Skip to main content

HTTP Definition (HyperText Transfer Protocol)

(HyperText Transfer Protocol).HTTP is a protocol used to access the Web (WWW).It is the basis for data communication in the WWW.

Hypertext is structured text that uses logical links (called hyperlinks) between nodes that contain text.HTTP is the protocol for exchanging or transferring hypertext.

HTTP is responsible for processing and responding to requests to view a web page.It also serves to send additional information such as sending forms with messages, etc.

After the transaction is finished, HTTP does not save any information about it, therefore it is considered a "stateless" protocol.To save the information between different requests , webmasters often use cookies or parameter steps.

The HTTP protocol generally uses port 80.

HTTP is based on the client-server model, where an HTTP client (a browser for example) opens a connection and make a sun The server responds to the request with a resource (text, graphics, etc.) or an error message, and finally the connection is closed.One of the most famous HTTP error messages is 404 Not found (not found).

The development of HTTP initiated by Tim Berners-Lee at CERN in 1989.The development of HTTP standards was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C ), culminating in the publication of the so-called RFC (Requests for Comments), are documents that describe various aspects of the operation of the Internet and other computer networks, such as protocols, procedures, etc.

The first definition was HTTP/1.1, published in RFC 2068 in 1997, and then replaced by RFC 2616 in 1999.

Its successor, HTTP/2, was published in May 2015, is currently supported by most web browsers and web servers.

In recent times, Google and other companies promote (and practically force) websites to switch to HTTPS technology.

General HTTP operation

In the client-server model, HTTP functions as a request-response protocol.The typical case is the web browser (it is the client on a computer) and the website that is hosted on a server.

The client sends an HTTP request (or request or request) message to the server.The server, which provides resources such as HTML files and other web content, returns a response message to the client.

This response contains information about the status of the request and may also have content in the message body.

HTTP messages are plain text which makes it more readable and easy to debug.This has the disadvantage of making longer messages.

The web browser is an example of a user agent (user agent or UA).Other types of user agent can be the web crawlers that use Internet search engines for indexing content, mobile apps and any other software that access or display web content.

HTTP is designed to allow intermediate network elements to improve or allow communications between clients and servers.For example, high traffic websites often benefit from cache servers that deliver content instead of the server to speed up response time.

Web browsers also cache web resources previously accessed for reuse them and thus load them faster, reducing network traffic.

HTTP is an application layer protocol designed within the framework of the Internet Protocol Suite (TCP/IP), where its definition implies a transport layer protocol (usually TCP).Although HTTP can be adapted for other protocols such as SSDP or UDP (in HTTPU for example).

HTTP resources are identified and located in a network using addresses URLs, using the http and https URI schemes

The URIs and hyperlinks in an HTML document form the interlinked hypertext documents.

HTTP/1.1 is a revision of the original version of HTTP (HTTP/1.0).In HTTP/1.0 a separate connection is made to the same server each time a resource is requested.In both HTTP/1.1 a connection can be reused multiple times to download images, scripts, CSS files, etc.after the html page has been delivered.Therefore, HTTP/1.1 communications experience less latency.

HTTP versions

-1991: HTTP version 0.9, only supports the GET command.Within the request itself The HTTP version is not specified, nor header.It also does not support the POST method.

-May 1996: HTTP/1.0, the HTTP version is specified in the request, allows GET, HEAD and POST methods.It is still used, usually on proxy servers.

-June 1999: HTTP/1.1, persistent connections were activated by default, working correctly with proxies.It allows the client to send multiple requests at once using the same connection (pipelining), allowing to reduce the latency (Round-Trip delay) of each request.It is the version most used today.

-2000: HTTP/1.2: the first drafts of this version were from 1995 where the Protocol Extension Protocol, abbreviated PEP, is proposed for HTTP.The W3C made them and was sent to the IETF.February 2000.

-May 2015: HTTP/2.Start writing in 2012.The basics continue unchanged from the previous version.The improvements are concentrated in the packaging of data and in the transport.For example, add the use of a single connection, compression of headers and also the server push service (form of communication in which the sending request originates from the server, as opposed to the pull technology, in which the request originates from the client).

RFC 2145 describes the use of HTTP version numbers.The client tells the server at the beginning of the request the version it uses, and the server uses the same or a previous one in your response.

HTTP response numerical codes

The web server responds to each request with a response code that can be:

-1xx: Informative answers, indicating that the request was received and is being processed.The most common is 100.

-2xx: Correct answers, where it indicates that the request was processed correctly.The typical is 200 (OK).

-3xx: Redirect responses, indicates that the client must perform more actions to finalize this request.

-4xx: Errors caused by the client, where it indicates that an error has occurred while the request was being processed probably because the client did something wrong, usually because the URL is incorrect, which is the most typical error, 404.Also the 403-Forbidden (prohibited) is usual.

-5xx: Errors caused by the server, this indicates that an error has occurred while processing the request due to a server failure.en 500-Internal Server Error.

Example of an HTTP dialog

HTTPS

HTTPS is a variant encrypted using SSL.

To more information see: HTTPS.

Google's change to HTTPS

Read: Why does Chrome now mention unsafe websites?


Network technologies and protocols *
Application level
DNS, FTP, HTTP, IMAP, IRC, NFS, NNTP, NTP, POP3, SMB/CIFS, SMTP, SNMP, SSH, Telnet, SIP...
Presentation level
ASN.1, MIME, SSL/TLS, XML...
Session level
NetBIOS...
Transport level
SCTP, SPX, TCP, UDP...
Network level
AppleTalk, IP, IPX, NetBEUI, X.25...
Link level
ATM, Ethernet, Frame Relay, HDLC, PPP, Token Ring, Wi-Fi, STP...
Physical level
Coaxial cable, fiber optic, twisted pair, microwave, radio, RS-232...
* Following the OSI model

Questions? needs more information?
Write and we will respond to your email

Comments

  1. Http Definition (Hypertext Transfer Protocol) >>>>> Download Now

    >>>>> Download Full

    Http Definition (Hypertext Transfer Protocol) >>>>> Download LINK

    >>>>> Download Now

    Http Definition (Hypertext Transfer Protocol) >>>>> Download Full

    >>>>> Download LINK zC

    ReplyDelete

Post a Comment

Popular posts from this blog

Definition of Macrocomputer (macrocomputer)

A macrocomputer is a large, powerful and expensive computer used primarily in companies that need to process large amounts of data or support large numbers of users.It contrasts with the concept of microcomputer (or microcomputer).Sometimes called macrocomputers. In English: mainframe and macrocomputer. For more information see: Mainframe What is a macrocomputer or mainframe? A large and powerful computer capable of managing a large number of simultaneous tasks and of communicating with a large number of connected terminals; used by large and complex organizations (such as banks and supermarkets) in which continuous operation is vital. Characteristics of macromputers Macrocomputers are a type of computer that are generally known Due to their large size, storage quantity, processing power and high level of reliability, they are mainly used by large organizations for critical mission applications that require large volumes of data processing.In general, there are some characte...

Definition of DPI or PPP (print quality)

(dots per inch, dots per inch).The DPI or PPP is a unit of measurement of the resolution of an image (related to quality) of a scanner, a printer, etc.It serves to measure the resolution, which is the amount of dots that enter an inch.It is expressed like this: (number) x (number) dpi. A resolution of 300 dpi will produce a text that will show broken lines visible under a magnifying glass.Even larger resolutions are necessary to obtain reproductions of smooth photographs.Professional graphics use printers with resolutions from 1200 to 2400 dpi. Pixels or resolution of a photo and printing in centimeters There is no direct equivalence between the pixels of a digital image and the centimeter of printing that correspond to it.A very small image can be printed very large on paper, but the pixels of the printed image will begin to be noticed at first glance.There are techniques to "enlarge" the digital image and soften it a bit the pixels, but these do not make ma ravillas. ...

Monoprogramming Definition

Monoprogramming, also called monoexecution, is an operating system in which only one program is executed at a time and no other is executed until the previous one is finished. In other words, only one program is executed at a time within a single address space. This type of execution practically does not exist anymore because it has been replaced by multiprogramming. Monoprogramming vs.multiprogramming In the monoprogramming, the memory only contains one program at any time, while in the multiprogramming the memory contains more than one user program. In the case of monoprogramming, when the CPU is running the program and it find an I/O operation (input-output), then the program goes to the I/O devices, during that time the CPU remains idle.Therefore, in the monogramming the CPU is not used effectively, that is, CPU utilization is poor. However, in the multiprog branch, when a user program contains I/O operations, the CPU changes to the next user program.Therefore, the CPU i...

Definition of Eset

Eset is a computer security company based in Bratislava, Slovakia. Eset was founded in 1992 as a result of the merger of two private companies.Its best-known product is the NOD32 antivirus, although it also develops Smart Security, which includes the NOD32 features in addition to firewall and antispam. Compete with other security companies such as Symantec and McAfee Questions? needs more information? Write and we will respond to your email

Network transparency definition

Network transparency refers to the ability of a protocol to transmit data over the network in a way that is transparent (invisible) to those who are using the applications that use the protocol.In this regard, users of a particular application they can access remote resources in the same way they would access their own local resources. An example of this is cloud storage, where remote files are presented as if they were locally accessible; also the cloud computing where the resource in question is the processing. From English: network transparency. X Windows The term is often applied partially correctly in the context of the X Windows system, which is capable of transmitting graphic data over the network and integrating it seamlessly with the applications that are running and displayed locally; however, certain extensions of the X Windows system are not able to work on the network. Firewall In firewall technology, transparency can be defined in the network layer ( or IP) or ...

Floppy disk drive definition

The floppy disk drive is a physical device or drive that is responsible for reading/writing to floppy disks.In English, floppy disk drive (FDD) or floppy disk drive. In IBM PCs, they are used to write or read on floppy disks.5 1/4 or 3 1/2 inches.They are usually represented with the A: or B units: They are removable storage devices. The floppy drives were invented by the IBM company, being the versions of 8, 5¼ and 3½ inches (and all its variants) the most popular forms for the storage and exchange of data from the mid-70s to the end of the 90s.Computers gradually stopped bringing floppy drives, being replaced by readers of optical disks (CDs, DVDs...), flash memories, external hard drives, etc. Operation of the floppy drives Basically the floppy drives have a small motor that rotates a floppy disk at a controlled speed, while a second engine operates a mechanism that moves a Magnetic read-write head on the surface thereof.Both read and write operations require the head to ph...

Definition of Cognitive Computing (CC)

Cognitive computing (CC) describes technology platforms that, in general terms, are based on the scientific disciplines of artificial intelligence and signal processing.These platforms cover machine learning, reasoning, natural language processing, voice recognition and vision (object recognition), man-machine interaction, dialogue and narrative generation, among other technologies. At present, there is no widely accepted definition of cognitive computing. In general, the term computation Cognitive has been used to refer to new hardware and/or software that mimics the functioning of the human brain and helps to improve people's decision-making.In this sense, CC is a new type of informatics with the aim of obtaining more models precise how the human brain/mind detects, reasons and responds to the stimulus. Uses of Cognitive Computing -Voice Recognition -Analis is of feelings -Face detection -Risk assessment -Fraud detection -Behavioral recommendations Characteristics of...

Google bomb definition

(Google bomb) In the internet jargon, Google bomb refers to a certain type of attempt to influence the ranking of a specific page, in a search result returned by the Google search engine, often with humorous or political intentions.p> A specific page can go up in the Google ranking, if a large number of external links (with certain keywords) are created to that page.The technique also has effects on other search engines, since they use similar methods of positioning pages. Google bombing is related to spamdexing, a set of practices to improve the position of a website in the search results of Internet search engines. Google announced on 25 January 2007, which had introduced the necessary changes to minimize the impact of Google bombs. Googlebomb cases The first popular case of Google bomb, with an unknown author, was when search for phrase "more evil than Satan himself "(worse than Satan himself) on Google, threw as a first result the page of Microsoft. One of the...

Web Proxy Definition

A web proxy is used to intercept the navigation of web pages for reasons of security, anonymity, performance, etc. A web proxy can be accessed by an IP address, free or paid, which is added to a browser (also There are proxy programs to avoid the configuration process.) When someone uses the browser, everything that is done in it first goes through the proxy first (the proxy server).That is, if a web page is requested the remote proxy will It is in charge of looking for it and sending it to our computer.In this intermediate step the proxy can be used to: * Anonymous browsing: if the proxy is configured in this way, anyone who navigates through that proxy will do so Anonymously, the destination pages will not be able to know the IP address (identification) of the computer you are browsing; they will only see the IP address of the proxy.If a proxy is not configured to be anonymous it is said to be transparent browsing. * Safe browsing: a proxy is responsible for filtering or alertin...