0% found this document useful (0 votes)
26 views49 pages

Web Page Accessibility Across Devices

The document provides an overview of the World Wide Web (WWW), detailing its definition, functionality, and historical context, including its invention by Tim Berners-Lee in 1989. It explains the roles of web browsers, web servers, hyperlinks, URLs, and web standards, as well as the differences between the WWW and the Internet. Additionally, it discusses various web technologies and browsers, highlighting their features and the evolution of web applications.

Uploaded by

Komal Saharan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views49 pages

Web Page Accessibility Across Devices

The document provides an overview of the World Wide Web (WWW), detailing its definition, functionality, and historical context, including its invention by Tim Berners-Lee in 1989. It explains the roles of web browsers, web servers, hyperlinks, URLs, and web standards, as well as the differences between the WWW and the Internet. Additionally, it discusses various web technologies and browsers, highlighting their features and the evolution of web applications.

Uploaded by

Komal Saharan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Unit -1

WWW definition
Introduction
The World Wide Web (WWW), also known as the Web, is an interconnected
network of web pages and documents accessible through the Internet. Tim
Berners-Lee created it in 1989 as a way for researchers to share information
through linked documents.

The Web has since grown into a vast network of information, entertainment,
commerce, and communication accessible to anyone with an internet
connection.

Here is a step-by-step explanation of how the Web works

1. web browser: A web browser is a software application that allows users


to access and view web pages on the Internet. It acts as an interface
between the user and the World Wide Web by displaying web pages and
providing tools to navigate, search, and interact with the content.

Web browsers communicate with web servers using the HTTP or HTTPS
protocol, which allows users to access websites hosted on remote servers.
They also support web technologies such as HTML, CSS, JavaScript, and
multimedia content such as images, audio, and video.

2. web server: A web server is a computer program that serves web pages
to clients, such as web browsers, upon request. It is responsible for hosting
websites, processing HTTP requests, and delivering web content to users
online.

When a user types a website address into a web browser, the browser sends
a request to the web server hosting that website. The web server then
retrieves the requested resources, such as HTML files, images, and videos,
and sends them back to the user's browser, which renders them into a
viewable web page.

Web servers can run on various operating systems, including Windows,


Linux, and Unix. Some popular web servers include Apache, Nginx, and
Microsoft IIS. Web servers also support different web technologies such as
CGI scripts, PHP, and [Link], which allow developers to create dynamic
web pages and web applications.

3. Hyperlinks: One of the key features of the Web is hyperlinks, which allow
you to navigate between web pages by clicking on links. Hyperlinks are
created using the HTML <a> tag and can link to other web pages, files, or
even specific parts of a page.

4. Uniform Resource Locators (URLs): Web pages are identified by URLs,


which are unique addresses that point to the location of the web page on the
Internet. URLs typically start with "[Link] or "[Link] and include the
domain name of the web server and the path to the specific web page.

5. Web standards: To ensure that web pages are compatible across


different browsers and devices, there are web standards that govern how
HTML, CSS (Cascading Style Sheets), and other web technologies should be
used. These standards are developed by organizations like the World Wide
Web Consortium (W3C) and are implemented by browser makers and web
developers.

6. Web applications: In addition to static web pages, the Web also


supports interactive web applications that allow users to shop online, play
games, and communicate with each other. Web applications are created
using programming languages like JavaScript and run in the browser or web
servers.

How the Invention Started


The invention of the World Wide Web (WWW) began with a proposal by Tim
Berners-Lee in 1989 while he was working at CERN, the European
Organization for Nuclear Research. Berners-Lee's goal was to create a
system allowing researchers at different institutions to share information and
collaborate more easily.
At the time, various information-sharing systems were in place, such as
email and bulletin board systems. Still, they needed to be more extensive in
their capabilities and often required specialized knowledge. Berners-Lee
envisioned a system that would be more user-friendly and accessible to a
wider range of users.

To achieve his goal, Berners-Lee developed several key concepts and


technologies that would become the foundation of the Web. One of the most
important was the idea of hypertext, which links related documents together
using hyperlinks. This allowed users to easily navigate between different
pages and follow their interests across a vast information network.

Another key technology was the development of the Uniform Resource


Locator (URL), a standardized way of identifying the location of a specific
webpage on the Internet. This enabled users to access a particular website
using a simple and intuitive web address.

Berners-Lee also developed the first web browser, WorldWideWeb, allowing


users to view and navigate web pages using a graphical user interface. This
significantly improved over the earlier text-based browsers that were difficult
to use and required specialized knowledge.

With these technologies in place, Berners-Lee launched the first website, a


simple page describing the World Wide Web project and providing links to
related resources. Over time, more websites were created, and the Web
grew into a vast network of information and communication that has
transformed the world.

Today, the World Wide Web continues to evolve and expand, constantly
developing new technologies and applications. It has revolutionized how we
access and share information, connect with others, and conduct business. Its
impact on society and the economy will likely continue for many years.

Difference between World Wide Web and the


Internet
The terms "World Wide Web" (WWW) and "Internet" are often used
interchangeably, but they refer to different things. Here is a detailed
explanation of the differences between the two:

1. Definition: The Internet is a global network of connected computers


and devices that communicate with each other using standardized
protocols. It allows people and machines to exchange information and
data across geographical distances. The World Wide Web, on the other
hand, is a subset of the Internet that consists of related documents
and resources that are accessed through web browsers.
2. Scope: The Internet is a vast network connecting millions of
computers, devices, and networks worldwide. It includes different
technologies such as email, instant messaging, file sharing, and other
protocols. The World Wide Web, in contrast, is a collection of related
documents and resources stored on servers worldwide. It includes
websites, web pages, images, videos, and other media accessed
through hyperlinks.
3. Access: Accessing the Internet requires a connection to a network,
either through a wired or wireless connection. This can be achieved
through various means, such as broadband connections, Wi-Fi, cellular
data, or satellite connections. On the other hand, accessing the World
Wide Web requires a web browser application installed on a device,
such as a computer, smartphone, or tablet. Once the browser is open,
users can navigate to websites and web pages using hyperlinks or by
entering URLs into the browser's address bar.
4. Technology:The Internet uses various networking technologies and
protocols, such as TCP/IP, DNS, and HTTP, to connect computers and
devices and enable communication. The World Wide Web, on the other
hand, is based on technologies like HTML, CSS, and JavaScript, which
are used to create and display web pages.
5. Content: The Internet contains a wide variety of content, including
text, images, videos, and other media. The World Wide Web primarily
focuses on delivering content in the form of web pages and other
resources accessible via hyperlinks and URLs.

Some technologies used in the world wide web


1. Hypertext Transfer Protocol (HTTP)
HTTP is a client-server protocol, which means that the client (in this case, the
web browser) initiates the request, and the server responds. The protocol
defines a set of rules and standards for the format and structure of the
messages exchanged between the client and server, including the request
methods, response status codes, headers, and body.

HTTP request methods include GET, POST, PUT, DELETE, and others, which
specify the type of request being made and the data being sent or retrieved.
Response status codes include 200 OK, 404 Not Found, 500 Internal Server
Error, and others, which indicate the request's status and whether it was
successful.

HTTP also supports stateless communication, meaning each request and


response is independent of previous recommendations and responses. This
allows for efficient and scalable communication between clients and servers,
reducing the amount of data that needs to be transmitted and processed.

In recent years, HTTP has been evolving to address new challenges and
technologies, such as the need for faster and more secure communication.
For example, the latest version of HTTP, HTTP/3, uses a new transport
protocol called QUIC, designed to improve web communication's
performance and reliability. HTTP is a critical component of the World Wide
Web, enabling fast, efficient, and scalable communication between web
clients and servers.

2. Web browser
A web browser is a software application used to access and view web pages
and other resources on the World Wide Web. It is the primary way users
interact with the Web, allowing them to navigate between websites, search
for information, and consume various media types.

Web browsers communicate with web servers, which host the web pages and
resources that users request. When a user enters a web address (URL) into
the browser's address bar, the browser sends an HTTP request to the web
server, which responds with the requested resource, such as a web page,
image, or video.

Web browsers use a rendering engine to interpret and display web content,
usually written in HTML, CSS, and JavaScript. The rendering engine reads the
HTML code, applies the CSS styling, and executes the JavaScript code, to
create the visual and interactive elements of the web page.

Web browsers also provide a range of other features and functionalities, such
as bookmarks, history, tabbed browsing, extensions, and plugins. These
features allow users to personalize and enhance their browsing experience,
enabling developers to create rich and interactive web applications.

Many different web browsers are available, including popular ones like
Google Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge. Each
browser has its unique features, user interface, and performance
characteristics, and users often choose a browser based on their personal
preferences and needs.

Overall, web browsers are a critical component of the World Wide Web,
enabling users to access and interact with the vast web pages and resources
available on the Internet.

3. Hypertext Markup Language (HTML)


Hypertext Markup Language (HTML) is used to create web pages and other
documents on the World Wide Web. HTML is the standard markup language
used to structure content on the Web and is a critical component of the web
development process.

Web browsers use the HTML code to interpret and display the content of web
pages, using a rendering engine to apply the CSS styling and execute the
JavaScript code. This process creates the visual and interactive elements of
the web page, such as text, images, buttons, and forms.

HTML is designed to be easy to learn and use and can be written using a
simple text editor or a more advanced integrated development environment
(IDE). HTML code can also be generated using content management systems
(CMS) and website builders, which provide a visual interface for creating and
editing web pages.

The latest version of HTML, HTML5, introduces new elements and features
that make it easier to create complex and interactive web pages and
applications. These features include support for multimedia, semantic
markup, responsive design, and more. Overall, HTML is a critical component
of the World Wide Web, providing the structure and content that underpins
the vast web pages and resources available on the Internet.

Who runs www


Any entity or organization does not run the World Wide Web (WWW or the
Web). Still, it is a decentralized network of interconnected computers and
servers that communicate through standardized protocols and technologies.

The development and evolution of the Web are overseen by various


organizations and standards bodies, such as the World Wide Web Consortium
(W3C) and the Internet Engineering Task Force (IETF). These organizations
work to develop and maintain the standards and protocols that enable the
Web to function, including means for HTML, CSS, JavaScript, HTTP, and other
technologies.

Web content is created and published by individuals, businesses,


organizations, and governments worldwide and is accessible to anyone with
an internet connection and a web browser. Search engines like Google and
Bing help users find and discover web content by indexing and ranking web
pages based on various factors such as relevance, authority, and popularity.

Web Browser Definition


17 Mar 2025 | 7 min read
Web Browser: What Does It Mean?
Users can find, access, and view web pages with the help of a web browser,
which is a software program. The term "browser" is frequently used to refer
to a web browser. Using languages like 'Hypertext Markup Language' (HTML)
and 'Extensible Markup Language' (XML), websites on the internet and other
content are generally displayed and accessed through web browsers.

Web pages and websites transmitted via the Hypertext Transfer Protocol
(HTTP) are converted into content humans can view using browsers. They
can also display additional protocols and prefixes, such as secure 'HTTP'
(HTTPS), 'File Transfer Protocol' (FTP), 'email handling', and files (file:).
Additionally, most browsers accept third-party plug-ins to show dynamic
material such as embedded video, audio, and game content.

What Distinguishes a Search Engine from a


Browser?
Search engines and web browsers are sometimes mistaken for one another,
yet they serve different purposes. A search engine contains searchable data
about other websites (common examples of search engines are Google, Bing,
Yahoo, and Baidu). Nonetheless, a browser must connect to a website's
server and view its web pages. These are a few examples of browsers.

What functions do web browsers have?


Anything on the internet is accessible with a web browser, and it pulls data
from other websites and displays it on your computer or mobile device. The
Hypertext Transfer Protocol, which outlines how text, pictures, and video are
communicated on the web, is used to send the information. To ensure that
users of any browser, anywhere in the globe, can access this information, it
must be shared and presented consistently.

However, not every browser developer opts to interpret the format in the
same way. This implies to users that a website may have a varied
appearance and functionality. Web standards aim to provide uniformity
among browsers so that users can utilize and enjoy the internet.

When a web browser requests data from a server connected to the internet,
it converts that data into images and text using a program known as a
rendering engine. Web browsers read the Hypertext Markup Language
(HTML) code contained in this data to produce the images, sounds, and
experiences of the internet.
Users can navigate to other online pages or sites via hyperlinks. Every
image, video, and webpage has a distinct Universal Resource Locator (URL),
commonly called a web address. When a browser requests data from a
server, the web address instructs the browser where to look for each item
described in the HTML, instructing the browser where it should appear on the
web page.

Different Web Browsers


All web browsers do the same tasks. As a result, various web browsers have
been used over the years.

Several web browser examples and their unique features are covered below:

1. Google Chrome

The most widely used browser in the USA is Chrome, developed by internet
giant "Google" and regarded as quick, safe, and dependable by PC and
smartphone users. The Chrome Store offers various customization options in
the form of helpful extensions and apps that may be downloaded without
charge.

Moreover, Chrome makes it simple to integrate with other Google services,


like Gmail. Due to its popularity, Google has since expanded the "Chrome"
brand name to include more products such as the Chromebook, Chromebox,
Chromecast, and Chrome OS.

2. Apple Safari
On Apple phones, laptops, and other Apple devices, Safari is the default
browser. It is typically regarded as a reliable browser, and Apple's ethos is
reflected in its sleek appearance. Due to the dominance of iPhones and
iPads, Safari, initially designed for Macs, has grown to dominate the mobile
industry.

In contrast to other browsers mentioned, Safari is only available from Apple,


cannot be used with Android devices, and no longer receives critical security
updates from Apple for the Windows version.

3. Microsoft Edge and Internet Explorer

Although being discontinued, Internet Explorer deserves to be mentioned


because it was the preferred browser in the early years of the internet
revolution, with a 95% user share in 2003. However, in the years that
followed, many people switched to Chrome and Firefox because of their
generally slow startup time.

Internet Explorer 11 was the last version to be published because Microsoft


announced in 2015 that Microsoft Edge would take Internet Explorer's place
as the default browser on Windows 10. Microsoft Edge has a smaller market
share than Internet Explorer, which is nonetheless widely used worldwide as
of the time of writing.

4. Mozilla Firefox
Firefox is an open-source browser developed by members of the Mozilla
Foundation's community, in contrast to Chrome, Safari, Internet Explorer,
and Microsoft Edge. With a wide variety of available add-ons and extensions,
it may be the most individualized of the major browsers.

It had a user share of 32.21% as of the end of 2003 before steadily slipping
behind Google Chrome's influence. It still competes fiercely in the "desktop"
market but has a smaller market share on mobile devices, where Google
Chrome and Apple Safari are more popular.

5. Opera

Opera, made for Microsoft Windows, Android, iOS, macOS, and Linux
operating systems, is another web browser worth mentioning. It includes a
few unique characteristics and is usually considered a solid choice by many
people. Many of its original features have since been added to competing
browsers. Also, it offers a unique user interface. Opera has a usage rate of
only 2.28% as of this writing, yet it is nonetheless influential, if not widely.

In addition, the Opera Mini web browser, created especially for mobile users,
was released in 2005. Opera, the PC version, published in 1995 before the
mobile version, was created by Opera Software and supported an exemplary
user interface.

Components of a Web Browser


Seven key elements work together to make the web browser functional. That
is:

1. User Interface

When you launch a web browser, the first page you view is the user
interface. The address bar, forward/backward button, menu, bookmarking
option, and a few other options are all present on this page.

2. Browser Engine

The browser engine connects the rendering engine and the browser's user
interface. It adjusted the rendering engine to provide an output based on the
input.

3. The rendering system

The production of required content for the browser and its display on the
screen is the responsibility of the rendering engine. The HTML documents
are parsed before being converted to a usable form. Every browser that we
are aware of has a different rendering engine.

o Safari makes use of WebKit.


o Blink is used by Chrome and Opera (fork of WebKit).
o Trident is used on Internet Explorer.
o Firefox uses Gecko.
The open-source rendering engine WebKit was developed for Linux, and
apple changed it to support both Mac and Windows.

4. Networking

On the internet, communication and security are handled by the network


layer. It is also utilized for HTTP queries and caches the retrieved pages to
reduce network traffic.

5. UI Backend

It is used to draw simple boxes, windows, and widgets. This is for a general-
purpose interface and is not platform-specific. Underneath all of this, UI
techniques are handled by an operating system.

6. JavaScript Interpreter
JavaScript powers all websites and web pages. These pages were all written
in JavaScript. The rendering engine uses the pages that the interpreter has
translated to display the finished product.

7. Data persistence

Cookies are an example of data that is saved locally through data


persistence or storage. The browsers allow you to store databases locally on
your computer using storage methods such as IndexedDB, WebSQL, File
System, etc. User data is managed in the same way as cookies, cache, and
bookmarks are.

User data is managed in the same way as cookies, cache, and bookmarks
are.

What a Web Browser Can Do


The web browser has several features, including:

1. Home button - The "Home" button returns the user to the browser's
home page with only one click. Any website can be made the default
home page. Most of the time, consumers favor having search engines
like [Link] as their home page.
2. Address bar - The URL of the desired website is in the address bar.
This navigation bar aids us in finding the website of our choosing.
3. Refresh button - Refreshing the page reloads it. Sometimes, the
page locally saves and stores the data, and users cannot view the
updated information. The refresh button is, therefore, useful in these
circumstances.
4. Bookmarks- With this feature, you can save a certain website for later
use. It highlights web pages that could one day be significant or
helpful.
5. Tabbed browsing - This function lets many tabs open simultaneously
in the same browser.

Search Engine Definition


17 Mar 2025 | 8 min read
A software program that is designed to carry out web searches is known as a
search engine. They conduct systematic searches of the World Wide Web for
specific information, particularly in a textual web search query. Search
engine results pages (SERPs) are commonly used to refer to the presentation
of the search results as a list of outcomes.
A search engine searches its index of web pages for information that match
to the user's query whenever the user types a query. Then the user can see
the results in order of relevance. Links to websites, pictures, videos,
infographics, essays, research papers, and other types of files could all be
included in the content some search engines also mine data from open
directories or databases. Search engines also retain real-time information by
running an algorithm on a web crawler, unlike web directories and social
bookmarking sites edited by human beings. Deep web refers to any internet-
based content which cannot be indexed and searchable by a web search
engine.

History of Search Engine


In 1945, Vannevar Bush wrote "As We May Think" in The Atlantic Monthly. He
described a system for finding published information intended to overcome
the ever-increasing difficulty of finding information in ever-growing
centralized indices of scientific work. In this article, he envisioned research
libraries with connected annotations like modern hyperlinks. Through
algorithms like Hyper Search and PageRank link analysis will eventually
become a significant part of search engines.

Birth of Search Engines in the 1990s


In addition to WHOIS user search dates back to 1982, and Knowbot
Information Service multi-network user search, which was initially introduced
in 1989. The earliest internet search engines existed before the launch of the
Web in December 1990. Archie, who debuted on September 10th, 1990, was
the first well-documented search engine that searched content files such as
FTP [Link] World Wide Web was entirely manually indexed before
September 1993. On the CERN webserver, there existed a list of web servers
which was edited by Tim Berners-Lee. One snapshot of the list from 1992 is
present, but as more web servers came online, the central list could no
longer follow up. New servers were announced on the NCSA site under the
headline "What's New!".

Archie was the first Internet search engine to look up content (as opposed to
the users). The name is an acronym for "archive" (without the "v"). It was
founded by Alan Emtage, a computer science student at McGill University in
Montreal, Quebec, Canada. The Archie Search Engine did not index the
contents of these sites because the amount of data was so small that it could
be easily searched manually. Instead, the program downloaded the directory
listings of all the files found on public anonymous FTP (File Transfer Protocol)
sites, producing a searchable database of file names.

In 1998, Google bought the concept of selling search phrases from a start-up
called [Link]. The search engine industry was significantly impacted by
this shift going from a struggling company to one of the most productive
ones on the Internet. In the late 1990s Internet investing frenzy, search
engines were likewise regarded as some of the brightest stars. Several
businesses had stunning market entrances and saw record-breaking gains
during their IPOs. Some have stopped selling enterprise-only editions of their
public search engines like Northern Light. The dot-com bubble, a speculator-
driven market boom that peaked in March 2000 which affected many search
engine companies.

Bias of Search Engines


Several political, economic, and social biases have been found in the
information provided by search engines and in the underlying assumptions
made about the technology. However, search engines are built to rank
websites according to some combination of their popularity and relevance.
These biases may be a direct outcome of political processes (such as
removing search results to comply with local regulations) and economic and
commercial processes (for example, businesses who advertise with a search
engine may also become more prevalent in their organic search results). For
instance, in countries like France and Germany where Holocaust denial is
prohibited Google will not display specific neo-Nazi websites.
As search engine algorithms are frequently created to eliminate non-
normative opinions in favour of more "popular" results, biases can also
originate from social processes. Major search engines indexing algorithms
tend to cover more American-based websites than from other countries. One
attempt to manipulate with search results for commercial, social, or political
objectives is the practice of "Google Bombing." Researchers have looked at
the societal shifts brought about by search engines and how controversial
subjects like Irish terrorism, denial of climate change, and conspiracy
theories are represented in the search results.

Submission of Search Engine


A webmaster submits a website directly to a search engine through online
search engine submission. Even though search engine submission is
occasionally promoted as a technique to promote a website in most cases, it
is optional as the main search engines use web crawlers that eventually find
most websites online without assistance. They can either submit a single
web page at a time or the entire site using a sitemap, although usually only
the home page of a website needs to be submitted because search engines
can crawl a well-designed website. The only two reasons left are to add a
brand-new website without waiting for a search engine to find it and to have
the record of an existing website updated following a significant overhaul.
Some search engine submission tools connect to websites from their pages
and submit websites to various search engines. Given that external links are
one of the most significant variables affecting a website's rating, this is
beneficial in raising a website's ranking. But according to Google's John
Mueller, this "can lead to a tremendous number of unnatural links for your
site" and have a negative effect on site ranking.

Importance of Search Engine


Search engines are critical tools for accessing the massive amounts of
information available on the Internet. They enable users to access relevant
information quickly and easily by putting keywords or phrases into a search
box. Here are some of the reasons why search engines are important

Efficiency
Search engines allow instant access to critical information by saving
consumers time and effort in locating what they search for.

Accessibility
Search engines make information available to people worldwide regardless
of their location or level of knowledge.
Relevance
Search engines are constantly improving their algorithms to provide more
precise and appropriate search results by helping users to get the
information they need faster.

Business Growth
Search engines significantly drive website traffic which is critical for
businesses looking to expand their online presence and customer base.

Research
Researchers, scientists, and students benefit from search engines because
they enable access to scholarly journals, research papers and other
academic resources.

How does a Search Engine Work?


How does a search engine select the most relevant websites from the
thousands available online? How do we see these pages on our screens?
What are the prerequisites?
To execute the user's query, the search engine takes three steps.

Crawling
Crawling is the first step in discovering new web pages on the Internet. All
search engines use web crawlers or spider bots to follow links to new web
pages in the known ones. They gather data by crawling from site to site.
After gathering the data, it is indexed. While indexing is taking place, the
spider continues to discover new pages. The spider stops crawling when a
specified period has passed or based on the amount of data obtained.

Indexing
Once the data has been crawled, it is sent for indexing which saves data on
the search engine's database stated as the index. The index's job is to find
information linked to the query as quickly as possible. This procedure can be
completed quickly by using any of the following steps:
o The stop words are being removed.
o Links to other pages are listed.
o Providing details about images or embedded media on the page.
To appear in search results any website must be indexed. When a query is
entered, the index results are sometimes returned rapidly because it has
previously saved a few internet links containing the keywords.

Ranking
The last step is to rank the outcomes on the SERP. The search engines have
their criteria for listing search results. These signals or criteria should be
visible to the general public. The ranking algorithm determines the order of
the web links on the results page. One of the most frequently asked
questions is if all search engines produce the same results and the answer is
only sometimes. Each search engine has an algorithm that it uses to do web
searches. These searches are also influenced by criteria such as your
location, what other people preferred for the exact phrase, your previous
searches and so on. As a result, different search engines produce different
results.

Top Search Engines


Search engines are technologies that help people find information on the
internet. They are intended to assist users in the discovery of web pages,
photographs, videos, news stories, and other sorts of online content.
Here are a few search engine examples

Bing (renamed as Microsoft Bing in October 2020)


This is nearly as common as a Google search. The default search engine on a
Windows PC is Bing. There are certain parallels between Google and Bing
regarding search results such as images, videos, places, maps, and news.
Despite Microsoft's efforts to make it as successful as Google, it currently has
only 2-3% of the total search engine market share.

Yahoo
Yahoo used to be one of the most popular websites to visit. It is exclusively
given by Bing. It is also the default setting for Firefox users in the United
States.

Baidu
This is a well-known engine in China. Despite its low popularity, Alexa reports
its market share is growing globally. It is available worldwide but only in
Chinese.

Yandex
[Link] is a well-known search engine in Russia, Ukraine, and Turkey. It
gets its name derived from Yet Another Indexer. It accounts for less than 1%
of the overall search engine market.

DuckDuckGo
This unpopular search engine accounts for approximately 0.45 percent of the
market. Small search engines such as Bing and Yahoo are also competitors.
Unlike most search engines, it does not maintain its own search index and
instead relies on several sources. In other words, it lacks its own data and
relies on third-party sites such as Yahoo, Bing, and others. But what
distinguishes it from the rest is that it is considerably cleaner and free of junk
advertisements.

What is Downloading?
Downloading is the process by which any electronic gadget or computer
system obtains information from other network sources or the internet. The
downloading process is similar to saving data. The data is really stored on
another system before being delivered and stored on your system, which is
known as data downloading. Some examples of downloading are
downloading images, files, songs, movies, etc.

Important Points of Downloading


There are several important points of downloading. Some of the downloading
points are as follows:

1. Downloading the data is a reliable way to deliver it to the end user. It


keeps the data from buffering, which happens during the streaming.
2. It is the process of copying data or files from the server to the
computer.
3. When you download something, the process is essentially unaffected
by changes in connection speed. However, if your Internet connection
is sluggish, it may become slow.
4. Users will require memory and Internet access on their devices during
this process.

HTTPS Definition
17 Mar 2025 | 8 min read

Introduction
HTTPS is a protection-enhanced version of the Hypertext Transfer Protocol
(HTTP), an application protocol for all kinds of communication on the web.
HTTP facilitates the retrieval of web pages. HTTPS, or HTTP Secure,
accomplishes the same function but more securely. HTTPS works by focusing
on secure search so that unauthorized users cannot obtain the information
they are not allowed to have. In December 2019, Google released
information about its latest HTTPS update.

Different Methods Used to Make the Data


Secure
Encryption
Encryption is essential for the security of HTTPS as it executes SSL and TLS.
Public-key cryptography and the SSL/TLS handshake ensure that even if
someone can access the data you submitted to a website, they cannot read
it. Your sensitive information is converted through encryption into an
unreadable jumble of characters, symbols, and numbers meaningless to
anyone trying to read.
Authentication
The next stage in ensuring data security approaches a website is
authentication. The SSL/TLS certificate for a website will contain a public key
to confirm that the data sent has been signed digitally by a specific
individual using the right private key. This demonstrates that the information
is reliable and acceptable.

Data Integrity
Files, photos, or web pages are subject to manipulation by third-party
individuals if not properly secured. A website can utilize the digital signature
from the original sender provided through HTTPS to verify the authenticity of
each document sent through the server. It is possible to examine the
document's contents, including its digital certificate, to ensure there hasn't
been any data loss during transmission.

What is HTTPS?
o HTTP: HyperText Transfer Protocol
o HTTPS: HyperText Transfer Protocol Secure

Difference between HTTP and HTTPS


Web users can send and receive information over the Internet with the use of
both HTTP and HTTPS. So what makes HTTP and HTTPS different from one
another?

However, HTTPS is crucial for websites that send sensitive information, such
as e-commerce sites where customers enter payment information like credit
card numbers, billing addresses, and phone numbers. TLS, formerly known
as Secure Sockets Layer (SSL), is a protocol that works with HTTPS to encrypt
sensitive data, safeguard against information loss or tampering during
transfer, and authenticate specific users to communicate with the website.

Fundamentally, HTTPS secures data transfers by generating temporary


session keys, or encryption codes, for communication between a user and
the website server. The certificate authority like Symantec or Comodo must
validate these encryption keys.

Email, e-commerce, and other sensitive data transfers were the initial uses
for HTTPS. It is now considered the industry standard for all websites, is
supported by Google, and is necessary for many cutting-edge features,
including advanced web applications.

Importance of HTTPS
Using HTTPS is a must for any website dealing with secure information.
However, HTTPS can still be useful for websites that don't deal with sensitive
data. Google has been one of the leading supporters of HTTPS's universal
application in secure search.

If you work in e-commerce or finance, provide a SaaS solution, or have any


other business model that includes processing sensitive client data online,
the security dangers connected with HTTP are real and might have serious
repercussions.

Most significantly, HTTP can allow an internet service provider (ISP) or


another outside actor to actively tamper with pages that site users travel to,
changing content or removing page elements. However, in the hands of
other parties, this could be used for much more criminal reasons. For
example, in the case of ISPs, this is occasionally used to insert
advertisements or behavioral tracking cookies for advertisements.

Which is more secure, HTTP or HTTPS?


HTTPS is safer. A 1999 note from the World Wide Web Consortium, a
worldwide web community operated by Jeffrey Jaffe and Tim Berners-Lee,
creator of the World Wide Web, reported several unique security factors and
the potential attack transmitters linked with HTTP/1.1:

1. Leakage of private information: In an ideal world, websites allow


users to choose how much personal information is disclosed. However,
this is only sometimes the case, leaving consumers at the mercy of the
webmaster's wishes.
2. Unauthorized usage of server log data: Web servers track the
navigating movements of site visitors. This data may be utilized to
discover personal information regarding end users.
3. Unsecure transfer of confidential data: HTTP cannot control the
precise nature of the data being transferred through them.
4. Encoding of confidential data in URIs: An unintentional disclosure
of a private source of information could be the source of a link that
contains potentially private information.
5. Privacy issues related to accepting request headers: A different
data class may be combined with other sources to identify end users.
However, this violation of privacy may be secure on the server side.
6. DNS spoofing: The Domain Name Service, which links domain names
like [Link] with underlying IP addresses, is a key component
of HTTP. Malicious individuals can "spoof" a DNS by purposefully
associating an IP address with the wrong DNS, leading people away
from the site they intended to visit and onto a different one.
7. Spoofing and location headers: Similar to the DNS spoofing
problem, a server hosting multiple unrelated organizations needs to
check the Location and Content-Location header values to ensure they
aren't trying to invalidate resources they don't control.
8. Identification credentials and inactive web clients: Clients
cannot remove cached authentication credentials using HTTP/1.1.

How Does HTTPS Protect Against


Cyberattacks?
Most data sent from an individual to a website is protected and encrypted by
HTTPS. An HTTPS connection encrypts all data sent, including the query
string arguments, post bodies, and URL path.

Although HTTPS offers an extra layer of security for the data transmitted to
and from a website, it is not intended to act as a firewall for the site. The
SSL/TLS encryption protects the data transfer, but you should implement
additional security measures to secure the other information on your
website.

Can HTTPS Prevent DNS Spoofing?


Domain Name System (DNS) spoofing secretly directs users to a different
website than they request. The HTTP Strict Transport Security (HSTS)
protocol allows you to force a browser to display your website at all times.

A hacker may attempt to create a fake version of your site since it has a
secure SSL/TLS certificate. Still, users will be immediately made aware of the
security violation. The strongest defense against DNS spoofing is setting up
HSTS with HTTPS.

Why Are HTTPS and VPN Required Together?


Virtual private networks (VPNs) and HTTPS are great website security
technologies. When combined, they can offer an even better level of security
than you might be able to achieve on your own.

Data is passed from a user to the website, and HTTPS secures the reverse.
The sensitive data exchanged across websites today require this protection,
but it only safeguards that communication channel.

A VPN, on the other hand, protects your whole system while shielding your
identity and surfing history. You can provide a second layer of security for
every user on your network by using HTTPS and a VPN provider.

Advantages of HTTPS
HTTPS provides multiple benefits over HTTP connections:

o Data and user protection: HTTPS creates secure connections and


prevents monitoring between browsers and web servers. Thus, it
safeguards user privacy and Guards delicate data against hackers: This
is crucial for transactions involving sensitive personal or financial
information.
o Enhanced user experience: Customers are more confident and
trusting of a website when they know its authenticity and data
security. Additionally, HTTPS accelerates data transfers by shortening
the data's size.
o Search engine optimization (SEO): An important benefit for
companies looking to increase their online presence through SEO is
that HTTPS websites typically rank higher in search engines' results
pages.
Limitations of HTTP
Some of the limitations of HTTP are:

o HTTP is quick due to its simplicity but lacks security when exchanging
data. This is because none of the data is encrypted and is instead
transferred in plain text.
o Anyone with the appropriate equipment, understanding, and insight
between the server and the browser can easily view and obtain the
transmitted information because the hypertext data is divided into
'packets' during the transfer.
o As a result, there is a high possibility that attackers will gain access to
usernames, passwords, and other sensitive information.
o This indicates that HTTP is not a private or secure medium, making
users uneasy.
o Although HTTP is secure for some websites, such as blogs, it is not a
secure method to transmit sensitive data, such as credit card numbers.
How to switch from HTTP to HTTPS?
Transform from HTTP to HTTPS in 7 stages:

o Initially, it would help if you decided whether you require a single,


multi-domain, or wildcard certificate.
o The next step is to use a 2048-bit key certificate to obtain a Certificate
Signing Request on your server.
o It is your responsibility to keep your SSL certificate up to date.
o Relative URLs should be used for resources on the same secure
domain.
o For 301 HTTP redirects to HTTPS URLs, use mod rewrite, a popular
server-side option.
o Ensure the web crawlers can reach your HTTPS pages through your
[Link] file.
o Verify that the website returns the identical HTTP status code.
HTTPS vs. HTTP is a query that has afflicted several website owners as they
attempt to stay compliant with Google and offer a secure space for those
who visit.

How Does HTTPS Work?


Cryptographic technologies like TLS or SSL are used on top of HTTP to
encrypt and secure each data packet transmitted over an HTTPS connection.
The technology used to encrypt communications is called Transport Layer
Security (TLS), formerly Secure Sockets Layer (SSL). It is SSL's most recent
and secure version.

TLS protects against attacks and has three key objectives: privacy,
authentication, and general security. An asymmetric key algorithm known as
The Public Key Infrastructure, or PKI, is used by TLS to secure
communications. This system utilizes two uniquely corresponding keys to
encrypt and decrypt important data, allowing secure communication across
the Internet.

TLS connects the sender and recipient by combining the two keys. It ensures
that both parties are recognized and are who they claim to be.

o First, you have the public key. It can be shared with anyone who
wishes to communicate with the site and is accessible to the general
public.
o This key serves as a lock to encrypt the data and is used to convert
plain text into cipher text. Additionally, it confirms the private key's
owner. Certificates are used to distribute public keys to browsers.
o Then, each public key has a private key, which functions as a pair. This
key is used to decrypt data. Only the associated unique private key
can be used to decrypt data that has been encrypted with a public key.
o The lock is opened, and the data is decrypted using this private key. A
private key also verifies the ownership of the data. Only the owner can
access this key, which is kept secure and stored.
o A secure connection is established, and the certificates are transferred
before any real data is transferred.
o The customer types in the page URL they want to access. The web
page's server transmits the TLS or SSL certificate with the public key to
establish the connection. The server and client undergo much back
and forth (called a TLS/SSL handshake) until they establish a secure
session.

URL Definition
17 Mar 2025 | 9 min read
A URL is a special identifier that can be used to find a site online. Uniform
Resource Locator is the full form of URL. It is additionally known as a web
address. URLs comprise several components, including a protocol and a
domain name. A URL tells a web browser how and from where to retrieve a
resource.

End users can access the site by putting the URL into the address bar of their
browsers or by clicking a hyperlink. Owners of websites can change their
URLs. A carefully constructed URL can be an effective tool for enhancing user
experience, which can boost search engine optimization (SEO) performance.
Syntax of URL:
scheme://[Link]: port/path/filename

Example:
[Link]

Parts of the URL


The scheme, subdomain, domain, top-level domain, port number, path,
query, parameter and fragment are the components of a URL.

1. Scheme
All URLs start with the scheme. The scheme specifies the protocol to access
the resource on the internet. The scheme denotes the protocol that the
browser utilizes to request the resource. The most popular URL scheme
are listed below.

1. HTTP: HTTP is used to send data across the internet. Browsers use it
to exchange messages with web servers to access web pages. When
the input URL starts with "http" in the address bar, the web browser
sends a request to the server that utilizes HTTP protocol. HTTP is a
stateless protocol that does not keep a constant connection between
the client and the server. Each request and response are handled as
separate transactions.
2. HTTPS: A secure variant of the HTTP protocol is HTTPS. It is frequently
utilized to access websites that contain private data. Your web browser
creates a secure connection with the server using the SSL / TLS
protocol whenever you input a URL that starts with "https" in the
address bar.
3. FTP: FTP is used for online file transfers. It is frequently used to upload
and receive files from a server. A subdomain establishes a unique site
entity that enables using a different website style and content
organization. The FTP client creates a connection to the server and
enables you to browse its files and directories and upload and
download files.
4. Mailto: The "mailto" URL scheme is utilized to make a link that opens
the default email client and generates a new email message with the
"To" field. After that, the user can add a subject and message in the
body and send the email as usual.
5. Tel: The "tel" URL scheme generates a link to place a call. The phone
number is formatted per the E.164 specification, including the nation
code, area code, and local numbers.
6. Sms: The "sms" URL scheme generates a link to send a text message.
The format for SMS URLs is "[Link] where <phone> is an
optional parameter that specifies the destination phone number of the
SMS message.
7. Skype: The "Skype" URL scheme is utilized to generate a Skype
conversation link.

2. Subdomains
Any words or phrases before the first dot in a URL are called subdomains.
Subdomains are excellent for organizing information on the site to improve
the user experience. The most widely used subdomain is www. Subdomains
help to manage your website. Subdomains allow users to locate and access
content more rapidly. Most websites have a responsive layout for different
platforms, but you can also add a mobile-specific website with a subdomain.

3. Domain
The domain is the name of a website. It is a symbolic word connected to an
IP address. Users enter a domain name into their browser's address bar to
access a website. The domain name is a different or special name for
recognizing the website. Domain names come after the (@) in email
addresses and after the (www.) in web addresses.

Many domain names are available, some are generic (com, edu, gov, net,
etc.), and others are country-level (au, in, za, us, etc.).

The generic top-level domain names are listed in the chart below:

Domain Name Meaning

1. Mil U.S. military

2. Net Networking organization

3. Edu Education

4. Int International entity


5. Com Commercial business

6. Gov U.S. government agency

7. Org Non-profit organization

The top-level domains for every nation are listed in the chart below:

Domain Name Meaning

1. za South Africa

2. in India

3. de Germany

4. fr France

5. us United States

6. uk United Kingdom

7. cl Chile

8. jp Japan

9. au Australia

10. ca Canada
11. es Spain

12. ee Estonia

13. hk Hong Kong

Guidelines to Buy the Domain


1. Check the Availability of the Name
You can use a checker to search for the name to verify whether the name is
available.

o Enter the name and extension you want to use.


o Click on the search
o It will give you a list of available names.

2. Continue to Checkout
You need to select the registration period in this step. Usually, registrars
require a minimum of one year period. Some registrars provide up to ten
years of registration time.

i) Complete the Registration Procedure

Once the payment has been approved, the registrar will ask you to complete
a setup form with details such as your name, email address, home address,
and phone number.

ii) Verify Domain Ownership

After completing the registration procedure, you will receive the verification
link in the email. You can submit a request from the control panel if you do
not receive the verification link.

4. TLD
The part of a website name that comes after the dot is known as a top-level
domain (TLD).

TLD Extension Types

1. Generic TLD (gTLD): Most well-known extensions, such as .com, .org,


[Link], are included in this group.
2. iCountry Code TLD (ccTLD): TLD denotes a nation, a territory, or a
region. ccTLDs are letters based on international country codes
like .uk,.in, and. sg.
3. Sponsored TLD (sTLD): Particular organizations utilize this kind of
extension. For example, '. app' is a TLD designated for the developer
community.

5. Port Number
The port is a reserved channel that is utilised for particular purposes.
Different servers will utilise various ports. The resources on the server
are accessible by browsers only when they are connected to a specific port.
The default port for HTTP servers is 80.

6. Path
It is frequently referred to as the website's folder structure. The path
indicates which directory on the server contains the requested resources
(files, movies, audio, etc.). A web server can direct users to a particular
location by using the path to the resource.

7. Query
The query is found in dynamic web pages' URLs. The query comprises a
question mark and then a list of parameters.

8. Parameter
A parameter is a query string or a variable in a URL. They are part of a URL
that comes after the question mark. Keys and values in parameters are
separated by the equal symbol (=). Ampersands (&) symbol is used to
separate many parameters.

Parameter Use Cases

o Translating: A country code in the query string translates a web page


into the language associated with the nation.
o Searching: The search parameter displays search results from a
website's private search engine.
o Filtering: Site owners can utilize the filtering parameter to divide
various fields, like the topic, colour, price range, and region.
o Tracking: Tracking typically includes the Urchin Tracking Module
codes to monitor traffic from advertisements and marketing efforts.

9. Fragment
The fragment is the last part of a URL. The fragment is an optional element
of a web URL that begins with the hash (#) symbol, which refers to a
secondary resource. The secondary resource is the website section is like a
footer or a sidebar.

Types of URL
1. Absolute URL

An absolute URL provides precise location details. It starts with a procedure


like "[Link] and goes on with all the specifics. Absolute URLs give all the
details needed to locate a website, including its location.

Syntax: protocol://domain/path

2. Relative URL

The relative URL only includes the path and not the domain name. Relative
refers to "in relation to," so a relative URL describes a location in terms of
the present location. A relative path refers to an internal connection to a file
within the same domain.

3. Canonical URL

A canonical URL aids web crawlers and search engines figure out which
version of a web page should be indexed and shown in search engine results.
It is crucial because it aids in avoiding problems with duplicate content that
might negatively impact a website's search engine visibility. It also helps to
ensure the most important web page version is indexed and shown in SERPs.

4. Callback URL

Callback URLs point to a main location when users finish a task on an


external system.

5. Vanity URL
Vanity URLs are also referred to as custom short URLs. A vanity URL is a one-
of-a-kind web address that has been customized for marketing uses. Vanity
URLs make it easier for visitors to recall and locate a particular website page.
Vanity URLs should be simple to recall, use, and share. Owners of websites
can create a vanity URL using a website url shortener utility like Bitly,
[Link], or TinyURL.

Web Server Definition


17 Mar 2025 | 7 min read
Web pages are a collection of data stored on a computer (also known as
server space) on the Internet, including photos, text files, hyperlinks,
database files, and more. A web server is a software program that runs
on the server side. When a user asks their web browser to run a particular
web page, the web server organizes all the data elements into that web page
and uses the Internet to forward them back to the web browser.

What exactly is a Web Server?


A web server is used for storing and transferring a website's
content. A web server sends all the text, video, application data, graphics,
and other content that users may require. The web server requests the
website's data each time a user clicks a link or begins a download.
It consists of the hardware and software responsible for utilizing the
hypertext transfer protocol (HTTP) and other protocols to reply to requests
made on the World Wide Web. The requests come from customers.

Its main function is to provide each user who wants it with access to a
website's content. Data is stored, processed, and delivered during this
process.

Hardware on a web server makes it easier for devices to communicate data.


The web server's software manages access to the hosted files by users. Web
server software is required for every computer that hosts websites.

Functions of a Web Server


It's critical, to begin with, an understanding of a web server's functions to
comprehend all of its features.

In general, web servers perform the following tasks:

o All website data is stored and set up on web servers. Web


servers are the ones responsible for making hosted websites
accessible. Therefore, this is done to safeguard data from unauthorized
users. This covers various things, such as the accessibility of back-end
database server services.
o Your website's web server will be designed to accommodate visitors
worldwide who want to view it. Such potential customers and visitors
are referred to as end users, and their demands for access are referred
to as end-user requests.
o Web servers help in bandwidth management; they are set up to
reduce unnecessary network traffic, which regulates the traffic
volume on the network. This function of web servers greatly reduces
downtime. The main reason for downtime is excessive website traffic.
o The availability of a web server makes it possible to create dynamic
websites using popular programming languages like Perl, Ruby,
Python, and others.

How do Web Servers Operate?


The words "web server" refer to either server software or hardware;
however, typically, both can coexist.

1. A web server is a machine that maintains software and information that


has not been processed from other websites, such as HTML files, photos, text
documents, and JavaScript files. The hardware of the web servers is linked to
the Internet and enables the sharing of information with various Internet-
connected devices.

2. A web server has server software that may be accessed via website
domain names. It ensures that website content is available and regulates
how web users access files. An HTTP server is one of the parts that make up
the web server.

Any web browser, including Google Chrome, Microsoft Edge, and Firefox, will
use HTTP to move the request ahead whenever it requests a web page
hosted on a web server. The HTTP server will accept the request once it is
received at the server end, start searching for the required data
immediately, and then send it back to the web browser through HTTP.

Let's examine the sequential steps when a web browser approaches a web
server to request a web file or file. As you do the following:

1. Any web user must first enter the website's URL in the address bar of their
web browser.

2. Using the URL, your web browser will look up the IP address associated
with your domain name by translating the URL using the DNS (Domain Name
System) or searching cache memory. Your browser will be directed to the
web server by the IP address.

3. After establishing the connection, the web browser will use an HTTP
request to ask the web server for the webpage.

4. The web server swiftly responds by providing the requested page or file
back to the web browser after receiving this request.

5. The web server will provide an error message if the web page the browser
requested does not exist or if a processing problem occurs.

6. If there are no errors, the browser will show the webpage correctly.

Uses for Web Servers


Most commonly, web servers are used for

o deploying SMTP (Simple Mail Transfer Protocol) to send and receive


emails over the Internet;
o 'File Transfer Protocol (FTP) file fetching requests; and
o developing, publishing, and designing websites.
The server-side scripting method is supported by many Web servers,
including the most basic ones. Web server scripts are used in server-side
scripting, a technique for creating personalized responses for each user. This
method runs on the server machine with many features, including database
access. Numerous scripting languages will be used during the server-side
scripting process, including ASP, PHP, Java, JavaScript, Python, Ruby, and
many more. The HTML files can also be created dynamically using this
method.

Architecture
The two methods that Web Server Architecture employs are as follows:

1. Concurrent Approach

2. The single-process, event-driven approach

1. Concurrent Approach
The web server may process several client requests simultaneously with the
help of the concurrent technique. It can be done using the following
techniques:
o Multi-process
o Multi-threaded
o Hybrid method

Multi-Processing
The parent process starts several single-threaded child processes,
distributing incoming requests to the child processes. Each child process is in
charge of dealing with a single request.

The parent process monitors the load and chooses whether to kill or fork
processes.

Multi-threaded
It generates numerous single-threaded processes as compared to Multi-
process.

Hybrid
It combines the two methods described previously. This method creates
numerous processes, each of which starts several threads. Each thread
handles one connection. Less stress is placed on the system's resources
when numerous threads are active in a single process.

2. The single-process, event-driven approach


An event-driven server typically has a single thread that manages all
connections to the server. The thread simultaneously uses the select()
system call to wait for events on these connections.

Security Measures for Web Servers


Although there are many security strategies on the market that a user can
utilize to have a secure web server experience, the following list of security
practices includes some processes that can be used as security practices:

1. A reverse proxy is a proxy server that clients can access, hiding the
internal server. The proxy server intercepts all requests for data or files
made by users and then connects to the web server on their behalf. This
serves as an intermediary between users and the web server.

2. The use of Secure Socket Shell (SSH) or another method to restrict


access is a tactic used by web hosts;

3. Maintaining updated web servers to prevent exposures and keep the


web server safe;

4. Network monitoring is a security procedure that makes sure the web


server is not being used for any illegal purposes; and

5. The web server is protected by using a firewall and SSL since firewalls
can monitor HTTP request traffic, and SSL helps secure data.

Various Web Server Types


1. Apache
One of the most widely used web servers today, Apache Web Server, was
introduced in 1996 and is now maintained by the Apache Foundation. It's
free software. It is one of the best examples of a web server that can run on
several operating systems, including Linux, Windows, Mac, and others.

2. IIS
Internet Information Services, also known by its acronym IIS, is a
Microsoft-owned web server. IIS may be configured using a graphical user
interface and included in the Windows Server Operating System.

3. NGINX
In 2002, Igor Sysoev created NGINX. It serves as both a web server and a
proxy server. This indicates that it can coexist with another web server like
Apache. Its main duty is to manage multiple hundred connections at once.

4. Apache Tomcat
A free web server with a focus on Java Servlets is Apache Tomcat. A Java
container is commonly referred to as Apache Tomcat. It is compatible with
PHP, [Link], Perl, Python, and others and may operate under Port 8080.

5. Lighttpd
In 2003, lighttpd was created. This web server needs low memory, CPU, and
disk space. Lighttpd is the web server used by webcams, internet routers, &
other devices of a similar kind.

Static Web Server vs. Dynamic Web Server


Web servers can serve both static and dynamic content. Compared to
dynamic content, static content is displayed exactly as it is.

A computer and HTTP software are both components of a static web server.
The hosted files are transmitted unchanged from the server to the browser.

On the other hand, a dynamic web server has a computer and other
software, including a database and an application server. Before the hosted
files are transmitted to the browser, the application server can change them.
Whenever content is requested from the database, this web server may also
create it. Although it offers flexibility, this also makes the process more
difficult.

FTP
17 Mar 2025 | 3 min read

o FTP stands for File transfer protocol.


o FTP is a standard internet protocol provided by TCP/IP used for
transmitting the files from one host to another.
o It is mainly used for transferring the web page files from their creator
to the computer that acts as a server for other computers on the
internet.
o It is also used for downloading the files to computer from other
servers.
Objectives of FTP
o It provides the sharing of files.
o It is used to encourage the use of remote computers.
o It transfers the data more reliably and efficiently.

Why FTP?
Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems. For example, two
systems may have different file conventions. Two systems may have
different ways to represent text and data. Two systems may have different
directory structures. FTP protocol overcomes these problems by establishing
two connections between hosts. One connection is used for data transfer,
and another connection is used for the control connection.

Mechanism of FTP
The above figure shows the basic model of the FTP. The FTP client has three
components: the user interface, control process, and data transfer process.
The server has two components: the server control process and the server
data transfer process.

There are two types of connections in FTP:


o Control Connection: The control connection uses very simple rules
for communication. Through control connection, we can transfer a line
of command or line of response at a time. The control connection is
made between the control processes. The control connection remains
connected during the entire interactive FTP session.
o Data Connection: The Data Connection uses very complex rules as
data types may vary. The data connection is made between data
transfer processes. The data connection opens when a command
comes for transferring the files and closes when the file is transferred.

FTP Clients
o FTP client is a program that implements a file transfer protocol which
allows you to transfer files between two hosts on the internet.
o It allows a user to connect to a remote host and upload or download
the files.
o It has a set of commands that we can use to connect to a host, transfer
the files between you and your host and close the connection.
o The FTP program is also available as a built-in component in a Web
browser. This GUI based FTP client makes the file transfer very easy
and also does not require to remember the FTP commands.

Advantages of FTP:
o Speed: One of the biggest advantages of FTP is speed. The FTP is one
of the fastest way to transfer the files from one computer to another
computer.
o Efficient: It is more efficient as we do not need to complete all the
operations to get the entire file.
o Security: To access the FTP server, we need to login with the
username and password. Therefore, we can say that FTP is more
secure.
o Back & forth movement: FTP allows us to transfer the files back and
forth. Suppose you are a manager of the company, you send some
information to all the employees, and they all send information back on
the same server.

Disadvantages of FTP:
o The standard requirement of the industry is that all the FTP
transmissions should be encrypted. However, not all the FTP providers
are equal and not all the providers offer encryption. So, we will have to
look out for the FTP providers that provides encryption.
o FTP serves two operations, i.e., to send and receive large files on a
network. However, the size limit of the file is 2GB that can be sent. It
also doesn't allow you to run simultaneous transfers to multiple
receivers.
o Passwords and file contents are sent in clear text that allows unwanted
eavesdropping. So, it is quite possible that attackers can carry out the
brute force attack by trying to guess the FTP password.
o It is not compatible with every system.
Web publishing is the process of creating content and making it available to an
audience on the World Wide Web. It involves content creation, designing and building a
website or webpage, uploading the content to a web server, and providing a way for
people to find and access it, often through a domain name and web hosting. The goal is
to share information, promote a brand, or facilitate communication with a global
audience.

Key Steps in Web Publishing


1. 1. Content Creation:

Develop the digital content to be shared, such as text, images, videos, audio, and
other multimedia.
2. 2. Website/Webpage Design:

Design the website or webpage using web design software and a domain name (the
website's address).
3. 3. Web Hosting:

Obtain web hosting, which provides storage space on a web server to store the
website's files.
4. 4. Content Upload:

Transfer the created content to the web server using an internet connection.
5. 5. Publication & Access:
Make the website accessible to users on the internet, often by linking the domain
name to the server's IP address.
Components of Web Publishing
 Web Server:

A computer that stores website files and delivers them to visitors' browsers.

 Web Publishing Software:

Tools used to create and manage the website's content and structure.

 Internet Connection:
Required to upload content to the web server and for publishers and users to access
the site.

 Domain Name:
A human-readable address (e.g., [Link]) that directs users to a website's
server.

 Web Hosting:

Services that provide the server space and bandwidth needed to store and run a
website.

 Domain Name System (DNS):


Translates domain names into the numeric IP addresses of web servers, enabling
internet navigation.
Types of Web Publishing
 Personal Websites: Blogs and personal pages for individuals to share their thoughts
and work.

 Business Websites: Online platforms for companies to promote their brand, products,
and services.

 Community Websites: Online spaces for communities to share information and


interact.

 E-books and Blogs: Digitized forms of traditional publications shared online.


Space on a host server for a website, known as disk space or web space, is the storage
allocated to hold your site's content, including files, images, videos, and databases. The
amount of space needed varies greatly depending on the website's complexity, ranging
from a few gigabytes for a simple blog to much larger amounts for an e-commerce
site. You can select hosting plans that offer sufficient disk space, with smaller sites
starting with lower amounts and upgrading as the site grows.

What it stores
 Website files: HTML pages, CSS files, JavaScript, and other assets

 Images and Videos: All multimedia content that appears on your site

 Databases: Information for dynamic websites, such as product listings or user data

 Emails: In some hosting plans, disk space is also used to store emails
How to determine the right amount of space
1. Assess your content: Consider how many images, videos, and text pages your site
will have.

2. Understand your website type: A small business website needs far less space than a
large e-commerce platform with extensive product catalogs.

3. Start small and upgrade: Most hosting providers allow you to start with a smaller disk
space plan and upgrade your plan as your website's content grows.
How it works
 Storage:

Your hosting provider allocates a specific amount of storage (measured in Gigabytes


or GB) on their server's hard drive for your website.

 Sharing vs. dedicated:

In shared hosting, this space is divided among multiple users, while VPS and
dedicated hosting provide you with a fixed amount of space on your own server or a
portion of one.

 Performance:
Having enough disk space is critical for your website's performance; insufficient space
can lead to issues with data loss and a poor user experience.
Maintaining and updating" refers to the ongoing processes of ensuring something remains
functional, secure, and relevant over time, with maintenance focusing on keeping the system
running smoothly through tasks like bug fixes, performance checks, and security hardening, and
updating involving the addition of new features, content, or software versions to meet evolving
user needs or technological advancements. These processes are crucial for extending an
object's lifespan, improving user experience, and maintaining its competitiveness in the digital
world.

Maintenance Activities
 Bug Fixes and Error Correction:

Identifying and resolving issues or defects that hinder the system's performance.

 Performance Optimization:

Ensuring the system runs efficiently by checking for slow processes and implementing
improvements.

 Security Measures:

Implementing patches and updates to protect against new vulnerabilities and threats,
as well as performing regular security checks.

 Routine Inspections and Monitoring:

Regularly checking all components for wear, potential failure, and proper functioning.

 Backups and Restoration:

Creating copies of data to ensure recovery in case of system failures or data loss.

 Technical Adjustments:
Adapting the system to changes in hardware or the operating environment to ensure
continued compatibility.
Updating Activities
 Adding New Features:

Incorporating new functionalities to enhance the system's capabilities and user value.

 Content Refinement:

Updating website content with new data, statistics, keywords, or product information to
keep it relevant.

 Design Enhancements:

Refreshing the visual aspects of a website or app to align with current design trends
and user expectations.

 Compatibility Updates:
Ensuring the system works with other software, hardware, and services by installing
the latest versions.

 Performance Improvements:
Implementing changes that lead to faster speeds, increased stability, or better
performance.
Why They Matter
 Extended Lifespan:

Proper maintenance and updates prolong the useful life of a system or asset.

 Enhanced User Experience:


A well-maintained and updated system provides a smoother, more reliable, and
satisfying experience for users.

 Improved Security:

Updates include patches that fix vulnerabilities, protecting against cyberattacks and
data breaches.

 Sustained Compatibility:

Keeping systems updated ensures they remain compatible with other platforms,
software, and devices.

 Market Competitiveness:
For businesses, regular maintenance and updates help their websites and apps
remain competitive and relevant in a dynamic digital environment.

You might also like