You are on page 1of 35

Web Technology

Unit-1

Internet :-
Internet is a global network that connects billions of computers across the world with each
other and to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect
billions of computer users worldwide. It is set up by using cables such as optical fibers and other
wireless and networking technologies. At present, internet is the fastest mean of sending or
exchanging information and data between computers across the world.
Internet is called a network as it creates a network by connecting computers and servers across
the world using routers, switches and telephone lines, and other communication devices and
channels. So, it can be considered a global network of physical cables such as copper telephone
wires, fiber optic cables, tv cables, etc. Furthermore, even wireless connections like 3G, 4G, or
Wi-Fi make use of these cables to access the Internet.
Internet is different from the World Wide Web as the World Wide Web is a network of
computers and servers created by connecting them through the internet. So, the internet is the
backbone of the web as it provides the technical infrastructure to establish the WWW and acts
as a medium to transmit information from one computer to another computer. It uses web
browsers to display the information on the client, which it fetches from web servers.

Internet Connection Protocols :-


Protocols are a set of guidelines that aid in regulating the operation of any specific organization
or technology.
Three main categories of Internet Connection Protocols are discussed below:
o TCP/IP Network Model: The most popular protocols for linking networks are
Transmission Control Protocol (TCP) and Internet Protocol (IP). Any communication is
split up into a number of packets that are sent from source to destination.
o File Transfer Protocol: With the help of FTP (File Transfer Protocol), a user can transfer
documents, text files, multimedia files, program files, etc., from one device to another.
o Hypertext Transfer Protocol: It is used to move a hypertext between two or more
computers or other devices. Links can be made using HTML tags and can take the form
of text or graphics.
How Does the Internet Work?

Computers that we use every day are called clients because they are indirectly connected to the
Internet through an internet service provider. When you open a webpage on your computer,
you connect to the webpage, and then you can access it. Computers break the information into
smaller pieces called packets, which are reassembled in their original order.

If we put the right address on a packet and send it to any computer which is connected as part
of the internet, each computer would figure out which cable to send it down next so that it
would get to its destination. With several computers on a network, it may create confusion
even with unique addresses. This transfer of messages is handled by the Packet Routing
Network, and hence a router is required to set up.

The Transfer Control Protocol is another system that makes sure no packet is lost or left behind
because it might create a disrupted message at the receiving end.

The below are the steps for how the message is transferred.

1. First, Computer1 sends a message by IP address to Computer2


2. The message sent by Computer1 is broken into small pieces- packets.
3. These small pieces- packets are transferred concerning Transfer Protocol so that the
quality is maintained.
4. Finally, these small pieces- packets reach Computer2 and are reassembled at their IP
address.

The Internet works in a more complex manner than these above-given steps, but this might
give a basic idea of how the internet works.

Uses of the internet

Generally speaking, the Internet may be used to exchange information with people all over the
world, communicate across great distances, and locate information or answers fast on almost
any subject.

Here are some examples of specific uses for the Internet:

o Using social media and content sharing.


o Instant messaging, video conferencing, Internet Relay Chat (IRC), Internet telephony,
and email are all examples of electronic communication. These all are used through the
Internet.
o Access to online degree programs, courses, and workshops for education and self-
improvement.
o Searching for jobs: To advertise available positions, submit job applications, and hire
candidates identified on social networking sites like LinkedIn, both employers and
applicants use the Internet.

Other examples include:

o Online dating
o Online gaming
o Research
o Reading electronic newspapers and magazines
o Online shopping, or e-commerce.
o Online discussion groups and forums

History of the Internet

The forerunner of the Internet, the ARPANet, went live for the first time in 1969. The TCP/IP,
open networking protocol suite, was adopted by the ARPANet in 1983, and the National Science
Foundation Network (NSFN) developed the network to link university computer science
departments across the US in 1985.

When the hypertext transfer protocol (HTTP) was developed in 1989, it enabled different
computer platforms to connect to the same Internet sites, which dramatically improved
communications over the network. The Mosaic Web browser was developed in 1993.

Over the years of its existence, the Internet has remained a constant growth and development.
For instance, IPv6 was created to provide for a significant future rise in the number of IP
addresses that could be used. In a related development, the Internet of Things (IoT) refers to
the rapidly developing environment where nearly any entity or device can be given a unique
identifier (UID) and the capability to communicate data automatically over the Internet.

Evolution of the Internet :-


Although the Internet was developed much earlier, it only became popular in households in the
1990s. The emergence of the Internet can be tracked by how many businesses and homes
started changing the way they worked and started connecting their laptops and other devices
to the Internet. However, the concept of hypertext transfer protocol (HTTP) as we know it
today, was created only during this time. This meant that people could access the same web
pages on their devices now and share information.
There has been a dramatic growth in the number of internet users since its inception. As a
result, the number of computer networks that are connected has grown exponentially too. It
started with only connecting less than ten computers initially. Today, 440 million computers can
be connected directly, making life easier for people across the globe. Sharing information and
knowledge has become extremely easy for those that have access to the Internet. The country
with the highest number of internet users is China, with 1.4 billion users, followed by India with
1.3 billion and the United States of America with a little over 0.3 billion users.

Different ways to Connect to the Internet


The various methods for connecting to the Internet are briefly discussed below:
o Dial-Up: Users must connect their phone line to a computer system in such connections
in order to access the Internet connection. The user is unable to make or receive calls
using the tier home phone service while connected.
o Broadband: Today's most popular high-speed internet connection, broadband is offered
either by cable or phone companies.
o Wireless Connection: This category includes Mobile and Wi-Fi services providers. No
matter where you are, you can connect to the Internet anywhere because connectivity
is made possible by radio waves. Several instances of wireless connections are provided
below:
o Wi-fi: Without the use of cables, wi-fi or wireless fidelity, enables high-speed internet
connectivity.
o Mobile Phones: In modern times, all smartphones include an Internet connectivity
option that can be availed using Internet packs and coupons. These don't require a wire
or external connection as well.
o Satellite: Satellites are utilized for wireless Internet connectivity in areas Where
broadband connections is not available.
o Integrated Services Digital Network: With the help of using telephone lines, ISDN
enables users to send audio or video data.

Advantages of the Internet:


o Instant Messaging: You can send messages or communicate to anyone using internet,
such as email, voice chat, video conferencing, etc.
o Get directions: Using GPS technology, you can get directions to almost every place in a
city, country, etc. You can find restaurants, malls, or any other service near your
location.
o Online Shopping: It allows you to shop online such as you can be clothes, shoes, book
movie tickets, railway tickets, flight tickets, and more.
o Pay Bills: You can pay your bills online, such as electricity bills, gas bills, college fees, etc.
o Online Banking: It allows you to use internet banking in which you can check your
balance, receive or transfer money, get a statement, request cheque-book, etc.
o Online Selling: You can sell your products or services online. It helps you reach more
customers and thus increases your sales and profit.
o Work from Home: In case you need to work from home, you can do it using a system
with internet access. Today, many companies allow their employees to work from
home.
o Entertainment: You can listen to online music, watch videos or movies, play online
games.
o Cloud computing: It enables you to connect your computers and internet-enabled
devices to cloud services such as cloud storage, cloud computing, etc.
o Career building: You can search for jobs online on different job portals and send you CV
through email if required.

Disadvantages of the Internet


o Time wastage: Although, Internet has a lot of advantages, it also contains some
limitations. Time wasting is one of among them. It can decrease your productivity if you
are spending too much time on the Internet using social media apps while doing
nothing. Rather than squandering time, one should use that time to do something useful
and even more productive.
o Bad impacts on health: You can get health related issues if you spend too much time
online; your body needs outside activities, exercise, and many other things. If you look
at the screen for a long time, it causes negative effects on the eyes.
o Cyber Crimes: These days, crimes including cyberbullying, spam, viruses, hacking, and
data theft are increasing day by day. Cybercriminals can quickly break into your system,
which store all of your private information.
o Effects on children: The constant watching of videos and playing games on the Internet
by young children is bad for their social and overall personality development.
o Bullying and spreading negativity: Social media applications have provided a free tool
to all those people who regularly attempt to spread negativity with really repulsive and
humiliating comments and try to bully each other, which is wrong and does bad impact
on society.

Internet Addressing
Internet addressing refers to the system and protocols used to identify and locate devices,
resources, and services on the internet. It's a fundamental aspect of how data is transmitted
and routed across the global network. Internet addressing allows devices to communicate with
each other by specifying the source and destination of data packets.
Internet addressing primarily involves two key components: IP addresses and domain names.
1. IP Addresses: IP stands for Internet Protocol, and an IP address is a unique numerical
label assigned to each device connected to a computer network that uses the Internet
Protocol for communication. IP addresses come in two main types: IPv4 (32-bit
addresses) and IPv6 (128-bit addresses). IPv4 addresses are more common but are
running out due to the growth of the internet. IPv6 was introduced to address this
shortage and provide a vastly larger pool of addresses.
Types Of IP Address :-
There are two main types of IP addresses: IPv4 and IPv6. Each type has its own format and
characteristics.
1. IPv4 (Internet Protocol version 4) Addresses:
 IPv4 addresses are 32-bit numerical labels.
 They are typically written as four sets of decimal numbers separated by periods
(dots). Each set represents 8 bits, making up a total of 32 bits.
 Example IPv4 address: 192.168.0.1
 IPv4 addresses are in short supply due to the rapid growth of the internet, which
has led to the adoption of IPv6.
2. IPv6 (Internet Protocol version 6) Addresses:
 IPv6 addresses are 128-bit numerical labels.
 They are written in hexadecimal notation and consist of eight groups of four
hexadecimal digits, separated by colons.
 IPv6 was introduced to address the limitations of IPv4 and to provide a vastly
larger address space.
 Example IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Additionally, within IPv4 and IPv6, IP addresses can be categorized into different classes based
on their purpose and scope:
1. Public IP Addresses:
 Public IP addresses are globally unique addresses assigned to devices connected
directly to the internet.
 They allow devices to be identified and communicate across the internet.
 Public IP addresses are assigned by Internet Service Providers (ISPs) and are
registered in public databases.
2. Private IP Addresses:
 Private IP addresses are used within private networks (like home or office
networks) to identify devices within that network.
 These addresses are not globally unique and are intended for use within a
specific local network.
 They are often used for network address translation (NAT) to enable multiple
devices in a local network to share a single public IP address.
3. Dynamic IP Addresses:
 Dynamic IP addresses are assigned to devices temporarily by an ISP's DHCP
(Dynamic Host Configuration Protocol) server.
 These addresses change periodically, usually whenever the device connects to
the network.
 They are commonly used for residential internet connections.
4. Static IP Addresses:
 Static IP addresses are manually assigned to a device and remain constant over
time.
 They are often used for servers, websites, and other devices that need a
consistent, easily reachable address.

2. Domain Names: Domain names are user-friendly textual labels used to identify
resources on the internet, like websites and services. They provide a human-readable
format that is easier to remember than IP addresses. Domain names are organized
hierarchically, with the top-level domain (TLD) being the rightmost part (e.g., .com, .org,
.net), followed by the second-level domain (SLD) which is the name chosen by the entity
owning the domain. The complete domain name is followed by the top-level domain
(TLD) and might include subdomains as well.
For example, in the domain name "www.example.com":
 "www" is the subdomain.
 "example" is the second-level domain.
 "com" is the top-level domain.
Domain names are translated into IP addresses through the Domain Name System (DNS), which
acts as a global distributed directory for translating human-readable domain names into
machine-readable IP addresses.
Together, IP addresses and domain names enable effective communication on the internet.
When you enter a domain name into your browser's address bar, your computer uses DNS to
look up the corresponding IP address, which is then used to establish a connection to the target
server.
Internet addressing is crucial for routing data across the vast and interconnected network of
devices and services that make up the modern internet.

ISP: Internet Service Provider


ISP stands for Internet Service Provider. It is a company that provides access to the internet and
similar services such as Website designing and virtual hosting. For example, when you connect
to the Internet, the connection between your Internet-enabled device and the internet is
executed through a specific transmission technology that involves the transfer of information
packets through an Internet Protocol route.

History
The first Internet Service Provider was Telenet. Telenet was the commercialized version of the
ARPANET – a precursor to the internet, of sorts. Telenet was introduced in 1974. Since then,
many Internet Service Providers have entered the scene and this was partly because of the
proliferation of the internet as a commodity that fuelled the consumerist attitude of the
people. Pretty soon, an Internet Service Provider called “The World” came to be in vogue and
ever since it started serving its customers today in 1989 has cemented itself as the first
archetypal Internet Service Provider. Examples of major Internet Service Providers include
Google Fiber, Verizon, Jio, AT&T etc.

Characteristics
 E-mail Account: Many Internet Service Providers offer an e-mail address to their
consumers.
 User Support: Professionals and an increasing number of lay users prefer an ISP that can
provide them with customer support so that they have someone they can refer to if
things go awry.
 Access to high-speed internet: Probably the most obvious item on this list as this
feature of an Internet Service Provider lies literally in its name. Furthermore, the higher
the speed an Internet Service Provider can offer one, the better it’s standing in the
market and the more customers it can attract.
 Spam Blocker: An Internet Service Provider that hinders its customers’ productivity by
way of not blocking spam and displaying frequent ads is not something that is generally
favoured in the market today. Therefore, many of the Internet Service Providers offer
spam blocking features to their customers.
 Web Hosting: Some of the ISPs offer web hosting services to their clientele as well.

Different types of ISP connections


 DSL - digital subscriber line
 Wi-Fi broadband
 mobile broadband
 fibre optic broadband
 cable broadband

List of ISP
 Reliance Jio
 Vodafone Idea
 Airtel
 BSNL
 Hathway
Advantages
The customer need not then bother with either the technicalities or finances of investing
and inventing a web browser to work with. An ISP can readily do all of this for its customers.
 Many ISPs, being professional companies, provide its clientele with high-speed internet
and that is not possible if one decides to sidesteps these companies.
 ISPs offer a very high degree of reliability and availability
 The ISPs are secure – they offer a tremendous deal of protection against viruses and use
only the latest software patches whilst operating and thereby, maintaining the integrity
of the browser.
 User do not need to invest in user’s own web server.
 ISP’s should give the best uptime guarantee.

Disadvantages
 Because of the range of options available in the market and due to cut-throat
competition, some of the ISPs have been accused of violating the customers’ trust by
way of inflated pricing, data losses, etc. It is true that using an ISP makes the customer
entirely dependent on it.
 If an Internet Service Provider is stretched thin because of hosting too many sites on a
shared server, it can compromise the quality of the customers’ data by way of slow
download rates and poor performance of websites.
 User need to trust user’s ISP for uptime and security.
 ISP can directly affect user if the it gets blacklisted.

WWW - World Wide Web :-


World Wide Web, which is also known as a Web, is a collection of websites or web pages stored
in web servers and connected to local computers through the internet. These websites contain
text pages, digital images, audios, videos, etc. Users can access the content of these sites from
any part of the world over the internet using their devices such as computers, laptops, cell
phones, etc. The WWW, along with internet, enables the retrieval and display of text and media
to your device.
The building blocks of the Web are web pages which are formatted in HTML and connected by
links called "hypertext" or hyperlinks and accessed by HTTP.
Difference between World Wide Web and Internet:
Some people use the terms 'internet' and 'World Wide Web' interchangeably. They think they
are the same thing, but it is not so. Internet is entirely different from WWW. It is a worldwide
network of devices like computers, laptops, tablets, etc. It enables users to send emails to other
users and chat with them online. For example, when you send an email or chatting with
someone online, you are using the internet.

Internet – Connecting Computers


www – Connecting Peoples

But, when you have opened a website like google.com for information, you are using the World
Wide Web; a network of servers over the internet. You request a webpage from your computer
using a browser, and the server renders that page to your browser. Your computer is called a
client who runs a program (web browser), and asks the other computer (server) for the
information it needs.

History of the World Wide Web:


The World Wide Web was invented by a British scientist, Tim Berners-Lee in 1989. He was
working at CERN at that time. Originally, it was developed by him to fulfill the need of
automated information sharing between scientists across the world, so that they could easily
share the data and results of their experiments and studies with each other.
CERN, where Tim Berners worked, is a community of more than 1700 scientists from more than
100 countries. These scientists spend some time on CERN site, and rest of the time they work at
their universities and national laboratories in their home countries, so there was a need for
reliable communication tools so that they can exchange information.
Internet and Hypertext were available at this time, but no one thought how to use the internet
to link or share one document to another. Tim focused on three main technologies that could
make computers understand each other, HTML, URL, and HTTP. So, the objective behind the
invention of WWW was to combine recent computer technologies, data networks, and
hypertext into a user-friendly and effective global information system.
Working of WWW:
The World Wide Web is based on several different technologies: Web browsers, Hypertext
Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
A Web browser is used to access web pages. Web browsers can be defined as programs which
display text, data, pictures, animation and video on the Internet. Hyperlinked resources on the
World Wide Web can be accessed using software interfaces provided by Web browsers.
Initially, Web browsers were used only for surfing the Web but now they have become more
universal. Web browsers can be used for several tasks including conducting searches, mailing,
transferring files, and much more. Some of the commonly used browsers are Internet Explorer,
Opera Mini, and Google Chrome.
Features of WWW:
 HyperText Information System
 Cross-Platform
 Distributed
 Open Standards and Open Source
 Uses Web Browsers to provide a single interface for many services
 Dynamic, Interactive and Evolving.
 “Web 2.0”

Components of the Web: There are 3 components of the web:

1. Uniform Resource Locator (URL): serves as a system for resources on the web.
2. HyperText Transfer Protocol (HTTP): specifies communication of browser and server.
3. Hyper Text Markup Language (HTML): defines the structure, organisation and content
of a webpage.

DNS :- Domain Name System


o DNS is a directory service that provides a mapping between the name of a host on the
network and its numerical address.
o DNS is required for the functioning of the internet.
o Each node in a tree has a domain name, and a full domain name is a sequence of
symbols specified by dots.
o DNS is a service that translates the domain name into IP addresses. This allows the users
of networks to utilize user-friendly names when looking for other hosts instead of
remembering the IP addresses.
o For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50, most
people would reach this site by specifying ftp.EduSoft.com. Therefore, the domain name
na
is more reliable than IP address.
DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into
three different sections: generic domains, country domains, and inverse domain.

Generic Domains
o It defines the registered hos
hosts according to their generic behavior.
o Each node in a tree defines the domain name, which is an index to the DNS database.
o It uses three-character
character labels, and these labels describe the organization type.

Label Description

com Commercial Organizations

edu Educational institutions

gov Government institutions

info Information service providers

mil Military groups

name Personal names


net Network Support centers

org Nonprofit Organizations

Country Domain
The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States, .in for INDIA) in place of three character
organizational abbreviations.

Inverse Domain
The inverse domain is used for mapping an address to a name. When the server has received a
request from the client, and the server contains the files of only authorized clients. To
determine whether the client is on the authorized list or not, it sends a query to the DNS server
and ask for mapping an address to the name.

Working of DNS
o DNS is a client/server network communication protocol. DNS clients send requests to
the. server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a
forward DNS lookups while requests containing an IP address which is converted into a
name known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts available on
the internet.
o If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP
address of a hostname. If DNS server does not contain the IP address associated with a
hostname, then it forwards the request to another DNS server. If IP address has arrived
at the resolver, which in turn completes the request over the internet protocol

URL: Uniform Resource Locator


URL stands for Uniform Resource Locator. It is the address of a resource, which can be a specific
webpage or a file, on the internet. It is also known as web address when it is used with http. It
was created in 1994 by Tim Berners-Lee. URL is a specific character string that is used to access
data from the World Wide Web. It is a type of URI (Uniform Resource Identifier).
Every URL contains the following information:
o The scheme name or protocol.
o A colon, two slashes.
o A host, normally called a domain name but sometimes as a literal IP address.
o A colon followed by a port number.
o Full path of the resource.
The URL of a web page is displayed above on the page in the address bar. A typical URL looks
like this:

http://www.javatpoint.com/full-form
The above URL contains:
o protocol: http
o host or domain: www.javatpoint.com
o Path of the resource: /full-form
A URL can be entered manually by typing it in the address bar of your web browser. If the URL
does not contain a valid server, a browser may display a "Server not found" error and if the
path in the URL is incorrect, the browser may display a "404 error". A URL does not contain
spaces and uses forward slashes to represent different directories. So, dashes and underscores
are used separate the words of a web address.

URI
URI stands for Uniform Resource Identifier. It is a generic term for all the name and addresses
which show objects on the World Wide Web. It is generally a sequence of characters which
identifies a logical resource or the name and location of a file or resource in a uniform format.

HTTP :-
HTTP stands for HyperText Transfer Protocol. Tim Berner invents it. HyperText is the type of
text which is specially coded with the help of some standard coding language called HyperText
Markup Language (HTML). HTTP/2 is the successor version of HTTP, which was published on
May 2015. HTTP/3 is the latest version of HTTP, which is published in 2022.
The protocol used to transfer hypertext between two computers is known as HyperText
Transfer Protocol.
HTTP provides a standard between a web browser and a web server to establish
communication. It is a set of rules for transferring data from one computer to another. Data
such as text, images, and other multimedia files are shared on the World Wide Web. Whenever
a web user opens their web browser, the user indirectly uses HTTP. It is an application protocol
that is used for distributed, collaborative, hypermedia information systems.

Working of HTTP
First of all, whenever we want to open any website then first open a web browser after that we
will type the URL of that website (e.g., www.facebook.com ). This URL is now sent to Domain
Name Server (DNS). Then DNS first check records for this URL in their database, then DNS will
return the IP address to the web browser corresponding to this URL. Now the browser is able to
send requests to the actual server.
After the server sends data to the client, the connection will be closed. If we want something
else from the server we should have to re-establish the connection between the client and the
server.
HTTP Connection
HTTP Request
HTTP request is simply termed as the information or data that is needed by Internet browsers
for loading a website. This is simply known as HTTP Request.
There is some common information that is generally present in all HTTP requests. These are
mentioned below.
 HTTP Version
 URL
 HTTP Method
 HTTP Request Headers
 HTTP Body
HTTP Request Headers
HTTP Request Headers generally store information in the form of key-value and must be
present in each HTTP Request. The use of this Request Header is to provide core information
about the client’s information, etc.
HTTP Request Body
HTTP Request Body simply contains the information that has to be transferred. HTTP Request
has the information or data to be sent to these browsers.
HTTP Method
HTTP Methods are simply HTTP Verb. In spite of being present so many HTTP Methods, the
most common HTTP Methods are HTTP GET and HTTP POST. These two are generally used in
HTTP cases. In HTTP GET, the information is received in the form of a website.
HTTP Response
HTTP Response is simply the answer to what a Server gets when the request is raised. There are
various things contained in HTTP Response, some of them are listed below.
 HTTP Status Code
 HTTP Headers
 HTTP Body

HTTP Response
HTTP Response Headers
HTTP Response headers are simply like an HTTP Request where it has that work to send some
important files and data to the HTTP Response Body.
HTTP Response Body
HTTP Responses are the responses that are received successfully upon the request. Generally, it
comes under the requests generated by the web. In most cases, the request is of transferring
the HTML data into a webpage.
HTTP Status Code
HTTP Status Codes are the 3-Digit codes that tell the message or simply tell us about the HTTP
Request whether it has been completed or not.
History of HTTP
Tim Berners Lee and his team at CERN get credit for inventing original HTTP and associated
technologies.
 HTTP version 0.9: This was the first version of HTTP which was introduced in 1991.
 HTTP version 1.0: In 1996, RFC 1945 (Request For Comments) was introduced in HTTP
version 1.0.
 HTTP version 1.1: In January 1997, RFC 2068 was introduced in HTTP version 1.1.
Improvements and updates to the HTTP version 1.1 standard were released under RFC
2616 in June 1999.
 HTTP version 2.0: The HTTP version 2.0 specification was published as RFC 7540 on May
14, 2015.
 HTTP version 3.0: HTTP version 3.0 is based on the previous RFC draft. It is renamed as
Hyper-Text Transfer Protocol QUIC which is a transport layer network protocol
developed by Google.
Characteristics of HTTP
 The server processes a request, which is raised by the client, and also server and client
know each other only during the current bid and response period.
 Any type of content can be exchanged as long as the server and client are compatible
with it.
 Once data is exchanged, servers and clients are no longer connected.
 It is a request and response protocol based on client and server requirements.
 It is a connection-less protocol because after the connection is closed, the server does
not remember anything about the client and the client does not remember anything
about the server.
 It is a stateless protocol because both client and server do not expect anything from
each other but they are still able to communicate.
Advantages of HTTP
 Memory usage and CPU usage are low because of fewer simultaneous connections.
 Since there are few TCP connections hence network congestion is less.
 Since handshaking is done at the initial connection stage, then latency is reduced
because there is no further need for handshaking for subsequent requests.
 The error can be reported without closing the connection.
 HTTP allows HTTP pipe-lining of requests or responses.
Disadvantages of HTTP
 HTTP requires high power to establish communication and transfer data.
 HTTP is less secure because it does not use any encryption method like HTTPS and use
TLS to encrypt regular HTTP requests and response.
 HTTP is not optimized for cellular phones and it is too gabby.
 HTTP does not offer a genuine exchange of data because it is less secure.
 The client does not close the connection until it receives complete data from the server;
hence, the server needs to wait for data completion and cannot be available for other
clients during this time.

HTTPs :-
HTTPS is an abbreviation of Hypertext Transfer Protocol Secure. It is a secure extension or
version of HTTP. This protocol is mainly used for providing security to the data sent between a
website and the web browser. It is widely used on the internet and used for secure
communications. This protocol uses the 443 port number for communicating the data.
This protocol is also called HTTP over SSL because the HTTPS communication protocols are
encrypted using the SSL (Secure Socket Layer).
By default, it is supported by various web browsers. Those websites which need login
credentials should use the HTTPS protocol for sending the data.
It allows users to create a secured encrypted connection and helps them to protect their
information from being stolen.
Difference between HTTP and HTTPS

HTTP HTTPS

1. It is an abbreviation of Hypertext 1. It is an abbreviation of Hypertext


Transfer Protocol Transfer Protocol Secure.

2. This protocol operates at the 2. This protocol operates at the transport


application layer. layer.

3. The data which is transferred in HTTP 3. The data which is transferred in HTTPS is
is plain text. encrypted, i.e., ciphertext.

4. By default, this protocol operates on 4. By default, this protocol operates on


port number 80. port number 443.

5. The URL (Uniform Resource Locator) of 5. The URL (Uniform Resource Locator) of
HTTP start with http:// HTTPS start with https://

6. This protocol does not need any 6. But, this protocol requires an SSL
certificate. (Secure Socket Layer) certificate.
7. Encryption technique is absent in 7. Encryption technique is available or
HTTP. present in HTTPS.

8. The speed of HTTP is fast as compared 8. The speed of HTTPS is slow as compared
to HTTPS. to HTTP.

9. It is un-secure. 9. It is highly secure.

10. Examples of HTTP websites are 10. Examples of HTTPS websites are
Educational Sites, Internet Forums, etc. shopping websites, banking websites, etc.

Advantages of HTTPS
o The main advantage of HTTPS is that it provides high security to users.
o Data and information are protected. So, it ensures data protection.
o SSL technology in HTTPS protects the data from third-party or hackers. And this
technology builds trust for the users who are using it.
o It helps users by performing banking transactions.
Disadvantages of HTTPS
o The big disadvantage of HTTPS is that users need to purchase the SSL certificate.
o The speed of accessing the website is slow because there are various complexities in
communication.
o Users need to update all their internal links.

SSL - Secure Sockets Layer


Secure Sockets Layer (SSL) is a standard technique for transmitting documents securely across a
network. SSL technology, created by Netscape, establishes a secure connection between a Web
server and a browser, ensuring private and secure data transmission. SSL communicates using
the Transport Control Protocol (TCP).
The term "socket" in SSL refers to the method of sending data via a network between a client
and a server.
A Web server requires an SSL certificate to establish a secure SSL connection while using SSL for
safe Internet transactions. SSL encrypts network connection segments atop the transport layer,
a network connection component above the program layer.
How Does SSL Work?
SSL encrypts data communicated across the web to guarantee a high level of privacy. Anyone
attempting to intercept this data will meet a jumbled mess of characters nearly hard to decrypt.
SSL begins an authentication process known as a handshake between two communicating
devices to confirm that both devices are who they say they are.
SSL also digitally certifies data to ensure data integrity, ensuring that it has not been tampered
with before reaching its intended receiver.
SSL has gone through multiple incarnations, each one more secure than the last. TLS (Transport
Layer Security) was introduced in 1999, replacing SSL.

Objectives of SSL
The goals of SSL are as follows −
 Data integrity − Information is safe from tampering. The SSL Record Protocol, SSL
Handshake Protocol, SSL Change CipherSpec Protocol, and SSL Alert Protocol maintain
data privacy.
 Client-server authentication − The SSL protocol authenticates the client and server
using standard cryptographic procedures.
 SSL is the forerunner of Transport Layer Security (TLS), a cryptographic technology for
secure data transfer over the Internet.

Web Browser
The web browser is an application software to explore www (World Wide Web). It provides an
interface between the server and the client and requests to the server for web documents and
services. It works as a compiler to render HTML which is used to design a webpage. Whenever
we search for anything on the internet, the browser loads a web page written in HTML,
including text, links, images, and other items such as style sheets and JavaScript functions.
Google Chrome, Microsoft Edge, Mozilla Firefox, and Safari are examples of web browsers.
History of the Web Browser :- The first web browser WorldWideWeb was invented in the
year of 1990 by Tim Berners-Lee. Later, it becomes Nexus. In the year of 1993, a new browser
Mosaic was invented by Mark Andreessen and their team. It was the first browser to display
text and images at a time on the device screen. He also invents another browser Netscape in
1994. Next year Microsoft launched a web browser Internet Explorer which was already
installed in the Windows operating system. After this many browsers were invented with
various features like Mozilla Firefox, Google Chrome, Safari, Opera, etc.
How does a browser work?
o When a user enters something (like javatpoint.com) in the browser. This request goes to
a domain name server.
o The browser sends the user request to the server using an IP address, which is described
by the domain name server.
o The domain name server sends an IP address to the web server that hosts the website.
o The server sends the information back to the IP address, which is defined by the
browser at the time of the request. The requested page may include links to other files
on the same server, like images, for which the browser also requests the server.
o The browser gathers all the information requested by the user, and displays on your
device screen in the form of web pages.
Some Popular Web Browsers
1. Google Chrome:
Developed by Google, Chrome is one of the most widely-used web browsers in the world,
known for its speed and simplicity.
2. Mozilla Firefox:
Developed by the Mozilla Foundation, Firefox is an open-source browser that is known for its
privacy features and customization options.
3. Apple Safari:
Developed by Apple, Safari is the default browser on Mac and iOS devices and is known for its
speed and integration with other Apple products.
4. Microsoft Edge:
Developed by Microsoft, Edge is the default browser on Windows 10 and is known for its
integration with other Microsoft products and services.
5. Opera:
Developed by Opera Software, Opera is a web browser that is known for its speed and built-in
VPN feature.
6. Brave:
Developed by Brave Software, Brave is a web browser that is focused on privacy and security
and blocks third-party ads and trackers by default.
7. Tor Browser:
Developed by The Tor Project, Tor Browser is a web browser that is designed for anonymous
web browsing and is based on Mozilla Firefox.

Cookies :-
Cookies are small files which are stored on a user’s computer. They are used to hold a modest
amount of data specific to a particular client and website and can be accessed either by the
web server or by the client computer
When cookies were invented, they were basically little documents containing information
about you and your preferences. For instance, when you select your language in which you
want to view your website, the website would save the information in a document called a
cookie on your computer, and the next time when you visit the website, it would be able to
read a cookie saved earlier. That way the website could remember your language and let you
view the website in your preferred language without having to select the language again.
A cookie can contain any type of information such as the time when you visited the website,
the items that you added into your shopping basket, all the links you clicked in website, etc.,
Who can access?
If a cookie is created in a particular website, and you visit another website later, the latter
would not be able to read the contents from the first website, in other words only the same
website that saves information to a cookie can access it.
Types of internet Cookies
Session Cookies: A session cookie only lasts for the duration of users using the website. A web
browser normally deletes session cookies when it quits. A session cookie expires if the user
does not access the website for a period of time chosen by the server(idle timeout). They only
last for the duration of time we are on the site. If someone comes and uses our computer, they
would not be able to see anything on the sites that use session cookies, because they need to
enter the username and password again.
Persistent Cookies: A persistent cookie outlast user sessions. If a persistent cookie has its
maximum age 1 year, then within a year, the initial value set in the cookie would be sent back
to the server every time the user visits the server. This could be used to record a vital piece of
information such as how the user initially came to the website. For this reason, persistent
cookies are also called tracking cookies. These are kind of cookies are used on websites that
need to know who we are but offer us the ability to “remember me” when you enter username
and password. Example: Gmail.
Third-party cookies: Third party cookies are the cookies being set with the different domain
than the one shown in the address bar. For example, if you were to visit Sendflowers.com, it
may set the cookie for the address of SomeAdvertiser.com. Later, when you visit
RebuidEngines.com it may set the cookie for SomeAdvertiser.com. Both of these cookies will be
used by SomeAdvertiser.com to ascertain that you are a person who sends flowers and works
on cars. These are used by advertising agencies who have clients that pay for displaying ads for
products and services but don’t want to waste money displaying them to people who aren’t
going to be a customer.

HTTP Cookies: When you send a request to the server, the server sends a reply in which it
embeds the cookie which serves as an identifier to identify the user. So, next time when you
visit the same website, the cookie lets the server know that you are visiting the website again.

Web Server:
Web server is a program which processes the network requests of the users and serves them
with files that create web pages. This exchange takes place using Hypertext Transfer Protocol
(HTTP).
Basically, web servers are computers used to store HTTP files which makes a website and when
a client requests a certain website, it delivers the requested website to the client. For example,
you want to open Facebook on your laptop and enter the URL in the search bar of google. Now,
the laptop will send an HTTP request to view the facebook webpage to another computer
known as the webserver. This computer (webserver) contains all the files (usually in HTTP
format) which make up the website like text, images, gif files, etc. After processing the request,
the webserver will send the requested website-related files to your computer and then you can
reach the website.
Key Points
 When client sends request for a web page, the web server search for the requested
page if requested
ested page is found then it will send it to client with an HTTP response.
 If the requested web page is not found, web server will the send an HTTP
response:Error 404 Not found.
 If client has requested for some other resources then the web server will contact
conta to the
application server and data store to construct the HTTP response.

Examples

S.N. Web Server Descriptino

1 Apache HTTP Server


This is the most popular web server in the world developed by the Apache
Software Foundation. Apache web server is an open source software and can be
installed on almost all operating systems including Linux, UNIX, Windows,
FreeBSD, Mac OS X and more. About 60% of the web server machines run the
Apache Web Server.
2. Internet Information Services (IIS)
The Internet Information Server (IIS) is a high performance Web Server from
Microsoft. This web server runs on Windows NT/2000 and 2003 platforms (and
may be on upcoming new Windows version also). IIS comes bundled with
Windows NT/2000 and 2003; Because IIS is tightly integrated with the operating
system so it is relatively easy to administer it.

3. Lighttpd
The lighttpd, pronounced lighty is also a free web server that is distributed with
the FreeBSD operating system. This open source web server is fast, secure and
consumes much less CPU power. Lighttpd can also run on Windows, Mac OS X,
Linux and Solaris operating systems.

4. Sun Java System Web Server


This web server from Sun Microsystems is suited for medium and large web sites.
Though the server is free it is not open source. It however, runs on Windows,
Linux and UNIX platforms. The Sun Java System web server supports various
languages, scripts and technologies required for Web 2.0 such as JSP, Java
Servlets, PHP, Perl, Python, and Ruby on Rails, ASP and Coldfusion etc.

5. Jigsaw Server
Jigsaw (W3C's Server) comes from the World Wide Web Consortium. It is open
source and free and can run on various platforms like Linux, UNIX, Windows, and
Mac OS X Free BSD etc. Jigsaw has been written in Java and can run CGI scripts
and PHP programs.

Proxy server
Proxy server refers to a server that acts as an intermediary between the request made by
clients, and a particular server for some services or requests for some resources. There are
different types of proxy servers available that are put into use according to the purpose of a
request made by the clients to the servers. The basic purpose of Proxy servers is to protect the
direct connection of Internet clients and internet resources. The proxy server also prevents the
identification of the client’s IP address when the client makes any request is made to any other
servers.
Types Of Proxy Server
1. Reverse Proxy Server: The job of a reverse proxy server to listen to the request made by
the client and redirect to the particular web server which is present on different servers.
Example – Listen for TCP port 80 website connections which are normally placed in a
demilitarized zone (DMZ) zone for publicly accessible services but it also protects the
true identity of the host. Moreover, it is transparent to external users as external users
will not be able to identify the actual number of internal servers. So, it is the prime duty
of reverse proxy to redirect the flow depending upon the configurations of internal
servers. The request that is made to pass through the private network protected by
firewalls will need a proxy server that is not abiding by any of the local policies. Such
types of requests from the clients are completed using reverse proxy servers. This is also
used to restrict the access of the clients to the confidential data residing on the
particular servers.
2. Web Proxy Server: Web Proxy forwards the HTTP requests, only URL is passed instead
of a path. The request is sent to particular the proxy server responds. Examples, Apache,
HAP Proxy.
3. Anonymous Proxy Server: This type of proxy server does not make an original IP
address instead these servers are detectable still provides rational anonymity to the
client device.
4. Highly Anonymity Proxy: This proxy server does not allow the original IP address and it
as a proxy server to be detected.
5. Transparent Proxy: This type of proxy server is unable to provide any anonymity to the
client, instead, the original IP address can be easily detected using this proxy. But it is
put into use to act as a cache for the websites. A transparent proxy when combined with
gateway results in a proxy server where the connection requests are sent by the client ,
then IP are redirected. Redirection will occurs without the client IP address
configuration. HTTP headers present on the server-side can easily detect its redirection .
6. CGI Proxy: CGI proxy server developed to make the websites more accessible. It accepts
the requests to target URLs using a web form and after processing its result will be
returned to the web browser. It is less popular due to some privacy policies like VPNs
but it still receives a lot of requests also. Its usage got reduced due to excessive traffic
that can be caused to the website after passing the local filtration and thus leads to
damage to the organization.
7. Suffix Proxy: Suffix proxy server basically appends the name of the proxy to the URL.
This type of proxy doesn’t preserve any higher level of anonymity. It is used for
bypassing the web filters. It is easy to use and can be easily implemented but is used less
due to the more number of web filter present in it.
8. Distorting Proxy: Proxy servers are preferred to generate an incorrect original IP
address of clients once being detected as a proxy server. To maintain the confidentiality
of the Client IP address HTTP headers are used.
9. Tor Onion Proxy: This server aims at online anonymity to the user’s personal
information. It is used to route the traffic through various networks present worldwide
to arise difficulty in tracking the users’ address and prevent the attack of any
anonymous activities. It makes it difficult for any person who is trying to track the
original address. In this type of routing, the information is encrypted in a multi-folds
layer. At the destination, each layer is decrypted one by one to prevent the information
to scramble and receive original content. This software is open-source and free of cost
to use.
10. 12P Anonymous Proxy: It uses encryption to hide all the communications at various
levels. This encrypted data is then relayed through various network routers present at
different locations and thus I2P is a fully distributed proxy. This software is free of cost
and open source to use, It also resists the censorship.
11. DNS Proxy: DNS proxy take requests in the form of DNS queries and forward them to
the Domain server where it can also be cached, moreover flow of request can also be
redirected.
How Does The Proxy Server Operates?
Every computer has its unique IP address which it uses to communicate with another node.
Similarly, the proxy server has its IP address that your computer knows. When a web request is
sent, your request goes to the proxy server first. The Proxy sends a request on your behalf to
the internet and then collect the data and make it available to you. A proxy can change your IP
address So, the webserver will be unable to fetch your location in the world. It protects data
from getting hacked too. Moreover, it can block some web pages
also.
Advantages of Proxy Server
o It improves the security and enhances the privacy of the user.
o It hides the identity (IP address) of the user.
o It controls the traffic and prevents crashes.
o Also, saves bandwidth by caching files and compressing incoming traffic.
o Protect our network from malware.
o Allows access to the restricted content.
Need of Proxy Server
o It reduces the chances of data breaches.
o It adds a subsidiary layer of security between server and outside traffic.
o It also protects from hackers.
o It filters the requests.
Disadvantages of Proxy Server
1. Proxy Server Risks: Free installation does not invest much in backend hardware or
encryption. It will result in performance issues and potential data security issues. If you
install a “free” proxy server, treat very carefully, some of those might steal your credit
card numbers.
2. Browsing history log: The proxy server stores your original IP address and web request
information is possibly unencrypted form and saved locally. Always check if your proxy
server logs and saves that data – and what kind of retention or law enforcement
cooperation policies they follow while saving data.
3. No encryption: No encryption means you are sending your requests as plain text.
Anyone will be able to pull usernames and passwords and account information easily.
Keep a check that proxy provides full encryption whenever you use it.

Web-applications
A web-application is an application program that is usually stored on a remote server, and users
can access it through the use of Software known as web-browser.
Another definition
It is a type of computer program that usually runs with the help of a web browser and also uses
many web technologies to perform various tasks on the internet.
A web application can be developed for several uses, which can be used by anyone like it can be
used as an individual or as a whole organization for several reasons.
In general, a web application can contain online shops (or we can also say them e-commerce
shops), webmail's, calculators, social media platforms, etc. There is also some kind of web
application that usually requires a special kind of web browser to access them. We cannot
access those kinds of web applications by using regular web- browsers. However, most of the
web applications available on the internet can be accessed using a standard web browser.
Apart from that web applications also allow its users to create documents, share them, or share
the data/ information. By using the web application, users can collaborate on same projects by
event when they are not available on the same geographical location.
How does a web- application work?
In general, web-application does not require downloading them because, as we already
discussed, the web application is a computer program that usually resides on the remote
server. Any user can access it by using one of the standard web browsers such as Google
Chrome, Safari, Microsoft Edge, etc., and most of them are available free for everyone.
A web application are generally coded using the languages supported by almost every web-
browsers such as HTML, JavaScript because these are the languages that rely on the web
browsers to render the program executable.
To operate a web- application, we usually required a web server (or we can say some space on
the web-server for our programs/application's code) to manage the clients' upcoming requests
and required an application server.
Benefits of a web application
o Any typical web application can run or accessible on any operating system such as the
Windows, Mac, Linux as long as the browser is compatible.
o A web application is usually not required to install in the hard drive of the computer
system, thus it eliminates all the issues related to the space limitation.
o All the users are able to access the same version of the web application, which
eliminates all compatibility issues.
o They also reduce the expense for end-users, business owners because the maintenance
needed by the business is significantly less.
o Web applications are flexible. A user can work from any geographical location as long as
he has a working internet connection.
o It just takes a moment to create a new user by providing a username, password, and
URL, and it's all.
Disadvantages of the Web Applications
o Internet connection is necessary to access any web application, and without an internet
connection, anyone can't use any of the web applications. It is very typical to get an
internet connection in our modern cities, still rural area internet connectivity not so
well.
o As we all know that many users like to use different web browsers according to their
needs and choices. So while creating a web application, you must remember that your
application must support several web browsers, including new and old versions of
browsers.
o Speed-related issues are also affecting the web application's performance because there
are several factors on which the performance of a web application depends, and these
all factors affect the performance of the web application in their own way.
o A user must have to spend enough money to maintain the good condition of his web
application, provide an update whenever an issue occurs, and make an attractive user
interface, which is not so cheap at all.
o A web application must be programmed/ coded in such a way that it will be run
regardless of the device's operating system.
o A web application may face some issues while running on Windows, Android, or several
other operating systems if it is not responsive.

PRINCIPLES OF GOOD WEBSITE DESIGN


An effective website design should fulfil its intended function by conveying its particular
message whilst simultaneously engaging the visitor. Several factors such as consistency,
colours, typography, imagery, simplicity, and functionality contribute to good website design.
When designing a website there are many key factors that will contribute to how it is
perceived. A well-designed website can help build trust and guide visitors to take action.
Creating a great user experience involves making sure your website design is optimised for
usability (form and aesthetics) and how easy is it to use (functionality).
Below are some guidelines that will help you when considering your next web project.
1. WEBSITE PURPOSE
Your website needs to accommodate the needs of the user. Having a simple clear intention on
all pages will help the user interact with what you have to offer. What is the purpose of your
website? Are you imparting practical information like a ‘How to guide’? Is it an entertainment
website like sports coverage or are you selling a product to the user? There are many different
purposes that websites may have but there are core purposes common to all websites;
1. Describing Expertise
2. Building Your Reputation
3. Generating Leads
4. Sales and After Care
2. SIMPLICITY
Simplicity is the best way to go when considering the user experience and the usability of your
website. Below are ways to achieve simplicity through design.
Colour
Colour has the power to communicate messages and evoke emotional responses. Finding a
colour palette that fits your brand will allow you to influence your customer’s behaviour
towards your brand. Keep the colour selection limited to less than 5 colours. Complementary
colours work very well. Pleasing colour combinations increase customer engagement and make
the user feel good.
Type
Typography has an important role to play on your website. It commands attention and works as
the visual interpretation of the brand voice. Typefaces should be legible and only use a
maximum of 3 different fonts on the website.
Imagery
Imagery is every visual aspect used within communications. This includes still photography,
illustration, video and all forms of graphics. All imagery should be expressive and capture the
spirit of the company and act as the embodiment of their brand personality. Most of the initial
information we consume on websites is visual and as a first impression, it is important that
high-quality images are used to form an impression of professionalism and credibility in the
visitors’ minds.
3. NAVIGATION
Navigation is the wayfinding system used on websites where visitors interact and find what
they are looking for. Website navigation is key to retaining visitors. If the website navigation is
confusing visitors will give up and find what they need elsewhere. Keeping navigation simple,
intuitive and consistent on every page is key.
4. F-SHAPED PATTERN READING
The F- based pattern is the most common way visitors scan text on a website. Eye-tracking
studies have found that most of what people see is in the top and left areas of the screen. The F
shaped layout mimics our natural pattern of reading in the West (left to right and top to
bottom). An effectively designed website will work with a reader’s natural pattern of scanning
the page.

5. VISUAL HIERARCHY
Visual hierarchy is the arrangement of elements in order of importance. This is done either by
size, colour, imagery, contrast, typography, whitespace, texture and style. One of the most
important functions of visual hierarchy is to establish a focal point; this shows visitors where
the most important information is.

6. CONTENT
An effective website has both great design and great content. Using compelling language great
content can attract and influence visitors by converting them into customers.
7. GRID BASED LAYOUT
Grids help to structure your design and keep your content organised. The grid helps to align
elements on the page and keep it clean. The grid
grid-based
based layout arranges content into a clean
rigid grid structure with columns, sections that line up an
andd feel balanced and impose order and
results in an aesthetically pleasing website.
8. LOAD TIME
Waiting for a website to load will lose visitors. Nearly half of web visitors expect a site to load in
2 seconds or less and they will potentially leave a site that isn’t loaded within 3 seconds.
Optimising image sizes will help load your site faster.
9. MOBILE FRIENDLY
More people are using their phones or other devices to browse the web. It is important to
consider building your website with a responsive layout where your website can adjust to
different screens.

Website Navigation and its Importance


Website Navigation, as name suggests, is a way to showing importance and relevance of pages,
content, and information on website. It is way that helps users or visitors to find content that
they want to see. It is simply a way of navigating page
pages,s, content and information on website
using internet. It can be presented in different ways such as spider bars, menus in header or
footer, etc. Simplicity is very essential and important for good website navigation.
Structure of Website Navigation
Structure of website navigation is very important as it have a greater impact on sales, user
experience and SEO (Search Engine Optimization) rankings. It not only includes sketching pages
but also include greater level of abstraction. It is not at all easy to design and organize website.
Let us see an example:
In above diagram, about us, events, media, contact, newspaper, etc., are all linked to home
menu. To have access to other pages such as mission, coming events, new music, etc., you have
to first visit about us, events, media, etc. Then you can open whatever you want to.

Importance of website Navigation


Website navigation is way by which one can easily increase audience or number of visitors on
website. If website navigation is not good and effective, there is not point of having a creative
website because users won’t be able to navigate easily around it to find information they want.
So, it’s very important to keep to simple, effective to increase user experience and keep clients
and visitors happy. Below are given some reasons that will tell you why website navigation is
important. Let’s have a look.
1. Increase duration of visit: Website navigation helps people to find information they
want to see very easily and effectively. Good website navigation provides clear and
simple navigation bars and links that encourages visitors or peoples to explore more and
more. This in turn increase duration of their visit on website because navigation is very
easy to use and understand and nowadays everyone wants it easy to get things.
2. Increased chance of sales: Website navigation generally helps in showing visitors what
website is actually about without any wastage of time. This in turn increase time spent
by visitors on website and visitors stays on website for longer time. Visitors then go
through website and purchase product effortlessly and easily. This will automatically
increase purchase of products and sale.
3. Improved user experience: Navigation is very important for website because without
navigation, websites won’t look good, and appear unorganized. Nowadays, no one to
waste their time on determining how website works. Everyone wants to easily find what
they want. Good navigation generally helps visitors to find information they want to
search and increase speed of visitors search
4. Good Design: Good navigation make website look more attractive, effective and good.
Navigation has a greater impact on how website is viewed by users or visitors and how
longer they will stay on website. Design of website navigation have a greater impact on
success of website. It almost affects traffic, SEO ranking, user experience, conversions,
sales, etc. So, good navigation is very useful to boost website design and brand of
company or business. Good navigation keeps visitors happy and satisfied.

You might also like