SlideShare a Scribd company logo
1 of 26
Introduction to Web Technologies
Sudeshna Dey
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 1
Topics
• History and Growth of Web Technologies
• Web Protocols
• Web Applications
• Web Security Aspects
• Computational Aspects of the Internet
• Websites Creation – Individual and Corporate
• Introduction to Cyber Laws
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 2
History of Web Technologies
• Web technology – a technical gateway to the
Internet
• Age-old
– Started in 1950’s
– Started with point-to-point communications
– Mainframe computers and terminals
– Relied on packet switching networks, and
internally relies upon packet switching till date
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 3
History of Web Technologies (cont’d)
• ARPANET and Telenet emerged in 1960’s and 1970’s
• Relies on TCP/IP protocol today
– TCP/IP Was standardized over 1981 (ARPANET) and 1982
• TCP: Transmission Control Protocol
– At the logical layer
• IP: Internet Protocol
– At the physical layer
– After standardization, ISP services started emerging in late
1980’s in the USA
• Matured over 1990’s
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 4
Growth of the Internet
• The Internet grew exponentially from 1990s
– Still growing rapidly
• 35% of the global population connected to the Internet in
2011
– http://en.wikipedia.org/wiki/List_of_countries_by_number_of_Intern
et_users
– This makes around 250-crore Internet users worldwide
• Internet penetrating in social lives
• Used for different purposes
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 5
Growth of the Internet (cont’d)
• Internet usage purposes
– Emails for personal and corporate communications
– Instant messengers (chat) for instant communications
– VOIP for phone calls
– Social networks for connections in social circles
– Professional networks
– Blogs for personal and corporate communications
– Forums for CRM and cross-user discussions
– Web 2.0 for interactive browsing, such as videos, photo sharing, music
albums etc.
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 6
Web Protocols
• Protocols: Data transfer policies to ensure correct,
fast and efficient transfer of data with appropriate
security and privacy standards
• Different protocols for different types of data
processing
• Each protocol specifically designed to satisfy a well-
defined set of requirements
• Internet Engineering Task Force (IETF) manages the
Internet protocols such as TCP/IP
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 7
Web Protocols (cont’d)
• OSI (Open Systems Interconnection) protocol is the classic
network protocol
– 7 layers
– Physical layer: Electrical specifications of signals to carry data in form
of raw bits
– Data link layer: Converts raw bits from physical layer into frames and
back
– Network layer: Deals with data transfer across systems using physical
network addresses via routers and switches
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 8
Web Protocols (cont’d)
• OSI layers (cont’d)
– Transport layer: Transfers data across source and destination
processes at a logical level, providing interface to the lower physical
level
– Session layer: Creates and maintains session-level dialogues across
local and remote computers
– Presentation layer: Defines and encrypts/decrypts data types from
application layer
• Example: GIF and MPEG formats
– Application layer: Keeps track of running and managing
communications across applications at the highest level
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 9
Web Protocols (cont’d)
• Internet protocol suite
– Also known as the TCP/IP protocol
– The TCP and IP driven design encapsulates the functions of the 7
classic OSI layers in only 4 layers
– Link layer (Ethernet): Communicates for the local network
– Internet layer (IP): Connects local networks, establishing
internetworking
– Transport layer (TCP): Handles host-to-host communication
– Application layer (ex: HTTP): Contains protocols for all protocol-
specific data communication services at a process-to-process level
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 10
Web Protocols (cont’d)
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 11
• Image source:
http://en.wikiped
ia.org/wiki/Intern
et_Protocol_Suite
• Two Internet
hosts connected
via two routers
and the
corresponding
layers used at
each hop
Web Protocols (cont’d)
• Other web/application protocols
– FTP: File transfer protocol – protocol for file transfer across systems
– SFTP: Secure FTP – protocol to run FTP securely
– SSH: Secure shell protocol – establishes a secure peer-to-peer
connection across computers
– SMTP: Simple mail transfer protocol – protocol for email exchange
– HTTP: Hypertext transfer protocol – application protocol for web site
and web service level data exchange
– HTTPS: Secure HTTP – protocol to run HTTP securely
– SSL: Secure socket layer – establishes a secure socket connection
across computers
– Telnet: Telephone network protocol – used in early days of networking
to connect across computers
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 12
Web Applications
• Applications that run on the web
• Structures using three primary tiers
– Front tier considers design and presentation aspects to
users
– Middle tier contains business intelligence and carries out
the requisite processing
– Back end database tier is responsible for storing and
managing data
• Can be interactive
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 13
Web Applications (cont’d)
• Benefits
– Browser-based, hence no complex deployment process at clients
• Application is expected to work as long as the client has a web browser
and can connect to application portal
– Require little to no disk space on client machine
– Integrates easily into server-side processing, such as email and search
– Application rollout does not involve touching clients as the full update
happens at servers
– Compatible across platforms such as Linux, Windows and Mac, since
these are browser driven
– HTML5 allows web developers to create interactive applications using
native browsers
– Thin clients
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 14
Web Applications (cont’d)
• Limitations
– Usability less flexible compared to thick clients since the usage is
browser based
• Modern hybrid applications emerging to mix thick and thin clients
– Requires compatible web browsers
• Applications may contain browser-specific bugs
– Requires web server to be up and running – so creates a dependency
– Requires Internet connection to be up and running
– Open to privacy issues since user actions can be tracked by web
application provider
– Users forced to use newer versions of applications as the development
company rolls them out, giving user lesser choice of versions
• REST applications have improved version control capabilities using which clients can
potentially use older application versions
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 15
Web Security Aspects
• Security essential for web applications
• Security breach can happen in many ways
– Confidential information such as login information
– Sensitive financial information such as bank account or credit card
details
– Theft of identity
– Scams
• Lack of trust in security among users can lead to drastic
reduction in e-commerce volumes
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 16
Web Security Aspects (cont’d)
• Technical breach of security
– Virus attacks: Third-party self-replicating executable codes placed on a
computer causing different kinds of damages
– Spoofing attacks: One person masquerades as another by presenting
false data
– Phishing attacks: Attempt to acquire information such as username,
password and credit card details by masquerading as trustworthy
entity
• Often carried out by email spoofing
– Man-in-the-middle attacks: Eavesdropping on networks to listen for
incoming and outgoing packets and use the acquired information for
masquerading as false client to the server
– Manual hacking: Hackers hacking into websites through manual efforts
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 17
Web Security Aspects (cont’d)
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 18
• Spoofing attack
• Src: http://www.technicalinfo.net/papers/Pharming2.html
Web Security Aspects (cont’d)
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 19
• Phishing attacks via email
• Source: http://help.yo.co.zw/index.php?action=artikel&cat=11&id=1&artlang=en
Web Security Aspects (cont’d)
• Protection of security
– Cryptography
• Encryption: Transforms plain-text data into a human-unreadable format
• Decryption: Transforms encrypted data into plain text
– RSA protocol (Rivest Shamir Adleman)
• Asymmetric key based cryptography: Encryption and decryption keys are
different
– Public key: Made public, and used to encrypt data to send to the owner of the
public key
– Private key: Never distributed, and used to decrypt data encrypted by the
corresponding public key
– Asymmetric function because the same key cannot do both encryption and
decryption
– Symmetric key based cryptography: Same key used to encrypt and
decrypt
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 20
Computational Aspects of the Internet
• First generation: Web 1
• Second generation: Web 2.0
– Dynamic page generation
• Need to pull data from backend database
– Pages capture user context on the fly
– Session-based computations
– Web services
• Application programs running as services
• Example: Bill payment portals
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 21
Introduction to Website Creation
• Acquire domain name
– TLD (top level domains): com, org, net, me, mobi, info, biz, tv, edu, gov, in, us,
uk, de, jp, cn, it
– ICANN – the international body running the Internet registry – levies a fixed
annual fee per domain
• Acquire hosting space
• Need to create front, middle and back end
• Front end uses presentation technology
– Ex: HTML
• Middle tier requires programming
– Ex: JSP/Java, PHP, ASP/C#
• Backend requires database
– Ex: MySQL, Oracle, DB2, MS-SQL
• Can use Content Management System (CMS) such as Wordpress
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 22
Individual Websites
• Individual websites for persons
– Individual blogs
– Personal photos and videos
– Social media/network such as Facebook and Twitter
– Often with the .me TLD, but can be other TLDs
– Used for individual identity management
– Successful people use it for personal brand management
• Ex: RogerFederer.com
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 23
Corporate Websites
• Owned and maintained by corporates
• Large, medium and small businesses
• Large corporates host web portals in-house
– Massive corporations have data centers across world rather than
hosting on single computer
• Ex: Google, Facebook, Microsoft
• Medium businesses go for single, dual or quad core dedicated
servers
• Small businesses can possibly use shared web hosting services
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 24
Corporate Websites (cont’d)
• Corporate websites may be
– Informational
• Information distributed online, sales conducted from physical
stores offline
– Commercial
• More prevalent nowadays
• Direct sales from online portals
• Delivery can be online (for digital products or subscriptions) or
offline (for physical goods)
– Forums and blogs for enhanced PR and CRM
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 25
Introduction to Cyber Laws
• Identity protection
• Copyright protection
– Digital Millennium Copyright Act (DMCA) in the USA
• Protects intellectual property and copyrights using Digital Rights
Management (DRM)
• Address copyrights of technology, services and software products
• 5 titles
– WIPO Copyright and Performances and Phonograms Treaties Implementation
Act
– Online Copyright Infringement Liability Limitation Act
– Computer Maintenance Competition Assurance Act
– Miscellaneous Provisions
– Vessel Hull Design Protection Act
Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 26

More Related Content

Similar to Powering the digital frontier with web technologies.

Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6APSU
 
Networking Essentials jsdsdcjsdcdscdscsdc
Networking Essentials jsdsdcjsdcdscdscsdcNetworking Essentials jsdsdcjsdcdscdscsdc
Networking Essentials jsdsdcjsdcdscdscsdcmaneeshs10
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10newbie2019
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxSmithaV19
 
Network basics. eng. moaath alshaikh
Network basics. eng. moaath alshaikhNetwork basics. eng. moaath alshaikh
Network basics. eng. moaath alshaikhMoaath alshaikh
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Cs ch04
Cs ch04Cs ch04
Cs ch04-
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
The internet
The internetThe internet
The internetAniqa Zai
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6Irsandi Hasan
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud ComputingRaymond Gao
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 

Similar to Powering the digital frontier with web technologies. (20)

Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
Chapter_2_v8.3.pptx
Chapter_2_v8.3.pptxChapter_2_v8.3.pptx
Chapter_2_v8.3.pptx
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
Networking Essentials jsdsdcjsdcdscdscsdc
Networking Essentials jsdsdcjsdcdscdscsdcNetworking Essentials jsdsdcjsdcdscdscsdc
Networking Essentials jsdsdcjsdcdscdscsdc
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
Network basics. eng. moaath alshaikh
Network basics. eng. moaath alshaikhNetwork basics. eng. moaath alshaikh
Network basics. eng. moaath alshaikh
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Ch10
Ch10Ch10
Ch10
 
Cs ch04
Cs ch04Cs ch04
Cs ch04
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
The internet
The internetThe internet
The internet
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 

Recently uploaded

Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec QatarBuy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatarsamsungultra782445
 
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...Amil baba
 
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
Vibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxVibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxjoshuaclack73
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证mestb
 
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...drjose256
 
Balancing of rotating bodies questions.pptx
Balancing of rotating bodies questions.pptxBalancing of rotating bodies questions.pptx
Balancing of rotating bodies questions.pptxjoshuaclack73
 
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...Amil Baba Dawood bangali
 
Cytotec 200 mcg in doha [+966572737505 ] buy abortion pills
Cytotec 200 mcg in doha [+966572737505 ] buy abortion pillsCytotec 200 mcg in doha [+966572737505 ] buy abortion pills
Cytotec 200 mcg in doha [+966572737505 ] buy abortion pillssamsungultra782445
 
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样vwymvu
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.ECoyShastriBhawan
 
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...daisycvs
 
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhMatrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhjoshuaclack73
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证mestb
 

Recently uploaded (19)

Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec QatarBuy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
 
Abortion pills in Jeddah Saudi Arabia! +966572737505 Where to buy cytotec
Abortion pills in Jeddah Saudi Arabia! +966572737505 Where to buy cytotecAbortion pills in Jeddah Saudi Arabia! +966572737505 Where to buy cytotec
Abortion pills in Jeddah Saudi Arabia! +966572737505 Where to buy cytotec
 
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
 
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
 
Vibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxVibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptx
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
 
Abortion pills in Riyadh Saudi Arabia!+966572737505 ) Where to get cytotec
Abortion pills in Riyadh Saudi Arabia!+966572737505 ) Where to get cytotecAbortion pills in Riyadh Saudi Arabia!+966572737505 ) Where to get cytotec
Abortion pills in Riyadh Saudi Arabia!+966572737505 ) Where to get cytotec
 
Abortion Clinic in Jeddah +966572737505 buy cytotec pills
Abortion Clinic in Jeddah +966572737505 buy cytotec pillsAbortion Clinic in Jeddah +966572737505 buy cytotec pills
Abortion Clinic in Jeddah +966572737505 buy cytotec pills
 
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
 
Balancing of rotating bodies questions.pptx
Balancing of rotating bodies questions.pptxBalancing of rotating bodies questions.pptx
Balancing of rotating bodies questions.pptx
 
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
 
Cytotec 200 mcg in doha [+966572737505 ] buy abortion pills
Cytotec 200 mcg in doha [+966572737505 ] buy abortion pillsCytotec 200 mcg in doha [+966572737505 ] buy abortion pills
Cytotec 200 mcg in doha [+966572737505 ] buy abortion pills
 
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.
 
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
 
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhMatrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
 

Powering the digital frontier with web technologies.

  • 1. Introduction to Web Technologies Sudeshna Dey Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 1
  • 2. Topics • History and Growth of Web Technologies • Web Protocols • Web Applications • Web Security Aspects • Computational Aspects of the Internet • Websites Creation – Individual and Corporate • Introduction to Cyber Laws Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 2
  • 3. History of Web Technologies • Web technology – a technical gateway to the Internet • Age-old – Started in 1950’s – Started with point-to-point communications – Mainframe computers and terminals – Relied on packet switching networks, and internally relies upon packet switching till date Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 3
  • 4. History of Web Technologies (cont’d) • ARPANET and Telenet emerged in 1960’s and 1970’s • Relies on TCP/IP protocol today – TCP/IP Was standardized over 1981 (ARPANET) and 1982 • TCP: Transmission Control Protocol – At the logical layer • IP: Internet Protocol – At the physical layer – After standardization, ISP services started emerging in late 1980’s in the USA • Matured over 1990’s Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 4
  • 5. Growth of the Internet • The Internet grew exponentially from 1990s – Still growing rapidly • 35% of the global population connected to the Internet in 2011 – http://en.wikipedia.org/wiki/List_of_countries_by_number_of_Intern et_users – This makes around 250-crore Internet users worldwide • Internet penetrating in social lives • Used for different purposes Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 5
  • 6. Growth of the Internet (cont’d) • Internet usage purposes – Emails for personal and corporate communications – Instant messengers (chat) for instant communications – VOIP for phone calls – Social networks for connections in social circles – Professional networks – Blogs for personal and corporate communications – Forums for CRM and cross-user discussions – Web 2.0 for interactive browsing, such as videos, photo sharing, music albums etc. Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 6
  • 7. Web Protocols • Protocols: Data transfer policies to ensure correct, fast and efficient transfer of data with appropriate security and privacy standards • Different protocols for different types of data processing • Each protocol specifically designed to satisfy a well- defined set of requirements • Internet Engineering Task Force (IETF) manages the Internet protocols such as TCP/IP Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 7
  • 8. Web Protocols (cont’d) • OSI (Open Systems Interconnection) protocol is the classic network protocol – 7 layers – Physical layer: Electrical specifications of signals to carry data in form of raw bits – Data link layer: Converts raw bits from physical layer into frames and back – Network layer: Deals with data transfer across systems using physical network addresses via routers and switches Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 8
  • 9. Web Protocols (cont’d) • OSI layers (cont’d) – Transport layer: Transfers data across source and destination processes at a logical level, providing interface to the lower physical level – Session layer: Creates and maintains session-level dialogues across local and remote computers – Presentation layer: Defines and encrypts/decrypts data types from application layer • Example: GIF and MPEG formats – Application layer: Keeps track of running and managing communications across applications at the highest level Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 9
  • 10. Web Protocols (cont’d) • Internet protocol suite – Also known as the TCP/IP protocol – The TCP and IP driven design encapsulates the functions of the 7 classic OSI layers in only 4 layers – Link layer (Ethernet): Communicates for the local network – Internet layer (IP): Connects local networks, establishing internetworking – Transport layer (TCP): Handles host-to-host communication – Application layer (ex: HTTP): Contains protocols for all protocol- specific data communication services at a process-to-process level Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 10
  • 11. Web Protocols (cont’d) Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 11 • Image source: http://en.wikiped ia.org/wiki/Intern et_Protocol_Suite • Two Internet hosts connected via two routers and the corresponding layers used at each hop
  • 12. Web Protocols (cont’d) • Other web/application protocols – FTP: File transfer protocol – protocol for file transfer across systems – SFTP: Secure FTP – protocol to run FTP securely – SSH: Secure shell protocol – establishes a secure peer-to-peer connection across computers – SMTP: Simple mail transfer protocol – protocol for email exchange – HTTP: Hypertext transfer protocol – application protocol for web site and web service level data exchange – HTTPS: Secure HTTP – protocol to run HTTP securely – SSL: Secure socket layer – establishes a secure socket connection across computers – Telnet: Telephone network protocol – used in early days of networking to connect across computers Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 12
  • 13. Web Applications • Applications that run on the web • Structures using three primary tiers – Front tier considers design and presentation aspects to users – Middle tier contains business intelligence and carries out the requisite processing – Back end database tier is responsible for storing and managing data • Can be interactive Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 13
  • 14. Web Applications (cont’d) • Benefits – Browser-based, hence no complex deployment process at clients • Application is expected to work as long as the client has a web browser and can connect to application portal – Require little to no disk space on client machine – Integrates easily into server-side processing, such as email and search – Application rollout does not involve touching clients as the full update happens at servers – Compatible across platforms such as Linux, Windows and Mac, since these are browser driven – HTML5 allows web developers to create interactive applications using native browsers – Thin clients Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 14
  • 15. Web Applications (cont’d) • Limitations – Usability less flexible compared to thick clients since the usage is browser based • Modern hybrid applications emerging to mix thick and thin clients – Requires compatible web browsers • Applications may contain browser-specific bugs – Requires web server to be up and running – so creates a dependency – Requires Internet connection to be up and running – Open to privacy issues since user actions can be tracked by web application provider – Users forced to use newer versions of applications as the development company rolls them out, giving user lesser choice of versions • REST applications have improved version control capabilities using which clients can potentially use older application versions Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 15
  • 16. Web Security Aspects • Security essential for web applications • Security breach can happen in many ways – Confidential information such as login information – Sensitive financial information such as bank account or credit card details – Theft of identity – Scams • Lack of trust in security among users can lead to drastic reduction in e-commerce volumes Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 16
  • 17. Web Security Aspects (cont’d) • Technical breach of security – Virus attacks: Third-party self-replicating executable codes placed on a computer causing different kinds of damages – Spoofing attacks: One person masquerades as another by presenting false data – Phishing attacks: Attempt to acquire information such as username, password and credit card details by masquerading as trustworthy entity • Often carried out by email spoofing – Man-in-the-middle attacks: Eavesdropping on networks to listen for incoming and outgoing packets and use the acquired information for masquerading as false client to the server – Manual hacking: Hackers hacking into websites through manual efforts Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 17
  • 18. Web Security Aspects (cont’d) Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 18 • Spoofing attack • Src: http://www.technicalinfo.net/papers/Pharming2.html
  • 19. Web Security Aspects (cont’d) Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 19 • Phishing attacks via email • Source: http://help.yo.co.zw/index.php?action=artikel&cat=11&id=1&artlang=en
  • 20. Web Security Aspects (cont’d) • Protection of security – Cryptography • Encryption: Transforms plain-text data into a human-unreadable format • Decryption: Transforms encrypted data into plain text – RSA protocol (Rivest Shamir Adleman) • Asymmetric key based cryptography: Encryption and decryption keys are different – Public key: Made public, and used to encrypt data to send to the owner of the public key – Private key: Never distributed, and used to decrypt data encrypted by the corresponding public key – Asymmetric function because the same key cannot do both encryption and decryption – Symmetric key based cryptography: Same key used to encrypt and decrypt Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 20
  • 21. Computational Aspects of the Internet • First generation: Web 1 • Second generation: Web 2.0 – Dynamic page generation • Need to pull data from backend database – Pages capture user context on the fly – Session-based computations – Web services • Application programs running as services • Example: Bill payment portals Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 21
  • 22. Introduction to Website Creation • Acquire domain name – TLD (top level domains): com, org, net, me, mobi, info, biz, tv, edu, gov, in, us, uk, de, jp, cn, it – ICANN – the international body running the Internet registry – levies a fixed annual fee per domain • Acquire hosting space • Need to create front, middle and back end • Front end uses presentation technology – Ex: HTML • Middle tier requires programming – Ex: JSP/Java, PHP, ASP/C# • Backend requires database – Ex: MySQL, Oracle, DB2, MS-SQL • Can use Content Management System (CMS) such as Wordpress Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 22
  • 23. Individual Websites • Individual websites for persons – Individual blogs – Personal photos and videos – Social media/network such as Facebook and Twitter – Often with the .me TLD, but can be other TLDs – Used for individual identity management – Successful people use it for personal brand management • Ex: RogerFederer.com Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 23
  • 24. Corporate Websites • Owned and maintained by corporates • Large, medium and small businesses • Large corporates host web portals in-house – Massive corporations have data centers across world rather than hosting on single computer • Ex: Google, Facebook, Microsoft • Medium businesses go for single, dual or quad core dedicated servers • Small businesses can possibly use shared web hosting services Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 24
  • 25. Corporate Websites (cont’d) • Corporate websites may be – Informational • Information distributed online, sales conducted from physical stores offline – Commercial • More prevalent nowadays • Direct sales from online portals • Delivery can be online (for digital products or subscriptions) or offline (for physical goods) – Forums and blogs for enhanced PR and CRM Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 25
  • 26. Introduction to Cyber Laws • Identity protection • Copyright protection – Digital Millennium Copyright Act (DMCA) in the USA • Protects intellectual property and copyrights using Digital Rights Management (DRM) • Address copyrights of technology, services and software products • 5 titles – WIPO Copyright and Performances and Phonograms Treaties Implementation Act – Online Copyright Infringement Liability Limitation Act – Computer Maintenance Competition Assurance Act – Miscellaneous Provisions – Vessel Hull Design Protection Act Copyright © : Sudeshna Dey -- 2012 - Till Date. All Rights Reserved. 26