- a)
HTTP:
The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
HTTP is an application protocol for distributive, collaborative, and hypermedia
Client:
In
Server:
In computer network, a server is a computer program that provides services to other computer programs. A server usually accepts requests made by the client and provides its services to the client.
b)
HTTP:
The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
c)
HTTP:
The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
Client:
In computer network, a client is a computer hardware or software that accesses a service made available by server. A client usually asks for the service of a server. The client accesses the service by a way of network.
Server:
In computer network, a server is a computer program that provides services to other computer programs. A server usually accepts requests made by the client and provides its services to the client.
d)
HTTP:
The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
Client:
In computer network, a client is a computer hardware or software that accesses a service made available by server. A client usually asks for the service of a server. The client accesses the service by a way of network.
Server:
In computer network, a server is a computer program that provides services to other computer programs. A server usually accepts requests made by the client and provides its services to the client.
Explanation of Solution
Closing of transport connection:
“Yes”, it is possible for either of server or client that one side starts closing a connection while the other side is transmitting data through this connection...
Trending nowThis is a popular solution!
Chapter 2 Solutions
EBK COMPUTER NETWORKING
- Obtain the HTTP/1.1 specification (RFC 2616). Answer the following questions: a. Explain the mechanism used for signaling between the client and server to indicate that a persistent connection is being closed. Can the client, the server, or both signal the close of a connection? b. What encryption services are provided by HTTP? c. Can a client open three or more simultaneous connections with a given server? d. Either a server or a client may close a transport connection between them if either one detects the connection has been idle for some time. Is it possible that one side starts closing a connection while the other side is transmitting data via this connection? Explain.arrow_forwardQuestion 23 A client's browser sends an HTTP request to a website. The website responds with a handshake and sets up a TCP connection. The connection setup takes 2.1 ms, including the RTT. The browser then sends the request for the website's index file. The index file references 8 additional images, which are to be requested/downloaded by the client's browser. Assuming all other conditions are equal, how much longer would non-persistent HTTP take than persistent HTTP? (Give answer in milliseconds, without units, rounded to one decimal place. For an answer of 0.01005 seconds, you would enter "10.1" without the quotes.)arrow_forwardKerberos is a protocol that is based around Needham-Schroeder protocol for many to many authentications. Now answer the following questions. (Use necessary diagrams to justify your answers) i) Explain why the password of the user is not sent over the network and instead session keys are generated and shared in the Kerberos protocol. ii) The information in a TGT (Ticket Granting Ticket) is encrypted so the client cannot access the information in the TGT. However, all information in the ticket is already known to the client. Why is it still necessary to encrypt it? iii) Describe the working mechanism of how a ticket is generated between the client and server by the TGS (Ticket Granting Server) and how it is used for client-server communication.arrow_forward
- Please write the steps to set up a server as DHCP server according to the following conditions: Setting up the Account Server Set the DHCP service onCreate a DHCP pool where:Pool Name: Your Name (Ex: Lionel Messi)Start IP address: Your ID (Ex: 20.22.12.18)arrow_forwardHttps is a protocol used to secure websites from being tampered with by other parties without proper authorization. it bridges the gap between sender and receiver.Using protocols like secure socket layer/TLS, HTTPS encrypts data sent over the internet, making it unreadable to anybody who shouldn't have it.This prevents a "man in the middle" assault on the system.Such assaults intercept messages before they reach their intended recipient.It then transmits the revised information to the user.It guarantees the server's authenticity, too.arrow_forwardThe following questions are related to HTTP protocol Q1. The first line of a HTTP request from some client to some server is basically made of where the web page file path is added. The path is shown as folders separated by slash. Q2. If an HTTP server responds to a client request and the response is a success, what is the http code and string that marks a success response? Must provide the code and the string as they appear in TCPDump or Wireshark traces. (note: use upper case for the string and also proper spacing in you answers. Keep the order of the string and the code as seen in TCPDump) Answer: code and string that marks a success response Q3. What http header field is used to identify an address of a web page (i.e. the URI) that linked to the resource currently being requested. This field indicates the last page the user/requester was on by the time they link to the requested page. Answer: The field that indicates the last page the user/requester was on is Q4. What is the http…arrow_forward
- Download delays for 100 objects (HTTP 1.1 with browser caching). Consider an HTTP 1.1 client and server. The RTT delay between the client and server is 2 seconds. Suppose the time a server needs to transmit an object into its outgoing link is 3 seconds, as shown below for the first of these 100 requests. initiate TCP connection RTT request file RTT file received time You can assume that any other HTTP message not containing an object sent by the client and server has a negligible (zero) transmission time. Suppose the client makes 100 requests, one after the other, waiting for a reply to a request before sending the next request. 352 secs Using HTTP 1.1, how much time elapses between the client transmitting the first request, and the receipt of the last requested object, assuming the client uses the IF- MODIFIED-SINCE header line, and 50% of the objects requested have not changed since the client downloaded them (before these 100 downloads are performed)? 350 secs 252 secs time to…arrow_forwardComputer Science Networks and should be done in C language. Create a UDP client and server program that not only is able to locally transfer files but it gives the client the ability to send multiple copies of the file to multiple servers. Once the server program is initiated, it waits until it receives client packets. It then reads and saves the payload of the packets. The client reads a file from the disk and sends it to each server over a UDP socket by breaking the file up into mtu-byte sized packets. Client needs to be concurrent in sending the packets to all of the servers using threadsarrow_forwardThe gRPC protocol does not have this: The gRPC protocol does not have this: a) Support for streams of requests or streams of responses. b) Ability to choose UDP or TCP for communication at the transport layer. c) Ability for the client to specify how long it's willing to wait for a response by providing a timeout. d) Use of HTTP/2 as an underlying protocol.arrow_forward
- A person's e-mail address is his or her login name @ the name of a DNS domain with an MX record. Login names can be first names, last names, initials, and all kinds of other names. Suppose that a large company decided too much e-mail was getting lost because people did not know the login name of the recipient. Is there a way for them to fix this problem without changing DNS? If so, give a proposal and explain how it works. If not, explain why it is impossible.arrow_forwardConsider a SunRPC client sending a request to a server. (a) Under what circumstances can the client be sure its request has executed exactly once? (b) Suppose we wished to add at-most-once semantics to SunRPC. What changes would have to be made? Explain why adding one or more fields to the existing headers would not be sufficient.arrow_forwardsign and Application Assume that Bob (bob@foo.com) wants to send e-mail from his client to his girl friend Alice (alice@bar.com). Please give all steps and needed protocols with explanation in your answer. 7 A▾ B I EE I 30 22arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education