Explore several aspects of the http protocol

Assignment Help Computer Engineering
Reference no: EM132118901

Assignment

Read the Wireshark Introduction document available on WesternOnline, and carry out the activities described in the document.

In this lab, we'll explore several aspects of the HTTP protocol:

the basic GET/response interaction, HTTP message formats, retrieving large HTML files, and retrieving HTML files with embedded objects.

Note: Only trace HTTP packets from the server TCP port 80. If you see SSDP packets being shown with an HTTP filter, ignore these, since these are from UDP ports. You may also ignore GET requests for "favicon.ico" as these are not strictly part of the web page transfer.

1. The Basic HTTP GET/response interaction

1. Start up your web browser.

2. Start up the Wireshark packet sniffer (but don't yet begin packet capture). Enter "http" (just the letters, not the quotation marks) in the display-filter-specification window, so that only captured HTTP messages will be displayed later in the packet-listing window.

3. Wait a bit more than one minute (we'll see why shortly), and then begin Wireshark packet capture.

4. Enter the following to your browser. Your browser should display the very simple HTML file.

5. Stop Wireshark packet capture.

Questions:

1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running?

2. What is the IP address and port number of your computer?

3. What is the physical address of your computer? Of the wiu server.

4. Inspect the HTTP header of the request packet and briefly describe the fields in it.

5. How many application bytes are being returned to your browser in the HTTP response? How many bytes of data are being returned (not including the HTTP header)?

2. The HTTP CONDITIONAL GET/response interaction

Before performing the steps below, make sure your browser's cache is empty. (To do this under Firefox, select Tools->Options and click on clear all current history, or for Internet Explorer, select Tools->Internet Options->Delete under Browsing History; these actions will remove cached files from your browser's cache.) Now do the following:

1. Start up your web browser, and make sure your browser's cache is cleared, as discussed above.

2. Start up the Wireshark packet sniffer

3. Enter the following URL into your browser


4. Click the refresh button on your browser

5. Stop Wireshark packet capture, and enter "http" in the display-filter-specification window, so that only captured HTTP messages will be displayed later in the packetlisting window.

Questions:

6. Inspect the contents of the first HTTP GET request from your browser to the server. Do you see an "IF-MODIFIED-SINCE" line in the HTTP GET?

7. Inspect the contents of the server response. Did the server explicitly return the contents of the file? How can you tell?

8. Now inspect the contents of the second HTTP GET request from your browser to the server. Do you see an "IF-MODIFIED-SINCE:" line in the HTTP GET? If so, what information follows the "IF-MODIFIED-SINCE:" header?

9. What is the HTTP status code and phrase returned from the server in response to this second HTTP GET? Did the server explicitly return the contents of the file? Explain.

3. Retrieving Long Documents

In our examples thus far, the documents retrieved have been simple and short HTML files. Let's next see what happens when we download a long HTML file. Do the following:

1. Start up your web browser, and make sure your browser's cache is cleared, as discussed previously.

2. Start up the Wireshark packet sniffer.

 3. Enter the following URL into your browser should display the rather lengthy US Bill of Rights.

4. Stop Wireshark packet capture, and enter "http" in the display-filter-specification window, so that only captured HTTP messages will be displayed.

In the packet-listing window, you should see your HTTP GET message, followed by a multiple-packet response to your HTTP GET request. This multiple-packet response deserves a bit of explanation.

Recall that the HTTP response message consists of a status line, followed by header lines, followed by a blank line, followed by the entity body. In the case of our HTTP GET, the entity body in the response is the entire requested HTML file.

In our case here, the HTML file is rather long, and at 4700 bytes, is too large to fit in one TCP packet. The single HTTP response message is thus broken into several pieces by TCP, with each piece being contained within a separate TCP segment.

Questions:

10. How many TCP segments were sent for the HTTP GET request sent by your browser (ignore any requests for "favicon.ico")?

11. How many data-containing TCP segments were needed to carry the single HTTP response?

12. What is the status code and phrase associated with the response to the HTTP GET request?

4. HTML Documents with Embedded Objects

Now that we've seen how Wireshark displays the captured packet traffic for large HTML files, we can look at what happens when your browser downloads a file with embedded objects, i.e., a file that includes other objects (in the example below, image files) that are stored on another server(s).

Do the following:

1. Start up your web browser, and make sure your browser's cache is cleared, as discussed previously.

2. Start up the Wireshark packet sniffer.

3. Enter the following URL into your browser

Should display a short HTML file with three images. These images are referenced in the base HTML file. That is, the images themselves are not contained in the HTML; instead the URLs for the images are contained in the downloaded HTML file. As discussed in the textbook, your browser will have to retrieve these files from the indicated web sites.

4. Stop Wireshark packet capture, and enter "http" in the display-filter-specification window, so that only captured HTTP messages will be displayed.

Questions:

13. How many HTTP GET request messages were sent by your browser (ignore any requests for "favicon.ico")? To which Internet addresses were these GET requests sent?

14. Can you tell whether your browser downloaded the images serially (i.e., one after the other), or whether they were downloaded from the two web sites in parallel? Explain.

15. How many TCP connections were opened for the transfer of the page with the images to your browser? How can you tell?

Reference no: EM132118901

Questions Cloud

How many different ways can you up the stair way : Suppose a stair way has N steps where N is a positive integer. How many different ways can you up the stair way if, as you up, sometimes
What is the starting address of displacement 0 : What is the ending address? Exactly how many bytes are contained in the segment? What is the starting address of displacement 0?
Explain why most real numbers cannot be stored : Explain why most real numbers cannot be stored using finite binary storage from two different point of views in less than 200 words.
Identify all the types of actors who will use rtgm : Please turn in this assignment by uploading a document with the results of your three tasks this week: Identify all the types of actors who will use RTGM.
Explore several aspects of the http protocol : Wait a bit more than one minute (we'll see why shortly), and then begin Wireshark packet capture.
How to read a html file using python : How to read a html file using python, then extract id and links in that file.
How knowledge management systems could be used : Consider your degree program (Business Study with Accounting Concentration) or your selected industry (Restaurant Business).
How would you write a piece of code that throws : How would you write a piece of code that throws a RuntimeException with the message "An incorrect parameter was given"?
Which data structures should you use for the address book : Suppose we want to create an address book which contains names, phone numbers, emails, and other personal information.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd