User server interaction - application layer , Computer Networking

Assignment Help:

User Server Interaction

Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship  is over. The  original design  of www. Retrieving publicly available documents exactly fits this purpose. Today  the web  has other  functions some  are listen  here.

a.Some websites  need to  allow access to registered clients  only.

b.Websites  are begins used as  electronic  stores  that allows users  to browse  through  the  store  select  wanted  items  put them  in an electronic  cart and path  end with  a credit  card.

c.Some  websites  are used as portals the user selects the  web pages  which  he wants to see.

d.Some  website are just  advertising.

For these  purpose, the  cookies  mechanism  introduced. Cookies are more  commonly  referred to as web  cookies  tracking or just  cookies are parcels of next  sent by  a server to a  web  client ( usually a browser) and then  sent back  unchanged by the client  each  time it  accesses that server. Cookies are used  for authenticating  session tracking state  maintenance and maintaining  specific information  about  uses  such as site  preference  or the  contents  of their electronic  shopping carts.

Cookies technology  has four  components:

a.a cookie header line  in the HTTP response  message.

b.A cookie  header line in the HTTP request  message.

c.A cookie  file kept  on the user end system  and managed by the user browser .

d.A back end database  at the website.

Let go through  an example  of how  cookies  are used. Suppose  Hassan who  always  access the web using  internet explorer from his home PC contacts and  e commerce site for the first time and this site  uses cookies. When  the request comes into the web server the web site  creates a unique identification number and creates an entry in its back end  database that is indexed by the  identification number. The server then  responds  to  Hassan browser including  in the HTTP response  a set cookie. Header which  contains  the identification  number. For example  the header lien might  be:

 

 


Related Discussions:- User server interaction - application layer

Network interface hardware, NETWORK INTERFACE HARDWARE:  CPU can't ope...

NETWORK INTERFACE HARDWARE:  CPU can't operate data at network speeds. So in order to connect to the network device systems use special purpose hardware for network connection

Binary addition, using binary adition, what is the result of 1010 + 10? Usi...

using binary adition, what is the result of 1010 + 10? Using binary addition, how would you repeatedly increment a number by 2?

Difference between windows 2000 and windows 2003, What is the difference am...

What is the difference among Windows 2000 and Windows 2003?

What is raid in ccna, A method used to standardize and categorize fault-tol...

A method used to standardize and categorize fault-tolerant disk systems. RAID levels give lot of mixes of performance, reliability, and cost. Some servers give three of the RAID le

What is ping utility, PING - Packet Internet Gopher A utility that shows...

PING - Packet Internet Gopher A utility that shows connections to one or more remote hosts. The ping command uses the ICMP echo request and echo reply packets to verify whether

Standard ip access-list use as test criteria, What does a Standard IP Acces...

What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Snort deployed in the dmz network, Let's consider the network shown in Figu...

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

Introduction to operations research, explain the three classification of op...

explain the three classification of operation research

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd