Professional Documents
Culture Documents
8/20/2013
1960s- U.S Department of Defense (DoD) became interested in developing a new large scale computer network. The DoDs Advanced Research Projects Agency (ARPA) funded the construction of the first such network established at UCLA in 1969 . Hence it was named as ARPAnet.
8/20/2013
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) Since 1982, all connections use TCP/IP- TCP/IP hides the differences among devices connected to the Internet It consists of millions of private, public, academic, business, and government networks of local to global scope that are linked by a broad array of electronic and optical networking technologies.
8/20/2013
All devices connected to the Internet are uniquely identified using IP address. The Internet Protocol (IP) address of a machine connected to the Internet is a unique 32-bit number. IP addresses usually are written as four 8-bit numbers, separated by periods. New standard IPv6 128 bits.
http://www.ip-adress.com/whois/devilsproxy.com
8/20/2013
Text based names to remember IP address technically known as Domain Name System(DNS). These names begin with the names of the host machine, followed by progressively larger enclosing collection of machines, called domains. There may be two, three or more domain names. DNS is of the form hostname.domainName.domainName .Example: vtu.ac.in First domain : Hostname Second domain and so on : Domain of which first domain is a part Last Domain : Type of organization. Ex: .com, .gov, .org, .in
8/20/2013
The DNS has to be converted to IP address before destination is reached because computer understands only numbers. The conversion is done with the help of name server. As soon as domain name is provided, it will be sent across the internet to contact name servers. This name server is responsible for converting domain name to IP, If one of the name servers is not able to convert DNS to IP, it contacts other name server. This process continues until IP address is generated. Once the IP address is generated, the host can be accessed. The hostname and all domain names form what is known as FULLY QUALIFIED DOMAIN NAME.
8/20/2013 7
8/20/2013
In 1980s, different protocols on TCP\IP had been developed to developed to support a variety of Internet uses.
FTP To transfer files over Internet Telenet- Remote login Usenet Electronic bulletin board mailto message over Internet
Drawback: User had to learn interfaces of all the different protocols. Solution: World Wide Web (WWW)
8/20/2013
1989: Tim Berners Lee and his group proposed a new protocol for the Internet whose intention was to allow documents exchange. The proposed new system was designed to allow a user anywhere on the Internet to search for and retrieve documents from the databases on any number of different document-serving computers.
embedded links to text in other documents to allow non-sequential browsing of textual material.
8/20/2013 10
Documents are texts with embedded links to other documents, they mal also have images, sound recordings or other media. In such case it is called hypermedia.
These documents can be accessed by web browsers and are provided by web servers.
8/20/2013
11
It is important to understand that the Internet and the Web is not the same thing.
The Internet is a collection of computers and other devices connected by equipment that allows them to communicate with each other. The Web is a collection of software and protocols that has been installed on most, if not all, of the computers on the Internet
8/20/2013
12
Client: Request for Information. Server: Provides service by providing requested information. Most application on WEB operates in this client\server configuration. Client: Web Browser Server: Web Server
8/20/2013
13
Documents provided by servers on the Web are requested by browsers, which are programs running on client machines. First browsers were text based, not capable of displaying graphics, images, interface. 1993, Mosaic, first graphical interface browser, developed by NCSA ( National center for super computer application) Resulted in explosive growth of web usage.
8/20/2013
14
8/20/2013
15
8/20/2013
16
Programs that provide documents to requesting browsers ( clients). First two servers:
Server at CERN in Europe Server at NCSA at university of Illinois
Web browser specifies a address of a data file on server or a program stored in the server that the client wants executed, with the output of the program returned to the client.
8/20/2013 17
All the communications between a web client and a web server uses the standard protocol HTTP When a web server begins execution,
It informs the OS under which it is running & it runs as a background process 1. 2. 3. 4. 1. 2. 3. Opens a network connection to a web server, Sends information requests and possibly data to the server, Receives information from the server and closes the connection. Monitor a communication port on host machine, Accept HTTP commands through that port and Perform the operations specified by the commands.
When the URL is received, it is translated into either a filename or a program name.
8/20/2013 18
Common characteristics of web servers Web servers have two main directories:
1. Document root (servable documents) 2. Server root (server system software)
The files stored directly in the document root are those available to clients through top level URLs The secondary areas from which documents can be served are called virtual document trees. Many servers can support more than one site on a computer, potentially reducing the cost of each site and making their maintenance more convenient. Such secondary hosts are called
virtual hosts.
Some servers can serve documents that are in the document root of other machines on the web; in this case they are called as
proxy servers.
8/20/2013
19
Apache: Began as the NCSA server httpd Most widely used web server. Fast and Reliable Open source software and free Best available server for UNIX based systems which is preferred for servers. Contains three configuration files:
Httpd.conf Srm.conf Access.conf
8/20/2013
20
Supplied with Microsoft windows server systems. Provides similar service to that of Apache. IIS Snap-in is a window based (GUI) management program to configure the server unlike configuration file of Apache.
8/20/2013
21
Uniform Resource Locators (URLs) are used to identify different kinds of resources on Internet. If the web browser wants some document from web server, just giving domain name is not sufficient because domain name can only be used for locating the server. It does not have information about which document client needs. Therefore, URL should be provided. The general format of URL is:
scheme: object-address
Example: http: www.vtu.ac.in/results.php The scheme indicates protocols being used. (http, ftp, telnet...) In case of http, the full form of the object address of a URL is as follows: http://fully-qualified-domain-name/path-to-document
8/20/2013
22
URLs can never have embedded spaces. It cannot use special characters like semicolons, ampersands and colons The path to the document for http protocol is a sequence of directory names and a filename, all separated by whatever special character the OS uses. (forward or backward slashes) A path that includes all directories along the way is called a complete path. Example: http://www.vtu.ac.in/index.html In most cases, the path to the document is relative to some base path that is specified in the configuration files of the server. Such paths are called partial paths. Example: http://www.vtu.ac.in/
8/20/2013
23
A browser determines the format of a document it receives by the help of MIME. A web server attaches MIME format specification to the beginning of the document provided to browser. When browser receives the document, it uses the MIME specification to determine qwhat to do. MIME specification have the following format: type/subtype
8/20/2013 24
The most common types of MIME are texts, image and video. Common text subtypes are plain and html. Common image subtype gif and jpeg. Common video subtype mpeg and quicktime. Server determines the file type by using filenames extension.
8/20/2013
25
Name of experimental type begins with x. Ex: video/-x msvideo Web provider can add an experimental subtype by having its name added to the list of MIME specification in web providers server. Web browser must supply a support program called helper applications or plug-ins.
8/20/2013
26
All web communications and transactions uses the same protocol HTTP. Current version is HTTP1.1- stable, formally defines as RFC 2616. Two phases : Each communication consists of two parts, a header and a body.
Header- Information about communication Body Data of the communication if any Request Response
8/20/2013
27
Example:
/cs.uccp.edu/degrees.html HTTP/1.1
GET
8/20/2013
28
8/20/2013
29
General: For general information such as date Request: Included in the request headers Response: For response headers Entity: Used in both request and response headers.
8/20/2013
30
Host: hostname request field gives the name of the host. If the request has a body length of the body must given with a content-length field. Header of a request must be followed by a blank line, which is used to separate the header from the body. GET , HEAD, DELETE methods do not have bodies.
8/20/2013
31
GET http://www.tiggerwigger.com/ HTTP/1.0 Proxy-Connection: Keep-Alive User-Agent: Mozilla/5.0 [en] (X11; I; Linux 2.2.3 i686) Host: www.tiggerwigger.com Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */ * Accept-Encoding: gzip Accept-Language: en Accept-Charset: iso-8859-1, *, utf-8
8/20/2013
32
Status line
HTTP version three digit status code status code explain HTTP/1.1 200 OK
8/20/2013
33
8/20/2013
34
Several lines of information about the response header. Content-type : only essential field.
HTTP/1.1 200 OK Date: Sat, 25 July 2009 20:15:11 GMT Server: Apache /2.2.3 (CentOS) Last-modified: Tues, 18 May 2004 16:38:38 GMT Etag: "1b48098-16a-3dab592dc9f80" Accept-ranges: bytes Content-length: 364 Connection: close Content-type: text/html, charset=UTF-8
8/20/2013
35
Fertile ground for security problems. Transmit data without any interception and corruption. Security issues for a communication between a browser and a server: 1. Privacy 2. Integrity 3. Authentication 4. Nonrepudiation
8/20/2013
36
Encryption:Basic tool to support privacy and integrity. Symmetric and Asymmetric Private-Key encryption and Public key encryption Public key encryption in 1976 by Whitfield Diffie and Martin Hellman. Most widely used public key encryption is RSA algorithm -1977- by Ron Rivest, Adi Shamir and Leonard Adelman of MIT.
8/20/2013 37
Viruses, Zombies, worms, hacking .. Solution is to use Anti Virus software's and keeping it up to date. Virus examples:
ILOVEYOU 2000 CodeRedvirus 2001 Blaster Worm 2003
8/20/2013
38
Most common tools used in the Web programming. XHMTL, XML, Javascript, Java, Perl, PHP, Ruby, AJAX, Rails
8/20/2013
39
To describe the general form and layout of documents An XHTML document is a mix of content and controls Controls are tags and their attributes
Tags often delimit content and specify something about how the content should be arranged in the document Attributes provide additional information about the content of a tag
8/20/2013
40
Plug ins
Integrated into tools like word processors, effectively converting them to WYSIWYG
XHTML editors
Filters
Convert documents in other formats to XHTML
8/20/2013
41
XML
A meta-markup language Used to create a new markup language for a particular purpose or area Because the tags are designed for a specific area, they can be meaningful No presentation details A simple and universal way of representing and transmitting data of any textual kind
JavaScript
A client-side XHTML-embedded scripting language
Only related to Java through syntax Dynamically typed and not object-oriented Provides a way to access elements of XHTML documents and dynamically change them
8/20/2013
42
Flash
A system for building and displaying text, graphics, sound, interactivity, and animation (movies) Two parts:
Authoring environment Player
PHP
A server-side scripting language Similar to JavaScript Great for form processing and database access through the Web
8/20/2013
43
Ajax
Asynchronous JavaScript + XML No new technologies or languages Much faster for Web applications that have extensive user/server interactions Uses asynchronous requests to the server Requests and receives small parts of documents, resulting in much faster responses
8/20/2013
44
ASP.NET
Does what JSP and JSF do, but in the .NET environment
Allows any .NET language to be used as a server-side scripting language ASP.NET documents are compiled into classes
Ruby
A pure object-oriented interpreted scripting language Every data value is an object, and all operations are via method calls Most operators can be redefined by the user
8/20/2013
45
applications
Particularly useful for Web applications that access databases Written in Ruby and uses Ruby as its primary user language Based on the Model-View-Controller architecture
8/20/2013
46
8/20/2013
47
8/20/2013
48