Premium Essay

Understanding Web Architecture and Components

In:

Submitted By ejdude13
Words 2883
Pages 12
Report: Understanding Web Architecture and Components

Elliot Johnson
Learning Objective One
Mr Johnmark Horton
Friday Periods 3 + 4

Contents 1. Introduction 2. Internet Service Providers (ISP) 3. Web Hosting Services 4. Domain Names and Structures 5. Web Design Software 6. Conclusion 7. References

Introduction
Introduction
In the modern world we use the Internet daily, from a Google search, to reading the news, to checking our emails. However the World Wide Web and the Internet are two completely different things, they have both come a long way from the origins of CERN, being designed on the back of a napkin. How does the Internet really work though? What happens when we connect to the Internet? What are the differences between the Internet and the World Wide Web? Read on to find out more.

(Brooke Telecom, 2014)

Internet Service Provider (ISP)
Internet Service Provider (ISP)
An Internet service provider is basically a company that will provide you with your Internet connection, whether that is to your house, your business or anywhere else. The services that Internet service providers usually provide include Internet access, Internet transit, domain name and registration, web hosting and colocation. There are different types of Internet providers; these include access providers, mailbox providers, hosting ISPs, transit ISPs, virtual ISPs, free ISPs and wireless ISPs.
An access provider provides Internet access, they do this by having modems and servers set up, these then connect through telephone wires, Ethernet cables, fibre optics or Wi-Fi. Originally copper wires where used to provide dial up connection, DSL, however this method was ineffective as you would get noise on the wires and the wires didn’t have a large bandwidth. To get a high speed connection you would use

Similar Documents

Free Essay

Nnbj

...(service-oriented architecture) changed the conventional system development method, and allowed system integration to become more flexible. Cost reduction is a major issue in the construction of e-learning systems. Software components of SOA and web services are characterized by being reusable and interchangeable, and are therefore able to reduce waste of educational resources, as well as lower system development cost. This study uses web service components developed with Microsoft .NET and XML technologies to construct a teaching platform with standard specifications, allowing system developers to rapidly construct an e-learning system based on SOA and web services. Keywords: E-learning, Web Services, SOA, XML 1. Introduction SOA and web services can solve communication issues of different platforms or distributed architectures. XML (extensible markup language) technology is used as a foundation for message passing because its data format is able to go across platforms. SOAP (simple object access protocol), WSDL (web service description language) and UDDI (universal description, discovery and integration) technologies are used to describe, publish and access various objects. The prevalence of e-learning has caused government agencies, schools and private enterprises to set up e-learning websites one after another. However, these e-learning websites were constructed with different programming languages, data storage formats and system architectures, hence causing...

Words: 1374 - Pages: 6

Premium Essay

Enterprise Architecture

...No Enterprise is an Island Enterprise architecture in the internet era must accommodate multiple platforms and user communities By Meir Shargal & Yoav Intrator E-business is changing the way people work and communicate, requiring a different approach to enterprise architecture. Previously, systems revolved around a specific user community or platform. The system design, in most cases, coupled the user platform to the actual services. For example, a travel agency's system and applications targeted a single tier audience -- brokers -- and worked on a single platform, such as Green Screen. They supported one entry point, such as Web, fax, email, or voice response units (VRUs). In such a straightforward environment, developing systems based on the needs of that one group of users, and on the functionality of that specific platform, made sense. Today, business -- and the technology that supports it -- is more complex. During a typical work day, you may access a corporate extranet and check your inventory status at a supplier's warehouse, participate in a Web-based corporate discussion group, or receive an email message via your mobile PDA. Electronic communication now takes place across multiple platforms and among multiple companies, widening and blurring the boundaries of the individual enterprise. You can no longer neatly define users and systems, making the traditional user- or platform-focused approach to enterprise architecture inadequate. How you receive services changes...

Words: 1849 - Pages: 8

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...

Words: 3868 - Pages: 16

Free Essay

Applied Soa

...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright  2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...

Words: 218699 - Pages: 875

Free Essay

Website Migration

...better security features and recovery solutions in the event that the website has any problems. With the operational reliability of the existing system, this will make it easier to improve the new system. The first part of the project goal is to discuss what it will take to build the web architecture, then what will have to be done to move the existing Website with minimal downtime, and then provide a disaster recovery plan in the event that the website should crash or stop working. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems analysis, systems design, systems implementation, and systems support and security. When building a web architecture the first and possibly most important step in the process is the systems planning phase. The reason this is possibly the most important step in the process is that this is the time when you will gather all of the information required in order to build an architecture that will be...

Words: 2274 - Pages: 10

Premium Essay

Computer Architecture- Von Neumann Architecture

...Abstract Computer architecture and its history are important to understanding how a computer works. The Von Neumann architecture is the basic building block to the modern day computer. There are different types of functions within the Von Neumann architecture that have helped create an efficient design and allow computers to perform multiple functions rather than being used for one specific purpose. The Von Neumann model uses memory, system buses, and Boolean operators to communicate programs and perform functions. Computer Architecture- Von Neumann Architecture Explained A computer is an electronic device that operates under the control of instructions that are stored in memory. The concept of storing memory or instructions within the computer came from John Von Neumann. Von Neumann architecture can be best described as a stored program design. A stored programmed design means that the program that operates the computer and the instructions that carry out the program are stored on the computer in one location, memory. By having a stored program design, the computer doesn’t have to go through a rigorous process to be reprogrammed, or to perform multiple functions. The basic design of today’s computers is founded on the architecture of Von Neumann, which can be referred to as the “fetch-execute cycle”. The Von Neumann model consists of five major components that work together to make the computer perform. There is an area for memory to be held and processed; today we know...

Words: 1392 - Pages: 6

Free Essay

Information System

...Information Architecture Slides based on content of: Morville, P., & Rosenfeld, L. (2007). Information Architecture for the World Wide Web (3rd ed.). Sebastopol, CA: O’Reilly. Architecture Metaphor http://en.wikipedia.org/wiki/File:Milano_Duomo_1.jpg Architecture Metaphor http://upload.wikimedia.org/wikipedia/commons/c/cf/Uline_Ice_Company_Plant.jpg Architecture Metaphor http://en.wikipedia.org/wiki/File:MIT_Strata_Center.jpg Architecture Metaphor • A good architecture is – Functional – Appealing – Enduring Conceptualizing IA • Information architecture is the architecture of information spaces – Conceptualize information as a set of physical objects – Conceptualize information space as the physical space in which these objects reside – Information architecture is the architecture of this information space Lin, J. 2008. Introduction: What is Information Architecture? Available online at http://www.umiacs.umd.edu/~jimmylin/INFM700-2008-Spring/Session1.ppt IA Examples http://www.mta.info/nyct/maps/submap.htm IA Examples IA Examples http://en.wikipedia.org/wiki/File:SteacieLibrary.jpg IA Examples www.nist.gov IA for the WWW • Information Architecture 1. The structural design of shared information environments. 2. The combination of organization, labeling, search, and navigation systems within web sites and intranets. 3. The art and science of shaping information products and experiences to support...

Words: 2739 - Pages: 11

Free Essay

Re: Target Jbims.. Dream Team 2012.. Do You Have It in You...

...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...

Words: 5050 - Pages: 21

Free Essay

Apis to Affordances

...New Paradigm for Web Services Mike Amundsen mca@mamund.com amundsen.com, inc. ABSTRACT The ecosystem of services on the Web continues to grow and evolve while, at the same time, the number and diversity of connected devices increases; challenges lie ahead for both providers and consumers of Web services. This paper is presented as a ‘what-if’ proposal; an alternate paradigm for dealing with an increasingly heterogeneous network. Drawing from diverse sources including physical architecture, industrial design, the psychology of perception, and cross-cultural mono-myth, a new implementation paradigm is proposed to help software architects and developers meet these challenges; one that invites participants to shift their mental model from that of programming network devices to programming the network to which those devices are connected. To accomplish this goal an “affordance-rich message” is proposed; one that is based on shared understanding through network-oriented affordances instead of device-oriented APIs. A working model based on this approach is offered, examples given, and areas of related work identified. Figure 1: From Ericsson : 50b devices by 2020 Keywords HTTP, WWW, hypermedia, networks, SOA, REST, distributed computing, web services, usability, evolvability 1. BACKGROUND In the last several years, the landscape of the Internet has changed noticeably. There are many more connected devices, more connected applications, and thousands of Web ’APIs’ to service...

Words: 6657 - Pages: 27

Premium Essay

Btec Business Level 3 Unit 3 P1

...P1 - Outline the web architecture and components which enable internet and web functionality M1 - Explain the user side and server side factors that influence the performance of a website D1 - Explain the role of the TCP/IP protocol and how it links to application layer protocols Within this assignment I will try and explain the web architecture and the components that enable internet and the functionality of the web. If we look on what internet is, we can say it is a network connecting computers (personal computer or server computers) from all over the globe. Each one of this computer is holding information that is shared in-between computers, so that what we need to look at in this assignment, where is the information hold and how and what enables the sharing of information. We should first look at the hardware we need to be able to be part of this global network. In image abovewe have a personal computer network that we all have in our home. So we have...

Words: 897 - Pages: 4

Premium Essay

Cloud Computing

...hosting and then subsequently dismissed without catching the improvements to hosting called utility computing that permit near realtime, policy-based control of computing resources. Or it may be interpreted to mean only data center hosting rather than understood to be the significant shift in Internet application architecture that it is. Perhaps it is the name. Certainly it is more nebulous than mnemonic, if you’ll pardon the poor pun. We happen to think so too. We’d rather use the term service grid, frankly, but that name also has its problems. The fact is that cloud and service grid computing are paradigmatically different from their common interpretations, and their use can shed light on how internet architectures are constructed and managed. Cloud computing represents a different way to architect and remotely manage computing resources. One has only to establish an account with Microsoft or Amazon or Google to begin building and deploying application systems into a cloud. These systems can be, but certainly are not restricted to being, simplistic. They can be web applications that require only http services. They might require a relational database. They might require web service infrastructure and message queues. There might be need to interoperate with CRM or e-commerce application services, necessitating construction of a custom technology stack to deploy into the cloud if these services are not already provided there. They might require the use of new types of persistent storage...

Words: 20471 - Pages: 82

Premium Essay

Biography

...Systems Design What is a System? Give examples. A set of components working together for a common objective Information Systems (Web-based) H/w, S/W, people, Data, Procedures, Web-portals What is SDLC? Systems Planning, Systems analysis, systems design, systems development, implementation, maintenance IS alignment IS Success IS usage User satisfaction Information waste IS enabled Competitive advantage Orgl change Orgl learning TAM Easy to use Perceived personal usefulness Web-based Information System Banner – Assess the levels of Flexibility Stakeholders What is Systems Design? Input design Output Design Interface design Database Technology – Network architecture, Communications Technology Flexible Systems Design for Web-based IS? Examples: Banner, Amazon.com, Dell.com – Identify the systems design elements Flexible Systems Design for Web based Information Systems (Research) BOM changes affect MRP In the Banner system, what are the changes that could occur? How do we respond to these changes? Interviews them Users – Students, Registrar (Shannon), Dean, etc. Designers / Planners – Gary Administration - Explore the dimensions – Extent, Options, cost, easy, Range, etc. Gain more insight by getting more examples. • Application architecture Design • Interface design (User/ System) • Database • Network • Prototype • Systems controls Case...

Words: 1598 - Pages: 7

Premium Essay

Nt1310 Unit 3 Assignment 1

...Question 2 A system in which hardware or software components located at networked computers communicate and coordinate their actions only be message passing, is characterized as distributed system (Coulouris, Dollimore, Kindberg, & Blair, 2012). A distributed system consists of a collection of autonomous computers, connected through a network and distribution middleware, which enables computers to coordinate their activities and to share the resources of the system, so that users perceive the system as a single, integrated computing facility. All distributed systems offer to their users: • Resource Sharing: Distributed system users has the ability to use any component (hardware, software or piece of data) anywhere in the system. The access to the system is being controlled by suitable resource manager that provides naming scheme and controls concurrency depending on sharing models describing how resources are provided, used and interact with each other. • Openness: It has to do with the system ability of the system components to...

Words: 3083 - Pages: 13

Premium Essay

Telecommunications and Networks

...Lecture 6 Telecommunications And Networks Learning Objectives Understand the concept of a network. Apply Metcalfe’s law in understanding the value of a network. Identify major developments and trends in the industries, technologies, and business applications of telecommunications and Internet technologies. Provide examples of the business value of Internet, intranet, and extranet applications. Learning Objectives Identify the basic components, functions, and types of telecommunications networks used in business. Explain the functions of major components of telecommunications network hardware, software, media, and services. Explain the concept of client/server networking. Understand the two forms of peer-to-peer networking. Learning Objectives Explain the difference between digital and analog signals. Identify the various transmission media and topologies used in telecommunications networks. Understand the fundamentals of wireless network technologies. Explain the concepts behind TCP/IP. Understand the seven layers of the OSI network model. Reference Introduction To Information Systems, 16th Edition, Marakas & O’Brien, The McGraw-Hill Company, Inc. The Networked Enterprise Networking The Organization Telecommunications and network technologies are internetworking and revolutionizing business and society. The Internet, the Web, and intranets and extranets are networking business process and employees together; and connecting them to their customers, suppliers...

Words: 5527 - Pages: 23

Free Essay

Internet Information Services

...Copyright © 2008 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2008920571 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWT 3 2 1 0 9 8 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further information about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to rkinput@microsoft.com. Microsoft, Microsoft Press, Active Directory, Internet Explorer, JScript, MSDN, Silverlight, SQL Server, Visual Basic, Visual Studio, Win32, Windows, Windows Media, Windows NT, Windows PowerShell, Windows Server, Windows Vista and Xbox are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain...

Words: 65718 - Pages: 263