Internet and Web Browsers
Internet and Web Browsers
• E-mail
• Research
• Shopping
• News
• Games
• Ed-line
World Wide Web
The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web
resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via
the Internet. English scientist TimBerners-Lee invented the World Wide Web in 1989. He wrote the first web browser
computerprogram in 1990 while employed at CERN in Switzerland. The Web browser was released outside CERN in
1991, first to other research institutions starting in January 1991 and to the general public on the Internet in August
1991.
The World Wide Web has been central to the development of the Information Age and
is the primary tool billions of people use to interact on the Internet. Web pages are
primarily text documents formatted and annotated with Hypertext Markup Language
(HTML). In addition to formatted text, web pages may contain images, video, audio,
and software components that are rendered in the user's web browser as coherent
pages of multimedia content.
Browsers
WWW Clients, or "Browser": The program you use to access the WWW is
known as a browser because it "browses" the WWW and requests these
hypertext documents. Browsers can be graphical, allows to see and hear
the graphics and audio;
text-only browsers (i.e., those with no sound or graphics capability) are also
available. All of these programs understand http and other Internet protocols
such as FTP, gopher, mail, and news, making the WWW a kind of "one stop
shopping" for Internet users.
List of Web browsers
Year
1991 World Wide Web (Nexus)
1992 Viola WWW, Erwise, MidasWWW, MacWWW (Samba)
1993 Mosaic,Cello,[2] Lynx 2.0, Arena, AMosaic 1.0
1994 IBM WebExplorer, Netscape Navigator, SlipKnot 1.0, MacWeb, IBrowse, Agora (Argo), Minuet
Internet Explorer 1, Internet Explorer 2, Netscape Navigator 2.0, OmniWeb, UdiWWW, Grail
1995
Mozilla Firefox 2.0, Internet Explorer 7,Opera 9,[12], SeaMonkey 1.0, K-Meleon 1.0,
2006
Galeon 2.0, Camino 1.0, Avant11, iCab 3
Apple Safari 3.0, Maxthon 2.0, Netscape
2007
Navigator9,NetSurf 1.0, Flock 1.0, Conkeror
Google Chrome 1, Mozilla Firefox 3, Opera 9.5,[13], Apple Safari 3.1, Konqueror 4,
2008
Amaya 10.0,[5] Flock 2, Amaya 11.0[5]
Google Chrome 2–3, Mozilla Firefox 3.5, Internet Explorer 8,Opera 10,[14], Apple Safari 4, SeaMonkey 2, Camino 2,surf, Pale Moon 3.0[15]
2009
Google Chrome 4–8, Mozilla Firefox 3.6, Opera 10.50,[16], Opera 11, Apple Safari 5,
2010
K-Meleon 1.5.4,
2011 Google Chrome 9–16, Mozilla Firefox 4-9, Internet Explorer 9,Opera 11.50, Apple Safari 5.1, Maxthon 3.0, SeaMonkey 2.1–2.6
Google Chrome 17–23, Mozilla Firefox 10–17, Internet Explorer 10, Opera 12, Apple
2012
Safari 6, Maxthon 4.0, SeaMonkey 2.7-2.14
Google Chrome24–31,Mozilla Firefox 18–26,Internet Explorer 11, Opera 15– 18, Apple Safari 7, SeaMonkey 2.15-2.23
2013
Uniform Resource Locators, or URLs:
A Uniform Resource Locator, or URL is the address of a document found on the WWW. Browser interprets the
information in the URL in order to connect to the proper Internet server and to retrieve your desired document.
Each time a click on a hyperlink in a WWW document instructs browser to find the URL that's embedded within
the hyperlink.
.com—commercial enterprises
.mil—military site
org—organization site (non-profits, etc.)
int—organizations established by international treaty
.net—network
.biz—commercial and personal
.edu—educational site (universities, schools, etc.)
.info—commercial and personal
.gov—government organizations
.name—personal sites
MIME (Multi-Purpose Internet Mail Extensions)
Workstations
Servers
Networking Devices
Workstations
1 Tier Architecture
2 Tier Architecture
3 Tier Architecture
N Tier Architecture
1 Tier Architecture
This kind of architecture contains all sorts of settings on a single device. The setting
involves configuration setting, data and marketing logic. 1 Tier architecture is one of the
reliable sources because of services; however, handling such an architecture is a bit
difficult as data resides in different variances. Below are the few layers that hold 1 tier
architecture.
•Presentation layer
•Business layer
•Data access layer
2 Tier Architecture
This architecture facility has the best environment. As it assists in saving the user
interface on the system of the user (client) and the related data based are stored on
the server device. Database logic and business logic needs to be maintained where
these logics are to be stored either on the user’s end or the server’s end. When
these logics are stored on the client’s end, the architecture is called “fat client thin
server” however, if these logics are handled at server device then we call it as “thin
client fat server”.
Upon firing the command by the client gives quick response, and the fastest rate is
achieved as client-server devices are directly in relation (without the participation of
an intermediate party). Most of the time, ticket reservation agencies employ 2 tier
architecture.
3 Tier Architecture
A middleware lies in between the client and the server machines in 3 tier architecture. If a
user needs specific information from the server, the user will generate the request that
will first be received by the middle layer, which will then be dispatched to the server for
further actions. In the same pattern, the response will be reached to the user’s end. That
first is received at the middle layer, and then the middle layer will dispatch the received
data from the server to the user’s end. Middleware has a provision to control and store
the data logic and business logic. Middleware in the 3-tier architecture helps to optimize
the flexibility and performance of the architecture. The framework is categorized into
three main layers
1. Web Servers:
A robust computational device that can manage many websites is like a web server. Installing numerous kinds of
web server applications on this computer, such as Apache or Microsoft IIS, offers links to the various web pages
hosted on the online, and such servers are connected to the Internet by higher-speed connections that offer ultra-
speed data transfer speeds.
2. E-Mail Servers:
e-mail servers are a valuable asset for companies, agencies and individuals as well. That enables the transferring of
messages among various stakeholders. Specific applications perform functions on the mailing servers that permit
the administrators to establish and control email accounts for the specific domain that the server hosts. Various
protocols include SMTP, IMAP, POP3 for email communication. Service Mail Transfer Protocol (SMTP) is a general
approach used for firing the messages as well as to controlling the outgoing emails. However, the Internet Message
Access Protocol (IMAP) and Post Office Protocol V3 (POP3) is used for reception and controlling the incoming emails.
3. File Servers:
File servers are exclusively allocated structures that facilitate all data to be accessed by clients. It serves as a
consolidated place for storing data, and many terminal systems may manage it.
•There is a centralized network that has full leverage to control the processes and activities in
a client-server architecture.
•The central area of the architecture is used for the storage of data.
•The devices used in architecture can be controlled centrally.
•Network protection, data backup and all other concerned elements are tackled centrally.
•Users have the authority to access all the files at any time residing on the central storage.
•There exists no restriction regarding geography to access the information. One can access
any information from any place.
•The architecture can be expanded as the growth requires the scaling of users or any other
parameters.
•It offers service incorporation, which ensures that it allows user authorization to view
business data through its device and to delete any inappropriate access for logging in.
•Clients have the facility to share any resources at various platforms and places.
•The client-server design is implemented on a distributed model basis, ensuring that the
server is replaced, restored, upgraded and moved without influencing the client.
•The architecture can tackle massive weight given clients, systems, devices and network
loads.
•The architecture provides an easy user interface, file finding procedure and
management system for keeping all the files in an organized pattern.
•The architecture facilitates the data overwhelming by the reduction in data replication.
Client-Server Architecture Disadvantages