Analysis of Cookie Mechanism in Computer Networks: SIT202 Report

Verified

Added on  2023/06/04

|5
|767
|281
Report
AI Summary
This report analyzes the cookie mechanism within the context of computer networks, focusing on its role in online shopping and web interactions. The assignment addresses the evolution of cookies from a stateless web design, highlighting how they enable stateful relationships between web clients and servers. The report explains the six steps involved in using cookies, including server and client activities, cookie contents, and request/response components. It discusses session cookies, persistent cookies, and the mechanisms by which browsers and servers exchange information to facilitate user tracking and personalized experiences. The report also includes references to relevant research papers and studies on cookies and related technologies.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: COMPUTER NETWORKS
COMPUTER NETWORKS
Name of the Students
Name of the University
Author Notes:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1COMPUTER NETWORKS
Answer to Question 1
Answer to question a
In the recent time cookies have evolved as they come with the ability to solve large
number of problems for various people who can easily implement the website. Cookies allow
various website to easily store information in the given machine. The stored information helps
the website in understanding the stated in which browser exists [1]. Sites are zones which help in
analyzing the state where the number of people visiting the website can be easily calculated. It
works due to proxy, server and lastly caching which is considered to be accurate for any number
of visitors. With the help of cookies, sites can easily analyze the number of visitors. Sites can
easily store, the number of visitors to a website. In the given figure, a file is generated on both
the server side and vendor side with same cookie id that is 12343. Server-side mainly handles the
various kind of customer file which is generated while the client side emphasizes on certain
number of cookies which are made due to client request. In the beginning the response is
generally stored file which is in the vendor side [4]. The server will have the data as soon as the
request is made. The server is updated on a regular basis which each user which is generated by
server file. During the proceeding of the cookie mechanism, the whole order confirmation is
done for the customer of this given website.
The mechanism of working cookie in the mode of online shopping is that user request is
given on the page for getting directed to a particular website. Session cookie is considered to be
first step [2]. The particular step, the given cookie is created or generated. Session cookie is
created or generated when the client shut down any kind of break from the page. Session cookie
gets totally permanent in nature when the various browser is needed for restoring of session. The
Document Page
2COMPUTER NETWORKS
second session which is also known as persistent cookie as it comes up with attribute of max age.
This particular instruction is removed so that cookie can be fixed at the given date and time.
In the upcoming stage, browser can easily provide the request which is needed for
availing the image of the website. After that, the request is provided on the given browser which
comes up with a proper cookie with proper kind of HTTP header. Server works in such a way
that it can easily respond and send cookie to the given page which has been already requested by
the user of the website [3]. User can easily modify the given cookie by properly adding a set
cookie which is in response to the request of the page. After that, the browser can easily replace
the old cookie with the given new value. In the last stage, user emphasizes on the various server
so that they easily get all the details related to payment.
Answer to question b
Document Page
3COMPUTER NETWORKS
Answer to question 2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4COMPUTER NETWORKS
References
[1] Malloy, M., McNamara, M., Cahn, A. and Barford, P. Ad blockers: Global prevalence and
impact. In Proceedings of the 2016 Internet Measurement Conference(pp. 119-125). ACM,
2016, November.
[2] Gordon, B.R., Zettelmeyer, F., Bhargava, N. and Chapsky, D. A comparison of approaches to
advertising measurement: Evidence from big field experiments at Facebook, 2018.
[3] Sivakorn, S., Polakis, I. and Keromytis, A.D. The cracked cookie jar: HTTP cookie hijacking
and the exposure of private information. In 2016 IEEE Symposium on Security and Privacy
(SP) (pp. 724-742). IEEE, 2016, May.
[4] Dmitriev, P., Frasca, B., Gupta, S., Kohavi, R. and Vaz, G. Pitfalls of long-term online
controlled experiments. In Big Data (Big Data), 2016 IEEE International Conference on (pp.
1367-1376). IEEE, 2016, December.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]