Solved

Terminology:  HTTP Post

Posted on 2014-10-27
2
114 Views
Last Modified: 2014-10-27
I am confused by some of the conversations I have been having.

Does a HTTP post imply a send to a request / reply, and this the HTTP post will both send and wait for a response  (this is my understanding, but I notice that some use the term HTTP post to imply a condition where there is no wait for a reply)

Or does a HTTP Post simply a send, but does not wait for a response

Assuming that HTTP Post is a term normatively identifying a send and receive, what would be the correc tto for a simply HTTP send?

Thanks
0
Comment
Question by:Anthony Lucia
2 Comments
 
LVL 28

Accepted Solution

by:
becraig earned 250 total points
ID: 40406596
The POST request method is designed to request that a web server accept the data enclosed in the request message's body for storage.[1] It is often used when uploading a file or submitting a completed web form.

So the two main HTTP methods are POST and GET

GET simply implies a read - such as you go to a webpage and request a specific url without attempting to pass any data to the webserver.

POST however is a method utilized when you want to send data to the webserver, such as submitting a web form.
Generally when traffic is sent whether GET or POST we usually await a response from the server, so it is not really a matter of waiting for a response but rather pushing data to the server rather than simply requesting a resource on the web server.


Here is a link on other methods:
http://www.w3schools.com/tags/ref_httpmethods.asp
0
 
LVL 82

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 250 total points
ID: 40406895
As noted in the article that @becraig linked, HTTP POST and GET are Request methods.  You normally get a Response from the server when you make a request.  There is no method for just sending.  That's not how HTTP is intended to work.  Request and Response is how it works.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

This very simple solution applies to a narrow cross-section of the "needs to close" variety. In this case, the full message in Event Viewer was in applog, Event ID 1000: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module …
User Beware!  This is a rather permanent solution to removing your email from an exchange server.  The only way to truly go back is to have your exchange administrator restore your mailbox from backups.  This is usually the option of last resort.  A…
The viewer will learn how to simulate a series of coin tosses with the rand() function and learn how to make these “tosses” depend on a predetermined probability. Flipping Coins in Excel: Enter =RAND() into cell A2: Recalculate the random variable…
The viewer will learn how to simulate a series of sales calls dependent on a single skill level and learn how to simulate a series of sales calls dependent on two skill levels. Simulating Independent Sales Calls: Enter .75 into cell C2 – “skill leve…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now