![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem P1P
- a)
Program Plan Intro
Given Statement:
“Suppose a web page consists of images and texts. A client will send one request message and receive four response messages, if the user requests that webpage.”
- b)
Program Plan Intro
Given Statement:
“Over the same persistent connection, two distinct WebPages such as “www.mit.edu/research.html” and “www.mit.edu/students.html” can be sent.”
- c)
Program Plan Intro
Given Statement:
“With no persistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages.”
- d)
Program Plan Intro
Given Statement:
“When the object in the response was last modified can be indicated in the HTTP response message by the Date: header.”
- e)
Program Plan Intro
Given Statement:
“An empty message body can never be present in a HTTP message body”.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Q: Imagine a Web server that maintains a table in which client IP addresses
are mapped to the most recently accessed Web pages. When a client connects
to the server, the server looks up the client in its table, and if found, returns the
registered page. Is this server stateful or stateless?
In the HTTP protocol, what is the primary different between a GET request and a PUT request?
GET requests send out TCP packets whereas PUT requests send out UDP packets.
O GET requests are for HTML (and CSS/JavaScript) source files only while PUT requests are for other objects such as images,
audio, and video.
O GET requests place parameters into the URL while PUT requests place parameters in the HTTP request body.
O GET requests are for downloading data and PUT requests are for uploading data.
In this assignment, you will develop a simple Web server in Python that is capable of processing only one request. Specifically, your Web server will (i) Create a connection socket when contacted by a client (browser) (ii) Receive the HTTP request from this connection(iii) Parse the request to determine the specific file being requested(iv) Get the requested file from the server’s file system(v) Create an HTTP response message consisting of the requested file preceded by header lines(vi) Send the response over the TCP connection to the requesting browser. If a browser requests a file that is not present in your server, your server should return a “404 Not Found” error message. Your job is to code the steps above, run your server, and then test your server by sending requests from browsers running on different hosts. If you run your server on a host that already has a Web server running on it, then you should use a different port than port 80 for your Web server. Make sure to test your…
Chapter 2 Solutions
EBK COMPUTER NETWORKING
Ch. 2 - List five nonproprietary Internet applications and...Ch. 2 - Prob. R2RQCh. 2 - Prob. R3RQCh. 2 - Prob. R4RQCh. 2 - Prob. R5RQCh. 2 - Prob. R6RQCh. 2 - Prob. R7RQCh. 2 - Prob. R8RQCh. 2 - Prob. R9RQCh. 2 - Prob. R10RQ
Ch. 2 - Why do HTTP, SMTP, and POP3 run on top of TCP...Ch. 2 - Prob. R12RQCh. 2 - Prob. R13RQCh. 2 - Prob. R14RQCh. 2 - Prob. R15RQCh. 2 - Prob. R16RQCh. 2 - Prob. R17RQCh. 2 - From a users perspective, what is the difference...Ch. 2 - Prob. R19RQCh. 2 - Prob. R20RQCh. 2 - Prob. R21RQCh. 2 - Prob. R22RQCh. 2 - Prob. R23RQCh. 2 - Prob. R24RQCh. 2 - Prob. R25RQCh. 2 - In Section 2.7, the UDP server described needed...Ch. 2 - Prob. R27RQCh. 2 - Prob. P1PCh. 2 - Prob. P2PCh. 2 - Prob. P3PCh. 2 - Prob. P4PCh. 2 - Prob. P5PCh. 2 - Prob. P6PCh. 2 - Prob. P7PCh. 2 - Prob. P8PCh. 2 - Prob. P9PCh. 2 - Prob. P10PCh. 2 - Prob. P11PCh. 2 - Prob. P13PCh. 2 - Prob. P14PCh. 2 - Prob. P15PCh. 2 - Prob. P16PCh. 2 - Prob. P17PCh. 2 - Suppose you can access the caches in the local DNS...Ch. 2 - Prob. P21PCh. 2 - Prob. P22PCh. 2 - Prob. P23PCh. 2 - Prob. P25PCh. 2 - Prob. P26PCh. 2 - Prob. P27PCh. 2 - Prob. P28PCh. 2 - Prob. P29PCh. 2 - Prob. P30PCh. 2 - Prob. P31PCh. 2 - Prob. P32P
Knowledge Booster
Similar questions
- Consider a web page, which contains 6 objects. How many RTTS does it take to download all objects in this web page: (a) Using non-persistent HTTP (b) Using persistent HTTP without pipelining (c) Using persistent HTTP with pipelining.arrow_forward2- Client is connecting a server via TCP to get an object from HTTP Server. Skitch the TCPwindow connection including (establishing connection, the request from client, the response byserver, sending data from server side and closing the connection).Knowing that:1- Get request from the HTTP 1.1 server is 259 bytes.2- Response from the server is 223 bytes.3- Data size requested is 900 bytes.arrow_forwardQuestion 23 A client's browser sends an HTTP request to a website. The website responds with a handshake and sets up a TCP connection. The connection setup takes 2.1 ms, including the RTT. The browser then sends the request for the website's index file. The index file references 8 additional images, which are to be requested/downloaded by the client's browser. Assuming all other conditions are equal, how much longer would non-persistent HTTP take than persistent HTTP? (Give answer in milliseconds, without units, rounded to one decimal place. For an answer of 0.01005 seconds, you would enter "10.1" without the quotes.)arrow_forward
- Match the statements in the left column with the appropriate architecture in the right column. There is a server that is always on. Processes may request service from other processes or provide service to other processes. There is always a client process and a server process in any communication. HTTP uses this architecture. Hosts are controlled by users and could be up or down unpredictably. Self-scalable. A. Peer-to-peer. B. Neither client-server nor peer-to-peer. C. Client-server or peer-to-peer. D. Client-server. E. TCP/IP architecture.arrow_forwardOAuth is an authorization protocol which is also used as an authentication method for the OpenlD Connect (OIDC) protocol. OIDC implements OAuth by performing the following: The user first tries to access the service of a service provider through a browser/app. 1. The service provider will send a request to the OIDC server 2. If the user is already logged in, the OIDC server will send a JWT token to the service provider. If the user is not logged in, then the user will first have to authenticate 3. and then the JWT token is sent 4. After receiving the JWT token, the service provider will use the OIDC's JWKS URI to fetch the certificates used by the authentication server and validate the JWT token 5. If the token is valid the service provider will use the OIDC's user endpoint to fetch the data of the user using the JWT token. If the token is not valid, then the service provider will show an error message. If we create an activity diagram for the above scenario, how many fork nodes will…arrow_forward- Consider another carelessly written Web application, which uses a servlet that checks if there was an active session, but does not check if the user is authorized to access that page, instead depending on the fact that a link to the page is shown only to authorized users. What is the risk with this scheme? (There was a real instance where applicants to a college admissions site could, after logging into the Web site, exploit this loophole and view information they were not authorized to see; the unauthorized access was however detected, and those who accessed the information were punished by being denied admission.)arrow_forward
- HTTP/2 versus HTTP/1.1: object download delays. Consider a client and a server, separated by an RTT of 4 time units. The client makes a request for 4 objects at t=0. O1 consists of 10 frames, 02 and 04 each consist of 1 frame, and 03 consists of 2 frames. In the HTTP/2 example shown below, the server is transmitting frames to the client in the order 01, 02, 03, 04 (as long as there are frames of type i to transmit, and when not the server just moves on to a frame from object i+1 mod 4). Each frame takes 1 time unit to transmit. server GET O4 GET 03 GET O2 GET 01 object data requested client O4 O2 Оз Under HTTP 1.1 (not shown below), the server would send 01, 02, 03, O4 in that first-come-first-served (FCFS) order, sending each object in its entirety before moving on to send the next object in that order. Let's define the object download delay as the time from when an object is requested (at t=0 below) to the time that object is received in its entirety. What is the average object…arrow_forwardThe WebSocket protocol provides a way to exchange data between browser and server via persistent connection. Once the socket is created, there are events following that. Analyze all the FOUR (4) events and provide a code snippet of every event.arrow_forwardSuppose a user has two browser applications active at the same time and suppose that the applications are accessing the same server to retrieve HTTP documents at the same time. How does the server tell the difference between two applications?arrow_forward
- Suppose an HTTP client makes a first GET request to the gaia.cs.umass.edu web server for a base page that it has never before requested, which contains an embedded object, which causes the client to make a second GET request. A very short time later, the client then makes a third GET request - for the same base page, with that third GET request having an If-Modified-Since field (as does the 4th GET request that the client makes for the embedded object). Neither the base object nor the jpeg object has changed. How many round trip times (RTTs) are needed from when the client first makes the third GET request (i.e., when it requests the base object for the second time) to when the base page and the jpeg file are displayed a second time, assuming that: any time needed by the server to transmit the base file, or the jpeg file into the server's link is (each) equal to 1/2 RTT the time needed to transmit an HTTP GET into the client's link is zero? the time needed by the server to transmit…arrow_forwardWrite a simple multithreaded web server in C#. Regardless of the page requested, the server should respond with an HTML page displaying just the words "PTUK Final Exam C#-Socket- Programming"arrow_forwardHTTP 1.1 GET with an embedded object. Suppose an HTTP client makes a request to the gaia.cs.umass.edu web server. The client has never before requested a given base object, nor has it communicated recently with the gaia.cs.umass.edu server. You can assume, however, that the client host knows the IP address of gaia.cs.umass.edu. Suppose also that after downloading the base file, the browser encounters a jpeg object in the base html file that is stored on gaia.cs.umass.edu, and therefore makes another GET request to gaia.cs.umass.edu for that referenced jpeg object. How many round trip times (RTTs) are needed from when the client first makes the request to when the base page and the jpeg file are completely downloaded, assuming the time needed by the server to transmit the base file, or the jpeg file into the server's link is (each) equal to 1/2 RTT and that the time needed to transmit the HTTP GET into the client's link is zero? You should assume that persistent HTTP 1.1 is being used.…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education