SlideShare a Scribd company logo
1 of 36
Download to read offline
HTTP(Hyper Text Transfer Protocol)
Dr R Jegadeesan Prof-CSE
Jyothishmathi Institute of Technology
and Science, Karimnagar
• The Hypertext Transfer Protocol (HTTP) is a
protocol used mainly to access data on the
World Wide Web.
• HTTP functions as a combination of FTP
and SMTP.
• It is similar to FTP because it transfers files
and uses the services of TCP.
• It is much simpler than FTP because it uses
only one TCP connection.
• There is no separate control connection;
only data are transferred between the client
and the server.
• HTTP is like SMTP because the data transferred
between the client and the server look like SMTP
messages.
• The format of the data is controlled by MIME-like
headers.
• Unlike SMTP, the HTTP messages are not destined to
be read by humans; they are read and interpreted by the
HTTP server and HTTP client (browser)
• SMTP messages are stored and forwarded, but HTTP
messages are delivered immediately
• The commands from the client to the server are
embedded in a request message.
• The contents of the requested file or other
information are embedded in a response
message.
• AS SMTP uses the services of TCP on well-
known port 25, POP3 uses 110, IMAP4 uses 143
port number
• HTTP uses the services of TCP on well-known
port 80.
HTTP Transaction
• Figure illustrates the HTTP transaction
between the client and server.
• The client initializes the transaction by
sending a request message.
• The server replies by sending a response
message
Messages
• The formats of the request and response
messages are similar; both are shown in
figure
• A request message consists of a request line,
a header, and sometimes a body.
• A response message consists of a status line, a
header, and sometimes a body.
Request and Status Line
• The first line in a request message is called a
request line;
• The first line in the response message is
called the status line.
• There is one common field, as shown in
Figure
Request type.
• This field is used in the request message.
• In version 1.1 of HTTP, several request types are defined.
they are
➢ GET
➢ HEAD
➢ POST
➢ PUT
➢ CONNECT
• GET
Requests a document from the server
• HEAD
Requests information about a document but
not the document itself.
• POST
Client submits data to be processed to a
specified server
• PUT
Sends a document from the server to client
• CONNECT
Reserved(connection established between
client and server)
• Status code
➢The status code field is similar to those in the
FTP and the SMTP protocols.
➢It consists of three digits code.
➢Whereas the codes in the 100 range are only
informational
➢ the codes in the 200 range indicate a successful
request.
➢The codes in the 300 range redirect the client to
another URL
➢the codes in the 400 range indicate an error at
the client site.
➢Finally, the codes in the 500 range indicate an
error at the server site.
Status phrase.
• This field is used in the response message. It
explains the status code in text form
HTTP Version.
The most current version of HTTP is 1.1.
Header
• The header exchanges additional information
between the client and the server.
• The header can consist of one or more header
lines.
• Each header line has a header name, a colon,
a space, and a header value
• A header line belongs to one of four categories:
• General Header
• Request Header
• Response Header
• Entity Header
• A request message can contain only general,
request, and entity headers.
• A response message can contain only general,
response, and entity headers
General header
➢The general header gives general information
about the message and can be present in both a
request and a response.
➢Cache-control Specifies information about
caching
➢Connection Shows whether the connection
should be closed or not between client and server
➢Date Shows the current date
➢MIME-version Shows the MIME version used
Request Header
• The request header can be present only in a
request message.
• It specifies the client's configuration and the
client's preferred document format
• List of some request headers and their
descriptions.
• Accept
Shows the format the client can accept
• Accept- charset
Shows the character set the client can handle
• Accept-encoding
Shows the encoding scheme the client can
handle
• Accept-language
Shows the language the client can accept
• From
Shows the e-mail address of the user
• Host
Shows the host and port number of the server
• If-modified-since
Sends the document if newer than specified
date
• If-match
Sends the document only if it matches given
request
• If-range
Sends only the portion of the document
• Referrer
Specifies the URL of the linked document
• User-agent
Identifies the client program
Response header
• The response header can be present only in a
response message.
• It specifies the server's configuration and
special information about the request
• List of some response headers with their
descriptions
• Accept-range
Shows if server accepts the range of
document requested by client
• Public
Shows the supported list of methods
• Retry-after
Specifies the date after which the server is
available
• Server
Shows the server name and version number
Entity header
• The entity header gives information about the body
of the document.
• Given below List of some entity headers and their
descriptions.
➢Content-encoding Specifies the encoding scheme
➢Content-language Specifies the language
➢Content-length Shows the length of the document
➢Content-range Specifies the range of the document
➢Content-type Specifies the data type
Body
• The body can be present in a request or
response message.
• Usually, it contains the document to be sent
or received.
Network security
• Network security is protection of the
access to files and directories in
computer network against hacking,
misuse and unauthorized changes to
the file.
SECURITY SERVICES
• Network security can provide one of the five
services.
➢Message Confidentiality,
➢Message Integrity
➢ Authentication
➢Non repudiation
➢Entity Authentication Or Identification
Message Confidentiality
• Message confidentiality or privacy means that the
sender and the receiver expect confidentiality.
• The transmitted message must make sense to
only the intended receiver.
• To all others, the message must be garbage.
• For example When a customer communicates
with her bank, she expects that the
communication is totally confidential.
Message Integrity
• Message integrity means that the data must
arrive at the receiver exactly as they were sent.
• There must be no changes during the
transmission, neither accidentally nor
maliciously.
• As more and more money exchanges occur over
the Internet, integrity is crucial.
• For example, it would be disastrous if a request
for transferring Rs1000 changed to a request for
Rs10,000 or Rs1,00,000.
Authentication
• It refers to the process of verifying the
identity of an entity involved in the
communication process i.e. determining the
identity of an entity before revealing the
sensitive information.
• The process of identifying an individual,
usually based on a username and password.
Non repudiation
• Message non repudiation means that a sender
must not be able to deny sending a message that
he or she, in fact, did send.
• Non repudiation is a way to guarantee that the
sender of a message cannot later deny having
sent the message and that the recipient cannot
later deny having received the message.
• Non repudiation can be obtained through the
use of digital signatures.
Entity authentication
• Entity authentication is a technique designed
to let one party prove the identity of another
party.
• An entity can be a person, a process, a client,
or a server.
• The entity whose identity needs to be proved
is called the claimant
• The entity that tries to prove the identity of
the claimant is called the verifier.
Thank you

