User server interaction - application layer , Computer Networking

Assignment Help:

User Server Interaction

Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship  is over. The  original design  of www. Retrieving publicly available documents exactly fits this purpose. Today  the web  has other  functions some  are listen  here.

a.Some websites  need to  allow access to registered clients  only.

b.Websites  are begins used as  electronic  stores  that allows users  to browse  through  the  store  select  wanted  items  put them  in an electronic  cart and path  end with  a credit  card.

c.Some  websites  are used as portals the user selects the  web pages  which  he wants to see.

d.Some  website are just  advertising.

For these  purpose, the  cookies  mechanism  introduced. Cookies are more  commonly  referred to as web  cookies  tracking or just  cookies are parcels of next  sent by  a server to a  web  client ( usually a browser) and then  sent back  unchanged by the client  each  time it  accesses that server. Cookies are used  for authenticating  session tracking state  maintenance and maintaining  specific information  about  uses  such as site  preference  or the  contents  of their electronic  shopping carts.

Cookies technology  has four  components:

a.a cookie header line  in the HTTP response  message.

b.A cookie  header line in the HTTP request  message.

c.A cookie  file kept  on the user end system  and managed by the user browser .

d.A back end database  at the website.

Let go through  an example  of how  cookies  are used. Suppose  Hassan who  always  access the web using  internet explorer from his home PC contacts and  e commerce site for the first time and this site  uses cookies. When  the request comes into the web server the web site  creates a unique identification number and creates an entry in its back end  database that is indexed by the  identification number. The server then  responds  to  Hassan browser including  in the HTTP response  a set cookie. Header which  contains  the identification  number. For example  the header lien might  be:

 

 


Related Discussions:- User server interaction - application layer

Show the data encryption standard, Q. Show the Data Encryption Standard? ...

Q. Show the Data Encryption Standard? Data Encryption Standard - Bit-level encryption method designed by IBM - Adopted as standard for nonmilitary and nonclassified us

Hybrid of client server and p2p architecture, Hybrid  of Client Server and...

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Sap is used by the cisco ios for which encapsulation types, "SAP" is used b...

"SAP" is used by the Cisco IOS for which encapsulation types? Ans) Three types:- Ethernet_802.2 Token-Ring FDDI_802.2

Define guided media, Q. Define Guided Media? - Offers a conduit from on...

Q. Define Guided Media? - Offers a conduit from one device to another - Signal is directed as well as contained by physical limits of medium - Twisted-pair and coaxial ut

Requests types in distributed enrollment protocol , Control Commands: The ...

Control Commands: The STAT command is used as a way for the client to confirm that the server is still responding properly. The server must simply send a positive command res

Explain the working of transceivers, Explain the working of Transceivers ...

Explain the working of Transceivers Transceivers are used to connect nodes to the several Ethernet media. Most computers and network interface cards having a built-in 10BaseT o

What are intrusion detection systems, Question : a) Give three example...

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Quality of service, Networks are more frequently being prepared to allow sp...

Networks are more frequently being prepared to allow specification of the quality of service needed by users. For example: - a typical voice telephone call may give a QoS para

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd