0% found this document useful (0 votes)
26 views

Introduction and Web Development Strategies_pdf

Uploaded by

Deeksha Gangwar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Introduction and Web Development Strategies_pdf

Uploaded by

Deeksha Gangwar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Web Technology

UNIT-1
Introduction and Web Development Strategies:-

 Identify target user: Identify the user of the website by doing market research.
 Make our design portable: To be successful, website design should be portable and accessible
across different browsers, operating systems, and computer platforms. Designers should test the
website in a different environment whether they look same to all their users.
 Design for low bandwidth: Web pages in websites should be accessible at any connection
speeds. If a page is downloaded slowly then users will leave the website before they see the
content.
 Plan for clear presentation and easy access to information: Presentation of the information
on the website must be clear and easily accessible to the user.
 Create smooth transitions: Plan to create a unified look among the sections and pages of site.
Reinforce the identifying elements of the site and create smooth transitions from one page to
another.

History of Web and Internet:-

The World Wide Web is a system of interlinked hypertext documents accessed via the Internet. Web
is a huge collection of pages of information linked to each other around the globe.
History of WWW:

 WWW was created by Sir Tim Berners Lee in 1989 at CERN (European Council for Nuclear
Research,) in Geneva.
 The name CERN is derived from the acronym for the French "Conseil Européen pour la
Recherché Nucléaire",
 In 1990, the first text only browsers were set up and CERN scientists could access hypertext
files and other information at CERN. HTML was based on a subset of the standard generalized
markup language (SGML). To transfer HTML documents to remote sites a new protocol was
devised called HTTP (HyperText Transfer Protocol).
 In the fall of 1991, conferences around the world started hearing about the promise but sparks
still were not flying.
 In 1993, there were only about 50 websites worldwide. A browser that allowed users to take
advantage of the web’s graphical capabilities was developed at the National center for
SuperComputing application (NCSA). NCSA called the browser Mosaic
Introduction to Internet services and tools:-
Internet Services allows us to access huge amount of information such as text, graphics, sound and
software over the internet. Following diagram shows the four different categories of Internet Services.

Communication Services:-

There are various Communication Services available that offer exchange of information with
individuals or groups. The following table gives a brief introduction to these services :

Summary - How does the Internet work?


If we need to conclude this section, we can say that it starts with protocols and finish in architecture.
The most dominant parts are listed in the following section:
● Protocols – standardized rules that define how computers communicate and exchange data
● IP address – unique number used to identify computers on the Internet
● Domain name – structured naming system to locate computers on the Internet
● URL – uniform naming scheme that specifies unique addresses of Internet resources
● Client and server – computing architecture used by most Internet services

Internet Tools:-

 E-Mail
 FTP
 Gopher
 HTML
 HTTP
 TCP/IP
 Telnet

Information Retrieval Services

There exist several Information retrieval services offering easy access to information present on the
internet. The following table gives a brief introduction to these services:
S.N. Service Description

File Transfer Protocol (FTP)


1
Enable the users to transfer files.

Archie
2 It’s updated database of public FTP sites and their content. It helps to search a file by its
name.

Gopher
3
Used to search, retrieve, and display documents on remote sites.

Web Services:-

1. Web services allow exchange of information between applications on the web. Using web services,
applications can easily interact with each other.The web services are offered using the concept
of Utility Computing.
2. Web services are self-contained, modular, distributed, dynamic applications that can be described,
published, located
3. It is a client-server application or application component for communication.
4. The method of communication between two devices over the network.
5. It is a software system for the interoperable machine to machine communication.
6. It is a collection of standards or protocols for exchanging information between two devices or
application.

World Wide Web (WWW):-

WWW is also known as W3. It offers a way to access documents spread over the several servers over
the internet. These documents may contain texts, graphics, audio, video, hyperlinks. The hyperlinks
allow the users to navigate between the documents.
Web Development Phases
The Web development life cycle includes the following phases: planning, analysis, design and
development, testing, and implementation and maintenance.
Web Development Phase
Web development phase Questions

 What is the purpose of the Web site


 Who will use this Web site
 What are their computing environment
Planning
 Who owns and authors the information on the
Web site

 What information is useful to the user


Analysis

 What type of Web site layout is appropriate


Design and
 What forms of multimedia is helpful to the user
development

 Is the Web site content correct


 Does the Website functions correctly
Testing  Are users able to find the information they need
 Is the navigation easy to use?

 How is the Web site published


Implementation  How is the Web site updated
and  Who is responsible for content updates
Maintenance  Will the Web site be monitored

Writing Web Projects:-


Write a project mission statement: Write the specific mission statement that you want to do.
Identify Objectives:

 Specific
 Measurable
 Attainable
 Realistic
 Time limited
Identify your target users: The matter of a website will be determined by the users whom you want
to visit the site. This is totally depend upon

 Market research
 Focus group
 Understanding intranet audiences
Determine the scope: By supporting documents and client’s approval.
Budget:

 Assumption for budgets.


 Budget categories.
 Determine hidden costs and tools.
Planning issues:

 Discuss client’s existing information system.


 Project team and developing infrastructure.
 Where the website will place.

Protocols Governing Web:-

Protocol: A protocol is a set of rules that is used to communicate applications to each other.
OR
A protocol is the interface required for communicating the different applications.
Classifications:-

1 HTTP: HTTP is the primary protocol used to distribute information on the web. This protocol is
used to access, send and receive Hypertext markup language (HTML) files on the Internet .

Advantages of HTTP:-

 HTTP can be implemented with other protocol on the Internet, or on other networks
 HTTP pages are stored on computer and internet caches, so it is quickly accessible
 Platform independent which allows cross-platform porting
 Does not need any Runtime support
 Usable over Firewalls! Global applications are possible
 Not Connection Oriented; so no network overhead to create and maintain session state and
information

Differentiate between HTTP & HTTPS

 HTTP lacks a security mechanism to encrypt the data, whereas HTTPS provides SSL or TLS
Digital Certificate to secure the communication between server and client.
 HTTP operates at the Application Layer, whereas HTTPS operates at Transport Layer.
 HTTP by default operates on port 80, whereas HTTPS by default operates on port 443.
 HTTP transfers data in plain text, while HTTPS transfers data in cipher text (encrypt text).
 HTTP is fast as compared to HTTPS because HTTPS consumes computation power to encrypt
the communication channel.

2. What is HTTPS?
HTTPS stands for Hyper Text Transfer Protocol Secure. It is highly advanced and secure version of
HTTP. It uses the port no. 443 for Data Communication. It allows the secure transactions by
encrypting the entire communication with SSL. It is a combination of SSL/TLS protocol and HTTP. It
provides encrypted and secure identification of a network server.
Limitations of HTTPS

 HTTPS protocol can’t stop stealing confidential information from the pages cached on the
browser
 SSL data can be encrypted only during transmission on the network. So it can’t clear the text in
the browser memory
 HTTPS can increase computational overhead as well as network overhead of the organization

 Transmission Control Protocol (TCP)
 Internet Protocol (IP):-

1. TCP/IP is the most popular protocol connecting the networks.


2. IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP
addresses in packets help in routing them through different nodes in a network until it
reaches the destination system

TCP/IP:

 Transmission Control Protocol (TCP): TCP is a popular communication protocol which


is used for communicating over a network. It divides any message into series of
packets that are sent from source to destination and there it gets reassembled at the
destination.

TCP: This protocol ensures the delivery of information packets across network.
IP: This protocol is responsible logical addressing called IP address to route information
between network.

UDP:-

User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet
Protocol suite, referred to as UDP/IP suite. it is an unreliable and connectionless protocol.
There is no need to establish a connection prior to data transfer. The UDP enables process to
process communication .
 FTP: It is used to transfer the files over networks. FTP is a standard internet protocol provided
by TCP/IP used for transmitting the files from one host to another. FTP (File Transfer
Protocol) is a network protocol for transmitting files between computers over Transmission
Control Protocol/Internet Protocol (TCP/IP
 E-Mail: It is a method of exchanging digital messages across the Internet or other computer
networks.
 Telnet: Telnet lets you remotely log into another system and browse files and directories on
that remote system. Telnet Protocol (TELNET) provides a standard method for terminal
devices and terminal-oriented processes to interface.
 Simple Mail Transfer Protocol (SMTP) : This protocol is used for transferring e-mail
between computers.
 Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server principle.

Introduction to client-server computing:-


o A client and server networking model is a model in which computers such as servers
provide the network services to the other computers such as clients to perform a user
based tasks. This model is known as client-server networking model.

o An application program is known as a client program, running on the local machine


that requests for a service from an application program known as a server program,
running on the remote machine.
o A client program runs only when it requests for a service from the server while the
server program runs all time as it does not know when its service is required.
o An application program is known as a client program, running on the local machine
that requests for a service from an application program known as a server program,
running on the remote machine.
o A client program runs only when it requests for a service from the server while the
server program runs all time as it does not know when its service is required.

Client:-
A client is a program that runs on the local machine requesting service from the server. A
client program is a finite program means that the service started by the user and terminates
when the service is completed.

Server
A server is a program that runs on the remote machine providing services to the clients.
When the client requests for a service, then the server opens the door for the incoming
requests, but it never initiates the service.

Advantages of Client-server networks:

o Centralized: Centralized back-up is possible in client-server networks, i.e., all the data
is stored in a server.
o Security: These networks are more secure as all the shared resources are centrally
administered.
o Performance: The use of the dedicated server increases the speed of sharing
resources. This increases the performance of the overall system.
o Scalability: We can increase the number of clients and servers separately, i.e., the new
element can be added, or we can add a new node in a network at any time.

Connecting the Internet:-

Internet is a global network that connects billions of computers across the world with each other and
to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions of
computer users worldwide.

Types of Internet service


1. Dial-up:- This is generally the slowest type of Internet connection. Dial-up Internet
uses your phone line.
2. DSL:- DSL service uses a broadband connection, which makes it much faster than dial-
up. DSL connects to the Internet via a phone line
3. Cable:- Cable service connects to the Internet via cable TV.
It uses a broadband connection and can be faster than both dial-up and DSL service. it
is only available where cable TV is available.
4. Satellite:- A satellite connection uses broadband but does not require cable or phone
lines. it connects to the Internet through satellites orbiting the Earth. it can be used
almost anywhere in the world

You might also like