Anda di halaman 1dari 31

HTTP AND URLs

HTTP (Hypertext Transfer Protocol) : HTTP protocol is


used to manage the links between one hypertext document
and another. HTTP is the mechanism that opens the
related documents when you select a hypertext link, no
matter where that document resides on the web.

Web documents are marked for formatting and linking with


HTML (hypertext markup language), and Web servers use
HTTP (hypertext transport protocol) to deliver Web pages. It
works equally well on stand alone computers, LANs, WANs,
and the global Internet.
Uniform Resource Locator (URLs) : Every page on the Web has a
unique address, called a Uniform Resource Locator (URL). URLs
are used by Web browsers to connect you directly to a specific
document or page on the WWW, and you do not have to know
where that resource is located physically. A sample URL might look
like the following : http://www.nitesh.ibm.com

The first part of the URL berfore the colon specifies the access
meethod. On the Web this is usually http (for Hypertext Transfer
Protocol).

The second part of the URL after the colon, specifies the resource.
The text after the two slashes (//) indicates a server name, and the
text after the single slash defines the directory or individual file you
will be connected to. If you are linking to a document, it will usually
have the file name extension .html, the abbreviation for Hypertext
Markup Language.

URL are always case sensitive.


Domain Names : A domain name is a way of identifying and
locating computers connected to the internet. The same
domain name can never contained by any two organizations.
A domain name always has two or more components
separated by periods.
If you know the domain name, you can start at the home page
of the site and click links until you find the Web page you want.
The task of matching domain names to IP addresses is
completed by DNS (Domain Name System). DNS is a
collection of databases that has information about domain
names and their corresponding IP address. The Domain
Name Servers are the computers that translate domain names
to IP addresses.
Most organizations use domain names that are easy to
remember. Each domain name ends with an identifier that tells
you what type of the Web site it is.

.com Commercial business


.edu Educational institutions
.gov Government entities
.ent Internet service provider
.mil Military sites
.org Organizations that do not fit any other category.
Hypertext : Hypertext is a system of organizing, navigating, distributing and
publishing information electronically. Hypertext information is organized into an
interconnected Web of linked text and image. Hypertext documents (called Web
pages) contain navigational anchors (commonly known as hyperlinks) that allow
you to navigate to another part of the same document. It is also used for
accessing information on the Internet.
The most common example of the hypertext is the help system available in
Windows 98 and other Windows-based applications like EXCEL, WORD, etc.
WWW : World Wide Web is : All the resources and users on the Internet
that are using the Hypertext Transfer Protocol (HTTP). Hypertext
Transfer Protocol (HTTP) is the set of rules for transferring files (text,
graphic images, sound, video, and other multimedia files) on the World
Wide Web.
The world wide web is an internet service, based on a common set of
protocols, which allows a particular configured server computer to
distribute documents across the Internet in a standard way. There are
several applications called web browsers that make it easy to access
WWW; two of the most popular browsers are Netscape Navigator &
Microsoft’s Internet Explorer.
FTP : File Transfer Protocol or FTP is not just a protocol but also a service and
an application. FTP is especially useful for transferring files between different
computer. FTP provides the facility to transfer files between two computers
running on different operation systems such as UNIX, MS-DOS and Windows 95.
FTP as a service : FTP is a service for copying files from one computer to
another. A connection can be made from one computer (Client) to another
computer (Server) offering this service and files can be sent or received.
FTP as a Protocol : FTP is a protocol for copying files between two computers.
The client and the server applications both use it for communication to ensure
that the new copy of the file is identical to the original.
SMTP : The simple mail transfer protocol (SMTP) provides a basic electronic
mail facility. E-mail message are passed through the Internet by using SMTP.
SMTP is used to sending outgoing messages. It accepts incoming connections
and copies messages from them into the appropriate mailboxes. If messages
cannot be delivered an error report having the first part of undeliverable message
is returned to sender.
POP3 (Post Office Protocol 3) is the most recent version of a standard
protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is
received and held for you by your Internet Server. Periodically, you (or your
client e-mail receiver) check your mail-box on the server and download any mail,
probably using POP3. POP3 is designed to delete mail on the server as soon as
the user has downloaded it.
Internet :
Hardware Requirement :
1. PC 2. Modem 3. Phone Line Connection.
Software Requirement :
1. Operating System (win 95) or Win 98
2. Browser (Internet Explorer, Netscape Navigator)
3. E-mail Software
4. Internet A/c and connection.

What is Internet ?
Internet is a network of network connecting people world wide.
Modem : It is a device used for modulation and demodulation of signals to be
transmitted. Converts Anolog Signals to Digital and vice – versa.
Browser : It should be according to the operating system if Operating System is
win 95 or NT. Browser is Internet Explorer but if Operating System is Novell
Netware Browser should be Netscape navigator. Browser is generally use to
search information on Internet. It helps in opening the website requested.
Encryption :
The process of rendering a message ( or data) unusable to all but the intended
recipients, who have the ability to decrypt it.
Cryptography is the science of creating workable procedures for encrypting and
decrypting messages.
The goal is to ensure that a message intercepted by a distrusted user cannot be
decrypted in a feasible amount of time. Although there are many different approaches
to encryption, the two most common are :
1. Symmetric / Private Key Encryption. This method uses a secret key known only to
the sender and recipient of a message. The secret key is used both to encrypt the
message when it is sent and to decrypt it when it is received. Symmetric key
encryption is very secure, but suffers from one problem if we want to send a message
to someone who does not have our key, we must also fine a way to securely give
them a copy of the key.
2. Public Key Encryption : This method is now commonly used in many computer
networking and telecommunication using the Secure Sockets Layer (SSL) protocol for
example, sending credit card numbers over the Internet. SSL establishes a secure
communications session over the Internet by using public key encryption, which
provides every participating user with a public key and a private key. Users are the
only ones aware of their private keys, while their public keys are generally available to
anyone who wants them. Remember that if a message is encrypted with a user’s
public key, it can be decrypted only with the same user’s private key and vice versa.
WEB SERVER
A Web server is the program that runs on a Web site and is
responsible for replying to Web browser requests for files. You
need a Web server to publish documents on the web.

An application that supports the server side of the Hypertext


Transfer Protocol (HTTP), the Internet Protocol for the World
Wide Web (WWW). Web servers are used to publish content on
corporate intranets and over the Internet. To access content on a
Web server we use a Web browser.

An example of a Web server is Internet Information Server (IIS).

Another popular Web Server is Apache, an open source


application for UNIX platforms.
A Web server is the program that runs on a Web site and is
responsible for replying to Web browser requests for files. You
need a Web server to publish documents on the web.

An application that supports the server side of the Hypertext


Transfer Protocol (HTTP), the Internet Protocol for the World
Wide Web (WWW). Web servers are used to publish content
on corporate intranets and over the Internet. To access
content on a Web server we use a Web browser.

An example of a Web server is Internet Information Server


(IIS).
Another popular Web Server is Apache, an open source
application for UNIX platforms.
• Microsoft Internet Explorer
• Microsoft’s Internet Explorer, usually just called
Explorer is the largest used browser in the
world.
Netscape Navigator
• Netscape Navigator also called Netscape is
available for Windows, Macintosh and for many
different versions of UNIX running the X
Window System. It is well supported and
provides up to the minute features including an
integrated news and mail reader, support for
Java applets, and the ability to handle “plug-
ins” for more new and interesting features yet
to be developed.
Web Browser:-It is a program that acts as an interface
between user and WWW. Brower sends requests for
information available on Internet and display
information for use.

A Web program you use to view pages on and


navigate the World Wide Web. Browsers are
sometimes referred to as Web clients or other fancy
names (“ Internet navigation tools”) but Web browser
is the most common term.
A wide range of Web browsers is available for every
type of systems you can imagine, including,
graphical-user-interface, and text only for dial-up UNIX
connections. Usually, all you have to do is to get a
browser downloaded from the Internet. For Ex.
Internet Explorer 5.0 version comes free as part of
Window’s 98.
NNTP : Network News Transfer Protocol (NNTP) :
The Network News Transfer Protocol is one of the most widely used protocols. It
provides access to the news service. NNTP is used in the delivery of news.
News is very similar in functionality to E-mail except message are delivered to
newsgroups, not end users. Each of these newsgroups is a storage area for
message that follows a common thread or subject. Instead of mail-client, News
client is used to read messages that have been posted to different subject areas.

NNTP shares characteristics with both Simple Mail Transfer Protocol and TCP.
Internet :
Hardware Requirement :
1. PC 2. Modem 3. Phone Line Connection.
Software Requirement :
1. Operating System (win 95) or Win 98
2. Browser (Internet Explorer, Netscape Navigator)
3. E-mail Software
4. Internet A/c and connection.

What is Internet ?
Internet is a network of network connecting people world wide.
Modem : It is a device used for modulation and demodulation of signals to be
transmitted. Converts Anolog Signals to Digital and vice – versa.
Browser : It should be according to the operating system if Operating System is
win 95 or NT. Browser is Internet Explorer but if Operating System is Novell
Netware Browser should be Netscape navigator. Browser is generally use to
search information on Internet. It helps in opening the website requested.
Internet Security
• Internet is not a secure place for the same you have to protect your
password. These should be main security against people who want
to break your account. The people called hackers or crackers.

• Most often, hackers are programmers, as such hackers obtain


advanced knowledge of operating system and programming
language. A cracker is a person who breaks into or otherwise
violates the system integrity of remote machines, with malicious
intent crackers, having gained unauthorized access, destroy vital
data.

• Keep your password secure from hackers or crackers, and never


have anything to worry about.
Internet Security
• Security System of Internet :
• Access Security : It prevents unauthorized access to your
computers or computing resources and it ensures that your
computers are available to authorized personnel etc.

• Transaction Security : Internet is not one’s Personal Property, it is


entirely distributed globally.

• User Accounts : The very first level of network security is the use
of user accounts to allow only authorized users access to the
network. Without an account, a computer user can not log in and
therefore can not use the network.

• Password : One of the most important aspects of the network


security is the use of passwords. Passwords are top secret of your
network.
Internet Viruses : A computer virus is a program sometimes (but not
necessarily destructive). That is designed to travel from machine to
machine, infecting each one along the way. This infection usually
involves the virus attacking itself to other files.
For example it is very common for viruses to themselves to executable
files (On the Dos/Windows Platform, viruses frequent targets are .exe
and .com files). Once the virus is attacked to a file in this manner, the
victim file itself become a security problem, when transported to
another computer system, can infect still other files that may never
come in contact with the original virus program. Basically there are
three types of viruses :
1. Master boot sector viruses.
2. Boot sector viruses.
3. File viruses.
Viruses may enter through e-mail address book of user, viruses are
sent with messages in address book. Don’t open an infected
attachment if you want to save your computer.
Firewall :
• It is a security control device, that connects two networks and
determines which traffic should be allowed to pass between them, in this
way firewall protects an organization’s computer system from an
external access.
• Firewall are the strongest form of Internet security yet implemented.
Firewalls not only protects your computer from outflow dangers, it also
protect the internet from your network.
• It is usually a combination of hardware and software. Network require
some soft of router or gateway to connect to the Internet. A firewall is
pass through mechanism (packets are either passed through the wall or
are rejected).
• Firewall can be placed in two categories static and dynamic. Static
firewall usually work in one of two ways. Static firewall allow all traffic
except that which is explicitly blocked by the firewall administrator. This
is known as default permit. The second is known as default deny,
denies all traffic except that which is explicitly allowed by the firewall
administrator. Default deny is more secure that default permit.
FIREWALLS
A Corporation connects its internal computer network
or LAN to the Internet, it faces potential danger
regarding security. Due to the Internet could
theoretically break into the corporate network and do
harm in a number of the following way:-

* They could steal or damage important data.


* Damage individual computer or the entire
network.
Search Engine
A Search Engine is a software that searches through a database of
Web pages for specific information. A search engine is a collection of
programs that gathers the information from the web, indexes it and puts it
in a database so it can be searched. It takes the keywords or phrases
that we enter in the search form and then searches the database
attached to it with the search phrase. If it does not find any match then a
message No Match found is returned by it, otherwise it returns hyperlinks
to sources that have search phrase along with a brief description of the
site having search phrase.
A web search engine is an interactive tool to help people locate
information available via the World Wide Web. Web search engines are
actually databases that contain references to thousand of resources.
Users interact with the database submitting question that “ask” the
database if it contains resources that match a specific criteria.
Search engines have a computer program (Called spider or crawler or
bot or robot) that responsible for building up database attached with
each search engine. A Web search engine employs a
search agent (Spider) which goes out and looks for information on web
pages. This information is indexed and stored in huge database. When
we conduct search, it looks through its database to find entries that
match the information we entered. Then it presents a list of Web pages
that it determines are most relevant to our search criteria.
Different spiders collect information using different
techniques and from different resources.

Some robots find synonyms of the keywords and results


matching those synonyms will be displayed. Others can
automatically remove article and prepositions from the key
phrase and then perform the search. Still others can find
the meaning of key phrase and display results which in
essence mean the same.

Search engine provides the help required. When user first


seeks information, the user can invoke an automated
search for topic. Search engine is an interactive tool to
locate information available via the World Wide Web.
Techniques for searching from the web :
(i) Phrase Searching : Phrase searching allows us to
search on multiple words for one topic. If we want a
Search Engine to do a phrase search we need to inform
the search engine that the words we are looking for
need to be grouped together. By enclosing the
keywords within quotes we are basically informing the
search engine that all three words have to be present
on the page in close proximity to one another.
(ii) Boolean Searching : Named after an English
mathematician, Boolean searching refers to a form of
logic applied to the search. Basically a Boolean search
requires some additional words to be used.
(iii) Capital Searching : If a search keyword is capitalized
the search engine will return only documents containing
the capitalized word.
(iv) Metasearches : Rather than search each directory or
index individually, we can submit a query to multiple
search engines by doing a metasearch.
Categories of Search Engines : There are many search engine on the
Web Some of the popular search engines are :
a. Yahoo ! (http://www.yahoo.com)
b. HotBot
c. WebCrawler
d. Excite (http://www.excite.com)
e. Lycos (http://www.lycos.com)
f. Magellan
g. Alta Vista (http://www.altavista.digital.com)

Yahoo : It is basically a search directory. It is hierarchically organized with


subject catalogue or directory of the Web Which is browsable and
searchable. Yahoo ! Indexes Web pages, Usenet and e-mail addresses.
This search engine has 14 categories listed on its homepage. If the
search request fails in Yahoo !, it is automatically routed to AltaVista for
more search. Yahoo !offers a lot of extra services like free e-mail
accounts, region-specific sites, searches to locate people, site reviews,
and a customisable news page.

AltaVista : This has been created by the research facility Digital Electronic
Corporation (DEC) of USA. This search engine has a spider called
AltaVista : This has been created by the research facility Digital Electronic
Corporation (DEC) of USA. This search engine has a spider called
scooter that traverses the Web and Usenet newsgroups. The engine
has two modes of search types namely, simple and advanced search.

In simple search, AltaVista will attempt to find pages that include as many
of your search words as possible, and rank those pages highest to
lowest in the result.
In advanced search , the page uses the same syntax rules as the basic
search, but it adds Boolean Operators to make searches much more
flexible. The operators include &(AND), | (OR), and !(NOT).
Spiders : The software that scans document on the Internet and adds this to the
search engine in database. Spiders is the process of scanning web sites to add
new pages and to update existing one.
A web spiders is an automated search engine. When someone submits a source
(website) to the search engine, it sends a small, but powerful program back to the
site of the submission, which scans the site for more resources. It finds additional
resources, it catalogs them as well as original resource. The advantage of this is
that, you can find information in a site, even if the site is not dedicated to that
specific type of information.
Bots : A bot is a software tool for digging through data. You give a bot directions
and it bring back answer.
It is a type of automated software. The term bot has become interchangeable with
agent, to indicate that the software can be sent out on a mission, usually to find
information and report back. Strictly speaking, an agent is a bot that goes out on a
mission. Some bots operate in place : for example, a bot in Microsoft Front Page
automates work on a Web page. Bots have great potential in data mining, the
process of finding in enormous amounts of data. Data mining often requires a series
of searches, bots can save labor as they persist in a search, refining it as they go
along. Intelligent bots can make decisions based on past experiences, which will
become an important tool for data miners trying to perfect complex searches that
delve into billions of data points.
Agent : Problem can be identified and resolved locally by agents rather than by
harried operators at a central management console or by sending technicians to
remote locations, which is expensive and time – consuming.
Internet Agent : Internet Agents are special programs that accomplish specified
tasks while the user is busy doing something else Perhaps the most common type
of agent on the Internet is the search engine.
The “agent” concept originated as a method of improving the efficiency of network
management. The manager – agent relationship is intrinsic to most standard
network management protocols, including the Simple Network Management
Protocol (SNMP) used to manage Transmission Control Protocol / Internet Protocol
(TCP / IP) networks. SNMP agents are widely available for all kinds of network
devices, including bridges, routers, hubs, multiplexers and switches.
Mobile Agent : Internet Agents are especial useful for mobile computer users for
a variety of information retrieval needs. Generally, wireless network are not very
fast. In addition, ……………….
Agents can be written in – house or purchased from venders such as IBM and
Oracle.

Anda mungkin juga menyukai