SlideShare una empresa de Scribd logo
1 de 16
Chromium vs. Firefox




 Software Architecture and Design Review
Web Browser

Software application for retrieving, presenting,
 and traversing information resources on the
              World Wide Web
Features of a Web
         Browser
•   User Interface
•   Privacy
•   Security
•   Extendibility
•   Standard Support
Reference Architecture
Firefox Architecture
User Interface
Architecture
Browser Engine
Functional Requirements
• Basic User Interface Features
• Watch Audio, Video, Images and other non-HTML
  features.
• Run JavaScript and CSS
• Tabbed Browsing
• Recover from Crashes
• Manage Downloads
Non-Functional
 Requirements
•   Modifiability
•   Security
•   Performance
•   Reusability
•   Extendibility
Chromium Architecture
Functional Requirements
 • Basic User Interface Requirements
 • Multiple Processes for same Application
 • Inter Process Communication
 • Secure/Safe Browsing
 • Watch Audio, Video, Images and other non-HTML
   features.
 • Run JavaScript and CSS
 • Recover from Crashes
 • Manage Downloads
Non-Functional
 Requirements
•   Security
•   Performance
•   Availability
•   Modifiability
•   Usability
•   Extendibility
Comparison – High Level
    Architecture




    Firefox     Chromium
Comparison - Security




Networking Subsystem of   Security Model of
        Firefox              Chromium
Who is the best?
Thank You!
               Presented by,
 Rashmika Nawaratne B.K.U.R.   090348E
 Samitha Senarathna M.S.R.     090476T
 Gimantha Bandara M.           090047F

Más contenido relacionado

La actualidad más candente

Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
ppt of web designing and development
ppt of web designing and developmentppt of web designing and development
ppt of web designing and development47ishu
 
OVERVIEW: Chromium Source Tree
OVERVIEW: Chromium Source TreeOVERVIEW: Chromium Source Tree
OVERVIEW: Chromium Source TreeChang W. Doh
 
Session10-PHP Misconfiguration
Session10-PHP MisconfigurationSession10-PHP Misconfiguration
Session10-PHP Misconfigurationzakieh alizadeh
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation BlueChipICT
 
Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV NANDINI SHARMA
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilitiesMayur Mehta
 
Zephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfZephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfibramax
 
Architecture of the Web browser
Architecture of the Web browserArchitecture of the Web browser
Architecture of the Web browserSabin Buraga
 
communication Mechanism in Client Server Model
communication Mechanism in Client Server Model communication Mechanism in Client Server Model
communication Mechanism in Client Server Model Junaid Lodhi
 
Web application framework
Web application frameworkWeb application framework
Web application frameworkPankaj Chand
 
Web Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User ExperienceWeb Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User ExperienceChromeInfo Technologies
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptxmasbulosoke
 
Front end for back end developers
Front end for back end developersFront end for back end developers
Front end for back end developersWojciech Bednarski
 

La actualidad más candente (20)

Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
ppt of web designing and development
ppt of web designing and developmentppt of web designing and development
ppt of web designing and development
 
OVERVIEW: Chromium Source Tree
OVERVIEW: Chromium Source TreeOVERVIEW: Chromium Source Tree
OVERVIEW: Chromium Source Tree
 
Session10-PHP Misconfiguration
Session10-PHP MisconfigurationSession10-PHP Misconfiguration
Session10-PHP Misconfiguration
 
Web engineering lecture 1
Web engineering lecture 1Web engineering lecture 1
Web engineering lecture 1
 
Web Designing
Web Designing Web Designing
Web Designing
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation
 
Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilities
 
Zephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfZephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdf
 
Architecture of the Web browser
Architecture of the Web browserArchitecture of the Web browser
Architecture of the Web browser
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
communication Mechanism in Client Server Model
communication Mechanism in Client Server Model communication Mechanism in Client Server Model
communication Mechanism in Client Server Model
 
Web application framework
Web application frameworkWeb application framework
Web application framework
 
Web Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User ExperienceWeb Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User Experience
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptx
 
Configuration DHCP
Configuration DHCPConfiguration DHCP
Configuration DHCP
 
Dc domain controller
Dc domain controllerDc domain controller
Dc domain controller
 
Web servers
Web serversWeb servers
Web servers
 
Front end for back end developers
Front end for back end developersFront end for back end developers
Front end for back end developers
 

Destacado

Web browser architecture
Web browser architectureWeb browser architecture
Web browser architectureNguyen Quang
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web ArchitectureChamnap Chhorn
 
Mobile Browser Internal (Blink Rendering Engine)
Mobile Browser Internal (Blink Rendering Engine)Mobile Browser Internal (Blink Rendering Engine)
Mobile Browser Internal (Blink Rendering Engine)Hyungwook Lee
 
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)FirefoxOS and its use of Linux (a deep dive into Gonk architecture)
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)Aimee Maree Forsstrom
 
Android Chromium Rendering Pipeline
Android Chromium Rendering PipelineAndroid Chromium Rendering Pipeline
Android Chromium Rendering PipelineHyungwook Lee
 
Firefox extension Development
Firefox extension DevelopmentFirefox extension Development
Firefox extension DevelopmentAbhinav Chittora
 
Introduction to cassandra
Introduction to cassandraIntroduction to cassandra
Introduction to cassandraNguyen Quang
 
Mobile Opera Browser
Mobile Opera BrowserMobile Opera Browser
Mobile Opera BrowserSteve Yu
 
Mozilla Firefox - Swot analysis
Mozilla Firefox - Swot analysisMozilla Firefox - Swot analysis
Mozilla Firefox - Swot analysisJakob Marovt
 
WebKit and Blink: Open Development Powering the HTML5 Revolution (LinuxCon No...
WebKit and Blink: Open Development Powering the HTML5 Revolution (LinuxCon No...WebKit and Blink: Open Development Powering the HTML5 Revolution (LinuxCon No...
WebKit and Blink: Open Development Powering the HTML5 Revolution (LinuxCon No...Igalia
 
Compiling and Optimizing Your Own Browser with WebKit
Compiling and Optimizing Your Own Browser with WebKitCompiling and Optimizing Your Own Browser with WebKit
Compiling and Optimizing Your Own Browser with WebKitSencha
 
Chrom works introduction
Chrom works   introductionChrom works   introduction
Chrom works introductionSoo Kim
 
Android chromium web view
Android chromium web viewAndroid chromium web view
Android chromium web view朋 王
 
LCU14 208- Chromium-Blink Migration for RDK
LCU14 208- Chromium-Blink Migration for RDKLCU14 208- Chromium-Blink Migration for RDK
LCU14 208- Chromium-Blink Migration for RDKLinaro
 
A Browser for the Automotive: Introduction to WebKit for Wayland (Automotive ...
A Browser for the Automotive: Introduction to WebKit for Wayland (Automotive ...A Browser for the Automotive: Introduction to WebKit for Wayland (Automotive ...
A Browser for the Automotive: Introduction to WebKit for Wayland (Automotive ...Igalia
 
Chrome & Webkit overview
Chrome & Webkit overviewChrome & Webkit overview
Chrome & Webkit overviewBin Chen
 

Destacado (20)

Web browser architecture
Web browser architectureWeb browser architecture
Web browser architecture
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web Architecture
 
Mobile Browser Internal (Blink Rendering Engine)
Mobile Browser Internal (Blink Rendering Engine)Mobile Browser Internal (Blink Rendering Engine)
Mobile Browser Internal (Blink Rendering Engine)
 
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)FirefoxOS and its use of Linux (a deep dive into Gonk architecture)
FirefoxOS and its use of Linux (a deep dive into Gonk architecture)
 
How Browser Works?
How Browser Works?How Browser Works?
How Browser Works?
 
Android Chromium Rendering Pipeline
Android Chromium Rendering PipelineAndroid Chromium Rendering Pipeline
Android Chromium Rendering Pipeline
 
The WebKit project
The WebKit projectThe WebKit project
The WebKit project
 
Firefox extension Development
Firefox extension DevelopmentFirefox extension Development
Firefox extension Development
 
Introduction to cassandra
Introduction to cassandraIntroduction to cassandra
Introduction to cassandra
 
Mobile Opera Browser
Mobile Opera BrowserMobile Opera Browser
Mobile Opera Browser
 
Google chrome
Google chromeGoogle chrome
Google chrome
 
Mozilla Firefox - Swot analysis
Mozilla Firefox - Swot analysisMozilla Firefox - Swot analysis
Mozilla Firefox - Swot analysis
 
WebKit and Blink: Open Development Powering the HTML5 Revolution (LinuxCon No...
WebKit and Blink: Open Development Powering the HTML5 Revolution (LinuxCon No...WebKit and Blink: Open Development Powering the HTML5 Revolution (LinuxCon No...
WebKit and Blink: Open Development Powering the HTML5 Revolution (LinuxCon No...
 
The Analysis of Google
The Analysis of GoogleThe Analysis of Google
The Analysis of Google
 
Compiling and Optimizing Your Own Browser with WebKit
Compiling and Optimizing Your Own Browser with WebKitCompiling and Optimizing Your Own Browser with WebKit
Compiling and Optimizing Your Own Browser with WebKit
 
Chrom works introduction
Chrom works   introductionChrom works   introduction
Chrom works introduction
 
Android chromium web view
Android chromium web viewAndroid chromium web view
Android chromium web view
 
LCU14 208- Chromium-Blink Migration for RDK
LCU14 208- Chromium-Blink Migration for RDKLCU14 208- Chromium-Blink Migration for RDK
LCU14 208- Chromium-Blink Migration for RDK
 
A Browser for the Automotive: Introduction to WebKit for Wayland (Automotive ...
A Browser for the Automotive: Introduction to WebKit for Wayland (Automotive ...A Browser for the Automotive: Introduction to WebKit for Wayland (Automotive ...
A Browser for the Automotive: Introduction to WebKit for Wayland (Automotive ...
 
Chrome & Webkit overview
Chrome & Webkit overviewChrome & Webkit overview
Chrome & Webkit overview
 

Similar a Chromium vs. Firefox

CompTIASecPLUSAASS-part4 - Edited (1).pptx
CompTIASecPLUSAASS-part4 - Edited (1).pptxCompTIASecPLUSAASS-part4 - Edited (1).pptx
CompTIASecPLUSAASS-part4 - Edited (1).pptxmohedkhadar60
 
Webdev battacherjee
Webdev battacherjeeWebdev battacherjee
Webdev battacherjeeRavingTiger
 
PaaS security challenges and solutions (salesforce vision)
PaaS security challenges and solutions (salesforce vision)PaaS security challenges and solutions (salesforce vision)
PaaS security challenges and solutions (salesforce vision)Olga Lavrentieva
 
CIS5-204-Project-CH6Z - Sharyan.pptx.pptx
CIS5-204-Project-CH6Z - Sharyan.pptx.pptxCIS5-204-Project-CH6Z - Sharyan.pptx.pptx
CIS5-204-Project-CH6Z - Sharyan.pptx.pptxZakariaSharyan
 
Filemaker security-protect-your-data
Filemaker security-protect-your-dataFilemaker security-protect-your-data
Filemaker security-protect-your-dataDB Services
 
2019 devconfza - legacy js
2019   devconfza - legacy js2019   devconfza - legacy js
2019 devconfza - legacy jsWilliam Brander
 
AMF Flash and .NET
AMF Flash and .NETAMF Flash and .NET
AMF Flash and .NETYaniv Uriel
 
Selenium for everyone
Selenium for everyoneSelenium for everyone
Selenium for everyoneTft Us
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...Brian Culver
 
CIS5-project-boughzala-amine.pptx
CIS5-project-boughzala-amine.pptxCIS5-project-boughzala-amine.pptx
CIS5-project-boughzala-amine.pptxamiineboughzala
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease Inductive Automation
 
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...Microsoft Private Cloud
 
Media streaming on aws
Media streaming on awsMedia streaming on aws
Media streaming on awscloudnonstop
 
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBMEnterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBMData Driven Innovation
 
Migrating Enterprise Microservices From Cloud Foundry to Kubernetes
Migrating Enterprise Microservices From Cloud Foundry to KubernetesMigrating Enterprise Microservices From Cloud Foundry to Kubernetes
Migrating Enterprise Microservices From Cloud Foundry to KubernetesTony Erwin
 
The Case Against Frameworks - JFall 2023
The Case Against Frameworks - JFall 2023The Case Against Frameworks - JFall 2023
The Case Against Frameworks - JFall 2023Jan-Hendrik Kuperus
 

Similar a Chromium vs. Firefox (20)

Firefox vs. chrome
Firefox vs. chromeFirefox vs. chrome
Firefox vs. chrome
 
CompTIASecPLUSAASS-part4 - Edited (1).pptx
CompTIASecPLUSAASS-part4 - Edited (1).pptxCompTIASecPLUSAASS-part4 - Edited (1).pptx
CompTIASecPLUSAASS-part4 - Edited (1).pptx
 
Webdev battacherjee
Webdev battacherjeeWebdev battacherjee
Webdev battacherjee
 
PaaS security challenges and solutions (salesforce vision)
PaaS security challenges and solutions (salesforce vision)PaaS security challenges and solutions (salesforce vision)
PaaS security challenges and solutions (salesforce vision)
 
Chrome O S
Chrome O SChrome O S
Chrome O S
 
CIS5-204-Project-CH6Z - Sharyan.pptx.pptx
CIS5-204-Project-CH6Z - Sharyan.pptx.pptxCIS5-204-Project-CH6Z - Sharyan.pptx.pptx
CIS5-204-Project-CH6Z - Sharyan.pptx.pptx
 
Filemaker security-protect-your-data
Filemaker security-protect-your-dataFilemaker security-protect-your-data
Filemaker security-protect-your-data
 
2019 devconfza - legacy js
2019   devconfza - legacy js2019   devconfza - legacy js
2019 devconfza - legacy js
 
Document Management System
Document Management System Document Management System
Document Management System
 
AMF Flash and .NET
AMF Flash and .NETAMF Flash and .NET
AMF Flash and .NET
 
Selenium for everyone
Selenium for everyoneSelenium for everyone
Selenium for everyone
 
Intorduction to Datapower
Intorduction to DatapowerIntorduction to Datapower
Intorduction to Datapower
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
 
CIS5-project-boughzala-amine.pptx
CIS5-project-boughzala-amine.pptxCIS5-project-boughzala-amine.pptx
CIS5-project-boughzala-amine.pptx
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
 
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
 
Media streaming on aws
Media streaming on awsMedia streaming on aws
Media streaming on aws
 
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBMEnterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
 
Migrating Enterprise Microservices From Cloud Foundry to Kubernetes
Migrating Enterprise Microservices From Cloud Foundry to KubernetesMigrating Enterprise Microservices From Cloud Foundry to Kubernetes
Migrating Enterprise Microservices From Cloud Foundry to Kubernetes
 
The Case Against Frameworks - JFall 2023
The Case Against Frameworks - JFall 2023The Case Against Frameworks - JFall 2023
The Case Against Frameworks - JFall 2023
 

Más de Rashmika Nawaratne

Time Management : Manage your focus
Time Management : Manage your focusTime Management : Manage your focus
Time Management : Manage your focusRashmika Nawaratne
 
Higher Education Pathways, Opportunities and Scholarships
Higher Education Pathways, Opportunities and ScholarshipsHigher Education Pathways, Opportunities and Scholarships
Higher Education Pathways, Opportunities and ScholarshipsRashmika Nawaratne
 
Professional Etiquette - Communication, Grooming, Email and Workplace
Professional Etiquette - Communication, Grooming, Email and WorkplaceProfessional Etiquette - Communication, Grooming, Email and Workplace
Professional Etiquette - Communication, Grooming, Email and WorkplaceRashmika Nawaratne
 
Mobile Enablement And Intelligence
Mobile Enablement And IntelligenceMobile Enablement And Intelligence
Mobile Enablement And IntelligenceRashmika Nawaratne
 
Connect the dots and Groom as a Professional
Connect the dots and Groom as a ProfessionalConnect the dots and Groom as a Professional
Connect the dots and Groom as a ProfessionalRashmika Nawaratne
 
Resume Writing and Online Media Presence
Resume Writing and Online Media PresenceResume Writing and Online Media Presence
Resume Writing and Online Media PresenceRashmika Nawaratne
 
Hybrid Mobile Development - Overview and Intro to Cordova/Ionic Framework
Hybrid Mobile Development - Overview and Intro to Cordova/Ionic FrameworkHybrid Mobile Development - Overview and Intro to Cordova/Ionic Framework
Hybrid Mobile Development - Overview and Intro to Cordova/Ionic FrameworkRashmika Nawaratne
 
Show your professionalism using LinkedIn
Show your professionalism using LinkedInShow your professionalism using LinkedIn
Show your professionalism using LinkedInRashmika Nawaratne
 
Professional Communication Etiquette
Professional Communication EtiquetteProfessional Communication Etiquette
Professional Communication EtiquetteRashmika Nawaratne
 
Railway Ticket Issuing System (Online)
Railway Ticket Issuing System (Online)Railway Ticket Issuing System (Online)
Railway Ticket Issuing System (Online)Rashmika Nawaratne
 
How expensive a logical agent is
How expensive a logical agent isHow expensive a logical agent is
How expensive a logical agent isRashmika Nawaratne
 

Más de Rashmika Nawaratne (13)

Time Management : Manage your focus
Time Management : Manage your focusTime Management : Manage your focus
Time Management : Manage your focus
 
Higher Education Pathways, Opportunities and Scholarships
Higher Education Pathways, Opportunities and ScholarshipsHigher Education Pathways, Opportunities and Scholarships
Higher Education Pathways, Opportunities and Scholarships
 
Professional Etiquette - Communication, Grooming, Email and Workplace
Professional Etiquette - Communication, Grooming, Email and WorkplaceProfessional Etiquette - Communication, Grooming, Email and Workplace
Professional Etiquette - Communication, Grooming, Email and Workplace
 
Mobile Enablement And Intelligence
Mobile Enablement And IntelligenceMobile Enablement And Intelligence
Mobile Enablement And Intelligence
 
Connect the dots and Groom as a Professional
Connect the dots and Groom as a ProfessionalConnect the dots and Groom as a Professional
Connect the dots and Groom as a Professional
 
Resume Writing and Online Media Presence
Resume Writing and Online Media PresenceResume Writing and Online Media Presence
Resume Writing and Online Media Presence
 
Hybrid Mobile Development - Overview and Intro to Cordova/Ionic Framework
Hybrid Mobile Development - Overview and Intro to Cordova/Ionic FrameworkHybrid Mobile Development - Overview and Intro to Cordova/Ionic Framework
Hybrid Mobile Development - Overview and Intro to Cordova/Ionic Framework
 
Show your professionalism using LinkedIn
Show your professionalism using LinkedInShow your professionalism using LinkedIn
Show your professionalism using LinkedIn
 
Professional Communication Etiquette
Professional Communication EtiquetteProfessional Communication Etiquette
Professional Communication Etiquette
 
Sms presentation
Sms presentationSms presentation
Sms presentation
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
Railway Ticket Issuing System (Online)
Railway Ticket Issuing System (Online)Railway Ticket Issuing System (Online)
Railway Ticket Issuing System (Online)
 
How expensive a logical agent is
How expensive a logical agent isHow expensive a logical agent is
How expensive a logical agent is
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Chromium vs. Firefox

Notas del editor

  1. Firefox is a well known browser for using extensions. Since the last decade its a paradise for application developers. Chromium. This was initially the same as the Chrome but Google gave out the source code of chrome for developers and the name of the project was chromium. Then the developers added features and released updates under the name of chromium. Our objective is to compare the 2 browsers.
  2. First we’ll look at a general browser and identify its characteristics. Basically browser is a app to retrieve present travers info/resources on www. Initially the user requests for a web resource using a URL. HTML is passed to the browser's layout engine to be transformed from markup to an interactive document. Other than documents most browsers can display images, audio, video, and XML files using technologies like xpath and xquery. Support Flash applications and Java applets.
  3. User Interface: Navigation Buttons Refresh Button Stop Button Home Button Address Bar Integrated Search Bookmarking Tabbed Browsing Privacy and security Provide support for HTTPS Quick and easy ways to delete the web cache, cookies, and browsing history Extensibility Supports the development of browser extensions. Standard Support Ability to display images, audio, video, and XML files, and have extensions to support Flash applications and Java applets
  4. To achieve the requirements of a web browser, Dr. Alan Grosskurth and Dr. Michael W. Godfrey from University of Waterloo have come up with a reference architecture for a general web browser. User Interface component Provides the methods with which a user interacts with the Browser Engine. The Browser Engine component Provides; Methods to initiate the loading of a URL Show error messages Rendering Engine component Visual representation of a given URL. Interprets the HTML, XML, and JavaScript and generates the layout that is displayed in the User Interface. Data Persistence component Manages user data such as bookmarks and preferences. Networking component Handle protocols as HTTP and FTP. Handles all aspects of Internet communication and security. Display Backend component It provides primitive drawing and windowing methods that are host operating system dependent.
  5. We can see that Firefox architecture is largely same to the reference architecture .But there are two differences between them. 1. In the conceptual architecture user interface only builds on gecko. It is not connected to other subcomponents. In the reference architecture, the user interface connects to the Data Persistence component also. 2. In the reference architecture there are two layers for Browser engine and rendering engine. But in the conceptual they are integrated into Gecko. Gecko is an open source layout engine.   Software used to implement the Firefox modules is mentioned in the figure. For ex. Expat for XML Parser, Spider monkey for java script interpreter etc.
  6. Firefox user interface is built on XPTool kit. Three layers of the XPtool kit is shown in the figure. The Frames & Widgets layer directly defines the individual user interface components such as buttons, text fields etc. Services layer controls the services that can be executed through widgets (saving or printing document). Communication between Frames & Widgets layer, Services layer and Gecko happens through the Application Object Model.
  7. Gecko is the heart and the brain of the Firefox. It takes in contents, such as HTML, XML, and many others, and outputs the parsed content onto the web browser display. It depends on every other sub-component except the User Interface. Gecko first receives document data from the networking subsystem Necko. HTML data is parsed by the Document Parser and sent to the Content Model along with any style data. The content model arranges the data into a DOM tree. The DOM tree, style data, and image data are combined into a frame tree by the Frame Constructor. Then it sends the data to the Graphics Interface to be displayed on the system.
  8. As any other web browser firefox provides basic user interface Features. . Watch Audio, Video, Images and other non-HTML features Without plugging Firefox supports many media formats. Audio - WAVE, PCM, WebM, Vorbis, Ogg, Video -WebM, VP8, Vorbis, Ogg, Theora, Vorbis other - APNG (Animated PNG) images with alpha transparency   It Run JavaScript and CSS It providesTabbed Browsing    Recover from Crashe s Firefox will offer to restore session after a crash or other unexpected close. Session Store feature saves session data, including open windows and tabs,text typed in forms.   Download manager Downloading files can be stopped and started at anytime with download manager. If the downloading file is big and connection is slow, downloading can be paused and started later.
  9. Modifiability Firefox architecture consists of modules. They can be modified while the interfaces are kept unchanged.   Security It uses SSL/TLS ( Secure Sockets Layer,Transport Layer Security )to protect communications with web servers using strong cryptography when using the HTTPS protocol. And Firefox integrates with Windows anti-virus software.   Performance Performance of Firefox has been increased by rapid graphics rendering, improved page load speed and faster start-up time. Firefox uses single process model. Advantages It uses less system resources per tab compared to creating multiple Windows processes. Firefox can use fast in-process data access and synchronization objects when it interacts with the history, cookie and cache data stores. Disadvantages Lack of isolation means that if anything causes a page to crash, all Firefox tabs and windows lose.   Reusability Firefox modules are open source and these modules are used in many applications. (E.g. Gecko is used in SeaMonkey ).   Extendibility Extensions add new functionality to Firefox web browser. They can add anything from a toolbar button to a completely new feature. They allow the application to be customized to fit the personal needs of each user if they need additional features
  10. The chromium’s architecture can be seen as a layered architecture as well as a multi process architecture. The layered architecture shown above is spitted into two parts, the browser process and the renderer process. As shown in the slide, the renderer process runs in a sandbox, a security feature which is implemented by Google. All the architectures do not have a sandbox, it could be disabled or enabled depending on the distributor ( since this is an open source project).
  11. Multi processes for same application The chromium has 2 main processes, one for browser and other one for renderer. When there are multiple tabs, a renderer process created for each tab and a new process is created for each plug-in. Inter process communication Although the application has several processes, these processes communicate with each other. The main inter process communication primitive is the named pipe. In browser process, a separate I/O thread is used to communicate with renderer processes and renderer processes use separate thread for communicating with browser and WebKit. The so-called named pipes are used in asychronous mode ensuring neither ends are blocked wiating for each other. IPC allows processes to exchange information such as user information between tabs although they have their own separate tabs Secure and safe browsing Secure and safe browsing limits IPC with other processes. When secure browsing is enabled, data like user information are not exchanged with other tab processes and the websites visited are not saved in the history manager. Recover from crashes Suppose that the whole browser is a single process application. If that processes is crashed the whole browser will crash and will need to restart. As the chromium uses multi processes although one processes get crashed other processes will not crash and even if crashed by refreshing that tab, a new process can be created redirecting to the website it displayed previously
  12. Security uses middleware like browser kernel which handles procedure calls to operating system. The rendering engine is bounded by a sandbox. So malicious code execution inside the sandbox cannot harm the rest of the browser. The plug-ins are not allowed to install in both rendering engine and kernel, when they are installed, they run in separate processes. The rendering engine receives the web URLs through the browser kernel so browser does not directly access the network. A compromised renderer cannot capture user’s keystrokes as each render process runs in separate windows “desktop” which is not visible to user. Performance chromium has a multi-process architecture, which means all the processes have their own memory address spaces and resource space, therefore avoiding shared memory and resources. Uses V8 JavaScript interpreter so browser is very fast relatively than others. As shown in the multiprocess architecture, the inter-process communication is reduced. So performance increases. Availability and robustness chromium architecture is built in such a way that the plug-ins run in separate processes, so plug-ins do not include in browser kernel or rendering engine processes. So if a plug-in crashes, it does not affect the whole browser. If plug-ins contained in two main processes and if plug-in crashed, there would be a great possibility that the whole browser get crashed. Since chromium has multi-process architecture, although one tab process got crashed, other tab processes do not get affected. Even when the crashed tab is refreshed a new process is created killing the crashed tab. Modifiability since the architecture of the chromium can be seen as a layered architecture, each layer can be modified easily with minimum changes to other layers(at most only adjacent 2 layers only). So a new browser can be derived from the existing architecture easily. Usability uppermost layer is the browser’s view layer. It provides an UI which is very easy to learn and use. User will not get lots of security prompts when interacting with the UI as lots of security issues are resolved using the sandbox. In process architecture, there is a separate process for handling I/O. so user will not feel degrade in performance will sending inputs to browser as they are handled separately by the I/O handing process. Extendibility Chromium is a open source project. Thus with the complete documents, this is expected to develop and extend much further. Also, chromium allows developers to build extensions/plugins and use them with the chromium browser.
  13. 1. Firefox has directly used the reference architecture of a web browser. Chrome has deviated from the usual model and developed their unique architecture. 2. Rendering has complete different architectures for above 2 systems. Firefox uses Gecko layout engine where as Chromium uses Webkit layout engine. Both are very fast and compatible with their own unique differences in HTML 5 and CSS 3 features. Webkit is more popular for mobile devices though. Therefore that's something to consider if you are a mobile user. Chromium uses multi process system. That is each web-page in chromium lives in its own process and so if something bad happens to it the entire browser can continue running. Firefox uses separate threads for each web-pages in the process so if one page crashes whole process will get crashed and you will lose all the tabs opened. 4. In the sense of Extension development Chromium is in further. Because it doesn’t need restart to have the effect of a modified extension where as firefox needs. But still firefox has the lead because before chromium came alive firefox was ruling the extension world.
  14. In Firefox security is achieved through the Networking Subsystem. NSS: (Network Security Services), Set of libraries that supports secure client-server communication and application development. 2. PSM: (Personal Security Manager) is built on top of NSS . Set of libraries that perform crypto operations for the client-side application. – support SSL/TLS/Encryption/Signatures and Certification Mgt For Chromium, security is achieved through a reference monitor and a security policy. Treat the rendering engine as a black box. Reduce the complexity of browser’s kernel security monitor
  15. As conclusion both architectures provide all the requirements in their own ways. According to our opinion, chromium’s architecture is more efficient for the basic non functional requirements such as Usability – elegant design Availability – process based tabs over thread based Security – reference monitor Extendibility – Efficient development environment for extensions Performance – As a user and from the statistics on the internet I can say that the responsiveness of chromium is rather high than FF
  16. References: A Reference Architecture for Web Browsers Alan Grosskurth and Michael W. Godfrey School of Computer Science University of Waterloo http://dev.chromium.org/developers/design-documents http://en.wikipedia.org/wiki/Web_browser http://www.smooth-step.com/web-browsers/features http://web.uvic.ca/~hitchner/assign1.pdf http://www.soi.wide.ad.jp/class/20070050/slides/01/index_5.html