Msc(IT)_Unit_1(Introduction to Web)_Internet and web Technology(1310505)

 

What is computer networking?

Computer networking refers to interconnected computing devices that can exchange data and share resources with each other. These networked devices use a system of rules, called communications protocols, to transmit information over physical or wireless technologies.

Network computer devices that originate, route and terminate the data are called network nodes.[1]Nodes can include hosts such as personal computersphones,servers as well as networking hardware. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.

Computer networks differ in the transmission medium used to carry their signals, the communications protocols to organize network traffic, the network’s size, topology and organizational intent.

Computer networks support an enormous number of applications and services such as access to the World Wide Webdigital videodigital audio, shared use of application and storage serversprinters, and fax machines, and use of email and instant messaging applications as well as many others. In most cases, application-specific communications protocols are layered (i.e. carried as payload) over other more general communications protocols.

Computer network design falls under two broad categories:

1. Client-server architecture

In this type of computer network, nodes may be servers or clients. Server nodes provide resources like memory, processing power, or data to client nodes. Server nodes may also manage client node behavior. Clients may communicate with each other, but they do not share resources. For example, some computer devices in enterprise networks store data and configuration settings. These devices are the servers in the network. Clients may access this data by making a request to the server machine.

What is a Client? client is a computer hardware device or software that accesses a service made available by a server. The server is often (but not always) located on a separate physical computer.

What is a Server? server is a physical computer dedicated to run services to serve the needs of other computers. Depending on the service that is running, it could be a file server, database server, home media server, print server, or web server.

 


 

2. Peer-to-peer architecture

In Peer-to-Peer (P2P) architecture, connected computers have equal powers and privileges. There is no central server for coordination. Each device in the computer network can act as either client or server. Each peer may share some of its resources, like memory and processing power, with the entire computer network. For example, some companies use P2P architecture to host memory-consuming applications, such as 3-D graphic rendering, across multiple digital devices.

 


 

Computer Network Types

A computer network is a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications.

A computer network can be categorized by their size. A computer network is mainly of four types:


  • LAN(Local Area Network)
  • PAN(Personal Area Network)
  • MAN(Metropolitan Area Network)
  • WAN(Wide Area Network)

LAN(Local Area Network)

  • Local Area Network is a group of computers connected to each other in a small area such as building, office.
  • LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable, etc.
  • It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet cables.
  • The data is transferred at an extremely faster rate in Local Area Network.
  • Local Area Network provides higher security.



PAN(Personal Area Network)

  • Personal Area Network is a network arranged within an individual person, typically within a range of 10 meters.
  • Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network.
  • Personal Area Network covers an area of 30 feet.
  • Personal computer devices that are used to develop the personal area network are the laptop, mobile phones, media player and play stations.


There are two types of Personal Area Network:



  • Wired Personal Area Network
  • Wireless Personal Area Network

Wireless Personal Area Network: Wireless Personal Area Network is developed by simply using wireless technologies such as WiFi, Bluetooth. It is a low range network.

Wired Personal Area Network: Wired Personal Area Network is created by using the USB.

Examples Of Personal Area Network:

  • Body Area Network: Body Area Network is a network that moves with a person. For example, a mobile network moves with a person. Suppose a person establishes a network connection and then creates a connection with another device to share the information.
  • Offline Network: An offline network can be created inside the home, so it is also known as a home network. A home network is designed to integrate the devices such as printers, computer, television but they are not connected to the internet.
  • Small Home Office: It is used to connect a variety of devices to the internet and to a corporate network using a VPN

MAN(Metropolitan Area Network)

  • A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network.
  • Government agencies use MAN to connect to the citizens and private industries.
  • In MAN, various LANs are connected to each other through a telephone exchange line.
  • The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc.
  • It has a higher range than local area network(LAN)


 Uses Of Metropolitan Area Network:

  • MAN is used in communication between the banks in a city.
  • It can be used in an Airline Reservation.
  • It can be used in a college within a city.
  • It can also be used for communication in the military.

WAN(Wide Area Network)

  • A Wide Area Network is a network that extends over a large geographical area such as states or countries.
  • A Wide Area Network is quite bigger network than the LAN.
  • A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fibre optic cable or satellite links.
  • The internet is one of the biggest WAN in the world.
  • A Wide Area Network is widely used in the field of Business, government, and education.


Examples Of Wide Area Network:

  • Mobile Broadband: A 4G network is widely used across a region or country.
  • Private network: A bank provides a private network that connects the 44 offices. This network is made by using the telephone leased line provided by the telecom company.

Advantages Of Wide Area Network:

Following are the advantages of the Wide Area Network:

  • Geographical area: A Wide Area Network provides a large geographical area. Suppose if the branch of our office is in a different city then we can connect with them through WAN. The internet provides a leased line through which we can connect with another branch.
  • Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy the emails, files or back up servers.
  • Get updated files: Software companies work on the live server. Therefore, the programmers get the updated files within seconds.
  • Exchange messages: In a WAN network, messages are transmitted fast. The web application like Facebook, Whatsapp, Skype allows you to communicate with friends.
  • Sharing of software and resources: In WAN network, we can share the software and other resources like a hard drive, RAM.
  • Global business: We can do the business over the internet globally.
  • High bandwidth: If we use the leased lines for our company then this gives the high bandwidth. The high bandwidth increases the data transfer rate which in turn increases the productivity of our company.

Disadvantages of Wide Area Network:

The following are the disadvantages of the Wide Area Network:

  • Security issue: A WAN network has more security issues as compared to LAN and MAN network as all the technologies are combined together that creates the security problem.
  • Needs Firewall & antivirus software: The data is transferred on the internet which can be changed or hacked by the hackers, so the firewall needs to be used. Some people can inject the virus in our system so antivirus is needed to protect from such a virus.
  • High Setup cost: An installation cost of the WAN network is high as it involves the purchasing of routers, switches.
  • Troubleshooting problems: It covers a large area so fixing the problem is difficult.


Types of Network Topology

The arrangement of a network that comprises nodes and connecting lines via sender and receiver is referred to as Network Topology. The various network topologies are:

  • Point to Point Topology
  • Mesh Topology
  • Star Topology
  • Bus Topology
  • Ring Topology
  • Tree Topology

Point to Point Topology

Point-to-Point Topology is a type of topology that works on the functionality of the sender and receiver. It is the simplest communication between two nodes, in which one is the sender and the other one is the receiver. Point-to-Point provides high bandwidth.

Point to Point Topology

Point to Point Topology

Mesh Topology

In a mesh topology, every device is connected to another device via a particular channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc.

Mesh Topolgy

Mesh Topology

Figure 1: Every device is connected to another via dedicated channels. These channels are known as links. 

  • Suppose, the N number of devices are connected with each other in a mesh topology, the total number of ports that are required by each device is N-1. In Figure 1, there are 5 devices connected to each other, hence the total number of ports required by each device is 4. The total number of ports required = N * (N-1).
  • Suppose, N number of devices are connected with each other in a mesh topology, then the total number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In Figure 1, there are 5 devices connected to each other, hence the total number of links required is 5*4/2 = 10.

Advantages of Mesh Topology

  • Communication is very fast between the nodes.
  • Mesh Topology is robust.
  • The fault is diagnosed easily. Data is reliable because data is transferred among the devices through dedicated channels or links.
  • Provides security and privacy.

Drawbacks of Mesh Topology

  • Installation and configuration are difficult.
  • The cost of cables is high as bulk wiring is required, hence suitable for less number of devices.
  • The cost of maintenance is high.

A common example of mesh topology is the internet backbone, where various internet service providers are connected to each other via dedicated channels. This topology is also used in military communication systems and aircraft navigation systems.


Star Topology

In Star Topology, all the devices are connected to a single hub through a cable. This hub is the central node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.

Star Topology

Star Topology

Figure 2: A star topology having four systems connected to a single point of connection i.e. hub. 

Advantages of Star Topology

  • If N devices are connected to each other in a star topology, then the number of cables required to connect them is N. So, it is easy to set up.
  • Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports required is N.
  • It is Robust. If one link fails only that link will affect and not other than that.
  • Easy to fault identification and fault isolation.
  • Star topology is cost-effective as it uses inexpensive coaxial cable.

Drawbacks of Star Topology

  • If the concentrator (hub) on which the whole topology relies fails, the whole system will crash down.
  • The cost of installation is high.
  • Performance is based on the single concentrator i.e. hub.

A common example of star topology is a local area network (LAN) in an office where all computers are connected to a central hub. This topology is also used in wireless networks where all devices are connected to a wireless access point.


Bus Topology

Bus Topology is a network type in which every computer and network device is connected to a single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.

Bus Topology

Bus Topology

Figure 3: A bus topology with shared backbone cable. The nodes are connected to the channel via drop lines. 

Advantages of Bus Topology

  • If N devices are connected to each other in a bus topology, then the number of cables required to connect them is 1, known as backbone cable, and N drop lines are required.
  • Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10 Mbps.
  • The cost of the cable is less compared to other topologies, but it is used to build small networks.
  • Bus topology is familiar technology as installation and troubleshooting techniques are well known.
  • CSMA is the most common method for this type of topology.

 Drawbacks of  Bus Topology

  • A bus topology is quite simpler, but still, it requires a lot of cabling.
  • If the common cable fails, then the whole system will crash down.
  • If the network traffic is heavy, it increases collisions in the network. To avoid this, various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.
  • Adding new devices to the network would slow down networks.
  • Security is very low.

A common example of bus topology is the Ethernet LAN, where all devices are connected to a single coaxial cable or twisted pair cable. This topology is also used in cable television networks.

Ring Topology

In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A number of repeaters are used for Ring topology with a large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.

The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.

Ring Topology

Ring Topology

Figure 4: A ring topology comprises 4 stations connected with each forming a ring. 

The most common access method of ring topology is token passing.

  • Token passing: It is a network access method in which a token is passed from one node to another node.
  • Token: It is a frame that circulates around the network.

Operations of Ring Topology

  1. One station is known as a monitor station which takes all the responsibility for performing the operations.
  2. To transmit the data, the station has to hold the token. After the transmission is done, the token is to be released for other stations to use.
  3. When no station is transmitting the data, then the token will circulate in the ring.
  4. There are two types of token release techniques: Early token release releases the token just after transmitting the data and Delayed token release releases the token after the acknowledgment is received from the receiver.

Advantages of Ring Topology

  • The data transmission is high-speed.
  • The possibility of collision is minimum in this type of topology.
  • Cheap to install and expand.
  • It is less costly than a star topology.

Drawbacks of Ring Topology

  • The failure of a single node in the network can cause the entire network to fail.
  • Troubleshooting is difficult in this topology.
  • The addition of stations in between or the removal of stations can disturb the whole topology.
  • Less secure. 


Tree Topology

This topology is the variation of the Star topology. This topology has a hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration ) are used.

Tree Topology

Tree Topology

Figure 5: In this, the various secondary hubs are connected to the central hub which contains the repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes.

Advantages of Tree Topology

  • It allows more devices to be attached to a single central hub thus it decreases the distance that is traveled by the signal to come to the devices.
  • It allows the network to get isolated and also prioritize from different computers.
  • We can add new devices to the existing network.
  • Error detection and error correction are very easy in a tree topology.

Drawbacks of Tree Topology

  • If the central hub gets fails the entire system fails.
  • The cost is high because of the cabling.
  • If new devices are added, it becomes difficult to reconfigure.

A common example of a tree topology is the hierarchy in a large organization. At the top of the tree is the CEO, who is connected to the different departments or divisions (child nodes) of the company. Each department has its own hierarchy, with managers overseeing different teams (grandchild nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected to their respective managers and departments.



ISP: Internet Service Provider

ISP stands for Internet Service Provider. It is a company that provides access to the internet and similar services such as Website designing and virtual hosting. For example, when you connect to the Internet, the connection between your Internet-enabled device and the internet is executed through a specific transmission technology that involves the transfer of information packets through an Internet Protocol route.


Data is transmitted through different technologies, including cable modem, dial-up, DSL, high speed interconnects. Accordingly, based on the method of data transmission, the Internet access provided by ISPs can be divided into many types, some of which are as follows:

Dial-up Internet access: It is the oldest technology to provide Internet access by modem to modem connection using telephone lines. In this method, the user's computer is connected to a modem with a telephone line. This method has become outdated today due to slow connection speed. However, in remote areas, this method can be used where the broadband network is not available.

DSL: DSL, which stands for 'digital subscriber line' is an advanced version of the dial-up Internet access method. It uses high frequency to execute a connection over the telephone network and allows the internet and the phone connection to run on the same telephone line. This method offers an Asymmetric Digital Subscriber (ADSL), where the upload speed is less than the download speed, and a Symmetric Digital Subscriber Line (SDSL), which offers equal upload and download speeds. Out of these two, ADSL is more popular among users and is popularly known as DSL.

Wireless Broadband (WiBB): It is a modern broadband technology for Internet access. It allows high-speed wireless internet within a large area. To use this technology, you are required to place a dish on the top of your house and point it to the transmitter of your Wireless Internet Service Provider (WISP).

Wi-Fi Internet: It is the short form for "wireless fidelity," which is a wireless networking technology that provides wireless high-speed Internet connections using radio waves. To use the internet, you are required to be within the range of wi-fi network. It is commonly used in public places such as hotels, airports, restaurants to provide internet access to customers.

ISDN: It is a short form of Integrated Services Digital Network. It is a telephone system network which integrates a high-quality digital transmission of voice and data over the same standard phone line. It offers a fast upstream and downstream Internet connection speed and allows both voice calls and data transfer.

Ethernet: It is a wired LAN (Local Area Network) where computers are connected within a primary physical space. It enables devices to communicate with each other via a protocol (a set of rules or common network language). It may provide different speeds such as 10 Mbps, 100 Mbps and 10 Gbp.

 Internetwork

  • An internetwork is defined as two or more computer network LANs or WAN or computer network segments are connected using devices, and they are configured by a local addressing scheme. This process is known as internetworking.
  • An interconnection between public, private, commercial, industrial, or government computer networks can also be defined as internetworking.
  • An internetworking uses the internet protocol.
  • The reference model used for internetworking is Open System Interconnection(OSI).

Types Of Internetwork:

1.Internet: 
An Internet is a public network and it is not owned by anyone. Since, it is a public network therefore anyone can access it without a valid username and password. Internet is the largest network in the case of number of connected devices. In this, there are numerous users and it provides lots of information to users. It acts as a tool for sharing information all over the world. 

2.Extranet: 
Extranet is a private network and it is owned by a single or multiple organization. Since, it is a private network therefore no one can access it without a valid username and password. It acts as a medium to share the information between the internal and external members. It is more secure network and managed by numerous organizations. 

 

Intranet advantages:

  • Communication: It provides a cheap and easy communication. An employee of the organization can communicate with another employee through email, chat.
  • Time-saving: Information on the intranet is shared in real time, so it is time-saving.
  • Collaboration: Collaboration is one of the most important advantage of the intranet. The information is distributed among the employees of the organization and can only be accessed by the authorized user.
  • Platform independency: It is a neutral architecture as the computer can be connected to another device with different architecture.
  • Cost effective: People can see the data and documents by using the browser and distributes the duplicate copies over the intranet. This leads to a reduction in the cost.

 

Internet

 

Extranet

1.

It is used as public network.

Whereas it is used as private network.

2.

An internet is less secure because it has zero security level in the firewall.

While the extranet is more secure than the Internet.

3.

In the case of the Internet, anyone can access it without a valid username and password.

Whereas in the case of extranet, no one can access it without a valid username and password.

4.

A large number of users can access the Internet.

Whereas here, a limited number of users can access the extranet.

5.

An internet acts as a tool for sharing information all over the world.

Whereas it acts as a medium to share the information between the internal and external members.

6.

An internet is not owned by anyone.

Whereas extranet is owned by a single or multiple organization.

7.

An Internet is not managed by either authority.

Unlike the internet, it is managed by numerous organizations.

8.

An internet is the largest network in the case of number of connected devices.

Whereas in the case of extranet, it is small in terms of connected devices as compared to the internet.

9.

An internet is less costly than extranet.

Whereas in the case of extranet, it is more costly.

10.

It’s users are the general public.

It’s users are the employees of the organization which are connected.

11.

It is not owned by anyone.

It is owned by single or multiple organization.

12.

There is no regulating authority for Internet.

It is regulated by multiple organizations.

13.

It is maintained by ISP.

It is maintained by CIO, HR or communication department of an organization.

14.

It is the network of networks.

It is derived from Intranet.

15.

Example: What we are normally using is Internet.

Example: DELL and Intel using network for business related operations.

 What is Internet?

The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANET. The original aim was to create a network that would allow users of a research computer at one university to "talk to" research computers at other universities.

1. Internet : 
The network formed by the co-operative interconnection of millions of computers, linked together is called Internet. Internet comprises of : 

  • People : People use and develop the network. 
  • Resources : A collection of resources that can be reached from those networks. 
  • A setup for collaboration : It includes the member of the research and educational committees worldwide. 

2. Intranet : 
It is an internal private network built within an organization using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information. 
3. Extranet : 
It is the type of network that allows users from outside to access the Intranet of an organization. 

Difference between Internet, Intranet and Extranet :  

Point of differenceInternetIntranetExtranet
Accessibility of networkPublicPrivatePrivate
AvailabilityGlobal system.Specific to an organization.To share information with suppliers and vendors it makes the use of public network.
CoverageAll over the world.Restricted area upto an organization.Restricted area upto an organization and some of its stakeholders or so.
Accessibility of contentIt is accessible to everyone connected.It is accessible only to the members of organization.Accessible only to the members of organization and external members with logins.
No. of computers connectedIt is largest in number of connected devices.The minimal number of devices are connected.The connected devices are more comparable with Intranet.
OwnerNo one.Single organization.Single/ Multiple organization.
Purpose of the networkIt’s purpose is to share information throughout the world.It’s purpose is to share information throughout the organization.It’s purpose is to share information between members and external, members.
SecurityIt is dependent on the user of the device connected to network.It is enforced via firewall.It is enforced via firewall that separates internet and extranet.
UsersGeneral public.Employees of the organization.Employees of the organization which are connected.
Policies behind setupThere is no hard and fast rule for policies.Policies of the organization are imposed.Policies of the organization are imposed.
MaintenanceIt is maintained by ISP.It is maintained by CIO. HR or communication department of an organization.It is maintained by CIO. HR or communication department of an organization.
EconomicalIt is more economical to use.It is less economical.It is also less economical.
RelationIt is the network of networks.It is derived from Internet.It is derived from Intranet.
ExampleWhat we are normally using is internet.WIPRO using internal network for its business operations.DELL and Intel using network for its business operations.

What is World Wide Web (WWW, W3)?

--collection of text pages,digital photograph, music files, video and animation that you can access over internet.

The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages that users can access on their local computers and other devices through the internet.

These pages and documents are interconnected by means of hyperlinks that users click on for information. This information can be in different formats, including text, images, audio and video.

The term World Wide Web isn't synonymous with the internet. Rather, the World Wide Web is part of the internet.

How the World Wide Web works

Paving the way for an internet revolution that has transformed the world in only three decades, the World Wide Web consists of multiple components that enable users to access various resources, documents and web pages on the internet. Thus, the WWW is like a vast electronic book whose pages are stored or hosted on different servers worldwide.

These pages are the primary component or building blocks of the WWW and are linked through hyperlinks, which provide access from one specific spot in a hypertext or hypermedia document to another spot within that document or a different one. Hyperlinks are another defining concept of the WWW and provide its identity as a collection of interconnected documents.

 Web Page

Web page is a document available on world wide web. Web Pages are stored on web server and can be viewed using a web browser.

A web page can cotain huge information including text, graphics, audio, video and hyper links. These hyper links are the link to other web pages.

Collection of linked web pages on a web server is known as website. There is unique Uniform Resource Locator (URL) is associated with each web page.

Static Web page

Static web pages are also known as flat or stationary web page. They are loaded on the client’s browser as exactly they are stored on the web server. Such web pages contain only static information. User can only read the information but can’t do any modification or interact with the information.

Static web pages are created using only HTML. Static web pages are only used when the information is no more required to be modified.

Dynamic Web page

Dynamic web page shows different information at different point of time. It is possible to change a portaion of a web page without loading the entire web page

What is HTTP?

The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web, and is used to load web pages using hypertext links. HTTP is an application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack. A typical flow over HTTP involves a client machine making a request to a server, which then sends a response message.

HTTP stands for Hypertext Transfer Protocol.

 HTTP is based on the client-server architecture model and a stateless request/response

protocol that operates by exchanging messages across a reliable TCP/IP connection.

 An HTTP "client" is a program (Web browser) that establishes a connection to a server for the

purpose of sending one or more HTTP request messages. An HTTP "server" is a program

(generally a web server like Apache Web Server) that accepts connections in order to serve

HTTP requests by sending HTTP response messages.

 Errors on the Internet can be quite frustrating — especially if you do not know the difference

between a 404 error and a 502 error. These error messages, also called HTTP status codes are

response codes given by Web servers and help identify the cause of the problem.

 For example, "404 File Not Found" is a common HTTP status code. It means the Web server

cannot find the file you requested. The file -- the webpage or other document you try to load in

your Web browser has either been moved or deleted, or you entered the wrong URL or

document name.

 HTTP is a stateless protocol means the HTTP Server doesn't maintain the contextual

information about the clients communicating with it and hence we need to maintain sessions

in case we need that feature for our Web-applications

 HTTP header fields provide required information about the request or response, or about the

object sent in the message body. There are four types of HTTP message headers:

o General-header:

These header fields have general applicability for both request and response messages.

o Request-header:

These header fields have applicability only for request messages.

o Response-header:

These header fields have applicability only for response messages.

o Entity-header:

These header fields define Meta information about the entity-body.

What’s in an HTTP request?

An HTTP request is the way internet communications platforms such as web browsers ask for the information they need to load a website.


Each HTTP request made across the Internet carries with it a series of encoded data that carries different types of information. A typical HTTP request contains:

1.      HTTP version type

2.      a URL

3.      an HTTP method

4.      HTTP request headers

5.      Optional HTTP body.

What’s an HTTP method?

An HTTP method, sometimes referred to as an HTTP verb, indicates the action that the HTTP request expects from the queried server. For example, two of the most common HTTP methods are ‘GET’ and ‘POST’; a ‘GET’ request expects information back in return (usually in the form of a website), while a ‘POST’ request typically indicates that the client is submitting information to the web server (such as form information, e.g. a submitted username and password).

.N.Method and Description
1GET

The GET method is used to retrieve information from the given server using a given URI. Requests using GET should only retrieve data and should have no other effect on the data.

2HEAD

Same as GET, but it transfers the status line and the header section only.

3POST

A POST request is used to send data to the server, for example, customer information, file upload, etc. using HTML forms.

4PUT

Replaces all the current representations of the target resource with the uploaded content.

5DELETE

Removes all the current representations of the target resource given by URI.

   HTTP request headers:

An HTTP request header is a component of a network packet sent by a browser or client to the server to request for a specific page or data on the Web server. It is used in Web communications or Internet browsing to transport user requests to the corresponding website’s Web server.

Some of the information within an HTTP request header includes:

  • Source IP address and port number
  • Requested URI (data or web page)
  • Host (Destination website or web server)
  • Type of data the browser will accept in return (text, html, xml etc)
  • User’s browser type (Mozilla, Chrome, IE) so that the Web server can send compatible data.
  • As mentioned, whenever you enter a URL in the address box of the browser, the browser translates the URL into a request message according to the specified protocol; and sends the request message to the server.

    For example, the browser translated the URL http://www.nowhere123.com/doc/index.html into the following request message:

    GET /docs/index.html HTTP/1.1
    Host: www.nowhere123.com
    Accept: image/gif, image/jpeg, */*
    Accept-Language: en-us
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
    (blank line)

    When this request message reaches the server, the server can take either one of these actions:

    1. The server interprets the request received, maps the request into a file under the server's document directory, and returns the file requested to the client.
    2. The server interprets the request received, maps the request into a program kept in the server, executes the program, and returns the output of the program to the client.
    3. The request cannot be satisfied, the server returns an error message.


What’s in an HTTP response?

An HTTP response is what web clients (often browsers) receive from an Internet server in answer to an HTTP request. These responses communicate valuable information based on what was asked for in the HTTP request.

A typical HTTP response contains:

1.     an HTTP status code

2.     HTTP response headers

3.     optional HTTP body

Message Status-Line

A Status-Line consists of the protocol version followed by a numeric status code and its associated textual phrase. The elements are separated by space SP characters.

Status-Line = HTTP-Version SP Status-Code SP Reason-Phrase CRLF

HTTP Version

A server supporting HTTP version 1.1 will return the following version information:

HTTP-Version = HTTP/1.1

Status Code

The Status-Code element is a 3-digit integer where first digit of the Status-Code defines the class of response and the last two digits do not have any categorization role. There are 5 values for the first digit:

S.N.Code and Description
11xx: Informational

It means the request was received and the process is continuing.

22xx: Success

It means the action was successfully received, understood, and accepted.

33xx: Redirection

It means further action must be taken in order to complete the request.

44xx: Client Error

It means the request contains incorrect syntax or cannot be fulfilled.

55xx: Server Error

It means the server failed to fulfill an apparently valid request

 An example of the HTTP response message is as shown:

HTTP/1.1 200 OK
Date: Sun, 18 Oct 2009 08:56:53 GMT
Server: Apache/2.2.14 (Win32)
Last-Modified: Sat, 20 Nov 2004 07:16:26 GMT
ETag: "10000000565a5-2c-3e94b66c2e680"
Accept-Ranges: bytes
Content-Length: 44
Connection: close
Content-Type: text/html
X-Pad: avoid browser bug
  

Examples of Communication Protocols:

1.   HTTP(Hypertext transfer protocol): It is a layer 7 protocol that is designed for transferring a hypertext between two or more systems. HTTP works on a client-server model, most of the data sharing over the web are done through using HTTP.

2.   TCP(Transaction control protocol): It lay-outs a reliable stream delivery by using sequenced acknowledgment. It is a connection-oriented protocol i.e., it establishes a connection between applications before sending any data. It is used for communicating over a network. It has many applications such as emails, FTP, streaming media, etc.

3.   UDP(User datagram protocol): It is a connectionless protocol that lay-out a basic but unreliable message service. It adds no flow control, reliability, or error-recovery functions. UPD is functional in cases where reliability is not required. It is used when we want faster transmission, for multicasting and broadcasting connections, etc.

4.   BGP(Border gateway protocol): It is a routing protocol that controls how packets pass through the router in an independent system one or more networks run by a single organization and connect to different networks. It connects the endpoints of a LAN with other LANs and it also connects endpoints in different LANs to one another.

5.   ARP(Address Resolution protocol): ARP is a protocol that helps in mapping Logical addresses to the Physical addresses acknowledged in a local network. For mapping and maintaining a correlation between these logical and physical addresses a table known as ARP cache is used.

6.   IP(Internet Protocol): It is a protocol through which data is sent from one host to another over the internet. It is used for addressing and routing data packets so that they can reach their destination.

7.   DHCP(Dynamic Host Configuration Protocol): it’s a protocol for network management and it’s used for the method of automating the process of configuring devices on IP networks. A DHCP server automatically assigns an IP address and various other configurational changes to devices on a network so they can communicate with other IP networks. it also allows devices to use various services such as NTP, DNS, or any other protocol based on TCP or UDP.

2. Management 

These protocols assist in describing the procedures and policies that are used in monitoring, maintaining, and managing the computer network. These protocols also help in communicating these requirements across the network to ensure stable communication. Network management protocols can also be used for troubleshooting connections between a host and a client.

Examples of Management Protocols:

1.   ICMP(Internet control Message protocol): It is a layer 3 protocol that is used by network devices to forward operational information and error messages. It is used for reporting congestions, network errors, diagnostic purposes, and timeouts.

2.   SNMP(Simple Network Management Protocol): It is a layer 7 protocol that is used for managing nodes on an IP network. There are three main components in SNMP protocol i.e., SNMP agent, SNMP manager, and managed device. SNMP agent has the local knowledge of management details, it translates those details into a form that is compatible with the SNMP manager. The manager presents data acquired from SNMP agents, thus helping in monitoring network glitches, network performance, and troubleshooting them.

3.   FTP(File Transfer Protocol): FTP is a Client/server protocol that is used for moving files to or from a host computer, it allows users to download files, programs, web pages, and other things that are available on other services.

4.   POP3(Post office protocol): It is a protocol that a local mail client uses to get email messages from a remote email server over a TCP/IP connection. Email servers hosted by ISPs also use the POP3 protocol to hold and receive emails intended for their users. Eventually, these users will use email client software to look at their mailbox on the remote server and to download their emails. After the email client downloads the emails, they are generally deleted from the servers.

5.   SMTP(Simple mail transfer protocol)

6.   Telnet: It is a protocol that allows the user to connect to a remote computer program and to use it i.e., it is designed for remote connectivity. Telnet creates a connection between a host machine and a remote endpoint to enable a remote session.

3. Security

These protocols secure the data in passage over a network. These protocols also determine how the network secures data from any unauthorized attempts to extract or review data. These protocols make sure that no unauthorized devices, users, services can access the network data. Primarily, these protocols depend on encryption to secure data.

Examples of Security Protocols:

1.   SSL(Secure Socket Layer): It is a network security protocol mainly used for protecting sensitive data and securing internet connections. SSL allows both servers to server and client to server communication. All the data transferred through SSL is encrypted thus stopping any unauthorized person from accessing it.

2.   HTTPS: It is the secured version of HTTP; this protocol ensures secure communication between two computers where one sends the request through the browser and the other fetches the data from the webserver.

3.   TSL(Transport layer security): It is a security protocol designed for data security and privacy over the internet, its functionality is encryption, checking the integrity of data i.e., whether it has been tampered with or not and Authentication. It is generally used for encrypted communication between servers and web apps, like a web browser loading a website, it can also be used for encryption of messages, emails, VoIP.

Web server and its types:


Web Server: Web server is a program which processes the network requests of the users and serves them with files that create web pages. This exchange takes place using Hypertext Transfer Protocol (HTTP).
Basically, web servers are computers used to store HTTP files which makes a website and when a client requests a certain website, it delivers the requested website to the client. For example, you want to open Facebook on your laptop and enter the URL in the search bar of google. Now, the laptop will send an HTTP request to view the facebook webpage to another computer known as the webserver. This computer (webserver) contains all the files (usually in HTTP format) which make up the website like text, images, gif files, etc. After processing the request, the webserver will send the requested website-related files to your computer and then you can reach the website.
Different websites can be stored on the same or different web servers but that doesn’t affect the actual website that you are seeing in your computer. The web server can be any software or hardware but is usually a software running on a computer. One web server can handle multiple users at any given time which is a necessity otherwise there had to be a web server for each user and considering the current world population, is nearly close to impossible. A web server is never disconnected from the internet because if it was, then it won’t be able to receive any requests, and therefore cannot process them.

There are many web servers available in the market both free and paid. Some of them are described below:

  • Apache HTTP server: It is the most popular web server and about 60 percent of the world’s web server machines run this web server. The Apache HTTP web server was developed by the Apache Software Foundation. It is an open-source software which means that we can access and make changes to its code and mold it according to our preference. The Apache Web Server can be installed and operated easily on almost all operating systems like Linux, MacOS, Windows, etc.
  • Microsoft Internet Information Services (IIS): IIS (Internet Information Services) is a high performing web server developed by Microsoft. It is strongly united with the operating system and is therefore relatively easier to administer. It is developed by Microsoft, it has a good customer support system which is easier to access if we encounter any issue with the server. It has all the features of the Apache HTTP Server except that it is not an open-source software and therefore its code is inaccessible which means that we cannot make changes in the code to suit our needs. It can be easily installed in any Windows device.
  • Lighttpd: Lighttpd is pronounced as ‘Lightly’. It currently runs about 0.1 percent of the world’s websites. Lighttpd has a small CPU load and is therefore comparatively easier to run. It has a low memory footprint and hence in comparison to the other web servers, requires less memory space to run which is always an advantage. It also has speed optimizations which means that we can optimize or change its speed according to our requirements. It is an open-source software which means that we can access its code and add changes to it according to our needs and then upload our own module (the changed code).
  • Jigsaw Server: Jigsaw has been written in the Java language and it can run CGI (common gateway interference) scripts as well as PHP programs. It is not a full-fledged server and was developed as an experimental server to demonstrate the new web protocols. It is an open-source software which means that we can access its code and add changes to it according to our needs and then upload our own module (the changed code). It can be installed on any device provided that the device supports Java language and modifications in Java.
  • Sun Java System: The Sun Java System supports various languages, scripts, and technologies required for Web 2.0 such as Python, PHP, etc. It is not an open-source software and therefore its code is inaccessible which means that we cannot make changes in the code to suit our needs.


How does a virtual private network (VPN) work?

A VPN extends a corporate network through encrypted connections made over the Internet. Because the traffic is encrypted between the device and the network, traffic remains private as it travels. An employee can work outside the office and still securely connect to the corporate network. Even smartphones and tablets can connect through a VPN.

Comments

Popular posts from this blog

MSC(IT)_Sem_I_WT(1310505)_PracticalList_Assignment/QustionBank

HTML_CSS_BOOK for subjectcode:1310505(M.sc.IT)_By_GTU