没有合适的资源?快使用搜索试试~ 我知道了~
http protocol1.1_en
需积分: 9 11 下载量 48 浏览量
2007-12-31
01:39:50
上传
评论
收藏 2.44MB PDF 举报
温馨提示
试读
105页
RFC文档,hypertext transfer protocol\1.1
资源推荐
资源详情
资源评论
Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
HTTP/1.1
June 1999
[ Page 1 ]
RFC: 2616
Network Working Group R. Fielding
Request for Comments: 2616 UC Irvine
Obsoletes: 2068 J. Gettys
Category: Standards Track Compaq/W3C
J. Mogul
Compaq
H. Frystyk
W3C/MIT
L. Masinter
Xerox
P. Leach
Microsoft
T. Berners-Lee
W3C/MIT
June 1999
Hypertext Transfer Protocol -- HTTP/1.1
Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
HTTP/1.1
June 1999
[ Page 2 ]
Status of this Memo
This document species an Internet standards track protocol for the Internet community, and requests
discussion and suggestions for improvements. Please refer to the current edition of the "Internet Ofcial
Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (1999). All Rights Reserved.
Abstract
The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hy-
permedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond
its use for hypertext, such as name servers and distributed object management systems, through extension
of its request methods, error codes and headers [47]. A feature of HTTP is the typing and negotiation of data
representation, allowing systems to be built independently of the data being transferred.
HTTP has been in use by the World-Wide Web global information initiative since 1990. This specication
denes the protocol referred to as "HTTP/1.1", and is an update to RFC 2068 [33].
Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
HTTP/1.1
June 1999
[ Page 3 ]
Table of Contents
1 Introduction ....................................................................................................9
1.1 Purpose ...................................................................................................9
1.2 Requirements ..........................................................................................9
1.3 Terminology ...........................................................................................9
1.4 Overall Operation .................................................................................11
2 Notational Conventions and Generic Grammar ...........................................12
2.1 Augmented BNF ...................................................................................12
2.2 Basic Rules ...........................................................................................13
3 Protocol Parameters .....................................................................................14
3.1 HTTP Version .......................................................................................14
3.2 Uniform Resource Identiers ...............................................................15
3.2.1 General Syntax ..................................................................................15
3.2.2 http URL ............................................................................................15
3.2.3 URI Comparison ...............................................................................16
3.3 Date/Time Formats ...............................................................................16
3.3.1 Full Date ............................................................................................16
3.3.2 Delta Seconds ....................................................................................17
3.4 Character Sets .......................................................................................17
3.4.1 Missing Charset .................................................................................17
3.5 Content Codings ...................................................................................18
3.6 Transfer Codings ..................................................................................18
3.6.1 Chunked Transfer Coding .................................................................19
3.7 Media Types .........................................................................................20
3.7.1 Canonicalization and Text Defaults ..................................................20
3.7.2 Multipart Types .................................................................................20
3.8 Product Tokens .....................................................................................21
3.9 Quality Values ......................................................................................21
3.10 Language Tags ....................................................................................21
3.11 Entity Tags ..........................................................................................22
3.12 Range Units ........................................................................................22
4 HTTP Message .............................................................................................22
4.1 Message Types .....................................................................................22
4.2 Message Headers ..................................................................................23
4.3 Message Body ......................................................................................23
4.4 Message Length ...................................................................................24
4.5 General Header Fields ..........................................................................24
5 Request .........................................................................................................25
5.1 Request-Line ........................................................................................25
5.1.1 Method ..............................................................................................25
5.1.2 Request-URI ......................................................................................25
5.2 The Resource Identied by a Request ..................................................26
5.3 Request Header Fields ..........................................................................27
6 Response ......................................................................................................27
Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
HTTP/1.1
June 1999
[ Page 4 ]
6.1 Status-Line ...........................................................................................27
6.1.1 Status Code and Reason Phrase ........................................................27
6.2 Response Header Fields .......................................................................29
7 Entity ............................................................................................................29
7.1 Entity Header Fields .............................................................................29
7.2 Entity Body ..........................................................................................29
7.2.1 Type ...................................................................................................30
7.2.2 Entity Length .....................................................................................30
8 Connections ..................................................................................................30
8.1 Persistent Connections .........................................................................30
8.1.1 Purpose ..............................................................................................30
8.1.2 Overall Operation ..............................................................................30
8.1.2.1 Negotiation .....................................................................................31
8.1.2.2 Pipelining .......................................................................................31
8.1.3 Proxy Servers ....................................................................................31
8.1.4 Practical Considerations ....................................................................31
8.2 Message Transmission Requirements ..................................................32
8.2.1 Persistent Connections and Flow Control .........................................32
8.2.2 Monitoring Connections for Error Status Messages .........................32
8.2.3 Use of the 100 (Continue) Status ......................................................32
8.2.4 Client Behavior if Server Prematurely Closes Connection ...............33
9 Method Denitions ......................................................................................34
9.1 Safe and Idempotent Methods ..............................................................34
9.1.1 Safe Methods .....................................................................................34
9.1.2 Idempotent Methods ..........................................................................34
9.2 OPTIONS .............................................................................................34
9.3 GET ......................................................................................................35
9.4 HEAD ...................................................................................................35
9.5 POST ....................................................................................................36
9.6 PUT ......................................................................................................36
9.7 DELETE ...............................................................................................37
9.8 TRACE .................................................................................................37
9.9 CONNECT ...........................................................................................37
10 Status Code Denitions ..............................................................................37
10.1 Informational 1xx ...............................................................................37
10.1.1 100 Continue ...................................................................................38
10.1.2 101 Switching Protocols .................................................................38
10.2 Successful 2xx ....................................................................................38
10.2.1 200 OK ............................................................................................38
10.2.2 201 Created .....................................................................................38
10.2.3 202 Accepted ...................................................................................38
10.2.4 203 Non-Authoritative Information ................................................39
10.2.5 204 No Content ...............................................................................39
10.2.6 205 Reset Content ...........................................................................39
10.2.7 206 Partial Content ..........................................................................39
10.3 Redirection 3xx ..................................................................................40
Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
HTTP/1.1
June 1999
[ Page 5 ]
10.3.1 300 Multiple Choices ......................................................................40
10.3.2 301 Moved Permanently .................................................................40
10.3.3 302 Found ........................................................................................40
10.3.4 303 See Other ..................................................................................41
10.3.5 304 Not Modied ............................................................................41
10.3.6 305 Use Proxy .................................................................................41
10.3.7 306 (Unused) ...................................................................................41
10.3.8 307 Temporary Redirect ..................................................................42
10.4 Client Error 4xx ..................................................................................42
10.4.1 400 Bad Request .............................................................................42
10.4.2 401 Unauthorized ............................................................................42
10.4.3 402 Payment Required ....................................................................42
10.4.4 403 Forbidden .................................................................................42
10.4.5 404 Not Found .................................................................................42
10.4.6 405 Method Not Allowed ................................................................43
10.4.7 406 Not Acceptable .........................................................................43
10.4.8 407 Proxy Authentication Required ................................................43
10.4.9 408 Request Timeout .......................................................................43
10.4.10 409 Conict ...................................................................................43
10.4.11 410 Gone .......................................................................................43
10.4.12 411 Length Required .....................................................................44
10.4.13 412 Precondition Failed ................................................................44
10.4.14 413 Request Entity Too Large .......................................................44
10.4.15 414 Request-URI Too Long ..........................................................44
10.4.16 415 Unsupported Media Type .......................................................44
10.4.17 416 Requested Range Not Satisable ...........................................44
10.4.18 417 Expectation Failed ..................................................................44
10.5 Server Error 5xx .................................................................................44
10.5.1 500 Internal Server Error ................................................................45
10.5.2 501 Not Implemented ......................................................................45
10.5.3 502 Bad Gateway ............................................................................45
10.5.4 503 Service Unavailable .................................................................45
10.5.5 504 Gateway Timeout .....................................................................45
10.5.6 505 HTTP Version Not Supported ..................................................45
11 Access Authentication ................................................................................45
12 Content Negotiation ...................................................................................45
12.1 Server-driven Negotiation ..................................................................46
12.2 Agent-driven Negotiation ...................................................................46
12.3 Transparent Negotiation .....................................................................47
13 Caching in HTTP .......................................................................................47
13.1.1 Cache Correctness ...........................................................................48
13.1.2 Warnings ..........................................................................................48
13.1.3 Cache-control Mechanisms .............................................................49
13.1.4 Explicit User Agent Warnings .........................................................49
13.1.5 Exceptions to the Rules and Warnings ............................................49
13.1.6 Client-controlled Behavior ..............................................................49
13.2 Expiration Model ...............................................................................50
剩余104页未读,继续阅读
资源评论
pkuwwt
- 粉丝: 1
- 资源: 5
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功