Differentiate between http and ftp, Computer Engineering

Assignment Help:

Differentiate between http and ftp.

HTTP and FTP were developed to make Internet transmission better.

FTP is utilized to exchange files among computer accounts, to transfer files among an account and a desktop computer (upload) or to access software archives upon the Internet. This also commonly used to download programs and another files to your computer from other servers. This transfer files in two different formats Binary format for binary files and ASCII for text files.

This permits a user to perform fundamental file and directory management operations as deleting, renaming or copying. In addition, there is something termed as Anonymous FTP used heavily today by some universities and also private organizations. Anonymous FTP is a facility offered through many machines on the Internet. It permits you to log in along with the user name 'anonymous' or the user name 'ftp'. While prompted for a password, type your e-mail address -- this is not necessary, although, this is a courtesy for those sites that like to identify who is making use of their facility. Be courteous. Several sites need a valid e-mail address, others don't.

HTTP is used mainly in today's society like a set of rules for exchanging files (graphic images, text, sound, other multimedia files or video) on the World Wide Web. This also gives access to other protocols like FTP, NNTP, SMTP, WAIS, Telnet, TN3270 and Gopher. Necessary concepts which are part of HTTP contain (as its name means) the idea which files can contain references to other files whose choose will elicit additional transfer requests. Any web server machine has, in addition to the HTML and another file this can serve, an HTTP daemon, a program which is designed to wait for HTTP requests and handle them while they arrive. Your Web browser is an HTTP client, sending requests to server machines. While the browser user enters file requests through either "opening" a Web file clicking upon a hypertext link or typing in a Uniform Resource Locator, the browser builds an HTTP request and sends this to the Internet Protocol Address indicated through the URL. The HTTP daemon in the destination server machine gets the request and after any essential processing, the requested file is returned.


Related Discussions:- Differentiate between http and ftp

Determine the concepts of object oriented analysis, Determine the concepts ...

Determine the concepts of Object Oriented Analysis  In OOA the initial focus is on identifying objects from the application domain, after that fitting those procedures around

What is the linkage section used for, The linkage section is used to pass d...

The linkage section is used to pass data from one program to one more program or to pass data from a PROC to a program.

How is a valid user identifier accomplished, How is a valid user identifier...

How is a valid user identifier accomplished? A valid user identifier is accomplished within one or more of given ways: • Provide some password, which only user knows. • P

What do you mean by proc directive, Q. What do you mean by PROC Directive? ...

Q. What do you mean by PROC Directive? PROC Directive: Code segment comprises executable code for a program that includes one or more procedures defined initially with PROC dir

What are the concerns for growth of e-commerce in india, What are the conce...

What are the concerns for growth of e-commerce in India? Government as Facilitator for the growth of e-commerce has taken following steps: a. Promotion of competitive dataco

Signaling pvm process, Q. Signaling PVM process? int pvm_sendsig( ...

Q. Signaling PVM process? int pvm_sendsig( int tid, int signum ) Transmits a signal to other PVM process. tid is task identifier of PVM process to receive signal.

Develop a menu driven program, Q.  Develop a Menu driven program with follo...

Q.  Develop a Menu driven program with following menu: a.  Binary to Decimal b.  Binary to Octal c.  Binary to Hexadecimal d.  Exit (Put proper validation for input

Register-to-register operands in RISC, Q. Register-to-register operands in ...

Q. Register-to-register operands in RISC? Register-to-register operands: In RISC machines operation which access memories are LOAD and STORE. All other operands are kept in reg

How race around condition can be avoided, How Race Around Condition can...

How Race Around Condition can be avoided? Ans: The race around condition can be avoided if 1. Duration of clock pulse being high is small like comparative to the dela

Develop an object-oriented design, Investigate the MIPS programmers model a...

Investigate the MIPS programmers model and develop an object-oriented design that will reflect aspects of the MIPS architecture. Consider the functional units of the architecture a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd