Uploaded by Kawn Soni

Week 5 Group Assignment

advertisement
Web Access Over the Internet
Contents
Introduction ..................................................................................................................................... 3
The Technologies of Web Access over the Internet ....................................................................... 5
The Different Types of Webs Access over the Internet. ................................................................. 6
The Security and Privacy Considerations of Web Access over the Internet .................................. 7
Conclusion ...................................................................................................................................... 8
References ....................................................................................................................................... 9
Bibliography ................................................................................................................................. 10
Introduction
Web access over the Internet refers to the ability to access and browse websites and webbased applications using a web browser, such as Google Chrome, Mozilla Firefox, or Microsoft
Edge, over the Internet.
The Internet is a global network of interconnected computer networks, and web access is
one of the most common ways people use the Internet. When you type in a website address or
URL (Uniform Resource Locator) into your web browser, the browser sends a request to the
website's server over the internet, and the server responds by sending back the requested web page
(Gralla, 1998).
Web access over the Internet has become a ubiquitous part of modern life, enabling people
to access an ever-increasing amount of information, communicate, shop, bank, and perform many
other tasks online. This essay will explore the various aspects of web access over the Internet,
including the technologies involved, the different types of web access, and the security and privacy
considerations that need to be considered.
Web access over the Internet involves a complex series of interactions between different
devices, networks, and servers. The following is a high-level overview of how web access over
the Internet works:
1. Establishing an Internet Connection: To access the web, a user first needs to have an
Internet connection. This can be through a wired or wireless connection provided by an
Internet Service Provider (ISP), or through a mobile data network provided by a cellular
provider (Gralla, 1998).
2. Entering a URL: Once the user has established an internet connection, they can enter the
Uniform Resource Locator (URL) of a website they want to access in the address bar of
their web browser. The URL contains the domain name of the website, such as
“www.google.com” and is used by the browser to locate the website's server.
3. Resolving the Domain Name: The domain name entered by the user is sent to a Domain
Name System (DNS) server, which translates the domain name into an IP address. This IP
address is used to locate the server that hosts the website (Gralla, 1998).
4. Sending a Request: Once the IP address of the server is known, the user's web browser
sends a request to the server for the website's files. This request is sent using the Hypertext
Transfer Protocol (HTTP) or its encrypted version, HTTPS.
5. Processing the Request: When the server receives the request, it checks if the user has
permission to access the requested files. If permission is granted, the server gathers the
necessary files and sends them back to the user's browser in the form of a response.
6. Receiving the Response: The user's browser receives the response from the server and
renders the webpage for display. The webpage is constructed using HyperText Markup
Language (HTML), which defines the structure and content of the webpage, and Cascading
Style Sheets (CSS), which defines the visual style and layout of the webpage.
7. Displaying the Webpage: Once the browser has received the webpage files, it renders the
webpage on the user's device. This includes displaying text, images, videos, and other
multimedia elements on the webpage.
8. Interacting with the Webpage: The user can interact with the webpage by clicking on
links, filling out forms, or performing other actions. These interactions are processed by
the user's browser and sent back to the server as requests for additional files or updates to
the webpage.
9. Closing the Connection: Once the user is done interacting with the webpage, they can
close the connection to the server by closing the web browser or navigating to a different
website.
This process may involve multiple devices and networks, such as routers, switches, and
firewalls, that work together to ensure the smooth transfer of data between the user's device and
the website's server. Understanding how web access over the internet works is essential for anyone
who wants to navigate the web and access online content (Zeber et al., 2020).
The Technologies of Web Access over the Internet
Web access over the Internet involves the use of various technologies to enable communication
between web browsers and servers. The primary technologies involved include:
1. HTTP (Hypertext Transfer Protocol): HTTP is the primary protocol used for web
communication. It defines how web browsers and servers communicate and transfer data,
including text, images, and video.
2. HTML (Hypertext Markup Language): HTML is the primary language used for creating
web pages. It defines the structure and layout of web pages, including text, images, links,
and other multimedia elements.
3. CSS (Cascading Style Sheets): CSS is a language used to define the visual style and layout
of web pages. It allows web designers to create visually appealing and consistent designs
across multiple web pages (Choo et al., 2013).
4. JavaScript: JavaScript is a programming language used to create interactive and dynamic
elements on web pages. It allows web designers to create complex and interactive
applications that can respond to user actions (Gralla, 1998).
The Different Types of Webs Access over the Internet.
There are several different types of web access over the Internet, including:
1. Static Web Pages: Static web pages are web pages that are created and stored on a web
server and are delivered to web browsers exactly as they are. They are typically created
using HTML and CSS and do not change unless they are manually edited (Choo et al.,
2013).
2. Dynamic Web Pages: Dynamic web pages are web pages that are created and customized
based on user inputs and are generated by web applications running on the server. They are
typically created using server-side programming languages like PHP, Python, or Ruby, and
can include dynamic content like user-generated data, news feeds, and other dynamic
elements.
3. Rich Internet Applications: Rich Internet Applications (RIAs) are web applications that
are designed to provide a desktop-like user experience, including responsive interfaces,
interactive animations, and multimedia elements. They are typically created using a
combination of HTML, CSS, and JavaScript, and can leverage various libraries and
frameworks to enable advanced functionality.
4. Mobile Web Access: Mobile web access refers to the ability to access web pages and web
applications on mobile devices like smartphones and tablets. Mobile web access typically
requires web pages to be optimized for smaller screens and slower data connections and
can leverage technologies like responsive web design and mobile-specific frameworks to
provide a seamless user experience (Maple, 2017).
The Security and Privacy Considerations of Web Access over the Internet
Web access over the Internet can present various security and privacy challenges, including:
1. Malware and Phishing: Malware and phishing attacks can occur when users visit websites
or download files that contain malicious code or links. These attacks can result in the theft
of personal information or financial data and can compromise the security of users'
computers and networks.
2. Data Breaches: Data breaches can occur when websites or web applications are
compromised, resulting in the theft of users’ personal data like email addresses, passwords,
and other sensitive information. These breaches can result in identity theft and other forms
of fraud and can damage users' trust in the affected websites or companies.
3. Tracking and Surveillance: Web access over the internet can be used to track users' online
activities and behaviors, including the websites they visit, the products they purchase, and
the searches they make. This information can be used to create detailed profiles of users
and to deliver targeted advertising, but it can also raise concerns about privacy and
surveillance.
4. Encryption: Encryption is a technique used to protect sensitive information by encoding
it so that it can only be read by authorized parties. Encryption is used in web access over
the internet to protect users' sensitive data like passwords, credit card numbers, and other
personal information. The primary encryption protocol used in web access is HTTPS
(Hypertext Transfer Protocol Secure), which encrypts data sent between web browsers and
servers (Maple, 2017).
5. Firewalls and Antivirus Software: Firewalls and antivirus software can be used to protect
users' computers and networks from malware, phishing attacks, and other online threats.
Firewalls monitor incoming and outgoing web traffic and block any suspicious activity,
while antivirus software scans files and web pages for malware and other malicious code.
6. Privacy Settings: Many websites and web applications offer privacy settings that allow
users to control what information is shared with other users or with third-party advertisers.
Users should take the time to review and adjust their privacy settings to ensure that their
personal information is not being shared without their consent (Maple, 2017).
Conclusion
Overall, web access over the internet has transformed the way we access information,
communicate with others, and conduct business. While there are certain risks and challenges
associated with web access, there are also many benefits. By being aware of the potential risks and
taking steps to protect their privacy and security, users can enjoy the benefits of web access over
the internet while minimizing the risks (Gralla, 1998).
References
Choo, C. W., Detlor, B., & Turnbull, D. (2013). Web work: Information seeking and knowledge
work on the World Wide Web (Vol. 1). Springer Science & Business Media.
Gralla, P. (1998). How the Internet works. Que Publishing.
Maple, C. (2017). Security and privacy in the internet of things. Journal of cyber policy, 2(2), 155184.
Zeber, D., Bird, S., Oliveira, C., Rudametkin, W., Segall, I., Wollsén, F., & Lopatka, M. (2020).
The representativeness of automated web crawls as a surrogate for human browsing.
Proceedings of The Web Conference 2020,
Bibliography
Stallings, William. “Online Privacy: Threats and Requirements.” InformIT Database, 4 Jan.
2020, www.informit.com/articles/article.aspx?p=2995362&seqNum=2.
How the Web Works.” MDN Web Docs, 18 May 2019,
https://developer.mozilla.org/enUS/docs/Learn/Getting_started_with_the_web/How_the_Web_w
orks
9 Types of Webs Portals with Examples. www.monocubed.com/blog/types-of-web-portal/.
“Welcome to Web Access” | www.webaccessglobal.com/.
Download