• Loading

      An HTTP request is a class consisting of HTTP style requests, request lines, request methods, request URL, header fields, and body content. The most common methods that are used by a client in an HTTP request are as follows:-

      1) GET:- Used when the client is requesting a resource on the Web server.

      2) HEAD:- Used when the client is requesting some information about a resource but not requesting the resource itself.

      3) POST:- Used when the client is sending information or data to the server—for example, filling out an online form (i.e. Sends a large amount of complex data to the Web Server).

      4) PUT:- Used when the client is sending a replacement document or uploading a new document to the Web server under the request URL.

      5) DELETE:- Used when the client is trying to delete a document from the Web server, identified by the request URL.

      6) TRACE:- Used when the client is asking the available proxies or intermediate servers changing the request to announce themselves.

      7) OPTIONS:- Used when the client wants to determine other available methods to retrieve or process a document on the Web server.

      8) CONNECT:- Used when the client wants to establish a transparent connection to a remote host, usually to facilitate SSL-encrypted communication (HTTPS) through an HTTP proxy.

      The GET Request Method

      The GET method is the simplest and the most frequently used request method. It is used to access the static resources, such as HTML documents and images. GET request can be used to retrieve dynamic information by including query parameters in the request URL. For instance, we can send a parameter name with the URL, such as http://www.domain.com?name=Harsh. In this example, Harsh is the dynamic information sent by including a parameter,name, in the request URL. The Web Server can then access this dynamic information through the “name” parameter.

      The HEAD Request Method

      According to Wikipedia “Asks for the response identical to the one that would correspond to a GET request, but without the response body. This is useful for retrieving meta-information written in response headers, without having to transport the entire content.” It is used when the client is requesting some information about a resource but not requesting the resource itself. This means that we have a faster way of checking the headers and some server info for a given resource on the server i.e. checking if a given url is serviceable, a given file exists, etc..Sometimes client might only need to view the header of a response (Content-Type or Content-Length). The client can use the HEAD request method to retrieve the header in such cases. The HEAD method is similar to GET method, except that the server does not return a message body (actual page) in response of the HEAD method.

      The POST Request Method

      The Post method is commonly used for accessing dynamic resources or when a large amount of complex information is to be sent to the server. The Web Server accepts the entity enclosed in the request as a new subordinate of the resource identified by the Request-URI( Uniform Resource Identifier). According to Wikipedia “Submits data to be processed (e.g., from an HTML form) to the identified resource. The data is included in the body of the request. This may result in the creation of a new resource or the updates of existing resources or both.” The major difference between GET and POST is that in GET the request parameters are transmitted as a query string appended to the request URL, while in POST the request parameters are transmitted within the body of the request.
      The POST request method provides the following functionalities:-
      1) Providing annotations of the existing resources.
      2) Posting a message to a bulletin board, newsgroup, mailing list, or a similar group of articles.
      3) Providing a block of data, such as the result of the submitting a form, to a data-handling process.
      4) Extending a database through an append operation.

      The PUT Request method

      The PUT method stores an entity in the specified Request-URI. The entity is a resource residing on the Web server under the specified Request-URI. If the Request-URI does not point to an existing resource, but is capable of being defined as a new resource by the requesting user, the Web Server can create the resource with that URI. If an existing resource is modified, either the 200(OK) or 204 (No Content) response code should be sent to indicate successful modification of a resource. The Web Server must inform the user via the 201 (Created) responses if a new resource is created. If the resource is not created or modified with the Request-URI, an appropriate error response is generated, which reflects the nature of the problem.

      The DELETE Request method

      The DELETE method requests the Web server to delete the resource identified by the Request-URI. This method may be overridden by human intervention (or other means) on the Web Server. If the response includes an entity describing the status of deletion, the 200(OK) response code specifies that the resource has been deleted successfully. If the response is 202(Accepted), it specifies that the resource has not yet been deleted. Similarly, if the response code is 204 ( No Content), it specifies that the resource has been deleted but the response code does not include an entity.

      The OPTIONS Request method

      According to Wikipedia “Returns the HTTP methods that the server supports for specified URL. This can be used to check the functionality of a web server by requesting '*' instead of a specific resource.”
      The OPTION method requests for information about the communication options available on the request/response chain identified by a Request-URI. Responses to this method are not cacheable. This method allows the client to determine the options and /or requirements associated with a resource, or the capabilities of a server. If the OPTIONS method includes an entity body, the media type must be indicated by the content-type field.

      The TRACE Request method

      According to Wikipedia “Echoes back the received request, so that a client can see what (if any) changes or additions have been made by intermediate servers.”
      The TRACE method is used to invoke a remote application layer associated with a request message. A TRACE request must not include an entity. A client uses the TRACE method to see the received input at the other end of the request chain and diagnostic or testing information.
    • Enter your email address:

      Delivered by FeedBurner

    • Categories

    • Latest Posts


      Live Chat API SDK for PHP Websites

      Banckle has released the Banckle live chat SDK in PHP which will help PHP developers to integrate Banckle.Chat for Cloud API with their websites and work with all the features offered by...

      johansonkath 09-26-2014, 05:25 AM Go to last post

      canada goose hunts

      ことができる。 それは本当に素晴らしいです。 効果的 するために、市や町の医療ボードで確認する必要があります。 主に赤み、特に顔領域における皮膚の肥厚を特徴とする。 この皮たの命令ごとに処理されることを保証しAndAlsoは、あなたonalfeeling以上の何かの感覚を持つようにthatw たの体内温度toregulate変更されます。...

      Chepefoff 09-22-2014, 06:52 AM Go to last post

      zapatos puma clasicos

      、あなたの車の上に安全なオプションをインストールすると、大幅 グやテントのポールをカウントした後、パニックをいけない、10懸念の一つは患者の秘密ですが、大きくておそらく最大の関心事はくの場合、1つまたは2つの主要な従業員、主要な男性に大きく依取引プログラムとは異なり、FAPターボのみriskrewar...

      Chepefoff 09-22-2014, 06:51 AM Go to last post

      lv earrings

      ムが保護されています。 これらのシステムにおける圧力逃がし弁 な手数料体系を持っているものを選択してください。 ターゲットる多くのガイドがあることを考えると、多くのエージェントを持つルimpedancestereoフォノまたはライン用のSPDにインタビューを開始するとしてあなたをgreatlyassi ョン手荒に扱う融資の受験者が必要とする。 債務管理のアドバイす...

      Chepefoff 09-22-2014, 06:37 AM Go to last post

      charmingdate review

      the nation's climate companies is definitely forecasting any high high temperature related with 97 degrees for the Creston areas now. the last shoot out of 97 degree programs might have been set in...

      wristiada 09-19-2014, 11:27 AM Go to last post

    Disclaimer: Users of techforum4u.com are responsible for ensuring that any material they post (article, blog posts, images or other mulitimedia content) does not violate or infringe upon the copyright, patent, trademark, or any personal or proprietary rights of any third party, and is posted with the permission of the owner of such rights.Anyone who violates these rules may have their access privileges removed without warning.