0% found this document useful (0 votes)
46 views

Web Technology: Basic

This document discusses client-server computing and network applications. It defines key concepts such as: - A network application comprises a server that provides services and a client that requests services. Together they form a computing system with distinct roles. - Client-server computing involves a client requesting a service from a server and the server responding. Servers can be passive and wait for requests or active and push resources to clients. - Servers can be stateless and forget transactions after completing them or stateful and remember transaction histories.

Uploaded by

Mirzanur Rahman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Web Technology: Basic

This document discusses client-server computing and network applications. It defines key concepts such as: - A network application comprises a server that provides services and a client that requests services. Together they form a computing system with distinct roles. - Client-server computing involves a client requesting a service from a server and the server responding. Servers can be passive and wait for requests or active and push resources to clients. - Servers can be stateless and forget transactions after completing them or stateful and remember transaction histories.

Uploaded by

Mirzanur Rahman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 64

Web Technology

Basic
2
3
Network Application
• An Application over a network is called a network application
• A network application is commonly called a service
• A service comprises of two discrete participants:

– A SERVER that provides services


– A CLIENT that requests services from the server

• Together, the two form a complete computing system with a distinct


division of responsibility and clean separation of duty based on the idea
of service
• Technically Client /Server computing relates two or more threads of
execution using a consumer / producer relationship.

4
Client/Server Computing

• Client/Server computing is a power full


paradigm of computing.
Client
• In this paradigm a client requests a server for
a service and the server responds with the
service.

• Clients need to be aware of the servers that Request Response


are available but usually do not know of the
existence of other clients.

Server

5
Client-Server concept

• Server program is shared by many clients


• RPC protocol typically used to issue requests
• Server may manage special data, run on an
especially fast platform, or have an especially large
disk
• Client systems handle “front-end” processing and
interaction with the human user
Server and its clients
Examples of servers
• Network file server
• Database server
• Network information server
• Domain name service
• authentication server
Why use a client-server approach?

• Pricing parameters are “expensive” (in terms of


computing resources) to obtain: must monitor many
data sources and pre-compute many parameters.
• Computing demands may be extreme: demands a
very high performance machine
• Database of bonds is huge: large storage, more pre-
computation
On client side

• Need a lot of CPU and graphics power to display


the data and interact with the user
• Dedicated computation provides compressed
response time and powerful decision making aids
• Can “cache” or “save” results of old computations
so that if user revisits them, won’t need to reissue
identical request to server
Summary of typical split

• Server deals with bulk data storage, high


performance computation, collecting huge amounts
of background data that may be useful to any of
several clients
• Client deals with the “attractive” display, quick
interaction times
• Use of caching to speed response time
Server: Passive and Active

• Servers may be of two types based on participation :


• passive and active.
– Traditional servers are passive. They passively await requests from
clients and then act on them.
– Protocol is initiated by the client.
– It is termed as Client Pull.

– Recent researches conceptualize what is called active servers


– active servers can actively search out changes in the state of clients
and take appropriate actions. It is termed as Server push.
– In Server Push ,server pushes a resource directly to the client
without the client asking for the resource. The server is making an
assumption here that pushing the resource is desirable.

12
Server: Stateless and Stateful
• Servers may also be of two types based on forgetfulness: stateless and
statefull.

• A statefull server has stronger memory power. It can not only remember
the facts of the ongoing transaction but also history of previous
transactions. Therefore, the design of a statefull server is very complex.

• A stateless server has very limited memory power. It can only


remember the facts of the ongoing transaction between the server and
the client. After the transaction is over, it forgets every thing about the
transaction. Its design is comparatively simple.

• Web Server is a stateless server.

• A server can act as a client to other servers. Using this model, a server
can execute a task by dividing it into sub-tasks and then having other
servers complete the subtasks.

13
Server: Stateless and Stateful || other concepts
• Client-server system is stateless if:
Client is independently responsible for its actions, server doesn’t track set
of clients or ensure that cached data stays up to date
• Client-server system is stateful if:
Server tracks its clients, takes actions to keep their cached states “current”.
Client can trust its cached data.

14
Server: Stateless and Stateful

• Web Server is a stateless server.

• A server can act as a client to other servers. Using this model, a server
can execute a task by dividing it into sub-tasks and then having other
servers complete the subtasks.

15
Best known examples?

• The UNIX NFS file system is stateless.


user: “Once they replaced my file server during the evening
while my machine was idle. The next day I resumed work
right where I had left off, and didn’t even notice the
change!”

• Database systems are usually stateful:


Client reads database of available seats on plane, information
stays valid during transaction
Typical issues in design

• Client is generally simpler than server: may be


single-threaded, can wait for reply to RPC’s
• Server is generally multithreaded, designed to
achieve extremely high concurrency and
throughput. Much harder to develop
• Reliability issue: if server goes down, all its clients
may be “stuck”. Usually addressed with some form
of backup or replication.
Use of caching

• In stateless architectures, cache is responsibility of


the client. Client decides to remember results of
queries and reuse them. Example: caching Web
proxies, the NFS client-side cache.
• In stateful architectures, cache is owned by server.
Server uses “callbacks” to its clients to inform them
if cached data changes, becomes invalid. Cache is
“shared state” between them.
Characteristics of a Client / Server System
• A client/server application has the following characteristics:
• shared resources: A server can service many clients at the same time
and regulate their access to shared resources.

• transparency of location: The server process can reside on the same


machine as the client or on a separate machine across a network. C/S
software usually masks the location of the server from the clients by
redirecting the service calls when needed.

• platform independence: An ideal C/S system is platform independent.



• message-based exchange: clients and servers are loosely coupled
systems that interact through a message-passing mechanism. The
message is the delivery mechanism for the service requests and replies

19
Contd..
• encapsulation of services: A message tells a server what service is
requested. It is up to the server to determine how to get the job done. A
server can be upgraded without effecting the clients as long as the
published message interface is not changed.

• scalability: A C/S system can be scaled horizontally or vertically.


– Horizontal scaling means adding or removing clients with only little
performance impact.
– Vertical scaling means upgrading to a larger or faster server or multi-
server

• integrity: The server code and server data is centrally maintained, which
results in cheaper maintenance and the guarding of shared data integrity.
At the same time, the clients remain personal and independent.

20
Virtual Hosting
• Normally one host has one domain name
• Virtual hosting is a method for hosting multiple domain names (with
separate handling of each name) on a single server
• IP address to Domain Name mapping is 1:1
• IP address to DN is 1:M
• One IP address but multiple domain name
• Web Site hosting agencies use virtual hosting
• A host may have more than one IP address, if it is connected to many
networks

• There are two main types of virtual hosting


– name-based
– IP-based.

21
Name Based Hosting
• Name-based virtual hosts use multiple host names for the same IP
address.
• A technical prerequisite needed for name-based virtual hosts is a web
browser with HTTP/1.1 support to include the target hostname in the
request. This allows a server hosting multiple sites behind one IP
address to deliver the correct site's content.
• For instance, a server could be receiving requests for two domains,
www.example.com and www.example.net, both of which resolve to the
same IP address.
• For www.example.com, the server would send the HTML file from the
directory /var/www/user/GU/site/, while requests for www.example.net
would make the server serve pages from /var/www/user/IST/site/.

22
IP Based Hosting
• When IP-based virtual hosting is used, each site (either a DNS host
name) points to a unique IP address.
• The web server is configured with multiple physical network interfaces,
virtual network interfaces on the same physical interface or multiple IP
addresses on one interface.

23
Port-based Hosting
• The default port number for HTTP is 80. However, most web servers can be
configured to operate on almost any port number, provided the port number
is not in use by any other program on the server.

• For example, a server may host the website www.example.com.


• If the owner wishes to operate a second site, can use another port number,
for example, www.example.com:81 for port 81, www.example.com:8000
for port 8000, or www.example.com:8080 for port 8080.

• However this is not a user friendly approach. Users cannot reasonably be


expected to know the port numbers for their websites and moving a site
between servers may require changing the port number.
• Using non-standard port numbers may also be seen as unprofessional and
unattractive to users.
• In addition, some firewalls block all but the most common ports, causing a
site hosted on a non-standard port to appear unavailable to some users.

24
Basic Services

• Name Service:
• Remote login Service:
• File Service:
• Mail Service:
• Web Service:

25
Name Service
• For a common user it is hard to remember correctly an IP Address
• An equivalent symbolic name is associated with this number as an
identifier of the machine in application layer and such a name is called
domain name.
• With domain name a connection cannot be established directly.
• For transport layer connection, the IP address of the host is required
• Name service resolves a domain name to IP address for establishing
connection or vice versa
– Forward Mapping: Mapping of domain names to ip address. This is
commonly what the name server does.
– Reverse Mapping : Mapping of ip address to domain names. Used in
diskless machines. Certain applications also require this to check for
security.
• The domain name of the machine 50.22.136.227 is www.gauhati.ac.in.
• A mapping is simply an association between two things

26
Flat Namespace
• Originally each machine name on the internet consisted of a sequence
of characters.
• A central site Internet Network Information Center Administered the
namespace and assigned new names.
• Issues
– single point of failure
– traffic volume
– distant centralized database
– maintenance
– scaling

27
Distributed Name Space
• Decentralize the naming mechanism by delegating authority for part of
the namespace to different players. It means to distribute the database.

• The mechanism that implements a machine name hierarchy for TCP/IP


internet is called the Domain Name System (DNS).

• The DNS uses a hierarchical naming scheme known as domain


names.

• DNS name space is divided into non-overlapping zones


• Each zone contain some part of the tree and name servers

28
Hierarchal Naming Scheme
• A hierarchical, domain-based naming scheme
• Root Domain (.)
• Top Level Domains (TLD)
– Generic (.com, .edu, .gov, .org, .net ….)
– Country (.in, .jp .us .nl …)

29
Hierarchal Naming Scheme

A top-level domain (TLD) is one of the domains at the highest level in the
hierarchical Domain Name System of the Internet
The top-level domain names are installed in the root zone of the name
space. For all domains in lower levels, it is the last part of the domain
name, that is, the last label of a fully qualified domain name.

• A TLD will have sub-domains and a sub-domain will have sub-sub-


domains and so on
• And thus a hierarchy is formed
• Domain name of a host in a network is a path from root to the hostname
• It is expressed in dot-decimal format of path expression
– Eg. www.gauhati.ac.in
• Domain names are case insensitive.
• There is co correspondence among component names and bytes of IP
address

30
Domain Name System (DNS)
• Defined in RFC (Request for Comments) 1034,1035
• The system comprises of
• Name Client:
– Name client requests a name server to resolve the given domain name to its
IP address
– It uses UDP and not TCP in the transport layer
• Name Server:
– name server resolves the given name to its IP address
– It listens to port no UDP port no 53
• Distributed Name Database
– name-to-IP address mappings are stored in a name database associated with
a name server

31
Protocol
• A client calls a library program, resolver
• Resolver sends a UDP packet the local name server listening at port no
53
• The server looks into the local name database and returns the ip address
to the resolver if it has it in its cache. Resolver forwards it to the client

• If it does not know it will see how closely it can match the requested
name and use whatever information it has cached.
• It will remove the leftmost parts one at a time, checking if it knows
anything about www.gauhati.ac.in , gauhati.ac.in, ac.in. , in,
• In the worst case there is no match but the `.' (root) of the name, It will
then ask a . server about www.gauhati.ac.in
• This . server will not know the answer but it will help your server on its
way by giving a referral, telling it where to look instead.
• These referrals will eventually lead your server to a nameserver that
knows the answer.

32
Simple DNS example

host abc.ac.in wants IP address of root name server


xyz.edu
2 4
5 3
1. contacts its local DNS server, dns.
ac.in
2. dns.ac.in contacts root name
server, if necessary authorititive name server
local name server
3. root name server contacts authoritative dns.ac.in dns.test.edu
name server, dns.test.edu, if
necessary 1 6

33
requesting host Xyz.edu
abc.ac.in

33
DNS example
root name server
Root name server:
• may not know
authoritative name server 2 6
• may know intermediate 7 3
name server: who to
contact to find
authoritative name server
intermediate name server
dns.test1.edu
4 5
1 8

authoritative name server


dns.test2.edu

34
Name Servers
• Local name servers:
– each ISP, company has local (default) name server
– host DNS query first goes to local name server and is resolved by
using local name database.
• Authoritative name server:
– for a host: stores that host’s IP address, name
– can perform name/address translation for that host’s name
• Root Name Servers
– Root servers are the servers at the root of the Domain Name System
hierarchy
– “. “ Servers
– 13 Nos in the world

– In India three root servers are placed, one in Mumbai (I root), one in
Delhi (K root) and one in Chennai (F root)

35
36
Root Name Servers
• A root name server is a name server for the Domain Name System's
root zone.
• It directly answers requests for records in the root zone and answers
other requests returning a list of the designated authoritative name
servers for the appropriate top-level domain (TLD).
• The root name servers are a critical part of the Internet because they are
the first step in translating (resolving) human readable host names into
IP addresses that are used in communication between Internet hosts.
• here are currently 13 root name servers specified, with names in the
form letter.root-servers.net, where letter ranges from A to M

37
Who operates root servers?

The root servers are operated by 12 different organizations:


• Verisign
• University of Southern California
• Cogent
• University of Maryland
• NASA AMES Research Center
• Internet Systems Consortium
• US Department of Defense
• US Army Research Lab
• Netnod
• RIPE
• ICANN
• WIDE

38
Contd..
• There are more than 300 root servers scattered around the world, on all
six populated continents.
• They are reachable using 13 numeric IP addresses – one per operating
organization, except for Verisign, which has two.
• Most of those addresses are assigned to multiple servers scattered
around the world, so DNS queries sent to those addresses get fast
responses from local servers.
• Because there are only 13 root server IP addresses, only 13 root servers
can be seen from any single location at any given time.

39
Authoritative Name Server

• An authoritative name server provides actual answer to your DNS queries


such as – mail server IP address or web site IP address .
• It provides original and definitive answers to DNS queries.
• It does not provides just cached answers that were obtained from another
name server. Therefore it only returns answers to queries about domain
names that are installed in its configuration system. There are two types of
Authoritative Name Servers:
• Master server (primary name server) – A master server stores the original
master copies of all zone records.
• A host-master only make changes to master server zone records.
• Each slave server gets updates via special automatic updating mechanism of
the DNS protocol. All slave servers maintain an identical copy of the master
records.
• Slave server (secondary name server) – A slave server is exact replica of
master server. It is used to share DNS server load and to improve DNS zone
availability in case master server fails.

40
Remote Login Service: TELNET

telnet
• Remote Login(TELNET) a service which client
allows a local machine to login to a
remote machine.
• The local machine now works as a
terminal of the remote machine.
• TELNET is the basis of other application
protocols, like FTP, HTTP etc
– Step1 telnet 50.22.136.227
23
– Step2 login : password:
– Step3 commands
– Step 4 bye
telnet
server

41
File Service: FTP

• File Transfer(FTP) service allows


users to download from and upload ftp
files to a remote machine to login to client
a remote machine.
– Step1 ftp 50.22.136.227
– Step2 login : password:
– Step3 bin
– Step4 get / put
– Step5 bye
21

ftp
server

42
Web Service: World Wide Web
• The World Wide Web (www) or the Web
service is the most popular service on the
Internet
• WWW was originated by Timothy Berners
Lee in march 1989 at CERN, the European Web
Particle Physics Laboratory client
• He wrote the first web client and server in
1990
• WWW is a network of pages containing
hypermedia information HTTP
• A Web client, talks to a Web server (Port 80)
using HTTP (HyperText Transport Protocol)

80

Web
Server

43
TELNET as Alternative Web Browser
• TELNET software can be used as poor alternative to a web browser.
• It can be used to request an HTML page from Web server and then
interpret the HTML page and display its contents on the user’s screen
• If the user’s , for some reason, does not have Web Browser, but knows
how to enter TELNET commands, and has some software that can
interpret HTML pages.
• In such case, the user can actually type TELNET commands that mimic
the function of Web Browser, by requesting web pages from a web
server.
• However, the point to note is that TELNET can actually be used to send
HTTP commands to a Web Server

telnet 172.16.0.2 80
GET /index.html

44
Hypermedia Page

• Hypermedia components
– Text ( .html, .htm)
– Image (.jpg, .gif, etc)
– Audio (.wav)
– Video (.avi)

 Each component is a separate file


 Text file serves as the binding element of other files
 Every file is downloaded separately in HTTP

45
Uniform Resource Locator: URL

protocol://domain_name:target_port/relative_path/file_name.extension#section

• http://www.gauhati.ac.in/ist/prog/btech/index.html#btech_04
• Defaults
– Protocol: http
– Domain_name: current
– Target Port:80
– Relative path: wrt DocumentRoot (/var/www/html)
– File: DirectoryIndex (index.html)
– Section : #TOP
• Server Configutation Directives in /etc/httpd/conf/httpd.conf
• In lieu of domain_name we can use an IP address also.

Example

46
URI
• A Uniform Resource Identifier (URI) is a compact sequence of
characters that identifies an abstract or physical resource.
• A URI can be further classified as a locator, a name, or both.
• The term “Uniform Resource Locator” (URL) refers to the subset of
URIs that, in addition to identifying a resource, provide a means of
locating the resource by describing its primary access mechanism (e.g.,
its network “location”).

47
URL
• A URL is a URI that, in addition to identifying a web resource, specifies
the means of acting upon or obtaining the representation, specifying
both its primary access mechanism and network location.
• For example, the URL http://guist.ac.in/index.html refers to a resource
identified as index.html whose representation, in the form of HTML and
related code, is obtainable via HyperText Transfer Protocol (http) from a
network host whose domain name is guist.ac.in

48
URN
• A URN is a URI that identifies a resource by name in a particular
namespace *.
• A URN can be used to talk about a resource without implying its
location or how to access it.
– The International Standard Book Number (ISBN) system for
uniquely identifying books provides a typical example of the use of
URNs.
– The URN for that edition would be urn:isbn:0-486-27557-4.

* Namespaces
• In order to ensure the global uniqueness of URN namespaces, their
identifiers (NID [Namespace Identifier]) are required to be registered
with the IANA(Internet Assigned Numbers Authority) .

49
Contd..
Syntax
• The syntax of a URN
<URN> ::= "urn:" <NID> ":" <NSS>
• This renders as: urn:<NID>:<NSS>
• The leading
– urn: sequence is case-insensitive.
– <NID> is the namespace identifier, which determines the syntactic
interpretation of <NSS>, the namespace-specific string.

– Example : urn:isbn:0451450523

50
Conceptual distinctions

• "URL is a useful but informal concept: a URL is a type of URI that


identifies a resource via a representation of its primary access
mechanism (e.g., its network "location"), rather than by some other
attributes it may have".
• A URL is simply a URI that happens to point to a physical resource over
a network.

• A URN is a URI that identifies a resource by name in a particular


namespace.

51
Examples
• Examples of URIs–again from the RFC:
• ftp.is.co.za/rfc/rfc1808.txt
• http://www.ietf.org/rfc/rfc2396.txt
• ldap://[2001:db8::7]/c=GB?objectClass?one
• mailto:[email protected]
• news:comp.infosystems.www.servers.unix
• telnet://192.0.2.16:80/ (
• urn:oasis:names:specification:docbook:dtd:xml:4.1.2

52
Examples
• Examples of URIs–again from the RFC:
• ftp://ftp.is.co.za/rfc/rfc1808.txt (also a URL because of the protocol)
• http://www.ietf.org/rfc/rfc2396.txt (also a URL because of the protocol)
• ldap://[2001:db8::7]/c=GB?objectClass?one (also a URL because of the
protocol)
• mailto:[email protected] (also a URL because of the protocol)
• news:comp.infosystems.www.servers.unix (also a URL because of the
protocol)
• telnet://192.0.2.16:80/ (also a URL because of the protocol)
• urn:oasis:names:specification:docbook:dtd:xml:4.1.2

53
Web Browser
• A web browser is a software application for retrieving, presenting and
traversing information resources on the World Wide Web.
• An information resource is identified by a Uniform Resource Identifier
(URI) and may be a web page, image, video or other piece of content.
• Hyperlinks present in resources enable users easily to navigate their
browsers to related resources.
• A web browser can also be defined as an application software or
program designed to enable users to access, retrieve and view
documents and other resources on the Internet.
• Although browsers are primarily intended to use the World Wide Web,
they can also be used to access information provided by web servers in
private networks or files in file systems.

• Browsers:
– Internet Explorer
– Netscape Navigator
– Mozilla Firefox
– Chrome
– Opera
– Safari
54
History - web browser

• The first web browser was invented in 1990 by Sir Tim Berners-Lee. It
was called WorldWideWeb (no spaces) and was later renamed Nexus.
• In 1993, Mosaic (later Netscape), browser software was innovated by
Marc Andreessen ,"the world's first popular browser which made the
World Wide Web system easy to use and more accessible to the average
person
• Andreessen, the leader of the Mosaic team at NCSA, soon started his
own company, named Netscape, and released the Mosaic-influenced
Netscape Navigator in 1994, which quickly became the world's most
popular browser, accounting for 90% of all web use at its peak
• Microsoft responded with its Internet Explorer in 1995, also heavily
influenced by Mosaic, initiating the industry's first browser war.
• Internet Explorer gained dominance in the web browser market; Internet
Explorer usage share peaked at over 95% by 2002.

55
Contd..
• Opera was released in 1996; although it has never achieved widespread
use, having less than 2% browser usage share as of February 2012
according to Net Applications.
• Its Opera-mini version has an additive share, in April 2011 amounting to
1.1% of overall browser use.
• In 1998, Netscape launched what was to become the Mozilla Foundation
in an attempt to produce a competitive browser using the open source
software model.
• That browser would eventually evolve into Firefox
• As of August 2011, Firefox has a 28% usage share.
• Apple's Safari had its first beta release in January 2003; as of April
2011, it had a dominant share of Apple-based web browsing, accounting
for just over 7% of the entire browser market.

56
Contd..
• The most recent major entrant to the browser market is Chrome, first
released in September 2008. Chrome's take-up has increased
significantly year on year, by doubling its usage share from 8% to 16%
by August 2011.

• This increase seems largely to be at the expense of Internet Explorer,


whose share has tended to decrease from month to month.
• In December 2011, Chrome overtook Internet Explorer 8 as the most
widely used web browser but still had lower usage than all versions of
Internet Explorer combined.
• Chrome's user-base continued to grow and in May 2012, Chrome's
usage passed the usage of all versions of Internet Explorer combined.
• By April 2014, Chrome's usage hit 45%.

57
Source: http://en.wikipedia.org View current usage share
58
Most used web browser by country as of June 2015

59
Web Browser – Function
• Function of a web browser is to bring information resources to the user
("retrieval" or "fetching"), allow them to view the information
("display", "rendering"), and then access other information
("navigation", "following links").
• This process begins when the user inputs a Uniform Resource Locator
(URL), for example http://en.wikipedia.org/, into the browser.
• The prefix of the URL, the Uniform Resource Identifier or URI,
determines how the URL will be interpreted.
• The most commonly used kind of URI starts with http: and identifies a
resource to be Retrieved over the Hypertext Transfer Protocol (HTTP).
• Many browsers also support a variety of other prefixes, such as https:
for HTTPS, ftp: for the File Transfer Protocol, and file: for local files.
• Prefixes that the web browser cannot directly handle are often handed
off to another application entirely. For example, mailto: URIs are
usually passed to the user's default e-mail application, and news: URIs
are passed to the user's default newsgroup reader.

60
Contd..
• In the case of http, https, file, and others, once the resource has been
Retrieved the web browser will display it.
• HTML and associated content (image files, formatting information such as
CSS, etc.) is passed to the browser's layout engine to be transformed from
markup to an interactive document, a process known as "rendering".
• Aside from HTML, web browsers can generally display any kind of content
that can be part of a web page.
• Most browsers can display images, audio, video, and XML files, and often
have plug-ins to support Flash applications and Java applets.
• Upon encountering a file of an unsupported type or a file that is set up to be
downloaded rather than displayed, the browser prompts the user to save the
file to disk.
• Information resources may contain hyperlinks to other information
resources. Each link contains the URI of a resource to go to. When a link is
clicked, the browser navigates to the resource indicated by the link's target
URI, and the process of bringing content to the user begins again.

61
HTTP Commands
• GET :Request for obtaining a Web page
• HEAD :Request to read the header of a Web page. If a browser wants to
know the last modified date of a Web page
• PUT :Request the server to store a Web page
• POST : Similar to PUT, but is used for updating a existing Web page
• DELETE : Remove a Web page (Obsolete)
• LINK : Connects two resources (Obsolete)
• UNLINK : Disconnects two resources (Obsolete)

• Note that GET is the most common command sent by a client browser
as apart of the HTTP request to a Web server.
• This is because not many Web servers would allow a client to
delete/add/link/unlink files.

62
Web Content

• Now the issue is how to encode web content for


presentation and for processing.
• Programming languages are used to encode logic of
processing data.
• Markup languages are used for encoding data for
presentation and processing.

63
Thank You

Next Slide

You might also like