Web Engineering 7
Web Engineering 7
Web Engineering 7
1. What is protocol?
Protocol is a set of rules which are used in digital communication to connect
network devices and exchange information between them.
Types of protocols:
TCP/IP:
TCP stands for transmission control protocol where as IP stands for internet
protocol.
TCP is used to transfer the data over the internet it, divides
the data Into small packets and send it to the destination through the network. It
is the basic protocol as compare to all.
Every protocol use TCP/up to fulfill there work where network connection and
transferring needed.
While IP is used for addressing through which data reaches the destination.
HTTP:
Http is an application protocol that is used in the address bar of the web browser
before www. Whenever we search anything in the address bar browser so it
brings that website in front of us.
FTP:
Ftp stands for file transfer protocol. It is used to transfer the file from server to
client machine and vice versa. It uses the TCP/IP protocol to enable data transfer.
SMTP:
Smtp stands for simple mail transfer protocol. Is is used to send and receive
emails in the network. There are two more protocols uses with SMTP (pop &
IMAP) all these protocols work with the help of TCP/IP.
POP:
Pop stands for post office protocol. It is a mail box which is actually a message
access protocol through which a user can fetch the email from the server.
Pop protocol works up on TCP/IP protocol and held the SMTP protocol from
end to end communication.
IMAP:
Imap stands for internet mail access protocol. It is also a mail box which is
actually an improvement version of POP.
By use IMAP the main advantage is we can retrieve out deleted email from the
server.
PPP
PPP stand for point to point protocol. It is used to transfer data between two
directly connected devices. In this just two devices used for direct
communication.
UDP:
UDP stands for user datagram protocol. It is an unreliable and connectionless
protocol so in order to send the data from one machine to another machine we
did not establish any connection in compare to tcp/IP protocol.
It is used to transfer the data in a short distance.
2. What is three – tier architecture?
Three-tier architecture is a well-established software application architecture that
organizes applications into three logical and physical computing tiers: the
presentation tier, or user interface; the application tier, where data is processed;
and the data tier, where the data associated with the application is stored and
managed.
Presentation Tier
This is the topmost level of the application. It provides user interface, handles the
interaction with the user. Sometimes called the GUI or client view or front-end. It
sends content to browsers in the form of HTML/JS/CSS. This might leverage
frameworks like React, Angular, Ember, Aurora, etc. It communicates with other
tiers by which it provides the results to the browser/client side.
Application Tier (Business Logic or Middle Tier)
This contains set of rules for processing information, business logic and able to
accommodate many users. Sometimes also called as middleware. It processes the
Inputs received from the clients and interacts with the database. The logic tier will
have the JSP, Java Servlets, Ruby, PHP, C++, Python and other programs. The logic
tier would be run on a Web server.
Data Tier
A database, comprising both data sets and the database management system or
RDBMS software that manages and provides access to the data (back-end).
It provides security, data integrity and support application. The data tier would be
some sort of database, such as a MySQL, SQLite or PostgreSQL database. All of
these are run on a separate database server.
Advantages
Maintainability – Because each tier is independent of the other tiers, updates or
changes can be carried out without affecting the application as a whole.
Scalability – Because tiers are based on the deployment of layers, scaling out an
application is reasonably straightforward.
Flexibility – Because each tier can be managed or scaled independently, flexibility
is increased.
Availability – Applications can exploit the modular architecture of enabling
systems using easily scalable components, which increases availability.
Reusability – Components are reusable
Faster development – Because of division of work web designer does
presentation, software engineer does logic, DB admin does data model.
Disadvantages
High installation cost.
Structure is more complex as compare to 1 & 2 tier architectures.
The client does not maintain a persistent database connection.
A separate proxy server may be required.
Network traffic will be increased if a separate proxy server is used.
The physical separation of application servers containing business logic
functions and database servers containing databases may be something
that affects performance.
Improve complexity or effort.
Applications
E-commerce Websites
Database related Websites
5. What is intranet, extranet & internet?
Intranet:
An intranet can be defined as a private network used by an organization. Its
primary purpose is to help employees securely communicate with each other, to
store information, and to help collaborate.
Advantages of intranet:
In the intranet, the cost of conveying data utilizing the intranet is very low.
Using intranet employees can easily get data anytime and anywhere.
It is easy to learn and use.
It connects employees with each other.
The documents stored on the intranet are much more secure.
Disadvantages of intranet:
The expense of actualizing intranets is normally high.
The staff of the company or organization require special training to know
how to use the system.
Data overloading.
Although the intranet provides good security, but it still lacks in some
places.
Extranet:
An extranet is a private network that only authorized users can access. These
authorized users may include business partners, suppliers, and even some
customers. They can use the extranet to exchange information with each other
without having to enter the host company’s main network.
ADVANTAGES:
Share or transfer huge amounts of data easily by using EDI (Electronic Data
Interchange).
Store the company’s data in a secure location.
Provide or access to the information shared by a company to all other
companies.
Easily tracking and follow all the project’s information.
Any company easily share all the latest news with other companies.
DISADVANTAGES:
The extranet is costly and expensive to implement and maintain for any
organization.
Its security and safety can be trouble when hosting important or branded
product’s information.
It is also complicated to implement or use for an organization at the time of
commencement of business.
Also, Companies have to careful when transferring information to avoid
controlled given in the wrong hands.
It also decreases face-to-face meetings (personal contact) with clients,
customers, vendors, suppliers, business partners, etc.
Internet:
The internet is a widespread interconnected network of computers and
electronics devices(that support internet). It creates a communication medium to
share and get information online. If your device is connected to the Internet then
only you will be able to access all the applications, websites, social media apps,
and many more services. Internet nowadays is considered as the fastest medium
for sending and receiving information.
It is cost-effective.
The Cable length required is the least in comparison to other topologies.
The working of this topology is easy to understand.
Expansion can be done easily by linking the cables together.
Drawbacks of Bus Topology
If the main cable collapses, the complete network collapses.
The network performance is at stake and reduces if there are numerous
nodes and heavy network traffic.
The main cable can only be so long. The length of the cable is limited.
Bus Topology is not as fast as Ring Topology.
2. Ring Topology
Ring Topology is a topology type in which every computer is connected to another
computer on each side. The last computer is connected to the first, thus forming a
ring shape. This topology allows for each computer to have exactly two
neighboring computers.
In this topology, the main computer is known as the monitor station, which is
responsible for all the operations. Data transmission amongst devices is done with
the help of tokens. For transmitting data, the computer station has to hold the
token. The token is released only when the transmission is complete, following
which other computer stations can use the token to transmit data. The data
transmission is unidirectional in a Ring topology.
The network is not affected by numerous nodes or heavy traffic, as only the
nodes possessing tokens can transfer data.
Ring topology has cheap installation and expansion.
Drawbacks of Ring Topology
3. Star Topology
Star Topology is the kind of network topology in which all the nodes are
connected via cables to a single node called a hub, which is the central node. The
hub can be active or passive in nature. Active hubs contain repeaters, while
passive hubs are considered non-intelligent nodes. Each node contains a reserved
connection to the central node, which the central node acts as a repeater during
data transmission
Benefits of Star Topology
4. Mesh Topology
Mesh topology is the kind of topology in which all the nodes are connected
with all the other nodes via a network channel. Mesh topology is a point-to-
point connection. It has n(n-1)/2 network channels to connect n nodes.
Mesh topology has two techniques for transmission of data, i.e. routing and
flooding. In the routing technique, the nodes possess a routing logic, like
the logic for the shortest distance to the destination node or the logic to
avoid routes with broken connections. In the flooding technique, all the
network nodes receive the same data. This leaves us no need for routing
logic. This technique makes the network robust but results in unwanted
load on the network.
Benefits of Mesh Topology
Every connection has the ability to carry its particular data load.
Mesh Topology is very robust.
It is easy to diagnose faults.
Mesh Topology provides privacy and security.
It is profoundly cabled.
It is expensive when compared to other topologies.
If the root node collapses, the network will also collapse.
6. Hybrid Topology
A Hybrid Topology is basically a network topology comprising two or more
different types of topologies. It is a reliable and scalable topology, but
simultaneously, it is a costly one. It receives the merits and demerits of the
topologies used to build it.
If the address is written in decimal format, the first number determines the address. If the
first number is between 0 and 127 inclusive, the address is class A. If the first number is
between 128 and 191 inclusive, the address is class B.
Types of IP address:
Static IP address
A static IP address is an IP address that cannot be changed but it can be altered as
part of routine network administration. Static IP addresses are consistent, which
is assigned once, that stays the same over the years. Static IP address is provided
by the Internet Service Provider and remains fixed till the system is connected to
the network.
Dynamic IP address
Dynamic IP addresses always keep changing. It is temporary and are allocated to a
device every time it connects to the web. Dynamic IP address is provided by the
DHCP, generally a company gets a single static IP address and then generates the
dynamic IP address for its computers within the organization’s network.
Private IP address
A private IP address is a unique IP number assigned to every device that connects
to your home internet network, which includes devices like computers, tablets,
smartphones, which is used in your household. It also likely includes all types of
Bluetooth devices you use, like printers or printers, smart devices like TV, etc. With
a rising industry of internet of things (IoT) products, the number of private IP
addresses you are likely to have in your own home is growing.
Public IP address
A public IP address is an address where one primary address is associated with
your whole network. In this type of IP address, each of the connected devices has
the same IP address. This type of public IP address is provided to your router by
your ISP.
Some definitions:
Index.html file: for getting input from the user.
Login.java file: a servlet class for processing the response. If password is servet, it
will forward the request to the welcome servlet.
WelcomeServlet.java file: a servlet class for displaying the welcome message.
Web.xml file: a deployment descriptor file that contains the information about
the servlet.