Professional Documents
Culture Documents
Learner Resource
Learner Resource
LEARNER RESOURCE
This material is developed by Enhance Your Future Pty Ltd for Australian Institute of
Science and Technology (AIST)
This unit describes the skills and knowledge required to keep up-to-date and apply
emerging web technologies.
You should read through this resource to develop your knowledge in preparation for
your assessment. At the back of the resource are a list of references you may find useful
to review.
As a student it is important to extend your learning and to search out textbooks, internet
sites, talk to people at work and read newspaper articles and journals which can provide
additional learning material.
Your trainer may include additional information and provide activities, PowerPoint
slide presentations, and assessments in class to support your learning.
Your performance and knowledge using written and practical activities that
apply to a workplace environment.
Your ability to apply your learning to the workplace.
Your ability to recognise common principles and actively use these on the job.
You will receive an overall result of Competent or Not Yet Competent for the assessment
of this unit. The assessment is a competency based assessment, which has no pass or
fail. You are either competent or not yet competent. Not Yet Competent means that you
still are in the process of understanding and acquiring the skills and knowledge required
to be marked competent.
All of your assessment and training is provided as a positive learning tool. Your
trainer/assessor will guide your learning and provide feedback on your responses to the
assessment. For valid and reliable assessment of this unit, a range of assessment
methods will be used to assess practical skills and knowledge.
Written Activity
Case Study
Observation
Practical tasks
Short answer questions
Third Party Report
Developed by Enhance Your Future Pty Ltd 6
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
The assessment tool for this unit should be completed within the specified time period
following the delivery of the unit. If you feel you are not yet ready for assessment,
discuss this with your trainer/assessor.
To be successful in this unit, you will need to relate your learning to your workplace.
You may be required to demonstrate your skills and be observed by your assessor in
your workplace environment. Some units provide for a simulated work environment,
and your trainer and assessor will outline the requirements in these instances.
2. Implement new 2.1 Create the code to apply the web technology
web technology
trends in a 2.2 Test the web application in a variety of browsers, and rectify
portfolio any problems that arise
Performance Evidence
Evidence of the ability to:
Note: If a specific volume or frequency is not stated, then evidence must be provided at
least once.
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
Outline the principles of the internet and the technologies that underpin its
existence
o Stateless programming
o Session management
o Client-side programming
Identify the sources of information regarding new and emerging, trends and
technologies.
A development environment
A server
A database server
The internet
Browsers.
PRE-REQUISITES
This unit must be assessed after the following pre-requisite unit:
This unit describes the skills and knowledge required to keep up-to-date and apply
emerging web technologies.
Let’s begin!
Web technology
Web technology refers to any hardware or software items that are associated with the
web application and website development processes that may be applied within an
organisation.
Developed by Enhance Your Future Pty Ltd 12
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Conduct reviews into new developments in web technology
It is important that detailed reviews are conducted into any new developments in web
technology so that these can be explained to the client and then potentially integrated
into the client scenario.
Personal contacts
Books
Journals/magazines
Newspapers
Commercial databases
Industry news
General news
Competitors
It is important to make sure that competitors are monitored for the types of technology
that they are using and applying as this will become the expected level of technology
application by consumers.
Internet of things
The internet of things is an area of new technology and development within web
application development, and it involves the connection of web applications to devices
in the home and the voice automation and control of these items.
There are many applications of this type of technology and these include:
Smart homes
Automated services
Chatbots
While chatbots have been around for a while new chatbot technology means that the
chatbot is more intuitive and responsive and therefore can be relied upon more heavily.
Motion UI
Motion UI refers to motion interaction meaning that as a user interacts with a website, it
will move and become more fluid to engage and capture the attention of the users by
using motion to engage different components of the mind.
Be concise
The most effective and easily understood information is clear and succinct. Long winded
explanations and wordiness only distract from the intent of the explanation and
interpretation of the information and its subject.
Provide a conclusion
It will be necessary to consider all current web technology applications and then to
evaluate the web application against the current trends in web technology to make sure
that appropriate selections can be made.
The analysis will involve the identification of a range of sources of information, the
collection of information from these sources and then the investigation and organisation
of the results in a manner that can be used to complete the design phase of the project.
The key phases and principles that are included in the analysis include:
Some of the activities that need to take place during the design phase are:
Design the application
Design and integrate the network
Design and integrate the database
Create a contingency plan
Start a Maintenance, Training and Operations plan
Review the design
Articulate the business processes and procedures
Establish a transition strategy
Deliver the System Design Document
Review the final design
1
1
https://en.wikibooks.org/wiki/Systems_Analysis_and_Design/Introduction#Analysis
Developed by Enhance Your Future Pty Ltd 19
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Web competition is extremely high, and there is an ocean of sites out there, it is
important to make sure that the client sites that are created are compliant with the
trends so that they are able to maintain their popularity and competition against the
other players in their field.
Does the web application take advantage of the new technology trends?
Does the application of these trends enhance the application and the potential
for user engagement, satisfaction and integration?
How can we adapt our current platforms to include these technology trends?
Security requirements
Actions to be conducted
The following concepts and consideration will need to be applied during coding:
IF-THEN statement
The IF-THEN statement can be used to determine whether a particular condition is true
or false. It can be set up so that if a particular statement is true then a particular action
will be taken and vice versa.
IF-THEN-ELSE statement
The IF-THEN-ELSE statement can determine if the statement is true and then chose an
action to take in that case or else in another case take a different course of action.
Object-oriented programming
Object-oriented programming is a programming concept that is based on the
management of “objects” which contain data which is the form of fields known as
attributes and code. Objects can be then programmed with a range of variables that will
define how the objects relate to and interact with each other.
2
https://cdn.instructables.com/F1N/X1IH/HMMFA53Q/F1NX1IHHMMFA53Q.MEDIUM.jpg
3
https://www.webopedia.com/TERM/O/object_oriented_programming_OOP.html
Developed by Enhance Your Future Pty Ltd 23
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
An object-oriented programming language is object based and relies on the identity and
then behaviours of objects that are created along with a range of executable script in
order to enable full functionality across the application.
Java
Python
C++
Visual Basic.NET
Ruby
Client-side programming
Client-side programming is the range of scripts that will run on the client side of the
interaction these are the items that operate within the browser and make requests from
the browser to the server to make sure that the server information is able to be
provided to the browser and the user.
It is the program that runs on the It is the program that runs on server
client machine (browser) and deals dealing with the generation of the content
with the user interface/display and of web page.
any other processing that can happen 1) Querying the database
on client machine like reading/writing
cookies. 2) Operations over databases
3) Access/Write a file on the server.
1) Interact with temporary storage 4) Interact with other servers.
2) Make interactive web pages 5) Structure web applications.
3) Interact with local storage 6) Process user input. For example, if user
input is a text in the search box, run a
Developed by Enhance Your Future Pty Ltd 24
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
4) Sending request for data to the search algorithm on data stored on the
server server and send the results.
5) Send request to the server
6) work as an interface between the Examples :
server and the user The Programming languages for server-
side programming are :
The Programming languages for client- 1) PHP
side programming are : 2) C++
1) Javascript 3) Java and JSP
2) VBScript 4) Python
3) HTML 5) Ruby on Rails
4) CSS
5) AJAX Refer PHP articles for example server
side codes.
4
4
httpso://www.geeksforgeeks.org/server-side-client-side-programming/
Developed by Enhance Your Future Pty Ltd 25
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Test the web application in a variety of
browsers, and rectify any problems that arise
Once the web application has been coded, and the new technology has been included it
will be necessary to make sure that the web application is tested in a variety of browsers
and that any problems that arise are rectified according to the needs of the project, the
client and the application.
HTML viewers
HTML viewers can be used to display the content of the web document onto a browser
to ensure that is displayed as planned and that all functionality is working correctly.
Debugging
Coding alterations
Further testing
In the 90s peer to peer or P2P communication what developed, and this formed the
basis for the internet that we have today.
The internet is one of the most effective and prolific communications systems that the
world has ever seen and is used to communicate:
Data
Voice
Videos
Photos
Documents
Millions of storage and hardware devices and programs operate simultaneously on the
internet to enable it to operate effectively.
HTTP provides requests and responses that can be used between servers and browsers
used to perform web application functions such as access and authentication.
5
https://blogs.bmc.com/wp-content/uploads/2018/06/osi-model-7-layers-1024x734.jpg
Developed by Enhance Your Future Pty Ltd 29
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Examples of HTTP:
Stateless programming
6
https://image.slidesharecdn.com/http-150115004903-conversion-gate01/95/hypertext-transfer-
protocol-7-638.jpg?cb=1421288295
7
https://www.researchgate.net/profile/Christoph_Friedrich/publication/320479973/figure/fig1/AS:551
535285370881@1508507667561/The-Hypertext-Transfer-Protocol-HTTP-and-Hypertext-Transfer-
Protocol-Secure-HTTPS.png
Developed by Enhance Your Future Pty Ltd 30
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Computers or programs can be either stateful or stateless, and these different states
describe whether the program or computer are designed to record and remember
preceding events that make up a sequence of interactions with another computer,
program or user.
Programs and computers that are designed to be stateful will keep track of the
interaction states through the setting of a range of values in a designated storage field.
Stateless programs and computers will not record any information in relation to these
previous interactions which means that when a request is received that it can only be
actioned based on the information that is sent along with the request.
Stateless and stateful programming are defined based on the usage that they apply to
the state as a set of conditions that apply to a particular time moment.
An example of stateless programming and interaction is those that are created using the
internet protocol or IP. This means that the internet is generally stateless in its makeup.
When packets are transmitted across the internet, they are generally sent without
making any reference to any other packets. When a webpage is requested by entering
the websites URL into a browser, the request will be sent in one or more individual and
independent packets according to the IP protocol. The TCP layer of the internet will
relate the packets to each other by using information internal to the packets, not
information that has been attached to the outside of the packets.
The HTTP governs the communication layer above the TCP/IP, and this is also an
example of stateless programming. When requests are made by a user through the web
browser by inputting a website URL, the request will be sent to the server but without
the placement of markers that enable the server to remember that this request has been
made at a later date.
Servers can be set up to be stateful if this is desired but generally will be stateless when
used for their normal programming purposes.
See the following diagram of the differences between stateless and stateful
programming:
Session management
A session in internet communication is a range of HTTP request and response
transactions that are associated with each other or linked in some way.
Due to the complexity of modern web applications a range of data and variables is able
to be collected during these sessions which can enable the ability to set a range of
conditions that will apply each time the same user accessed the web application for the
duration of the specific session.
The information within this session will provide a further layer of security in addition to
the range of verifications that have been provided earlier and will allow the
maintenance of a secure session without the need for the user to re-verify each time
they make a request to the server due to the information that is being accessed or input
during the session.
8
https://devcentral.f5.com/Portals/0/Users/038/38/38/bifurcated-network-stateful-stateless.png
Developed by Enhance Your Future Pty Ltd 32
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Session management can be described as the rules that govern the interactions that are
conducted between users and web-based applications such as websites. Websites and
browsers both use HTTP to conduct communications. HTTP is stateless, and this means
that each of the transactions that are conducted will be independent of each other. To
combine these transactions into a session that can be managed it will be necessary to
implement capabilities that can be used to link the authentication and access
requirements that apply to use of the application to the session.
This will be done through the use of one of the following methods:
When session management has used a range of analytics, and advanced options are able
to be used in conjunction with the session.
Cookies
A cookie is one method that can be used to ensure that the data will be maintained
between requests during a session. Cookies are small sized files that are stored on the
browser during the session and contain session information. The session data will be
stored on the server. Then when a browser with cookies sends a request to the server,
the cookie information will also be transferred allowing the server to respond each time
with the correct session data as required.
URL re-writing
When using the URL re-writing session management method, a token or parameter will
be added to the end of the URL. This token will contain a name and value pair that are
separated by an equal sign. When the user of the site clicks a particular hyperlink that is
included on the page, these names and value pairs will be passed onto the server, and
the server can be sent to obtain suitable parameter values.
Example:
10
9
https://www.whizlabs.com/wp-content/uploads/2015/11/session-tracking.png
10
https://www.studytonight.com/servlet/images/url-rewriting.jpg
Developed by Enhance Your Future Pty Ltd 34
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Authentication and web security
Authentication is the actions that are taken to identify a user or computer as what it
declares itself to be. Authentication technology and processes are used to make sure the
credentials that are provided by a user or user device match the credentials that have
been stored in a database listing all those devices or users that are authorised to access
a system or server.
Most often each user will be associated with a user ID, and then this will be applied with
an authentication method that is used to confirm that the user that supplied the ID is the
user that is associated with that ID. Often times the item that the user will supply is a
password or a knowledge item such as the answer to questions that only the user would
be able to provide. These knowledge items are referred to as authentication factors.
Once a user, device or process has been authenticated this will enable the user, device or
process to access the items that they have been authorised to access. User accounts will
be set up, and specific permissions and access controls will be granted to the accounts
based on the user ID that is assigned. The authentication component will make sure
that the user that has been provided with the authorisation is the one that will be able to
complete the access based on authentication aspects provided.
This means that even once a user has been authenticated, they may still fail to obtain
access to certain resources or permissions within the system due to the level of access
they have been granted.
Authentication is used within web security management to make sure that systems and
networks are protected using a range of controls, protocols and scripts that are
designed to make sure that only the person that is permitted to obtain access to the
system will.
The most common form of authentication involves the creation of a user account that
will receive a range of manual or automatic permissions and will be associated with an
ID and a password that will need to be provided each time the user wishes to obtain
access to the particular system or resource.
12
https://searchsecurity.techtarget.com/definition/authentication
Developed by Enhance Your Future Pty Ltd 38
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
SUMMARY
Now that you have completed this unit, you should have the skills and knowledge to
keep up-to-date and apply emerging web technologies.
If you have any questions about this resource, please ask your trainer. They will be only
too happy to assist you when required.
Images
“Authentication and authorisation” n.d. Web. 7 Feb. 2019
<http://cdn.differencebetween.net/wp-content/uploads/2017/10/Difference-
between-Authentication-and-Authorization.png>