User server interaction - application layer , Computer Networking

Assignment Help:

User Server Interaction

Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship  is over. The  original design  of www. Retrieving publicly available documents exactly fits this purpose. Today  the web  has other  functions some  are listen  here.

a.Some websites  need to  allow access to registered clients  only.

b.Websites  are begins used as  electronic  stores  that allows users  to browse  through  the  store  select  wanted  items  put them  in an electronic  cart and path  end with  a credit  card.

c.Some  websites  are used as portals the user selects the  web pages  which  he wants to see.

d.Some  website are just  advertising.

For these  purpose, the  cookies  mechanism  introduced. Cookies are more  commonly  referred to as web  cookies  tracking or just  cookies are parcels of next  sent by  a server to a  web  client ( usually a browser) and then  sent back  unchanged by the client  each  time it  accesses that server. Cookies are used  for authenticating  session tracking state  maintenance and maintaining  specific information  about  uses  such as site  preference  or the  contents  of their electronic  shopping carts.

Cookies technology  has four  components:

a.a cookie header line  in the HTTP response  message.

b.A cookie  header line in the HTTP request  message.

c.A cookie  file kept  on the user end system  and managed by the user browser .

d.A back end database  at the website.

Let go through  an example  of how  cookies  are used. Suppose  Hassan who  always  access the web using  internet explorer from his home PC contacts and  e commerce site for the first time and this site  uses cookies. When  the request comes into the web server the web site  creates a unique identification number and creates an entry in its back end  database that is indexed by the  identification number. The server then  responds  to  Hassan browser including  in the HTTP response  a set cookie. Header which  contains  the identification  number. For example  the header lien might  be:

 

 


Related Discussions:- User server interaction - application layer

Advantage of ip sec tunnelling mode, Advantage of IP sec  Tunnelling Mode ...

Advantage of IP sec  Tunnelling Mode IP Sec  tunnelling mode  has the  following  advantages: a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In a

WIRELESS COMMUNICATION, how does the near/far effects infulence TDMA system...

how does the near/far effects infulence TDMA system?what happen CDMA system? what are countermeasures in TDMA system/

computer computinons, Difference between synchronous tdm and statistical t...

Difference between synchronous tdm and statistical tdm

Define remote procedure call (rpc), RPC adumbrates the intricacies of the ...

RPC adumbrates the intricacies of the network by using the ordinary procedure call mechanism familiar to each programmer. A client process calls a function on a remote server and

Describe one security measure against reverse tunneling, Question: a) I...

Question: a) In route-optimized communication, a mobile node sends packets to a correspondent using the home address present in the destination option. Why does the design use

System inheritance.., what is inheritance in computer systems special permi...

what is inheritance in computer systems special permissions?

Wlan technology, Identify and briefly explain any four key requirements tha...

Identify and briefly explain any four key requirements that need to be examined when considering deploying a WLAN technology.

Explain design issues of interconnection network, Design Issues Of Intercon...

Design Issues Of Interconnection Network Below are the issues, which must be considered when designing an interconnection network. 1)  Size and Dimension of network:  It m

Command that forces the router to load into ROM, Determine the command that...

Determine the command that forces the router to load into ROM mode upon a reload?  Ans) boot system rom ia the command that forces the router to load into ROM mode upon a reload

Define about the term - hackers, Define about the term - hackers Every ...

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd