Architecture of www named world wide web, Computer Network Security

Assignment Help:

Write down short notes on the architecture of WWW which is World Wide Web.

WWW which means The World Wide web or the web is a repository of information spread worldwide and related together.  The  WWW  has  the  unique  combination  of portability, flexibility and user-friendly  features  which distinguish  it from other  services  provided  by the Internet.

The WWW project was initiated by the CERN (which means European Laboratory for Particle Physics) to create the system to handle distributed resources essential for scientific research. The WWW today is the distributed client-server service, in which a client making use of a browser can access a service using a server. Though, the service given is distributed over number of locations called websites.

The web comprises of many web pages which incorporate text, sound, graphics, animation and other multimedia components. These web pages are linked to one another by hypertext. In a hypertext environment the information is stored by making use of the concept of pointers. WWW uses a concept of HTTP which permits communicating between a web browser and the web server. The web pages can be formed by using a HTML (Hyper Text Markup Language). This language has several commands which are used to inform browser about the way of displaying the text, graphics and the multimedia files. HTML also has several commands through which we can give links to web pages.

If we want to get the page from web, we should type URL (Uniform Resource Locator) ‘for the required page, or otherwise we have to click on a link which provides the URL. The URL specifies internet address of the web server, the directory and name of the required page. If there is no directory or web page specified, then web server will give us a default home page.

The WWW today is a distributed client-server service, in which the client making use of a browser can access a service using a server. Figure drawn below illustrates how the different web site can communicate amongst them.

Working of a Web is described below:
The Web operates on the client/server model. A web browser acts as client in the WWW interface. By making use of this program, a user sends a request for the web page stored on the web server. The web server locates this web page and sends back it, to the client computer. The web browser after that interprets the web page written in the HTML language and then displays it on client computer’s screen.


Related Discussions:- Architecture of www named world wide web

Benchmarking-information security, Benchmarking An alternative approach to...

Benchmarking An alternative approach to risk management is Benchmarking. It is process of seeking out and studying practices in other organizations which one’s own organization de

Steganography-cryptography, Steganography It is a process of hiding info...

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

What is the main security vulnerability of ipv4, Question: (a) What is...

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Log file monitors-information security, LOG FILE MONITORS Log file monit...

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

What do you meant by network address translation, Problem: (a) What do ...

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

What do you meant by the term bastion host, Question : (a) What do you...

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

What is network virtual terminal, Network Virtual Terminal It is a set...

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Fragmentation, FRAGMENTATION One method is to limit datagram size to s...

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

People, People,Procedures,Data Asset Identification-Risk Management Th...

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd