rohini_58863099423
rohini_58863099423
rohini_58863099423
Unit -1
WEBSITE BASICS, HTML 5, CSS 3,
WEB 2.0
1.1 WEB ESSENTIALS
WEBSITES
A website is a set of related web pages typically served from a single web server.
A website is hosted on at least one web server, accessible via a network such as the
internet or a private local area network. The pages of a website can usually be accessed from a
simple Uniform Resource Locator (URL) otherwise called as web address. The URLs of the
pages organize them into a hierarchy.
Terminologies:
Internet: The Internet is a collection of computers around the world connected to each other
via high speed series of networks.
World Wide Web (WWW): The World Wide Web – or Web consists of a vast assortment of
files and documents that are stored on the computers and written in some form of Hyper Text
Markup Language (HTML).
Servers: The computers that store the files are called servers because they can serve requests
from many users at the same time.
Browsers: A Web browser is a program that displays Web pages and other documents on the
web. Examples: Internet explorer, Firefox, Google Chrome etc.
HTML: HTML, or Hyper Text Markup Language, is the authoring language that describes
how a Web page should be displayed by a Web browser. It has two essential features:
Hypertext: When a visitor clicks a link on a Web page, it leads to another web page
INTERNET
The origin of Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET). ARPANET was developed by United States
Department of Defense.
In 1972, the ARPANET spread over the globe with 23 nodes located at different
countries and thus became known as Internet.
By the time, with invention of new technologies such as TCP/IP protocols, DNS,
WWW, browsers, scripting languages etc, Internet provided a medium to publish
and access information over the web.
Internet Terminologies
Host: A computer connected to the Internet is commonly referred to as a host.
Communication services: The data is passed back and forth between host
computers using packets and protocols, such as electronic mail (e-mail) for
messaging, file transfer protocol (FTP) for moving files, telnet for accessing
information, hypertext transfer protocol (HTTP) for serving up Web sites, custom
protocols, etc. They are called communication services.
Hyperlinks: Allow a user to quickly move from one web page to another, even if
the pages are on different servers in different parts of the world.
Protocols: They are pre-established means of communication. Example: TCP/IP,
SMTP.
IP address: It is the address of the machine. It is a four byte unique number that
identifies a system on the Internet.
Domain Name Services (DNS): They link text to our numeric IP addresses,
allowing users to use the DNS as a proxy for the IP address. The IP addresses are
often provided by the ISP. Each site must register the name for a cost through a
DNS hosting service. DNS host servers then are used to convert our text DNS
address to its digital IP address equivalent.
World Wide Web: The World Wide Web consists of all the Web sites and pages served
on the Internet via HTTP. It is a hypermedia-based system for browsing Internet sites. It is
named the web because it is made of many sites linked together; users can travel from one
site to another by clicking on hyperlinks. Text, graphics, sound, and video can all be
accessed. Tim Berners-Lee invented the World Wide Web in 1989 while working at
CERN, the European Particle Physics Laboratory.
Protocol is a set of mutually accepted and implemented rules at both ends of the
communications channel for the proper exchange of information.
TCP / IP
Transmission Control Protocol/Internet Protocol (TCP /IP) is a suite of communication
protocols used to interconnect network devices on the internet. TCP/IP can also be used as a
communications protocol in a private network.TCP/IP specifies how data is exchanged over
the internet by providing end-to-end communications that identify how it should be broken
into packets, addressed, transmitted, routed and received at the destination.
IP defines how to address and route each packet to make sure it reaches the right
destination. Each gateway computer on the network checks this IP address to determine where
to forward the message.A key element of IP is the IP address, which is simply a 32 -bit
number. IP addresses are normally written as a sequence of four decimal numbers separated
by periodsas in 192.0.34.166. When an application on the source computer wants to send
information to a destination, the application calls IP software on the source machine and
provides it with data to be transferred along with an IP address for each of the source and
destination computers.
The IP software running on the source creates a packet, which is a sequence of bits
representing the data to be transferred along with the source and destination IP addresses and
some other header information, such as the length of the data.If the destination computer is on
the same local network as the source, then the IP softwarewill send the packet to the
destination directly via this network.
If the destination is onanother network, the IP software will send the packet to a
gateway, which is a device that is connected to the source computer’s network as well as to at
least one other network.The gateway will select a computer on one of the other networks to
which it is attached and send the packet on to that computer. This process will continue, until
the packet reaches the destination computer.
IP software on that computer will receive the packet and pass its data up to an
application that is waiting for the data.TCP, the Transmission Control Protocol, is a higher-
level protocol that extends IP to provide additional functionality, including reliable
communication based on the concept of a connection.
UDP provides protocol port used i.e. UDP message contains both source and
destination port number, that makes it possible for UDP software at the destination to deliver
the message to correct application program.
Data
TCP UDP
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
As a message makes its way across the UDP is also a protocol used in message
internet from one computer to another. This transport or transfer. This is not connection
is connection based. based which means that one program can
send a load of packets to another and that
would be the end of the relationship.
TCP is suited for applications that require UDP is suitable for applications that need
high reliability, and transmission time is fast, efficient transmission, such as games.
relatively less critical UDP's stateless nature is also useful for
servers that answer small queries from huge
numbers of clients.
TCP is used by HTTP, HTTPs, FTP, UDP is used by DNS, DHCP, TFTP,
SMTP, Telnet SNMP, RIP, VOIP.
TCP rearranges data packets in the order UDP has no inherent order as all packets are
specified. independent of each other. If ordering is
required, it has to be managed by the
application layer.
The speed for TCP is slower than UDP. UDP is faster because there is no error-
checking for packets.
There is absolute guarantee that the data There is no guarantee that the messages or
transferred remains intact and arrives in the packets sent would reach at all.
same order in which it was sent.
TCP header size is 20 bytes UDP Header size is 8 bytes.
Data is read as a byte stream, no Packets are sent individually and are
distinguishing indications are transmitted checked for integrity only if they arrive.
to signal message (segment) boundaries Packets have definite boundaries which are
honored upon receipt, meaning a read
operation at the receiver socket will yield an
entire message as it was originally sent
FTP establishes two different connections: one is for data transfer and other is for
control information.
Control connection is made between control processes while Data Connection is
made between data transfer process.
FTP uses port 21 for the control connection and Port 20 for the data connection.
TFTP makes use of UDP for data transport. Each TFTP message is carried in separate
UDP datagram.The first two bytes of a TFTP message specify the type of message. The TFTP
session is initiated when a TFTP client sends a request to upload or download a file.The
request is sent from an ephemeral UDP port to the UDP port 69 of a TFTP server.
FTP TFTP
Authentication is done before transferring No authentication is done before transferring
files. files
The underlying protocol employed is TCP. The underlying protocol employed is UDP.
Port 20 is used as control port and 21 for Port numbers: 3214, 69, 4012 are used.
data transfers.
Telnet
Telnet is a protocol used to log in to remote computer on the internet. There are a
number of Telnet clients having user friendly user interface. The following diagram shows a
person is logged in to computer A, and from there, he remotely logged into another computer
B.