what are some applications of web programming
how is data transferred on the internet
information is broken down into packets, addressed with IP and routed through DNS
- data packets (small units of data transmitted independently over network ‘packet switching’)
- internet protocol addresses (IP used for relaying packets of data, IP address is unique identifier assigned to devices for network communication)
- DNS (translates human readable domain names into IP addresses - simplifies user experience)
what is a web server
a system (software and hardware) that hosts websites and makes them accessible over the internet
- listens for incoming requests, processes them, responds by sending the requested resources
what are the structure of data packets
what are characteristics of ipv4 and ipv6
IPv4:
- 32 bit, dotted decimal, 4.3 billion (192.168.1.1)
IPv6:
- 128 bit, hexadecimal, basically unlimited (2001:db8::1)
how does data travel when you visit a website
describe the function of web protocols and their ports
what is TCP/IP
transmission control protocol / internet protocol
- suite of communication protocols that enable network communication between devices on the internet
- TCP ensures reliable, ordered data transmission by breaking data into packets and reassembling them
- IP handles addressing and routing data packets
what is HTTP and HTTPS
what is dns (protocol)
what is FTP and SFTP
what is SSL and TLS
secure sockets layer (deprecated) and transport layer security
- don’t have specific ports but used with protocols like HTTP, SMTP, IMAP
- cryptographic protocols for secure communication
what are the email protocols
SMTP (simple mail transfer protocol)
- sends emails
- 25 / 587
POP3 (post office protocol v3)
- downloads emails from a server to a local device, then removes from server
- 110 / 995
IMAP (internet message access protocol)
- keeps emails stored on the server while syncing multiple devices
- 143 / 993
what are the main processes for securing the web (syllabus)
what are SSL certificates
Used to encrypt data in transit between client and server, protecting it from eavesdropping and tampering.
- Issued by a trusted Certificate Authority (CA) and digitally binds the website’s identity to a cryptographic key.
- Involves an SSL/TLS handshake (uses asymmetric encryption to securely exchange a session key then switches to symmetric encryption for efficient, secure communication)
what are encryption algorithms
mathematical formulas that convert plain text to cipher
- symmetric (AES advanced encryption standard)
- asymmetric (RSA rivest-shamir-adleman) commonly used for web
what are encryption keys
randomly generated sequences of numbers used in encryption/decryption
- key exchange is securely sharing between parties over unsecured network
what is plain and cipher text
what is authentication and authorisation (in securing the web)
what are hash values
what are digital signatures
a cryptographic mechanism used to authenticate the origin and integrity of digital documents/messages
- asymmetric encryption
- uses public key cryptography
- provides non-repudiation
what is big data
extremely large and complex datasets that can’t be easily managed
- volume (large amount generated)
- variety (diff data types)
- velocity (speed of generation)
- veracity (reliability/accuracy of data)
what is web architecture
structure under which the information or contents of a web page are organised, ordered and classified
what is data handling
the process of obtaining, processing, analysing and managing data
- collecting, manipulating, transforming
- dynamic and procedural - focuses on ‘how’