ABSTRACT

Web’s application layer protocol ◾ Understand the differences involved between the persistent and non-persistent HTTP modes ◾ Learn the two types of HTTP messages: HTTP Request and HTTP Response ◾ Obtain an understanding of Cookies and the role they play in Web sites ◾ Understand the use of a proxy in Web operations ◾ Explore the many features of the File Transfer Protocol ◾ Understand the salient features of electronic mail and the various elements that make

this ubiquitous operation viable

The network applications are quite extensive and range from soup to nuts. In addition, some of the applications are used by the general population on a daily basis, while others are fairly sophisticated and their use is more esoteric. The applications that find wide and extensive use are known as killer applications, or killer apps for short. A listing of some of the popular network applications that are generally employed are listed in Table 1.1.