The Web Approach: A web like organization of information works the best for most people. With this structure, web pages are linked to each other when relate contextual. There could be several links to a single page, or every document usually has at least two ways to get it. Links could lead the users in a circular path. From the navigation point of view, this kind of site is very appealing. It allows the users to get around this site quickly and enjoy a more free form experience of the site. Hence most of the designers use the spider web like approach to organize their content and the web sites.
Dynamic Web Server Architecture:
Web sites require a specialized database they must perform well in a distributed architecture, support object oriented applications and store extended data types like images, spatial and multimedia. Web sites use an object-oriented data base management system (ODBMS) because they are optimized for distributed, object-oriented that store new data types.
The flow of messages and data in this web server architecture takes place in the following manner. The web browser sends a request for an html template to the web server via the http protocol. The web server receives the request and passes it to one of a pool of ODBMS web service processes on the same machine or LAN as the web server. The web server and the web service communicate via a protocol, which could be either a CGI, FCGI , ISAPI or NSAPI. The web service combines the html in the template file with variables return from the methods to form html dynamically. The browsers thus receive the relation systems by a synchronization gateway. Tools like agents that track the user profile preference, and the database online utilities also interact with the database.
There are a different variety of web search engines on the internet like Altavista, Lycos, Yahoo, AOL (American Online) and so on which provide us with a list of dynamically a web sites. The Internet users can therefore access any of these web search engines and look for the web site they need.
Download Trustworthy Computing under Resource Constraints with the DOWN Policy Final Year Project