SlideShare a Scribd company logo
1 of 17
Vishal Choudhary
vishalhim@yahoo.com
URI (Uniform Resource
Identifier)
URL (Uniform Resource
Locator)
 URL (Uniform Resource Locator) is often defined
as a string of characters that is directed to an
address. It is a very commonly used way to locate
resources on the web. It provides a way to
retrieve the presentation of the physical location
by describing its network location or primary
access mechanism
 . The protocol is described within the URL which
is employed to retrieve the resource and resource
name. The URL contains http/https at the start if
the resource may be a web type resource.
Similarly, it begins with ftp if the resource may be
a file and mailto if the resource is an email
address
URI (Uniform Resource
Identifier):
 Similar to URL, URI (Uniform Resource Identifier)
is also a string of characters that identifies a
resource on the web either by using location,
name or both. It allows uniform identification of
the resources.
 Such identification enables interaction with
representations of the resource over a network,
typically the World Wide Web, using
specific protocols. Schemes specifying a
concrete syntax and associated protocols define
each URI. The most common form of URI is the
Uniform Resource Locator (URL), frequently
referred to informally as a web address.
URL URI
URL is used to describe the identity
of an item.
URI provides a technique for defining
the identity of an item.
URL links a web page, a component
of a web page or a program on a
web page with the help of accessing
methods like protocols.
URI is used to distinguish one
resource from other regardless of the
method used.
URL provides the details about what
type of protocol is to be used.
URI doesn’t contains the protocol
specification.
URL is a type of URI. URI is the superset of URL.
URI Syntax
 The generic form of any URI
is scheme:[//[user:password@]host[:port]][/]path[?query][#fragment]
 Scheme: The scheme lays out the concrete syntax and
any associated protocols for the URI. Schemes are case-
insensitive and are followed by a colon. Ideally, URI
schemes should be registered with the Internet Assigned
Numbers Authority (IANA), although nonregistered
schemes can also be used.While the two slashes shown in
the example above are required by some schemes, they
are not required by all schemes, including authority
components, which are described below.
 Authority component: An authority component is made
up of multiple parts: an optional authentication section, a
host -- consisting of either a registered name or an IP
address -- and an optional port number. The authentication
section contains the username and password, which are
separated by a colon and followed by the symbol for at
(@). After the @ comes the hostname, which is in turn
followed by a colon and then a port number. It is important
to note that IPv4 addresses must be in dot-decimal
notation, and IPv6 addresses must be enclosed in
brackets.
 The path, which contains data, is notated by a sequence
of segments separated by slashes. The path must begin
with a single slash if an authority part was present. It may
also begin with a single slash even if there is no authority
part, but it cannot begin with a double slash. Keep in mind
that while this part of the syntax may closely resemble a
particular file path, it does not always imply a relation to
that file system path.
 Query (optional): The query contains a string of
nonhierarchical data. Although the syntax is not well-
defined, it is most often a sequence of attribute value
pairs separated by a delimiter, such as an ampersand
or a semicolon. The query is separated from the
preceding part by a question mark.
 Fragment (optional): The fragment contains a
fragment identifier that provides direction to a
secondary resource. For example, if the primary
resource is an HTML document, the fragment is often
an ID attribute of a specific element of that document.
If the fragment identifies a certain section of an article
identified by the rest of the URI, a Web browser will
scroll this particular element into view. The fragment
is separated from the preceding part by a hash (#).
 scheme component followed by a colon (:), consisting of a sequence of characters beginning
with a letter and followed by any combination of letters, digits, plus (+), period (.), or hyphen
(-). Although schemes are case-insensitive, the canonical form is lowercase and documents
that specify schemes must do so with lowercase letters. Examples of popular schemes
include http, https, ftp, mailto, file, data,. URI schemes should be registered with the Internet
Assigned Numbers Authority (IANA), although non-registered schemes are used in practice
 userinfo subcomponent that may consist of a user name and an
optional password preceded by a colon (:), followed by an at symbol (@)
 host subcomponent, consisting of either a registered name (including but not limited to
a hostname), or an IP address
 path component, consisting of a sequence of path segments separated by a slash (/).
 query component preceded by a question mark (?), containing a query string of non-
hierarchical data.
 fragment component preceded by a hash (#). The fragment contains a fragment
identifier providing direction to a secondary resource, such as a section heading in an article
identified by the remainder of the URI
 These URIs are frequently referred to as URLs,. The schemes
covered are:
 http: Hypertext Transfer Protocol
 ftp: File Transfer protocol
 Gopher: Gopher protocol
 mailto : Electronic mail address
 News: Usenet newst
 Telnet , rlogin and tn3270: Reference to interactive sessions
 wais: Wide Area Information Servers
 File: Local file accessThe following schemes are proposed as
essential to the unification of the web with electronic mail, but
not currently (to the author's knowledge) implemented:
 Mid: Message identifiers for electronic mail
 cid : Content identifiers for MIME body part
XMPP
 XMPP is the Extensible Messaging and Presence
Protocol, a set of open technologies for instant
messaging, presence, multi-party chat, voice and
video calls, collaboration, lightweight middleware,
content syndication, and generalized routing of XML
data.
 XMPP was originally developed in the Jabber open-
source community to provide an open, decentralized
alternative to the closed instant messaging services
at that time. XMPP offers several key advantages
over such services:
Extensible Messaging and Presence
Protocol (XMPP) is a communication
protocol for message-oriented middleware based
on XML (Extensible Markup Language).It enables
the near-real-time exchange of structured
yet extensible data between any two or more
network entities.Originally named Jabber, the
protocol was developed by the eponymous open-
source community in 1999 for near real-time instant
messaging (IM), presence information, and contact
list maintenance. Designed to be extensible, the
protocol has been used also for publish-subscribe
systems, signalling for VoIP, video, file
transfer, gaming, the Internet of Things (IoT)
applications such as the smart grid, and social
networking services.
 Open — the XMPP protocols are free, open, public, and easily understandable; in
addition, multiple implementations exist in the form clients, servers, server components,
and code libraries.
 Standard — the Internet Engineering Task Force (IETF) has formalized the core XML
streaming protocols as an approved instant messaging and presence technology. The
XMPP specifications were published as RFC 3920 and RFC 3921 in 2004, and
the XMPP Standards Foundation continues to publish many XMPP Extension
Protocols. In 2011 the core RFCs were revised, resulting in the most up-to-date
specifications (RFC 6120, RFC 6121, and RFC 7622).
 Proven — the first Jabber/XMPP technologies were developed by Jeremie Miller in
1998 and are now quite stable; hundreds of developers are working on these
technologies, there are tens of thousands of XMPP servers running on the Internet
today, and millions of people use XMPP for instant messaging through public services
such as Google Talk and XMPP deployments at organizations worldwide.
 Decentralized — the architecture of the XMPP network is similar to email; as a result,
anyone can run their own XMPP server, enabling individuals and organizations to take
control of their communications experience.
 Secure — any XMPP server may be isolated from the public network (e.g., on a
company intranet) and robust security using SASL and TLS has been built into the
core XMPP specifications. In addition, the XMPP developer community is actively
working on end-to-end encryption to raise the security bar even further.
 Extensible — using the power of XML, anyone can build custom functionality on top of
the core protocols; to maintain interoperability, common extensions are published in
the XEP series, but such publication is not required and organizations can maintain
their own private extensions if so desired.
 Flexible — XMPP applications beyond IM include network management, content
syndication, collaboration tools, file sharing, gaming, remote systems monitoring, web
services, lightweight middleware, cloud computing, and much more.
 Diverse — a wide range of companies and open-source projects use XMPP to build
and deploy real-time applications and services; you will never get “locked in” when you
use XMPP technologies.
 XMPP features such as federation across
domains, publish/subscribe, authentication and its
security even for mobile endpoints are being used
to implement the Internet of Things. Several
XMPP extensions are part of the experimental
implementation: Efficient XML Interchange (EXI)
Format; Sensor Data;Provisioning;Control
RFID Technology and Its Applications in Internet of
Things (IOT)
 Radio frequency identification system (RFID) is an
automatic technology and aids machines or
computers to identify objects, record metadata or
control individual target through radio waves .The
RFID technology was first appeared in 1945, as an
espionage tool for the Soviet Union, which
retransmitted incident radio waves with audio
 A typically RFID system is consisted of tags
(transmitters/ responders) and readers
(transmitters/receivers) . The tag is a microchip
connected with an antenna, which can be attached to
an object as the identifier of the object. The RFID
reader communicates with the RFID tag using radio
waves. The main advantage of RFID technology is the
automated identification and data capture that
promises wholesale changes across a broad
spectrum of business activities and aims to reduce the
cost of the already used systems such as bar codes.
RFID System
RFID systems are composed of three main components: RFID tags,
reader, application system:
 RFID tags: also known as transponders (transmitter/ responder), are
attached to the objects to count or identify. Tags could be either active
or passive. Active tags are those that have partly or fully battery
powered, have the capability to communicate with other tags, and can
initiate a dialogue of their own with the tag reader. Passive tags, on the
other hand, do not need any internal power source but are powered up
by the tag reader. Tags consist mainly of a coiled antenna and a
microchip, with the main purpose of storing data.
 Reader: also known as transceiver (transmitter/receiver)
made up of a radio frequency interface (RFI) module and
control unit. Its main functions are to activate the tags,
structure the communication sequence with the tag, and
transfer data between the application software and tags.
 Application system: also called data processing system,
which can be an application or database, depending on
the application. The application software initiates all
readers and tags activities. RFID provides a quick,
flexible, and reliable way for electronically detecting,
tracking and controlling a variety of items. RFID systems
use radio transmissions to send energy to a RFID tag
while the tag emits a unique identification code back to a
data collection reader linked to an information
management system. The data collected from the tag can
then be sent either directly to a host computer, or stored in
a portable reader and up-loaded later to the host
computer.

More Related Content

What's hot

Optimizing Power Control And Clustering In Ad Hoc
Optimizing Power Control And Clustering In Ad HocOptimizing Power Control And Clustering In Ad Hoc
Optimizing Power Control And Clustering In Ad Hoc
guest139ec61
 
Conceptos basicos de redes
Conceptos basicos de redesConceptos basicos de redes
Conceptos basicos de redes
Franke Boy
 
11.soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functions11.soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functions
Alexander Decker
 

What's hot (20)

Internet 2.0
Internet 2.0Internet 2.0
Internet 2.0
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
 
Optimizing Power Control And Clustering In Ad Hoc
Optimizing Power Control And Clustering In Ad HocOptimizing Power Control And Clustering In Ad Hoc
Optimizing Power Control And Clustering In Ad Hoc
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Osi rp3
Osi rp3Osi rp3
Osi rp3
 
Sdn Networking
Sdn NetworkingSdn Networking
Sdn Networking
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LAN
 
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication System
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
 
Conceptos basicos de redes
Conceptos basicos de redesConceptos basicos de redes
Conceptos basicos de redes
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
 
11.soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functions11.soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functions
 

Similar to Lecture 13

The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
 
wepik-securing-networks-understanding-the-power-of-https-202402081449138j2r.pptx
wepik-securing-networks-understanding-the-power-of-https-202402081449138j2r.pptxwepik-securing-networks-understanding-the-power-of-https-202402081449138j2r.pptx
wepik-securing-networks-understanding-the-power-of-https-202402081449138j2r.pptx
avishekpradhan24
 
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxChapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
walterl4
 
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxCCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
BabarYunus1
 

Similar to Lecture 13 (20)

Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
 
Avani
AvaniAvani
Avani
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Basic concept of internet
Basic concept of internetBasic concept of internet
Basic concept of internet
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
wepik-securing-networks-understanding-the-power-of-https-202402081449138j2r.pptx
wepik-securing-networks-understanding-the-power-of-https-202402081449138j2r.pptxwepik-securing-networks-understanding-the-power-of-https-202402081449138j2r.pptx
wepik-securing-networks-understanding-the-power-of-https-202402081449138j2r.pptx
 
Web Terminology
Web TerminologyWeb Terminology
Web Terminology
 
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxChapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
 
Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)
Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)
Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxCCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Introduction about Internet
Introduction about InternetIntroduction about Internet
Introduction about Internet
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Web Topics
Web TopicsWeb Topics
Web Topics
 

More from vishal choudhary

More from vishal choudhary (20)

SE-Lecture1.ppt
SE-Lecture1.pptSE-Lecture1.ppt
SE-Lecture1.ppt
 
SE-Testing.ppt
SE-Testing.pptSE-Testing.ppt
SE-Testing.ppt
 
SE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.pptSE-CyclomaticComplexityand Testing.ppt
SE-CyclomaticComplexityand Testing.ppt
 
SE-Lecture-7.pptx
SE-Lecture-7.pptxSE-Lecture-7.pptx
SE-Lecture-7.pptx
 
Se-Lecture-6.ppt
Se-Lecture-6.pptSe-Lecture-6.ppt
Se-Lecture-6.ppt
 
SE-Lecture-5.pptx
SE-Lecture-5.pptxSE-Lecture-5.pptx
SE-Lecture-5.pptx
 
XML.pptx
XML.pptxXML.pptx
XML.pptx
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
SE-coupling and cohesion.ppt
SE-coupling and cohesion.pptSE-coupling and cohesion.ppt
SE-coupling and cohesion.ppt
 
SE-Lecture-2.pptx
SE-Lecture-2.pptxSE-Lecture-2.pptx
SE-Lecture-2.pptx
 
SE-software design.ppt
SE-software design.pptSE-software design.ppt
SE-software design.ppt
 
SE1.ppt
SE1.pptSE1.ppt
SE1.ppt
 
SE-Lecture-4.pptx
SE-Lecture-4.pptxSE-Lecture-4.pptx
SE-Lecture-4.pptx
 
SE-Lecture=3.pptx
SE-Lecture=3.pptxSE-Lecture=3.pptx
SE-Lecture=3.pptx
 
Multimedia-Lecture-Animation.pptx
Multimedia-Lecture-Animation.pptxMultimedia-Lecture-Animation.pptx
Multimedia-Lecture-Animation.pptx
 
MultimediaLecture5.pptx
MultimediaLecture5.pptxMultimediaLecture5.pptx
MultimediaLecture5.pptx
 
Multimedia-Lecture-7.pptx
Multimedia-Lecture-7.pptxMultimedia-Lecture-7.pptx
Multimedia-Lecture-7.pptx
 
MultiMedia-Lecture-4.pptx
MultiMedia-Lecture-4.pptxMultiMedia-Lecture-4.pptx
MultiMedia-Lecture-4.pptx
 
Multimedia-Lecture-6.pptx
Multimedia-Lecture-6.pptxMultimedia-Lecture-6.pptx
Multimedia-Lecture-6.pptx
 
Multimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptxMultimedia-Lecture-3.pptx
Multimedia-Lecture-3.pptx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Lecture 13

  • 2. URL (Uniform Resource Locator)  URL (Uniform Resource Locator) is often defined as a string of characters that is directed to an address. It is a very commonly used way to locate resources on the web. It provides a way to retrieve the presentation of the physical location by describing its network location or primary access mechanism  . The protocol is described within the URL which is employed to retrieve the resource and resource name. The URL contains http/https at the start if the resource may be a web type resource. Similarly, it begins with ftp if the resource may be a file and mailto if the resource is an email address
  • 3. URI (Uniform Resource Identifier):  Similar to URL, URI (Uniform Resource Identifier) is also a string of characters that identifies a resource on the web either by using location, name or both. It allows uniform identification of the resources.  Such identification enables interaction with representations of the resource over a network, typically the World Wide Web, using specific protocols. Schemes specifying a concrete syntax and associated protocols define each URI. The most common form of URI is the Uniform Resource Locator (URL), frequently referred to informally as a web address.
  • 4. URL URI URL is used to describe the identity of an item. URI provides a technique for defining the identity of an item. URL links a web page, a component of a web page or a program on a web page with the help of accessing methods like protocols. URI is used to distinguish one resource from other regardless of the method used. URL provides the details about what type of protocol is to be used. URI doesn’t contains the protocol specification. URL is a type of URI. URI is the superset of URL.
  • 5. URI Syntax  The generic form of any URI is scheme:[//[user:password@]host[:port]][/]path[?query][#fragment]  Scheme: The scheme lays out the concrete syntax and any associated protocols for the URI. Schemes are case- insensitive and are followed by a colon. Ideally, URI schemes should be registered with the Internet Assigned Numbers Authority (IANA), although nonregistered schemes can also be used.While the two slashes shown in the example above are required by some schemes, they are not required by all schemes, including authority components, which are described below.
  • 6.  Authority component: An authority component is made up of multiple parts: an optional authentication section, a host -- consisting of either a registered name or an IP address -- and an optional port number. The authentication section contains the username and password, which are separated by a colon and followed by the symbol for at (@). After the @ comes the hostname, which is in turn followed by a colon and then a port number. It is important to note that IPv4 addresses must be in dot-decimal notation, and IPv6 addresses must be enclosed in brackets.  The path, which contains data, is notated by a sequence of segments separated by slashes. The path must begin with a single slash if an authority part was present. It may also begin with a single slash even if there is no authority part, but it cannot begin with a double slash. Keep in mind that while this part of the syntax may closely resemble a particular file path, it does not always imply a relation to that file system path.
  • 7.  Query (optional): The query contains a string of nonhierarchical data. Although the syntax is not well- defined, it is most often a sequence of attribute value pairs separated by a delimiter, such as an ampersand or a semicolon. The query is separated from the preceding part by a question mark.  Fragment (optional): The fragment contains a fragment identifier that provides direction to a secondary resource. For example, if the primary resource is an HTML document, the fragment is often an ID attribute of a specific element of that document. If the fragment identifies a certain section of an article identified by the rest of the URI, a Web browser will scroll this particular element into view. The fragment is separated from the preceding part by a hash (#).
  • 8.  scheme component followed by a colon (:), consisting of a sequence of characters beginning with a letter and followed by any combination of letters, digits, plus (+), period (.), or hyphen (-). Although schemes are case-insensitive, the canonical form is lowercase and documents that specify schemes must do so with lowercase letters. Examples of popular schemes include http, https, ftp, mailto, file, data,. URI schemes should be registered with the Internet Assigned Numbers Authority (IANA), although non-registered schemes are used in practice  userinfo subcomponent that may consist of a user name and an optional password preceded by a colon (:), followed by an at symbol (@)  host subcomponent, consisting of either a registered name (including but not limited to a hostname), or an IP address  path component, consisting of a sequence of path segments separated by a slash (/).  query component preceded by a question mark (?), containing a query string of non- hierarchical data.  fragment component preceded by a hash (#). The fragment contains a fragment identifier providing direction to a secondary resource, such as a section heading in an article identified by the remainder of the URI
  • 9.  These URIs are frequently referred to as URLs,. The schemes covered are:  http: Hypertext Transfer Protocol  ftp: File Transfer protocol  Gopher: Gopher protocol  mailto : Electronic mail address  News: Usenet newst  Telnet , rlogin and tn3270: Reference to interactive sessions  wais: Wide Area Information Servers  File: Local file accessThe following schemes are proposed as essential to the unification of the web with electronic mail, but not currently (to the author's knowledge) implemented:  Mid: Message identifiers for electronic mail  cid : Content identifiers for MIME body part
  • 10. XMPP  XMPP is the Extensible Messaging and Presence Protocol, a set of open technologies for instant messaging, presence, multi-party chat, voice and video calls, collaboration, lightweight middleware, content syndication, and generalized routing of XML data.  XMPP was originally developed in the Jabber open- source community to provide an open, decentralized alternative to the closed instant messaging services at that time. XMPP offers several key advantages over such services:
  • 11. Extensible Messaging and Presence Protocol (XMPP) is a communication protocol for message-oriented middleware based on XML (Extensible Markup Language).It enables the near-real-time exchange of structured yet extensible data between any two or more network entities.Originally named Jabber, the protocol was developed by the eponymous open- source community in 1999 for near real-time instant messaging (IM), presence information, and contact list maintenance. Designed to be extensible, the protocol has been used also for publish-subscribe systems, signalling for VoIP, video, file transfer, gaming, the Internet of Things (IoT) applications such as the smart grid, and social networking services.
  • 12.  Open — the XMPP protocols are free, open, public, and easily understandable; in addition, multiple implementations exist in the form clients, servers, server components, and code libraries.  Standard — the Internet Engineering Task Force (IETF) has formalized the core XML streaming protocols as an approved instant messaging and presence technology. The XMPP specifications were published as RFC 3920 and RFC 3921 in 2004, and the XMPP Standards Foundation continues to publish many XMPP Extension Protocols. In 2011 the core RFCs were revised, resulting in the most up-to-date specifications (RFC 6120, RFC 6121, and RFC 7622).  Proven — the first Jabber/XMPP technologies were developed by Jeremie Miller in 1998 and are now quite stable; hundreds of developers are working on these technologies, there are tens of thousands of XMPP servers running on the Internet today, and millions of people use XMPP for instant messaging through public services such as Google Talk and XMPP deployments at organizations worldwide.  Decentralized — the architecture of the XMPP network is similar to email; as a result, anyone can run their own XMPP server, enabling individuals and organizations to take control of their communications experience.  Secure — any XMPP server may be isolated from the public network (e.g., on a company intranet) and robust security using SASL and TLS has been built into the core XMPP specifications. In addition, the XMPP developer community is actively working on end-to-end encryption to raise the security bar even further.  Extensible — using the power of XML, anyone can build custom functionality on top of the core protocols; to maintain interoperability, common extensions are published in the XEP series, but such publication is not required and organizations can maintain their own private extensions if so desired.  Flexible — XMPP applications beyond IM include network management, content syndication, collaboration tools, file sharing, gaming, remote systems monitoring, web services, lightweight middleware, cloud computing, and much more.  Diverse — a wide range of companies and open-source projects use XMPP to build and deploy real-time applications and services; you will never get “locked in” when you use XMPP technologies.
  • 13.  XMPP features such as federation across domains, publish/subscribe, authentication and its security even for mobile endpoints are being used to implement the Internet of Things. Several XMPP extensions are part of the experimental implementation: Efficient XML Interchange (EXI) Format; Sensor Data;Provisioning;Control
  • 14. RFID Technology and Its Applications in Internet of Things (IOT)  Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through radio waves .The RFID technology was first appeared in 1945, as an espionage tool for the Soviet Union, which retransmitted incident radio waves with audio
  • 15.  A typically RFID system is consisted of tags (transmitters/ responders) and readers (transmitters/receivers) . The tag is a microchip connected with an antenna, which can be attached to an object as the identifier of the object. The RFID reader communicates with the RFID tag using radio waves. The main advantage of RFID technology is the automated identification and data capture that promises wholesale changes across a broad spectrum of business activities and aims to reduce the cost of the already used systems such as bar codes.
  • 16. RFID System RFID systems are composed of three main components: RFID tags, reader, application system:  RFID tags: also known as transponders (transmitter/ responder), are attached to the objects to count or identify. Tags could be either active or passive. Active tags are those that have partly or fully battery powered, have the capability to communicate with other tags, and can initiate a dialogue of their own with the tag reader. Passive tags, on the other hand, do not need any internal power source but are powered up by the tag reader. Tags consist mainly of a coiled antenna and a microchip, with the main purpose of storing data.
  • 17.  Reader: also known as transceiver (transmitter/receiver) made up of a radio frequency interface (RFI) module and control unit. Its main functions are to activate the tags, structure the communication sequence with the tag, and transfer data between the application software and tags.  Application system: also called data processing system, which can be an application or database, depending on the application. The application software initiates all readers and tags activities. RFID provides a quick, flexible, and reliable way for electronically detecting, tracking and controlling a variety of items. RFID systems use radio transmissions to send energy to a RFID tag while the tag emits a unique identification code back to a data collection reader linked to an information management system. The data collected from the tag can then be sent either directly to a host computer, or stored in a portable reader and up-loaded later to the host computer.