You are on page 1of 51
Unit-5 ONLINE APPLI CATIONS Simple Applications - Online Databases = Mectiectes oor Events ~ ee gang ae Customization of Internet Commerce 5.1 Simple Applications to run on intern Any application which deploys web languages and is corms ering requirements: | categorized under web applications. A typical web ‘application has the follo yet can be 5.1.1 Application Requirements * f de CALLON + eae penCne gy @ Browser ‘Accessibility 5 itis ‘ Mostlv-most of the requests that some fora web sptiatan £9 come from browser 2“ the web server would nounally be located.at a different place fram where te a Hoimail,com, on which most of you are having your email accounts, is sf going to US every ume to check your mails?” is Spal ‘achieved: Eee. ac the server is an,U.S based, Phopmail.com. And the browser is always there for.you to ‘remaining! ‘some applications rarely do use some special software, mostly custom built. Say, your i ahioo ch hat! Whatever be the case, the applications mostly use Tf security is required, say for sites like amazon.com, where the user m: be wancoeri ay. Peco. fh, a lite cb Tanguages must necessarily vm At fr Lovee ty anette [7 6) eupoones by a wide variety of rab servers. The web de variet ting s\ St a 0 ON thy Otact her oy application from a web server to similar web vo = - ‘Server Aot impose any new. pcoblatts.“Phe-webs language you ties WEB TECHNOLOGY is er wal OO Cae, tan rth jy (v) State Management: o a aD => HITE isa sinless protocol. agreed!_But there do arise some occasions ce storit on ithe user until he leaves our site like storing the name of a jer. Heiice, your web Shavld provide ths option, Remember the vEage OF session OB}EE 18 " of web server programmer knowledge etc.., which are outside the scope of the book. F5.12 Design Tips; \ ~~ If you have completely studied the book so far, you are familiar with atleast the following web technologies like HTML, ASP, Perl, Servlet, Applet. JSP, VB Script. Java Script Style Sheets. ‘So here are some tips for you before you start building your application /web site: = 3), et rely on a single technology. It may be better if you use Applet when you have to me with Dac jraphics like building of Charts, Graphs etc... butit isa foolish decision to construct a complete web site using Applets alone. The right mix ‘of these technologies is the secret of success. Don't overload the server for everything. It is not 2 good practice to check something like this on the server: “Ch if request form(“username”)="" then response.write “Sorry!! User Name cannot be Empty” response.cnd response.write “Welcome to my page” Seourse, there 1s no harm until the user types the usernaine and gets the greeting then the web server is unnecessarily loaded besides increasing traffic on the VB script or Java Script written on the client side would do the trick!! ctions. It is good fur debugging and encourages code reuse. objects do serve a noble cause. But it is not a wise thing to store details on session objects like storing current date etc... which carries The reason is that the session and application variables are loaded @ when the page is accessed rtant.data.on client side scripting, Jike checking the password of a "usemame. Since, it is easy for anyone to breach this by clicking from the main menu and seeing the HTML source, where the n le page. It always increases download time of ‘At the maxiraum the downloading of @ page should LUGIN used in the server must also be present in nto be discussed. Tike credit card numbers on cookies. As you are and even be deleted: Unit-5 ON-LINE APPLICATIONS. 396 Combine the cor ly occurring code within multiple pages into a single file and use “include” dicectives to include that coding into the pages. Less modification €ffort alone is sufficient for any changes. Keeping these features in mind, we have devised some simple (Simpler, indeed) c for you to use and have presented already. Like in Unit-2, you came across designing ‘book application in CGI and in unit -4 you came across designing a online exam site using G ISP. The application has been developed using the various web technologies like HTMI d, ASP as server side Technology with VBScript for implementation, Backend is MS- with that, design work is done using DHTML fall the Personal Web Server in the system (For windows 9x)or install Intemet | Server on a windows N7/2000 server machines (Don’t worry! In most of the systems, ly installed in your system.) Place the folder “Design” in the following path: FOO, Create a virtual directory named “design” (the steps for creating a virtual ‘mentioned in Unit-2) and map it to the design folder. Browse the web page a ‘Which you have already come across many a times in this book. But this Databases in a structured manner. Databases ine database.you can cispls data in . in_any order. Or even spread across ik ing; Visitors certain permissions webmaster or administrggor. You cai Tet visitors enter rain Tive, while you only moderate, You can usc a database to lock a ce visitors register to get an automatic username and passw. Jarge amounts of structured data on a web site, easily searched, indexes / an online examination is available in the CD. Type asp. The initial screen appears. Login as webluser « ish you all good luck.” Don’t forget to walkthrough the on of | data ii Serr Oracle, MYSOe. depend Iso ne.best way jo.stoce and rank large ihe te tabases indispensable in the IF ECORTE. HOTS WHS A ditabase may consist af two or more data fi : the database Js. the DBMS must oe on of a distributed database is ‘ig_collectis database, sysiems. wish in-built facilities for exchanging data and services located either localty v7 remote” of Distributed databasy ing_a distributed DBMS. The main ones include the ones Bone Se new data location (c.g. new table), there's no need to re- = the new node almost automatically bei r _ (due to management decisions) or chan; ing physics 0 al changes in the Database or its abies. a 2 Spiraliand system. Additional considerat ot to mention the high complexity of 4 _— o val fey yan 4 Sneed OM, Sete ty ey iand_thass_in tbe anise of she. system. means. that errors, aré. hardgr-to-_aveid and as -arechiffreute wo Went. By trying tc ake the Di fibued database more reliable ed-system,-by. its. very nature, entails a large _communtcation wansactions between the different site to the fact that not all data is located in one centralized place - a station (node) failure exity means th guisition.and.majntenance costs of jhe system are much ‘of a centralized DBMS. database issues spdlate propagation & Distributed catalog management ‘update occurs in one node - the transaction should propagate to ss, meaning, all users of that database should receive all transactions being of their physical location -y control ‘control and transaction flow over the network is of extreme ying of data in databases 19 multiple locations providing Lofdatay TMU creating @ virtual global DE -whGT I er trANSPAFenlly Updates each copy of the Data © model of Distributed Database has to deal with the tives for timing - Examples are: P). = In this case the data is moved through the vA . < as determined by the system administrator. In server until it is scheduled for distribution, * Thgpered ~ by user detived criteria such as an event happening. the number of records ‘ ‘excoeding a limit or timé of day. When that trigger is fired, the server moves the data to the distribution queue for remote processing. case, data remains in the * Manyal = As done manually by the DB Manager or System Administrator oe fware MySQL, the one of the most popular Open Source SQL databé 1. The. so! istelbuled, and supported by MySQL AB which.is_a.commercial company, 7 “that builds" Business by ‘providing services around the ‘ANBANE Thfiagesnent system 5.2.41 Need for MySQL Database Server le, and easy to use, MySQL Server was lly Used in highly demanding production environments for several years. ‘Though under development, MySQL Server today offers a rich and useful set of functions. Its p, speed, and security make MySQL Server highly suited for accessing databases on the atte: ol mutton did LL: thal. cuisirgape torn har thon, Rub igines. Also any wimber of storage e¢ the uscr organization can add their own storage engine. The thread-based and hence it is very fast, The joins, temporary ized way. SQL functions are implemented through a highly as fast as possible. ‘They are: signed/unsigned integers |, 2, 3, 4, and 8 ‘TEXT, BLOB, DATE, TIME, DATETIME, Unit-5 ON-LINE APPLICATIONS = , YEAR, SET, and ENUM types. The records also supports fixed-length and n that js very flexible and secure, apd allows host-based 1 16 columns or parts Gf iMay connect t0 the MySQL server using TCP/P sockets on any platform. Ox in the NT family (NT, 2000, or XP), clients may connect using named pipes. Os (elients may connect using Unix domain socket files. The Connector/ODBC MySQL support for client programs that use ODBC (Open-DatsBase- ections, All ODBC 2.5 functions are supported, as are many others. several different character sets that provide error messages to clients ia can be saved in the chosen character set. All comparisons for normal st myisamehk, a very fast command-line w tables. which are working along with the customer unit : SQL Secvs-enables 1c deny Se cise. ay a yes the activities of the Web users. documents ctc can be easily stored and located in the other servers which is very much immporiant 19 tacking 18 «different security events and additional suo-évents; support for file and rietwork enccyption, including Secure Socket Layer (SSL), Kerberos, ang rfoums. several operations to_keep ilselisyned,, SOL Server 2000 also provides , 10 monitor the circumstances under which automated management tasks are 4S changes in dita tiles and log tiles. Developers, in wun, can troubleshoot Hing these evens on a production syste: and replaying them on @ test system, can: also create applications thar use SQL Protiler stored procedures to ment of the operational characteristics of SQL Server. Providers often host multiple applications on a single server, This requires instances 0° SQL Server 2000. Multi-instance support provides greater cation Service Providers, and any enterprise with tightly constrained hardware hg multiple, independent installations of SQL Server on the sarrie machine. This ‘an application affecis the performance of a database. O delivers features for accessing data stored in SQL Server databases and OLAP Web. These features ‘ensure that data is available through intuitive. user access Using a Uniform Resource Locator (URI) by several different sc d with an instance of SQL Server 2000. ‘The queries can be executed "Access the database tables directly iusing the XPath etc. end systems and data transier across firewalls using XML. gi up to 32CPUs and 64 Gigabytes of RAM. , transform, and load data trom heterogeneous sources to native heterogencous sources. ay) handheld .!evices like Windows CE device femtures for replication services of merge, transactional and 402 Unit-5 (ON-LINE APPLICATIONS al a ote ste deploy the following features, which sill KeeP stem Faults und Crashes: etion is enabled by deploying the follwing rm eat " fr Seigation Clusters binds the processing power O provicles Availability (provides near ‘continuous access hee nre und software component Failures), Scalability and 1 ws 4 otd PAR from Application sud Middleware Failures: weld ,& like Pane on Monitor Support _Message. Oxiented fleware and Oracle et ind middleware failures. echanismns: multiple interconnected to data with minimal Manageability. fect from application a Application Fuilover_( mechanisms are used to protect from network 4 duit ‘nica... cleta peeealy a comprehensive syite of security, feat to protect enterprise networks FORpUUNE MeIworks to the internet. The Oracle ‘Advanced Security option To the security of distributed environments, providing data integrity. data inistrator to as: only-those privileges. required to. do their ‘does not require permission to drop a table, they need not be given the therefore cannot accidentally loose a valuable table. In addition aecess control, protecting data from unauthorized users regardless 0! ariel) of routine mnainuenancs. activi Vities with ekupS can be taken while the database ison! is online SRECE'OF ininy operations that are : ‘bulk data to be unaffected during maintenance. In addition, partitions enable E: ‘Oracle9i to use parallel execution to perform most operations much faster. Another benefit of Partitions is fault containment. A failure, such as a media failure or corruption, is contained to Partitions resident on the failed disk. Only that partition is affected and needs to be recovered. ‘This not only reduces the time to recover, but allows the other unaffected partitions to remain ‘online while the failed partition is recovered. (ix) New Deployments: Oracle provides the ability 10 gracefully failover to another node in a clustered database. environment using 'the SHUTDOWN TRANSACTION and Transparent Application Failover, Oracle also “para Stipports Compatibility pardimeters to ensure an easy fall-back to a prior release is Possible. new feature in OracleSi that allows a user to maye eon 8 to another Oracle9i database, Transporting a tablespace from one” be orders-of- tude “Faster than’ either exporvimport or’ unload/oad copying data files and integrating metadata. WA Unlt-5 ON-LINE APPLICATIONS 404 ) “ea lon) pilundin for ceecacery mo 53. Monitoring User Event (mamulonong ie e + of recording the setivities of a user at the system for sea user events isthe proce S31 of User Event Monitoring: of user events is |important due to the following reasons Aked PTH cessity (0 bill o company B based on their usage statistics by ‘A which is actually owning the server Hence. the usage statistics has ja be measured wh” Passume that company A actually hosts 2 websites for 2 different companies on a Let the ollier company be, say company C. Billing on a flat rate, say Rs x/- per semper Band C is a simple option ny C isa high profile company, Hence the number of hits of company bits for Company B {problem may be solved if billing 1s done on the basis like Number of hitts*cosvhit Henee, it becomes necessary. to monitor the traffic on the web server based on HMlatabase access traffic has gone high and the company is "al the server. If it is found that the traffic is higher than the threshold fake a decision to distribute the database by making it reside on multi oring is necessary enis of a database are taken backup by a backup administrator ator Wants to make sure that the activity is going on fine of User Events Monitoring: 2 ‘can be monitoring at the following places | Web Server, Database Server, Proxy servers, Client eic.., + (Using SQL Profiler): PeemnaeBorve\Usine 901 Potter: lick on etc... so that the website may be restructured to suit the actual taste of the real time monitoring is the best option. jors to mon: ents in en }QL Server table to see which stored pe pers ce by cxecuting 100 slowly. The interested events can also be faces arc becoming 100 large, filter them based on the required information, so that the event data is coliested. events adds overhead 10 th nd the monito pow very large, especially when the monitorin; 2s g After events have been QL Profiler allows captored 7 Bae am instance of SQL Server, thereby effectively re-executing the Deen riinally. The result of the trace can be stored in a file. The sive of ine events and produces the following results: ext data performed Aabe (O42 1, af, ithas been executed mame ~~ 4 etc. it iS easy 10 trace the anon “ yMOuS access 0 monitor the events that is happen the database. Also ing between Various | he wace result according to the selected. So the result of the Mentioned trace results it also 406 y ObjectType OwnerName Permissions RoleName ServerName Severity State Snecess ‘TargertLoginName.. TargertLoginSid TargertUserName PexeData TransactionID Writes 407 it out: Check out the similar user ser event monitoring feaies peseain other RDBMS like Oracle, MySQL etc.. Seen Sere Ame > __ Similar to the database server, web server events can be monitored by the Log File generated by, the HIS $.0. The web sites that are being viewed by the various user agents Can be logged. The a following details: Date 2 Service Name (Web site) Time +. Computer Name Server, Client IP address © Win-32 Status Port Address —* Bytes Seat * Bytes Received © Time Taken © Protocol, Version cots (Browser details) | © Referrer that can be logged are: eviak UnitS . ON-LINE APPLICATIONS emacs eget Wt outs Check oot the similar user event monitoring features present in other Linux based web servers like Apache, Tomcat etc... $.3.2.4 Monitoring Events at indies Ste) Sometimes, the client can be askedo installa utility in his premises, ene, the actions: by the client and intimates the server in case of abnorm: ti ie to VarIGUS: ‘Security sy this is very rarely used as there are numerous chane¢s of malicious usage like recording credit card numbers and passwords using key stroke logging. ‘On that'case, the program ‘iscalled a “Trojan”. Hence this technique is very rarely used. Rebs tueac tmery -browser to eged-tn-dawnloadable files withthe specific pligain— these programs were known as shelpér applications" window .A Dingsin-spplicaiion is recognized automatically ications are not supplied with your Web an extra service, WWW-pages with plugs ‘Where the plug-in can be downloaded, displayed” in applications available an be easily integrated with ? component(ActiveX any user-defined , like Visual Basic. Ze ssn the Activex. component | for the calendar control is 1264-101C-8, e-id is unique and global and is generated * the manufacturing 5 the Active-X plugin. - e| | a! you selected is less than current Date and it is’ "you selected is greaterthan current Date and it is” a. i pase sb Fa method called Elug-in, eae ie OLE View (This utility is | y is | ). Select Co-create or example the syllabus ae the subjects wil Fin the web page as follows pal be in the browser itself. file should be available in the web application in the specified path. | [kes fe) plugcin application of the Sun Microsystems. Novmally Applet(will be cles) the web page SE Tollows Unit-5 ON-LINE APPLICATIONS 412 Shockwave 4 inbaniive pms « Lig a Series of aaieaee players (Flash, Director i om Authorware) "Content-type" content=" Mlash Mleftmargin=0 > | cellspacing="0 "border-collapse: collapse” |. 100%" id="autonumber! 37"> \- ” height="160"> id:d27edb6e-ac6d-} 1ef-96b8-444 553540000" load. macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0 00" height="150" id=shockwaveflash> value="Imgemnino.swi"> value=high> sre="img/banner.swf" quality=bigh -macromedia.com/shockwave/download/index.cgi?p}_prod_version=sho on/x-shockwave-flash” width="800" height="150"> or="#99ccff" height="276"> bed the flash file in the html web page and make your web page more one. int that is used to play any audio or video files. | farly_asing” me previous veenniques. MEGS & Be oral oe neste ning pt 112-BOF6-111D0-94AB-0080C74C7E95S" "299" VIEWASTEXT> grating still and s. Wea extensively discussed in ASP part of the Unit 4 iP Part. Please refer to Unit-4 for further details. in this world. Internet provides the . The various communication services aa Unit-S perween Internet users E-mail transmits ‘and send emails 10 anyone, E-mail is the widely used ‘commutnieation service v o computers. Users login tO theic mailcid an sie aly the message alone but also E ‘of files in the ernail: The signatures canal ibe attached at the of einails, met e by using email see Th =n a subscriber send to all the subscribers again distribute to all the 180 The ag its own email _d rs, abe mailing send reply message ' jion continves. jin yahoo groups, it is possible to create our own list Bae aie railing list. By sending e-mails to that address, he email to the subscribers int that list address. 10 the list address in it the mailing a ticles or-postings)- Like a world wide replied to that and: also new between mailing lists and the newsgroup is tag snyone.can read the ashes ot $0 ssage. jn mailing list only subscriber c 2E0. Aical system of words, separated by dots The y (or hierarchy) in which the newsgroup falls names by using the hierarc! roup name indicates the catego" topic is as follows. ‘Table 5.1 ‘Topics of USENET Software, networking and | Comp. systems d topics Ir will not be suitable to | Mise.education News. internationalpolitics Rec.stampcollection Sci.* Soc.religion Talk.trends Biz.products i I nemesis ae , ow Insemet enables « group of poopie to cummumicane urges ue whit Sar pclae sty oe locaned im any commer of the world. This group cantmuinnasion can Oa en ca Sat seme Sy ee [im et repens The pe of comes cle ts se conferencing ‘The vanous types of chatweonlerencing services ace (1) insernet Ratay Chas (RC) URC atows sewers: leneanes east) penne = eaten tent based chat The IRC program is colimected (© 4 Gemtral URC sere! ail cumremanas Somme Bach conversation ws called ss chamnet webtses provide ther: owe NEE @ Wrymenromcar ces BgF The monje tag or Vatest culling Cope b serives. ye S Teady to customize the mail box of on if he is ready to pay for that. f Clients may wish to access the same web site from a wide ‘Smart phone etc... The web site si -orporating the necessary inlerface.

You might also like