Introduction and Web Development Strategies
Introduction and Web Development Strategies
History of WWW:
Classification:
HTTP
TCP/IP
FTP
E-MAIL
TELNET
HTTP: HTTP is the primary protocol used to distribute information on the web.
Initial HTTP 0.9 does not allow for content typing and does not have provisions forsupplying
meta-information.
TCP/IP: It is a set of rules that an application can use to package its information forsending
across the networks of networks.
FTP: It is used to transfer the files over networks.
E-Mail: It is a method of exchanging digital messages across the Internet or othercomputer
networks.
Telnet: Telnet lets you remotely log into another system and browse files and directorieson that remote
system.
Website: A website is simply a collection of interlinked web pages.
Classification:
A. Corporate Website
B. Individual website
A. Corporate Website:
i. In this, there is certain no. of persons, who develop their website for a
particular organization.
ii. The corporate website are formed when group of people have common
interest and objective.
iii. The purpose of this website is to convey the information of organization to all
over the world.
B. Individual website: It is just like profile management system. In this type of website
an individual wants to develop website for h-projection, career growth etc.
Cyber Laws: Cyber law is a term used to describe the legal issues related to use of
communication technology, particularly “cyberspace” i.e. Internet.
Indian and International Cyber Law: Cyber Laws are formed by the government to prevent the
internet crime. These crimes could be hacking, threat on internet, denial of services etc. Cyberspace
includes computer, computer networks, internet data, software etc.
o Data Protection and Privacy Law: This is due to the nature of the internet
and amount of information that may be accessed through it, such legislation is
critical to protect the fundamental rights of privacy of an individual.
o Electronic and Digital Signature Law: This is required so that uniform and
standard procedures are established for authentication of electronics records,
EDI, E-Mail.
o Computer Crime Law: due to victim of internet threats.
o Telecommunication Law: Approve and supervise the application of fees and
rates charged for telecommunication services in accordance with the provision
of the applicable law.
o Intellectual Property Law: This includes copyright law, trademark law,
semiconductor law and patent law in relation to computer hardware and
software.
E-Governance
Authentication of E-Records
Digital Signatures
Controlled certifying authorities
Penalties for damage of computer and computer system.
Writing web Projects and Target Users:
Write a project mission statement: Write the specific mission statement that you want to
do.
Identify Objectives:
Specific
Measurable
Attainable
Realistic
Time limited
Identify your target users: The matter of a website will be determined by theusers whom
you want to visit the site. This is totally depend upon
Market research
Focus group
Understanding intranet audiences
Determine the scope: By supporting documents and client’s approval.
Budget:
Assumption for budgets.
Budget categories.
Determine hidden costs and tools.
Planning issues:
Discuss client’s existing information system.
Project team and developing infrastructure.
Where the website will place.
Comparison between traditional project and web project:
Web Projects
Traditional Projects
1. They are always different.
2. It is not applicable in this case
4. More specialized.
Internet Services allows us to access huge amount of information such as text, graphics, sound and software over the
internet. Following diagram shows the four different categories of Internet Services.
Communication Services
There are various Communication Services available that offer exchange of information with individuals or groups. The
following table gives a brief introduction to these services:
1 Electronic Mail
Used to send electronic message over the internet.
2 Telnet
Used to log on to a remote computer that is attached to internet.
3 Newsgroup
Offers a forum for people to discuss topics of common interests.
5 Mailing Lists
Used to organize group of internet users to share common information through e-mail.
7 Instant Messaging
Offers real time chat between individuals and group of people. Eg. Yahoo messenger, MSN messenger.
Information Retrieval Services
There exist several Information retrieval services offering easy access to information present on the internet. The following
table gives a brief introduction to these services:
2 Archie
It’s updated database of public FTP sites and their content. It helps to search a file by its name.
3 Gopher
Used to search, retrieve, and display documents on remote sites.
Web Services
Web services allow exchange of information between applications on the web. Using web services, applications can easily
interact with each other.
The web services are offered using concept of Utility Computing.
Video Conferencing
Video conferencing or Video teleconferencing is a method of communicating by two-way video and audio transmission with
help of telecommunication technologies.
Modes of Video Conferencing
Point-to-Point
This mode of conferencing connects two locations only.
Multi-point
This mode of conferencing connects more than two locations through Multi-point Control Unit (MCU).
Introduction to client server computing
In client server computing, the clients requests a resource and the server provides that resource. A server may serve multiple
clients at the same time while a client is in contact with only one server. Both the client and server usually communicate via a
computer network but sometimes they may reside in the same system.
An illustration of the client server system is given as follows −
The client server computing works with a system of request and response. The client sends a request to the server and
the server responds with the desired information.
The client and server should follow a common communication protocol so they can easily interact with each other. All
the communication protocols are available at the application layer.
A server can only accommodate a limited number of client requests at a time. So it uses a system based to priority to
respond to the requests.
Denial of Service attacks hindera servers ability to respond to authentic client requests by inundating it with false
requests.
An example of a client server computing system is a web server. It returns the web pages to the clients that requested
them.
In client server computing, a server is a central node that services many client nodes. On the other hand, in a peer to
peer system, the nodes collectively use their resources and communicate with each other.
In client server computing the server is the one that communicates with the other nodes. In peer to peer to computing,
all the nodes are equal and share data with each other directly.
Client Server computing is believed to be a subcategory of the peer to peer computing.
Advantages of Client Server Computing
The different advantages of client server computing are −
All the required data is concentrated in a single place i.e. the server. So it is easy to protect the data and provide
authorisation and authentication.
The server need not be located physically close to the clients. Yet the data can be accessed efficiently.
It is easy to replace, upgrade or relocate the nodes in the client server model because all the nodes are independent
and request data only from the server.
All the nodes i.e clients and server may not be build on similar platforms yet they can easily facilitate the transfer of
data.
If all the clients simultaneously request data from the server, it may get overloaded. This may lead to congestion in the
network.
If the server fails for any reason, then none of the requests of the clients can be fulfilled. This leads of failure of the
client server network.
The cost of setting and maintaining a client server model are quite high.