SlideShare uma empresa Scribd logo
1 de 23
Introduction to
WEB SYSTEM
&
TECHNOLOGIES
PREPARED BY: MR. BERNIE S. ACDAL
Internet or World Wide Web
• Is there a difference? What is it?
How do we use the Internet?
The INTERNET
 The InterNet is short for INTERconnected NETwork.
 The Internet is a giant network of networks
 A network may include PCs, and other devices like servers
or printers
 A network is connected through a communication channel
3
2
1 >>
4 5
The INTERNET
 Early research was performed by the US Department of
Defense in 1962.
 This research group established ARPAnet (Advanced
Research Project Agency) in order to connect the US
Defense Department network
 The objective of the ARPAnet project was to investigate the
development of a decentralized computer network
3
2
1 >>
4 5
The INTERNET
 Original aim was to create a network that would allow users
of a research computer at one university to be able to ‘talk
to’ research computers at other universities.
 A side benefit of ARPAnet’s design was that, because
messages could be routed or rerouted in more than one
direction, the network could continue to function even if parts
of it were destroyed in the event of a military attack or other
disaster.
3
2
1 >>
4 5
The INTERNET
 In 1969, four computers clients were connected together via
ARPAnet.
 Leonard Kleinrock is accredited with the idea of packet
switching, which describes how data can be sent across a
network
 The ethernet was developed by Xerox during this period. This
was inspired by Robert Metcalfe’s PhD on ‘packet networks’.
 An ethernet is a protocol for describing how computers can be
connected in a LAN (Local Area Network)
3
2
1 >>
4 5
The INTERNET
 In 1973 Vint Cerf and Bob Kahn created the TCP/IP
communication protocols
 TCP/IP: Transfer Control Protocol/Internet Protocol is a set of
rules that describe how computers can communicate over a
network
 To send information over the Internet, a computer packs data
into Internet Protocol (IP) packets and labels them with the
correct address. They are then sent across a packet switched
interconnectednetwork.
3
2
1 >>
4 5
Internet Protocol Suite
 The Internet Protocol Suite includes a number of standard protocols. The two
most common are:
– Transmission Control Protocol (TCP)
– Internet Protocol (IP)
 A computer communication protocol is a description of the rules computers must
follow to communicate with each other.
 TCP/IP defines how electronic devices (like computers) should be connected to
the Internet, and how data should be transmitted between them.
 The TCP/IP protocol is embedded in TCP/IP software that is part of the operating
system (OS)
3
2
1 >>
4 5
TCP IP
 TCP handles communication between applications
– TCP uses a fixed connection.
– If one application wants to communicate with another via TCP, it sends a
communication request. This request must be sent to an exact address. After a
‘handshake’ between the applications a communication line opens.
 IP handles communication between computers
– IP is a connection-less protocol. With IP, messages are broken down into small
independent ‘packets’ and are sent between computers via the Internet. IP is responsible
for ‘routing’ each packet to its correct destination.
– Communicating via IP is like sending a long letter as a large number of small
postcards, each finding its own (often different) way to the receiver
3
2
1 >>
4 5
TCP IP
 TCP/IP is TCP and IP working together.
 TCP takes care of the communication between your application
software (your browser) and your network software - the handshake
 IP takes care of the communication with other computers - the postal
system which lets you address the package and put it into the post
 TCP is responsible for breaking data down into IP packets before
they are sent, and for assembling the packets when they arrive.
 IP is responsible for sending the packets to the correct destination.
Every computer has a IP address
>>
Who owns the Internet?
No person or organization owns the
entire Internet
As the Internet is a network of
networks, each network is owned by a
company.
This is similar to the motor-way and
road system. Each town or state owns
and maintains roads in its jurisdiction
The WORLD WIDE WEB
 The World Wide Web (WWW, W3 or The Web) is often confused with
the Internet
 The Web didn’t exist until the 1980s
 In 1989 Tim Berners-Lee created a set of technologies that allowed
information on the Internet to be linked together through the use of
links, or connections in documents
 The language used to write these documents with links is HTML
3
2
1 >>
4 5
The WORLD WIDE WEB
 The Web was mostly text based until Marc Andreessen created the
Mosaic browser in 1992
 Accredited for popularizing the WWW
 People started thinking about adding videos, sound, and graphics on
the Web.
 Now many people think of the Web as the graphical or illustrated part
of the Internet
3
2
1 >>
4 5
The Domain Names
 Names are easier to remember than a 12 digit (or longer!) number
 Some applications let you identify a computer or an IP network by
using a logical or domain name:
 – www.facebook.com is a domain name
 When you address a web site, like http:// www.facebook.com, the
name is translated to a number by a Domain Name Server (DNS)
 When a new domain is registered together with a TCP/ IP address,
DNS servers all over the world are updated with this information
3
2
1 >>
4 5
The Uniform Resource Locators (URL)
 A Uniform Resource Locator (URL) is used to address a
document on the Web.
 The name that corresponds to an IP address in the DNS is
known as a URL
 A full Web address is like:
– http://www.scss.tcd.ie/Owen.Conlan/php/xpath/index.html
 A URL usually follows these syntax rules:
– scheme://host.domain.country_code:port/path/filename
3
2
1 >>
4 5
The Uniform Resource Locators (URL)
 URL Codes
 For International use, the domains end in the country code
– .ie For Irish websites
– .fr French websites
– .co.uk United Kingdom
– .ph Philippines
3
2
1 >>
4 5
The Uniform Resource Locators (URL)
URL Codes
 – com Commercial institute or service provider
 – .me Personal website
 – .edu Educational institute
 – .gov Government
 – .org Nonprofit organization
 – .net Network Service Provider
 – .mil U.S. military
3
2
1 >>
4 5
Retrieving a URL
 HTTP (Hypertext Transfer Protocol) is used for sending
requests from a web client (a browser) to a web server,
returning web content (web pages) from the server back to
the client.
 The Web browser specifies the details of the required Web
page in a HTTP Request message
 The Web server receives this request and after processing it
completes the operation by returning either the document or
an error in the HTTP Response message
>>
The HTTP
 Hypertext Transfer Protocol
 HTTP takes care of the communication between a web
server and a web browser.
 HTTP is used for sending requests from a web client (a
browser) to a web server, returning web content (web pages)
from the server back to the client.
 Before the Web, the Internet protocol was FTP (File Transfer
Protocol)
 FTP was too slow, and HTTP was invented
The HTTP
 HTTP adopted the concept of hypertext links but its protocol
includes other methods
 There are four messages within this protocol
– Connection: Establishes a connection between the client
and the server
– Request: Asks for a resource
– Response: Delivers the resource
– Close: Terminates the connection
END;

Mais conteúdo relacionado

Mais procurados

Web browsers
Web browsersWeb browsers
Web browsers
learnt
 

Mais procurados (20)

WWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINEWWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINE
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
04 The Purpose of Straight-Through and Crossover Cables.pptx
04 The Purpose of Straight-Through and Crossover Cables.pptx04 The Purpose of Straight-Through and Crossover Cables.pptx
04 The Purpose of Straight-Through and Crossover Cables.pptx
 
Web Programming and Internet Technologies
Web Programming and Internet TechnologiesWeb Programming and Internet Technologies
Web Programming and Internet Technologies
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web system
 
World Wide Web (WWW)
World Wide Web (WWW)World Wide Web (WWW)
World Wide Web (WWW)
 
System Administration
System AdministrationSystem Administration
System Administration
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
History of internet
History of internetHistory of internet
History of internet
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
Principles of web design
Principles of web designPrinciples of web design
Principles of web design
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Introduction to flowchart
Introduction to flowchartIntroduction to flowchart
Introduction to flowchart
 
Browsers and search engines
Browsers and search enginesBrowsers and search engines
Browsers and search engines
 
History of Internet
History of InternetHistory of Internet
History of Internet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Web technology
Web technologyWeb technology
Web technology
 

Semelhante a WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx

The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
S S
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
IMRAN KHAN
 
How the internet works
How the internet worksHow the internet works
How the internet works
ftcim
 

Semelhante a WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx (20)

INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
basic web concepts.ppt
basic web concepts.pptbasic web concepts.ppt
basic web concepts.ppt
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
 
Networking
NetworkingNetworking
Networking
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Internet
InternetInternet
Internet
 
CIS 1203 Introduction to the Web
CIS 1203 Introduction to the WebCIS 1203 Introduction to the Web
CIS 1203 Introduction to the Web
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
How the internet works
How the internet worksHow the internet works
How the internet works
 

Último

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Último (20)

(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx

  • 2. Internet or World Wide Web • Is there a difference? What is it?
  • 3. How do we use the Internet?
  • 4. The INTERNET  The InterNet is short for INTERconnected NETwork.  The Internet is a giant network of networks  A network may include PCs, and other devices like servers or printers  A network is connected through a communication channel 3 2 1 >> 4 5
  • 5. The INTERNET  Early research was performed by the US Department of Defense in 1962.  This research group established ARPAnet (Advanced Research Project Agency) in order to connect the US Defense Department network  The objective of the ARPAnet project was to investigate the development of a decentralized computer network 3 2 1 >> 4 5
  • 6. The INTERNET  Original aim was to create a network that would allow users of a research computer at one university to be able to ‘talk to’ research computers at other universities.  A side benefit of ARPAnet’s design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster. 3 2 1 >> 4 5
  • 7. The INTERNET  In 1969, four computers clients were connected together via ARPAnet.  Leonard Kleinrock is accredited with the idea of packet switching, which describes how data can be sent across a network  The ethernet was developed by Xerox during this period. This was inspired by Robert Metcalfe’s PhD on ‘packet networks’.  An ethernet is a protocol for describing how computers can be connected in a LAN (Local Area Network) 3 2 1 >> 4 5
  • 8. The INTERNET  In 1973 Vint Cerf and Bob Kahn created the TCP/IP communication protocols  TCP/IP: Transfer Control Protocol/Internet Protocol is a set of rules that describe how computers can communicate over a network  To send information over the Internet, a computer packs data into Internet Protocol (IP) packets and labels them with the correct address. They are then sent across a packet switched interconnectednetwork. 3 2 1 >> 4 5
  • 9. Internet Protocol Suite  The Internet Protocol Suite includes a number of standard protocols. The two most common are: – Transmission Control Protocol (TCP) – Internet Protocol (IP)  A computer communication protocol is a description of the rules computers must follow to communicate with each other.  TCP/IP defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them.  The TCP/IP protocol is embedded in TCP/IP software that is part of the operating system (OS) 3 2 1 >> 4 5
  • 10. TCP IP  TCP handles communication between applications – TCP uses a fixed connection. – If one application wants to communicate with another via TCP, it sends a communication request. This request must be sent to an exact address. After a ‘handshake’ between the applications a communication line opens.  IP handles communication between computers – IP is a connection-less protocol. With IP, messages are broken down into small independent ‘packets’ and are sent between computers via the Internet. IP is responsible for ‘routing’ each packet to its correct destination. – Communicating via IP is like sending a long letter as a large number of small postcards, each finding its own (often different) way to the receiver 3 2 1 >> 4 5
  • 11. TCP IP  TCP/IP is TCP and IP working together.  TCP takes care of the communication between your application software (your browser) and your network software - the handshake  IP takes care of the communication with other computers - the postal system which lets you address the package and put it into the post  TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.  IP is responsible for sending the packets to the correct destination. Every computer has a IP address >>
  • 12. Who owns the Internet?
  • 13. No person or organization owns the entire Internet As the Internet is a network of networks, each network is owned by a company. This is similar to the motor-way and road system. Each town or state owns and maintains roads in its jurisdiction
  • 14. The WORLD WIDE WEB  The World Wide Web (WWW, W3 or The Web) is often confused with the Internet  The Web didn’t exist until the 1980s  In 1989 Tim Berners-Lee created a set of technologies that allowed information on the Internet to be linked together through the use of links, or connections in documents  The language used to write these documents with links is HTML 3 2 1 >> 4 5
  • 15. The WORLD WIDE WEB  The Web was mostly text based until Marc Andreessen created the Mosaic browser in 1992  Accredited for popularizing the WWW  People started thinking about adding videos, sound, and graphics on the Web.  Now many people think of the Web as the graphical or illustrated part of the Internet 3 2 1 >> 4 5
  • 16. The Domain Names  Names are easier to remember than a 12 digit (or longer!) number  Some applications let you identify a computer or an IP network by using a logical or domain name:  – www.facebook.com is a domain name  When you address a web site, like http:// www.facebook.com, the name is translated to a number by a Domain Name Server (DNS)  When a new domain is registered together with a TCP/ IP address, DNS servers all over the world are updated with this information 3 2 1 >> 4 5
  • 17. The Uniform Resource Locators (URL)  A Uniform Resource Locator (URL) is used to address a document on the Web.  The name that corresponds to an IP address in the DNS is known as a URL  A full Web address is like: – http://www.scss.tcd.ie/Owen.Conlan/php/xpath/index.html  A URL usually follows these syntax rules: – scheme://host.domain.country_code:port/path/filename 3 2 1 >> 4 5
  • 18. The Uniform Resource Locators (URL)  URL Codes  For International use, the domains end in the country code – .ie For Irish websites – .fr French websites – .co.uk United Kingdom – .ph Philippines 3 2 1 >> 4 5
  • 19. The Uniform Resource Locators (URL) URL Codes  – com Commercial institute or service provider  – .me Personal website  – .edu Educational institute  – .gov Government  – .org Nonprofit organization  – .net Network Service Provider  – .mil U.S. military 3 2 1 >> 4 5
  • 20. Retrieving a URL  HTTP (Hypertext Transfer Protocol) is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.  The Web browser specifies the details of the required Web page in a HTTP Request message  The Web server receives this request and after processing it completes the operation by returning either the document or an error in the HTTP Response message >>
  • 21. The HTTP  Hypertext Transfer Protocol  HTTP takes care of the communication between a web server and a web browser.  HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.  Before the Web, the Internet protocol was FTP (File Transfer Protocol)  FTP was too slow, and HTTP was invented
  • 22. The HTTP  HTTP adopted the concept of hypertext links but its protocol includes other methods  There are four messages within this protocol – Connection: Establishes a connection between the client and the server – Request: Asks for a resource – Response: Delivers the resource – Close: Terminates the connection
  • 23. END;