What happens when aspx page is requested from browser ?, DOT NET Programming

Assignment Help:

The steps that occur when we request a ASPX page are as follows:-

1) The browser sends the request to the webserver. Now  assume that the webserver at the other end is IIS.

2) Once the IIS receives the request he looks on which engine the request is served. Whenever I mean engine that means the DLL who can parse this page or compile and send a response back to the browser. Which request is to map is decided by the file extension of the page requested.

Depending on the file extension some mapping are as follows:

1) .aspx, for the ASP.NET Web pages,

2).asmx, for the ASP.NET Web services,

3).config, for the ASP.NET configuration files,

4).ashx, for the custom ASP.NET HTTP handlers

5).rem, for remoting the resources

6)Etc

You also can configure the extension mapping to which engine can route by using the IIS engine.

1833_ASPX page.png

For example an ASP page will be sent to the old classic ASP.DLL to compile. While the .ASPX pages will be routed to the ASP.NET engine for compilation.

7) We will see how an ASP.NET page that is ASPX pages generation sequence occurs. Once IIS passes the Request to the ASP.NET engine page has to go through two section HTTP module section and HTTP handler section. Both of this section has their own work to be completed in order that the page is properly compiled and sent to the IIS. The HTTP modules inspect the incoming request and depending on that they can change their internal workflow of the request. The HTTP handler actually compiles the page and generates the output. If you see your machine.config file you will see the following section of HTTP modules.

d name="OutputCache" type="System.Web.Caching.OutputCacheModule" />

d name="Session" type="System.Web.SessionState.SessionStateModule" />

d name="WindowsAuthentication" type="System.Web.Security.WindowsAuthenticationModule" />

d name="PassportAuthentication" type="System.Web.Security.PassportAuthenticationModule" />

d name="UrlAuthorization" type="System.Web.Security.UrlAuthorizationModule" />

d name="FileAuthorization" type="System.Web.Security.FileAuthorizationModule" />

d name="ErrorHandlerModule" type="System.Web.Mobile.ErrorHandlerModule, System.Web.Mobile, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /

> 

The mapping above will show which functionality is to be handled by which Namespace. For e.g. FormsAthuentication is handled by "System.Web. Security.FormsAuthenticationModule". If you see at the web.config section HTTP module is where the authentication and authorization happens.

d verb="*" path="*.vjsproj" type="System.Web.HttpForbiddenHandler" />

d verb="*" path="*.java" type="System.Web.HttpForbiddenHandler" />

d verb="*" path="*.jsl" type="System.Web.HttpForbiddenHandler" />

d verb="*" path="trace.axd" type="System.Web.Handlers.TraceHandler" />

d verb="*" path="*.aspx" type="System.Web.UI.PageHandlerFactory" />

d verb="*" path="*.ashx" type="System.Web.UI.SimpleHandlerFactory" />

...

Depending on the File extension handler it decides which Namespace will generate the output. e.g.  All .ASPX extension files will be compiled by the System.Web.UI.PageHandlerFactory

Once the file is done it will be send back again to the HTTP modules and from there to IIS and then to the browser.

 698_IIS flow.png

 Figure:-IIS flow from various sections.


Related Discussions:- What happens when aspx page is requested from browser ?

Implement dtc in .net, How to implement DTC in .NET DTC is implemented ...

How to implement DTC in .NET DTC is implemented using the COM+. Following are some of the steps to implement COM + in .NET:- 1) The "EnterpriseService" namespace has all

What is the use of a .disco file, What is the use of a .disco file? A c...

What is the use of a .disco file? A client application uses a .disco file to locate or discover the documents that have the description of a Web service. The .disco file having

Durkheims theory of crime, Application of durkheim''s theory of crime in ex...

Application of durkheim''s theory of crime in explaining the crime context in south Africa. Highlighting the relevance of the theory, as well as its limitations

Different types of joins, What are the different types of joins? 1) IN...

What are the different types of joins? 1) INNER JOIN: The Inner join shows matches only when they exist in both the tables.For example, in the SQL below there are two tabl

I need online real commission management system, I need Online Real Commiss...

I need Online Real Commission Management system Project Description: Real Estate -- Store and retrieve Purchase plot customers, Employee to refer the customers get commiss

Develop c# routines for website back end, Project Description: We requir...

Project Description: We require some routines written in C# (.NET) to: * Parse several RESTful APIs to change and push data to RabbitMQ * Pop objects from RabbitMQ and inp

Wowza expert required, Wowza expert required Project Description: See...

Wowza expert required Project Description: Seeking wowza expert to teach our webmaster. To provide: How configure wowza to live transcoder. How allow add live transc

Define network, Define Network? A network is a set of devices linked by...

Define Network? A network is a set of devices linked by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more

Experienced outlook addin developer, Experienced Outlook addin (Microsoft O...

Experienced Outlook addin (Microsoft Office) developer Project Description: About us in a nutshell: We are a young start-up that buys a refreshing product in the field of ent

Payroll managment, how can i construct er diagram for payroll managment

how can i construct er diagram for payroll managment

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd