You are on page 1of 41

ICTWEB516

RESEARCH AND APPLY


EMERGING WEB
TECHNOLOGY TRENDS

LEARNER RESOURCE
This material is developed by Enhance Your Future Pty Ltd for Australian Institute of
Science and Technology (AIST)

Developed by Enhance Your Future Pty Ltd 2


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
TABLE OF CONTENTS
TABLE OF CONTENTS..................................................................................................................................... 3
UNIT INTRODUCTION.................................................................................................................................... 5
ABOUT THIS RESOURCE................................................................................................................................. 5
ABOUT ASSESSMENT..................................................................................................................................... 6
ELEMENTS AND PERFORMANCE CRITERIA..................................................................................................... 8
PERFORMANCE AND KNOWLEDGE EVIDENCE................................................................................................ 9
PERFORMANCE EVIDENCE............................................................................................................................. 9
KNOWLEDGE EVIDENCE................................................................................................................................. 9
ASSESSMENT CONDITIONS.......................................................................................................................... 11
PRE-REQUISITES.......................................................................................................................................... 11
TOPIC 1 – IDENTIFY EMERGING WEB TECHNOLOGY TRENDS AND THEIR USES..............................................12
REVIEW NEW DEVELOPMENTS IN WEB TECHNOLOGY..................................................................................12
Web technology............................................................................................................................................12
Conduct reviews into new developments in web technology.......................................................................13
Identify the sources of information regarding new and emerging, trends and technologies......................13
News and media...........................................................................................................................................14
Competitors..................................................................................................................................................14
Conferences and Expos.................................................................................................................................14
Web technology vendors..............................................................................................................................14
Explain the latest web technology trends, and their application, to a client...............................................14
Internet of things..........................................................................................................................................15
Modular design technologies.......................................................................................................................15
Responsive design technologies to integrate mobile use.............................................................................15
Chatbots........................................................................................................................................................15
Voice search optimisation technology..........................................................................................................16
Motion UI......................................................................................................................................................16
Provide effective explanations to clients......................................................................................................16
Make sure it is logical...................................................................................................................................16
Clearly, state the information and its purpose.............................................................................................16
Be concise.....................................................................................................................................................16
Provide a conclusion.....................................................................................................................................16
Use words and phrases accurately...............................................................................................................17
Break down complex ideas...........................................................................................................................17
Provide the client with the opportunity to ask questions.............................................................................17
IDENTIFY THE APPROPRIATE WEB TECHNOLOGY TO MEET THE NEEDS OF THE WEB APPLICATION................18
Technology to meet the needs of the web application.................................................................................18
Summarise the key principles of analysis and design...................................................................................18
Key principles of analysis..............................................................................................................................18
Key principles of design.................................................................................................................................19
Evaluate a web application, using trends in web technology......................................................................20
TOPIC 2 – IMPLEMENT NEW WEB TECHNOLOGY TRENDS IN A PORTFOLIO...................................................21
CREATE THE CODE TO APPLY THE WEB TECHNOLOGY...................................................................................21
Plan for the selection of the correct type of code.........................................................................................21
Outline programming control structures and object-oriented programming..............................................21
Developed by Enhance Your Future Pty Ltd 3
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Programming control structures..................................................................................................................22
IF-THEN statement........................................................................................................................................22
IF-THEN-ELSE statement...............................................................................................................................22
WHILE and DO WHILE Loops.........................................................................................................................22
Object-oriented programming......................................................................................................................22
Object-oriented programming languages....................................................................................................24
Object-oriented language examples.............................................................................................................24
Client-side programming..............................................................................................................................24
TEST THE WEB APPLICATION IN A VARIETY OF BROWSERS, AND RECTIFY ANY PROBLEMS THAT ARISE.........26
HTML viewers...............................................................................................................................................26
Testing for browsers and platforms..............................................................................................................26
Testing the format of the site content..........................................................................................................26
Operational and display testing....................................................................................................................26
Functional testing.........................................................................................................................................27
Rectify issues found......................................................................................................................................27
TOPIC – 3 REQUIRED KNOWLEDGE............................................................................................................... 28
RESEARCH AND APPLY EMERGING WEB TECHNOLOGY TRENDS....................................................................28
Outline the principles of the internet and the technologies that underpin its existence.............................28
Internet technologies by OSI layer................................................................................................................28
Explain web programming concepts, including:...........................................................................................29
The hypertext transfer protocol (HTTP)........................................................................................................29
Stateless programming.................................................................................................................................31
Session management....................................................................................................................................32
Cookies..........................................................................................................................................................33
URL re-writing...............................................................................................................................................34
Authentication and web security..................................................................................................................35
How authentication applies to web security................................................................................................35
SUMMARY.................................................................................................................................................. 39
REFERENCES................................................................................................................................................ 40
Websites.......................................................................................................................................................40
Images..........................................................................................................................................................40

Developed by Enhance Your Future Pty Ltd 4


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
UNIT INTRODUCTION
This resource covers the unit ICTWEB516 - Research and apply emerging web
technology trends.

This unit describes the skills and knowledge required to keep up-to-date and apply
emerging web technologies.

It applies to individuals who have an understanding of internet technology, are highly


skilled technicians, and have high-level knowledge of the principles of analysis and
design.

No licensing, legislative or certification requirements apply to this unit at the time of


publication.

About This Resource


This resource brings together information to develop your knowledge about this unit.
The information is designed to reflect the requirements of the unit and uses headings to
makes it easier to follow.

You should read through this resource to develop your knowledge in preparation for
your assessment. At the back of the resource are a list of references you may find useful
to review.

As a student it is important to extend your learning and to search out textbooks, internet
sites, talk to people at work and read newspaper articles and journals which can provide
additional learning material.

Your trainer may include additional information and provide activities, PowerPoint
slide presentations, and assessments in class to support your learning.

Developed by Enhance Your Future Pty Ltd 5


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
About Assessment
Throughout your training we are committed to your learning by providing a training
and assessment framework that ensures the knowledge gained through training is
translated into practical on the job improvements.

You are going to be assessed for:

 Your performance and knowledge using written and practical activities that
apply to a workplace environment.
 Your ability to apply your learning to the workplace.
 Your ability to recognise common principles and actively use these on the job.

You will receive an overall result of Competent or Not Yet Competent for the assessment
of this unit. The assessment is a competency based assessment, which has no pass or
fail. You are either competent or not yet competent. Not Yet Competent means that you
still are in the process of understanding and acquiring the skills and knowledge required
to be marked competent.

The assessment process is made up of a number of assessment methods. You are


required to achieve a satisfactory result in each of these to be deemed competent
overall.

All of your assessment and training is provided as a positive learning tool. Your
trainer/assessor will guide your learning and provide feedback on your responses to the
assessment. For valid and reliable assessment of this unit, a range of assessment
methods will be used to assess practical skills and knowledge.

Your assessment may be conducted through a combination of the following methods:

 Written Activity
 Case Study
 Observation
 Practical tasks
 Short answer questions
 Third Party Report
Developed by Enhance Your Future Pty Ltd 6
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
The assessment tool for this unit should be completed within the specified time period
following the delivery of the unit. If you feel you are not yet ready for assessment,
discuss this with your trainer/assessor.

To be successful in this unit, you will need to relate your learning to your workplace.
You may be required to demonstrate your skills and be observed by your assessor in
your workplace environment. Some units provide for a simulated work environment,
and your trainer and assessor will outline the requirements in these instances.

Developed by Enhance Your Future Pty Ltd 7


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
ELEMENTS AND PERFORMANCE
CRITERIA
1. Identify 1.1 Review new developments in web technology
emerging web
technology trends 1.2 Identify the appropriate web technology to meet the needs of
and their uses the web application

2. Implement new 2.1 Create the code to apply the web technology
web technology
trends in a 2.2 Test the web application in a variety of browsers, and rectify
portfolio any problems that arise

Developed by Enhance Your Future Pty Ltd 8


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
PERFORMANCE AND KNOWLEDGE
EVIDENCE
This describes the essential knowledge and skills and their level required for this unit.

Performance Evidence
Evidence of the ability to:

 Research, investigate, and apply emerging web technology trends to a web


application.

Note: If a specific volume or frequency is not stated, then evidence must be provided at
least once.

Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:

 Outline the principles of the internet and the technologies that underpin its
existence

 Summarise the key principles of analysis and design

 Outline programming control structures and object-oriented programming

 Explain web programming concepts, including:

o The hypertext transfer protocol (HTTP)

o Stateless programming

o Session management

o Authentication and web security

o Client-side programming

Developed by Enhance Your Future Pty Ltd 9


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
 Explain the latest web technology trends, and their application, to a client

 Evaluate a web application, using trends in web technology

 Identify the sources of information regarding new and emerging, trends and
technologies.

Developed by Enhance Your Future Pty Ltd 10


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
ASSESSMENT CONDITIONS
Gather evidence to demonstrate consistent performance in conditions that are safe and
replicate the workplace. Noise levels, production flow, interruptions and time variances
must be typical of those experienced in the website technologies field of work, and
include access to:

 A development environment

 A server

 A database server

 The internet

 Browsers.

Assessors must satisfy NVR/AQTF assessor requirements.

PRE-REQUISITES
This unit must be assessed after the following pre-requisite unit:

There are no pre-requisites for this unit.

Developed by Enhance Your Future Pty Ltd 11


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
TOPIC 1 – IDENTIFY EMERGING WEB
TECHNOLOGY TRENDS AND THEIR
USES
Welcome to the unit ICTWEB516 - Research and apply emerging web technology trends.

This unit describes the skills and knowledge required to keep up-to-date and apply
emerging web technologies.

It applies to individuals who have an understanding of internet technology, are highly


skilled technicians, and have high-level knowledge of the principles of analysis and
design.

No licensing, legislative or certification requirements apply to this unit at the time of


publication.

In this unit you will learn how to:

 Identify emerging web technology trends and their uses

 Implement new web technology trends in a portfolio

Let’s begin!

Review new developments in web technology


It is important to set up a program that means that the organisation will regularly
review any new developments that have occurred within the area of web technology.

Web technology
Web technology refers to any hardware or software items that are associated with the
web application and website development processes that may be applied within an
organisation.
Developed by Enhance Your Future Pty Ltd 12
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Conduct reviews into new developments in web technology
It is important that detailed reviews are conducted into any new developments in web
technology so that these can be explained to the client and then potentially integrated
into the client scenario.

Reviews will need to identify:

 New and emerging development in web technology

 Applications of these developments

 Suitability for integration with client sites and apps

Reviews should involve the following steps:

Identify the sources of information regarding new and emerging,


trends and technologies
It is important to identify a range of sources of information regarding new and emerging
trends and technologies that may be applied are able to be identified.

Information sources that could be researched include:

 Personal contacts

 Books

 Journals/magazines

 Newspapers

 Professional conferences/ meetings

 Radio, television, internet

 Commercial databases

Sources of information on new and emerging trends in web technology include:

Developed by Enhance Your Future Pty Ltd 13


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
News and media
It is important to stay abreast of the news and media sources that apply to the industry
so that any new developments are able to be identified so that further investigation can
be applied.

News and media could include:

 Industry news

 General news

 Reports from universities

Competitors
It is important to make sure that competitors are monitored for the types of technology
that they are using and applying as this will become the expected level of technology
application by consumers.

Conferences and Expos


Industry conferences, expos, awards and a range of other industry events are excellent
sources of information that can be used to obtain up to date information about
technology developments that apply to web design and web application development
and should be monitored and attended as much as possible.

Web technology vendors


The sellers of web technology are an excellent source of information on technology and
advancements that are currently available and being developed now; it is important to
maintain contact with and conduct research into vendors in the industry and technology
area of interest.

Explain the latest web technology trends, and their application, to a


client
It is important to be able to explain the latest web technology trends and their
applications to a client.

Developed by Enhance Your Future Pty Ltd 14


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Web technology trends and applications include:

Internet of things
The internet of things is an area of new technology and development within web
application development, and it involves the connection of web applications to devices
in the home and the voice automation and control of these items.

There are many applications of this type of technology and these include:

 Smart homes

 Voice and internet connected devices

 Automated services

Modular design technologies


Modular design technologies enable a range of modules or components to be used to
develop web pages and applications that can be put together in any format meaning that
the previously used template model for applications and pages is becoming less
commonly used. Applications include both web page and web application development.

Responsive design technologies to integrate mobile use


Responsive design technologies that integrate mobile use are those that develop web
and mobile sites as one instead of developing a web site for a computer browser and
then enabling it for mobile, this is allowing for more streamlined and responsive
development that means that sites are web and mobile-ready straight away. The
application of these technologies means that fewer errors and lower development costs
are able to be maintained.

Chatbots
While chatbots have been around for a while new chatbot technology means that the
chatbot is more intuitive and responsive and therefore can be relied upon more heavily.

Voice search optimisation technology


Developed by Enhance Your Future Pty Ltd 15
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Voice search optimisation technology is on the rise to be included in websites and
browsers to enable users to search using voice input instead of typed input as was
previously the most common.

Motion UI
Motion UI refers to motion interaction meaning that as a user interacts with a website, it
will move and become more fluid to engage and capture the attention of the users by
using motion to engage different components of the mind.

Provide effective explanations to clients


It is important that effective explanations are provided to clients and this can be
achieved using the following guidelines:

Make sure it is logical


Information communicated in a logical sequence is less confusing and easier to
understand. Explain the idea or information from start to finish in order.

Clearly, state the information and its purpose


When explaining ideas and information, it is important that you clearly state the
purpose and identify the subject and objectives of the content. Do not expect a person
with whom you are explaining information to, to have to extract this information
themselves.

Be concise
The most effective and easily understood information is clear and succinct. Long winded
explanations and wordiness only distract from the intent of the explanation and
interpretation of the information and its subject.

Provide a conclusion

Developed by Enhance Your Future Pty Ltd 16


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Once you have explained your idea or information, then provide a conclusion at the end
and restate the objective and what it is you would like to achieve the explanation and
interpretation.

Use words and phrases accurately


Make sure that all of the words and phrases used in your explanation are used correctly.
Using words or phrases incorrectly can change the tone and message that you are trying
to convey.

Break down complex ideas


When explaining or interpreting a complex idea or piece of information, it is most useful
if you break down your explanation into manageable pieces, this will enhance the clarity
of your information.

Provide the client with the opportunity to ask questions


It will be necessary to ensure that clients are provided with the opportunity to ask
questions and seek further assistance in relation to the items that have been explained.

Developed by Enhance Your Future Pty Ltd 17


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Identify the appropriate web technology to meet
the needs of the web application
It is important to make sure that appropriate web technology to meet the needs of the
web application is able to be identified.

It will be necessary to consider all current web technology applications and then to
evaluate the web application against the current trends in web technology to make sure
that appropriate selections can be made.

Technology to meet the needs of the web application


Technology to meet the needs of the web application is those that are identified during
the analysis and design phases as being suitable in meeting the organisational goals and
requirements that apply to the development of the application.

Consider the following factors:

Summarise the key principles of analysis and design


It is important to be able to summarise the key principles of analysis and design so that
these can be applied to web technology applications and research.

Key principles of analysis


The analysis phase in systems and web development is applied before the system is
designed and involves the gathering and understanding of the requirements of the item
that is to be designed.

The analysis will involve the identification of a range of sources of information, the
collection of information from these sources and then the investigation and organisation
of the results in a manner that can be used to complete the design phase of the project.

The key phases and principles that are included in the analysis include:

 Gather initial information


Developed by Enhance Your Future Pty Ltd 18
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
 Define the system requirements from the assessment of information gathered

 The development of prototypes

 Requirements prioritisation activities

 Evaluation of the alternatives and options developed

 Selection of alternatives and options based on set criteria

Key principles of design


The design phase involves the actual planning and creation of the physical item or
program. There is a range of phases that are included that make up the principles of
design, and these include:

Some of the activities that need to take place during the design phase are:
 Design the application
 Design and integrate the network
 Design and integrate the database
 Create a contingency plan
 Start a Maintenance, Training and Operations plan
 Review the design
 Articulate the business processes and procedures
 Establish a transition strategy
 Deliver the System Design Document
 Review the final design
1

Evaluate a web application, using trends in web technology


It is important to evaluate the web applications that are developed for clients and
customers using the current trends to make sure that web development that is
completed for clients is staying current with these trends.

1
https://en.wikibooks.org/wiki/Systems_Analysis_and_Design/Introduction#Analysis
Developed by Enhance Your Future Pty Ltd 19
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Web competition is extremely high, and there is an ocean of sites out there, it is
important to make sure that the client sites that are created are compliant with the
trends so that they are able to maintain their popularity and competition against the
other players in their field.

When evaluating a web application using trends in web technology, it is important to


ask:

 Does the web application take advantage of the new technology trends?

 Does the application of these trends enhance the application and the potential
for user engagement, satisfaction and integration?

 Could these technology trends be applied to the client website in a


meaningful manner?

 How can we adapt our current platforms to include these technology trends?

Developed by Enhance Your Future Pty Ltd 20


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
TOPIC 2 – IMPLEMENT NEW WEB
TECHNOLOGY TRENDS IN A
PORTFOLIO
Create the code to apply the web technology
It will be necessary to make sure that the code that will be required to apply the new
technology to the web application is created and implemented into the web application
development process.

Plan for the selection of the correct type of code


It is important to consider a range of factors when selecting the correct code and code
flow for a particular web application, and these include:

 Needs of the web technology item

 Structural complexity or simplicity of the application

 Development timeframe constraints

 Development cost constraints

 The needs for server or client-side scripting

 Security requirements

 Actions to be conducted

 User interaction needs

The following concepts and consideration will need to be applied during coding:

Outline programming control structures and object-oriented


programming
It is important for designers and developers to be able to outline programming control
structures, and object-oriented programming and these are explained below:

Developed by Enhance Your Future Pty Ltd 21


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Programming control structures
Programming control structures are methods that are used to control the flow the of the
code that is created based on a range of parameters that are provided to make sure that
the program can determine the direction that it is supposed to take in relation to the
various options that are provided to it.

Programming control structures that are commonly applied include:

IF-THEN statement
The IF-THEN statement can be used to determine whether a particular condition is true
or false. It can be set up so that if a particular statement is true then a particular action
will be taken and vice versa.

IF-THEN-ELSE statement
The IF-THEN-ELSE statement can determine if the statement is true and then chose an
action to take in that case or else in another case take a different course of action.

WHILE and DO WHILE Loops


A while loop will result in looped actions that occur until a particular pre-set condition
has been achieved. The DO WHILE loop will operate by checking to see if an action is
the case and then to perform another action while this condition exists.

Object-oriented programming
Object-oriented programming is a programming concept that is based on the
management of “objects” which contain data which is the form of fields known as
attributes and code. Objects can be then programmed with a range of variables that will
define how the objects relate to and interact with each other.

Many object-oriented programming languages are class-based and therefore will be


managed using a range of class variables as described in the diagram below:

Developed by Enhance Your Future Pty Ltd 22


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
2

Principles and concepts include:


 Abstraction: The process of picking out (abstracting) common features of objects and
procedures.
 Class: A category of objects. The class defines all the common properties of the different
objects that belong to it.
 Encapsulation: The process of combining elements to create a new entity. A procedure is
a type of encapsulation because it combines a series of computer instructions.
 Information hiding: The process of hiding details of an object or function. Information
hiding is a powerful programming technique because it reduces complexity.
 Inheritance: a feature that represents the "is a" relationship between different classes.
 Interface: the languages and codes that the applications use to communicate with each
other and with the hardware.
 Messaging: Message passing is a form of communication used in parallel programming
and object-oriented programming.
 Object: a self-contained entity that consists of both data and procedures to manipulate
the data.
 Polymorphism: A programming language's ability to process objects differently
depending on their data type or class.
 Procedure: a section of a program that performs a specific task.
3

Object-oriented programming languages

2
https://cdn.instructables.com/F1N/X1IH/HMMFA53Q/F1NX1IHHMMFA53Q.MEDIUM.jpg
3
https://www.webopedia.com/TERM/O/object_oriented_programming_OOP.html
Developed by Enhance Your Future Pty Ltd 23
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
An object-oriented programming language is object based and relies on the identity and
then behaviours of objects that are created along with a range of executable script in
order to enable full functionality across the application.

Object-oriented language examples


Object-oriented programming languages are those which are used in order to conduct
object-oriented programming and common languages are:

 Java

 Python

 C++

 Visual Basic.NET

 Ruby

Client-side programming
Client-side programming is the range of scripts that will run on the client side of the
interaction these are the items that operate within the browser and make requests from
the browser to the server to make sure that the server information is able to be
provided to the browser and the user.

See the comparison table below:

Client-side programming Server-side programming

It is the program that runs on the It is the program that runs on server
client machine (browser) and deals dealing with the generation of the content
with the user interface/display and of web page.
any other processing that can happen 1) Querying the database
on client machine like reading/writing
cookies. 2) Operations over databases
3) Access/Write a file on the server.
1) Interact with temporary storage 4) Interact with other servers.
2) Make interactive web pages 5) Structure web applications.
3) Interact with local storage 6) Process user input. For example, if user
input is a text in the search box, run a
Developed by Enhance Your Future Pty Ltd 24
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
4) Sending request for data to the search algorithm on data stored on the
server server and send the results.
5) Send request to the server
6) work as an interface between the Examples :
server and the user The Programming languages for server-
side programming are :
The Programming languages for client- 1) PHP
side programming are : 2) C++
1) Javascript 3) Java and JSP
2) VBScript 4) Python
3) HTML 5) Ruby on Rails
4) CSS
5) AJAX Refer PHP articles for example server
side codes.
4

4
httpso://www.geeksforgeeks.org/server-side-client-side-programming/
Developed by Enhance Your Future Pty Ltd 25
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Test the web application in a variety of
browsers, and rectify any problems that arise
Once the web application has been coded, and the new technology has been included it
will be necessary to make sure that the web application is tested in a variety of browsers
and that any problems that arise are rectified according to the needs of the project, the
client and the application.

HTML viewers
HTML viewers can be used to display the content of the web document onto a browser
to ensure that is displayed as planned and that all functionality is working correctly.

Testing for browsers and platforms


It will be necessary to ensure that the HTML and embedded scripts using a range of
different browsers and platforms to ensure that the web document behaves in the same
way on each platform type.

When testing in different browsers, it will be necessary to complete:

Testing the format of the site content


It will be necessary to make sure that the site content is tested in a range of
environments to make sure that the content will format as required and designed in a
range of technical environments that apply to the business and the client.

Operational and display testing


It is important to make sure that operations and display testing are completed to make
sure that the format of the website will not have formatting issues in the range of
technical environments that the organisation requires the website to work within, any
identified issues should be resolved at this point.

Developed by Enhance Your Future Pty Ltd 26


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Functional testing
It is important that functional testing is completed within each of the different browsers
to make sure that all site and application functionality is operational in each of the
browser environment.

Rectify issues found


It is important that any compatibility issues that are identified are able to be resolved
according to the needs of the site and the organisation and this will be through:

 Debugging

 Coding alterations

 Applying new code

 Strengthening the code in the application

 Further testing

Developed by Enhance Your Future Pty Ltd 27


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
TOPIC – 3 REQUIRED KNOWLEDGE
Research and apply emerging web technology
trends
Outline the principles of the internet and the technologies that
underpin its existence
The internet is a network that spans the globe and which uses TCP/IP to communicate a
range of data and media between all of the connected nodes. The internet is strung
together using both caballing and wireless networks and a range of different hardware
and software components that enable it to operate as required.

In the 90s peer to peer or P2P communication what developed, and this formed the
basis for the internet that we have today.

The internet is one of the most effective and prolific communications systems that the
world has ever seen and is used to communicate:

 Data

 Voice

 Videos

 Photos

 Other media forms

 Email

 Documents

Millions of storage and hardware devices and programs operate simultaneously on the
internet to enable it to operate effectively.

Internet technologies by OSI layer


The internet operates based on a range of different layers, and these describe the
different technologies that apply to each layer.

Developed by Enhance Your Future Pty Ltd 28


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
5

Explain web programming concepts, including:


It is important that a range of web programming concepts can be clearly explained, and
these include:

The hypertext transfer protocol (HTTP)


Hypertext Transfer Protocol or HTTP is an application protocol for a range of
information systems including that that is distributed, hypermedia-based and
collaborative.

The HTTP protocol is a fundamental principle of internet communication. The


Hypertext protocols use hyperlinks to be sent between nodes in a network to enable the
development of logical links. HTTP transfers and exchanges hypertext over the
internet.

HTTP provides requests and responses that can be used between servers and browsers
used to perform web application functions such as access and authentication.
5
https://blogs.bmc.com/wp-content/uploads/2018/06/osi-model-7-layers-1024x734.jpg
Developed by Enhance Your Future Pty Ltd 29
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Examples of HTTP:

The position of HTTP in the communication stack:

Stateless programming
6
https://image.slidesharecdn.com/http-150115004903-conversion-gate01/95/hypertext-transfer-
protocol-7-638.jpg?cb=1421288295
7

https://www.researchgate.net/profile/Christoph_Friedrich/publication/320479973/figure/fig1/AS:551
535285370881@1508507667561/The-Hypertext-Transfer-Protocol-HTTP-and-Hypertext-Transfer-
Protocol-Secure-HTTPS.png
Developed by Enhance Your Future Pty Ltd 30
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Computers or programs can be either stateful or stateless, and these different states
describe whether the program or computer are designed to record and remember
preceding events that make up a sequence of interactions with another computer,
program or user.

Programs and computers that are designed to be stateful will keep track of the
interaction states through the setting of a range of values in a designated storage field.

Stateless programs and computers will not record any information in relation to these
previous interactions which means that when a request is received that it can only be
actioned based on the information that is sent along with the request.

Stateless and stateful programming are defined based on the usage that they apply to
the state as a set of conditions that apply to a particular time moment.

An example of stateless programming and interaction is those that are created using the
internet protocol or IP. This means that the internet is generally stateless in its makeup.

When packets are transmitted across the internet, they are generally sent without
making any reference to any other packets. When a webpage is requested by entering
the websites URL into a browser, the request will be sent in one or more individual and
independent packets according to the IP protocol. The TCP layer of the internet will
relate the packets to each other by using information internal to the packets, not
information that has been attached to the outside of the packets.

The HTTP governs the communication layer above the TCP/IP, and this is also an
example of stateless programming. When requests are made by a user through the web
browser by inputting a website URL, the request will be sent to the server but without
the placement of markers that enable the server to remember that this request has been
made at a later date.

Servers can be set up to be stateful if this is desired but generally will be stateless when
used for their normal programming purposes.

See the following diagram of the differences between stateless and stateful
programming:

Developed by Enhance Your Future Pty Ltd 31


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
8

Session management
A session in internet communication is a range of HTTP request and response
transactions that are associated with each other or linked in some way.

Due to the complexity of modern web applications a range of data and variables is able
to be collected during these sessions which can enable the ability to set a range of
conditions that will apply each time the same user accessed the web application for the
duration of the specific session.

The information within this session will provide a further layer of security in addition to
the range of verifications that have been provided earlier and will allow the
maintenance of a secure session without the need for the user to re-verify each time
they make a request to the server due to the information that is being accessed or input
during the session.

8
https://devcentral.f5.com/Portals/0/Users/038/38/38/bifurcated-network-stateful-stateless.png
Developed by Enhance Your Future Pty Ltd 32
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Session management can be described as the rules that govern the interactions that are
conducted between users and web-based applications such as websites. Websites and
browsers both use HTTP to conduct communications. HTTP is stateless, and this means
that each of the transactions that are conducted will be independent of each other. To
combine these transactions into a session that can be managed it will be necessary to
implement capabilities that can be used to link the authentication and access
requirements that apply to use of the application to the session.

This will be done through the use of one of the following methods:

 Cookie-based session management

 URL rewriting session management

When session management has used a range of analytics, and advanced options are able
to be used in conjunction with the session.

Cookies
A cookie is one method that can be used to ensure that the data will be maintained
between requests during a session. Cookies are small sized files that are stored on the
browser during the session and contain session information. The session data will be
stored on the server. Then when a browser with cookies sends a request to the server,
the cookie information will also be transferred allowing the server to respond each time
with the correct session data as required.

Developed by Enhance Your Future Pty Ltd 33


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
9

URL re-writing
When using the URL re-writing session management method, a token or parameter will
be added to the end of the URL. This token will contain a name and value pair that are
separated by an equal sign. When the user of the site clicks a particular hyperlink that is
included on the page, these names and value pairs will be passed onto the server, and
the server can be sent to obtain suitable parameter values.

Example:

10

9
https://www.whizlabs.com/wp-content/uploads/2015/11/session-tracking.png
10
https://www.studytonight.com/servlet/images/url-rewriting.jpg
Developed by Enhance Your Future Pty Ltd 34
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
Authentication and web security
Authentication is the actions that are taken to identify a user or computer as what it
declares itself to be. Authentication technology and processes are used to make sure the
credentials that are provided by a user or user device match the credentials that have
been stored in a database listing all those devices or users that are authorised to access
a system or server.

Most often each user will be associated with a user ID, and then this will be applied with
an authentication method that is used to confirm that the user that supplied the ID is the
user that is associated with that ID. Often times the item that the user will supply is a
password or a knowledge item such as the answer to questions that only the user would
be able to provide. These knowledge items are referred to as authentication factors.

How authentication applies to web security


Authentication is an important and fundamental factor that is related to web security as
it means that organisations are able to keep their information and networks secure by
only allowing trusted users to complete certain actions and to make sure that all access
is controlled by permissions and authentication procedures that are able to be
determined and applied to meet the specific needs of the organisation.

Once a user, device or process has been authenticated this will enable the user, device or
process to access the items that they have been authorised to access. User accounts will
be set up, and specific permissions and access controls will be granted to the accounts
based on the user ID that is assigned. The authentication component will make sure
that the user that has been provided with the authorisation is the one that will be able to
complete the access based on authentication aspects provided.

This means that even once a user has been authenticated, they may still fail to obtain
access to certain resources or permissions within the system due to the level of access
they have been granted.

See the following determination between the two terms:

Developed by Enhance Your Future Pty Ltd 35


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
11

Authentication is used within web security management to make sure that systems and
networks are protected using a range of controls, protocols and scripts that are
designed to make sure that only the person that is permitted to obtain access to the
system will.

The most common form of authentication involves the creation of a user account that
will receive a range of manual or automatic permissions and will be associated with an
ID and a password that will need to be provided each time the user wishes to obtain
access to the particular system or resource.

Other common methods that can be used for authentication include:

 Two-factor authentication -- Two-factor authentication adds an extra layer of


protection to the process of authentication. 2FA requires that a user provide a
second authentication factor in addition to the password. 2FA systems often
require the user to enter a verification code received via text message on a
preregistered mobile phone, or a code generated by an authentication
application.
 Multifactor authentication -- Multifactor authentication requires users to
11
http://cdn.differencebetween.net/wp-content/uploads/2017/10/Difference-between-Authentication-
and-Authorization.png
Developed by Enhance Your Future Pty Ltd 36
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
authenticate with more than one authentication factor, including a biometric
factor like fingerprint or facial recognition, a possession factor like a security key
fob or a token generated by an authenticator app.
 One-time password -- A one-time password is an automatically generated
numeric or alphanumeric string of characters that authenticates a user. This
password is only valid for one login session or transaction, and is usually used for
new users, or for users who lost their passwords and are given a one-time
password to log in and change to a new password.
 Three-factor authentication -- Three-factor authentication (3FA) is a type of
MFA that uses three authentication factors, usually a knowledge factor
(password) combined with a possession factor (security token) and inherence
factor (biometric).
 Biometrics -- While some authentication systems can depend solely on biometric
identification, biometrics are usually used as a second or third authentication
factor. The more common types of biometric authentication available include
fingerprint scans, facial or retina scans and voice recognition.
 Mobile authentication -- Mobile authentication is the process of verifying user via
their devices or verifying the devices themselves. This lets users log into secure
locations and resources from anywhere. The mobile authentication process
involves multifactor authentication that can include one-time passwords,
biometric authentication or QR code validation.
 Continuous authentication -- With continuous authentication, instead of a user
being either logged in or out, a company's application continually computes an
"authentication score" that measures how sure it is that the account owner is the
individual who's using the device.
 API authentication -- The standard methods of managing API authentication are:
HTTP basic authentication; API keys and OAuth.
 In HTTP basic authentication, the server requests authentication information,
i.e., a username and password, from a client. The client then passes the
authentication information to the server in an authorization header.
 In the API key authentication method, a first-time user is assigned a unique
generated value that indicates that the user is known. Then each time the user
tries to enter the system again, his unique key is used to verify that he is the same
Developed by Enhance Your Future Pty Ltd 37
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
user who entered the system previously.
 Open Authorization (OAuth) is an open standard for token-based authentication
and authorization on the internet. OAuth allows a user's account information to
be used by third-party services, such as Facebook, without exposing the user's
password. OAuth acts as an intermediary on behalf of the user, providing the
service with an access token that authorizes specific account information to be
shared.
12

12
https://searchsecurity.techtarget.com/definition/authentication
Developed by Enhance Your Future Pty Ltd 38
ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
SUMMARY
Now that you have completed this unit, you should have the skills and knowledge to
keep up-to-date and apply emerging web technologies.

If you have any questions about this resource, please ask your trainer. They will be only
too happy to assist you when required.

Developed by Enhance Your Future Pty Ltd 39


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
REFERENCES
Websites
“Systems analysis and design” n.d. Web. 7 Feb. 2019
<https://en.wikibooks.org/wiki/Systems_Analysis_and_Design/Introduction#Analysis>

“Control structures ” n.d. Web. 7 Feb. 2019


<https://en.wikiversity.org/wiki/Control_structures>

“Authentication” n.d. Web. 7 Feb. 2019


<https://searchsecurity.techtarget.com/definition/authentication>

“Hypertext Transfer Protocol” n.d. Web. 7 Feb. 2019


<https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol>

“Session management” n.d. Web. 7 Feb. 2019


<https://www.whitehatsec.com/glossary/content/session-management>

“Server side client side programming” n.d. Web. 7 Feb. 2019


<https://www.geeksforgeeks.org/server-side-client-side-programming/>

“URL re-writing” n.d. Web. 7 Feb. 2019 <http://candidjava.com/tutorial/session-


management-using-url-rewriting-servlet/>

“Stateless” n.d. Web. 7 Feb. 2019 <https://whatis.techtarget.com/definition/stateless>

Images
“Authentication and authorisation” n.d. Web. 7 Feb. 2019
<http://cdn.differencebetween.net/wp-content/uploads/2017/10/Difference-
between-Authentication-and-Authorization.png>

“URL re-writing” n.d. Web. 7 Feb. 2019


<https://www.studytonight.com/servlet/images/url-rewriting.jpg>

“Cookies” n.d. Web. 7 Feb. 2019 <https://www.whizlabs.com/wp-


content/uploads/2015/11/session-tracking.png>

“Stateful vs stateless” n.d. Web. 7 Feb. 2019


<https://devcentral.f5.com/Portals/0/Users/038/38/38/bifurcated-network-stateful-
stateless.png>

“HTTP” n.d. Web. 7 Feb. 2019


<https://www.researchgate.net/profile/Christoph_Friedrich/publication/320479973/f
igure/fig1/AS:551535285370881@1508507667561/The-Hypertext-Transfer-Protocol-
HTTP-and-Hypertext-Transfer-Protocol-Secure-HTTPS.png>

Developed by Enhance Your Future Pty Ltd 40


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name
“HTTP” n.d. Web. 7 Feb. 2019 <https://image.slidesharecdn.com/http-150115004903-
conversion-gate01/95/hypertext-transfer-protocol-7-638.jpg?cb=1421288295>

Developed by Enhance Your Future Pty Ltd 41


ICTWEB516 - Research and apply emerging web technology trends Version 3
Course Code and Name

You might also like