The world wide web http, Computer Networking

Assignment Help:

The World  Wide Web HTTP

The Hyper text Transfer Protocols( HTTP) is a protocols  used mainly to  access data on the world  wide  web. HTTP functions as a carbonation of FTP( File  Transfer Protocols) and SMTP ( Simple  Mail Transfer Protocols). HTTP is  implemented in two programs a  client program  and a server program. The  client program  and server program executing on different end systems talk to each other by  exchanging. HTTP message HTTP defines the structure of these  message  and how  the client and server exchange  the messages.

HTTP defines  how web  clients (f or  example browser ) request  web  page from web  servers and  how servers transfer web page to client. In  figure 3.3 when a user requests a web  page (f or  e, g, clicks on a hyperlink) the  browse sends HTTP request messages for the objects  ( an  objects  is simply a file such as an HTML file a JPEG image are GIF image java applet an audio clip and so on in the page to the server.

HTTP uses TCP (Transmission control  protocols) is  its  underlying transport protocol.  Because TCP provides a reliable data transfer services to HTTP. HTTP consists  of two  types  of massage format request  and response.

2035_The World  Wide Web HTTP.jpg

                                                                   figure HTTP request response behavior

 

The HTTP client first  initiates a TCP connection with  the server. Once the connection is established the browser and the server process access TCP through their socket interface. On  the client  side the socket interface is the door between  the client process and the TCP connection on  the server side it is the door  between  into its  socket interface and receives HTTP response message from  its socket interface. Similarly  the HTTP server receives request message from its  socket interface and sends response message  into its socket interface. Once  the client sends  a message  into its  socket  interface the  message  is out  of the  clients  hands  and is  in the bands of TCP.

HTTP need not worry  about  lost data  or the details of  how TCP recovers from loss  or reordering of data within  the network. That is the job of TCP and the  protocols in the  lower layers  of the protocols stack. It  is important to note  that the server sends  requested files to client without storing any state information about the client. If  a particular client asks for  the same object twice in a period of a few  seconds the server does not  respond by saying that it just  served the object  t the client instead the server resends the objects as it has completely forgotten what  the server  has sent earlier because on HTTP server mantas no information  about  clients HTTP is said  to be  as tasteless protocols.

 

 

 


Related Discussions:- The world wide web http

Different types of subnet classfull networks are present, How many dissimil...

How many dissimilar types of subnet classful networks are present?

Network access technologies, Question 1 Explain the following with respect...

Question 1 Explain the following with respect to Data Encoding                     Digital Signaling of Digital Data                     Digital Signal Encoding Techniques Questi

Packet, a transperent switch is inserted between two local area networks AB...

a transperent switch is inserted between two local area networks ABC and XYZ.network ABC has workstation 1,2,and 3 and Network XYZ has workstation 4,5, and 6. show the contents of

Set cookies 1178345 - application layer, Set Cookies 1178345 When  Hus...

Set Cookies 1178345 When  Hussan  browser receives  the HTTP response  message it sees the set cookies header. The  browser then appends  a line to the special cookie file  th

Data mining, The following DNA sequences are extracted from promoter region...

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

Describe a basic communication model, NETWORK MANAGEMENT & SECURITY 1. ...

NETWORK MANAGEMENT & SECURITY 1. Describe a basic communication model. 2. State the following terms: a. Configuration Management b. Fault Management c. Security Management

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

Ip message finally reassemble, Concept of how does the IP message finally r...

Concept of how does the IP message finally reassemble?

Explain bus topology, Explain Bus Topology. The physical Bus topology i...

Explain Bus Topology. The physical Bus topology is the easiest and most widely used of the network designs. It having of one continuous length of cable (trunk) and a terminatin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd