Data Communication and Computer Networks Oz Assignments

Data Communication and Computer Networks Oz Assignments

Data Communication and Computer Networks Oz Assignments

Ans 1 (A) :

The client then sends a request from the machine to the server a get request is sent and the server returns a cookie for with the acknowledgement message. The below diagram is used for demonstrating cookie usage and its application in tracking the pattern of usage and activity of the user in the e-commerce system website.

In the above diagram the user behaviour is analysed using the behaviour of the user and collect the information for the evolution of the server and client relationship.

A cookie is created in the server side for storing the user data and a cookie is created is created on the client side for storing the server data and the same ID is used for transferring the data between the client and the server. The request made from the client side is handled by the server and each of the activity of the user is tracked in the cookie and it is updated in the server and saved. The cookie also have an expiration date and time the search pattern of the user is stored for suggesting the user similar type of items.

The cookie mechanism is applied in the ecommerce website for increasing the usability and dealing with the placement of orders. The cookie helps to user to redirect to the desired page by using the data from the cookie and updating the cookie to get the history and the current item selected. Another request is made by the client that for opening the catalogue of the shopping website and fetch the files and information from the server.

The web server return the requested page from the cookie and the needed page that is searched by the user. The details are contained in the searched page and two different types of cookies are generated for the different process and the first cookie is the session cookie that is temporary and gets deleted automatically after closing the webpage and the browser. There are no constraint that have date and time mentioned for limiting the expiration and configuration can be made such that it can be lasted for a longer time period and restored when the browser fetched the url again. There is another cookie type i.e. session token that is applied for the management of the maximum time and eliminate the time boundary of the cookies.

The desired step is successfully executed and a HTTP header is used for analysing the request from the user and a response is received form the server depending on the request. The server responses according to the user request and the cookie header is sent to the user for sending and receiving the data from the user. The cookie header manages the files and information from the client for the analysis of the user pattern.

The cookie is used for getting the item requested after checking the availability and the set of cookie can be modified with the implementation of another cookie and the old value is changed with the new one for setting the nature. The last procedure of online shopping is making payment and here a cookie is generated and reducing the time of transaction. The transaction procedure is used for enabling exchange of information between the client and the ecommerce website.

Ans 1 (B) :

For redirecting the user and management of the track on the advertising website the cookie is used and the hyperlink is used where on clicking the banner ad the user is redirected to the advertising website. The request from the university server is used and the following diagram shows the flow of the information between the two sited and the servers.

 

The cookie is transferred from the university server to the advertising server for maintaining a track on the user. The Get research methodology issued for the retrieving the requested HTML page and a cookie header is sent from the university server and is updated by storing the values for the request made by the user.

In cookie mechanism , two types of file gets generated, client and server side respectively. In the client side, vendor file gets generated whereas in the server side a customer file is generated.

A request is made from the client end to open the HTML page and set cookie is used for getting the information. The university and the advertising servers exchanges the cookie information for tracking the user visiting the website of the manufactured if the user clicks the banner add to reach the advertising website.

Ans 2 :

The tcp message flow diagram is created for the management of the flow of information between the client and the server and an initial sequence number and windows frame is used for management of the sequence header. The following diagram is used for the demonstration of the port, acknowledgment, value, and sequence number. The control fields and the window size helps in analysing the response time and demonstration of the order of connection.

Bibliography

1. Asadi, A., Wang, Q. and Mancuso, V., 2014. A survey on device-to-device communication in cellular networks. IEEE Communications Surveys & Tutorials16(4), pp.1801-1819.
2. Chen, P., Nikiforakis, N., Huygens, C. and Desmet, L., 2015. A Dangerous Mix: Large-scale analysis of mixed-content websites. In Information Security (pp. 354-363). Springer, Cham.
3. Cunha, F., Villas, L., Boukerche, A., Maia, G., Viana, A., Mini, R.A. and Loureiro, A.A., 2016. Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks44, pp.90-103.
4. Da Cunha, F.D., Boukerche, A., Villas, L., Viana, A.C. and Loureiro, A.A., 2014. Data communication in VANETs: a survey, challenges and applications (Doctoral dissertation, INRIA Saclay; INRIA).
5. Jussila, J., 2018. HTTP cookie weaknesses, attack methods and defense mechanisms: a systematic literature review.
6. Liu, J., Kato, N., Ma, J. and Kadowaki, N., 2015. Device-to-device effective communication in LTE-advanced networks: A survey. IEEE Communications Surveys & Tutorials17(4), pp.1923-1940.
7. McMahan, H.B., Moore, E., Ramage, D. and Hampson, S., 2016. Communication-efficient learning of deep networks from decentralized data. arXiv preprint arXiv:1602.05629.

8. Milgrom, J. and Gemmill, A.W., 2015. Introduction.
9. Rao, R.K., Ram, S., Kumar, M.A., Supritha, R. and Reza, S.A., 2017. Cross site scripting attacks and preventive measures. International Research Journal of Engineering and Technology4(2), pp.2016-2019.
10. Zheng, X., Jiang, J., Liang, J., Duan, H.X., Chen, S., Wan, T. and Weaver, N., 2015, August. Cookies Lack Integrity: Real-World Implications. In USENIX Security Symposium (pp. 707-721).