Академический Документы
Профессиональный Документы
Культура Документы
INTERNET PRINCIPLES
TCP/IP UDP
SITE TYPES
Public web sites: A web site is one that is not explicitely restricted to a particular class of users Intranet websites: An intranet website is a site that is private to a particular organization generally run with a private network rather than on the internet at large Extranet websites: An external web sites is a website that is available to a limited class of users, but is available via the public internet.
DESIGN CONSIDERATION:
(i)
Grouping by interactivity: Static sites: a static site is a one where content is relatively fixed and users are unable to add effect the look or scope of the data.
Interactive sites: some sites are commonly related sites that allow the users to modify the content such sites are called as interactive sites.
(ii) Grouping by size: Very small site Small site Mid-size site Large site Very large site (iv) Grouping by purpose: Commercial sites: Informational sites:
Entertainment sites: Navigational sites: Community sites: Artistic sites: Personal sites:
SITE ARCHITECTURE
2 types : Logical structure : It describes documents that are related to other documents Physical structure It describes where a document actually lives Organisational structure: (i) Linear :books written that one page follows another in this model (ii) Grid :a spatial organization its good for collection of related item a pure grid in common on the web (iii)Hierarchical :The most common hypertext structure on the web is the tree or hierarchy form.
SEARCH ENGINE
A web
search engine is designed to search for information on the World Wide Web. The search results are generally presented in a list of results and are often called hits. The information may consist of web pages, images, information and other types of files.
HTML
HTML
stands for Hyper Text Markup Language. An HTML file is a text file containing small markup tags. The markup tags tells the web browser how to display the page . An HTML file must have an htm or html extension. It can be created using a simple text editor.
HTML Tags
Headings
HTML FORMS:
Text
XML
Extensible
Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machinereadable
focused on what the document is.
It
XML was designed to transport and store data, with focus on what data is
HTML was designed to display data, with focus on how data looks HTML is about displaying information, while XML is about carrying information.
It uses a Document Type Definition (DTD) and an XML schema to describe the data.
is a framework for defining reusable software components in a programming language-independent way. Software applications can then be composed from one or more of these components in order to provide their functionality. Object Linking and Embedding (OLE) is a technology developed by Microsoft that allows embedding and linking to documents and other objects
STREAMING
Stream
SOCKET
A
socket is an endpoint of a two-way communication link between two programs running on the network.
TYPES OF SOCKET
Stream
Datagram
Raw
FIREWALL
The firewall may be a single computer system or a set of two or more system that co-operate to perform the firewall function.
Packet Filtering :Packet filters act by inspecting the "packets" which transfer between computers on the Internet. If a packet matches the packet filter's set of rules, the packet filter will drop (silently discard) the packet, or reject it NAT(Network Address Translation) :It is a technology that allows your home network to share internet access. Proxy server : A proxy server is a gateway from one network to another for a specific network application, in the sense that it functions as a proxy on behalf of the network user
HACKERS
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose People who engage in computer hacking activities are often called hackers
ENCRYPTION
Encryption is define as a process of converting the plain text into chipper text.
VPN
The virtual private network (VPN) technology included in Windows Server 2003 helps enable cost-effective, secure remote access to private networks.
IDEAL FIREWALL
The ideal firewall defines your security requirements and helps to figure out what general type of security our business requires. It also explains exactly how to configure your border gateways to achieve that level of security.
THANK YOU!!!!