scispace - formally typeset
Book ChapterDOI

Chapter 26 – Hypertext Transfer Protocol

Walter Goralski
- pp 661-684
Reads0
Chats0
TLDR
In this chapter, you will learn about the HTTP protocol used on the Web, including the major message types and HTTP methods, and the status codes and headers used in HTTP.
Abstract
In this chapter, you will learn about the HTTP protocol used on the Web, including the major message types and HTTP methods. We’ll also discuss the status codes and headers used in HTTP. You will learn how URLs are structured and how to decipher them. We’ll also take a brief look at the use of cookies and how they apply to the Web.

read more

Citations
More filters
Proceedings ArticleDOI

Rate adaptation for adaptive HTTP streaming

TL;DR: A receiver-driven rate adaptation method for HTTP/TCP streaming that deploys a step-wise increase/ aggressive decrease method to switch up/down between the different representations of the content that are encoded at different bitrates is presented.
Proceedings ArticleDOI

Profiling resource usage for mobile applications: a cross-layer approach

TL;DR: ARO, the mobile Application Resource Optimizer, is the first tool that efficiently and accurately exposes the cross-layer interaction among various layers including radio resource channel state, transport layer, application layer, and the user interaction layer to enable the discovery of inefficient resource usage for smartphone applications.
Patent

Content request routing and load balancing for content distribution networks

TL;DR: A content distribution mechanism that distributes content of a content provider at various sites across a network and selects the site that is nearest a content requestor using an anycast address that resides at each of the sites is described in this paper.
Journal ArticleDOI

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

TL;DR: This paper will provide a general taxonomy of attack tactics against IDSs, an extensive description of how such attacks can be implemented by exploiting IDS weaknesses at different abstraction levels, and highlight the most promising research directions for the design of adversary-aware, harder-to-defeat IDS solutions.
Journal ArticleDOI

Models as web services using the Open Geospatial Consortium (OGC) Web Processing Service (WPS) standard

TL;DR: This work advances the idea of service-oriented modeling by presenting a design for a modeling service that builds from the Open Geospatial Consortium Web Processing Service (WPS) protocol, and demonstrates how the WPS protocol can be used to create modeling services, and how these modeling services can be brought into workflow environments using generic client-side code.