0% found this document useful (0 votes)
16 views64 pages

Unit 1 Faculty Notes

The document provides an overview of information technology, the internet, and web evolution, detailing concepts such as data, technology, and the structure of the internet. It explains the workings of web browsers and servers, the HTTP protocol, and the evolution from Web 1.0 to Web 3.0, highlighting user participation and the role of AI. Additionally, it discusses the dark web and the importance of net neutrality in maintaining open internet access.

Uploaded by

Shubham Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views64 pages

Unit 1 Faculty Notes

The document provides an overview of information technology, the internet, and web evolution, detailing concepts such as data, technology, and the structure of the internet. It explains the workings of web browsers and servers, the HTTP protocol, and the evolution from Web 1.0 to Web 3.0, highlighting user participation and the role of AI. Additionally, it discusses the dark web and the importance of net neutrality in maintaining open internet access.

Uploaded by

Shubham Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

• Information: In a general sense, is a

processed form of data. For example, a


What is single customer’s sale at a restaurant is data –
this becomes information when the business
Information is able to identify the most popular or least
Technology popular dish.
? • Technology refers to methods, systems, and
devices which are the result
of scientific knowledge.
• Data Overload: This requires large amounts of
processing power, sophisticated software and
human analytical skills.
Need of • Mobile and Wireless Usages: More employers
Information are offering remote work options.
• Cloud Services: Many businesses now work with
Technology cloud services—third-party hosting platforms that
maintain that data.
• Bandwidth for video Hosting:
Videoconferencing solutions have become more
and more popular.
What is Internet ?

• The Internet is the wider network that allows computer networks around the
world run by companies, governments, universities and other organizations
to talk to one another. The result is a mass of cables, computers, data
centers and Wi-Fi towers that allows digital information to travel around the
world.
• It is that infrastructure that lets you order the weekly shop, share your life
on Facebook, stream Outcast on Netflix, email your dear one’s and search
the web for the Silliest thing you can think of.
How does
Internet Work
?
• It takes some wiring up.
Hundreds of thousands of miles
of cables crisscross countries,
and more are laid along sea
floors to connect islands and
continents. About 300
submarine cables, the deep-sea
variant only as thick as a garden
hose, underpin the modern
internet. Most are bundles of
hair-thin fiber optics that carry
data at the speed of light.
How does Internet Work ? – Continued..

• Internet Service Providers: Reliance Jio-Fiber, Airtel Fiber. They Buy Bandwidth from
the cable providers as a wholesaler and provide it to small local retailer ISP. It is there job
to get you connected to the internet.
• BSNL – Government ISP: Still trying to get there feet in the fiber world. Little bit data
safety is there.
• Speed of data retrieval: Depends upon the servers of the website where they are located.
For e.g. Google – data retrieval is very fast because if you are browsing in India they do
have data Centre's in India for faster data access. Some Institute website in foreign country
having lots of data, they don’t usually have India as there audience so data retrieval in there
case is slow if you are browsing from India no matter how fast your internet is.
What is Open Internet?
• Sometimes referred to as “net neutrality,” “Internet freedom” or the
“open Internet,” these rules protect your ability to go where you want
when you want online.
The FCC's open internet rules protect and maintain open, uninhibited access
to lawful online content. The rules specifically prohibit:
• Blocking: Broadband providers may not block access to lawful content,
applications, services or non-harmful devices.
• Throttling: Broadband providers may not deliberately target some lawful
internet traffic to be delivered to users more slowly than other traffic.
• Paid prioritization: Broadband providers may not favor some internet
traffic in exchange for consideration of any kind. ISPs are also banned from
prioritizing content and services of their affiliates.
Canada, the U.S., and 59 other countries have
signed a declaration vowing to work for an open,
free, global, interoperable, reliable, and secure
internet.
• The web is a way to view and share information
over the internet. That information, be it text,
music, photos or videos or whatever, is written
What is on web pages served up by a web browser.
World • Google handles more than 40,000 searches per
second.
Wide Web • The rise of apps means that for many people,
? being on the internet today is less about
browsing the open web than getting more
focused information: news, messages, weather
forecasts, videos and the like.
What is Dark Web ?
• Think of the web as having three layers: surface, deep and dark.
• Standard web browsers trawl the surface web, the pages that are most visible.
• Under the surface is the deep web: a mass of pages that are not indexed. These
include pages held behind passwords – the kind found on the office intranet, for
example, and pages no one links to, since Google and others build their search
indexes by following links from one web page to another.
• Buried in the deep web is the dark web, a bunch of sites with addresses that hide
them from view. To access the dark web, you need special software such
as Tor (The Onion Router), a tool originally created by the US navy for
intelligence agents online. While the dark web has plenty of legitimate uses, not
least to preserve the anonymity of journalists, activists and whistleblowers, a
substantial portion is driven by criminal activity. Illicit marketplaces on the dark
web trade everything from drugs, guns and counterfeit money to hackers.
Web Evolution
Web 1.0: The Static Web
• The first version of web is Web 1.0 also referred as Syntactic web or
read only web is the era (1990–2000) where the role of a user is
limited to reading information provided by the content producers.
• There is no option given for user or consumer to communicate back
the information to the content producers.
• Example of Web 1.0 are static web sites and personal sites.
Web 2.0: The Rise of User Participation
and Social Media
• The Web 2.0 also referred as Social Web or read-write web is the era(2000–
2010 and continues even now) which facilitates interaction between web
users and sites which allows users to communicate with other users.
• In this era every user can be a content producers and content is distributed
and shared between sites.
• Some of the famous Web 2.0 applications are Facebook, YouTube, Twitter
etc.,
• The web technologies like HTML5, CSS3 and JavaScript frameworks like
ReactJs, AngularJs, VueJs etc., enables startups to innovate new ideas
which enables users to contribute more in this Social Web. Web 2.0 is build
around the users, producer just need build a way to enable and engage them.
Web 3.0: Decentralization, Security and
Privacy
The Web 3.0 also referred as Semantic Web or read-write-execute is the era
(2010 and above) which refers to the future of web. In this era computers can
interpret information like humans via Artificial Intelligence and Machine
Learning. Which help to intelligently generate and distribute useful content
tailored to a particular need of a user.
• What if computers can understand meaning behind information
• What if they can learn “what we are interested in”
• Then they can help us find what we want
• It can recognize People, Place, Events, Companies, Product, Movies etc.,
• It can understand the relationship between things
Some of the examples of web 3.0 are Apple’s Siri, Blockchain, IoT, Cloud
Computing.
Web Browser
A web browser is a software application that is used to access the world
wide web(www) or as known by everyone on the Internet. It is an
interface between us and the information available on the web.
• This information might be pictures, audio, videos, or some other files
that are shown on our screens through a web page.
• The web browser can be called a client program as it requests the
webserver for the information demanded by the user.
• Some of the common browsers are Google Chrome, Mozilla Firefox,
Safari, Microsoft Edge, Netscape Navigator, etc.
How does a browser work?
How does a browser work?
• The whole process of gathering information begins with the user when
enters the URL of the desired website in the address bar. The browser
is a part of the client-server model where it plays the part of the client.
• It sends the requested information to the web server through HTTP-
hypertext transfer protocol. Once the request is received, the server
gathers the related information it forwards it through web pages.
Element of a Web Browser
1. User Interface
The user interface is the first page that you see when you open the web browser.
This page has the address bar, forward/ backward button, menu, bookmarking
option, and a few more options.
2. Browser Engine
The browser engine acts as an interface between the rendering engine and the UI of
the browser. Based on the input, it manipulated the rendering engine to provide
output.
3. Rendering engine
The rendering engine is responsible for producing requested content to the browser
and displaying it on the screen. It parses the HTML documents and then converts
them to readable form. All the browsers we know have their own rendering engines.
• Safari uses WebKit.
• Chrome and Opera use Blink ( fork of WebKit).
• Internet explored use Trident.
• Firefox uses Gecko.
4. Networking
The network layer is responsible for security and communication on the internet. It
is also used for HTTP requests and to cache the documents retrieved in order to
reduce network traffic.
5. UI Backend
It is for drawing basic boxes and windows/ widgets. This is for a generic interface
and is independent of any specific platform. Behind all this, it uses an Operating
system for UI methods.
6. JavaScript Interpreter
As we all know JavaScript is responsible for all the websites/ webpages. All these
pages are written in JavaScript language. Therefore this interpreter translates these
pages and these are sent to the rendering engine to display the final results.
7. Data persistence
Data persistence or storage is for saving the data locally, like cookies. The browsers
support storage mechanisms like IndexedDB, WebSQL, File System, etc. to store
databases locally on your computer. This way user data is handled like cache,
bookmarks, cookies, etc.
• Home Page: Whenever we open a browser, the first web page which loads is called the home page. Although
the home page of a browser has some default setting, it can be changed according to user’s preference.
• Address (URL) Bar: The URL of the website that has to be accessed is entered here. Through this bar user
can access different websites or search anything on browser.
• Navigation Buttons: Using the forward and backward buttons user can revisit previously opened web pages.
These buttons provide convenience to retrieve data previously accessed.
• History: If you visited a website and want to revisit it after a few days but have forgotten the address of
website then don’t worry as every browser has a history where it collects all previously visited data. This is a
very handy feature to revisit websites.
• Bookmark: This feature helps in quickly accessing websites. If you come across some important web page
you can always bookmark it for easy access in future.
• Refresh Button: The refresh button reloads the page and shows updates if any.
• Home Button: It brings the user to home page which can be set by user.
• Tabbed Browsing: Using this feature a user can open multiple web pages in the same web browser so that
they can easily switch between them.
• Extensions: Extensions or plugins (like AdBlock) can be installed by the user. These extensions help in
improving functionality of web browsers.
Web Server
A web server is a dedicated computer responsible for running websites sitting
out on those computers somewhere on the Internet. They are specialized
programs that circulate web pages as summoned by the user. The primary
objective of any web server is to collect, process and provide web pages to
the users.
• This intercommunication of a web server with a web browser is done with
the help of a protocol named HTTP (Hypertext Transfer Protocol). These
stored web pages mostly use static content, containing HTML documents,
images, style sheets, text files, etc. However, web servers can serve static
as well as dynamic contents.
• Web Servers also assists in emailing services and storing files. Therefore it
also uses SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer
Protocol) protocols to support the respective services.
How Does a Web Server Work?
1.First, any web user is required to type the URL of the web page in the
address bar of your web browser.
2.With the help of the URL, your web browser will fetch the IP address of
your domain name either by converting the URL via DNS (Domain Name
System) or by looking for the IP in cache memory. The IP address will
direct your browser to the web server.
3.After making the connection, the web browser will request for the web
page from the web server with the help of an HTTP request.
4.As soon as the web server receives this request, it immediately responds by
sending back the requested page or file to the web browser HTTP.
5.If the web page requested by the browser does not exist or if there occurs
some error in the process, the web server will return an error message.
6.If there occurs no error, the browser will successfully display the webpage.
HTTP
• HTTP stands for Hypertext Transfer Protocol.
• It is a protocol used to access the data on the World Wide Web
(www).
• The HTTP protocol can be used to transfer the data in the form of
plain text, hypertext, audio, video, and so on.
• This protocol is known as HyperText Transfer Protocol because of its
efficiency that allows us to use in a hypertext environment where there
are rapid jumps from one document to another document.
Features of HTTP:
• Connectionless protocol: HTTP is a connectionless protocol. HTTP client
initiates a request and waits for a response from the server. When the server
receives the request, the server processes the request and sends back the
response to the HTTP client after which the client disconnects the
connection. The connection between client and server exist only during the
current request and response time only.
• Media independent: HTTP protocol is a media independent as data can be
sent as long as both the client and server know how to handle the data
content. It is required for both the client and server to specify the content
type in MIME-type header.
• Stateless: HTTP is a stateless protocol as both the client and server know
each other only during the current request. Due to this nature of the
protocol, both the client and server do not retain the information between
various requests of the web pages.
What is in an HTTP request?
What is in an HTTP request?
• An HTTP method, usually a verb like GET, POST, or a noun like
OPTIONS or HEAD that defines the operation the client wants to
perform. Typically, a client wants to fetch a resource (using GET) or
post the value of an HTML form (using POST), though more
operations may be needed in other cases.
• The path of the resource to fetch; the URL of the resource stripped
from elements that are obvious from the context, for example without
the protocol (http://), the domain (here, developer.mozilla.org), or the
TCP port (here, 80).
• The version of the HTTP protocol.
• Optional headers that convey additional information for the servers.
What is in an HTTP response?
What is in an HTTP response?
Responses consist of the following elements:
• The version of the HTTP protocol they follow.
• A status code, indicating if the request was successful or not, and why.
• A status message, a non-authoritative short description of the status
code.
• HTTP headers, like those for requests.
• Optionally, a body containing the fetched resource.
What’s an HTTP status code?
• HTTP status codes are 3-digit codes most often used to indicate
whether an HTTP request has been successfully completed. Status
codes are broken into the following 5 blocks:
1. 1xx Informational
2. 2xx Success
3. 3xx Redirection
4. 4xx Client Error
5. 5xx Server Error
What’s an HTTP status code?
• The “xx” refers to different numbers between 00 and 99.
• Status codes starting with the number ‘2’ indicate a success. For example,
after a client requests a webpage, the most commonly seen responses have a
status code of ‘200 OK’, indicating that the request was properly completed.
• If the response starts with a ‘4’ or a ‘5’ that means there was an error and
the webpage will not be displayed. A status code that begins with a ‘4’
indicates a client-side error (it is very common to encounter a ‘404 NOT
FOUND’ status code when making a typo in a URL). A status code
beginning in ‘5’ means something went wrong on the server side. Status
codes can also begin with a ‘1’ or a ‘3’, which indicate an informational
response and a redirect, respectively.
What are IP & TCP?
• The Internet Protocol (IP) is the address system of the Internet and has
the core function of delivering packets of information from a source
device to a target device. IP is the primary way in which network
connections are made, and it establishes the basis of the Internet. IP
does not handle packet ordering or error checking. Such functionality
requires another protocol, often the Transmission Control Protocol
(TCP).
Transport Layer – TCP Protocol
• The TCP/IP relationship is similar to sending someone a message written on
a puzzle through the mail.
• The message is written down and the puzzle is broken into pieces. Each
piece then can travel through a different postal route, some of which take
longer than others. When the puzzle pieces arrive after traversing their
different paths, the pieces may be out of order. IP makes sure the pieces
arrive at their destination address.
• TCP can be thought of as the puzzle assembler on the other side who puts
the pieces together in the right order, asks for missing pieces to be resent,
and lets the sender know the puzzle has been received.
• TCP maintains the connection with the sender from before the first puzzle
piece is sent to after the final piece is sent.
Example - Working TCP/IP
TCP Working
Example- TCP Working
When an email is sent over TCP, a connection is established and a 3-way
handshake is made.
• First, the source sends an SYN “initial request” packet to the target server
in order to start the dialogue.
• Then the target server sends a SYN-ACK packet to agree to the process.
• Lastly, the source sends an ACK packet to the target to confirm the
process, after which the message contents can be sent. The email message
is ultimately broken down into packets before each packet is sent out into
the Internet, where it traverses a series of gateways before arriving at the
target device where the group of packets are reassembled by TCP into the
original contents of the email.
Network Layer-Internet Protocol (IP)
• IP is a connectionless protocol, which means that each unit of data is
individually addressed and routed from the source device to the target
device, and the target does not send an acknowledgement back to the
source. That’s where protocols such as TCP come in. TCP is used in
conjunction with IP in order to maintain a connection between the sender
and the target and to ensure packet order.
• The primary version of IP used on the Internet today is Internet Protocol
Version 4 (IPv4). Due to size constraints with the total number of possible
addresses in IPv4, a newer protocol was developed.
• The newer protocol is called IPv6. It makes many more addresses available
and is increasing in adoption.
URLs
Parts of a URL
• The protocol or scheme. Used to access a resource on the internet. Protocols include http, https,
ftps, mailto. The resource is reached through the domain name system (DNS) name. In this
example, the protocol is https.
• Host name or domain name. The unique reference the represents a webpage. For this example,
whatis.techtarget.com.
• Port name. Usually not visible in URLs, but necessary. Always following a colon, port 80 is the
default port for web servers, but there are other options. For example, :80.
• Path. A path refers to a file or location on the web server. For this example, search/query.
• Query. Found in the URL of dynamic pages. The query consists of a question mark, followed by
parameters. For this example, ?q=URL1.
• Parameters. Pieces of information in a query string of a URL. Multiple parameters can be
separated by ampersands (&). For this example, q=URL1&z=URL2.
• Fragment. This is an internal page reference, which refers to a section within the webpage. It
appears at the end of a URL and begins with a hashtag (#). Although not in the example above, an
example could be #history in the URL https://en.wikipedia.org/wiki/Internet#History.
Other URL Example
• The URL mailto:[email protected] initiates a new email
addressed to the mailbox president in the domain whitehouse.gov.
• The
URL ftp://www.companyname.com/whitepapers/widgets.ps specifi
es the use of the FTP protocol to download a file
Absolute URLs vs. Relative URLs
• Absolute URLs: In your browser's address bar, a URL doesn't have
any context, so you must provide a full (or absolute) URL. For E.g.:
www.google.com
• Relative URLs: When a URL is used within a document, such as in
an HTML page. It can use this information to fill in the missing parts
of any URL. If the path starts with “/” Character, the browser will
fetch the resources from the top root of the server. For E.g.: /images
Domain Name
Top-level domains
• Each domain name has to be registered with the Internet Corporation for Assigned
Names and Numbers (ICANN).
• Once registered, it gets a suffix to indicate which top-level domain (TLD) it
belongs to. Sometimes this is also called the “parent domain” or “domain
extension.” Some common TLDs include:
• .gov for government websites (whitehouse.gov)
• .mil for military websites (af.mil)
• .com for commercial businesses (google.com)
• .edu for educational institutions (harvard.edu)
• .ca for sites in Canada (cbc.ca)
• .org for organizations (wikipedia.org)
Domain Name
• The label located right before the TLD is also called a Secondary
Level Domain (SLD)
• For E.g.: www.saitm.ac.in
• Here .in is the Top level domain and .ac is the second level domain
Search Engines
• Search engines are programs that allow users to
search and retrieve information from the vast
amount of content available on the internet.
• Popular search engines include Google, Bing, and
Yahoo.
How do Search Engines Work?
Crawling
• Search engines have a number of computer programs that are
responsible for finding information that is publicly available on the
internet.
• The crawler scans the web and creates a list of all available websites.
Then they visit each website and by reading HTML code they try to
understand the structure of the page, the type of the content, the
meaning of the content, and when it was created or updated.
• Why crawling is important? Your first concern when optimizing your
website for search engines is to make sure that they can access it
correctly. If crawler cannot find your content you won’t get any
ranking or search engine traffic.
Indexing
• Information identified by the crawler needs to be organized, Sorted,
and Stored so that it can be processed later by the ranking algorithm.
• Search engines don’t store all the information in your index, but they
keep things like the Title and description of the page, The type of
content, Associated keywords Number of incoming and outgoing
links, and a lot of other parameters that are needed by the ranking
algorithm.
• Why indexing is important? Because if your website is not in their
index it will not appear for any searches this also means that if you
have any pages indexed you have more chances of appearing in the
search results for a related query.
Ranking
Ranking is the position by which your website is listed in any Search Engine. There
is following three steps in which how ranking works .
• Step 1: Analyze user query – This step is to understand what kind of information
the user is looking for. To do that analyze the user’s query by breaking it down
into a number of meaningful keywords. A keyword is a word that has a specific
meaning and purpose, for example when you type how to make a chocolate
cupcake search engines know that you are looking for specific information so the
results will contain recipes and step-by-step instructions. They can also
understand the meaning of how to change a light bulb is the same as how to
replace a light bulb search engines are clever enough to interpret spelling mistakes
also.
• Step 2: Finding matching pages – This step is to look into their index and find
the best matching pages, for example, if you search dark wallpaper then it gives
you the result of images, not text.
• Step 3: Present the results to the users – A typical search results page includes
ten organic results in most cases it is enriched with other elements like paid Ads,
direct answers for specific queries, etc.
Components of Search Engine
• Web crawler: A search engine uses multiple web crawlers to crawl
through world wide web and gather information. It is basically a
software which is also known as bot or spider.
• Database: The information which is gathered by web crawler by
crawling through internet is stored on the database.
• Search Interface: Search interface is just an interface to the data base
which is employed by the user to search through the data base.
Search Techniques
BOOLEAN OPERATORS
• OR is used to find articles that mention either of the topics you search
for.
• AND is used to find articles that mention both of the searched topics.
• NOT excludes a search term or concept. It should be used with caution
as you may inadvertently exclude relevant references.
BOOLEAN OPERATORS
• AND/OR • NOT
Truncation and wildcard searches
Truncation Wildcard
• Many databases use an asterisk • Wildcards are useful for finding
(*) as their truncation symbol. British and American spellings,
For example, “therap*” will find for example: “behavio?r” in
therapy, therapies, therapist or Medline will find both behaviour
therapists. and behavior.
Search Techniques
• Case Sensitivity: Search terms entered in lower case letters are case
insensitive. The use of capitalized terms (or accented letters) makes
the term case sensitive. HotDog finds only the terms spelled exactly
with that capitalization; hotdog finds all occurrences of the term,
regardless of capitalization. López only finds a word spelled exactly
that way.
• Phrases: To group search terms into phrases, include them in double
quotes. “Abraham Lincoln” finds occurrences of the name Abraham
Lincoln, capitalized in just that way.
Search Tools
• Search allows you to search content created by tools within a site. It
achieves this by creating an index of all content that other tools make
available to the search tool. This index is updated automatically, so as
content is added to the site, it will be indexed.
• For example, if the site has an Email Archive, as emails are posted to
the list, the content of those emails will be indexed and become
searchable in the search tool. Or, if the site has documents uploaded to
Resources, the documents will become searchable.
• The Search tool indexes many different types of content, including
messages; web pages in HTML format; documents in DOC, PDF, or
RTF format; spreadsheets in XLS format; and Wiki pages.
Who need search tool
• Huge amount of data on website.
• High number of visitors.
• Growing sites adding new and valuable information.
Webcasting
• Webcasting is the delivery of media contents and any digital
information in various formats such as texts, graphics, and audio and
video files on the World Wide Web to Internet users.
• Some examples of large webcasters would be radio and TV stations
who cast their output through online TV or radio streaming stations.
What can you do with a webcast?
• Training: Webcasts allow the trainer to broadcast a training video to a
wide and dispersed audience at the same time, ensuring consistency.
• Meetings and Conferences: Companies with a nationwide presence
can still hold regular meetings, without paying for travel to meet in
person.
• Corporate Communications: Connecting with your corporate office
to share visual content demands a service like webcasting.
• Product Introductions: Companies will have the ability to
demonstrate new products and services to sales prospects and send out
company-wide product announcements.
Use cases
A variety of webcasting applications for maintaining external relationships include:
• Marketing: In general, webcasts can be used for marketing new products and sales
updates.
• Touch base with clients: It is important to maintain goodwill by periodically checking
in.
• Educational: Teaching customers and clients about your products or services can help
them to view you as a subject matter expert.
• Q&A Sessions: The chat feature of most webcasts allows companies to interact with their
customers and answer their questions.
• Special Events: Any special events or conferences that those located out-of-state cannot
attend can be easily broadcasted.
• Customer Service and Support: Great for customer support that requires long-distance
communication and visual content.
• Press Conferences: Webcasts are perfect for interactive and far-reaching press
conferences.
Types of webcast services
• On Demand: It refers to that webcasting which can be activated by an
individual used at his place and at a time individually chosen by him.
For E.g.: YouTube.
• Real Time Streaming: In this content is streamed at a time chosen by
the webcaster; any one who is interested in listening/viewing may log
on to the server of the webcaster at that time. For E.g.: FB Live, Insta
Live.

You might also like