Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views10 pages

Unit-1 Web Technology

The document provides an overview of web technology, covering web basics such as browsers, servers, and tier architecture, including single, dual, and three-tier systems. It also differentiates between static and dynamic web pages, explains web protocols like HTTP and FTP, and introduces free, open source, and proprietary software, along with their advantages and disadvantages. Additionally, it discusses software licensing types, emphasizing the differences between free/open source and proprietary licenses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views10 pages

Unit-1 Web Technology

The document provides an overview of web technology, covering web basics such as browsers, servers, and tier architecture, including single, dual, and three-tier systems. It also differentiates between static and dynamic web pages, explains web protocols like HTTP and FTP, and introduces free, open source, and proprietary software, along with their advantages and disadvantages. Additionally, it discusses software licensing types, emphasizing the differences between free/open source and proprietary licenses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Page |1

Unit-1
Introduction to Web Technology
1.1 Web Basics:
 Web Browsers
A web browser, or simply "browser," is an application used to access and view websites.
Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla
Firefox etc.
 Web Servers
A computer that hosts a website on the computer.
 Tier Technology and its types
In computer programming, the parts of a program can be distributed among several tiers,
each located in a different computer in a network. Such a program is said to be tiered,
multitier, or multitiered.
Three-tier architecture is a well-established architecture that organizes web applications
into three logical and physical computing tiers: the presentation tier, application tier, and
the data tier.
o Presentation tier:
It is also known as the Client layer. The top most layer of an application. This is the layer
we see when we use the software. By using this layer, we can access the web pages. The
main function of this layer is to communicate with the Application layer. This layer passes
the information which is given by the user in terms of keyboard actions, mouse clicks to
the Application Layer.
For example, the login page of Gmail where an end-user could see text boxes and buttons
to enter user id, password, and to click on sign-in.
o Application Layer
It is also known as Business Logic Layer which is also known as the logical layer. As per the
Gmail login page example, once the user clicks on the login button, the Application layer
interacts with the Database layer and sends required information to the Presentation
layer. It controls an application’s functionality by performing detailed processing. This
layer acts as a mediator between the Presentation and the Database layer. Complete
business logic will be written in this layer.
In simple words, it is to perform operations on the application.

Prepared By- Jhalnath Chapagain


Page |2

o Data Layer
The data is stored in this layer. The application layer communicates with the Database
layer to retrieve the data. It contains methods that connect the database and
performs required action e.g.: insert, update, delete, etc.
In simple words, it is to share and retrieve the data.
Evolution to the 3-tier Architecture

Single Tier

Dual Tier

3-Tier

Single Tier(1-Tier)

One-tier architecture involves putting all of the required components for a software
application or technology on a single server or platform. Basically, a one-tier
architecture keeps all of the elements of an application, including the interface,
middleware and back-end data, in one place.
Some experts describe them as applications that could be installed and run on a
single computer. Example: Mainframe Computer

Prepared By- Jhalnath Chapagain


Page |3

Dual Tier(2-Tier)

A two-tier client/server is a type of multi-tier computing architecture in which an


entire application is distributed as two distinct layers or tiers.
It divides the application logic, data and processing between client and server
devices.

Three Tier(3-Tier)

In three tier architecture client server environment an additional middle-ware is used


that means client request goes to server through that middle layer and the response
of server is firstly accepted by middle-ware then to client.
 Static and Dynamic Webpage
Static Webpage:

Prepared By- Jhalnath Chapagain


Page |4

A static website has fixed content and does not require programming languages
to build one. Static Web pages are very simple. It is written in languages such as HTML,
JavaScript, CSS, etc. In static web pages, Pages will remain the same until someone
changes it manually.

Dynamic Webpage:

A dynamic page displays different content for different users while retaining the same
layout and design. Such pages, usually written in php, AJAX, ASP or ASP.NET, take more
time to load than simple static pages. They’re frequently implemented to show
information that changes frequently, e.g., weather updates or stock prices. The page
may change with the time of day, the user that accesses the webpage, or the type of
user interaction.
There are two types of dynamic web pages.
CLIENT-SIDE SCRIPTING
Web pages that change in response to an action within that web page, such as a mouse
or a keyboard action, use client-side scripting.
Client-side scripts generate client-side content. Client-side content is content that's
generated on the user's computer rather than the server. In these cases, the user's web
browser would download the web page content from the server, process the code
that's embedded in the web page, and then display the updated content to the user.
Scripting languages such as JavaScript allow a web page to respond to client-side
events.

Prepared By- Jhalnath Chapagain


Page |5

SERVER-SIDE SCRIPTING
Web pages that change when a web page is loaded or visited use server-side scripting.
Server-side content is content that's generated when a web page is loaded. For
example, login pages, forums, submission forms, and shopping carts, all use server-side
scripting since those web pages change according to what is submitted to it.
Scripting languages such as PHP, ASP, ASP.NET, JSP, ColdFusion and Perl allow a web
page to respond to submission events.

1.2 Web Protocols


 HTTP:
HTTP is the backbone of the World Wide Web(WWW). It defines the format of
messages through which web browsers (like chrome) and web servers
communicate. HTTP allows us to transfer files in the form of text between client
and server.

HTTP is a protocol for fetching resources such as HTML documents. Clients and
servers communicate by exchanging individual messages (as opposed to a stream
of data). The messages sent by the client, usually a Web browser, are called
requests and the messages sent by the server as an answer are called responses.

The client submits an HTTP request message to the server. The server, which
provides resources such as HTML files and other content or performs other
functions on behalf of the client, returns a response message to the client. The
response contains completion status information about the request and may also
contain requested content in its message body.
The HTTP protocol is a stateless one. This means that every HTTP request the server
receives is independent and does not relate to requests that came prior to it.
 HTTPS:
Hypertext transfer protocol secure (HTTPS) is the secure version of HTTP,
which is the primary protocol used to send data between a web browser
and a website. HTTPS is encrypted in order to increase security of data
transfer. This is particularly important when users transmit sensitive data,
such as by logging into a bank account, email service, or health insurance
provider.

Prepared By- Jhalnath Chapagain


Page |6

Any website, especially those that require login credentials, should use
HTTPS. In modern web browsers such as Chrome, websites that do not use
HTTPS are marked differently than those that are. Look for a green padlock
in the URL bar to signify the webpage is secure. Web browsers take HTTPS
seriously; Google Chrome and other browsers flag all non-HTTPS websites
as not secure.

 FTP:
FTP stands for File transfer protocol. FTP is a standard internet protocol
provided by TCP/IP used for transmitting the files from one host to another.
The process works when one party allows another to send or receive files
over the internet. Originally used as a way for users to communicate and
exchange information between two physical devices, it is now commonly
used to store files in the cloud, which is usually a secure location that is held
remotely.

1.3 Introduction to Free and Open Source Software


 Free Software:
“Free software” means software that respects users' freedom and community. Roughly,
it means that the users have the freedom to run, copy, distribute, study, change and
improve the software. Thus, “free software” is a matter of liberty, not price.
We may have paid money to get copies of a free program, or you may have obtained
copies at no charge. But regardless of how you got your copies, you always have the
freedom to copy and change the software, even to sell copies.
Advantage:
 Accessible
 Innovative
 Fewer errors
 Low Cost
 Security and privacy

Prepared By- Jhalnath Chapagain


Page |7

Disadvantages:
 There is no definition of guarantee
 It requires technical knowledge
 Quality control is provided by the community
 Low advertising budget: being inexpensive
 Open Source Software:
Open source software is software with source code that anyone can inspect, modify, and
enhance. "Source code" is the part of software that most computer users don't ever see;
it's the code computer programmers can manipulate to change how a piece of software—
a "program" or "application"—works. Programmers who have access to a computer
program's source code can improve that program by adding features to it or fixing parts
that don't always work correctly.
Advantage:
 Cost Effective
 Reliability
 Flexibility
 Scalability
 Licensing
 Error Free
Disadvantages:
 Security issues
 Compatibility issues
 Lack of Maintenance
 Lack of Support
 Not so user friendly

Prepared By- Jhalnath Chapagain


Page |8

Difference Between Free and Open Source Software


Free Software Open Source Software
It was coined by the free software foundation In response to the restrictions of free
in the 1980s. software, the phrase “open source” was
coined in the late 1990s.
Every free software is open source. Every open-source software is not free
software.
No restrictions are imposed on free software. Open-source software occasionally imposes
some constraints on users.
Examples include the Linux kernel, Linux Examples: Prime examples of open-source
operating systems, the GNU Compiler products are the Apache HTTP Server, the e-
Collection and C library; the MySQL relational commerce platform Open Source Commerce,
database; the Apache web server. internet browsers Mozilla Firefox, and
Chromium

Proprietary Software:
Some software has source code that only the person, team, or organization who created
it—and maintains exclusive control over it—can modify. We call this kind of software
"proprietary" or "closed source" software.

Only the original authors of proprietary software can legally copy, inspect, and alter that
software. And in order to use proprietary software, computer users must agree (usually
by signing a license displayed the first time they run this software) that they will not do
anything with the software that the software's authors have not expressly permitted.
Microsoft Office and Adobe Photoshop are examples of proprietary software.

Advantage:
 software is stable because the development is totally the responsibility of the
owner
 Since the users pay for the software hence, it is a great source of revenue for the
developers.
 Good Customer Service
 Good user interface

Prepared By- Jhalnath Chapagain


Page |9

Disadvantages:
 The lifespan of the software depends on the vendors. Hence, there may be a great
loss while using this software in business if the software is removed from the
market.
 Software is quite costly.
 The software is rigid in nature. it means that you cannot modify the features
according to your needs.
 The users have no right to share the software.

Difference Between Open Source Software and Proprietary Software

Open Source Software Proprietary Software


Open-source software is computer software Proprietary software is computer software
whose source code is available openly on the where the source codes are publicly not
internet and programmers can modify it to available only the company which has created
add new features and capabilities without any can modify it.
cost.
Here the software is developed and tested Here the software is developed and tested by
through open collaboration. the individual or organization by which it is
owned not by the public.
In open-source software the source code is In proprietary software, the source code is
public. protected.
Usually Developed and Maintained by non- Usually Developed and Maintained by
profit organizations. for-profit entities.
Users can get open software free of charge. Users must have to pay to get the proprietary
software.
Examples are Android, Linux, Firefox, Open Examples are Windows, macOS, Microsoft
Office, GIMP, VLC Media player, etc. Office, Adobe Flash Player, Skype, etc.

Licensing and its types


A software license is a document that provides legally binding guidelines for the use and
distribution of software. Software licenses typically provide end users with the right to
make one or more copies of the software without violating copyrights. The license also
defines the responsibilities of the parties entering into the license agreement and may
impose restrictions on how the software can be used.

Prepared By- Jhalnath Chapagain


P a g e | 10

 Free and open source software (FOSS) licenses are often referred to as open
source. FOSS source code is available to the customer along with the software
product. The customer is usually allowed to use the source code to change the
software. The FOSS movement has developed many different FOSS licenses to
enable software developers to easily state that they grant their users some rights
that copyright law grants exclusively to them. FOSS licenses also serve as
agreements among FOSS developer communities.
 Proprietary licenses are often referred to as closed source. They provide customers
with operational code. Users cannot freely alter this software. These licenses also
usually restrict reverse engineering the software's code to obtain the source code.

One issue with this proprietary license model is that it is not protected by law. This
means that in theory, one can’t get in trouble for accessing the software’s code and
making changes. This is the reason that these types of software almost always
require users to agree to a lengthy Terms and Conditions document. These terms
are binding between the user and the software developer and making any changes
is forbidden.

Prepared By- Jhalnath Chapagain

You might also like