0% found this document useful (0 votes)
73 views41 pages

comP1C2 PDF

Uploaded by

shubham pawar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
73 views41 pages

comP1C2 PDF

Uploaded by

shubham pawar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 41
chical ones, (al channels ra otis y % fer Stag ia cont Internet and Web Servers sezae siz aa ade 2.1 Internet 2.1 foe pildwide connected forte sf sk 4 PAP (Tennetission emés t,t PRR olitatarastrcticay to ecmmit Cea sae a Sa is those ofearious tres of media, Tie ich ‘The internet is a network systom that uses’ gee taaia) aT saan Tw ork e government networks. These networks are fOR4, Teste aie 1a connected by guided, wireless and fiber-optic 72a "REE, araccta technologies za ware at ‘The internet can be viewed as the system gece {internet is a network of global connectic neludes private, public, business, academic and fas architecture which has transformed the am, faaa gira a communications and methods of commerce to Fo aie ame ap ¥ interconnect by allowing various computer networks around the world. Tt is sometimes 7! 71 fea @ 3 Az referred to as a “network of networks,” ‘FHT SET © The internet originated with the U.S ate FRET | government, which began building a computer network in the 1960s known as ARPANET. In 1985, the U.S. National Science Foundation (NSF) 727% #1 Frximi ae fra commissioned the development of a university W#3¥m (NSF) 3 afr network backbone called NSFNET. The system Saami 3 steer fe was replaced by new networks operated by * commercial internet service providers in 1995, AER 1995 8 arf ‘Theintornet wasbrought to the publiconalarger site fa a ara aq seale at around this time. By 2020, approximately ® - Y get ws 4 100 crore people, or nearly half of the world’s cg Population, were estimated tohave access tothe ""' 2020 a TTA 400 1960 =z # ARPA Intern. amt stand, a1 ez ‘The Internet provides a powerful and general Ree ae wag facility that ican be used for almost any purpose erm ¢, faa avara 5 fen St aa @, sh sa AR store AE SRT that depends on information, Also itis accessible by every individual who connects to one of its component networks. It supports human ‘communication via electronic mail (e-mail), “chat a Bareereips, aid 'auio end video nsmission and allows people to wor i Collaboratively at. many different locations. tt * 3% Sth a we fal MPPorts access to digital information by many *¥ FA 3 arpEKa Se (43) 44 } Di World Wide W application’, including th vices over the Internet. Many exper The terms internet and World Wide Web a sftén’ used interchangeably, but they are not i refers toth exactly the same thing; the interne ncluding hardware global communication sys and infrastructure, while the web is one of the rkofnetwork ‘ed to.as World .e Internet isa global net while the Web which is also n Wide Web (www) isthe collection of infor ed via the Internet. In othe which is acce the Internet is infrastructure while the Web i ructure, Alternative while the Web can be viewed as én that store. Ata high leve fewed as hardware and the Web as software 2.1.1 Features of internet Ubiqu and at anytime. With the help of internet transaction cost is reduced and Shopping ean be done with ease Global reach globally and reaches across national bi around the earth the only way to connect iversal standard : It has one set of TCP isa standard protocol ste forint Richness: Internet Information is available n different format such as text, graphical, audi isual, instant messaging ete 1 Interactivity is interactive and makes onsumer A CO participant in the proce Information density: Intemet technology and raised the dae =a the quality veduced the information cost of information. collection of soma @ (RS FAT orezaee trate, TAS a a om Bf el aan Ae rm aa aera, $e 1 aut oh tan ae art ert @, sik wae afte sea a wea ater #5 stench 35 WaT 2 arate eed. %, faa aM TCP/IE feta—rete Barer eth @, at ee Baan athe _ _ Ferafectet = am fea an aa wm @ Pattierr Sah 3 eatiten ah ate 7 safe St age were erat 2) é in as well as fo group. jlivered toindividua Social technology It suppor neration and social networking 2.1.2 Advantages of Internet 1 Se, (1) E-mail ; E-mail is now an important Fy the uipotesmail which works lke writing etter The messages are delivered instantly to peopl I that takesa lot of time in deliver #1 anywhor ta ¢ , traditional ms faa: nals fre, fast and very cheap ag compared to . "l telephone, fax and postal services. Ni @)2 Internet is available, 24x7 days for uso (3) Information : Availability o! information is possibly the biggest advan hours a day - 7 days a week aay Poot 36H Internet. There is a huge amount of information ‘T3189 available on the internet for almost every subject 182) ranging from government laws and sorvices, trad fairs, conferences, market information, new idea: technical support and many more. Any type of fea g, data on almost any kind of subject can be found frat @ easily by using search engines like goog 8am msn, etc wea (@ Online Chat : Many ‘chat rooms’ on at theweb can be accossed that can be used to meet fait =m people, make new friends, as well as to stay in touch with old friends, Also MSN and yahoo websites can be used to chat in. [oP os eheteeesnre rot! AL, on theintemnet like net banking, job searching, -af@t! tickets purchasing, hotel reservations, guidance ‘a, f@ Servicason many topics and thus effected almost very aspect of life (6) Communities : Many types of comm Unities have come up on the internet. Itis a great Way to meet up vith people of similar interest and Aiseuss common issues, na font) Frcommerce : Along with getting & ‘litmation on the Internet, it can alsobe used to 4 “MP online, There are many online stores and at rail y allows per q wrefaerrgstyry nreaTg sebrerese Faas SY ATA saa ator Seite 7e He scat sh NE a2 gets & Usaitste (y $e aa BR afitrert F ed fa fe oa ate ard a of, Pred ah oh a afer Het % fata 3 ‘soitt ath flr, 24 x (3) Fertig —sattit a7 eee a aad as wae a 2 toe, aera, wee estes, wid an we ory a dar a gees ra Hat Haiti MSN aif Sia a seh fa on at 21 (4) sitrengs Beara zt aaa é, fran se wr, wa a oe 7 fearon aera @i FH sreren MSI wa S fee ft etre (6) afte —eerte = @, S842 afm, sia oie, fea aed fared woreda at Bao shee & en eq aH (6) weahtal—eecre HF art ong tae BO fea & ER wal eo a Oe (0 tate ete we aa-ara Ferm Sy aon fea on wam 81 we siren as buy them using your or eras a Tee eccrhnnachoaeeeree) ta LE =a otewrse Tike tition, games, music, VEC eee a, ER, am 8 eects FT movies, eto can be downloaded for free from the Internet. 2.1.3 Limitations of Internet (1) Theft of Personal information ? Blectronic messages sent over the Internet can be easily mooped and tracked, revealing who is talking to whom and what they are talking about Ifyou uce the Internet, your personal information = 3am #A €, 7g such as your name, address, credit eard, bank aman am, Tae, Foe details and ther information canbe accessed by =e SraTarTEH % unauthorized persons, Tryou use acredit card or #1 -afe 34 siren ei internet banking for online shopping, then your fay #1 stp axa @ Getais can also ‘stolen’ awal (2) Negative effects on family coms ry nication : It is generally observed that due to ® more time spent on Internet, there isa decrease 7© WAN We Rae in communication and feeling of togetherness faart ® amu afta 2 among the family members. (8) Internet addiction : There is some controversy over whetheritis possibleto actually be (@) eee addictedtothe Internetor not, Someresoarchers $8 FA @, faa claim thatitis simply peopleti : opletryingtoescapetheir zh Internethavebecomeabig concern, Mos notreaizethedngersinvlvedwhen threes Sa logontothe Internet. Whenchildrentalktoothers tsa eet ae aagaen ee realize they couldactually be © TESTA WE ten & inal averyscronbmuecorern peoeathy TH ASR a | eapscillgphiette ‘ueconcerningthe Internet, Hee, Witarat st 2 enn moar aneehllcren, There aqen %, araat Wa thatcanbecosilyoundandeanbondecrnerce, Ce EAR Sr lettingchildren usethe Internet Ho amd at orca t Interne Es RIE ST — Gp virus threat : Today, not only are mere mT, SSI gansgning viruses buteomputors are also. aca 9 wn et, at Fe aera eoingteeviuss fom Saye 9 gor t 8 EF BR wg CO cme. Virus isa program which disrupts 3) ora wee stoma Bi #, ¢ at fregy ne emal functioningf the computer systems. "1 TRS ete micastare ns preante Ste wene iaeeg “itfeah vigj qf Gpusattacksand they can end up intocrashing ¥°4EC W Aka * Eve 4 15 mh ype your whole hard disk ae ored qh we eee =) FS of fq) Spamming : Iris often viewed as the (5) eatin sa ore fou Tune gt acoteendingunsoliited email Thismoltle or 35 -r¢ tan ara 896 HE lube Boost emailing is often compared to mass junk ae eee Sette erate deren hectare Se Fe Seth Moet apam is commercial advertising, often for Tre aftr seat SRT y dubious products, get-rich-quick schemes, or | @ 8, sere afer stsazH tquasilogal sorvives. Spam costs the sender very 344 art BPH wre ert 5 little to send — most of the costs are paid for by ze a ar aga aH eet Pee Feat tae veesers encour lhne OF" es eiece TIT Si Way sender. a am 2.1.4 Difference between Internet and WWW fe sary dere WWW atte Gerke & ater aia ‘er 38 [Internet www ‘eH ait ag |) Intemetisamassivenctworkofnetworks, [() WWWisaway ofac fe si waz | bisa networking infrastructure, over the medium of sidan gery | fetta, Town a oe age free Seah Set WWW eecte & =e rsa ae | tae ew vere ar Fealfin cores thet th vata 0 ao al @ Icconnectsmillionsof computers together |@) Itisan information frm wera | qlobally forming a networkin which any builton the top of in computer can communicate with any other eres a acest ee We fara er We Um Teoh AA aTa-aTT ae satin Fat ae a fra | ae apd at ste aor &, fied ft hee me een erat |g arog & om fat tar eae H a SU | page frm ot wea &, wm we fs oH a Beet Stee om a shes a ata 4 Information that travels over the internet (3) The web uses HTT] isan # — d0essoviaa variety oflanguages know data ae wt as protocols, is fers Brasa & aay a gece daa Sas tafe ea 8 as mont (| FO art eaten, stdteter re a swim sé Internet and Web Servers [ 47 eee tadarnatianl ves servers 07, Fthreat : Today, not only are viruses, but computers are also, Iinly getting these viruses from irus isa program which disrupts ‘tioning ofthe computer systems hed to internet are more prone to td they can end up intacrashing (isk tming Its often viewed as the solicited email, This multiple or ‘often compared to mass junk lesly obstructs the entire system: tmmereial advertising, often for ts, get-rich-quick schemes, or tes. Spam costs the sender very ost ofthe costs are paid for by ‘he carriers rather than by the (4) Bree on Tams, 7 Fa ATS FT ara 8 afta at ae @, afew aero a ae th eget 9 yey oo a ae areca deCke & TT th area ca shore at, St EE Fen A atten 8 parse tw Bam ai eerie 8 HES seem aaa & weet ar aT aes eer, ke ae ome) at re Fees ah et ot a Bet (6) vate —ait ae arr Gira ak ah a Sen om Bi ae ecives fra Get STAT sar rare fe eet ti ae ge Reza a ere or 8 ata ct &h ars cin atin rearecrEaC ee, orem fer ssa & fee, te fea fae, a1 ont arg afte ore etd #1 ote as ach fore eco are aa am aid tae a strate, wie fii a fx grt yar at ore 1 2.1.4 Difference between Internet and WWW. WWW site gecte & alter stat www massive nctwork of networks ‘king infrastructure Far em age fare fe det Fm Rea Sora aat 21 (@) WWWis away of accessing information over the medium of the internet. WWW settee we suet exper vada 3c a ue aia 21 illions of computers together inga networkin which any ‘communicate with any other ong as both are connected to Up Feak aa? & aaa Bieta ar é, ral Gt tr fet oh re amen ar awa @, oa ae fs St a wie ai @ _ Teis an information sharing model thatis built on the top of internet. 7¢ eater Sex Fe aren wa feet ere 2, St ez arm aren we 21 \attravels over theinternet [(@) The web uses HTTP protocol, to tansmie tiety of languages know mem @ dete H ae a, ardtata % ae a data. 225 Sette wa few ae TTP aT oem wen a) eee | Teis the browsers. Te tr firefox #0 ACCES 48) Dighal Mertens 0 oper oF ten WHW inact suit 7 i wee ak Bete 7 th Tate Fdos the structure @ Internet prov | ee ERT EH Fe pn ame is the name of w' : jobsite. A A domain ni tread = oa ing computers on. the Inet Comperso Taare which cen of number, However, is dificult f i ‘strings of numbers. Because ember humans toremem! £ this, domain names were developed and used to identify entities on the Internet rather than using IP addresses. A domain name can be any combination of letters and numbers, and it can be used in combination of the various domain name extensions, such as com, net and more, The domain name must be registered before using it. Every domain name is unique. No two websit san have the same domain name, If someone types in www.mydomain.com, it will go tomydomain website and nowhere else, In general, a domain name represents an Internet Protocol (IP) resource, such as. personal computer used to access the Internet, a server computer hosting a web site, or the web site itselt or any other service commu communicated a via the Domain names are, ‘Organized in sub 4s subdomains) of the DNS root fieen et | Whi ed web P' rovid pro different meth variety of arin RTA 3 fran 21 ga ase &, Sra TH Se Wa wm sein 0H ES nf ea & fore ST we ois 3a sence afar @ wea @, st ra a WHET, 38 com, .net 2 OI aa 2 sein eS wea SHE see a8 tn phe gr 21 | wd ohn an ad & ae mydomain.com % Zig 4G ae Wa fate axe BY a at, ue Sar CP) feats a foreer BRO & fore sei fe FRR, awe aq ae t SR, a eri aa az at oy afta 7 DNS we 3h CRa-tH) sits fr first-level se domains (TL wel domains (gl ins gor, info ‘code top-level level dom et yp as intern ‘eb documents Tr utiles browsers UC toaccess o explorer or firefox called web page Se aee 3a HT TEE a fre eee a zi ae im Berners lee i 1992. TH Tewas created by Ti a 1992 Bem wd oF aT fever ; Gay Teprories tho ayoamic ectworss Mjnternet resources Terr afaiferent methodologies and vations of dome protocols. Be cased ircreteh ae ster Domain na! oe resources, such as ct Cerrars Reeth HATES TT EL = and services, with a 2.2 Ba FA is easier to me numerical addre ite A gga, Sage a ate 21 STA = cag ua tt, sel Sette HE EZ UH RE Jae freee wom ms a octet & fee Be ca ie a arava ea rer #1 HITT IP EE aes eae re. os een eat en ae a feito paler sche : recs, ot using GAA pee re ees ; individual inet OS steel sober set BEE Titernet host con ween a ate names as host idi Internet protocols. ‘Adomain name ca asingle IP addr! addresses. din Bates team @, ak yen seam fale Sh : host n ame TGR, 33 et, neha com, .net 3fe % sft ¥ fra * = Adomain name is be a. i “ahem atl toideritify a webs! me sear irate pa 3 za [i * Domain names ar sea * EE ve identification | e ee au is at ae mydomain wnership or cont, me wor oh a al exam ges, ara aR, wa Sis Am ew gee Hea el Te pin w faker wt #8 FE el 3 eye ea ren We eet domains in e-mail elf PER aoe ag ae A oe FO TUE Ee ead aq ange eC TY eo | a | FUpy 1 are the top-I generic top-level domains level domains (TLDs), including the LDs), such as the vminent domains gom, info, net, edu, and org, nd the country code top-level domains (ce TLDs) Below hierar dom these top-level domains in the DNS hhy are the second-le n names that are typically open for and third-level toservation by end-usors who wish to connect local farea networks to the Intemet, create other publicly accessible Internet resources or run web sites 2.2.1 Functions of domain Names Domain names serve to identify Internet resources, such as computers, networks, and services, with a text-hased label that is easier to memorize than the numerical addresses used in the Internet protocols. Adomain name can be used to identify a single IP address or group of IP addresses. ‘Adomain name may represent entire collections of such resources or individual instances. Individual Internet host computers use domain names as host identifiers, also called host names. ‘Adomain nameis used as partofa URL to identify a website Domain names are also used as simple identification labels to indicate ‘ownership or control ofa resource, Such examplesare therealm identifiers used in the Session Initiation Protocol (SIP), the Domain Keys used to verify DNS domains in e-mail systems, and in many other Uniform Resource Identifiers CRIs). ‘An important function of domain names is to provide easily recognizable and ‘memorizable names to numerically Internet and mmeless, The first-level set ofdomain names @) Zt 3ea a wee-eae @ (TLD) #4 &, for BARR TE cafe a @, 8 sa SHA com org, ot $A ats eh-Baa DNS tare aw ava B ret af addres % Sr TH dear arm fewer & fea fear Fea ah eects aE art ® ger wettest sects K at ta aE a 2.2.1 Shr arm & Baers aia aa, ete fo ate fresnas feae, ste afte, 3 a gers wea AT waa al ger Bae we dia a ee raat naa fem a aaa zt we dia ata dein R see? @ Sager eee aa te sete aut, fe ae a fst Qaae = oT Us URL? fea seam feat at @1 Se aa a sein fa a ada a tee aster Fat team sare (SIP), 244 a fren 8 DNS Sa ait =f oy ape CURD # svi f amsizarr ta #1 aa ae fedta A sate Se aTart 8 uee 50 | Digital Marketing purces. This addressed Internet re ce to b abstraction allow esource ti moved to a different physical location ress topology of the network, inthe addi et, Suck locally in an in ally and th P address of a resource rrresponding translation of this IP dress to and from its domain name 2 identity. Organizations can ique identity. Org to their name, helping Internet use toreach them easily A generic domain is a name that define general category, rather than a specific or perso ‘astanee, for example, the name of an industr rather than a company name. Some examples of generic names are books.com, musie.com, and travel.info, Companies have ereated brands based on generic names, and such generic domain names may be valuable Domain names are often simply referre nains and domain name registrant frequently referred to asdomain ow domain name registration with a regis not confer any legal ownership of the domain nam only an exelusive right of uration of time, for a particular 2.2.2 Domain name syntax Domain names are used worldwide, Particularly in the world of net works and data communication The following points expl ain how they wor and how they are used: es s © Domain names have two parts that a separated byadot, such asesample gn The Paddy azul background is. es recognizable, al ne by domain name's nverted phanumeric do, ‘system known as the name system (ONS), to a main domain oo eax and oe ahem wer fara ra free ee or am @ aa to & aah a eT 5 ap ate Ow BH aoa 1 aftstiea aAeaT 7 cree geet % fee, SATE an, Sr ae Hac Te music.com 4 travel info @ % aI TH ats TA z, ait aoa tet th Si Fy ah saa SH Sir am tien Ft ore tet fren aim 2, wife ch ase tin a fareh oh wen @, aq Ue vege at fn often ser sem 21 2.2.2 3h am Rides Sr 3m ofa eA ay Teas oh 2a gape Frofefan wits & an oS ae awe ara Be fea or © Sir taat aad ara, seat fare (DNS) + i wade a SH ZIT IFZzZLET/] a ar ‘¢ The right-most label conveys the top- evel domain; For example, .gov is the ‘TLD for Indian government domains. ¢ Thehierarchy of domains descends from _ the right to tho left label in the- marie; each label to the left specifies a subdivision, or subdomain of the domai tothe right, oad © Ahostname is a domain name thatpaie at least one associated IP address. Fag) namgeout example, the domain www.example.com and example.com- are also hostnames, whereas the com domain is not. However, other top-level domains, particularly country code top: level domains, may indeed have an IP address, and if so, they are also hostnames. ‘¢ Hostnames impose restrictions on the characters allowed in the corresponding domain name. A valid hostname is also a valid domain name, but a valid domain name may not necessarily be valid as.a hostname, 2.2.3 Domain Name System Architecture The Domain name system comprises of Domain Names, Domain Name Space, Name Server that have been described below: Types of Domain Names Domain Name is a symbolic string associated with an IP address. There are several domain names available; some of them are generic such as com, edu, gov, net etc, while some country level domain names such as au, in, za, sete. LAB Internet and Wel © agate daa ae: warm ; saree & FU. gor TLD #1 amt ae tie oe, Sr Ie asrer tera Pee pete 3, www.ext example.com ¥4 2" com #el 81 eres, 3 4 wegen wy 8 ed EY oer # us IP 2a HS ta aio 4, ta areas © rete daca Sr 1H ffgaen om #1 oH a ‘Afere tii 3m de &, oe ate Boi wea a 2.2.3 3a am Rees snfbera Sim fine 8 St 3, a we efit Bt 2, fe Freferfere | she 34 3 yo “Ses ee ies fee ae a tities @i ef ate ee ‘Fo ama a ¥ $3 com, edu, gov, Weed Goa & ase A au, i ‘The following table shows the Generic Top- fre eae 8 a ate-aaa S Level Domain names: & Domain Name Meaning com Commercial business afer fara edu Education (937 Indian government agoney #faa7 Tate WAL International entity ea Cea fe zanization : Networking Orga! Aire ATE ie ation [eects OEE wee p-leve country 10h “The following table shows some of the Cs Domain Name 2.2.4 Importance of a domain i 3 Geitinga domain namesfourcicecanbe FFT a a sons, for ‘very useful, It can be used for many rea instance, we can create the identity ofour brand TY og catin cnline orcancreatoa personalblogging website. TEP oa ag tat @, Tiwehavea business, people willbe abletoleam |) 1 Crae, asa 3 a we about our business remotely 32g wm att ae Pres 2.2.5 Registering a Domain Name pancreas Domain names are registered with anon- 5 sie profit organization ICANN(The Internet (4et2 #hftet FR al Corporation for Assigned Names and Numbers). xfsezé #4 @1 ae M8 TH Te does not allow registering a domain directly, quia 7 a @, Raa wi TH but we will havetogo witha domain registrar for fgeee 35 Te A GM SAE thispurpose. Domain name registrations involve 35 fry = a 8 registration fee for a year, and it must De flay a ae z er renewed every year by providing a renewal fee. am : Domain names cannot be purchased permanently S12 él ee aT at i at once, butit must be renewed every year. Ifwe FFAS Waa a ae eH Sy ful torenew the domain, itisautomatially deleted 2 , ae aitherch von from registry, fen aim #1 Toregistera domain name, following steps G ah sae = must be followed 5 sich feat oe ei Step 1" Choose perfect domain name for the website. Ifit isa business website, then EE = ae ‘wemay want togowith adomainname, whichis 2739. ‘free the name of our business. 7 wa - mee aa Internet and Web ‘Step 2" Choose a good domain registrar company having good support infrastructure example, GoDaddy or BigRock. ‘Step 3"In the registrar's website, check: ifyour domain name is avail GoDaddy 1 BigRock eau g—afargn: at awe #4 able for vat rarer ara te xfarezert & fet ‘on Ifthe domain that wehove selected wt aa Frere frat @, = weet Ht? For registrati i hhas been already registered by'someone, then we Ithas authority to create, mainta res a file about its zone x nd update the zone file. Secondary Server i Secondary Server transfers complet nation about a zone from another server pereee econdary server. The which may be primary or seconda econdary server does not have authority to create or update a zone file 2.3 Web Server ‘Web server" can hardware or the software, or both of them working together. 1. Onthe hardware side, a web server is a computer that stores web server software and a website's component files (e.g. HTML documents, images, CSS stylesheets, and JavaScript files), It is connected to the Internet and supports physical data interchange with other devices connected to theweb e referred to as the 2. On the software side, a web server Includes several parts that control how web users Access hosted files, on HTTP serve, An HTTP server is a pie understands (the protocol your Tteanbe accessed Mozilla.org) ce of software that URLs (web addresses) and HTTP, browser uses to view webpages), through the domain names ( like xe wt mas Fe aa teat 3 sitar tered wee feat 3 ra Hem, Sa we frie 8 Saved wa Te stata 3 2.3 da WAR “aq wit” are 7 ea 8 daflia farm oT Aart #17 fe ai dge wi a ari Lager HFS, 2 Gat, aaah aaa al wea ($3 HTML sraqiiee ate she wat - fore ea eer 8 was tae, sik a aaa Sas oq feada eta Sh etd a 2. Aired & sate a, aia #8, dae fra 78 Gee, HTTP wie HOTP e etaedat ar ee fe ®) sh HTTP (am ars SS fea ave fry ah ad st STEER Sh es (St Internet OT eee “Geebsites itstores, and delivers their content to theend-user's device. ~ Atthe most basic level, whenever a browser needs a file which is hosted on a web server, the browser requests the file via HT'TP, When the roquest reaches the correct web server (hardware), the HTTP server (software) accepts request, finds the requested document Git doesnot find it then 404 response is returned), and sends it back to the browser, also through HTTP, Avweb server is a computer that stores data, usesthe HTTP (Hyper Text Transfer Protocol) to send and receive requests as well as deliver web pages to clients. A user agent, such as a web browser or a web crawler, establishes communication between the server and the client PC by making a request for a specific resource using HTP and the server responds with an error message, ifthe resource does not exit Inother words when users search a website on their browser, the browser opens up a communication line with the server that hosts that ‘web page. For example consider facebook com. ‘The server that holds the data for facebook, will then pull those files from the storage and sent them back, which is what the client sees on their browser. Depending on the size of the file, this process can take from milliseconds to several sceonds or sometimes even minutes. ‘These pages are mostly HTML documents that may include text, images, style sheets and scripts. Many generic web servers also support server-side scripting such as Active Server Pages. (ASP) and PHP. 2.3.1 Uses of Web servers Web servers are commonly used to store, Process and deliver web pages to users, They are often part ofa larger of Internet and Intranet related Programs such as serving email, downloading Tequests for File Transfer Protocol (FTP) files, and ‘uilding and publishing Web pages. __ Web servers are not limited to just World Wide Web, but can also be found embedded in ic ’s such as printers, routers, webcams and ‘Serving only a local network. Sada fea arene, aR feaa we fect Fo | aa afte Ger icK de HA ae at arse HTTPS wR T va freee wel Aa we ( UTP wae CatqeaR) Fea fesatee Pt sree FF firer-wen@, #t 404 fener ee & mem a aon 8 TT aaah oe TY ae fade He oh feta Aaa ta fexiog oc gam wetea) arse a aa arson a aa ET, A ‘ifatiew Fraiel & fem fa PC % aa wettest a ara 2, aha OR TT gat wal 3, wae wi ad é, dae saw aren sitet sem #, St se ‘sarer % fed Facebook.co Sates meme, ae aR: rat @, sit 38 ar Gs | wea % tem ti wea a ahaa fretieke ad ae We tt 21 cag tae Sree HTD re, thie, Ena vie tot Ste aa ae GF Wika wee Te (ASP) af 2.3.1 da wat or sot aa ade omit ae 7 ok, haa a fatto 217s oR ee ait G Sa afta, Hea cam fe sce a3 ak dq 38 at ari ecm 21 fa edt Seq at) @, aft fie, ase, da a 8, oft San we stra eet 56 | Digit 2.3.2 Types of Web Servers ervers that are ‘There are four very popular servers the) STS ‘ate the market share, butt these are pollowing currently domin are a few more serves that also exist relatively unpopular among the masses. FOTO are some of the servers that are common!¥ (0) Apache Web Server eae [Apache is the most popular server o” EE market and was developed by the Apach' Foundation. It is open source software that can be installed on multiple platforms including Linux, Windows, UNIX, Mac OSX, and more. re excellent as they are “Apache servers a ee extremely customizable and contain 2 m structure, And sinee itis an open source platform, ‘we can add our own modules and make changes asrequired (2) IS Web Server Internet Information Services (1S) sa high- performance web server technology by Microsoft This web server runs on Windows NT/2000 and 2003 platforms (and may be on upcoming new Windows version also) While, it shares similar features to the Apache, it is not open source software, which ‘means that we can modify it or add our own modules, IIS supports HTTP, HTTPS, FTP, FIPS, SMTP and NNTP, (3) NGINX Web Server NGINX pronounced Engine-X) Weh server has a light-weight powerful server that is known for its high performance, stability, simple configuration and low resource usage. NGINX stands apart from other servers by scalable event-driven, rather than a threa using a idsystem ag walter atch a aa fier NT/2000 3 206 Coit arr 7a Pests 7e aura 3 SH sine ard ined al i vifewnd ae re aed &, 2 Wat sat ti aS H) SMTP 3it NNTP #3 (3) NGINX aa adz NGINX ($95-X eon adap at Safed, wea santa % fet ort ara #1 NG Ama Oe fen ST a sey sa sea eat Ger A ay NGINX gz sie Hea hae an wa Soe aaa a weaaay titeSpeed Web Server LiteSpeed is a high-performance & it is a replacement of Apache. After above 3 web server vost popular used server aeross the Internet. It jrpopularforits improved performance and low sat, LiteSpeed is compatible with the most and htaccess. Unlike other front-end proxy solutions, LSWS replaces all Apache functions, making iteasier to transition from Apache (5) Lighttpd Lighttpd is an open-source web server that was designed for speed-critical environments, while maintaining being standard compliant secure and flexible. It. was originally writton to target the c10k problem, similar to NGINX, but hhas become a popular server world-wide, Lighttpd consumes less power and can run on multiple operating systems including Windows, Mac OSX, Linux and Solaris, (6) Jigsaw Jigsaw is the open-source web server that was introduced by the World Wide Web Consortium. [tis not designed for enterprise-level applications, but instead a way to test your applications yourself. It was originally created as a technology demonstration rather than a full- fledged release, ‘Jigsaw can run on multiple platforms such as Linux, UNIX, Windows, Free BSD, and more. ‘tis written in Java and can even run CGI scripts and PHP programs. These are some of the most powerful web Servers that are currently on the market. Choosing the right web server isa strong challenge that companies face. Bach company should consider their requirements before selecting the ight type of server for their needs, Fowles di & ae deve a are ek th ae one ae % fem stati @ ements htaccess Bien afta AI | sateen 21 ay she-de het LSWS ash srord oavie at f aifaes aon ara et ar 2 (6) Lighttpd Lighttpd @ 3it—ard 1 fafewa wart % fore fem) ed adie, frie ai wa ‘ae ya 18 NGINX ® wa we & fe ara ra ar, fr vie a4 7 @1 an ete a fats, # OSX, forse ait ten fren Hm fen ot oem @) (6) fora fare em shea aq a aif ere fora ‘weftiets & fry fray et Far ett at ge te Fa a ae yar iets org 8 ae a fara wf devia $8 fe 34 BSD, 3h hag Gea ae wal ae Fear, atta fore sit PHP stares sh oH fh ‘sates all aga alae f rare ayeren @1 meh aa ake hd 2, fen afr a aor art a avi serait & AR a factaert att a weet or aafea 58 } Digital Marketing 2.3.3 File Servers ‘They arecften responsible Se ee management ae eel De om arat ng cit and acorea atthe Ee pen ma paring eves ord tI wo i eo en en eg fortheava { stored files recurity. The files can «./These are D0 uiser’sreques! they are mare like the filing cabinet aga 744 world. a si ea Fie servers ire oft categorized BY the ant, qi Fae vessed. Here a wa ee different methods: 23:4 CAE p (a1 TAR 2.3.4 Internet File Servers ie ¢ FIP(File'Transfer ProtocoD) . PTP (File Transfer Prot ee 2 GAIT ciyperTent Transfer Proto) 2.9.8 4 PRE we 2.3.5 LAN File Servers te ‘¢ SMBICIFS Protocol « SMBICIFS Pro @ NFSProtoco! @ NFSProtocol So, fileservers are diferent from web 207v2% ca eee ree? secaventhay do not provide dynamic webeOnten’ 3 iq THC Ane ora nstead, they only provide like web servers. In static gal cesder 23 2.3.6 UAE WET 2.3.6 Application Servers and its *yPes This isa server that is dedicated to serving ae oH tea TH certain piece of software. So, it is often usedin Rat w4 & feu ea zh ater % org sear FF conjunction with other servers and software, For ‘example, we may sign up for online gaming and 74 atone Atm & fore, nservers set up solely forthe gaming TF aivcter % fore Tt software. aatats fri sma #1 Types of Application Servers valieen wat & Wo ‘¢ Java Application Servers be directed to Net Framework Serv ee ah © Open Source Application Servers ane art ™ Mobile Application Servers 257 ee level devices 2.3.7 poe Ral oe ae that bypass servers in ata fate a oes cea from one place to WH wa & gut = sence So fashion, such asa person fem wat @t =o) load one file from multiple {Gaeta qu ‘computers at one time, we a Internet and es Ss Servers seage Rey 24 darren thatallow things such as Sy aemonmien ten rnd re a ma pware. The methods of commun Fe funy exible ire fy, 9.39 Proxy Servers and its types TR jactsasamediatorbetwoen server-to-fiter reuats made by users and client program, So, itallows the management of emails and shared connections. The two types of proxy servers are: a) Open Prosiesand Reverse Pro (1) Open Proxies ‘An open proxy is a forwarding proxy server which is accessible to any user. gq (2) Reverse Proxies be Reverse proxies are a type of server which "RUG pears tobe an ordinary sorver. So, a user that { requests information from the server wll have their request forwarded to one or mare proxy servers which allow the user to receive their GI cegMMatserrere from the origtial eecver all aig while having no information as to the original 1% fi server. 1 @@ 2.3.10 Database Servers veh They can manage a database, asit is stored an the server. They may use the SQL database management system, So, the server can search through information and send any requested information back to the client, 2.3.11 Mail Servers ‘These are used to control email. This server is be set up with the only the idea of controlling and handling emails. So, it sends, receives, stores the emails an coe There are two primary types of mal servers: g ‘MAP and POPS Servers. IMAP is quickly qa Pecoming the most popular server as it allows reading mails on multiple devices. 2.3.8 tot BAT ve ache wt, AT anf $a aril a argaia eke, te wee oe ee ear ets anne watacaes WA Hl 2.3.9 sie wee wd TH He we rd are fa 7m wa atte wenge Sma cra farce 1 eaferu, ae Gite atte aR Fm? ach ah agate ten bh alae we are stat atte fra tain (1) atte sitar em ae ate er teas A feet sf ape fore waa (2) Rear sitar feel aise oH WaT ae teat woke % Se ar #1 safer a rates af fore aem @, 3 Ue 8 often wach add at Bes 8 siftares wat 8G at ag a, + ah eral ad atten =i ot 2.3.10 Serie WaT ae tama FW att (aaa) we Sr BH fae a ori ara 1 goat mem Road ae wea é, sit wetter at gem a fied ts 2.3.11 Fer wee aa ovina a eae om @1 ea aa i a fr a+ 0 & far % aa She fe tha eam @, feta aco 3} 2 werd aay & Fa we POPS Fat) IMAP aga eh wi wa @, ifs ae ag fered 1 Safa eR ear #1 60 } Digital Marketing 2.4 Web Hosting ng is the service noma website or application vet, Web hosting #88 5e™ storage of web pages. available via World viding of prov Web hostin storage space for @ server oh the intern jing online space for hat Was The compar wi feb hosts ee ‘The servers on which web site is hosted sonnets bee hese eres HE seed pune, Bach ore: ht by med hating arene oe sic ae epetPadtreoftecreer visa oleae ade offer website local computer, to do so you wo your computer on 24 hours a day. This is practical and cheaper as well. Thisis where web hosting companies comes in. ace the website s made available on the internet, it can be accessed by other computers connected to the internet In other words Web hosting is a hosting service that allows individuals and businesses to host their website which can be view on the internet ‘This is done through a web hosting services, provider that offers the necessary technology in order to enable the page to be seen online, ‘These websites and web pagesare stored and hosted via special computers called Servers which are backbone with high-end data center having ‘an uptime of 9.98%, : Taree ie be lacated anywhere- either in your workspace (onsite) or ina remote (offsite). bee ae raat location Asites load much faster when your: is hosted to the nearest data c ee business location, enter of your 2.4.1 Types of Hosting The following table describes di of hosting that can be ayy a lerent types vailed as per the need: pea A aH 24 2 TGA Game k ca ate entra waer # on @1 um am Fane FH STIS ag, wa yet a wAeS at fora on wet 2h qat wad §, aa aif Sh eaheaget aft faster at ares ‘afaerser act @, fad gece t ae um 4a Oifeen alas ae @, se a ate = & fe crag carte ven a Faas sates wed Sere tee ath ere! tater wa 99.98% 7H oT weed hts a as (attaR2) =n fared forte ate Bem § 200 man ue eer | os ern ee [tess eina inate Eewenten : Exons footer Feiitetitona, em oper saben epIE EEDA gti ay ane MA 2 grap onan EIN WOE Ta AAA em me th nT eqen someon mjemnde se acne Ie Monn SE HE enzoy, inno saeamy eye Tommie Hecate 3 ‘ecm Ferns ttn terrane Minpecden sooo eoourag © aru 1 HH UBEOP Ho feet nna Ty ogame —— reg ant say ee ety a ‘ei 2g ee - a ¥ COEEETELENE 852 ie ie ag TRIM TNL en peppee "apa i Wi stone ae nen ma "a a sta 9 ane a 8 i orm yay 5 yo en en oa correo ze ea a a ase Pigae ego pan 000 gen ue ih sea ee TE gitar ane as r "9 ep 2 a shy Yom ee i a a pe ie gnc mn a Yee wos wane bes uee Doin ae py pal Lows 9th a pag ‘ea yak neo ‘eat sees sam ebareysmieae a, pee Wem ome eae wanes a Peay hace ey pe Re Sonn aay, ay Ha) OR Be [sess te of Baan eee rime pupa obo Oomimnae me ge ug ang OOmen npg Eocene pasuecemEPEY fe

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy