Solved

Chunked Transfer Encoding/Decoding

Posted on 1997-06-12
2
1,312 Views
Last Modified: 2013-12-25
Hi all

This ones for the hardcores. I have set up some cgi and html so the user may select specific files to download from my pages.

Everything works for me, however i want there to be some form of safe transfer passage during the download. I want the user to know that the file they have just downloaded is uncorrupted in any fashion. I am aware of chunked transfers and what it means, but how do i incorporate it into my pages.

Currently i have in my script, before i push the file out :

Content-Type: application/octet-stream
Transfer-Encoding: chunked

I think there should be more to chunking than this.

What else do i need to define? and does HTTP know at the client end to decode these chunked up transfers?

The content-type is so the file that is being downloaded is passed on as is. i.e if it's a ".zip" then it remains a ".zip".
0
Comment
Question by:abd051697
2 Comments
 
LVL 5

Accepted Solution

by:
icd earned 200 total points
ID: 1828199
As far as I can see what you are doing is correct. The HTTP/1.1 protocol 'knows' about the Transfer-Encoding and will deal with it correctly.

As I understand it, just by including the line 'Transfer-Encoding' the server will take care of the rest.

You might find the following reference of use to you.

http://cosanostra.msh.unicaen.fr/WWW/http/http_1.1_spec.html


0
 

Author Comment

by:abd051697
ID: 1828200
i am familiar with this http draft. if all i need to do is provide "Transfer-Encoding: chunked", how do i know that the transfer was safe, and not just like any other.

what more do i have to define to let the end user know that the transfer was safe. based on factual data from the transfer, not just that i am using the chunking method.

last but not least. have you used this method of safe transfer.
if so i would very much like to continue our email banter. so that i may get what i am trying to do working.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Ever wondered how to display how many visitors you have online. In this tutorial I will show you an easy but effective way to display the number of online visitors in WhizBase. In this article I assume you have read my previous articles and know …
I hope you'll find this tutorial useful and interesting. So let's try to extend Tcl with a new package.  For anyone more deeply interested please check out the book "Practical Programming in Tcl and Tk". It's really one of the best written books abo…
The viewer will learn how to dynamically set the form action using jQuery.
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now