0% found this document useful (0 votes)
27 views15 pages

Web Theory

Uploaded by

mohitnajkani786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views15 pages

Web Theory

Uploaded by

mohitnajkani786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Internet

The internet (or Interconnected Network) sometimes called simply “the NET”, is a
worldwide system of computer networks – a networks of networks in which users
at any one computer can, if they have permission, get information
It is a global system of interconnected computer networks.
It was primarily designed for a work environment and offices but now, it is
everywhere for example homes, parks, roads, college and research institutions,
hospitals even in some remote areas also.

History
● the origin of internet devised from the concept of ARPANET (Advanced
Research Project Agency Network)
● ARPANET was developed by US Department of Defence.
● Basic purpose of ARPANET was to provide communication among the
various bodies of government.
● Initially, there were only four nodes, formally known as hosts.
● In 1972, the ARPANET spread over the globe with 23 nodes located at
different countries and thus became known as Internet
● In 1989, internet was made available for commercial purposes

Uses of Internet

● Online Booking & Orders

- The Internet has made it a lot easier for people to book tickets for buses,
trains, flights (domestic and international) directly using their devices from
anywhere. People can also book a taxi by choosing their current location,
and they will be picked up or dropped at a specified location. Now no one
needs to wait in long queues for their turn to book tickets at the ticket
counter.
- Besides, people can order a wide variety of products at home using the
Internet and devices. It can range from grocery products to ready to eat,
fashionable clothes to medicines. Most items can be ordered at home and
received directly at the door.

● Cashless Transactions

- Most countries are promoting cashless transactions and digital payments.


This helps people not carry much cash. People can pay their bills through
debit or credit cards using POS devices. These devices are connected to the
payment gateway on the Internet. Besides, People can also use their
smartphone and the Internet for processing transactions on UPI (Unified
Payment Interface). It does not even require them to carry their cards. The
UPI payment method is continuously evolving and is expected to cover most
transactions in the near future.

● Education

- Most of the devices nowadays are connected through the Internet. The
Internet has the availability of broad educational content on any topic with
different types. People can study the relevant topic just by spending a couple
of minutes over the Internet. Internet Search engines help people quickly
find the relevant study material in multiple formats (such as images, videos,
documents, etc.). This helps eliminate the need to go to the library to read
several books to find the desired information.
- Besides, the Internet has also enabled students to participate in their classes
through video conferencing, where students can connect with their teachers
or professionals anywhere in the world.

● Online Banking & Trading

- The way of banking has changed after the introduction of the Internet. The
Internet has made banking online where people can manage their bank
accounts while sitting at home or traveling abroad. Nowadays, most of the
features of banking are right in people's hands. With the help of online
banking, people can securely transfer the money from one account to
another, change their ATM pins, apply for the physical or virtual credit
cards, update credit card limits, enable or disable international transactions,
track their transactions, and many more. Also, they can even raise an online
complaint or contact to bank's support staff.
- Apart from this, the Internet has made it a lot easier for people to trade in the
Stock market from anywhere. People can easily buy, sell, or manage stocks
online.

● Research

- The Internet is playing a significant role in the field of research. Before the
use of the Internet, it was quite hard to look for information about anything.
People had to go through hundreds of books for references to find the
desired information. However, the Internet has made it a lot easier, and
anyone can find the required information at some clicks only. In research,
people can study about the success and failed research and work further for
the improvements. Uses of the Internet in research have incredibly beneficial
for the researchers.

● Electronic Mail

- Email or electronic mail is one of the first significant uses of the Internet.
The email has enabled faster communication between people on the Internet.
Using email, people can quickly share information, data files, such as
images, audio, video, and other types of files. The use of email has
significantly reduced paper use, which was the primary source of
communication in the olden days. Anyone can have a free email address and
can easily communicate with others. This has also reduced the load on the
physical mail system, although it is still in use.

● Job Search

- Getting a job is a lot easier than before. Any person can view relevant job
information using the Internet. Earlier, people had to go through each
company individually to know if a position was vacant or not. However, the
Internet has enabled people to find employment sitting at home to suit their
interests. Many websites provide details about job availability. Once people
submit their resumes, these websites keep informing about vacancies
through email. Besides, each well-known company has its website, where
the company posts about the vacancy opening. So, just sitting at home,
people can search, apply for jobs and even give their interviews and see or
know their results.

● Social Networking

- Social networking sites have connected people around the world. Social
networking is an essential part of the Internet. With the help of the Internet,
people have got the ability to form social groups where they can share
information, thoughts and ideas about anything. The social networking
platform is the largest source of content, covering everything from
informative content to entertainment. The best thing is that people don't have
to pay anything to use these services. This helps businesses develop their
community and promote their products.

● Entertainment

- The Internet is the most effective means of entertainment. There are various
options available on the Internet, which people can try, such as watching
movies, playing online games, listening to songs, etc. The Internet has also
made it easy for people to download entertainment items to their local
storage. Using the Internet, people can also share their videos, songs,
pictures online with others. Also, nowadays, people can watch live TV or
sports on the Internet.

● E-Commerce

- The Internet is not just limited to ordering things; it can also be used to sell
products. Many e-commerce websites allow businesses and individuals to
sell their products. Products are purchased by these e-commerce companies,
stored in their warehouses, packaged in their brand packaging, and
distributed by themselves. E-commerce companies charge some commission
to distribute goods to customers. Also, they offer great discounts and offers
to customers. The best thing is that customers do not have to go to physical
stores.
- Besides, sellers can also create their website and list their products there.
They can refer to all information about the product, answer customer
questions and provide online payment options to their customers. All these
things are possible on the Internet.

India and Internet


In India, it started on an auspicious day, 15th August 1995. This in a way marks the
beginning of free information flow from every corner of the world and thus could
well ne called an Independence Day for Information Age in the country.
Videsh Sanchar Nigam Limited, (VSNL) started a service called GIAS (Gateway
Internet Access Service) to allow the Indian users to have access of Internet

ISP: Internet Service Provider


It is a company that provides individuals and other companies access to the internet
and other related services. These companies are called internet service provider
(ISPs). Among the largest national and regional ISPs are Comcast, Frontier, Time
Warner Cable, Century ink., Charter etc
To connect to an ISP, you need a modem and an active account. When you connect
a modem to the telephone or cable outlet in your house, it communicates with your
ISP. The ISP verifies your account and assigns your modem an IP address. Once
you have an IP address you are connected to an internet

World Wide Web


● www or world wide web is also known as web, is a collection of pages of
information linked to each other around one globe.
● Every page contain text, images, audios, videos etc. Users can access the
content of these pages from any part of the world over the internet using
their devices such as computers, laptops, cell phones etc.
● Tim Berners Lee is the father of WWW.
● This application brought millions of new, non-academic users to the net.
Tim Berners Lee invented this application with mosaic viewer
● The world wide web is an architectural framework for accessing linked
documents spread out over thousands of machines all over the internet. The
WWW made it possible for a site to set up a number of pages of information
containing text, pictures, sound and even videos, with embedded links to
other pages. By clicking on a link, the user is suddenly transported to page
pointed by the link
Search Engines
● It is a software system that is designed to carry out web search, which means
to search the world wide web in systematic way for particular information
specified in textual web search query.
● The search results are generally presented in a line of results, often referred
as search engine results pages (SERPs).
● The information may be mix of links to web pages, images, videos, articles,
research papers and other types of files.
● Popular examples are Google, Yahoo!, MSN search, Ask.com

Uniform Resource Locator (URL)


● An addressing scheme for locating resources on the internet
● A URL (Uniform Resource Locator) is a unique identifier used to locate a
resource on internet. It is also referred to as web address.
● The URL components:

http:://www.google.com/index.html

scheme domain name extension home page

o Protocol or Scheme: used to access a resource on the internet.


Protocols include http, https, ftp, mailto and file
o Domain name or Host name: the unique reference that represents a
webpage
o Path: refers to the file or location on the web server
● URL enables internet client software such as Hypertext Transfer Protocol
(HTTP) clients (most commonly Web Browsers) and File Transfer Protocol
(FTP) clients to locate and access resources stored on web servers, FTP
servers and other kinds of Internet hosts.

Web Server
● It is a software/hardware that uses HTTP and other protocols to respond to
client requests made over the WWW.
● Every Website sits on a computer known as a Web server. This server is
always connected to the internet. Every Web server that is connected to the
Internet is given a unique address made up of a series of four numbers
between 0 and 255 separated by periods. For example, 68.178.157.132 or
68.122.35.127.

Web Browser
● It is application software that allows us to view and explore information on
the web. User can request for any web page by just entering a URL into
address bar.
● Various popular browsers are Google Chrome, Mozilla Firefox, Opera,
Safari, Internet Explorer etc.

Web Browser Architecture:


There are a lot of web browsers available in market. All of them interpret and
display information on the screen however their capabilities and structure vary
depending upon implementation.
But the most basic component that all web browsers must exhibit is listed below:
1. User Interface: it is the space where user interacts with the browser. It
includes the address bar, back and next button, home button, refresh and
stop, bookmark option etc.
2. The Browser Engine: it works as a bridge between the user interface and
the rendering engine. According to the inputs from various user interface, it
queries and manipulates the rendering engine.
3. The Rendering Engine: As the name suggests is responsible for rendering
the requested web page on the browser screen. The rendering engine
interprets the HTML, XML documents and images that are formatted using
CSS and generates the layout that is displayed in the user interface.
4. Networking: Component of the browser which retrieves the URLs using the
common internet protocols of HTTP or FTP. The networking component
handles all aspects of internet communication and security
5. JavaScript Interpreter: It is the component of browser which interprets
and executes the JavaScript code. The interpreted results are sent to
rendering engine for display.
6. UI Backend: It is used for drawing basic widgets like combo boxes and
windows. It underneath uses operating system user interface methods.
7. Data Persistence / Storage: This is a persistence layer. Browser supports
storage mechanisms such as local storage, File system. It is a small database
created on the local drive of the computer where the browser is installed
Web Page
● It is a document commonly written in HTML that is viewed in an internet
browser.
● A web page can be accessed by entering a URL address into browser’s
address bar. A web page may contain text, graphics and hyperlinks to other
web pages and files.
● Multiple web pages make up a website. Collection of related web pages on a
server is known as a website. The first page of a website is called a home
page or web home page
● The web pages can be grouped into three categories:
o Static: they are also known as flat or stationary web page. They are
loaded on the client’s browser as exactly they are stored on the web
server. Such web pages only contain static information. Users can
only read the information but can’t do any modification.

Static web pages are created using only HTML, CSS, JavaScript

Static web pages are only used when the information is no more
required to be modified.

o Dynamic: it shows different information at different point of time. It


is possible to change a portion of a web page without loading the
entire web page.
Dynamic web pages are written in languages such as ASP, AJAX.
Dynamic web pages are used where the information is changed
frequently

o Active: it consists of a computer program that server sends to the


browser and then browser runs locally.
When is runs, the active document program can interact with the user
and change the display continuously
Active web pages are written in languages such as AJAX, PHP,
JavaScript.
Web page and multimedia
What is multimedia?
● Multimedia is everything you can hear or see: texts, books, pictures, music,
sounds, CDs, videos, DVDs, films and more.
● Multimedia comes in many different formats. On the internet you will find
many of these elements embedded in web pages and today’s web browser
have support for a number of multimedia formats.
Multimedia formats:
● Multimedia elements (like sounds and videos) are stored in media files.
● The most common way to discover the media type is to look at the file
extension.
● When a browser sees the file extensions .htm or .html, it will assume that the
file is an HTML page. The .xml extension indicates an XML file and the .css
extension indicates a style sheet.
● Picture formats are recognized by extensions like .gif and .jpg
● Multimedia elements also have their own file formats with different
extensions

Security on Web
Web security is the process of securing confidential data stored online from
unauthorised access and modification.
Aspects of security:

1. Protect the confidentiality of data.


● Confidentiality is roughly equivalent to privacy and avoids the unauthorized
disclosure of information.
● It involves the protection of data, providing access for those who are allowed
to see it while disallowing others from learning anything about its content.
● It prevents essential information from reaching the wrong people while
making sure that the right people can get it.
● Tools for Confidentiality:
a. Encryption
- Encryption of data involves converting the data into a
form that can only be understood by the people
authorized.
- In this case, information is converted into cipher text
format that can be difficult to understand.
- Once all the security problems have been dealt with
information can be decrypted that is converted back to
original form

b. Access control

- Access control defines rules and policies for limiting


access to a system
- It is a process by which users are granted access and
certain privileges to systems, resources or information.
- One can choose to use passwords or user identification
cards to gain access.

c. Authentication
- An authentication is a process that ensures and confirms
a user's identity or role that someone has.
- It can be done in a number of different ways, but it is
usually based on a combination of-something the person
has (like a smart card), something the person knows (like
a password),something the person is (like a human with a
fingerprint).

2. Preserve the integrity of data.

• It refers to maintain data in a consistent, accurate and trustworthy manner.


• In this case one has to ensure that data is not changed or altered.
• Tools for integrity :-
a. Backup:
- Backup is the periodic archiving of data.
- It is a process of making copies of data or data files to
use in the event when the original data or data files are
lost or destroyed.
b. Checksum:
- A checksum is a numerical value used to verify the integrity
of a file or a data transfer.
3. Promote the availability of data for authorized users.
• Availability is the property in which information is accessible and modifiable in
a timely fashion by those authorized to do so.
• It is the guarantee of reliable and constant access to our sensitive data by
authorized people.
• Tools of availability :-
a. Physical protection :-
- Physical safeguard means to keep information available
even in the event of physical challenges.
- It ensures sensitive information and critical information
technology are housed in secure areas.

b. Computational Redundancy :-
• It is mainly based on keeping things up and running in one’s
organization even with the absence of one important
component.
• It is applied as fault tolerant against accidental faults.
• It protects computers and storage devices that serve as
fallbacks in the case of failures.

Email: Electronic mail


● It is widely used feature of internet
● Electronic mail (E-mail) is the exchange of computer stored messages by
telecommunication.
● E-mail messages are usually encoded in ASCII text. Non text files such as
graphic images and sound files can be sent as attachment in binary streams.
● Email can be distributed to lists of people, as well as to individuals
● Email is used for virtually every type of business communication, including
marketing, invoicing and customer service. Email saves businesses millions
of dollars through the elimination of costly paper contracts, invoices and
receipts
Protocols:
HTTP: Hyper Text Transfer Protocol
● It is the data communication protocol used to establish communication
between client and server. It is used to deliver data like image files, query
results, HTML files on WWW.
● It is a connectionless, media independent, and stateless protocol

FTP: File Transfer Protocol


● It is a standard protocol for transmitting files from one machine to another.
Types of files may include program files, multimedia files, text files and
documents etc.
● It is also used for downloading the files to computer from other servers.
● File Transfer Protocol (FTP) is one of the earliest Internet protocols and it is
still used for uploading and downloading files between clients and server.
● FTP commands can be used to change directories, change transfer modes
between binary and ASCII, upload files and download files.

TFTP: Trivial File Transfer Protocol


● It is also used to transfer the file but it transfers the files without
authentication.
● Since there is no authentication, TFTP lacks in security features therefore it
is not recommended to use TFTP.

SMTP: Simple Mail Transfer Protocol


● It is a set of communication guidelines that allows software to transmit an
electronic mail over the internet.
● It provides a mail exchange between users on same or different computers
and it also supports:
o it can send a single message to one or more recipients.
o sending message can include text, video or graphics
● SMTP defines a message format and forwarding procedure to enable
messages to be sent between hosts on internet.

POP: Post Office Protocol 3


● It is the most recent version of a standard protocol for receiving emails.
● POP3 is a client-server protocol in which email is received and held by you
and your internet server.
● POP3 is designed to delete mail on server as soon as the user has
downloaded it.

SNMP: Simple Network Management Protocol


● It is a framework used for managing devices on the internet. It provides set
of operations for monitoring and managing the internet
● SNMP is used for collecting information from and configuring network
devices such as servers, printers, hubs, switches and routers on an Internet
Protocol (IP) network.
● SNMP can also be used to collect information about network statistics from
these devices and to relay this information to a central management console
to monitor network health, trap errors, perform diagnostics and generate
reports

Telnet: Terminal Network


● It is a protocol used to log in to remote computer on the internet. It provides
a connection to the remote computer in such a way that a local terminal
appears to be at the remote side.
● Using Telnet, a user on one IP host can connect to and run text-based
commands on a different IP host, provided the user can be authenticated and
has suitable privileges.
● The term telnet is also commonly used to refer to software that implements
this protocol on a particular platform or system.

Gopher
● From about 1992 through 1996, Gopher was an Internet application in which
hierarchically-organized text files could be brought from servers all over the
world to a viewer on your computer.

You might also like