Firstly, for adding the introduction in the blackboard we are required to follow the following steps:
For the introduction I would like to state that I am <name of the student> …… . I am currently on course toc complete the course of 6CC549 Web Development – Creating Effective
Applications Units 1-3. This assignment has a number of activities and instructions associated with it that would help me in gaining knowledge in the sectors of web development and networking. In addition to this, the interconnection in between the web services and networks has also been explained in this assignment. The assignment also requires introduction about the web server that is currently being used by me. I am currently using the Google Chrome browser. It is a freeware browser available on the net for the users for free download. It was released in the year 2008 in the month of September. It is supported on all platforms. The major components of the browser include the Adobe Flash Player plug-in by the which helps in the live video and live gamming features for the users (Reimers and Stewart 2015). The ports of the browser use the Web kit layout engine as I am working on the windows operating the ports fork directly to the web kit using Blink. Chromecast is another important feature of this browser that was very helpful for me and also this was very attractive feature for me. I brought this Chromecast in January its about 3.5 months and me and my family enjoying it. Googles one of the best product its convert your normal TV into smart TV. This device looks Awesome. It is just like a pen drive. Guys you can insert it in any HDMI port and enjoy the smart TV life. With this device you can watch movies, videos games. Anything you do on your phone you can do same as it on your TV. They provide you an extension cable also to connect your device. It is awesome. This device cast your mobile screen on TV.
Another feature of it is the Chromebook that I used for quite a span of time. I’m a college student and don’t really need anything major just for typing my papers and getting on the web. I wasn’t planning on using this for gaming or anything thing like that. So far I’ve had this for a couple of months and sadly tonight is the first time I needed to print something from it. All the other times I printed from school, anyways what I found out is that I can’t use a classic printer to print from here. This means that I cannot plug in a printer on to here and print the papers that I really require. I was not able to Use the PC as my host and hence this experience was very bad for me.
It is to be noted that we are traveling to the friends’ place by train. Hence, the main requirements of the journey are that we are required to travel to station by a cab and when we reach the station we would need a ticket to enter the station and then the ticket would be required to get out of the station (Tilk et al. 2017). In addition to this, the fuel would be required for the car to reach the station. Hence, the list of requirements to reach the house of the friend from house are:
In addition to this, an alternate path is also suggested foe reaching the friend’s house. In the alternate route the travelling is done bus. This would help the use to reach the house of his friend however having less requirements. The graph below describes the route of the user.
The categorization of the IP addresses is provided below:
192.168.0.1 – Class C Address
10.10.10.10 – Class A Address
202.45.36.257 – Class C Address
The network devices are all used for the connection in between the different nodes in a network. The different devices within a network are switches, hubs, routers and access points. However, each of them is distinct and each of them have different capabilities. The hubs are used mainly for the connection to the computers within a network and this enables them to communicate with each other (Aho et al. 2014). Each of the computers of the system connects to the hubs by the use of ports so that they communicate with each other efficiently. The information is passed from one computer to another with the use of hubs. The source or the destinations of the data cannot be identified by the hubs. Hence, the hub transmits the data to all the devices within the network and hence, this is one of the major drawback of the device. In addition to this, there is another disadvantage of the hub and that is the hub cannot perform both the functions of sending and receiving data at the same time, it can transmit only in a single channel at a time.
Respective to this, the switches are similar to the hubs however they can provide additional features to the network that the hubs would not be able to provide. Firstly, the intended destination for the transfer of data can be easily identified by the switch and this, would make the switch send the data to only those destinations which would help be intended by the source. The switch arte also to send the information and receive it as well correspondingly at a same time. The information also travels at a faster rate in the switch than that in the hubs (Pagani et al. 2017). This helps the user to transfer the data at a faster speed and saves time. It is recommended for the best uses in the offices and private use.
Additionally, there are the routers in the networking system used for the connection to the different type of devices in the network. They are also known as the intermediary devices within the network that helps in the connection of different type of devices within the network and helps them in efficient communication among each other. They are also used for establishing the connection and distributing the internet within the nodes of the network. They are also capable to direct the traffic of the network among the different network peripherals. They also provide an in-built security options and one such option is the firewall in the systems. It is also to be noted that the access points also require mentions along with that of the routers. With addition to the routers the access points are also used for performing the similar functions. They provide the options of wireless access to the network of the system in which they are implanted. The wired internet access is spread to the whole network with the use of the wireless access points. This implements the wireless access to the network by the peripherals. This would help the users to move to any location they want to and still stay connected to the network. It can plug into any of the hub, switch or the wired router which is pre-existing in the network. This is generally used in the place of public gathering where generally the wireless access would be very useful. For instances these are very useful in the public places such as hotel, airport and other access points.
In the world where the client/server architecture is main component in which the networks are generally based on it is very important that the user can define efficiently, that the workload is to be handled by the clients or the servers (Skuta, Bartunek and Svozil 2014). This is the criteria that helps in the determination of whether the network is a thin client or a thick client architecture. However, it is to be noted both the architecture are almost similar, however there are dissimilarities in between both the architectures as the terms are generally used for the hardware that are used in the network and the application that are to be included in the network. The main differences are generally encountered in the applications of the system. The difference between the thin and thick clients are described in the table below;
Thin Clients |
Thick Clients |
The deployment is very easy as it does not have any requirement of extra software installation |
The deployment is very expensive as it requires more application to be installed before it can be actually deployed |
It requires server validation |
It requires client verification |
In case a server goes down the collection of data is halted as there is requirement of constant communication with the server. |
No such requirements are identified for the thick clients. |
The interfacing with other equipment are not possible in this architecture |
Can be interfaced easily. |
This runs only as the specifications provided by the servers |
The only communication is required during intermittence with the servers. |
The architecture needs more downtime. |
The architecture has a robust technology effecting for the better uptime. |
The security threat is reduced in this architecture |
The security issues are also increased in the |
The design of the client architecture is provided below:
For both the firms the thin clients would be recommended so that the front end application and the functions can be easily handled by the servers that is implemented for the system. The terminals and the mainframe would be designed for the so that they are connected directly to the client systems (Sigl, Faschingbauer and Berl 2018). Additionally, the this would be helpful for the organization as it would be very difficult for the organization to manage a large number of thick clients that are existing the network. Hence the centralization of the server is very important for the firm to conduct their task very efficiently.
In addition to this, the HTTP requests from the clients are generally the get and post methods. The client generally makes the request for the websites, files and the message requests from the application front ends.
There is various type of methods used in the HTTP protocols such as the GET, POST and PUT methods. The GET method is used to retrieve the information from the browser and results fetched by the method are safe, regardless of how many times they have been fetched and displayed. The request is either partial or conditional. The POST method is used for requesting the resources from the URI so that they can use the entity that is provided. The method is also used for the creation or updating of a new entry. In addition to this the PUT method is used for storing the entity at a URI. It creates an entity or updates an existing one. The main difference in between the POST and PUT method is the impotency.
The response codes are generally classified into groups by their activities whether the request of the codes have been completed successfully or not. They have been classified into informational responses, successful responses, redirects, client errors, and server’s errors.
Differences between HTML5 and HTML4 is provided below:
HTML4 |
HTML5 |
Syntax |
|
The HTML4 syntax are only valid for the HTML4 only and invalid for the HTML5 syntaxes (Sanjopa and Gancarski 2017). |
The syntax of the HTML5 is simplified and is compatible with HTML4 and HTML1 as well. |
The HTML4 uses the primitive type of syntaxes and hence, lack in various type of features. |
The HTML5 uses various type innovative tags for the implementation of the websites. |
The HTML4 does not have any new element |
The new <canvas> element has been developed in HTML5 (Mangal 2016) |
API Language |
|
The HTML4 languages were not able to use the API elements. |
The HTML5 language has new API functionalities: · HTML Geolocation · HTML Drag and Drop · HTML Local Storage · HTML Application Cache · HTML Web Workers · HTML SSE |
Explain usage of HTML5 elements
Keygen: The HTML <keygen> is used for the web forms for the generation of the key materials and it also helps in the submission of the public keys for the HTML forms. It is also important for the generation of the RSA key for the websites.
Meter: The tag is used for the measurement of a known range and within the scalar value provided which is also known as the gauge.
BDI: The tag is used for the indication of the span of texts for formatting it with a different type of attribute. This is generally used during the translation of the language from Arabic to English.
Template: the tag is used for the standard DOM based approach for tinplating it client side. It allows the user to declare the mark-up fragments which are then parsed as the HTML.
The <div> tag has no special function at all, it is basically the representation of the class, language and title of the HTML page. It is recommended that the <div> element is to be used only as a class when no other attributes are available for the declaration of the elements. On the other hand, the <section> tag is used for the representation of generic section of a document of an application. It is to be identified with an heading as a child of the section.
What is character encoding?
Character Encoding is a characteristic of a HTML which helps in the interpretation of the raw data of the binaries into the real characters. In addition to this, the numbers are generally paired with the characters (Bray 2017). The characters are also grouped together for the formation of a sentence or a phrase.
<!DOCTYPE html>
<html lang = “en”>
<head>
<meta chartset = “utf-8”>
<title> Hobies </title>
<style>
ul {
list-style-type: none;
margin: 0;
padding: 0;
}
</style>
</head>
<nav>
<a href=”about”> about </a>
<a> | </a>
<a href=”introduction”> introduction </a>
</nav>
<header align=”centre”><h1> STAMP COLLECTION </h1></Header>
<main>
<section>
<h4 id=”introdcution”> </h4>
<article> Collecting stamps is a hobby that attracts people from all around the world. When you’re collecting stamps you can find them from a multiple of sources, including free sources, as well as paying for those stamps that you just can’t do without. When you start collecting stamps you’ll want to spend as little money as possible and concentrate on getting a beginner’s collection of stamps. </article>
</section>
<section>
<h4> VIDEO </h4>
<video align=”centre” width=”720″ height=”540″ controls>
<source data-src=”E:2018June751368video.mp4″>
</video>
<br>
<h4> METER </h4>
<meter value=”2″ min=”0″ max=”10″>2 out of 10</meter>
</section>
</main>
<footer>
<h4 style=”color=red;”>ABOUT</h4>
<p id=”about”>
When you first decide to start collecting stamps you may find that you have nothing to start with. If this is the case you can buy a pack of stamps from a hobby shop or a stamp collector to get you started. For a small price, usually around $6.00, you’ll get an assortment of stamps from different countries. This is a great way to determine what types of stamps appeal to you and what area you might like to focus on.
</p>
</footer>
</html>
<!DOCTYPE html>
<html>
<body>
<h2>Basic HTML Table</h2>
<table style=”width:100%”>
<tr>
<th>Heading 1</th>
<th>Heading 2</th>
<th>Date</th>
</tr>
<tr>
<td>Student1</td>
<td>Data1</td>
<td>Date1</td>
</tr>
<tr>
<td>Student2</td>
<td>Data2</td>
<td>Date2</td>
</tr>
<tr>
<td>Student3</td>
<td>Data3</td>
<td>Date3</td>
</tr>
</table>
</body>
</html>
<!DOCTYPE html>
<html>
<body>
<h2>Basic HTML Table</h2>
<table style=”width:100%”>
<tr>
<th>Heading 1</th>
<th>Heading 2</th>
<th>Date</th>
</tr>
<tr>
<td>Student1</td>
<td>Data1</td>
<td>Date1</td>
</tr>
<tr>
<td>Student2</td>
<td>Data2</td>
<td>Date2</td>
</tr>
<tr>
<td>Student3</td>
<td>Data3</td>
<td>Date3</td>
</tr>
</table>
</body>
</html>
The HTML forms are used for various type of purposes and they provide the user with various different type of uses (Manister 2015). They can be used for the design of a page such as a registration form. This form provides the users with the ability to accept data from any type of webpage and insert the data into their databases. In addition to this, the forms can also be used for displaying the data required by the users in tabular form. It also helps in providing a great view to the users.
table#t01 tr:nth-child(even) {
background-color: #eee;
}
table#t01 tr:nth-child(odd) {
background-color: #fff;
}
table#t01 th {
color: white;
background-color: black;
}
<!DOCTYPE html>
<html>
<head>
<meta chartset = “utf-8”>
<title> Hobies </title>
<link rel=”stylesheet” type= “text/css” href=”style.css”>
</head>
<body>
<h2 style= “text-align:center”>Student Information Table</h2>
<table id=”t01″ style=”width:100%”>
<tr>
<th>Student ID</th>
<th>Name</th>
<th>Address</th>
<th>Contact</th>
<th>Course</th>
<th>Subjects</th>
</tr>
<tr>
<td>S001</td>
<td>Student1</td>
<td>43 besen street</td>
<td>6546542</td>
<td>B.tech</td>
<td>English, Math, Physiscs</td>
</tr>
<tr>
<td>S002</td>
<td>Student2</td>
<td>43 other street</td>
<td>6546542</td>
<td>B.tech</td>
<td>Spanish, Math, Physiscs</td>
</tr>
<tr>
<td>S003</td>
<td>Student11</td>
<td>43 no street</td>
<td>6546542</td>
<td>B.tech</td>
<td>Latin, Math, Physiscs</td>
</tr>
</table>
</body>
</html>
<head>
<meta chartset = “utf-8”>
<title> Hobies </title>
<link rel=”stylesheet” type= “text/css” href=”style.css”>
</head>
This unit has helped us in learning the effective use of the HTML and CSS language and also made us understand the importance of designing the pages and documentation for any type of website. In addition to this, the networking features of the system that is implemented by the user for designing the front end of the website for any type of organization.
Reference List
Aho, M.E., Chen, D., Eisley, N.A., Gooding, T.M., Heidelberger, P. and Tauferner, A.T., International Business Machines Corp, 2014. Calculating a checksum with inactive networking components in a computing system. U.S. Patent 8,914,498.
Bray, T., 2017. The javascript object notation (json) data interchange format.
Mangal, P., 2016. A Modern interactive approach in Web Design using HTML5. International Journal of Engineering Technology and Computer Research, 4(2).
Masinter, L., 2015. Returning Values from Forms: multipart/form-data.
Pagani, M., Giuliani, A., ?berg, J., De Carli, F., Morbelli, S., Girtler, N., Arnaldi, D., Accardo, J., Baucknhet, A., Bongioanni, F. and Chincarini, A., 2017. Progressive disgregation of brain networking from normal aging to Alzheimer’s Disease. Journal of Nuclear Medicine.
Reimers, S. and Stewart, N., 2015. Presentation and response timing accuracy in Adobe Flash and HTML5/JavaScript Web experiments. Behavior research methods, 47(2), pp.309-327.
Sanoja, A. and Gançarski, S., 2017, September. Migrating Web Archives from HTML4 to HTML5: A Block-Based Approach and Its Evaluation. In Advances in Databases and Information Systems (pp. 375-393). Springer, Cham.
Sigl, C., Faschingbauer, A. and Berl, A., 2018. Management of Virtual Desktops in Energy Efficient Office Environments Using Thin Clients. CLOUD COMPUTING 2018, p.100.
Škuta, C., Bart?n?k, P. and Svozil, D., 2014. InCHlib–interactive cluster heatmap for web applications. Journal of cheminformatics, 6(1), p.44.
Tilk, C., Rothenbächer, A.K., Gschwind, T. and Irnich, S., 2017. Asymmetry matters: Dynamic half-way points in bidirectional labeling for solving shortest path problems with resource constraints faster. European Journal of Operational Research, 261(2), pp.530-539.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download