Understanding the Mechanism of Cookies in Computer Networks
Verified
Added on 2023/06/04
|5
|767
|281
AI Summary
This article explains the working mechanism of cookies in computer networks and their role in online shopping. It covers the creation of session and persistent cookies, how cookies help in analyzing website visitors, and the process of modifying cookies. The article also includes references for further reading.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: COMPUTER NETWORKS COMPUTER NETWORKS Name of the Students Name of the University Author Notes:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1COMPUTER NETWORKS Answer to Question 1 Answer to question a In the recent time cookies have evolved as they come with the ability to solve large number of problems for various people who can easily implement the website. Cookies allow various website to easily store information in the given machine. The stored information helps the website in understanding the stated in which browser exists [1]. Sites are zones which help in analyzing the state where the number of people visiting the website can be easily calculated. It works due to proxy, server and lastly caching which is considered to be accurate for any number of visitors. With the help of cookies, sites can easily analyze the number of visitors. Sites can easily store, the number of visitors to a website. In the given figure, a file is generated on both the server side and vendor side with same cookie id that is 12343. Server-side mainly handles the various kind of customer file which is generated while the client side emphasizes on certain number of cookies which are made due to client request. In the beginning the response is generally stored file which is in the vendor side [4]. The server will have the data as soon as the request is made. The server is updated on a regular basis which each user which is generated by server file. During the proceeding of the cookie mechanism, the whole order confirmation is done for the customer of this given website. The mechanism of working cookie in the mode of online shopping is that user request is given on the page for getting directed to a particular website. Session cookie is considered to be first step [2]. The particular step, the given cookie is created or generated. Session cookie is created or generated when the client shut down any kind of break from the page. Session cookie gets totally permanent in nature when the various browser is needed for restoring of session. The
2COMPUTER NETWORKS second session which is also known as persistent cookie as it comes up with attribute of max age. This particular instruction is removed so that cookie can be fixed at the given date and time. In the upcoming stage, browser can easily provide the request which is needed for availing the image of the website. After that, the request is provided on the given browser which comes up with a proper cookie with proper kind of HTTP header. Server works in such a way that it can easily respond and send cookie to the given page which has been already requested by the user of the website [3]. User can easily modify the given cookie by properly adding a set cookie which is in response to the request of the page. After that, the browser can easily replace the old cookie with the given new value. In the last stage, user emphasizes on the various server so that they easily get all the details related to payment. Answer to question b
3COMPUTER NETWORKS Answer to question 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4COMPUTER NETWORKS References [1] Malloy, M., McNamara, M., Cahn, A. and Barford, P. Ad blockers: Global prevalence and impact. InProceedings of the 2016 Internet Measurement Conference(pp. 119-125). ACM, 2016, November. [2] Gordon, B.R., Zettelmeyer, F., Bhargava, N. and Chapsky, D. A comparison of approaches to advertising measurement: Evidence from big field experiments at Facebook, 2018. [3] Sivakorn, S., Polakis, I. and Keromytis, A.D. The cracked cookie jar: HTTP cookie hijacking and the exposure of private information. In2016 IEEE Symposium on Security and Privacy (SP)(pp. 724-742). IEEE, 2016, May. [4] Dmitriev, P., Frasca, B., Gupta, S., Kohavi, R. and Vaz, G. Pitfalls of long-term online controlled experiments. InBig Data (Big Data), 2016 IEEE International Conference on(pp. 1367-1376). IEEE, 2016, December.