Professional Documents
Culture Documents
Unit-1
Internet :-
Internet is a global network that connects billions of computers across the world with each
other and to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect
billions of computer users worldwide. It is set up by using cables such as optical fibers and other
wireless and networking technologies. At present, internet is the fastest mean of sending or
exchanging information and data between computers across the world.
Internet is called a network as it creates a network by connecting computers and servers across
the world using routers, switches and telephone lines, and other communication devices and
channels. So, it can be considered a global network of physical cables such as copper telephone
wires, fiber optic cables, tv cables, etc. Furthermore, even wireless connections like 3G, 4G, or
Wi-Fi make use of these cables to access the Internet.
Internet is different from the World Wide Web as the World Wide Web is a network of
computers and servers created by connecting them through the internet. So, the internet is the
backbone of the web as it provides the technical infrastructure to establish the WWW and acts
as a medium to transmit information from one computer to another computer. It uses web
browsers to display the information on the client, which it fetches from web servers.
Computers that we use every day are called clients because they are indirectly connected to the
Internet through an internet service provider. When you open a webpage on your computer,
you connect to the webpage, and then you can access it. Computers break the information into
smaller pieces called packets, which are reassembled in their original order.
If we put the right address on a packet and send it to any computer which is connected as part
of the internet, each computer would figure out which cable to send it down next so that it
would get to its destination. With several computers on a network, it may create confusion
even with unique addresses. This transfer of messages is handled by the Packet Routing
Network, and hence a router is required to set up.
The Transfer Control Protocol is another system that makes sure no packet is lost or left behind
because it might create a disrupted message at the receiving end.
The below are the steps for how the message is transferred.
The Internet works in a more complex manner than these above-given steps, but this might
give a basic idea of how the internet works.
Generally speaking, the Internet may be used to exchange information with people all over the
world, communicate across great distances, and locate information or answers fast on almost
any subject.
o Online dating
o Online gaming
o Research
o Reading electronic newspapers and magazines
o Online shopping, or e-commerce.
o Online discussion groups and forums
The forerunner of the Internet, the ARPANet, went live for the first time in 1969. The TCP/IP,
open networking protocol suite, was adopted by the ARPANet in 1983, and the National Science
Foundation Network (NSFN) developed the network to link university computer science
departments across the US in 1985.
When the hypertext transfer protocol (HTTP) was developed in 1989, it enabled different
computer platforms to connect to the same Internet sites, which dramatically improved
communications over the network. The Mosaic Web browser was developed in 1993.
Over the years of its existence, the Internet has remained a constant growth and development.
For instance, IPv6 was created to provide for a significant future rise in the number of IP
addresses that could be used. In a related development, the Internet of Things (IoT) refers to
the rapidly developing environment where nearly any entity or device can be given a unique
identifier (UID) and the capability to communicate data automatically over the Internet.
Internet Addressing
Internet addressing refers to the system and protocols used to identify and locate devices,
resources, and services on the internet. It's a fundamental aspect of how data is transmitted
and routed across the global network. Internet addressing allows devices to communicate with
each other by specifying the source and destination of data packets.
Internet addressing primarily involves two key components: IP addresses and domain names.
1. IP Addresses: IP stands for Internet Protocol, and an IP address is a unique numerical
label assigned to each device connected to a computer network that uses the Internet
Protocol for communication. IP addresses come in two main types: IPv4 (32-bit
addresses) and IPv6 (128-bit addresses). IPv4 addresses are more common but are
running out due to the growth of the internet. IPv6 was introduced to address this
shortage and provide a vastly larger pool of addresses.
Types Of IP Address :-
There are two main types of IP addresses: IPv4 and IPv6. Each type has its own format and
characteristics.
1. IPv4 (Internet Protocol version 4) Addresses:
IPv4 addresses are 32-bit numerical labels.
They are typically written as four sets of decimal numbers separated by periods
(dots). Each set represents 8 bits, making up a total of 32 bits.
Example IPv4 address: 192.168.0.1
IPv4 addresses are in short supply due to the rapid growth of the internet, which
has led to the adoption of IPv6.
2. IPv6 (Internet Protocol version 6) Addresses:
IPv6 addresses are 128-bit numerical labels.
They are written in hexadecimal notation and consist of eight groups of four
hexadecimal digits, separated by colons.
IPv6 was introduced to address the limitations of IPv4 and to provide a vastly
larger address space.
Example IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Additionally, within IPv4 and IPv6, IP addresses can be categorized into different classes based
on their purpose and scope:
1. Public IP Addresses:
Public IP addresses are globally unique addresses assigned to devices connected
directly to the internet.
They allow devices to be identified and communicate across the internet.
Public IP addresses are assigned by Internet Service Providers (ISPs) and are
registered in public databases.
2. Private IP Addresses:
Private IP addresses are used within private networks (like home or office
networks) to identify devices within that network.
These addresses are not globally unique and are intended for use within a
specific local network.
They are often used for network address translation (NAT) to enable multiple
devices in a local network to share a single public IP address.
3. Dynamic IP Addresses:
Dynamic IP addresses are assigned to devices temporarily by an ISP's DHCP
(Dynamic Host Configuration Protocol) server.
These addresses change periodically, usually whenever the device connects to
the network.
They are commonly used for residential internet connections.
4. Static IP Addresses:
Static IP addresses are manually assigned to a device and remain constant over
time.
They are often used for servers, websites, and other devices that need a
consistent, easily reachable address.
2. Domain Names: Domain names are user-friendly textual labels used to identify
resources on the internet, like websites and services. They provide a human-readable
format that is easier to remember than IP addresses. Domain names are organized
hierarchically, with the top-level domain (TLD) being the rightmost part (e.g., .com, .org,
.net), followed by the second-level domain (SLD) which is the name chosen by the entity
owning the domain. The complete domain name is followed by the top-level domain
(TLD) and might include subdomains as well.
For example, in the domain name "www.example.com":
"www" is the subdomain.
"example" is the second-level domain.
"com" is the top-level domain.
Domain names are translated into IP addresses through the Domain Name System (DNS), which
acts as a global distributed directory for translating human-readable domain names into
machine-readable IP addresses.
Together, IP addresses and domain names enable effective communication on the internet.
When you enter a domain name into your browser's address bar, your computer uses DNS to
look up the corresponding IP address, which is then used to establish a connection to the target
server.
Internet addressing is crucial for routing data across the vast and interconnected network of
devices and services that make up the modern internet.
History
The first Internet Service Provider was Telenet. Telenet was the commercialized version of the
ARPANET – a precursor to the internet, of sorts. Telenet was introduced in 1974. Since then,
many Internet Service Providers have entered the scene and this was partly because of the
proliferation of the internet as a commodity that fuelled the consumerist attitude of the
people. Pretty soon, an Internet Service Provider called “The World” came to be in vogue and
ever since it started serving its customers today in 1989 has cemented itself as the first
archetypal Internet Service Provider. Examples of major Internet Service Providers include
Google Fiber, Verizon, Jio, AT&T etc.
Characteristics
E-mail Account: Many Internet Service Providers offer an e-mail address to their
consumers.
User Support: Professionals and an increasing number of lay users prefer an ISP that can
provide them with customer support so that they have someone they can refer to if
things go awry.
Access to high-speed internet: Probably the most obvious item on this list as this
feature of an Internet Service Provider lies literally in its name. Furthermore, the higher
the speed an Internet Service Provider can offer one, the better it’s standing in the
market and the more customers it can attract.
Spam Blocker: An Internet Service Provider that hinders its customers’ productivity by
way of not blocking spam and displaying frequent ads is not something that is generally
favoured in the market today. Therefore, many of the Internet Service Providers offer
spam blocking features to their customers.
Web Hosting: Some of the ISPs offer web hosting services to their clientele as well.
List of ISP
Reliance Jio
Vodafone Idea
Airtel
BSNL
Hathway
Advantages
The customer need not then bother with either the technicalities or finances of investing
and inventing a web browser to work with. An ISP can readily do all of this for its customers.
Many ISPs, being professional companies, provide its clientele with high-speed internet
and that is not possible if one decides to sidesteps these companies.
ISPs offer a very high degree of reliability and availability
The ISPs are secure – they offer a tremendous deal of protection against viruses and use
only the latest software patches whilst operating and thereby, maintaining the integrity
of the browser.
User do not need to invest in user’s own web server.
ISP’s should give the best uptime guarantee.
Disadvantages
Because of the range of options available in the market and due to cut-throat
competition, some of the ISPs have been accused of violating the customers’ trust by
way of inflated pricing, data losses, etc. It is true that using an ISP makes the customer
entirely dependent on it.
If an Internet Service Provider is stretched thin because of hosting too many sites on a
shared server, it can compromise the quality of the customers’ data by way of slow
download rates and poor performance of websites.
User need to trust user’s ISP for uptime and security.
ISP can directly affect user if the it gets blacklisted.
But, when you have opened a website like google.com for information, you are using the World
Wide Web; a network of servers over the internet. You request a webpage from your computer
using a browser, and the server renders that page to your browser. Your computer is called a
client who runs a program (web browser), and asks the other computer (server) for the
information it needs.
1. Uniform Resource Locator (URL): serves as a system for resources on the web.
2. HyperText Transfer Protocol (HTTP): specifies communication of browser and server.
3. Hyper Text Markup Language (HTML): defines the structure, organisation and content
of a webpage.
Generic Domains
o It defines the registered hos
hosts according to their generic behavior.
o Each node in a tree defines the domain name, which is an index to the DNS database.
o It uses three-character
character labels, and these labels describe the organization type.
Label Description
Country Domain
The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States, .in for INDIA) in place of three character
organizational abbreviations.
Inverse Domain
The inverse domain is used for mapping an address to a name. When the server has received a
request from the client, and the server contains the files of only authorized clients. To
determine whether the client is on the authorized list or not, it sends a query to the DNS server
and ask for mapping an address to the name.
Working of DNS
o DNS is a client/server network communication protocol. DNS clients send requests to
the. server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a
forward DNS lookups while requests containing an IP address which is converted into a
name known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts available on
the internet.
o If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP
address of a hostname. If DNS server does not contain the IP address associated with a
hostname, then it forwards the request to another DNS server. If IP address has arrived
at the resolver, which in turn completes the request over the internet protocol
http://www.javatpoint.com/full-form
The above URL contains:
o protocol: http
o host or domain: www.javatpoint.com
o Path of the resource: /full-form
A URL can be entered manually by typing it in the address bar of your web browser. If the URL
does not contain a valid server, a browser may display a "Server not found" error and if the
path in the URL is incorrect, the browser may display a "404 error". A URL does not contain
spaces and uses forward slashes to represent different directories. So, dashes and underscores
are used separate the words of a web address.
URI
URI stands for Uniform Resource Identifier. It is a generic term for all the name and addresses
which show objects on the World Wide Web. It is generally a sequence of characters which
identifies a logical resource or the name and location of a file or resource in a uniform format.
HTTP :-
HTTP stands for HyperText Transfer Protocol. Tim Berner invents it. HyperText is the type of
text which is specially coded with the help of some standard coding language called HyperText
Markup Language (HTML). HTTP/2 is the successor version of HTTP, which was published on
May 2015. HTTP/3 is the latest version of HTTP, which is published in 2022.
The protocol used to transfer hypertext between two computers is known as HyperText
Transfer Protocol.
HTTP provides a standard between a web browser and a web server to establish
communication. It is a set of rules for transferring data from one computer to another. Data
such as text, images, and other multimedia files are shared on the World Wide Web. Whenever
a web user opens their web browser, the user indirectly uses HTTP. It is an application protocol
that is used for distributed, collaborative, hypermedia information systems.
Working of HTTP
First of all, whenever we want to open any website then first open a web browser after that we
will type the URL of that website (e.g., www.facebook.com ). This URL is now sent to Domain
Name Server (DNS). Then DNS first check records for this URL in their database, then DNS will
return the IP address to the web browser corresponding to this URL. Now the browser is able to
send requests to the actual server.
After the server sends data to the client, the connection will be closed. If we want something
else from the server we should have to re-establish the connection between the client and the
server.
HTTP Connection
HTTP Request
HTTP request is simply termed as the information or data that is needed by Internet browsers
for loading a website. This is simply known as HTTP Request.
There is some common information that is generally present in all HTTP requests. These are
mentioned below.
HTTP Version
URL
HTTP Method
HTTP Request Headers
HTTP Body
HTTP Request Headers
HTTP Request Headers generally store information in the form of key-value and must be
present in each HTTP Request. The use of this Request Header is to provide core information
about the client’s information, etc.
HTTP Request Body
HTTP Request Body simply contains the information that has to be transferred. HTTP Request
has the information or data to be sent to these browsers.
HTTP Method
HTTP Methods are simply HTTP Verb. In spite of being present so many HTTP Methods, the
most common HTTP Methods are HTTP GET and HTTP POST. These two are generally used in
HTTP cases. In HTTP GET, the information is received in the form of a website.
HTTP Response
HTTP Response is simply the answer to what a Server gets when the request is raised. There are
various things contained in HTTP Response, some of them are listed below.
HTTP Status Code
HTTP Headers
HTTP Body
HTTP Response
HTTP Response Headers
HTTP Response headers are simply like an HTTP Request where it has that work to send some
important files and data to the HTTP Response Body.
HTTP Response Body
HTTP Responses are the responses that are received successfully upon the request. Generally, it
comes under the requests generated by the web. In most cases, the request is of transferring
the HTML data into a webpage.
HTTP Status Code
HTTP Status Codes are the 3-Digit codes that tell the message or simply tell us about the HTTP
Request whether it has been completed or not.
History of HTTP
Tim Berners Lee and his team at CERN get credit for inventing original HTTP and associated
technologies.
HTTP version 0.9: This was the first version of HTTP which was introduced in 1991.
HTTP version 1.0: In 1996, RFC 1945 (Request For Comments) was introduced in HTTP
version 1.0.
HTTP version 1.1: In January 1997, RFC 2068 was introduced in HTTP version 1.1.
Improvements and updates to the HTTP version 1.1 standard were released under RFC
2616 in June 1999.
HTTP version 2.0: The HTTP version 2.0 specification was published as RFC 7540 on May
14, 2015.
HTTP version 3.0: HTTP version 3.0 is based on the previous RFC draft. It is renamed as
Hyper-Text Transfer Protocol QUIC which is a transport layer network protocol
developed by Google.
Characteristics of HTTP
The server processes a request, which is raised by the client, and also server and client
know each other only during the current bid and response period.
Any type of content can be exchanged as long as the server and client are compatible
with it.
Once data is exchanged, servers and clients are no longer connected.
It is a request and response protocol based on client and server requirements.
It is a connection-less protocol because after the connection is closed, the server does
not remember anything about the client and the client does not remember anything
about the server.
It is a stateless protocol because both client and server do not expect anything from
each other but they are still able to communicate.
Advantages of HTTP
Memory usage and CPU usage are low because of fewer simultaneous connections.
Since there are few TCP connections hence network congestion is less.
Since handshaking is done at the initial connection stage, then latency is reduced
because there is no further need for handshaking for subsequent requests.
The error can be reported without closing the connection.
HTTP allows HTTP pipe-lining of requests or responses.
Disadvantages of HTTP
HTTP requires high power to establish communication and transfer data.
HTTP is less secure because it does not use any encryption method like HTTPS and use
TLS to encrypt regular HTTP requests and response.
HTTP is not optimized for cellular phones and it is too gabby.
HTTP does not offer a genuine exchange of data because it is less secure.
The client does not close the connection until it receives complete data from the server;
hence, the server needs to wait for data completion and cannot be available for other
clients during this time.
HTTPs :-
HTTPS is an abbreviation of Hypertext Transfer Protocol Secure. It is a secure extension or
version of HTTP. This protocol is mainly used for providing security to the data sent between a
website and the web browser. It is widely used on the internet and used for secure
communications. This protocol uses the 443 port number for communicating the data.
This protocol is also called HTTP over SSL because the HTTPS communication protocols are
encrypted using the SSL (Secure Socket Layer).
By default, it is supported by various web browsers. Those websites which need login
credentials should use the HTTPS protocol for sending the data.
It allows users to create a secured encrypted connection and helps them to protect their
information from being stolen.
Difference between HTTP and HTTPS
HTTP HTTPS
3. The data which is transferred in HTTP 3. The data which is transferred in HTTPS is
is plain text. encrypted, i.e., ciphertext.
5. The URL (Uniform Resource Locator) of 5. The URL (Uniform Resource Locator) of
HTTP start with http:// HTTPS start with https://
6. This protocol does not need any 6. But, this protocol requires an SSL
certificate. (Secure Socket Layer) certificate.
7. Encryption technique is absent in 7. Encryption technique is available or
HTTP. present in HTTPS.
8. The speed of HTTP is fast as compared 8. The speed of HTTPS is slow as compared
to HTTPS. to HTTP.
10. Examples of HTTP websites are 10. Examples of HTTPS websites are
Educational Sites, Internet Forums, etc. shopping websites, banking websites, etc.
Advantages of HTTPS
o The main advantage of HTTPS is that it provides high security to users.
o Data and information are protected. So, it ensures data protection.
o SSL technology in HTTPS protects the data from third-party or hackers. And this
technology builds trust for the users who are using it.
o It helps users by performing banking transactions.
Disadvantages of HTTPS
o The big disadvantage of HTTPS is that users need to purchase the SSL certificate.
o The speed of accessing the website is slow because there are various complexities in
communication.
o Users need to update all their internal links.
Objectives of SSL
The goals of SSL are as follows −
Data integrity − Information is safe from tampering. The SSL Record Protocol, SSL
Handshake Protocol, SSL Change CipherSpec Protocol, and SSL Alert Protocol maintain
data privacy.
Client-server authentication − The SSL protocol authenticates the client and server
using standard cryptographic procedures.
SSL is the forerunner of Transport Layer Security (TLS), a cryptographic technology for
secure data transfer over the Internet.
Web Browser
The web browser is an application software to explore www (World Wide Web). It provides an
interface between the server and the client and requests to the server for web documents and
services. It works as a compiler to render HTML which is used to design a webpage. Whenever
we search for anything on the internet, the browser loads a web page written in HTML,
including text, links, images, and other items such as style sheets and JavaScript functions.
Google Chrome, Microsoft Edge, Mozilla Firefox, and Safari are examples of web browsers.
History of the Web Browser :- The first web browser WorldWideWeb was invented in the
year of 1990 by Tim Berners-Lee. Later, it becomes Nexus. In the year of 1993, a new browser
Mosaic was invented by Mark Andreessen and their team. It was the first browser to display
text and images at a time on the device screen. He also invents another browser Netscape in
1994. Next year Microsoft launched a web browser Internet Explorer which was already
installed in the Windows operating system. After this many browsers were invented with
various features like Mozilla Firefox, Google Chrome, Safari, Opera, etc.
How does a browser work?
o When a user enters something (like javatpoint.com) in the browser. This request goes to
a domain name server.
o The browser sends the user request to the server using an IP address, which is described
by the domain name server.
o The domain name server sends an IP address to the web server that hosts the website.
o The server sends the information back to the IP address, which is defined by the
browser at the time of the request. The requested page may include links to other files
on the same server, like images, for which the browser also requests the server.
o The browser gathers all the information requested by the user, and displays on your
device screen in the form of web pages.
Some Popular Web Browsers
1. Google Chrome:
Developed by Google, Chrome is one of the most widely-used web browsers in the world,
known for its speed and simplicity.
2. Mozilla Firefox:
Developed by the Mozilla Foundation, Firefox is an open-source browser that is known for its
privacy features and customization options.
3. Apple Safari:
Developed by Apple, Safari is the default browser on Mac and iOS devices and is known for its
speed and integration with other Apple products.
4. Microsoft Edge:
Developed by Microsoft, Edge is the default browser on Windows 10 and is known for its
integration with other Microsoft products and services.
5. Opera:
Developed by Opera Software, Opera is a web browser that is known for its speed and built-in
VPN feature.
6. Brave:
Developed by Brave Software, Brave is a web browser that is focused on privacy and security
and blocks third-party ads and trackers by default.
7. Tor Browser:
Developed by The Tor Project, Tor Browser is a web browser that is designed for anonymous
web browsing and is based on Mozilla Firefox.
Cookies :-
Cookies are small files which are stored on a user’s computer. They are used to hold a modest
amount of data specific to a particular client and website and can be accessed either by the
web server or by the client computer
When cookies were invented, they were basically little documents containing information
about you and your preferences. For instance, when you select your language in which you
want to view your website, the website would save the information in a document called a
cookie on your computer, and the next time when you visit the website, it would be able to
read a cookie saved earlier. That way the website could remember your language and let you
view the website in your preferred language without having to select the language again.
A cookie can contain any type of information such as the time when you visited the website,
the items that you added into your shopping basket, all the links you clicked in website, etc.,
Who can access?
If a cookie is created in a particular website, and you visit another website later, the latter
would not be able to read the contents from the first website, in other words only the same
website that saves information to a cookie can access it.
Types of internet Cookies
Session Cookies: A session cookie only lasts for the duration of users using the website. A web
browser normally deletes session cookies when it quits. A session cookie expires if the user
does not access the website for a period of time chosen by the server(idle timeout). They only
last for the duration of time we are on the site. If someone comes and uses our computer, they
would not be able to see anything on the sites that use session cookies, because they need to
enter the username and password again.
Persistent Cookies: A persistent cookie outlast user sessions. If a persistent cookie has its
maximum age 1 year, then within a year, the initial value set in the cookie would be sent back
to the server every time the user visits the server. This could be used to record a vital piece of
information such as how the user initially came to the website. For this reason, persistent
cookies are also called tracking cookies. These are kind of cookies are used on websites that
need to know who we are but offer us the ability to “remember me” when you enter username
and password. Example: Gmail.
Third-party cookies: Third party cookies are the cookies being set with the different domain
than the one shown in the address bar. For example, if you were to visit Sendflowers.com, it
may set the cookie for the address of SomeAdvertiser.com. Later, when you visit
RebuidEngines.com it may set the cookie for SomeAdvertiser.com. Both of these cookies will be
used by SomeAdvertiser.com to ascertain that you are a person who sends flowers and works
on cars. These are used by advertising agencies who have clients that pay for displaying ads for
products and services but don’t want to waste money displaying them to people who aren’t
going to be a customer.
HTTP Cookies: When you send a request to the server, the server sends a reply in which it
embeds the cookie which serves as an identifier to identify the user. So, next time when you
visit the same website, the cookie lets the server know that you are visiting the website again.
Web Server:
Web server is a program which processes the network requests of the users and serves them
with files that create web pages. This exchange takes place using Hypertext Transfer Protocol
(HTTP).
Basically, web servers are computers used to store HTTP files which makes a website and when
a client requests a certain website, it delivers the requested website to the client. For example,
you want to open Facebook on your laptop and enter the URL in the search bar of google. Now,
the laptop will send an HTTP request to view the facebook webpage to another computer
known as the webserver. This computer (webserver) contains all the files (usually in HTTP
format) which make up the website like text, images, gif files, etc. After processing the request,
the webserver will send the requested website-related files to your computer and then you can
reach the website.
Key Points
When client sends request for a web page, the web server search for the requested
page if requested
ested page is found then it will send it to client with an HTTP response.
If the requested web page is not found, web server will the send an HTTP
response:Error 404 Not found.
If client has requested for some other resources then the web server will contact
conta to the
application server and data store to construct the HTTP response.
Examples
3. Lighttpd
The lighttpd, pronounced lighty is also a free web server that is distributed with
the FreeBSD operating system. This open source web server is fast, secure and
consumes much less CPU power. Lighttpd can also run on Windows, Mac OS X,
Linux and Solaris operating systems.
5. Jigsaw Server
Jigsaw (W3C's Server) comes from the World Wide Web Consortium. It is open
source and free and can run on various platforms like Linux, UNIX, Windows, and
Mac OS X Free BSD etc. Jigsaw has been written in Java and can run CGI scripts
and PHP programs.
Proxy server
Proxy server refers to a server that acts as an intermediary between the request made by
clients, and a particular server for some services or requests for some resources. There are
different types of proxy servers available that are put into use according to the purpose of a
request made by the clients to the servers. The basic purpose of Proxy servers is to protect the
direct connection of Internet clients and internet resources. The proxy server also prevents the
identification of the client’s IP address when the client makes any request is made to any other
servers.
Types Of Proxy Server
1. Reverse Proxy Server: The job of a reverse proxy server to listen to the request made by
the client and redirect to the particular web server which is present on different servers.
Example – Listen for TCP port 80 website connections which are normally placed in a
demilitarized zone (DMZ) zone for publicly accessible services but it also protects the
true identity of the host. Moreover, it is transparent to external users as external users
will not be able to identify the actual number of internal servers. So, it is the prime duty
of reverse proxy to redirect the flow depending upon the configurations of internal
servers. The request that is made to pass through the private network protected by
firewalls will need a proxy server that is not abiding by any of the local policies. Such
types of requests from the clients are completed using reverse proxy servers. This is also
used to restrict the access of the clients to the confidential data residing on the
particular servers.
2. Web Proxy Server: Web Proxy forwards the HTTP requests, only URL is passed instead
of a path. The request is sent to particular the proxy server responds. Examples, Apache,
HAP Proxy.
3. Anonymous Proxy Server: This type of proxy server does not make an original IP
address instead these servers are detectable still provides rational anonymity to the
client device.
4. Highly Anonymity Proxy: This proxy server does not allow the original IP address and it
as a proxy server to be detected.
5. Transparent Proxy: This type of proxy server is unable to provide any anonymity to the
client, instead, the original IP address can be easily detected using this proxy. But it is
put into use to act as a cache for the websites. A transparent proxy when combined with
gateway results in a proxy server where the connection requests are sent by the client ,
then IP are redirected. Redirection will occurs without the client IP address
configuration. HTTP headers present on the server-side can easily detect its redirection .
6. CGI Proxy: CGI proxy server developed to make the websites more accessible. It accepts
the requests to target URLs using a web form and after processing its result will be
returned to the web browser. It is less popular due to some privacy policies like VPNs
but it still receives a lot of requests also. Its usage got reduced due to excessive traffic
that can be caused to the website after passing the local filtration and thus leads to
damage to the organization.
7. Suffix Proxy: Suffix proxy server basically appends the name of the proxy to the URL.
This type of proxy doesn’t preserve any higher level of anonymity. It is used for
bypassing the web filters. It is easy to use and can be easily implemented but is used less
due to the more number of web filter present in it.
8. Distorting Proxy: Proxy servers are preferred to generate an incorrect original IP
address of clients once being detected as a proxy server. To maintain the confidentiality
of the Client IP address HTTP headers are used.
9. Tor Onion Proxy: This server aims at online anonymity to the user’s personal
information. It is used to route the traffic through various networks present worldwide
to arise difficulty in tracking the users’ address and prevent the attack of any
anonymous activities. It makes it difficult for any person who is trying to track the
original address. In this type of routing, the information is encrypted in a multi-folds
layer. At the destination, each layer is decrypted one by one to prevent the information
to scramble and receive original content. This software is open-source and free of cost
to use.
10. 12P Anonymous Proxy: It uses encryption to hide all the communications at various
levels. This encrypted data is then relayed through various network routers present at
different locations and thus I2P is a fully distributed proxy. This software is free of cost
and open source to use, It also resists the censorship.
11. DNS Proxy: DNS proxy take requests in the form of DNS queries and forward them to
the Domain server where it can also be cached, moreover flow of request can also be
redirected.
How Does The Proxy Server Operates?
Every computer has its unique IP address which it uses to communicate with another node.
Similarly, the proxy server has its IP address that your computer knows. When a web request is
sent, your request goes to the proxy server first. The Proxy sends a request on your behalf to
the internet and then collect the data and make it available to you. A proxy can change your IP
address So, the webserver will be unable to fetch your location in the world. It protects data
from getting hacked too. Moreover, it can block some web pages
also.
Advantages of Proxy Server
o It improves the security and enhances the privacy of the user.
o It hides the identity (IP address) of the user.
o It controls the traffic and prevents crashes.
o Also, saves bandwidth by caching files and compressing incoming traffic.
o Protect our network from malware.
o Allows access to the restricted content.
Need of Proxy Server
o It reduces the chances of data breaches.
o It adds a subsidiary layer of security between server and outside traffic.
o It also protects from hackers.
o It filters the requests.
Disadvantages of Proxy Server
1. Proxy Server Risks: Free installation does not invest much in backend hardware or
encryption. It will result in performance issues and potential data security issues. If you
install a “free” proxy server, treat very carefully, some of those might steal your credit
card numbers.
2. Browsing history log: The proxy server stores your original IP address and web request
information is possibly unencrypted form and saved locally. Always check if your proxy
server logs and saves that data – and what kind of retention or law enforcement
cooperation policies they follow while saving data.
3. No encryption: No encryption means you are sending your requests as plain text.
Anyone will be able to pull usernames and passwords and account information easily.
Keep a check that proxy provides full encryption whenever you use it.
Web-applications
A web-application is an application program that is usually stored on a remote server, and users
can access it through the use of Software known as web-browser.
Another definition
It is a type of computer program that usually runs with the help of a web browser and also uses
many web technologies to perform various tasks on the internet.
A web application can be developed for several uses, which can be used by anyone like it can be
used as an individual or as a whole organization for several reasons.
In general, a web application can contain online shops (or we can also say them e-commerce
shops), webmail's, calculators, social media platforms, etc. There is also some kind of web
application that usually requires a special kind of web browser to access them. We cannot
access those kinds of web applications by using regular web- browsers. However, most of the
web applications available on the internet can be accessed using a standard web browser.
Apart from that web applications also allow its users to create documents, share them, or share
the data/ information. By using the web application, users can collaborate on same projects by
event when they are not available on the same geographical location.
How does a web- application work?
In general, web-application does not require downloading them because, as we already
discussed, the web application is a computer program that usually resides on the remote
server. Any user can access it by using one of the standard web browsers such as Google
Chrome, Safari, Microsoft Edge, etc., and most of them are available free for everyone.
A web application are generally coded using the languages supported by almost every web-
browsers such as HTML, JavaScript because these are the languages that rely on the web
browsers to render the program executable.
To operate a web- application, we usually required a web server (or we can say some space on
the web-server for our programs/application's code) to manage the clients' upcoming requests
and required an application server.
Benefits of a web application
o Any typical web application can run or accessible on any operating system such as the
Windows, Mac, Linux as long as the browser is compatible.
o A web application is usually not required to install in the hard drive of the computer
system, thus it eliminates all the issues related to the space limitation.
o All the users are able to access the same version of the web application, which
eliminates all compatibility issues.
o They also reduce the expense for end-users, business owners because the maintenance
needed by the business is significantly less.
o Web applications are flexible. A user can work from any geographical location as long as
he has a working internet connection.
o It just takes a moment to create a new user by providing a username, password, and
URL, and it's all.
Disadvantages of the Web Applications
o Internet connection is necessary to access any web application, and without an internet
connection, anyone can't use any of the web applications. It is very typical to get an
internet connection in our modern cities, still rural area internet connectivity not so
well.
o As we all know that many users like to use different web browsers according to their
needs and choices. So while creating a web application, you must remember that your
application must support several web browsers, including new and old versions of
browsers.
o Speed-related issues are also affecting the web application's performance because there
are several factors on which the performance of a web application depends, and these
all factors affect the performance of the web application in their own way.
o A user must have to spend enough money to maintain the good condition of his web
application, provide an update whenever an issue occurs, and make an attractive user
interface, which is not so cheap at all.
o A web application must be programmed/ coded in such a way that it will be run
regardless of the device's operating system.
o A web application may face some issues while running on Windows, Android, or several
other operating systems if it is not responsive.
5. VISUAL HIERARCHY
Visual hierarchy is the arrangement of elements in order of importance. This is done either by
size, colour, imagery, contrast, typography, whitespace, texture and style. One of the most
important functions of visual hierarchy is to establish a focal point; this shows visitors where
the most important information is.
6. CONTENT
An effective website has both great design and great content. Using compelling language great
content can attract and influence visitors by converting them into customers.
7. GRID BASED LAYOUT
Grids help to structure your design and keep your content organised. The grid helps to align
elements on the page and keep it clean. The grid
grid-based
based layout arranges content into a clean
rigid grid structure with columns, sections that line up an
andd feel balanced and impose order and
results in an aesthetically pleasing website.
8. LOAD TIME
Waiting for a website to load will lose visitors. Nearly half of web visitors expect a site to load in
2 seconds or less and they will potentially leave a site that isn’t loaded within 3 seconds.
Optimising image sizes will help load your site faster.
9. MOBILE FRIENDLY
More people are using their phones or other devices to browse the web. It is important to
consider building your website with a responsive layout where your website can adjust to
different screens.