Vous êtes sur la page 1sur 8

P1

Web servers
Web server is a used to upload your website and its webpages online on the internet.
This will allow the website to be available on the World Wide Web for the public to see.
These can either be software as well as hardware. Most websites are hosted via these
web servers as well as other internet applications.
Mail servers
A email server or mail server is where all of your emails are kept for the user or within its
network. The mail server is used whenever a user is sending an email, receiving any
email etc. When an email is sent; it goes through the mail sever and then sent to its
destination
Proxy servers
A proxy server is a software that can responds to any communication to from other
programs and software. E.g. client. Proxy servers are used to manager the different
network capitals within a system and a network. There are many aspects in which a
proxy server controls such as hosting any website. Some proxy servers can be dedicated
servers which can be used for specific tasks
Routers
A router is a hardware that allows different data packets to be sent through networks and
making sure that they right data is going to the right destination. Whenever a request is
made within a website; it is sent through routers and gradually goes to the web server. It
then responds by the web server sending this information through the routers back to the
user.
Browsers
A browser or a web browser is one of the main programs within a web architecture which
allows the system to process the web script e.g. HTML on websites and make sure its
easier for the user to read the web page. With browsers you are allowed to complete
many tasks such as watching videos, editing documents etc. Some examples are
Chrome, Edge, and Mozilla
Email
With email software; you can easily send and receive emails from other users. It uses an
email address to send and receive these emails. Some examples of these email software
are Outlook, Gmail, and Yahoo etc.
Protocols
Protocols are used to make sure that different systems and programs can easily
communicate with each other. There are many different types and versions of protocols
that are in use at all times. One example is transmission control protocol/internet
protocol or TCP/IP. This protocol is used to make sure that all information that is being
exported ends up at the right destination or IP address. This has four different layers; link
layer, internet layer, transport layer and application layer. Each layer has a different role.
Link layer, the lowest level, deals with all the different hardware and navigates its way

through different routers, servers and hardware. Internet layer makes sure that it
constantly focuses on the IP address. The transport layer makes sure that communication
is created between the different hosts and makes sure that the package reaches its
destination. The application layer, the highest layer, uses and contains all the other
different protocols needed such as the SMTP, HTTP and HTTP. SMTP protocol is used to
transfer emails. HTTP is used to give the website permission to transfer data to a
destination. Whether its the final destination depends as it could be a node. HTTPS is
similar to HTTP however its security protocol is much more extensive. Hence the reason it
is used within e-commerce and online banking. POP and IMAP protocols are used to
access the different mail servers.
Web functionality
As there are many new technology and upgrades within technology; many internet
connections are becoming much faster, reliable as well as cheaper for some users. E.g.
Fibre optic.
Web 2.0
Web 2.0 is the different uses in which the web has since the new developments within
technology. It is the different and new ways in which the internet is used compared to
previous years however it does not refer to a new version of the internet or web. It allows
different users to be able to contribute their knowledge as well as their different opinions.
Social networking Social network are different web sites and apps that can be used to
socialise and communicated with other people, no matter where they are in the world.
With social networking sites you can post different videos, pictures etc. Some examples
are Facebook, Twitter etc.
Wikis is a website in which users can add and contribute to the information on the
website. You can add new information, edit wrong information or even create a whole
new page. One of the main examples is Wikipedia.
Online applications - applications are normally downloaded and need to installed on a
system; however with online applications, you can easily use the program as long as
there is internet connection (without the need of downloading). Most of these
applications are free or have a small fee.
Blogs blogs are online diaries or journals that are posted on different blogging websites.
Most blogs are public to everyone however some may require you to be friends with the
user. Anyone can become a blogger.
Cloud computing With the new developments within the internet and web 2.0 it has led
to cloud computing to flourish. Cloud computing is where different files and programs are
stored on a cloud server rather than being saved within the system or network itself.
Some of the main advantages of using cloud computing is that you can access your files
on any system as long as you have internet connection, no need to carry mass storage
devices etc. Some disadvantages of using cloud computing is that some users may not
trust the servers to store the information as it may get lost or stolen, especially within
financial and personal data.

P3

Security: risks e.g.


There are many different types of risks within the security if a website. This is especially
important for E-commerce and banking website as they hold personal and confidential
information which attracts different hackers. The website developers must make sure
that they take the correct security procedures to protect their website and their data.
hacking,
Hackers are a huge problem regarding the security risks. Hackers use different tools and
software to be able to steal information from different websites. Many e-commerce
websites store many different confidential customer details such as their bank account,
phone numbers, addresses etc. It is up to the business to stop hackers from gaining
access to this information.
viruses,
Viruses are a huge problem for any system whether its a business or even just a normal
user. Viruses can gain unauthorised access to the computer or a website that a user uses
and is able to see and even steal the data within the computer. They can also damage
the computer system itself and cause to break. If a website becomes infected with a
virus; it will affect all users that visit the webpage, this can lead to hundreds of people
being infected.
identity theft
As the internet becomes bigger, the amount of e-commerce businesses is also
increasing. This means more people are entering their personal and confidential
information on different websites. This has increased the rate of identity theft. With
customers personal information; identity thieves can use the information to impersonate
them and also buy items with their money. The website must be able to protect all of
their customers private and confidential informative on so that hackers and identity
thieves do not get access to the information
Security protection mechanisms:
There are many different security protection mechanisms which are available to all users
that can stop many risks within a website.
firewalls;
Firewalls set up a gateway which only allows authorised data to come through into the
network and stops any unauthorized data packets. This is completed by opening and
closing the different ports within the system. Firewalls will keep the website safe from
hackers or viruses, however if a firewall is not added onto a website, it can be easily
hacked. This will lead to the website crashing and losing important information. This can
be important information such as customer banking information, address, contact
number etc. Whenever a user tries to breach the firewall, the admin is notified and can
start working towards stopping the hacker or virus.
Secure Socket Layers (SSL);
SSL or security socket layer is a protocol that can use the internet/network to transfer
different files and documents. SSL encrypts the data using different public as well as
private keys. The use of SSL makes sure that all the information is encrypted and so that
hackers and viruses cannot read the information. This means that even if the information
is stolen; without the correct decryption key the information cannot be read. You can see
a website has SSL via the Lock icon or the S after HTTP.
adherence to standards e.g. strong passwords

It is vital that all users use strong passwords to make sure that no one can easily guess
the password and have access to the system or website. Some ways to make a password
strong is by; using a mixture of letters and numbers, using a mixture of capital and
lowercase letters, using symbols and longer passwords (above 8 characters). Hackers can
use different software that can be used to crack passwords and having stronger
passwords will take the software longer to find the password and this will alert the
website admin.
P2
User side factors:
The capabilities of the users systems must be taken into consideration beforehand,
otherwise users that want access to the website may not be able to and may be forced to
use a different website
download speed;
the download speed of the user will determine how long it will take for the web page to
be downloaded on the users system. The slower the internet connection the slower it will
take for the web page to load and even then it may not load some items due to the lower
speeds. However this problem has reduced over the past few years due to the
developments within internet connections as they have a much higher speed as well as
lower price.
Dial up this was one of the main methods of internet connection before. It used an
analogue telephone lines to connect to the internet. However speeds ranged to 56kbps.
ISDN integrated services digital network which added digital lines to increase faster
speeds. Speeds ranged to 128kbps
DSL digital subscriber line used the digital lines and it was the main basis of broadband.
The most common in the UK was ADSL.. It can reach up to 1mbps to 8mbps.
Broadband is a technology that is always being developed and advanced in the
currents. At this time some users can experience 1gbps or 1000mbps.
You must make sure that the website can be used on the lowest internet speeds as well
as the highest internet speeds.
PC performance factors e.g.
Computer components can also factor the speed in which an item is displayed on a
webpage as well as the performance when a user interacts with it.
Browser,
Most browsers nowadays are very up-to-date and the speeds between these browses are
fairly similar. However there can be some times in which there are compatibility problems
and it may not show some aspects of the web page. At this moment Google Chrome is
the most used browser due to its high speed and easy compatibility however browsers
like internet explorer are much slower and need constant updates to keep up with other
browsers.
Cache memory,
Cache memory is a type of memory that is stored within your computer and it stores data
from websites that you have visited. Data is downloaded into the cache memory so
whenever you visit that website again it will load faster as well as carry some information
across from your previous visit. Some examples are Cookies, passwords and scripts. As
time goes by the cache memory becomes larger and the system may become slower.
Processor speed

The different speeds of their systems processor can factor the performance of the
website. A processor with higher speeds can complete different tasks within their system
a lot quicker; meaning the system can quickly open and process all the different aspects
within the web page. However having a slower processer will slow down this process and
can cause some other problems. It is important that the webpage can be used for both
users with slower and fast processors.
Server side factors:
If a website takes a long time to load or to download; this will reduce the amount of users
that will come to the website or revisit again. There are many different methods that can
be used to reduce the download time as well as making the website more efficient as a
whole.
Web server capacity
As well as making sure that the capabilities of the users computers are met; it is
important that the capacity of the web servers are also met.
Available bandwidth,
Bandwidth is the amount of data that can be downloaded as well as uploading from the
web servers to all the users per second. It depends on the size of the business, website
as well as the amount of users. If you have a bigger bandwidth than it allows more users
to be able to access the website at the same time as well as the amount of users in that
specific month. It also allows the users to download the data from the website quicker
however this will most likely be limited. It is important that the bandwidth is high as if the
website has a low bandwidth; even if the user had very fast internet, it would only be the
speed of the bandwidth.
Executions to be performed before page load,
Executions to be performed before the page itself loads is where the websites scripts e.g.
Java, PHP, allows the website to load all the different images and videos onto the website
so it is available to the user straight away instead of them having to wait. Another factor
is that it can personalise the web page for them as if they log in; they may have a
customer background that should automatically change before the page is loaded. This
gives a more personalised feeling for the user and will cause them to come back to the
site.
Number of hits;
Number of hits can affect a website as if there are too many users on a website at once it
can affect the websites performance a lot. It can in some cases overload the web servers
and either slow down the website or even crash the website it self. Most websites have a
large server so this will not cause a problem and it is also good to have a backup server
in case of problems such as this.
File types
File types are crucial when in involved within a websites performance. If the website has
small file types then this will decrease the time it takes for the website to load for any
user. It will also load all the different aspects faster as well. The website developers must
consider how long it will take for a user to download the page as having a larger sized
image will have better quality but will also take longer to download. Within image files
there are two main file types. Bitmap and vector images. Bitmap save all their pixels

separately which means that they have a higher file size and whenever the image is
resized; it becomes pixelated and loses its quality. This is a lossey image. Vector images
use co-ordinates for their images and they have a smaller file size as well as whenever
the image is resized; it keeps its quality. This is a lossless image. Another file type that
the website developer must consider is their sound files. WAV files are the most common
and they are very large in size and can increase the download speeds on website
however a lot of website uses a WAV file format. MP3 are more popular compared to WAV
but it has a lower quality compared to WAV but have a small file size. Meaning that it will
slow down the website less.
M1
In this report I will be explaining what web architecture is and how it has
affected communication.
Web 2.0
Web 2.0 is the different uses in which the web has since the new developments within
technology. It is the different and new ways in which the internet is used compared to
previous years however it does not refer to a new version of the internet or web. Web 2.0
can be both software as well as hardware and it can be used in many different platforms.
One of the main features of web 2.0 is social networking and social platforms. This allows
website developers to directly add social network integration into the website allowing
communication to be much easier.
Another example would be wiki pages. With the integration of Web 2.0 it has allowed the
use of wiki pages. With wiki pages users can add, edit and delete information on these
websites so that the users on the internet can take this information. This has increased
the amount of communication within the internet itself.
Another factor is that previous web pages required users to code the whole websites
themselves which meant that users would have to spend more time coding their
websites or developing and this made it a lot harder for webpages to communicate with
each other. With the use of web 2.0 it is much easier to develop and create websites and
in some cases websites can automatically change some of the features for you.
Cloud computing
With the new developments within the internet and web 2.0 it has led to cloud computing
to flourish. Cloud computing is where different files and programs are stored on a cloud
server rather than being saved within the system or network itself. This means that the
user would not have to install any other software or program to be able to store their
data. Instead they can store their data online on the cloud servers. One example of how
cloud computing affects communication would be within emails. Whenever you are using
an email service such as Outlook, Gmail and Yahoo; you are not downloading software
onto your computer. With cloud computing you are able to use the online service and are
able to send emails and attachments all around the world.

Web storage
Web storage is a new type of data storage service that has been created since the use of
web 2.0. It allows user to be able to store their data and information on different websites
via the web server that have been provided. With these web servers you are able to

access these files anytime as long you have a device that supports it. E.g. a laptop or a
smartphone. This has allowed users to be able to access their information wherever as
well as being able to give other users their data. If users give permission they can send
the link to other users across the world and they will be able to access that file and
download it, thus making it a lot easier to transfer data across websites now.

D1
Explain the Role of the TCP/IP Protocol and How It Links to Application Layer
Protocols
TCP/IP
TCP/IP or transmission control protocol/internet is a vital protocol that is used within
networks. It is used so that information sent from the network is sent to the right
destination; whether its on the same network or on another network/system. TCP/IP
allows users to able to connect to the internet as well as being able to send and receive
emails. TCP/IP checks for any errors whenever information is being sent or received.
TCP/IP has four different layers which each have their separate user within the protocol.
All layers are vital for the protocol.
-

Link layer

Link layer is the lowest layer and it deals with all the hardware within the computer
system. It gets all the information together and creates a data link layer. It also
makes sure that the protocol is in use and can be used in other network and systems
that the information is traveling to.
-

Internet Layer

The internet layer focuses on the IP address as well as making sure that the different
networks are connected to each other to transfer the data across. It also makes sure
that the data is sent to the correct destination via the IP address.
-

Transport Layer

The transport layers make sure that the data sent through the network is correct as
well as making sure that the network has access to the information in an efficient
manner.
-

Application Layer

The application layer, the highest layer, uses and contains all the other different
protocols needed such as the SMTP, HTTP and HTTP. It makes sure that the user can
access the internet with the different protocols.

HTTP

HTTP or Hypertext Transfer Protocol is the protocol that allows the connection between
the web servers and the user. It uses two nodes to create a connection between each
other. It is used within the World Wide Web to distribute information across.
FTP
FTP or file transfer protocol is a type of protocol that is used to transfer different
information from a host or user to another user via the internet or any other TCP network.
The FTP requires security login information from the admin of the web server to be able
to access the information however most web servers have it so that the downloads do
not need this login.
SMTP
SMTP or Simple mail transfer protocol is used within sending and receiving emails and it
is directly in use with either a POP3 protocol or an IMAP protocol, this lets the user able to
download and save the emails in a server for further use.
DNS
Domain name system or DNS is a protocol that is used to name the different services,
computers and other resources on a network or the internet. It gives each item a specific
and unique domain name and these names can easily be translated to IP address which
are used to find a specific computer service or a device on the users network or the
worldwide network.
All these different protocols, TCP/IP, that are in used within the applications layer are
used to make sure that all information is sent through the internet and the network
without failing. There reason for many different protocols is to make sure that if one
protocol fails; there is another protocol in place instead. In some cases if the information
keeps failing to send; then the protocol will stop and give an error message.

Vous aimerez peut-être aussi