0% found this document useful (0 votes)
191 views

Web Design and Devlopment Assignment 1

The document provides explanations of various networking protocols: - ARP resolves IP addresses to MAC addresses on local networks. - DHCP dynamically allocates IP addresses and network settings to devices on a network. - DNS translates human-readable domain names to machine-readable IP addresses. - Several other protocols are described, including FTP, HTTP, IMAP, and IP, that facilitate file transfers, web browsing, email access, and internet communication.

Uploaded by

Nurye Nigus
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views

Web Design and Devlopment Assignment 1

The document provides explanations of various networking protocols: - ARP resolves IP addresses to MAC addresses on local networks. - DHCP dynamically allocates IP addresses and network settings to devices on a network. - DNS translates human-readable domain names to machine-readable IP addresses. - Several other protocols are described, including FTP, HTTP, IMAP, and IP, that facilitate file transfers, web browsing, email access, and internet communication.

Uploaded by

Nurye Nigus
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Name - Nurye Nigus

Web Design and Development Assignment

Assignment-1

Explain the following:

ARP: Address Resolution Protocol

The Address Resolution Protocol (ARP) is a network protocol used to resolve or map an IP address to its
corresponding physical (MAC) address on a local network. When a device wants to communicate with
another device on the same network, it needs to know the MAC address of the destination device. The
ARP protocol allows devices to send an ARP request, containing the IP address they want to resolve, to
the local network. The device with the corresponding IP address responds with its MAC address, which is
then stored in the ARP cache of the requesting device. Subsequent communication between the devices
can then be done using the MAC address. ARP plays a vital role in facilitating communication within local
networks by enabling devices to find and identify each other.

DHCP: Dynamic Host Configuration Protocol

Dynamic Host Configuration Protocol (DHCP) is a network protocol that automates the process of
assigning IP addresses and other network configuration parameters to devices on a network. It
eliminates the need for manual configuration by providing a centralized server, known as a DHCP server,
that dynamically allocates IP addresses from a predefined pool to devices when they connect to the
network. DHCP also manages the lease duration of IP addresses, allowing them to be reused when
devices disconnect. Additionally, DHCP can provide additional network configuration settings such as
subnet masks, default gateways, and DNS server addresses, enabling seamless and efficient network
connectivity for devices in a dynamic network environment.

DNS: Domain Name Service

The Domain Name System (DNS) is a fundamental protocol used on the internet to translate human-
readable domain names, such as example.com, into machine-readable IP addresses, such as 192.0.2.1. It
functions as a distributed directory service, allowing users to access websites and other internet
resources by typing in easy-to-remember domain names instead of remembering the complex numerical
IP addresses associated with each resource. DNS operates through a hierarchical structure of servers that
store and distribute DNS records, enabling efficient and reliable resolution of domain names to IP
addresses, facilitating smooth internet communication and navigation.

DSN: Data Source Name

A Data Source Name (DSN) is a configuration setting used to establish a connection to a data source,
such as a database or a file. It serves as an identifier for the data source and contains the necessary
information to connect to it, including the driver name, server address, port number, database name,
and authentication credentials. DSNs are commonly used in applications and programming languages to
provide a standardized way of specifying data sources, allowing developers to easily manage and switch
between different databases or data files without modifying their code. By using DSNs, the connection
details can be abstracted and centralized, simplifying the process of connecting to data sources and
promoting reusability and flexibility in data access.

FTP: File Transfer Protocol

File Transfer Protocol (FTP) is a standard network protocol used for transferring files between a client
and a server on a computer network. It provides a simple and reliable method for users to upload and
download files, as well as perform various file operations such as renaming, deleting, and creating
directories. FTP operates on the client-server model, where the client initiates a connection to the server
using the FTP software. Once connected, users can navigate through directories, transfer files by sending
commands to the server, and receive responses back. FTP supports both authenticated and anonymous
access, allowing users to provide credentials or access certain public resources without authentication.
Although FTP is widely used, it is considered less secure than other protocols like SFTP or FTPS, as it does
not encrypt data during transmission, making it susceptible to eavesdropping and data tampering.

HTTP: Hypertext Transfer Protocol

HTTP (Hypertext Transfer Protocol) is a communication protocol that enables the transfer of hypertext,
typically in the form of web pages, between a client (such as a web browser) and a server. It serves as
the foundation of the World Wide Web, facilitating the retrieval and display of information. When a
client makes a request to a server, using a URL (Uniform Resource Locator), HTTP specifies the format
and structure of the request and response messages. It operates on a client-server model, where the
client initiates a connection, sends a request for a resource, and receives a response containing the
requested data. HTTP is stateless, meaning it does not retain information about previous requests, but it
can be enhanced using cookies or session management techniques to maintain state. With its simple and
widely adopted structure, HTTP allows for the seamless exchange of information over the internet,
enabling users to access and navigate web pages efficiently.

IMAP: Internet Message Access Protocol

IMAP, which stands for Internet Message Access Protocol, is a widely used email protocol that enables
users to access and manage their email messages on a remote mail server. Unlike the POP (Post Office
Protocol) protocol, which is more commonly used for retrieving and downloading email to a local device,
IMAP allows users to access their email from multiple devices while keeping messages synchronized
across all devices. With IMAP, users can view, organize, and search their email folders, create and
manage folders, and perform various actions on their email messages, such as marking them as read,
deleting them, or moving them to different folders. IMAP also supports advanced features like server-
side searching and email message flags, providing a more versatile and flexible email experience.

ICMP: Internet Control Message Protocol

The Internet Control Message Protocol (ICMP) is a network layer protocol that is used to report errors,
exchange control messages, and provide diagnostic information in IP networks. It operates by sending
messages between network devices, such as routers and hosts, to communicate information about
network conditions or to troubleshoot network issues. ICMP messages include error messages indicating
unreachable destinations, timeouts, and routing issues, as well as echo requests and replies used by
tools like ping for network connectivity testing. ICMP plays a crucial role in the proper functioning and
management of IP networks by facilitating communication and aiding in network troubleshooting.
IDRP: ICMP Router-Discovery Protocol

The ICMP Router-Discovery Protocol (IDRP) is a network protocol used to dynamically discover and
communicate with routers in an IP network. It operates at the Internet Control Message Protocol (ICMP)
layer and enables hosts to discover the presence of neighboring routers and their corresponding IP
addresses. IDRP allows routers to advertise their routing capabilities, such as their default gateway
address and other relevant information, to hosts on the network. This protocol plays a crucial role in
facilitating efficient routing and connectivity within IP networks by providing a mechanism for hosts to
automatically discover and establish communication with routers.

IP: Internet Protocol

IP, or Internet Protocol, is a fundamental protocol that enables communication and data transfer over
the internet. It is responsible for addressing and routing data packets across networks, ensuring that
information reaches its intended destination. IP provides a unique numerical identifier, called an IP
address, to each device connected to the internet, allowing them to send and receive data. It also
defines the structure and format of data packets, breaking down information into smaller units for
efficient transmission. IP operates in conjunction with other protocols, such as TCP (Transmission Control
Protocol), to establish reliable connections and ensure the delivery of data. Overall, IP forms the
backbone of the internet, facilitating seamless communication and enabling the vast network of
interconnected devices and systems that we rely on today.

IRC: Internet Relay Chat Protocol

IRC (Internet Relay Chat) is a communication protocol that enables real-time text-based conversations
over the Internet. It operates on a client-server model, where users connect to IRC servers using
specialized software or web-based clients. Users can join channels, which are virtual rooms where
multiple participants can engage in discussions. IRC supports private messaging, file transfers, and the
exchange of various types of data. It uses a simple, text-based format and relies on commands and
messages to facilitate communication between users. IRC has been widely used for online communities,
group collaboration, and real-time chat since its creation in the late 1980s.

POP3: Post Office Protocol version 3

POP3, which stands for Post Office Protocol version 3, is a widely used internet standard for email
retrieval. It enables email clients to connect to a remote mail server and download email messages to
the client's device for offline access. POP3 operates on the client-server model, where the client sends
requests to the server to authenticate, retrieve emails, and manage them. It supports simple
authentication methods like username and password and offers limited functionality compared to more
advanced protocols like IMAP. POP3 is commonly used by email clients to retrieve emails from the
server, delete them from the server once downloaded (although some clients offer the option to keep
copies), and efficiently manage the storage of email messages on the client's device.

PAR: Positive Acknowledgment and Retransmission

Positive Acknowledgment and Retransmission (PAR) is a protocol used in network communication to


ensure reliable delivery of data packets. When a sender transmits a packet, the receiver sends an
acknowledgment (ACK) to indicate successful receipt. In the case of a missing or corrupted packet, the
receiver sends a negative acknowledgment (NAK), prompting the sender to retransmit the lost packet.
PAR operates on a selective retransmission basis, where only the specific missing packets are
retransmitted, reducing unnecessary network traffic. This feedback mechanism ensures data integrity
and reliability in transmitting information between network endpoints.

RLOGIN: Remote Login

RLOGIN, which stands for Remote Login, is a network protocol that enables users to log into remote
computers and access their resources over a network. It provides a way for users to establish a terminal
session on a remote host as if they were physically present at that computer. RLOGIN allows users to
execute commands, transfer files, and perform various tasks on the remote system. It operates on the
Telnet protocol and typically requires a username and password for authentication. However, RLOGIN is
considered insecure as it transmits data, including login credentials, in plaintext, making it susceptible to
eavesdropping and unauthorized access. As a result, the usage of RLOGIN has declined in favor of more
secure remote login protocols such as SSH (Secure Shell).

SMTP: Simple Mail Transfer Protocol

SMTP, which stands for Simple Mail Transfer Protocol, is a widely used internet standard for sending and
receiving email messages. It serves as the primary method of email transmission between mail servers.
SMTP enables the reliable and efficient delivery of electronic mail by establishing a connection between
the sender's mail server and the recipient's mail server. It defines the rules and procedures for message
transfer, including addressing, authentication, and error handling. SMTP operates on a client-server
model, where the client initiates the connection and transfers the message to the server for further
routing and delivery. It provides a straightforward and standardized way for different email systems to
communicate and exchange messages, making it an essential component of the global email
infrastructure.

SSL: Secure Sockets Layer

SSL (Secure Sockets Layer) is a cryptographic protocol that provides secure communication over the
internet. It establishes an encrypted connection between a client (such as a web browser) and a server
(such as a website) to ensure that sensitive information transmitted between them remains private and
protected from unauthorized access. SSL uses a combination of symmetric and asymmetric encryption
algorithms to secure the data, authenticates the server's identity using digital certificates, and ensures
the integrity of the transmitted data through message authentication codes. By employing SSL, users can
trust that their online interactions are secure, reducing the risk of eavesdropping, data tampering, and
identity theft.

SSH: Secure Shell

SSH (Secure Shell) is a cryptographic network protocol that provides a secure and encrypted channel for
remote administration, file transfer, and secure communication over an unsecured network. It allows
users to securely connect to a remote server or device, authenticate themselves using cryptographic
keys or passwords, and securely transmit data between the client and server. SSH ensures confidentiality,
integrity, and authenticity of the data by encrypting it, verifying the identity of the remote server, and
protecting against eavesdropping and tampering. It is widely used by system administrators, developers,
and users who require secure remote access to manage and control remote systems.

TCP: Transmission Control Protocol

The Transmission Control Protocol (TCP) is a core protocol of the Internet protocol suite that provides
reliable, ordered, and error-checked delivery of data packets between devices over a network. TCP
ensures the successful transmission of data by breaking it into smaller packets, numbering them, and
verifying their integrity through error detection and retransmission mechanisms. It establishes a
connection-oriented communication channel between a sender and a receiver, employing a three-way
handshake for initialization. TCP also implements flow control to prevent overwhelming the receiver and
congestion control to manage network congestion. It is widely used in applications that require
guaranteed delivery of data, such as web browsing, email, file transfer, and streaming services.

TELNET: TCP/IP Terminal Emulation Protocol

TELNET is a TCP/IP terminal emulation protocol that enables remote access and control of computers
and devices over a network. It provides a means for establishing a virtual terminal session between a
local client and a remote server, allowing users to remotely log in and execute commands on the server
as if they were physically present. TELNET operates using a client-server model, with the client initiating
a connection to the server and transmitting keystrokes and commands that are then executed on the
server-side. The protocol facilitates the exchange of text-based information, but it lacks encryption,
making it susceptible to security vulnerabilities. Despite its limitations, TELNET has been widely used for
remote administration and network management purposes.

UPD: User Datagram Protocol

User Datagram Protocol (UDP) is a connectionless transport layer protocol that operates on the Internet
Protocol (IP) network. It provides a simple, lightweight, and unreliable delivery mechanism for data
packets. Unlike Transmission Control Protocol (TCP), UDP does not establish a dedicated connection
before sending data, nor does it guarantee the delivery or order of packets. Instead, UDP focuses on low
overhead and minimal latency, making it suitable for time-sensitive applications like real-time streaming,
gaming, and VoIP. It is often used for quick data exchanges, where occasional packet loss is acceptable,
and the application layer can handle error correction or retransmission if needed. UDP uses ports to
differentiate between multiple applications running on the same device and enables communication
between different devices on the network.

Multiple Choice Answers:

1-B,

2-A,

3-C,

4-B,
5-D,

6-A,

7-B,

8-A,

9.C

10. Create a webpage that prints your name to the screen

<html>

<head>

<title> My Name </title>

</head>

<body> <h1> Nurye Nigus </h1>

</body>

</html>

11. Print your name to the screen with every letter being a different heading size

<html>

<head>

<title> My Name </title>

</head>

<body> <h1> N </h1>

<h2> U </h2>

<h3> R </h3>

<h4> Y </h4>

<h5> E </h5>

</body>
</html>

12. Create a webpage and set its title to "This is a webpage"

<html>

<head>

<title> This is Web Page </title>

</head>

<body>

</body>

</html>

13. Create a webpage that prints the numbers 1 - 10 to the screen, each

number being a different

<html>

<head>

<title>Number Display</title>

</head>

<body>

<h1>Numbers 1 - 10 </h1>

<ul>

<li>1</li>

<li>2</li>

<li>3</li>

<li>4</li>

<li>5</li>

<li>6</li>
<li>7</li>

<li>8</li>

<li>9</li>

<li>10</li>

</ul>

</body>

</html>

14. Print a paragraph with 4 - 5 sentences. Each sentence should be a different

font.

<html>

<head>

<title>Font with diffrent Sentences </title>

<style>

/* Define the font styles */

.font1 {

font-family: Arial, sans-serif;

.font2 {

font-family: Verdana, sans-serif;

.font3 {

font-family: Georgia, serif;

.font4 {

font-family: Courier New, monospace;

.font5 {
font-family: Impact, sans-serif;

</style>

</head>

<body>

<p>

<span class="font1"> Web design is very intersting course </span><br>

<span class="font2"> fter i done this course i will design my website </span><br>

<span class="font3"> My Web page will include pictures </span><br>

<span class="font4"> My web page will include tables </span><br>

<span class="font5"> My Web page will have pictures and videos </span><br>

</p>

</body>

</html>

15. Create some links to various search engines (google, yahoo, altavista, lycos,

etc)

<html>

<head>

<title>Search Engines</title>

</head>

<body>

<h1>Search Engines</h1>

<ul>

<li><a href="https://www.google.com">Google</a></li>

<li><a href="https://www.yahoo.com">Yahoo</a></li>

<li><a href="https://www.altavista.com">Altavista</a></li>

<li><a href="https://www.lycos.com">Lycos</a></li>
</ul>

</body>

</html>

16. Create links to five different pages on five different websites that should all

open in a new window.

<html>

<head>

<title>My Webpage</title>

</head>

<body>

<h1>Welcome to My Webpage</h1>

<p>Check out these five different websites:</p>

<ul>

<li><a href="https://www.facebook.com" target="_blank">Website 1</a></li>

<li><a href="https://www.twitter.com" target="_blank">Website 2</a></li>

<li><a href="https://www.youtube.com" target="_blank">Website 3</a></li>

<li><a href="https://www.instagram.com" target="_blank">Website 4</a></li>

<li><a href="https://www.bing.com" target="_blank">Website 5</a></li>

</ul>

</body>

</html>

17. Create a page with a link at the top of it that when clicked will jump all the

way to the bottom of the page.

<html>
<head>

<title>Jump to Bottom</title>

<style>

#bottom {

height: 1000px;

</style>

</head>

<body>

<a href="#bottom">Jump to Bottom</a>

<div id="bottom">

<!-- Content at the bottom of the page -->

</div>

</body>

</html>

18. Create a page with a link at the bottom of it that when clicked will jump all

the way to the top of the page.

<html>

<head>

<title>Jump to Top</title>

</head>

<body>

<a href="#top">Jump to Top</a>

<div id="top">

<!-- Content at the top of the page -->


</div>

<div style="height: 1000px;">

<!-- Rest of the content -->

</div>

</body>

</html>

19. Create a webpage that looks like the screenshot below

<html>

<head>

<h1>The Story in the Book</h1>

<h2>Chapter 1</h2>

</head>

<body>

<p>

Molly had been staring out of her window for about an hour now. On her desk, lying between the
copies of <i>Natural,

New Scientist,</i> and all the other scientists her work had appeared in, was a well-thumbed copy of
<i>On The

Road</i>. It had been Molly's favorite book since college, and the longer she spent in these four
walls, the more

she felt she needed to be free.

she had spent the last ten years in this room, sitting under a poster with an Oscar Wilde quote
proclaiming the

<q>Work is the refuge of people who have nothing better to do</q>. Although many considered her
pioneering work,

unraveling the llama <acronym title="deoxyribonucleic acid">DNA</acronym>, the secrets was an


outstanding
achievement. Molly <i>did</i> think she had something

<acronym title="Deoxyribonucleic acid">DNA</acronym>.

</p>

</body>

</html>

20. List few commons attributes that can be used with following tags

A. <H1> , <P>, <OL>, <UL>, <A>

<H1> tag:

- `class`: Specifies one or more class names for an element.

- `id`: Specifies a unique ID for an element.

- `style`: Specifies inline CSS styles for an element.

<P> tag:

- `class`

- `id`

- `style`

<OL> tag (ordered list):

- `class`

- `id`

- `style`

- `start`: Specifies the starting number of the list.

<UL> tag (unordered list):

- `class`
- `id`

- `style`

<A> tag (anchor/link):

- `class`

- `id`

- `style`

- `href`: Specifies the URL of the linked page or resource.

- `target`: Specifies where to open the linked page/resource (_self, _blank, _parent, _top).

21. How to create a link to a specific part of another page?

<html>

<head>

</head>

<body>

<p id="my-paragraph">This is the paragraph I want to link to.</p>

<a href="https://hilcoe.com/page.html#my-paragraph">Link text</a>

</body>

</html>

22. Create a webpage that looks like the screenshot below

<html>

<head>

<title>GirlDevelopIt</title>

</head>

<body>

<img src="New%20folder/Girl_Develop_It_Logo.png">
<h1>About</h1>

<p>

It can be intimidating for women to learn and ask questions when they are in an <br>

<b>extreme minority.</b> While open and welcoming, today's budding developer <br>

community is up to <b>91% male.</b> If we can empower more females with the confidence <br>

in their technological capabilities <i>we can begin to change this landscape.</i>

</p>

<h1>Our Locations</h1>

<p>

<ul>

<li>USA

<ul>

<li><a href="https://www.google.com/maps/place/New%20York">New York</a></li>

<li><a href="https://www.google.com/maps/place/Columbus">Columbus</a></li>

<li><a href="https://www.google.com/maps/place/Austin">Austin</a></li>

<li><a href="https://www.google.com/maps/place/Philly">Philly</a></li>

</ul>

</li>

<li>World

<ul>

<li><a href="https://www.google.com/maps/place/Ottawa">Ottawa</a></li>

<li><a href="https://www.google.com/maps/place/Columbus">Columbus</a></li>

</ul>

</li>

</ul>

<br>

<a href="https://twitter.com">Twitter</a> |

<a href="https://www.facebook.com">Facebook</a> |

<a href="https://www.flickr.com">Flickr</a>
</p>

</body>

</html>

You might also like