Copyright © 2002-2003 W3C ® ( MIT , ERCIM , Keio ), All Rights Reserved. W3C liability , trademark , document use and software licensing rules apply. Your interactions with this site are in accordance with our public and Member privacy statements.
The World Wide Web is a networked an information system. Web Architecture consists of the requirements, constraints, principles, and choices system that influence relates information sources and services through the design use of hypertext-style relationships, creating a web of information that spans the system and Internet. Architecture defines the desired operational behavior of agents components within the system. When this information system, including software, machine, and human components, and protocols for interactions between components. The Web Architecture is followed, the large-scale effect architecture is influenced by social requirements and software engineering principles, leading to design choices that constrain the behavior of the Web in order for the system to achieve desired properties: an efficient, scalable, shared information space. The organization of this space that will continue to grow indefinitely across languages, cultures, and information mediums. This document reflects is organized to reflect the three divisions dimensions of Web architecture: identification, representation, and interaction. This document also addresses some non-technical (social) issues that play a role in building the shared information space. </p> <p> This document strives to establish a reference set of requirements, constraints, principles, interaction, and design choices for Web architecture. representation.
This section describes the status of this document at the time of its publication. Other documents may supersede this document. The latest status of this document series is maintained at the W3C.
This document has been developed by W3C's Technical Architecture Group (TAG) ( charter ).
This draft is an Editor's Draft and some new content has not yet been reviewed by the TAG. The primary changes in this This draft were editorial changes contains substantial revisions based on some comments from Stuart Williams, and the addition of a note regarding the phrase "on discussion at the Web" based on comments from David Orchard. TAG's 21-23 July face-to-face meeting in Vancouver. A complete list of changes since the previous Working Draft is available on the Web.
deleted text: This draft remains incomplete; sections 1, 2, and 3 are the most developed; 4 the least. The TAG has published a number of findings that address specific architecture issues. Parts of those findings may appear in subsequent drafts. Please also consult the list of issues under consideration by the TAG.
This document is intended to inform discussions about issues of Web architecture. Where current practice conflicts with this document, this document and related findings are intended to help the relevant parties resolve their differences. Some parts of this document may fill in gaps in published specifications or may call attention to known weaknesses in those specifications.
This draft includes some editorial notes and also references to open TAG issues . These do not represent all open issues in the document. They are expected to disappear from future drafts.
Publication as a Working Draft does not imply endorsement by the W3C Membership. This is a draft document and may be updated, replaced or obsoleted by other documents at any time. It is inappropriate to cite this document as other than "work in progress."
The latest information regarding patent disclosures related to this document is available on the Web. As of this publication, there are no disclosures.
Please send comments on this document to the public W3C TAG mailing list www-tag@w3.org ( archive ).
A list of current W3C Recommendations and other technical documents can be found at the W3C Web site.
Highlighted entries in this table of contents link to principles, constraints, good practice notes, and design choices emphasized in the document.
The World Wide Web (or, ( WWW , or simply Web) is a networked an information system consisting of <a name="def-agent" id="def-agent"> that relates information sources and services, referred to collectively as agents resources </a> (programs acting on behalf , through the use of hypertext-style relationships, creating a person, entity, or process) web of information that exchange information. Here's a spans the Internet. The Web's primary goal is to create and maintain an efficient, scalable, shared information space that will continue to grow indefinitely across languages, cultures, and information mediums.
A simple travel scenario illustrating a common Web interaction: </p> <ul> <li> While planning a trip is used throughout this document to Mexico, Dan reads "Oaxaca weather information: <code> http://weather.example.com/oaxaca </code> " in a glossy travel magazine. Dan has enough experience illustrate typical behavior of Web components (e.g., servers, proxies, browsers, spiders, multimedia players, and other user agents -- programs acting on behalf of a person) and describe their interactions:
http://weather.example.com/oaxaca
'"
in
a
glossy
travel
magazine.
Dan
has
enough
experience
with
the
Web
to
recognize
that
"
http://weather.example.com/oaxaca
"
is
a
URI.
He
Given
the
context
in
which
the
URI
appears,
he
can
expect
that
the
URI
it
should
allow
him
to
access
relevant
weather
information.
This scenario illustrate (elaborated on throughout the document) illustrates the three architectural divisions of the Web that are discussed in this document:
http://weather.example.com/oaxaca
".
The intended audience for this document includes: </p> <ol> <li> Participants in W3C Activities, i.e., developers Architecture defines the desired operational behavior of Web components within the system, including software, machine, and human components, and protocols for interactions between components. The Web architecture is influenced by social requirements and software engineering principles, leading to design choices that constrain the behavior of the Web in order for the system to achieve desired properties. This document is an ongoing attempt to describe the properties we desire of the Web and the design choices that have been made to achieve them.
This document promotes re-use of existing standards when suitable, and gives some guidance on how to innovate in a manner consistent with the Web architecture.
The intended audience for this document includes:
This document is designed to balance the value of brevity The terms MUST, MUST NOT, SHOULD, SHOULD NOT, and precision MAY are used in accordance with the value of illustrative examples. <a shape="rect" href="http://www.w3.org/2001/tag/findings"> TAG findings RFC 2119 [ RFC2119 provide more background, motivation, and examples. ].
Readers will benefit from familiarity with the Requests for Comments ( RFC ) series from the IETF , some of which define pieces of the architecture discussed in this document.
The architecture described in We assume readers are familiar with the rationale for some of the general design principles: minimal constraints (fewer rules make the system more flexible), modularity, minimum redundancy, extensibility, simplicity, and robustness.
This document is principally focuses on the result architecture of deleted text: experience. There has been some theoretical and modeling work in the area Web. Other groups inside and outside W3C also document principles related to specialized aspects of Web Architecture, notably Roy Fielding's work architecture, including accessibility, internationalization, device independence, and Web Services. The section on "Representational State Transfer" [ <a shape="rect" href="#REST"> REST Architectural Specifications ]. includes some references.
The terms MUST, MUST NOT, SHOULD, SHOULD NOT, This document is designed to balance the value of brevity and MAY are used in accordance precision with deleted text: RFC 2119 [ <a shape="rect" href="#RFC2119"> RFC2119 </a> ]. </p> <p> Throughout this document, we elaborate on the <a shape="rect" href="#scenario"> travel scenario value of illustrative examples. TAG findings to introduce provide more background, motivation, and illustrate architectural principles. examples.
deleted text: <span class="ednote"> Editor's note </span>: The scenario has not yet been well-integrated into sections 3 and 4. </p> <div class="section"> <h4> 1.1.1. <a shape="rect" name="doc-scope" id="doc-scope"> Scope of architecture described in this deleted text: Document </a> </h4> <p> This document deleted text: focuses on the architecture of the Web. We assume the reader is familiar with primarily the rationale for some result of the general design principles: minimal constraints (fewer rules makes the system more flexible), modularity, minimum redundancy, extensibility, simplicity, and robustness. </p> <p> Other groups inside experience. There has been some theoretical and outside W3C are writing down principles related to specialized aspects modeling work in the area of Web architecture, including accessibility, internationalization, device independence, and Web Services. The section notably Roy Fielding's work on <a shape="rect" href="#archspecs"> Architectural Specifications "Representational State Transfer" [ REST includes some references. ].
The TAG intends for this document Uniform Resource Identifiers (URI), defined in "Uniform Resource Identifiers (URI): Generic Syntax" [ URI ], are central to deleted text: inform discussions about issues of Web Architecture. Where current practice conflicts with this document, the TAG expects to engage in constructive discussion with other parties. Some parts of this document may fill in gaps in published specifications or may call attention to known weaknesses in those specifications. </p> <p> This document promotes reuse of existing standards when suitable, and gives some guidance on how to innovate in a manner consistent with the Web architecture. </p> </div> </div> </div> <div class="section"> <h2> 2. <a shape="rect" name="identification" id="identification"> Identification and Resources </a> </h2> <p> <a name="def-uri" id="def-uri"> <dfn> Uniform Resource Identifiers </dfn> URIs identify (i.e., name) resources. 4 (URI), defined by "Uniform Resource Identifiers (URI): Generic Syntax" [ <a shape="rect" href="#URI"> URI </a> ], are central to Web Architecture. Parties who wish to communicate about something will establish a shared vocabulary, i.e. a shared set of deleted text: bindings between identifiers and things. with agreed to meanings. This shared vocabulary has a tangible value: it reduces the cost of communication. The ability to use common identifiers across communities is what motivates global naming in Web Architecture. architecture.
deleted text: URIs identify resources. When a representation of one resource refers to another resource with a URI, a link is formed between the two resources. The networked information system is built of linked resources, and the large-scale effect is a shared information space. The value of the Web grows exponentially as a function of the number of linked resources (the "network effect").
deleted text: <p class="prefix"> Principle </p> <p class="principle"> <a shape="rect" name="pr-use-uris" id="pr-use-uris"> Use URIs: </a> All important resources SHOULD be identified by a URI. <sup> <a name="note3" id="note3" href="#note-use-uris"> 3 </a> </sup> </p>Although there's no precise definition of an "important resource," A URI must be assigned to a resource in order for the resource to be named, shared, or linked to within the information system. It follows that any resource should have be assigned a URI if a third party might reasonably want to link to it, make or refute assertions about it, retrieve or cache a representation of it, transclude include all or part of it by reference into another resource, representation, or annotate it.
Principle
Use URIs: A URI SHOULD be assigned to each resource that is intended to be identified, shared, or described by reference. 5
Web architecture does not constrain resources to be uniquely named; a resource may be assigned more than one URI.
There are many benefits to making resources identifiable by URI. assigning a URI to a resource. Some are by design (e.g., linking, bookmarking, book marking, and caching), others (e.g., global search services) were not predicted. <a name="note4" id="note4" href="#whentouseget"> 4 6
deleted text: <div class="section"> <h3> 2.1. <a shape="rect" name="identifiers-comparison" id="identifiers-comparison"> Comparing Identifiers </a> </h3>An important aspect of communication is to be able to establish when two parties are talking Editor's note : The TAG has not yet reached agreement about whether to distinguish "information resources" from other types of resources. An information resource is one that conveys information (via representations). See TAG issue httpRange-14 . Related to the same thing. In the context concept of "information resource" is the Web, this means when two parties identify expression "on the same resource. Web". Two suggested definitions for "on the Web" are "is identified by a URI" and "is identified by a URI and at least one representation is available for retrieval."
The most common straightforward way to establish of establishing that two parties are identifying referring to the same resource is to compare the spelling (i.e., as strings) of the identifiers the parties URIs they are using. Section using, as character strings. In section 6 of [ URI ] discusses this type of analysis. In that specification, ], determination of equivalence or difference of URIs is based on string comparison, perhaps augmented by reference to additional rules provided by comparison.
Good practice
URI scheme definitions (e.g., for HTTP URIs, the authority component is case-insensitive). Depending on the application, an agent may invest more processing effort characters: If a URI has been assigned to deleted text: reduce the likelihood of a deleted text: false negative (i.e., two URIs identify the same resource, but that was not detected). </p> <p> There may be other ways Web components SHOULD refer to deleted text: establish that two parties are identifying the deleted text: same resource that are not based on string comparison; see the section on future directions for <a shape="rect" href="#future-comparison"> determining that two URIs identify using the same resource </a>. URI, character for character.
<span class="ednote"> Editor's note </span>: Dan Connolly has suggested the The term "coreference" instead "character" refers to URI characters as defined section 2 of "equivalence" [ URI ].
Although it is possible to communicate determine that two URIs are referring to the same resource. equivalent, it is generally not possible by inspection of two URIs to be sure that they identify different resources. Applications may apply rules beyond basic string comparison (e.g., for "http" URIs, the authority component is case-insensitive) to reduce the risk of false negatives and positives. Please refer to section 6.3 of [ URI ] for more information about reducing the risk of false positives and negatives.
Agents
Web
components
that
reach
conclusions
about
identity
beyond
what
they
are
based
on
comparisons
done
through
means
other
than
those
licensed
deleted text:
to
do
(e.g.,
by
specification,
or
community
convention,
or
site-specific
convention)
relevant
specifications
take
responsibility
for
any
problems
that
result.
For
instance,
agents
components
should
not
assume
that
"
http://weather.example.com/Oaxaca
"
and
"
http://weather.example.com/oaxaca
"
identify
the
same
resource,
since
none
of
the
specifications
involved
states
that
the
path
part
of
an
HTTP
"http"
URI
is
case-insensitive.
deleted text:
Web
servers
may
vary
in
how
they
are
configured
to
handle
case-sensitivity.
Agents
that
assume
these
URIs
identify
the
same
resource
take
responsibility
for
any
resulting
problems.
</p>
<p>
Although
it
is
possible
to
determine
that
two
URIs
are
equivalent,
it
is
generally
not
possible
by
mere
inspection
of
two
URIs
to
be
sure
that
they
identify
different
resources.
Web
architecture
does
not
constrain
resources
to
be
uniquely
named.
</p>
<p class="prefix">
Good
practice
</p>
<p class="practice">
<a shape="rect" name="lc-uri-scheme" id="lc-uri-scheme">
Spelling
URIs:
</a>
If
an
agent
has
been
provided
with
a
URI
to
refer
to
a
resource,
the
agent
SHOULD
use
the
spelling
of
the
URI
as
it
was
originally
provided.
To
help
parties
know
when
they
are
referring
to
the
same
resource,
it
follows
that
URI
producers
should
be
conservative
about
the
number
of
different
URIs
they
produce
for
the
same
resource.
For
instance,
the
parties
responsible
for
weather.example.com
have
no
reason
to
use
both
"
http://weather.example.com/Oaxaca
"
and
"
http://weather.example.com/oaxaca
"
to
refer
to
the
same
resource;
agents
components
will
not
detect
the
equivalence
relationship.
In
this
case,
one
URI
should
be
chosen
and
used
consistently.
See
section
6.3
of
[
<a shape="rect" href="#URI">
URI
</a>
]
for
further
advice
on
how
to
reduce
the
risk
of
false
negatives.
relationship
by
following
specifications.
URI consumers cannot, in general, determine There may be other ways to establish that two parties are identifying the meaning of a same resource deleted text: by inspection of a URI that identifies it. are not based on string comparison; see the section on future directions for determining that two URIs identify the same resource .
Although
it
is
tempting
to
guess
at
the
nature
of
a
resource
by
inspection
of
a
URI
that
identifies
it,
this
is
not
licensed
by
specifications;
this
is
called
URI
opacity
.
In
our
travel
scenario
,
the
example
URI
(
("
http://weather.example.com/oaxaca
)
")
suggests
that
the
identified
resource
has
something
to
do
with
the
weather
in
Oaxaca.
deleted text:
Although
short,
meaningful
URIs
benefit
people,
URI
consumers
must
not
rely
on
the
URI
string
to
communicate
the
meaning
of
a
resource.
A
site
reporting
the
weather
in
Oaxaca
could
just
as
easily
be
identified
by
the
URI
"
http://vjc.example.com/315
</code>.
".
And
the
URI
"
http://weather.example.com/vancouver
"
might
identify
the
resource
"my
photo
album."
See
the
section
on
retrieving
a
representation
for
information
about
how
agents
components
convey
information
about
a
resource.
The more resource metadata is included in a URI, the more fragile the URI becomes (e.g., sensitive to changes in representation).
Editor's note : When finding available on URI opacity, link from here. See TAG issue metadataInURI-31 . There is a related principle that has not yet been captured: don't restrict (e.g., through specifications) the URI space allotted to resource owners. See TAG issue siteDate-26 : Web site metadata improving on robots.txt, w3c/p3p and favicon etc.
In
the
URI
"
http://weather.example.com/
</code>,
",
the
"http"
that
appears
before
the
colon
(":")
is
a
URI
scheme
name.
There
are
other
scheme
names,
such
as
"mailto"
and
"ftp".
It
is
common
The
name
refers
to
deleted text:
classify
URIs
by
scheme;
a
URI
with
scheme
"http"
is
called
an
"HTTP
URI."
</p>
<p>
Each
URI
begins
with
a
deleted text:
<a name="def-URI-scheme" id="def-URI-scheme">
<dfn>
URI
scheme
</dfn>
</a>
name.
The
scheme
name
corresponds
specification,
which
explains
how
to
a
specification
for
assigning
assign
identifiers
within
that
scheme.
As
such,
the
The
URI
syntax
is
thus
a
federated
and
extensible
naming
system
wherein
each
scheme's
specification
may
further
restrict
the
syntax
and
semantics
of
identifiers
using
within
that
scheme.
Furthermore,
the
URI
scheme
specification
specifies
how
an
agent
a
component
can
dereference
the
URI
.
Several URI schemes incorporate identification mechanisms information systems that pre-date the Web into this the URI syntax:
mailto:nobody@example.org
ftp://example.org/aDirectory/aFile
news:comp.infosystems.www
tel:+1-816-555-1212
Other URI schemes have been introduced since the advent of the Web, including those introduced as a consequence of new protocols. Examples of URIs for these such URI schemes include:
http://www.example.org/something?with=arg1;and=arg2
ldap://ldap.itd.umich.edu/c=GB?objectClass?one
urn:oasis:SAML:1.0
The Internet Assigned Numbers Authority ( IANA ) maintains a registry [ IANASchemes ] of mapping between URI scheme names and their scheme specifications. For instance, the IANA registry indicates that the "http" scheme is defined by in [ RFC2616 ]. The process for registration of new URI schemes is defined by in [ RFC2717 </a>. ].
Since many aspects of URI processing are scheme-dependent, and since a huge amount of deployed software already processes URIs of well-known schemes, the cost of introduction of new URI schemes is high. deleted text: We note in passing that even more expensive than introducing a new URI scheme is introducing a new identification mechanism for the Web; this is considered prohibitively expensive.
Good practice
New URI schemes: Authors of specifications SHOULD avoid introducing NOT introduce a new URI schemes scheme when an existing schemes can be used to meet scheme specifies the goals desired properties of the specifications. identifiers and their relation to resources.
Consider
our
travel
scenario
:
should
the
authority
providing
information
about
the
weather
in
Oaxaca
register
a
new
URI
scheme
"weather"
for
the
identification
of
resources
related
to
the
weather?
They
might
then
publish
URIs
such
as
"
weather://travel.example.com/oaxaca
</code>.
".
While
the
Web
Architecture
architecture
allows
the
definition
of
new
schemes,
there
is
a
cost
to
registration
and
especially
deployment
of
new
schemes.
When
an
agent
a
component
dereferences
such
a
URI,
if
what
really
happens
is
that
HTTP
GET
is
invoked
to
retrieve
an
HTML
representation
of
the
resource,
then
an
HTTP
"http"
URI
would
have
sufficed.
If
a
URI
scheme
exists
that
meets
the
needs
of
an
application,
designers
should
use
it
rather
than
invent
one.
Furthermore,
designers
should
expect
that
it
will
prove
useful
to
be
able
to
share
a
URI
across
applications,
even
if
that
utility
is
not
initially
evident.
If the motivation behind registering a new scheme is to allow an agent a component to launch a particular application when retrieving a representation, such dispatching can be accomplished at lower expense by registering a new media type Internet Media Type instead. deleted text: Reasons for this include: </p> <ul> <li> The more resource metadata is included in a URI, the more fragile the URI becomes (e.g., sensitive to changes in representation). Designers should choose URI schemes that allow them to keep their options open. </li> <li> At this time, the registration process for new URI schemes is more strict than for the registration of new media types. </li> </ul> <p> <span class="ednote"> Editor's note </span>: When finding available based on Tim Bray's discussion of this topic, link from here.
The use of unregistered URI schemes is discouraged for a number of reasons:
In
When
navigating
within
the
URI
XHTML
data
that
Dan
receives
as
a
representation
of
the
resource
identified
by
"
http://weather.example.com/
</code>,
http://weather.example.com/oaxaca
",
Dan
finds
that
the
string
URI
"
weather.example.com
http://weather.example.com/oaxaca#tom
(between
"//"
and
"
refers
to
information
about
tomorrow's
weather
in
Oaxaca.
This
URI
includes
the
next
"/")
called
fragment
identifier
"tom"
(the
string
after
the
authority
component.
Many
URI
schemes
include
"#").
The fragment identifier component of a hierarchical element for URI allows indirect identification of a naming <a name="def-authority" id="def-authority"> authority secondary resource deleted text: such that governance of the name space defined by the remainder of the URI is delegated reference to deleted text: that authority (which may, in turn, delegate it further). The generic syntax provides a common means for distinguishing an authority based on a registered domain name primary resource and additional identifying information. The secondary resource may be some portion or server address. See section 3.2 subset of deleted text: [ <a shape="rect" href="#URI"> URI </a> ] for more information about the authority portion of a URI. </p> <p> How authority is delegated depends primary resource, some view on representations of the URI scheme. primary resource, or some other resource. The deleted text: deployment and use of different URI schemes may require varying degrees that identifies the secondary resource consists of deleted text: central coordination and administration. For example, MAILTO, FTP, and HTTP URIs depend on the use URI of the DNS and IANA infrastructure; see "ICP-1: Internet Domain Name System Structure and Delegation" [ <a shape="rect" href="#IANAICP1"> IANAICP1 </a> ] for more information about how primary resource with the IANA manages delegation of domain names. additional identifying information as a fragment identifier. More precisely:
<p> Successful communication between two parties aboutFor URI ..." the design choice for the Web is, in general, schemes that do specify the owner use of a resource assigns fragment identifiers, the authoritative interpretation of representations syntax and semantics of the resource. See the <strong> draft </strong> TAG finding <cite> " <a shape="rect" href="http://www.w3.org/2001/tag/doc/mime-respect.html"> Client handling of MIME headers" </a> </cite> for related discussion. </p> <p> In our <a shape="rect" href="#scenario"> travel scenario </a>, the agent responsible for <code> weather.example.com </code> has license to create representations of this resource and assign their authoritative interpretation. </p> </div> <div class="section"> <h3> 2.4. <a shape="rect" name="fragid" id="fragid"> Fragment Identifiers </a> </h3> <p> In our <a shape="rect" href="#scenario"> travel scenario </a> the server returns an XHTML representation when Dan dereferences the URI <code> http://weather.example.com/oaxaca </code>. Then, by navigating within the XHTML content, Dan finds that the URI <code> http://weather.example.com/oaxaca#tom </code> refers to information about tomorrow's weather in Oaxaca. This URI includes the fragment identifier "tom" (the string after the "#"). </p> <p> The <a name="def-fragid" id="def-fragid"> <dfn> fragment identifier </dfn> </a> component of a URI allows indirect identification of a <a name="def-secondary-resource" id="def-secondary-resource"> <dfn> secondary resource </dfn> </a>, by reference to a primary resource and additional identifying information that is selective with respect to that resource. The identified secondary resource may be some portion or subset of the primary resource, some view on representations of the primary resource, or some other resource that is merely named with respect to the primary resource. </p> <p> Although the generic URI syntax allows any URI to end with a fragment identifier, some URI schemes do not specify the use of fragment identifiers. For instance, fragment identifier usage is not specified for MAILTO URIs. </p> <p> For URI schemes that do specify the use of fragment identifiers, the syntax and semantics of those identifiers is defined by those identifiers are defined by the set of <a shape="rect" href="#representations"> representations that might result from a <a shape="rect" href="#def-representation-retrieval"> retrieval action on the primary resource. The presence of a fragment identifier component in a URI does not imply that a retrieval action will take place.
Interpretation of the fragment identifier during a retrieval action is performed solely by the user agent; the fragment identifier is not passed to other systems during the process of retrieval. This means that some intermediaries in the Web architecture (e.g., proxies) have no effect on fragment identifiers and that redirection (in HTTP [ RFC2616 ], for example) does not account for them.
Suppose
that
the
managers
of
<code>
weather.example.com
</code>
provide
a
authority
responsible
for
"weather.example.com"
provide
a
visual
map
of
the
meteorological
conditions
in
Oaxaca
as
part
of
the
representation
served
for
"
http://weather.example.com/oaxaca
</code>.
".
They
might
encode
the
same
visual
map
in
a
number
of
image
formats
to
meet
different
needs
(e.g.,
they
might
serve
PNG,
SVG,
and
JPEG/JFIF).
Dan's
user
agent
browser
and
the
server
engage
in
HTTP
content
negotiation,
so
that
Dan
receives
the
best
image
format
his
user
agent
browser
can
handle
or
the
image
format
he
usually
prefers.
The
URI
"
http://weather.example.com/oaxaca/map#zicatela
"
refers
to
a
portion
of
the
weather
map
that
shows
the
Zicatela
Beach,
where
Dan
intends
to
go
surfing.
Clients
can
do
something
useful
with
the
fragment
identifier
and
the
SVG
representation,
since
SVG
defines
fragment
identifier
semantics.
Clients
should
not
be
expected
to
do
something
useful
On
the
other
hand,
it
is
an
error
when
the
authority
responsible
for
a
resource
publishes
a
URI
with
a
fragment
identifier
and
representations
of
the
resource
do
not
have
consistent
fragment
identifier
for
semantics.
Thus,
the
authority
responsible
for
"
http://weather.example.com/oaxaca/map#zicatela
"
creates
an
error
condition
by
making
available
PNG
or
and
JPEG/JFIF
representations
since
those
format
specifications
do
not
define
fragment
identifier
semantics.
Good practice
Content negotiation with fragments: Authors SHOULD NOT Authorities responsible for minting a URI with a fragment identifier and who use deleted text: HTTP content negotiation for different media types that have incompatible to serve multiple representations of the identified resource SHOULD NOT serve representations with inconsistent fragment identifier semantics.
Fragment identifier semantics may differ among format specifications. See related TAG issues httpRange-14 and RDFinXHTML-35 and abstractComponentRefs-37 .
Given a URI, To dereference a system may attempt URI means to perform a variety of operations on access the resource, as might be characterized resource identified by deleted text: such words as "access", "update", "replace", or "find attributes". Available operations depend on the formats and protocols that make use of URIs. The URI specification (in [ <a shape="rect" href="#URI"> URI </a> ], section 1.2.2) defines the deleted text: following terms related to interactions through a URI. </p> <dl> <dt> <a name="def-URI-resolution" id="def-URI-resolution"> <dfn> Resolution </dfn> Access may take many forms, including retrieving a representation </dt> <dd> The process (e.g., using HTTP GET or HEAD), modifying the state of determining an access mechanism the resource (e.g., using HTTP POST or PUT), and deleting the appropriate parameters necessary to dereference resource (e.g., using HTTP DELETE).
When accessing a URI; such resolution may require several iterations. </dd> <dt> <a name="def-URI-dereference" id="def-URI-dereference"> <dfn> Dereference </dfn> </a> </dt> <dd> To dereference a URI is to use an access mechanism to perform an action on the URI's resource. </dd> <dt> <a name="def-representation-retrieval" id="def-representation-retrieval"> <dfn> Retrieval </dfn> </a> </dt> <dd> A URI dereference that causes an agent to retrieve resource, a representation of the associated resource. </dd> </dl> <p> During URI resolution, an agent component applies deleted text: in succession a finite set of relevant specifications, specifications in succession, beginning with the specification of the context in which the URI is found (e.g., a format or protocol specification, or an application). Any one of these specifications may define more than one access mechanism (e.g., the HTTP protocol defines a number of access methods, methods , including GET, HEAD, and POST). Note that the information governing the choice of access mechanism may be found in the context, not the URI itself (e.g., the choice of HTTP GET v. HTTP HEAD). The deleted text: <strong> draft </strong> TAG finding " URIs, Addressability, and the use of HTTP GET and POST." discusses issues surrounding multiple access mechanisms and the relation to URI addressability.
Some URI schemes (e.g., the URN scheme [ RFC 2141 ]) do not define dereference mechanisms.
TAG issue metadataInURI-31 : Should metadata (e.g., versioning information) be encoded in URIs?
deleted text: <p> TAG issue <a shape="rect" href="http://www.w3.org/2001/tag/ilist.html#siteData-36"> siteDate-26 </a>: Web site metadata improving on robots.txt, w3c/p3p and favicon etc. </p>One of the most important actions involving a resource is to retrieve a <a shape="rect" href="#representations"> representation of it (for example, by using HTTP GET). As stated above, GET; HTTP POST does not retrieve a representation of the <a shape="rect" href="#URI-authority"> identified resource). The authority responsible for assigning a URI </a> to a resource determines deleted text: what the URI identifies and which representations are used for interaction with the resource. The representations communicate all or part of the state of the resource.
Good practice
Resource descriptions: Owners of important resources SHOULD make available representations that describe of those resources.
As
an
example
of
representation
retrieval,
suppose
that
the
URI
"
http://weather.example.com/budapest
"
is
used
within
an
a
element
of
an
SVG
document.
The
sequence
of
specifications
applied
is:
a
link
involves
retrieving
a
representation
of
a
resource,
identified
by
the
XLink
href
attribute:
"By
activating
these
links
(by
clicking
with
the
mouse,
through
keyboard
input,
and
voice
commands),
users
may
visit
these
resources."
xlink:href
is
defined
in
section
5.4
of
the
XLink
1.0
[
XLink10
]
specification
states
that
"The
value
of
the
href
attribute
must
be
a
URI
reference
as
defined
in
[IETF
RFC
2396],
or
must
result
in
a
URI
reference
after
the
escaping
procedure
described
below
is
applied."
Note
that,
in
general,
one
cannot
determine
the
media
type(s)
Internet
Media
Type(s)
of
representation(s)
of
a
resource
by
inspecting
a
URI
for
that
resource.
For
example,
do
not
assume
that
all
representations
of
"
http://example.com/page.html
"
are
HTML.
The
HTTP
protocol
does
not
constrain
the
media
type
Internet
Media
Type
based
on
the
path
component
of
the
URI;
the
server
is
free
to
return
a
PNG
image
representation.
Dan's retrieval of weather information qualifies as a "safe" interaction; a safe interaction is one where the user agent does not commit to anything beyond the interaction and is not responsible for any consequences other than the interaction itself (e.g., a read-only query or lookup). Other Web interactions resemble orders more than queries. These unsafe interactions may cause a change to the state of a resource; the user may be held responsible for the consequences of these interactions. Unsafe interactions include subscription services, to a newsletter, posting to a list, or modifying a database.
Safe interactions are important because these are interactions where users can browse with confidence and where software programs (e.g., search engines and browsers that pre-cache data for the user) can follow links safely. Users (or software agents components acting on their behalf) do not commit themselves to anything by querying a resource or following a link.
Principle
Safe retrieval: Agents Components do not incur obligations by retrieving a representation.
For
instance,
suppose
in
our
<a shape="rect" href="#scenario">
travel
scenario
</a>
that
the
managers
of
<code>
weather.example.com
</code>
offer
a
monthly
newsletter
available
by
subscription.
It
it
is
deleted text:
<strong>
incorrect
deleted text:
and
harmful
</strong>
to
publish
a
deleted text:
page
<code>
http://example.com/oxaca/aboutNewsLetter
</code>
that
states
"...
terms
and
conditions..."
with
a
link
to
(e.g.,
"
http://example.com/oxaca/newsLetter
because
search
services
may
link
directly
")
that,
when
followed,
subscribes
a
user
to
<code>
http://example.com/oxaca/newsLetter
</code>
and
readers
a
mailing
list.
Remember
that
search
engines
may
follow
such
links
may
not
have
seen,
let
alone
agreed
to,
the
terms
and
conditions.
links.
For more information about safe and unsafe operations using HTTP GET and POST, and handling security concerns around the use of HTTP GET, see the deleted text: <strong> draft </strong> TAG finding " URIs, Addressability, and the use of HTTP GET and POST."
The value of a URI increases with the predictability of interactions using that URI.
Good practice
URI Persistence: persistence: Parties responsible for a URI SHOULD service that URI predictably and consistently.
Service breakdowns include:
There are strong social expectations that once a URI identifies a particular resource, it should continue indefinitely to refer to that resource; this is called URI persistence . URI persistence is always a matter of policy and commitment on the part of authorities servicing URIs rather than a constraint imposed by technological means.
URI deleted text: persistence also improves when ambiguity is removed refers to the use of the same URI to refer to more than one distinct thing.
Good practice
URI ambiguity: Avoid URI ambiguity.
Ambiguous use of a URI can be costly. Suppose that one division of Large Company, Inc. maintains data about what company Web pages, including who created them and when. Another division in the company maintains data about companies, including who created them and when. The second data set uses the URIs of the organization's home page as though it was the URI of the organization itself. When the two data sets are merged, the reuse of the URI causes information about companies to be merged with that of the home pages, resulting in potentially costly nonsense.
URI
identifies.
ambiguity
differs
from
"indirect
identification,"
which
is
common.
For
instance,
example,
one
may
identify
meeting
participants
by
using
their
email
addresses
(e.g.,
"
joe@example.com
").
In
this
case,
all
parties
know
that
they
are
using
a
mailbox
identifier
to
indirectly
identify
the
person.
In
terms
of
Web
architecture,
"
mailto:joe@example.com
"
still
identifies
a
mailbox,
not
a
person.
As
another
example
of
URI
ambiguity,
saying
that
the
URI
"
http://www.example.com/moby
"
identifies
"Moby
Dick"
can
lead
to
confusion
because
this
might
be
interpreted
as
any
one
of
the
following
very
distinct
resources:
a
particular
printing
of
this
work
(say,
by
ISBN),
work,
or
the
work
itself
in
an
abstract
sense,
or
the
fictional
white
whale,
or
a
particular
copy
of
the
book
on
the
shelves
of
a
library
(via
the
Web
interface
of
the
library's
online
catalog),
or
the
record
in
the
library's
electronic
catalog
which
contains
the
metadata
about
the
work,
or
the
Gutenberg
project's
online
version
.
deleted text:
Similarly,
one
should
not
use
the
same
URI
to
refer
to
a
person
and
to
that
person's
mailbox.
Ambiguous descriptions HTTP [ RFC2616 ] has been designed to help service URIs. For example, HTTP redirection (via some of deleted text: what a URI identifies increase the likelihood that two parties will think the same URI identifies different resources, and thus that the parties will use the URI inconsistently. This can be costly, as in the case of two databases in which the same URI is used inconsistently; merging the two databases might lead to confusion or errors. </p> <p> HTTP [ <a shape="rect" href="#RFC2616"> RFC2616 </a> ] has been designed to help service URIs. For example, HTTP redirection (via some of the 3xx response codes) permits servers to tell an agent 3xx response codes) permits servers to tell a user agent that further action needs to be taken by the user agent in order to fulfill the request (e.g., the resource has been assigned a new URI). In addition, content negotiation also promotes consistency, as a site manager would not be required to define new URIs for each new format specification that is supported, as would be the case with protocols that don't support content negotiation, such as FTP.
For more discussion about URI persistence, refer to [ Cool ]. <a name="note5" id="note5" href="#note-cool-uri-title"> 5 9
As we have seen, identification of a resource is distinct from interacting interaction with that resource. It is reasonable to control limit access to the resource (e.g., for security reasons), but it is unreasonable to prohibit others from merely identifying the resource.
As an analogy: A building might have a policy that the public may only enter via the main front door, and only during business hours. People employed in the building and in making deliveries to it might use other doors as appropriate. Such a policy would be enforced by a combination of security personnel and mechanical devices such as locks and pass-cards. One would not enforce this policy by hiding some of the building entrances, nor by requesting legislation requiring the use of the front door and forbidding anyone to reveal the fact that there are other doors to the building.
In the travel scenario , imagine that Dan and Norm both subscribe to the <code> weather.example.com </code> "weather.example.com" newsletter. Dan wishes to point out an article of particular interest to Norm, using a URI. The managers of <code> weather.example.com </code> authority responsible for "weather.example.com" can offer Dan and Norm the benefits of URIs (e.g., bookmarking book marking and linking) and still control limit access to the newsletter by to authorized parties. The Web provides several mechanisms to control access to resources, none of which relies on hiding or suppressing URIs for those resources. For more information on identification and access control, please refer to the TAG finding "' " Deep 'Deep Linking' in the World Wide Web ."
There remain open questions regarding identifiers on the Web. The following sections identify a few areas of future work in the Web community. The TAG makes no commitment at this time to pursuing these issues.
The integration of internationalized identifiers (i.e., composed of characters beyond those allowed by [ URI ]) into the Web Architecture architecture is an important and open issue. See TAG issue IRIEverywhere-27 for discussion about work going on in this area.
Emerging
Semantic
Web
technologies,
including
"DAML+OIL"
[
DAMLOIL
]
and
"Web
Ontology
Language
(OWL)"
[
OWL10
],
define
RDF
properties
such
as
equivalentTo
and
FunctionalProperty
to
state
--
or
at
least
claim
--
formally
that
two
URIs
identify
the
same
resource.
The Dynamic Delegation Discovery System ( DDDS ) ([ RFC3401 ] and related RFCs) is used related RFCs) is used to implement lazy binding of strings to data, in order to support dynamically configured delegation systems. This system is designed to allow resolution of any type of URI, in particular URNs.
One area of work involves the creation of globally unique identifiers in a file-sharing system without centralized or hierarchical administration.
In
the
travel
scenario
,
Dan
retrieves
a
representation
from
the
weather
site
"
http://weather.example.com/oaxaca
".
He
then
follows
the
link
labeled
"satellite
image"
in
the
representation
data
and
retrieves
a
representation
of
a
secondary
resource,
a
satellite
photo
of
the
Oaxaca
region.
The
link
to
the
satellite
image
is
an
HTML
link
encoded
as
<a
href="http://example.com/satimage/oaxaca">satellite
image</a>
.
Dan's
browser
analyzes
the
URI
and
determines
that
its
scheme
is
"http".
The
browser
opens
a
network
connection
to
port
80
on
the
server
at
"example.com"
and
sends
a
"GET"
message
as
specified
by
the
HTTP
protocol,
requesting
a
representation
of
the
resource
identified
by
"/satimage/oaxaca".
The
server
sends
a
response
message
to
the
browser,
once
again
according
to
the
HTTP
protocol.
The
message
consists
of
several
headers
and
a
JPEG
image.
Some
of
the
headers
(for
example,
'Transfer-encoding:
identity',
which
indicates
that
no
compression
has
been
applied)
are
descriptive
of
the
message.
The
remainder
of
the
headers
and
the
message
body
together
comprise
a
representation
of
the
resource
identified
by
"
http://example.com/satimage/oaxaca
".
The browser reads the headers, learns from the 'Content-Type' field that the Internet Media Type of the representation data is "text/jpeg", reads the sequence of octets that comprises the representation data, and renders the image.
Dan decides to book a vacation to Oaxaca at "booking.example.com." He completes a series of HTML forms and is ultimately asked for credit card information to purchase the airline tickets. He provides this information in another HTML form. When he presses the "Purchase" button, his browser opens another network connection to the server at "booking.example.com" and sends a message conforming to the rules for an HTTP POST request. As described by the HTML specification, the message data consists of a set of name/value pairs corresponding to the HTML form fields. Note that this is not a safe interaction since Dan wishes to change the state of the system by exchanging money for airline tickets.
The server reads the POST request, and after performing the booking transaction returns a message to Dan's browser that contains a representation of the results of Dan's request. The representation data is in HTML so that it can be saved or printed out for Dan's records. Note that neither the data transmitted with the POST nor the data received in the response necessarily correspond to any resource named by a URI.
Web components exchange information via messages that are constructed according to a non-exclusive set of messaging protocols (e.g., HTTP, FTP, NNTP, SMTP 10 , etc.). A message exchanged between Web components is an octet sequence consisting of:
This section will describe the architectural principles and constraints regarding interactions between components, including such topics as network protocols and interaction styles, along with interactions between the Web as a system and the people that make use of it. This will include the role of architectural styles, such as REST and SOAP, and the impact of meta-architectures, such as Web Services and the Semantic Web.
Good practice
A The representation is data that represents or describes of the state of a resource. It consists resource is an octet sequence consisting of:
Web agents components use representations to modify as well as retrieve resource state.
When agents transfer The first data format used to build representations via messages (see was HTML. Since then, data formats for the Web have flourished. The Web architecture does not constrain which data formats can be used to build representations. This flexibility is important, since there is continuing progress in the development of new data formats for new applications and the refinement of existing ones.
Some characteristics of a data format make it easier to integrate into the Web architecture. We examine some of those characteristics below. This document does not address generally beneficial characteristics of a specification such as readability, simplicity, attention to programmer goals, attention to user needs, accessibility, internationalization, etc. The section on <a shape="rect" href="#interaction"> interactions architectural specifications deleted text: for information about message protocols), the message often includes references to additional format specification guidelines.
Successful communication between two parties about a piece of information relies on shared understanding of the meaning of the information. Thousands of independent parties can identify and communicate about a Web resource. To give these parties the confidence that is not part they are all talking about the same thing when they refer to "the resource identified by the following URI ..." the design choice for the Web is, in general, that the owner of a resource assigns the authoritative interpretation of representations of the representation (e.g., the HTTP Server field or resource. See the request method, URI, etc.). A message may even include "meta-metadata" (for message-integrity checks). The representation consists those bits that would not change regardless TAG finding " Client handling of the transfer protocol used to exchange them. MIME headers" for related discussion.
In our deleted text: previous travel scenario </a> , the representation authority responsible for "weather.example.com" has license to create representations of this resource and assign their authoritative interpretation. Which representation(s) Dan receives deleted text: (and whether he receives one at all) depends on a number of factors, including:
http://weather.example.com/oaxaca;
http://weather.example.com/oaxaca
";
We discuss these issues in more detail below. </p> <div class="section"> <h3> 3.1. <a shape="rect" id="authoritative-metadata" name="authoritative-metadata"> Authoritative representation metadata </a> </h3> <p> As discussed above, Inconsistencies between the owner of a resource assign URIs for that resource, create representations format of the resource, representation data and assign their authoritative interpretation. This interpretation is described in part by metadata that is part of the representation, notably the Internet media type. At times there may be inconsistencies between assigned representation metadata and what is specified in a format. do occur. Examples deleted text: of inconsistencies between headers and format data that have been observed in practice include:
User agents should detect such inconsistencies but should not resolve them without involving the user (e.g., by securing permission or at least providing notification). (for example, due to security issues).
Principle
Authoritative server metadata: User agents MUST NOT silently ignore authoritative server metadata.
Thus, for example, if the parties responsible for "weather.example.com" mistakenly label the satellite photo of Oaxaca as "image/gif" instead of "image/jpeg", and if Dan's browser detects a problem, Dan's browser must not silently ignore authoritative server metadata. the problem and render the GIF image. Dan's browser can notify Dan of the problem, notify Dan and take corrective action, etc. Of course, user agent designers should not ignore usability issues when handling this type of error; notification may be discreet, and handling may be tuned to meet the user's preferences.
See the deleted text: <strong> draft </strong> TAG finding " Client handling of MIME headers" for more in-depth discussion and examples.
deleted text: </div> <div class="section"> <h3> 3.2. <a shape="rect" id="formats" name="formats"> Characteristics of formats and their specifications </a> </h3>The Web can be used to interchange resource representations in any format. This flexibility is important, since there is continuing progress in Furthermore, server managers help reduce the development risk of new data formats error through careful assignment of representation metadata.
Principle
Don't guess metadata: Server managers MUST ensure that representation metadata is appropriate for new applications each representation.
For a data format to be usefully interoperable between two parties, the parties must have a shared understanding of its syntax and semantics. This is not to imply that a sender of data can count on constraining its treatment by a receiver; simply that making good use of electronic data usually requires knowledge of its designers' intentions.
<p> For a format to be widely interoperable across the Web:Good practice
<ul> <li> ThereFormat specification availability: To promote the interoperability of a Web data format, there SHOULD be a stable, normative specification which for it that is a deleted text: stable and widely available Web resource. </li> <li> The format specification SHOULD have an officially registered Internet media type (see the [ <a shape="rect" href="#IANAMIME"> IANAMIME </a> ] registry). See TAG finding finding <cite> " <a shape="rect" href="http://www.w3.org/2001/tag/2002/0129-mime"> Internet Media Type registration, consistency of use </a>
Good practice
</cite>." </li> <li> The format specification SHOULD define the syntax and semantics of fragment identifiers. </li> <li> The format specification SHOULD allow Web-wide linking, not just internal document linking. </li> <li> The format specification SHOULD allow authors to use URIs without constraining them to a limited set of URI schemes. </li> <li> The Media type registration: A format specification MAY use Qualified Names (QNames) for identifiers in content, but format designers should be aware of SHOULD have an officially registered Internet Media Type (see the limitations and interoperability risks associated with QNames. [ MEDIATYPEREG ] registry).
See deleted text: the TAG finding " <a shape="rect" href="http://www.w3.org/2001/tag/doc/qnameids.html"> Using QNames as Identifiers in Content Internet Media Type registration, consistency of use " " for more information. </li> </ul>
Good practice
Specified fragment identifier semantics: A format specification SHOULD define the syntax and semantics of fragment identifiers.
Although the Web architecture allows for the deployment of new data formats, the creation and deployment of new formats (and software able to handle them) can be very expensive. Thus, before inventing a new data format, designers should carefully consider re-using one that is already available. For example, if a format is required to contain human-readable text with embedded hyperlinks, it is almost certainly better to use HTML for this purpose than to invent a new format. </p> <div class="section"> <h4> 3.2.1. <a shape="rect" name="format-characteristics" id="format-characteristics"> Desirable Characteristics of Format Specifications </a> </h4> <p> As noted above, the utility of data formats starts with the availability of a normative specification. Some of the desirable characteristics of a format include: </p> <dl> <dt> Attention to Programmer Needs </dt> <dd> A specification that is written to meet the needs of programmers is more likely to be implemented, and thus more likely to be useful. In particular, the specification SHOULD be in part formal and mathematical, rather than relying exclusively on narrative. </dd> <dt> Attention to Author Needs </dt> <dd> Formats that allow authors to intuitively and efficiently address problems they are trying to solve, that can be readily learned, that are simple to use, and that are interoperable are more likely to be adopted by authors and authoring tool developers. </dd> <dt> Attention to User Needs </dt> <dd> A number of characteristics of a format specification will address the needs of end users, and doing so will create a market for the format. Attention to issues of accessibility, internationalization, and device-independence will tend to make a format specification more flexible. </dd> <dt> Attention to Error-Handling </dt> <dd> Given that representations are generated by humans (either coded directly or mediated by an authoring tool) and then transmitted in than to invent a heterogeneous network, it is inevitable that errors will occur. Specifications new format.
Errors, of data formats SHOULD be clear about behavior course, occur in the presence deployment of errors. It is reasonable software and data. The degree to specify that which errors are tolerated varies depends on application context.
Principle
Error recovery: Silent recovery from error is harmful.
To promote interoperability, specifications should be worked around, or should result set expectations about behavior in the termination face of a transaction or session. It is not acceptable for the known error conditions.
Good practice
Specify error handling: Format specification designers SHOULD specify component behavior in the face of errors to be left unspecified. error conditions.
See the deleted text: <strong> draft </strong> TAG finding " Client handling of MIME headers" for more discussion about error reporting. </dd> <dd> Issue See also TAG issue errorHandling-20 </a> </dd> <dt> .
When designing specifications that address independent functions of a system, references between the specifications are in general deleted text: harmful. They are harmful because they since such references impede the independent evolution of the specifications. </dd> <dd>
For example, it is a strength of XML that XPath cannot query the HTTP header. It is a strength of HTTP that it does not refer to details of the underlying TCP to the extent that it cannot be run over a different transport service. Similarly, the RDF data graph has a significance that is independent of the actual serialization. </dd> <dd>
Sometimes it is necessary (and even good for given application) to break layers. cross specification boundaries. For example, it is good for an HTTP agent component to be aware of TCP speeds and round trip times to different mirror servers in order to optimize the choice of server. deleted text: When designing specification, identify the functionalities that break layers so it is clear when they are being used. </dd> </dl> <p> The section on <a shape="rect" href="#archspecs"> architectural specifications </a> includes references to additional format specification guidelines.
<p> Other design issues:Good practice
<ul> <li> QNames: Issues <a shape="rect" href="http://www.w3.org/2001/tag/ilist"> rdfmsQnameUriMapping-6 </a>, <a shape="rect" href="http://www.w3.org/2001/tag/ilist#qnameAsId-18"> qnameAsId-18 </a> and finding <cite> " <a shape="rect" href="http://www.w3.org/2001/tag/doc/qnameids.html"> Using QNames as Identifiers in Content </a> " </cite> </li> <li> Formatting properties: Issue <a shape="rect" href="http://www.w3.org/2001/tag/ilist#formattingProperties-19"> formattingProperties-19 </a>, <a shape="rect" href="http://www.w3.org/2001/tag/ilist#contentPresentation-26"> contentPresentation-26 </a></li> </ul> </div> <div class="section"> <h4> 3.2.2. <a shape="rect" name="format-taxonomy" id="format-taxonomy"> Taxonomic Categorization of Data Formats Identify features that peek: </h4> <p> This section discusses important characteristics of data formats which can together be used to describe and understand them. Format specification designers SHOULD clearly identify the features of a format specification that peek across specification boundaries.
A textual data format is one in which the data is specified as a linear sequence of characters. HTML, Internet e-mail, and all XML-based languages formats are textual. In modern textual data formats, the characters are usually taken from the Unicode repertoire. repertoire [ UNICODE ].
Binary data formats are those in which portions of the data are encoded for direct use by computer processors, for example thirty-two bit little-endian two's-complement and sixty-four bit IEEE double-precision floating-point. The portions of data so represented include numeric values, pointers, and compressed data of all sorts.
In principle, all data can be represented using textual formats.
The trade-offs between binary and textual data formats are complex and application-dependent. Binary formats can be substantially more compact, particularly for complex pointer-rich data structures. Also, they can be consumed more rapidly by software in those cases where they can be loaded into memory and used with little or no conversion.
Textual formats are often more portable and interoperable, since there are fewer choices for representation of the basic units (characters), and those choices are well-understood and widely implemented.
Textual formats also have the considerable advantage that they can be directly read and understood by human beings. This can simplify the tasks of creating and maintaining processing software, and allow the direct intervention of humans in the processing chain without recourse to tools any more complex than the ubiquitous text editor. Finally, it simplifies the necessary human task of learning about new data formats (the "View Source" effect).
deleted text: All things being equal (a rare state of affairs) textual formats are generally preferable to binary ones in Web applications. </p> <p> It is important to emphasize that intuition as to such matters as data size and processing speed are not a reliable guide in data format design; quantitative studies are essential to a correct understanding of the trade-offs.
TAG issue binaryXML-30 : Effect of Mobile on architecture - size, complexity, memory constraints. Binary infosets, storage efficiency.
Final-form Many modern data formats are not designed to allow modification or uses other than that intended by their designers. An example would be PDF, which is designed to support the presentation of page images on either screen or paper, and is not readily used in any other way. XSL Formatting Objects (XSL-FO) share this characteristic. </p> <p> XHTML, on the other hand, can be format specifications include mechanisms for composition. These mechanisms range from relatively shallow and is put to a variety of uses including direct display (with highly flexible display semantics), processing by network-sensitive Web spiders limited to support search and retrieval operations, and reprocessing into a variety of derivative forms. </p> <p> In general XML-based data formats are more re-usable relatively deep and repurposable than the alternatives, although the example of XSL-FO shows that this is not an absolute. sophisticated.
There are many cases where final-form is an application requirement; representations which embody legally-binding transactions are an obvious example. In such cases, Toward the use shallow end of deleted text: digital signatures may be appropriate to achieve immutability, whether the format spectrum, it is naturally final-form or possible to embed text comments in some XML vocabulary. </p> <p> On the other hand, where image formats, such requirements are not in play, representations that are reusable and repurposable as JPEG/JFIF. Although these comments are embedded in deleted text: general higher in value, particularly in the case where containing data, they have little or no effect on the content of the information's utility may be long-lived. image.
deleted text: </div> <div class="section"> <h5> 3.2.2.3. <a shape="rect" name="composable" id="composable"> Composable v. Standalone </a> </h5>Some data formats are explicitly designed Towards the deep end, it is possible to be used in combination compose XML documents with others, while some are designed for standalone use. An example of elements from a standalone data format is PDF; it variety of namespaces. How these namespaces interact and what effect an element's namespace has on its ancestors, siblings, and descendents is not typically embedded in representations encoded in other formats. always obvious.
At Near the other extreme is SOAP, middle of the spectrum, there are container formats such as SOAP which is designed explicitly fully expect to contain a "payload" in some non-SOAP vocabulary. Another example is SVG, be composed from multiple namespaces but which is designed to provide an overall semantic relationship of message envelope and payload.
These relationships can be included in compound documents, mixed and which may in turn nested arbitrarily. In principle, a SOAP message can contain information encoded in other XML vocabularies. a JPEG image that contains an RDF comment that references a vocabulary of terms for describing the image.
This characteristic Composition is related to, to but distinct from, from the final-form/reusable distinction discussed above. question of whether a data format is intended as a final form . For example, one can deleted text: certainly imagine cases where it is useful for a representation to include data embedding SVG in multiple different formats, but be considered immutable a JPEG image thus combining final-form and display-only. reusable components, whereas a SOAP envelope might provide nothing more than a container for a particular payload that has no presentation form at all.
TAG issue xmlProfiles-29 : When, whither and how to profile W3C specifications in the XML Family?
TAG issue mixedUIXMLNamespace-33 : Composability for user interface-oriented XML namespaces
TAG issue xmlFunctions-34 : XML Transformation and composability (e.g., XSLT, XInclude, Encryption)
TAG issue RDFinXHTML-35 : Syntax and semantics for embedding RDF in XHTML
deleted text: XML and XML Namespaces allow format designers to create and combine vocabularies. A format is extensible if instances of the format can include terms from other vocabularies. For example, XML and XML Namespaces allow format designers to create and combine vocabularies.
Good practice
Extensibility: Format extensibility: Format designers should create extensible formats.
Versioning is the term for the evolution of languages formats and documents. Versioning is achieved through extensibility mechanisms and language format redefinition. When a format definition changes (e.g., by addition or removal of element or attribute definitions), this creates a new version of the format. When an instance of a format includes other vocabulary elements, elements from another data format, this creates an extension of the instance; the original format definition has not changed. An example is a SOAP message with a header block, block; this is called a SOAP extension, not a new version of the SOAP format.
The following terms define important relationships among different versions of a format:
Good practice
Compatibility: Format compatibility: Format designers SHOULD define extensibility models that allow forwards compatible and backwards compatible changes.
Naturally, even if M and N are compatible but different versions of a format, agents components will process instances of them differently. For instance, if format version M is forwards compatible with format version N, M processors that encounter N instances might handle unknown elements by ignoring them entirely, or by ignoring element tags but continuing to process element content. Different format specifications may require different compatibility behavior.
Good practice
Compatibility behavior: Format designers SHOULD define expected behavior when agents components designed to process one version of a format encounter a compatible version of the format.
In
some
cases,
format
designers
require
that
new
features
be
supported
(i.e.,
not
ignored).
In
this
case,
the
new
version
of
the
format
(N)
may
be
backwards
compatible
with
the
earlier
version
(M),
but
M
is
not
forwards
compatible
with
N.
The
SOAP
1.2
Recommendation
[
SOAP12
],
for
example,
defines
the
mustUnderstand
attribute
in
section
5.2.3
.
For more information on format extensibility, refer to "Web Architecture: Extensible Languages" [ EXTLANG ].
Replacement text from C. Lilley expected.
In many cases, the information contained encoded in a separation data format is logically separable from the choice of ways in which it may be presented to a human, and the modes of interaction it may support.
While such separation is, where possible, often advantageous, it is clearly not always possible and in some cases not desirable either.
<p> <i> Replacement text from C. Lilley expected. </i>Final-form data formats are not designed to allow modification or uses other than that intended by their designers. An example would be PDF, which is designed to support the presentation of page images on either screen or paper, and is not readily used in any other way. XSL Formatting Objects (XSL-FO) share this characteristic.
XHTML, on the other hand, can be and is put to a variety of uses including direct display (with highly flexible display semantics), processing by network-sensitive Web spiders to support search and retrieval operations, and reprocessing into a variety of derivative forms.
There are many cases where final-form is an application requirement; representations which embody legally-binding transactions are an obvious example. In such cases, the use of digital signatures may be appropriate to achieve immutability.
On the other hand, where such requirements are not in play, representations that are re-usable and re-purposable are in general higher in value, particularly in the case where the information's utility may be long-lived.
See also TAG issues Issue formattingProperties-19 and contentPresentation-26 .
One
of
the
greatest
strengths
of
HTML
as
a
format
is
that
it
allows
authors
to
embed
cross
references
(hyperlinks).
The
simplicity
of
<a
href="#foo">
as
a
link
to
"foo"
foo
and
<a
name="foo">
as
the
anchor
"foo"
foo
are
partly
(perhaps
largely)
responsible
for
the
birth
of
the
hypertext
Web
as
we
know
it
today.
Simple, single-ended, single-direction, inline links are not the most powerful linking paradigm imaginable. But they They are very easy to understand. And understand, however, and they can be authored by individuals (or other agents) components) that have no control or write access to the other end point.
More sophisticated linking mechanisms have been invented for the Web. XPointer allows links to address content that does not have an explicit, named anchor. XLink allows links to have multiple ends and to be expressed either inline or in "link bases" stored external to any or all of the resources identified by the links it contains.
All of the current common linking mechanisms identify resources by URI and optionally identify portions (or views) of a resource with the fragment identifier. reference.
Good practice
Link mechanisms: Format specification designers SHOULD provide mechanisms for identifying links to other resources and to portions of representations (via fragment identifiers). Allow Web-wide linking, not just internal document linking.
For formats based on XML, format designers should examine XLink and the XPointer framework for inspiration. To define fragment identifier syntax, use at least the XPointer Framework and XPointer element() Schemes.
TAG issue: What is the scope of using XLink? xlinkScope-23 .
If a future revision of RFC 3023 identifies the XPointer Framework, element(), and perhaps other ancillary schemes as the fragment identifier syntax for XML documents, authors will be able to rely on at least those schemes for all XML documents.
Good practice
URI genericity: Format specification designers SHOULD allow authors to use URIs without constraining them to a limited set of URI schemes.
Good practice
QName caution: Format specification designers MAY use Qualified Names (QNames) for identifiers in representation data, but should be aware of the limitations and interoperability risks associated with them.
TAG issue: What is See the scope of using XLink? <a shape="rect" href="http://www.w3.org/2001/tag/ilist#xlinkScope-23"> xlinkScope-23 TAG finding " Using QNames as Identifiers in Content " for more information. See also TAG issues rdfmsQnameUriMapping-6 and qnameAsId-18 .
Many deleted text: resource representations are encoded in using data formats which are based on XML vocabularies. 1.0 [XML10] . This section discusses issues that are specific to such deleted text: data formats. deleted text: </p> <p> Anyone seeking guidance in this area is urged to consult the "Guidelines For The Use of XML in IETF Protocols" [IETFXML] </a> for the use of XML in Internet Protocols. This document , which contains a very thorough discussion of the considerations that govern whether or not XML ought to be used, as well as specific guidelines on how it ought to be used. While it is directed at Internet applications with specific reference to protocols, the discussion is generally applicable to Web scenarios as well.
The discussion here should be seen as ancillary to the content of the IETF BCP. [IETFXML] . Refer also to "XML Accessibility Guidelines" [XAG] for help designing XML formats that lower barriers to Web accessibility for people with disabilities.
XML defines textual data formats that are naturally suited to describing data objects which are hierarchical and processed in an in-order sequence. It is widely but not universally applicable for format specifications. For example, an audio or video format is unlikely to be well suited to representation in XML. Design constraints that would suggest the use of XML include:
Editor's note : Which XML Specifications make up the XML Family? </p> </div> <div class="section"> <h4> 3.3.2. <a shape="rect" name="xml-namespaces" id="xml-namespaces"> XML Namespaces </a> </h4> <p> The Web is significantly a <em> networked </em> information system. Authors and applications can use URIs uniformly to identify different resources. After representations of these resources have been retrieved, they may be processed in a variety of ways. Some applications (and some users) will undoubtedly build new resources by combining several representations together. This is particularly easy, and potentially useful, when XML representations are available for all the resources. </p> <p> However, combining representations in this way moves them out of their original context and places them in a new context. This change of context introduces the possibility of information loss. Any information that depended on XML Specifications make up the local context will no longer be available. XML Family?
What is needed is a mechanism for establishing a global context The authority responsible for the "weather.example.com" realize that they can provide more interesting representations by creating instances that consist of elements and attributes defined in the XML resources. This problem bears a strong resemblance to the distinction between relative different published XML-based formats, such as XHTML, SVG, and absolute URIs. While MathML. How do the many hundreds of relative URI references to "index.html" on a typical web server may be entirely unambiguous in their respective contexts, they have no unambiguous global meaning. But each such relative URI has an unambiguous absolute URI application designers ensure that can be established in its local context and used there are no naming conflicts when deleted text: a document is moved. This solves the problem for URI references. </p> <p> For elements and attributes, their names can be seen as analogous to relative URI. Within their original context, they have meanings combine elements from different formats (e.g., suppose that are clear and entirely unambiguous. Namespaces the "p" element is defined in two or more combined XML formats)? "Namespaces in XML" [ XMLNS ] provides a mechanism for establishing a globally unique name that can be understood in any context.
The "absolute" form of an XML element or attribute name is the combination of its namespace URI and its local name. This is represented lexically in documents by associating namespace names with (optional) prefixes and combining prefixes and local names with a colon as described in "Namespaces in XML" [ <a shape="rect" href="#XMLNS"> XMLNS </a> ]. XML."
Designers Format specification designers that use declare namespaces deleted text: are thus providing provide a global context for documents authored with their schema. instances of the data format. Establishing this global context allows their documents those instances (and portions of their documents) thereof) to be reused re-used and combined in novel ways not yet imagined. Failure to provide a namespace makes such reuse re-use more difficult, perhaps impractical in some cases.
The most significant technical drawback to using namespaces is that they do not interact well with DTDs. DTDs perform validation based on the lexical form of the name, making prefixes semantically significant in ways that are not desirable. As other schema deleted text: language technologies become widely deployed, this drawback will diminish in significance.
Namespace designers SHOULD make available human-readable material Dan receives a representation from "weather.example.com" in an unfamiliar data format. He knows enough about XML to meet recognize which XML namespace the needs elements belong to. Since the namespace is identified by a URI, he asks his browser to retrieve a representation of deleted text: those who will use the namespace vocabulary. The simplest way via that URI. He gets back some useful data that allows him to achieve learn more about the data format; this is for the called a namespace name to be an HTTP URI which document . Dan's browser may also be dereferenced able to access this material. The resource identified by use machine-readable data automatically to perform useful tasks on Dan's behalf, such a URI is called a "namespace document." as download additional software components to process and render the format.
There are many reasons why a person or agent other component might want more information about the namespace. A person might want to:
A namespace document should also support the automatic retrieval of other Web resources that support the processing markup from this vocabulary. Useful information to processors includes:
Good practice
Namespace documents: XML namespace designers SHOULD make available human-readable and machine-readable material to meet the needs of those who will use the namespace vocabulary.
It follows that there is, in In general, there is no single type of resource that can be returned in response to a request "best" data format for the encoding a namespace name that will always be the most appropriate; see document. See the section on future work regarding namespace document formats for more information.
Issue : namespaceDocument-8 : What should a "namespace document" look like?
Issue : abstractComponentRefs-37 : Definition of abstract components with namespace names and frag ids
deleted text: <p> <span class="ednote"> Editor's note </span>: Where should we put a section on mixing namespaces; is the section on processing model more appropriate? See issue <a shape="rect" href="http://www.w3.org/2001/tag/ilist.html#mixedUIXMLNamespace-33"> mixedUIXMLNamespace-33 </a>. </p>
Suppose
that
the
URI
"
http://example.com/oaxaca
"
defines
a
resource
with
representations
encoded
in
XML.
What,
then,
is
the
interpretation
of
the
URI
"
http://example.org/oaxaca#weather
?
"?
The URI specification [ URI ] makes it clear that the interpretation depends on the deleted text: context of the media type of the representation. It follows from this that representation data. Per the previous good practice note on fragment identifiers , designers of an XML-based data formats SHOULD include format specification should define the semantics of fragment identifiers in their designs. that format. The XPointer Framework [ XPTRFR ] provides a syntax designed for in such fragment identifiers, and it SHOULD be used for this purpose. interoperable starting point.
When
a
representation
is
provided
whose
the
media
type
assigned
to
representation
data
is
application/xml
,
there
are
no
semantics
defined
for
fragment
identifiers,
and
thus
they
SHOULD
NOT
be
provided
for
authors
should
not
make
use
of
fragment
identifiers
in
such
representations.
This
is
also
the
case
if
the
representation
data.
The
same
is
known
to
be
XML
because
true
if
the
assigned
media
type
has
a
the
suffix
deleted text:
of
+xml
as
described
(defined
in
"XML
Media
Types"
[
RFC3023
],
but
])
as
there
is
no
normative
specification
of
fragment
semantics.
semantics
in
this
case.
It
is
common
practice
to
assume
that
when
an
element
has
an
attribute
that
is
declared
in
a
DTD
to
be
of
type
ID,
then
the
fragment
identifier
#abc
identifies
the
element
which
has
an
attribute
of
that
type
whose
value
is
"abc"
.
However,
there
is
no
normative
support
for
this
assumption
and
it
is
problematic
in
practice,
since
the
only
defined
way
to
establish
that
an
attribute
is
of
type
ID
is
via
a
DTD,
which
may
not
exist
or
may
not
be
available.
TAG issue fragmentInXML-28 : Do fragment identifiers refer to a syntactic element (at least for XML content), or can they refer to abstractions? See TAG issue.
TAG issue xmlIDSemantics-32 : How should the problem of identifying ID semantics in XML languages formats be addressed in the absence of a DTD? See deleted text: <strong> draft </strong> TAG finding " How should the problem of identifying ID semantics in XML languages formats be addressed in the absence of a DTD? " .
RFC
3023
defines
the
media
types
Internet
Media
Types
application/xml
and
text/xml
,
and
describes
a
convention
whereby
XML-based
data
formats
use
media
types
Internet
Media
Types
with
a
+xml
suffix,
for
example
image/svg+xml
.
Good practice
XML
and
"text/*":
In
general,
media
types
Internet
Media
Types
beginning
with
text/
SHOULD
NOT
be
used
for
assigned
to
XML
representations.
They
These Internet Media Types create two problems: First, intermediate agents intermediaries in the Web are allowed to "transcode", i.e., convert one character encoding to another. Since XML documents are designed to allow them to be self-describing, and since this is a good and widely-followed practice, any such transcoding will make the self-description false.
Secondly,
Second,
representations
whose
media
types
Internet
Media
Types
begin
with
text/
are
required,
unless
the
charset
parameter
is
specified,
to
be
considered
to
be
encoded
in
US-ASCII.
In
the
case
of
XML,
since
it
is
self-describing,
it
is
good
practice
to
omit
the
charset
parameter,
and
since
XML
is
very
often
not
encoded
in
US-ASCII,
the
use
of
"
text/
"
media
types
Internet
Media
Types
effectively
precludes
this
good
practice.
There remain open questions regarding resource representations. The following sections identify a few areas of future work in the Web community. The TAG makes no commitment at this time to pursuing these issues.
Glossary not yet completed .
Editor's note : The TAG is still experimenting with the categorization of points in this document. This list is likely to change. It has also been suggested that the categories clearly indicate their primary audience.
The important points of this document are categorized as follows:
*
had
been
chosen
instead,
the
large-scale
result
would,
most
likely,
have
been
the
same.
Other
design
choices
are
more
fundamental;
these
are
the
focus
of
this
document.
Editor's note : The usage of a normative reference in this document needs clarification.
The authors of this This document are was authored by the participants of W3C's W3C Technical Architecture Group: Group which included the following participants: Tim Berners-Lee (Chair, (co-Chair, W3C), Tim Bray (Antarctica Systems), Dan Connolly (W3C), Paul Cotton (Microsoft), (Microsoft Corporation), Roy Fielding (Day Software), Chris Lilley (W3C), David Orchard (BEA Systems), Norman Walsh (Sun), and Stuart Williams (Hewlett-Packard). (co-Chair, Hewlett-Packard).
The TAG thanks people for their thoughtful contributions on the TAG's public mailing list, www-tag ( archive ).