Architecture of www named world wide web, Computer Network Security

Assignment Help:

Write down short notes on the architecture of WWW which is World Wide Web.

WWW which means The World Wide web or the web is a repository of information spread worldwide and related together.  The  WWW  has  the  unique  combination  of portability, flexibility and user-friendly  features  which distinguish  it from other  services  provided  by the Internet.

The WWW project was initiated by the CERN (which means European Laboratory for Particle Physics) to create the system to handle distributed resources essential for scientific research. The WWW today is the distributed client-server service, in which a client making use of a browser can access a service using a server. Though, the service given is distributed over number of locations called websites.

The web comprises of many web pages which incorporate text, sound, graphics, animation and other multimedia components. These web pages are linked to one another by hypertext. In a hypertext environment the information is stored by making use of the concept of pointers. WWW uses a concept of HTTP which permits communicating between a web browser and the web server. The web pages can be formed by using a HTML (Hyper Text Markup Language). This language has several commands which are used to inform browser about the way of displaying the text, graphics and the multimedia files. HTML also has several commands through which we can give links to web pages.

If we want to get the page from web, we should type URL (Uniform Resource Locator) ‘for the required page, or otherwise we have to click on a link which provides the URL. The URL specifies internet address of the web server, the directory and name of the required page. If there is no directory or web page specified, then web server will give us a default home page.

The WWW today is a distributed client-server service, in which the client making use of a browser can access a service using a server. Figure drawn below illustrates how the different web site can communicate amongst them.

Working of a Web is described below:
The Web operates on the client/server model. A web browser acts as client in the WWW interface. By making use of this program, a user sends a request for the web page stored on the web server. The web server locates this web page and sends back it, to the client computer. The web browser after that interprets the web page written in the HTML language and then displays it on client computer’s screen.


Related Discussions:- Architecture of www named world wide web

Spambot detection - spam mail, Spambot Detection: The  previous studie...

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Pinging a web server, Ask quIf you are pinging a web server from a user’s c...

Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#

Assignment, Hello i have submitted an assignment and i am still waiting to ...

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Calculate the total latency, Question (a) Inspect the following ifconfi...

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

Md Fayzul karim, How can I get help for Linux automotion configuration (...

How can I get help for Linux automotion configuration (Network, virtualization, security and Firewal etc) with bash scrip. What is the charge for.

Ring topology, RING topology all computers are connected in loop. A ring ...

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Elliptic Curves, #questioAn elliptic curve y^2=x^3+ax+b(mod29) includes poi...

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Vulnerability identification-risk management, Vulnerability Identification ...

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

Describe how access control is implemented, Question: (a) How can you ...

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Ucsf medical center case study-information security, Example : UCSF Medical...

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd