Web Application Architecture and Design

Verified

Added on  2020/01/28

|21
|6910
|331
Literature Review
AI Summary
This assignment explores the fundamental concepts of web application architecture, delving into the distinction between client-side and server-side components. It examines various design patterns commonly employed in web development, illustrating their applications through practical examples. The provided resources offer insights into architectural models, security considerations, and best practices for designing robust and scalable web applications.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Web Application
Development

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................4
TASK 1............................................................................................................................................4
P1.1 Functions and advantages of web application.....................................................................4
P1.2 Different types of server-side and client-side scripting languages......................................6
P1.3 Web security........................................................................................................................7
TASK 2 ...........................................................................................................................................9
P2.1 Designing a web application ...............................................................................................9
P2.2 Synthesising client-side and server-side functionality......................................................11
P2.3 Applying database design..................................................................................................12
P2.4 Alternative designs and solutions......................................................................................13
TASK 3 .........................................................................................................................................13
P3.1 Implementation of web application...................................................................................13
P3.2 Implementing web-enabled database management system...............................................14
P3.3 Opportunities for error handling and reporting.................................................................15
TASK 4..........................................................................................................................................16
P4.1 Review and testing of web application..............................................................................16
P4.2 Actual test results analysis.................................................................................................17
P4.3 Evaluating independent feedback and providing recommendations.................................18
P4.4 User documentation...........................................................................................................18
CONCLUSION..............................................................................................................................19
REFERENCES..............................................................................................................................21
2
Document Page
ILLUSTRATION INDEX
Illustration 1: Standard layout of a web application........................................................................9
3
Document Page
INTRODUCTION
Internet is perceived as an open library for collecting information from any part of the
world at any time. The medium through which this data is published is a website or a modified
form that is web application. Business organisations have evolved their marketing strategies by
developing platforms that help in easy transfer of information. Apps can be used across various
devices and operating system depending on their compilation procedure. Languages that are
commonly used for web application development are HTML, CSS or JavaScript. Despite of
these many uses and advantages, it is essential that complete system is secure and functions
smoothly without interruptions from external environment. This report is based on basic
knowledge required for web app.
With help of a developed website, one can achieve the aim of this report which is to
provide specific information regarding various aspects of a web application. The different
languages that are involved while developing client side and server side are also described. Basic
need of technology is to make human work much more simpler and managed. Hence, database
management system will be implemented which is continued by proper evaluation of complete
design output.
TASK 1
P1.1 Functions and advantages of web application
Web application is a computer based software program that is stored in a web server and
accessed by an internet based web browser. It is a modified form of a website. With growing
advancements in internet technology and smartphones, certain interfaces have to be developed in
such a manner that people can access them even without an internet connection. Such platforms
are web applications (Atzori, Iera and Morabito, 2010). Most of these information media are
valid for smartphones that have operating systems like Android, IOS and Windows.
Omnipresence of web applications can be felt very well in 21st century. People are able to
perform their minute tasks with great ease through these applications also known as apps. Web
application development is technique that is used for enhancing web platforms (Bal, 2013).
Functions of Web Application
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Documentation and reporting of various statistical information can be performed
(Hebeler and et. al., 2011).
Businesses can develop their own web apps so that goods and commodities can be easily
purchased and tracked.
Education purposes are fulfilled. Tutorials and online classrooms are easily approached
through web apps.
Daily news and updates are given.
Remote organisational operations are performed online.
Web application helps in developing user profiles. People can visualise their activities
and functions when they use the user profile option. They have the ability to customise
the themes and set up of a web application according to their needs and requirements. Online shopping is an increasing function of web applications. Customers have direct
access to commodities which are sold by companies in their physical stores.
Advantages1. Cost effective: Environment given to users for using a web application is uniform and
similar. This reduces the manufacturing costs of these apps for different platforms. It is
just a one time development and execution.2. Easy access: The viability and usability of these platforms increases due to high
accessibility over various devices. Once an app is registered for a user, he/she can derive
all their information on any other platform by entering respective credentials (Charland
and Leroux, 2011).3. Customisable: People can customise and change their preferences for layout and look of a
web application. This feature helps in gathering more audience.4. Device restrictions are less: Content that has been formulated for a web app can be
customised and connected to any device. It doesn't demand much complex compatibility
features.5. Effortless installation and maintenance: Complications related to installation and
maintenance are minimum. The web server doesn't require to upgrade the software for
every user. Once installed, it runs smoothly for all future customers.
Disadvantages
5
Document Page
Reliability towards internet is very high which makes it non-operational during low
connectivity situations.
Every company that establishes its own web application has a separate server. The
browsing speed for an app will be higher on servers than on other client base.
Security is often at risk when transferring data over an app. It has to be rendered for
improved usage.
P1.2 Different types of server-side and client-side scripting languages
Server-side scripting: Every web page has to be present on a platform that is called
server. All applications and pages are being circulated through servers. The complete process of
interpretation of codes and then execution at user end is performed by server side scripting.
Major languages that are used in this part of development are HTML, ASP, JSP, Perl, Ruby, etc.
The web server plays an important role in delivering data to users. Every potential web
application must have a strong server side scripting (Chess and et. al., 2011). Server side
scripting can be static and dynamic depending on the level and usage of that particular web
application . Static websites do not involve massive user interaction. They are merely a page that
is opened on customer's end so that they can read and grab data. HTML is widely used for all
server side protocols and actions because it is easy to use and execute with better understanding.
The company has used three server side scripting languages that is PHP, Python and C+
+. Since, entire processing and creation of the project is processed in server-side, the developers
must be skilled with these languages.
Client-side scripting: Computer programming is the heart of every web application. This
function is based on concept of dynamism which enables web pages to be scripted and changed
according to manufacturer's convenience (O'connell and Walker, 2010.). This scripting is a set of
instructions that has to be given to user computer with help of a web server. It is accomplishment
of user requests in scripting form which is then interpreted with help of server side. Execution of
web application is not possible without help of both scripting sides. Languages that are majorly
used in client side scripting are HTML or XHTML(Extensible Hypertext Markup Language).
These are often referred to as external scripting language. Internal script may be based on CSS or
JavaScript. Web application will be developed with client side scripting based on use of HTML,
CSS and Javascript.
6
Document Page
Comparison:
There are three situations that can take place when considering information transfer.
These are client to client, client to server and server to server. The nature and mode of transfer is
totally different in all three cases. In client to client protocol, there is exchange of files. A DCC
connection that is direct client to client connection is established which is used for sharing
individual files. On the contrary, client to server is network where users provide a request to the
server. This request is related to web application like searching or opening a page.
Distinctly, the server to server connection is completely different from the above two
types. It is internally used by companies to get analytical data about what amount of installs and
visits have been created for a particular web page. All these three functions are interlinked but
their nature of functioning is different.
P1.3 Web security
With comfort and reliance, comes security. It is essential for every web application to be
secure and safe so that no credentials are lost to fraudster advantages. Web application security is
ensured by information technology software that take care of security and protection of web
services. Hackers are always in search of an opportunity where they can detect a flaw in a
particular website (Kothari, Le and Nydegger, 2010.). Threats like misuse of user data, money
laundering, compromise in network services are faced by web apps. Network security is ensured
by firewall software and encryptions.
Preventive measures for making a web experience more secure and authentic is through
network security. Client side scripting is crucial and most valuable data. The infrastructure is
build on this end. Firewalls control the incoming and outgoing data over the server (Akhawe and
et. al., 2010). Certain security rules have been established by firewall settings which control the
flow of information. Belonging to internal structure of a web application, Firewall is only
accessible by some encryptions.
Encryptions help in making the route of data transfer secure and approachable by only
user and client. It cannot be accessed by third parities or external users. Internet is used by all
types of users. It is most unsafe and insecure platform for data sharing. But firewall encryption
enables good flow of information both internally and externally (Katkar and Kulkarni 2012).
The security standards body that has been functioning currently is OWASP(Open Web
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Application Security Project). It works as a community that provides guidelines and instructions
for creating a safe environment over the internet. After emergence of this body, certain secure
websites have devised a generic agreement which appears every time a person accesses those
websites or apps.
Encryption allows the transfer of data in coded format. It can be decoded only at the other
end of communication. For example, a person requests a company website to show the products
and services it has been giving to customers. This request will be processed under encrypted
code which can be decoded at company server's end. If third party interventions are observed
then, firewall gets activated and no loss of data is observed (Matbouli and Gao, 2012).
Information regarding details of customer and company is to be secured from hackers and
intruders. There are various tools and techniques that can be utilised for improving web security.
