Differentiate between http and ftp, Computer Engineering

Assignment Help:

Differentiate between http and ftp.

HTTP and FTP were developed to make Internet transmission better.

FTP is utilized to exchange files among computer accounts, to transfer files among an account and a desktop computer (upload) or to access software archives upon the Internet. This also commonly used to download programs and another files to your computer from other servers. This transfer files in two different formats Binary format for binary files and ASCII for text files.

This permits a user to perform fundamental file and directory management operations as deleting, renaming or copying. In addition, there is something termed as Anonymous FTP used heavily today by some universities and also private organizations. Anonymous FTP is a facility offered through many machines on the Internet. It permits you to log in along with the user name 'anonymous' or the user name 'ftp'. While prompted for a password, type your e-mail address -- this is not necessary, although, this is a courtesy for those sites that like to identify who is making use of their facility. Be courteous. Several sites need a valid e-mail address, others don't.

HTTP is used mainly in today's society like a set of rules for exchanging files (graphic images, text, sound, other multimedia files or video) on the World Wide Web. This also gives access to other protocols like FTP, NNTP, SMTP, WAIS, Telnet, TN3270 and Gopher. Necessary concepts which are part of HTTP contain (as its name means) the idea which files can contain references to other files whose choose will elicit additional transfer requests. Any web server machine has, in addition to the HTML and another file this can serve, an HTTP daemon, a program which is designed to wait for HTTP requests and handle them while they arrive. Your Web browser is an HTTP client, sending requests to server machines. While the browser user enters file requests through either "opening" a Web file clicking upon a hypertext link or typing in a Uniform Resource Locator, the browser builds an HTTP request and sends this to the Internet Protocol Address indicated through the URL. The HTTP daemon in the destination server machine gets the request and after any essential processing, the requested file is returned.


Related Discussions:- Differentiate between http and ftp

Explain about the term middleware, Explain about the term Middleware. M...

Explain about the term Middleware. Middleware is the term frequently used to explain the application or business logic present within an application server. Unfortunately, simi

What are the types of pipeline hazards, What are the types of pipeline haza...

What are the types of pipeline hazards? The various pipeline hazards are:  1. Data hazard  2. Structural Hazard  3. Control Hazard.

Describe the forms tag, Now let's get a grip on how to add interactivity to...

Now let's get a grip on how to add interactivity to your web documents by way of the tag. With this tag you can add to your web pages a guestbook, surveys, order forms, ge

Explain keyboard input and video output, Q. Explain Keyboard Input and Vide...

Q. Explain Keyboard Input and Video output ? A Keystroke read from keyboard is termed as a console input and a character displayed on the video screen is known as a console out

Determine the objectives of object oriented analysis, Objectives of object ...

Objectives of object oriented analysis After going through this unit, you should be able to: define the concepts of the objects in the system; express desired syste

Handshake control of data transfer - computer architecture, Handshake contr...

Handshake control of data transfer during an input operation:   . Handshake control of data transfer during an output operation o   Interface to CPU and Memory o

First order predicate logic-artificial intelligence, First Order Predicate ...

First Order Predicate Logic This is a more expressive logic because it builds on propositional logic by allowing us to use constants, predicates, variables, quantifiers and fun

Coso framework, The COSO Framework consists of six broad classes of control...

The COSO Framework consists of six broad classes of control activities. Initial responses should identify and define one of the broad classes (Ex: segregation of duties or indepe

Does c have circular shift operators, No C don't have circular shift operat...

No C don't have circular shift operator. (Part of the reason why that is the sizes of C's types aren't precisely described----but a circular shift makes most sense when applied to

Define compilers and interpreters with high level language, Define compiler...

Define compilers and interpreters with high level language? Both compilers and interpreters are available for most high-level languages. Though LISP and BASIC are in particular

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd