Blue Cotton Shirt
Green Cotton Shirt White Silk Shirt ….

"> Blue Cotton Shirt
Green Cotton Shirt White Silk Shirt ….

">

Presentation is loading. Please wait.

Presentation is loading. Please wait.

Maintaining State in a Stateless System

Similar presentations


Presentation on theme: "Maintaining State in a Stateless System"— Presentation transcript:

1 Maintaining State in a Stateless System
Use your script to write data to a temporary file on the server and to start each time by reading any data in that file Use JavaScript to process activities in a given session and send results to server at end only Hide data in forms and send it back and forth Keep everything in a database Use Servlets GETS TRICKY!!

2 Hidden Fields … <FORM NAME="Form1">
<INPUT TYPE= "HIDDEN" NAME= "Shirt1" VALUE="25"> <INPUT TYPE= "CHECKBOX" NAME= "Check1">Blue Cotton Shirt <br> <INPUT TYPE= "HIDDEN" NAME= "Shirt2" VALUE="26"> <INPUT TYPE= "CHECKBOX" NAME= "Check2" >Green Cotton Shirt <INPUT TYPE= "HIDDEN" NAME= "Shirt3" VALUE="27"> <INPUT TYPE= "CHECKBOX" NAME= "Check3">White Silk Shirt …. <P> <INPUT TYPE="submit" NAME="Go" VALUE="Register!"> <INPUT TYPE="RESET" VALUE="Reset!"> </FORM>

3 1-Tier Architecture Processing
Main Frame

4 1-Tier Architecture Processing
1-Ask for file Client Files 2-File 4-return file File Server

5 Two Tiers Web Server Web Client User HTTP request
Response to HTTP request Web Server Web Client

6 Tier 2 Tier 3 Tier 1 2 HTTP request 1 HTTP request 3 TCP/IP internet 4
DBMS Web Server Tier 2 Tier 3 Web Client Tier 1

7 Operating Systems For Web Servers
Microsoft Windows NT Server Microsoft Windows 2000 Advanced Server Microsoft.NET Server Linux Solaris

8 Web Server Software Apache HTTP Server
Microsoft Internet Information Server (IIS) Sun ONE (iPlanet, Netscape) Web Server

9 A catalog display Shopping cart capabilities Transaction processing

10 Middleware Application integration Web services Integration with ERP software Supply chain management software Customer relationship management software Content management software Knowledge management Software

11 E-commerce Software Intershop Enfinity
WebSphere Commerce Professional Edition Microsoft Commerce Server 2002

12 Back Doors And Trojan Horses

13 Virus Protection Install anti-virus software – McAfee, Norton, Dr. Solomon, Symantec Downloading of plug-ins from the internet be avoided Downloading of plug-ins should be done from the vendor’s official website Newly obtained disks, programs or files should be scanned for viruses before use Installation of a firewall may also reduce the risk of virus infiltration

14 Outside Attacks On A Network
Eavesdropping/Sniffing/Snooping – ability to monitor network traffic using some kind of network-monitoring software Password Attacks – attacker is able to gain access to the network and gather information such as valid users, computer names, resources – can lead to modification, deletion or rerouting of network data IP Address Spoofing – attacker assumes a legal IP address and gain access to the network Man-in-the–middle attacks – attacker is able to monitor, capture and control data between sending and receiving devices

15 Firewalls A combination of hardware and software that sits between the internet and the internal network Protects a network from outside attack A firewall examines data leaving and entering the internal network and is able to filter the data according to the specified rules

16 Internet Fire wall Organization network

17 Types of Firewalls Packet Filter Firewall Circuit-Level Firewall
Application-Gateway Firewall


Download ppt "Maintaining State in a Stateless System"

Similar presentations


Ads by Google