SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
HyperText Transfer
Protocol (HTTP)
GURJOT SINGH REVTI RAMAN SINGH
UG201113013 UG201110026
1
WHAT IS A PROTOCOL AND HTTP?
• Protocol: A Protocol is a standard procedure for
defining and regulating communication. For
example TCP, UDP, HTTP etc.
• HTTP is the foundation of data communication for
the World Wide Web.
• The HTTP is the Web’s application-layer protocol
for transferring various forms of data between
server and client like plaintext, hypertext, image,
videos and sounds .
2
TERMINOLOGY
• IP Address: An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network that uses the Internet
Protocol for communication.
• TCP :Transmission Control Protocol (TCP) is one of the two original core protocols of
the Internet Protocol Suite (IP), and is so common that the entire suite is often called TCP/IP.
TCP provides reliable, ordered, error-checked delivery of a stream of octets between
programs running on computers connected to an intranet or the public Internet.
• Port Number : A port number is a 16 bit number which when associated with IP address ,
completes the destination address for a communications session.
• Socket : A socket is nothing but a combination of IP address and port number. It is simply an
end while communication. 3
HOW HTTP WORKS?
• HTTP is implemented in two programs: a client
program and a server program, executing on
different end systems, talk to each other by
exchanging HTTP messages.
• The HTTP client first initiates a TCP
connection with the server. Once the
connection is established, the browser and the
server processes access TCP through their
socket interfaces.
4
HOW HTTP WORKS?
5
Suppose client wants to visit www.yahoo.com
HOW HTTP WORKS? (CONT.)
6
HOW HTTP WORKS? (CONT.)
7
HOW HTTP WORKS? (CONT.)
8
HOW HTTP WORKS? (CONT.)
9
PERSISTENT AND NON-PERSISTENT CONNECTIONS
• In non-persistent connection each request/response pair are sent over a
separate TCP connection.
• In persistent connections all of the requests and their corresponding responses
are sent over the same TCP connection.
10
HTTP REQUEST MESSAGE
• The first line of an HTTP request message is
called the request line; the subsequent lines are
called the header lines. The request line has
three fields: the method field, the URL field, and
the HTTP version field. The method field can take
on several different values, including GET, POST,
HEAD, PUT, and DELETE etc. The great majority
of HTTP request messages use the GET method.
The GET method is used when the browser
requests an object, with the requested object
identified in the URL field.
11
REQUEST METHODS
• GET: Retrieve Document identified in URL
• HEAD: Retrieve meta information about document identified in URL
• DELETE: Delete specified URL
• OPTIONS: Request information about available options
• PUT: Store document under specified URL
• POST: Give information to server
• TRACE: Loopback request message
• CONNECT: For use by Proxies
12
HTTP RESPONSE MESSAGES
• It has three sections: an initial status line,
header lines, and then the entity body. The
entity body contains the requested object
itself. The status line has three fields: the
protocol version field, a status code, and a
corresponding status message.
13
SOME COMMON STATUS CODES AND
ASSOCIATED PHRASES
• Some common status codes and associated phrases
include:
• 200 OK: Request succeeded and the information is
returned in the response.
• 301 Moved Permanently: Requested object has been
permanently moved; the new URL is specified in Location:
header of the response message. The client software will
automatically retrieve the new URL.
• 400 Bad Request: This is a generic error code indicating
that the request could not be understood by the server.
• 404 Not Found: The requested document does not exist
on this server.
• 505 HTTP Version Not Supported: The requested HTTP
protocol version is not supported by the server.
14
15
An HTTP request using telnet
HTTP: A STATELESS PROTOCOL
• HTTP is a stateless protocol, because an HTTP server maintains no information
about the clients.
• If a particular client asks for the same object twice in a period of a few
seconds, the server does not respond by saying that it just served the object to
the client; instead, the server resends the object, as it has completely forgotten
what it did earlier.
16
USER-SERVER INTERACTIONS: COOKIES
• HTTP server being stateless, simplifies server design and has permitted engineers to
develop high-performance Web servers that can handle thousands of simultaneous
TCP connections. However, it is often desirable for a Web site to identify users, either
because the server wishes to restrict user access or because it wants to serve content
as a function of the user identity. For these purposes, HTTP uses cookies. Cookies
allow sites to keep track of users.
• The cookie technology has four components:
• a cookie header line in the HTTP response message
• a cookie header line in the HTTP request message
• a cookie file kept on the user’s end system and managed by the user’s browser
• a back-end database at the Web site
17
18
WEB CACHING
• Also called proxy server, is a network entity that
satisfies HTTP requests on the behalf of an origin Web
server.
• The Web cache has its own disk storage and keeps
copies of recently requested objects in this storage.
• A Web cache can substantially reduce the response
time for a client request, particularly if the bandwidth
between the client and the origin server is much less
than the bandwidth between the client and the cache.
• Web caches can substantially reduce traffic
19

Contenu connexe

Tendances

Tendances (20)

Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
 
HTTP Basic
HTTP BasicHTTP Basic
HTTP Basic
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
Http-protocol
Http-protocolHttp-protocol
Http-protocol
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 
Introduction to HTTP - Hypertext Transfer Protocol
Introduction to HTTP - Hypertext Transfer ProtocolIntroduction to HTTP - Hypertext Transfer Protocol
Introduction to HTTP - Hypertext Transfer Protocol
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
 
Http basics by-joshi_29_4_15-ppt
Http basics by-joshi_29_4_15-pptHttp basics by-joshi_29_4_15-ppt
Http basics by-joshi_29_4_15-ppt
 
Lec 7(HTTP Protocol)
Lec 7(HTTP Protocol)Lec 7(HTTP Protocol)
Lec 7(HTTP Protocol)
 
(Ftp) file transfer protocol
(Ftp)   file transfer protocol(Ftp)   file transfer protocol
(Ftp) file transfer protocol
 
File Transfer protocols
File Transfer protocolsFile Transfer protocols
File Transfer protocols
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
HTTP
HTTPHTTP
HTTP
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
Web technology Unit-I Part D - message format
Web technology Unit-I  Part D - message formatWeb technology Unit-I  Part D - message format
Web technology Unit-I Part D - message format
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)
 
File Transfer Protocol(FTP)
File Transfer Protocol(FTP)File Transfer Protocol(FTP)
File Transfer Protocol(FTP)
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 

Similaire à HTTP Protocol Explained

Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...smitha273566
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocolsFabMinds
 
Advanced Web Design And Development BIT 3207
Advanced Web Design And Development BIT 3207Advanced Web Design And Development BIT 3207
Advanced Web Design And Development BIT 3207Lori Head
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.pptMohammed Ilyas
 
11 - ftp & web.ppt
11 - ftp & web.ppt11 - ftp & web.ppt
11 - ftp & web.pptssuserf7cd2b
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide WebAbhishek Kharbanda
 
HTTP Request Smuggling
HTTP Request SmugglingHTTP Request Smuggling
HTTP Request SmugglingAkash Ashokan
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guideSrihari
 

Similaire à HTTP Protocol Explained (20)

Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
Http
HttpHttp
Http
 
Web & HTTP
Web & HTTPWeb & HTTP
Web & HTTP
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Advanced Web Design And Development BIT 3207
Advanced Web Design And Development BIT 3207Advanced Web Design And Development BIT 3207
Advanced Web Design And Development BIT 3207
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
11 - ftp & web.ppt
11 - ftp & web.ppt11 - ftp & web.ppt
11 - ftp & web.ppt
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
 
Http smuggling 1 200523064027
Http smuggling 1 200523064027Http smuggling 1 200523064027
Http smuggling 1 200523064027
 
HTTP Request Smuggling
HTTP Request SmugglingHTTP Request Smuggling
HTTP Request Smuggling
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
Http protocol
Http protocolHttp protocol
Http protocol
 
http presentation 1.pptx
http presentation 1.pptxhttp presentation 1.pptx
http presentation 1.pptx
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
 
An Introduction to HTTP
An Introduction to HTTPAn Introduction to HTTP
An Introduction to HTTP
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Hyper Text Transfer Protocol
Hyper Text Transfer ProtocolHyper Text Transfer Protocol
Hyper Text Transfer Protocol
 

Dernier

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

HTTP Protocol Explained

  • 1. HyperText Transfer Protocol (HTTP) GURJOT SINGH REVTI RAMAN SINGH UG201113013 UG201110026 1
  • 2. WHAT IS A PROTOCOL AND HTTP? • Protocol: A Protocol is a standard procedure for defining and regulating communication. For example TCP, UDP, HTTP etc. • HTTP is the foundation of data communication for the World Wide Web. • The HTTP is the Web’s application-layer protocol for transferring various forms of data between server and client like plaintext, hypertext, image, videos and sounds . 2
  • 3. TERMINOLOGY • IP Address: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. • TCP :Transmission Control Protocol (TCP) is one of the two original core protocols of the Internet Protocol Suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to an intranet or the public Internet. • Port Number : A port number is a 16 bit number which when associated with IP address , completes the destination address for a communications session. • Socket : A socket is nothing but a combination of IP address and port number. It is simply an end while communication. 3
  • 4. HOW HTTP WORKS? • HTTP is implemented in two programs: a client program and a server program, executing on different end systems, talk to each other by exchanging HTTP messages. • The HTTP client first initiates a TCP connection with the server. Once the connection is established, the browser and the server processes access TCP through their socket interfaces. 4
  • 5. HOW HTTP WORKS? 5 Suppose client wants to visit www.yahoo.com
  • 6. HOW HTTP WORKS? (CONT.) 6
  • 7. HOW HTTP WORKS? (CONT.) 7
  • 8. HOW HTTP WORKS? (CONT.) 8
  • 9. HOW HTTP WORKS? (CONT.) 9
  • 10. PERSISTENT AND NON-PERSISTENT CONNECTIONS • In non-persistent connection each request/response pair are sent over a separate TCP connection. • In persistent connections all of the requests and their corresponding responses are sent over the same TCP connection. 10
  • 11. HTTP REQUEST MESSAGE • The first line of an HTTP request message is called the request line; the subsequent lines are called the header lines. The request line has three fields: the method field, the URL field, and the HTTP version field. The method field can take on several different values, including GET, POST, HEAD, PUT, and DELETE etc. The great majority of HTTP request messages use the GET method. The GET method is used when the browser requests an object, with the requested object identified in the URL field. 11
  • 12. REQUEST METHODS • GET: Retrieve Document identified in URL • HEAD: Retrieve meta information about document identified in URL • DELETE: Delete specified URL • OPTIONS: Request information about available options • PUT: Store document under specified URL • POST: Give information to server • TRACE: Loopback request message • CONNECT: For use by Proxies 12
  • 13. HTTP RESPONSE MESSAGES • It has three sections: an initial status line, header lines, and then the entity body. The entity body contains the requested object itself. The status line has three fields: the protocol version field, a status code, and a corresponding status message. 13
  • 14. SOME COMMON STATUS CODES AND ASSOCIATED PHRASES • Some common status codes and associated phrases include: • 200 OK: Request succeeded and the information is returned in the response. • 301 Moved Permanently: Requested object has been permanently moved; the new URL is specified in Location: header of the response message. The client software will automatically retrieve the new URL. • 400 Bad Request: This is a generic error code indicating that the request could not be understood by the server. • 404 Not Found: The requested document does not exist on this server. • 505 HTTP Version Not Supported: The requested HTTP protocol version is not supported by the server. 14
  • 15. 15 An HTTP request using telnet
  • 16. HTTP: A STATELESS PROTOCOL • HTTP is a stateless protocol, because an HTTP server maintains no information about the clients. • If a particular client asks for the same object twice in a period of a few seconds, the server does not respond by saying that it just served the object to the client; instead, the server resends the object, as it has completely forgotten what it did earlier. 16
  • 17. USER-SERVER INTERACTIONS: COOKIES • HTTP server being stateless, simplifies server design and has permitted engineers to develop high-performance Web servers that can handle thousands of simultaneous TCP connections. However, it is often desirable for a Web site to identify users, either because the server wishes to restrict user access or because it wants to serve content as a function of the user identity. For these purposes, HTTP uses cookies. Cookies allow sites to keep track of users. • The cookie technology has four components: • a cookie header line in the HTTP response message • a cookie header line in the HTTP request message • a cookie file kept on the user’s end system and managed by the user’s browser • a back-end database at the Web site 17
  • 18. 18
  • 19. WEB CACHING • Also called proxy server, is a network entity that satisfies HTTP requests on the behalf of an origin Web server. • The Web cache has its own disk storage and keeps copies of recently requested objects in this storage. • A Web cache can substantially reduce the response time for a client request, particularly if the bandwidth between the client and the origin server is much less than the bandwidth between the client and the cache. • Web caches can substantially reduce traffic 19