What is key difference that you observe in the interaction

Assignment Help Computer Networking
Reference no: EM132239143

IT INFRASTRUCTURE ASSIGNMENT -

Assignment Name: Hypertext Transfer Protocol (HTTP)

Hypertext Transfer protocol is known as the mechanism for delivering web pages. The JASPER applet supports the simulation of HTTP. URLs (Universal Resource Locators) are abstract represented as URL1, URL2... URLn, and likewise for DATA which represents web pages.

Below are some experiments you can go through to understand HTTP and its commands. The first two experiments will give a feel to using the simulator and simply relate to real scenarios. Subsequent experiments will be complex, yet still relating to real events.

EXPERIMENT 1: RETRIEVING A WEB PAGE SUCCESSFULLY

This is the simplest example: fetching the data (which is the web page contents) of a particular URL (location). To do this the client will send a GET(url) command to the server, which will respond with a 200 response code along with the contents of the location specified in the GET command.

1. Click the Clear button to start a fresh simulation.

2. In the command panel, click on Client: GET(URL1) - get data for URL. You should be able to see in the simulation view a corresponding flow of this command from the client to the server via the medium. Notice that the available choices in the command panel change as the request is received at the server.

3. Now click the Server: 200 OK(DATA1) - send requested data. Similarly the simulation view reflects the response from server to the client.

The simulation is now complete for URL1. Observe the interaction between the client and server.

Capture a screenshot of your simulation that includes a date/time stamp or unique desktop element, and answer the following question.

Q1: In reality, what does the client represent? Relate the client/server interaction you observed in this experiment to a regular activity that occurs on the Internet.

EXPERIMENT 2: UNSUCCESSFUL RETRIEVAL OF A WEB PAGE

Repeat Experiment 1 again, but this time selecting Server: 400 Error(Code) - report requested data unavailable at the last step.

The simulation is now complete for URL1. Observe the interaction between the client and server.

Capture a screenshot of your simulation that includes a date/time stamp or unique desktop element, and answer the following question.

Q2: Identify a real scenario when this client and server interaction would occur.

EXPERIMENT 3: REDIRECTION OF REQUESTED DATA

Repeat Step 1 and 2 of Experiment One, and then do the following

1. In command panel, select Server: 301 MOVED(URL2) - report moved URL.

2. Select Client: GET(URL2) - get data for new URL.

3. Select Server: 200 OK(DATA2) - send requested data.

Capture a screenshot of your simulation that includes a date/time stamp or unique desktop element, and answer the following question.

Q3: Observe the simulation and compare with the results in Experiment One. What is the difference in the flow, and what does it mean?

EXPERIMENT 4: POST INFORMATION TO WEB PAGES

It should be obvious that there are many types of interactions that a client might have with a web server. One such interaction is when a client appends data to the URL to be received by the server.

Start a new simulation similar to Experiment #1, but this time choose Client: POST(URL1, DATA1) for step 2.

Capture a screenshot of your simulation that includes a date/time stamp or unique desktop element, and answer the following question.

Q4: What is the key difference that you observe in the interaction?

Q5: Relate the client/server interaction you observed in this experiment to a regular activity that occurs on the Internet.

Attachment:- Assignment File.rar

Reference no: EM132239143

Questions Cloud

Distinction between cause marketing and social marketing : What is the distinction between cause marketing and social marketing? Explain the three key legislative acts affecting consumers.
Replace including labour and basic teeth : A set of basic shovel teeth costs $5000 to replace including labour and basic teeth, but not including the cost of lost shovel time.
Describe possible extensions to the research : Describe possible extensions to the research, if any. In what ways can the study be enhanced or modified to provide additional value?
What was the main legal issue and how was it resolved : What was the main legal issue and how was it resolved? How did the case impact forensic evidence admissibility or expert testimony?
What is key difference that you observe in the interaction : BMIS 520 IT INFRASTRUCTURE ASSIGNMENT, Liberty University, USA. What is the key difference that you observe in the interaction
Social and environmental impact of the hospitality sector : Social and Environmental Impact of the hospitality sector and Local People in Eco-tourism, Kerala India." this is my topic. The following five ecotourism spot
How do sign and notices improve convention traffic flow : In what cases would a hotel prefer an outside AV specialist rather than coping with in-house service? How do sign and notices improve convention traffic flow?
Discuss best practices to be used by police : Discuss best practices to be used by police when conducting suspect identifications. Write a 350- to 700-word summary of your discussion.
Corresponding dual using the graphical method : You must show your problem is correct by solving both the primal linear program and its corresponding dual using the graphical method.

Reviews

len2239143

2/21/2019 2:28:56 AM

The first two experiments will give a feel to using the simulator and simply relate to real scenarios. Subsequent experiments will be complex, yet still relating to real events. Submitting your work - In a new Word document, include your screenshots of the simulations for each experiment, along with your answers for each of the five questions. Save the file as Lastname_Firstname_Assignment #. Include your name in the assignment file itself and submit your file to Blackboard. Any assignment with screenshots that do not include a visible date and timestamp or a unique desktop element to identify the student’s work will not be accepted.

Write a Review

Computer Networking Questions & Answers

  What is the network id of the subnet

Troubleshoot Subnetting a Small Network Recall that a subnet or broadcast domain is bound by routers. You can use hosts on a small network to demonstrate.

  Network administrator presentation

As the network administrator, you have been given the task of preparing a presentation for the stakeholders of a new project that will involve the creation of a new e-commerce Web site.

  Critically reflect on current project management ethics

Demonstrate project leadership skills; identify and assess risk in designing, executing a major project - critically reflect on current project management

  Advantages and disadvantages of computer netwoerks

Advantages and disadvantages of computer netwoerks

  Explain the types of virtual private networks

Review and explain each of the following: DMZ-Based, Bypass Deployment, and Internally Connected Deployment implementation.

  Features to facilitate overcoming limits of security

What features do they incorporate to facilitate overcoming limits of security, merchant risk, cost, etc.? How do they validate cardholder identities?

  Describes typical passenger states

Describes typical passenger states and how they change based on specific actions and events - Create a sequence diagram for the use case

  Develop a wbs and network diagram

Create an Earned Value Report and at least one other report from MS Project 2010 reports. Create a one-page Word document summarizing an overview of the project.

  Explain way handshake process use to initiate tcp connection

Explain the three-way handshake process used to initiate TCP connections. Describe the three basic types of network topologies and provide a sample diagram.

  Define per-packet load balancing

What networking equipment is usually found in the core of a campus network?

  Explain the role of a voip gateway

Explain the role of a VoIP gateway-Define the PSTN hierarchy and key components of the network

  Consider a situation where two microcontroller

Consider a situation where two microcontrollers are connected with a CAN network. Computer 1 generates 8-bit data packets that must be sent to Computer 2, and Computer 2 generates 8-bit data packets that must be sent to Computer 1

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd