Introduction To Web Technology
Introduction To Web Technology
UNIT I
Introduction and Web Development Strategies
History of Web, Protocols governing Web, Creating Websites for
individual and Corporate World, Cyber Laws
Web Applications, Writing Web Projects, Identification of Objects,
Target Users, Web Team,
Planning and Process Development.
humans daily life and therefore well defined strategies are required
regulations.
networks of the western world, and then began to penetrate into the
popular use in the 1990s, the Internet has had a drastic impact on
PROTOCOLS
intelligence.
caused.
was developed to survive a nuclear attack has its roots in the early
the number of hosts had grown to 213, with a new host being
X.25 formed the basis for the SERCnet network between British
use. Telenet offered its Telemail electronic mail service, but this
ARPANET.
the first to offer real-time chat with its CB Simulator. There were
also the America Online (AOL) and Prodigy dial in networks and
Ellis, came up with the idea of using simple Bourne shell scripts to
published as RFCs 791, 792 and 793 and adopted for use. DARPA
After the ARPANET had been up and running for several years,
ARPA looked for another agency to hand off the network to;
July 1975, the network had been turned over to the Defense
who were.
Network or ESNet.
Center creating the first multiprotocol wide area network called the
seven continents.
The term "Internet" was adopted in the first RFC published on the
interlinked with NSFNet, that the term Internet came into more
[edit] CERN, the European internet, the link to the Pacific and
beyond
Between 1984 and 1988 CERN began installation and operation of
(much of which ran over X.25 links) over to TCP/IP. In 1987, Ben
Segal had met with Len Bosack from the then still small company
Cisco about purchasing some TCP/IP routers for CERN, and was
able to give Karrenberg advice and forward him on to Cisco for the
1992.
DIGITAL DIVIDE
AFRICA
IPSS and 2400 baud modem UUCP links for international and
Specialists.
(APRICOT).
LATIN AMERICA
Uruguay, operates DNS root, reverse DNS, and other key services.
During the late 1980s, the first Internet service provider (ISP)
UUCP-based email and Usenet News to the public. The first dial-
opened in 1989.
brought prices low enough that junior colleges and other schools
could afford to participate in the new arenas of education and
research.
the idea that the Internet is not owned or controlled by any one
number.
role as the RFC Editor, Jon Postel worked as the manager of IANA
domains (TLDs) of .mil, .gov, .edu, .org, .net, .com and .us, root
Since at this point in history most of the growth on the Internet was
by General Atomics.
In 1998 both IANA and InterNIC were reorganized under the
tender basis.
Daniel and Tom Truscott in 1979 was used to distribute news and
mailing list).
From gopher to the WWW
As the Internet grew through the 1980s and early 1990s, many
files and information. Projects such as Gopher, WAIS, and the FTP
accommodate all the existing data types and in being able to grow
turning point for the World Wide Web began with the introduction
led by Marc Andreessen. Funding for Mosaic came from the High-
popular browser. While it held this title for some time, eventually
Royce Hall. This was the "first public conference bringing together
field [and] also began the national dialogue about the Information
Search engines
Even before the World Wide Web, there were search engines that
the invention of the World Wide Web but all continued to index
the Web and the rest of the Internet for several years after the Web
As the Web grew, search engines and Web directories were created
to track pages on the Web and allow people to find things. The first
and was the first to achieve commercial success. During the late
1990s, both Web directories and Web search engines were popular
—Yahoo! (founded 1995) and Altavista (founded 1995) were the
search engines.
sort the best results first. Relevancy ranking first became a major
PageRank method for ordering the results has received the most
press, but all major search engines continually refine their ranking
their search ranking, and an entire body of case law has developed
consumer advocates.
Dot-com bubble
so.
(intra-day peak 5132.52), more than double its value just a year
through their venture capital and IPO capital, often without ever
making a profit.
Worldwide Online Population Forecast
five years, far outpacing the 1.1 percent compound annual growth
rate for the planet's population as a whole. The report says 1.1
report.
As the online population of the United States and Canada grows by
will take place, says JupiterResearch. The report says China should
should hit 7 percent during the same time frame. This growth is
laggards."
Historiography
Internet.
Firstly, India has an extremely detailed and well-defined legal system in place.
Numerous laws have been enacted and implemented and the foremost amongst
them is The Constitution of India. We have interalia, amongst others, the Indian
Penal Code, the Indian Evidence Act 1872, the Banker's Book Evidence Act,
1891 and the Reserve Bank of India Act, 1934, the Companies Act, and so on.
However the arrival of Internet signalled the beginning of the rise of new and
complex legal issues. It may be pertinent to mention that all the existing laws in
place in India were enacted way back keeping in mind the relevant political,
social, economic, and cultural scenario of that relevant time. Nobody then
could really visualize about the Internet. Despite the brilliant acumen of our
master draftsmen, the requirements of cyberspace could hardly ever be
anticipated. As such, the coming of the Internet led to the emergence of
numerous ticklish legal issues and problems which necessitated the enactment
of Cyberlaws.
Secondly, the existing laws of India, even with the most benevolent and liberal
interpretation, could not be interpreted in the light of the emerging cyberspace,
to include all aspects relating to different activities in cyberspace. In fact, the
practical experience and the wisdom of judgment found that it shall not be
without major perils and pitfalls, if the existing laws were to be interpreted in
the scenario of emerging cyberspace, without enacting new cyberlaws. As such,
the need for enactment of relevant cyberlaws.
Thirdly, none of the existing laws gave any legal validity or sanction to the
activities in Cyberspace. For example, the Net is used by a large majority of
users for email. Yet till today, email is not "legal" in our country. There is no
law in the country, which gives legal validity, and sanction to email. Courts and
judiciary in our country have been reluctant to grant judicial recognition to the
legality of email in the absence of any specific law having been enacted by the
Parliament. As such the need has arisen for Cyberlaw.
All these and other varied considerations created the conducive atmosphere for
the need for enacting relevant cyberlaws in India. The Government of India
responded by coming up with the draft of the first Cyberlaw of India - The
Information Technology Bill, 1999. One question that is often asked is why
should we have Cyberlaw in India, when a large chunk of the Indian population
is below the poverty line and is residing in rural areas ? More than anything
else, India, by its sheer numbers, as also by virtue of its extremely talented and
ever growing IT population, is likely to become a very important Internet
market in the future and it is important that we legislate Cyberlaws in India to
provide for a sound legal and technical frame work which, in turn, could be a
catalyst for growth and success of the Internet Revolution in India.
SUPPORTIVE CYBER LAW
• Existing Statutes
1. Communications and Multimedia Act 1998(CMA)
2. Malaysian Communications and Multimedia Commission Act
1998
3. Digital Signature Act 1997
4. Computer Crimes Act 1997
5. Copyright Act (Amendment) Act 1997
6. Telemedicine Act 1997
7. Optical Discs Act 2000
• Amendments of Statutes
• Proposed Statutes
• LICENCE
o INDIVIDUAL / CLASS
Network Facilities
Network Services
Application Services
(NFP)
Network Service Provider 19 11 30
(NSP)
Application Service Provider 16 64 80
(ASP)
Content Application Service 19 1 20
Provider (CASP)
Total 74 87 161
COSTS OF SERVICES
INSTITUTIONAL FRAMEWORK
MINISTER
• MCMC
INDUSTRY FORUMS
• MECM
TRIBUNAL
COMMUNICATIONS AND MULTIMEDIA
COMMISSION ACT 1998
2. Regulate industry
damage suffered.
COPYRIGHT ACT(A) 1997
its components.
prescription
CELLULAR PENETRATION BETWEEN
SELECTED COUNTRIES 2002
90 84.49
79.14
80
67.95
70
62.11
60
48.81
50
40 37.3
30 26.04
20 16.09
10
1.22
0
UK Singapore Korea, Rep Japan USA Malaysia Thailand China India
Source: ITU@2003
COMPUTER AND INTERNET PENETRATION
18.0 16.7
16.0 14.5
14.0 12.5
11.4
12.0 10.5
9.4
10.0 8.8
7.9
%
8.0 7.1
6.1
6.0
4.0 2.9
1.8
2.0
-
1998 1999 2000 2001 2002 2003
50
44.9
40.6
40
31.6
30
20
10 7.8
4.6
1.6
0
Korea, Rep Singapore USA Japan UK Malaysia Thailand China India
Source: ITU@2003
BROADBAND PENETRATION RATES (%)
AMONG SELECTED ASIAN COUNTRIES IN
2002
25
20 14.5m
15
465k
10
640k
5 196k
0
S o u t h K oHr oe na g K o nTga iw a n S i n g a p o r eC h in a M A L 1.5m
A Y S TI Ah a i l a n19k
d In d i a
% 1 9 .2 9 1 3 .3 9 .1 5 6 .1 3 0 .1 2 0 .0 8 0 .0 5 0 .0 2
AMENDMENT OF STATUTES.
PURPOSE OF AMENDMENTS:
Regulations 2000;
2000;
2000
introduced:-
Promote Encourage
secured PDP - electronic
electronic Protect personal data transactions
environment
Enhance consumer
trust and confidence
Privacy is a Shared Responsibility
Web applications are popular due to the ubiquity of a client, sometimes called a thin
client. The ability to update and maintain Web applications without distributing and
installing software on potentially thousands of client computers is a key reason for their
popularity. Common Web applications include Webmail, online retail sales, online
auctions, wikis, discussion boards, Weblogs, MMORPGs and many other functions.
History
In earlier types of client-server computing, each application had its own client program
which served as its user interface and had to be separately installed on each user's
personal computer. An upgrade to the server part of the application would typically
require an upgrade to the clients installed on each user workstation, adding to the support
cost and decreasing productivity.
Interface
The Web interface places very few limits on client functionality. Through Java,
JavaScript, DHTML, Flash and other technologies, application-specific methods such as
drawing on the screen, playing audio, and access to the keyboard and mouse are all
possible. Many services have worked to combine all of these into a more familiar
interface that adopts the appearance of an operating system. General purpose techniques
such as drag and drop are also supported by these technologies. Web developers often use
client-side scripting to add functionality, especially to create an interactive experience
that does not require page reloading (which many users find disruptive)[citation needed].
Recently, technologies have been developed to coordinate client-side scripting with
server-side technologies such as PHP. Ajax, a web development technique using a
combination of various technologies, is an example of technology which creates a more
interactive experience.
Technical considerations
A significant advantage of building Web applications to support standard browser
features is that they should perform as specified regardless of the operating system or OS
version installed on a given client. Rather than creating clients for MS Windows, Mac OS
X, GNU/Linux, and other operating systems, the application can be written once and
deployed almost anywhere. However, inconsistent implementations of the HTML, CSS,
DOM and other browser specifications can cause problems in web application
development and support. Additionally, the ability of users to customize many of the
display settings of their browser (such as selecting different font sizes, colors, and
typefaces, or disabling scripting support) can interfere with consistent implementation of
a Web application.
Another approach is to use Adobe Flash or Java applets to provide some or all of the user
interface. Since most Web browsers include support for these technologies (usually
through plug-ins), Flash- or Java-based applications can be implemented with much of
the same ease of deployment. Because they allow the programmer greater control over
the interface, they bypass many browser-configuration issues, although incompatibilities
between Java or Flash implementations on the client can introduce different
complications. Because of their architectural similarities to traditional client-server
applications, with a somewhat "thick" client, there is some dispute over whether to call
systems of this sort "Web applications"; an alternative term is "Rich Internet Application"
(RIA).
Structure
Though many variations are possible, a Web application is commonly structured as a
three-tiered application. In its most common form, a Web browser is the first tier, an
engine using some dynamic Web content technology (such as ASP, ASP.NET, CGI,
ColdFusion, JSP/Java, PHP,embPerl, Python, or Ruby on Rails) is the middle tier, and a
database is the third tier. The Web browser sends requests to the middle tier, which
services them by making queries and updates against the database and generates a user
interface.
But there are some who view a web application as a Two-Tier architecture.
Business use
An emerging strategy for application software companies is to provide Web access to
software previously distributed as local applications. Depending on the type of
application, it may require the development of an entirely different browser-based
interface, or merely adapting an existing application to use different presentation
technology. These programs allow the user to pay a monthly or yearly fee for use of a
software application without having to install it on a local hard drive. A company which
follows this strategy is known as an application service provider (ASP), and ASPs are
currently receiving much attention in the software industry.
The use of Web application frameworks can often reduce the number of errors in a
program, both by making the code more simple, and by allowing one team to concentrate
just on the framework. In applications which are exposed to constant hacking attempts on
the Internet, security-related problems caused by errors in the program are a big issue.
Frameworks may also promote the use of best practices such as GET after POST.
Applications
Examples
• Word
processor and
Spreadsheet: Google
Docs & Spreadsheets
• CRM
Software:
SalesForce.com
Benefits
Browser Applications typically require little or no disk space, upgrade automatically with
new features, integrate easily into other web procedures, such as email and searching.
They also provide cross-platform compatibility (i.e Mac or Windows) because they
operate within a web browser window.
Disadvantages
Standards compliance is an issue with any non-typical office document creator, which
causes problems when file sharing and collaboration becomes critical. Also, Browser
Applications rely on application files accessed on remote servers through the internet.
Therefore, when connection is interrupted, the application is no longer usable. Google
Gears is a beta platform to combat this issue and improve the usability of Browser
Applications.
As the Internet grew into a major player on the global economic
front, so did the number of investors who were interested in its
development. So, you may wonder, how does the Internet
continue to play a major role in communications, media and
news? The key words are: Web Application Projects.
There are many entities that require applications for the Web-
one example would be Business-to-Business interaction. Many
companies in the world today demand to do business with each
other over secure and private networks. This process is
becoming increasingly popular with a lot of overseas companies
who outsource projects to each other. From the simple process
of transferring funds into a bank account, to deploying a large
scale Web services network that updates pricing information
globally, the adoption of a Web applications infrastructure is vital
for many businesses.
The User Service tier creates a visual gateway for the consumer
to interact with the application. This can range from basic HTML
and DHTML to complex COM components and Java applets.
The user services then grab business logic and procedures from
the Business Services. This tier can range from Web scripting in
ASP/PHP/JSP to server side programming such as TCL, CORBA
and PERL, that allows the user to perform complex actions
through a Web interface.
The final tier is the Data Service layer. Data services store,
retrieve and update information at a high level. Databases, file
systems, and writeable media are all examples of Data storage
and retrieval devices. For Web applications, however, databases
are most practical. Databases allow developers to store,
retrieve, add to, and update categorical information in a
systematic and organized fashion.
After assessing all your resources, you and your team come to a
conclusion that the company is unable to do data backups on a
daily basis. After further discussion, you realize that this is a
very important part of the setup for your client, and you should
not risk taking a chance with the project. It's very likely that you
will be more prepared next time around, when a similar project
lands on your desk, so you decline the job and recommend
someone else who has the capabilities to do it right now.
3. Development
Once the project plan and functional specification are
ready, a baseline is set for the development work to begin.
The programmer/s or Web developer/s begin coding,
testing and publishing data. This phase establishes the
data variables, entities and coding procedures that will be
used throughout the remainder of the project. A milestone
document is prepared by the development team, which is
then handed to management for review.
Practically speaking, it's always best to start with the data tier,
because you've already identified your entities and understand
their relationships. The data tier can be an SQL server database,
a text file, or even the powerful and robust Oracle. Create
tables, relationships, jobs, and procedures depending on what
platform you have chosen. If the data is a warehouse (i.e. the
data already exists and does not depend on real time
interaction), then make sure that new and additional data can be
added securely and in a scalable fashion.
The last is the user tier, which is absolutely vital for the
interactive and strategic elements in the application. It provides
the user with a visual gateway to the business service by placing
images, icons, graphics and layout elements in strategic areas of
interest, most commonly, based on management research. If
you'll be developing the user tier yourself, be sure to have
studied your competition. The last thing you need is for your
application to look exactly the same as someone else's.