3. Topics to be Covered
Website & Its Types
Web Server & It’s Elements
Web server & Web Client
Server Architecture
Web Page Content
Web server Software
Web Server Hardware
Web Server Operating System
Server computer Performance Evaluation
4. Web Site
A website is a collection of different types of data, which can be anything like
text, graphics, videos etc, combined together to provide some kind of useful
information.
Collection of Web pages
Web Page: What displays
Example:
Daraz.pk
Zameen.com
Google.com
5. Types of Web Site
Development Sites:
Building, creating, and an maintaining websites.
Such as web design, we publishing, web programming, and database
management.
Example:
Wix.com
Transaction processing site
Electronic site i.e. business-to-business and business-to-consumer
Available 24 hours a day, seven days a week
Example:
Amazon.com
OLX.com
6. Content-delivery sites:
Deliver content such as news, histories, summaries, and other
digital information
Example:
Yahoo.com
MSN
Intranet:
Private Network
Internal Website
Share internal memos, corporate policy handbooks, expense
account worksheets, budgets, newsletters, and a variety of other
corporate documents.
Extranet:
Intranets that allow authorized parties outside the company to
access information stored in the system
7. Web Server
A web server is a computer that stores a website's component files (e.g. HTML
documents, images, and JavaScript files) and delivers them to the end-user's
device over the internet.
The most common use of Web server is to host Websites.
A web server serves web pages to clients across the Internet or an Intranet. The
web server hosts the pages, scripts, programs, and multimedia files and serves
them using HTTP, a protocol designed to send files to web browsers and other
protocol
Three main elements of a Web server:
Hardware
Operating system software
Web server software
8. Web server / Web Client
Web Client:
Any computing Device attached to the internet that is capable of making http
request
Web Server:
A web server is any computer used to provide (or “serve”) files or make
programs available to other computers connected to it through a network
(such as a LAN or a WAN)
9. Client/Server Architecture
Client/server architecture is a computing model in which the
server hosts, delivers and manages most of the resources and
services to be consumed by the client
This type of architecture has one or more client computers
connected to a central server over a network or Internet
connection.
10. Two-tier architecture
Typical request message from a client to a server consists of three major
parts: request line, optional request headers, and an optional entity body.
11. Three-Tier and N-Tier Client/Server
Architectures
A three-tier architecture extends the two-tier architecture to allow
additional processing to occur before the Web server responds to the Web
client’s request. Higher-order architectures - that is, those that have more
than three tiers - are usually called n-tier architectures.
12. Web Page Content
Dynamic Content:
“Dynamic" content, smart content is a term for the aspects of a
website, ad, or email body that change based on the interests or
past behavior of the viewer.
It creates an experience that's customized specifically for the
visitor or reader at that moment.
Static Content:
It is any content that can be delivered to an end user without having
to be generated, modified, or processed.
The server deliver the same file to each user.
13. Operating software
Microsoft Windows NT Server,
Microsoft Windows 2000 or 2003 Server products,
Linux, or one of several UNIX-based operating systems,
Microsoft server products are simpler for information systems staff to learn and
use than UNIX-based systems.
UNIX based Web servers are more popular, and many users believe that UNIX is a
more secure operating system
14. Web Hardware
Server Computers :
Web server computers generally have more memory,
larger (and faster) hard disk drives,
Faster processors than the typical desktop
15. Web Software
Web server software:
Server software is a type of software that is designed to be used, operated
and managed on a computing server.
Or
Used by a server computer to make files and programs available to other
computers
Other programs
-Internet utilities
-Email software
16. Email
A system for sending messages from one individual to another via
telecommunications links between computers or terminals using dedicated
software
.
Email messages are comprised of three components, as follows:
Message envelope: Describes the email’s electronic format
Message header: Includes sender/recipient information and email
subject line
Message body: Includes text, image and file attachments
17. Email benefits and drawback
Benefit:
Attachment
Email is Fast
Privacy is Maintained
Draw Backs:
Virus
Unwanted Email(spam mails)
18. SPAM
Electronic junk mail that can include
Advertisements, or e-mail chain letters
It consume large amounts of Internet capacity
19. Solution to SPAM:
Companies now offer software to limit the amount of spam
Control exposure of an e-mail address
Use multiple e-mail addresses
Content filtering strategy
Require software that identifies content elements that indicate if a
message is (or is not) spam
Content-filtering techniques
Black list spam filter
White list spam filter
Challenge-response
20. Internet utility program
Finger Utilities:
It is a program that runs on UNIX operating systems
Allows user to obtain some information about other network users
A Finger command yields a list of users who are logged on to a network, or
reports the last time a user logged on to the network.
Ping Utilities:
Ping is short for Packet Internet Groper,
It tests the connectivity between two computers connected to the Internet.
21. Telnet:
Allows users to log on to a computer that is connected to the Internet
This remote login capability can be useful for running older software that
does not have a Web interface.
FTP Utilities:
It is part of the TCP/IP rules that defines the formats used to transfer files
between TCP/IP-connected computers.
Data Analysis Software:
Web servers can capture visitor information, including data about who is
visiting a Web site (the visitor’s URL), how long the visitor’s Web browser
viewed the site, the date and time of each visit, and which pages the visitor
viewed.
22. Server computer Performance Evaluation
Benchmarking:
Testing used to compare the performance of hardware and software
Throughput :
Number of HTTP requests that a hardware and software combination
can process in a unit of time
Response time:
Time required by a server to process one request
Editor's Notes
When people use their Internet connections to become part of the Web, their computers become Web client computers on a worldwide client/server network. Client/server architectures are used in LANs, WANs, and the Web. In a client/server architecture, the client computers typically request services, such as printing, information retrieval, and database access, from the server, which processes the clients’ requests. The computers that perform the server function usually have more memory and larger, faster disk drives than the client computers they serve.
Dynamic Website:
IT contains information that changes, depending on the viewer, the time of the day, the time zone, the viewer's native language, and other factors
Static Website:
A static website is one that has web pages stored on the server in format that is send to client web browser.
It present pre-defined static information to user.
Example: Brochure Website (Information about company, its products and services )
AttachmentOne of the most important advantages of email is attachment facility. Email gives you a facility of attachment so that you can attach anything like the picture, audio file, video file, document file, PDF etc.Email is fastIt eliminates the time spent in establishing telephone calls. It is faster compared to traditional mail.Privacy is maintainedPrivacy of communication is ensured because the mail is delivered to video individual’s mailbox which can be opened by the intended recipients only.VirusAn email may carry the virus to you. So, all the time you should careful about it. It is one of the greatest disadvantages of email.
Unwanted emailEmail can spread mail containing virus or spam contents which can damage computer systems totally.