SlideShare uma empresa Scribd logo
1 de 25
 When

a web address (or URL- Uniform
Resource Locator) is typed into a web
browser, the web browser establishes a
connection to the web service running
on the server using HTTP.

 URLs

and URIs (uniform resource
identifiers) are the names most people
associate with web addresses.


The URL http://www.cisco.com/index.html refers to a
specific resource—a web page named index.html on
a server identified as cisco.com.



Web browsers are the client applications computers
use to connect to the World Wide Web and access
resources stored on a web server.



As with most server processes, the web server runs as
a background service and makes different types of
files available.
 To

access the content, web clients make
connections to the server and request the
desired resources.

 The

server replies with the resources and,
upon receipt, the browser interprets the data
and presents it to the user.

 Browsers

can interpret and present many
data types, such as plain text or HTML, the
language in which web pages are constructed.
 Other

types of data, however, might require
another service or program, typically referred
to as a plug-in or add-on.

 To

help the browser determine what type

of file it is receiving, the server specifies what
kind of data the file contains.
consider the URL http://www.cisco.com/webserver.htm.
First, the browser interprets the three parts of the
URL:


■ http: The protocol or scheme
■ www.cisco.com: The server name
■ web-server.htm: The specific filename requested


The browser then checks with a name server to
convert http://www.cisco.com into a numeric
address, which it uses to connect to the server.
 Using

the HTTP requirements, the browser
sends a GET request to the server and asks for
the file web-server.htm.

 The

server in turn sends the HTML code for
this web page to the browser.

 Finally, the

browser deciphers the HTML code
and formats the page for the browser
window.
 HTTP,

one of the protocols in the TCP/IP
suite, was originally developed to
publish and retrieve HTML pages and is now
used for distributed, collaborative
information systems.

 HTTP is

used across the world wide web for
data transfer and is one of the most used
application protocols.
 HTTP

specifies a request/response protocol.
When a client, typically a web browser, sends
a request message to a server, the HTTP
protocol defines the message types the client
uses to request the web page and the
message types the server uses to respond.
 GET

is a client request for data.

A

web browser sends the GET message to
request pages from a web server.



When the server receives the GET request, it
responds with a status line, such as HTTP/1.1
200 OK, and a message of its own, the body
of which can be the requested file, an error
message, or some other information.
 The

are:

three common message types

■ GET
■ POST
■ PUT
 POST

and PUT are used to send messages
that upload data to the web server.



For example, when the user enters data into
a form embedded in a web page, POST
includes the data in the message sent to the
server.

 PUT

uploads resources or content to the web
server.
Looks up phone book
for the number
Example
Could have been also
POST/phonebook.cgi.HTTP/1.0 achieved by Get
Date:
But in that case number
User-Agent:
would have been in the
Accept Language: en-us
Resource URL
Content Length: 14
Which would have been
98490 55266
stored in the log
 Although

it is remarkably flexible, HTTP is
not a secure protocol.

 The

POST messages upload information to
the server in plain text that can be
intercepted and read.

 Similarly, the

server responses, typically HTML
pages, are unencrypted.
 For

secure communication across the Internet,
the Secure HTTP (HTTPS) protocol is used for
accessing and posting web server information.
HTTPS can use authentication and

encryption to secure data as it travels
between the client and server.
 HTTPS

specifies additional rules for passing

data between the application layer and the
transport layer.
HTTP Protocol
Using GET
Accessing Resources over the Web



<protocol>://<server>/<path>

Communication Protocol
between the client and
the server

Defines the address
(Uniform Resource Locator)
Hypertext Transport Protocol
(HTTP) characteristics


Request-response mechanism:



Resource Identification



Statelessness



Meta data support

◦ Transaction is initiated by a client sending a request
to server
◦ Server generates a response
◦ Each HTTP request includes a URI (Uniform Resource
Identifier)
◦ The server does not maintain any information about the
transaction
◦ Metadata about information can be exchanged in the
messages
HTTP Request Format
Request Line
Header Lines

GET /index.html HTTP/1.0

Specifies
resource via URI
& meta data

Host: www.content-networking.com
Date: BBBBBBBBBBBB
User-Agent: Mozilla/5.0 (en) (WINNT; U)
Accept-Language: en-us

Carriage Return/Line
Feed

Message Body

Specifies
request
method

Content-length:
(Message Payload)
HTTP Response Format
Status line
Header Lines

HTTP/1.0 200 OK
Date: BBBBBBBBBBBB
Server: Apache/1.3.12 (Unix)
Last-Modified: (date)
Content Type: text/html

Carriage Return/Line Feed

Message Body

Content-length:
(Message Payload)

Status line
with result
code and
phrase

Specifies
server &
resource meta
data
Result Code and Phrase






1xx: Informational – Not Done Yet
2xx: Success – You win
3xx:Redirection-You lose but try again
4xx:Client Error – You lose, your fault
5xx:Server Error – You lose, my bad

200
204
300
301
302
304
400
401
404
500

OK
No Content
Multiple Choices
Moved Permanently
Moved Temporarily
Not Modified
Bad Request
Unauthorized
Not Found
Internal Server Error
Improvements in HTTP/1.1


Persistent connections
◦ Keeps the connection open after the server
response
◦ Connection can be closed by either client or server



Request Pipelining
◦ Allows a client to send several requests without
waiting for a response
◦ Server responds in the same order



Chunked Encoding
◦ Allows sender to break a message into arbitrary
sized chunks
◦ Useful for dynamically created response messages
Cookies
HTTP is stateless protocol
Cookies manage state maintenance by shifting the
burden to client
• Cookies are transmitted in clear text (security issue)
•
•

Server

Client
Usual HTTP Request
1st client
request

2nd
client
request

Usual HTTP Response,
including header line Setcookie: <cookie>
Usual HTTP Request,
including header line
Set-cookie: <cookie>
Usual HTTP Response

Client does
not interpret
the cookie
string
Server is
presented
with the
previously
returned state
information
User Authentication
• Users browser information remembers
credentials and includes them in headers
for subsequent requests
• Browser typically deletes stored
authentication credentials once browser is
closed
• HTTP allows various authentication
mechanisms
Group 2
 John

Gabriel Javier
 Jenica Salmorin
 Enrefie Abuela
 Marilou Villanueva

Mais conteúdo relacionado

Mais procurados

Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
nhepner
 

Mais procurados (20)

HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
Lecture-3: Introduction to html - Basic Structure & Block Building
Lecture-3: Introduction to html - Basic Structure & Block BuildingLecture-3: Introduction to html - Basic Structure & Block Building
Lecture-3: Introduction to html - Basic Structure & Block Building
 
WWW & HTTP
WWW & HTTPWWW & HTTP
WWW & HTTP
 
World wide web (WWW)
World wide web (WWW)World wide web (WWW)
World wide web (WWW)
 
How internet works
How internet worksHow internet works
How internet works
 
World wide web
World wide webWorld wide web
World wide web
 
Html1
Html1Html1
Html1
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and response
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
 
HTML (Web) basics for a beginner
HTML (Web) basics for a beginnerHTML (Web) basics for a beginner
HTML (Web) basics for a beginner
 
Laravel
LaravelLaravel
Laravel
 
web browser ppt
web browser pptweb browser ppt
web browser ppt
 
World Wide Web (WWW)
World Wide Web (WWW)World Wide Web (WWW)
World Wide Web (WWW)
 
Basic html structure
Basic html structureBasic html structure
Basic html structure
 
Web design - How the Web works?
Web design - How the Web works?Web design - How the Web works?
Web design - How the Web works?
 
URL
URLURL
URL
 
Advantages of java
Advantages of javaAdvantages of java
Advantages of java
 
Html basics
Html basicsHtml basics
Html basics
 
A History of PHP
A History of PHPA History of PHP
A History of PHP
 
Unit 1 introduction to web programming
Unit 1 introduction to web programmingUnit 1 introduction to web programming
Unit 1 introduction to web programming
 

Semelhante a www and http services

Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
Cathie101
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
Cathie101
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
Rajan Pandey
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
 
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
webhostingguy
 

Semelhante a www and http services (20)

Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
Webbasics
WebbasicsWebbasics
Webbasics
 
Http
HttpHttp
Http
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
 
Starting With Php
Starting With PhpStarting With Php
Starting With Php
 
Web technology
Web technologyWeb technology
Web technology
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Ch-1_.ppt
Ch-1_.pptCh-1_.ppt
Ch-1_.ppt
 
PHP Training: Module 1
PHP Training: Module 1PHP Training: Module 1
PHP Training: Module 1
 
HTTP
HTTPHTTP
HTTP
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Internet
InternetInternet
Internet
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Restful web services
Restful web servicesRestful web services
Restful web services
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

www and http services

  • 1.
  • 2.  When a web address (or URL- Uniform Resource Locator) is typed into a web browser, the web browser establishes a connection to the web service running on the server using HTTP.  URLs and URIs (uniform resource identifiers) are the names most people associate with web addresses.
  • 3.  The URL http://www.cisco.com/index.html refers to a specific resource—a web page named index.html on a server identified as cisco.com.  Web browsers are the client applications computers use to connect to the World Wide Web and access resources stored on a web server.  As with most server processes, the web server runs as a background service and makes different types of files available.
  • 4.  To access the content, web clients make connections to the server and request the desired resources.  The server replies with the resources and, upon receipt, the browser interprets the data and presents it to the user.  Browsers can interpret and present many data types, such as plain text or HTML, the language in which web pages are constructed.
  • 5.  Other types of data, however, might require another service or program, typically referred to as a plug-in or add-on.  To help the browser determine what type of file it is receiving, the server specifies what kind of data the file contains.
  • 6. consider the URL http://www.cisco.com/webserver.htm. First, the browser interprets the three parts of the URL:  ■ http: The protocol or scheme ■ www.cisco.com: The server name ■ web-server.htm: The specific filename requested  The browser then checks with a name server to convert http://www.cisco.com into a numeric address, which it uses to connect to the server.
  • 7.  Using the HTTP requirements, the browser sends a GET request to the server and asks for the file web-server.htm.  The server in turn sends the HTML code for this web page to the browser.  Finally, the browser deciphers the HTML code and formats the page for the browser window.
  • 8.  HTTP, one of the protocols in the TCP/IP suite, was originally developed to publish and retrieve HTML pages and is now used for distributed, collaborative information systems.  HTTP is used across the world wide web for data transfer and is one of the most used application protocols.
  • 9.  HTTP specifies a request/response protocol. When a client, typically a web browser, sends a request message to a server, the HTTP protocol defines the message types the client uses to request the web page and the message types the server uses to respond.
  • 10.  GET is a client request for data. A web browser sends the GET message to request pages from a web server.  When the server receives the GET request, it responds with a status line, such as HTTP/1.1 200 OK, and a message of its own, the body of which can be the requested file, an error message, or some other information.
  • 11.  The are: three common message types ■ GET ■ POST ■ PUT
  • 12.  POST and PUT are used to send messages that upload data to the web server.  For example, when the user enters data into a form embedded in a web page, POST includes the data in the message sent to the server.  PUT uploads resources or content to the web server.
  • 13. Looks up phone book for the number Example Could have been also POST/phonebook.cgi.HTTP/1.0 achieved by Get Date: But in that case number User-Agent: would have been in the Accept Language: en-us Resource URL Content Length: 14 Which would have been 98490 55266 stored in the log
  • 14.  Although it is remarkably flexible, HTTP is not a secure protocol.  The POST messages upload information to the server in plain text that can be intercepted and read.  Similarly, the server responses, typically HTML pages, are unencrypted.
  • 15.  For secure communication across the Internet, the Secure HTTP (HTTPS) protocol is used for accessing and posting web server information. HTTPS can use authentication and encryption to secure data as it travels between the client and server.  HTTPS specifies additional rules for passing data between the application layer and the transport layer.
  • 17. Accessing Resources over the Web  <protocol>://<server>/<path> Communication Protocol between the client and the server Defines the address (Uniform Resource Locator)
  • 18. Hypertext Transport Protocol (HTTP) characteristics  Request-response mechanism:  Resource Identification  Statelessness  Meta data support ◦ Transaction is initiated by a client sending a request to server ◦ Server generates a response ◦ Each HTTP request includes a URI (Uniform Resource Identifier) ◦ The server does not maintain any information about the transaction ◦ Metadata about information can be exchanged in the messages
  • 19. HTTP Request Format Request Line Header Lines GET /index.html HTTP/1.0 Specifies resource via URI & meta data Host: www.content-networking.com Date: BBBBBBBBBBBB User-Agent: Mozilla/5.0 (en) (WINNT; U) Accept-Language: en-us Carriage Return/Line Feed Message Body Specifies request method Content-length: (Message Payload)
  • 20. HTTP Response Format Status line Header Lines HTTP/1.0 200 OK Date: BBBBBBBBBBBB Server: Apache/1.3.12 (Unix) Last-Modified: (date) Content Type: text/html Carriage Return/Line Feed Message Body Content-length: (Message Payload) Status line with result code and phrase Specifies server & resource meta data
  • 21. Result Code and Phrase      1xx: Informational – Not Done Yet 2xx: Success – You win 3xx:Redirection-You lose but try again 4xx:Client Error – You lose, your fault 5xx:Server Error – You lose, my bad 200 204 300 301 302 304 400 401 404 500 OK No Content Multiple Choices Moved Permanently Moved Temporarily Not Modified Bad Request Unauthorized Not Found Internal Server Error
  • 22. Improvements in HTTP/1.1  Persistent connections ◦ Keeps the connection open after the server response ◦ Connection can be closed by either client or server  Request Pipelining ◦ Allows a client to send several requests without waiting for a response ◦ Server responds in the same order  Chunked Encoding ◦ Allows sender to break a message into arbitrary sized chunks ◦ Useful for dynamically created response messages
  • 23. Cookies HTTP is stateless protocol Cookies manage state maintenance by shifting the burden to client • Cookies are transmitted in clear text (security issue) • • Server Client Usual HTTP Request 1st client request 2nd client request Usual HTTP Response, including header line Setcookie: <cookie> Usual HTTP Request, including header line Set-cookie: <cookie> Usual HTTP Response Client does not interpret the cookie string Server is presented with the previously returned state information
  • 24. User Authentication • Users browser information remembers credentials and includes them in headers for subsequent requests • Browser typically deletes stored authentication credentials once browser is closed • HTTP allows various authentication mechanisms
  • 25. Group 2  John Gabriel Javier  Jenica Salmorin  Enrefie Abuela  Marilou Villanueva