Web Technologies Module 2
Web Technologies Module 2
MODULE2
WEB BROWSER(PREVIOUSLY ASKED UNIVERSITY QUESTION(2 MARKS))
● Web Browser is an application software that allows us to view and explore information
on the web. User can request for any web page by just entering a URL into address bar.
● Web browser can show text, audio, video, animation and more. It is the responsibility of a
web browser to interpret text and commands contained in the web page.
● Example: Internet Explorer, Google chrome
● Content-Delivery Sites
o delivers content such as news, e-books, music, software or software components
text, MP3 files, PDF documents, executables fixed or streaming (e.g. daily news
or stock exchange live data)
o Content must be delivered rapidly on the visitor’s screen.Visitors must be able to
locate content quickly.
o Must be available 24x7.
• Request line
– Contains command, name of target resource, and protocol name and version
number
• Request headers
– Can contain information about types of files that client will accept in response to
request
• Entity body
– Used to pass bulk information to the server
Working
• The client request is formulated into an HTTP message by the browser.
• The HTTTP request message is sent to the server over the internet.
• The server analyses the request and finds that it needs the help of servers database to
generate the response.
• The server sends a request to the database managemet software to search and return all
information.
• The database info flows back through the dbms softwar to the server.
• The server formats the response into an HTML document and sends the document inside
an HTTP response message to client.
• Search either a specific site or the entire Web for requested documents
– Indexing program
• Can provide full-text indexing that generates an index for all documents
stored on server
• Can often index documents stored in many different file formats
• Data Analysis Software
– Web servers can capture
• Data about who is visiting a Web site
• How long the visitor’s Web browser viewed site
• Date and time of each visit
• Which pages visitor viewed
– Data captured by Web servers are Stored in a log file
• Link checking utilities
– Link checker
• Examines each Web page and reports on URLs that are
• Broken, seem broken, or are in some way incorrect
– Orphan file
• File on Web site not linked to any Page
– Dead link
• When clicked, displays error message rather than a Web page
– Eg: Elsop Linkscan
• Remote administration
– Web site administrator can control Web site from any Internet-connected
computer
– NetMechanic
• Offers variety of link-checking, HTML troubleshooting, site-monitoring,
and other programs
● Companies use a wide variety of computer brands, types, and sizes to host electronic
commerce operations. Some small companies can run Web sites on desktop PCs.
Server Computers
● Web server computers generally have more memory, larger (and faster) hard disk drives,
and faster processors than the typical desktop or notebook PCs. Web server computers
use more capable hardware elements and more of these elements, they are usually much
more expensive than workstation PCs.
• Blade servers
– Placing small server computers on a single computer board, then installing boards
into a rack-mounted frame
• Virtual server (virtual host)
– Maintains more than one server on one machine
WEB SERVER PERFORMANCE EVALUATION
● Large sites deliver millions of pages every day.They process thousands of customer and
vendor transactions each day .
● The large collection of servers that these sites have are called server farms
● Two approach
o centralised architecture:
▪ a few very large and very fast (and very expensive) computers
o distributed/decentralised architecture:
▪ a large number of relatively inexpensive servers
▪ Large decentralized sites must use load-balancing systems (divide the
workload among them)
Load Balancing
A load-balancing switch is a piece of network hardware that monitors the workloads of the
servers attached to it and assigns incoming Web traffic to the server that has the most available
capacity.
In a simple load-balancing system, the traffic that enters the site from the Internet, encounters
the load-balancing switch, which then directs the traffic to the Web server best able to handle the
traffic
In complex load balancing system, the incoming traffic entering from two or more routers on a
larger website is directed to groups of web servers dedicated to specific tasks.
PROXY SERVER
Forward Proxies
● In this the client requests its internal network server to forward to the internet.
● Provides proxy services to a client or a group of clients. Client request must pass through
the forward proxy first. The request can be allowed or denied. If allowed, the request is
forwarded to the server. From the point of view of server, it is the proxy server that
issued the request and not the client. When server responds, it addreses its response to
the proxy.
● When forward proxy receives the response, it recognizes it as a response to the request
that went through earlier. Hence it sends that response to the client that made the request.
Open Proxies
● Open Proxies helps the clients to conceal their IP address while browsing the web.
● It forwards requests to and from anywhere on the internet.
Reverse Proxies
● In this the requests are forwarded to one or more proxy servers and the response from
the proxy server is retrieved as if it came directly from the original Server.
Anonymous Proxy
● This type of proxy server does not make the client’s IP address available to the contacted
site and identifies itself as a proxy server.
Distorting Proxy
● This type of proxy server identifies itself as a proxy server, but make an incorrect
original IP address available through the HTTP headers on the data packets.
the proxy server will return them to the client computers. If not cached, it will connect to
the original servers and request the resources on behalf of the client computers. Then it
'caches' resources from the remote servers, and returns subsequent requests for the same
content directly.
Benefits of proxy servers
● To hide the IP address of the client computer so that it can surf anonymous, it's mostly for
security.
● To speed up Internet surfing.
● To block undesired sites
● To bypass security restrictions and filters.
● Benefits of caching in proxy
o Reduces latency
o Reduces network traffic
o reduces number of requests on the server
o conserve bandwidth on the network, increasing its scalability.
o improve response time experienced by clients.
3. Search Interfaces
Web crawler
● It is also known as spider or bots. It is a software component that automatically
searches the web to find web pages to gather information.
● When spider finds webpages that might interest search engine site visitors, it collects the
URL of page and information contained on the page.The information includes page’s
title, keywords included in page’s text and information about other pages on the
website.The keywords are enclosed in an HTML tag set is called meta tags.
Database
● The spider returns the information gathered to the database. All the information on the
web is stored in database. It consists of huge web resources.The storage element of
search engine is called index of database.The index checks to see if information about
webpage is already stored.If it is, it compares the stored information to the new
information and determines whether to update the page information.
Search Interfaces
● This component is an interface between user and the database. It helps the user to search
through the database.
Working of Search Engines
Web crawler, database and the search interface are the major component of a search engine that
actually makes search engine to work. Search engines make use of Boolean expression AND,
OR, NOT to restrict and widen the results of a search.
Following are the steps that are performed by the search engine:
● Crawling
● Indexing
● Ranking
● Serving Results
Crawling
● The search engine looks for the keyword in the index for predefined database instead of
going directly to the web to search for the keyword.
● It then uses software to search for the information in the database. This software
component is known as web crawler.
● Once web crawler finds the pages, the search engine then shows the relevant web pages
as a result. These retrieved web pages generally include title of page, size of text portion,
first several sentences etc.
Indexing
● Indexing is when the data from a crawl is processed and placed in a database.
● Indexing process comprises of the following three tasks:
o Text acquisition
Serving Results
● User can click on any of the search results to open it.
programs that run within the browser are known as plugins. A number of plugins are
available from various vendors.
● It is a dynamic code module designed to extend the capabilities of the browser by
integrating a third party application program into the browser.
● New features can be added
● Reduce the size of application
● Eg: Media Player,Acrobat Reader, Shock Wave etc.
HELPER APPLICATION
● A program, external to the browser, which the browser is configured to use when it
downloads a file type which it cannot itself display/handle but which the browser knows
can handle the file type being downloaded.
● These are stand-alone programs which were developed totally independent of Web
browsers
● There are 2 ways to configure a browser to use a particular helper application.
o Manually
▪ The user enters the appropriate information in the fields of
the Helpers screen
o Browser-Assisted
▪ Many browsers will assist the user in configuring the helper application in
the case where the user has already installed the application, but not yet
configured the browser to use it.
● Eg: A browser is unable to directly play a MP3 file. If a browser receives a MP3 file, it
will access its list of helper applications to locate a compatible MP3 applications.
//VERY VERY IMPORTANT TOPIC MORE QUESTIONS WERE ASKED FROM THIS TOPIC
IN MODULE2 DON’T SKIP THIS TOPIC
● The size and objectives of electronic commerce sites vary greatly; thus, a variety of
software and hardware products are used to build those sites.
● The basic functions of electronic commerce includes:
● Catalog display
● Shopping cart capabilities
● Transaction processing
Catalog Display:
● A catalog organizes the goods and services being sold. These items are grouped into
departments. A small commerce site can have a very simple static catalog.
● A catalog is a listing of goods and services.
o A static catalog is a simple list written in HTML that appears on a Web page or a
series of Web pages. To add an item, delete an item, or change an item’s listing,
the company must edit the HTML of one or more pages.
o Larger commerce sites uses dynamic catalog. A dynamic catalog stores the
information about items in a database, usually on a separate computer that is
accessible to the server that is running the Web site itself.
● Small web stores provides catalog with simple list of products. organization of products
is not so important.Photos can be added to products which serves as a link to products
page.
● Large ecommerce sites should provide navigation aids in their catalog.organization of
products is important. Search engines can be used to facilitate easy buying.
Shopping Cart:
● In the early days of electronic commerce, form base shopping cart were used.
● Shoppers selected items they wanted to purchase by filling out online forms. Using text
box and list box form controls to indicate their choices, users entered the quantity of an
item in the quantity text box, the SKU (stock-keeping unit) or product number in another
text box, and the unit price in yet another text box.
● The problem with this approach is that if we fail to submit the order, we have no way to
check it ans so the order will not be processed. Also we may submit the order twice
thinking that we have not submit the order. This system was awkward for ordering more
than one or two items at a time.
● The forms-based method is replaced with shopping bag or shopping basket nowadays. It
keeps track of the items the customer has selected and allows customers to view the
contents of their carts, add new items, or remove items. To order an item, the customer
simply clicks that item. All of the details about the item, including its price, product
number, and other identifying information, are stored automatically in the cart. If a
customer later changes his or her mind about an item, he or she can view the cart’s
contents and remove the unwanted items. When the customer is ready to conclude the
shopping session, the click of a button executes the purchase transaction.
Transaction Processing:
● This is the final check out phase.
● Transaction processing occurs when the shopper proceeds to the virtual checkout counter
by clicking a checkout button. Then the electronic commerce software performs any
necessary calculations, such as volume discounts, sales tax, and shipping costs. At
checkout, the customer’s Web browser software and the seller’s Web server software both
switch into a secure state of communication since it involves money transaction.
● Transaction processing can be the most complex part of the online sale. Computing taxes
and shipping costs are important parts of this process, and site administrators must
continually check tax rates and shipping tables to make sure they are current. Some
software enables the Web server to obtain updated shipping rates by connecting directly
to shipping companies to retrieve information.
Middleware
● Provides connection between ecommerce s/w and existing accounting system.Middle can
be purchased from a third party vendor or it can be self-written if the company has
enough technical staffs.Middleware vendors are IBM,Broadvision
Enterprise application integration
● A program that performs a specific function, such as creating invoices, calculating
payroll,or processing payments received from customers, is called an application program
or application software or, more simply, an application.
● An application server is a computer that takes the request messages received by the Web
server and runs application programs that perform some kind of action based on the
contents of the request messages.
● The actions that the application server software performs are determined by the rules
used in the business. These rules are called business logic.
● Application servers are usually grouped into two types: page-based and component-based
systems.
o Page-based application systems return pages generated by scripts that include the
rules for presenting data on the Web page with the business logic. Common
page-based server systems include Adobe ColdFusion, JavaServer Pages ( JSP),
Microsoft Active Server Pages (ASP), and Hypertext Preprocessor (PHP).
o Component-based application system separates the presentation logic from the
business logic. Each component of logic is created and maintained separately. Eg:
Enterprise JavaBeans (EJBs), Microsoft Component Object Model (COM), and
the Object Management Group Common Object Request Broker Architecture
(CORBA).
Integration with ERP Systems
● Enterprise resource planning (ERP) software packages are business systems that integrate
all facets of a business, including accounting, logistics,manufacturing, marketing,
planning, project management, and treasury functions.The two major ERP vendors are
Oracle and SAP.
Web Services
● a Web service is a set of software and technologies that allow computers to use the Web
to interact with each other directly, without human operators directing the specific
interactions.
● Allows application software in one organization to communicate with other applications
in the network using protocols such as SOAP,UDDI,WSDL.
● SOAP Specifications
o Simple Object Access Protocol (SOAP),which is a message-passing protocol that
defines how to send marked-up data from one software application to another
across a network.
● Web Services Description Language (WSDL), which is used to describe the
characteristics of the logic units that make up specific Web services.
● Universal Description, Discovery, and Integration Specification (UDDI), a set of
protocols that identify the locations of Web services and their associated WSDL
descriptions.
● Understands customer needs. Gather data about customer activities on company’s site.
Supply Chain Management Software
● Coordinate planning and operations with their partners.
Content Management Software
● Helps to control text,graphics and media files.
Knowledge Management software
● Collect and organize information
● Share information among users
● Enhance the ability of users to collaborate
● Preserve the knowledge
PAYMENT SYSTEMS
(previously asked university question(10 marks))
The function of payment systems is the handling of payments over the Internet. Most electronic
commerce involves the exchange of some form of money for goods or services.
There are four basic ways to pay:
● Cash
● Credit card
● Cheque
● Debit card
Another payment medium is scrip. Scrip is digital cash issued by a company instead of by a
government. scrip cannot be exchanged for cash; it must be exchanged for goods or services by
the company that issued the scrip.
Payment Cards
all types of plastic cards like credit cards, debit cards etc that consumers (and some businesses)
use to make purchases.
● Credit card
o Provided by Visa or a MasterCard.
o The spending limit of credi card is based on the user’s credit history.
o A bill will be generated every month for the credits.
o a user can either pay off the entire credit card balance or pay a minimum amount
each billing period. Credit card issuers charge interest on any unpaid balance.
o It is widely accepted.
● Debit Card
o Debit cards are issued by the cardholder’s bank and usually carry the name of a
major credit card issuer, such as Visa or MasterCard, by agreement between the
issuing bank and the credit card issuer.
o a debit card removes the amount of the sale from the cardholder’s bank account
and transfers it to the seller’s bank account.
● Charge card
o offered by companies such as American Express.
o carries no spending limit, and the entire amount charged to the card is due at the
end of the billing period.
● No interests and the entire amount has to be payed.
When using payment cards users have the fear of security. To overcome this Several payment
card companies began offering cards with disposable numbers. These cards are called single-use
cards, gave consumers a unique card number that was valid for one transaction only.It is least
used.
Advantages
1. Provides fraud protection for mechanism as they authenticate cards.
2. Worldwide acceptance
3. Useful for online transaction
4. Provides built-in security for merchants as cash will be paid by issuing companies.
Disadvantages
● Payment card service companies charge per-transaction fee and monthly processing fee.
Payment Acceptance and Processing
In physical store, a sales clerk runs the payment card through online card terminal, card amount
will be charged. In internet we use EMV standard is used.
● In open loop systems three or more parties are involved in transaction. Systems using
Visa or MasterCard are examples of open loop systems.
Working
● Banks connect to an ACH through highly secure, private leased telephone lines.
● The merchant sends the card information to a payment card authorization company,which
reviews the customer account and, if it approves the transaction, sends the credit
authorization to the issuing bank.
● Then the issuing bank deposits the money in the merchant’s bank account through the
ACH.
● The merchant’s Web site receives confirmation of the acceptance of the consumer
transaction.
● After receiving notification of acceptance or rejection of the transaction, the merchant
Web site confirms the sale to the customer over the Internet.
ELECTRONIC CASH
(previously asked university question(10 marks))
● Electronic cash (also called e-cash or digital cash) is value storage and exchange system
created by a private (nongovernmental) entity.
● It does not use paper documents or coins.
● It can serve as a substitute for government-issued physical currency
Micropayments
● Payments for items costing from a few cents to a dollar
Small Payments
Disadvantages
● provides no audit trails
● money laundering( converts illegal money to cash)
● susceptible to forgery
Detecting double spending
● consumer creates a random serial number
● consumer sends it to the issuing bank
● bank uses it along with bank’s digital signature
● bank sends a package containing random number, ecash and digital signature to the
consumer.
● Consumer can use it for further transaction.
Providing security
● Cryptographic algorithms are used using keys to create tamper proof ecash.
● Anonymous electronic cash can be used.
● Individual companies offer ewallet services.common standard built into the structure of
web.
W3C Electronic commerce Interest Group(ECIG)
● Common markup for micropayment per fee links
● Contains guidelines to embed micropayment information in a webpage
ECML standard
● Stands for electronic commerce modeling language
● Contains a set of XML tags
● A smart card can hold private user data, such as financial facts, encryption keys, account
information, credit card numbers, health insurance information, medical records, and so
on.
● Smart cards are safer than conventional credit cards because the information stored on a
smart card is encrypted.
● Eg:OCTOPUS