Web Standards. Web Technologies. Web Standards. URI and URL

Size: px
Start display at page:

Download "Web Standards. Web Technologies. Web Standards. URI and URL"

Transcription

1 Web Technologies Claudio Fornaro ver Web Standards At its core, the Web is made up of three standards: the Uniform Resource Identifier (URI), which is a universal system for referencing resources on the Web, such as Web pages; the HyperText Transfer Protocol (HTTP), which specifies how the browser and server communicate with each other; the HyperText Markup Language (HTML), used to define the structure and content of hypertext documents. 2 Web Standards URI and URL The World Wide Web Consortium (W3C, headed by Tim Berners-Lee) develops and maintains these and other standards that enable computers on the Web to effectively store and communicate different forms of information. A Uniform Resource Identifier (URI) is a compact string of characters used to identify or name a resource. The main purpose of this identification is to enable interaction with representations of the resource over a network, typically the World Wide Web, using specific protocols. 3 4

2 URI and URL animal/mammal/aquatic?species=whale#tail protocol login host port path query anchor 5 URI and URL A Uniform Resource Locator (URL) is a URI that, in addition to identifying a resource, provides a means of locating the resource by describing its primary access mechanism (e.g., its network location). In non technical language the term "URL" is used when referring to URI 6 URI and URL A Web browser will usually dereference URI by performing an HTTP request to the host example.org, at the default HTTP port. Dereferencing URI mailto:bob@example.com will usually open a "Compose " window with the address bob@example.com in the "To" field. 7 URI and URL A Web browser will dereference URL by retrieving the identified resource (page index.html) located at the host example.org (default HTTP port). 8

3 HyperText Transfer Protocol Hypertext Transfer Protocol (HTTP) is a method used to transfer or convey information on the World Wide Web. Its original purpose was to provide a way to publish and retrieve HTML pages. Development of HTTP was coordinated by the World Wide Web Consortium (W 3 C) and the Internet Engineering HyperText Transfer Protocol HTTP is a request/response protocol between clients and servers. The originating client, such as a web browser or other end-user tool, is referred to as the user agent. The destination server, which stores or creates resources such as HTML files and images, is called the origin server. Task Force (IETF) HTTP Versions HTTP has evolved into multiple, mostly backwards-compatible protocol versions. The client tells in the beginning of the request the version it uses, and the server uses the same or earlier version in the response. HTTP Versions Version 0.9 Deprecated. Only supports one command: GET, and does not support headers. Since this version does not support command POST, the client cannot pass much information to the server

4 HTTP Versions Version 1.0 (May 1996) This is the first protocol revision to specify its version in communications. Still in wide use, especially by proxy servers. Allows persistent connections (alias keepalive connections: more than one requestresponse exchange use the same TCP/IP connection before it is closed) when HTTP Versions Version 1.1 (June 1999) Persistent connections enabled by default. Negotiation of contents (e.g. language): Accept-Language: en. Support of request pipelining: multiple requests are allowed to be sent at the same time (in the same packet) so that the server can prepare for the workload (better perormance). explicitly negotiated HTTP Request An HTTP client initiates a request by establishing a TCP connection to a particular port on a remote host (port 80 by default). An HTTP server listening on that port waits for the client to send a request message. 15 HTTP Request The request message consists of the following: a request line, such as GET /images/logo.gif HTTP/1.1 which requests the file logo.gif from the /images directory headers, such as Accept-Language: en an empty line an optional message body (data to be sent to the server) 16

5 HTTP Response Upon receiving the request, the server sends back a message composed of: a status line, such as HTTP/ OK, headers, such as Content-Length: 438 an empty line an optional message body that could be the requested file, or an error message, or some other information. 17 HTTP Sample Connection Client Request GET /index.html HTTP/1.1 Accept-Language: en 18 HTTP Sample Connection Server Response HTTP Request Methods HTTP/ OK Date: Mon, 23 May :38:34 GMT Server: Apache/ (Suse/Linux) Last-Modified: 08 Jan :11:55GMT Content-Length: 438 Connection: close Content-Type: text/html;charset=utf-8 19 HTTP defines eight methods indicating the desired action to be performed on the identified resource: HEAD Asks for the response identical to the one that would correspond to a GET request, but without the response body. This is useful for retrieving meta-information written in response headers, without having to transport the entire content. 20

6 HTTP Request Methods continuation: GET Requests a copy of the specified resource. By far the most common method used on the Web today. POST Submits data to be processed (e.g. from an HTML form) to the identified resource. The data is included in the body of the request. 21 HTTP Request Methods continuation: PUT Uploads a copy of the specified resource. DELETE Deletes the specified resource. TRACE Echoes back the received request, so that a client can see what intermediate servers are adding or changing in the request. 22 HTTP Request Methods continuation: OPTIONS Returns the HTTP methods that the server supports. This can be used to check the functionality of a web server. CONNECT For use with a proxy that can change to being an SSL tunnel. HTTP servers are supposed to implement HTTP Session State HTTP is a stateless protocol: servers do not retain information about users between requests. State retaining is required (for example): to realize a virtual shopping basket, allowing for the content of the shopping cart to depend on the user's actions, at least: GET, HEAD, possibly OPTIONS

7 HTTP Session State State retaining is required (cont.): to allow the webserver to know that the user is already authenticated (after a successful login), and therefore is allowed to access services or perform operations that are restricted to logged-in users, to allow websites for personalization based on users' preferences. HTTP Session State Methods for solving the state problem are based on establishing a session. A session is a set of related requests to the same server coming from the same browser within a limited amount of time HTTP Session State A session can be: anonymous, when the user need not to be identified, nominal, when the user is identified (e.g. by means of a username and password). A session is established by using: external applications, session identification numbers. HTTP Session State External applications are Java applets or ActiveX controls that directly connect to the remote server and manage the session. This solution is complex and nongeneral

8 HTTP Session State A session identification number (SessionID) is an unique number associated to a session by the server. SessionID can be used with: hidden variables values, URL rewriting techniques, cookies. 29 HTTP Session State Hidden Variables Applicable only when using HTML forms. Forms submitted to a Web server have hidden fields (variables) containing the SessionID, to be passed to the server. This method is useful only when more forms are to be filled in sequence. Pages sent back by the server must be rewritten to have a hidden field set with the SessionID (to be passed back). 30 HTTP Session State URL Rewriting Each URL in the HTML page sent back to that user is previously rewritten by the server to include user s SessionID (usually in the query string part). When the user follows a link, the browser returns the attached query string to the server. E.g. resource page.php becomes page.php?userid=2f3bc2d. 31 HTTP Session State Cookies Cookies are parcels of text (not programs) sent by a webserver to a web browser and then sent back unchanged by the browser each time it accesses that server. By returning a cookie to a web server, the browser provides the server a means of connecting the current page view with prior page views. 32

9 HTTP Session State Cookies HTTP Session State Cookies Cookie setting can be requested directly by a web server response, or through a page embedded script. The cookie setter can specify a deletion (expiration) date. If the cookie setter does not specify a date, the cookie is removed once the user quits his/her browser. Specifying a date makes a cookie Cookies have been of concern for Internet privacy, they can be used to track users across multiple sites to create an anonymous profile of the user (third-party coockies). This allows the advertising company to select the banner to show to a user based on the user's profile. survive across sessions (persistent) Cookies can also be stolen and forged. HTTP Session State Cookie Setting by a Webserver Proxy Servers Client first request: GET /index.html HTTP/1.1 Server first response: HTTP/ OK Content-type: text/html Set-Cookie: name=abcd123; expires=31-dec :59:59 GMT; path=/; domain=.example.net Client next request(s): GET /spec.html HTTP/1.1 A proxy server offers a service to allow clients to make indirect network connections to other network services (e.g. a Web site). A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. Cookie: name=abcd

10 Proxy Servers Proxy Servers In some cases, the proxy may modify the client's request or the server's response for various purposes. Web proxies may be used to control web content surfing and intercept hostile content served by remote sites. Other web proxies reformat web pages for a specific purpose or audience (e.g. Some proxy servers are used to circumvent restrictions. A famous example is 'elgoog', which allowed users in China to use Google after it had been blocked there. Anonymous proxies, as opposed to regular transparent proxies, do not pass the information about the real user to for cell phones and PDAs). the remote web server MIME Encoding MIME Encoding HTTP requires that data be transmitted in the form of -like messages. The basic Internet transmission protocol (SMTP) supports only 7-bit ASCII characters. This effectively limits Internet to text messages which, when transmitted, include only the characters sufficient for writing a small number of Multipurpose Internet Mail Extensions (MIME) extends the format of to support: text in character sets other than US-ASCII, non-text attachments (binary content such as files containing images, sounds, movies, and programs.), multi-part message bodies, header information in non-ascii character languages, primarily English sets.

11 MIME Encoding Mapping messages into and out of MIME format is typically done automatically by clients and servers. MIME full encoding may raise the data size up to 33% more. The "Content Types" defined by MIME standards are also of importance outside of and HTTP. HyperText Markup Language HTML is the predominant markup language for the creation of web pages. It provides a means to describe the structure of text-based information in a document and to supplement that text with interactive forms, embedded images, and other objects HyperText Markup Language Hypertext is ordinary text that has been dressed up with extra features, such as formatting, images, multimedia, and links to other documents. Markup is the process of taking ordinary text and adding extra symbols. Each of the symbols used for markup in HTML is a command that tells a browser how to display the text. 43 Versions of HTML The last HTML specification published by the W3C is the HTML The W3C's HTML Working Group (WG) has increasingly focused on the development of XHTML, an XML-based counterpart to HTML. In Nov. 2006, the HTML WG published a new charter indicating its intent to resume development of HTML in a way that unifies HTML 4 and XHTML 1. 44

12 XHTML XHTML applies the more rigorous, less ambiguous syntax requirements of XML to HTML to make it easier to process and extend. As support for XHTML has increased in browsers and tools, it has been embraced by many web standards advocates in preference to HTML. XHTML XHTML documents need to be wellformed (syntactically correct), this allows for automated processing to be performed using a standard XML library (unlike HTML, which requires a relatively complex, lenient, and generally custom parser) The Modern Approach Each page can be thought as composed by three separated parts: Structure Presentation Behavior The Modern Approach Structure deals with the organization of the information in headings, paragraphs, lists, etc. The (X)HTML language is used to define the structure. Non structural tags and properties (e.g. font, color) are never used nor needed

13 The Modern Approach Presentation languages format the page layout, controlling fonts, displacement, colors, etc. The most common language is Cascading Style Sheets (CSS) 49 The Modern Approach Presentation and structure can be changed without affecting each other: the page content can be modified without affecting the layout, each user can have different style sheets without changing the content: a layout optimized for small portable device displays, a large text layout for visuallyimpaired users (accessibility), the layout for an entire website can be held in one place, and updated easily. 50 The Modern Approach Browsers are Different Sofisticated effects (behavior) working on most platforms and browsers are obtained by scripting languages such as JavaScript applied to page objects. Page object organization is described by its DOM (more on this later). Despite the claimed high (but never complete) adherence to Web standards, each browser renders the web page in a slightly different way. Sometimes not so slightly... Old browsers do not support any standard and should be avoided

14 Client-side Execution Some particular programs are executed by the user's web browser instead of the web server. This type of programs enables web pages to have different and changing content depending on user input, environmental conditions (such as the time of day), or other variables. Client-side Execution Scripts are small interpreted programs, often embedded within an HTML document, or contained in a separate file requested by the HTML document. The user's web browser itself executes the script, then displays the whole document including any visible output from the script Client-side Execution Scripts may also contain instructions for the browser to follow if the user interacts with the document in a certain way (e.g. a click on a certain button starts a script that checks input correctness). These instructions can be followed without further communication with the server, though they may require such communication. 55 Client-side Execution JavaScript is a scripting language developed to be embedded in Web pages. The standardized version is called ECMAScript. While its name is similar to Java, JavaScript was developed by Netscape and it has almost nothing to do with Java. 56

15 Client-side Execution JavaScript can modify the Document Object Model (DOM) properties of a page to change document content, structure, and style. Changes are applied immediatly, so Web pages can simulate the behavior of standalone programs. The manipulation of a page's DOM after the page is delivered to the client is Client-side Execution Ajax ("Asynchronous JavaScript And XML") is a JavaScript-based technology that provides a method whereby large or small parts within a Web page may be updated, using new information obtained over the network in response to user actions. called Dynamic HTML (DHTML) Client-side Execution Ajax partial update capability allows the page to be much more responsive, interactive and interesting, without the user having to wait for whole-page reloads. Examples of Ajax techniques currently in use are Gmail, Google Maps, etc. 59 Client-side Execution Java applets are small pre-compiled programs (bytecode) downloaded upon request by the hosting HTML page. A Java Virtual Machine (JVM) must be present on the user s computer in order to execute the applet bytecode. Any graphical output of the program is displayed in the HTML page and can change independently. 60

16 Client-side Execution Client-side Execution Java never gained the popularity that Sun had hoped for, for a variety of reasons including: the lack of integration with other content (applets were confined to small boxes within the rendered page) computers at the time were supplied to end users without an installed Java Virtual Machine, this required a download by the ActiveX controls are small compiled programs downloaded by the hosting HTML page and used by the Internet Explorer web browser to incorporate applet-like functionality into web pages. ActiveX controls are unsafe for users of IE who turn on the browser's ability to automatically download and activate ActiveX controls within a non-trusted web page. user before applets would appear Client-side Execution Adobe Flash now performs many of the functions that were originally envisioned for Java applets including: playing of video content, animation (and games), some rich User Interface features. 63 Client-side Execution Flash files are called "Flash movies" or "Flash games", have a.swf file extension, and are executed by the Flash Player application or plug-in. Flash Player is freely available for the most common web browsers. Flash Player features support for a scripting language and bi-directional streaming of audio and video. 64

17 Server-side Execution To highly customize the response based on: the user's requirements or access rights, queries into databases or other data stores, some programs are executed on the server computer itself: by the O.S. as external programs (CGI) within the Web server process 65 Server-side Execution The Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with a web server. This allows the server to pass requests from a web browser to the external application (running on the server). The web server can then return the output from the application to the web browser. 66 Server-side Execution Server-side Execution CGIs can be: compiled programs run by the Operating System (O.S.), tipically written in C, interpreted programs run by an interpreter, e.g. Perl and shell scripts. Compiled programs must be started by the O.S. for each CGI request. Scripts require that an interpreter be executed for each CGI request. Repeatedly starting a program can significantly reduce web server performance. Today, scripts are preferred and interpreters are integrated directly into Web servers as modules (extensions). This avoids the overhead of repeatedly starting a program or a language interpreter. Usually speed reduction of interpretation is hardly noticeable. Compiled programs run faster

18 Server-side Execution When program code (usually a script) is embedded into the HTML page stored in the web server, when a page is requested: the Web server executes the embedded server-side code, assembles the result in an HTML page, sends back the page to the user. Server-side Execution Technologies using this approach are: PHP ASP (Active Server Pages - Microsoft) ColdFusion (Adobe) Server-side JavaScript Server-side Execution Server-side Execution Other technologies pre-load (as a module) a JVM or similar runtime environments to execute pre-compiled programs. Technologies using this approach are: Servlet (Java) Perl Pyton Other technologies use a hybrid approach, when a page is requested: the code embedded in the HTML page is compiled, the resulting program is executed by the virtual machine, and it is kept for further use. Technologies using this approach are: Java Server Pages (JSP), that produce servlet Ruby 71 72

19 Web Services Web services are application components that can be used by other applications. Web services communicate over the Internet using open protocols. Web services are self-contained and self-describing. XML is the basis for Web services. Web Services Unlike traditional Web client-server 2/3- tier model (Web browser and Web server/database), Web services do not provide the user with a GUI. Web services allow different applications from different locations to communicate with each other without custom coding (program code is ready to be used) Web Services All communication is in XML, thus Web services are not tied to any one operating system or programming language. Web services do not require the use of browsers or HTML. Web services are sometimes called application services. Web Services Web services allow organizations to communicate data without deep knowledge of each other's IT systems behind a firewall

20 Web Services The open standards used are: The XML standard, that describes how to tag the data. The SOAP standard, that describes how to transfer the data. The WSDL standard, that describes how to use the available services. The UDDI standard, that describes how to list (publish) the available services. 77 Web Services An UDDI application is accessed to get the list of available services. An XML document is used to request an available service. The XML document is tranferred using the SOAP standard. The application is used as described in the WSDL document. 78 Web Services Simple Object Access Protocol SOAP is a communication protocol between applications. SOAP is a format for sending messages via Internet. SOAP is platform and language independent. SOAP is based on XML, simple and extensible. Web Services Web Services Description Language WSDL is used to describe Web services and also to locate Web services. WSDL is written in XML. WSDL itself is described by an XML document. SOAP allows to get around firewalls

21 Web Services Universal Description, Discovery and Integration Web Services UDDI is a directory for storing information about web services. UDDI is a directory of web service interfaces described by WSDL. UDDI communicates via SOAP Secure HTTP Securing a session means preventing eavesdropping, tampering, and message forgery. Endpoint authentication and communications privacy over the Internet is obtained by using cryptography. Secure HTTP Typically, only the server is authenticated (i.e., its identity is ensured) while the client remains unauthenticated. This means that the end user (be that a person, or an application such as a web browser), can be sure of whom they are "talking" to

22 Secure HTTP The next level of security - both ends of the "conversation" being sure of who they are "talking" to - is known as mutual authentication. Mutual authentication requires Public Key Infrastructure (PKI) deployment to clients. 85 Secure HTTP There are currently two methods of establishing a secure HTTP connection: the https URI scheme, the HTTP 1.1 Upgrade header. The https URI scheme has been deprecated; however, as browser support for the Upgrade header is nearly non-existent, the https URI scheme is still the dominant method. 86 Secure HTTP https URI Scheme https: is a URI scheme syntactically identical to the http: scheme used for normal HTTP connections. It tells the browser to use an added encryption layer of SSL/TLS to protect the traffic. SSL/TLS is especially suited for HTTP since it can provide some protection even if only one side (the server) of the Secure HTTP HTTP 1.1 Upgrade Header HTTP 1.1 introduced support for the Upgrade header. In the exchange, the client begins by making a clear-text request, which is later followed by a server demand to upgrade the connection to TLS. The server returns a code to the plaintext request that alerts legacy clients that the failure was client-related. communication is authenticated

23 Secure HTTP HTTP 1.1 Upgrade Header The benefits of using this method for establishing a secure connection are the following: it removes messy and problematic redirection and URL rewriting on the server side, it reduces user confusion by providing a single way to access a particular resource. 89 SSL/TLS Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols which provide secure communications and authentication on the Internet for web browsing, , and other data transfers. There are slight differences between SSL 3.0 and TLS 1.1, but the protocol remains substantially the same. 90

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

INTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary

INTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary INTERNET ENGINEERING HTTP Protocol Sadegh Aliakbary Agenda HTTP Protocol HTTP Methods HTTP Request and Response State in HTTP Internet Engineering 2 HTTP HTTP Hyper-Text Transfer Protocol (HTTP) The fundamental

More information

CS WEB TECHNOLOGY

CS WEB TECHNOLOGY CS1019 - WEB TECHNOLOGY UNIT 1 INTRODUCTION 9 Internet Principles Basic Web Concepts Client/Server model retrieving data from Internet HTM and Scripting Languages Standard Generalized Mark up languages

More information

3. WWW and HTTP. Fig.3.1 Architecture of WWW

3. WWW and HTTP. Fig.3.1 Architecture of WWW 3. WWW and HTTP The World Wide Web (WWW) is a repository of information linked together from points all over the world. The WWW has a unique combination of flexibility, portability, and user-friendly features

More information

Lecture 9a: Sessions and Cookies

Lecture 9a: Sessions and Cookies CS 655 / 441 Fall 2007 Lecture 9a: Sessions and Cookies 1 Review: Structure of a Web Application On every interchange between client and server, server must: Parse request. Look up session state and global

More information

Web Programming Paper Solution (Chapter wise)

Web Programming Paper Solution (Chapter wise) Introduction to web technology Three tier/ n-tier architecture of web multitier architecture (often referred to as n-tier architecture) is a client server architecture in which presentation, application

More information

Chapter 10 Web-based Information Systems

Chapter 10 Web-based Information Systems Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 10 Web-based Information Systems Role of the WWW for IS Initial

More information

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer

More information

The World Wide Web. Internet

The World Wide Web. Internet The World Wide Web Relies on the Internet: LAN (Local Area Network) connected via e.g., Ethernet (physical address: 00-B0-D0-3E-51-BC) IP (Internet Protocol) for bridging separate physical networks (IP

More information

WWW, REST, and Web Services

WWW, REST, and Web Services WWW, REST, and Web Services Instructor: Yongjie Zheng Aprile 18, 2017 CS 5553: Software Architecture and Design World Wide Web (WWW) What is the Web? What challenges does the Web have to address? 2 What

More information

Produced by. Mobile Application Development. Higher Diploma in Science in Computer Science. Eamonn de Leastar

Produced by. Mobile Application Development. Higher Diploma in Science in Computer Science. Eamonn de Leastar Mobile Application Development Higher Diploma in Science in Computer Science Produced by Eamonn de Leastar (edeleastar@wit.ie) Department of Computing, Maths & Physics Waterford Institute of Technology

More information

Session 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes

Session 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes Session 8 Deployment Descriptor 1 Reading Reading and Reference en.wikipedia.org/wiki/http Reference http headers en.wikipedia.org/wiki/list_of_http_headers http status codes en.wikipedia.org/wiki/_status_codes

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10 EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 20 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

Global Servers. The new masters

Global Servers. The new masters Global Servers The new masters Course so far General OS principles processes, threads, memory management OS support for networking Protocol stacks TCP/IP, Novell Netware Socket programming RPC - (NFS),

More information

1.1 A Brief Intro to the Internet

1.1 A Brief Intro to the Internet 1.1 A Brief Intro to the Internet - Origins - ARPAnet - late 1960s and early 1970s - Network reliability - For ARPA-funded research organizations - BITnet, CSnet - late 1970s & early 1980s - email and

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

CMSC 332 Computer Networking Web and FTP

CMSC 332 Computer Networking Web and FTP CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into

More information

ReST 2000 Roy Fielding W3C

ReST 2000 Roy Fielding W3C Outline What is ReST? Constraints in ReST REST Architecture Components Features of ReST applications Example of requests in REST & SOAP Complex REST request REST Server response Real REST examples REST

More information

Java Applets, etc. Instructor: Dmitri A. Gusev. Fall Lecture 25, December 5, CS 502: Computers and Communications Technology

Java Applets, etc. Instructor: Dmitri A. Gusev. Fall Lecture 25, December 5, CS 502: Computers and Communications Technology Java Applets, etc. Instructor: Dmitri A. Gusev Fall 2007 CS 502: Computers and Communications Technology Lecture 25, December 5, 2007 CGI (Common Gateway Interface) CGI is a standard for handling forms'

More information

Web, HTTP and Web Caching

Web, HTTP and Web Caching Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects

More information

Notes beforehand... For more details: See the (online) presentation program.

Notes beforehand... For more details: See the (online) presentation program. Notes beforehand... Notes beforehand... For more details: See the (online) presentation program. Topical overview: main arcs fundamental subjects advanced subject WTRs Lecture: 2 3 4 5 6 7 8 Today: the

More information

13. Databases on the Web

13. Databases on the Web 13. Databases on the Web Requirements for Web-DBMS Integration The ability to access valuable corporate data in a secure manner Support for session and application-based authentication The ability to interface

More information

Lecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing

Lecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing Lecture Overview IN5290 Ethical Hacking Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing Summary - how web sites work HTTP protocol Client side server side actions Accessing

More information

1.1 A Brief Intro to the Internet

1.1 A Brief Intro to the Internet 1.1 A Brief Intro to the Internet - Origins - ARPAnet - late 1960s and early 1970s - Network reliability - For ARPA-funded research organizations - BITnet, CSnet - late 1970s & early 1980s - email and

More information

CSCI-1680 WWW Rodrigo Fonseca

CSCI-1680 WWW Rodrigo Fonseca CSCI-1680 WWW Rodrigo Fonseca Based partly on lecture notes by Scott Shenker and John Jannotti Precursors 1945, Vannevar Bush, Memex: a device in which an individual stores all his books, records, and

More information

KINGS COLLEGE OF ENGINEERING 1

KINGS COLLEGE OF ENGINEERING 1 KINGS COLLEGE OF ENGINEERING Department of Computer Science & Engineering Academic Year 2011 2012(Odd Semester) QUESTION BANK Subject Code/Name: CS1401-Internet Computing Year/Sem : IV / VII UNIT I FUNDAMENTALS

More information

CMPE 151: Network Administration. Servers

CMPE 151: Network Administration. Servers CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response

More information

Web Technology. COMP476 Networked Computer Systems. Hypertext and Hypermedia. Document Representation. Client-Server Paradigm.

Web Technology. COMP476 Networked Computer Systems. Hypertext and Hypermedia. Document Representation. Client-Server Paradigm. Web Technology COMP476 Networked Computer Systems - Paradigm The method of interaction used when two application programs communicate over a network. A server application waits at a known address and a

More information

Programming the Web 06CS73 INTRODUCTION AND OVERVIEW. Dr. Kavi Mahesh, PESIT, Bangalore. Textbook: Programming the World Wide Web

Programming the Web 06CS73 INTRODUCTION AND OVERVIEW. Dr. Kavi Mahesh, PESIT, Bangalore. Textbook: Programming the World Wide Web Programming the Web 06CS73 INTRODUCTION AND OVERVIEW Dr. Kavi Mahesh, PESIT, Bangalore Textbook: Programming the World Wide Web Introduction: Internet and World-Wide Web Internet History Internet Protocols

More information

CSCI-1680 WWW Rodrigo Fonseca

CSCI-1680 WWW Rodrigo Fonseca CSCI-1680 WWW Rodrigo Fonseca Based partly on lecture notes by Sco2 Shenker and John Janno6 Administrivia HW3 out today Will cover HTTP, DNS, TCP TCP Milestone II coming up on Monday Make sure you sign

More information

World Wide Web. Hypertext

World Wide Web. Hypertext World Wide Web HTTP, HTTPS SSL, TLS URL, Hypertext WWW s and Browsers Proxy, Plugin, Cookie Hypertext The WWW implementation of documents which include hyperlinks referencing other documents on the system.

More information

Table of Contents WWW. WWW history (2) WWW history (1) WWW history. Basic concepts. World Wide Web Aka The Internet. Client side.

Table of Contents WWW. WWW history (2) WWW history (1) WWW history. Basic concepts. World Wide Web Aka The Internet. Client side. Table of Contents WWW World Wide Web Aka The Internet Karst Koymans Informatics Institute University of Amsterdam (version 44, 2014/10/06 11:35:56 UTC) Tuesday, October 7, 2014 WWW history Basic concepts

More information

Fachgebiet Technische Informatik, Joachim Zumbrägel

Fachgebiet Technische Informatik, Joachim Zumbrägel Computer Network Lab 2017 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Internet Internet Protocols Fundamentals about HTTP Communication HTTP-Server, mode of operation Static/Dynamic Webpages

More information

IT2353 WEB TECHNOLOGY Question Bank UNIT I 1. What is the difference between node and host? 2. What is the purpose of routers? 3. Define protocol. 4.

IT2353 WEB TECHNOLOGY Question Bank UNIT I 1. What is the difference between node and host? 2. What is the purpose of routers? 3. Define protocol. 4. IT2353 WEB TECHNOLOGY Question Bank UNIT I 1. What is the difference between node and host? 2. What is the purpose of routers? 3. Define protocol. 4. Why are the protocols layered? 5. Define encapsulation.

More information

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year/Sem: IV / VII CS1401 INTERNET

More information

Session 9. Deployment Descriptor Http. Reading and Reference. en.wikipedia.org/wiki/http. en.wikipedia.org/wiki/list_of_http_headers

Session 9. Deployment Descriptor Http. Reading and Reference. en.wikipedia.org/wiki/http. en.wikipedia.org/wiki/list_of_http_headers Session 9 Deployment Descriptor Http 1 Reading Reading and Reference en.wikipedia.org/wiki/http Reference http headers en.wikipedia.org/wiki/list_of_http_headers http status codes en.wikipedia.org/wiki/http_status_codes

More information

Traditional Web Based Systems

Traditional Web Based Systems Chapter 12 Distributed Web Based Systems 1 Traditional Web Based Systems The Web is a huge distributed system consisting of millions of clients and servers for accessing linked documents Servers maintain

More information

Introduction to Ethical Hacking

Introduction to Ethical Hacking Introduction to Ethical Hacking Summer University 2017 Seoul, Republic of Korea Alexandre Karlov Today Some tools for web attacks Wireshark How a writeup looks like 0x04 Tools for Web attacks Overview

More information

Hypertext Transport Protocol

Hypertext Transport Protocol Hypertext Transport Protocol HTTP Hypertext Transport Protocol Language of the Web protocol used for communication between web browsers and web servers TCP port 80 HTTP - URLs URL Uniform Resource Locator

More information

Distributed Multitiered Application

Distributed Multitiered Application Distributed Multitiered Application Java EE platform uses a distributed multitiered application model for enterprise applications. Logic is divided into components https://docs.oracle.com/javaee/7/tutorial/overview004.htm

More information

Tennessee. Trade & Industrial Course Web Page Design II - Site Designer Standards. A Guide to Web Development Using Adobe Dreamweaver CS3 2009

Tennessee. Trade & Industrial Course Web Page Design II - Site Designer Standards. A Guide to Web Development Using Adobe Dreamweaver CS3 2009 Tennessee Trade & Industrial Course 655745 Web Page Design II - Site Designer Standards A Guide to Web Development Using Adobe Dreamweaver CS3 2009 ation Key SE Student Edition LE Learning Expectation

More information

WEB TECHNOLOGIES CHAPTER 1

WEB TECHNOLOGIES CHAPTER 1 WEB TECHNOLOGIES CHAPTER 1 WEB ESSENTIALS: CLIENTS, SERVERS, AND COMMUNICATION Modified by Ahmed Sallam Based on original slides by Jeffrey C. Jackson THE INTERNET Technical origin: ARPANET (late 1960

More information

5/19/2015. Objectives. JavaScript, Sixth Edition. Introduction to the World Wide Web (cont d.) Introduction to the World Wide Web

5/19/2015. Objectives. JavaScript, Sixth Edition. Introduction to the World Wide Web (cont d.) Introduction to the World Wide Web Objectives JavaScript, Sixth Edition Chapter 1 Introduction to JavaScript When you complete this chapter, you will be able to: Explain the history of the World Wide Web Describe the difference between

More information

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt Excerpts of Web Application Security focusing on Data Validation adapted for F.I.S.T. 2004, Frankfurt by fs Purpose of this course: 1. Relate to WA s and get a basic understanding of them 2. Understand

More information

World-Wide Web Protocols CS 571 Fall Kenneth L. Calvert All rights reserved

World-Wide Web Protocols CS 571 Fall Kenneth L. Calvert All rights reserved World-Wide Web Protocols CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved World-Wide Web The Information Universe World-Wide Web structure: hypertext Nonlinear presentation of information Key

More information

Web Engineering (CC 552)

Web Engineering (CC 552) Web Engineering (CC 552) Introduction Dr. Mohamed Magdy mohamedmagdy@gmail.com Room 405 (CCIT) Course Goals n A general understanding of the fundamentals of the Internet programming n Knowledge and experience

More information

RKN 2015 Application Layer Short Summary

RKN 2015 Application Layer Short Summary RKN 2015 Application Layer Short Summary HTTP standard version now: 1.1 (former 1.0 HTTP /2.0 in draft form, already used HTTP Requests Headers and body counterpart: answer Safe methods (requests): GET,

More information

Programming the World Wide Web by Robert W. Sebesta

Programming the World Wide Web by Robert W. Sebesta Programming the World Wide Web by Robert W. Sebesta Tired Of Rpg/400, Jcl And The Like? Heres A Ticket Out Programming the World Wide Web by Robert Sebesta provides students with a comprehensive introduction

More information

Discovering Computers Chapter 13 Programming Languages and Program Development

Discovering Computers Chapter 13 Programming Languages and Program Development Discovering Computers 2009 Chapter 13 Programming Languages and Program Development Chapter 13 Objectives Differentiate between machine and assembly languages Identify and discuss the purpose of procedural

More information

HyperText Transfer Protocol

HyperText Transfer Protocol Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Outline. Web browsers & Web servers

Outline. Web browsers & Web servers Web browsers & Web servers 1 Outline Goals and Objectives Topics headlines Introduction Finding a web page Browser Tasks Top browsers Browser window structure Internet Explorer Netscape / Mozilla Opera

More information

Unit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution

Unit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution Unit 4 The Web Computer Concepts 2016 ENHANCED EDITION 4 Unit Contents Section A: Web Basics Section B: Browsers Section C: HTML Section D: HTTP Section E: Search Engines 2 4 Section A: Web Basics 4 Web

More information

Introduction to the Internet and World Wide Web p. 1 The Evolution of the Internet p. 2 The Internet, Intranets, and Extranets p. 3 The Evolution of

Introduction to the Internet and World Wide Web p. 1 The Evolution of the Internet p. 2 The Internet, Intranets, and Extranets p. 3 The Evolution of Introduction to the Internet and World Wide Web p. 1 The Evolution of the Internet p. 2 The Internet, Intranets, and Extranets p. 3 The Evolution of the World Wide Web p. 3 Internet Standards and Coordination

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 3 Spring 2012 January 25, 2012 Announcements Four HW0 s)ll missing HW1 due this week Start working on HW2 and HW3 Re- assess if you found HW0/HW1 challenging

More information

How A Website Works. - Shobha

How A Website Works. - Shobha How A Website Works - Shobha Synopsis 1. 2. 3. 4. 5. 6. 7. 8. 9. What is World Wide Web? What makes web work? HTTP and Internet Protocols. URL s Client-Server model. Domain Name System. Web Browser, Web

More information

Lesson 5: Multimedia on the Web

Lesson 5: Multimedia on the Web Lesson 5: Multimedia on the Web Learning Targets I can: Define objects and their relationships to multimedia Explain the fundamentals of C, C++, Java, JavaScript, JScript, C#, ActiveX and VBScript Discuss

More information

Web Systems & Technologies: An Introduction

Web Systems & Technologies: An Introduction Web Systems & Technologies: An Introduction Prof. Ing. Andrea Omicini Ingegneria Due, Università di Bologna a Cesena andrea.omicini@unibo.it 2006-2007 Web Systems Architecture Basic architecture information

More information

Web Systems & Technologies: An Introduction

Web Systems & Technologies: An Introduction Web Systems & Technologies: An Introduction Prof. Ing. Andrea Omicini Ingegneria Due, Università di Bologna a Cesena andrea.omicini@unibo.it 2005-2006 Web Systems Architecture Basic architecture information

More information

Chapter 9. Web Applications The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill

Chapter 9. Web Applications The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 9 Web Applications McGraw-Hill 2010 The McGraw-Hill Companies, Inc. All rights reserved. Chapter Objectives - 1 Explain the functions of the server and the client in Web programming Create a Web

More information

Introduction to Web Technologies

Introduction to Web Technologies Introduction to Web Technologies James Curran and Tara Murphy 16th April, 2009 The Internet CGI Web services HTML and CSS 2 The Internet is a network of networks ˆ The Internet is the descendant of ARPANET

More information

LECT 8 WEB SECURITY BROWSER SECURITY. Repetition Lect 7. WEB Security

LECT 8 WEB SECURITY BROWSER SECURITY. Repetition Lect 7. WEB Security Repetition Lect 7 LECT 8 WEB SECURITY Access control Runtime protection Trusted computing Java as basic model for signed code Trusted Computing Group TPM ARM TrustZone Mobile Network security GSM security

More information

WebDev. Web Design COMBINES A NUMBER OF DISCIPLINES. Web Development Process DESIGN DEVELOPMENT CONTENT MULTIMEDIA

WebDev. Web Design COMBINES A NUMBER OF DISCIPLINES. Web Development Process DESIGN DEVELOPMENT CONTENT MULTIMEDIA WebDev Site Construction is one of the last steps The Site Development Process http://webstyleguide.com Web Design COMBINES A NUMBER OF DISCIPLINES DESIGN CONTENT Interaction Designers User Interface Designers

More information

Web System and Technologies (Objective + Subjective)

Web System and Technologies (Objective + Subjective) 1. What four components are needed to create a fully dynamic web page. A web server (such as Apache), a server-side scripting language (PHP), a database (MySQL), and a client-side scripting language (JavaScript)

More information

SAS/IntrNet 9.3. Overview. SAS Documentation

SAS/IntrNet 9.3. Overview. SAS Documentation SAS/IntrNet 9.3 Overview SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS/IntrNet 9.3: Overview. Cary, NC: SAS Institute Inc. SAS/IntrNet

More information

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

1.1 A Brief Intro to the Internet

1.1 A Brief Intro to the Internet 1.1 A Brief Intro to the Internet - Origins - ARPAnet - late 1960s and early 1970s - Network reliability - For ARPA-funded research organizations - BITnet, CSnet - late 1970s & early 1980s - email and

More information

Review of Previous Lecture

Review of Previous Lecture Review of Previous Lecture Network access and physical media Internet structure and ISPs Delay & loss in packet-switched networks Protocol layers, service models Some slides are in courtesy of J. Kurose

More information

Languages in WEB. E-Business Technologies. Summer Semester Submitted to. Prof. Dr. Eduard Heindl. Prepared by

Languages in WEB. E-Business Technologies. Summer Semester Submitted to. Prof. Dr. Eduard Heindl. Prepared by Languages in WEB E-Business Technologies Summer Semester 2009 Submitted to Prof. Dr. Eduard Heindl Prepared by Jenisha Kshatriya (Mat no. 232521) Fakultät Wirtschaftsinformatik Hochshule Furtwangen University

More information

COSC 2206 Internet Tools. The HTTP Protocol

COSC 2206 Internet Tools. The HTTP Protocol COSC 2206 Internet Tools The HTTP Protocol http://www.w3.org/protocols/ What is TCP/IP? TCP: Transmission Control Protocol IP: Internet Protocol These network protocols provide a standard method for sending

More information

UR what? ! URI: Uniform Resource Identifier. " Uniquely identifies a data entity " Obeys a specific syntax " schemename:specificstuff

UR what? ! URI: Uniform Resource Identifier.  Uniquely identifies a data entity  Obeys a specific syntax  schemename:specificstuff CS314-29 Web Protocols URI, URN, URL Internationalisation Role of HTML and XML HTTP and HTTPS interacting via the Web UR what? URI: Uniform Resource Identifier Uniquely identifies a data entity Obeys a

More information

Unraveling the Mysteries of J2EE Web Application Communications

Unraveling the Mysteries of J2EE Web Application Communications Unraveling the Mysteries of J2EE Web Application Communications An HTTP Primer Peter Koletzke Technical Director & Principal Instructor Common Problem What we ve got here is failure to commun cate. Captain,

More information

Web Architecture and Technologies

Web Architecture and Technologies Web Architecture and Technologies Ambient intelligence Fulvio Corno Politecnico di Torino, 2015/2016 Goal Understanding Web technologies Adopted for User Interfaces Adopted for Distributed Application

More information

Browser behavior can be quite complex, using more HTTP features than the basic exchange, this trace will show us how much gets transferred.

Browser behavior can be quite complex, using more HTTP features than the basic exchange, this trace will show us how much gets transferred. Lab Exercise HTTP Objective HTTP (HyperText Transfer Protocol) is the main protocol underlying the Web. HTTP functions as a request response protocol in the client server computing model. A web browser,

More information

Agenda. INTRODUCTION TO WEB DEVELOPMENT AND HTML <Lecture 1> 1/20/2013. What is a Web Developer? Rommel Anthony Palomino Spring

Agenda. INTRODUCTION TO WEB DEVELOPMENT AND HTML <Lecture 1> 1/20/2013. What is a Web Developer? Rommel Anthony Palomino Spring INTRODUCTION TO WEB DEVELOPMENT AND Rommel Anthony Palomino Spring 2013 2 What is a Web Developer? Agenda History of the Internet Web 2.0 What is web development today Technology part of it

More information

Web Architecture Review Sheet

Web Architecture Review Sheet Erik Wilde (School of Information, UC Berkeley) INFO 190-02 (CCN 42509) Spring 2009 May 11, 2009 Available at http://dret.net/lectures/web-spring09/ Contents 1 Introduction 2 1.1 Setup.................................................

More information

Shankersinh Vaghela Bapu Institue of Technology

Shankersinh Vaghela Bapu Institue of Technology Branch: - 6th Sem IT Year/Sem : - 3rd /2014 Subject & Subject Code : Faculty Name : - Nitin Padariya Pre Upload Date: 31/12/2013 Submission Date: 9/1/2014 [1] Explain the need of web server and web browser

More information

COPYRIGHTED MATERIAL. Part I: Getting Started. Chapter 1: Introducing Flex 2.0. Chapter 2: Introducing Flex Builder 2.0. Chapter 3: Flex 2.

COPYRIGHTED MATERIAL. Part I: Getting Started. Chapter 1: Introducing Flex 2.0. Chapter 2: Introducing Flex Builder 2.0. Chapter 3: Flex 2. 02671c01.qxd:02671c01 4/20/07 11:24 AM Page 1 Part I: Getting Started Chapter 1: Introducing Flex 2.0 Chapter 2: Introducing Flex Builder 2.0 Chapter 3: Flex 2.0 Basics Chapter 4: Using Flex Builder 2.0

More information

Application Protocols and HTTP

Application Protocols and HTTP Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due

More information

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1 The HTTP protocol Fulvio Corno, Dario Bonino 08/10/09 http 1 What is HTTP? HTTP stands for Hypertext Transfer Protocol It is the network protocol used to delivery virtually all data over the WWW: Images

More information

STUDY GUIDE CHAPTER 7

STUDY GUIDE CHAPTER 7 STUDY GUIDE CHAPTER 7 True/False Indicate whether the statement is true or false. 1. Every Web page has a unique address called a(n) Uniform Resource Locator. 2. Web 3.0 refers to innovations like cloud

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

04 Webservices. Web APIs REST Coulouris. Roy Fielding, Aphrodite, chp.9. Chp 5/6

04 Webservices. Web APIs REST Coulouris. Roy Fielding, Aphrodite, chp.9. Chp 5/6 04 Webservices Web APIs REST Coulouris chp.9 Roy Fielding, 2000 Chp 5/6 Aphrodite, 2002 http://www.xml.com/pub/a/2004/12/01/restful-web.html http://www.restapitutorial.com Webservice "A Web service is

More information

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35 Networks, WWW, HTTP Web Technologies I. Zsolt Tóth University of Miskolc 2018 Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP 2018 1 / 35 Table of Contents Networks Internet 1 Networks Internet

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers

More information

Internet Standards for the Web: Part II

Internet Standards for the Web: Part II Internet Standards for the Web: Part II Larry Masinter April 1998 April 1998 1 Outline of tutorial Part 1: Current State Standards organizations & process Overview of web-related standards Part 2: Recent

More information

Uniform Resource Locators (URL)

Uniform Resource Locators (URL) The World Wide Web Web Web site consists of simply of pages of text and images A web pages are render by a web browser Retrieving a webpage online: Client open a web browser on the local machine The web

More information

Outline of Lecture 3 Protocols

Outline of Lecture 3 Protocols Web-Based Information Systems Fall 2007 CMPUT 410: Protocols Dr. Osmar R. Zaïane University of Alberta Course Content Introduction Internet and WWW TML and beyond Animation & WWW CGI & TML Forms Javascript

More information

Contents 1 INTRODUCTION TO COMPUTER NETWORKS...

Contents 1 INTRODUCTION TO COMPUTER NETWORKS... Contents 1 INTRODUCTION TO COMPUTER NETWORKS... 1.1 LAN's & WAN's... 1.2 Some network and internetwork components... File Server... Workstation. Topologies and Protocol... Repeaters. Hubs (concentrators)...

More information

UNIT I. A protocol is a precise set of rules defining how components communicate, the format of addresses, how data is split into packets

UNIT I. A protocol is a precise set of rules defining how components communicate, the format of addresses, how data is split into packets UNIT I Web Essentials: Clients, Servers, and Communication. The Internet- Basic Internet Protocols -The World Wide Web-HTTP request message-response message- Web Clients Web Servers-Case Study. Markup

More information

Reading How the Web Works

Reading How the Web Works Reading 1.3 - How the Web Works By Jonathan Lane Introduction Every so often, you get offered a behind-the-scenes look at the cogs and fan belts behind the action. Today is your lucky day. In this article

More information

HTTP Protocol and Server-Side Basics

HTTP Protocol and Server-Side Basics HTTP Protocol and Server-Side Basics Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming HTTP Protocol and Server-Side Basics Slide 1/26 Outline The HTTP protocol Environment Variables

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Application Layer Introduction; HTTP; FTP

Application Layer Introduction; HTTP; FTP Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers

More information

Web as a Distributed System

Web as a Distributed System Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,

More information

WWW Document Technologies

WWW Document Technologies WWW Document Technologies Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview The Internet

More information