SlideShare a Scribd company logo
1 of 20
“Understanding our IIS”
Contents
   Web Server
   Kernel & User mode
   IIS and it's main components
   Different Modes of Operations
   Request Processing
   Take Away
Web Server
•   The primary function of a web server is to
    deliver web pages on requests from clients using
    HTTP.
•   It can be referred as hardware(computer) or the
    software (computer application)
•   Hosts websites/web application to serve www.
•   Found embedded in devices like printers,
    routers, web-cams to serve local network
•   Able to map URL to a local file system resource
    (static requests) as well as internal or external
    program name (dynamic requests)
Kernel & User Mode
•   The executing code      •   The executing code
    has complete and            has no ability to
    unrestricted access         directly access
    to the underlying           hardware or
    hardware.                   reference memory.
•   Kernel mode is          •   Code running in user
    generally reserved          mode must delegate
    for the lowest-level,       to system APIs to
    most trusted                access hardware or
    functions of the            memory.
    operating system.
Kernel & User Mode
•   Crashes in kernel      •   Crashes in user mode
    mode are                   are always
    catastrophic; they         recoverable.
    will halt the entire
    PC.
                           •   Comparatively slow
•   Usually work faster,       as they have to ask
    because, as part of        the system the
    the system, it can         permission to use
    directly use all the       more memory or
    hardware resources         more CPU resources.
    it needs.
IIS & it's main components
•   Designed to provide secure, scalable solutions for
    creating and managing www sites and servers
•   We can publish information on intranets,
    extranets and the internet
•   Provides FTP, SMTP, Indexing and other services
•   Components:
     –   HTTP.sys
     –   Worker processes (W3wp.exe)
     –   ISAPI
     –   InetInfo.exe
     –   Application pools
HTTP.sys
•   Also known as “HTTP Protocol Stack” or “Http
    Listener Process”
•   Implemented as a kernel-mode device driver
•   core component to receive and serve HTTP
    requests and passing them off to the worker
    processes
•   When you create a Web site, IIS registers the site
    with HTTP.sys
•   Other than retrieving a stored response from its
    internal cache, HTTP.sys does not process the
    requests that it receives.
W3wp.exe
•   A worker process is user-mode code whose role is
    to process requests, such as processing requests
    to return a static page
•   The worker process is controlled by the WWW
    service
•   A worker process runs as an executable file
    named W3wp.exe
•   Worker processes also run application code, such
    as ASP.NET applications and XML Web services.
ISAPI
•   Internet Server Application Programming
    Interface, is an API developed to provide the
    application developers with a powerful way to
    extend the functionality of IIS
•   Extensions and Filters are the two types of
    applications that can be developed using ISAPI
•   ISAPI extensions are true applications that run on
    IIS and have access to all of the functionality
    provided by IIS
ISAPI Application
Mapping are implemented as DLLs that
• ISAPI extensions
    are loaded into a process that is controlled by IIS
•   Like ASP and HTML pages, IIS uses the virtual
    location of the DLL file in the file system to map
    the ISAPI extension
•   ASP.Net functionality is contained in an ISAPI
    extension called aspnet_isapi.dll
•   Any file that is requested from the IIS server that
    ends in “.aspx” is mapped to aspnet_isapi.dll
    which is assigned to process the file before
    displaying its output in the client’s window
InetInfo.exe
•   A user-mode component that hosts the IIS
    metabase and that also hosts the non-Web
    services like the FTP, SMTP etc
•   Used to manage ISAPI applications that run
    within the IIS process context
•   The services that run in Inetinfo.exe run as
    dynamic-link libraries (DLLs) under the Local
    System account
•   In IIS5.0 or IIS6.0 runs in IIS5.0 isolation mode
    >Inetinfo.exe hosts the worker process
DLLHost.exe (IIS 5.0)
•   Manage out-of-process ISAPI applications
•   Any pooled ISAPI applications running on the
    server run within the context of a single instance
    of DLLHost.exe
•   The dllhost.exe process goes by the name COM
    Surrogate, which is an general purpose
    executable to host dlls out of process
•   In case of any unhandled error which may crash
    the COM Surrogate process, leaves the
    originating process intact.
Application Pools (IIS
             6.0)
•   Group of Web Applications and Web Sites are
    called Application Pools
•   Every application within an application pool
    shares the same worker process
•   The worker process(w3wp.exe) that services one
    application pool is separated from the worker
    process that services another
•   Each separate worker process provides a process
    boundary so each application pool is separated
    by these process boundaries
IIS Different Modes of
           Operations
•   IIS 5.0 isolation mode
(InetInfo.exe or DLLHost.exe takes the ownership for
     request processing)

•   IIS 6.0 worker process isolation mode
(worker process W3wp.exe takes the ownership for
    request processing)
IIS 5.0 Isolation Mode
file:///C:/Documents and Settings/Admin/My Documents/My Pictures/iis5_isolation_mode.jpg
Request Processing
•   A request arrives. If the requested application is running in-
    process, then Inetinfo.exe takes the request. If not, then
    DLLHost.exe takes the request.
•   Inetinfo.exe or DLLHost.exe determines if the request is valid.
    If the request is not valid, it sends a code for an invalid request
    back to the client.
•   If the request is valid, Inetinfo.exe or DLLHost.exe checks to
    see if the response is located in the IIS cache.
•   If the response is in the cache, it is returned immediately.
•   If the response is not cached, Inetinfo.exe or DLLHost.exe
    processes the request, by evaluating the URL to determine if
    the request is for static (HTML), or dynamic content (ASP)
•   The response is sent back to the client and the request is
    logged, if IIS is configured to do so.
IIS 6.0 Isolation Mode
file:///C:/Documents and Settings/Admin/My Documents/My Pictures/iis6_isolation_Mode.jpg
Request Processing
•   A request arrives at HTTP.sys.
•   HTTP.sys determines if the request is valid. If the request is not
    valid, it sends a code for an invalid request back to the client.
•   If the request is valid, HTTP.sys checks to see if the request is
    for static content (HTML) because static content can be served
    immediately.
•   If the request is for dynamic content, HTTP.sys checks to see if
    the response is located in its “kernel-mode cache”.
•   If the response is in the cache, HTTP.sys returns the response
    immediately.
•   If the response is not cached, HTTP.sys determines the correct
    “request queue”, and places the request in that queue.
Request
Processing(contd.)
•   If the queue has no worker processes assigned to it, HTTP.sys
    signals the WWW service to start one.
•   The worker process pulls the request from the queue and
    processes the request, evaluating the URL to determine the
    type of request (ASP, ISAPI, or CGI).
•   The worker process sends the response back to HTTP.sys.
•   HTTP.sys sends the response back to the client and logs the
    request, if configured to do so.
Take Away

More Related Content

What's hot

introasp_net-7364068.ppt
introasp_net-7364068.pptintroasp_net-7364068.ppt
introasp_net-7364068.ppt
IQM123
 
introaspnet-3030384.ppt
introaspnet-3030384.pptintroaspnet-3030384.ppt
introaspnet-3030384.ppt
IQM123
 

What's hot (18)

Understanding IIS
Understanding IISUnderstanding IIS
Understanding IIS
 
Build sites on iis
Build sites on iisBuild sites on iis
Build sites on iis
 
Codeigniter framework
Codeigniter framework Codeigniter framework
Codeigniter framework
 
IIS7 For Non IIS PFEs
IIS7 For Non IIS PFEsIIS7 For Non IIS PFEs
IIS7 For Non IIS PFEs
 
introasp_net-7364068.ppt
introasp_net-7364068.pptintroasp_net-7364068.ppt
introasp_net-7364068.ppt
 
CNIT 129S: 10: Attacking Back-End Components
CNIT 129S: 10: Attacking Back-End ComponentsCNIT 129S: 10: Attacking Back-End Components
CNIT 129S: 10: Attacking Back-End Components
 
introaspnet-3030384.ppt
introaspnet-3030384.pptintroaspnet-3030384.ppt
introaspnet-3030384.ppt
 
WebLogic on ODA - Oracle Open World 2013
WebLogic on ODA - Oracle Open World 2013WebLogic on ODA - Oracle Open World 2013
WebLogic on ODA - Oracle Open World 2013
 
IIS 7.0 Architecture And Integration With Asp.Net
IIS 7.0 Architecture And Integration With Asp.NetIIS 7.0 Architecture And Integration With Asp.Net
IIS 7.0 Architecture And Integration With Asp.Net
 
Apex world 2018 continuously delivering APEX
Apex world 2018 continuously delivering APEXApex world 2018 continuously delivering APEX
Apex world 2018 continuously delivering APEX
 
Laravel and CodeIgniter: pros & cons
Laravel and CodeIgniter: pros & consLaravel and CodeIgniter: pros & cons
Laravel and CodeIgniter: pros & cons
 
Web303
Web303Web303
Web303
 
High Volume Payments using Mule
High Volume Payments using MuleHigh Volume Payments using Mule
High Volume Payments using Mule
 
Operational Security 3.7
Operational Security 3.7Operational Security 3.7
Operational Security 3.7
 
Iis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.comIis it-slideshares.blogspot.com
Iis it-slideshares.blogspot.com
 
Restful风格ž„web服务架构
Restful风格ž„web服务架构Restful风格ž„web服务架构
Restful风格ž„web服务架构
 
From VMs to Containers: Introducing Docker Containers for Linux and Windows S...
From VMs to Containers: Introducing Docker Containers for Linux and Windows S...From VMs to Containers: Introducing Docker Containers for Linux and Windows S...
From VMs to Containers: Introducing Docker Containers for Linux and Windows S...
 
IBM InterConnect 2015 - IIB in the Cloud
IBM InterConnect 2015 - IIB in the CloudIBM InterConnect 2015 - IIB in the Cloud
IBM InterConnect 2015 - IIB in the Cloud
 

Similar to Understandingiis 120715123909-phpapp01

Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
Denis Gundarev
 
06.m3 cms set-upwebserver
06.m3 cms set-upwebserver06.m3 cms set-upwebserver
06.m3 cms set-upwebserver
tarensi
 
Application hardening
Application hardeningApplication hardening
Application hardening
Jayesh Naik
 

Similar to Understandingiis 120715123909-phpapp01 (20)

Web Server Hardening
Web Server HardeningWeb Server Hardening
Web Server Hardening
 
10 tips to make your ASP.NET Apps Faster
10 tips to make your ASP.NET Apps Faster10 tips to make your ASP.NET Apps Faster
10 tips to make your ASP.NET Apps Faster
 
Windows internals
Windows internalsWindows internals
Windows internals
 
Add a web server
Add a web serverAdd a web server
Add a web server
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
 
AAI-2016 WebSphere Application Server Installation and Maintenance in the Ent...
AAI-2016 WebSphere Application Server Installation and Maintenance in the Ent...AAI-2016 WebSphere Application Server Installation and Maintenance in the Ent...
AAI-2016 WebSphere Application Server Installation and Maintenance in the Ent...
 
Debugging the Web with Fiddler
Debugging the Web with FiddlerDebugging the Web with Fiddler
Debugging the Web with Fiddler
 
SharePoint Saturday San Antonio: SharePoint 2010 Performance
SharePoint Saturday San Antonio: SharePoint 2010 PerformanceSharePoint Saturday San Antonio: SharePoint 2010 Performance
SharePoint Saturday San Antonio: SharePoint 2010 Performance
 
IIS request process
IIS request processIIS request process
IIS request process
 
06.m3 cms set-upwebserver
06.m3 cms set-upwebserver06.m3 cms set-upwebserver
06.m3 cms set-upwebserver
 
SharePoint 2013 - What's New
SharePoint 2013 - What's NewSharePoint 2013 - What's New
SharePoint 2013 - What's New
 
Network Implementation and Support Lesson 13 Web Resouces
Network Implementation and Support Lesson 13   Web ResoucesNetwork Implementation and Support Lesson 13   Web Resouces
Network Implementation and Support Lesson 13 Web Resouces
 
Web server
Web serverWeb server
Web server
 
SharePoint Saturday The Conference 2011 - SP2010 Performance
SharePoint Saturday The Conference 2011 - SP2010 PerformanceSharePoint Saturday The Conference 2011 - SP2010 Performance
SharePoint Saturday The Conference 2011 - SP2010 Performance
 
How to Harden the Security of Your .NET Website
How to Harden the Security of Your .NET WebsiteHow to Harden the Security of Your .NET Website
How to Harden the Security of Your .NET Website
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
12 Factor App Methodology
12 Factor App Methodology12 Factor App Methodology
12 Factor App Methodology
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Understandingiis 120715123909-phpapp01

  • 2. Contents  Web Server  Kernel & User mode  IIS and it's main components  Different Modes of Operations  Request Processing  Take Away
  • 3. Web Server • The primary function of a web server is to deliver web pages on requests from clients using HTTP. • It can be referred as hardware(computer) or the software (computer application) • Hosts websites/web application to serve www. • Found embedded in devices like printers, routers, web-cams to serve local network • Able to map URL to a local file system resource (static requests) as well as internal or external program name (dynamic requests)
  • 4. Kernel & User Mode • The executing code • The executing code has complete and has no ability to unrestricted access directly access to the underlying hardware or hardware. reference memory. • Kernel mode is • Code running in user generally reserved mode must delegate for the lowest-level, to system APIs to most trusted access hardware or functions of the memory. operating system.
  • 5. Kernel & User Mode • Crashes in kernel • Crashes in user mode mode are are always catastrophic; they recoverable. will halt the entire PC. • Comparatively slow • Usually work faster, as they have to ask because, as part of the system the the system, it can permission to use directly use all the more memory or hardware resources more CPU resources. it needs.
  • 6. IIS & it's main components • Designed to provide secure, scalable solutions for creating and managing www sites and servers • We can publish information on intranets, extranets and the internet • Provides FTP, SMTP, Indexing and other services • Components: – HTTP.sys – Worker processes (W3wp.exe) – ISAPI – InetInfo.exe – Application pools
  • 7. HTTP.sys • Also known as “HTTP Protocol Stack” or “Http Listener Process” • Implemented as a kernel-mode device driver • core component to receive and serve HTTP requests and passing them off to the worker processes • When you create a Web site, IIS registers the site with HTTP.sys • Other than retrieving a stored response from its internal cache, HTTP.sys does not process the requests that it receives.
  • 8. W3wp.exe • A worker process is user-mode code whose role is to process requests, such as processing requests to return a static page • The worker process is controlled by the WWW service • A worker process runs as an executable file named W3wp.exe • Worker processes also run application code, such as ASP.NET applications and XML Web services.
  • 9. ISAPI • Internet Server Application Programming Interface, is an API developed to provide the application developers with a powerful way to extend the functionality of IIS • Extensions and Filters are the two types of applications that can be developed using ISAPI • ISAPI extensions are true applications that run on IIS and have access to all of the functionality provided by IIS
  • 10. ISAPI Application Mapping are implemented as DLLs that • ISAPI extensions are loaded into a process that is controlled by IIS • Like ASP and HTML pages, IIS uses the virtual location of the DLL file in the file system to map the ISAPI extension • ASP.Net functionality is contained in an ISAPI extension called aspnet_isapi.dll • Any file that is requested from the IIS server that ends in “.aspx” is mapped to aspnet_isapi.dll which is assigned to process the file before displaying its output in the client’s window
  • 11. InetInfo.exe • A user-mode component that hosts the IIS metabase and that also hosts the non-Web services like the FTP, SMTP etc • Used to manage ISAPI applications that run within the IIS process context • The services that run in Inetinfo.exe run as dynamic-link libraries (DLLs) under the Local System account • In IIS5.0 or IIS6.0 runs in IIS5.0 isolation mode >Inetinfo.exe hosts the worker process
  • 12. DLLHost.exe (IIS 5.0) • Manage out-of-process ISAPI applications • Any pooled ISAPI applications running on the server run within the context of a single instance of DLLHost.exe • The dllhost.exe process goes by the name COM Surrogate, which is an general purpose executable to host dlls out of process • In case of any unhandled error which may crash the COM Surrogate process, leaves the originating process intact.
  • 13. Application Pools (IIS 6.0) • Group of Web Applications and Web Sites are called Application Pools • Every application within an application pool shares the same worker process • The worker process(w3wp.exe) that services one application pool is separated from the worker process that services another • Each separate worker process provides a process boundary so each application pool is separated by these process boundaries
  • 14. IIS Different Modes of Operations • IIS 5.0 isolation mode (InetInfo.exe or DLLHost.exe takes the ownership for request processing) • IIS 6.0 worker process isolation mode (worker process W3wp.exe takes the ownership for request processing)
  • 15. IIS 5.0 Isolation Mode file:///C:/Documents and Settings/Admin/My Documents/My Pictures/iis5_isolation_mode.jpg
  • 16. Request Processing • A request arrives. If the requested application is running in- process, then Inetinfo.exe takes the request. If not, then DLLHost.exe takes the request. • Inetinfo.exe or DLLHost.exe determines if the request is valid. If the request is not valid, it sends a code for an invalid request back to the client. • If the request is valid, Inetinfo.exe or DLLHost.exe checks to see if the response is located in the IIS cache. • If the response is in the cache, it is returned immediately. • If the response is not cached, Inetinfo.exe or DLLHost.exe processes the request, by evaluating the URL to determine if the request is for static (HTML), or dynamic content (ASP) • The response is sent back to the client and the request is logged, if IIS is configured to do so.
  • 17. IIS 6.0 Isolation Mode file:///C:/Documents and Settings/Admin/My Documents/My Pictures/iis6_isolation_Mode.jpg
  • 18. Request Processing • A request arrives at HTTP.sys. • HTTP.sys determines if the request is valid. If the request is not valid, it sends a code for an invalid request back to the client. • If the request is valid, HTTP.sys checks to see if the request is for static content (HTML) because static content can be served immediately. • If the request is for dynamic content, HTTP.sys checks to see if the response is located in its “kernel-mode cache”. • If the response is in the cache, HTTP.sys returns the response immediately. • If the response is not cached, HTTP.sys determines the correct “request queue”, and places the request in that queue.
  • 19. Request Processing(contd.) • If the queue has no worker processes assigned to it, HTTP.sys signals the WWW service to start one. • The worker process pulls the request from the queue and processes the request, evaluating the URL to determine the type of request (ASP, ISAPI, or CGI). • The worker process sends the response back to HTTP.sys. • HTTP.sys sends the response back to the client and logs the request, if configured to do so.