Architecture of www named world wide web, Computer Network Security

Assignment Help:

Write down short notes on the architecture of WWW which is World Wide Web.

WWW which means The World Wide web or the web is a repository of information spread worldwide and related together.  The  WWW  has  the  unique  combination  of portability, flexibility and user-friendly  features  which distinguish  it from other  services  provided  by the Internet.

The WWW project was initiated by the CERN (which means European Laboratory for Particle Physics) to create the system to handle distributed resources essential for scientific research. The WWW today is the distributed client-server service, in which a client making use of a browser can access a service using a server. Though, the service given is distributed over number of locations called websites.

The web comprises of many web pages which incorporate text, sound, graphics, animation and other multimedia components. These web pages are linked to one another by hypertext. In a hypertext environment the information is stored by making use of the concept of pointers. WWW uses a concept of HTTP which permits communicating between a web browser and the web server. The web pages can be formed by using a HTML (Hyper Text Markup Language). This language has several commands which are used to inform browser about the way of displaying the text, graphics and the multimedia files. HTML also has several commands through which we can give links to web pages.

If we want to get the page from web, we should type URL (Uniform Resource Locator) ‘for the required page, or otherwise we have to click on a link which provides the URL. The URL specifies internet address of the web server, the directory and name of the required page. If there is no directory or web page specified, then web server will give us a default home page.

The WWW today is a distributed client-server service, in which the client making use of a browser can access a service using a server. Figure drawn below illustrates how the different web site can communicate amongst them.

Working of a Web is described below:
The Web operates on the client/server model. A web browser acts as client in the WWW interface. By making use of this program, a user sends a request for the web page stored on the web server. The web server locates this web page and sends back it, to the client computer. The web browser after that interprets the web page written in the HTML language and then displays it on client computer’s screen.


Related Discussions:- Architecture of www named world wide web

Explain how inter-vlan communication, QUESTION a) A switch basically ...

QUESTION a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store

Csma/ca, CSMA/CA Wireless needs collision avoid ness rather than colli...

CSMA/CA Wireless needs collision avoid ness rather than collision checking. Transmitting computer puts very short codes to receiver. Receiver responds with short message getti

Elliptic Curves, #questioAn elliptic curve y^2=x^3+ax+b(mod29) includes poi...

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Intercultural sensitivity: recognising differences, Intercultural sensitivi...

Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

Function of key secrecy and algorithm secrecy in security, What is the func...

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

Using Technology as Experience Framework, Write a two to three (2-3) page p...

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

What is the benefit of adopting a password aging policy, QUESTION (a) H...

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

Secure routing protocols for wireless sensor networks, Q. Secure routing Pr...

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

Network analysis and network representation of a project, Question: Net...

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd