Describe the HTTP response message format.

1 Answer

Answer :

Status Line 

Status line shows status for the response it indicates response status using a code as well as a status phrase. The status-Line begins with a protocol version, then status code and status phrase.

E.g: HTTP/1.1 200 OK

Headers

Three types of headers are present HTTP Response message which are as follows.


General Header

The general header gives general information about the message and can be present in both a request and a response.

e.g. Date: Mon, 27 Jul 2009 12:28:53 GMT


Response Header

The response header can be present only in a response message. It specifies the server's configuration and special information about the request.

e.g. Server: Apache/2.2.14 (Win32)


Entity Header

The entity header gives information about the body of the document.

e.g. Content-Length: 88

e.g. Content-Type: text/html


Blank Line

An empty line (i.e., a line with nothing preceding the CRLF) indicating the end of the header fields

Body

It contains actual content. This part is optional.

electronics2electrical.com 626 -  .jpg

OR

electronics2electrical.com 627 -  .jpg

Related questions

Description : Describe the RIP message format.

Last Answer : RIP(Routing Information Protocol) message format * RIP is routing protocol based on Distance Vector Routing algorithm which is an intradomain (interior) routing protocol used inside an autonomous ... 32-bit field defines the hop count from the advertising router to the destination network

Description : Explain ICMP protocol. Describe the header format of ICMP.

Last Answer : The Internet Control Message Protocol (ICMP) supports the unreliable and connectionless Internet Protocol (IP). * ICMP messages are encapsulated in IP datagrams. There are two categories of ICMP messages ... query messages, the data section carries extra information based on the type of the query.

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Python: how to get an HTTP response code from a URL -Web-Development

Last Answer : answer:

Description : Explain TCP connection management with the help of TCP connection management finite state machine.

Last Answer : To keep track of all the different events happening during connection establishment, connection termination, and data transfer, TCP is specified as the Finite State Machine -FSM TCP ... , a server transitions through a solid line or a client transitions through a dotted line.

Description : Explain how TCP connections are established using the 3 way handshake. What happens when 2 hosts simultaneously try to establish a connection?

Last Answer : If 2 host Simultaneously try to establish connection: Simultaneous Open: * It's possible for two applications to send a SYN to each other to start a TCP connection, although the possibility is small, ... . * The CLOSING state takes the place of FIN-WAIT-2 or CLOSEWAIT in a common scenario.

Description : Explain about standard and non standard protocols at the application layer.

Last Answer : HTTP The Hypertext Transfer Protocol (HTTP) is a Application layer protocol used mainly to access data on the World Wide Web. HTTP uses the services of TCP on well-known port 80. FTP ... starts with the client when the user needs to download e-mail from the mailbox on the mail server.

Description : Explain the TCP connection establishment using a three way handshake mechanism.

Last Answer : Connection Establishment TCP uses a Three way handshaking mechanism to establish a connection between client and server machines. The three steps in three way handshaking mechanism are as follows.  SYN: ... This is just an ACK segment. It guarantees the completion of three way handshaking.

Description : Construct a diagram to show the application of cookies in a scenario in which the server uses cookies for advertisement.

Last Answer : Use of Cookies for advertisements:  A cookie is also used by advertising agencies. An advertising agency can place banner ads on some main website that is often visited by users. The advertising agency supplies only ... the user is sent and stored in the file, which are used by the server. 

Description : Explain the working of TELNET.

Last Answer : TELNET: TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP protocol for virtual terminal service. TELNET Working: * TELNET is a client-server application that allows a user ... the characters to the appropriate application program.  Fig. Working of TELNET 

Description : Explain different transition method of IPv4 to IPv6.

Last Answer : Three Transition from IPv4 to IPv6 strategies are 1. Dual Stack 2. Tunnelling 3. Header Translation  1. DUAL STACK  In this kind of strategy a station has a dual stack of protocols run IPv4 and ... of the IPv6 packet is converted to an IPv4 header see figure. Fig. Header Translation

Description : Explain difference between distance vector and link state routing. 

Last Answer : Distance Vector Routing Link State Routing Routing tables are updated by exchanging information with the neighbours.  Complete topology is distributed to every router to update a routing table. ... Harder to configure Count to infinity problem No count to infinity problem

Description : Explain working of WWW.

Last Answer : The Web is a repository of information in which the documents, called web pages, are distributed all over the world and related documents are linked together. The WWW today is a distributed client- ... the web server. Each time a request arrives, the corresponding document is sent to the client. 

Description : Compare TCP and UDP

Last Answer : Characteristics TCP UDP Connection TCP is connection oriented Protocol UDP is connection less Protocol  Reliability It provides reliable delivery of messages It provides unreliable delivery of ... FTP, Telnet, SMTP, DNS, HTTP, POP DNS, BOOTP, DHCP, TFTP, RIP

Description : State the concept of fragmentation in IPv4. 

Last Answer : Fragmentation: When the maximum size of datagram is greater than maximum size of data that can be held a frame then the network layer divides the datagram received from x-port layer into ... copied into the fragment header. The three fields Flags, Fragmentation offset and Total length are altered.

Description : State the transmission modes of FTP.

Last Answer : Transmission modes of FTP: 1. Stream mode 2. Block mode 3. Compressed mode

Description : List two advantages of using UDP over TCP.

Last Answer : Advantages of using UDP over TCP : 1) UDP is connection less and unreliable transport layer protocol. i.e. It does not require to maintain a connection. 2) UDP is transaction oriented and ... UDP is faster since it does not require acknowledgment. 4) Useful when time sensitivity is more important

Description : State the use of 6 flags in TCP header.

Last Answer : There are 6, 1-bit control bits that control connection establishment, termination, abortion, flow control etc.. 1) URG: Urgent pointer If this bit field is set the receiving TCP should ... 6) FIN: No more data from sender. If this bit is set then it terminates the connection.

Description : State the need of domain name system.

Last Answer : Need of domain name system: * Since IP addresses are difficult to remember and names are easier to remember Domain Name System is used and DNS servers are used for converting these names into IP addresses. * ... to internet. Use for mapping can map a name to an address or an address to a name. 

Description : State the four advantages of IPv6.

Last Answer : Advantages of IPv6: * Larger address space. * Better header format. * New options for additional functionalities. * Allowance for extension. * Support for more security. * ... Simplified Network configuration * Support for new services * Support for Security * Auto configuration

Description : Differentiate between IPv4 and IPv6.

Last Answer : IPv4 IPv6 1. Source and destination addresses are 32 bits (4 bytes) in length. 1. Source and destination addresses are 128 bits(16 bytes) in length. 2. Uses broadcast ... Uses host address (AAAA) resource records in the domain name system to map host names to IPv6 addresses

Description : When sending a text message, can you type numbers in the body of the message without changing the input format?

Last Answer : on my motorola phone I can just get to the numbers after I go through the letters on a given key (i.e. if I hit the #2 button, I can do A, B, C, then 2).

Description : The supervisor Speed post centre will send his daily report to Manager speed post a) By means of a letter b) By fax message c) By email d) By using format MS 83

Last Answer : d) By using format MS 83

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : Four elements that distinguish mobile marketing from traditional mass marketing are: scope of audience, type and format of messages, ___________, and response tracking.  location-based targeting  wide coverage  mass distribution  interest group setting

Last Answer :  location-based targeting

Description : How much effort do you spend on understanding a message before giving your response?

Last Answer : answer:I would say no. Most of the time when someone is speaking I am not really hearing. Oddly fluther made me aware of this as often my questions are misunderstood. I have started to make a conserted ... as those not spoken. I was taught this in social work, but I have never used. it, sadly.

Description : A husband and wife are seated facing each other with a barrier between them. Each one takes turns communicating with the other, each speaking only two words at a time. After each two-word message is ... or frustrated with the person who shouted the four-word phrase. What is going on here? -Riddles

Last Answer : The husband and wife are playing the old game of BATTLESHIP. The two-word communications consist of a letter and a number for the coordinates of where the ships are hidden, and the one-word responses are ... ' or 'Miss'. The final four word phrase which ends the game is, 'You Sank My Battleship!

Description : What is a good message for sharing your response on a paper review?

Last Answer : What is the answer ?

Description : The _______ is used by a router in response to a received leave report. A) general query message B) special query message C) membershipreport D) noneof the above

Last Answer : special query message

Description : During which stage of the immune response does the circulating lymphocyte containing the antigenic message return to the nearest lymph node? a) Proliferation Once in the node, the sensitized lymphocyte ... cellular response reaches and couples with the antigen on the surface of the foreign invader.

Last Answer : a) Proliferation Once in the node, the sensitized lymphocyte stimulates some of the resident dormant T and B lymphocytes to enlarge, divide, and proliferate.

Description : The response to general call from ATC is for the aircraft to: a. Respond in alphabetic order b. Respond in numerical order c. Give no response d. Request a repeat of the message

Last Answer : c. Give no response

Description : What are the basic elements of communication? (a) Sender and receiver (b) Message and channel of communication (c) Response and feedback (d) All of the above

Last Answer : (d) All of the above

Description : The response to general call from ATC is for the aircraft to: a. Respond in alphabetic order b. Respond in numerical order c. Give no response d. Request a repeat of the message

Last Answer : c. Give no response

Description : Draw the format of TCON register of 8051 and describe the function of each bit of it.

Last Answer : TCON: TIMER/COUNTER CONTROL REGISTER.BIT ADDRESSABLE  TF1 TCON. 7 Timer 1 overflows flag. Set by hardware when the Timer/Counter 1 Overflows. Cleared by hardware as processor ... 0 type control bit. Set/cleared by software to Specify falling edge/low level triggered External Interrupt

Description : How do I make an HTTP request in JavaScript?

Last Answer : There are several ways to make an HTTP request in JavaScript, and the choice of which to use depends on the type of request you need to make and whether you want to use modern standards or not. ... .data)); Which option you choose will depend on your needs and which browsers you need to support.

Description : How many Jellies have tried "http://jelly.co/"?

Last Answer : answer:Jelly a legitimate thing, it’s an app of a Q&A platform. Maybe @orbutsbi is the username that Stu uses for that app and maybe he’s just sharing that info so we’ll recognize him if we go there. (Just speculation, that, I have no idea.)

Description : Is this wholesale website a scam, http://onetoto.tk ?

Last Answer : You understand that .tk is in New Zealand?

Description : What would happen if you received an HTTP status code in real life?

Last Answer : Poorly worded Fluther question. 400 Bad Request: The request cannot be fulfilled due to bad syntax.

Description : Http://www.soundunwound.com/ - anyone use this service?

Last Answer : I'm sorry, I might not be understanding this question correctly, or I'm missing something. imdb.com is the internet movie data base and soundunwound.com focuses on music database. I can't really ... gaga in soundunwound, it gives you the info such as basic biography, alubm releases, and her news.

Description : What do you think about this idea http://rentafriend.com/?

Last Answer : Oh my god, someone must have watched Mr. Show.

Description : Does anybody knows what song is used in this video: http://www.youtube.com/watch?v=OoSdQsb2t4E?

Last Answer : Seriously? You are such an asshole…You just made me watch Gilmore Girls! That should be a new form of Rick Rolling….

Description : What exactly is being attempted here? http://imgur.com/0b6mq.jpg?

Last Answer : This is interesting. Are you sure the gardeners are putting them there? I notice one says “sugar” and another has the word “rice” on it.

Description : Where can i buy this print? - http://www.yourarthere.com/entry/the-truth-seekers-radio/?

Last Answer : I’d contact the artist.

Description : How to fix (HTTP 404 Errors)

Last Answer : answer:404 means the page you're trying to visit isn't there. I don't know this game, but it sounds like the site might have stopped existing Or maybe you're using a wrong address. P.S. Zwinky ... enough to be sure there's no problem with the website. I think you're probably using a wrong address.

Description : What do you think of this computer: http://www.dell.com/us/en/home/notebooks/inspiron-1012/pd.aspx?refid=inspiron-1012&s=dhs&cs=19&~oid=us~en~29~laptop-inspiron-10_anav1~~?

Last Answer : There are a lot of netbooks on the market with similar specs. Read the reviews and buy by price. Try looking at the Asus EEE Netbooks on Amazon or Newegg.com, and reading the customer reviews. Dell is not the paragon that it once was, although things change and it may come back.

Description : What is he saying at 1:28 here: http://tinyurl.com/322tgh3?

Last Answer : Beats me. All I know is it hurt my ears. LOL!

Description : Does using meaningful words as part of the Http link helps to get more Google search results of that link? Why is that?

Last Answer : answer:It goes according to key words, yes. The search engine crawls the web, looking for the key words you input. The stronger the search engine, the deeper the search. Some serch engines use other search ... are the most specific way to get dead-on hits? Do you know how to do a Boolean search?

Description : What takes more computing power, serving HTTP or MySQL?

Last Answer : this is not exactly my field, but i would say http has much more to do that mysql. with http you are loading everything, where mysql is just loading data. i guess it could depend on the site and whats on it, but for the most part http will be doing most the work.

Description : What is happening in this weather map ? http://i49.tinypic.com/w7ly0z.jpg And what will happen in the next 24 hours?

Last Answer : Are you asking for homework help?

Description : What is the difference between http and https when accessing Google Reader?

Last Answer : https is encrypted both ways. Portions of a page can be encrypted and not others, but your browser should (or at least can be set up to) warn you if that’s the case.