Web Technology Unit 1 Part 1
Web Technology Unit 1 Part 1
Working of Internet
Although the physical network connections, the hardware communication devices and the
software communication protocols are required for communication across the Internet, the
application software provides useful functionalities.
In a network application, two application programs participate in any communication: one
application initiates communication and the other accepts it. This is known as the Client-Server
interaction. This is the methodology used for internet communication.
Client-Server
Client and Server are two applications involved in communication. These components work
together over a network. It involves the client requesting serve from the server. The Server provides
the requested service.
The typical features of the Client are:
It is front-end of an application.
It manages user-interface portion.
It validates data entered by the user.
It dispatches requests to server program.
The typical features of the Server are:
Performs a back-end task.
Receives requests from clients.
Executes database retrievals and updates.
Manages data integrity.
Dispatches response to clients.
Web Browsers
A Web browser is a software program that is used to access the World Wide Web (WWW).
It allows users to view Web pages and navigate between them.
Examples of Web Browsers are: Mozilla, Microsoft Internet Explorer, Opera, Chrome,
Netscape etc.
Web Browsers are known as Universal Clients because they act as the common Client for all
Web-based applications. They are the Web Clients that request services from a Web Server, which
is located somewhere on the Internet or Intranet.
Working of Server
A server offers one or more Services to clients. By default, it does not do any processing until a client
sends in a request. It waits for a client to make a request. This is known as `listening mode of the server.
A typical client server interaction happens as follows:
1. The client sends a request for a server.
2. On receiving a request, the service assigns one of the threads in the pool to process the
task and continues to wait for further request.
3. The thread executes the code for the requested service.
4. After execution, it sends the response back to the client.
5. It then returns to the thread pool.
Protocol Resource
http://192.168.10.1/download
Page 5
HTTP/1.0 404 Page Not Found
HTTP/1.0 500 Internal Server Error
1XX Indicates informational message only
2XX Indicates success of some kinds.
3XX Redirects the Client to another URL.
4XX Indicates an error on Client's port.
5XX Indicates an error on Server's port
HTTP Response Headers: The Response must contain header line describing the following.
MIME-type of the data being sent in response.
Date and Time stamp.
Content size etc.
The HTTP Response message body contains the required data.
1.2 Web Servers
A Web Server is a server program running on a computer whose purpose is to serve Web
Pages to another computer when required. Every computer on the Internet that contains a Web site
will have a Web Server program.
The most common use of web servers is to host websites, but there are other uses such as
gaming, data storage, running enterprise applications, handling email, FTP, or other web uses.
Many generic web servers also support server-side scripting using Active Server Pages
(ASP), PHP, or other scripting languages. This means that the behavior of the web server can be
scripted in separate files, while the actual server software remains unchanged. Usually, this
function is used to create HTML documents dynamically ("on-the-fly") as opposed to returning
static documents.
Examples of Web Servers:
1. Apache Web Server
2. Microsoft Internet Information Server (IIS)
3. XAMPP (Bundle server)
4. WAMP (Bundle server)
Features:
IIS has a modular architecture. Modules, also called extensions, can be added or removed
individually so that only modules required for specific functionality have to be installed.
Security Module: Used to perform many tasks related to security in the requesting-
processing pipeline (Authentication Scheme, URL authentication)
Content Module: Used to perform tasks related to content in the requesting-processing
pipeline (Such as processing requests for static pages, returning default page etc.,)
Compression Module: Used to perform tasks related to compression in the requesting-
processing pipeline (Such as compression responses, performing pre-compression of static
content.)
Caching Module: Used to perform tasks related to caching in the requesting-processing
pipeline (Such as storing processed information in the memory on the server and using
cached content in subsequent request for the same resource.)
Logging and Diagnostics Module: Used to perform tasks related to Logging and Diagnostics
in the requesting-processing pipeline (Such as passing information and processing status to
HTTP.sys for logging, reporting events, and tracking requests currently executing in worker
processes.)
IIS 7.5 includes additional security features: Client-certificate mapping, IP security, Request
filtering, URL authentication.
And, if you want Bluehost alternatives for web hosting, you can buy from one of the following top
hosting companies.
SiteGround
HostGator
InMotion Hosting
Static Website: In Static Websites, Web pages are returned by the server which are prebuilt source code
files built using simple languages such as HTML, CSS, or JavaScript. There is no processing of content
on the server (according to the user) in Static Websites. Web pages are returned by the server with no
change therefore, static Websites are fast. There is no interaction with databases. Also, they are less costly
as the host does not need to support server-side processing with different languages.
Note: Static does not mean that it will not respond to user actions, These Websites are called static
because these cannot be manipulated on the server or interact with databases (which is the case in
Dynamic Websites).
Dynamic Website: In Dynamic Websites, Web pages are returned by the server which are processed
during runtime means they are not prebuilt web pages but they are built during runtime according to the
user’s demand with the help of server-side scripting languages such as PHP, Node.js, ASP.NET and many
more supported by the server. So, they are slower than static websites but updates and interaction with
databases are possible.
Dynamic Websites are used over Static Websites as updates can be done very easily as compared to static
websites (Where altering in every page is required) but in Dynamic Websites, it is possible to do a
common change once and it will reflect in all the web pages.
Architecture
The above figure shows the basic model of the FTP. The FTP client has three components: the
user interface, control process, and data transfer process. The server has two components: the
server control process and the server data transfer process.
Advantages of FTP:
o Speed: One of the biggest advantages of FTP is speed. The FTP is one of the fastest way to
transfer the files from one computer to another computer.
o Efficient: It is more efficient as we do not need to complete all the operations to get the entire file.
o Security: To access the FTP server, we need to login with the username and password. Therefore,
we can say that FTP is more secure.
o Back & forth movement: FTP allows us to transfer the files back and forth. Suppose you are a
manager of the company, you send some information to all the employees, and they all send
information back on the same server.
Disadvantages of FTP:
o The standard requirement of the industry is that all the FTP transmissions should be encrypted.
However, not all the FTP providers are equal and not all the providers offer encryption. So, we
will have to look out for the FTP providers that provides encryption.
o FTP serves two operations, i.e., to send and receive large files on a network. However, the size
limit of the file is 2GB that can be sent. It also does not allow you to run simultaneous transfers to
multiple receivers.
o Passwords and file contents are sent in clear text that allows unwanted eavesdropping. So, it is
quite possible that attackers can carry out the brute force attack by trying to guess the FTP
password.
o It is not compatible with every system.
SMTP Protocol:
Components of SMTP
o First, we will break the SMTP client and SMTP server into two components such as user agent
(UA) and mail transfer agent (MTA). The user agent (UA) prepares the message, creates the
envelope and then puts the message in the envelope. The mail transfer agent (MTA) transfers this
mail across the internet.
Working of SMTP
1. Composition of Mail: A user sends an e-mail by composing an electronic mail message using a
Mail User Agent (MUA). Mail User Agent is a program which is used to send and receive mail.
The message contains two parts: body and header. The body is the main part of the message while
the header includes information such as the sender and recipient address. The header also includes
descriptive information such as the subject of the message. In this case, the message body is like a
letter and header is like an envelope that contains the recipient's address.
2. Submission of Mail: After composing an email, the mail client then submits the completed e-mail
to the SMTP server by using SMTP on TCP port 25.
3. Delivery of Mail: E-mail addresses contain two parts: username of the recipient and domain name.
For example, [email protected], where "vivek" is the username of the recipient and "gmail.com"
is the domain name.
If the domain name of the recipient's email address is different from the sender's domain name,
then MSA will send the mail to the Mail Transfer Agent (MTA). To relay the email, the MTA will
find the target domain. It checks the MX record from Domain Name System to obtain the target
domain. The MX record contains the domain name and IP address of the recipient's domain. Once
the record is located, MTA connects to the exchange server to relay the message.
4. Receipt and Processing of Mail: Once the incoming message is received, the exchange server
delivers it to the incoming server (Mail Delivery Agent) which stores the e-mail where it waits for
the user to retrieve it.
5. Access and Retrieval of Mail: The stored email in MDA can be retrieved by using MUA (Mail
User Agent). MUA can be accessed by using login and password.
How to develop Web Project?
Phase-I: Strategy
Goals and objectives
Team building
Research and review
Project proposal
Phase-II: Design and specification
Developing concepts
Content planning
Rough design
Final design
Build prototype
Prototype testing
Phase-III: Production or development
Coding
Phase-IV: Testing and maintenance
Automation testing
Manual testing
Phase-V: Register with ISP
Buy domain name
Hosting
Phase-VI: Launch
Internet Services
Internet services provides a way for data to be transferred from internet servers to out computer.
To access/exchange a large amount of data such as software, audio clips, video clips, text files, other
documents, etc., we need internet services. You must use an Internet service to connect to the Internet.
Data can be sent from Internet servers to your machine via Internet service. Some of the commonly used
internet services are:
Communication Services
Information Retrieval Services
File Transfer
World Wide Web Services
Web Services
Directory Services
Automatic Network Address Configuration
Network Management Services
Time Services
Usenet
Newsgroup
Ecommerce