Frauds can be in any form. Credit fraud, phishing, hacking, virus attack, etc. Virus attack: Malicious software often gets addressed in some servers and computer
networks that are not encrypted and protected. This software is called as computer virus.
Some of the most common viruses are trojan horses, keyloggers, worms, ransomware,
etc. These are used as a tool to deplete computer functions and disrupt company's
functioning. It also helps in getting private information from receiving side through virus
attacks. Hacking: The process in which a person breaches security features of a network and
takes away all important data for his/her personal use is hacking. Hacking is a cyber
crime and is mainly intended to steal profits and money. Phishing: Email marketing is rapidly increasing. Fraudsters and intruders take this as an
opportunity to obtain private information of targeted person. Phishing is known as this
practise of fraud emails in the name of reputed companies. It is also known as email
spoofing.
Credit Fraud: Credit cards have emerged as an increasing medium for transactions.
Intruders explore this opportunity and transact money from consumers by getting detailed
information about their credit cards.
Apart from encryption and firewall settings, there are some other tools that can be used
for minimising these problems and dangers. Some of them are discusses below:
8
Document Page
VPN: Virtual Private network is a security management tool which enables users to
create a private network over a public or maximum users network. VPN can be used with
help of internet for secure transfer of information and disabling virus attack. Public key: Cryptographic techniques are used for enabling public key. A key generation
program is initiated which provides a public key and a private key. The rights for
accessing these keys is limited to owners only.
Symmetric key and asymmetric key : Symmetric keys are a type of algorithm which is
initiated to secure information of a defined and confined network. Stream ciphers and
block ciphers are certain types of symmetric keys. On the other hand, asymmetric keys
are a pair of public and private keys. It means that when transfer of information takes
place between a public user and private user then asymmetric key algorithms are
initiated.
TASK 2
P2.1 Designing a web application
Web application is an easier approach of companies to gain maximum customers. Certain
specific rules have to be followed for achieving a good user interactive portal.
Reinvention of new patterns must be prohibited or avoided. Users get adapted to
functions and platforms that are quick and easy (Pan, Xiao and Lu, 2010). If same
operating system gets upgraded by engaging into new working techniques then threats of
substitution by other platforms will increase. Hence, design must be based on common
principles and similar working patterns.
Grouping or menu drops must be customised in such a manner that information or
guidelines regarding usage are clearly depicted without any complications.
Communication must be effective. It is important that proposed design is able to
communicate the purpose and objective of company (Erdogan, Meland and Mathieson,
2010). This includes deployment of good scenarios.
Catching and output buffering are a must so that once the web application is installed on
a device then no round trips are made towards web browser and downlink servers. Catch
remains to internal part of software and is a form of temporary data storage.
9
Document Page
The proposed design is a three tier web application. Proper management of all layers can
be done through logging and auditing. This will help in making improvements whenever
suggested.
Encrypting codes when credentials are considered; will provide security to the design.
For example, passwords and authentication rights or cookies have to be encrypted so that
sensitivity is not hindered.
10
Illustration 1: Standard layout of a web application
(Designing Web Applications, 2017)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P2.2 Synthesising client-side and server-side functionality
Architectural design or layout once made has to be synthesised with help of proper codes
and scripts so that end result is similar to the one that is proposed on rough design. Client-side
and server-side scripting is performed as second stage of development process. The client-side
servers are like source generators (Taivalsaari and Mikkonen, 2011). Instructions are formulated
from this end and given to server-side. An interpreter is already installed on servers so that
instructions can be compiled and user demands can be successfully met. Functionality is checked
once a code is executed. Errors are likely to appear after execution. This has to be resolved at
client-end itself. To avoid future consequences, every company provides a development time
period so that users don't find it difficult while interacting.
Server-side functionality is complete responsibility of host server which is assigned by
company for particular regions. Asynchronous messages that are sent by client side are received
at this end. The presence of server-side code helps in creating a dynamic environment between
client and server. Users do not directly interact with clients (Garrett, 2010). This is an
advantageous situation to change and improve internal architecture of web application.
Integration is performed once codes are generated. This step provides a client augmentation
which provides servers information regarding errors.
P2.3 Applying database design
MySQL database can be applied for developing simpler methodologies of web app. Once
the application goes live on internet, then users will fill in their data and credentials. This
information needs to be managed and classified so that chaos is not created when bulk collection
is achieved. Database Management Systems or DBMS is applied to web apps for scaling robust
data efficiently (Satzinger, Jackson and Burd, 2011). The DBMS software that easily integrates
with the coding structure of an app is MySQL community server. This tool has interactive
graphic user interface and is compatible with most operating systems, especially Linux.
Microsoft Access is also a famous tool that can be used for application in DBMS but the
drawback it carries with itself is high purchasing costs. Moreover, flexibility is less with this
software.
Interfaces that are build in an application must be efficient to easily handle bulk data at
every instant (Paterno, 2012). For example, a company launches its app of an online clothing
11
Document Page
store and publishes it to all citizens of UK. With growing publicity and awareness of the
company, audience will increase. This implies more number of users will be able to shop and
track their orders. Being a transactional website, real time interaction will be prominent for
clients. Application of DBMS will help in dealing with these situations. It is mandatory to
involve database so that electronic records can be maintained (Tidwell, 2010). It not only helps
in gathering information about users but also tracks company's movements. If app is subjected to
hacking conditions then, detection of offender becomes easy. Several options like cloud
computing and Big data; which are technological tools for data handling and storage can also be
linked with host servers.
P2.4 Alternative designs and solutions
Designs that are adopted for development of websites into applications must be simple
and easy to operate. Sophistication is an important feature of successful applications. Consumers
are very specific in their choices for professional and sophisticated designs. Colour layout and
minimum layer architecture is the heart of every website. Simple approach to elements makes it
easy for coders to generate codes (Paterno, 2012). Choices must be present but not in vast
number. This creates a lot of confusion and chaos in minds of users.
Technology like hide and conceal can e adopted as a better solution for design. It works
as an elaborative menu bar when mouse is placed on that particular header. It creates
more space and lessens stress over eyes.
Specialised controls can be introduced so that situational handling is best executed. For
example, sliders for navigation and click and drag buttons in search options. This gives
users better hold over little situations.
Disabling pressed buttons is a must to be included in design. Often applications encounter
a problem that is based on submission of forms. Slow loading speeds enable users to
submit particular data twice or thrice. This can be solved by disabling buttons that are
pressed one until result is not depicted (Hubbard and et. al., 2011). This will increase
working efficiency of the project.
Search data must be sensitive to content so that users get desired results for their filled
context.
12
Document Page
TASK 3
P3.1 Implementation of web application
Combined functioning of client side and server side codes gives us a result of website and
web application. While performing the implementation process it is essential that languages that
are used for coding are compatible (Klimushyn, 2015). Servers process the request that is input
by users and client-side is basically browsers like Internet Explorer, Google Chrome, Mozilla
Firefox, etc. Languages that are used for processing web applications is HTML as described
before.
Implementation stage is crucial in web application development. Client-side has to magnify
errors and find proper solutions. Tools like Ajax Control toolkit provide versatile options for
correctly executing the proposed design. Since complete communication process that is
transmission of instructions from server to client and vice versa is asynchronous and random, the
environment must be active and secure.
Aforementioned security measures must also be included in code generation process so
that firewall will be enabled right at the time of testing. This will help in de-hijacking
competitors and hackers. Flexible and simpler designs do not require much server-side
complications (Charland and Leroux, 2011). Client-side scripting itself enables increasing power
of the application. Web browsers are best platforms for checking strength of codes. Quick
responses and faster operational speeds must be the objectives of this implementation process.
Lack of any of the two means a need for changes and improvements.
P3.2 Implementing web-enabled database management system
A database management system is used for keeping records and storing information of
complete organisational activity which can be retrieved at any instance of time. Web enabled
database helps in storing huge volumes of data with cost effectiveness and less manual efforts.
Portability and accessibility increases with use of these tools in web applications (Pan, Xiao and
Luo, 2010). Web Browser client or Java applets are used commonly for this processing. When
data is easily stored and transferred then, flexibility for usage increases. The overall speed of
application doesn't get affected.
Servers and storage systems are two independent entities. Centralised functioning cannot
be supported as web applications have to face continuous shifts between clients and servers.
13

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Hence, MySQL, DB2 or Oracle software tools are adopted for attaining better functioning.
These are specialised for cross platform compatibility and without creating any hindrance in
operation of web application. Biggest advantage of web enabled database management system is
to provide efficient and effective information without delay and fuss that is often created by
human handling (Atzori, Iera and Morabito, 2010). Millions and billions of users get connected
to one particular website at a time. It is not easy to shuffle these many times between client and
servers. DBMS tools help in margining this feature of web applications and provides smooth
operation.
P3.3 Opportunities for error handling and reporting
The development of web applications requires intellectual power to incorporate each and
every information in form of web pages (Adam, 2016). The various number of web pages are
included in collaborative form of website. The errors are incurred in the development of web
applications which is given as below:
Error handling through data flow- The errors are managed while handling the web
application developed by an individual. The errors in this mode are dependent on each other in
order to find the ultimate source which held responsible for creating trouble. The errors are
handled by identifying the loop areas in the coding of the application. The flow of data has
identified to determine the method to resolve the queries (Carroll and Lewis, 2013). The SSIS
package has used to evaluate the data errors in order to handle the data flow from one source to
another. The bad flow of data has determined to process that data into refined data in data flow
techniques. The good source of data is reflected in the green connector and the red connector is
used to indicate the flaws in the data coding. These connectors are used to reach the output which
is in the favor the coder to present good amount of data without any kind of flaws.
Error handling through control flow- The green and the red connectors are framed to
help an individual to manage the errors flowed between the tasks and the containers. The
separation of the rows will help in ascertaining the reasons of occurrence of the errors in the
given set of data. The relationships are formed among several tasks.
Error reporting
Debugging- The data errors identified by applying data flow and control flow systems to
prevent the existing computer system (Dogan, Betin-Can and Garousi, 2014). This is a process
14
Document Page
which helps in determining the problem and errors in order to resolve by determining its root
cause. The identified errors are reported to the officials to take control of all these errors by using
this technique. This refers to that programming language efficiently used to control the central
processing units.
TASK 4
P4.1 Review and testing of web application
The current web application developed by an individual are required to be test before
launching the markets which is given as below:
Application re-engineering- The applications developed by an individual will further
pass to the analysis stage where the whole application has tested on different parameters. The
criteria used for testing is data volume and web traffic attract by these applications (Prilepova,
2014). The logic are also tested for creating the applications as the wrong logic will lead to
demolish of the whole applications. The bug errors are also assessed as the bug free application
will grab higher audiences than its competitors.
Authentication assessment- The authenticity of the application are test on the basis of
regulations and licensing requirements followed by these applications. The application will pre-
launch using virtual assessment techniques.
Session management- It is that mechanism which is used to store information
specifically for different set of users. There are various tools used to test the capabilities of
current application on the basis of cookies, hidden form filed, URL rewriting and Http sessions.
The application will run on the back end by forming servlets to provide the standard information
to various users on their requests by creating unique identity of every users.
Input manipulation- There will be no loop holes found in the coding of the applications
as it will decrease the authenticity of the data recorded (Goldfarb, Hast, Wang and Major, 2014).
The intruders will easily enter and break the servers by manipulated the input of the servers. The
frauds are tested in this phase as the wrong entering of dad will result into wrong output which is
detected at this stage.
Output manipulation- The coding are manipulated which will result into the output of
the application coding. The frauds can be committed in generating wrong output to affect the
15
Document Page
brand image of the company. For instance, the web applications are coded wrong which will
result into bugs and errors to restrict the number of audiences to download the applications.
Information leakage- The web applications are tested on this parameter in which the
technical data are tested in order to ensure its validity before launching the application in the
market.
Code review- It is regarded as one of the important tool or systematic examination in
order to find mistakes and errors which are form part of the applications whether intentionally or
unintentionally.
P4.2 Actual test results analysis
The actual results of the web applications are compared in relation to the two essential
programming approaches in order to assess its true value which is given as below:
Client side scripting- The coding will be viewed by the client on their own browser as
this visible to every visitor who visits the website (Carroll and Lewis, 2013). The focus of the
users is to communicate the client by reflecting the back end calculations in form of visible
codes. The web pages visible to the client are embedded with Hyper text mark up language and
Extensible mark up language. The traditional codes are seen on the server side but with this
unique technology to showcase codes on the client's browser. The supporting elements of these
approaches which helps in showcasing the true performance of an individual in form of coding is
given below:
HTML
CSS
JavaScript
Ajax
Server side scripting- the web development has uses another technique in which the
traditional web application practices in which codes have seen on the server side of the users.
The changes and rectification in the codes of the application can be made from the server side of
the users. The users will customize the website according the needs and the expectations o the
clients by making changes in the existing coding of the applications (Prilepova, 2014). The
features can be added or removed by creating changes according to the client's demands. The
codes prepared by the users are restricted for the visitors as it is not visible to them. The codes
16

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
are easily interpreted by the users who prepared it as the website is the final outcome of the
coding done by the users. There are various factors which held responsible for creating web
scripts which is given as below:
PHP
ASP
Ruby on rails
Python
P4.3 Evaluating independent feedback and providing recommendations
The feedback gathered from wide number of audiences will help users to know the
importance of their developed web application (Carroll and Lewis, 2013). The reviews of the
buyers who download the applications is important as this will encourage the users to launch
new applications in the future. There are various ways in which the feedback can be collected
from various users which is given as below:
Surveys- The web surveys are conducted by the users in order to record the views of a
user in relation to the applications developed by them (Buranarach, 2016). The surveys will
conduct through social media as this place will gather large amount of audiences and the
important information can be conveyed. The reactions can be positive or negative will be
achieved by the users at the same time which saves the time and energy of a user to conduct
singular surveys. The information posted on social media websites is not expensive as it saves
the cost to be incurred by an entity.
Questionnaire- In modern time, questionnaires are supplied to several users in form of
games, posted on social media, advertised through search engine. The SMS marketing can be
used which is less expensive mode to collect reviews.
The feedback and consent of the buyers are collected by applying above modes are
analysed at the same time by prioritizing the feedback into good and bad reviews (Adam, 2016).
The proportion of good and bad views will decide the next step of a user. The bad view will be
used as major approach to re-frame the application according to the audiences and then
implement in the market. The good views will encourage users to add additional features in
specific time interval to remain ahead in the race of gaining popularity among different web
applications.
17
Document Page
P4.4 User documentation
Test plan- This plan has prepared in developing web applications as it involves various
factors in order to deliver right information to the end users. The test data are identified and
analysed in relation to the external market (Luo and Feng, 2016). The expected results that is
popularity gain by this application has judged on the basis of virtual evaluation techniques. The
actual results are compared with the standard results in order to make corrective actions.
Test results- Several factors are used to analyze the existing position of the web
developer in the market in terms of volume of audiences, web traffic, views achieved, number of
downloads and the unique feature included in the existing systems.
Guidance notes- The guidance notes which accompanies with the instruction manual to
guide the users in order to implement the applications.
Help button when introduced over the company website helps customers in many ways.
Some of these benefits are mentioned below:
Navigation becomes easy when help button is provided. People can solve maximum of
their queries with this page on the shopping portal.
It becomes a virtual guide for the customers during their purchase process. Hence, it has
to be essentially included to support consumers at every stage.
Often the customer care portal is not accessible by consumers. In this situation, they can
leave a query or take guidance by hovering over help button. It becomes a temporary
solution for a problem at customer side.
CONCLUSION
Imagining a world without internet is not possible in current age of interactive
technology. Reliance for products that are less technical and more adaptable is increasing. This
led to development of web based applications. The design procedure cannot be started without
proper knowledge about concept of web technology. Through this report, once gets a general
information about web applications. Researchers had started working since 2001 in this field.
Current operating systems have their individual application store where users can access 'n'
number of apps in any category be it education, creativity or official. The report consists of a
web application that is designed for a company. Its specific details help in getting wider
perspective of how an idea is generated into scripted codes which are interpreted in the form of
18
Document Page
app. Knowledge regarding client-side and server-side is provided with a brief description
regarding languages that are used for in development of both ends. With implementation of
database management system, the app gets improvised and implementation becomes easier. In
the final section of this report, every function is evaluated using proper testing and review tools.
This helps in getting overall perception of final output. The procedure from designing to
implementation and evaluation is tracked and documented so that further recommendations can
be easily applied.
19

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and Journals
Adam, S., 2016. Challenges and Techniques for Quality Web Applications.International Journal
of Computer (IJC). 18(1).
Akhawe, D. and et. al., 2010. Towards a formal foundation of web security. In 2010 23rd IEEE
Computer Security Foundations Symposium, IEEE. pp. 290-304.
Atzori, L., Iera, A. and Morabito, G., 2010. The internet of things: A survey. Computer networks.
54(15). pp.2787-2805.
Bal, S. N., 2013. Mobile web–enterprise application advantages. International Journal of
Computer Science and Mobile Computing. 2(2). pp.36-40.
Buranarach, M., and et.al., 2016. OAM: An Ontology Application Management Framework for
Simplifying Ontology-Based Semantic Web Application Development. International
Journal of Software Engineering and Knowledge Engineering. 26(01). pp.115-145.
Carroll, F. and Lewis, R., 2013. The ‘engaged’interaction: Important considerations for the HCI
design and development of a web application for solving a complex combinatorial
optimization problem. World Journal of Computer Application and Technology. 1(3).
pp.75-82.
Charland, A. and Leroux, B., 2011. Mobile application development: web vs. native.
Communications of the ACM. 54(5). pp.49-53.
Chess, B. and et. al., 2011. Client-side caching of pages with changing content. U.S. Patent
7,970,816.
Dogan, S., Betin-Can, A. and Garousi, V., 2014. Web application testing: A systematic literature
review. Journal of Systems and Software. 91(0). pp.174-201.
Erdogan, G., Meland, P. H. and Mathieson, D., 2010. Security testing in agile web application
development-a case study using the east methodology. In International Conference on
Agile Software Development, Springer Berlin Heidelberg. pp. 14-27.
Garrett, J. J., 2010. Elements of user experience, the: user-centered design for the web and
beyond. Pearson Education.
Goldfarb, D., Hast, B. E., Wang, W. and Major, M. B., 2014. Spotlite: web application and
augmented algorithms for predicting co-complexed proteins from affinity purification–
mass spectrometry data. Journal of proteome research. 13(12). pp.5944-5955.
Guthrie, J. L., and et.al., 2016. Technology and tuberculosis control: the OUT-TB Web
experience. Journal of the American Medical Informatics Association, p.ocw130.
Hebeler, J. and et. al., 2011. Semantic web programming. John Wiley & Sons.
Hubbard, D. and et. al., 2011. System and method of analyzing web content. U.S. Patent
8,020,206.
Katkar, S. A. and Kulkarni B. R., 2012. Web vulnerability detection and security mechanism.
International Journal of Soft Computing and Engineering (IJSCE). 2. pp.237-241.
Kothari, N., Le Roy, B. and Nydegger, W., 2010. Initial server-side content rendering for client-
script web pages. U.S. Patent 7,814,410.
Li, L., Zhou, X., Kalo, M. and Piltner, R., 2016. Spatiotemporal interpolation methods for the
application of estimating population exposure to fine particulate matter in the contiguous
20
Document Page
US and a Real-Time web application.International Journal of Environmental Research and
Public Health. 13(8). p.749.
Luo, J. and Feng, H., 2016. A Web-Based Framework for Lightweight Context-Aware Mobile
Applications. International Journal of Database Theory and Application. 9(4). pp.119-134.
Matbouli, H. and Gao, Q., 2012. An overview on web security threats and impact to e-commerce
success. In Information Technology and e-Services (ICITeS), 2012 International
Conference on . IEEE. pp. 1-6.
O'connell, B. M. and Walker, K.R., International Business Machines Corporation, 2010. Web
browser-based programming language error determination and reporting. U.S. Patent
7,725,574.
Pan, B., Xiao, K. and Luo, L., 2010. Component-based mobile web application of cross-
platform. In Computer and Information Technology (CIT), 2010 IEEE 10th International
Conference on IEEE. pp. 2072-2077.
Paterno, F., 2012. Model-based design and evaluation of interactive applications. Springer
Science & Business Media.
Prilepova, O., and et.al., 2014. Design of a GIS-based web application for simulating biofuel
feedstock yields. ISPRS International Journal of Geo-Information. 3(3). pp.929-941.
Satzinger, J. W., Jackson, R. B. and Burd, S. D., 2011. Systems analysis and design in a
changing world. Cengage learning.
Taivalsaari, A. and Mikkonen, T., 2011. The web as an application platform: The saga continues.
In 2011 37th EUROMICRO Conference on Software Engineering and Advanced
Applications. IEEE. pp. 170-174.
Tidwell, J., 2010. Designing interfaces. " O'Reilly Media, Inc.".
Online
Klimushyn, M., 2015.Web Application Architecture from 10,000 Feet, Part 1 – Client-Side vs.
Server-Side. [Online]. Available Through:<https://spin.atomicobject.com/2015/04/06/web-
app-client-side-server-side/>. [Accessed on 10th January, 2017].
Designing Web Applications. 2017. [Online]. Available
Through:<https://msdn.microsoft.com/en-gb/library/ee658099.aspx>. [Accessed on 10th
January, 2017].
21
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]