User server interaction - application layer , Computer Networking

Assignment Help:

User Server Interaction

Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship  is over. The  original design  of www. Retrieving publicly available documents exactly fits this purpose. Today  the web  has other  functions some  are listen  here.

a.Some websites  need to  allow access to registered clients  only.

b.Websites  are begins used as  electronic  stores  that allows users  to browse  through  the  store  select  wanted  items  put them  in an electronic  cart and path  end with  a credit  card.

c.Some  websites  are used as portals the user selects the  web pages  which  he wants to see.

d.Some  website are just  advertising.

For these  purpose, the  cookies  mechanism  introduced. Cookies are more  commonly  referred to as web  cookies  tracking or just  cookies are parcels of next  sent by  a server to a  web  client ( usually a browser) and then  sent back  unchanged by the client  each  time it  accesses that server. Cookies are used  for authenticating  session tracking state  maintenance and maintaining  specific information  about  uses  such as site  preference  or the  contents  of their electronic  shopping carts.

Cookies technology  has four  components:

a.a cookie header line  in the HTTP response  message.

b.A cookie  header line in the HTTP request  message.

c.A cookie  file kept  on the user end system  and managed by the user browser .

d.A back end database  at the website.

Let go through  an example  of how  cookies  are used. Suppose  Hassan who  always  access the web using  internet explorer from his home PC contacts and  e commerce site for the first time and this site  uses cookies. When  the request comes into the web server the web site  creates a unique identification number and creates an entry in its back end  database that is indexed by the  identification number. The server then  responds  to  Hassan browser including  in the HTTP response  a set cookie. Header which  contains  the identification  number. For example  the header lien might  be:

 

 


Related Discussions:- User server interaction - application layer

Network protocols - computer networks, Network Protocols In computer  ...

Network Protocols In computer  networks  communication  occurs between  the entities in different  systems an entity  is anything  that is  capable  of sending  or receiving

Commands and responses - application layer, Commands SMTP uses comma...

Commands SMTP uses commands  and response  to transfer  message between a client  and a  server.  Each  commands  or reply  is terminated by a two character ( carriage re

Osi network layer addressing, Q. OSI Network Layer Addressing ISO/I...

Q. OSI Network Layer Addressing ISO/IEC and CCITT mutually administer the global network addressing domain. The primary hierarchical decomposition of the address is defined

Explain twisted pair cable, Explain twisted pair cable. A pair of wires...

Explain twisted pair cable. A pair of wires twisted with each other is CALLED as twisted pair cable.  A set of four pairs of twisted wires are bundled to form cable. These are

Show the go-back- N - control variables, Q. Show the Go-back-N - Control Va...

Q. Show the Go-back-N - Control Variables? - S- holds the series number of the recently sent frame - SF - holds sequence number of the first frame in the window - SL - ho

Summary of osi model, Q. Summary of osi model? - There was no standard ...

Q. Summary of osi model? - There was no standard for networks in the early period and as a result it was difficult for networks to communicate with each other. - The ISO (In

virtual private network - virtual private network vpns, Virtual private ne...

Virtual private network The virtual  private  networks takes the  user data  encrypts them and sends them  to their  destination over  the internet. the sender  and the receiv

Give the solutions to the threats, Give the solutions to the threats In...

Give the solutions to the threats In order to implement solutions to the threats, it is advisable that the company should maintain proper password protected hardware. Wherever

Control - transport layer, Control This field  defines 6 different  co...

Control This field  defines 6 different  control  bits or  flags. These bits  enable flow  control  connection  establishment  and termination connection abortion and the mode

State token bus frame format, Token Bus Frame Format No length fiel...

Token Bus Frame Format No length field Data is able to be much larger (timers prevent hogs) Frame control Ack required? Data vs Control frame and how is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd