SlideShare a Scribd company logo
Hyper Text Transfer Protocol (HTTP) Objective: Understand HTTP (the protocol that makes the Internet possible)
Accessing Resources over the Web <protocol>://<server>/<path> Defines the address (Uniform Resource Locator) Communication Protocol between the client and the server
Hypertext Transport Protocol (HTTP) characteristics Request-response mechanism: Transaction is initiated by a client sending a  request  to server  Server generates a  response   Resource Identification Each HTTP request includes a URI (Uniform Resource Identifier) Statelessness The server does not maintain any information about the transaction  Meta data support  Metadata about information can be exchanged in the messages
HTTP Request Format GET /index.html HTTP/1.0 Request Line Host:  www.content-networking.com Date: BBBBBBBBBBBB User-Agent: Mozilla/5.0 (en) (WINNT; U) Accept-Language: en-us  Header Lines  Carriage Return/Line Feed Specifies request method Specifies resource via URI  & meta data Message Body Content-length:  (Message Payload)
Request Methods GET  whatever information is  identified by the Reuest-URI Can Get static content  and  data produced by a program POST Submit information to Web Server Eg: posting to blog, submission of user form… Information is included in message body  The actual function depends on request URI  Example POST/phonebook.cgi.HTTP/1.0 Date: User-Agent: Accept Language: en-us Content Length: 14 98490 55266  Looks up phone book for the number  Could have been also achieved by Get  But in that case number would have been in the Resource URL  Which would have been stored in the log
Request Methods…contd (ii) HEAD Servers response does not include message body  Useful for getting resource metadata without transferring the resource  Also useful for debugging , checking for validity, accessibility and modification PUT Requests a server store the enclosed data under the supplied Request URL. Creates the resource if it does not create  Not useful for web publishing (FTP is preferred for security purposes) DELETE Removes the Web object  Needs to be carefully used for security reasons
Request Methods…contd (iii) TRACE method Invokes a remote appliction layer feedback of the request message Useful for testing what is being received at the server  Also possible to forward to intermediaries for debugging purposes OPTIONS Requests information about communication options available to server
HTTP Response Format HTTP/1.0  200 OK  Status line Date: BBBBBBBBBBBB Server: Apache/1.3.12 (Unix) Last-Modified:  (date) Content Type: text/html Header Lines  Carriage Return/Line Feed Status line with result code and phrase Specifies server & resource meta data Message Body Content-length:  (Message Payload)
Result Code and Phrase 1xx: Informational – Not Done Yet 2xx: Success – You win 3xx:Redirection-You lose but try again 4xx:Client Error – You lose, your fault 5xx:Server Error – You lose, my bad  200 OK  204 No Content 300 Mutiple Choices 301 Moved Permanently  302 Moved Temporarily 304 Not Modified  400 Bad Request  401 Unauthorized 404 Not Found 500 Internal Server Error
Improvements in HTTP/1.1 Persistent connections Keeps the connection open after the server response  Connection can be closed by either client or server  Request Pipelining  Allows a client to send several requests without waiting for a response Server responds in the same order  Chunked Encoding  Allows sender to break a message into arbitrary  sized chunks  Useful for dynamically created response messages
Cookies HTTP is stateless protocol  Cookies manage state maintenance by shifting the burden to client Cookies are transmitted in clear text (security issue) Client Server Usual HTTP Request Usual HTTP Response, including header line Set-cookie: <cookie> 1 st  client request Usual HTTP Request, including header line Set-cookie: <cookie> Usual HTTP Response 2nd client request Client does not interpret the cookie string  Server is presented with the previously returned state information
User Authentication Users browser information remembers credentials and includes them in headers for subsequent requests Browser typically deletes stored authentication credentials once browser is closed HTTP allows various authentication mechanis ms  Client Server Usual HTTP Request HTTP Response with code 401, including header line www-authenticate: <string1> Same HTTP Request, including header line Authorization: <string2> Usual HTTP Response 1 st  client request User inputs credentials  Usual HTTP Request, including header line Authorization: <string2> Usual HTTP Response 2ndclient request
SSL: Secure Web Communications SSL protocol is application independent  Operates between application layer and transport layer Application protocols such as HTTP sit on top of it and TCP/IP beneath it SSL provides:
How SSL Works The Public Key is a random number generated in pair (the other part of the pair is the private key known only to the server)  Data encrypted by the public key can be decrypted only by using the private key  Client Server HTTPS Request SSL Certificate with the Public Key of the Server Sends Session Key encrypted with the Server Public Key Response/Request encrypted with session key Generates a random number or session key which can be encrypted using the server public key Decrypted using the Server Private Key
Ensuring SSL version compatibility There are different versions of SSL depending on the encryption algorithm used.  The browser sends the versions it supports The server sends the certificate. The certificate includes:  The identity of the organization to which the web server belongs  The certificate’s expiration date  The public key  The identity of the organization that issued the certificate, known as a certification authority (CA)  Browsers store and recognize certificates issued by a number of well-known CAs.
What it does and what it does not What It Does What it Does Not Data encryption  Server authentication  Message integrity  Optional client authentication  SSL does not protect the data stored on the disk.  Information getting stolen through pages cached on the browser Stealing confidential information from the browser memory. Since in SSL data is encrypted only during transmission on the network, it is in clear text in the browser memory
Ad

More Related Content

What's hot (20)

Http
HttpHttp
Http
Luavis Kang
 
Http protocol
Http protocolHttp protocol
Http protocol
Arpita Naik
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
Raed Aldahdooh
 
Http-protocol
Http-protocolHttp-protocol
Http-protocol
Toushik Paul
 
Http Protocol
Http ProtocolHttp Protocol
Http Protocol
N R Z Malik
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
Shubham Srivastava
 
HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
Lana Dujanovic
 
Restful web services ppt
Restful web services pptRestful web services ppt
Restful web services ppt
OECLIB Odisha Electronics Control Library
 
REST & RESTful Web Services
REST & RESTful Web ServicesREST & RESTful Web Services
REST & RESTful Web Services
Halil Burak Cetinkaya
 
HTTP Request and Response Structure
HTTP Request and Response StructureHTTP Request and Response Structure
HTTP Request and Response Structure
BhagyashreeGajera1
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and response
Sahil Agarwal
 
Introduction to REST - API
Introduction to REST - APIIntroduction to REST - API
Introduction to REST - API
Chetan Gadodia
 
SOAP vs REST
SOAP vs RESTSOAP vs REST
SOAP vs REST
Mário Almeida
 
HTTP Request Header and HTTP Status Code
HTTP Request Header and HTTP Status CodeHTTP Request Header and HTTP Status Code
HTTP Request Header and HTTP Status Code
Abhishek L.R
 
Http
HttpHttp
Http
NITT, KAMK
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
Nuha Noor
 
Introduction To REST
Introduction To RESTIntroduction To REST
Introduction To REST
Bhavya Siddappa
 
Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its Applications
Nayan Dagliya
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal
 
HTTP Request and Response Structure
HTTP Request and Response StructureHTTP Request and Response Structure
HTTP Request and Response Structure
BhagyashreeGajera1
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and response
Sahil Agarwal
 
Introduction to REST - API
Introduction to REST - APIIntroduction to REST - API
Introduction to REST - API
Chetan Gadodia
 
HTTP Request Header and HTTP Status Code
HTTP Request Header and HTTP Status CodeHTTP Request Header and HTTP Status Code
HTTP Request Header and HTTP Status Code
Abhishek L.R
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
Nuha Noor
 
Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its Applications
Nayan Dagliya
 

Viewers also liked (20)

Snmp
SnmpSnmp
Snmp
hetaljadav
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
simplyharshad
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
selvakumar_b1985
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocol
Aviran Mordo
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
Rishikese MR
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the Essentials
Living Online
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
Nour Eldeen Mahmoud Khalifa
 
Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless
Living Online
 
snmp
snmpsnmp
snmp
حسن رشید
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
Prasenjit Gayen
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Rajan Pandey
 
SCTP introduction
SCTP introductionSCTP introduction
SCTP introduction
Li Xiong
 
Digital Transmission
Digital TransmissionDigital Transmission
Digital Transmission
anuragyadav94
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Congestion control
Congestion controlCongestion control
Congestion control
Krishna Ranjan
 
Domain name system
Domain name systemDomain name system
Domain name system
Siddique Ibrahim
 
VLAN
VLANVLAN
VLAN
Alberto Jimenez
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
selvakumar_b1985
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocol
Aviran Mordo
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
Rishikese MR
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the Essentials
Living Online
 
Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless
Living Online
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
Prasenjit Gayen
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Rajan Pandey
 
SCTP introduction
SCTP introductionSCTP introduction
SCTP introduction
Li Xiong
 
Digital Transmission
Digital TransmissionDigital Transmission
Digital Transmission
anuragyadav94
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 
Ad

Similar to HTTP Basics (20)

Httpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedHttpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-converted
computerorganization
 
www and http services
www and http serviceswww and http services
www and http services
Jenica Salmorin
 
HTTP
HTTPHTTP
HTTP
spacecharge
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
Zani10
 
Webbasics
WebbasicsWebbasics
Webbasics
patinijava
 
Module 5.pptx HTTP protocol on optical and wireless communication
Module 5.pptx HTTP protocol on optical and wireless communicationModule 5.pptx HTTP protocol on optical and wireless communication
Module 5.pptx HTTP protocol on optical and wireless communication
chandushivamurthy4
 
Ch-1_.ppt
Ch-1_.pptCh-1_.ppt
Ch-1_.ppt
berihunmolla2
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
 
Intro webapps
Intro webappsIntro webapps
Intro webapps
Howard Mao
 
Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
Satish b
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Web Servers (ppt)
Web Servers (ppt)Web Servers (ppt)
Web Servers (ppt)
webhostingguy
 
Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014
Navaneethan Naveen
 
Web Application Technologies
Web Application TechnologiesWeb Application Technologies
Web Application Technologies
Se-Han Lee
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
VietAnhNguyen337355
 
WWW & HTTP
WWW & HTTPWWW & HTTP
WWW & HTTP
subbarayudu chakali
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
Cathie101
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
Cathie101
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
Rajan Pandey
 
Httpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedHttpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-converted
computerorganization
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
Zani10
 
Module 5.pptx HTTP protocol on optical and wireless communication
Module 5.pptx HTTP protocol on optical and wireless communicationModule 5.pptx HTTP protocol on optical and wireless communication
Module 5.pptx HTTP protocol on optical and wireless communication
chandushivamurthy4
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
 
Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
Satish b
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014Http request&response by Vignesh 15 MAR 2014
Http request&response by Vignesh 15 MAR 2014
Navaneethan Naveen
 
Web Application Technologies
Web Application TechnologiesWeb Application Technologies
Web Application Technologies
Se-Han Lee
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
VietAnhNguyen337355
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
Cathie101
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
Cathie101
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
Rajan Pandey
 
Ad

More from sanjoysanyal (20)

business
businessbusiness
business
sanjoysanyal
 
Solar
SolarSolar
Solar
sanjoysanyal
 
Windindustryin India
Windindustryin IndiaWindindustryin India
Windindustryin India
sanjoysanyal
 
Solar Industryin India
Solar Industryin IndiaSolar Industryin India
Solar Industryin India
sanjoysanyal
 
Bio Fuel Industryin India
Bio Fuel Industryin IndiaBio Fuel Industryin India
Bio Fuel Industryin India
sanjoysanyal
 
Introduction to Carbon Markets
Introduction to Carbon Markets Introduction to Carbon Markets
Introduction to Carbon Markets
sanjoysanyal
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
sanjoysanyal
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
sanjoysanyal
 
Introductionto Solar
Introductionto SolarIntroductionto Solar
Introductionto Solar
sanjoysanyal
 
Introductionto Solar
Introductionto SolarIntroductionto Solar
Introductionto Solar
sanjoysanyal
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
sanjoysanyal
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
sanjoysanyal
 
Topic5 Web Services
Topic5 Web ServicesTopic5 Web Services
Topic5 Web Services
sanjoysanyal
 
Topic4 Application Servers
Topic4 Application ServersTopic4 Application Servers
Topic4 Application Servers
sanjoysanyal
 
Topic3 Enterprise Application Integration
Topic3 Enterprise Application IntegrationTopic3 Enterprise Application Integration
Topic3 Enterprise Application Integration
sanjoysanyal
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
sanjoysanyal
 
Topic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information SystemsTopic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information Systems
sanjoysanyal
 
Content Navigation
Content NavigationContent Navigation
Content Navigation
sanjoysanyal
 
Instantmessagingprotocols
InstantmessagingprotocolsInstantmessagingprotocols
Instantmessagingprotocols
sanjoysanyal
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networks
sanjoysanyal
 
Windindustryin India
Windindustryin IndiaWindindustryin India
Windindustryin India
sanjoysanyal
 
Solar Industryin India
Solar Industryin IndiaSolar Industryin India
Solar Industryin India
sanjoysanyal
 
Bio Fuel Industryin India
Bio Fuel Industryin IndiaBio Fuel Industryin India
Bio Fuel Industryin India
sanjoysanyal
 
Introduction to Carbon Markets
Introduction to Carbon Markets Introduction to Carbon Markets
Introduction to Carbon Markets
sanjoysanyal
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
sanjoysanyal
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
sanjoysanyal
 
Introductionto Solar
Introductionto SolarIntroductionto Solar
Introductionto Solar
sanjoysanyal
 
Introductionto Solar
Introductionto SolarIntroductionto Solar
Introductionto Solar
sanjoysanyal
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
sanjoysanyal
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
sanjoysanyal
 
Topic5 Web Services
Topic5 Web ServicesTopic5 Web Services
Topic5 Web Services
sanjoysanyal
 
Topic4 Application Servers
Topic4 Application ServersTopic4 Application Servers
Topic4 Application Servers
sanjoysanyal
 
Topic3 Enterprise Application Integration
Topic3 Enterprise Application IntegrationTopic3 Enterprise Application Integration
Topic3 Enterprise Application Integration
sanjoysanyal
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
sanjoysanyal
 
Topic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information SystemsTopic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information Systems
sanjoysanyal
 
Content Navigation
Content NavigationContent Navigation
Content Navigation
sanjoysanyal
 
Instantmessagingprotocols
InstantmessagingprotocolsInstantmessagingprotocols
Instantmessagingprotocols
sanjoysanyal
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networks
sanjoysanyal
 

Recently uploaded (20)

Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 

HTTP Basics

  • 1. Hyper Text Transfer Protocol (HTTP) Objective: Understand HTTP (the protocol that makes the Internet possible)
  • 2. Accessing Resources over the Web <protocol>://<server>/<path> Defines the address (Uniform Resource Locator) Communication Protocol between the client and the server
  • 3. Hypertext Transport Protocol (HTTP) characteristics Request-response mechanism: Transaction is initiated by a client sending a request to server Server generates a response Resource Identification Each HTTP request includes a URI (Uniform Resource Identifier) Statelessness The server does not maintain any information about the transaction Meta data support Metadata about information can be exchanged in the messages
  • 4. HTTP Request Format GET /index.html HTTP/1.0 Request Line Host: www.content-networking.com Date: BBBBBBBBBBBB User-Agent: Mozilla/5.0 (en) (WINNT; U) Accept-Language: en-us Header Lines Carriage Return/Line Feed Specifies request method Specifies resource via URI & meta data Message Body Content-length: (Message Payload)
  • 5. Request Methods GET whatever information is identified by the Reuest-URI Can Get static content and data produced by a program POST Submit information to Web Server Eg: posting to blog, submission of user form… Information is included in message body The actual function depends on request URI Example POST/phonebook.cgi.HTTP/1.0 Date: User-Agent: Accept Language: en-us Content Length: 14 98490 55266 Looks up phone book for the number Could have been also achieved by Get But in that case number would have been in the Resource URL Which would have been stored in the log
  • 6. Request Methods…contd (ii) HEAD Servers response does not include message body Useful for getting resource metadata without transferring the resource Also useful for debugging , checking for validity, accessibility and modification PUT Requests a server store the enclosed data under the supplied Request URL. Creates the resource if it does not create Not useful for web publishing (FTP is preferred for security purposes) DELETE Removes the Web object Needs to be carefully used for security reasons
  • 7. Request Methods…contd (iii) TRACE method Invokes a remote appliction layer feedback of the request message Useful for testing what is being received at the server Also possible to forward to intermediaries for debugging purposes OPTIONS Requests information about communication options available to server
  • 8. HTTP Response Format HTTP/1.0 200 OK Status line Date: BBBBBBBBBBBB Server: Apache/1.3.12 (Unix) Last-Modified: (date) Content Type: text/html Header Lines Carriage Return/Line Feed Status line with result code and phrase Specifies server & resource meta data Message Body Content-length: (Message Payload)
  • 9. Result Code and Phrase 1xx: Informational – Not Done Yet 2xx: Success – You win 3xx:Redirection-You lose but try again 4xx:Client Error – You lose, your fault 5xx:Server Error – You lose, my bad 200 OK 204 No Content 300 Mutiple Choices 301 Moved Permanently 302 Moved Temporarily 304 Not Modified 400 Bad Request 401 Unauthorized 404 Not Found 500 Internal Server Error
  • 10. Improvements in HTTP/1.1 Persistent connections Keeps the connection open after the server response Connection can be closed by either client or server Request Pipelining Allows a client to send several requests without waiting for a response Server responds in the same order Chunked Encoding Allows sender to break a message into arbitrary sized chunks Useful for dynamically created response messages
  • 11. Cookies HTTP is stateless protocol Cookies manage state maintenance by shifting the burden to client Cookies are transmitted in clear text (security issue) Client Server Usual HTTP Request Usual HTTP Response, including header line Set-cookie: <cookie> 1 st client request Usual HTTP Request, including header line Set-cookie: <cookie> Usual HTTP Response 2nd client request Client does not interpret the cookie string Server is presented with the previously returned state information
  • 12. User Authentication Users browser information remembers credentials and includes them in headers for subsequent requests Browser typically deletes stored authentication credentials once browser is closed HTTP allows various authentication mechanis ms Client Server Usual HTTP Request HTTP Response with code 401, including header line www-authenticate: <string1> Same HTTP Request, including header line Authorization: <string2> Usual HTTP Response 1 st client request User inputs credentials Usual HTTP Request, including header line Authorization: <string2> Usual HTTP Response 2ndclient request
  • 13. SSL: Secure Web Communications SSL protocol is application independent Operates between application layer and transport layer Application protocols such as HTTP sit on top of it and TCP/IP beneath it SSL provides:
  • 14. How SSL Works The Public Key is a random number generated in pair (the other part of the pair is the private key known only to the server) Data encrypted by the public key can be decrypted only by using the private key Client Server HTTPS Request SSL Certificate with the Public Key of the Server Sends Session Key encrypted with the Server Public Key Response/Request encrypted with session key Generates a random number or session key which can be encrypted using the server public key Decrypted using the Server Private Key
  • 15. Ensuring SSL version compatibility There are different versions of SSL depending on the encryption algorithm used. The browser sends the versions it supports The server sends the certificate. The certificate includes: The identity of the organization to which the web server belongs The certificate’s expiration date The public key The identity of the organization that issued the certificate, known as a certification authority (CA) Browsers store and recognize certificates issued by a number of well-known CAs.
  • 16. What it does and what it does not What It Does What it Does Not Data encryption Server authentication Message integrity Optional client authentication SSL does not protect the data stored on the disk. Information getting stolen through pages cached on the browser Stealing confidential information from the browser memory. Since in SSL data is encrypted only during transmission on the network, it is in clear text in the browser memory