A name the url of the document requested by the browser

Assignment Help Computer Networking
Reference no: EM13465495

Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i. e., this is the actual content of an HTTP GET message). The characters <cr>< lf> are carriage return and line- feed characters (that is, the italized character string <cr> in the text below represents the single carriage-return character that was contained at that point in the HTTP header). Answer the following questions, indicating where in the HTTP GET message below you find the answer.

GET / cs453/ index. html HTTP/ 1.1< cr>< lf> Host: gai a. cs. umass. edu< cr>< lf> a.cs.umass.edu<cr><lf> User- Agent: Mozilla/ 5.0 ( Windows; U; Windows NT 5.1; en- US; rv: 1.7.2) Gec ko/ 20040804 Netscape/ 7.2 ( ax) < cr>< lf> Accept: ex t/ xml, application/ xml, application/ xhtml+ xml, text / html; q= 0.9, text/ plain; q= 0.8, image/ png,*/*; text/plain;q=0.8,image/png,*/*; q= 0.5 < cr>< lf> Accept- Language: en- us, en; q= 0.5< cr>< en-us,en;q=0.5<cr>< lf> Accept- Encoding: zip, deflate< cr>< lf> Accept- Charset: zip,deflate<cr><lf>Accept-Charset: ISO - 8859- 1, utf- 8; q= -8859-1,utf-8;q= 0.7,*; q= 0.7< cr>< lf> -8859-1,utf-8;q=0.7,*;q=0.7<cr><lf> Keep- Alive: 300< cr> < lf> Connection: keep- alive< cr>< <lf>Connection:keep-alive<cr>< lf>< cr>< lf>

a. What is the URL of the document requested by the browser?

b. What version of HTTP is the browser running?

c. Does the browser request a non-persistent or a persistent connection?

d. What is the IP address of the host on which the browser is running?

e. What type of browser initiates this message? Why is the browser type needed in an HTTP request message?

Reference no: EM13465495

Questions Cloud

Consider an http client that wishes to retrieve a web : consider an http client that wants to retrieve a web document at a given url. the ip address of the http server is
Why do heuristics and biases play a major role in the : 1.why do heuristics and biases play a major role in the successfailure of an it project? what specific kinds are the
Mention three examples of actual hate crimes which youve : mention three examples of actual hate crimes which youve learned about from newscasts newspapers magazines the internet
What are the primary differences in the learning process : what are the primary differences in the learning process between learning to read english learning to write
A name the url of the document requested by the browser : consider the following string of ascii characters that were captured by wireshark when the browser sent an http get
Mention one example of actual case of robbery or burglary : list one example of an actual case of robbery or burglary and one example of an actual case of battery or assault that
Mother insists that they go back upstairs immediately so : a young child awakes one morning and decides to pick out her own clothing. she is excited at the prospect of doing this
Assume that within your web browser you click on a link to : suppose within your web browser you click on a link to obtain a web page. the ip address for the associated url is not
Wat are the differences between the human-centered and : what are the differences between the human-centered and user-centered approaches?nbsp do you agree that the

Reviews

Write a Review

Computer Networking Questions & Answers

  Write steps for computer in company browse site using url

Personel.mycompany.com in URL address box to browse this Web site. Write down steps do you take so that each computer in company can browse the site using URL?

  The fiber distributed data interface fddi backbone is the

based of your understanding of remote monitoring rmonin a microsoft word document configure a rmon and create a 3- to

  The cto informed you that the board of executives showed

the cto informed you that the board of executives showed great interest in building a new network based on the work you

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

  List possible ways to interconnect three computers

List as many ways as possible to interconnect the three computers so that they could operate on one local area network.

  The irreducible polynomial is the one used

Compute in  GF (28): ( x 4+ x +1) / ( x 7+ x 6+ x 3+ x 2) , where the irreducible polynomial is the one used by AES, P ( x )= x 8+ x 4+ x 3+ x +1.

  Explain why a pc is consider to be a fat client

Briefly discuss two benefits that the client/server architecture offers to the user.

  Review the latest version of netware

Review the latest version of NetWare and summarize three features that make it easy to manage.

  Question 1awhat is your knowing for the term cyber weapon

question 1awhat is your knowing for the term cyber weapon? give an example of a cyber weapon.bhow was sony play station

  What is the type of block of the abbreviated ipv6 address

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation.

  Explain system gives protection using bell-lapadula policy

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if: The virus were placed on the system at system low (the compartment that all other compartments dominate)?

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd