The world wide web http, Computer Networking

Assignment Help:

The World  Wide Web HTTP

The Hyper text Transfer Protocols( HTTP) is a protocols  used mainly to  access data on the world  wide  web. HTTP functions as a carbonation of FTP( File  Transfer Protocols) and SMTP ( Simple  Mail Transfer Protocols). HTTP is  implemented in two programs a  client program  and a server program. The  client program  and server program executing on different end systems talk to each other by  exchanging. HTTP message HTTP defines the structure of these  message  and how  the client and server exchange  the messages.

HTTP defines  how web  clients (f or  example browser ) request  web  page from web  servers and  how servers transfer web page to client. In  figure 3.3 when a user requests a web  page (f or  e, g, clicks on a hyperlink) the  browse sends HTTP request messages for the objects  ( an  objects  is simply a file such as an HTML file a JPEG image are GIF image java applet an audio clip and so on in the page to the server.

HTTP uses TCP (Transmission control  protocols) is  its  underlying transport protocol.  Because TCP provides a reliable data transfer services to HTTP. HTTP consists  of two  types  of massage format request  and response.

2035_The World  Wide Web HTTP.jpg

                                                                   figure HTTP request response behavior

 

The HTTP client first  initiates a TCP connection with  the server. Once the connection is established the browser and the server process access TCP through their socket interface. On  the client  side the socket interface is the door between  the client process and the TCP connection on  the server side it is the door  between  into its  socket interface and receives HTTP response message from  its socket interface. Similarly  the HTTP server receives request message from its  socket interface and sends response message  into its socket interface. Once  the client sends  a message  into its  socket  interface the  message  is out  of the  clients  hands  and is  in the bands of TCP.

HTTP need not worry  about  lost data  or the details of  how TCP recovers from loss  or reordering of data within  the network. That is the job of TCP and the  protocols in the  lower layers  of the protocols stack. It  is important to note  that the server sends  requested files to client without storing any state information about the client. If  a particular client asks for  the same object twice in a period of a few  seconds the server does not  respond by saying that it just  served the object  t the client instead the server resends the objects as it has completely forgotten what  the server  has sent earlier because on HTTP server mantas no information  about  clients HTTP is said  to be  as tasteless protocols.

 

 

 


Related Discussions:- The world wide web http

Initialization - network layer and routing , Initialization  Imagine t...

Initialization  Imagine that  all routers in our  sample internetwork  comes up  at the  same time. Each router sends a greeting packet to its  neighbours to find  out the  sta

5 igrp supports a feature , 5 IGRP supports a feature that permits traffic ...

5 IGRP supports a feature that permits traffic to be distributed among up to 6 (4 default) paths to give greater allover throughput and reliability. What is this called? Ans) An

Application of internet control message protocol, The application for this ...

The application for this assignment is somewhat arti?cial. Normally, an application would not interact directly with IP. Instead, it would create a UDP or TCP socket and interact w

Message oriented middleware , What is Message Oriented Middleware (MOM)? ...

What is Message Oriented Middleware (MOM)? Ans) MOM permits general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate ove

Describe the concept of successor and feasible successor, Describe the conc...

Describe the concept of successor and feasible successor?

Subnetting ip addresses, Explain everything you can tell from the following...

Explain everything you can tell from the following: a. 00-01-00-01-13-FD-F4-C0-00-1E-33-92-CE-99 b. fe80::2c1e:18af:749b:91c5%12 c. 2002:8b64:6e3a::8b64:6e3a d. ::0

What is authentication, Q. What is Authentication ? - Verification of s...

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Company access - computer network, Company Access Company  access is t...

Company Access Company  access is that in which  end systems are connected in connecting end  systems in a organization or educational  institution into the network. On  co

Define encoder, Define Encoder? A device or program that uses predefine...

Define Encoder? A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to change

Metrics for performance evaluation, Metrics For Performance Evaluation ...

Metrics For Performance Evaluation In this section, we would highlight different kinds of metrics involved for analyzing the performance of parallel algorithms for parallel co

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd