Skip to main content

Diagram 2: HyperText Transfer Protocol

Protocols in ICT are set of rules that enforce certain manner of communication between different devices to allow them understand each other. HTTP is one of numerous protocols used to transfer information over the Internet and shortly it was designed in purpose of serving websites. 

HTTP version 1.0 or HTTP/1 was documented and published in 1996, followed by improved version 1.1 a year later, in 1997. HTTP/1.1 is still broadly used at present. Work on HHTP/2 was officially finalized in 2015 and the new version delivered number of performance and security improvements. Especially important advantage was multiplexing that created the possibility to request multiple files without the need of waiting for previous request to be completed.


Version 3 of HTTP introduces substantial changes to the protocol, altering the way of communication towards the manner known from live online applications like video games; maintaining open connection between client and server, and streaming all requested data simultaneously, majorly improving response time and security. While HTTP/3 is neither finalized nor widely available, it was already implemented as a draft and could be used. However it is strongly recommended to allow usage of older versions as HTTP/3 is not yet reliable and could change in the future.



 

Comments

Popular posts from this blog

Computer Ethics

The invention of computers was undeniably significant milestone for civilisation. Creation of that extensively versatile and multipurpose device was an advancement that commenced a new age - Information Age - in a history of humankind. However with new possibilities, new threats follows: cyber crime, cyber terrorism or cyber war. Computer ethics consists of rules, practices and areas that should be taken into consideration while designing, implementing and using information and communication technologies. It was a predecessor to ICT related legislation and expands current legal obligations for every individual involved.  The first of computer ethics commandments says: "Thou shalt not use a computer to harm other people".   Often ethic codes are assigned to activities that have potential to be unethical, and within computer sciences the first thought is majorly hacking. In general, hacking refers to activities leading to acquire access to systems or data without permission...