Web Technology-
Web Technology-
Its accessibility is for a limited time in Its accessibility is 24×7×365 means round
07.
a day. the clock.
Traditional commerce is done where E-commerce is used to save valuable time
08.
the digital network is not reachable. and money.
Types of E-Commerce.
1. Business-to-Consumer (B2C)
In this industry, a company offers goods or services to customers directly through the
Internet. You may, for instance, purchase something from Amazon, Flipkart, or another
website.
2. Business-to-Business (B2B)
In this scenario, businesses use the Internet to sell goods or services to other
businesses. Because both parties involved in this sort of e-commerce are corporations,
its volume and value may be enormous.
Consumer-to-Customer transactions occur when one consumer sells his or her goods
to another consumer through the Internet (C2C). In this scenario, a consumer uses the
internet to sell another consumer their property directly, such as an old vehicle or bike.
These transactions are often carried out through third parties that offer internet
platforms. For this, a lot of businesses, like Olx, either charge the customer for the
service or offer it for free.
Advantages of E-Commerce
1. Selling Internationally
It is a platform where any trader or business may advertise their goods as much as
possible around the globe. Additionally, anybody can purchase the item for themselves
from any location..
2. Accessibility
Anything may now be purchased quite easily. On the e-commerce platform, products
are accessible around the clock. Compared to offline markets, it is considerably better.
3. Cheap
The client and the firm are linked directly through this business strategy. Because of
this, any business or group may offer their goods directly to consumers.
4. Domestic Delivery
5. Locating Basics
Finding the products you need in the offline market is really challenging. At the same
time, we may use a single click to browse an online e-commerce website and purchase
the products we need. Customers have far more convenience with this alternative than
with an offline market.
Disadvantages of E-Commerce
1. Safety
E-Commerce has a significant issue from online fraud. Hackers steal personal
information, financial information, and other data from websites. The issue of hacking
persists because of any negligence.
2. Fear
When purchasing online, most of the shops lack a physical presence, and before
completing online payment, customers have reservations about this. People worry that
they will lose their money if the wrong goods are delivered and that it would be
challenging to obtain their money back if the website is unreliable.
if you believe that you can buy everything and everything online. You are, therefore,
completely mistaken in your thinking. Some necessary items and valuables are
challenging to purchase online. People believe it is more appropriate to purchase items
like jewelry from brick-and-mortar stores rather than online.
4. Delivery Is Late
You are granted a specific amount of time while buying on an e-commerce website,
after which you will get your purchase. However, this seldom occurs, and for some
reason, the merchandise usually arrives to you sooner than promised.
5. Self-Awareness
Online shopping is impossible since we cannot physically inspect or test anything
before making a purchase. Occasionally, an item may appear appealing on the website,
but in practice, it may be considerably worse. The main drawback of e-commerce is
this. People who are offline can touch and see the object of their choice.
6. Risk of Privacy
Privacy Every individual is required to disclose their personal information, such as name,
address, phone number, etc., to the online retailer before completing a transaction.
Some e-commerce websites have such porous security that hackers may quickly
access them. Personal data about persons is also taken. The folks may incur high costs
because of this catastrophe. People are reluctant to purchase online because of this.
Matchmaking
Matchmaking services in e-commerce are a way to connect people and
companies with similar business interests, expertise, or technologies. The
goal is to create mutually beneficial connections and business opportunities.
Here are some ways matchmaking services can help in e-commerce:
Improve market efficiency
Matchmaking can help improve market efficiency by reducing transaction costs and
generating new revenue.
Find new business partners
Matchmaking services can help businesses find new partners to collaborate with.
Build relationships
Matchmaking services can help businesses build relationships with potential buyers,
investors, or partners.
Avoid bad-faith practices
Matchmaking services can help foreign companies avoid working with unscrupulous
firms.
Ensure mutual agreement
Matchmaking services can help ensure that both parties agree on business goals,
capacity, and benefits.
E-services
E-services are a range of electronic services that are accessible to anyone
with a device. Some types of e-services include:
UNIT - 2
Electronic cash (eCash) and electronic checks (eChecks) are both ways to make
payments, but they differ in a few ways:
eCash
A type of digital currency that allows for secure, anonymous, and untraceable fund
transfers. eCash uses encryption algorithms to protect transactions and is
decentralized, meaning it's not controlled by a central authority. eCash could
potentially make international purchases easier by allowing for universal
transactions without the need for exchange rates.
1. Anonymity: Like physical cash, eCash can offer anonymity, allowing users to
make purchases without disclosing their identity.
2. Security: Transactions are encrypted, ensuring that they are secure from fraud
or hacking attempts.
3. Instant Transactions: eCash enables instant payments, which are often faster
than traditional payment methods like credit cards or bank transfers.
4. Digital Representation of Money: eCash represents actual monetary value in
digital form, stored either on a user’s device or in an online wallet.
5. Offline and Online Use: eCash systems may allow for both online purchases
and offline transactions using devices or smart cards.
1. Issuance: Users can convert their traditional money into eCash by purchasing it
through a participating bank or institution. The bank provides the user with
digitally signed, encrypted tokens representing a certain amount of money.
2. Spending eCash: Users spend eCash by sending these digital tokens to
merchants or individuals. Merchants verify the authenticity of the tokens and
redeem them with the issuing bank.
3. Verification: A key feature of eCash is that it prevents double-spending—
ensuring that the same token cannot be used multiple times.
Advantages of eCash:
● Privacy: It offers better privacy compared to credit cards and online banking,
making it attractive for users who value their personal information.
● Security: eCash systems are usually encrypted, making it difficult for
unauthorized users to tamper with or steal.
● Speed: Transactions are completed quickly, without the need for third-party
intermediaries.
Disadvantages of eCash:
Although traditional eCash systems did not take off, modern e-wallets and mobile
payment systems have adopted similar principles. These include:
PayPal, Apple Pay, Google Pay: These services allow users to store money
electronically and make online or offline purchases securely.
Mobile Money: Services like M-Pesa in Africa enable users to store and transfer
money digitally using mobile phones.
eChecks
A form of payment that works similarly to a paper check, but is made online or over a
data network. eChecks have more security features than paper checks, including
digital signatures, encryption, and public key cryptography. eChecks can be more
economical for sellers than credit cards for large purchases. The processing time for
eChecks varies by provider, but funds are usually verified within 24 to 48 hours and
the transaction is cleared within three to five business days.
1. Authorization:
○ The payer (the person making the payment) authorizes the eCheck
transaction by providing their bank account information (account number
and routing number), either through an online payment form or verbally
over the phone.
2. Verification:
○ The payment processor verifies the information and checks whether the
account has sufficient funds. This step helps prevent fraud and ensures
the transaction can be completed.
3. Funds Transfer:
○ Once the verification is successful, the funds are withdrawn from the
payer’s bank account and transferred electronically to the recipient’s
(payee’s) account.
4. Clearing and Settlement:
○ The eCheck is processed through the Automated Clearing House (ACH)
network, which is responsible for handling electronic transactions. This
process usually takes 1 to 3 business days to settle fully.
Benefits of eChecks:
1. Cost-Effective:
○ eChecks are generally cheaper than credit card transactions for
businesses. This is because ACH transactions tend to have lower
processing fees than traditional card payments.
2. Faster Processing:
○ Unlike paper checks that can take several days to clear, eChecks typically
process within 1 to 3 business days, speeding up the transaction cycle.
3. Security:
○ eChecks are encrypted and processed through secure networks, reducing
the risk of fraud compared to traditional checks.
4. Convenience:
○ Payees don’t need to physically handle or deposit paper checks. eChecks
are processed electronically, which can be especially helpful for recurring
payments or large transactions.
5. Environmentally Friendly:
○ Since eChecks are digital, they reduce the need for paper, postage, and
physical handling, making them a more environmentally friendly option.
Recurring Payments:
○ eChecks are popular for recurring payments such as rent, mortgage, utility
bills, insurance premiums, and subscription services.
Business Payments:
○ Businesses often use eChecks for larger transactions between companies
(B2B), payroll disbursements, and vendor payments. They can reduce the
manual work associated with traditional paper checks.
Online Transactions:
○ eChecks can be used by consumers to make payments for e-commerce
transactions, donations to nonprofits, or payments to government
agencies.
Loan Payments:
○ Lenders often accept eChecks for loan repayments because of their
reliability and lower processing fees.
Debit card
A popular payment method that links directly to your bank account. When you use a
debit card, the money is immediately transferred from your bank account to pay for
the transaction.
Digital wallet
A mobile payment method that allows you to store your payment details in a secure
location on your smartphone. Examples include Google Pay and Apple Pay.
PayPal Pay in 4
A buy now, pay later (BNPL) service that allows you to split a payment into four
installments due every two weeks.
ACH Direct Debit
An electronic bank transfer that allows funds to be digitally transferred between
businesses' bank accounts.
Stripe
A payment processing platform that allows you to accept payments from credit cards,
digital wallets, ACH transfers, and different currencies.
Governments have used PPPs throughout history. In India, the government under
Prime Minister PV Narasimha Rao introduced several liberalization policies in 1991
that opened the door for private players to invest in public projects.
E - governance
1. Delivery of Services:
2. Transparency:
3. Efficiency:
4. Citizen Participation:
5. Accountability:
● Digital Record Keeping: Every transaction is logged, making it easier to audit
government functions and hold officials accountable.
● Monitoring and Reporting: Digital platforms enable better monitoring of
government programs and timely reporting of progress.
7. Challenges:
● Digital Divide: Lack of internet access and digital literacy in rural or underserved
populations can limit the benefits of e-governance.
● Cybersecurity: Safeguarding sensitive data from hacking or breaches is a major
concern for governments.
● Interoperability: Different government departments often use different systems,
making it hard to integrate services.
Examples of E-Governance:
● India's Aadhar: A unique identification system that links various services and
welfare programs.
● Estonia's E-Governance: A highly digital government that offers almost all
services online, including e-voting.
● USA’s Digital Services: Platforms like HealthCare.gov provide online access to
federal health insurance programs.
Types of Cybercrimes:
The IT Act, 2000 is the primary legislation in India dealing with cybercrime. It
provides the legal framework for electronic governance and defines various
cyber offenses and penalties. Over time, amendments were made to the Act
(notably in 2008) to deal with the increasing challenges posed by cybercrime.
Cybercrime Challenges:
UNIT -3
Mobile agents are software programs that move across networks, performing
tasks like price comparison, product recommendations, and automated
negotiations. Unlike traditional software, they work autonomously and can
interact with different systems, making them efficient in handling e-commerce
tasks.
Benefits:
Challenges:
The WAP Model follows a layered approach, similar to the OSI (Open
Systems Interconnection) model, to structure the communication process. It is
designed to make wireless internet browsing more efficient and adaptable to
the constraints of mobile devices.
Benefits of WAP:
Key Components:
How It Works:
Benefits:
WAP was essential in the early days of mobile internet but has been replaced
by modern technologies.
1. Mobile Access to Online Stores: WAP enabled users with early mobile devices
to access e-commerce platforms, making shopping possible from anywhere.
2. Increased Customer Reach: E-commerce businesses could reach a wider
audience, including users without computers, through WAP-enabled mobile
devices.
3. Faster and Convenient Transactions: Customers could browse, compare
products, and make purchases directly from their mobile phones, increasing
convenience.
4. Secure Mobile Payments: WAP provided secure data transmission with WTLS
encryption, ensuring safe mobile transactions, which was crucial for trust in
mobile e-commerce.
5. Real-Time Interaction: Businesses could send real-time updates, offers, or
alerts to customers through WAP, enhancing user engagement and marketing
opportunities.
6. Optimized Content for Mobile: WAP ensured that web content was optimized
for mobile devices, offering a better user experience on small screens with
limited processing power.
These benefits helped e-commerce businesses expand their reach and offer more
convenience to mobile users during the early days of mobile internet.
Web Security:
Web security protects websites and online transactions from threats and unauthorized
access. Here are the key components:
1. Authentication:
○ Confirms user identity through methods like passwords and two-factor
authentication (2FA).
2. Encryption:
○ Secures data during transmission using protocols like SSL/TLS, enabling
secure connections (HTTPS).
3. Secure Web Documents:
○ Use HTTPS and digital certificates to verify the authenticity of websites
and protect user data.
4. Data Integrity:
○ Ensures data remains unchanged during transfer, often using hashing
techniques.
5. Access Control:
○ Restricts access to sensitive information based on user roles and
permissions.
6. Firewalls:
○ Act as barriers between trusted networks and potential threats, filtering
incoming and outgoing traffic.
7. Web Application Security:
○ Protects against common attacks like SQL injection and cross-site
scripting (XSS).
8. Regular Updates:
○ Keeping software and systems updated helps protect against
vulnerabilities.
9. Monitoring:
○ Continuously checks for security incidents and ensures a quick response.
10. User Education:
○ Training users on security best practices helps reduce risks.
1. Encryption Schemes
● Symmetric Encryption: Uses the same key for both encryption and decryption
(e.g., AES, DES). It is faster but requires secure key management.
● Asymmetric Encryption: Utilizes a pair of keys (public and private) for encryption
and decryption (e.g., RSA). It enhances security for key exchange but is slower
than symmetric encryption.
● Hybrid Encryption: Combines both symmetric and asymmetric encryption to
leverage the strengths of both methods. For example, a symmetric key encrypts
the data, while asymmetric encryption secures the key itself.
Secure web documents are essential for protecting information exchanged over the
internet. They typically use SSL/TLS (Secure Sockets Layer/Transport Layer Security)
protocols.
3. Digital Signatures
Digital signatures provide a way to verify the authenticity and integrity of digital
messages or documents.
● How it Works:
○ A sender creates a digital signature by encrypting a hash of the message
with their private key.
○ The recipient can verify the signature by decrypting it using the sender’s
public key and comparing the hash to the message.
● Benefits:
○ Authentication: Confirms the identity of the sender.
○ Integrity: Ensures the message has not been altered during transmission.
○ Non-repudiation: The sender cannot deny having sent the message,
providing accountability.
4. Firewalls
Firewalls are security devices or software that monitor and control incoming and
outgoing network traffic based on predetermined security rules.
● Types of Firewalls:
○ Packet Filtering Firewall: Inspects packets and allows or blocks them
based on defined rules.
○ Stateful Inspection Firewall: Monitors active connections and makes
decisions based on the state of the connection.
○ Proxy Firewall: Acts as an intermediary between users and the internet,
filtering requests and responses for enhanced security.
● Benefits:
○ Protects against unauthorized access to the network.
○ Monitors and logs traffic for analysis.
○ Prevents malware and attacks from entering the network.
UNIT - 4
Q.1 What is DNS? Write difference between primary and secondary DNS.
When you type a URL into your web browser, DNS servers translate the domain name
into the corresponding IP address, enabling your browser to find and connect to the
correct web server.
In simpler terms, DNS acts like a phonebook for the internet, helping convert domain
names into numerical IP addresses, allowing users to access websites using easy-to-
remember names.
● Definition: The primary DNS is the first DNS server that a device or network
queries for domain name resolution.
● Role: It is the authoritative source for domain records and stores the original
copies of DNS data.
● Responsibility: The primary DNS server has the main responsibility for
managing and maintaining the zone records (such as A records, MX records,
etc.).
● Example: If you're using your Internet Service Provider (ISP)'s DNS, this would
be the main DNS server they provide to you.
● Definition: The secondary DNS is a backup DNS server that holds copies of the
DNS records from the primary DNS server.
● Role: It is used as a failover or backup in case the primary DNS server is
unavailable.
● Responsibility: The secondary DNS server periodically synchronizes with the
primary DNS server to update its records, ensuring that it has an up-to-date copy
of the DNS zone data.
● Example: If the primary DNS server fails or is unreachable, the secondary DNS
can be queried to resolve domain names.
Definition The main DNS server where the The backup DNS server that holds copies of
original records are stored. the records from the primary DNS.
Role Authoritative source of DNS records. Provides backup in case the primary DNS
fails.
Responsibility Manages and updates DNS records. Syncs with the primary DNS and can only
read the information from its copy.
Reliability Critical for DNS resolution. Ensures reliability and redundancy for DNS
resolution.
Data Update The primary server updates DNS Periodically fetches updates from the primary
records directly. server.
Failure If the primary DNS fails, it can't resolve If the primary DNS fails, the secondary DNS
Handling domain names. takes over to ensure continuity.
Example Your ISP's main DNS server. A secondary DNS server provided by a
different provider or the same ISP.
● Redundancy: If one server fails, the other can still respond to DNS queries,
ensuring the website remains accessible.
● Load Balancing: Some systems distribute requests between the primary and
secondary servers to balance the load and improve performance.
1. Local Login
Whenever a user logs into its local system, it is known as local login.
Local Login
2. Remote Login
Remote Login is a process in which users can log in to a remote site i.e. computer and
use services that are available on the remote computer. With the help of remote login, a
user is able to understand the result of transferring the result of processing from the
remote computer to the local computer.
Advantages of ICMP
1. Error Reporting:
ICMP notifies devices about issues like unreachable destinations or network
errors.
2. Diagnostic Tools:
Tools like ping and traceroute use ICMP to test network connectivity and
performance.
3. Network Management:
It provides feedback about network conditions, helping in better traffic
management.
Disadvantages of ICMP
1. Security Risks:
ICMP can be exploited for attacks like ping floods and Denial-of-Service (DoS)
attacks.
2. Limited Scope:
It is designed only for network diagnosis and error reporting, lacking upper-level
communication functions.
3. Potential for Misuse:
Hackers can use ICMP for reconnaissance, gathering information about networks
for potential attacks.
Advantages of IGMP
Disadvantages of IGMP
1. Local Area Network Only:
IGMP operates within a local area network (LAN) and cannot manage multicast
traffic across different network segments or the internet.
2. Complex Configuration:
Managing and configuring IGMP for large networks can be challenging.
3. Resource Consumption:
Multicast traffic can consume significant bandwidth and resources if not managed
properly.
ICMP IGMP
ICMP stands for Internet Control Message While IGMP stands for Internet Group Message
Protocol. Protocol.
ICMP can be operated between host to host or While IGMP can be used between client and
host to router or router to router. multicast routers.
ICMP could be a mechanism employed by hosts While IGMP is employed to facilitate the
and gateway to send notification of datagram synchronal transmission of a message to a bunch
downside back to sender. of recipients.
ICMP is used to test reachability to a host or While IGMP is used in group packet transmission
network. like DTS service.
ICMP is primarily used for diagnostic and error
IGMP is primarily used for multicasting purposes.
reporting purposes.
ICMP messages are typically sent in response IGMP messages are sent by hosts to multicast
to errors or diagnostic requests. routers to join or leave multicast groups.
Q.4.Explain ARP & RARP protocol. Describe ARP role in networking and how it
facilitates communication between devices on a local network.
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)
are both protocols that help devices communicate on a local network by mapping IP
addresses to MAC addresses..
● Facilitates Communication:
ARP translates IP addresses into MAC addresses, enabling data packets to
reach the correct physical device on a LAN.
● Supports Packet Delivery:
It ensures that data packets intended for a specific IP are sent to the correct
hardware address.
● Cache Optimization:
ARP uses a cache to store mappings, reducing the need for frequent broadcasts.
1. Device Discovery:
When a device wants to send data, it first needs the MAC address of the
destination device. ARP helps find it.
2. Packet Delivery:
ARP maps the destination IP to a MAC address, ensuring the packet is delivered
to the correct device on the LAN.
3. Broadcast Efficiency:
ARP broadcasts are restricted to the local network, avoiding unnecessary traffic
on external networks.
ARP RARP
To obtain the MAC address of a network device To obtain the IP address of a network device
when only its IP address is known when only its MAC address is known
In ARP, broadcast MAC addresses are used. While in RARP, broadcast IP addresses are used.
In ARP, ARP table is managed or maintained by While in RARP, the RARP table is managed or
the local host. maintained by the RARP server.
ARP is used on the sender's side to map the RARP is used on the receiver's side to map the
receiver’s MAC address. sender’s IP.
Static and dynamic web pages - A "static web page" is a fixed webpage with
content that remains the same for every visitor, while a "dynamic web page" can change
its content based on user interactions, location, or other factors, allowing for
personalized experiences, like product recommendations or shopping cart updates,
which are crucial for a robust e-commerce platform.
1. Content Update: Static pages require manual code changes to update content,
while dynamic pages can update content automatically through a database,
allowing for real-time changes.
2. User Interaction: Static pages offer limited user interaction, like simple forms,
whereas dynamic pages can respond to user actions, like adding items to a cart
or filtering products.
3. Database Integration: Static pages usually don't use a database, while dynamic
pages rely on a database to store and retrieve information based on user needs.
4. Development Complexity: Static pages are generally easier and faster to
develop, while dynamic pages require more complex server-side scripting and
database management.
Static Pages:
● A simple "About Us" page with fixed company information.
● A product catalog with basic descriptions (if not requiring frequent updates).
● Advantages:
■ Easy to create and maintain.
■ Loads quickly as there’s no server-side processing.
■ Cost-effective for small or informational websites.
● Disadvantages:
■ Not interactive or personalized.
■ Requires manual updates for content changes.
Dynamic Pages:
● A personalized product recommendation section on an e-commerce site.
● A user login area with account details.
● A shopping cart that updates in real-time as items are added or removed.
Advantages:
● Interactive and personalized for better user experience.
● Can handle complex functionalities (e.g., payments, live updates).
● Easy to scale for growing businesses.
Disadvantages:
● More expensive and time-consuming to develop.
● Requires more resources for hosting and maintenance.
● Definition: Tiers refer to the architecture or layers used to build and organize a
web application. Commonly used tiers are:
○ Presentation Tier: User interface (UI) that displays content to the user.
■ Static Pages: HTML and CSS for fixed layouts.
■ Dynamic Pages: React, Angular for dynamic UI updates.
○ Logic Tier: Processes data and handles business logic.
■ Static Pages: Not applicable as there’s no dynamic interaction.
■ Dynamic Pages: Backend code in Node.js, PHP, or Python.
○ Data Tier: Manages database storage and retrieval.
■ Static Pages: No database interaction.
■ Dynamic Pages: Interacts with databases like MySQL, MongoDB
for real-time content.
● Definition: Frames divide a webpage into multiple sections that can load content
independently.
● Use in Static Pages:
○ Commonly used to create multi-section layouts with fixed content.
○ Example: A menu frame on the left and a content frame on the right.
● Use in Dynamic Pages:
○ Rarely used; modern designs rely on CSS grids or responsive
frameworks.
○ Frames can break dynamic functionalities like real-time updates.
● Advantages:
○ Easier to organize and load specific content in sections.
● Disadvantages:
○ Obsolete in modern web design due to limited flexibility.
○ SEO and accessibility issues.
● Definition: Forms allow users to input data, which is processed by the server.
● Use in Static Pages:
○ Basic forms for collecting simple data (e.g., contact forms).
○ Action leads to fixed pages or emails (e.g., mailto: links).
● Use in Dynamic Pages:
○ Advanced forms with real-time validation and database integration.
○ Example: User registration, login forms, and payment forms.
● Advantages:
○ Increases interactivity and user engagement.
● Disadvantages:
○ Requires secure handling of user data (e.g., encryption for sensitive info).
Markup languages are used to structure, format, and present data on web pages or
documents. These languages use "tags" to define elements.
Having experience with coding systems that use tags to define the structure and
presentation of content, essentially "marking up" a document to indicate how it should
be displayed, with each language serving a specific purpose:
1. HTML (HyperText Markup Language): The most common markup language used
to build web pages, defining elements like headings, paragraphs, images, and links on a
website.
Definition: A standard markup language for creating web pages and web applications.
Features:
● Basic structure for websites.
● Uses tags like <html>, <head>, <body>, <h1>, <p>.
● Supports multimedia embedding (e.g., images, audio, videos).
Advantages:
● Easy to learn and use.
● Supported by all browsers.
● Definition: An extension of HTML that allows for dynamic and interactive web
pages.
● Components: Combines HTML, CSS, and JavaScript.
● Features:
○ Enables animations and interactivity (e.g., image sliders, dropdown
menus).
○ Content can change without reloading the page.
● Advantages:
○ Improves user experience with interactivity.
● Use Case: Interactive websites like gaming portals or animated menus.
3. VRML (Virtual Reality Modeling Language) - A markup language specifically
designed for creating 3D graphics and virtual environments, often used in virtual reality
applications.
HTML Structure of web Fixed tags, easy to learn, static Static websites.
pages content.
SGML Defining markup Meta-language for creating other Basis for HTML
languages markup languages. and XML.
Q. What is SEO?
SEO (Search Engine Optimization) refers to the process of improving the visibility and
ranking of a website or web page in search engine results pages (SERPs). The goal of
SEO is to increase organic (non-paid) traffic to a website by ensuring that it appears
higher in search engine results for relevant queries.
SEO is an essential digital marketing strategy that helps websites rank higher in search
results, ultimately leading to more organic traffic and better business outcomes. By
optimizing on-page, off-page, and technical elements, websites can improve their
search engine visibility and attract more relevant visitors.
Types of SEO
1. Local SEO:
Optimizing a website to appear in local search results, such as when users
search for businesses or services near them.
○ Example: A coffee shop in New York City targeting "best coffee near me."
2. E-commerce SEO:
SEO strategies tailored for online stores to help their product pages rank higher
in search results.
○ Example: Optimizing product descriptions, images, and product category
pages.
3. Mobile SEO:
Focuses on making a website mobile-friendly since many searches are now done
on mobile devices.
○ Example: Ensuring that images and text adjust to different screen sizes.
4. International SEO:
Involves optimizing a website for different languages, regions, and countries.
○ Example: A website targeting users in multiple countries by offering
content in multiple languages.
● Increased Visibility and Traffic: Higher rankings lead to more visibility, and
ultimately more visitors to your site.
● Cost-Effective: Unlike paid ads, organic traffic from SEO is free, and long-term
SEO efforts can provide sustained traffic over time.
● Trust and Credibility: Websites that rank high in search engines are often
perceived as more trustworthy and credible by users.
● User Experience: Good SEO practices also lead to better user experience (e.g.,
fast-loading pages, easy navigation), which keeps visitors on your site longer.
1. Client-Server Architecture:
○ In CORBA, the client sends a request to the server to invoke a method
on an object.
○ The server processes the request and sends the result back to the client.
○ The communication can happen on the same machine or over a network,
and the client does not need to know the details about where the server or
object is located, what language it is written in, or how it is implemented.
2. Middleware:
○ CORBA acts as middleware that sits between the client and server. It
handles the complexities of communication, allowing the client and server
to focus on their main tasks without worrying about how to interact with
each other.
3. ORB (Object Request Broker):
○ The ORB is a key component of CORBA. It is the communication
mechanism that allows the client and server to exchange information.
○ ORB is responsible for:
■ Finding the appropriate object to handle the request.
■ Passing parameters to the object.
■ Invoking the object’s method.
■ Returning the result of the method invocation back to the client.
CORBA Services
● Client-Server Communication:
○ The client sends a request to the server by calling a method on an object.
○ The server processes this request, executes the necessary actions, and
sends the response back to the client.
● ORB: The Object Request Broker ensures that the client and server can
communicate smoothly by managing the request and response process. It also
ensures that the client and server don't need to know about each other's internal
details (like the location of objects or their implementation).
CORBA Components
1. Object Interface:
○ The object interface defines the operations that can be invoked on an
object.
○ It is language-independent and specifies the way the client interacts with
the object.
2. Remote Objects:
○ These are objects that exist on a different machine, and clients can invoke
methods on these objects as if they were local.
3. Proxy:
○ A proxy is an object that acts as an intermediary between the client and
the remote object. It allows clients to interact with remote objects without
knowing their physical location.
Benefits of CORBA
1. Portability:
○ CORBA enables the development of applications that can work across
different platforms and programming languages.
○ Developers can create applications that run on various operating systems
like Windows, Linux, or Unix without having to worry about the underlying
infrastructure.
2. Reusability:
○ CORBA promotes the reuse of objects and services across different
systems.
○ Remote objects can be independently designed, which increases flexibility
in development.
3. Flexibility:
○ The broker pattern allows for flexibility in system design. It is possible to
update remote objects or switch them to different platforms without
affecting the client.
4. Scalability:
○ CORBA is designed to handle large-scale, distributed systems with
numerous objects and clients.
5. Language Independence:
○ CORBA supports a wide range of programming languages, allowing
clients and servers to communicate even if they are written in different
languages (such as C++, Java, Python, etc.).
CGI (Common Gateway Interface)
● Definition: A standard protocol that allows web servers to interact with external
programs to generate dynamic content. CGI scripts can be written in various
programming languages, such as Perl, Python, or even shell scripts. Unlike Java
Servlets, CGI is language-agnostic.
● How it Works:
○ A user request triggers the server to execute a script or program (written
in languages like Perl, Python, or C).
○ The output of the program is sent back to the user's browser as a web
page.
● Features:
○ Enables dynamic content generation.
○ Platform-independent.
○ Typically runs as separate processes on the server.
● Advantages:
○ Easy to implement.
○ Can be written in multiple programming languages.
● Disadvantages:
○ Slow performance due to creating a new process for each request.
○ High server resource usage.
● Use Case:
○ Early e-commerce systems (e.g., shopping cart calculations).
Servlets
Java Servlets are Java-based programs that extend the functionality of a web server to
generate dynamic content. Servlets are managed by the Java Servlet Container, a part
of the web server or a separate application server. The servlet container communicates
with the servlet through the Java Servlet API.
Definition: Java programs that run on the server side to handle client requests and
generate responses.
How it Works:
Features:
Advantages:
Disadvantages:
● Limited to Java.
● Requires knowledge of servlet APIs.
Use Case:
Applets
● Definition: Small Java programs that run inside a web browser or an applet
viewer.
● How it Works:
○ Applets are embedded in HTML pages using the <applet> or <object>
tags.
○ The browser downloads the applet code and runs it within a Java Virtual
Machine (JVM).
● Features:
○ Provides rich, interactive user interfaces.
○ Sandbox environment ensures security.
○ Requires JVM on the client-side.
● Advantages:
○ Cross-platform compatibility.
○ Useful for client-side interactivity.
● Disadvantages:
○ Requires Java support on the client’s browser (outdated technology).
○ Slower compared to modern JavaScript frameworks.
● Use Case:
○ Educational tools, online games (used earlier, now largely obsolete).
Applets Servlets
Applets are executed on the client side. Servlets are executed on the server side.
Applets are used to provide interactive features to Servlets are the Java counterpart to other
web applications that cannot be provided by HTML dynamic Web content technologies such as PHP
alone like capture mouse input etc. and ASP.NET.
Life cycle of Applets init(), stop(), paint(), start(), Lifecycle of servlets are:- init( ), service( ), and
destroy(). destroy( ).
Packages available in Applets are :- import Packages available in servlets are:- import
java.applet.*; and import java.awt.*. javax.servlet.*; and import java.servlet.http.*;
Applets are two types 1.) Untrusted Applets 2.) Servlets are two types 1.) Generic Servlet 2.)
trusted Applets HTTP Servlet
Applets is a part of JSE(JAVA Standard Edition) Servlet is a part of JEE(Java Enterprise Edition )
Modules. Modules.
● Definition:
JSP is a server-side technology that allows developers to embed Java code
directly within HTML to create dynamic web pages.
Features of JSP:
Advantages of JSP:
Disadvantages of JSP:
2. JavaBeans
● Definition:
JavaBeans are reusable Java components or classes that encapsulate data and
behavior. They follow specific conventions to allow easy integration with other
Java technologies like JSP and servlets.
Features of JavaBeans:
1. Encapsulation:
○ Use private variables and public getter/setter methods for data access.
2. Reusability:
○ Can be used across multiple applications or modules.
3. Platform Independence:
○ Written in Java, so they are platform-independent.
4. Lightweight Components:
○ JavaBeans are efficient and easy to use.
Advantages of JavaBeans:
Disadvantages of JavaBeans:
● Storing user data like name and email for dynamic web forms.
● Managing business logic components like product details or order processing.
ActiveX Control
ActiveX Controls are small programs or components developed by Microsoft that add
specific functionality to applications, particularly web browsers like Internet Explorer.
They allow users to interact with rich content, such as animations, videos, and
interactive features, directly on web pages.
1. Platform-Specific (Windows):
○ ActiveX controls are designed specifically for Windows platforms and
tightly integrated with Microsoft applications.
2. Reusable Components:
○ They are reusable objects that can be embedded in software applications
to perform tasks like file management, data transfer, or media playback.
3. Browser Integration:
○ Initially popular for adding interactivity to web pages, such as embedding
Flash players or Excel spreadsheets in Internet Explorer.
4. Wide Range of Functionalities:
○ Examples include media players, calendars, and other interactive tools.
5. COM-Based Architecture:
○ ActiveX controls are built using Microsoft's Component Object Model
(COM) technology, which allows interoperability between software
components.
Cookies in Active Server Pages (ASP) are small pieces of data stored on the client-
side (browser) to maintain information across multiple requests or sessions. They are
used for storing user preferences, session data, or tracking purposes.
Web Services
Web Services are software components that allow applications to communicate with
each other over the internet or a network. They use standard protocols and data formats
for interoperability.
1. Interoperability:
Web services allow different systems to interact, regardless of programming
language or platform.
2. Protocol Standards:
○ Use of SOAP (Simple Object Access Protocol) or REST
(Representational State Transfer).
3. Data Formats:
○ Typically use XML or JSON for data exchange.
4. Platform Independence:
○ Can be used across platforms like Windows, Linux, etc.
1. Monolithic Architecture:
○ All components (UI, business logic, and database) are tightly coupled in a
single application.
○ Example: Traditional websites.
2. Client-Server Architecture:
○ Client sends requests to the server, and the server processes them.
○ Example: Email services.
3. Three-Tier Architecture:
○ Divides the application into three layers:
■ Presentation Layer (UI): User interface.
■ Business Logic Layer: Application's core functionalities.
■ Data Layer: Manages data storage.
○ Example: E-commerce websites.
4. Microservices Architecture:
○ The application is divided into small, independent services that
communicate via APIs.
○ Example: Netflix, Amazon.
1. Presentation Layer
○ Role: This is the user-facing layer that includes User Interface (UI)
components and UI process components.
○ Built With:
■ HTML: Provides the structure of web pages.
■ CSS: Adds styling and layout to the UI.
■ JavaScript: Enables interactivity and dynamic behavior.
○ Accessibility: This layer is accessible through a web browser.
○ Example: Buttons, forms, menus on a website.
2. Business Layer
○ Other Names: Also known as Business Logic Layer or Application
Layer.
○ Role:
■ Processes user requests from the browser.
■ Encodes the workflow and regulates data access routes.
○ Example:
■ Booking a hotel: The series of steps (selecting a hotel, choosing a
room, making payment) are managed here.
○ Key Functionality: Controls what happens after a user performs an
action like clicking "Submit."
3. Persistence Layer
○ Other Names: Also called the Storage Layer or Data Access Layer.
○ Role:
■ Manages data storage and retrieval.
■ Collects data calls and communicates with the database.
○ Infrastructure:
■ Relies on a Database Management System (DBMS) for
accessing and retrieving data.
■ Data can be stored on physical servers or in the cloud.
○ Example: Retrieving a user's past bookings on a travel website.
Browsers
Web Browsers are software applications that allow users to access and interact with
web content.
1. Google Chrome
2. Mozilla Firefox
3. Safari
4. Microsoft Edge
5. Opera
Functions of a Browser
Search Engines
Search Engines are software systems that help users find information on the web by
indexing and ranking web pages.
1. Crawling:
○ Automated bots (crawlers) explore web pages and gather data.
2. Indexing:
○ Organizing data into a structured database for quick retrieval.
3. Ranking:
○ Displaying search results based on relevance, using algorithms.
Distributed Objects
Distributed Objects are software components that can be distributed across a network
while appearing to be a single system to the user. They are often used in large-scale
systems to enable resource sharing.
Key Concepts
1. Object Distribution:
○ Objects are stored on different machines but can interact as if on the
same machine.
2. Remote Method Invocation (RMI):
○ Allows objects on one machine to invoke methods on objects located on
another machine.
3. Transparency:
○ Hides the complexity of the underlying network and distribution.
Examples
Features
1. Communication Management:
○ Manages interactions between clients and objects on different machines.
2. Platform Independence:
○ Ensures compatibility across various platforms and programming
languages.
3. Transparency:
○ Hides the details of network protocols and object locations.
How they work
ORBs use the Internet Inter-ORB Protocol (IIOP) to:
● Enable clients to make requests and receive responses from servers
● Provide location transparency
● Allow clients to treat remote objects as if they were located in the same
running process as the client
Example Technologies
Types of Scalability
1. Vertical Scalability:
○ Involves upgrading server hardware (CPU, RAM).
○ Limited by the capacity of a single machine.
○ Example: Adding more memory to a web server.
2. Horizontal Scalability:
○ Adds more servers to distribute the load.
○ Achieved using load balancers and distributed systems.
○ Example: A cluster of web servers serving requests.
Techniques to Achieve Scalability
1. Load Balancing:
○ Distributes incoming requests across multiple servers.
○ Prevents overloading any single server.
2. Caching:
○ Stores frequently accessed data in memory for faster retrieval.
○ Example: Using CDNs (Content Delivery Networks).
3. Database Optimization:
○ Using distributed databases or sharding for scalability.
4. Stateless Architecture:
○ Ensures that no server stores session data, allowing requests to be
handled by any server.
○ Example: Using tokens instead of server-side sessions.