction 2. Confidentiality Another name to confidentiality is secrecy. That means the information sent by the sender should be read by the intended receiver and should not be read by any third party person. The kind of attack due to lack of confidentiality is called interception. 3. Integrity Integrity is a kind of security in which the contents sent by the sender gets changed by some intruder and receiver gets the some different message. For example - If Mrs. XYZ signs the cheque of 1000 and transfer it to Mr.PQR and if Mr.PQR gets an amount of % 10000 then that means contents are modified in between. The attack in which the integrity of message gets lost is called modification. 4. Access Control Access control is a mechanism by which it is determined which contents are accessible to the user and which are not. For example - User may be allowed to view the records from the database but is not allowed to update them. 5. Non-repudiation When sender sends some message and later on refuses that he has sent that message then in such a situation there should some mechanism which will not allow the sender to refuse his sending. Such security mechanism is called non-repudiation. For example : If Mr.XYZ has demanded for the transaction of Rs. 1000 and later on if he refuses about his claim then using non-repudiation mechanism bank can prove falsehoodness of Mr.XYZ. 6. Availability Availability is the security principle by which the contents or the resources will be available to the authentic user for all the time. If some resources are demanded by the authentic user and will not be available to him due to some attack then such attack is called interruption CORS * Cross-Origin Resource Sharing (CORS) is a browser mechanism which allows to share the resources or data present on other site. * Generally access to the resources that are residing in a third party site is restricted by the client side browser for security purpose. TECHNICAL PUBLICATIONS® - An up thrust for knowledge Scanned with CamScanner rorigin resource sh. ¥ oo Scanned with CamScanner Web Development 1-21 Introduction $l Understanding SEO SEO stands for Search Engine Optimization. It is the practice of increasing quantity and quality of traffic to your web site through organic search engine result. Here organic search means a search for which you need not have to pay. SEO is important because itis the practice of optimizing your web pages to make them reach a high position in the search results of Google or other search engines, What are the benefits of SEO? (1) SEO Encourages Local Users to Visit the Physical Store After the Search: For example - if an internet user searches for “Best restaurants in Pune” , then internet shows variety of options. The user will normally prefer the top choices and can become your customer if your restaurant has occupied higher position on the search engine page. (2) SEO builds the brand credibility: Ranking first, second or third may give your customers the idea that you are one of the top players in the industry. It shows that you are popular and many users have researched you, too. (3) SEO helps establish brand awareness: Brand Awareness is the extent to which the target market recognizes a brand. This refers to how familiar your customers are with your product or service. (@) SEO helps you gain market share: Being on top of the search list means a high tendency for your website to be found by Internet users. These users are now considered as your leads. Once they have found their required information from Your website, these leads may turn into your customers. (9) SEO helps you to create all marketing activities online: All of your marketing Strategies conducted online will contribute to the success of your search engine optimization efforts. Marketing activities such as content marketing, direct €mail, social media marketing, blogging, web management, e-commerce, and others will help you get better rankings on several search engine sites. How SEO Works? * SEO works by demonstrating the search engines that your contents is the best result of user queries, * Search Engine Optimization technique is mainly for optimizing the Google search Engine. Google uses more than 200 ranking factors. It is a good idea to have a knowledge about most commonly used ranking factors. Let us discuss some of — Scanned with CamScanner | ae a St” (1) Crawlability # Google uses several ways to discover new’ eer ee wed) but the 5, Cn method is crawling, Basically crawling is where Google follows links on the To do this, they use a computer program called a spider. © Let us say that your homepage has a backlink oe a website that is alreag Google's index. Next time they craw! that site, they will follow that link to disc, your website's homepage and likely add it to their index. © From there, they will crawl the links on your homepage to find other pages o,, ‘ site. * Hence to adopt SEO, Google's crawler should not get blocked because of i) poor internal ranking ii) no properly followed internal links among web Pages, your website iii) no index pages. Pag, (2) Mobile Friendliness Most of the searches to Google come from mobile devices. Hence Google has starts; mobile version of your page for indexing and ranking. Pages that aren’t optimized fo, mobile lead to dissatisfaction. Hence it is necessary to have your web pages being mobil: friendly. (3) Page Speed Page speed means how fast your page loads. It is a ranking factor on desktop and mobile. If the user clicks on your page displayed as a search result and if it takes too long to load, then that certainly leads to dissatisfaction. Therefore it is necessary to check the Page speed of your web site and keep it improving. (4) Content Quality © Google wants to rank the most reliable and useful results - always. * To do this, they look at content-related signals like expertise, authoritativeness. 2"! trustworthiness. * To adopt SEO the quality of the contents of your web Page must be full proof 1. What is SEO ? What are the benefits of it 2 2. Explain the working of SEO. Scanned with CamScanner

You might also like