Building efficient websites with AJAX
Books were the original model for website design. Navigation was similar to flipping the pages. Thanks to AJAX, many state-of-the-art websites now behave like desktop applications.
Before rendering a website, the browser and web server go through a number of steps (Figure 1):
- The browser sends a page request to a web server.
- The server processes the request and serves up the HTML text and images. This might take a couple of seconds if the load is heavy. The network transmission speed decides how fast the content is delivered. The required time is still noticeable on fast intranets, however.
- Finally, the browser reads the response and displays the page. The same sequence is repeated for each image before the browser can render the final version of the page.
All told, these three steps typically take several seconds. In case of HTML pages without AJAX technology the steps are repeated for even the tiniest of changes.
In contrast to rich client applications, this considerably affects the user experience: Menus that drop down without a delay, point and click sorting in tables, or drag and drop are not easily implemented because of time-consuming page reloads. HTML pages that offer these kinds of features need to be autonomous, like local programs; that is, you should not need to rely on a server connection.
Removing Time-Consuming Requests
To improve the user experience, more and more web applications are starting to process user input directly browser-side and to do without time-consuming server requests.
The proprietary Flash plugin executes binary Flash applications in the browser. The plugin is embedded in the web page very much like a bitmap image, except that it offers the user an interactive interface. The Flash plugin has excellent graphics capabilities with virtually no restrictions on the developers' creativity. However, for lack of equivalent open source alternatives, there is virtually no alternative to the Adobe tools.
Buy this article as PDF
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.