SlideShare a Scribd company logo
1 of 8
Assignment 1
(1)Study of HTTP.
 HTTP means HyperText Transfer Protocol.
 The Hypertext Transfer Protocol (HTTP) is the foundation
protocol of the World Wide Web (WWW).
 HTTP (Hypertext Transfer Protocol) is perhaps the most
popular application protocol used in the Internet (or The WEB).
 HTTP is designed to permit intermediate network elements to
improve communications between clients and servers.
 HTTP is a transaction-oriented client/server protocol. The most
typical use of HTTP is between a web browser and a web
server.
 HTTP is an asymmetric request-response client-server protocol
as illustrated. An HTTP client sends a request message to an
HTTP server. The server, in turn, returns a response message.
 In other words, HTTP is a pull protocol, the client pulls
information from the server (instead of server pushes
information down to the client).

 HTTP is a stateless protocol. In other words, the current request
does not know what has been done in the previous requests.
 The Hypertext Transfer Protocol (HTTP) is an application-level
protocol for distributed, collaborative, hypermedia information
systems.
 A typical implementation creates a new TCP (Transmission Control
Protocol) connection between client and server for each
transaction and then terminates the connection as soon as the
transaction completes, although the specification doesn't
dictate this one-to-one relationship between transaction and
connection lifetimes.
HOW HTTP WORKS?
 Web sites generally have an http:// at the beginning of the
uniform resource locator (URL) address.
 When you enter a URL into your Web browser, the browser
sends out a data request for the information stored under that
address, which is then transferred back to you.
 Your browser then interprets the data and displays it for you in
the appropriate manner.
 Today, many sites instead have https:// listed as their URL
prefixes.
 This stands for HTTP secure and means that the Web page will
be transmitted with encryption.
 Banks, e-commerce sites and any company concerned about
Internet security may use the HTTPS protocol instead of simple
HTTP to ensure that sensitive data (such as your credit card
number) is sent to and from a server with encryption.
 If there is no "s" after the HTTP prefix, you can assume that
there is no encryption. That's an important point to remember
when conducting business of any kind.
 Users should check for the https:// prefix before entering
sensitive, private data into a site's forms. That's especially true
if accessing the site through a wireless connection.
 Even services such as Google Mail, Twitter and Facebook have
begun using forms of HTTPS.
 Here shown the difference between HTTP and HTTPS.

 But in HTTPS has secure and means that the Web page will be
transmitted with encryption.

 In the near future, Internet browsers may not see the HTTP at
all, because address bars may become a thing of the past.
Google Chrome and Mozilla Firefox are redesigning their systems
to be more like mobile applications than like traditional Web
browsing -- they're making the browser bar smaller and less
prominent. It's possible that the bar may one day disappear
altogether and all Internet access will be through links and apps.
(2) Explain methods of HTTP.
 HTTP mainly divided in seven methods.
i.
ii.
iii.
iv.
v.
vi.
vii.

Get
Head
Put
Post
Delete
Trace
Option

(i) Get : The GET method is used to retrieve information from a specified
URI and is assumed to be a safe, repeatable operation by
browsers, caches and other HTTP aware components.
 This means that the operation must have no side effects and GET
requests can be re-issued without worrying about the
consequences.
 For example, displaying the balance of a bank account has no
effect on the account and can be safely repeated.
 In fact, Internet Explorer will allow a user to refresh a page that
resulted from a GET, without displaying any kind of warning.
 Other HTTP aware components such as proxies may automatically
retry GET requests if they encounter a temporary network
connection problem.
 The conditional GET method is intended to reduce network usage
by allowing cached entities to be refreshed without requiring
multiple requests or transferring unnecessary data.
 The GET method can also be used to submit forms. The form data
is URL-encoded and appended to the request URI.
 One downside of GET requests is that they can only supply data in
the form of parameters encoded in the URI (Universel Resource Identifier
known as a Query String) or as cookies in the cookie request header.
 Therefore, GET cannot be used for uploading files or other
operations that require large amounts of data to be sent to the
server.
(ii) Head : A HEAD request is just like a GET request, except it asks the server
to return the response headers only, and not the actual resource
(i.e. no message body).
 This is useful to check characteristics of a resource without
actually downloading it, thus saving bandwidth.
 This is useful for retrieving meta-information written in response
headers without having to transport the entire content.
 We can use HEAD when we don't actually need a file's contents.
 The response to a HEAD request must never contain a message
body, just the status line and headers.
 The head method is often used for testing hyperlinks, accessibility
and for determining if a document has been recently modifed.
(iii) Put : This method allows a client to upload new files on the web server.
 An attacker can exploit it by uploading malicious files.
 e.g.: an ASP (Active server Pages) file that executes commands by
invoking cmd.exe , or by simply using the victim's server as a file
repository.
 HTTP/1.1 does not define how a PUT method affects the state of
an origin server.
 PUT requests must obey the message transmission requirements.
(iv)Post: The POST method is used for operations that have side effects
and cannot be safely repeated.
 For example, transferring money from one bank account to
another has side effects and should not be repeated without
explicit approval by the user.
 If you try to refresh a page in Internet Explorer that resulted from
a POST, it displays the following message to warn you that there
may be side effects:

 For banking, and other transactional web applications, the best
approach is to use a POST when the user submits a change and
then use a 302 redirection to change to a GET that displays the
result of the action.
 A person who working with Microsoft's Internet Information
Server (IIS) may notice that it returns two status codes in its
response for a POST request.
 The first is 100 Continue to indicate that it has successfully
received the POST request and the second is 200 OK after the
request has been processed.
(v) Delete: This method allows a client to delete a file on the web server.
 An attacker can exploit it as a very simple and direct way to
deface a web site or to mount a DoS (Disk Operating System) attack.
 This method may be overridden by human intervention (or other
means) on the Web Server.
 If the response includes an entity describing the status of
deletion, the 200(OK) response code specifies that the resource
has been deleted successfully.
 If the response is 202(Accepted), it specifies that the resource has
not yet been deleted.
 Similarly, if the response code is 204 (No Content), it specifies that
the resource has been deleted but the response code does not
include an entity.
(vi) Trace: This method simply echoes back to the client whatever string has
been sent to the server, and is used mainly for debugging
purposes.
 This method, originally assumed harmless, can be used to mount
an attack known as Cross Site Tracing.
 Thus, It is useful to locate exact location of your request.
(vii) Option: This method is Used when the client wants to determine other
available methods to retrieve a document on the Web server.
 This method requests for information about the communication
options available on the request chain identified by a Request-URI
(Uniform Resource Identifier).
 Responses to this method are not cacheable.
 If the OPTIONS method includes an entity body, the media type
must be indicated by the content-type field.
Study of http

More Related Content

What's hot

Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its ApplicationsNayan Dagliya
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Shimona Agarwal
 
HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.Halah Salih
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http responseNuha Noor
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developersMario Cardinal
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to knowGökhan Şengün
 
21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboardsDenis Ristic
 
Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014Navaneethan Naveen
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...rahul kundu
 

What's hot (20)

Http-protocol
Http-protocolHttp-protocol
Http-protocol
 
Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its Applications
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.
 
Webbasics
WebbasicsWebbasics
Webbasics
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
 
Http
HttpHttp
Http
 
Get and post methods
Get and post methodsGet and post methods
Get and post methods
 
Restful web services
Restful web servicesRestful web services
Restful web services
 
Http protocol
Http protocolHttp protocol
Http protocol
 
HTTP
HTTPHTTP
HTTP
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developers
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
 
HTTPS
HTTPSHTTPS
HTTPS
 
21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
 
Web technology
Web technologyWeb technology
Web technology
 
Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 

Viewers also liked

Radio trails analysis_sheet grand prix
Radio trails analysis_sheet grand prixRadio trails analysis_sheet grand prix
Radio trails analysis_sheet grand prixa2cole13
 
SANTA MARIA TATALTEPEC - ISABEL
SANTA MARIA TATALTEPEC - ISABELSANTA MARIA TATALTEPEC - ISABEL
SANTA MARIA TATALTEPEC - ISABELIsabel Cruz
 
costume and prop research
costume and prop researchcostume and prop research
costume and prop researchkendro98
 
Indonesia dan masyarakat serta perkembangan iptek
Indonesia dan masyarakat serta perkembangan iptek Indonesia dan masyarakat serta perkembangan iptek
Indonesia dan masyarakat serta perkembangan iptek IRFAN ipan
 
Projet Politique de la Liste LE GRAND RASSEMBLEMENT POUR UN GOSIER UNI
Projet Politique de la Liste LE GRAND RASSEMBLEMENT POUR UN GOSIER UNIProjet Politique de la Liste LE GRAND RASSEMBLEMENT POUR UN GOSIER UNI
Projet Politique de la Liste LE GRAND RASSEMBLEMENT POUR UN GOSIER UNIcommunity971
 
Italy: 10 things to visit not to be missed
Italy: 10 things to visit not to be missedItaly: 10 things to visit not to be missed
Italy: 10 things to visit not to be missedFashion Tour
 
The benefits of IBM FlashSystems
The benefits of IBM FlashSystemsThe benefits of IBM FlashSystems
The benefits of IBM FlashSystemsLuca Comparini
 
Resolucion de los problemas del libro de rufino moya
Resolucion de los problemas del libro de rufino moyaResolucion de los problemas del libro de rufino moya
Resolucion de los problemas del libro de rufino moyaWagner Santoyo
 
ασύρματο τερματικό WF43
ασύρματο τερματικό WF43ασύρματο τερματικό WF43
ασύρματο τερματικό WF43WITEC_GREECE
 

Viewers also liked (16)

Radio trails analysis_sheet grand prix
Radio trails analysis_sheet grand prixRadio trails analysis_sheet grand prix
Radio trails analysis_sheet grand prix
 
Pres planeta
Pres planetaPres planeta
Pres planeta
 
Dcm wp riskmgt2014
Dcm wp riskmgt2014Dcm wp riskmgt2014
Dcm wp riskmgt2014
 
SANTA MARIA TATALTEPEC - ISABEL
SANTA MARIA TATALTEPEC - ISABELSANTA MARIA TATALTEPEC - ISABEL
SANTA MARIA TATALTEPEC - ISABEL
 
CCE1000 Jan 2014
CCE1000 Jan 2014CCE1000 Jan 2014
CCE1000 Jan 2014
 
costume and prop research
costume and prop researchcostume and prop research
costume and prop research
 
Indonesia dan masyarakat serta perkembangan iptek
Indonesia dan masyarakat serta perkembangan iptek Indonesia dan masyarakat serta perkembangan iptek
Indonesia dan masyarakat serta perkembangan iptek
 
Projet Politique de la Liste LE GRAND RASSEMBLEMENT POUR UN GOSIER UNI
Projet Politique de la Liste LE GRAND RASSEMBLEMENT POUR UN GOSIER UNIProjet Politique de la Liste LE GRAND RASSEMBLEMENT POUR UN GOSIER UNI
Projet Politique de la Liste LE GRAND RASSEMBLEMENT POUR UN GOSIER UNI
 
Thesis 03 5205108
Thesis 03 5205108Thesis 03 5205108
Thesis 03 5205108
 
Italy: 10 things to visit not to be missed
Italy: 10 things to visit not to be missedItaly: 10 things to visit not to be missed
Italy: 10 things to visit not to be missed
 
The benefits of IBM FlashSystems
The benefits of IBM FlashSystemsThe benefits of IBM FlashSystems
The benefits of IBM FlashSystems
 
Infective endocarditis-1
Infective endocarditis-1Infective endocarditis-1
Infective endocarditis-1
 
Presentación psicosis (psicoanalisis)
Presentación psicosis (psicoanalisis)Presentación psicosis (psicoanalisis)
Presentación psicosis (psicoanalisis)
 
Resolucion de los problemas del libro de rufino moya
Resolucion de los problemas del libro de rufino moyaResolucion de los problemas del libro de rufino moya
Resolucion de los problemas del libro de rufino moya
 
Tengo hambre
Tengo hambreTengo hambre
Tengo hambre
 
ασύρματο τερματικό WF43
ασύρματο τερματικό WF43ασύρματο τερματικό WF43
ασύρματο τερματικό WF43
 

Similar to Study of http

Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfRaghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfRaghunathan52
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009Cathie101
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009Cathie101
 
05 20254 financial stock application
05 20254 financial stock application05 20254 financial stock application
05 20254 financial stock applicationIAESIJEECS
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcaRenu Thakur
 
Abhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_techAbhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_techabhishek srivastav
 
Decoding real time web communication
Decoding real time web communicationDecoding real time web communication
Decoding real time web communicationAMiT JAiN
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdfZani10
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guideSrihari
 
Lecture 1 Introduction to Web Development.pptx
Lecture 1 Introduction to Web Development.pptxLecture 1 Introduction to Web Development.pptx
Lecture 1 Introduction to Web Development.pptxKevi20
 
Server Side Programming
Server Side ProgrammingServer Side Programming
Server Side ProgrammingMilan Thapa
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptVietAnhNguyen337355
 

Similar to Study of http (20)

Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
www and http services
www and http serviceswww and http services
www and http services
 
Internet
InternetInternet
Internet
 
05 20254 financial stock application
05 20254 financial stock application05 20254 financial stock application
05 20254 financial stock application
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
 
Web server
Web serverWeb server
Web server
 
Abhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_techAbhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_tech
 
ClientServer Websocket.pptx
ClientServer Websocket.pptxClientServer Websocket.pptx
ClientServer Websocket.pptx
 
Decoding real time web communication
Decoding real time web communicationDecoding real time web communication
Decoding real time web communication
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
 
Ch-1_.ppt
Ch-1_.pptCh-1_.ppt
Ch-1_.ppt
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
Lecture 1 Introduction to Web Development.pptx
Lecture 1 Introduction to Web Development.pptxLecture 1 Introduction to Web Development.pptx
Lecture 1 Introduction to Web Development.pptx
 
Server Side Programming
Server Side ProgrammingServer Side Programming
Server Side Programming
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
 
REST Presentation
REST PresentationREST Presentation
REST Presentation
 

Recently uploaded

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 

Study of http

  • 1. Assignment 1 (1)Study of HTTP.  HTTP means HyperText Transfer Protocol.  The Hypertext Transfer Protocol (HTTP) is the foundation protocol of the World Wide Web (WWW).  HTTP (Hypertext Transfer Protocol) is perhaps the most popular application protocol used in the Internet (or The WEB).  HTTP is designed to permit intermediate network elements to improve communications between clients and servers.  HTTP is a transaction-oriented client/server protocol. The most typical use of HTTP is between a web browser and a web server.  HTTP is an asymmetric request-response client-server protocol as illustrated. An HTTP client sends a request message to an HTTP server. The server, in turn, returns a response message.  In other words, HTTP is a pull protocol, the client pulls information from the server (instead of server pushes information down to the client).  HTTP is a stateless protocol. In other words, the current request does not know what has been done in the previous requests.
  • 2.  The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems.  A typical implementation creates a new TCP (Transmission Control Protocol) connection between client and server for each transaction and then terminates the connection as soon as the transaction completes, although the specification doesn't dictate this one-to-one relationship between transaction and connection lifetimes. HOW HTTP WORKS?  Web sites generally have an http:// at the beginning of the uniform resource locator (URL) address.  When you enter a URL into your Web browser, the browser sends out a data request for the information stored under that address, which is then transferred back to you.  Your browser then interprets the data and displays it for you in the appropriate manner.  Today, many sites instead have https:// listed as their URL prefixes.  This stands for HTTP secure and means that the Web page will be transmitted with encryption.  Banks, e-commerce sites and any company concerned about Internet security may use the HTTPS protocol instead of simple HTTP to ensure that sensitive data (such as your credit card number) is sent to and from a server with encryption.  If there is no "s" after the HTTP prefix, you can assume that there is no encryption. That's an important point to remember when conducting business of any kind.  Users should check for the https:// prefix before entering sensitive, private data into a site's forms. That's especially true if accessing the site through a wireless connection.
  • 3.  Even services such as Google Mail, Twitter and Facebook have begun using forms of HTTPS.  Here shown the difference between HTTP and HTTPS.  But in HTTPS has secure and means that the Web page will be transmitted with encryption.  In the near future, Internet browsers may not see the HTTP at all, because address bars may become a thing of the past. Google Chrome and Mozilla Firefox are redesigning their systems to be more like mobile applications than like traditional Web browsing -- they're making the browser bar smaller and less prominent. It's possible that the bar may one day disappear altogether and all Internet access will be through links and apps.
  • 4. (2) Explain methods of HTTP.  HTTP mainly divided in seven methods. i. ii. iii. iv. v. vi. vii. Get Head Put Post Delete Trace Option (i) Get : The GET method is used to retrieve information from a specified URI and is assumed to be a safe, repeatable operation by browsers, caches and other HTTP aware components.  This means that the operation must have no side effects and GET requests can be re-issued without worrying about the consequences.  For example, displaying the balance of a bank account has no effect on the account and can be safely repeated.  In fact, Internet Explorer will allow a user to refresh a page that resulted from a GET, without displaying any kind of warning.  Other HTTP aware components such as proxies may automatically retry GET requests if they encounter a temporary network connection problem.  The conditional GET method is intended to reduce network usage by allowing cached entities to be refreshed without requiring multiple requests or transferring unnecessary data.  The GET method can also be used to submit forms. The form data is URL-encoded and appended to the request URI.
  • 5.  One downside of GET requests is that they can only supply data in the form of parameters encoded in the URI (Universel Resource Identifier known as a Query String) or as cookies in the cookie request header.  Therefore, GET cannot be used for uploading files or other operations that require large amounts of data to be sent to the server. (ii) Head : A HEAD request is just like a GET request, except it asks the server to return the response headers only, and not the actual resource (i.e. no message body).  This is useful to check characteristics of a resource without actually downloading it, thus saving bandwidth.  This is useful for retrieving meta-information written in response headers without having to transport the entire content.  We can use HEAD when we don't actually need a file's contents.  The response to a HEAD request must never contain a message body, just the status line and headers.  The head method is often used for testing hyperlinks, accessibility and for determining if a document has been recently modifed. (iii) Put : This method allows a client to upload new files on the web server.  An attacker can exploit it by uploading malicious files.  e.g.: an ASP (Active server Pages) file that executes commands by invoking cmd.exe , or by simply using the victim's server as a file repository.  HTTP/1.1 does not define how a PUT method affects the state of an origin server.  PUT requests must obey the message transmission requirements.
  • 6. (iv)Post: The POST method is used for operations that have side effects and cannot be safely repeated.  For example, transferring money from one bank account to another has side effects and should not be repeated without explicit approval by the user.  If you try to refresh a page in Internet Explorer that resulted from a POST, it displays the following message to warn you that there may be side effects:  For banking, and other transactional web applications, the best approach is to use a POST when the user submits a change and then use a 302 redirection to change to a GET that displays the result of the action.  A person who working with Microsoft's Internet Information Server (IIS) may notice that it returns two status codes in its response for a POST request.  The first is 100 Continue to indicate that it has successfully received the POST request and the second is 200 OK after the request has been processed. (v) Delete: This method allows a client to delete a file on the web server.  An attacker can exploit it as a very simple and direct way to deface a web site or to mount a DoS (Disk Operating System) attack.
  • 7.  This method may be overridden by human intervention (or other means) on the Web Server.  If the response includes an entity describing the status of deletion, the 200(OK) response code specifies that the resource has been deleted successfully.  If the response is 202(Accepted), it specifies that the resource has not yet been deleted.  Similarly, if the response code is 204 (No Content), it specifies that the resource has been deleted but the response code does not include an entity. (vi) Trace: This method simply echoes back to the client whatever string has been sent to the server, and is used mainly for debugging purposes.  This method, originally assumed harmless, can be used to mount an attack known as Cross Site Tracing.  Thus, It is useful to locate exact location of your request. (vii) Option: This method is Used when the client wants to determine other available methods to retrieve a document on the Web server.  This method requests for information about the communication options available on the request chain identified by a Request-URI (Uniform Resource Identifier).  Responses to this method are not cacheable.  If the OPTIONS method includes an entity body, the media type must be indicated by the content-type field.