Unit-1 Web Application Development
Unit-1 Web Application Development
WHAT IS INTERNET?
• A computer network consisting of a worldwide network of computers that use the
TCP/IP network protocols to facilitate data transmission and exchange.
• The Internet is a global system of interconnected computer networks that use the
standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.
• The term Internet actually refers to the combined collection of academic, commercial,
and government networks connected over international telecommunication backbones
and routed using IP addressing.
APPLICATIONS OF INTERNET
Here are some key applications of the internet:
1. Communication: Email, instant messaging, video conferencing (e.g., Zoom, Skype).
2. Information Sharing: Access to websites, blogs, e-books, and news platforms.
3. E-Commerce: Online shopping, auctions, and payment systems (e.g., Amazon, eBay,
PayPal).
4. Social Networking: Platforms like Facebook, Twitter, Instagram for connection and
interaction.
5. Entertainment: Streaming music, videos, games, and movies (e.g., Netflix, Spotify).
6. Education: Online courses, virtual classrooms, and e-learning platforms (e.g., Coursera,
Khan Academy,nptel).
7. Healthcare: Telemedicine, online consultations, and health information systems.
8. Banking and Finance: Online banking, stock trading, and cryptocurrency transactions.
9. Cloud Computing: Data storage and SaaS applications like Google Drive and Microsoft
365.
10. IoT and Smart Devices: Controlling and monitoring smart homes, wearables, and
industrial IoT.
11. Research and Development: Access to scientific journals, datasets, and research
forums.
EMAIL
Electronic mail (also known as email or e-mail) is one of the most commonly used services on
the Internet, allowing people to send messages to one or more recipients.
• Emailwasinvented by Ray Tomlinson in1972.
• Electronic mail is a method of exchanging digital messages from an author to one or more
recipients.
• Modern email operates across the Internet or other computer networks. Today's email systems
are based on a store-and-forward model.
• Email servers accept, forward, deliver and store messages. Neither the users nor their
computers are required to be online simultaneously; they need connect only briefly, typically
to an email server, for as long as it takes to send or receive messages.
• An email message consists of three components, the message envelope, the message header,
and the message body.
• Header contains information about who sent the message, the recipient(s) and the route.
• Header also usually contains descriptive information, such as a subject header field and a
message submission date/timestamp.
• Email message body contains text (7bit ASCII) as well as multimedia messages. These
processes are declared in Multipurpose Internet Mail Extensions (MIME). MIME is set of
RFCs (Request for Comment)
• Network based emails are exchanged over the internet using the SMTP (Simple Mail Transfer
protocol).
STRUCTURE OF EMAIL
The structure of an email consists of the following key components:
1. Header
Contains metadata about the email, including:
• From: The sender's email address.
• To: The recipient's email address(es).
• Cc: Carbon Copy; recipients visible to all other recipients.
• Bcc: Blind Carbon Copy; recipients invisible to others.
• Subject: A brief description of the email's content.
• Date: The timestamp when the email was sent.
• Reply-To: (Optional) The email address to which replies should be sent.
2. Body
The main content of the email:
• Plain Text or HTML Content:
o Plain Text: Simple text without formatting.
o HTML: Richly formatted content with text styles, images, and hyperlinks.
• Sections: May include greetings, the main message, and a closing signature.
3. Attachments
Files or documents attached to the email, such as PDFs, images, or other file formats.
4. Footer
• Email signature: Contains the sender's contact details, designation, or company info.
• Disclaimers or legal notices: (Optional) Often used in professional emails.
5. Encoding (Technical Aspect)
• MIME (Multipurpose Internet Mail Extensions): Allows for attachments and non-
text content.
• Content-Type: Specifies the format (e.g., text/plain or text/html).
TELNET
Telnet is a network protocol used in any network (internet or LAN) for bidirectional text
oriented communication.
• telnet standard was defined in 1973, before which it was considered as a dhocprotocol.
• Original purpose of the telnet protocol was to login to the remote computers on the network.
• Telnet protocol uses ‘virtual terminal’ to connect to the remote hosts.
• Virtual terminal is a application service that allows host in a multi terminal network to
communicate with other hosts irrespective of terminal type or characteristics.
• Telnet uses the TCP protocol for transmission of 8 byte data.
• Most network equipment and operating systems with a TCP/IP stack support a Telnet service
for remote configuration (including systems based on Windows NT)
• The term telnet may also refer to the software that implements the client part of the protocol.
• Telnet is a client server protocol, which is based upon reliable connection oriented
communication transport and basic use of telnet is to make a connection to the TCP protocol.
• Data transferred over telnet is vulnerable as telnet does not use any encryption technique to
mask or protect the data.
• Most implementations of Telnet have no authentication that would ensure communication is
carried out between the two desired hosts and not intercepted in the middle.
• Commonly used Telnet daemons have several vulnerabilities discovered over the years.
• Extensions to the Telnet protocol provide Transport Layer Security (TLS) security and Simple
Authentication and Security Layer (SASL) authentication that address the above issues.
• Few applications of telnet include the ‘putty’ TCP client which can access a linux server using
windows operating system, Absolute telnet (windows client) and RUMBA (terminal emulator).
FTP
• File transfer protocol is a simple and standard network protocols that transfers a file from one
host to the other over a TCP network.
• Based on client server architecture.
• Utilizes separate control and data connection for client and server to transmit and receive
file(s) over the network.
• Itis an application protocol that uses the internet’s TCP/IP suite.
• Mainly used to transfer the web pages or related data from the source or creator to a host that
acts as a server to make the page or file available to other hosts (uploading) or downloading
programs and other files from server to a host.
• FTPprotocol can perform over a active or passive connection.
• When a connection is made from the client to server, it is called as control connection and it
remains open for duration of session. This connection is responsible for establishing
connectivity between client and server.
• Other connection opened by client (passive) or server (active) is called data connection and
is used to transfer the data.
• Asseparate ports are used by client and server for these connections, FTP becomes an put of
band protocol.
• Datatransfer can take place in following three modes o Stream mode : data is sent in a
continuous stream where FTP does not do any formatting.
o Block mode: FTP breaks the data into several blocks (block header, byte count, and data
field) and then passes it on to TCP.
o Compressed mode: Data is compressed using a single algorithm.
• FTP is a old protocol and is basically low in security aspect. Data transferred over FTP is not
encrypted and is in clear text format.
Hence the data like usernames, passwords can be read by anyone who can capture the FTPed
package. Newer versions of the protocol, however, apply secure shell protocol (SSH) and avoid
all the problems faced by FTP.
• Following are few types of FTP protocol with additional features
• Anonymous FTP : Users login using an ‘anonymous’ account to protect their confidential
data.
• Remote FTP: FTP commands executed on a remote FTP server FTP with web browser and
firewall support. Secure FTP (SFTP,FTPS)
AnInternet service provider (ISP) is a company that provides access to the Internet, hosts data,
or does both. ISP is also known as IAP (internet access provider) Access ISPs connect
customers to the Internet using copper, wireless or fibre connections.
Hosting ISPs lease server space for smaller businesses and host other people servers
(colocation)..
• As internet gained popularity, it was essential to provide internet access to many people or
many hosts. Due to the increasing demand to access internet, commercial ISP came into
existence in1990. Technologies used For users and small business applications
• Dialupconnection
• DSL(digital subscriber line)
• Broadband wireless connection
• Cablemodem
• Fibre optical connection
For medium to large businesses or for other ISPs,
• DSL
• Ethernet
• Gigabyte Ethernet
• Framerelay
• Satellite Ethernet
• ISPconnections
ISPs which provide connections through phone lines like dial ups, do not seek any information
about the caller’s (user of the internet) physical location or address. So, caller from any location
which is in reach of the ISP, can use the services provided. Other way of getting connected
through ISP is using cable or any other lines. Here, fixed registration of the user at the ISP side
is essential.
•Services provided
ISP host usually provide e mail, FTP and web hosting services. Other services can be like
virtual machines, clouds or entire physical servers where clients can run their own softwares.
ISPs often take services from their upstream ISPs. i.e. they work in hierarchy. The ISPs are
divided into three categories
•Peering : ISPs taking services from upstream and getting connected to each other to exchange
data and to control network traffic through peering points, orinternetex change points. These
points help save one more upstream ISP and cut down on the cost. The ISPs which do not need
upstream ISP are called Tier 1 ISP.
• Virtual ISP (VISP) : this is an ISP which purchases services from other ISP and gives them
to the end user, without any set up of its own.
•Free ISP: these are ISPs which provide services free of cost to the users and display
advertisements till the users are connected. These are called as freenets. These are normally
run on no profit basis.
DOMAIN NAME SERVER
The Domain Name System (DNS) is like the internet’s phone book. It helps you find websites
by translating easy-to-remember names (like www.example.com) into the numerical IP
addresses (like 192.0.2.1) that computers use to locate each other on the internet. Without DNS,
you would have to remember long strings of numbers to visit your favorite websites.
Inverse Domain
The inverse domain is used for mapping an address to a name. When the server has received a
request from the client, and the server contains the files of only authorized clients. To determine
whether the client is on the authorized list or not, it sends a query to the DNS server and ask
for mapping an address to the name.
Working of DNS
o DNS is a client/server network communication protocol. DNS clients send requests to
the. server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a
forward DNS lookups while requests containing an IP address which is converted into
a name known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts available on
the internet.
o If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP
address of a hostname. If DNS server does not contain the IP address associated with a
hostname, then it forwards the request to another DNS server. If IP address has arrived
at the resolver, which in turn completes the request over the internet protocol.
Applications of DNS
• DNS enables users to access websites by typing in domain names (e.g.,
www.example.com) instead of needing to remember the website's IP address (e.g.,
192.0.2.1).
• DNS is used to resolve the mail exchange (MX) records, directing email traffic to the
correct mail server based on the domain name.
• DNS can be used to block access to malicious websites or filter content.
• DNS is used in VoIP systems to resolve the domain names of service providers and
connect voice traffic to the correct servers for calls, ensuring proper call routing.
•
INTERNET ADDRESS
Internet address follows the TCP/IP suite hence, it is also known as the IP address. Internet
address has a job of identifying a node on the network. In other words, it is a numeric label
attached to every system (computer or any other device). IP address provides two basic
functionalities:
• Identification of computer or node or device and location addressing.
• The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this
system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the
enormous growth of the Internet and the predicted depletion of available addresses, a new
addressing system (IPv6), using 128 bits for the address, was developed in 1995,[3]
standardized as RFC 2460 in 1998,[4] and is being deployed worldwide since themid-2000s.
• IP addresses are binary numbers, but they are usually stored in text files and displayed in
human-readable notations, such as 172.16.254.1 (forIPv4).Both IPV4 as well as IPV6 have
reserved addresses for private or internal networks. This is termed as private addressing.
• Both IPV4 and IPV6 have sub netting effect. That mean, IP networks can be divided into
smaller groups or subnets. IP addresses two constituents that is network address and host
identifier or interface identifier are used for this purpose.
• Internet Protocol addresses are assigned to a host either anew at the time of booting, or
permanently by fixed configuration of its hardware or software. Persistent configuration is also
known as using a static IP address. In contrast, in situations when the computer's IP address is
assigned newly each time, this is known as using a dynamic IP address.
5. Path. A path refers to a file or location on the web server. For this example, the path is
whatis/search/query.
6. Query. Found in the URL of dynamic pages, the query consists of a question mark,
followed by parameters or the query string. In this example, "?" marks the beginning of
the query.
8. Fragment. This is an internal page reference, which refers to a section within the
webpage. It appears at the end of a URL and begins with a pound sign (#).
URL vs. URI
Uniform Resource Identifiers (URIs) are strings of characters used to identify a resource over
a network. A URL is the most common type of URI. URLs are essential to navigating the
internet.
BROWSERS
A web browser or Internet browser is a software application for retrieving, presenting, and
traversing information resources on the World Wide Web.
• Web browsers can also be used to access information provided by Web servers in private
networks or files in file systems. Some browsers can also be used to save information resources
to file systems.
• Primary function of a browser is to identify the URI and brings the information resource to
user.
• This process begins when user inputs the URI in the browser. Prefix of the URI describes
how to interpret the URI. Most URIs have resource retrieved over Hyper text Transfer Protocol.
Some web browsers also support prefixes like FTP. • Once this is done, the HTML script is
passed to the browser’s layout engine. To make the script interactive java script support is
needed. With this, browser can interpret text, images, video and interactive scripts.
• All major browsers allow users to access multiple information resources at the same time in
different windows or in tabs. Major browsers include pop up blockers to prevent windows to
open without users consent.
• Most major web browsers have these user interface elements in common: Back and forward
buttons to go back to the previous resource and forward again.
• A history list, showing resources previously visited in a list (typically, the list is not visible
all the time and has to be summoned)
• Arefresh or reload button to reload the current resource.
• Astopbutton to cancel loading the resource. In some browsers, the stop button is merged
with the reload button.
• Ahomebutton to return to the user's homepage
• Anaddress bar to input the Uniform Resource Identifier (URI) of the desired resource and
display it.
• Asearchbar to input terms into a search engine o Astatus bar to display progress in loading
the resource and also the URI of links when the cursor hovers over them, and page zooming
capability.
• Some special web browsers are listed below.
INTERNET EXPLORER
• Windows Internet Explorer (formerly Microsoft Internet Explorer, commonly abbreviated IE
or MSIE) is a series of graphical web browsers developed by Microsoft and included as part of
the Microsoft Windows line of operating systems starting in1995.
• It was first released as part of the add-on package Plus! for Windows 95 that year. Later
versions were available as free downloads, or in service packs. It was part of later versions of
windows operating systems.
NETSCAPE NAVIGATOR
• Netscape Navigator is a proprietary web browser that was popular in the 1990s. It was the
most popular web browser till 2002, after which competitor browsers have taken over the
market of Netscape.
• Netscape Navigator was based on the Mosaic web browser.
OPERA
• Opera is a web browser and Internet suite developed by Opera Software. The browser handles
common Internet-related tasks such as displaying web sites, sending and receiving e-mail
messages, managing contacts, chatting on IRC, downloading files via Bit Torrent, and reading
webfeeds.
• Opera is offered free of charge for personal computers and mobile phones. This is the most
popular mobile phone browser and is not packages in desktop operating system.
• Features include tabbed browsing, page zooming, mouse gestures, and an integrated
download manager. Its security features include built-in 16 phishing and malware protection,
strong encryption when browsing secure websites, and the ability to easily delete private data
such as HTTP cookies.
MOZILLAFIREFOX
• Mozilla Firefox is a free and open source web browser descended from the Mozilla
Application Suite and managed by Mozilla Corporation. As of February 2011[update], Firefox
is the second most widely used browser with approximately 30% of worldwide usage share of
web browsers.
• To display web pages, Firefox uses the Gecko layout engine, which implements most current
web standards.
• The latest Firefox featuresinclude tabbed browsing, spell checking, incremental find, live
book marking, a download manager, private browsing, location-aware browsing (also known
as "geolocation") based exclusively on a Google service.
CHROME
• Chrome,
The web browser by Google, is rapidly becoming popular due to following features .
• SPEED: Chrome is designed to be fast in every possible way: It's quick in staring up from
the desktop, loading web pages and running complex web applications.
• SIMPLICITY: Chrome's browser window is streamlined, clean and simple. Chrome also
includes features that are designed for efficiency and ease of use. For example, you can
search and navigate from the same box, and arrange tabs however you wish.
• SECURITY: Chrome is designed to keep you safer and more secure on the web with built-
in malware and phishing protection, auto updates to make sure the browser is up-to-date
with the latest 17 security updates, and more. Learn more about Chrome's security features
SEARCH ENGINE
A search engine is a software system designed to search for information on the World Wide
Web. When you type a query into a search engine, it searches its index for relevant content and
displays the results in a ranked order. Search engines are essential tools for navigating the vast
amount of information available online.
WEBSERVER
Web pages are a collection of data, including images, text files, hyperlinks, database files etc.,
all located on some computer (also known as server space) on the Internet. A web server is
dedicated software that runs on the server-side.
This intercommunication of a web server with a web browser is done with the help of a protocol
named HTTP (Hypertext Transfer Protocol). These stored web pages mostly use static
content, containing HTML documents, images, style sheets, text files, etc. However, web
servers can serve static as well as dynamic contents. Web Servers also assists in emailing
services and storing files. Therefore it also uses SMTP (Simple Mail Transfer
Protocol) and FTP (File Transfer Protocol) protocols to support the respective services. Web
servers are mainly used in web hosting or hosting the website's data and running web-based
applications.
HTTP PROTOCOL
• HTTPstands for Hyper Text Transfer Protocol.
• It is a protocol used to access the data on the World Wide Web (www).
• The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio,
video, and so on.
• This protocol is known as Hyper Text Transfer Protocol because of its efficiency that allows
us to use in a hypertext environment where there are rapid jumps from one document to another
document.
• The HTTP protocol is a request/response protocol based on the client/server based
architecture where web browsers, robots and search engines, etc. act like HTTP clients and the
Web server acts as a server.
The HTTP protocol is a request/response protocol based on the client/server based architecture
where web browsers, robots and search engines, etc. act like HTTP clients, and the Web server
acts as a server.
Basic Features:
• HTTP is connectionless protocol
• HTTP is media independent
• HTTP is stateless
INTRODUCTION TO HTML
HTML (HyperText Markup Language) is the standard language used to create and design
web pages. It provides the basic structure of web documents, using a system of tags to define
elements like headings, paragraphs, links, images, and more. HTML is essential for building
websites and web applications and is the backbone of every webpage you see on the internet.
Here are some key events in the history of HTML:
• 1980: Tim Berners-Lee, a CERN physicist, proposes and prototypes ENQUIRE, a
system for CERN researchers to share documents.
• 1989: Berners-Lee writes a memo proposing an internet-based hypertext system.
• 1991: Berners-Lee introduces the first publicly available description of HTML, a
document called "HTML Tags".
• 1993: HTML 1.0 is released, consisting of 18 HTML tags.
• 1995: HTML 2.0 is released, which builds on HTML 1.0 and adds new features.
• 1997: HTML 3.0 is released, which improves on HTML's features.
• 1999: HTML 4.0 is released, which is widely adopted and used globally.
• 2014: HTML 5 is released, which is the fifth major version.
FORMATTING OF BACKGROUNDS
The background-color property provides a color for the background of the text, but not for the
whole document. If you wish to change the HTML color for the whole page, you should use
the bgcolor attribute in the opening tag of the
section: 28 HTML provides you following two good ways to decorate your webpage
background.
• HTMLBackgroundwithColors
• HTMLBackgroundwithImages
Html Background with Colors: The bgcolor attribute is used to control the background of an
HTML element, specifically page body and table backgrounds. Syntax The example below
shows the attribute.
This background is yellow
Html Background with Images: The background attribute can also be used to control the
background of an HTMLelement, specifically page body and table backgrounds.
CREATING HYPERLINKS AND BOOKMARKS
Hyperlinks allow users to navigate to other pages or websites by clicking a link.
Syntax:
<a href="URL">Clickable Text</a>
EXAMPLE
<!DOCTYPE html>
<html>
<head>
<title>Hyperlink Example</title>
</head>
<body>
<h2>Hyperlink Example</h2>
<a href="https://www.google.com" target="_blank">Visit Google</a>
</body>
</html>
• The <a> tag creates a hyperlink.
• The href attribute specifies the URL.
• target="_blank" opens the link in a new tab.
2. Bookmarks
Bookmarks allow users to navigate to specific sections of the same page.
Syntax:
1. Define a target section using id.
2. Link to the section using #id.
<!DOCTYPE html>
<html>
<head>
<title>Bookmark Example</title>
</head>
<body>
<h2>Bookmark Example</h2>
<a href="#section2">Go to Section 2</a>
1. <meta charset>
Specifies the character encoding of the document.
2. <meta name="description">
Defines a brief description of the webpage for search engines.
3. <meta name="keywords">
Specifies keywords related to the content of the webpage.
4. <meta name="author">
Defines the author's name.
5. <meta name="viewport">
Improves responsiveness by controlling the layout on mobile devices.
6. <title>
Specifies the title of the webpage (appears in the browser tab).
7. <meta http-equiv>
Provides HTTP headers or refreshes the page.
Example
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="A simple HTML document to demonstrate metadata.">
<meta name="keywords" content="HTML, metadata, tutorial, SEO">
<meta name="author" content="Jane Doe">
<title>Metadata Example</title>
</head>
<body>
<h1>Welcome to Metadata in HTML</h1>
<p>This page shows how to use metadata in an HTML document.</p>
</body>
</html>
Why Use Metadata?
1. SEO: Helps search engines index the page better.
2. User Experience: Improves mobile responsiveness and page behavior.
3. Identification: Provides essential information like author, keywords, and descriptions.
CSS: INTRODUCTION
CSS (Cascading Style Sheets) is a styling language used to design and enhance the appearance
of HTML elements. It controls layout, colors, fonts, spacing, and more, separating content from
presentation. CSS makes websites visually appealing and responsive across devices. Styles can
be applied inline, internally, or externally. CSS works with selectors to target specific elements
for styling.
5. Grouping Selector
Styles multiple elements with the same declaration.
h1, h2, p {
color: purple;
}
CHANGING BACKGROUND,ADDING BORDER,MARGIN AND PADDING
CSS properties like background-color, border, margin, and padding are essential for styling and
layout. These can be demonstrated effectively using Internal CSS.
What is Margin?
Margin is the space around an element. It is used to move an element up or down on a page as
well as left or right.
What is Padding?
Padding is the space between the element and the related content inside it. It determines how
elements look and sit within a container.
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>CSS Styling Example</title>
<style>
body {
background-color: lightgray;
}
.box {
background-color: white;
border: 2px solid blue;
margin: 20px;
padding: 15px;
width: 300px;
}
</style>
</head>
<body>
<h1>CSS Styling Example</h1>
<div class="box">
<p>This box demonstrates background color, border, margin, and padding.</p>
</div>
</body>
</html>
SETTING DIMENSIONS
CSS provides properties to set the dimensions of HTML elements. The most commonly used
dimension properties are:
• width: Sets the width of an element.
• height: Sets the height of an element.
• max-width: Specifies the maximum width of an element.
• max-height: Specifies the maximum height of an element.
• min-width: Specifies the minimum width of an element.
• min-height: Specifies the minimum height of an element.
Example
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>CSS Dimensions Example</title>
<style>
/* Setting width and height */
.box1 {
width: 200px; /* Fixed width */
height: 100px; /* Fixed height */
background-color: lightblue;
}
</style>
</head>
<body>
<h1>CSS Dimensions Example</h1>
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Inline Container Example</title>
<style>
/* Styling for inline containers */
.highlight {
background-color: yellow;
font-weight: bold;
}
.italic {
font-style: italic;
color: gray;
}
</style>
</head>
<body>
<p>
This is a normal sentence, but <span class="highlight">this part is highlighted</span>
and
<span class="italic">this part is italicized</span>.
</p>
</body>
</html>
INTERNET VS WORLDWIDEWEB