Editing Cloud
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 75: | Line 75: | ||
* The Hypertext Transfer Protocol (HTTP) is the basis for data communication on the World Wide Web. It now is an official standard from the Internet Engineering Task Force (IETF) and the World Wide Web Consortium ([[W3C]]), documented in so-called Requests for Comments (RFCs). HTTP defines nine actions on data, including HEAD, GET and POST. | * The Hypertext Transfer Protocol (HTTP) is the basis for data communication on the World Wide Web. It now is an official standard from the Internet Engineering Task Force (IETF) and the World Wide Web Consortium ([[W3C]]), documented in so-called Requests for Comments (RFCs). HTTP defines nine actions on data, including HEAD, GET and POST. | ||
− | Networking protocols are commonly mapped on the 7 layers of the Open Systems Interconnection model ( | + | Networking protocols are commonly mapped on the 7 layers of the Open Systems Interconnection model (OSI model). |
Although no end-user would typically need to debug the use of these standard protocols, troubleshooting is certainly possible by using protocol analyzers (sniffers). Depending on the configuration of the network, such tools may also be used to reconstruct confidential data being transferred. Therefore the use of them may be prohibited or considered a security threat. | Although no end-user would typically need to debug the use of these standard protocols, troubleshooting is certainly possible by using protocol analyzers (sniffers). Depending on the configuration of the network, such tools may also be used to reconstruct confidential data being transferred. Therefore the use of them may be prohibited or considered a security threat. |
Advertising: