Birds Eye View of HTTP

Written by Chris Inga


Continued from page 1

This sounds complex (andrepparttar details are!), but it is justrepparttar 118795 same asrepparttar 118796 person on Rock n Roll knowing to wait until they heard "over and out" before calling Jazz, and saying "over" atrepparttar 118797 end of each sentence. If no one followed these protocolsrepparttar 118798 channel would have been chaos, everyone trying to talk over everyone else. Inrepparttar 118799 same way, if your computer andrepparttar 118800 other computers onrepparttar 118801 internet did not followrepparttar 118802 specifications,repparttar 118803 fact that your computer sends out some numbers over your phone line would be as useless as it sounds inrepparttar 118804 first place! ... but, ifrepparttar 118805 rules are followed, it works.

I am not going to go intorepparttar 118806 actual details of these specifications, but you have probably seenrepparttar 118807 acronyms; TCP/IP and DNS (and a heap more!)

--* HTTP *--

Lets say that someone on Rock n Roll knows there is a football almanac onboard Jazz which will confirmrepparttar 118808 score of a particular game and settle an argument onboard Rock n Roll. When Rock n Roll hears Jazz say "this is Jazz, go ahead, over" they know they have a connection to Jazz and can start a conversation. Rock n Roll might say "Jazz can you get merepparttar 118809 score ofrepparttar 118810 1987 Superbowl, over", and Jazz comes back withrepparttar 118811 answer finishing with an "over". Rock n Roll might ask for another score, or might ask forrepparttar 118812 list of players, or might just say "thanks, over" and which point Jazz would say, "See ya, over and out".

--* http://Jazz/SuperbowlScore1987 *--

That is really what HTTP is doing. The connection has been made at lower separate layers which are handlingrepparttar 118813 numbers traveling out of your computer and moving them torepparttar 118814 computer you are connecting to. HTTP is a fairly simple specification that allows one computer to ask another for some information (by naming it), and for that information to be returned. It doesn't say anything about where that information comes from; as far asrepparttar 118815 HTTP specification is concerned, somebody could be sitting atrepparttar 118816 other computer typing inrepparttar 118817 response. However, usuallyrepparttar 118818 information that is asked for isrepparttar 118819 name of a file, which is a bunch of numbers onrepparttar 118820 hard drive. Those numbers get moved fromrepparttar 118821 hard drive into memory intorepparttar 118822 modem and back to your computer.

Thats it! That isrepparttar 118823 essence of HTTP.

The point is, to see why a geek can think something like HTTP is simple you need to think in layers like a geek. Thinking in layers is not some kind of zen like discipline for them, they probably do it without even being aware of it as that is what their tools and languages encourage. If a programmer was writing an HTTP program they may write something like:

LowerLayer connectTo: "Jazz". LowerLayer send: "GET SuperbowlScore1987". LowerLayer out.

The programmer who writes this is not thinking aboutrepparttar 118824 details of howrepparttar 118825 connection is established or howrepparttar 118826 message is sent. They may have no idea! When they are working with HTTP they just assumerepparttar 118827 lower layer works. If they, or you, do want to understandrepparttar 118828 lower layer, then put HTTP out of your mind and read up onrepparttar 118829 TCP/IP and DNS layers and specifications (have fun, and have a good supply of coffee ready).

Similarly, they are not trying to understand howrepparttar 118830 information that is received is displayed so nicely in your browser. That is a higher layer and yet another specification (HTML).

I hope you enjoyed reading this article, it has taken an unusual perspective of HTTP! If you want to read up onrepparttar 118831 details there are a number of good articles onrepparttar 118832 web andrepparttar 118833 HTTP specification itself.

Copyright 2003 Chris Inga Author of the Nici Picture Downloader software program for Windows that uses the HTTP protocol to download pictures from the web.


Digital Rights Management

Written by Thom Leggett


Continued from page 1

However, here is where DRM currently falls down. The distribution and licensing can only be enforced in theory because in order to work,repparttar content has to be viewed / played on a device or with software that supportsrepparttar 118794 particular flavour of DRM that you wish to apply. For example, as soon as you allow a file to be burnt to a standard CD, you have lost all control of it and limitless copies can again be made.

We arrive at a strange Catch 22 situation, whereby DRM is useless unless everybody adoptsrepparttar 118795 same system, but people won’t start to adopt a system that restricts their use so severely inrepparttar 118796 first instance.

The lack of widely available, reliable DRM is given byrepparttar 118797 record industry as a main reason for not launching online distribution channels themselves. But DRM won’t become widely available untilrepparttar 118798 music industry adopts it for online distribution.

As more and more intellectual property and copyright is distributed through email andrepparttar 118799 web, there is a greater need for a way of controlling this content. Slowly but surely, DRM technologies will become embedded into more and more software applications and hardware devices. As a recent example, Apple iTunes is an online music store which embeds DRM intorepparttar 118800 songs downloaded. Microsoft Office 2003 also embeds DRM enabling technologies, as does Windows Media Player.

An overly restrictive DRM solution will scare consumers away from protected content; but if content can be distributed freely with no reimbursement forrepparttar 118801 creator, then innovation andrepparttar 118802 development and sharing of new and exciting ideas will be stifled.

Inrepparttar 118803 end,repparttar 118804 answer torepparttar 118805 issues surrounding DRM will have to be a delicate balancing act between consumers onrepparttar 118806 one hand, and copyright owners and intellectual property creators onrepparttar 118807 other.

This article is copyright Fire Without Smoke Software Ltd 2003. You may reproduce withrepparttar 118808 appropriate credits intact.

Thom is the operations director and joint founder of fire without smoke software limited (FWOSS). FWOSS offer custom software development and accessible website design.


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use