1. HTTP protocolHyperText Transfer Protocol (HTTP) . Resources requested via HTTP or HTTPS are identified by Uniform Resource Identifiers (URIs). An HTTP client initiates a request and creates a TCP connection to a server-specified port (port 80 by default). The HTTP server listens for client requests on that port. Once a request is received, the server returns a status, such as "HTTP/1.1 200 OK", and the returned content, such as the requested file, error message, or other information. 2. URI and URL▐ 2.1 URIUniform Resource Identifier, Every resource available on the Web, such as HTML documents, images, video clips, programs, etc., is located using a URI; A URI generally consists of three parts:
▐ 2.2 URLUniform Resource Location, Uniform Resource Locator URL is a string used to describe information resources on the Internet, mainly used in various WWW client programs and server programs. URL is a type of URI. URL can be used to describe various information resources in a unified format, including files, server addresses and directories. URLs generally consist of three parts
▐ 2.3 URL composition
3. Types of RequestsThe HTTP protocol defines eight methods or "actions" to indicate different ways of operating the resource specified by the Request-URI. Just like operating a database or file system, designing network requests is the same. URLs are used to locate network resources, creating PUT, DELETE, POST, and GET to correspond to add, delete, modify, and query operations. However, get and post are commonly used in actual applications, and other request methods can also be indirectly implemented through these two methods. GETSend a "show" message to the specified resource. The GET method is only used to obtain data, and the data itself should not be changed, that is, the data should not be operated or submitted. POSTSubmit data to a specified resource and request the server to process it (for example, submit parameters/forms, or upload files). The data may be manipulated and submitted to create resources. PUTUpload the latest content to the specified resource location. DELETEAs the name suggests, it requests the server to delete the resource corresponding to the URI. HEADLike the GET method, it sends a request to the server for a specified resource. However, the server will not send back the text of the resource. The advantage is that this method can be used to obtain "information about the resource" (meta-information or metadata) without transmitting the entire content. TRACEEchoes requests received by the server, mainly used for testing or diagnosis. OPTIONSThis method allows the server to return all HTTP request methods supported by the resource. Substituting '*' for the resource name and sending an OPTIONS request to the web server can test whether the server function is working properly. CONNECTThe HTTP/1.1 protocol reserves the proxy server that can change the connection to a pipeline mode. It is usually used for the connection of SSL encrypted servers (via non-encrypted HTTP proxy servers). 4. Differences between GET and POST1. The parameter carrying position is different. The data submitted by GET will be appended to the URL (that is, the data is placed in the request line) and will be displayed in the address bar. The value is passed by ?=, and multiple parameters are connected by &. The data submitted by POST is placed in the HTTP package body and is not displayed in the address bar. 2. The transmission data size limit is different. Different browsers have restrictions on the length of URLs, so when submitting with GET, the transmitted data will be limited by the length of the URL. Since POST does not transmit values through the URL, theoretically there is no limit on the data. 3. POST is more secure than GET because the browser may store the request address as a history record. For a GET request login, others can directly obtain your account and password from the URL, while POST cannot obtain parameters. 5. HTTP request informationThe client sends an HTTP request to the service with the following format: The request line consists of four parts: request line, request header (header, often used to store token), blank line and request data. For example:
6. HTTP Response InformationThe server accepts the request and sends back a response message which also consists of four parts: Status line, message headers, a blank line, and the response body. For example:
7. HTTP Status CodesThe status code has three digits. The first digit indicates the current corresponding type. The types are:
Common status codes are as follows:
8. Summarize the complete process of an HTTP request
Events that occur when the browser enters the website:
The above is the complete summary of Http. This article is constantly improved and updated. |
<<: [Python Flask Practice] Get HTTP request data
As an engineer, you should often deal with interf...
As technology continues to evolve, SD-WAN (wide-a...
At the recent Global Terminal Summit, China Mobil...
Looking back at the whole year of 2018, the optic...
2021 is already halfway through, and China Radio ...
[51CTO.com original article] In the digital age, ...
[[423758]] On the morning of September 13, the St...
Connecting more and more data, applications and c...
In our daily development, we will more or less be...
Desktop cloud (also known as cloud desktop, deskt...
When talking about blockchain, everyone will ment...
HostKvm also released a promotional plan for the ...
[51CTO.com original article] On November 14, 2020...
As technology advances, the need for faster and m...
Speaking of 2017, Bitcoin has experienced several...