What version of http is the browser running

Assignment Help Computer Networking
Reference no: EM13811896

1. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. What transport and application- layer protocols besides HTTP are needed in this scenario?

2. Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i. e., this is the actual content of an HTTP GET message). The characters <cr>< lf> are carriage return and line- feed characters (that is, the italized character string <cr> in the text below represents the single carriage-return character that was contained at that point in the HTTP header). Answer the following questions, indicating where in the HTTP GET message below you find the answer.
GET / cs453/ index. html HTTP/ 1.1< cr>< lf> Host: gai a. cs. umass. edu< cr>< lf> a.cs.umass.edu<cr><lf> User- Agent: Mozilla/ 5.0 ( Windows; U; Windows NT 5.1; en- US; rv: 1.7.2) Gec ko/ 20040804 Netscape/ 7.2 ( ax) < cr>< lf> Accept: ex t/ xml, application/ xml, application/ xhtml+ xml, text / html; q= 0.9, text/ plain; q= 0.8, image/ png,*/*; text/plain;q=0.8,image/png,*/*; q= 0.5 < cr>< lf> Accept- Language: en- us, en; q= 0.5< cr>< en-us,en;q=0.5<cr>< lf> Accept- Encoding: zip, deflate< cr>< lf> Accept- Charset: zip,deflate<cr><lf>Accept-Charset: ISO - 8859- 1, utf- 8; q= -8859-1,utf-8;q= 0.7,*; q= 0.7< cr>< lf> -8859-1,utf-8;q=0.7,*;q=0.7<cr><lf> Keep- Alive: 300< cr> < lf> Connection: keep- alive< cr>< <lf>Connection:keep-alive<cr>< lf>< cr>< lf>

a. What is the URL of the document requested by the browser?
b. What version of HTTP is the browser running?
c. Does the browser request a non-persistent or a persistent connection?
d. What is the IP address of the host on which the browser is running?
e. What type of browser initiates this message? Why is the browser type needed in an HTTP request message?

3. Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT_1, ... ... RTT_n . Further suppose that the Web page associated with the link contains exactly one object, consisting of a small amount of HTML text. Let RTT_0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object?

4. How does SMTP mark the end of a message body? How about HTTP? Can HTTP use the same method as SMTP to mark the end of a message body? Explain.

5. Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the users in your department? Explain.

6. Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of u s = 30 Mbps, and each peer has a download rate of d i = 2 Mbps and an upload rate of u. For N = 10, 100, and 1,000 and u = 300 Kbps, 700 Kbps, and 2 Mbps, prepare a chart giving the minimum distribution time for each of the combinations of N and u for both client- server distribution and P2P distribution.

7. Suppose Bob joins a BitTorrent torrent, but he does not want to upload any data to any other peers (so called free-riding).

a. Bob claims that he can receive a complete copy of the file that is shared by the swarm. Is Bob's claim possible? Why or why not?

b. Bob further claims that he can further make his "free-riding" more efficient by using a collection of multiple computers (with distinct IP addresses) in the computer lab in his department. How can he do that?

8. In the circular DHT example in Section 2.6.2, suppose that peer 3 learns that peer 5 has left. How does peer 3 update its successor state information? Which peer is now its first successor? Its second successor?

Reference no: EM13811896

Questions Cloud

Invent a new style for a video game : Design a new textbook for a psychology class, science class, etc. Invent a new telephone. Design a new suitcase. Design new clothes for soldier/teacher/cook/student/etc.
Typical manufacturing supervisors challenges : What are typical manufacturing supervisors' challenges, frequently created due to no fault of their own? Under newer, nontraditional manufacturing and operations methods, how can these problems reduce?
Demonstrate relevant knowledge of mrp : Utilizing the Step-by-Step MRP Calculation Process, students will solve the following MRP problem given: Product A is an end item and is made from two units of B and four of C.
Credible academic journals and other reliable sources : Discuss how you would know that your team was in conflict and what would be a technique you would use to resolve it. You may wish to research any conflict resolution models available in many credible academic journals and other reliable sources.
What version of http is the browser running : Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i. e., this is the actual content of an HTTP GET message). What version of HTTP is the browser running? What is the IP addr..
Groups into a self-directed work team : You have just been part of a merger. You have each been chosen to head up your department and merge the two groups into a self-directed work team.
Question regarding the higher levels of performance : Organizational restructuring is common as organizations attempt to achieve higher levels of performance. Provide research via the Internet (from a credible source) and share an example of a restructuring that has taken place within an organization..
Define the agency''s department for the different sections : Interview at least two representatives of the agency's department for the different sections of the paper. If you can obtain more than two different interviews, do so.
Explain the role grants play in the human services field : Explain the role grants play in the human services field

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd