当前位置:网站首页>Overturn your cognition? The nature of get and post requests
Overturn your cognition? The nature of get and post requests
2022-07-06 04:09:00 【ZNineSun】
GET and POST yes HTTP Two basic methods of requesting , The difference between them , Maybe what we blurted out was :GET Include the parameter in URL in ,POST adopt request body Pass parameters .
Compare the official standard answer Like these :
- GET It is harmless when the browser is backout , and POST The request will be submitted again .
- GET Produced URL The address can be Bookmark, and POST Can not be .
- GET The request will be initiated by the browser cache, and POST Can't , Unless manually set .
- GET Request can only proceed url code , and POST Supports a variety of coding methods .
- GET The request parameters are fully preserved in the browser history , and POST The parameters in are not retained .
- GET Request in URL There is a length limit on the parameters passed in , and POST It has a .
- The data type for the parameter ,GET We only accept ASCII character , and POST There is no limit to .
- GET Than POST It's not safe , Because the parameters are directly exposed to URL On , So it can't be used to convey sensitive information .
- GET Parameters through URL Pass on ,POST Put it in Request body in .
Of course, it's good to answer these questions during the interview , In this article, do you think we just want to give you an interview answer ???no no no
If I told you GET and POST Is there no difference in essence between you and me ?
First of all, we need to understand GET and POST What is it? ?
HTTP Two ways to send requests in the protocol .
HTTP What is it? ?HTTP Is based on TCP/IP Protocol for how data is communicated on the world wide web .
HTTP The bottom is TCP/IP. therefore GET and POST The bottom layer is also TCP/IP, in other words ,GET/POST All are TCP link .GET and POST You can do the same thing . Do you want to GET add request body, to POST close url Parameters , Technically, it works perfectly .
that The problem is coming. , What are the standard answers above ?
TCP It's like a car , We use it TCP To transport data , It is very reliable , It never happens that fewer pieces are lost . But if we run as like as two peas, we'll run the same cars. , So the world looks like a mess , An urgent car may be blocked by a car full of goods ahead , The whole transportation system will be paralyzed .
To avoid that , traffic rules HTTP The birth of .HTTP There are several service categories for car transportation , Yes GET, POST, PUT, DELETE wait ,HTTP Regulations , When executed GET On request , To put a sticker on the car GET The label of ( Set up method by GET), And we need to put the transmitted data on the roof (url in ) To facilitate recording . If it is POST request , It's going to be pasted on the car POST The label of , And put the goods in the carriage .
Of course , You can also be in GET Sneak some goods into the car , But it was disgraceful ; It can also be in POST Put some data on the roof of the car , It feels silly .HTTP Just a Code of conduct , and TCP It's just GET and POST How to achieve the basic .
We only see HTTP Yes GET and POST Parameter transmission channel (url still requrest body) Put forward a request .“ The standard answer ” Where does the parameter size limit come from ?
In my world of the World Wide Web , There is another important role : Transportation company . Different browsers ( launch http request ) And the server ( Accept http request ) Just different shipping companies . Although theoretically , You can pile unlimited loads on the roof (url And an infinite number of arguments ).
But transportation companies are not stupid , Loading and unloading are also very costly , They will limit the number of shipments to limit the risk , Too much data is a burden on both the browser and the server . The unwritten rule in the industry is ,( majority ) Browsers often restrict url The length is in 2K Bytes , and ( majority ) Maximum server processing 64K The size of url. More than , We will not deal with it .
If you use GET service , stay request body Hiding the data , Different servers do different things , Some servers will unload for you , Read the data , Some servers just ignore it , therefore , although GET You can take request body, There is no guarantee that it will be received .
Okay , Now you know ,GET and POST It's essentially TCP link , There is no difference . But because of HTTP The rules and browsers / Server limitations , As a result, they show some differences in the application process .
GET and POST There is another important difference , To put it simply :
GET Produce a TCP Data packets ;POST Produce two TCP Data packets
- about GET Method request , The browser will http header and data Send along , Server response 200( Return the data );
- And for POST, Browser sends first header, Server response 100 continue, The browser sends data, Server response 200 ok( Return the data ).
in other words ,GET It only takes a car trip to get the goods to , and POST Have to run two , The first trip , Go and say hello to the server first “ hi , I have to deliver a shipment later , You open the door to meet me ”, Then go back and deliver the goods .
because POST Two steps are needed. , It takes a little more time , look GET Than POST More effective . therefore Yahoo The team has recommended GET Replace POST To optimize website performance . But this is a pit ! Jump in with caution . Why? ?
1.GET And POST Each has its own semantics , You can't mix them .
2. According to research , In a good network environment , The difference between the time to send a packet and the time to send two packets is negligible . And in the case of bad network environment , The two packages TCP On verifying packet integrity , It has great advantages .
3. Not all browsers will be there POST Send two packets in ,Firefox Just send it once .
So now look back at the standard answer above , Is there a deeper understanding !!!
边栏推荐
- Maxay paper latex template description
- Codeforces Round #770 (Div. 2) B. Fortune Telling
- 食品行业仓储条码管理系统解决方案
- Plus d'un milliard d'utilisateurs de grandes entreprises comme Facebook ont été compromis, il est temps de se concentrer sur le did
- Global and Chinese markets for endoscopic drying storage cabinets 2022-2028: Research Report on technology, participants, trends, market size and share
- C#(二十七)之C#窗体应用
- WPF effect Article 191 box selection listbox
- Redis (replicate dictionary server) cache
- C mouse event and keyboard event of C (XXVIII)
- asp. Core is compatible with both JWT authentication and cookies authentication
猜你喜欢
图应用详解
C#(二十七)之C#窗体应用
Viewing and verifying backup sets using dmrman
How many of the 10 most common examples of istio traffic management do you know?
MySQL reads missing data from a table in a continuous period of time
User datagram protocol UDP
简易博客系统
Path of class file generated by idea compiling JSP page
C mouse event and keyboard event of C (XXVIII)
[PSO] Based on PSO particle swarm optimization, matlab simulation of the calculation of the lowest transportation cost of goods at material points, including transportation costs, agent conversion cos
随机推荐
TCP/IP协议里面的网关地址和ip地址有什么区别?
The global and Chinese market of negative pressure wound therapy unit (npwtu) 2022-2028: Research Report on technology, participants, trends, market size and share
2/10 parallel search set +bfs+dfs+ shortest path +spfa queue optimization
Redis (replicate dictionary server) cache
/usr/bin/gzip: 1: ELF: not found/usr/bin/gzip: 3: : not found/usr/bin/gzip: 4: Syntax error:
asp. Core is compatible with both JWT authentication and cookies authentication
【leetcode】22. bracket-generating
C form application of C (27)
【leetcode】1189. Maximum number of "balloons"
Développement d'un module d'élimination des bavardages à clé basé sur la FPGA
Class A, B, C networks and subnet masks in IPv4
如何修改表中的字段约束条件(类型,default, null等)
Ks003 mall system based on JSP and Servlet
Solution to the problem that the root account of MySQL database cannot be logged in remotely
绑定在游戏对象上的脚本的执行顺序
MySql数据库root账户无法远程登陆解决办法
Web components series (VII) -- life cycle of custom components
Chinese brand hybrid technology: there is no best technical route, only better products
User datagram protocol UDP
Global and Chinese markets for MRI safe implants 2022-2028: technology, participants, trends, market size and share Research Report