Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D).,
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Class : III BCA A
Subject : Web Designing
Semester : V
Unit : 1
2/25/2019 1
2/25/2019 2
Fundamentals:
•The Brief Introduction about Internet
•The World Wide Web
•Web browser
•WebServer
•URL
•MIME
•HTTP Protocol
•Web Programmers Tool Box
2/25/2019 3
 The Internet is a global network of computers, including
public, private, academic business and govt. networks of local
to global scope both large industrial-strength servers and the
personal computers in homes and businesses, all chained
together (with network cables or phone lines), and which all
speak a common "language".
 The Internet is seen as a global repository of "information“
2/25/2019 4
 For instance, when you send an email message from your
account at your ISP, the message does not go directly from one
machine to another but rather it hops from machine to machine
along the chain.
Each machine looks at the destination address in the
message, and passes the message along in the right direction.
2/25/2019
5
 Send e-mail messages.
 Send (upload) or receive (down load) files between
computers.
 Participate in discussion groups, such as mailing lists
and newsgroups.
 Surfing the web.
 Etc.,
2/25/2019 6
This information can be in many forms: text,
pictures, audio clips, Web pages, software, etc.
they are all kept as files on a server somewhere.
Your request for a particular "document" is bounced
from your computer to the one containing the file.
The document, then, is sent back along the chain to
your PC, and you then have the info you requested
2/25/2019 7
Common Types of area network are:
LAN - Local Area Network
WLAN - Wireless Local Area Network
2/25/2019
8
2/25/2019 9
WAN - Wide Area Network
MAN - Metropolitan Area Network
2/25/2019 10
Other Types of Area Networks
(CAN)Campus Area
Network
(SAN)Storage Area
Network
Types of Internet Searches
Informational - Informational searchers are simply looking for
information. Be it a definition, product name or review, recipe, or
“how to” instructions.
Examples are:
“How to trim cat claws”
“Men’s shoe types”
Navigational – A navigational browser is searching for an official
website, person, or company.
Transactional – Transactional searchers are seeking something in
particular.
Examples are:
“Buy Nike track shoes”
“Frying pans for sale”
2/25/2019 11
The Advantages of Internet
1)Information
2)Communication
3)Entertainment
4) E-commerce
5) Formation of communities
6) Services
The Disadvantages of Internet
1)Spamming – unwanted E-mail
2)Theft of personal details
3) Pornography – unwanted videos, sex,
violence.
4)Virus 2/25/2019 12
 Many schools and businesses have direct access to the
Internet using special high-speed communication lines
and equipment.
 Students and employees can access through the
organization’s local area networks (LAN) or through
their own personal computers.
 Another way to access the Internet is through Internet
Service Provider (ISP).
2/25/2019 13
 An Internet service provider (ISP) is a company
that provides customers with Internet access.
Data may be transmitted using several
technologies, including dial-up, DSL, cable
modem, wireless or dedicated high-speed
interconnects.
An Internet Service Provider (ISP) is a company
such as AT&T, Verizon, Comcast, or BrightHouse
that provides Internet access to companies,
families, and even mobile users.
ISPs use fiber-optics, satellite, copper wire, and
other forms to provide Internet access to its
customers..
2/25/2019 14
2/25/2019 15
The World Wide Web (abbreviated as WWW or W3,[commonly
known as the Web, or the "Information Superhighway"), is a
system of interlinked hypertext documents accessed via the
internet.
The World Wide Web (abbreviated WWW or the Web) is an
information space where documents and other web resources are
identified by Uniform Resource Locators (URLs), interlinked by
hypertext links, and can be accessed via the Internet.
2/25/2019 16
With a web browser,one can view web pages that may
contain text, images, videos, and other multimedia,and
navigate between them via hyperlinks.
The www was started at CERN(European Council for
Nuclear Research), a European research organization
near Geneva situated on Swiss and French soil, Berners-
Lee and Belgian computer scientist Robert Cailliau
proposed in 1990 to use hypertext "...
2/25/2019 17
In 1994, Berners lee founded the
w3c(consortium),which is the well standard making
body for royalty free softwares all over the world.
W3c consortium is a international community that
develops open standards to ensure the long-term growth of
the Web
The world wide web became commercially viable
during 1996 – 98 when a large no. of dot com
companies used for placing their services.
2/25/2019 18
2/25/2019 19
A web browser (commonly referred to as a browser) is a software
application for retrieving, presenting and traversing information
resources on the World Wide Web.
Mosaic was the first web browser in 1993.
personal computers include Microsoft Internet Explorer(MS
corporation), Mozilla Firefox ,Opera ,Netscape and so on.
A browser commonly used kind of user agent.
2/25/2019 20
Internet Explorer
Mozilla Firefox
Opera
Safari
Google Chrome
Konqueror
Arora
Dillo
Planetweb
Netscape
Lunascape
Examples of Web Browser
2/25/2019 21
2/25/2019 22
A Web server uses a Web server plug-ins ( means
software components) to establish and maintain
persistent HTTP and HTTPS connections with an
application server.
The Supported Hardware and Software Web page
provides the most current information about
supported Web servers.
The web server creates a socket(ie port 80) and a
client access the server through the socket
mechanism.
2/25/2019 23
A Web server is a program that uses HTTP (Hypertext
Transfer Protocol) to serve the files that form Web pages to
users, in response to their requests, which are forwarded by
their computers' HTTP clients.
The web server create a socket connection in a
computer specified by the URL.
The web browser retrives the information using
HTTP.
For instance function to work, we need a web server
first.
2/25/2019 24
Example of Web Servers
Apache HTTP Server
Microsoft
Internet Information
Services (IIS)
Sun Java System Web
Server etc.,
2/25/2019 25
1. Title bar – tells you the name of the web page
2. Menu bar – has commands for moving around the webpage, printing, etc
3. Tool bar – short cuts to commands. Each picture represents a command
4. Address bar – webpage address. If you want to go directly to a web
page, you will need to know the address.
2/25/2019 26
 A web address is typically composed of four parts:
 For example, the address http://www.google.ca is made up of
the following areas:
 http://
This Web server uses Hypertext Transfer Protocol (HTTP).
This is the most common protocol on the Internet.
 www
This site is on the World Wide Web.
 google
The Web server and site maintainer.
 ca
This tells us it is a site in Canada.
2/25/2019 27
 Endings of web pages tells us a bit about the page. Some
common endings to web addresses are:
 com (commercial)
 edu (educational institution)
 gov (government)
 net (network)
 org (organization)
 You might also see addresses that add a country code as the
last part of the address such as:
 ca (Canada)
 uk (United Kingdom)
 fr (France)
 us (United States of America)
 au (Australia)
 In (India)
2/25/2019 28
 A domain name is your website name. A domain name
is the address where Internet users can access your
website. A domain name is used for finding and
identifying computers on the Internet.
 Computers use IP addresses, which are a series of
number. However, it is difficult for humans to
remember strings of numbers.
 Domain names can include any number of parts
separated by periods, however most domain names
currently in use have only three or four parts.
2/25/2019 29
 Domain names are used to identify one or more IP
addresses. For example, the domain
name microsoft.com represents about a dozen
IP addresses.
 Domain names are used in URLs to identify particular
Web pages. For example, in the URL
http://www.pcwebopedia.com/index.html,
the domain name is pcwebopedia.com.
2/25/2019 30
2/25/2019 31
 The IP address and the domain name each identify a particular
computer on the Internet.
 To identify a Web pages exact location, Web browsers rely on
Uniform Resource Locator (URL).
 URL is a four-part addressing scheme that tells the Web
browser:
 What transfer protocol to use for transporting the file
 The domain name of the computer on which the file resides
 The pathname of the folder or directory on the computer on
which the file resides
 The name of the file
2/25/2019 32
The URL contains the following
information:
the internet name of the site containing
the resource
the type of service the resource is
served by
the Internet port number of the service.
the location of the resource
2/25/2019 33
Structure of an URL
The following is an outline of the most common form
of a URL:
Protocol:/host:[port]/[path[?params]
[#anchor]]
It encapsulates a lot of information such as the
protocol to be used for this URL, host
address,port number, etc.,square bracket is
optional
2/25/2019 34
Some Simple URL Examples
2/25/2019 35
2/25/2019 36
Multipurpose Internet Mail Extensions, commonly
termed MIME, is a specification for enhancing the
capabilities of standard Internet electronic mail.
All human written emails can be transmitted
through in MIME format.
Standard email, defined over fifteen years ago by a
variety of documents (primarily RFC821 and RFC822)
has been showing its age for some time.
2/25/2019 37
MIME provides extensions, allowing some new uses of
electronic mail; messages now may have:
Multiple objects within a single message
Text with unlimited line length or overall length
Character sets other than 7-bit ASCII
Multi-font messages
Binary or Application-specific files
Images, audio, video and multi-media messages
2/25/2019 38
2/25/2019 39
MIME was introduced to extend the current SMTP, or
Simple Mail Transport Protocol, in order to send
data other than ASCII characters through various
web clients and web servers.
2/25/2019 40
Protocol
“a convention or standard that controls or enables the
connection, communication, and data transfer between
two computing endpoints.”
Protocol is a set of rules that define the syntax and
semantics of the connection, communication and data
transfer between two endpoints. This set of rules is
actually specified by the HTTP protocol.
2/25/2019 41
1) HTTP is an Application layer protocol that drives the
WWW. It was conceived by Sir Tim Berners-Lee.
2) 2) HTTP is a request – response protocol between
clients and a server.
3) Hypertext Transfer Protocol (HTTP) is an
application protocol for distributed, collaborative,
and hypermedia information systems.
4) HTTP is the foundation of data communication for the
World Wide Web. Hypertext is structured text that
uses logical links (hyperlinks) between nodes
containing text.
2/25/2019 42
5. The main purpose of HTTP is to transfer
web pages from one computer (web server)
to another computer (web client)
6. HTTP can be used to access virtually all
types of resources on the web.
2/25/2019 43
 HTTP Session
 HTTP Authentication
 HTTP Requested Methods
 HTTP Encrypted Connections
 HTTP Response Message
2/25/2019 44
 session refers to a limited time of communication
between two systems.
 An HTTP session is a sequence of network request-
response transactions. An HTTP client initiates a request
by establishing a Transmission Control Protocol (TCP)
connection to a particular port on a server.
 An HTTP session is initiated by a Web browser each
time you visit a website, the entire time you spend on
the website.
2/25/2019 45
 HTTP provides multiple authentication schemes such as Basic
access authentication and Digest access authentication which operate
via a challenge-response mechanism whereby the server identifies
and issues a challenge before serving the requested content.
 Basic access authentication is a method for a HTTP user
agent to provide a user name and password when
making a request.
 Digest access authentication is used to confirm the identity of
a user before sending sensitive information, such as
online banking transaction history. It applies a hash
function to the username and password before sending
them over the network
2/25/2019 46
 HTTP Authentication
2/25/2019 47
2/25/2019 48
2/25/2019 49
 GET AND HEAD METHODS ARE SAFE METHODS
BUT THERE ARE NO ACTION ON SERVER.
 PUT, POST AND PATCH METHODS ARE
CONTAINING THE MESSAGE WITH BODY. THEY
SEND DATA TO THE SERVER
2/25/2019 50
The Advantages of Hypertext Transfer Protocol
Identification
Specialization
Addressing
Flexibility
Security
Ease of Programming
Search Capabilities
Persistent Connections
2/25/2019 51
2/25/2019 52
General Development Tools
Online Tools
Web Browser Elements
Mac OS X:Safari
Mac OS X:Firefox
Windows vista:IE
Windows Vista : Firefox
Windows XP : IE
Windows XP :Firefox
2/25/2019 53
Internet tools generally considered
part of social media:
Business Networking sites (Likedln,Plaxo, etc)
Community sites (Facebook, Myspace, etc)
Mini-blogging sites (Twitter, Tumbir, etc)
Blogs
Message Boards
Email
Bookmarking sites (Delicious, Stumbleupon, etc)
Social News sites (Digg, Reddit, etc)
Media sharing (You Tube, Flickr, etc)
Q&A Sites (Yahoo Answers,Wiki Answers, etc)
Information Aggregators (Wikipedia, etc.)
2/25/2019 54

M.Florence Dayana Web Design-UNit 1

  • 1.
    Name of theStaff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D)., Head, Dept. of CA Bon Secours College For Women Thanjavur. Class : III BCA A Subject : Web Designing Semester : V Unit : 1 2/25/2019 1
  • 2.
  • 3.
    Fundamentals: •The Brief Introductionabout Internet •The World Wide Web •Web browser •WebServer •URL •MIME •HTTP Protocol •Web Programmers Tool Box 2/25/2019 3
  • 4.
     The Internetis a global network of computers, including public, private, academic business and govt. networks of local to global scope both large industrial-strength servers and the personal computers in homes and businesses, all chained together (with network cables or phone lines), and which all speak a common "language".  The Internet is seen as a global repository of "information“ 2/25/2019 4
  • 5.
     For instance,when you send an email message from your account at your ISP, the message does not go directly from one machine to another but rather it hops from machine to machine along the chain. Each machine looks at the destination address in the message, and passes the message along in the right direction. 2/25/2019 5
  • 6.
     Send e-mailmessages.  Send (upload) or receive (down load) files between computers.  Participate in discussion groups, such as mailing lists and newsgroups.  Surfing the web.  Etc., 2/25/2019 6
  • 7.
    This information canbe in many forms: text, pictures, audio clips, Web pages, software, etc. they are all kept as files on a server somewhere. Your request for a particular "document" is bounced from your computer to the one containing the file. The document, then, is sent back along the chain to your PC, and you then have the info you requested 2/25/2019 7
  • 8.
    Common Types ofarea network are: LAN - Local Area Network WLAN - Wireless Local Area Network 2/25/2019 8
  • 9.
    2/25/2019 9 WAN -Wide Area Network MAN - Metropolitan Area Network
  • 10.
    2/25/2019 10 Other Typesof Area Networks (CAN)Campus Area Network (SAN)Storage Area Network
  • 11.
    Types of InternetSearches Informational - Informational searchers are simply looking for information. Be it a definition, product name or review, recipe, or “how to” instructions. Examples are: “How to trim cat claws” “Men’s shoe types” Navigational – A navigational browser is searching for an official website, person, or company. Transactional – Transactional searchers are seeking something in particular. Examples are: “Buy Nike track shoes” “Frying pans for sale” 2/25/2019 11
  • 12.
    The Advantages ofInternet 1)Information 2)Communication 3)Entertainment 4) E-commerce 5) Formation of communities 6) Services The Disadvantages of Internet 1)Spamming – unwanted E-mail 2)Theft of personal details 3) Pornography – unwanted videos, sex, violence. 4)Virus 2/25/2019 12
  • 13.
     Many schoolsand businesses have direct access to the Internet using special high-speed communication lines and equipment.  Students and employees can access through the organization’s local area networks (LAN) or through their own personal computers.  Another way to access the Internet is through Internet Service Provider (ISP). 2/25/2019 13
  • 14.
     An Internetservice provider (ISP) is a company that provides customers with Internet access. Data may be transmitted using several technologies, including dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects. An Internet Service Provider (ISP) is a company such as AT&T, Verizon, Comcast, or BrightHouse that provides Internet access to companies, families, and even mobile users. ISPs use fiber-optics, satellite, copper wire, and other forms to provide Internet access to its customers.. 2/25/2019 14
  • 15.
  • 16.
    The World WideWeb (abbreviated as WWW or W3,[commonly known as the Web, or the "Information Superhighway"), is a system of interlinked hypertext documents accessed via the internet. The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the Internet. 2/25/2019 16
  • 17.
    With a webbrowser,one can view web pages that may contain text, images, videos, and other multimedia,and navigate between them via hyperlinks. The www was started at CERN(European Council for Nuclear Research), a European research organization near Geneva situated on Swiss and French soil, Berners- Lee and Belgian computer scientist Robert Cailliau proposed in 1990 to use hypertext "... 2/25/2019 17
  • 18.
    In 1994, Bernerslee founded the w3c(consortium),which is the well standard making body for royalty free softwares all over the world. W3c consortium is a international community that develops open standards to ensure the long-term growth of the Web The world wide web became commercially viable during 1996 – 98 when a large no. of dot com companies used for placing their services. 2/25/2019 18
  • 19.
  • 20.
    A web browser(commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web. Mosaic was the first web browser in 1993. personal computers include Microsoft Internet Explorer(MS corporation), Mozilla Firefox ,Opera ,Netscape and so on. A browser commonly used kind of user agent. 2/25/2019 20
  • 21.
    Internet Explorer Mozilla Firefox Opera Safari GoogleChrome Konqueror Arora Dillo Planetweb Netscape Lunascape Examples of Web Browser 2/25/2019 21
  • 22.
  • 23.
    A Web serveruses a Web server plug-ins ( means software components) to establish and maintain persistent HTTP and HTTPS connections with an application server. The Supported Hardware and Software Web page provides the most current information about supported Web servers. The web server creates a socket(ie port 80) and a client access the server through the socket mechanism. 2/25/2019 23
  • 24.
    A Web serveris a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients. The web server create a socket connection in a computer specified by the URL. The web browser retrives the information using HTTP. For instance function to work, we need a web server first. 2/25/2019 24
  • 25.
    Example of WebServers Apache HTTP Server Microsoft Internet Information Services (IIS) Sun Java System Web Server etc., 2/25/2019 25
  • 26.
    1. Title bar– tells you the name of the web page 2. Menu bar – has commands for moving around the webpage, printing, etc 3. Tool bar – short cuts to commands. Each picture represents a command 4. Address bar – webpage address. If you want to go directly to a web page, you will need to know the address. 2/25/2019 26
  • 27.
     A webaddress is typically composed of four parts:  For example, the address http://www.google.ca is made up of the following areas:  http:// This Web server uses Hypertext Transfer Protocol (HTTP). This is the most common protocol on the Internet.  www This site is on the World Wide Web.  google The Web server and site maintainer.  ca This tells us it is a site in Canada. 2/25/2019 27
  • 28.
     Endings ofweb pages tells us a bit about the page. Some common endings to web addresses are:  com (commercial)  edu (educational institution)  gov (government)  net (network)  org (organization)  You might also see addresses that add a country code as the last part of the address such as:  ca (Canada)  uk (United Kingdom)  fr (France)  us (United States of America)  au (Australia)  In (India) 2/25/2019 28
  • 29.
     A domainname is your website name. A domain name is the address where Internet users can access your website. A domain name is used for finding and identifying computers on the Internet.  Computers use IP addresses, which are a series of number. However, it is difficult for humans to remember strings of numbers.  Domain names can include any number of parts separated by periods, however most domain names currently in use have only three or four parts. 2/25/2019 29
  • 30.
     Domain namesare used to identify one or more IP addresses. For example, the domain name microsoft.com represents about a dozen IP addresses.  Domain names are used in URLs to identify particular Web pages. For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com. 2/25/2019 30
  • 31.
  • 32.
     The IPaddress and the domain name each identify a particular computer on the Internet.  To identify a Web pages exact location, Web browsers rely on Uniform Resource Locator (URL).  URL is a four-part addressing scheme that tells the Web browser:  What transfer protocol to use for transporting the file  The domain name of the computer on which the file resides  The pathname of the folder or directory on the computer on which the file resides  The name of the file 2/25/2019 32
  • 33.
    The URL containsthe following information: the internet name of the site containing the resource the type of service the resource is served by the Internet port number of the service. the location of the resource 2/25/2019 33
  • 34.
    Structure of anURL The following is an outline of the most common form of a URL: Protocol:/host:[port]/[path[?params] [#anchor]] It encapsulates a lot of information such as the protocol to be used for this URL, host address,port number, etc.,square bracket is optional 2/25/2019 34
  • 35.
    Some Simple URLExamples 2/25/2019 35
  • 36.
  • 37.
    Multipurpose Internet MailExtensions, commonly termed MIME, is a specification for enhancing the capabilities of standard Internet electronic mail. All human written emails can be transmitted through in MIME format. Standard email, defined over fifteen years ago by a variety of documents (primarily RFC821 and RFC822) has been showing its age for some time. 2/25/2019 37
  • 38.
    MIME provides extensions,allowing some new uses of electronic mail; messages now may have: Multiple objects within a single message Text with unlimited line length or overall length Character sets other than 7-bit ASCII Multi-font messages Binary or Application-specific files Images, audio, video and multi-media messages 2/25/2019 38
  • 39.
    2/25/2019 39 MIME wasintroduced to extend the current SMTP, or Simple Mail Transport Protocol, in order to send data other than ASCII characters through various web clients and web servers.
  • 40.
  • 41.
    Protocol “a convention orstandard that controls or enables the connection, communication, and data transfer between two computing endpoints.” Protocol is a set of rules that define the syntax and semantics of the connection, communication and data transfer between two endpoints. This set of rules is actually specified by the HTTP protocol. 2/25/2019 41
  • 42.
    1) HTTP isan Application layer protocol that drives the WWW. It was conceived by Sir Tim Berners-Lee. 2) 2) HTTP is a request – response protocol between clients and a server. 3) Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems. 4) HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. 2/25/2019 42
  • 43.
    5. The mainpurpose of HTTP is to transfer web pages from one computer (web server) to another computer (web client) 6. HTTP can be used to access virtually all types of resources on the web. 2/25/2019 43
  • 44.
     HTTP Session HTTP Authentication  HTTP Requested Methods  HTTP Encrypted Connections  HTTP Response Message 2/25/2019 44
  • 45.
     session refersto a limited time of communication between two systems.  An HTTP session is a sequence of network request- response transactions. An HTTP client initiates a request by establishing a Transmission Control Protocol (TCP) connection to a particular port on a server.  An HTTP session is initiated by a Web browser each time you visit a website, the entire time you spend on the website. 2/25/2019 45
  • 46.
     HTTP providesmultiple authentication schemes such as Basic access authentication and Digest access authentication which operate via a challenge-response mechanism whereby the server identifies and issues a challenge before serving the requested content.  Basic access authentication is a method for a HTTP user agent to provide a user name and password when making a request.  Digest access authentication is used to confirm the identity of a user before sending sensitive information, such as online banking transaction history. It applies a hash function to the username and password before sending them over the network 2/25/2019 46
  • 47.
  • 48.
  • 49.
  • 50.
     GET ANDHEAD METHODS ARE SAFE METHODS BUT THERE ARE NO ACTION ON SERVER.  PUT, POST AND PATCH METHODS ARE CONTAINING THE MESSAGE WITH BODY. THEY SEND DATA TO THE SERVER 2/25/2019 50
  • 51.
    The Advantages ofHypertext Transfer Protocol Identification Specialization Addressing Flexibility Security Ease of Programming Search Capabilities Persistent Connections 2/25/2019 51
  • 52.
  • 53.
    General Development Tools OnlineTools Web Browser Elements Mac OS X:Safari Mac OS X:Firefox Windows vista:IE Windows Vista : Firefox Windows XP : IE Windows XP :Firefox 2/25/2019 53
  • 54.
    Internet tools generallyconsidered part of social media: Business Networking sites (Likedln,Plaxo, etc) Community sites (Facebook, Myspace, etc) Mini-blogging sites (Twitter, Tumbir, etc) Blogs Message Boards Email Bookmarking sites (Delicious, Stumbleupon, etc) Social News sites (Digg, Reddit, etc) Media sharing (You Tube, Flickr, etc) Q&A Sites (Yahoo Answers,Wiki Answers, etc) Information Aggregators (Wikipedia, etc.) 2/25/2019 54