e-PG PATHSHALA- Computer Science
Computer Networks
Module 3–Application Layer Protocols - HTTP
Quadrant 4- Learn More/ Web Resources / Supporting Materials
Web Links
Massively Empowered Classroom (A community initiative by Microsoft Research)
Computer Networks (Spring 2015)
https://www.mecr.org/home/coursedetails/6
http://nptel.ac.in/courses/106105081/40
http://gaia.cs.umass.edu/kurose_ross/interactive/
http://booksite.elsevier.com/9780123850591/Glossary_Flashcards/index.html
http://booksite.elsevier.com/9780123850591/lec.php
http://computernetworks5e.org/blogs/students/web-top/chap07/
http://williamstallings.com/DCC/DCC9e-student.html
https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol
Supporting & Reference Materials
Larry L. Peterson & Bruce S. Davie , Computer networks- A systems approach,
Morgan Kaufmann Publishers, 5th edition, 2012.
James F. Kurose & Keith W. Ross, Computer Networking-A Top-Down Approach
Featuring the Internet, Addison-Wesley, 6th edition, 2012.
Andrew S Tanenbaum,&David Wetherall, Computer Networks,5th edition, Pearson,
2011.
William Stallings, Data and Computer Communications, Ninth Edition, Prentice
Hall/Pearson, 2011.
Douglas E. Comer, Internetworking With TCP/IP Vol I: Principles, Protocols, and
Architecture, 6th Ed onwards, Prentice Hall/Pearson, 2013.
Glossary
Starting Term Definition Related Term
char
The node which initiates a request in
C Client Server
a client-server paradigm.
Client-Server The application model where a single
C P2P model
architecture server services requests from many
clients.
A small file maintained on the client Stateless
C Cookie
side to keep track of the user HTTP
Applications that can tolerate delays
in transmission, eg., non-real time
D Delay-tolerant Loss-tolerant
applications such as file transfer, e-
mail
Elastic Applications that can manage with Delay-tolerant
E
bandwidth whatever bandwidth is available Loss-tolerant
Hyper-text transfer protocol used for Cookies
H HTTP
retrieving information from the web Stateless
GET, POST, etc. are methods that
H HTTP methods specify what is expected from the HTTP
server
Applications that can tolerate a Delay-tolerant
L Loss-tolerant certain amount of losses in Delay-
communication, eg. Video transfer sensitive
Non-persistent When HTTP closes the connection Persistent
N
HTTP after each object is received HTTP
Peer-to-peer model in which any
P P2P node can request information from Client-Server
any other node and get serviced
When HTTP uses the same open Non-
Persistent
P connection to request multiple persistent
HTTP
objects from a single server HTTP
Request For Comments – standards
R RFC Protocols
for network protocols
An interface between the application
S Socket TCP, UDP
and the network
Applications or systems that do no
S Stateless HTTP
maintain state (prior) information
Points to Ponder
S.No Points to Ponder
1. Tim Berners Lee and his team at CERN are credited with inventing the HTTP
protocol along with the idea of HTML in 1989. The Worldwideweb has been
around only for about 25 years.
2. HTTPS is a secure HTTP protocol – which uses SSL or TLS, a secure
transport layer, but is otherwise similar to HTTP.
3. Cookies are helpful for servers to track users, but can be major security
threats. So do we use them or not ?
4. Other than firefox, chrome, IE, safari there are more than 100 browser
applications.