Material on HTTP AExplain at most 6 sentences why a persiste
Material on HTTP.
A)Explain (at most 6 sentences) why a persistent connection under HTTP can lead to better efficiency.
B)Briefly describe (at most 5 sentences) how HTTP maintains state.
C)[2 points] Is FTP (by itself) a secure protocol? Explain (at most 2 sentences) why or why not.
Solution
A
ANS)
- By opening and shutting less TCP associations, CPU time is spared
in switches and has (customers, servers, intermediaries, portals,
passages, or stores), and memory utilized for TCP convention control
squares can be spared in hosts.
- HTTP solicitations and reactions can be pipelined on an association.
Pipelining permits a customer to make numerous solicitations without
sitting tight for every reaction, permitting a solitary TCP association with
be utilized a great deal more effectively, with much lower passed time.
- System clog is lessened by decreasing the quantity of bundles
brought about by TCP opens, and by permitting TCP adequate time to
decide the clog condition of the system.
- Dormancy on resulting solicitations is diminished since there is no time
spent in TCP\'s association opening handshake.
- HTTP can advance all the more smoothly, since mistakes can be accounted for
without the punishment of shutting the TCP association. Customers utilizing
future forms of HTTP may hopefully attempt another element,
in any case, if speaking with a more established server, retry with old
semantics after a mistake is accounted for.
B)
Ans
HTTP is a stateless convention. A stateless convention does not require the server to hold data or status about every client for the term of different solicitations.
Be that as it may, some web applications may need to track the client\'s advance from page to page, for instance when a web server is required to redo the substance of a page for a client. Answers for these cases include:
the utilization of HTTP treats.
server side sessions,
concealed factors (when the present page contains a frame), and
URL-reworking utilizing URI-encoded parameters, e.g.,/index.php?session_id=some_unique_session_code.
C
ANS)
security convention
A succession of operations that guarantee insurance of information. Utilized with a correspondences convention, it gives secure conveyance of information between two gatherings. The term by and large alludes to a suite of parts that work couple (see underneath). For instance, the 802.11i standard gives these capacities to remote LANs.
For the Internet, SSL and TLS are generally used to give confirmation and encryption with a specific end goal to send delicate information, for example, charge card numbers to a seller. Taking after are the essential segments of a security convention. See cryptography, data security, HTTPS, SSL, TLS, PCT and IPsec.
Get to Control
Validates client character. Approves access to particular assets in light of authorizations level and approaches. See get to control and confirmation.
Encryption Calculation
The cryptographic figure joined with different strategies for encoding the content. See encryption calculation.
Key Administration
Make, convey and keep up the keys. See key administration.
Message Uprightness
Guarantees that the scrambled message has not been altered. See message honesty.

