Explore several aspects of the http protocol

Assignment Help Computer Engineering
Reference no: EM132118901

Assignment

Read the Wireshark Introduction document available on WesternOnline, and carry out the activities described in the document.

In this lab, we'll explore several aspects of the HTTP protocol:

the basic GET/response interaction, HTTP message formats, retrieving large HTML files, and retrieving HTML files with embedded objects.

Note: Only trace HTTP packets from the server TCP port 80. If you see SSDP packets being shown with an HTTP filter, ignore these, since these are from UDP ports. You may also ignore GET requests for "favicon.ico" as these are not strictly part of the web page transfer.

1. The Basic HTTP GET/response interaction

1. Start up your web browser.

2. Start up the Wireshark packet sniffer (but don't yet begin packet capture). Enter "http" (just the letters, not the quotation marks) in the display-filter-specification window, so that only captured HTTP messages will be displayed later in the packet-listing window.

3. Wait a bit more than one minute (we'll see why shortly), and then begin Wireshark packet capture.

4. Enter the following to your browser. Your browser should display the very simple HTML file.

5. Stop Wireshark packet capture.

Questions:

1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running?

2. What is the IP address and port number of your computer?

3. What is the physical address of your computer? Of the wiu server.

4. Inspect the HTTP header of the request packet and briefly describe the fields in it.

5. How many application bytes are being returned to your browser in the HTTP response? How many bytes of data are being returned (not including the HTTP header)?

2. The HTTP CONDITIONAL GET/response interaction

Before performing the steps below, make sure your browser's cache is empty. (To do this under Firefox, select Tools->Options and click on clear all current history, or for Internet Explorer, select Tools->Internet Options->Delete under Browsing History; these actions will remove cached files from your browser's cache.) Now do the following:

1. Start up your web browser, and make sure your browser's cache is cleared, as discussed above.

2. Start up the Wireshark packet sniffer

3. Enter the following URL into your browser


4. Click the refresh button on your browser

5. Stop Wireshark packet capture, and enter "http" in the display-filter-specification window, so that only captured HTTP messages will be displayed later in the packetlisting window.

Questions:

6. Inspect the contents of the first HTTP GET request from your browser to the server. Do you see an "IF-MODIFIED-SINCE" line in the HTTP GET?

7. Inspect the contents of the server response. Did the server explicitly return the contents of the file? How can you tell?

8. Now inspect the contents of the second HTTP GET request from your browser to the server. Do you see an "IF-MODIFIED-SINCE:" line in the HTTP GET? If so, what information follows the "IF-MODIFIED-SINCE:" header?

9. What is the HTTP status code and phrase returned from the server in response to this second HTTP GET? Did the server explicitly return the contents of the file? Explain.

3. Retrieving Long Documents

In our examples thus far, the documents retrieved have been simple and short HTML files. Let's next see what happens when we download a long HTML file. Do the following:

1. Start up your web browser, and make sure your browser's cache is cleared, as discussed previously.

2. Start up the Wireshark packet sniffer.

 3. Enter the following URL into your browser should display the rather lengthy US Bill of Rights.

4. Stop Wireshark packet capture, and enter "http" in the display-filter-specification window, so that only captured HTTP messages will be displayed.

In the packet-listing window, you should see your HTTP GET message, followed by a multiple-packet response to your HTTP GET request. This multiple-packet response deserves a bit of explanation.

Recall that the HTTP response message consists of a status line, followed by header lines, followed by a blank line, followed by the entity body. In the case of our HTTP GET, the entity body in the response is the entire requested HTML file.

In our case here, the HTML file is rather long, and at 4700 bytes, is too large to fit in one TCP packet. The single HTTP response message is thus broken into several pieces by TCP, with each piece being contained within a separate TCP segment.

Questions:

10. How many TCP segments were sent for the HTTP GET request sent by your browser (ignore any requests for "favicon.ico")?

11. How many data-containing TCP segments were needed to carry the single HTTP response?

12. What is the status code and phrase associated with the response to the HTTP GET request?

4. HTML Documents with Embedded Objects

Now that we've seen how Wireshark displays the captured packet traffic for large HTML files, we can look at what happens when your browser downloads a file with embedded objects, i.e., a file that includes other objects (in the example below, image files) that are stored on another server(s).

Do the following:

1. Start up your web browser, and make sure your browser's cache is cleared, as discussed previously.

2. Start up the Wireshark packet sniffer.

3. Enter the following URL into your browser

Should display a short HTML file with three images. These images are referenced in the base HTML file. That is, the images themselves are not contained in the HTML; instead the URLs for the images are contained in the downloaded HTML file. As discussed in the textbook, your browser will have to retrieve these files from the indicated web sites.

4. Stop Wireshark packet capture, and enter "http" in the display-filter-specification window, so that only captured HTTP messages will be displayed.

Questions:

13. How many HTTP GET request messages were sent by your browser (ignore any requests for "favicon.ico")? To which Internet addresses were these GET requests sent?

14. Can you tell whether your browser downloaded the images serially (i.e., one after the other), or whether they were downloaded from the two web sites in parallel? Explain.

15. How many TCP connections were opened for the transfer of the page with the images to your browser? How can you tell?

Reference no: EM132118901

Questions Cloud

How many different ways can you up the stair way : Suppose a stair way has N steps where N is a positive integer. How many different ways can you up the stair way if, as you up, sometimes
What is the starting address of displacement 0 : What is the ending address? Exactly how many bytes are contained in the segment? What is the starting address of displacement 0?
Explain why most real numbers cannot be stored : Explain why most real numbers cannot be stored using finite binary storage from two different point of views in less than 200 words.
Identify all the types of actors who will use rtgm : Please turn in this assignment by uploading a document with the results of your three tasks this week: Identify all the types of actors who will use RTGM.
Explore several aspects of the http protocol : Wait a bit more than one minute (we'll see why shortly), and then begin Wireshark packet capture.
How to read a html file using python : How to read a html file using python, then extract id and links in that file.
How knowledge management systems could be used : Consider your degree program (Business Study with Accounting Concentration) or your selected industry (Restaurant Business).
How would you write a piece of code that throws : How would you write a piece of code that throws a RuntimeException with the message "An incorrect parameter was given"?
Which data structures should you use for the address book : Suppose we want to create an address book which contains names, phone numbers, emails, and other personal information.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Program to select numbers of three finalists

You have three identical prizes to give away and a pool of 10 finalists. The finalists are allocated numbers of 1 to 10. Write down a program to randomly select the numbers of 3 finalists to receive a prize.

  Draw a binary tree corresponding to the given expression

Draw a binary tree corresponding to the arithmetic expression A+B*C/D*(E-F), so that preorder, inorder and postorder traversal of binary tree.

  In brief explain the given options for ending a computing

briefly describe the following options for ending a computing session log off option switch user option sleep option

  Define what are the security and privacy risks

Discuss and cite at least one additional credible or scholarly source other than the course textbooks to support your analysis and positions

  Describe the insertion and removal algorithms for a tree

Describe, in detail, the insertion and removal algorithms for an (a,b) tree. For what values of d is the tree T of the previous exercise an order-d B-tree?

  How to create a case study for software engineer

How to create a case study for software engineer and explain in details.

  How to prepare your favorite three-dish meal

How to prepare your favorite three-dish meal? Change the font and font size of the Title Only slides using the Slide Master.

  Discuss about the primary audience of the website

To successfully analyze your client's needs, you should collect as much information about the project as possible. To assist in your data collection.

  Develop a web-based pothole tracking and repair system

Why is it that many software developers don't pay enough attention to requirements engineering? Are there ever circumstances where you can skip it?

  Prepare erd plus versions of tal and cat

Reports (10 Bonus pts. each Report & Query): TAL Subtotal Orders by Customer (3 Bonus pts). Include SQL for Query used for Report. TAL Subtotal Orders by Items (3 Bonus pts). Include SQL for Query used for Report

  Provide discussion of the relative effectiveness of research

Provide a discussion of the relative effectiveness of the research and how it might be improved to gain better results. MAKE SURE INCLUSION OF THE FOLLOWING...... Was there further information that would be helpful that was not found?

  Differentiate program counter and a memory address register

What is the difference between a program counter and a memory address register?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd