0% found this document useful (0 votes)
23 views3 pages

Unit1 (3) - Mergedupdated

The document provides an overview of IP routing and the Point-to-Point Protocol (PPP), detailing their functions, features, and limitations. It explains the IP model layers, types of routing, and the differences between PPP and SLIP protocols, as well as the significance of various internet protocols. Additionally, it covers the roles of routers and other networking devices in facilitating internet connectivity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

Unit1 (3) - Mergedupdated

The document provides an overview of IP routing and the Point-to-Point Protocol (PPP), detailing their functions, features, and limitations. It explains the IP model layers, types of routing, and the differences between PPP and SLIP protocols, as well as the significance of various internet protocols. Additionally, it covers the roles of routers and other networking devices in facilitating internet connectivity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1.1 UNIT1 2.1🔷IP Routing? process of determining the path for data packets to travel across interconnected 3.

outing? process of determining the path for data packets to travel across interconnected 3.1🔷 Internet Access via PPP (Point-to-Point Protocol)
🔷IP Model (Internet Protocol Model): also known as the TCP/IP model, networks from source to destination using Internet Protocol (IP). ✅ Introduction to PPP 👉 1PPP stands for Point-to-Point Protocol. 👉 2It is a
is a conceptual framework used to understand how data is transmitted over the internet. ✅ Key Concepts in IP Routing: 1. Routing Table:
data link layer protocol (Layer 2 in OSI model). 👉 3Used for establishing a direct
Layers of IP Model: 1 Link Layer, 2 Internet Layer 3Transport Layer 4 connection between two networking nodes. 👉 4Commonly used for dial-up Internet
Application Layer 1. Static Routing: 3.Dynamic Routing:(Common protocols: RIP, OSPF, BGP.) access, DSL, and VPNs.
🔷Classes in Classful IP Addressing 🔷 Types of Routing: 1. Unicast Routing 2. Multicast Routing 3. Anycast Routing ✅ Features of PPP 👉 1Supports authentication (PAP, CHAP). 👉 2Supports
Number 🔷 Routing Decisions Are Based On: 1Hop count 2Bandwidth multiple network layer protocols (like IP, IPX). 👉 3Provides error detection and link
First Default Hosts per 3Delay (latency)4Load 5Policy and cost
Class Address Range CIDR Use Case of configuration. 👉 4Enables encapsulation of higher-layer protocols over serial links.
Bits Subnet Mask Network
Networks ✅ PPP Components 👉 1Encapsulation Protocol: Encapsulates data packets for
Very large transmission. 👉 2Link Control Protocol (LCP): Establishes, configures, and tests the
~16
0.0.0.0 – networks
A 0 255.0.0.0 /8 128 million data link connection. 👉 3Network Control Protocol (NCP): Negotiates and configures
127.255.255.255 (ISPs, large Routing Protocols:
(2²⁴ – 2) different network layer protocols.
corps)
Medium-sized Concept IP Routing Table-Driven Routing Next Hop Routing 🔷 How Internet Access Happens via PPP (Step-by-Step)
128.0.0.0 – ~65,536 Step Explanation
B 10 255.255.0.0 /16 networks (e.g., ~16,384 Forwarding data
191.255.255.255 (2¹⁶ – 2) Routing method where Routing technique where
universities) packets from source to 1. Physical Connection User connects to ISP via modem, telephone line, or DSL line.
each node maintains the router only stores info
Small Definition destination using 2. PPP Link LCP initializes and configures the data link (negotiates
routing info to every about the next hop, not the
192.0.0.0 – networks (e.g., 254 (2⁸ – routing tables and
C 110 255.255.255.0 /24 ~2 million other node at all times. full path. Establishment settings).
223.255.255.255 small 2) routing protocols.
3. Authentication ISP authenticates the user using PAP or CHAP.
businesses) Contains destination Contains complete Contains only the next
Routing Table networks, next hop, paths to all possible
immediate router for each 4. NCP Configuration NCP configures and enables the IP protocol for data transfer.
Reserved for
224.0.0.0 – Not metric, and interface. destinations. destination. 5. IP Address Assignment ISP assigns a dynamic or static IP address to the client.
D 1110 N/A N/A multicast N/A
239.255.255.255 applicable 6. Data Transmission Internet data (IP packets) are transmitted through the PPP link.
groups Updates only the next hop
Static (manual) or Periodic updates even
Reserved for info; often derived from 7. Termination When the session ends, LCP terminates the link connection.
240.0.0.0 – Not Update Type dynamic (via protocols if the network hasn't
E 1111 N/A N/A experimental N/A link-state or distance vector
255.255.255.255 applicable like RIP, OSPF, BGP). changed. 🔷 Authentication Methods in PPP
use protocols.
Wireless ad hoc Method Description
✅ Limitations of Classful Addressing: 👉 1Wastage of IP addresses due to fixed class All network types where
Wired and wireless networks (e.g., Two-way handshake; less secure; sends
sizes. 👉 2Inflexible – led to address exhaustion. 👉 3Replaced by CIDR (Classless memory and speed are PAP (Password Authentication Protocol)
Used In networks (e.g., MANETs), sometimes passwords in plain text.
Inter-Domain Routing) for better efficiency. critical (e.g., large routers,
Internet, LANs). in traditional IP routing CHAP (Challenge Handshake Three-way handshake; more secure; uses
OSPF environments).
(e.g., RIP). Authentication Protocol) hashed values.
📊 Diagram of OSI Model: Open Systems Interconnection 👉 7. Application Router A → Router B
OSPF, IP routing tables in ✅ Advantages of PPP 👉 1Supports multiple network protocols. 👉 2Provides
Layer 👉 6. Presentation Layer 👉 5. Session Layer 👉 4. Transport LayeR 👉 3. Network → Router C (path DSDV (in MANETs),
Example Linux/Windows use next secure authentication. 👉 3Works over serial and point-to-point links. 👉 4Widely
Layer 👉 2. Data Link Layer 👉 1. Physical Layer | decided based on RIP (periodic updates).
hop concept. supported and simple to implement.
metrics and protocol).
✅ Use Cases of PPP 👉 1Dial-up Internet (using modems). 👉 2Broadband DSL
Efficient routing
Instant route connections (PPP over Ethernet or PPPoE). 👉 3VPN Tunneling protocols (e.g., PPTP
across networks; Lower memory usage;
Advantages availability; reduces uses PPP).🔹 Diagram () User PC ─── Modem ─── Telephone Line ─── ISP Server
supports scalability faster routing decisions.
delay in data transfer. (PPP Protocol in action)
and multiple paths.
✅ PPP Encapsulation Format:
Requires up-to-date
Inefficient if next hop info | Flag | Address | Control | Protocol | Data | CRC | Flag |
routing tables; High bandwidth usage;
is outdated; depends on Each frame starts and ends with a flag byte (01111110)
Disadvantages dynamic changes may not scalable for large
reliable neighboring
cause temporary dynamic networks.
routers.
delays.

4.1🔷 Table-Driven Routing Table-Driven Routing (also called Proactive 5.1🔷SLIP (Serial Line Internet Protocol) 👉 [Internet Connectivity] 👉 [Point-to- 6.1🔷1. Internet and Protocols 👉 [Global Network] 👉 [Internet Protocols]
Routing) maintains up-to-date routing tables at each node with routes to every possible Point Communication] 👉 SLIP is an [older protocol] that enables [IP communication] 👉 [Types of Networks]
destination regardless of demand. over [serial ports/modems]. ✅ 1.1 Definition of Internet 👉 Internet is a [global system] of interconnected computer
✅ Key Characteristics 👉 1Always-on: Routes maintained continuously. 👉 ✅Function 👉 Used to encapsulate IP packets for transmission over [serial connections]. networks that use the [TCP/IP protocol] to link devices worldwide.
2Periodic Updates: Routing tables are refreshed regularly.👉 3Low Latency: Instant ✅Limitations 👉 No error detection 👉 No compression 👉 Only supports IP 1 👉 Provides access to services like [WWW], [email], [FTP], and [file sharing].
route availability for data transfer. 👉 4Routing Overhead: High due to frequent updates. ✅ Replaced by [PPP (Point-to-Point Protocol)] 2 👉 It connects millions of private, public, academic, business, and government networks.
👉 5Topology Dependent: Reacts to changes even if no data needs to be sent. ✅Usage 👉 Early method for dial-up [internet access] before broadband.
✅How It Works 👉 1Each node exchanges routing info with neighbors at regular 🔷 2. Basic Internet Protocols
intervals. 2Tables contain entries: Destination, Next Hop, Metric, Sequence No. 👉 🔷 WWW (World Wide Web) 👉 [Hypertext System] 👉 [Internet Service] ✅ 2.1 TCP/IP (Transmission Control Protocol/Internet Protocol)
👉 3Uses Distance Vector or Link State methods. 1 👉 Fundamental communication protocol for data exchange on the Internet.
✅Definition 👉 WWW is a [global information system] that uses [hypertext links] to
✅ Routing Table Contents 👉 1Destination Address 👉 2Next Hop Node connect and access [web documents]. 2 👉 TCP ensures reliable data delivery; IP handles addressing and routing.
3Hop Count / Metric 4Sequence Number (freshness) 5Validity Flag
✅Key Components 👉 [Web Browsers] – Access and render websites 👉 [Web Servers] ✅ 2.2 HTTP/HTTPS (Hypertext Transfer Protocol / Secure)
🔹 Examples of Protocols 1DSDV (Destination-Sequenced Distance Vector)
– Host web content 👉 [HTTP/HTTPS] – Protocols for communication 👉 [HTML] – ✅ 2.3 FTP (File Transfer Protocol)
2OLSR (Optimized Link State Routing) 3WRP (Wireless Routing Protocol)
Language for content structuring ✅ 2.4 IP (Internet Protocol)
✅ Advantages 👉 1Low delay in route discovery 👉 2Stable routing for frequently
✅Features 👉User-friendly navigation👉 Multimedia integration 👉 Interactivity 1 👉 Assigns [unique addresses] to devices.
changing networks 3 👉 Pre-computed paths ensure quick transmission
through forms & scripts 👉 Access to dynamic and static content 2 👉 Handles [packet routing] across networks.
✅ Disadvantages 👉 High bandwidth consumption 👉 2Unnecessary updates
✅Inventor 👉 [Tim Berners-Lee], 1989 at CERN ✅ 2.5 SMTP (Simple Mail Transfer Protocol)
even when no traffic 👉 3Scalability issues in large networks
1 👉 Used for sending [emails] across networks.
✅ Use Cases 👉 1Mobile Ad Hoc Networks (MANETs) 👉 2Sensor Networks
🔷Difference between PPP and SLIP protocols: 2 👉 Works with other protocols like [POP3] and [IMAP].
👉 3Fixed wireless networks
🔷 Connection-Oriented vs Connection-less Services Aspect PPP (Point-to-Point Protocol)
SLIP (Serial Line Internet 🔷 Internet vs Intranet vs Extranet 👉 [Network Type Comparison]
Protocol) ✅ 3.1 Internet
✅ Connection-Oriented Service Requires setup phase before data transfer. Ensures Full Form Point-to-Point Protocol Serial Line Internet Protocol
reliable, ordered, and error-checked communication. 1 👉 Open, [public network] accessible by anyone.
✅ Best Suited For: 1Applications that need guaranteed delivery 2Real-time or
Protocol Type Data link layer protocol Data link layer protocol 2 👉 Uses standard protocols like [TCP/IP].
critical data transfer Supports multiple protocols (IP, IPX, 3 👉 Provides access to websites, email, cloud services.
Support Supports only IP
✅ Examples: 👉 1Video Conferencing (VoIP over TCP) Needs stable connection, AppleTalk) ✅ 3.2 Intranet
real-time audio/video sync 👉 2Bank Transactions / Online Payments Requires Error
Has built-in error detection (CRC) No error detection 1 👉 Private network within an organization.
reliable, secure, and ordered data delivery Detection 2 👉 Restricted to employees; not accessible externally.
🔹 Connection-less Service :No prior setup. Data sent as independent packets. No Authentication Supports authentication (PAP, CHAP) No authentication 3 👉 Used for internal communication, documents, tools.
guarantee of delivery/order. Compression Supports compression No compression ✅ 3.3 Extranet
✅ Best Suited For: 👉 1Applications tolerant to data loss or delay 👉 2Requires Framing Uses standard framing with headers Simple byte-oriented framing 1 👉 Extended part of intranet shared with [external users].
speed and low overhead
Dynamic IP address assignment 2 👉 Allows controlled access to [partners, vendors].
✅ Examples: 👉 1Online Gaming / Live Sports Updates:Speed over reliability; a Configuration No dynamic configuration
supported 3 👉 Useful for B2B communication and collaboration.
missed packet is tolerable 👉 2DNS Queries (over UDP):Small requests; no need for a Widely used in modern networks Obsolete, used in early internet ✅ 3.4 Key Differences
full connection Usage
(dial-up, VPN) connections 1 👉 Accessibility: Internet is public; Intranet is private; Extranet is semi-private.
Efficiency Slightly complex but reliable Very simple but unreliable 2 👉 Users: Internet – general public; Intranet – internal staff; Extranet – selected external
parties.
3 👉 Security: Intranet and Extranet are [more secure] due to restricted access.

2.1
2.2🔷 Mobile Routing Routing mechanism that allows mobile nodes to
UNIT2
2.3🔷 Interconnecting Devices
🔷 Short Notes: Routers, Bridges, Hubs & Switch-Based Routing maintain connectivity while moving across networks. ✅Key Features: 👉 1. Hub –Broadcasts to all devices; no filtering; Physical Layer.
✅Router:A network layer (Layer 3) device that routes packets between different networks 1Supports mobility across IP networks 👉2Ensures continuous session during 2. Switch –Sends data to correct MAC address; faster than hub; Data Link Layer.
using IP addresses. 3. Router –Directs data between networks using IP; Network Layer.
movement 3Uses Home Agent (HA) and Foreign Agent (FA) 👉 4Tunneling for
4. Bridge –Joins two LANs; filters by MAC; Data Link Layer.
✅Key Points: 👉 1Uses routing tables and algorithms. 👉 2Connects multiple networks packet delivery to roaming devices 👉 5Based on Mobile IP (RFC 5944) 5. Gateway –Protocol converter; links dissimilar networks; All Layers.
(LAN to WAN). 👉 3Supports dynamic/static routing. 👉 4Performs packet filtering, ✅Components: 1Mobile Node (MN) 2Home Network 3Foreign Network 6. Repeater –Boosts weak signals; extends range; Physical Layer.
NAT, firewalling. 👉 Example:Home router connects LAN to the Internet (ISP). 4Care-of Address (CoA) 7. Modem –Converts digital ↔ analog signals; used for internet via phone line.
✅Types: 👉 1Macro Mobility – movement across different networks 👉 2Micro 8. Access Point (AP) –Connects wireless devices to wired LAN; part of Wi-Fi network.
🔷Bridge :A data link layer (Layer 2) device that connects and filters traffic between two
Mobility – movement within the same network 9. Firewall –Controls traffic between networks; provides security; Network Layer or
LAN segments.
✅Applications: 👉 1Cellular networks 👉 2Mobile internet access 👉 Higher.
✅Key Points: 👉1Uses MAC addresses to forward frames. 👉2Divides a LAN into
3Vehicular ad hoc networks (VANETs) 10. Network Interface Card (NIC) –Hardware to connect a computer to a network; has
collision domains. 3👉 Helps in reducing traffic by filtering. MAC address.
✅Example:Ethernet bridge connecting two office floors. 🔷Link State Routing: routers have a complete view of the network Topology. Each 11. Brouter –Combines bridge and router functions; routes some packets, bridges others.
router constructs a map
🔷Hub:A physical layer (Layer 1) device that broadcasts incoming data to all ports. 12. Proxy Server –Acts as an intermediary for requests; improves security and
✅Protocols Using Link State: 👉 1OSPF (Open Shortest Path First) 👉 2IS-IS performance.
✅KeyPoints: 👉1No routing or filtering capability. 👉 2Operates as multiport repeater.
(Intermediate System to Intermediate System)
👉3Cannot reduce traffic; causes collisions. 👉4Now largely obsolete.
✅Working Steps:👉1.Discovery of Neighbors 👉 2.Measurement of Link Cost 👉 3.
🔷 Static vs Dynamic Routing – Short Notes Table
✅Example: Small LAN with few users (rare use today).
Flooding of Link State Packets (LSPs): 👉 4. Topology Map Formation: 👉 5. Shortest Aspect Static Routing Dynamic Routing
🔷Switch-Based Routing  A Layer 2 or Layer 3 device that uses MAC or IP Path Calculation Routes learned automatically via
addresses to intelligently forward data. Definition Manually configured routes
✅Advantages: 👉 1Rapid convergence. 👉 2More accurate and loop-free routing protocols
✅Key Points: 👉 1Layer 2 switch: uses MAC address table. 👉 2Layer 3 switch: does decisions. 👉 3Scalable for large and complex networks. Auto via routing protocols (e.g., RIP,
routing + switching. 👉 3Supports VLAN, QoS, port-based filtering. 👉 4Reduces Configuration Manual by network admin
✅Disadvantages: 👉 1Higher memory and CPU usage. 👉 2More complex to OSPF)
collisions and improves bandwidth. 👉 5Efficient in LAN routing, data center networks. configure and manage.. No automatic adjustment to Automatically adapts to topology
✅Example:Layer 3 switch used in enterprise networks for VLAN intercommunication. Adaptability
🔷Distance Vector Routing Distance Vector Routing is a dynamic routing changes changes
🔷Comparison Table protocol in which each router maintains a routing table that contains the best known distance Higher CPU, memory & bandwidth
Address to each destination and the direction (vector) to reach it. Overhead Low CPU & memory usage
Device Layer Key Function Best Use usage
Type ✅Key Concepts: 👉 1Routing Table:Contains destination, distance (metric), and next Less secure (open to route poisoning,
Network WAN routing, Internet hop. 👉 2Distance:Usually measured in number of hops. 👉 3Vector: Direction Security More secure (fixed paths)
Router IP Address Route between networks etc.)
(L3) access (next-hop router) to reach the destination.
Use Case Small/stable networks Large/dynamic networks
Data Link MAC Connect/filter LAN ✅How It Works: 👉 1Routers periodically exchange routing tables with directly
Bridge Segmenting LANs Time-consuming for large
(L2) Address segments connected neighbors. 👉 2Each router updates its own table based on information from Maintenance Easier for large and complex networks
networks
Very small networks neighbors using the Bellman-Ford algorithm. 👉 3he process continues until all routers
Hub Physical (L1) None Broadcast to all devices Example
(obsolete) have consistent routing tables. No protocol; manual entry RIP, OSPF, EIGRP, BGP
Intelligent forwarding / LAN performance, VLANs, ✅Features: 👉 1Simple and easy to implement 👉 2Slow convergence 👉 Protocols
Switch L2 / L3 MAC / IP
routing QoS 3Prone to routing loops
✅Problems and Solutions: 👉 1Routing Loops→ May occur due to slow convergence.
🔷Comparison to Link State Routing: 👉 2Count-to-Infinity Problem→ A route may keep increasing its distance metric
indefinitely.
Feature Distance Vector Link State
✅Solutions: 👉1Split Horizon 👉 2Route Poisoning 👉 3Hold-down Timers
Info Shared With neighbors only With all routers
✅Examples of Protocols: 👉 1RIP (Routing Information Protocol) 👉 2IGRP
Complexity Low High (Interior Gateway Routing Protocol)
Convergence Speed Slow Fast
Memory/CPU Usage Less More
2.4🔷HTTP Client-Server model 2.5🔷Routing Routing is the process of selecting a path for data packets in a network 2.6🔷1. Switch-Based Routing 👉 [Layer 3 Switching] 👉 [IP Routing] 👉
✅ HTTP (HyperText Transfer Protocol) is the foundation of data communication on the to reach their destination from the source. It is done by routers using routing algorithms. [High-Speed Performance]
World Wide Web. It is a stateless, application-layer protocol used for transmitting ✅Types of Routing
hypermedia documents (like HTML). Feature Adaptive Routing Non-Adaptive Routing ✅ 1.1 Definition 👉 Switch-based routing refers to the use of [Layer 3 switches] that
✅ Protocol Type: Request-Response ✅ Port Number: 80 (HTTP), 443 (HTTPS) combine the functionalities of both [routers] and [switches] to route data packets based on
Also Known As Dynamic Routing Static Routing [IP addresses] within a high-performance network.
✅ tateless: Each request is independent; server does not remember past requests.
✅ Secure Version: HTTPS uses SSL/TLS encryption. Based on network conditions (e.g. ✅ 2. Core Features
Route Update Predefined routes, fixed
HTTP Request Methods traffic)
✅ 2.1 Layer 3 Capability
Method Description Response to No response to network
🔷Common HTTP Status Codes: Changes
Yes, adapts to failures or congestion
changes
1 👉 Performs both [packet switching] and [IP routing].
GET Retrieves data from the server. Code Meaning 2 👉 Supports routing protocols like [RIP], [OSPF], and [EIGRP].
200 OK (Request succeeded) Complexity High Low ✅ 2.2 Hardware-Based Routing
POST Sends data to the server (e.g., form data). Examples RIP, OSPF Flooding, Fixed Routing
301 Moved Permanently 1 👉 Uses [ASIC chips] (Application Specific Integrated Circuits) for processing.
PUT Updates or replaces existing data. 400 Bad Request One Adaptive Routing Protocol: RIP (Routing Information Protocol) 2 👉 Much faster than software-based routers due to reduced CPU usage.
DELETE Deletes specified data on the server. 401 Unauthorized  Type: Distance Vector Protocol
✅ 2.3 VLAN Interconnection
403 Forbidden  Metric: Hop count (max 15 hops)
HEAD Same as GET but returns only headers. 1 👉 Routes traffic between different [VLANs] internally without external routers.
404 Not Found  Updates: Every 30 seconds to neighbors
PATCH Partially updates existing data.  Loop Prevention: Split horizon, route poisoning 2 👉 Supports [Inter-VLAN Routing], improving efficiency and reducing bottlenecks.
500 Internal Server Error
OPTIONS Describes the communication options.  Use: Small networks ✅ 2.4 Built-In Routing Table
One Non-Adaptive Routing Protocol: Flooding 1 👉 Maintains IP-based [routing tables] like traditional routers.
✅ HTTP Message Format  Working: Packet is sent on all outgoing lines except the one it arrived on 2 👉 Uses [dynamic] or [static routing] to determine the best path.
 Advantage: Very reliable
✅ 2.5 Network Segmentation
1. HTTP Request Format: 2. HTTP Response Format:  Disadvantage: Causes high traffic, not bandwidth-efficient
<Method> <URL> <HTTP Version> <HTTP Version> <Status Code> <Status 1 👉 Helps in segmenting networks logically while still enabling communication.
 Use: Emergency routing or military networks
Headers Message> 2 👉 Improves network security and traffic management.
(blank line) Headers
🔷Router Security 👉 [Network Gateway Protection] 👉 [Unauthorized Access ✅ 3. Advantages 👉 3.1 Speed & Performance 👉 3.2 Space & Cost Efficiency
[Body – optional] (blank line) Prevention] 👉 [Traffic Filtering] 👉 3.3 Enhanced Management
[Body – optional] ✅ 1.1 Definition 👉 Router security involves implementing measures to protect routers ✅ 4. Common Use Cases 👉 [Enterprise Networks] 👉 [Data Centers] 👉 [Campus
Example: Example: from [unauthorized access], [malicious attacks], and [data breaches]. Networks]
GET /index.html HTTP/1.1 HTTP/1.1 200 OK 4.1 👉 Interconnecting VLANs within large LANs.
✅ 2. Security Techniques ✅ 2.1 Strong Passwords
Host: www.example.com Content-Type: text/html 4.2 👉 Providing faster routing in high-speed backbone networks.
✅ 2.2 Access Control Lists (ACLs) 👉 Define rules to permit or deny traffic based on
User-Agent: Mozilla/5.0 Content-Length: 1256 4.3 👉 Replacing traditional routers in environments requiring high [bandwidth efficiency].
[IP address], [protocol], or [port number].
<html> ... </html> ✅ 5. Comparison with Traditional Routers
✅ 2.3 Firewall Configuration 👉 Enable built-in [firewall] to monitor and filter
incoming/outgoing traffic. 👉 Block unnecessary services and ports. 5.1 👉 Routing Performance: Layer 3 switches are [faster] due to hardware-based routing.
✅ 2.4 Router Firmware Updates 👉 Regularly update firmware to fix [security 5.2 👉 Protocol Support: Routers support more [WAN protocols] and features like [NAT],
vulnerabilities]. [VPN].
✅ 2.5 Secure Management Access 5.3 👉 Flexibility: Routers are better suited for [inter-network] communication (e.g.,
👉 Disable remote access (Telnet/HTTP) if not needed. different ISPs).
👉 Use secure protocols like [SSH] and [HTTPS] for configuration.
✅ 2.6 Enable Encryption1
👉 Enable [WPA3] or [WPA2] encryption for wireless access.
👉 Avoid using [WEP], which is outdated and insecure.
✅ 2.7 Logging and Monitoring👉 Use network monitoring tools to detect unusual
activities.

1.3UNIT3🔷👉✅ 2.3🔷👉1. Secure Socket Layer (SSL) 3.3🔷1. Web Crawlers 👉 [Web Spider] 👉 [Search Engine Bot] 👉 [Indexing]
🔷Apache Server 👉 Open-source web server (Apache Software Foundation) 👉 1.1 Definition 👉 SSL is a standard protocol that provides [secure communication] over the ✅1.1 Definition 👉 Web Crawlers are automated programs (also called [spiders] or [bots])
internet using [encryption], [authentication], and [integrity]. used by search engines to browse the web and collect information for [indexing].
delivers web content (HTTP/HTTPS) 👉 cross-platform (Windows, Linux) 👉 modular
2. SSL Objectives 👉 [Confidentiality] 👉 [Integrity] 👉 [Authentication] ✅WORKING
structure (mod_ssl, mod_php) 👉 widely used
3. SSL Architecture 👉 3.1 Handshake Protocol 👉 Sets up [secure session] and [key 2.1 Seed URLs 👉 Crawler starts with an initial list of [known websites] (seed URLs).
✅Apache Server – Features
exchange]. 3.2 Record Protocol 👉 Encrypts data and attaches [MAC]. 3.3 Alert Protocol 2.2Download Pages👉It fetches the HTMLcontent of each [web page] from the seed list
👉 Supports virtual hosting (multiple websites) 👉 handles static and dynamic content
👉 Sends [warnings] or [error messages]. 2.3 Extract Links 👉 Extracts all [hyperlinks] from the downloaded page.
(HTML, PHP) 👉 uses configuration files (httpd.conf, .htaccess) 👉 compatible with PHP,
Python, Perl 4. SSL Handshake Steps👉 [ClientHello]👉 [ServerHello]👉 [Key Exchange]👉 2.4 Repeat Process 👉 Adds new links to the queue and continues the [recursive
[Finish] crawling].
✅HTTP Request Handling
5. SSL vs TLS 👉 [SSL 3.0] vs [TLS 1.2/1.3] 5.1 SSL👉 Deprecated, less secure. ✅3. Key Components
👉 Client sends HTTP request (browser URL) 👉 DNS resolves domain to IP 👉 Apache
5.2 TLS 👉 Modern, secure replacement for SSL. 3.1 URL Frontier 👉 Queue that manages the list of [URLs to visit].
receives request (port 80/443) 👉 checks method (GET, POST) 👉 processes resource
6. Benefits of SSL 👉 [Secure Communication] 👉 [Trust] 👉 [Protection] 3.2 Fetcher 👉 Component that sends HTTP requests and [downloads web pages].
(file/script) 👉 sends response with status code
✅HTTP Communication – Protocol Basics 🔷1. Cookies 👉 [Small Data Files] 👉 [Client-Side Storage] 👉 [User 3.3 Parser 👉 Extracts [content] and [links] from the downloaded pages.
👉 Client-server model (request-response) 👉 stateless protocol (no session memory) 👉 Identification] 3.4 Scheduler 👉 Manages the [order and timing] of crawling activities.
request contains headers, path, method 👉 response contains status code, headers, content ✅1.1 Definition 👉 Cookies are [small text files] stored on the user's device by a [web ✅4. Features Considered During Crawling 👉 [robots.txt] 👉 [Duplicate Avoidance]
browser] that help websites [remember user information] across sessions. 👉 [Politeness]
✅ 12. Apache Server: Licensing and Installation 👉 ✅2. Types of Cookies 👉 [Session Cookie] 👉 [Persistent Cookie] 👉 [Secure Cookie] ✅3. Crawling Policies 👉 [Selection Policy] 👉 [Re-visit Policy] 👉 [Politeness Policy]
[Open-Source Server] 👉 [Cross-Platform Web Server] ✅3. How Cookies Provide Fast Access 1.👉 [Auto Login] 2.👉 [Preference Storage] 👉 [Parallelization Policy]
12.1 Licensing 👉 [Apache License 2.0] 👉 [Free to Use] 👉 [Open Source] 3.👉 [Session Management] 3.1 Selection Policy 👉 Determines which pages to crawl ([priority-based]).(1. 👉Popular
12.1.1 License Type 👉 Apache HTTP Server is licensed under the [Apache License ✅4. Advantages of Cookies 1.👉 [Faster Access] 2.👉 [User Personalization] 3.👉 Pages First: 2. 👉Fresh Pages First: 3. New Pages First: 4. 👉Focused Crawling:
Version 2.0]. [Reduced Server Load] 3.2 Re-visit Policy 👉 Decides how often to [re-crawl] a page.(1. 👉 Uniform Frequency
✅12.2 Installation Steps 🔷23. Next Generation Web Browsing👉 [AI Integration] 👉 [Voice 2. 👉Change-based Frequency 3. 👉Age-based Revisit)
✅12.2.1 Step 1: Download 👉 3.3 Politeness Policy 👉 Avoids overloading servers ([respect robots.txt]).
Search] 👉 [Faster Protocols]
Download the latest version from the [official Apache website]: 3.4 Parallelization Policy 👉 Improves speed using [multiple bots] in parallel.
✅23.1 Features 👉✅ Voice Commands✅ Augmented Reality (AR) Browsing
🔗 https://httpd.apache.org/download.cgi Importance of Crawling Policies👉Freshness👉Coverage👉Fairness👉Efficiency
✅ Predictive Loading✅ Progressive Web Apps (PWA)✅ 5G-Optimized browsing
✅12.2.2 Step 2: Choose OS 👉
Select the version based on your [Operating System] (Windows/Linux/Mac). 🔷WWW Proxies (Web Proxies) 👉 [Gateway Server] 👉 [Request 🔷4. Objective of Cookies 👉 [User Tracking] 👉 [Session Management] 👉
✅12.2.3 Step 3: Run Installer (Windows) OR Extract (Linux) 👉 Forwarding] 👉 [Content Filtering] [Personalization]
On Windows, use .msi or .exe installer. ✅4.1 Explanation 👉 Cookies are used to store [user preferences], maintain [sessions],
On Linux, use the following command: ✅1.1 Definition 👉 Web Proxies are [intermediate servers] that act between a client
and track user behavior for [targeted results].
sudo apt-get install apache2 (browser) and a web server to [forward requests] and [receive responses] on behalf of the
✅12.2.4 Step 4: Configuration 👉 user.
Edit the [httpd.conf] file to set up ports, document root, etc. ✅2. Functions of Web Proxies 1.👉 [Anonymity] 2.👉 [Caching] 3.👉 [Access 🔷5. Objective of Bookmarks 👉 [Quick Access] 👉 [Save Search]
Default file location (Linux): /etc/apache2/httpd.conf Control] 4,👉 [Monitoring] ✅5.1 Explanation 👉 Bookmarks help users to [save and revisit] important URLs and
Default file location (Windows): C:\Apache24\conf\httpd.conf ✅3. Types of Web Proxies [search results] easily.
12.2.5 Step 5: Start Server 👉 ✅3.1 Forward Proxy 👉 Placed between user and internet; helps in [filtering requests]
On Linux: sudo systemctl start apache2 and [bypassing restrictions]. 🔷6. Objective of Progress Indicators 👉 [User Feedback] 👉 [System
✅ On Windows: Use Apache Monitor or run httpd.exe. ✅3.2 Reverse Proxy 👉 Placed in front of web servers; handles [load balancing], Status]
✅12.2.6 Step 6: Test Installation 👉 Open browser and visit: http://localhost/ [security], and [SSL termination]. ✅6.1 Explanation 👉 Progress indicators show [loading status] and [search completion] to
You should see: “It works!” ✅3.3 Transparent Proxy👉Works without user knowledge; often used for [monitoring] inform users that the system is active and processing.
✅3.4. Anonymous Proxy ✅3.5. High Anonymity Proxy (Elite Proxy)
✅4. Advantages of Web Proxies 👉 [Security] 👉 [Speed] 👉 [Control]

4.3🔷1. Architecture of Search Engine 5.3🔷Differentiate between Scalable and Incremental Web Crawler. 6.3🔷16. Client-Side Scripting 👉 [Executed by Browser] 👉 [Fast
✅1.1 Definition 👉 A Search Engine is a software system that performs [web searches] by Interaction]
retrieving and ranking relevant information from the web based on user queries. Aspect Scalable Web Crawler Incremental Web Crawler ✅16.1 Definition 👉 Scripting languages like [JavaScript] that execute on the user's
✅2. Components of Search Engine Architecture Designed to handle large-scale Designed to fetch only updated or new browser. ✅16.2 Benefits 👉 [Faster UX], [Validation], [DOM Manipulation]
Purpose
2.1 Web Crawler 👉 Collects web pages from the internet using [automated bots] and web data content
sends data to the indexer. Crawling Focuses on expanding coverage Focuses on revisiting known pages 🔷 17. Accessing Web Servers 👉 [URL-Based Access] 👉 [HTTP/HTTPS
2.2 Indexer 👉 Extracts content and metadata from crawled pages and stores it in the Strategy across the web periodically
Protocol]
[search index] for quick access. Prioritizes speed and breadth of Prioritizes freshness and relevance of ✅17.1 Access Method 👉 Users access web servers via [domain names] or IP using a
Efficiency
2.3 Database (Repository) 👉 Stores raw and processed [web documents], including data collection content
[browser]. ✅17.2 Tools 👉 Browser, FTP, Telnet, SSH.
images, HTML, metadata, etc. Update May not detect recent changes on
Specifically targets updated pages ✅17.3 Example 👉 Accessing http://example.com/index.html
2.4 Query Processor 👉 Accepts user queries, matches them with the index, and returns Handling already visited pages
the most [relevant results]. Data Higher redundancy (may re- Minimizes redundancy by avoiding
✅3. Supporting Components Redundancy download same data) unchanged pages 🔷18. HTTP (Hypertext Transfer Protocol) 👉 [Stateless Protocol] 👉
[Web Communication]
3.1 Ranking Module 👉 Applies algorithms to [rank search results] based on [relevance, System Requires more bandwidth, Uses fewer resources due to selective
popularity, freshness]. Resources storage, and processing crawling ✅18.1 Definition 👉 A protocol to transfer [HTML documents], images, videos, etc., over
3.2 User Interface 👉 Provides an interactive platform for users to enter queries and view the web. ✅18.2 Characteristics 👉 [Request-Response], [Stateless], [Port 80]
Suitable for building large search Suitable for news sites, blogs, and
[search results]. Use Case
engine indexes frequently updated domains
3.3 Log Analyzer 👉 Analyzes user behavior, search patterns, and helps in [improving 🔷19. Secure HTTP (HTTPS) 👉 [Encrypted Communication] 👉 [SSL/TLS
performance]. Protocol]
✅Working Flow:1. Crawler collects pages →2. Pages stored in the repository →3. Parser 🔷IIS & PWS (Web Servers) 👉 [Microsoft Servers] 👉 [Dynamic Content] ✅19.1 Definition 👉 HTTPS is the [secure version] of HTTP using [SSL/TLS] for
cleans and extracts content →4. Indexer creates inverted index →5. User submits query →6. encryption.
Query processor parses query →7. Matching & Ranking performed →8. User sees results on ✅13.1 IIS (Internet Information Services) 👉 A [web server software] created by ✅19.2 Benefits 👉 [Data Protection], [Authentication], [Secure Transactions]
interface. Microsoft to host websites and web applications on [Windows servers].
[User Query] Search engine Tools✅ 1. Google ✅13.2 PWS (Personal Web Server) 👉 A [lightweight web server] by Microsoft for 🔷 20. Web Browser 👉 [Client Application] 👉 [Webpage Renderer]

[Query Processor]
👉 [Search Engine] 👉 [Web- [personal/local development].
✅20.1 Definition 👉 A software application to access and view [web resources].
↓ Based Tool]✅2.1 Features✅1 ✅13.3 Key Features 👉 [ASP Support], [FTP Hosting], [Security Configs], [Admin
✅20.2 Examples 👉 Chrome, Firefox, Safari, Edge.
[Index] 👉 Most widely used✅2 👉 GUI]
↑ ✅20.3 Functions 👉 [Send Requests], [Render HTML/CSS/JS], [Store Cookies]
Retrieves results from websites, 🔷14. HTTP Request Types 👉 [Client-Server Communication] 👉 [Methods]
[Indexer] ← [Crawler] ← [Web] images, news, and videos.✅3 👉 ✅14.1 GET 👉 Requests [data from server]; parameters in URL.
Supports voice search and 🔷21. Customization of Browsers 👉 [Personalized Experience]
✅14.2 POST 👉 Submits data to server (form submission).
advanced search filters.✅4 👉 ✅21.1 Features 👉✅ Change homepage ✅ Add bookmarks
✅14.3 PUT 👉 Replaces data on the server.
Uses powerful algorithms to rank ✅ Install plugins/extensions
relevant content. ✅14.4 DELETE 👉 Deletes a resource.
✅ Enable dark mode ✅ Manage cookies/cache
✅14.5 HEAD 👉 Requests only headers.
✅14.6 OPTIONS 👉 Describes communication options.
✅ 2. Yahoo 👉 [Web Portal] 👉 ✅14.7 PATCH 👉 Updates part of a resource.
🔷22. Browsing Tricks 👉 [Productivity Shortcuts]
[Search Tool with Services]✅3.1 ✅22.1 Examples 👉
Features✅1 👉 One of the oldest and ✅ Ctrl + T → New tab ✅ Ctrl + Shift + T → Reopen closed tab
widely known search tools.✅2 👉 🔷15. System Architecture 👉 [Client-Server Model] 👉 [3-Tier Model]
✅ Ctrl + D → Bookmark page✅ Ctrl + L → Focus address bar
Provides search functionality, along with ✅15.1 Client Tier 👉 Browser/UI interacting with users.
email, news, and finance.✅3 👉 ✅ Incognito mode for private browsing
✅15.2 Application Tier 👉 Business logic; processes data.
Currently powered by Bing’s search
engine ✅15.3 Database Tier 👉 Stores and manages data.
✅15.4 Flow 👉 Client → Request → Server → DB → Response.
1.4 UNIT 4
7.3🔷Web Server? A [web server] is a software or hardware that serves [web content] 2.4🔷 26. ASP (Active Server Pages) 👉 [Server-Side Scripting] 👉
(HTML pages, images, etc.) over the [HTTP/HTTPS protocol] to client browsers. 🔷Differences Between HTML and HTML5 [Dynamic Web Development] 👉 [Microsoft Technology] 👉 [Server-Side Execution]
✅25.1.2 Functions 1.👉Accepts [HTTP requests] 2. 👉Returns [HTTP responses] 👉 HTML is the [standard markup language] used to create web pages. ✅26.1.2 Technology Stack 👉 Based on [VBScript] and [COM objects]; works with [IIS
3. 👉Manages [domain hosting], [security], and [connections] 👉 HTML5 is the [latest version] with new [semantic], [multimedia], and [structural] (Internet Information Services)].
✅25.2 Types of Web Servers features. ✅26.1.3 ASP Page Extension 👉 Files are saved with .asp extension.
25.2.1 Apache HTTP Server 👉 Most popular [open-source] server, supports Aspect HTML HTML5 ✅26.3 ASP Built-in Objects 👉 [Predefined Server-Side Components]
[Linux/Windows]. Older versions (HTML 4.01, 26.3.1 Request 👉 Used to [retrieve data] sent by client (forms, query strings).
Version Latest version (HTML5)
XHTML)
25.2.2 IIS (Internet Information Services) 👉 Microsoft’s proprietary [Windows-only] <% username = Request.Form("uname") %>
server. Doctype Declaration Long and complex Simple (<!DOCTYPE html>)
26.3.2 Response 👉 Sends output/data back to browser.
25.2.3 Nginx 👉 Lightweight, high-performance [open-source] server used for [reverse No native support (requires <% Response.Write("Welcome!") %>
Multimedia Support Native support for <audio>, <video> tags
Flash/plug-ins)
proxy] and load balancing. 26.3.3 Server 👉 Provides access to server-level functions and utilities.
Graphics Support Not supported directly Built-in support with <canvas>, <svg>
25.2.4 LiteSpeed 👉 Commercial web server with [Apache compatibility]. <% Set con = Server.CreateObject("ADODB.Connection") %>
Supports Web Storage (localStorage,
25.2.5 Google Web Server (GWS) 👉 Used internally by Google, [not publicly Storage Relies on cookies
sessionStorage) 26.3.4 Session 👉 Maintains user data during the [session lifespan].
available]. <% Session("user") = "ankur" %>
Elements Fewer semantic elements More semantic tags like <header>, <footer>,
<article> ✅26.3.5 Application 👉 Shares data across all [users/sessions] of the web application.
✅25.3 IIS Server Performance 👉 [Windows Integration] 👉 [ASP/.NET Support] New input types like date, email, range, ✅26.4 Example ASP Script 👉 [Form Handling + Response]
Form Controls Basic input types only color
25.3.1 Optimized for Windows 👉 Works best on [Windows Server OS] with [tight <% Dim name
integration]. APIs Not supported
Supports modern APIs (Geolocation, Drag-and- name = Request.Form("username")
Drop, etc.) Response.Write("Hello, " & name) %>
25.3.2 Scalability 👉 Can handle multiple [web applications] and domains.
Mobile Support Limited Designed with mobile-first approach 📌 If the HTML form sends a POST request with a field username, this ASP page will
25.3.3 Built-in Security 👉 Provides [IP filtering], [SSL], [authentication modules].
Browser display:  Hello, Ankur
25.3.4 Monitoring Tools 👉 Includes [IIS Manager], [Event Viewer], and [Performance Older browsers Supported by modern browsers
Compatibility
Monitor]. 🔷 Working Process of ASP Architecture How ASP Works
✅25.4 Licensing of IIS Server 👉 [Free with Windows] 👉 [Closed Source] 🔷 difference between HTML, DHTML, XML, XHTML and AJAX
2.1 Client Request 👉 User sends a request through a browser.
25.4.1 License Type 👉 Comes bundled with [Windows OS]; no separate license required. Aspect HTML DHTML XML XHTML AJAX
HyperText eXtensible eXtensible
2.2 Web Server 👉 IIS receives the request and identifies the ASP file.
25.4.2 Cost 👉 No direct cost, but requires a valid [Windows license]. Asynchronous 2.3 ASP Engine 👉 Processes embedded scripts and accesses database.
Full Form Markup Dynamic HTML Markup HyperText
25.4.3 Restrictions 👉 Cannot be used on [non-Windows] systems. JavaScript and XML
Language Language Markup Language 2.4 HTML Response 👉 Generates HTML from ASP output and sends it to browser.
Create
Structure and Send/receive data ✅ 3. Components of ASP Architecture
🔷25.5 Installation Steps for IIS Server 👉 [Control Panel Method] 👉 Purpose layout of web
interactive and Store and Combine HTML
asynchronously
animated web transport data with XML rules 3.1 Client Browser 👉 Sends HTTP request.
[Enable Features] pages
pages
without reloading page
3.2 Web Server (IIS) 👉 Hosts ASP pages, forwards to ASP engine.
✅25.5.1 Step 1: Open Control Panel 👉 Go to: Combination of Reformulation of
Markup Markup Web development 3.3 ASP Engine 👉 Executes server-side scripts.
👉Control Panel → Programs → Turn Windows Features On or Off Type HTML, CSS, HTML using
language language technique 3.4 Database Server 👉 Used when data retrieval is required.
✅25.5.2 Step 2: Enable IIS 👉 JavaScript XML
Tick the box: [Internet Information Services]Click OK → System installs IIS components Exchanges small 3.5 Response Page 👉 Final HTML page returned to the client.
Displays Enables dynamic Focuses on data Stricter, well-
✅25.5.3 Step 3: Launch IIS Manager 👉
Content static content behavior and structure formed HTML
amounts of data with ✅DIAGRAM [ Client Browser ]  [ HTTP Request to Web Server ]  [ IIS Server ] 
server
👉 Press Win + R → Type inetmgr → Open [IIS Manager GUI] [ ASP Engine ]  [ Database Server ]  [ HTML Response Back to Client ]
Strict syntax Uses JavaScript +
Syntax Flexible Follows XML
✅25.5.4 Step 4: Test Server 👉 Open browser → Enter http://localhost/ syntax
Same as HTML (custom tags
syntax strictly
XML/JSON +
Rules
 If working, shows: "Welcome to IIS" default page allowed) XMLHttpRequest
✅25.5.5 Step 5: Add Website 👉 In IIS Manager → Right-click [Sites] → Add Website Not for display, All modern
Browser All browsers
All modern
used with other browsers (requires
All modern browsers
👉Enter site name, path, and port. Use browsers (requires JavaScript)
technologies stricter coding)
No (used in
Display No (used to store
Yes Yes Yes background
Capability data)
communication)

3.4🔷1. ASP.NET 👉 [Web Framework] 👉 [Microsoft] 👉 [Server-Side 4.4🔷 difference between ASP.NET and Classic ASP: 5.4🔷1. DHTML (Dynamic HTML) 👉 [Client-Side Scripting] 👉
Technology] Aspect Classic ASP ASP.NET [Interactive Web Pages]
✅1.1 Definition 👉 ASP.NET is a [server-side web application framework] developed by ✅1.1 Definition 👉 DHTML is not a language but a combination of [HTML], [CSS],
Technology Scripting-based (interpreted) Compiled, .NET Framework-based
[Microsoft] for building [dynamic web pages], [websites], and [web services]. [JavaScript], and the [Document Object Model (DOM)] to create [dynamic and interactive
✅2. Key Features 👉 [Language Support] 👉 [Code-Behind] 👉 [State Management] Language web pages].
VBScript, JavaScript Multiple languages (C#, VB.NET, F#)
👉 [Security] Support ✅2. Components of DHTML 👉 [HTML] 👉 [CSS] 👉 [JavaScript] 👉 [DOM]
2.1 Language Support 👉 Supports [C#], [VB.NET], and other .NET languages. Compilation Interpreted at runtime Compiled before execution ✅3. Features of DHTML 👉 [Animation] 👉 [Event Handling] 👉 [Live Content
2.2 Code-Behind 👉 Separates [HTML design] and [server-side logic]. Update]
Performance Slower (due to interpretation) Faster (due to compilation and caching)
2.3 State Management 👉 Uses [ViewState], [Session], and [Cookies] for managing user ✅4. Benefits👉 [Faster Interaction] 👉 [User Experience] 👉 [Reduced Server Load]
Separation of ✅5. Example of DHTML 👉 [JavaScript + HTML + CSS]
data. Code mixed with HTML Clear separation (Code-Behind Model)
Code <p id="demo" onmouseover="changeText()">Hover Me!</p>
2.4 Security 👉 Built-in support for [authentication], [authorization], and [input
validation]. State <script>
Basic (Session, Application) Advanced (ViewState, Session, Cache, etc.)
✅3. Components Management function changeText() {
document.getElementById("demo").innerHTML = "Text Changed!";
3.1 Web Forms 👉 Drag-and-drop UI elements; suitable for [event-driven programming]. Limited (On Error Structured exception handling (try-
Error Handling }
3.2 MVC 👉 [Model-View-Controller] pattern for cleaner separation of concerns. Resume Next) catch-finally)
</script>
3.3 Web API 👉 Used to create [RESTful services]. Development
3.4 Razor Pages 👉 Simplified [page-focused] development in ASP.NET Core. Tools
Basic text editor (Notepad) Advanced tools (Visual Studio) 🔷 2. XHTML (Extensible HyperText Markup Language) 👉 [XML-
✅4. Advantages 👉 [Rapid Development] 👉 [Rich Toolbox] 👉 [Scalability] Based HTML] 👉 [Well-Formed Structure]
Component
✅5. Runtime and Hosting 👉 [Common Language Runtime] 👉 [IIS Hosting] Limited Supports user controls, server controls ✅2.1 Definition 👉 XHTML is a [stricter and cleaner version of HTML] that follows the
Reuse rules of [XML], making web documents more [consistent and reliable].
5.1 CLR 👉 Executes ASP.NET code within the [Common Language Runtime] for
managed execution. Enhanced (Windows authentication, form ✅3. Features of XHTML 👉 [Well-Formed Tags] 👉 [Case Sensitivity[lowercase].]
Security Basic
5.2 IIS 👉 Hosted on [Internet Information Services] server for serving ASP.NET authentication) 👉 [Closed Tags] 👉 [Nesting Rules]
applications. Highly extensible with libraries and ✅4. Differences from HTML👉[Syntax Rules][strict]👉[Compatibility] 👉 [Parsing]
Extensibility Low
frameworks ✅5. Advantages of XHTML 👉 [Error-Free Parsing] 👉 [Cross-Platform] 👉
[Future-Proof]
🔷 39. ASP File System Object (FSO) 👉 [File Management] 👉 [Folder Outdated (no longer Actively supported and updated by
Support ✅6. Example of XHTML Document 👉 [Strict Format]
Management] 👉 [Drive Management] maintained by Microsoft) Microsoft
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
✅ 39.1 Definition 👉 The File System Object allows ASP scripts to access, create, delete, "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
and manage files and folders on the server. <html xmlns="http://www.w3.org/1999/xhtml">
✅ 39.2 Features👉Access and manipulate [files] (create, read, write, delete). 🔷37. Web Services (in XML context) <head> <title>XHTML Page</title> </head>
👉Manage [folders] (create, delete, list contents). Web services allow applications to communicate over the internet using [XML] messages. <body> <p>Hello, World!</p> </body>
👉Retrieve information about [drives] and [file attributes]. ✅ 37.2 Components </html>
✅Common Methods 👉CreateTextFile 👉 Creates a new text file. [SOAP] (Simple Object Access Protocol): XML-based messaging protocol.
🔷Difference Between WWW and Internet
👉OpenTextFile 👉 Opens an existing file for reading/writing. -[WSDL] (Web Services Description Language): XML describing the service interface.
[UDDI]: Registry to discover web services. Point Internet WWW (World Wide Web)
👉DeleteFile 👉 Deletes a specified file. 1. Definition Global network of computers Service on the internet to access web pages
✅ 37.3 Application 👉 Enables [platform-independent], [language-independent]
👉CreateFolder and DeleteFolder 👉 Manage folders. 2. Scope Includes WWW, Email, FTP, Part of the Internet
communication between distributed applications.
3. Functionality Provides infrastructure Provides access to websites using HTTP
4. Dependency WWW depends on Internet Internet does not depend on WWW
✅ Summary: WWW is a subset of the Internet, mainly used for accessing web content.

6.4🔷1. Document Object Model (DOM) 👉 [HTML Representation] 👉 [Tree 7.4🔷XML: Structuring Data 👉 [Extensible Markup Language] 👉 [Hierarchical
Structure] 👉 [Programming Interface] Data] 👉 [Self-describing]
✅1.1 Definition 👉 DOM is a [programming interface] for web documents, representing ✅ 32.1 Definition 👉 XML is a [markup language] used to store and transport data in a
the HTML or XML document as a [tree structure] where each node is an [object]. [human-readable] and [machine-readable] format.
✅2. Structure of DOM ✅ 32.2 Key Features
2.1 Document 👉 The root node representing the [entire HTML document]. 32.2.1 Structured as [tree hierarchy] with [elements] and [attributes].
2.2 Element 👉 Represents individual [HTML tags] (e.g., <p>, <div>). 32.2.2 [Self-describing] through [tags] that define the data meaning.
2.3 Attributes 👉 Provides [additional information] about elements (e.g., id, class). 32.2.3 Supports [custom tags] unlike HTML.
2.4 Text 👉 The actual [text content] within the elements.
✅3. DOM Methods 1.👉 [getElementById()] 2.👉 [getElementsByClassName()] 3.👉 🔷 33. XML Namespaces 👉 [Uniqueness] 👉 [Prefix] 👉 [Avoid Conflicts]
[querySelector()] 4.👉 [createElement()] ✅ 33.1 Purpose 👉 Prevents [name conflicts] by qualifying names used in XML
✅3.1 getElementById(id) 👉 Selects a single element using its [unique ID]. documents.
document.getElementById("myDiv").style.color = "blue"; ✅ 33.2 Working
✅3.2 getElementsByClassName(class) 👉 Selects [multiple elements] with the same 33.2.1 Uses [URI] as a namespace identifier.
class. 33.2.2 Elements/attributes are prefixed to associate with a namespace.
let items = document.getElementsByClassName("menu-item"); 33.2.3 Allows mixing elements from different vocabularies in one XML document.
✅3.3 querySelector(selector) 👉 Selects the [first matching element] using a CSS 🔷 34. XML Variables 👉 [Data Storage] 👉 [Element Content] 👉 [Attributes]
selector. ✅ 34.1 Usage 👉 Variables in XML store data inside [elements] or [attributes].
document.querySelector("p.intro").innerHTML = "Updated text"; ✅ 34.2 Example 34.2.1 Element Variable: <price>100</price>
✅3.4 createElement(tagName) 👉 Creates a new [HTML element]. 34.2.2 Attribute Variable: <item cost="100"/>
let para = document.createElement("p");
🔷35. Simple API for XML (SAX) 👉 [Event-driven] 👉 [Streaming Parser]
✅4. Example 👉 [HTML + DOM]
👉 [Low Memory]
<!-- HTML -->
<p id="demo">Hello</p> ✅ 35.1 Definition 👉 SAX is an [event-driven] API to parse XML documents sequentially
document.getElementById("demo").innerHTML = "Hello World!"; without loading the whole document into memory.
✅ The above example uses getElementById() to change the content of a paragraph. ✅ 35.2 Features
35.2.1 Triggers events like [startElement], [endElement], and [characters].
35.2.2 Suitable for [large XML files] due to low memory use.
🔷 Security Issues in Creating a Website 35.2.3 Does not allow backward navigation.
👉 1. Authentication and Authorization 👉 2. Data Encryption and Secure Transmission 👉 🔷 36. Document Type Definition (DTD) and Schemas 👉 [Validation]
3. Input Validation and Sanitization 👉 4. Session and Cookie Management 👉 5. Access 👉 [Structure Definition] 👉 [Rules]
Control and User Permissions 👉 6. Error Handling and Logging 👉 7. Server and Network ✅ 36.1 Purpose 👉 Define the [structure], [elements], and [attributes] rules for an XML
document to ensure [validity].
Security 👉 8. Protection Against Attacks (SQL Injection, XSS, CSRF)
✅ 36.2 DTD
🔷 Management Issues in Creating a Website Older standard for defining XML structure.
👉 1. Content Management and Updates 👉 2. Backup and Disaster Recovery Limited data types, no namespace support.
3. User Role and Permission Management 👉 4. Website Performance Monitoring ✅ XML Schema
5. SEO and Analytics Integration 👉 6. Compliance with Legal and Privacy Standards More powerful and XML-based alternative to DTD.
7. Version Control and Deployment 👉 8. Maintenance Scheduling and Downtime -Supports [data types], [namespaces], and [complex types].
Management Allows [restrictions], [extensions], and detailed validation.

You might also like