Sie sind auf Seite 1von 21

Data Communication & Networking 5th Module

Transport Layer

o The transport layer is a 4th layer from the top.

o The main role of the transport layer is to provide the communication services directly to the application processes
running on different hosts.

o The transport layer provides a logical communication between application processes running on different hosts.
Although the application processes on different hosts are not physically connected, application processes use the
logical communication provided by the transport layer to send the messages to each other.

o The transport layer protocols are implemented in the end systems but not in the network routers.

o A computer network provides more than one protocol to the network applications. For example, TCP and UDP are
two transport layer protocols that provide a different set of services to the network layer.

o All transport layer protocols provide multiplexing/demultiplexing service. It also provides other services such as
reliable data transfer, bandwidth guarantees, and delay guarantees.

o Each of the applications in the application layer has the ability to send a message by using TCP or UDP. The
application communicates by using either of these two protocols. Both TCP and UDP will then communicate with
the internet protocol in the internet layer. The applications can read and write to the transport layer. Therefore, we
can say that communication is a two-way process.

Transport Layer protocols


o The transport layer is represented by two protocols: TCP and UDP.

Sweta Barnwal
Page 1
Data Communication & Networking 5th Module

o The IP protocol in the network layer delivers a datagram from a source host to the destination host.

o Nowadays, the operating system supports multiuser and multiprocessing environments, an executing program is
called a process. When a host sends a message to other host means that source process is sending a process to a
destination process. The transport layer protocols define some connections to individual ports known as protocol
ports.

o An IP protocol is a host-to-host protocol used to deliver a packet from source host to the destination host while
transport layer protocols are port-to-port protocols that work on the top of the IP protocols to deliver the packet
from the originating port to the IP services, and from IP services to the destination port.

o Each port is defined by a positive integer address, and it is of 16 bits.

UDP
o UDP stands for User Datagram Protocol.

o UDP is a simple protocol and it provides nonsequenced transport functionality.

o UDP is a connectionless protocol.

o This type of protocol is used when reliability and security are less important than speed and size.

o UDP is an end-to-end transport level protocol that adds transport-level addresses, checksum error control, and
length information to the data from the upper layer.

o The packet produced by the UDP protocol is known as a user datagram.

User Datagram Format


The user datagram has a 16-byte header which is shown above.

Where,
Sweta Barnwal
Page 2
Data Communication & Networking 5th Module

o Source port address: It defines the address of the application process that has delivered a message. The source port
address is of 16 bits address.

o Destination port address: It defines the address of the application process that will receive the message. The
destination port address is of a 16-bit address.

o Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field.

o Checksum: The checksum is a 16-bit field which is used in error detection.

Disadvantages of UDP protocol


o UDP provides basic functions needed for the end-to-end delivery of a transmission.

o It does not provide any sequencing or reordering functions and does not specify the damaged packet when reporting
an error.

o UDP can discover that an error has occurred, but it does not specify which packet has been lost as it does not
contain an ID or sequencing number of a particular data segment.

TCP
o TCP stands for Transmission Control Protocol.

o It provides full transport layer services to applications.

o It is a connection-oriented protocol means the connection established between both the ends of the transmission. For
creating the connection, TCP generates a virtual circuit between sender and receiver for the duration of a
transmission.

Sweta Barnwal
Page 3
Data Communication & Networking 5th Module

Features of TCP protocol


o Stream data transfer: TCP protocol transfers the data in the form of contiguous stream of bytes. TCP group the
bytes in the form of TCP segments and then passed it to the IP layer for transmission to the destination. TCP itself
segments the data and forward to the IP.

o Reliability: TCP assigns a sequence number to each byte transmitted and expects a positive acknowledgement from
the receiving TCP. If ACK is not received within a timeout interval, then the data is retransmitted to the destination.
The receiving TCP uses the sequence number to reassemble the segments if they arrive out of order or to eliminate
the duplicate segments.

o Flow Control: When receiving TCP sends an acknowledgement back to the sender indicating the number the bytes
it can receive without overflowing its internal buffer. The number of bytes is sent in ACK in the form of the highest
sequence number that it can receive without any problem. This mechanism is also referred to as a window
mechanism.

o Multiplexing: Multiplexing is a process of accepting the data from different applications and forwarding to the
different applications on different computers. At the receiving end, the data is forwarded to the correct application.
This process is known as demultiplexing. TCP transmits the packet to the correct application by using the logical
channels known as ports.

o Logical Connections: The combination of sockets, sequence numbers, and window sizes, is called a logical
connection. Each connection is identified by the pair of sockets used by sending and receiving processes.

o Full Duplex: TCP provides Full Duplex service, i.e., the data flow in both the directions at the same time. To
achieve Full Duplex service, each TCP should have sending and receiving buffers so that the segments can flow in
both the directions. TCP is a connection-oriented protocol. Suppose the process A wants to send and receive the data
from process B. The following steps occur:

o Establish a connection between two TCPs.

o Data is exchanged in both the directions.

o The Connection is terminated.

Sweta Barnwal
Page 4
Data Communication & Networking 5th Module

TCP Segment Format

Where,

o Source port address: It is used to define the address of the application program in a source computer. It is a 16-bit
field.

o Destination port address: It is used to define the address of the application program in a destination computer. It is
a 16-bit field.

o Sequence number: A stream of data is divided into two or more TCP segments. The 32-bit sequence number field
represents the position of the data in an original data stream.

o Acknowledgement number: A 32-field acknowledgement number acknowledge the data from other
communicating devices. If ACK field is set to 1, then it specifies the sequence number that the receiver is expecting
to receive.

o Header Length (HLEN): It specifies the size of the TCP header in 32-bit words. The minimum size of the header
is 5 words, and the maximum size of the header is 15 words. Therefore, the maximum size of the TCP header is 60
bytes, and the minimum size of the TCP header is 20 bytes.

o Reserved: It is a six-bit field which is reserved for future use.

o Control bits: Each bit of a control field functions individually and independently. A control bit defines the use of a
segment or serves as a validity check for other fields.

There are total six types of flags in control field:


o URG: The URG field indicates that the data in a segment is urgent.

o ACK: When ACK field is set, then it validates the acknowledgement number.

Sweta Barnwal
Page 5
Data Communication & Networking 5th Module

o PSH: The PSH field is used to inform the sender that higher throughput is needed so if possible, data must be
pushed with higher throughput.

o RST: The reset bit is used to reset the TCP connection when there is any confusion occurs in the sequence numbers.

o SYN: The SYN field is used to synchronize the sequence numbers in three types of segments: connection request,
connection confirmation ( with the ACK bit set ), and confirmation acknowledgement.

o FIN: The FIN field is used to inform the receiving TCP module that the sender has finished sending data. It is used
in connection termination in three types of segments: termination request, termination confirmation, and
acknowledgement of termination confirmation.

o Window Size: The window is a 16-bit field that defines the size of the window.

o Checksum: The checksum is a 16-bit field used in error detection.

o Urgent pointer: If URG flag is set to 1, then this 16-bit field is an offset from the sequence number
indicating that it is a last urgent data byte.

o Options and padding: It defines the optional fields that convey the additional information to the receiver.

Stop and Wait ARQ


 Used in Connection-oriented communication.
 It offers error and flow control
 It is used in Data Link and Transport Layers
 Stop and Wait ARQ mainly implements Sliding Window Protocol concept with Window Size 1

Useful Terms:

 Propagation Delay: Amount of time taken by a packet to make a physical journey from one router to another
router.
Propagation Delay = (Distance between routers) / (Velocity of propagation)

Simple Stop and Wait

Sender:

Rule 1) Send one data packet at a time.


Rule 2) Send next packet only after receiving acknowledgement for previous.

Sweta Barnwal
Page 6
Data Communication & Networking 5th Module

Receiver:

Rule 1) Send acknowledgement after receiving and consuming of data packet.


Rule 2) After consuming packet acknowledgement need to be sent (Flow Control)

Problems :

1. Lost Data
2. Lost Acknowledgement
3. Delayed Acknowledgement/Data

Stop and Wait ARQ (Automatic Repeat Request)

Above 3 problems are resolved by Stop and Wait ARQ (Automatic Repeat Request) that does both error control
and flow control.

Sliding Window Protocol


The sliding window protocol is primarily an error control protocol, i.e. it is a method of error detection and error correction.

 Sliding window protocol is a flow control protocol.


 It allows the sender to send multiple frames before needing the acknowledgements.
 Sender slides its window on receiving the acknowledgements for the sent frames.
Sweta Barnwal
Page 7
Data Communication & Networking 5th Module

 This allows the sender to send more frames.


 It is called so because it involves sliding of sender’s window.
Maximum number of frames that sender can send without acknowledgement = Sender window size

Go-Back-N: Go-Back-N protocol is a sliding window protocol. It is a mechanism to detect and control the error in data
link layer. During transmission of frames between sender and receiver, if a frame is damaged, lost, or an acknowledgement
is lost then the action performed by sender and receiver is explained in the following content.

Damaged Frame: If a receiver receives a damaged frame or if an error occurs while receiving a frame then, the receiver
sends the NAK (negative acknowledgement) for that frame along with that frame number, that it expects to be retransmitted.
After sending NAK, the receiver discards all the frames that it receives, after a damaged frame. The receiver does not send
any ACK (acknowledgement) for the discarded frames. After the sender receives the NAK for the damaged frame, it
retransmits all the frames onwards the frame number referred by NAK.

Lost frame: The receiver checks the number on each frame, it receives. If a frame number is skipped in a sequence, then the
receiver easily detects the loss of a frame as the newly received frame is received out of sequence. The receiver sends the
NAK for the lost frame and then the receiver discards all the frames received after a lost frame. The receiver does not send
any ACK (acknowledgement) for that discarded frames. After the sender receives the NAK for the lost frame, it retransmits
the lost frame referred by NAK and also retransmits all the frames which it has sent after the lost frame.

Lost Acknowledgement: If the sender does not receive any ACK or if the ACK is lost or damaged in between the
transmission. The sender waits for the time to run out and as the time run outs, the sender retransmits all the frames for
which it has not received the ACK. The sender identifies the loss of ACK with the help of a timer.

Selective Repeat

Selective repeat is also the sliding window protocol which detects or corrects the error occurred in datalink layer.
The selective repeat protocol retransmits only that frame which is damaged or lost. In selective repeat protocol,
the retransmitted framed is received out of sequence. The selective repeat protocol can perform following actions

Sweta Barnwal
Page 8
Data Communication & Networking 5th Module

 The receiver is capable of sorting the frame in a proper sequence, as it receives the retransmitted frame whose
sequence is out of order of the receiving frame.

 The sender must be capable of searching the frame for which the NAK has been received.

 The receiver must contain the buffer to store all the previously received frame on hold till the retransmitted frame is
sorted and placed in a proper sequence.

 The ACK number, like NAK number, refers to the frame which is lost or damaged.

 It requires the less window size as compared to go-back-n protocol.

Damaged frames: If a receiver receives a damaged frame, it sends the NAK for the frame in which error or damage is
detected. The NAK number, like in go-back-n also indicate the acknowledgement of the previously received frames and
error in the current frame. The receiver keeps receiving the new frames while waiting for the damaged frame to be replaced.
The frames that are received after the damaged frame are not be acknowledged until the damaged frame has been replaced.

Lost Frame: As in a selective repeat protocol, a frame can be received out of order and further they are sorted to maintain a
proper sequence of the frames. While sorting, if a frame number is skipped, the receiver recognize that a frame is lost and it
sends NAK for that frame to the sender. After receiving NAK for the lost frame the sender searches that frame in its window
and retransmits that frame. If the last transmitted frame is lost then receiver does not respond and this silence is a negative
acknowledgement for the sender.

Lost Acknowledgement: If the sender does not receive any ACK or the ACK is lost or damaged in between the
transmission. The sender waits for the time to run out and as the time run outs, the sender retransmit all the frames for which
it has not received the ACK. The sender identifies the loss of ACK with the help of a timer.

Conclusion:

The selective repeat is a more efficient protocol as it does not waste bandwidth for the frames which are properly received
but, its complexity and expense favors the use of the go-back-n protocol.

Sweta Barnwal
Page 9
Data Communication & Networking 5th Module

Comparison Chart

BASIS FOR
GO-BACK-N SELECTIVE REPEAT
COMPARISON

Basic Retransmits all the frames that sent after the Retransmits only those frames that are suspected
frame which suspects to be damaged or to lost or damaged.
lost.

Bandwidth If error rate is high, it wastes a lot of Comparatively less bandwidth is wasted in
Utilization bandwidth. retransmitting.

Complexity Less complicated. More complex as it require to apply extra logic


and sorting and storage, at sender and receiver.

Window size N-1 <= (N+1)/2

Sorting Sorting is neither required at sender side Receiver must be able to sort as it has to maintain
nor at receiver side. the sequence of the frames.

Storing Receiver do not store the frames received Receiver stores the frames received after the
after the damaged frame until the damaged damaged frame in the buffer until the damaged
frame is retransmitted. frame is replaced.

Searching No searching of frame is required neither The sender must be able to search and select only
on sender side nor on receiver the requested frame.

ACK Numbers NAK number refer to the next expected NAK number refer to the frame lost.
frame number.

Use It more often used. It is less in practice because of its complexity.

Bidirectional Protocols
Data in both directions

Acknowledgement returned in both ways

Sweta Barnwal
Page 10
Data Communication & Networking 5th Module

Client/Server Protocols

The client-server architecture is also termed as a network-computing structure because every request and their associated
services are distributed over a network. So now the question is how the thing works? In the client-server architecture, when
the client computer sends a request for data to the server through the internet, the server accepts the requested, process it and
deliver the data packets requested back to the client. One special feature is that the server computer has the potential to
manage numerous clients at the same time. Also, a single client can connect to numerous servers at a single timestamp,
where each server provides a different set of services to that specific client. The clients and servers are two different
computers in different parts of the world that are connected through the Internet. However, it is not compulsory to have the
client, and the server resides miles apart, rather it could remain within the same building as well.

Sweta Barnwal
Page 11
Data Communication & Networking 5th Module

Client

A client is a program that runs on the local machine requesting service from the server. A client program is a finite program
means that the service started by the user and terminates when the service is completed.

Server

A server is a program that runs on the remote machine providing services to the clients. When the client requests for a
service, then the server opens the door for the incoming requests, but it never initiates the service.

A server program is an infinite program means that when it starts, it runs infinitely unless the problem arises. The server
waits for the incoming requests from the clients. When the request arrives at the server, then it responds to
the request.

Sweta Barnwal
Page 12
Advantages of Client-server networks:
o Centralized: Centralized back-up is possible in client-server networks, i.e., all the data is stored in a server.

o Security: These networks are more secure as all the shared resources are centrally administered.

o Performance: The use of the dedicated server increases the speed of sharing resources. This increases the
performance of the overall system.

o Scalability: We can increase the number of clients and servers separately, i.e., the new element can be added, or we
can add a new node in a network at any time.

Disadvantages of Client-Server network:


o Traffic Congestion is a big problem in Client/Server networks. When a large number of clients send requests to the
same server may cause the problem of Traffic congestion.

o It does not have a robustness of a network, i.e., when the server is down, then the client requests cannot be met.

o A client/server network is very decisive. Sometimes, regular computer hardware does not serve a certain number of
clients. In such situations, specific hardware is required at the server side to complete the work.

o Sometimes the resources exist in the server but may not exist in the client. For example, If the application is web,
then we cannot take the print out directly on printers without taking out the print view window on the web.

DNS
An application layer protocol defines how the application processes running on different systems, pass the messages to each
other.

o DNS stands for Domain Name System.

o DNS is a directory service that provides a mapping between the name of a host on the network and its numerical
address.

o DNS is required for the functioning of the internet.

o Each node in a tree has a domain name, and a full domain name is a sequence of symbols specified by dots.

o DNS is a service that translates the domain name into IP addresses. This allows the users of networks to utilize user-
friendly names when looking for other hosts instead of remembering the IP addresses.

o For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50, most people would reach this
site by specifying ftp.EduSoft.com. Therefore, the domain name is more reliable than IP address.

DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into three different sections:
generic domains, country domains, and inverse domain.
Generic Domains
o It defines the registered hosts according to their generic behavior.

o Each node in a tree defines the domain name, which is an index to the DNS database.

o It uses three-character labels, and these labels describe the organization type.

Label Description

aero Airlines and aerospace companies

biz Businesses or firms

com Commercial Organizations

coop Cooperative business Organizations

edu Educational institutions

gov Government institutions

info Information service providers


int International Organizations

mil Military groups

Country Domain: The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States) in place of three character organizational abbreviations.

Inverse Domain: The inverse domain is used for mapping an address to a name. When the server has received a request
from the client, and the server contains the files of only authorized clients. To determine whether the client is on the
authorized list or not, it sends a query to the DNS server and ask for mapping an address to the name.

Working of DNS
o DNS is a client/server network communication protocol. DNS clients send requests to the. server while DNS servers
send responses to the client.

o Client requests contain a name which is converted into an IP address known as a forward DNS lookups while
requests containing an IP address which is converted into a name known as reverse DNS lookups.

o DNS implements a distributed database to store the name of all the hosts available on the internet.

o If a client like a web browser sends a request containing a hostname, then a piece of software such as DNS
resolver sends a request to the DNS server to obtain the IP address of a hostname. If DNS server does not contain
the IP address associated with a hostname, then it forwards the request to another DNS server. If IP address has
arrived at the resolver, which in turn completes the request over the internet protocol.

FTP

o FTP stands for File transfer protocol.

o FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to another.

o It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other
computers on the internet.

o It is also used for downloading the files to computer from other servers.

Objectives of FTP
o It provides the sharing of files.

o It is used to encourage the use of remote computers.


o It transfers the data more reliably and efficiently.

Why FTP?

Although transferring files from one system to another is very simple and straightforward, but sometimes it can cause
problems. For example, two systems may have different file conventions. Two systems may have different ways to represent
text and data. Two systems may have different directory structures. FTP protocol overcomes these problems by establishing
two connections between hosts. One connection is used for data transfer, and another connection is used for the control
connection.

Mechanism of FTP

In the figure shows the basic model of the FTP. The FTP client has three components: the user interface, control process,
and data transfer process. The server has two components: the server control process and the server data transfer process.

Control Connection: The control connection uses very simple rules for communication. Through control connection, we
can transfer a line of command or line of response at a time. The control connection is made between the control processes.
The control connection remains connected during the entire interactive FTP session.

Data Connection: The Data Connection uses very complex rules as data types may vary. The data connection is made
between data transfer processes. The data connection opens when a command comes for transferring the files and closes
when the file is transferred.

Advantages of FTP:
o Speed: One of the biggest advantages of FTP is speed. The FTP is one of the fastest way to transfer the files from
one computer to another computer.

o Efficient: It is more efficient as we do not need to complete all the operations to get the entire file.

o Security: To access the FTP server, we need to login with the username and password. Therefore, we can say that
FTP is more secure.
o Back & forth movement: FTP allows us to transfer the files back and forth. Suppose you are a manager of the
company, you send some information to all the employees, and they all send information back on the same server.

Disadvantages of FTP:
o The standard requirement of the industry is that all the FTP transmissions should be encrypted. However, not all the
FTP providers are equal and not all the providers offer encryption. So, we will have to look out for the FTP
providers that provides encryption.

o FTP serves two operations, i.e., to send and receive large files on a network. However, the size limit of the file is
2GB that can be sent. It also doesn't allow you to run simultaneous transfers to multiple receivers.

o Passwords and file contents are sent in clear text that allows unwanted eavesdropping. So, it is quite possible that
attackers can carry out the brute force attack by trying to guess the FTP password.

o It is not compatible with every system.

Telnet

o The main task of the internet is to provide services to users. For example, users want to run different application
programs at the remote site and transfers a result to the local site. This requires a client-server program such as FTP,
SMTP. But this would not allow us to create a specific program for each demand.

o The better solution is to provide a general client-server program that lets the user access any application program on
a remote computer. Therefore, a program that allows a user to log on to a remote computer. A popular client-server
program Telnet is used to meet such demands. Telnet is an abbreviation for Terminal Network.

o Telnet provides a connection to the remote computer in such a way that a local terminal appears to be at the remote
side.

There are two types of login:


Local Login:

o When a user logs into a local computer, then it is known as local login.

o When the workstation running terminal emulator, the keystrokes entered by the user are accepted by the terminal
driver. The terminal driver then passes these characters to the operating system which in turn, invokes the desired
application program.

o However, the operating system has special meaning to special characters. For example, in UNIX some combination
of characters have special meanings such as control character with "z" means suspend. Such situations do not create
any problem as the terminal driver knows the meaning of such characters. But, it can cause the problems in remote
login.
Remote login

When the user wants to access an application program on a remote computer, then the user must perform remote
login.

https://www.javatpoint.com/computer-network-http

HTTP
o HTTP stands for HyperText Transfer Protocol.

o It is a protocol used to access the data on the World Wide Web (www).

o The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio, video, and so on.

o This protocol is known as HyperText Transfer Protocol because of its efficiency that allows us to use in a hypertext
environment where there are rapid jumps from one document to another document.

o HTTP is similar to the FTP as it also transfers the files from one host to another host. But, HTTP is simpler than
FTP as HTTP uses only one connection, i.e., no control connection to transfer the files.

o HTTP is used to carry the data in the form of MIME-like format.

o HTTP is similar to SMTP as the data is transferred between client and server. The HTTP differs from the SMTP in
the way the messages are sent from the client to the server and from server to the client. SMTP messages are stored
and forwarded while HTTP messages are delivered immediately.

Features of HTTP:
o Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a request and waits for a
response from the server. When the server receives the request, the server processes the request and sends back the
response to the HTTP client after which the client disconnects the connection. The connection between client and
server exist only during the current request and response time only.
o Media independent: HTTP protocol is a media independent as data can be sent as long as both the client and server
know how to handle the data content. It is required for both the client and server to specify the content type in
MIME-type header.

o Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current request.
Due to this nature of the protocol, both the client and server do not retain the information between various requests
of the web pages.

HTTP Transactions
The above figure shows the HTTP transaction between client and server. The client initiates a transaction by sending a
request message to the server. The server replies to the request message by sending a response message.

Messages: HTTP messages are of two types: request and response. Both the message types follow the same message
format.

Request Message: The request message is sent by the client that consists of a request line, headers, and sometimes a body.

Response Message: The response message is sent by the server to the client that consists of a status line, headers, and
sometimes a body.
Format of Request Message & Response Message

Secure Shell (SSH)


Secure Shell (SSH) is a cryptographic protocol and interface for executing network services, shell services and secure
network communication with a remote computer. Secure Shell enables two remotely connected users to perform network
communication and other services on top of an unsecured network. It was initially a Unix-based command but is now
supported on Windows-based systems as well. SSH was primarily designed to enable a user to securely log on to a remote
computer and perform shell and network services. For example, it could be used by network administrators logging into a
remote Web server.

SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has
managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the
connection when encryptions enabled.

When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted;
therefore it is almost impossible for an outsider to collect passwords.

E-Mail
Short for electronic mail, e-mail or email is information stored on a computer that is exchanged between two users over
telecommunications. More plainly, e-mail is a message that may contain text, files, images, or other attachments sent
through a network to a specified individual or group of individuals.

The first e-mail was sent by Ray Tomlinson in 1971. Tomlinson sent the e-mail to himself as a test e-mail message,
containing the text "something like QWERTYUIOP." However, despite sending the e-mail to himself, the e-mail message
was still transmitted through ARPANET.

E -mail address breakdown

support@computerhope.com
The first portion of all e-mail addresses, the part before the @ symbol, contains the alias, user, group, or department of a
company. In our above example, support is the Technical Support department at Computer Hope.
Next, the @ (at sign) is used as a divider in the e-mail address; it is required for all SMTP e-mail addresses since the first
message was sent by Ray Tomlinson.
Finally, computerhope.com is the domain name to which the user belongs.
WWW
The World Wide Web abbreviated as WWW and commonly known as the web created, by Timothy Berner’s Lee in 1989,
for researchers to work together effectively at CERN.. The WWW was initiated by CERN (European library for Nuclear
Research) in 1989.

Working of WWW:
The World Wide Web is based on several different technologies : Web browsers, Hypertext Markup Language (HTML) and
Hypertext Transfer Protocol (HTTP).

An Web browser is used to access webpages. Web browsers can be defined as programs which display text, data, pictures,
animation and video on the Internet. Hyperlinked resources on the World Wide Web can be accessed using software
interface provided by Web browsers. Initially Web browsers were used only for surfing the Web but now they have become
more universal. Web browsers can be used for several tasks including conducting searches, mailing, transferring files, and
much more. Some of the commonly used browsers are Internet Explorer, Opera Mini, Google Chrome.

Features of WWW:

 HyperText Information System

 Cross-Platform

 Distributed

 Open Standards and Open Source

 Uses Web Browsers to provide a single interface for many services

 Dynamic, Interactive and Evolving.

 “Web 2.0”

Components of Web
There are 3 components of web:

1. Uniform Resource Locator (URL): serves as system for resources on web.

2. HyperText Transfer Protocol (HTTP): specifies communication of browser and server.

3. Hyper Text Markup Language (HTML): defines structure, organisation and content of webpage.

Das könnte Ihnen auch gefallen