More Related Content

What's hot (12)

Application layer
Application layerApplication layer
Application layer
 
Http
HttpHttp
Http
 
Introduction to HTTP - Hypertext Transfer Protocol
Introduction to HTTP - Hypertext Transfer ProtocolIntroduction to HTTP - Hypertext Transfer Protocol
Introduction to HTTP - Hypertext Transfer Protocol
 
Introduction to HTTP
Introduction to HTTPIntroduction to HTTP
Introduction to HTTP
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
 
Basic concept of internet
Basic concept of internetBasic concept of internet
Basic concept of internet
 
Http request&response
Http request&responseHttp request&response
Http request&response
 
Http utilize
Http utilizeHttp utilize
Http utilize
 
The eMule application of the eDonkey protocol
The eMule application of the eDonkey protocolThe eMule application of the eDonkey protocol
The eMule application of the eDonkey protocol
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 
Network layer
Network layerNetwork layer
Network layer
 

Similar to HTTP(Hyper Text Transfer Protocol)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocolsFabMinds
 
Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its ApplicationsNayan Dagliya
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit vJAIGANESH SEKAR
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
 
Httpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedHttpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedcomputerorganization
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptxArnavPlayz
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and responseSahil Agarwal
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and serviceslearnt
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Nidhitransport
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
 

Similar to HTTP(Hyper Text Transfer Protocol) (20)

Http Introduction
Http IntroductionHttp Introduction
Http Introduction
 
Web & HTTP
Web & HTTPWeb & HTTP
Web & HTTP
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its Applications
 
http presentation 1.pptx
http presentation 1.pptxhttp presentation 1.pptx
http presentation 1.pptx
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 
Httpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedHttpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-converted
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
IP UNIT 1.pptx
IP UNIT 1.pptxIP UNIT 1.pptx
IP UNIT 1.pptx
 
Http
HttpHttp
Http
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and response
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Browser
BrowserBrowser
Browser
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02
 
Http protocol
Http protocolHttp protocol
Http protocol
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 

More from Jyothishmathi Institute of Technology and Science Karimnagar

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScript
 
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES JSP
 
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES Servlet
 
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES XML
 
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
WEB TECHNOLOGIES- PHP Programming
 
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time Environments
 
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax Analysis
 
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

HTTP(Hyper Text Transfer Protocol)

  • 1. HTTP(Hyper Text Transfer Protocol) Dr R Jegadeesan Prof-CSE Jyothishmathi Institute of Technology and Science, Karimnagar
  • 2. • The Hypertext Transfer Protocol (HTTP) is a protocol used mainly to access data on the World Wide Web. • HTTP functions as a combination of FTP and SMTP. • It is similar to FTP because it transfers files and uses the services of TCP. • It is much simpler than FTP because it uses only one TCP connection. • There is no separate control connection; only data are transferred between the client and the server.
  • 3. • HTTP is like SMTP because the data transferred between the client and the server look like SMTP messages. • The format of the data is controlled by MIME-like headers. • Unlike SMTP, the HTTP messages are not destined to be read by humans; they are read and interpreted by the HTTP server and HTTP client (browser) • SMTP messages are stored and forwarded, but HTTP messages are delivered immediately
  • 4. • The commands from the client to the server are embedded in a request message. • The contents of the requested file or other information are embedded in a response message. • AS SMTP uses the services of TCP on well- known port 25, POP3 uses 110, IMAP4 uses 143 port number • HTTP uses the services of TCP on well-known port 80.
  • 5. HTTP Transaction • Figure illustrates the HTTP transaction between the client and server. • The client initializes the transaction by sending a request message. • The server replies by sending a response message
  • 6.
  • 7. Messages • The formats of the request and response messages are similar; both are shown in figure • A request message consists of a request line, a header, and sometimes a body. • A response message consists of a status line, a header, and sometimes a body.
  • 8.
  • 9. Request and Status Line • The first line in a request message is called a request line; • The first line in the response message is called the status line. • There is one common field, as shown in Figure
  • 10.
  • 11. Request type. • This field is used in the request message. • In version 1.1 of HTTP, several request types are defined. they are ➢ GET ➢ HEAD ➢ POST ➢ PUT ➢ CONNECT
  • 12. • GET Requests a document from the server • HEAD Requests information about a document but not the document itself. • POST Client submits data to be processed to a specified server
  • 13. • PUT Sends a document from the server to client • CONNECT Reserved(connection established between client and server)
  • 14. • Status code ➢The status code field is similar to those in the FTP and the SMTP protocols. ➢It consists of three digits code. ➢Whereas the codes in the 100 range are only informational ➢ the codes in the 200 range indicate a successful request. ➢The codes in the 300 range redirect the client to another URL ➢the codes in the 400 range indicate an error at the client site. ➢Finally, the codes in the 500 range indicate an error at the server site.
  • 15.
  • 16.
  • 17. Status phrase. • This field is used in the response message. It explains the status code in text form HTTP Version. The most current version of HTTP is 1.1.
  • 18. Header • The header exchanges additional information between the client and the server. • The header can consist of one or more header lines. • Each header line has a header name, a colon, a space, and a header value
  • 19. • A header line belongs to one of four categories: • General Header • Request Header • Response Header • Entity Header • A request message can contain only general, request, and entity headers. • A response message can contain only general, response, and entity headers
  • 20. General header ➢The general header gives general information about the message and can be present in both a request and a response. ➢Cache-control Specifies information about caching ➢Connection Shows whether the connection should be closed or not between client and server ➢Date Shows the current date ➢MIME-version Shows the MIME version used
  • 21. Request Header • The request header can be present only in a request message. • It specifies the client's configuration and the client's preferred document format • List of some request headers and their descriptions.
  • 22. • Accept Shows the format the client can accept • Accept- charset Shows the character set the client can handle • Accept-encoding Shows the encoding scheme the client can handle • Accept-language Shows the language the client can accept • From Shows the e-mail address of the user • Host Shows the host and port number of the server
  • 23. • If-modified-since Sends the document if newer than specified date • If-match Sends the document only if it matches given request • If-range Sends only the portion of the document • Referrer Specifies the URL of the linked document • User-agent Identifies the client program
  • 24. Response header • The response header can be present only in a response message. • It specifies the server's configuration and special information about the request • List of some response headers with their descriptions
  • 25. • Accept-range Shows if server accepts the range of document requested by client • Public Shows the supported list of methods • Retry-after Specifies the date after which the server is available • Server Shows the server name and version number
  • 26. Entity header • The entity header gives information about the body of the document. • Given below List of some entity headers and their descriptions. ➢Content-encoding Specifies the encoding scheme ➢Content-language Specifies the language ➢Content-length Shows the length of the document ➢Content-range Specifies the range of the document ➢Content-type Specifies the data type
  • 27. Body • The body can be present in a request or response message. • Usually, it contains the document to be sent or received.
  • 29. • Network security is protection of the access to files and directories in computer network against hacking, misuse and unauthorized changes to the file.
  • 30. SECURITY SERVICES • Network security can provide one of the five services. ➢Message Confidentiality, ➢Message Integrity ➢ Authentication ➢Non repudiation ➢Entity Authentication Or Identification
  • 31. Message Confidentiality • Message confidentiality or privacy means that the sender and the receiver expect confidentiality. • The transmitted message must make sense to only the intended receiver. • To all others, the message must be garbage. • For example When a customer communicates with her bank, she expects that the communication is totally confidential.
  • 32. Message Integrity • Message integrity means that the data must arrive at the receiver exactly as they were sent. • There must be no changes during the transmission, neither accidentally nor maliciously. • As more and more money exchanges occur over the Internet, integrity is crucial. • For example, it would be disastrous if a request for transferring Rs1000 changed to a request for Rs10,000 or Rs1,00,000.
  • 33. Authentication • It refers to the process of verifying the identity of an entity involved in the communication process i.e. determining the identity of an entity before revealing the sensitive information. • The process of identifying an individual, usually based on a username and password.
  • 34. Non repudiation • Message non repudiation means that a sender must not be able to deny sending a message that he or she, in fact, did send. • Non repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot later deny having received the message. • Non repudiation can be obtained through the use of digital signatures.
  • 35. Entity authentication • Entity authentication is a technique designed to let one party prove the identity of another party. • An entity can be a person, a process, a client, or a server. • The entity whose identity needs to be proved is called the claimant • The entity that tries to prove the identity of the claimant is called the verifier.