The world wide web http, Computer Networking

Assignment Help:

The World  Wide Web HTTP

The Hyper text Transfer Protocols( HTTP) is a protocols  used mainly to  access data on the world  wide  web. HTTP functions as a carbonation of FTP( File  Transfer Protocols) and SMTP ( Simple  Mail Transfer Protocols). HTTP is  implemented in two programs a  client program  and a server program. The  client program  and server program executing on different end systems talk to each other by  exchanging. HTTP message HTTP defines the structure of these  message  and how  the client and server exchange  the messages.

HTTP defines  how web  clients (f or  example browser ) request  web  page from web  servers and  how servers transfer web page to client. In  figure 3.3 when a user requests a web  page (f or  e, g, clicks on a hyperlink) the  browse sends HTTP request messages for the objects  ( an  objects  is simply a file such as an HTML file a JPEG image are GIF image java applet an audio clip and so on in the page to the server.

HTTP uses TCP (Transmission control  protocols) is  its  underlying transport protocol.  Because TCP provides a reliable data transfer services to HTTP. HTTP consists  of two  types  of massage format request  and response.

2035_The World  Wide Web HTTP.jpg

                                                                   figure HTTP request response behavior

 

The HTTP client first  initiates a TCP connection with  the server. Once the connection is established the browser and the server process access TCP through their socket interface. On  the client  side the socket interface is the door between  the client process and the TCP connection on  the server side it is the door  between  into its  socket interface and receives HTTP response message from  its socket interface. Similarly  the HTTP server receives request message from its  socket interface and sends response message  into its socket interface. Once  the client sends  a message  into its  socket  interface the  message  is out  of the  clients  hands  and is  in the bands of TCP.

HTTP need not worry  about  lost data  or the details of  how TCP recovers from loss  or reordering of data within  the network. That is the job of TCP and the  protocols in the  lower layers  of the protocols stack. It  is important to note  that the server sends  requested files to client without storing any state information about the client. If  a particular client asks for  the same object twice in a period of a few  seconds the server does not  respond by saying that it just  served the object  t the client instead the server resends the objects as it has completely forgotten what  the server  has sent earlier because on HTTP server mantas no information  about  clients HTTP is said  to be  as tasteless protocols.

 

 

 


Related Discussions:- The world wide web http

Discuss the benefits and requirements of voip, Question 1 Discuss the bene...

Question 1 Discuss the benefits and requirements of VOIP Question 2 Define the following Multicast routing protocol explain in detail with diagram Multicast backbone

Describe briefly how the news filtering agent works, QUESTION (a) Conce...

QUESTION (a) Concerning agents that reduce workload, there are four agents developed using a learning approach among which is the News Filtering Agent. Name the other three age

Describe the term - certification authority, Describe the term - Certificat...

Describe the term - Certification Authority The certification is most easily implemented with a custom solution combined with a server, called the Certification Authority (CA).

Definition of csma/cd, Definition of CSMA/CD CSMA/CD (Carrier Sense Mu...

Definition of CSMA/CD CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is used to minimize collisions, coordinate traffic and maximize number of frames deliver

Command to copy the ios image to a tftp server, What is the command to copy...

What is the command to copy the IOS image to a TFTP server? Ans) Copy flash tftp

Security, .test a number to be prime number in network security

.test a number to be prime number in network security

Classes and dotted decimal notation, The relationship between dotted decima...

The relationship between dotted decimal notation and classes is shown as follows. In class A the three octets managed to a host suffix. In class B the last most two octets ar

What is bens network, Q. What is Bens Network? It's a non-blocking netw...

Q. What is Bens Network? It's a non-blocking network. It's a special type of Clos network where first and last stage consists of  2×2 switches (for n input  and m output networ

What is shielded twisted pair, Q. What is Shielded Twisted Pair? - A me...

Q. What is Shielded Twisted Pair? - A metal foil or braided-mesh covering encases every pair of insulated conductors to prevent electromagnetic noise called crosstalk - Cros

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd