How to use http and world wide web, Computer Engineering

Assignment Help:

Q. How to use Http and World Wide Web?

Http and World Wide Web

One of the most frequently used services on the Internet is the World Wide Web (WWW). The application protocol which makes the web work is Hypertext Transfer Protocol or HTTP. Don't confuse this with the Hypertext Markup Language (HTML). HTML is language used to write web pages. HTTP is the protocol which web browsers and web servers use to communicate with each other over Internet. It's an application level protocol since it sits on top of the TCP layer in the protocol stack and is used by specific applications to talk to one another. In this case applications are web browsers and web servers.

HTTP is a connectionless text based protocol. Clients (web browsers) transmits requests to web servers for web elements like web pages and images. After request is serviced by a server, connection between server and client across the Internet is disconnected. A new connection should be made for each request. Most protocols are connection oriented. This means that two computers communicating with each other keep connection open over the Internet. HTTP doesn't however. Before an HTTP request can be made by a client, a new connection should be made to the server.


Related Discussions:- How to use http and world wide web

Difference among java beans & servlets, Java bean is a reusable component, ...

Java bean is a reusable component, where as the servlet is the java program which extends the server capability.

What is dma operations, What is DMA operations? State its advantages. ...

What is DMA operations? State its advantages. In order to transfer bulk amount of data among memory and I/O device without involvement of CPU, the Direct Memory Access metho

Safety argument for good design, So far we have considered the problems of ...

So far we have considered the problems of poor ID in terms of the loss of productivity and efficiency to business. There is another important aspect to consider: the issue of safet

Analysis of amdahls law, Q. Analysis of Amdahls law? The conclusions of...

Q. Analysis of Amdahls law? The conclusions of analysis of Amdahl's law are: 1) To optimize performance of parallel computers modified compilers should be developed that sho

Define b2b - business to business, B2B - Business to Business  It is a...

B2B - Business to Business  It is a mode of conducting business among two or more companies over the Internet, rather than more traditional modes like as telephone, mail, and f

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

What are near and far pointers, These days, they're pretty much obsolete; t...

These days, they're pretty much obsolete; they're definitely system-particular. They had to do with 16-bit programming under MS-DOS and perhaps some early on versions of Windows. I

Define top-down parsing techniques, Define Top-down parsing Techniques ...

Define Top-down parsing Techniques Top-down parsing can be observed as an attempt to find left-most derivations of an input-stream through searching for parse trees using a top

Explain about indexed addressing scheme, In this technique, operand field o...

In this technique, operand field of instruction includes an address and an index register thatcomprises an offset. This addressing scheme is normally used to address the consecutiv

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd