当前位置:网站首页>HTTP cache
HTTP cache
2022-07-29 02:35:00 【Meme_ xp】
What is mandatory caching
Do not initiate http request , Use local cache directly , For example, enter in the browser address bar , Use the browser's refresh button , stay Expires or max-age In the case of the entry into force , Trigger strong cache .
Files that are not frequently modified , Usually use strong cache
Negotiate the cache , Corresponding cache
Before using the local cache , Negotiate with the server first , Check whether the cache file is up to date . Ask the head to carry If-None-Match or If-Modified-Since, You can also carry them all


Negotiate cache related header Field
The negotiation cache is determined by the server whether the cache resource is available , So the client and server communicate through some kind of identification , So that the server can judge whether the request resource can be accessed by cache , This mainly involves the following two groups header Field , These two groups of partners are in pairs , That is, the response header of the first request is attached with a certain field (Last-Modified perhaps Etag), Then the subsequent request will be accompanied by the corresponding request field (If-Modified-Since perhaps If-None-Match), If the response header does not Last-Modified perhaps Etag Field , Then the request header will not have a corresponding field .
边栏推荐
- 数据安全与隐私计算峰会-安全求交集在隐私计算中的发展和应用:学习
- [upload pictures can be cut-1]
- I want to talk about high concurrency.
- 主从复制及其原理
- Code implementation - the greatest common factor of polynomials (linear algebra)
- Three methods of STM32 delay function
- How to customize a new tab in Duoyu security browser?
- HTTP断点续传以及缓存问题
- Quickly master nodejs installation and getting started
- Day 15 (VLAN related knowledge)
猜你喜欢

“12306”的架构到底有多牛逼?

The financing demand of 129 million yuan was released, and the roadshow of the Dake city project continued to irrigate the "good seedlings" of scientific innovation

无线振弦采集系统工作流程

Read the recent trends of okaleido tiger and tap the value and potential behind it

Responsive dream weaving template hotel room website

结合Retrofit 改造OKHttp 缓存

Esbuild Bundler HMR

Understand the evolution of redis architecture in one article

Exploration and practice of network security vulnerability management

What happens if you have to use ArrayList in multithreading?
随机推荐
Exploration and practice of network security vulnerability management
Remember error scheduler once Asynceventqueue: dropping event from queue shared causes OOM
多边形点测试
结合Retrofit 改造OKHttp 缓存
Interprocess communication - detailed explanation of the pipeline (explanation of graphic cases)
响应式织梦模板家装装饰类网站
外包公司“混”了2年,我只认真做了5件事,如今顺利拿到字节 Offer。
“两个披萨”团队的分支管理实践
JMeter's BeanShell generates MD5 encrypted data and writes it to the database
How does the Devops team defend against API attacks?
【质量】代码质量评价标准
代码实现 —— 多项式的最大公因式(线性代数)
详解JS的四种异步解决方案:回调函数、Promise、Generator、async/await
Prometheus + alertmanager message alert
PS + PL heterogeneous multicore case development manual for Ti C6000 tms320c6678 DSP + zynq-7045 (2)
如果时间不够,无法进行充分的测试怎么办?
MySQL basic operation and comprehensive instance project based on MySQL basic operation
3d智能工厂工艺流转可视化交互展示应用优点
Virsh console connection failure
工程经济学简答题