What version of http is the browser running

Assignment Help Computer Networking
Reference no: EM13811896

1. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. What transport and application- layer protocols besides HTTP are needed in this scenario?

2. Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i. e., this is the actual content of an HTTP GET message). The characters <cr>< lf> are carriage return and line- feed characters (that is, the italized character string <cr> in the text below represents the single carriage-return character that was contained at that point in the HTTP header). Answer the following questions, indicating where in the HTTP GET message below you find the answer.
GET / cs453/ index. html HTTP/ 1.1< cr>< lf> Host: gai a. cs. umass. edu< cr>< lf> a.cs.umass.edu<cr><lf> User- Agent: Mozilla/ 5.0 ( Windows; U; Windows NT 5.1; en- US; rv: 1.7.2) Gec ko/ 20040804 Netscape/ 7.2 ( ax) < cr>< lf> Accept: ex t/ xml, application/ xml, application/ xhtml+ xml, text / html; q= 0.9, text/ plain; q= 0.8, image/ png,*/*; text/plain;q=0.8,image/png,*/*; q= 0.5 < cr>< lf> Accept- Language: en- us, en; q= 0.5< cr>< en-us,en;q=0.5<cr>< lf> Accept- Encoding: zip, deflate< cr>< lf> Accept- Charset: zip,deflate<cr><lf>Accept-Charset: ISO - 8859- 1, utf- 8; q= -8859-1,utf-8;q= 0.7,*; q= 0.7< cr>< lf> -8859-1,utf-8;q=0.7,*;q=0.7<cr><lf> Keep- Alive: 300< cr> < lf> Connection: keep- alive< cr>< <lf>Connection:keep-alive<cr>< lf>< cr>< lf>

a. What is the URL of the document requested by the browser?
b. What version of HTTP is the browser running?
c. Does the browser request a non-persistent or a persistent connection?
d. What is the IP address of the host on which the browser is running?
e. What type of browser initiates this message? Why is the browser type needed in an HTTP request message?

3. Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT_1, ... ... RTT_n . Further suppose that the Web page associated with the link contains exactly one object, consisting of a small amount of HTML text. Let RTT_0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object?

4. How does SMTP mark the end of a message body? How about HTTP? Can HTTP use the same method as SMTP to mark the end of a message body? Explain.

5. Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the users in your department? Explain.

6. Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of u s = 30 Mbps, and each peer has a download rate of d i = 2 Mbps and an upload rate of u. For N = 10, 100, and 1,000 and u = 300 Kbps, 700 Kbps, and 2 Mbps, prepare a chart giving the minimum distribution time for each of the combinations of N and u for both client- server distribution and P2P distribution.

7. Suppose Bob joins a BitTorrent torrent, but he does not want to upload any data to any other peers (so called free-riding).

a. Bob claims that he can receive a complete copy of the file that is shared by the swarm. Is Bob's claim possible? Why or why not?

b. Bob further claims that he can further make his "free-riding" more efficient by using a collection of multiple computers (with distinct IP addresses) in the computer lab in his department. How can he do that?

8. In the circular DHT example in Section 2.6.2, suppose that peer 3 learns that peer 5 has left. How does peer 3 update its successor state information? Which peer is now its first successor? Its second successor?

Reference no: EM13811896

Questions Cloud

Invent a new style for a video game : Design a new textbook for a psychology class, science class, etc. Invent a new telephone. Design a new suitcase. Design new clothes for soldier/teacher/cook/student/etc.
Typical manufacturing supervisors challenges : What are typical manufacturing supervisors' challenges, frequently created due to no fault of their own? Under newer, nontraditional manufacturing and operations methods, how can these problems reduce?
Demonstrate relevant knowledge of mrp : Utilizing the Step-by-Step MRP Calculation Process, students will solve the following MRP problem given: Product A is an end item and is made from two units of B and four of C.
Credible academic journals and other reliable sources : Discuss how you would know that your team was in conflict and what would be a technique you would use to resolve it. You may wish to research any conflict resolution models available in many credible academic journals and other reliable sources.
What version of http is the browser running : Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i. e., this is the actual content of an HTTP GET message). What version of HTTP is the browser running? What is the IP addr..
Groups into a self-directed work team : You have just been part of a merger. You have each been chosen to head up your department and merge the two groups into a self-directed work team.
Question regarding the higher levels of performance : Organizational restructuring is common as organizations attempt to achieve higher levels of performance. Provide research via the Internet (from a credible source) and share an example of a restructuring that has taken place within an organization..
Define the agency''s department for the different sections : Interview at least two representatives of the agency's department for the different sections of the paper. If you can obtain more than two different interviews, do so.
Explain the role grants play in the human services field : Explain the role grants play in the human services field

Reviews

Write a Review

Computer Networking Questions & Answers

  What is a telecommunications network protocol

What is telecommunications network architecture? Select a network protocol and provide details on the steps that preceded the formal adoption of the protocol by the industry.

  Propose one 1 strategy to upgrade the companys present

imagine that you are the administrator for a small accounting company which currently employees 200 people. the ceo

  Find the number of messages sent in the course

Assume an asynchronous network with n nodes. Let the nodes' names be in the interval [1; n]. Let these two properties above be general knowledge.

  Prepare design for private line network private line

How to create "rough design" to this network "prepare a rough design for private line network which would bring 256 kbps private line to each of bank's fifty branch offices.

  Soa exposes business services to the wide range of service

service oriented architecture soa is an architectural style for building software applications that use services

  Explain the importance of communication protocols

Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision.

  Find out your stance on issue of drug testing and employee

determine your stance on the issue of drug testing and employee drug usenbspand innbsp3-5 paragraphs write how you feel

  Project 1 bull in your own words what rfc gives

project 1 bull in your own words what rfc gives the protocol and specifications a news server must use to

  Question about tcp networking

A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se

  Compare how state and local governments mirror three

write 500-750 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Write research paper on network cost assessment

Write Research paper on network cost assessment

  Cbc-pad is block chiper mode of operation in rc block cipher

CBC-pad is a block chiper mode of operation used in RC5 block cipher, but it could be used in any block cipher. That is, if the original plaintext is an integer multiple of the block size, why not refrain from padding?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd