1. HTTP 1.1 supports persistent connection (PersistentConnection) and request pipeline (Pipelining) processing
HTTP 1.0 stipulates that browsers and servers only Maintain a short-lived connection. Each request of the browser needs to establish a TCP connection with the server. The server immediately disconnects the TCP connection after completing the request processing. The server does not track each client nor record past requests. (Recommended learning: web front-end video tutorial)
HTTP 1.1 supports persistent connection, and uses persistent connection by default. Multiple HTTP requests and Response. Multiple requests and responses can overlap, and multiple requests and responses can be performed simultaneously. More request headers and response headers (for example, HTTP 1.0 does not have a host field).
In 1.0 Session mode:
1. Establish a connection
2. Send a request message
3. Send back a response message
4. Close the connection
HTTP 1.1's continuous connection also needs to add new request headers to help implement it. For example, when the value of the Connection request header is Keep-Alive, the client notifies the server to maintain the connection after returning the result of this request; Connection When the value of the request header is close, the client notifies the server to close the connection after returning the result of this request. HTTP 1.1 also provides request headers and response headers related to mechanisms such as authentication, state management, and Cache caching.
Pipelining processing of requests can transmit multiple HTTP requests and responses on a TCP connection, reducing the consumption and delay of establishing and closing connections. For example, multiple requests and responses for a web page file containing many images can be transmitted over a single connection, but the requests and responses for each individual web page file still need to use their own connections. HTTP 1.1 also allows the client to make the next request without waiting for the result of the previous request to be returned. However, the server must send back the response results in the order in which the client request is received to ensure that the client can distinguish the content of each request. Response content.
2.HTTP 1.1 adds host field
In HTTP1.0, it is considered that each server is bound to a unique IP address, therefore, the URL in the request message The hostname is not passed. However, with the development of virtual host technology, multiple virtual hosts (Multi-homed Web Servers) can exist on a physical server, and they share an IP address.
HTTP1.1 request messages and response messages should support the Host header field, and if there is no Host header field in the request message, an error (400 Bad Request) will be reported. Additionally, the server SHOULD accept resource requests marked with absolute paths.
3. 100 (Continue) Status (save bandwidth)
HTTP/1.1 has added a new status code 100 (Continue). The client sends a request with only the header field in advance. If the server rejects the request due to permissions, it will send back the response code 401 (Unauthorized); if the server receives the request, it will send back the response code 100, and the client can continue to send the complete request with the entity. . The use of the 100 (Continue) status code allows the client to use the request header to test the server before sending the request message body to see if the server wants to receive the request body, and then decide whether to send the request body.
4. Chunked transfer-coding was introduced in HTTP/1.1 to solve the above problem. The sender divides the message into several data blocks of any size, and each data block will be attached with the block when sending. length, and finally use a zero-length block as a sign of the end of the message. This approach allows the sender to buffer only a fragment of the message, avoiding the overload caused by buffering the entire message.
5. HTTP/1.1 adds some new cache features on the basis of 1.0. When the Age of the cached object exceeds Expire, it becomes a stale object. The cache does not need to discard the stale object directly, but communicates with the source server. Perform revalidation.
The above is the detailed content of The difference between http1.0 and 1.1. For more information, please follow other related articles on the PHP Chinese website!

Springboot内置tomcat禁止不安全HTTP方法1、在tomcat的web.xml中可以配置如下内容让tomcat禁止不安全的HTTP方法/*PUTDELETEHEADOPTIONSTRACEBASIC2、Springboot使用内置tomcat没有web.xml配置文件,可以通过以下配置进行,简单来说就是要注入到Spring容器中@ConfigurationpublicclassTomcatConfig{@BeanpublicEmbeddedServletContainerFacto

1.HttpURLConnection使用JDK原生提供的net,无需其他jar包,代码如下:importcom.alibaba.fastjson.JSON;importjava.io.BufferedReader;importjava.io.InputStream;importjava.io.InputStreamReader;importjava.io.OutputStream;importjava.net.HttpURLConnection;

一、前言#ssl写在443端口后面。这样http和https的链接都可以用listen443sslhttp2default_server;server_namechat.chengxinsong.cn;#hsts的合理使用,max-age表明hsts在浏览器中的缓存时间,includesubdomainscam参数指定应该在所有子域上启用hsts,preload参数表示预加载,通过strict-transport-security:max-age=0将缓存设置为0可以撤销hstsadd_head

随着互联网的不断发展和改善,Web服务器在速度和性能上的需求也越来越高。为了满足这样的需求,Nginx已经成功地掌握了HTTP2协议并将其融入其服务器的性能中。HTTP2协议要比早期的HTTP协议更加高效,但同时也存在着特定的安全问题。本文将为您详细介绍如何进行Nginx的HTTP2协议优化和安全设置。一、Nginx的HTTP2协议优化1.启用HTTP2在N

httpkeepalive在http早期,每个http请求都要求打开一个tpcsocket连接,并且使用一次之后就断开这个tcp连接。使用keep-alive可以改善这种状态,即在一次tcp连接中可以持续发送多份数据而不会断开连接。通过使用keep-alive机制,可以减少tcp连接建立次数,也意味着可以减少time_wait状态连接,以此提高性能和提高httpd服务器的吞吐率(更少的tcp连接意味着更少的系统内核调用,socket的accept()和close()调用)。但是,keep-ali

一、urllib概述:urllib是Python中请求url连接的官方标准库,就是你安装了python,这个库就已经可以直接使用了,基本上涵盖了基础的网络请求功能。在Python2中主要为urllib和urllib2,在Python3中整合成了urllib。Python3.x中将urllib2合并到了urllib,之后此包分成了以下四个模块:urllib.request:它是最基本的http请求模块,用来模拟发送请求urllib.error:异常处理模块,如果出现错误可以捕获这些异常urllib

一、概述在实际开发过程中,我们经常需要调用对方提供的接口或测试自己写的接口是否合适。很多项目都会封装规定好本身项目的接口规范,所以大多数需要去调用对方提供的接口或第三方接口(短信、天气等)。在Java项目中调用第三方接口的方式有:1、通过JDK网络类Java.net.HttpURLConnection;2、通过common封装好的HttpClient;3、通过Apache封装好的CloseableHttpClient;4、通过SpringBoot-RestTemplate;二、Java调用第三方

被动检查对于被动健康检查,nginx和nginxplus会在事件发生时对其进行监控,并尝试恢复失败的连接。如果仍然无法恢复正常,nginx开源版和nginxplus会将服务器标记为不可用,并暂时停止向其发送请求,直到它再次标记为活动状态。上游服务器标记为不可用的条件是为每个上游服务器定义的,其中包含块中server指令的参数upstream:fail_timeout-设置服务器标记为不可用时必须进行多次失败尝试的时间,以及服务器标记为不可用的时间(默认为10秒)。max_fails-设置在fai

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

Dreamweaver CS6
Visual web development tools

WebStorm Mac version
Useful JavaScript development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
