Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
UNIT - I
`
Web Essentials: Clients, Servers, and Communication. The nternet-Basic nternet Protocols -The
World Wide Web-HTTP request message-response message-Web Clients Web Servers-Case Study.
Markup Languages: XHTML. An ntroduction to HTML History-Versions-Basic XHTML Syntax and
Semantics-Some Fundamental HTML Elements-Relative URLs-Lists-tables-Frames-Forms-XML Creating
HTML Documents Case Study. Style Seets: CSS ntroduction to Cascading Style Sheets-Features-
Core Syntax-Style Sheets and HTML Style Rule Cascading and nheritance-Text Properties-Box Model
Normal Flow Box Layout-Beyond the Normal Flow-Other Properties-Case Study.
WE! ESSE"T#$LS: CL#E"TS, SE%&E%S, $"' C(MM)"#C$T#("
Client it is an independent system, which have its own Operating System other software
Server- it is an other independent system, which have its own Operating System other software
Client and server communicate each other by using middleware software like ODBC
Example - #nternet system is te best e*ample +or client, server model-
A Client /server model application typically stores large quantities of data on an expensive, high
powered server, while most of the program logic and user interface is handled by client software
running on relatively cheap Personal computers
Normally server primarily sends data, while a client primarily receives it,
n a client/server model a client initiates a conversation, while server waits for clients to start
conversation
Some servers process and analyze the data before sending the results to the client. ts called
application servers
A file and database server will retrieve information and send it to a client, but it would not process
the information
The most popular client/server system on the nternet is the web
The web servers such as Apache respond the requests from web clients such as Netscape.
THE CL#E"T.SE%&E% M('EL , M('EL / , CL#E"T.SE%&E%
1. Model 1 is the simplest of client/server model in web architecture.
2. The client sends Request to the Web Server through nternet.
3. The Request is acknowledged by the Web Server and it sends Responses to the Client.
4. Now the Server sends the Requested information to the Client from Web Server.
5. At the end of data transfer, the Client disconnects from the Server.
M('EL 0 1 WWW 'atabase Client.Server
1. n Model 2 the client sends Request to the Web Server through nternet.
2. The Request is acknowledged by the Web Server and it sends Responses to the Client.
3. f the information is not available, then the Server searches data in the Database Server also.
4. Now the Server sends the Requested information to the Client from Web Server or from Database
Server.
5. At the end of data transfer, the Client disconnects from the Server.
M('EL 2 1 WE! SE%&E% . $33L#C$T#(" SE%&E%
1. n Model 3 the client sends Request to the Web Server through nternet.
2. The Request is acknowledged by the Web Server and it sends Responses to the Client.
3. f the information is not available, then the Server searches data in the Application Server also.
4. Now the Server sends the Requested information to the Client from Web Server or from Application
Server.
5. At the end of data transfer, the Client disconnects from the Server.
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
M('EL 4 1 WE! SE%&E% . $33L#C$T#(" SE%&E%.'$T$!$SE SE%&E%
1. n Model 4 the client sends Request to the Web Server through nternet.
2. The Request is acknowledged by the Web Server and it sends Responses to the Client.
3. f the information is not available, then the Server searches data in the Application Server and
Database Server also.
4. Now the Server sends the Requested information to the Client from Web Server or from Application
Server or Database Server.
5. At the end of data transfer, the Client disconnects from the Server.
M('EL 5: WE! SE%&E% . T%$"S$CT#(" SE%&E%.'$T$!$SE SE%&E%
1. n Model 5 the client sends Request to the Web Server through nternet.
2. The Request is acknowledged by the Web Server and it sends Responses to the Client.
3. f the information is not available, then the Server searches data in the Transaction Server and
Database Server also.
4. Now the Server sends the Requested information to the Client from Web Server or from Transaction
Server or Database Server.
5. At the end of data transfer, the Client disconnects from the Server.
6. The Transaction ensures the ACD properties for several transactions with the Databases.
M('EL 6: WE! SE%&E% . T%$"S$CT#(" SE%&E%
1. n Model 6 the client sends Request to the Web Server through nternet.
2. The Request is acknowledged by the Web Server and it sends Responses to the Client.
3. f the information is not available, then the Server searches data in the Web Server, Transaction
Server, Application Server and Database Server also.
4. Now the Server sends the Requested information to the Client from Web Server or from Transaction
Server or Database Server or Application Server.
5. At the end of data transfer, the Client disconnects from the Server.
CH$%$CTE%#ST#CS (7 CL#E"TS $"' SE%&E%S
Client so+t8are
s an arbitrary application program
s invoked directly by a user, and executes only for one session.
Runs locally on user's personal computer
Actively initiates contact with server
Can access multiple services as needed
Does not required special hardware or a sophisticated operating system
Server so+t8are
s a special-purpose, privileged program
s invoked automatically when a system boots, and continues to execute through many
sessions
Runs on shared computers
Waits passively for contact from arbitrary remote clients.
Accepts contact from arbitrary clients but offers a single service
Requires powerful hardware and a sophisticated operating system
#"TE%"ET
H#ST(%9 (7 THE #"TE%"ET
The nternet was originally designed for sharing information between collaborating scientists. And at
the time (early 70s) personal computers didn't yet exist. Nor, for that matter, were there widespread data
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
network lines. So, security didn't much enter into the thinking of the nternet's founders; they were far
more concerned with robust message delivery in the face of an anticipated World War .
n fact, the very open nature of the nternet protocols likely contributed to its enormous success
through the 1990s and today.
But when so many people can connect so easily, there are bound to be a few bad apples trying to
ruin the party. n earlier days, a tremendous amount of technical know-how was required to crack into
computers through the network. Gradually the software used by these l33t hax0rs ("elite hackers" in the
lingo) made it onto the nternet and could be wielded by any old pimply-faced high-school punk, the aptly
named "script kiddies". (The self-titled Mafia Boy who cracked CNN, eBay, Yahoo!, and others in 2000,
was a 15-year old Montreal brat who fit nicely into this category.)
These software tools are now run automatically by programs that search the nternet for weak
spots. t is said that an unprotected computer will be targeted within 15 minutes of its initial network
connection. Some security companies set up such computers (called "honeypots") from time to time to
attract just this sort of malicious attention in order to study the means and methods of the attackers.
n the 1950s and early 1960s, prior to the widespread inter-networking that led to the nternet,
most communication networks were limited by their nature to only allow communications between the
stations on the network. Some networks had gateways or bridges between them, but these bridges were
often limited or built specifically for a single use. One prevalent computer networking method was based
on the central mainframe method, simply allowing its terminals to be connected via long leased lines. This
method was used in the 1950s by Project RAND to support researchers such as Herbert Simon, in
Pittsburgh, Pennsylvania, when collaborating across the continent with researchers in Santa Monica,
California, on automated theorem proving and artificial intelligence.
WH$T #S $" #"TE%"ET :
The internet s a global connection of people computers which are linked together by cables and
Telephone lines making communication possible among them in a common language.
Global connection of interconnected networks.
H(W '(ES #"TE%"ET W(%;S
Move data between two specific computers.
We require
- the address of the destination.
- a safe mean of moving data in the form of electronic signals
There exist a set of rules which governs the sending and receiving of data on the internet.
Rules are implemented in two parts in the network software.
- Transmission Control Protocol (TCP).
- nternet Protocol (P).
t is called TCP/P
Large block of text/ data, the TCP divides into little Data Packets and add some special
information like - packet position.
- error correction code.
To make sure that packets at the destination can reassembled correctly and without any damage
to data
The role of P here is to put destination addressing information on such packets.
t is not necessary that all the packets will follow the same path from source to
destination.
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
S3EC#$L M$CH#"ES
Routers are used to load balance various paths that exist on networks
gateways allows different electronic networks to talk to nternet which TCP/P
Addresses are essential in the internet
The TCP/P is a mechanism for providing addresses for computers on the
internet address have two forms :
Person understandable which expressed as words (Domain name)
www.kongu.edu
Machine understandable which repressed as numbers
172.16.2.5.
Ex: murali@yahoo.com
username@host.subdomain.domain
username - is the name of the nternet account.
Host - individual machines at a particular location.
Hosts and local networks are grouped together into domains,which are grouped into one or more
larger domains.
Ex:
apartment-> complex -> town -> country.
Sub-domains may corresponds to organizations such as NASA or COMPUSERVE such as ndia
comes a large domain 'in'
S)!,'(M$#"S L$%<E '(M$#"S
com - commercial au - Australia
net - network usa - USA
mil - military in - india
org - organization sg - singapore
edu - education cn - canada
gov - government jp -Japan
int - international
#"TE%"ET $''%ES#"<
nternet Address consists TWO parts
1. Network Address (Net D)
2. Host Address (Host D)
There four types of internet address each 32 bit long :
"o- o+ bits in net #' "o- o+ bits Host #'
CL$SS $ 8 04
CL$SS ! 16 16
CL$SS C 24 8
CL$SS ' Multicasting all bits
CL$SS E For Future
n which only CLASS A, B & C are mostly used
These may be used for
Unicast - Single computer
Multicast - Set of computers all reside in different location
Any-cast - Set of computers all reside in single location.
Wat can # do on #nternet :
Several activities can be performed if you have access to the nternet
To Publish research information
To create campus wide information systems
Use it for Teaching
Use it with SDN for multimedia conferencing
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
Refer to the pictures of an art gallery
Have an electronic copy of classics such as alice in wonderland
Have an electronic copy of journals and magazine from the nternet
To meet people around the world
To refer the job listings and requirements
To get free public domain programs, Movies, songs etc.
To send mail at any time
Tools and Services on #nternet
E-mail - mailbox
Mailing List
Usenet or Newsgroups
File Transfer Protocol (FTP)
Telnet (Remote login)
!%(WS#"< THE #"TE%"ET
There are many browsers for the nternet. They are
nternet Explorer ( E )
Netscape Navigator
Mosaic etc.
Gopher -presents the nternet as a series of hierarchical menus containing items that point to
another menu.
#"TE%"ET ST$"'$%'S
There are many standard organizations in the world. The two organizations are:
nternet Engineering Task Force(ETF) and
World Wide Web Consortium( W3c)
ETF is a relatively informal and it standards include TCP/P, MME, SMTP.
The W3C, by contrast, is a vendor organization, controlled by its dues-paying member corporations and it
standards include HTTP,HTML and XML
#"TE%"ET 3%#"C#3LES
TCP/P
UDP
P Addresses
domain names
the domain name system
ports
sockets
URL's
!$S#C #"TE%"ET 3%(T(C(LS :
TC3.#3
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
#ntroduction
TCP/P is the communication protocol for the nternet.
Computer Communication Protocol
A computer communication protocol is a description of the rules computers must follow to communicate
with each other.
Wat is TC3.#3:
TCP/P is the communication protocol for communication between computers on the nternet.
TCP/P stands for Transmission Control Protocol / nternet Protocol.
TCP/P defines how electronic devices (like computers) should be connected to the nternet, and how
data should be transmitted between them.
#nside TC3.#3
nside the TCP/P standard there are several protocols for handling data communication:
TCP (Transmission Control Protocol) communication between applications
UDP (User Datagram Protocol) simple communication between applications
P (nternet Protocol) communication between computers
CMP (nternet Control Message Protocol) for errors and statistics
DHCP (Dynamic Host Configuration Protocol) for dynamic addressing
TCP Uses a Fixed Connection
TCP is for communication between applications.
f one application wants to communicate with another via TCP, it sends a communication request.
This request must be sent to an exact address. After a "handshake" between the two
applications, TCP will set up a "full-duplex" communication between the two applications.
The "full-duplex" communication will occupy the communication line between the two computers
until it is closed by one of the two applications.
UDP is very similar to TCP, but simpler and less reliable.
P is Connection-Less
P is for communication between computers.
P is a "connection-less" communication protocol.
P does not occupy the communication line between two computers. P reduces the need for
network lines. Each line can be used for communication between many different computers at the
same time.
With P, messages (or other data) are broken up into small independent "packets" and sent
between computers via the nternet.
P is responsible for "routing" each packet to the correct destination.
P Routers
When an P packet is sent from a computer, it arrives at an P router.
The P router is responsible for "routing" the packet to the correct destination, directly or via
another router.
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
The path the packet will follow might be different from other packets of the same communication.
The router is responsible for the right addressing, depending on traffic volume, errors in the
network, or other parameters.
TCP/P
TCP/P is TCP and P working together.
TCP takes care of the communication between your application software (i.e. your browser) and
your network software.
P takes care of the communication with other computers.
TCP is responsible for breaking data down into P packets before they are sent, and for
assembling the packets when they arrive.
P is responsible for sending the packets to the correct destination.
TCP/P Addressing
TCP/P uses 32 bits, or four numbers between 0 and 255, to address a computer.
#3 $ddresses
Each computer must have an P address before it can connect to the nternet.
Each P packet must have an address before it can be sent to another computer.
This is an P address: 192.68.20.50
This might be the same P address: www.w3schools.com
An P Address Contains 4 Numbers.
Each computer must have a unique P address.
This is your P address: 203.129.193.196
TCP/P uses four numbers to address a computer. The numbers are always between 0 and 255.
P addresses are normally written as four numbers separated by a period, like this: 192.168.1.50.
TC3.#3 3rotocols
TCP/P is a large collection of different communication protocols.
A Family of Protocols
TCP/P is a large collection of different communication protocols based upon the two original
protocols TCP and P.
TC3 , Transmission Control 3rotocol
TCP is used for transmission of data from an application to the network.
TCP is responsible for breaking data down into P packets before they are sent, and for
assembling the packets when they arrive.
P - nternet Protocol
P takes care of the communication with other computers.
P is responsible for the sending and receiving data packets over the nternet.
HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server and a web browser.
HTTP is used for sending requests from a web client (a browser) to a web server, returning web
content (web pages) from the server back to the client.
HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server and a web browser.
HTTPS typically handles credit card transactions and other sensitive data.
SSL - Secure Sockets Layer
The SSL protocol is used for encryption of data for secure data transmission.
SMTP - Simple Mail Transfer Protocol
SMTP is used for transmission of e-mails.
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
MME - Multi-purpose nternet Mail Extensions
The MME protocol lets SMTP transmit multimedia files including voice, audio, and binary data
across TCP/P networks.
MAP - nternet Message Access Protocol
MAP is used for storing and retrieving e-mails.
POP - Post Office Protocol
POP is used for downloading e-mails from an e-mail server to a personal computer.
FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.
NTP - Network Time Protocol
NTP is used to synchronize the time (the clock) between computers.
DHCP - Dynamic Host Configuration Protocol
DHCP is used for allocation of dynamic P addresses to computers in a network.
SNMP - Simple Network Management Protocol
SNMP is used for administration of computer networks.
LDAP - Lightweight Directory Access Protocol
LDAP is used for collecting information about users and e-mail addresses from the internet.
CMP - nternet Control Message Protocol
CMP takes care of error-handling in the network.
ARP - Address Resolution Protocol
ARP is used by P to find the hardware address of a computer network card based on the P address.
RARP - Reverse Address Resolution Protocol
RARP is used by P to find the P address based on the hardware address of a computer network card
WWW,W(%L' W#'E WE!
The World Wide Web ("WWW" or simply the "Web") is a global information medium which users
can read and write via computers connected to the nternet. The term is often mistakenly used as a
synonym for the nternet itself, but the Web is a service that operates over the nternet, as e-mail does.
The history of the nternet dates back significantly further than that of the World Wide Web.
The hypertext portion of the Web has an interesting history, notable influences being BM's Generalized
Markup Language and Ted Nelson's Project Xanadu. Since its implementation in the 1990s as an
academic system for sharing papers, the World Wide Web has evolved far beyond what its creators
imagined.
The concept of a home-based global information system goes back at least as far as saac
Asimov's short story "Anniversary" (Amazing Stories, March 1959), in which the characters look up
information on a home computer called a "Multivac outlet" -- which was connected by a "plantewide
network of circuits" to a mile-long "super-computer" somewhere in the bowels of the Earth. One character
is thinking of installing a Mulitvac, Jr. model for his kids.
#"T%(')CT#("
The nternet has revolutionized the computer and communications world like nothing before. The
invention of the telegraph, telephone, radio, and computer set the stage for this unprecedented integration
of capabilities. The nternet is at once a world-wide broadcasting capability, a mechanism for information
dissemination, and a medium for collaboration and interaction between individuals and their computers
without regard for geographic location.
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
The nternet represents one of the most successful examples of the benefits of sustained
investment and commitment to research and development of information infrastructure. Beginning with
the early research in packet switching, the government, industry and academia have been partners in
evolving and deploying this exciting new technology. Today, terms like "bleiner@computer.org" and
"http://www.acm.org" trip lightly off the tongue of the random person on the street.
1
This is intended to be a brief, necessarily cursory and incomplete history. Much material currently exists
about the nternet, covering history, technology, and usage. A trip to almost any bookstore will find
shelves of material written about the nternet
The nternet today is a widespread information infrastructure, the initial prototype of what is often
called the National (or Global or Galactic) nformation nfrastructure. ts history is complex and involves
many aspects - technological, organizational, and community. And its influence reaches not only to the
technical fields of computer communications but throughout society as we move toward increasing use of
online tools to accomplish electronic commerce, information acquisition, and community operations.
What is the World Wide Web?
The World Wide Web (Web) is a network of information resources. The Web relies on three mechanisms
to make these resources readily available to the widest possible audience:
A uniform naming scheme for locating resources on the Web (e.g., URs).
Protocols, for access to named resources over the Web (e.g., HTTP).
Hypertext, for easy navigation among resources (e.g., HTML).
The ties between the three mechanisms are apparent throughout this specification.
#ntroduction to )%#s
Every resource available on the Web -- HTML document, image, video clip, program, etc. -- has an
address that may be encoded by a Universal Resource Identifier, or "UR".
URs typically consist of three pieces:
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
The naming scheme of the mechanism used to access the resource.
The name of the machine hosting the resource.
The name of the resource itself, given as a path.
Consider the UR that designates the W3C Technical Reports page:
http://www.w3.org/TR
This UR may be read as follows: There is a document available via the HTTP protocol residing on the
machine www.w3.org, accessible via the path "/TR". Other schemes you may see in HTML documents
include "mailto" for email and "ftp" for FTP.
7ragment identi+iers
Some URs refer to a location within a resource. This kind of UR ends with "#" followed by an anchor
identifier (called the fragment identifier). For instance, here is a UR pointing to an anchor named
section_2: http://somesite.com/html/top.html#section_2
%elative )%#s
A relative URI doesn't contain any naming scheme information. ts path generally refers to a resource on
the same machine as the current document. Relative URs may contain relative path components (e.g.,
".." means one level up in the hierarchy defined by the path), and may contain fragment identifiers.
Relative URs are resolved to full URs using a base UR. As an example of relative UR resolution,
assume we have the base UR "http://www.acme.com/support/intro.html". The relative UR in the
following markup for a hypertext link:
<A href="suppliers.html">Suppliers</A>
would expand to the full UR "http://www.acme.com/support/suppliers.html", while the relative UR in the
following markup for an image
<MG src="../icons/logo.gif" alt="logo">
would expand to the full UR "http://www.acme.com/icons/logo.gif".
n HTML, URsare used to:
Link to another document or resource, (see the A and LNK elements).
Link to an external style sheet or script (see the LNK and SCRPT elements).
nclude an image, object, or applet in a page, (see the MG, OBJECT, APPLET and
NPUT elements).
Create an image map (see the MAP and AREA elements).
Submit a form (see FORM).
Create a frame document (see the FRAME and FRAME elements).
Cite an external reference (see the Q, BLOCKQUOTE, NS and DEL elements).
Refer to metadata conventions describing a document (see the HEAD element).
SMT3
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
INTRODUCTION
Simple Mail Transfer Protocol (SMTP) is the de facto standard for e-mail transmissions across the
nternet. Formally SMTP is defined in RFC 821 (STD 10) as amended by RFC 1123 (STD 3) chapter
5. The protocol used today is also known as ESMTP and defined in RFC 2821
SMTP is a relatively simple, text-based protocol, in which one or more recipients of a message are
specified (and in most cases verified to exist) along with the message text and possibly other
encoded objects. The message is then transferred to a remote server using a procedure of queries
and responses between the client and server. Either an end-user's email client, a.k.a. MUA (Mail User
Agent), or a relaying server's MTA (Mail Transport Agents) can act as an SMTP client.
An email client knows the outgoing mail SMTP server from its configuration. A relaying server
typically determines which SMTP server to connect to by looking up the MX (Mail eXchange) DNS
record for each recipient's domain name (the part of the email address to the right of the at (@) sign).
Conformant MTAs (not all) fall back to a simple A record in the case of no MX. Some current mail
transfer agents will also use SRV records, a more general form of MX, though these are not widely
adopted. (Relaying servers can also be configured to use a smart host.)
The SMTP client initiates a TCP connection to server's port 25 (unless overridden by configuration). t
is quite easy to test an SMTP server using the telnet program (see below).
SMTP is a "push" protocol that does not allow one to "pull" messages from a remote server on
demand. To do this a mail client must use POP3 or MAP. Another SMTP server can trigger a
delivery in SMTP using ETRN.
#ntroduction to =HTT3>
H93E%TEXT T%$"S3(%T 3%(T(C(L
HTTP is a form of Communication Protocol
The Basic Structure of HTTP Communication follows: Request-Response Model
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
Request:
Client sends a Request to a Server by:
clicking a link on a webpage
submitting a form
typing a web page address in the browser address field
HTT3 %e?uest Message:
The Browser uses the URL to create the request message
The HTTP request message consists of:
Request/ start line
requests headers / header field
Blank line
request / message body (optional)
Start line .%e?uest line:
Consists of three parts:
1.Request Method (Example: GET)
2.Request-UR portion of web address
3.HTTP version (Example: HTTP/1.1
%E@)EST 1)%#:
Second part of the Start line is known as Request-UR
Uniform Resource dentifier (UR) is a string of characters used to identify a name or a resource
on the nternet.
Such identification enables interaction with representations of the resource over a network
(typically the World Wide Web) using specific protocols
Te )%L concept:
URL means 'Uniform Resource Locator'
t's a standard way of specifying any kind of information available on the nternet
Four elements of a URL specification:
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
Method (i.e., the protocol for object retrieval)
Host (i.e., location hostname or P-address)
Port (i.e., port-number for contacting server)
Path (i.e., pathname of the resource's file)
The URL Format:
)%" ,)%C,)%L :
URNs are used for identification,
URCs for including meta-information.
URLs for locating or finding resources
Comparison )%" vs- )%L :
A URN is similar to a person's name, while a URL is like a street address.
The URN defines something's identity, while the URL provides a location. Essentially, "what" vs.
"where".
HTT3 %esponse:
The Server receive a request and uses its URL to decide how to handle it
it might simply fetch an html file and return its content back to the client
it might execute an external program
Browser does not care how the request is handled all it needs is a response
The browser reads the HTML tags in the response and formats the page onto your screen.
HTML %esponse,E*ample:
HTTP/1.1 200 OK
Last-Modified: Mon, 20Mar 2006 23:23:07 GMT
Date:Tue, 30 Mar 2006 18:00:01 GMT
Status: 200
Content-Type: text/html
Servlet-Engine: Tomcat Web Server/5.0
Content-Length: 59
<html>
<body>
<h1> hello world!</h1>
</body>
</html>
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
WE! SE%&E%S $"' WE! CL#E"TS
All of the machines on the nternet can be categorized as two types:
servers
client
Those machines that provide services (like Web servers or FTP servers) to other machines are
servers.
And the machines that are used to connect to those services are clients.
WEBTECHNOLOGY -241208 Lecture Notes - UNT-
'omain "ames:
Servers on the nternet also have human-readable names, called domain names. For example,
www.mywebsite.com
The name www.mywebsite.com actually has three parts:
The host name ("www")
The domain name ("mywebsite")
The top-level domain name ("com") .