How to use http and world wide web, Computer Engineering

Assignment Help:

Q. How to use Http and World Wide Web?

Http and World Wide Web

One of the most frequently used services on the Internet is the World Wide Web (WWW). The application protocol which makes the web work is Hypertext Transfer Protocol or HTTP. Don't confuse this with the Hypertext Markup Language (HTML). HTML is language used to write web pages. HTTP is the protocol which web browsers and web servers use to communicate with each other over Internet. It's an application level protocol since it sits on top of the TCP layer in the protocol stack and is used by specific applications to talk to one another. In this case applications are web browsers and web servers.

HTTP is a connectionless text based protocol. Clients (web browsers) transmits requests to web servers for web elements like web pages and images. After request is serviced by a server, connection between server and client across the Internet is disconnected. A new connection should be made for each request. Most protocols are connection oriented. This means that two computers communicating with each other keep connection open over the Internet. HTTP doesn't however. Before an HTTP request can be made by a client, a new connection should be made to the server.


Related Discussions:- How to use http and world wide web

First order predicate logic-artificial intelligence, First Order Predicate ...

First Order Predicate Logic This is a more expressive logic because it builds on propositional logic by allowing us to use constants, predicates, variables, quantifiers and fun

Overcoming global issues in e-commerce, E-commerce advance tremendous chanc...

E-commerce advance tremendous chance by permitting industrialist to buy Materials at a low price internationally. Also they give companies the opportunity to sell to universal stor

Computer Architecture, As an advocate of CISC architecture to RISC architec...

As an advocate of CISC architecture to RISC architecture, what are the merits and demerits of CISC to RISC architecture

Why does ftp use two standard ports, Why does FTP use two standard ports wh...

Why does FTP use two standard ports whereas other protocols, in general use only one port? Justify. File transfer protocol uses a control connection just to send commands and r

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Demonstrate arc consistency, Demonstrate Arc consistency: To demonstra...

Demonstrate Arc consistency: To demonstrate the worth of performing an arc-consistency check before starting a serarch for a solution, we'll use an example from Barbara Smith'

Explain about double error detection bit, Q. Explain about Double Error Det...

Q. Explain about Double Error Detection bit? Let's presume now that two bit errors take place in data. Data received: So on -matching we conclude P3-D3 pair doesn't

Full adder, design a FULL adder with two half adders and an or gate

design a FULL adder with two half adders and an or gate

What is an adaptor class or wrapper class in c++, A class that has no funct...

A class that has no functionality of its own is an Adaptor class in C++. Its member functions hide the use of a third party software component or an object with the non-compatible

What features are needed to implement top down parsing, The features are ne...

The features are needed to implement top down parsing are? Ans. Source string marker, Prediction making mechanism and also matching and backtracking mechanism features are need

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd