Meow

Submitted by: Submitted by

Views: 146

Words: 933

Pages: 4

Category: Spirituality

Date Submitted: 04/27/2014 03:57 PM

Report This Essay

1. HTTP or Hypertext Transfer Protocol is used to communicate messages between the client and server. HTTP is based on a request to response protocol, so when the client wants information from the server it sends a request over to the server and in response the server send the information back. A Get request asks for data from a specified resource and should not have any other effect. Other notes to know about Get requests are that they remain in your browser history; they can be bookmarked, and should not be used when sensitive data is involved. A Post Request asks that the server take the information enclosed in the request and submit it to be processed. Post requests could be anything from an item to add to a database to a mailing list. HTTP Payload is the actual data which is received by the system of specified destination. When packets are being moved across the internet they have a header and actual data, the header contains where the packet came from and who it’s going to but the actual data is what the recipient gets.

2. HTTP 1.0 vs. HTTP 1.1, here we have two of the main HTTP protocols. HTTP 1.0 has been the standard for past 15+ years. HTTP 1.1 is an upgraded version that is said to be more efficient and able to implement some things that bottlenecked HTTP 1.0. Like for instance in HTTP 1.0 it wasted bandwidth because a server could not break up objects into parts. So if it needed to send a part of an object it would have to send the whole thing and would take up more space and time. HTTP 1.1 is addressing this issue by trying to being more lenient and flexible with its object transfers. Overall HTTP 1.0 was solid for the time being but like every part of technology it has to be upgraded and HTTP 1.1 is a nice step forward, it will be a safer protocol to operate on.

3. TLS or Transport Layer Security is a protocol that was designed to provide communication security over the Internet. It uses certificates and asymmetric cryptography to...