SlideShare a Scribd company logo
 When

a web address (or URL- Uniform
Resource Locator) is typed into a web
browser, the web browser establishes a
connection to the web service running
on the server using HTTP.

 URLs

and URIs (uniform resource
identifiers) are the names most people
associate with web addresses.


The URL http://www.cisco.com/index.html refers to a
specific resource—a web page named index.html on
a server identified as cisco.com.



Web browsers are the client applications computers
use to connect to the World Wide Web and access
resources stored on a web server.



As with most server processes, the web server runs as
a background service and makes different types of
files available.
 To

access the content, web clients make
connections to the server and request the
desired resources.

 The

server replies with the resources and,
upon receipt, the browser interprets the data
and presents it to the user.

 Browsers

can interpret and present many
data types, such as plain text or HTML, the
language in which web pages are constructed.
 Other

types of data, however, might require
another service or program, typically referred
to as a plug-in or add-on.

 To

help the browser determine what type

of file it is receiving, the server specifies what
kind of data the file contains.
consider the URL http://www.cisco.com/webserver.htm.
First, the browser interprets the three parts of the
URL:


■ http: The protocol or scheme
■ www.cisco.com: The server name
■ web-server.htm: The specific filename requested


The browser then checks with a name server to
convert http://www.cisco.com into a numeric
address, which it uses to connect to the server.
 Using

the HTTP requirements, the browser
sends a GET request to the server and asks for
the file web-server.htm.

 The

server in turn sends the HTML code for
this web page to the browser.

 Finally, the

browser deciphers the HTML code
and formats the page for the browser
window.
 HTTP,

one of the protocols in the TCP/IP
suite, was originally developed to
publish and retrieve HTML pages and is now
used for distributed, collaborative
information systems.

 HTTP is

used across the world wide web for
data transfer and is one of the most used
application protocols.
 HTTP

specifies a request/response protocol.
When a client, typically a web browser, sends
a request message to a server, the HTTP
protocol defines the message types the client
uses to request the web page and the
message types the server uses to respond.
 GET

is a client request for data.

A

web browser sends the GET message to
request pages from a web server.



When the server receives the GET request, it
responds with a status line, such as HTTP/1.1
200 OK, and a message of its own, the body
of which can be the requested file, an error
message, or some other information.
 The

are:

three common message types

■ GET
■ POST
■ PUT
 POST

and PUT are used to send messages
that upload data to the web server.



For example, when the user enters data into
a form embedded in a web page, POST
includes the data in the message sent to the
server.

 PUT

uploads resources or content to the web
server.
Looks up phone book
for the number
Example
Could have been also
POST/phonebook.cgi.HTTP/1.0 achieved by Get
Date:
But in that case number
User-Agent:
would have been in the
Accept Language: en-us
Resource URL
Content Length: 14
Which would have been
98490 55266
stored in the log
 Although

it is remarkably flexible, HTTP is
not a secure protocol.

 The

POST messages upload information to
the server in plain text that can be
intercepted and read.

 Similarly, the

server responses, typically HTML
pages, are unencrypted.
 For

secure communication across the Internet,
the Secure HTTP (HTTPS) protocol is used for
accessing and posting web server information.
HTTPS can use authentication and

encryption to secure data as it travels
between the client and server.
 HTTPS

specifies additional rules for passing

data between the application layer and the
transport layer.
HTTP Protocol
Using GET
Accessing Resources over the Web



<protocol>://<server>/<path>

Communication Protocol
between the client and
the server

Defines the address
(Uniform Resource Locator)
Hypertext Transport Protocol
(HTTP) characteristics


Request-response mechanism:



Resource Identification



Statelessness



Meta data support

◦ Transaction is initiated by a client sending a request
to server
◦ Server generates a response
◦ Each HTTP request includes a URI (Uniform Resource
Identifier)
◦ The server does not maintain any information about the
transaction
◦ Metadata about information can be exchanged in the
messages
HTTP Request Format
Request Line
Header Lines

GET /index.html HTTP/1.0

Specifies
resource via URI
& meta data

Host: www.content-networking.com
Date: BBBBBBBBBBBB
User-Agent: Mozilla/5.0 (en) (WINNT; U)
Accept-Language: en-us

Carriage Return/Line
Feed

Message Body

Specifies
request
method

Content-length:
(Message Payload)
HTTP Response Format
Status line
Header Lines

HTTP/1.0 200 OK
Date: BBBBBBBBBBBB
Server: Apache/1.3.12 (Unix)
Last-Modified: (date)
Content Type: text/html

Carriage Return/Line Feed

Message Body

Content-length:
(Message Payload)

Status line
with result
code and
phrase

Specifies
server &
resource meta
data
Result Code and Phrase






1xx: Informational – Not Done Yet
2xx: Success – You win
3xx:Redirection-You lose but try again
4xx:Client Error – You lose, your fault
5xx:Server Error – You lose, my bad

200
204
300
301
302
304
400
401
404
500

OK
No Content
Multiple Choices
Moved Permanently
Moved Temporarily
Not Modified
Bad Request
Unauthorized
Not Found
Internal Server Error
Improvements in HTTP/1.1


Persistent connections
◦ Keeps the connection open after the server
response
◦ Connection can be closed by either client or server



Request Pipelining
◦ Allows a client to send several requests without
waiting for a response
◦ Server responds in the same order



Chunked Encoding
◦ Allows sender to break a message into arbitrary
sized chunks
◦ Useful for dynamically created response messages
Cookies
HTTP is stateless protocol
Cookies manage state maintenance by shifting the
burden to client
• Cookies are transmitted in clear text (security issue)
•
•

Server

Client
Usual HTTP Request
1st client
request

2nd
client
request

Usual HTTP Response,
including header line Setcookie: <cookie>
Usual HTTP Request,
including header line
Set-cookie: <cookie>
Usual HTTP Response

Client does
not interpret
the cookie
string
Server is
presented
with the
previously
returned state
information
User Authentication
• Users browser information remembers
credentials and includes them in headers
for subsequent requests
• Browser typically deletes stored
authentication credentials once browser is
closed
• HTTP allows various authentication
mechanisms
Group 2
 John

Gabriel Javier
 Jenica Salmorin
 Enrefie Abuela
 Marilou Villanueva

More Related Content

What's hot

Presentation on web browser
Presentation on web browserPresentation on web browser
Presentation on web browser
Swasat Dutta
 
what is www, website, internet, and URL
what is www, website, internet, and URL what is www, website, internet, and URL
what is www, website, internet, and URL
MuhammadSafiullah23
 
The World Wide Web Power Point
The World Wide Web Power PointThe World Wide Web Power Point
The World Wide Web Power Pointkaramfilova
 
Http
HttpHttp
Http Protocol
Http ProtocolHttp Protocol
Http Protocol
N R Z Malik
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
Vigneshkumar Ponnusamy
 
Advanced java
Advanced java Advanced java
Advanced java NA
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
Nuha Noor
 
Front end web development
Front end web developmentFront end web development
Front end web development
viveksewa
 
World wide web (WWW)
World wide web (WWW)World wide web (WWW)
World wide web (WWW)
Mishuk Hossan
 
Web server
Web serverWeb server
Web server
Sajan Sahu
 
introduction to web technology
introduction to web technologyintroduction to web technology
introduction to web technologyvikram singh
 
Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its Applications
Nayan Dagliya
 
History & Basic Structure of the Internet
History & Basic Structure of the InternetHistory & Basic Structure of the Internet
History & Basic Structure of the InternetVilla Santa Maria
 
Web technology
Web technologyWeb technology
Web technology
Edison Francis
 
HTML-(workshop)7557.pptx
HTML-(workshop)7557.pptxHTML-(workshop)7557.pptx
HTML-(workshop)7557.pptx
Raja980775
 

What's hot (20)

Presentation on web browser
Presentation on web browserPresentation on web browser
Presentation on web browser
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
what is www, website, internet, and URL
what is www, website, internet, and URL what is www, website, internet, and URL
what is www, website, internet, and URL
 
web server
web serverweb server
web server
 
URL
URLURL
URL
 
The World Wide Web Power Point
The World Wide Web Power PointThe World Wide Web Power Point
The World Wide Web Power Point
 
Http
HttpHttp
Http
 
Http Protocol
Http ProtocolHttp Protocol
Http Protocol
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Advanced java
Advanced java Advanced java
Advanced java
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
 
Front end web development
Front end web developmentFront end web development
Front end web development
 
World wide web (WWW)
World wide web (WWW)World wide web (WWW)
World wide web (WWW)
 
Web server
Web serverWeb server
Web server
 
introduction to web technology
introduction to web technologyintroduction to web technology
introduction to web technology
 
Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its Applications
 
Php mysql ppt
Php mysql pptPhp mysql ppt
Php mysql ppt
 
History & Basic Structure of the Internet
History & Basic Structure of the InternetHistory & Basic Structure of the Internet
History & Basic Structure of the Internet
 
Web technology
Web technologyWeb technology
Web technology
 
HTML-(workshop)7557.pptx
HTML-(workshop)7557.pptxHTML-(workshop)7557.pptx
HTML-(workshop)7557.pptx
 

Similar to www and http services

Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009Cathie101
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009Cathie101
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
Syed Ariful Islam Emon
 
Http
HttpHttp
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
VietAnhNguyen337355
 
Web technology
Web technologyWeb technology
Web technology
Anuj Singh Rajput
 
WWW & HTTP
WWW & HTTPWWW & HTTP
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
Abshar Fatima
 
Ch-1_.ppt
Ch-1_.pptCh-1_.ppt
Ch-1_.ppt
berihunmolla2
 
PHP Training: Module 1
PHP Training: Module 1PHP Training: Module 1
PHP Training: Module 1
hussulinux
 
HTTP
HTTPHTTP
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Internet
InternetInternet
Internet
manochitra10
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systemsReza Gh
 
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP Web Server Technologies I: HTTP
Web Server Technologies I: HTTP webhostingguy
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
Port80 Software
 

Similar to www and http services (20)

Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
Webbasics
WebbasicsWebbasics
Webbasics
 
Http
HttpHttp
Http
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
 
Starting With Php
Starting With PhpStarting With Php
Starting With Php
 
Web technology
Web technologyWeb technology
Web technology
 
WWW & HTTP
WWW & HTTPWWW & HTTP
WWW & HTTP
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Ch-1_.ppt
Ch-1_.pptCh-1_.ppt
Ch-1_.ppt
 
PHP Training: Module 1
PHP Training: Module 1PHP Training: Module 1
PHP Training: Module 1
 
HTTP
HTTPHTTP
HTTP
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Internet
InternetInternet
Internet
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Restful web services
Restful web servicesRestful web services
Restful web services
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

www and http services

  • 1.
  • 2.  When a web address (or URL- Uniform Resource Locator) is typed into a web browser, the web browser establishes a connection to the web service running on the server using HTTP.  URLs and URIs (uniform resource identifiers) are the names most people associate with web addresses.
  • 3.  The URL http://www.cisco.com/index.html refers to a specific resource—a web page named index.html on a server identified as cisco.com.  Web browsers are the client applications computers use to connect to the World Wide Web and access resources stored on a web server.  As with most server processes, the web server runs as a background service and makes different types of files available.
  • 4.  To access the content, web clients make connections to the server and request the desired resources.  The server replies with the resources and, upon receipt, the browser interprets the data and presents it to the user.  Browsers can interpret and present many data types, such as plain text or HTML, the language in which web pages are constructed.
  • 5.  Other types of data, however, might require another service or program, typically referred to as a plug-in or add-on.  To help the browser determine what type of file it is receiving, the server specifies what kind of data the file contains.
  • 6. consider the URL http://www.cisco.com/webserver.htm. First, the browser interprets the three parts of the URL:  ■ http: The protocol or scheme ■ www.cisco.com: The server name ■ web-server.htm: The specific filename requested  The browser then checks with a name server to convert http://www.cisco.com into a numeric address, which it uses to connect to the server.
  • 7.  Using the HTTP requirements, the browser sends a GET request to the server and asks for the file web-server.htm.  The server in turn sends the HTML code for this web page to the browser.  Finally, the browser deciphers the HTML code and formats the page for the browser window.
  • 8.  HTTP, one of the protocols in the TCP/IP suite, was originally developed to publish and retrieve HTML pages and is now used for distributed, collaborative information systems.  HTTP is used across the world wide web for data transfer and is one of the most used application protocols.
  • 9.  HTTP specifies a request/response protocol. When a client, typically a web browser, sends a request message to a server, the HTTP protocol defines the message types the client uses to request the web page and the message types the server uses to respond.
  • 10.  GET is a client request for data. A web browser sends the GET message to request pages from a web server.  When the server receives the GET request, it responds with a status line, such as HTTP/1.1 200 OK, and a message of its own, the body of which can be the requested file, an error message, or some other information.
  • 11.  The are: three common message types ■ GET ■ POST ■ PUT
  • 12.  POST and PUT are used to send messages that upload data to the web server.  For example, when the user enters data into a form embedded in a web page, POST includes the data in the message sent to the server.  PUT uploads resources or content to the web server.
  • 13. Looks up phone book for the number Example Could have been also POST/phonebook.cgi.HTTP/1.0 achieved by Get Date: But in that case number User-Agent: would have been in the Accept Language: en-us Resource URL Content Length: 14 Which would have been 98490 55266 stored in the log
  • 14.  Although it is remarkably flexible, HTTP is not a secure protocol.  The POST messages upload information to the server in plain text that can be intercepted and read.  Similarly, the server responses, typically HTML pages, are unencrypted.
  • 15.  For secure communication across the Internet, the Secure HTTP (HTTPS) protocol is used for accessing and posting web server information. HTTPS can use authentication and encryption to secure data as it travels between the client and server.  HTTPS specifies additional rules for passing data between the application layer and the transport layer.
  • 17. Accessing Resources over the Web  <protocol>://<server>/<path> Communication Protocol between the client and the server Defines the address (Uniform Resource Locator)
  • 18. Hypertext Transport Protocol (HTTP) characteristics  Request-response mechanism:  Resource Identification  Statelessness  Meta data support ◦ Transaction is initiated by a client sending a request to server ◦ Server generates a response ◦ Each HTTP request includes a URI (Uniform Resource Identifier) ◦ The server does not maintain any information about the transaction ◦ Metadata about information can be exchanged in the messages
  • 19. HTTP Request Format Request Line Header Lines GET /index.html HTTP/1.0 Specifies resource via URI & meta data Host: www.content-networking.com Date: BBBBBBBBBBBB User-Agent: Mozilla/5.0 (en) (WINNT; U) Accept-Language: en-us Carriage Return/Line Feed Message Body Specifies request method Content-length: (Message Payload)
  • 20. HTTP Response Format Status line Header Lines HTTP/1.0 200 OK Date: BBBBBBBBBBBB Server: Apache/1.3.12 (Unix) Last-Modified: (date) Content Type: text/html Carriage Return/Line Feed Message Body Content-length: (Message Payload) Status line with result code and phrase Specifies server & resource meta data
  • 21. Result Code and Phrase      1xx: Informational – Not Done Yet 2xx: Success – You win 3xx:Redirection-You lose but try again 4xx:Client Error – You lose, your fault 5xx:Server Error – You lose, my bad 200 204 300 301 302 304 400 401 404 500 OK No Content Multiple Choices Moved Permanently Moved Temporarily Not Modified Bad Request Unauthorized Not Found Internal Server Error
  • 22. Improvements in HTTP/1.1  Persistent connections ◦ Keeps the connection open after the server response ◦ Connection can be closed by either client or server  Request Pipelining ◦ Allows a client to send several requests without waiting for a response ◦ Server responds in the same order  Chunked Encoding ◦ Allows sender to break a message into arbitrary sized chunks ◦ Useful for dynamically created response messages
  • 23. Cookies HTTP is stateless protocol Cookies manage state maintenance by shifting the burden to client • Cookies are transmitted in clear text (security issue) • • Server Client Usual HTTP Request 1st client request 2nd client request Usual HTTP Response, including header line Setcookie: <cookie> Usual HTTP Request, including header line Set-cookie: <cookie> Usual HTTP Response Client does not interpret the cookie string Server is presented with the previously returned state information
  • 24. User Authentication • Users browser information remembers credentials and includes them in headers for subsequent requests • Browser typically deletes stored authentication credentials once browser is closed • HTTP allows various authentication mechanisms
  • 25. Group 2  John Gabriel Javier  Jenica Salmorin  Enrefie Abuela  Marilou Villanueva