The most prominent problem for network administrators in supporting Ajax applications is that the architecture programming model has changed the problem of using network applications from web applications such as block processing, non-interconnected responses. hundreds of KBs to the change are continuous in smaller HTTP responses. This means that the Web and application servers can be much busier than before. What Ajax will do with your network and server depends on how the application is designed, make sure application developers understand the impact of their applications on the network. how.
Web applications should be associated with the distribution of the network, which is to send less data. This does not mean, however, that this principle needs to be widely followed by software developers. One advantage for the network, HTTP compression for Ajax responses can be reduced in size and supported in many modern browsers. However, because the compression of the compressed file is dynamic, the speed may not improve much if the responses are relatively small. This means that network administrators should allow compression on the Web server, but they need to understand that with Ajax applications, the performance of this is not as large as previous web applications.
In order to send less data, we will often use caching. Most Ajax implementations, however, may be hostile to caching with the assumption that browsers do not involve re-fetching URLs in the same session. Instead of working with caching, many Ajax developers use caching through header settings or unique URLs.
It is possible to target caching issues with the client Ajax Ajax cache written in JavaScript, but most Ajax libraries do not add such features. Network experts should introduce developers to the benefits of caching because Ajax may be more beneficial from this problem than compression.
6. Acknowledge about two-connection restrictions
Ajax applications are restricted by HTTP for two concurrent connections with the same URL. This is how the HTTP protocol is designed, unrestricted. However, many Ajax software developers are still slipping into a server by chance although Microsoft's Internet Explorer 8 is supported to go beyond these restrictions. Some of Ajax 'bad apps can be problematic and with browsers changing, network administrators need to capture the number of requests created and work with application developers to Avoid using designs such as long polls or help connections.
7. Consider the order of processing
For traditional web applications, TCP / IP communication influence (such as the lack of an HTTP response order will be received) is generally unnoticed. HTML documents are received before other objects and then it will trigger the request. Any request that occurs later activates a new document completely, thus ensuring the order. However, Ajax does not use such order identification, so the dependency of an application in the right order needs to be handled by a queue. The Ajax framework also does not consistently acknowledge this concern. Therefore, it is necessary to ensure that Ajax application developers understand this issue.
8. Acknowledge the influence of eliminating "Layer 8" error correction
In the past few years, users have overcome the quality of Web distribution by reloading the pages or the Back button. Simply put, users do so to help reduce network problems because errors often appear at times between page paint. However, with Ajax, the application error is not so obvious. Users often get errors about errors because the animated GIF rotation provides too little information about the correct state of the request.
Software developers are the most deadly because many libraries are not effective in acknowledging that these timeouts occur, retry times must appear, the server and the data errors are increasing. JavaScript diagnostics display communication and code errors rarely on the client side, so users often don't know. Therefore, it is necessary to have multiple application level checks required for administrators to support Ajax properly.
9. The old security threats appear a second time
If you listen to experts, Ajax can increase the attack surface but it is no less secure than traditional web application development environments because of the HTTP inputs to the trusted server. has the same headers, query strings and text body. However, if the client code is fully trusted and imported into non-blocking data in the web development team, Ajax can cause similar security problems as traditional web applications.
Cross-site scripting (XSS) is not a new hole in Ajax; it is a common error, especially if an application allows state data to be adjusted with JavaScript. HTML input should be disallowed in most cases and HTTP Only Cookies should be applied immediately to reduce cookie attacks and other attacks via XSS.
Also Cross Site Request Forgery is not a new error of Ajax, but if your application developers do not check the HTTP Referer (sic) header and manage sessions properly within Ajax applications, then can leave this problem vulnerable.
Hackers, like software developers, are very interested in using and abusing JavaScript, which adds to potential vulnerabilities. Network experts should make sure the software expert knows that client code can be changed, so the input data always needs to be filtered and reviewed.
10. Policy issues of the same origin
On the 'positive' side of security, JavaScript's same policies will still be valid in Ajax applications using XMLHttpRequest. This policy ensures that these scripts are not linked to external domains. From the point of view of software developers, this can be quite frustrating because it means that those pages are met, for example, from ajaxref.com cannot link to the URL hosted on www. ajaxref.com; even if it is on the same server, it is not the same domain. DNS equivalent no problem here; It is a string-check used by SOP.
SOP will interfere with the developers' ability to perform some Web service efforts on the client side. Obviously the best method is to use a proxy on the server to make requests to another server and combine the results. However, many Ajax software developers try to interrupt the same restrictions. The use