2019
DOI: 10.29322/ijsrp.9.01.2019.p8512
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Simulation of Hyper Text Transfer Protocol at the Application Layer of the Internet

Abstract: The Internet and computer networks make extensive use of protocols. This paper is mainly focused on HTTP which is one of the most important piece of application layer protocol. Application layer is the topmost layer in OSI and TCP/IP model. The general format of HTTP request and response messages in real world are analyzed and captured by Wireshark. The actions taken by the Web client and server as these messages are sent and received are simulated and monitored using Packet Tracer.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The HTTP protocol uses port 80 and the HTTPS protocol uses port 443. Web attacks typically use these two ports to circumvent Web policies [32]. All a web hacker needs are a web browser and an internet connection.…”
Section: Web Attacksmentioning
confidence: 99%
“…The HTTP protocol uses port 80 and the HTTPS protocol uses port 443. Web attacks typically use these two ports to circumvent Web policies [32]. All a web hacker needs are a web browser and an internet connection.…”
Section: Web Attacksmentioning
confidence: 99%
“…He highlights the message traveling from sender to receiver or client to server. He discusses the packet tracer's monitoring and simulating mechanism [41]. A wide variety of applications, including smart cities, traffic congestion, waste management, systemic health, defense, emergency services, logistics, retail, industrial control, and healthcare, are enabled by the Internet of Things (IoT) [42].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…(1) Hyper-Text Transfer Protocol (HTTP) maintains the communication between the browser and server [41]. For this communication, it uses a request which sends from the browser (client) to the server (web), and in return for this request, web contents are sent from server to browser (client), as shown in Figure 3 (2) Hyper-Text Transfer Protocol Secure (HTTPS): when the "S" letter is attached to the HTTP, it indicates the communication (above mention) is secure [22,55].…”
Section: 3mentioning
confidence: 99%