Differentiate between http and ftp, Computer Engineering

Assignment Help:

Differentiate between http and ftp.

HTTP and FTP were developed to make Internet transmission better.

FTP is utilized to exchange files among computer accounts, to transfer files among an account and a desktop computer (upload) or to access software archives upon the Internet. This also commonly used to download programs and another files to your computer from other servers. This transfer files in two different formats Binary format for binary files and ASCII for text files.

This permits a user to perform fundamental file and directory management operations as deleting, renaming or copying. In addition, there is something termed as Anonymous FTP used heavily today by some universities and also private organizations. Anonymous FTP is a facility offered through many machines on the Internet. It permits you to log in along with the user name 'anonymous' or the user name 'ftp'. While prompted for a password, type your e-mail address -- this is not necessary, although, this is a courtesy for those sites that like to identify who is making use of their facility. Be courteous. Several sites need a valid e-mail address, others don't.

HTTP is used mainly in today's society like a set of rules for exchanging files (graphic images, text, sound, other multimedia files or video) on the World Wide Web. This also gives access to other protocols like FTP, NNTP, SMTP, WAIS, Telnet, TN3270 and Gopher. Necessary concepts which are part of HTTP contain (as its name means) the idea which files can contain references to other files whose choose will elicit additional transfer requests. Any web server machine has, in addition to the HTML and another file this can serve, an HTTP daemon, a program which is designed to wait for HTTP requests and handle them while they arrive. Your Web browser is an HTTP client, sending requests to server machines. While the browser user enters file requests through either "opening" a Web file clicking upon a hypertext link or typing in a Uniform Resource Locator, the browser builds an HTTP request and sends this to the Internet Protocol Address indicated through the URL. The HTTP daemon in the destination server machine gets the request and after any essential processing, the requested file is returned.


Related Discussions:- Differentiate between http and ftp

Computer graphics, explain area sub division method algorithm

explain area sub division method algorithm

Verilog, http://www.cse.psu.edu/~dheller/cmpen331/Homework/Homework4.htmlwo...

http://www.cse.psu.edu/~dheller/cmpen331/Homework/Homework4.htmlwords accepted#

Fully parallel associative processor (fpap), Fully Parallel Associative Pro...

Fully Parallel Associative Processor (FPAP):  This processor accepts the bit parallel memory organisation. FPAP has two type of this associative processor named as: Word Org

What is imprecise and precise exception, What is imprecise and precise exce...

What is imprecise and precise exception? Situation in which one or more of the succeeding instructions have been implemented to completion is known as imprecise exception. Situ

Explain the trackball and thumbwheel devices, Explain the Trackball and Thu...

Explain the Trackball and Thumbwheel devices  Joysticks A joystick consists of a small, vertical lever (called the stick) mounted on a base that is used to steer the screen

Explain the working of any one of centralized spc, Explain the working of a...

Explain the working of any one of centralized SPC? Standby mode of operation is the easiest of dual processor configuration operations. Usually, one processor is active and

Ms access database through menu driven selections, Would you like to easily...

Would you like to easily automate your MS Access database through menu driven selections? This can be accomplished by producing a form with customized buttons that point to macr

Types of policies in e-commerce, 1- The Privacy Policy: The vendor must...

1- The Privacy Policy: The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them i

Explain the process of inter-register signalling, Explain the process of in...

Explain the process of inter-register signalling. Registers are utilized in common control exchanges to store and analyze routing data. They are given on a common basis is a

Define the system users, Q. Define the System users? System users are d...

Q. Define the System users? System users are defined as the people who employ information systems or who are affected by information system on a regular basis i.e. validating,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd