Introduction and Web Development Strategies_pdf
Introduction and Web Development Strategies_pdf
UNIT-1
Introduction and Web Development Strategies:-
Identify target user: Identify the user of the website by doing market research.
Make our design portable: To be successful, website design should be portable and accessible
across different browsers, operating systems, and computer platforms. Designers should test the
website in a different environment whether they look same to all their users.
Design for low bandwidth: Web pages in websites should be accessible at any connection
speeds. If a page is downloaded slowly then users will leave the website before they see the
content.
Plan for clear presentation and easy access to information: Presentation of the information
on the website must be clear and easily accessible to the user.
Create smooth transitions: Plan to create a unified look among the sections and pages of site.
Reinforce the identifying elements of the site and create smooth transitions from one page to
another.
The World Wide Web is a system of interlinked hypertext documents accessed via the Internet. Web
is a huge collection of pages of information linked to each other around the globe.
History of WWW:
WWW was created by Sir Tim Berners Lee in 1989 at CERN (European Council for Nuclear
Research,) in Geneva.
The name CERN is derived from the acronym for the French "Conseil Européen pour la
Recherché Nucléaire",
In 1990, the first text only browsers were set up and CERN scientists could access hypertext
files and other information at CERN. HTML was based on a subset of the standard generalized
markup language (SGML). To transfer HTML documents to remote sites a new protocol was
devised called HTTP (HyperText Transfer Protocol).
In the fall of 1991, conferences around the world started hearing about the promise but sparks
still were not flying.
In 1993, there were only about 50 websites worldwide. A browser that allowed users to take
advantage of the web’s graphical capabilities was developed at the National center for
SuperComputing application (NCSA). NCSA called the browser Mosaic
Introduction to Internet services and tools:-
Internet Services allows us to access huge amount of information such as text, graphics, sound and
software over the internet. Following diagram shows the four different categories of Internet Services.
Communication Services:-
There are various Communication Services available that offer exchange of information with
individuals or groups. The following table gives a brief introduction to these services :
Internet Tools:-
E-Mail
FTP
Gopher
HTML
HTTP
TCP/IP
Telnet
There exist several Information retrieval services offering easy access to information present on the
internet. The following table gives a brief introduction to these services:
S.N. Service Description
Archie
2 It’s updated database of public FTP sites and their content. It helps to search a file by its
name.
Gopher
3
Used to search, retrieve, and display documents on remote sites.
Web Services:-
1. Web services allow exchange of information between applications on the web. Using web services,
applications can easily interact with each other.The web services are offered using the concept
of Utility Computing.
2. Web services are self-contained, modular, distributed, dynamic applications that can be described,
published, located
3. It is a client-server application or application component for communication.
4. The method of communication between two devices over the network.
5. It is a software system for the interoperable machine to machine communication.
6. It is a collection of standards or protocols for exchanging information between two devices or
application.
WWW is also known as W3. It offers a way to access documents spread over the several servers over
the internet. These documents may contain texts, graphics, audio, video, hyperlinks. The hyperlinks
allow the users to navigate between the documents.
Web Development Phases
The Web development life cycle includes the following phases: planning, analysis, design and
development, testing, and implementation and maintenance.
Web Development Phase
Web development phase Questions
Specific
Measurable
Attainable
Realistic
Time limited
Identify your target users: The matter of a website will be determined by the users whom you want
to visit the site. This is totally depend upon
Market research
Focus group
Understanding intranet audiences
Determine the scope: By supporting documents and client’s approval.
Budget:
Protocol: A protocol is a set of rules that is used to communicate applications to each other.
OR
A protocol is the interface required for communicating the different applications.
Classifications:-
1 HTTP: HTTP is the primary protocol used to distribute information on the web. This protocol is
used to access, send and receive Hypertext markup language (HTML) files on the Internet .
Advantages of HTTP:-
HTTP can be implemented with other protocol on the Internet, or on other networks
HTTP pages are stored on computer and internet caches, so it is quickly accessible
Platform independent which allows cross-platform porting
Does not need any Runtime support
Usable over Firewalls! Global applications are possible
Not Connection Oriented; so no network overhead to create and maintain session state and
information
HTTP lacks a security mechanism to encrypt the data, whereas HTTPS provides SSL or TLS
Digital Certificate to secure the communication between server and client.
HTTP operates at the Application Layer, whereas HTTPS operates at Transport Layer.
HTTP by default operates on port 80, whereas HTTPS by default operates on port 443.
HTTP transfers data in plain text, while HTTPS transfers data in cipher text (encrypt text).
HTTP is fast as compared to HTTPS because HTTPS consumes computation power to encrypt
the communication channel.
2. What is HTTPS?
HTTPS stands for Hyper Text Transfer Protocol Secure. It is highly advanced and secure version of
HTTP. It uses the port no. 443 for Data Communication. It allows the secure transactions by
encrypting the entire communication with SSL. It is a combination of SSL/TLS protocol and HTTP. It
provides encrypted and secure identification of a network server.
Limitations of HTTPS
HTTPS protocol can’t stop stealing confidential information from the pages cached on the
browser
SSL data can be encrypted only during transmission on the network. So it can’t clear the text in
the browser memory
HTTPS can increase computational overhead as well as network overhead of the organization
Transmission Control Protocol (TCP)
Internet Protocol (IP):-
TCP/IP:
TCP: This protocol ensures the delivery of information packets across network.
IP: This protocol is responsible logical addressing called IP address to route information
between network.
UDP:-
User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet
Protocol suite, referred to as UDP/IP suite. it is an unreliable and connectionless protocol.
There is no need to establish a connection prior to data transfer. The UDP enables process to
process communication .
FTP: It is used to transfer the files over networks. FTP is a standard internet protocol provided
by TCP/IP used for transmitting the files from one host to another. FTP (File Transfer
Protocol) is a network protocol for transmitting files between computers over Transmission
Control Protocol/Internet Protocol (TCP/IP
E-Mail: It is a method of exchanging digital messages across the Internet or other computer
networks.
Telnet: Telnet lets you remotely log into another system and browse files and directories on
that remote system. Telnet Protocol (TELNET) provides a standard method for terminal
devices and terminal-oriented processes to interface.
Simple Mail Transfer Protocol (SMTP) : This protocol is used for transferring e-mail
between computers.
Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server principle.
Client:-
A client is a program that runs on the local machine requesting service from the server. A
client program is a finite program means that the service started by the user and terminates
when the service is completed.
Server
A server is a program that runs on the remote machine providing services to the clients.
When the client requests for a service, then the server opens the door for the incoming
requests, but it never initiates the service.
o Centralized: Centralized back-up is possible in client-server networks, i.e., all the data
is stored in a server.
o Security: These networks are more secure as all the shared resources are centrally
administered.
o Performance: The use of the dedicated server increases the speed of sharing
resources. This increases the performance of the overall system.
o Scalability: We can increase the number of clients and servers separately, i.e., the new
element can be added, or we can add a new node in a network at any time.
Internet is a global network that connects billions of computers across the world with each other and
to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions of
computer users worldwide.