User server interaction - application layer , Computer Networking

Assignment Help:

User Server Interaction

Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship  is over. The  original design  of www. Retrieving publicly available documents exactly fits this purpose. Today  the web  has other  functions some  are listen  here.

a.Some websites  need to  allow access to registered clients  only.

b.Websites  are begins used as  electronic  stores  that allows users  to browse  through  the  store  select  wanted  items  put them  in an electronic  cart and path  end with  a credit  card.

c.Some  websites  are used as portals the user selects the  web pages  which  he wants to see.

d.Some  website are just  advertising.

For these  purpose, the  cookies  mechanism  introduced. Cookies are more  commonly  referred to as web  cookies  tracking or just  cookies are parcels of next  sent by  a server to a  web  client ( usually a browser) and then  sent back  unchanged by the client  each  time it  accesses that server. Cookies are used  for authenticating  session tracking state  maintenance and maintaining  specific information  about  uses  such as site  preference  or the  contents  of their electronic  shopping carts.

Cookies technology  has four  components:

a.a cookie header line  in the HTTP response  message.

b.A cookie  header line in the HTTP request  message.

c.A cookie  file kept  on the user end system  and managed by the user browser .

d.A back end database  at the website.

Let go through  an example  of how  cookies  are used. Suppose  Hassan who  always  access the web using  internet explorer from his home PC contacts and  e commerce site for the first time and this site  uses cookies. When  the request comes into the web server the web site  creates a unique identification number and creates an entry in its back end  database that is indexed by the  identification number. The server then  responds  to  Hassan browser including  in the HTTP response  a set cookie. Header which  contains  the identification  number. For example  the header lien might  be:

 

 


Related Discussions:- User server interaction - application layer

Explain about the middleware support, Explain about the Middleware support ...

Explain about the Middleware support All the connectivity interface related tools come under the category of middleware. Middleware provides the link for data exchange between

Advantage and disadvantage of wiring schemes, ADVANTAGE AND DISADVANTAGE OF...

ADVANTAGE AND DISADVANTAGE OF WIRING SCHEMES:  Each of three wiring procedure has disadvantages and advantages, which are illustrate as follows: RELIABILITY ISSUES:  W

Merge sort circuit, First, split the given series of n numbers into two par...

First, split the given series of n numbers into two parts, each consisting of n/2 numbers. After that, recursively split the series into two parts until each number acts as an inde

Private networks, Private  Networks The information routes from one ne...

Private  Networks The information routes from one networks  to another  network through  a leased line. If an  organization needs privacy  can use a private networks  or networ

Service paradigm, At the minimum level most networks sends individual packe...

At the minimum level most networks sends individual packets of data and the network needs each packet to follow an exact format dictated by the hardware, which is known service par

Different type of networking and internetworking device, What is the differ...

What is the different type of networking / internetworking devices? Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. I

The functions of the typical server program, What are the functions of the ...

What are the functions of the typical server program? Ans) It waits for client-initiated requests. Implements many requests at the similar time. Takes care of VIP clients first.

Describe a basic communication model, NETWORK MANAGEMENT & SECURITY 1. ...

NETWORK MANAGEMENT & SECURITY 1. Describe a basic communication model. 2. State the following terms: a. Configuration Management b. Fault Management c. Security Management

Access-list range for an extended ip access-list, Recognize the access-list...

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.

Networking device, what is the best time to use brouter rather than router?...

what is the best time to use brouter rather than router? what are advantages of using brouter over router?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd