Skip to main content

HOW A WEB BROWSER WORKS??

Well, you  reading this article shows you are using web browser, presenting this article content in a rich text/graphical format on your screen. A web browser  is an application software that  provides access to the World Wide Web. It fetches the web pages from the server along with the necessary files like, images, flashes, videos etc, interprets them and then displays it on the screen. On  simply typing the URL (Uniform Resource Locator) of a webpage in the address bar , the browser will bring the web page on your screen.Initially, user inputs a Uniform Resource Locator (URL), for example http://www.fb.com/, into the browser. The prefix of the URL, the Uniform Resource Identifier or URI, determines how the URL will be interpreted. The most commonly used kind of URI starts with http: and identifies a resource to be retrieved over the Hypertext Transfer Protocol (HTTP).Other prefixes are https: for HTTPS, ftp: for the File Transfer Protocol, and file: for local files. Prefixes that the web browser cannot directly handle are often handed off to another application entirely. For example, mailto: URIs are usually passed to the user's default e-mail application, and news: URIs are passed to the user's default newsgroup reader.
In the case of http, https, file, and others, once the resource has been retrieved the web browser will display it. HTML and associated content (image files, formatting information such as CSS, etc.) is passed to the browser's layout engine to be transformed from markup to an interactive document, a process known as "rendering".  Most browsers can display images, audio, video, and XML files, and have plug-ins to support Flash applications and Java applets. Upon encountering a file  that is set up to be downloaded rather than displayed, the browser prompts the user to save the file to disk.
Each link contains the URI of a resource to go to. When a link is clicked, the browser navigates to the resource indicated by the link's target URI, and the process  begins again.

1.      User Interface – It is the space where interaction between users and the browser occurs.eg - an address bar, next and back buttons, buttons for home, refresh and stop, options to bookmark web pages, etc.
2.      Browser Engine – It is the  code that communicates the inputs of user interface with the rendering engine. It is responsible for querying and manipulating the rendering engine according to the inputs from various user interfaces.
3.      Rendering Engine – It is the part  responsible for displaying the requested content on the screen. It first parses the html tags and then using the styles, it builds a render tree and finally a render layout, which displays the content on the screen.
4.      Networking – The  code , responsible to send various network calls.eg- sending the http requests to the server.
5.      Java Script Interpreter – It is the component  to interpret the java script code .
6.      UI Backend – This draws basic widgets on the browser like combo boxes, windows, etc.
7.      Data Storage – It is small database created on the local drive of the computer where the browser is installed. This database stores various files like cache, cookies, etc.

Browsers which include additional components to support e-mail, Usenet news, and Internet Relay Chat (IRC), are  referred to as "Internet suites" .
All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window. Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent.
Most web browsers can display a list of web pages that the user has bookmarked so that the user can quickly return to them.

Comments

Popular posts from this blog

Fatal exception errors and how to fix them

              'A fatal exception XY has occured at xxxx:xxxxxxxx' What is it? A fatal exception error is an error that causes a program to abort,returning the user to the operating system.When program encounters an exception that is invalid or unknown,fatal exception error(fatal 0E) is thrown.It mainly occurs during the computer's booting process,shutdown process or while trying to launch a program in windows.The processor exception(XY value) ranges from  00 to 0F. xxxx:xxxxxxxx represents the 32-bit address where the actual exception has occured. 00-Divide fault 02-NMI interrupt 04-overflow trap 05-bounds check fault 07-coprocesser not available 08-double fault 09-coprocesser segment overrun 0A-invalid task state segment 0B-Not present fault 0C-stack fault 0D-general protection fault 0E-page fault 10-coprocessor error fault 11-Alignment check fault When it occurs? Attempting an illegal instruction or operation accessing junk or non-working secti

Everyday Cloud !!

Cloud Computing - delivering hosted services over the Internet. Cloud computing is getting IT services, such as email, customer relationship management or web conferencing, over the internet.Instead of buying hardware and software up front, you pay a monthly charge based on the number of users.In simple words,when you  type a query into Google, the computer does nothing with regards to answer, it's just a messenger. The words you type are sent over the Net to one of Google's numerous clustered PCs, which find  your results and send them promptly back to you. The real work in finding your answers might be done by a computer sitting in California, Dublin, Tokyo, or Beijing!!Preparing documents over the Net is a newer example of cloud computing. Simply log on to a web-based service such as Google Documents and you can create a document, spreadsheet or presentation. Instead of typing your words into a program like Microsoft Word or OpenOffice, running on your computer, you're

WHAT ARE SIM CARDS USED FOR

A SIM - short for Subscriber Identity Module - is a piece of plastic that slots into your  mobile phone.It acts as your unique ID and helps you  connect to, make calls over  a particular mobile phone network.Most SIM cards have a capacity between 32 to 128 KB.They store contacts and messages which can be transferred easily from one mobile to another. SIM also stores the ‘key’ needed to decrypt data that is encrypted when voice is trransfered from a phone to another.A unique ID called the IMSI (International Mobile Subscriber Identity)  is used to connect someone calling your mobile number to your phone. GSM phones are the ones that utilize SIM cards .The most important bits of data include the IMSI (International Mobile Subscriber Identity) and the authentication key that validates the IMSI. This authentication key is provided by the carrier SIM authentication goes like this: On startup, the phone obtains the IMSI from the SIM card and relays it to the network,known as“request for