Architecture of www named world wide web, Computer Network Security

Assignment Help:

Write down short notes on the architecture of WWW which is World Wide Web.

WWW which means The World Wide web or the web is a repository of information spread worldwide and related together.  The  WWW  has  the  unique  combination  of portability, flexibility and user-friendly  features  which distinguish  it from other  services  provided  by the Internet.

The WWW project was initiated by the CERN (which means European Laboratory for Particle Physics) to create the system to handle distributed resources essential for scientific research. The WWW today is the distributed client-server service, in which a client making use of a browser can access a service using a server. Though, the service given is distributed over number of locations called websites.

The web comprises of many web pages which incorporate text, sound, graphics, animation and other multimedia components. These web pages are linked to one another by hypertext. In a hypertext environment the information is stored by making use of the concept of pointers. WWW uses a concept of HTTP which permits communicating between a web browser and the web server. The web pages can be formed by using a HTML (Hyper Text Markup Language). This language has several commands which are used to inform browser about the way of displaying the text, graphics and the multimedia files. HTML also has several commands through which we can give links to web pages.

If we want to get the page from web, we should type URL (Uniform Resource Locator) ‘for the required page, or otherwise we have to click on a link which provides the URL. The URL specifies internet address of the web server, the directory and name of the required page. If there is no directory or web page specified, then web server will give us a default home page.

The WWW today is a distributed client-server service, in which the client making use of a browser can access a service using a server. Figure drawn below illustrates how the different web site can communicate amongst them.

Working of a Web is described below:
The Web operates on the client/server model. A web browser acts as client in the WWW interface. By making use of this program, a user sends a request for the web page stored on the web server. The web server locates this web page and sends back it, to the client computer. The web browser after that interprets the web page written in the HTML language and then displays it on client computer’s screen.


Related Discussions:- Architecture of www named world wide web

Ip datagram, IP DATAGRAM Various options can be included to IP header,...

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

Explain belady''s anomaly, Belady's Anomaly Also known FIFO anomaly. G...

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Explain characteristics of associative memory networks, (a) Describe the pr...

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

Compare and contrast the trust models-pgp, a. PKI and PGP are two methods f...

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

Explain briefly the role of the physical layer, a) Calculate the CRC for th...

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

What is the main security vulnerability of ipv4, Question: (a) What is...

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Audit or review of the information security issues, Using the selected appr...

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

What is an autonomous system, QUESTION 1: a) Differentiate between a r...

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Deployment and implementing of an ids, DEPLOYMENT AND IMPLEMENTING OF AN ID...

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd