How many HTTP request methods are there
Hypertext Transfer Protocol
Each client request is initiated by specifying the method. Methods determine the action of the request. The current HTTP specification provides eight methods: OPTIONS, GET, HEAD, POST, PUT, DELETE, TRACE and CONNECT.
By far the most important method is GET. It is used to request a document or another source. A source is identified by the request URL. There are two types: conditional GET and partial GET. With the conditional GET type, the request for data is linked to conditions. The exact conditions are stored in the "Conditional" header field. Often used conditions are, for example, If-Modified-Since, If-Unmodified-Since or If-Match. With the help of this condition, the network load can be significantly reduced, since only the data that is actually required are transmitted. In practice, for example, proxy servers use this function to prevent the multiple transmission of data that is already in the cache.
The partial GET method pursues the same goal. It uses the range header field, which only transmits parts of the data, but which the client can still process. This technique is used to resume an interrupted data transfer.
The POST method takes the opposite route: it primarily transmits form entries to a web server. Commenting on existing sources, sending messages to forums and expanding online databases are also possible with POST. The data transmitted to the server are contained in the entity section. The POST method also sends a URL. In this case, this only serves as a reference as to which routine on the server handles the processing of the data.
This method enables the client to obtain information about available communication options. In this way, in particular, restrictions on sources on an HTTP server or even a proxy server can be determined without initiating a specific action or even transferring data.
This method is very similar to GET in the way it works. The only difference: HEAD only requests the header of a document or source. In contrast to GET, the server does not transmit the actual data. HEAD is particularly suitable for determining the size of sources, types or object attributes. In response to a HEAD request, the server transmits the meta information that is identical to the information in the GET request.
This type allows the modification of existing sources or the creation of new data on the server. In contrast to the POST method, the URL in the PUT request identifies the data sent with the request itself, and not the source.
This type is used to delete data on the HTTP server that is identified by the URL. The interesting thing about this is that the deletion process does not have to take place immediately after the request has been received, but can also take place at a later point in time. According to the specification, the server should at least confirm acceptance of the request.
The client can use this method to track requests that run across multiple nodes. This is of particular interest when transmitting the request via one or more proxy servers. The last link in the chain generates the answer. The TRACE method is primarily used to diagnose client-server connections. The client uses the Max-Forwards header field to determine the maximum number of hops. All servers passed through are logged in the "Via" header field of the response message.
The CONNECT method is reserved in the HTTP / 1.1 specification for connections in which proxy servers act dynamically as tunnels. In practice, it can be an SSL tunnel, for example. The tunnel mechanism is primarily intended as a passage for SSL-secured connections through a firewall. This method is already implemented in proxy servers such as MS Proxy, Netscape proxy server or WinGate. The client determines the target computer using the CONNECT method including the port specification. The proxy server then sets up a tunnel to the specified computer and transmits data and commands between client and server. Details on this procedure are specified in the Internet Draft "Tunneling TCP based protocols through Web proxy servers".
- How are you different from your sister
- What are the disadvantages of the centrifugal clutch
- What is the afterlife like in heaven
- Do drawing tablets work with iPads
- What is the uncus in the brain
- Clemson is a black college
- Which idioms engineers usually use
- How can learning history change the world
- How is Zach Galifianakis personally
- How do I increase pancreatic function
- Where in mountains should I get lost?
- What does bonafide 1
- What is Setup MSI
- What is the significance of the fractional oxidation number?
- Someone hates cars
- How do I find my Hotmail service
- Where can I learn to swim in Vizag
- What is the Best Umbraco Hosting Provider
- What is another name for potassium?
- How do we lobby at MUN
- What is an SG 443 carbine
- How good are Goodyear tires
- Can you stream UFC online legally
- Where do you see yourself in 2050
- Why doesn't my car start?
- Who shouldn't you fall in love with?
- What makes parent-child relationships beautiful
- What is incubation center
- Hydrate or dehydrate alcoholic beverages
- Is it worth learning to program python
- What is French Classical
- Who is the worst GTA protagonist
- What is the GTA 5 RP Mod
- What is wood opaque