Web Page Accessibility Across Devices
Web Page Accessibility Across Devices
WWW definition
Introduction
The World Wide Web (WWW), also known as the Web, is an interconnected
network of web pages and documents accessible through the Internet. Tim
Berners-Lee created it in 1989 as a way for researchers to share information
through linked documents.
The Web has since grown into a vast network of information, entertainment,
commerce, and communication accessible to anyone with an internet
connection.
Web browsers communicate with web servers using the HTTP or HTTPS
protocol, which allows users to access websites hosted on remote servers.
They also support web technologies such as HTML, CSS, JavaScript, and
multimedia content such as images, audio, and video.
2. web server: A web server is a computer program that serves web pages
to clients, such as web browsers, upon request. It is responsible for hosting
websites, processing HTTP requests, and delivering web content to users
online.
When a user types a website address into a web browser, the browser sends
a request to the web server hosting that website. The web server then
retrieves the requested resources, such as HTML files, images, and videos,
and sends them back to the user's browser, which renders them into a
viewable web page.
3. Hyperlinks: One of the key features of the Web is hyperlinks, which allow
you to navigate between web pages by clicking on links. Hyperlinks are
created using the HTML <a> tag and can link to other web pages, files, or
even specific parts of a page.
Today, the World Wide Web continues to evolve and expand, constantly
developing new technologies and applications. It has revolutionized how we
access and share information, connect with others, and conduct business. Its
impact on society and the economy will likely continue for many years.
HTTP request methods include GET, POST, PUT, DELETE, and others, which
specify the type of request being made and the data being sent or retrieved.
Response status codes include 200 OK, 404 Not Found, 500 Internal Server
Error, and others, which indicate the request's status and whether it was
successful.
In recent years, HTTP has been evolving to address new challenges and
technologies, such as the need for faster and more secure communication.
For example, the latest version of HTTP, HTTP/3, uses a new transport
protocol called QUIC, designed to improve web communication's
performance and reliability. HTTP is a critical component of the World Wide
Web, enabling fast, efficient, and scalable communication between web
clients and servers.
2. Web browser
A web browser is a software application used to access and view web pages
and other resources on the World Wide Web. It is the primary way users
interact with the Web, allowing them to navigate between websites, search
for information, and consume various media types.
Web browsers communicate with web servers, which host the web pages and
resources that users request. When a user enters a web address (URL) into
the browser's address bar, the browser sends an HTTP request to the web
server, which responds with the requested resource, such as a web page,
image, or video.
Web browsers use a rendering engine to interpret and display web content,
usually written in HTML, CSS, and JavaScript. The rendering engine reads the
HTML code, applies the CSS styling, and executes the JavaScript code, to
create the visual and interactive elements of the web page.
Web browsers also provide a range of other features and functionalities, such
as bookmarks, history, tabbed browsing, extensions, and plugins. These
features allow users to personalize and enhance their browsing experience,
enabling developers to create rich and interactive web applications.
Many different web browsers are available, including popular ones like
Google Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge. Each
browser has its unique features, user interface, and performance
characteristics, and users often choose a browser based on their personal
preferences and needs.
Overall, web browsers are a critical component of the World Wide Web,
enabling users to access and interact with the vast web pages and resources
available on the Internet.
Web browsers use the HTML code to interpret and display the content of web
pages, using a rendering engine to apply the CSS styling and execute the
JavaScript code. This process creates the visual and interactive elements of
the web page, such as text, images, buttons, and forms.
HTML is designed to be easy to learn and use and can be written using a
simple text editor or a more advanced integrated development environment
(IDE). HTML code can also be generated using content management systems
(CMS) and website builders, which provide a visual interface for creating and
editing web pages.
The latest version of HTML, HTML5, introduces new elements and features
that make it easier to create complex and interactive web pages and
applications. These features include support for multimedia, semantic
markup, responsive design, and more. Overall, HTML is a critical component
of the World Wide Web, providing the structure and content that underpins
the vast web pages and resources available on the Internet.
Web pages and websites transmitted via the Hypertext Transfer Protocol
(HTTP) are converted into content humans can view using browsers. They
can also display additional protocols and prefixes, such as secure 'HTTP'
(HTTPS), 'File Transfer Protocol' (FTP), 'email handling', and files (file:).
Additionally, most browsers accept third-party plug-ins to show dynamic
material such as embedded video, audio, and game content.
However, not every browser developer opts to interpret the format in the
same way. This implies to users that a website may have a varied
appearance and functionality. Web standards aim to provide uniformity
among browsers so that users can utilize and enjoy the internet.
When a web browser requests data from a server connected to the internet,
it converts that data into images and text using a program known as a
rendering engine. Web browsers read the Hypertext Markup Language
(HTML) code contained in this data to produce the images, sounds, and
experiences of the internet.
Users can navigate to other online pages or sites via hyperlinks. Every
image, video, and webpage has a distinct Universal Resource Locator (URL),
commonly called a web address. When a browser requests data from a
server, the web address instructs the browser where to look for each item
described in the HTML, instructing the browser where it should appear on the
web page.
Several web browser examples and their unique features are covered below:
1. Google Chrome
The most widely used browser in the USA is Chrome, developed by internet
giant "Google" and regarded as quick, safe, and dependable by PC and
smartphone users. The Chrome Store offers various customization options in
the form of helpful extensions and apps that may be downloaded without
charge.
2. Apple Safari
On Apple phones, laptops, and other Apple devices, Safari is the default
browser. It is typically regarded as a reliable browser, and Apple's ethos is
reflected in its sleek appearance. Due to the dominance of iPhones and
iPads, Safari, initially designed for Macs, has grown to dominate the mobile
industry.
4. Mozilla Firefox
Firefox is an open-source browser developed by members of the Mozilla
Foundation's community, in contrast to Chrome, Safari, Internet Explorer,
and Microsoft Edge. With a wide variety of available add-ons and extensions,
it may be the most individualized of the major browsers.
It had a user share of 32.21% as of the end of 2003 before steadily slipping
behind Google Chrome's influence. It still competes fiercely in the "desktop"
market but has a smaller market share on mobile devices, where Google
Chrome and Apple Safari are more popular.
5. Opera
Opera, made for Microsoft Windows, Android, iOS, macOS, and Linux
operating systems, is another web browser worth mentioning. It includes a
few unique characteristics and is usually considered a solid choice by many
people. Many of its original features have since been added to competing
browsers. Also, it offers a unique user interface. Opera has a usage rate of
only 2.28% as of this writing, yet it is nonetheless influential, if not widely.
In addition, the Opera Mini web browser, created especially for mobile users,
was released in 2005. Opera, the PC version, published in 1995 before the
mobile version, was created by Opera Software and supported an exemplary
user interface.
1. User Interface
When you launch a web browser, the first page you view is the user
interface. The address bar, forward/backward button, menu, bookmarking
option, and a few other options are all present on this page.
2. Browser Engine
The browser engine connects the rendering engine and the browser's user
interface. It adjusted the rendering engine to provide an output based on the
input.
The production of required content for the browser and its display on the
screen is the responsibility of the rendering engine. The HTML documents
are parsed before being converted to a usable form. Every browser that we
are aware of has a different rendering engine.
4. Networking
5. UI Backend
It is used to draw simple boxes, windows, and widgets. This is for a general-
purpose interface and is not platform-specific. Underneath all of this, UI
techniques are handled by an operating system.
6. JavaScript Interpreter
JavaScript powers all websites and web pages. These pages were all written
in JavaScript. The rendering engine uses the pages that the interpreter has
translated to display the finished product.
7. Data persistence
User data is managed in the same way as cookies, cache, and bookmarks
are.
1. Home button - The "Home" button returns the user to the browser's
home page with only one click. Any website can be made the default
home page. Most of the time, consumers favor having search engines
like [Link] as their home page.
2. Address bar - The URL of the desired website is in the address bar.
This navigation bar aids us in finding the website of our choosing.
3. Refresh button - Refreshing the page reloads it. Sometimes, the
page locally saves and stores the data, and users cannot view the
updated information. The refresh button is, therefore, useful in these
circumstances.
4. Bookmarks- With this feature, you can save a certain website for later
use. It highlights web pages that could one day be significant or
helpful.
5. Tabbed browsing - This function lets many tabs open simultaneously
in the same browser.
Archie was the first Internet search engine to look up content (as opposed to
the users). The name is an acronym for "archive" (without the "v"). It was
founded by Alan Emtage, a computer science student at McGill University in
Montreal, Quebec, Canada. The Archie Search Engine did not index the
contents of these sites because the amount of data was so small that it could
be easily searched manually. Instead, the program downloaded the directory
listings of all the files found on public anonymous FTP (File Transfer Protocol)
sites, producing a searchable database of file names.
In 1998, Google bought the concept of selling search phrases from a start-up
called [Link]. The search engine industry was significantly impacted by
this shift going from a struggling company to one of the most productive
ones on the Internet. In the late 1990s Internet investing frenzy, search
engines were likewise regarded as some of the brightest stars. Several
businesses had stunning market entrances and saw record-breaking gains
during their IPOs. Some have stopped selling enterprise-only editions of their
public search engines like Northern Light. The dot-com bubble, a speculator-
driven market boom that peaked in March 2000 which affected many search
engine companies.
Efficiency
Search engines allow instant access to critical information by saving
consumers time and effort in locating what they search for.
Accessibility
Search engines make information available to people worldwide regardless
of their location or level of knowledge.
Relevance
Search engines are constantly improving their algorithms to provide more
precise and appropriate search results by helping users to get the
information they need faster.
Business Growth
Search engines significantly drive website traffic which is critical for
businesses looking to expand their online presence and customer base.
Research
Researchers, scientists, and students benefit from search engines because
they enable access to scholarly journals, research papers and other
academic resources.
Crawling
Crawling is the first step in discovering new web pages on the Internet. All
search engines use web crawlers or spider bots to follow links to new web
pages in the known ones. They gather data by crawling from site to site.
After gathering the data, it is indexed. While indexing is taking place, the
spider continues to discover new pages. The spider stops crawling when a
specified period has passed or based on the amount of data obtained.
Indexing
Once the data has been crawled, it is sent for indexing which saves data on
the search engine's database stated as the index. The index's job is to find
information linked to the query as quickly as possible. This procedure can be
completed quickly by using any of the following steps:
o The stop words are being removed.
o Links to other pages are listed.
o Providing details about images or embedded media on the page.
To appear in search results any website must be indexed. When a query is
entered, the index results are sometimes returned rapidly because it has
previously saved a few internet links containing the keywords.
Ranking
The last step is to rank the outcomes on the SERP. The search engines have
their criteria for listing search results. These signals or criteria should be
visible to the general public. The ranking algorithm determines the order of
the web links on the results page. One of the most frequently asked
questions is if all search engines produce the same results and the answer is
only sometimes. Each search engine has an algorithm that it uses to do web
searches. These searches are also influenced by criteria such as your
location, what other people preferred for the exact phrase, your previous
searches and so on. As a result, different search engines produce different
results.
Yahoo
Yahoo used to be one of the most popular websites to visit. It is exclusively
given by Bing. It is also the default setting for Firefox users in the United
States.
Baidu
This is a well-known engine in China. Despite its low popularity, Alexa reports
its market share is growing globally. It is available worldwide but only in
Chinese.
Yandex
[Link] is a well-known search engine in Russia, Ukraine, and Turkey. It
gets its name derived from Yet Another Indexer. It accounts for less than 1%
of the overall search engine market.
DuckDuckGo
This unpopular search engine accounts for approximately 0.45 percent of the
market. Small search engines such as Bing and Yahoo are also competitors.
Unlike most search engines, it does not maintain its own search index and
instead relies on several sources. In other words, it lacks its own data and
relies on third-party sites such as Yahoo, Bing, and others. But what
distinguishes it from the rest is that it is considerably cleaner and free of junk
advertisements.
What is Downloading?
Downloading is the process by which any electronic gadget or computer
system obtains information from other network sources or the internet. The
downloading process is similar to saving data. The data is really stored on
another system before being delivered and stored on your system, which is
known as data downloading. Some examples of downloading are
downloading images, files, songs, movies, etc.
HTTPS Definition
17 Mar 2025 | 8 min read
Introduction
HTTPS is a protection-enhanced version of the Hypertext Transfer Protocol
(HTTP), an application protocol for all kinds of communication on the web.
HTTP facilitates the retrieval of web pages. HTTPS, or HTTP Secure,
accomplishes the same function but more securely. HTTPS works by focusing
on secure search so that unauthorized users cannot obtain the information
they are not allowed to have. In December 2019, Google released
information about its latest HTTPS update.
Data Integrity
Files, photos, or web pages are subject to manipulation by third-party
individuals if not properly secured. A website can utilize the digital signature
from the original sender provided through HTTPS to verify the authenticity of
each document sent through the server. It is possible to examine the
document's contents, including its digital certificate, to ensure there hasn't
been any data loss during transmission.
What is HTTPS?
o HTTP: HyperText Transfer Protocol
o HTTPS: HyperText Transfer Protocol Secure
However, HTTPS is crucial for websites that send sensitive information, such
as e-commerce sites where customers enter payment information like credit
card numbers, billing addresses, and phone numbers. TLS, formerly known
as Secure Sockets Layer (SSL), is a protocol that works with HTTPS to encrypt
sensitive data, safeguard against information loss or tampering during
transfer, and authenticate specific users to communicate with the website.
Email, e-commerce, and other sensitive data transfers were the initial uses
for HTTPS. It is now considered the industry standard for all websites, is
supported by Google, and is necessary for many cutting-edge features,
including advanced web applications.
Importance of HTTPS
Using HTTPS is a must for any website dealing with secure information.
However, HTTPS can still be useful for websites that don't deal with sensitive
data. Google has been one of the leading supporters of HTTPS's universal
application in secure search.
Although HTTPS offers an extra layer of security for the data transmitted to
and from a website, it is not intended to act as a firewall for the site. The
SSL/TLS encryption protects the data transfer, but you should implement
additional security measures to secure the other information on your
website.
A hacker may attempt to create a fake version of your site since it has a
secure SSL/TLS certificate. Still, users will be immediately made aware of the
security violation. The strongest defense against DNS spoofing is setting up
HSTS with HTTPS.
Data is passed from a user to the website, and HTTPS secures the reverse.
The sensitive data exchanged across websites today require this protection,
but it only safeguards that communication channel.
A VPN, on the other hand, protects your whole system while shielding your
identity and surfing history. You can provide a second layer of security for
every user on your network by using HTTPS and a VPN provider.
Advantages of HTTPS
HTTPS provides multiple benefits over HTTP connections:
o HTTP is quick due to its simplicity but lacks security when exchanging
data. This is because none of the data is encrypted and is instead
transferred in plain text.
o Anyone with the appropriate equipment, understanding, and insight
between the server and the browser can easily view and obtain the
transmitted information because the hypertext data is divided into
'packets' during the transfer.
o As a result, there is a high possibility that attackers will gain access to
usernames, passwords, and other sensitive information.
o This indicates that HTTP is not a private or secure medium, making
users uneasy.
o Although HTTP is secure for some websites, such as blogs, it is not a
secure method to transmit sensitive data, such as credit card numbers.
How to switch from HTTP to HTTPS?
Transform from HTTP to HTTPS in 7 stages:
TLS protects against attacks and has three key objectives: privacy,
authentication, and general security. An asymmetric key algorithm known as
The Public Key Infrastructure, or PKI, is used by TLS to secure
communications. This system utilizes two uniquely corresponding keys to
encrypt and decrypt important data, allowing secure communication across
the Internet.
TLS connects the sender and recipient by combining the two keys. It ensures
that both parties are recognized and are who they claim to be.
o First, you have the public key. It can be shared with anyone who
wishes to communicate with the site and is accessible to the general
public.
o This key serves as a lock to encrypt the data and is used to convert
plain text into cipher text. Additionally, it confirms the private key's
owner. Certificates are used to distribute public keys to browsers.
o Then, each public key has a private key, which functions as a pair. This
key is used to decrypt data. Only the associated unique private key
can be used to decrypt data that has been encrypted with a public key.
o The lock is opened, and the data is decrypted using this private key. A
private key also verifies the ownership of the data. Only the owner can
access this key, which is kept secure and stored.
o A secure connection is established, and the certificates are transferred
before any real data is transferred.
o The customer types in the page URL they want to access. The web
page's server transmits the TLS or SSL certificate with the public key to
establish the connection. The server and client undergo much back
and forth (called a TLS/SSL handshake) until they establish a secure
session.
URL Definition
17 Mar 2025 | 9 min read
A URL is a special identifier that can be used to find a site online. Uniform
Resource Locator is the full form of URL. It is additionally known as a web
address. URLs comprise several components, including a protocol and a
domain name. A URL tells a web browser how and from where to retrieve a
resource.
End users can access the site by putting the URL into the address bar of their
browsers or by clicking a hyperlink. Owners of websites can change their
URLs. A carefully constructed URL can be an effective tool for enhancing user
experience, which can boost search engine optimization (SEO) performance.
Syntax of URL:
scheme://[Link]: port/path/filename
Example:
[Link]
1. Scheme
All URLs start with the scheme. The scheme specifies the protocol to access
the resource on the internet. The scheme denotes the protocol that the
browser utilizes to request the resource. The most popular URL scheme
are listed below.
1. HTTP: HTTP is used to send data across the internet. Browsers use it
to exchange messages with web servers to access web pages. When
the input URL starts with "http" in the address bar, the web browser
sends a request to the server that utilizes HTTP protocol. HTTP is a
stateless protocol that does not keep a constant connection between
the client and the server. Each request and response are handled as
separate transactions.
2. HTTPS: A secure variant of the HTTP protocol is HTTPS. It is frequently
utilized to access websites that contain private data. Your web browser
creates a secure connection with the server using the SSL / TLS
protocol whenever you input a URL that starts with "https" in the
address bar.
3. FTP: FTP is used for online file transfers. It is frequently used to upload
and receive files from a server. A subdomain establishes a unique site
entity that enables using a different website style and content
organization. The FTP client creates a connection to the server and
enables you to browse its files and directories and upload and
download files.
4. Mailto: The "mailto" URL scheme is utilized to make a link that opens
the default email client and generates a new email message with the
"To" field. After that, the user can add a subject and message in the
body and send the email as usual.
5. Tel: The "tel" URL scheme generates a link to place a call. The phone
number is formatted per the E.164 specification, including the nation
code, area code, and local numbers.
6. Sms: The "sms" URL scheme generates a link to send a text message.
The format for SMS URLs is "[Link] where <phone> is an
optional parameter that specifies the destination phone number of the
SMS message.
7. Skype: The "Skype" URL scheme is utilized to generate a Skype
conversation link.
2. Subdomains
Any words or phrases before the first dot in a URL are called subdomains.
Subdomains are excellent for organizing information on the site to improve
the user experience. The most widely used subdomain is www. Subdomains
help to manage your website. Subdomains allow users to locate and access
content more rapidly. Most websites have a responsive layout for different
platforms, but you can also add a mobile-specific website with a subdomain.
3. Domain
The domain is the name of a website. It is a symbolic word connected to an
IP address. Users enter a domain name into their browser's address bar to
access a website. The domain name is a different or special name for
recognizing the website. Domain names come after the (@) in email
addresses and after the (www.) in web addresses.
Many domain names are available, some are generic (com, edu, gov, net,
etc.), and others are country-level (au, in, za, us, etc.).
The generic top-level domain names are listed in the chart below:
3. Edu Education
The top-level domains for every nation are listed in the chart below:
1. za South Africa
2. in India
3. de Germany
4. fr France
5. us United States
6. uk United Kingdom
7. cl Chile
8. jp Japan
9. au Australia
10. ca Canada
11. es Spain
12. ee Estonia
2. Continue to Checkout
You need to select the registration period in this step. Usually, registrars
require a minimum of one year period. Some registrars provide up to ten
years of registration time.
Once the payment has been approved, the registrar will ask you to complete
a setup form with details such as your name, email address, home address,
and phone number.
After completing the registration procedure, you will receive the verification
link in the email. You can submit a request from the control panel if you do
not receive the verification link.
4. TLD
The part of a website name that comes after the dot is known as a top-level
domain (TLD).
5. Port Number
The port is a reserved channel that is utilised for particular purposes.
Different servers will utilise various ports. The resources on the server
are accessible by browsers only when they are connected to a specific port.
The default port for HTTP servers is 80.
6. Path
It is frequently referred to as the website's folder structure. The path
indicates which directory on the server contains the requested resources
(files, movies, audio, etc.). A web server can direct users to a particular
location by using the path to the resource.
7. Query
The query is found in dynamic web pages' URLs. The query comprises a
question mark and then a list of parameters.
8. Parameter
A parameter is a query string or a variable in a URL. They are part of a URL
that comes after the question mark. Keys and values in parameters are
separated by the equal symbol (=). Ampersands (&) symbol is used to
separate many parameters.
9. Fragment
The fragment is the last part of a URL. The fragment is an optional element
of a web URL that begins with the hash (#) symbol, which refers to a
secondary resource. The secondary resource is the website section is like a
footer or a sidebar.
Types of URL
1. Absolute URL
Syntax: protocol://domain/path
2. Relative URL
The relative URL only includes the path and not the domain name. Relative
refers to "in relation to," so a relative URL describes a location in terms of
the present location. A relative path refers to an internal connection to a file
within the same domain.
3. Canonical URL
A canonical URL aids web crawlers and search engines figure out which
version of a web page should be indexed and shown in search engine results.
It is crucial because it aids in avoiding problems with duplicate content that
might negatively impact a website's search engine visibility. It also helps to
ensure the most important web page version is indexed and shown in SERPs.
4. Callback URL
5. Vanity URL
Vanity URLs are also referred to as custom short URLs. A vanity URL is a one-
of-a-kind web address that has been customized for marketing uses. Vanity
URLs make it easier for visitors to recall and locate a particular website page.
Vanity URLs should be simple to recall, use, and share. Owners of websites
can create a vanity URL using a website url shortener utility like Bitly,
[Link], or TinyURL.
Its main function is to provide each user who wants it with access to a
website's content. Data is stored, processed, and delivered during this
process.
2. A web server has server software that may be accessed via website
domain names. It ensures that website content is available and regulates
how web users access files. An HTTP server is one of the parts that make up
the web server.
Any web browser, including Google Chrome, Microsoft Edge, and Firefox, will
use HTTP to move the request ahead whenever it requests a web page
hosted on a web server. The HTTP server will accept the request once it is
received at the server end, start searching for the required data
immediately, and then send it back to the web browser through HTTP.
Let's examine the sequential steps when a web browser approaches a web
server to request a web file or file. As you do the following:
1. Any web user must first enter the website's URL in the address bar of their
web browser.
2. Using the URL, your web browser will look up the IP address associated
with your domain name by translating the URL using the DNS (Domain Name
System) or searching cache memory. Your browser will be directed to the
web server by the IP address.
3. After establishing the connection, the web browser will use an HTTP
request to ask the web server for the webpage.
4. The web server swiftly responds by providing the requested page or file
back to the web browser after receiving this request.
5. The web server will provide an error message if the web page the browser
requested does not exist or if a processing problem occurs.
6. If there are no errors, the browser will show the webpage correctly.
Architecture
The two methods that Web Server Architecture employs are as follows:
1. Concurrent Approach
1. Concurrent Approach
The web server may process several client requests simultaneously with the
help of the concurrent technique. It can be done using the following
techniques:
o Multi-process
o Multi-threaded
o Hybrid method
Multi-Processing
The parent process starts several single-threaded child processes,
distributing incoming requests to the child processes. Each child process is in
charge of dealing with a single request.
The parent process monitors the load and chooses whether to kill or fork
processes.
Multi-threaded
It generates numerous single-threaded processes as compared to Multi-
process.
Hybrid
It combines the two methods described previously. This method creates
numerous processes, each of which starts several threads. Each thread
handles one connection. Less stress is placed on the system's resources
when numerous threads are active in a single process.
1. A reverse proxy is a proxy server that clients can access, hiding the
internal server. The proxy server intercepts all requests for data or files
made by users and then connects to the web server on their behalf. This
serves as an intermediary between users and the web server.
5. The web server is protected by using a firewall and SSL since firewalls
can monitor HTTP request traffic, and SSL helps secure data.
2. IIS
Internet Information Services, also known by its acronym IIS, is a
Microsoft-owned web server. IIS may be configured using a graphical user
interface and included in the Windows Server Operating System.
3. NGINX
In 2002, Igor Sysoev created NGINX. It serves as both a web server and a
proxy server. This indicates that it can coexist with another web server like
Apache. Its main duty is to manage multiple hundred connections at once.
4. Apache Tomcat
A free web server with a focus on Java Servlets is Apache Tomcat. A Java
container is commonly referred to as Apache Tomcat. It is compatible with
PHP, [Link], Perl, Python, and others and may operate under Port 8080.
5. Lighttpd
In 2003, lighttpd was created. This web server needs low memory, CPU, and
disk space. Lighttpd is the web server used by webcams, internet routers, &
other devices of a similar kind.
A computer and HTTP software are both components of a static web server.
The hosted files are transmitted unchanged from the server to the browser.
On the other hand, a dynamic web server has a computer and other
software, including a database and an application server. Before the hosted
files are transmitted to the browser, the application server can change them.
Whenever content is requested from the database, this web server may also
create it. Although it offers flexibility, this also makes the process more
difficult.
FTP
17 Mar 2025 | 3 min read
Why FTP?
Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems. For example, two
systems may have different file conventions. Two systems may have
different ways to represent text and data. Two systems may have different
directory structures. FTP protocol overcomes these problems by establishing
two connections between hosts. One connection is used for data transfer,
and another connection is used for the control connection.
Mechanism of FTP
The above figure shows the basic model of the FTP. The FTP client has three
components: the user interface, control process, and data transfer process.
The server has two components: the server control process and the server
data transfer process.
FTP Clients
o FTP client is a program that implements a file transfer protocol which
allows you to transfer files between two hosts on the internet.
o It allows a user to connect to a remote host and upload or download
the files.
o It has a set of commands that we can use to connect to a host, transfer
the files between you and your host and close the connection.
o The FTP program is also available as a built-in component in a Web
browser. This GUI based FTP client makes the file transfer very easy
and also does not require to remember the FTP commands.
Advantages of FTP:
o Speed: One of the biggest advantages of FTP is speed. The FTP is one
of the fastest way to transfer the files from one computer to another
computer.
o Efficient: It is more efficient as we do not need to complete all the
operations to get the entire file.
o Security: To access the FTP server, we need to login with the
username and password. Therefore, we can say that FTP is more
secure.
o Back & forth movement: FTP allows us to transfer the files back and
forth. Suppose you are a manager of the company, you send some
information to all the employees, and they all send information back on
the same server.
Disadvantages of FTP:
o The standard requirement of the industry is that all the FTP
transmissions should be encrypted. However, not all the FTP providers
are equal and not all the providers offer encryption. So, we will have to
look out for the FTP providers that provides encryption.
o FTP serves two operations, i.e., to send and receive large files on a
network. However, the size limit of the file is 2GB that can be sent. It
also doesn't allow you to run simultaneous transfers to multiple
receivers.
o Passwords and file contents are sent in clear text that allows unwanted
eavesdropping. So, it is quite possible that attackers can carry out the
brute force attack by trying to guess the FTP password.
o It is not compatible with every system.
Web publishing is the process of creating content and making it available to an
audience on the World Wide Web. It involves content creation, designing and building a
website or webpage, uploading the content to a web server, and providing a way for
people to find and access it, often through a domain name and web hosting. The goal is
to share information, promote a brand, or facilitate communication with a global
audience.
Develop the digital content to be shared, such as text, images, videos, audio, and
other multimedia.
2. 2. Website/Webpage Design:
Design the website or webpage using web design software and a domain name (the
website's address).
3. 3. Web Hosting:
Obtain web hosting, which provides storage space on a web server to store the
website's files.
4. 4. Content Upload:
Transfer the created content to the web server using an internet connection.
5. 5. Publication & Access:
Make the website accessible to users on the internet, often by linking the domain
name to the server's IP address.
Components of Web Publishing
Web Server:
A computer that stores website files and delivers them to visitors' browsers.
Tools used to create and manage the website's content and structure.
Internet Connection:
Required to upload content to the web server and for publishers and users to access
the site.
Domain Name:
A human-readable address (e.g., [Link]) that directs users to a website's
server.
Web Hosting:
Services that provide the server space and bandwidth needed to store and run a
website.
Business Websites: Online platforms for companies to promote their brand, products,
and services.
What it stores
Website files: HTML pages, CSS files, JavaScript, and other assets
Images and Videos: All multimedia content that appears on your site
Databases: Information for dynamic websites, such as product listings or user data
Emails: In some hosting plans, disk space is also used to store emails
How to determine the right amount of space
1. Assess your content: Consider how many images, videos, and text pages your site
will have.
2. Understand your website type: A small business website needs far less space than a
large e-commerce platform with extensive product catalogs.
3. Start small and upgrade: Most hosting providers allow you to start with a smaller disk
space plan and upgrade your plan as your website's content grows.
How it works
Storage:
In shared hosting, this space is divided among multiple users, while VPS and
dedicated hosting provide you with a fixed amount of space on your own server or a
portion of one.
Performance:
Having enough disk space is critical for your website's performance; insufficient space
can lead to issues with data loss and a poor user experience.
Maintaining and updating" refers to the ongoing processes of ensuring something remains
functional, secure, and relevant over time, with maintenance focusing on keeping the system
running smoothly through tasks like bug fixes, performance checks, and security hardening, and
updating involving the addition of new features, content, or software versions to meet evolving
user needs or technological advancements. These processes are crucial for extending an
object's lifespan, improving user experience, and maintaining its competitiveness in the digital
world.
Maintenance Activities
Bug Fixes and Error Correction:
Identifying and resolving issues or defects that hinder the system's performance.
Performance Optimization:
Ensuring the system runs efficiently by checking for slow processes and implementing
improvements.
Security Measures:
Implementing patches and updates to protect against new vulnerabilities and threats,
as well as performing regular security checks.
Regularly checking all components for wear, potential failure, and proper functioning.
Creating copies of data to ensure recovery in case of system failures or data loss.
Technical Adjustments:
Adapting the system to changes in hardware or the operating environment to ensure
continued compatibility.
Updating Activities
Adding New Features:
Incorporating new functionalities to enhance the system's capabilities and user value.
Content Refinement:
Updating website content with new data, statistics, keywords, or product information to
keep it relevant.
Design Enhancements:
Refreshing the visual aspects of a website or app to align with current design trends
and user expectations.
Compatibility Updates:
Ensuring the system works with other software, hardware, and services by installing
the latest versions.
Performance Improvements:
Implementing changes that lead to faster speeds, increased stability, or better
performance.
Why They Matter
Extended Lifespan:
Proper maintenance and updates prolong the useful life of a system or asset.
Improved Security:
Updates include patches that fix vulnerabilities, protecting against cyberattacks and
data breaches.
Sustained Compatibility:
Keeping systems updated ensures they remain compatible with other platforms,
software, and devices.
Market Competitiveness:
For businesses, regular maintenance and updates help their websites and apps
remain competitive and relevant in a dynamic digital environment.