Differentiate between http and ftp, Computer Engineering

Assignment Help:

Differentiate between http and ftp.

HTTP and FTP were developed to make Internet transmission better.

FTP is utilized to exchange files among computer accounts, to transfer files among an account and a desktop computer (upload) or to access software archives upon the Internet. This also commonly used to download programs and another files to your computer from other servers. This transfer files in two different formats Binary format for binary files and ASCII for text files.

This permits a user to perform fundamental file and directory management operations as deleting, renaming or copying. In addition, there is something termed as Anonymous FTP used heavily today by some universities and also private organizations. Anonymous FTP is a facility offered through many machines on the Internet. It permits you to log in along with the user name 'anonymous' or the user name 'ftp'. While prompted for a password, type your e-mail address -- this is not necessary, although, this is a courtesy for those sites that like to identify who is making use of their facility. Be courteous. Several sites need a valid e-mail address, others don't.

HTTP is used mainly in today's society like a set of rules for exchanging files (graphic images, text, sound, other multimedia files or video) on the World Wide Web. This also gives access to other protocols like FTP, NNTP, SMTP, WAIS, Telnet, TN3270 and Gopher. Necessary concepts which are part of HTTP contain (as its name means) the idea which files can contain references to other files whose choose will elicit additional transfer requests. Any web server machine has, in addition to the HTML and another file this can serve, an HTTP daemon, a program which is designed to wait for HTTP requests and handle them while they arrive. Your Web browser is an HTTP client, sending requests to server machines. While the browser user enters file requests through either "opening" a Web file clicking upon a hypertext link or typing in a Uniform Resource Locator, the browser builds an HTTP request and sends this to the Internet Protocol Address indicated through the URL. The HTTP daemon in the destination server machine gets the request and after any essential processing, the requested file is returned.


Related Discussions:- Differentiate between http and ftp

Find the conversion time & conversion rate of A/D converter, Find the conve...

Find the conversion time of a Successive Approximation A/D converter which uses a 2 MHz clock and a 5-bit binary ladder containing 8V reference. What is the Conversion Rate? An

What is a co-processor, What is a co-processor? What is its use in a typica...

What is a co-processor? What is its use in a typical microprocessor based system. 8087 NDP (numerical data processor) is also called math co-processor which is used in parallel

How the conversation speed of A/D converter is maximum, The conversation sp...

The conversation speed of an analog to digital converter is maximum with which technique? Ans. With parallel comparator AD converter technique the conversation speed of an ana

What is the significance of the screen number ''0'', What is the significan...

What is the significance of the screen number '0'? In "calling mode", the special screen number 0 (LEAVE TO SCREEN 0) causes the system to jump back to the last call level.  Th

Show SNMPs representation in ASN.1 syntax, An SNMP integer whose value is 2...

An SNMP integer whose value is 200 has to be transmitted. Show its representation in ASN.1 syntax. An ASN.1 transfer syntax describes how values of ASN.1 types are unambiguousl

Comparison between risc and cisc - computer architecture, Comparison betwee...

Comparison between risc and cisc - computer architecture: CISC  Emphasis on hardware  Includes multi-clock complex instructions  Memory-to-memory

Retina - biometric computer security systems, Retina - Biometric Computer S...

Retina - Biometric Computer Security Systems The next security technology that explained in this report is retina security technology which is very famous in a lot of spy movi

Explain the differences between macros and subroutines, Explain the differe...

Explain the differences between macros and subroutines. Macros Vs Subroutines (i) Macros are pre-processor directives which are processed before the source program is pass

Block format and disk layout on cd-rom, Q. Block Format and Disk Layout on ...

Q. Block Format and Disk Layout on CD-ROM? A typical block format is displayed in Figure (a). It comprises the subsequent fields: Sync: Sync field identifies beginning o

Testmanagers wizard, TestManager has a wizard that you can use to copy or i...

TestManager has a wizard that you can use to copy or import test scripts and other test assets (Datapools) from one to another.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd