The Web and HTTP. Dr. Philip Cannata

Similar documents
The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

DATA COMMUNICATOIN NETWORKING

1 Introduction: Network Applications

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Network Technologies

Principles of Network Applications. Dr. Philip Cannata

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

Application Layer: HTTP and the Web. Srinidhi Varadarajan

CONTENT of this CHAPTER

CMPE 80N: Introduction to Networking and the Internet

Application-layer protocols

Chapter 4 Network Layer

Chapter 2 Application Layer

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

Cookies Overview and HTTP Proxies

Lecture 2. Internet: who talks with whom?

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture # Apache.

Chapter 2 Application Layer

First Midterm for ECE374 03/09/12 Solution!!

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Wireshark Lab: HTTP SOLUTION

Chapter 6 Wireless and Mobile Networks

Web Browsing Examples. How Web Browsing and HTTP Works

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

The Hyper-Text Transfer Protocol (HTTP)

Computer Networks - CS132/EECS148 - Spring

Research of Web Real-Time Communication Based on Web Socket

Chapter 8 Security Pt 2

Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013

The Web History (I) The Web History (II)

No. Time Source Destination Protocol Info HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)

Data Communication I

Wireshark Lab: HTTP. 1. The Basic HTTP GET/response interaction

Computer Networking LAB 2 HTTP

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

HTTP Protocol. Bartosz Walter

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

LESSON Networking Fundamentals. Understand TCP/IP

Final for ECE374 05/06/13 Solution!!

Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring Four parts

Remote login (Telnet):

Java Secure Application Manager

Web Conferencing Version 8.3 Troubleshooting Guide

M3-R3: INTERNET AND WEB DESIGN

First Midterm for ECE374 03/24/11 Solution!!

Application layer Protocols application transport

URLs and HTTP. ICW Lecture 10 Tom Chothia

Lecture 8a: WWW Proxy Servers and Cookies

Computer Networks & Security 2014/2015

S y s t e m A r c h i t e c t u r e

World Wide Web. Before WWW

Deployment Guide Microsoft IIS 7.0

Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

Internet Technologies 4-http. F. Ricci 2010/2011


Chapter 27 Hypertext Transfer Protocol

Hypertext for Hyper Techs

First Midterm for ECE374 02/25/15 Solution!!

DATA COMMUNICATOIN NETWORKING

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Application Layer -1- Network Tools

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

Cyber Security Workshop Ethical Web Hacking

Lecture 8a: WWW Proxy Servers and Cookies

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Domain Name System (DNS)

Introduction to Computer Security

Review of Networking Basics. Yao Wang Polytechnic University, Brooklyn, NY11201

CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ

DMZ Network Visibility with Wireshark June 15, 2010

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

Help. F-Secure Online Backup

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

CSCI-1680 SMTP Chen Avin

Domain Name System (DNS)

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Transport Layer Security Protocols

Cisco Configuring Commonly Used IP ACLs

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

File Transfer Protocol (FTP) & SSH

The Internet and Network Technologies

Internet Privacy Options

Network setup and troubleshooting

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Web Programming. Robert M. Dondero, Ph.D. Princeton University

Transcription:

The Web and HTTP Dr. Philip Cannata 1

Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: v If you use these slides (e.g., in a class) that you mention their source (after all, we d like people to use our book!) v If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-2 Dr. Philip Cannata 2

Web and HTTP First, a review web page consists of objects object can be HTML file, JPEG image, Java applet, audio file, web page consists of base HTML-file which includes several referenced objects each object is addressable by a URL, e.g., www.someschool.edu/somedept/pic.gif host name path name Application Layer 2-3 Dr. Philip Cannata 3

HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/server model client: browser that requests, receives, (using HTTP protocol) and displays Web objects server: Web server sends (using HTTP protocol) objects in response to requests PC running Firefox browser iphone running Safari browser server running Apache Web server Application Layer 2-4 Dr. Philip Cannata 4

HTTP overview (continued) uses TCP: client initiates TCP connection (creates socket) to server, port 80 server accepts TCP connection from client HTTP messages (applicationlayer protocol messages) exchanged between browser (HTTP client) and Web server (HTTP server) TCP connection closed HTTP is stateless server maintains no information about past client requests aside protocols that maintain state are complex! v past history (state) must be maintained v if server/client crashes, their views of state may be inconsistent, must be reconciled Application Layer 2-5 Dr. Philip Cannata 5

HTTP connections non-persistent HTTP at most one object sent over TCP connection connection then closed downloading multiple objects required multiple connections persistent HTTP multiple objects can be sent over single TCP connection between client, server Application Layer 2-6 Dr. Philip Cannata 6

Dr. Philip Cannata 7

Dr. Philip Cannata 8

Non-persistent HTTP: response time RTT (definition): time for a small packet to travel from client to server and back HTTP response time: one RTT to initiate TCP connection one RTT for HTTP request and first few bytes of HTTP response to return file transmission time non-persistent HTTP response time = 2RTT+ file transmission time initiate TCP connection time to transmit file Application Layer 2-9 Dr. Philip Cannata 9 RTT request file RTT file received time time

Persistent HTTP non-persistent HTTP issues: requires 2 RTTs per object OS overhead for each TCP connection browsers often open parallel TCP connections to fetch referenced objects persistent HTTP: server leaves connection open after sending response subsequent HTTP messages between same client/server sent over open connection client sends requests as soon as it encounters a referenced object as little as one RTT for all the referenced objects Application Layer 2-10 Dr. Philip Cannata 10

Dr. Philip Cannata 11

HTTP request message: general format method sp URL sp version cr lf header field name value cr lf ~ ~ request line header lines header field name cr lf value cr lf entity body ~ ~ body Application Layer 2-12 Dr. Philip Cannata 12

Uploading form input POST method: web page often includes form input input is uploaded to server in entity body URL method: uses GET method input is uploaded in URL field of request line: www.somesite.com/animalsearch?monkeys&banana Application Layer 2-13 Dr. Philip Cannata 13

Method types HTTP/1.0: GET POST HEAD asks server to leave requested object out of response HTTP/1.1: GET, POST, HEAD PUT uploads file in entity body to path specified in URL field DELETE deletes file specified in the URL field Application Layer 2-14 Dr. Philip Cannata 14

HTTP response message status line (protocol status code status phrase) header lines data, e.g., requested HTML file HTTP/1.1 200 OK\r\n Date: Sun, 26 Sep 2010 20:09:20 GMT\r\n Server: Apache/2.0.52 (CentOS)\r\n Last-Modified: Tue, 30 Oct 2007 17:00:02 GMT \r\n ETag: "17dc6-a5c-bf716880"\r\n Accept-Ranges: bytes\r\n Content-Length: 2652\r\n Keep-Alive: timeout=10, max=100\r\n Connection: Keep-Alive\r\n Content-Type: text/html; charset=iso-8859-1\r\n \r\n data data data data data... Application Layer 2-15 Dr. Philip Cannata 15

HTTP response status codes v status code appears in 1st line in server-to-client response message. v some sample codes: 200 OK request succeeded, requested object later in this msg 301 Moved Permanently requested object moved, new location specified later in this msg (Location:) 400 Bad Request request msg not understood by server 404 Not Found requested document not found on this server 505 HTTP Version Not Supported Application Layer 2-16 Dr. Philip Cannata 16

Trying out HTTP (client side) for yourself 1. Telnet to your favorite Web server: telnet cis.poly.edu 80 opens TCP connection to port 80 (default HTTP server port) at cis.poly.edu. anything typed in sent to port 80 at cis.poly.edu 2. type in a GET HTTP request: GET /~ross/ HTTP/1.1 Host: cis.poly.edu by typing this in (hit carriage return twice), you send this minimal (but complete) GET request to HTTP server 3. look at response message sent by HTTP server! (or use Wireshark to look at captured HTTP request/response) Application Layer 2-17 Dr. Philip Cannata 17

User-server state: cookies many Web sites use cookies four components: 1) cookie header line of HTTP response message 2) cookie header line in next HTTP request message 3) cookie file kept on user s host, managed by user s browser 4) back-end database at Web site example: Susan always access Internet from PC visits specific e-commerce site for first time when initial HTTP requests arrives at site, site creates: unique ID entry in backend database for ID Application Layer 2-18 Dr. Philip Cannata 18

Cookies: keeping state (cont.) client server ebay 8734 cookie file ebay 8734 amazon 1678 usual http request msg usual http response set-cookie: 1678 Amazon server creates ID 1678 for user create entry backend database usual http request msg cookie: 1678 usual http response msg cookiespecific action access one week later: ebay 8734 amazon 1678 usual http request msg cookie: 1678 usual http response msg cookiespecific action access Application Layer 2-19 Dr. Philip Cannata 19

Cookies (continued) what cookies can be used for: authorization shopping carts recommendations user session state (Web e- mail) aside cookies and privacy: v cookies permit sites to learn a lot about you v you may supply name and e-mail to sites how to keep state : v protocol endpoints: maintain state at sender/receiver over multiple transactions v cookies: http messages carry state Application Layer 2-20 Dr. Philip Cannata 20

Web caches (proxy server) goal: satisfy client request without involving origin server user sets browser: Web accesses via cache browser sends all HTTP requests to cache object in cache: cache returns object client proxy server origin server else cache requests object from origin server, then returns object to client client origin server Application Layer 2-21 Dr. Philip Cannata 21

More about Web caching cache acts as both client and server server for original requesting client client to origin server typically cache is installed by ISP (university, company, residential ISP) why Web caching? reduce response time for client request reduce traffic on an institution s access link Internet dense with caches: enables poor content providers to effectively deliver content (so too does P2P file sharing) Application Layer 2-22 Dr. Philip Cannata 22

Caching example: assumptions: v avg object size: 100K bits v avg request rate from browsers to origin servers:15/ sec v avg data rate to browsers: 1.50 Mbps v RTT from institutional router to any origin server: 2 sec v access link rate: 1.54 Mbps consequences: v LAN utilization: 15% v access link utilization = 99% problem! v total delay = Internet delay + access delay + LAN delay = 2 sec + minutes + usecs institutional network public Internet 1.54 Mbps access link origin servers 1 Gbps LAN Application Layer 2-23 Dr. Philip Cannata 23

Dr. Philip Cannata 24

Dr. Philip Cannata 25

Dr. Philip Cannata 26

Conditional GET Goal: don t send object if cache has up-to-date cached version no object transmission delay lower link utilization cache: specify date of cached copy in HTTP request If-modified-since: <date> server: response contains no object if cached copy is upto-date: HTTP/1.0 304 Not Modified client HTTP request msg If-modified-since: <date> HTTP response HTTP/1.0 304 Not Modified HTTP request msg If-modified-since: <date> HTTP response HTTP/1.0 200 OK <data> server object not modified before <date> object modified after <date> Application Layer 2-27 Dr. Philip Cannata 27