27
AddressingScheme
Protocol and
or clicks on a hyperlink, the web
Whon a user types a URL ntO a weo browser's address bar
the Corresponding web server. The web server processes the request
sends an HTTP request to
browser
HTTP response, which includes the requested
web page's HTML content and any
an
and sends back
(such as images
or stylesheets). The web browser then interprets the HTML,
associated resources
and may initiate additional requests for linked resources
to fully render
page to the user,
displays the web
the page.
TO HTTP/S
INTRODUCTION
2.4.2
and HTTPS (Hypertext Transfer Protocol Secure) are fundamental
Transfer Protocol) of information
HTTP (Hypertext
networking and the World Wide Web to facilitate the exchange
conventions
browsers). They define the rules and
computer
protocols used in clients (typically web
web display of web
between web
servers and
the internet, enabling the retrieval and
and transmited over
for bow data is formatted
pages and resources.
Transfer Protocol)
HTTP (Hypertext communication on the
1.
fundamental protocol used for
Protocol (HTTP) is a (clients) and web servers.
Hypertext Transfer exchanged between web browsers
governs how data is resources from servers
World Wide Web. It web pages, images, videos, and other
retrieval and display of
HTTP enables the with online content.
to access and interact
to browsers, allowing
users
method (e.g., GET,
POST, PUT,
information, such as the
includes specific sends back
The HTTP request server processes the request and
additional headers. The
web (e.g.,
relevant status codes
DELETE), the URL, and requested web page's content and
which contains the
an HTTP response, Found for page not
found).
404 Not
200 OK for success, independent of previous ones.
request-response cycle is
protocol, meaning each interactions between the
client and server.
HTTP is astateless memory of past
Therefore, does not maintain any
it
include:
aspects of HTTP typically a wetb
Key features and architecture. The client,
follows a client-server
processes these
a. Client-Server Model: HTTP resources. The server
for specific
requests to the server appropriate status codes.
browser, sends resources along with
the requested
requests and sends back from the client to the
s¹rver
stateless, meaning each request
HTTP is requires additOnal
b. Stateless Protocol: information about previous requests. This
retain any state across multiple
requests.
is independent and doesn't to maintain user
mechanisms (such as
cookies and sessions) indicating ne
request is sent by the client to the server,
C. Kequest and Response:
An HTTP The server proces_es the
request
relevant details. code
resource being requested and other along with a status
Ype or the requested resource
and sends back an HTTP response containing
that indicates the outcome of the request. Resource
ldentifiers
Locators (URLs) or Uniform protocol
d. URLs and URIs: HTTP uses Uniform Resource include the
web. URLs typically
(URIs) to identify the location of a resource on the parameters.
query action
(HTTP or HTTPS), domain name, path, and any specify the
verbs) that
HTTP Methods: HTTP defines various methods (also known as
to be performed on the server. Common methods include:
GET: Retrieve a resource from the server.
resource.
update a
POST: Send data to the server to create or
28| Mobile Computing and Networks
PUT: Update a resource on the server.
DELETE: Remove a resource from the server.
HEAD: Retrieve metadata about a resource without the actual content.
f. Status Codes: HTTP responses include status codes that
indicate the outcome of the reguest
Examples include:
200 OK: Request successful.
404 Not Found: Resource not found on the
server.
500 Internal Server Error: Server error.
g. Headers: Both requests and responses include headers,
which provide additional information
about the request/response or modify its behavior.
Headers can include details like content type.
length, caching instructions, and more.
h. Security Considerations: HTTP transmits data in plain
and tampering. To enhance security, HTTPS (HTTP text, making it susceptible to interception
protocols, ensuring that sensitive information remains Secure) encrypts data using SSLITLS
confidential during transmission.
i. Evolution: Over time, HTTP versions have evolved.
many years. More recently, HTTPI2 and HTTP/3 HTTP/1.1 was a widely used version for
have introduced improvements in performance,
multiplexing, and reduced latency.
2. HTTPS (Hypertext Transfer Protocol
Secure)
HTTPS is an extension of HTTP that adds a
browsers and web servers. It uses encryption and
layer of security to the communication between
web
integrity of data transmitted over the internet. authentication mechanisms to protect the privacy and
With HTTPS, the data exchanged between
the client and server is encrypted, ensuring
potential eavesdroppers cannot easily intercept or that any
understand the information being transmitted. This is
particularly important when sensitive data, such as login
details, are exchanged on websites. credentials, credit card information, or personal
HTTPS utilizes SSL (Secure Socket Layer) or TLS
a secure connection between the client (Transport Layer Security) protocols to estabISn
and server. When you visit a website using
browser verifies the authenticity of the website's HTTPS, your we0
the legitimate server. SSLTLS certificate to ensure you are connecting
HTTP and HTTPS are essential protocols in networking
that enable the smooth functioning o
World Wide Web. HTTP governs the standard data
exchange between web clients and servers, W
HTTPS adds an extra layer of security to protect sensitive
information during communication. As inte
security concerns continue to rise, the adoption of HTTPS has
secure web browsing a crucial aspect of modern become increasingly prevalent, ma
networking practices.
Key features and aspects of HTTPS include:
a. Encryption: The primary purpose of HTTPS is to provide encryption for the data transmitted
between a user's browser and the web server. This encryption is achieved using Secure Sockets
Layer (SSL) or Transport Layer Security (TLS) protocols. These protocols create a sod
and
encrypted channel through which data can travel, preventing unauthorized access
eavesdropping.