12 Jul 2022

130

The Life of a Web Page: How It's Created, How It Lives, and How It Dies

Format: APA

Academic level: Master’s

Paper type: Essay (Any Type)

Words: 595

Pages: 2

Downloads: 0

A web page can be described as a document that can be exhibited in a web browser such as the Google Chrome, Edge or Apple's Safari (Jswisher, 2018). They are commonly referred to as pages. The collection of series of web pages which are collected together in some ways is referred to a website or in simple term a site. The computer which acts as a host for the website on the internet can e referred to as a web server. 

Web page as a document is usually written in the HTML language. HTML is the abbreviations for Hyper Text Makeup Language. The language main purpose is to make it easier for the search engines and browsers to search for the web page (Jswisher, 2018). The web page contains various type of resources which includes style information whose main objective is to enhance a page's look and feel, scripts which are intended to make the web page response to the user and also the media which stores information such as sounds, videos, and images. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

To gain access to the web page, one requires network protocol which is an agreed way that two or more machines or application use to communicate with one another. OSI model is a layered model that shows the various components of a network (Defiant, 2018). The layers are physical, data link, network, transport, session, presentation and the application. 

The first layer that is the physical layer entails the end user network cabling, wireless radio signals, electrical signalling waveforms that take place on the end users network cable (Defiant, 2018). The second layer which is the data link layer explains how a dependable connection is achieved between two computers that are connected directly. In OSI model Ethernet is placed in the second layer. In Ethernet, the host can convey the message using exchanging frames. The media access control (MAC) is also located in the second layer. It is an address that helps to recognize a physical machine like a computer. 

Layer three which is also known as the network layer is involved in depicting the routers, IP addresses and the ways of transmissions that are employed to transmit packets from the local area networks and across a wide network range (Defiant, 2018). Transmission of the packets needs the use of logical addresses which are known as the IP addresses. Layer four or the transport layer is an essential part of maintaining the connection between the computers. Transmission control protocol (TCP) is employed in this layer, and it helps to create a connection between the computers employing a three-way handshake (Defiant, 2018). The fifth layer also referred to as the session layer which is responsible for the ending of the connection. 

The presentation layer which is the six-layer is used to convert data that originates from an application to statements that can be transported by a network using lower layer protocols. Layer seven or the application layer is the layer that is the closest to the end user. It depends on lower layer protocol to transmit data across the network (Defiant, 2018). The layer embeds most internet application protocols which include HTTP, SSH, POP, IMAP, SOAP, Telnet, and HHTPS. 

MAC and IP addresses are essential for the transmission of data across networks. For one to obtain them one employee's ARP, DNS, and DHCP which are layer two and three protocols (Pickett, 2013). Dynamic host configuration protocol is a way that a host can establish its IP address, the address of the DNS server, information about subnet, information concerning the gateway and lease time. Domain name system is also referred to as the human interface protocol and is employed by people to help determine the IP address of websites or web pages and hosts. Address resolution protocol (ARP) is a layer two protocol, and it requests for the MAC address, and it uses broadcasts and responses. 

References 

Defiant (2018). Networking for WordPress Administrators.  Wordfence . Retrieved from https://www.wordfence.com/learn/networking-for-wordpress-administrators/ 

Jswisher (2018). What is the difference between webpage, website, web server, and search engine?.  MDN Web DOCS . Retrieved from https://developer.mozilla.org/en- US/docs/Learn/Common_questions/Pages_sites_servers_and_search_engines 

Picket, T. (2013).ARP, DNS AND DHCP.  Contract Network Engineering . Retrieved from http://www.tonypickett.com/2013/07/arp_dns_dhcp/ 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). The Life of a Web Page: How It's Created, How It Lives, and How It Dies .
https://studybounty.com/the-life-of-a-web-page-how-its-created-how-it-lives-and-how-it-dies-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration