Internet Protocols  «Prev  Next»
Lesson 11 Uniform Resource Locator
ObjectiveDescribe the Functions, Components, and Types of URLs.

Uniform Resource Locator

A URL, or Uniform Resource Locator, specifies a unique address to a resource on the Internet. A resource can be a specific Web page, a document, or an image. URLs are occasionally called URIs, or Uniform Resource Identifiers.
  • Parts of a URL:
    Delimiters separate the parts of a URL address. The first part of a URL indicates which protocol to use; the second part specifies where the resource is located.
    The Parts of a URL
    The diagram show above provides a breakdown of the components of a URL (Uniform Resource Locator). Here's a detailed description of the text and features:
    URL Example Provided: http://www.asteron.hycurve.com:80/internet/index.html
    Components Described:
    1. Service or Protocol (`http://`): This part specifies the protocol used for communication, in this case, HTTP (Hypertext Transfer Protocol).
    2. Delimiter (`://`): The `://` acts as a separator between the protocol and the subsequent parts of the URL.
    3. Host Name (`www`): The `www` in this context refers to the host name, which often denotes the World Wide Web, though it is not always required in modern URLs.
    4. Subdomain Name (`asteron`): This part (`asteron`) is a subdomain, which is a subset of the domain name used to organize or categorize sections of the website.
    5. Domain Name (`hycurve.com`): The domain name (`hycurve.com`) is the main address of the website, indicating the specific website that is being accessed.
    6. Port Number (`:80`): The `:80` represents the port number used by the server. Port 80 is the default port for HTTP traffic.
    7. Directory on the Server (`/internet/`): This part (`/internet/`) indicates the directory on the server where the requested resource (file) is located.
    8. File Name (`index.html`): The `index.html` is the specific file being requested within the directory. It is typically the default file served by a web server for a directory.

    Visual Layout:
    1. The components are highlighted and labeled with descriptive text indicating what each part of the URL represents.
    2. The image uses lines to connect each part of the URL to its corresponding label, making it easy to visually identify and understand each element.

    This breakdown helps in understanding how a URL is structured and what each component signifies, which is essential for navigating the web and understanding how web addresses are formed.


Internet Security

Difference between a URL and a Domain Name

This can be a confusing point, but it is an important one. In a nutshell, using the Internet address https://www.cplusoop.com/, the Domain Name is cplusoop.com, everything to the right of the
http://www. 
The URL is everything including the https://www.cplusoop.com. You will be asked many times in for just the domain when registering or searching for domains. Other times, you will be asked for the full URL. It is important to understand the difference between these terms.
Internet web technologies 1
1) Service or Protocol 2) Host Name 3) Subdomain Name 4) Domain Name 5) Port Number 6) Directory on the server 7) Filename
  1. The service or protocol part of the URL identifies the types of internet service the browser uses to access the resources
  2. The host name is used to identify web resources on HTTP servers. Host names are optional.
  3. The subdomain name identifies the name of the server hosting the resources
  4. The Domain name identifies the type of entity providing the resource.
  5. The Port number designates the specific TCP/IP port being used to process the request and will default to 80 if it is omitted.
  6. The Directory identifies the location of the resources on the host server.
  7. The file name identifies the name of the resource

URL Defined
  • Elements of a Uniform Resource Locator:
    With Hypertext and HTTP, URL is one of the key concepts of the Web. It is the mechanism used by browsers to retrieve any published resource on the web. URL stands for Uniform Resource Locator and is nothing more than the address of a given unique resource on the Web. In theory, each valid URL points to a unique resource. Such resources can be an HTML page, a CSS document, an image, etc. In practice, there are some exceptions, the most common being a URL pointing to a resource that no longer exists or that has moved. As the resource represented by the URL and the URL itself are handled by the Web server, it is up to the owner of the web server to carefully manage that resource and its associated URL.
  • Uniform Resource Locator Definition:
    So how does your favorite browser navigate this tangled network of computers to find just the web page you want? It’s all in what is known as the URL (Uniform Resource Locator), which is simply the website address you type into your browser, like www.seotrance.com
  • Protocol Description: URL is the syntax and semantics for a compact string representation of a resource available via the Internet. For example, we use URL to locate web addresses and FTP site addresses. The generic syntax for URLs provides a framework for new schemes to be established using protocols other than those defined in this document. URLs are used to 'locate' resources, by providing an abstract identification of the resource location. Having located a resource, a system may perform a variety of operations on the resource, as might be characterized by such words as "access", "update", "replace", "find attributes". In general, only the "access" method needs to be specified for any URL scheme.

Types of URLs

A URL describes the location of a specific file on a specific computer connected to the Internet. There are three types of URLs based on where the files are located relative to the document. The table below describes the types of URLs and their general syntax.
Type Description Syntax
Relative
  1. Address expressed relative to the originating document
  2. Easy to move set of documents if the positions of the document relate to each other remain constant
  3. Best used when files are related to one another and kept in proximity
directoryname/filename
Local absolute
  1. Start at a fixed point and specify a fixed path to the file from that point
  2. Best used for most links in which documents reside on the same server
/directoryname/filename
Fully qualified absolute
  1. Defines the entire URL
  2. Easiest to move
  3. Best used when different servers are required
  4. Must be changed whenever the server name changes
service://host-name.domain-name/path/file

In addition to the functions of URLs discussed so far, there are other uses for URLs.

Software Defined Networks

Alternative Applications for URLs

When considering alternative applications for URLs on host computers, it generally means looking for tools or technologies that can serve as alternatives to traditional web hosting or methods of accessing web-based resources. Here are some of the best alternatives:
  1. IP Addresses Directly:
    • Usage: Instead of using a URL, which typically includes a domain name, you can directly access a resource by its IP address. This bypasses the need for DNS (Domain Name System) lookup.
    • Example: Instead of using `http://example.com`, you might use `http://192.168.1.1` if the resource is hosted on that IP.
  2. SSH (Secure Shell):
    • Usage: SSH allows secure access to a remote host, where you can execute commands, transfer files, or manage systems directly from a terminal or command line interface.
    • Example: Instead of accessing a website, you could use `ssh user@hostname` to manage the host directly.
  3. File Sharing Services (FTP/SFTP):
    • Usage: File Transfer Protocol (FTP) or Secure File Transfer Protocol (SFTP) provides a way to upload, download, and manage files on a server without needing a URL to access a web interface.
    • Example: Accessing a file via `ftp://hostname/path/to/file` instead of via a URL.
  4. Remote Desktop Protocol (RDP):
    • Usage: RDP allows you to remotely access and control a host computer's desktop environment. This can replace the need for URLs if you need direct interaction with the host machine.
    • Example: Using a remote desktop client to connect to `hostname` to manage resources on the server.
  5. Peer-to-Peer (P2P) Networks:
    • Usage: P2P networks like BitTorrent allow for the sharing of files or data directly between users, bypassing the need for traditional URLs.
    • Example: Instead of downloading a file from a URL, you might use a torrent file or magnet link that connects you directly to peers who have the file.
  6. Blockchain-Based DNS Alternatives (e.g., ENS, IPFS):
    • Usage: Decentralized alternatives to traditional DNS, like the Ethereum Name Service (ENS) or InterPlanetary File System (IPFS), can be used to resolve content or addresses without relying on traditional URLs.
    • Example: Accessing resources using a .eth domain name via ENS or retrieving content using an IPFS hash.
  7. Direct Socket Connections:
    • Usage: Establishing a direct TCP or UDP socket connection to a server can be an alternative to accessing web services via URLs.
    • Example: Applications like custom game servers or chat clients often connect to a server using a socket instead of a URL.
  8. Localhost Access:
    • Usage: If the application or service is hosted on your local machine, you can access it directly via `localhost` or `127.0.0.1`, often bypassing the need for a full URL.
    • Example: Accessing a development server running on your local machine via `http://localhost:8080`.
  9. Direct Application Protocols:
    • Usage: Instead of using HTTP(S) via a browser, you can interact with host services using alternative protocols specific to the application, like SMTP for email or MQTT for IoT devices.
    • Example: Sending an email via `smtp://hostname` instead of accessing an email client through a URL.
  10. Custom VPN Solutions:
    • Usage: Virtual Private Networks (VPNs) can allow secure and private access to resources on a network, often without the need for traditional web URLs.
    • Example: Using a VPN to connect to a private network where you can access shared resources directly by their network address.
  11. Mobile or Desktop Applications:
    • Usage: Instead of accessing a service through a web URL, you could use a dedicated application that interacts with the host via APIs or direct network communication.
    • Example: A desktop app for email, chat, or file management that connects directly to a server without needing a web browser.

These alternatives offer different ways to access, manage, and interact with host computers or resources without relying solely on traditional URLs and web browsers. The choice of alternative depends on the specific use case, security requirements, and the type of resources being accessed.


Port Numbers

There are two kinds of ports on a computer, hardware and software ports. Hardware ports identify a particular device. Software ports identify the first instruction of a program used to handle common routines, such as a modem request. Ports are identified by a number (possibly hexidecimal, so they may also contain letters). You may recall in our URL MouseOver above, that software port numbers identify the sending and receiving application. Over the years, a PC or Macintosh have software ports that are typically assigned values of 256 or less. Ports numbered from 256 to1024 are assigned to services developed as part of the UNIX operating system. The table below identifies the port numbers for common Internet services. Recalling the port number in our MouseOver as 80, what service does this designate?
  • Internet Services and their Port Numbers
    Service Port Number
    File Transfer Protocol 21
    Telnet 23
    (SMTP) Simple Mail Transfer Protocol 25
    Gopher 70
    Finger 79
    HTTP: Hypertext Trasnfer Protocol 80
    Network News Transfer Protocol 119
    Secure Hypertext Transfer Protocol 443
    MS SQL Server 1443

Internet Services Port Numbers

Click the link below to review what you have learned about port numbers related to common Internet services.

Some Internet Services and their Port Numbers

  1. File Transfer Protocol: 21
  2. Simple Mail Transfer Protocol: 25
  3. Hypertext Transfer Protocol: 80
  4. Network News Transfer Protocol: 119
  5. Secure Hypertext Transfer Protocol: 443
  6. MS SQL Server: 1443
  7. Gopher: 70
  8. Telnet: 23

Gopher Protocol :Port 70

Port 70 is the default port used for the Gopher protocol, which was a precursor to the World Wide Web. Gopher was a text-based protocol that allowed users to access and navigate content on remote servers. While the Gopher protocol is no longer widely used, there are still a few Gopher servers and clients in operation today. However, the use of Port 70 for Gopher is relatively rare, as most modern web browsers do not support the protocol by default.
In recent years, there has been some interest in reviving the Gopher protocol as a lightweight and privacy-focused alternative to the modern web. However, it remains to be seen whether this will result in a significant increase in the use of Port 70 or the Gopher protocol more broadly. In summary, while Port 70 for Gopher is still in use today, its usage is relatively rare and limited to a small number of servers and clients. The protocol is no longer widely used, and most modern web browsers do not support it by default.

Communication Channels

The communication channel provides the path for the message between the two communicating nodes in the model. Although the model in Figure 4-11 represents the channel as a direct point-to-point connection between the nodes, this is not generally the case.

In reality, the channel can take many different forms. In the simplest case, it might be a direct connection between nodes in a local area network. More typically, the communication channel is actually divided into segments, called links, with intermediate nodes between the links that forward packets from one link to the next. Data originates at one end point and passes through each link to reach the destination end point. As an example, consider Figure 4-12. In this example, data in the form of a http request originating from a home computer connects wirelessly through a router to a DSL modem. From there, the data passes through the DSL link to an Internet Service Provider, then through many additional connections to a computer somewhere on the Internet.

Data Processing (computers) versus Data Communications
The computer communications revolution has produced several remarkable facts:
  1. There is no fundamental difference between data processing (computers) and data communications (transmission and switching equipment).
  2. There are no fundamental differences among data, voice, and video communications.
  3. The distinction among single-processor computer, multiprocessor computer, local network, metropolitan network, and long-haul network has blurred.

In other words, the communication channel between your web browser and the web server on the Internet may be divided into many links, each with its own characteristics. This is true in general of most communication channel connections. Conversely, there may be many nodes sharing the use of a single channel or channel link. Thus, a channel or channel link may be required to carry several messages from different sources and bound for different destinations simultaneously. The requirements for data communication must include the ability to share the channel elements among many different sender-receiver pairs and to direct messages to their correct nodes, wherever those nodes might be located. One way to view the channel is to consider the connection between the end point sender-receiver pair as the communication channel for that pair. If our prime objective is to consider the overall characteristics of the channel as a conduit for messages being sent between that pair, this view may be useful and sufficient. We noted in the previous paragraph, however, that the channel between two end points may actually consist of a number of links, with intermediate nodes connecting the links. Each link has its own characteristics of interest and in a limited sense, each link can also be described as a communication channel.
Since the channel may be made up of multiple links, the interfaces at each end of the connection may differ from each other and the characteristics of the end-to-end channel may differ from those of the individual links. For example, the computer initiating a message might be connected to a network using a telephone modem, which transmits messages one byte at a time using audio tones as a signaling method. The receiving computer might be connected to the network using Ethernet, which expects messages formatted as digital packets consisting of many bytes of data, together with additional bytes that define the specific characteristics of the particular packet.
There are protocols and standards that define the makeup of the packets. The network must be capable of converting the message from one format to another at the intermediate nodes when required.

SEMrush Software 11 SEMrush Banner 11