SlideShare a Scribd company logo
Internet Technology
Saman M. Almufti
Lecture 6
HTTP • HTTP stands for HyperText Transfer Protocol.
• It is a protocol used in TCP/IP Application layer to access the data on the World Wide
Web (www).
• The HTTP protocol can be used to transfer the data in the form of (Multipurpose
Internet Mail Extensions) MIME-like format such as plain text, hypertext,
audio, video, and so on.
• This protocol is known as HyperText Transfer Protocol because of its efficiency that
allows us to use in a hypertext environment where there are rapid jumps from one
document to another document.
Features of HTTP
• Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a request and waits
for a response from the server. When the server receives the request, the server processes the request and
sends back the response to the HTTP client after that the client disconnects the connection. The
connection between client and server exist only during the current request and response time only.
• Media independent: HTTP protocol is a media independent as data can be sent as long as both the
client and server know how to handle the data content. It is required for both the client and server to
specify the content type in MIME-type header.
• Stateless: HTTP is a stateless protocol as both the client and server know each other only during the
current request. Due to this nature of the protocol, both the client and server do not retain the
information between various requests of the web pages.
HTTP Request / Response cycle
1.A client (a browser) sends an HTTP request to the web server
2.An web server receives the request
3.The server runs an application to process the request
4.The server returns an HTTP response (output) to the browser
5.The client (the browser) receives the response
Communication between clients and servers is done by requests and responses:
Request
Response
Request
Response
HTTP Request / Response cycle
Client Server
HTTP request /response to browse a website
HTTP makes several request to browse a website
1.The browser requests an HTML page. The server
returns an HTML file.
2.The browser requests a style sheet. The server returns
a CSS file.
3.The browser requests an JPG image. The server
returns a JPG file.
4.The browser requests JavaScript code. The server
returns a JS file
5.The browser requests data. The server returns data (in
XML or JSON).
A website is made up of many different files, which are sored in a server or in varies servers. These files come in two main types:
•Code files: Websites are built primarily from HTML, CSS, JavaScript, php,…etc.
•Assets: This is a collective of all the other contents of website, such as images, music, video, Word documents,
HTTP Request
Requests consists of the following elements:
• Method, HTTP methods like GET, POST, OPTIONS or
HEAD that defines the operation the client wants to
perform.
• Path of the resource to fetch; the URL of the resource, for
example without the protocol (http://), the domain (here,
developer.mozilla.com).
• Version of the HTTP protocol.
• Optional headers that convey additional information for the
servers.
• Or a body, for some methods like POST, similar to those in
responses, which contain the resource sent.
HTTP Response
Responses consist of the following elements:
•The version of the HTTP protocol they follow.
•A status code, indicating if the request was successful,
or not, and why.
•A status message, a non-authoritative short description
of the status code.
•HTTP headers, like those for requests.
•Optionally, a body containing the fetched resource.
Checking Http Information
To check your site using the
Developer tool, you will need
to add the protocol column
to the Network tab. To do
this, open the Developer
toolkit by hitting F12 or right
clicking and inspect element
in Chrome. Then navigate to
the Network tab and right
click on one of the headings,
then click protocol in the
drop down menu.
HTTPS
• HTTPS is Hypertext Transfer Protocol Secure.
• The HTTP protocol does not provide the security of the data, while HTTPS ensures the
security of the data. Therefore, we can say that HTTPS is a secure version of the HTTP
protocol.
• This protocol allows transferring the data in an encrypted form. The use of HTTPS
protocol is mainly required where we need to enter the bank account details. The HTTPS
protocol is mainly used where we require to enter the login credentials. In modern
browsers such as chrome, both the protocols, i.e., HTTP and HTTPS, are marked
differently.
• To provide encryption, HTTPS uses an encryption protocol known as Transport Layer
Security (TSL), and Secure Sockets Layer (SSL). This protocol uses a mechanism
known as asymmetric public key infrastructure, and it uses two different keys which are
given below:
• Private key: This key is available on the web server, which is managed by the
owner of a website. It decrypts the information which is encrypted by the public
key.
• Public key: This key is available to everyone. It converts the data into an encrypted
form.
HTTP VS HTTPS
HTTP HTTPS
The full form of HTTP is the Hypertext Transfer Protocol. The full form of HTTPS is Hypertext Transfer Protocol
Secure.
It is written in the address bar as http:// It is written in the address bar as https://
The HTTP transmits the data over port number 80. The HTTPS transmits the data over port number 443.
It is unsecured as the plain text is sent, which can be
accessible by the hackers.
It is secure as it sends the encrypted data which hackers
cannot understand.
It is mainly used for those websites that provide information
like blog writing.
It is a secure protocol, so it is used for those websites that
require to transmit the bank account details or credit card
numbers.
It does not use TSL and SSL. It uses TSL and SSL that provides the encryption of the data.
Google does not give the preference to the HTTP websites. Google gives preferences to the HTTPS as HTTPS websites
are secure websites.
The page loading speed is fast. The page loading speed is slow as compared to HTTP
because of the additional feature that it supports, i.e.,
security.
HTTPSHTTP
• Transport Layer Security (TLS)
• Secure Sockets Layer (SSL)
• TLS/SSL Protocols adds a layer of security on top of the TCP/IP transport protocols.
they uses both symmetric encryption and public key encryption for securely sending
private data, and adds additional security features, such as authentication and message
tampering detection.
• Are standard security technology for establishing an encrypted link between a server and
a client—typically a web server (website) and a browser, or a mail server and a mail
client (e.g., Outlook).
2- TLS initiation
3-Server confirmation of protocol
1- TCP handshake
5-Shared key generation
4-Certificate verification
6-Server confirmation of shared
key
7-Send secure data
IP Address
Lecture  6- http
Lecture  6- http

More Related Content

What's hot

HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.
Halah Salih
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal
 
HTTP & HTML & Web
HTTP & HTML & WebHTTP & HTML & Web
HTTP & HTML & Web
Peter R. Egli
 
HTTP
HTTPHTTP
Hypertex transfer protocol
Hypertex transfer protocolHypertex transfer protocol
Hypertex transfer protocol
wanangwa234
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
Gouasmia Zakaria
 
HTTP
HTTPHTTP
Http-protocol
Http-protocolHttp-protocol
Http-protocol
Toushik Paul
 
HTTPS
HTTPSHTTPS
HTTPS
maroti164
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developers
Mario Cardinal
 
Http headers
Http headersHttp headers
Http headers
Judy Ngure
 
HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?
CheapSSLsecurity
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
Gökhan Şengün
 
Http
HttpHttp
HTTP(Hyper Text Transfer Protocol)
HTTP(Hyper Text Transfer Protocol)HTTP(Hyper Text Transfer Protocol)
Http protocol
Http protocolHttp protocol
Http protocol
Arpita Naik
 
Http
HttpHttp
21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards
Denis Ristic
 
HTTP and HTTPS Basics
HTTP and HTTPS BasicsHTTP and HTTPS Basics
HTTP and HTTPS Basics
Kanishk Raj
 
Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014
Navaneethan Naveen
 

What's hot (20)

HTTP Definition and Basics.
HTTP Definition and Basics.HTTP Definition and Basics.
HTTP Definition and Basics.
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
HTTP & HTML & Web
HTTP & HTML & WebHTTP & HTML & Web
HTTP & HTML & Web
 
HTTP
HTTPHTTP
HTTP
 
Hypertex transfer protocol
Hypertex transfer protocolHypertex transfer protocol
Hypertex transfer protocol
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 
HTTP
HTTPHTTP
HTTP
 
Http-protocol
Http-protocolHttp-protocol
Http-protocol
 
HTTPS
HTTPSHTTPS
HTTPS
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developers
 
Http headers
Http headersHttp headers
Http headers
 
HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
 
Http
HttpHttp
Http
 
HTTP(Hyper Text Transfer Protocol)
HTTP(Hyper Text Transfer Protocol)HTTP(Hyper Text Transfer Protocol)
HTTP(Hyper Text Transfer Protocol)
 
Http protocol
Http protocolHttp protocol
Http protocol
 
Http
HttpHttp
Http
 
21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards
 
HTTP and HTTPS Basics
HTTP and HTTPS BasicsHTTP and HTTPS Basics
HTTP and HTTPS Basics
 
Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014
 

Similar to Lecture 6- http

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
Abshar Fatima
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
http presentation 1.pptx
http presentation 1.pptxhttp presentation 1.pptx
http presentation 1.pptx
DeepakKumar408406
 
HTTP.pptx...............................
HTTP.pptx...............................HTTP.pptx...............................
HTTP.pptx...............................
Halabja university - Kurdistan -Iraq
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
learnt
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
Akshay Dhole
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
Renu Thakur
 
PHP Training: Module 1
PHP Training: Module 1PHP Training: Module 1
PHP Training: Module 1
hussulinux
 
WT_TOTAL.pdf
WT_TOTAL.pdfWT_TOTAL.pdf
WT_TOTAL.pdf
Nandyala Manoj Sai
 
Web & HTTP
Web & HTTPWeb & HTTP
Web & HTTP
MansiSingh269494
 
Http vs https
Http vs httpsHttp vs https
Http vs https
Gulbir Chaudhary
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
Nuha Noor
 
Web technology
Web technologyWeb technology
Web technology
Anuj Singh Rajput
 
www and http services
www and http serviceswww and http services
www and http services
Jenica Salmorin
 
Starting With Php
Starting With PhpStarting With Php
Starting With Php
Harit Kothari
 
WWW & HTTP
WWW & HTTPWWW & HTTP
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
ShehryarFreelancer
 
Browser
BrowserBrowser
Browser
Shweta Oza
 
Www and http
Www and httpWww and http
Www and http
bhargav shah
 

Similar to Lecture 6- http (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
http presentation 1.pptx
http presentation 1.pptxhttp presentation 1.pptx
http presentation 1.pptx
 
HTTP.pptx...............................
HTTP.pptx...............................HTTP.pptx...............................
HTTP.pptx...............................
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
 
PHP Training: Module 1
PHP Training: Module 1PHP Training: Module 1
PHP Training: Module 1
 
WT_TOTAL.pdf
WT_TOTAL.pdfWT_TOTAL.pdf
WT_TOTAL.pdf
 
Web & HTTP
Web & HTTPWeb & HTTP
Web & HTTP
 
Http vs https
Http vs httpsHttp vs https
Http vs https
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
 
Web technology
Web technologyWeb technology
Web technology
 
www and http services
www and http serviceswww and http services
www and http services
 
Starting With Php
Starting With PhpStarting With Php
Starting With Php
 
WWW & HTTP
WWW & HTTPWWW & HTTP
WWW & HTTP
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Browser
BrowserBrowser
Browser
 
Www and http
Www and httpWww and http
Www and http
 

More from Saman M. Almufti

Lecture 7- domain name
Lecture  7- domain nameLecture  7- domain name
Lecture 7- domain name
Saman M. Almufti
 
Vp lecture 11 ararat
Vp lecture 11 araratVp lecture 11 ararat
Vp lecture 11 ararat
Saman M. Almufti
 
Vp lecture 10 ararat
Vp lecture 10 araratVp lecture 10 ararat
Vp lecture 10 ararat
Saman M. Almufti
 
Vp lecture 12 ararat
Vp lecture 12 araratVp lecture 12 ararat
Vp lecture 12 ararat
Saman M. Almufti
 
Vp lecture 9 ararat
Vp lecture 9 araratVp lecture 9 ararat
Vp lecture 9 ararat
Saman M. Almufti
 
Lecture 5- url-dns
Lecture  5- url-dnsLecture  5- url-dns
Lecture 5- url-dns
Saman M. Almufti
 
Vp lecture 7 ararat
Vp lecture 7 araratVp lecture 7 ararat
Vp lecture 7 ararat
Saman M. Almufti
 
Lecture 4- ip
Lecture  4- ipLecture  4- ip
Lecture 4- ip
Saman M. Almufti
 
Vp lecture 6 ararat
Vp lecture 6 araratVp lecture 6 ararat
Vp lecture 6 ararat
Saman M. Almufti
 
Vp lecture 5 ararat
Vp lecture 5 araratVp lecture 5 ararat
Vp lecture 5 ararat
Saman M. Almufti
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
Saman M. Almufti
 
Vp lecture 4 ararat
Vp lecture 4 araratVp lecture 4 ararat
Vp lecture 4 ararat
Saman M. Almufti
 
Vp lecture 3 ararat
Vp lecture 3 araratVp lecture 3 ararat
Vp lecture 3 ararat
Saman M. Almufti
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
Saman M. Almufti
 
Vp lecture 2 ararat
Vp lecture 2 araratVp lecture 2 ararat
Vp lecture 2 ararat
Saman M. Almufti
 
Vp lecture1 ararat
Vp lecture1 araratVp lecture1 ararat
Vp lecture1 ararat
Saman M. Almufti
 
Lecture 1- introduction
Lecture  1- introductionLecture  1- introduction
Lecture 1- introduction
Saman M. Almufti
 
Vs c# lecture12
Vs c# lecture12Vs c# lecture12
Vs c# lecture12
Saman M. Almufti
 
Vs c# lecture11
Vs c# lecture11Vs c# lecture11
Vs c# lecture11
Saman M. Almufti
 
Vs c# lecture10
Vs c# lecture10Vs c# lecture10
Vs c# lecture10
Saman M. Almufti
 

More from Saman M. Almufti (20)

Lecture 7- domain name
Lecture  7- domain nameLecture  7- domain name
Lecture 7- domain name
 
Vp lecture 11 ararat
Vp lecture 11 araratVp lecture 11 ararat
Vp lecture 11 ararat
 
Vp lecture 10 ararat
Vp lecture 10 araratVp lecture 10 ararat
Vp lecture 10 ararat
 
Vp lecture 12 ararat
Vp lecture 12 araratVp lecture 12 ararat
Vp lecture 12 ararat
 
Vp lecture 9 ararat
Vp lecture 9 araratVp lecture 9 ararat
Vp lecture 9 ararat
 
Lecture 5- url-dns
Lecture  5- url-dnsLecture  5- url-dns
Lecture 5- url-dns
 
Vp lecture 7 ararat
Vp lecture 7 araratVp lecture 7 ararat
Vp lecture 7 ararat
 
Lecture 4- ip
Lecture  4- ipLecture  4- ip
Lecture 4- ip
 
Vp lecture 6 ararat
Vp lecture 6 araratVp lecture 6 ararat
Vp lecture 6 ararat
 
Vp lecture 5 ararat
Vp lecture 5 araratVp lecture 5 ararat
Vp lecture 5 ararat
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Vp lecture 4 ararat
Vp lecture 4 araratVp lecture 4 ararat
Vp lecture 4 ararat
 
Vp lecture 3 ararat
Vp lecture 3 araratVp lecture 3 ararat
Vp lecture 3 ararat
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
 
Vp lecture 2 ararat
Vp lecture 2 araratVp lecture 2 ararat
Vp lecture 2 ararat
 
Vp lecture1 ararat
Vp lecture1 araratVp lecture1 ararat
Vp lecture1 ararat
 
Lecture 1- introduction
Lecture  1- introductionLecture  1- introduction
Lecture 1- introduction
 
Vs c# lecture12
Vs c# lecture12Vs c# lecture12
Vs c# lecture12
 
Vs c# lecture11
Vs c# lecture11Vs c# lecture11
Vs c# lecture11
 
Vs c# lecture10
Vs c# lecture10Vs c# lecture10
Vs c# lecture10
 

Recently uploaded

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Lecture 6- http

  • 1. Internet Technology Saman M. Almufti Lecture 6
  • 2.
  • 3. HTTP • HTTP stands for HyperText Transfer Protocol. • It is a protocol used in TCP/IP Application layer to access the data on the World Wide Web (www). • The HTTP protocol can be used to transfer the data in the form of (Multipurpose Internet Mail Extensions) MIME-like format such as plain text, hypertext, audio, video, and so on. • This protocol is known as HyperText Transfer Protocol because of its efficiency that allows us to use in a hypertext environment where there are rapid jumps from one document to another document.
  • 4. Features of HTTP • Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a request and waits for a response from the server. When the server receives the request, the server processes the request and sends back the response to the HTTP client after that the client disconnects the connection. The connection between client and server exist only during the current request and response time only. • Media independent: HTTP protocol is a media independent as data can be sent as long as both the client and server know how to handle the data content. It is required for both the client and server to specify the content type in MIME-type header. • Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current request. Due to this nature of the protocol, both the client and server do not retain the information between various requests of the web pages.
  • 5. HTTP Request / Response cycle 1.A client (a browser) sends an HTTP request to the web server 2.An web server receives the request 3.The server runs an application to process the request 4.The server returns an HTTP response (output) to the browser 5.The client (the browser) receives the response Communication between clients and servers is done by requests and responses: Request Response Request Response HTTP Request / Response cycle Client Server
  • 6. HTTP request /response to browse a website HTTP makes several request to browse a website 1.The browser requests an HTML page. The server returns an HTML file. 2.The browser requests a style sheet. The server returns a CSS file. 3.The browser requests an JPG image. The server returns a JPG file. 4.The browser requests JavaScript code. The server returns a JS file 5.The browser requests data. The server returns data (in XML or JSON). A website is made up of many different files, which are sored in a server or in varies servers. These files come in two main types: •Code files: Websites are built primarily from HTML, CSS, JavaScript, php,…etc. •Assets: This is a collective of all the other contents of website, such as images, music, video, Word documents,
  • 7. HTTP Request Requests consists of the following elements: • Method, HTTP methods like GET, POST, OPTIONS or HEAD that defines the operation the client wants to perform. • Path of the resource to fetch; the URL of the resource, for example without the protocol (http://), the domain (here, developer.mozilla.com). • Version of the HTTP protocol. • Optional headers that convey additional information for the servers. • Or a body, for some methods like POST, similar to those in responses, which contain the resource sent.
  • 8. HTTP Response Responses consist of the following elements: •The version of the HTTP protocol they follow. •A status code, indicating if the request was successful, or not, and why. •A status message, a non-authoritative short description of the status code. •HTTP headers, like those for requests. •Optionally, a body containing the fetched resource.
  • 9. Checking Http Information To check your site using the Developer tool, you will need to add the protocol column to the Network tab. To do this, open the Developer toolkit by hitting F12 or right clicking and inspect element in Chrome. Then navigate to the Network tab and right click on one of the headings, then click protocol in the drop down menu.
  • 10. HTTPS • HTTPS is Hypertext Transfer Protocol Secure. • The HTTP protocol does not provide the security of the data, while HTTPS ensures the security of the data. Therefore, we can say that HTTPS is a secure version of the HTTP protocol. • This protocol allows transferring the data in an encrypted form. The use of HTTPS protocol is mainly required where we need to enter the bank account details. The HTTPS protocol is mainly used where we require to enter the login credentials. In modern browsers such as chrome, both the protocols, i.e., HTTP and HTTPS, are marked differently. • To provide encryption, HTTPS uses an encryption protocol known as Transport Layer Security (TSL), and Secure Sockets Layer (SSL). This protocol uses a mechanism known as asymmetric public key infrastructure, and it uses two different keys which are given below: • Private key: This key is available on the web server, which is managed by the owner of a website. It decrypts the information which is encrypted by the public key. • Public key: This key is available to everyone. It converts the data into an encrypted form.
  • 11. HTTP VS HTTPS HTTP HTTPS The full form of HTTP is the Hypertext Transfer Protocol. The full form of HTTPS is Hypertext Transfer Protocol Secure. It is written in the address bar as http:// It is written in the address bar as https:// The HTTP transmits the data over port number 80. The HTTPS transmits the data over port number 443. It is unsecured as the plain text is sent, which can be accessible by the hackers. It is secure as it sends the encrypted data which hackers cannot understand. It is mainly used for those websites that provide information like blog writing. It is a secure protocol, so it is used for those websites that require to transmit the bank account details or credit card numbers. It does not use TSL and SSL. It uses TSL and SSL that provides the encryption of the data. Google does not give the preference to the HTTP websites. Google gives preferences to the HTTPS as HTTPS websites are secure websites. The page loading speed is fast. The page loading speed is slow as compared to HTTP because of the additional feature that it supports, i.e., security.
  • 13. • Transport Layer Security (TLS) • Secure Sockets Layer (SSL) • TLS/SSL Protocols adds a layer of security on top of the TCP/IP transport protocols. they uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection. • Are standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser, or a mail server and a mail client (e.g., Outlook).
  • 14. 2- TLS initiation 3-Server confirmation of protocol 1- TCP handshake 5-Shared key generation 4-Certificate verification 6-Server confirmation of shared key 7-Send secure data