Architecture of www named world wide web, Computer Network Security

Write down short notes on the architecture of WWW which is World Wide Web.

WWW which means The World Wide web or the web is a repository of information spread worldwide and related together.  The  WWW  has  the  unique  combination  of portability, flexibility and user-friendly  features  which distinguish  it from other  services  provided  by the Internet.

The WWW project was initiated by the CERN (which means European Laboratory for Particle Physics) to create the system to handle distributed resources essential for scientific research. The WWW today is the distributed client-server service, in which a client making use of a browser can access a service using a server. Though, the service given is distributed over number of locations called websites.

The web comprises of many web pages which incorporate text, sound, graphics, animation and other multimedia components. These web pages are linked to one another by hypertext. In a hypertext environment the information is stored by making use of the concept of pointers. WWW uses a concept of HTTP which permits communicating between a web browser and the web server. The web pages can be formed by using a HTML (Hyper Text Markup Language). This language has several commands which are used to inform browser about the way of displaying the text, graphics and the multimedia files. HTML also has several commands through which we can give links to web pages.

If we want to get the page from web, we should type URL (Uniform Resource Locator) ‘for the required page, or otherwise we have to click on a link which provides the URL. The URL specifies internet address of the web server, the directory and name of the required page. If there is no directory or web page specified, then web server will give us a default home page.

The WWW today is a distributed client-server service, in which the client making use of a browser can access a service using a server. Figure drawn below illustrates how the different web site can communicate amongst them.

Working of a Web is described below:
The Web operates on the client/server model. A web browser acts as client in the WWW interface. By making use of this program, a user sends a request for the web page stored on the web server. The web server locates this web page and sends back it, to the client computer. The web browser after that interprets the web page written in the HTML language and then displays it on client computer’s screen.

Posted Date: 7/20/2012 6:00:40 AM | Location : United States

Related Discussions:- Architecture of www named world wide web, Assignment Help, Ask Question on Architecture of www named world wide web, Get Answer, Expert's Help, Architecture of www named world wide web Discussions

Write discussion on Architecture of www named world wide web
Your posts are moderated
Related Questions
MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

which is best algorithm

Describe the process a proposed standard goes through to become an RFC

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi