When you enter a web address or uniform resource locator (URL) into a web browser, the web browser establishes a connection to the web service on the server through the HTTP protocol. URL and uniform resource identifier (URI) are the names most people associate with web addresses. The http://www.cisco.com/index.html URL is an example of a URL that points to a specific resource; a web page named index.html on a server identified as cisco.com. Click on each figure to see the steps used by HTTP. A web browser is a type of client application used by computers to connect to the World Wide Web and access resources stored on a web server. Like most server processes, a web server runs as a background service and supports different types of files. The web client first connects to the server and then sends a resource request to access the required resource content. The server responds to the resource request. The browser interprets the received resource and presents the interpreted data to the user. Browsers can interpret and display many types of data, such as plain text or the hypertext markup language used to build web pages. However, other types of data require the support of other services or programs, which we often call plug-ins. In order for the browser to identify the type of file it is accepting, the server should specify the type of data contained in the file. In order to better understand the interaction principle between web browsers and web clients, we can study how browsers open web pages. In this example, use the http://www.cisco.com/index.html URL. First, as shown in Figure 1, the browser analyzes the three components of the URL address:
Then, as shown in Figure 2, the browser will convert www.cisco.com into a numeric address through the domain name server and use it to connect to the server. According to the requirements of the HTTP protocol, the browser sends a GET request to the server and requests the index.html file. The server, as shown in Figure 3, sends the HTML code of the web page to the browser. Finally, as shown in Figure 4, the browser decrypts the HTML code and formats the page for the browser window. HTTP is a data transmission protocol in the World Wide Web. It is also the most commonly used application protocol today. It was originally developed just for publishing and retrieving HTML pages; however, the flexibility of HTTP makes it a vital application in distributed, collaborative information systems. HTTP is a request/response protocol. When a client, especially a web browser, sends a request to a web server, HTTP specifies the message type used for the communication. The three commonly used message types include GET, POST, and PUT (as shown in the figure). GET is a client data request message. The client (web browser) sends a GET message to a web server to request an HTML page. When the server receives a GET request, it responds with a status line (such as HTTP/1.1 200 OK) and a message of its own. The message from the server may contain the requested HTML file (if it exists), or it may contain an error or informational message, such as "The location of the requested file has changed." POST and PUT messages are used to upload data files to a web server. For example, when a user enters data into a form embedded in a web page (such as when completing a command request), a POST message is sent to the web server. The POST message contains the data submitted by the user in the form. PUT is used to upload resources or content to a web server. For example, if a user attempts to upload a file or image to a website, a PUT message with the file or image attached will be sent from the client to the server. Although HTTP is quite flexible, it is not a secure protocol. Since messages are sent to the server in plain text, they are very easy to intercept and interpret. Similarly, the server's response (usually an HTML page) is not encrypted. For secure communication on the Internet, people use the Hypertext Transfer Protocol Secure (HTTPS) protocol to access or publish web server information. HTTPS protects data with authentication and encryption, allowing data to be securely transmitted between the client and the server. Additional rules for data communication between the application layer and the transport layer are specified in HTTPS. HTTPS uses the same client request and server response process as HTTP, but uses Secure Sockets Layer (SSL) encryption before the data stream is transmitted over the network. HTTPS generates additional load and processing time on the server because of the encryption and decryption of the traffic. |
<<: What to do if the HTTPS certificate is forged?
>>: Will remote work boost unified communications interoperability?
[[312203]] 1. Preface When we talk about the TCP ...
Virtualization technology is being used more and ...
In "TCP/IP Basics: Data Encapsulation",...
1. SPI driver source file directory Linux common ...
Britain said on the 8th that it will gradually ph...
80VPS is an early established Chinese hosting com...
[[353891]] Today, the number of IoT devices is gr...
At the IoT Partner Program Conference 2017 (ICA) ...
[[442556]] Traefik has implemented a lot of middl...
[[424098]] In recent years, with the advent of a ...
Hello everyone, I am Bernie, an IT pre-sales engi...
Author: Han Binjie and Liu Hongxing, unit: Hebei ...
[51CTO.com original article] If we were to select...
As more and more people use the internet, the amo...