The world wide web http, Computer Networking

Assignment Help:

The World  Wide Web HTTP

The Hyper text Transfer Protocols( HTTP) is a protocols  used mainly to  access data on the world  wide  web. HTTP functions as a carbonation of FTP( File  Transfer Protocols) and SMTP ( Simple  Mail Transfer Protocols). HTTP is  implemented in two programs a  client program  and a server program. The  client program  and server program executing on different end systems talk to each other by  exchanging. HTTP message HTTP defines the structure of these  message  and how  the client and server exchange  the messages.

HTTP defines  how web  clients (f or  example browser ) request  web  page from web  servers and  how servers transfer web page to client. In  figure 3.3 when a user requests a web  page (f or  e, g, clicks on a hyperlink) the  browse sends HTTP request messages for the objects  ( an  objects  is simply a file such as an HTML file a JPEG image are GIF image java applet an audio clip and so on in the page to the server.

HTTP uses TCP (Transmission control  protocols) is  its  underlying transport protocol.  Because TCP provides a reliable data transfer services to HTTP. HTTP consists  of two  types  of massage format request  and response.

2035_The World  Wide Web HTTP.jpg

                                                                   figure HTTP request response behavior

 

The HTTP client first  initiates a TCP connection with  the server. Once the connection is established the browser and the server process access TCP through their socket interface. On  the client  side the socket interface is the door between  the client process and the TCP connection on  the server side it is the door  between  into its  socket interface and receives HTTP response message from  its socket interface. Similarly  the HTTP server receives request message from its  socket interface and sends response message  into its socket interface. Once  the client sends  a message  into its  socket  interface the  message  is out  of the  clients  hands  and is  in the bands of TCP.

HTTP need not worry  about  lost data  or the details of  how TCP recovers from loss  or reordering of data within  the network. That is the job of TCP and the  protocols in the  lower layers  of the protocols stack. It  is important to note  that the server sends  requested files to client without storing any state information about the client. If  a particular client asks for  the same object twice in a period of a few  seconds the server does not  respond by saying that it just  served the object  t the client instead the server resends the objects as it has completely forgotten what  the server  has sent earlier because on HTTP server mantas no information  about  clients HTTP is said  to be  as tasteless protocols.

 

 

 


Related Discussions:- The world wide web http

What is a java package, What is a Java package and how is it used? A J...

What is a Java package and how is it used? A Java package is a naming context for classes and interfaces. A package is used to make a separate name space for groups of classes

Illustrate data-link layer in osi layers model, Q. Illustrate Data-Link Lay...

Q. Illustrate Data-Link Layer in osi layers model? Data-Link Layer: This layer takes the data messages or frames from the Network Layer and gives for their actual transmissio

components in the following command ''interface serial0/1/1'', Normal 0 ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Enumerate about the traffic policing, Enumerate about the Traffic policing ...

Enumerate about the Traffic policing Traffic policing happens when a flow of data is regulated so that cells (or frames or packets) that exceed a performance level are discarde

Internet service provider (isp), Internet  Service Provider (ISP) Thi...

Internet  Service Provider (ISP) This  supper fast  network  spanning  the world  from  one major  metropolitan area to another  is provided  by a handful of national internet

Computing shortest path in a graph, While calculating shortest path, first ...

While calculating shortest path, first we assume graph presentation of network at every node then we use Djikstra's algorithm to calculate shortest path from every node to other on

Ppp authentication chap pap secret, As the system administrator, you type "...

As the system administrator, you type "ppp authentication chap pap secret". Name the authentication method is used first in setting up a session? Ans)  the authentication method

What are the unix-based firewalls, What are the Unix-based firewalls T...

What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating

Network topology and design, Question 1: The following is a dump of a T...

Question 1: The following is a dump of a TCP header in hexadecimal format: 00CD0018 00000EF1 00000D5D 502200D1 01BF0010 Please answer the following two parts of questions

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd