US20070050375A1 - Extended HTTP error channel - Google Patents
Extended HTTP error channel Download PDFInfo
- Publication number
- US20070050375A1 US20070050375A1 US11/243,350 US24335005A US2007050375A1 US 20070050375 A1 US20070050375 A1 US 20070050375A1 US 24335005 A US24335005 A US 24335005A US 2007050375 A1 US2007050375 A1 US 2007050375A1
- Authority
- US
- United States
- Prior art keywords
- error
- http
- server
- header
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
Definitions
- FIG. 1 shows an HTTP message 50 .
- the exchange of HTTP messages 50 between an HTTP client 52 and an HTTP server 54 is well known in the art of client-server computing.
- Various RFCs and other public documents may be consulted for details about the various versions and variations of HTTP.
- RFC 2616 defines HTTP version 1.1.
- an HTTP message 50 that is for an HTTP request has a request line 54 , such as “GET/HTTP/1.1”.
- a request line 54 or status line 56 is usually followed by one or more headers, each consisting of a field name 60 and, depending on the particular header, zero or more field bodies 62 .
- a message 50 may end with a message body 64 , depending on the type of request or response. Details relating to delimiters, particular headers, and other features of HTTP messages and HTTP communication can be found elsewhere.
- FIG. 2 shows an example HTTP request 80 and an example HTTP response 82 .
- the HTTP client 52 sends request 80 over a data network 84 to the HTTP server 54 , which handles the request and returns the response 82 .
- the request 80 includes a request line 87 and a number of headers 88 (some requests also have a message body).
- the response 82 includes a status line 89 , headers 90 , and a message body 92 .
- HTTP communications need not travel over a network such as network 84 ; communication between a local client and a local server is possible, albeit usually through the local system's communications stacks.
- HTTP does not provide for authoring through an HTTP channel. That is, the standard HTTP specifications do not specifically provide for clients to manage resources on servers. There is no way for a client to perform resource management operations like copying resources (e.g., files, documents, etc.), moving resources on a server, setting or obtaining properties of resources on a server, locking resources, and so on.
- resource management operations like copying resources (e.g., files, documents, etc.), moving resources on a server, setting or obtaining properties of resources on a server, locking resources, and so on.
- various public and private extensions to HTTP have been devised.
- FIG. 3 shows some method extensions 100 and header extensions 102 of a protocol or extension of HTTP that adds remote authoring functionality on top of HTTP.
- These extensions are from RFC 2518, which defines “HTTP Extensions for Web Authoring and Versioning”, or “WebDAV”.
- WebDAV is a superset of HTTP that is sometimes referred to as a protocol, and sometimes referred to as an extension of HTTP.
- the WebDAV protocol defines conventions, methods 100 , and headers 102 , for requests and responses that otherwise comply with HTTP. That is, WebDAV requests and responses follow the basic format of HTTP messages (e.g., message 50 in FIG. 1 ).
- some of the verbs in the web authoring methods 100 are defined as valid HTTP verbs, however, their functionality is extended by WebDAV.
- PUT is part of HTTP, but WebDAV extends its functionality to collections, directories, folders, etc.
- the same basic HTTP communication rules are used, the same line/field/body delimiters are used, the same error codes may be used, and base HTTP methods 104 and base HTTP headers can appear in WebDAV messages.
- an ordinary HTTP OPTIONS request may be answered by a WebDAV-compliant server with a response that has standard HTTP headers as well as one or more non-standard HTTP headers that indicate the availability of one or more HTTP extensions on the server.
- this manner of extending HTTP allows servers and clients to handle both base HTTP communications as well as various extensions thereto, even if a remote system does not support an extension that is supported locally; unsupported headers and methods are usually ignored or handled gracefully.
- WebDAV extension to HTTP provides functionality to create, change and move documents on a remote server (typically a web server).
- WebDAV implementations are useful, among other things, for remotely authoring documents or resources served by a web server.
- WebDAV implementations can also be used for general access-anywhere web-based file storage.
- Many operating systems, such as Windows, Linux, and Mac OSX provide built-in client and server support for WebDAV, thus allowing transparent use of files on a WebDAV server somewhat as if they were stored in a local directory.
- PUT put a resource or collection on the server
- DELETE delete a resource or collection from the server
- PROPFIND reset and delete properties of a resource
- PROPPATCH change and delete properties of a resource
- MKCOL create collections or directories
- COPY copy a resource from one URI to another on the server
- MOVE move a resource from one URI to another on the server
- LOCK output a lock on a resource
- UNLOCK retracte a lock from a resource.
- destination specifies a URI as a destination resource for methods such as COPY and MOVE
- Lock-Token specifies a token that identifies a particular lock
- Timeout specifies a duration of a lock.
- FIG. 4 shows a timeline for a sequence of related authoring requests.
- a user of HTTP client 52 would like to get and lock a resource on HTTP server 54 .
- the user will first direct the client 52 to get a particular resource.
- the client 52 will generate and transmit a GET request 120 to the server 54 .
- the server 54 handles the GET request 120 and returns an appropriate response 122 .
- the round trip time is the time between client 52 's transmission of the GET request 120 and the receipt of response 122 . As can be seen in FIG.
- client 52 sends discrete LOCK request 124 ; LOCK request 124 passes through the network; and the server 54 replies with a response 126 that also crosses the network.
- the second exchange has its own round trip time that may include significant network transmission time.
- the total time 128 to meet two related needs of the client 52 includes the time for two round trips or four network transmissions.
- the two discrete requests 120 , 124 require approximately twice the server overhead as a single request, which might cause further delay if the server is heavily loaded.
- the requested resource could be modified or locked by another client (or the server 54 itself) between the time that client 52 requests the resource and the time the client 52 is able to obtain a lock on the resource.
- another request can affect the resource after it is received by the client 52 but before the client 52 is able to obtain a lock on the resource, which could cause an error or unexpected result.
- Certain client-server communication conventions extend compounded web authoring methods to a web authoring protocol such as WebDAV. More particularly, a web authoring request can be provided with special header information to signify a first web authoring method compounded with a second web authoring method indicated by a verb in the request. Clients and servers are provided with techniques to use the web authoring extensions. Extended error handling can be used to allow servers to provider richer web authoring error information to clients.
- FIG. 1 shows an HTTP message
- FIG. 2 shows an example HTTP request and an example HTTP response.
- FIG. 3 shows some method extensions and header extensions of a protocol or extension of HTTP that adds remote authoring functionality on top of HTTP.
- FIG. 4 shows a timeline for a sequence of related authoring requests.
- FIG. 5 shows some web authoring method extensions and compounding header extensions that can be used to allow clients and servers to compound two or more authoring related methods with single client-server exchanges.
- FIG. 6 shows an uncompounded authoring exchange and a compounded authoring exchange with a similar purpose.
- FIG. 7 shows how a client can determine if compounding is available on a server.
- FIG. 8 shows how requests can be formatted to invoke compounded locking.
- FIG. 9 shows a mechanism for compounding property methods with HTTP or WebDAV methods or verbs.
- FIG. 10 shows further compounded methods.
- FIG. 11 shows an example POST+PROPFIND+LOCK method request and a corresponding response.
- FIG. 12 shows an error handling table and examples of a response using extended error handling.
- FIG. 5 shows some web authoring method extensions 140 and compounding header extensions 142 that can be used to allow clients and servers to compound two or more authoring related methods with single client-server exchanges.
- the method extensions 140 are characterized as “methods”, they need not involve verbs or request lines 54 that are different than those defined by HTTP and WebDAV.
- the method extensions 140 discussed below effectuate compound authoring methods. As discussed below, these in-effect compound authoring method extensions 140 can be accomplished using various compounded header extensions 142 .
- ” respectively represent compounding and “or”. So, for example, the “POST
- An explanation of how the method extensions 140 can be implemented using header extensions 142 will follow. Methods 144 and 146 will be discussed with reference to FIG. 8 . Methods 148 and 150 will be discussed with reference to FIG. 9 . Methods 152 and 154 will be discussed with reference to FIGS. 10 and 11 .
- FIG. 6 shows an uncompounded authoring exchange and a compounded authoring exchange with a similar purpose.
- the left hand side of FIG. 6 a repetition of FIG. 4 —shows the flow of an uncompounded authoring exchange.
- the right hand side of FIG. 6 shows the flow of a compounded authoring exchange.
- a single request message 170 is sent by the client 52 .
- the request message 170 includes information indicating a GET operation directed to a resource on server 174 and information indicating that the server 174 is to also lock the resource for the client 172 .
- the total transaction time 174 for the compounded request 170 is less than the total transaction time 128 of the uncompounded requests 120 , 124 . Furthermore, because the server 174 can tell from the request message 170 that a lock is desired, the server 174 can immediately lock the requested resource, thus preventing an intervening request from interfering with client 172 's request.
- FIG. 7 shows how client 172 can determine if compounding is available on server 174 .
- a client it is desirable (but not necessary) for a client to be able to use both compounded and uncompounded authoring requests. It is also desirable for a server to be able to support both compounded and uncompounded authoring requests.
- a mechanism can be provided for this purpose.
- the mechanism involves including information in a server response that indicates whether compounding is supported by the server.
- this information can take any form, the use of a new response header 190 is convenient because clients usually ignore unrecognized headers in an HTTP response.
- known algorithms for header parsing can be readily extended to process a new header or field name.
- a compounding indicator can take the form of a new value for a standard header, a special status line, etc.
- the client 172 performs a process 192 that starts with sending a standard OPTIONS request 194 (request 194 is only an example).
- a process 196 on the server 174 receives the OPTIONS request 194 and generates a response such as response 198 that includes a compounding indicator, in this embodiment, non-standard response header 190 .
- the actual name of the non-standard response header 190 is not important other than it be known in advance by the client 172 so that when the client's 172 process 192 receives the response 198 it can recognize it and communicate with the server 174 as appropriate.
- FIG. 8 shows how requests can be formatted to invoke compounded locking.
- the top part corresponds to the extended methods 144 (see FIG. 5 ) for GET or POST locking
- the lower part corresponds to the extended methods 146 for PUT locking.
- ordinary HTTP and WebDAV request verbs 220 GET, POST, and PUT are compounded with locking requests using various combinations of a standard Lock-Token header 222 and a non-standard or extended lock timeout header 224 , for example “X-MSDAVEXTLock-Timeout”.
- the lock timeout header 224 has a value of 0 or more seconds.
- the lock timeout header 224 signifies the creation of a new lock according to the value of the lock timeout header 224 . If the Lock-Token header 222 is included then the lock timeout header 224 signals the refresh of an existing lock. If the lock timeout header 224 is set to 0 seconds than an unlock is indicated (in this case, the Lock-Token header 222 and a correct token are required to unlock the file). Furthermore, a Lock-Token header 222 and token are preferably included in the response to any write operation on a locked resource.
- Example request 228 shows what a typical POST+UNLOCK request might look like. Note the inclusion of a Lock-Token header 222 and a lock timeout header 224 .
- the Lock-token header 222 and correct token are needed to modify a locked resource. No token is needed if the resource is not locked. If no token is included but a lock time is specified, then the natural locking logic occurs; a lock is granted if no lock exists, and the PUT and lock are denied if a lock already exists.
- the correct token is included with a PUT request the client can perform any PUT operation or any PUT operation combined with a lock operation.
- a typical PUT+REFRESH request is shown by request 230 .
- the lock timeout value of 120 seconds indicates a refresh or resetting of the lifetime of the lock to run for another 120 seconds
- the lock token is the key that the server uses to authorize both the PUT operation and the REFRESH operation.
- a Lock-Token header included in a non-write operation is ignored; i.e., “GET+verify an existing lock” is not supported.
- FIG. 9 shows a mechanism for compounding property methods with HTTP or WebDAV methods or verbs. These compound methods correspond to the methods 148 , 150 in FIG. 5 .
- the compounded property methods use two indicators; a special content type header value 240 (e.g., “multipart/MSDAVEXTPrefixEncoded”) and a special extensions header 242 with various possible values such as “PROPFIND” and “PROPPATCH”.
- the combinations in table 244 are self-explanatory and the resulting methods allow a resource to be accessed or modified while at the same time obtaining or setting one or more properties of the relevant resource.
- the standard Content-length header will be used and will give the value of the total message body or payload, which may also include properties as well resources (discussed further below).
- property related methods are compounded onto other methods using headers and a message body extension
- other approaches may also be used.
- the WebDAV PROPFIND and PROPPATCH methods could be overloaded using new headers.
- there are different ways for combining a resource and a set of properties in a message body All of the properties can be put in separate headers, since most property sets are of manageable size. The properties could be assigned to respective different headers, although this would require more coding to handle transport of properties.
- all of the properties (XML structure) can be placed in one large header, however, headers could potentially become larger than the buffers that some web servers allocate for header handling.
- PROPATCH properties
- PROPFIND properties of a resource. For example, to determine whether a particular property was properly set, or to determine what a property was set to before it was changed with a PROPPATCH.
- PROPPATCH and “PROPFIND” can both be included, and a convention can be established for the location of sent and returned properties in the message body.
- WebDAV protocol does not specify particular properties for resources, some typical properties are analogous to properties of objects in a file system, for example content size, creation date, date of last modification, last modifying user, special folder type, resource tag, file attributes, creation time, last access time, last modified time, and so on.
- FIG. 9 also shows an example GET+PROPFIND response 250 .
- the content type header field 240 signals the presence of a multi-part message body using the special “multipart/MSDAVEXTPrefixEncodedheader” extension.
- the lock related information is not required for the PUT+PROPPATCH method but may signify the presence of a server-side lock.
- the content type header field 240 signifies the presence of the multi-part message body 248 within a message body 64 . Generally those multiple parts are divided by a length field followed by a corresponding data, in other words, the message body 64 carries one or more pieces of discrete data, each preceded by a corresponding length indicator. The sizes of the length fields and the sizes of their data add up to the standard Content-length header.
- the example response 250 in FIG. 9 happens to have a properties section and a resource section, each preceded by a respective length field, for example, a 64 bit integer.
- a respective length field for example, a 64 bit integer.
- compound authoring is designed as an HTTP extension
- the standard HTTP message body 64 is used.
- properties may need to be exchanged in a message that may also include a resource such as an HTML document
- the length-data pairings allow both properties and resources to be carried in a same message body 64 .
- the standard Content-length header gives the total length of the message body 64 / 248 and can be used, in conjunction with the length indicators, to parse out the substantive pieces of content in the message body 248 .
- FIG. 10 shows further compounded methods.
- the top message is an example of a PUT+PROPPATCH+UNLOCK request 270 .
- the bottom message is an example of a corresponding response 272 .
- a response that is successful need not differ from the response to a normal PUT request.
- FIG. 11 shows an example POST+PROPFIND+LOCK method request 290 and a corresponding response 292 .
- the request 290 causes the server to put a resource or file, set some properties, and unlock the file or resource.
- FIG. 12 shows an error handling table and examples of a response 302 using extended error handling.
- a number of types of errors can occur when creating a resource on a server via an extended HTTP authoring request, for example, insufficient permissions, a resource checked out by another user or not checked at all, a quota violation, or a blocked filename or file type, the presence of a virus, etc. Other errors such as a missing property can occur when attempting to write to a file or resource.
- the server may have rich system-level information about the error. Previously, when a module or server that implements WebDAV methods would encounters an error it would translate that error to a standard HTTP error code.
- a client might attempt to provide a useful message about the error code, perhaps using a corresponding hardcoded message string.
- the standard HTTP error codes are not rich enough to support the number and types of errors which users can encounter using extended HTTP authoring. Therefore, an extension is optionally provided to extend the error information fed back to a client, while keeping the existing HTTP error code, which allows for backward compatibility. This extended error handling is accomplished by including in responses information specific to system-level errors on the server.
- extended error handling can be realized using a new HTTP header, for instance “X-MSDAVEXT_ERROR: Decimal; String”.
- the decimal portion is a code that maps to a system-level error such as a Unix file control error or a Win32 error.
- the String portion is in UTF-8 format.
- proxy servers may attempt to interpret requests and send back cached responses. Therefore, it is preferable that clients only use the new extensions or methods with POST rather than GET. Furthermore, when responding to a concatenated method or verb as discussed above, a server should mark a response to indicate that it should not be cached, using, for example, a header like “cache-control: private”.
- the server and client processes for using extended compound authoring methods are fairly straight forward given conventions as discussed above. Publicly available source code and documentation can be consulted to determine how to implement servers and clients with the functionality for performing atomic authoring methods and in particular locking and property functionality. This functionality can be performed in serial fashion when a compound method is encountered. For example, whereas previously a server may have had a function to handle a LOCK method and a function to handle a POST method, roughly, those functions can be invoked consecutively when a compounded POST+LOCK method is received.
- HTTP and WebDAV have been discussed above, the ideas discussed above are expected to be applicable to any future variations or versions of HTTP and WebDAV.
- a standard protocol is considered to refer to any future or current standard protocol.
- a remote computer may store an example of the process described as software.
- a local or terminal computer may access the remote computer and download a part or all of the software to run the program.
- the local computer may download pieces of the software as needed, or distributively process by executing some software instructions at the local terminal and some at the remote computer (or computer network).
- all or a portion of the software instructions may be carried out by a dedicated circuit, such as a DSP, programmable logic array, or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
- Stored Programmes (AREA)
Abstract
Techniques for clients and servers to use the web authoring extensions, and in particular, extended error handling to allow servers to provider richer web authoring error information to clients.
Description
- This application is a continuation and claims the benefit of U.S. patent application Ser. No. 11/217,626, filed Aug. 31, 2005, titled “COMPOUNDING OF HTTP AUTHORING PROTOCOL”, which is incorporated herein by reference.
-
FIG. 1 shows anHTTP message 50. The exchange of HTTPmessages 50 between anHTTP client 52 and anHTTP server 54 is well known in the art of client-server computing. Various RFCs and other public documents may be consulted for details about the various versions and variations of HTTP. For instance, RFC 2616 defines HTTP version 1.1. According to RFC 2616, anHTTP message 50 that is for an HTTP request has arequest line 54, such as “GET/HTTP/1.1”. AnHTTP message 50 that is for an HTTP response instead has a status line 56, such as “HTTP/1.1 200 OK”. Arequest line 54 or status line 56 is usually followed by one or more headers, each consisting of afield name 60 and, depending on the particular header, zero ormore field bodies 62. Amessage 50 may end with amessage body 64, depending on the type of request or response. Details relating to delimiters, particular headers, and other features of HTTP messages and HTTP communication can be found elsewhere. -
FIG. 2 shows anexample HTTP request 80 and anexample HTTP response 82. The HTTPclient 52 sendsrequest 80 over adata network 84 to the HTTPserver 54, which handles the request and returns theresponse 82. Therequest 80 includes arequest line 87 and a number of headers 88 (some requests also have a message body). Theresponse 82 includes astatus line 89,headers 90, and amessage body 92. HTTP communications need not travel over a network such asnetwork 84; communication between a local client and a local server is possible, albeit usually through the local system's communications stacks. - A shortcoming with HTTP is that it does not provide for authoring through an HTTP channel. That is, the standard HTTP specifications do not specifically provide for clients to manage resources on servers. There is no way for a client to perform resource management operations like copying resources (e.g., files, documents, etc.), moving resources on a server, setting or obtaining properties of resources on a server, locking resources, and so on. In response to this shortcoming, various public and private extensions to HTTP have been devised.
-
FIG. 3 shows somemethod extensions 100 andheader extensions 102 of a protocol or extension of HTTP that adds remote authoring functionality on top of HTTP. These extensions are from RFC 2518, which defines “HTTP Extensions for Web Authoring and Versioning”, or “WebDAV”. WebDAV is a superset of HTTP that is sometimes referred to as a protocol, and sometimes referred to as an extension of HTTP. The WebDAV protocol defines conventions,methods 100, andheaders 102, for requests and responses that otherwise comply with HTTP. That is, WebDAV requests and responses follow the basic format of HTTP messages (e.g.,message 50 inFIG. 1 ). Technically, some of the verbs in theweb authoring methods 100 are defined as valid HTTP verbs, however, their functionality is extended by WebDAV. For example, PUT is part of HTTP, but WebDAV extends its functionality to collections, directories, folders, etc. The same basic HTTP communication rules are used, the same line/field/body delimiters are used, the same error codes may be used, andbase HTTP methods 104 and base HTTP headers can appear in WebDAV messages. For example an ordinary HTTP OPTIONS request may be answered by a WebDAV-compliant server with a response that has standard HTTP headers as well as one or more non-standard HTTP headers that indicate the availability of one or more HTTP extensions on the server. In general, this manner of extending HTTP allows servers and clients to handle both base HTTP communications as well as various extensions thereto, even if a remote system does not support an extension that is supported locally; unsupported headers and methods are usually ignored or handled gracefully. - The WebDAV extension to HTTP provides functionality to create, change and move documents on a remote server (typically a web server). WebDAV implementations are useful, among other things, for remotely authoring documents or resources served by a web server. WebDAV implementations can also be used for general access-anywhere web-based file storage. Many operating systems, such as Windows, Linux, and Mac OSX provide built-in client and server support for WebDAV, thus allowing transparent use of files on a WebDAV server somewhat as if they were stored in a local directory.
- The methods and headers of WebDAV are fully documented elsewhere, however, the main methods are: PUT—put a resource or collection on the server; DELETE—delete a resource or collection from the server; PROPFIND—retrieve properties (as XML) of a resource; PROPPATCH—change and delete properties of a resource; MKCOL—create collections or directories; COPY—copy a resource from one URI to another on the server; MOVE—move a resource from one URI to another on the server; LOCK—put a lock on a resource; UNLOCK—remove a lock from a resource. Some notable headers (field names) are: destination—specifies a URI as a destination resource for methods such as COPY and MOVE; Lock-Token—specifies a token that identifies a particular lock; and Timeout—specifies a duration of a lock.
- It has not previously been recognized that there are certain inefficiencies and weaknesses built into WebDAV that can become significant in certain circumstances.
FIG. 4 shows a timeline for a sequence of related authoring requests. Suppose that a user ofHTTP client 52 would like to get and lock a resource onHTTP server 54. The user will first direct theclient 52 to get a particular resource. Theclient 52 will generate and transmit aGET request 120 to theserver 54. Theserver 54 handles theGET request 120 and returns anappropriate response 122. The round trip time is the time betweenclient 52's transmission of theGET request 120 and the receipt ofresponse 122. As can be seen inFIG. 4 , much of the round trip time can be attributed to the time that it takes for theGET request 120 and theresponse 122 to traverse the network. If the user also needs to lock the resource obtained by GETrequest 120, another round of communication is needed:client 52 sendsdiscrete LOCK request 124;LOCK request 124 passes through the network; and theserver 54 replies with aresponse 126 that also crosses the network. The second exchange has its own round trip time that may include significant network transmission time. Thetotal time 128 to meet two related needs of the client 52 (the need to both get and lock a resource) includes the time for two round trips or four network transmissions. Furthermore, the twodiscrete requests - Another problem with the example in
FIG. 4 is that the requested resource could be modified or locked by another client (or theserver 54 itself) between the time thatclient 52 requests the resource and the time theclient 52 is able to obtain a lock on the resource. In other words, another request can affect the resource after it is received by theclient 52 but before theclient 52 is able to obtain a lock on the resource, which could cause an error or unexpected result. - The atomic nature of WebDAV and the inability of WebDAV clients and servers to use compound or multi-aspect authoring requests with one discrete exchange may have other problems and inconveniences. Without necessity, some embodiments discussed below may alleviate some problems associated with HTTP authoring.
- The following summary is included only to introduce some concepts discussed in the Detailed Description below. This summary is not comprehensive and is not intended to delineate the scope of protectable subject matter, which is set forth by the claims presented at the end.
- Certain client-server communication conventions extend compounded web authoring methods to a web authoring protocol such as WebDAV. More particularly, a web authoring request can be provided with special header information to signify a first web authoring method compounded with a second web authoring method indicated by a verb in the request. Clients and servers are provided with techniques to use the web authoring extensions. Extended error handling can be used to allow servers to provider richer web authoring error information to clients.
- Many of the attendant features will be more readily appreciated by referring to the following detailed description considered in connection with the accompanying drawings.
- Like reference numerals are used to designate like parts in the accompanying Drawings.
-
FIG. 1 shows an HTTP message. -
FIG. 2 shows an example HTTP request and an example HTTP response. -
FIG. 3 shows some method extensions and header extensions of a protocol or extension of HTTP that adds remote authoring functionality on top of HTTP. -
FIG. 4 shows a timeline for a sequence of related authoring requests. -
FIG. 5 shows some web authoring method extensions and compounding header extensions that can be used to allow clients and servers to compound two or more authoring related methods with single client-server exchanges. -
FIG. 6 shows an uncompounded authoring exchange and a compounded authoring exchange with a similar purpose. -
FIG. 7 shows how a client can determine if compounding is available on a server. -
FIG. 8 shows how requests can be formatted to invoke compounded locking. -
FIG. 9 shows a mechanism for compounding property methods with HTTP or WebDAV methods or verbs. -
FIG. 10 shows further compounded methods. -
FIG. 11 shows an example POST+PROPFIND+LOCK method request and a corresponding response. -
FIG. 12 shows an error handling table and examples of a response using extended error handling. -
FIG. 5 shows some webauthoring method extensions 140 and compoundingheader extensions 142 that can be used to allow clients and servers to compound two or more authoring related methods with single client-server exchanges. Although themethod extensions 140 are characterized as “methods”, they need not involve verbs orrequest lines 54 that are different than those defined by HTTP and WebDAV. However, conceptually, themethod extensions 140 discussed below effectuate compound authoring methods. As discussed below, these in-effect compoundauthoring method extensions 140 can be accomplished using various compoundedheader extensions 142. - In the Figures, the symbols “+” and “|” (vertical bar) respectively represent compounding and “or”. So, for example, the “POST|GET+LOCK|REFRESH|UNLOCK”
method 144 represents a number of discrete compound methods: “POST+LOCK”, “POST+UNLOCK”, “GET+LOCK”, etc. An explanation of how themethod extensions 140 can be implemented usingheader extensions 142 will follow.Methods FIG. 8 . Methods 148 and 150 will be discussed with reference toFIG. 9 .Methods FIGS. 10 and 11 . -
FIG. 6 shows an uncompounded authoring exchange and a compounded authoring exchange with a similar purpose. The left hand side ofFIG. 6 —a repetition ofFIG. 4 —shows the flow of an uncompounded authoring exchange. The right hand side ofFIG. 6 shows the flow of a compounded authoring exchange. On the right hand side ofFIG. 6 (the compounded example), asingle request message 170 is sent by theclient 52. Therequest message 170 includes information indicating a GET operation directed to a resource onserver 174 and information indicating that theserver 174 is to also lock the resource for theclient 172. In the compounded case, there is one exchange with the time of one round trip. Thetotal transaction time 174 for the compoundedrequest 170 is less than thetotal transaction time 128 of theuncompounded requests server 174 can tell from therequest message 170 that a lock is desired, theserver 174 can immediately lock the requested resource, thus preventing an intervening request from interfering withclient 172's request. -
FIG. 7 shows howclient 172 can determine if compounding is available onserver 174. As mentioned earlier, it is desirable (but not necessary) for a client to be able to use both compounded and uncompounded authoring requests. It is also desirable for a server to be able to support both compounded and uncompounded authoring requests. A mechanism can be provided for this purpose. Preferably, the mechanism involves including information in a server response that indicates whether compounding is supported by the server. Although this information can take any form, the use of anew response header 190 is convenient because clients usually ignore unrecognized headers in an HTTP response. Furthermore, known algorithms for header parsing can be readily extended to process a new header or field name. In the alternative, a compounding indicator can take the form of a new value for a standard header, a special status line, etc. - To establish the availability of compounding, the
client 172 performs aprocess 192 that starts with sending a standard OPTIONS request 194 (request 194 is only an example). Aprocess 196 on theserver 174 receives theOPTIONS request 194 and generates a response such asresponse 198 that includes a compounding indicator, in this embodiment,non-standard response header 190. The actual name of thenon-standard response header 190 is not important other than it be known in advance by theclient 172 so that when the client's 172process 192 receives theresponse 198 it can recognize it and communicate with theserver 174 as appropriate. -
FIG. 8 shows how requests can be formatted to invoke compounded locking. The top part corresponds to the extended methods 144 (seeFIG. 5 ) for GET or POST locking, and the lower part corresponds to theextended methods 146 for PUT locking. In one embodiment, ordinary HTTP and WebDAV request verbs 220 GET, POST, and PUT are compounded with locking requests using various combinations of a standard Lock-Token header 222 and a non-standard or extendedlock timeout header 224, for example “X-MSDAVEXTLock-Timeout”. Thelock timeout header 224 has a value of 0 or more seconds. - The
lock timeout header 224 signifies the creation of a new lock according to the value of thelock timeout header 224. If the Lock-Token header 222 is included then thelock timeout header 224 signals the refresh of an existing lock. If thelock timeout header 224 is set to 0 seconds than an unlock is indicated (in this case, the Lock-Token header 222 and a correct token are required to unlock the file). Furthermore, a Lock-Token header 222 and token are preferably included in the response to any write operation on a locked resource.Example request 228 shows what a typical POST+UNLOCK request might look like. Note the inclusion of a Lock-Token header 222 and alock timeout header 224. - Referring to the PUT verb combined with a locking operation, note that the Lock-
token header 222 and correct token are needed to modify a locked resource. No token is needed if the resource is not locked. If no token is included but a lock time is specified, then the natural locking logic occurs; a lock is granted if no lock exists, and the PUT and lock are denied if a lock already exists. In sum, if the correct token is included with a PUT request the client can perform any PUT operation or any PUT operation combined with a lock operation. A typical PUT+REFRESH request is shown byrequest 230. The lock timeout value of 120 seconds indicates a refresh or resetting of the lifetime of the lock to run for another 120 seconds, and the lock token is the key that the server uses to authorize both the PUT operation and the REFRESH operation. In a preferred embodiment a Lock-Token header included in a non-write operation is ignored; i.e., “GET+verify an existing lock” is not supported. -
FIG. 9 shows a mechanism for compounding property methods with HTTP or WebDAV methods or verbs. These compound methods correspond to the methods 148, 150 inFIG. 5 . The compounded property methods use two indicators; a special content type header value 240 (e.g., “multipart/MSDAVEXTPrefixEncoded”) and aspecial extensions header 242 with various possible values such as “PROPFIND” and “PROPPATCH”. The combinations in table 244 are self-explanatory and the resulting methods allow a resource to be accessed or modified while at the same time obtaining or setting one or more properties of the relevant resource. Furthermore, the standard Content-length header will be used and will give the value of the total message body or payload, which may also include properties as well resources (discussed further below). - In conformance with the rules of table 244, an example GET+
PROPFIND request 246 is shown. Note the inclusion of an indication of the PROPFIND portion of the method in the form of thespecial extensions header 242 with the appropriate value or verb. - Although in one embodiment property related methods are compounded onto other methods using headers and a message body extension, other approaches may also be used. For example, the WebDAV PROPFIND and PROPPATCH methods could be overloaded using new headers. Furthermore, there are different ways for combining a resource and a set of properties in a message body. All of the properties can be put in separate headers, since most property sets are of manageable size. The properties could be assigned to respective different headers, although this would require more coding to handle transport of properties. In another embodiment, all of the properties (XML structure) can be placed in one large header, however, headers could potentially become larger than the buffers that some web servers allocate for header handling.
- It is possible that some implementations may need to simultaneously set properties (PROPATCH) and get properties (PROPFIND) of a resource. For example, to determine whether a particular property was properly set, or to determine what a property was set to before it was changed with a PROPPATCH. In this case, “PROPPATCH” and “PROPFIND” can both be included, and a convention can be established for the location of sent and returned properties in the message body.
- Although the WebDAV protocol does not specify particular properties for resources, some typical properties are analogous to properties of objects in a file system, for example content size, creation date, date of last modification, last modifying user, special folder type, resource tag, file attributes, creation time, last access time, last modified time, and so on.
-
FIG. 9 also shows an example GET+PROPFIND response 250. Note that the contenttype header field 240 signals the presence of a multi-part message body using the special “multipart/MSDAVEXTPrefixEncodedheader” extension. The lock related information is not required for the PUT+PROPPATCH method but may signify the presence of a server-side lock. The contenttype header field 240 signifies the presence of themulti-part message body 248 within amessage body 64. Generally those multiple parts are divided by a length field followed by a corresponding data, in other words, themessage body 64 carries one or more pieces of discrete data, each preceded by a corresponding length indicator. The sizes of the length fields and the sizes of their data add up to the standard Content-length header. Theexample response 250 inFIG. 9 happens to have a properties section and a resource section, each preceded by a respective length field, for example, a 64 bit integer. Because compound authoring is designed as an HTTP extension, the standardHTTP message body 64 is used. Because properties may need to be exchanged in a message that may also include a resource such as an HTML document, the length-data pairings allow both properties and resources to be carried in asame message body 64. The standard Content-length header gives the total length of themessage body 64/248 and can be used, in conjunction with the length indicators, to parse out the substantive pieces of content in themessage body 248. - Referring back to the
methods FIG. 5 (POST|GET+PROPFIND+LOCK|REFRESH|UNLOCK, PUT+PROPPATCH+LOCK|REFRESH|UNLOCK), these methods can be implemented by combining the properties and locking extensions discussed above. Because locking functionality and properties functionality is logically separate, the methods and headers discussed above can readily coexist in a message.FIG. 10 shows further compounded methods. The top message is an example of a PUT+PROPPATCH+UNLOCK request 270. Note the size of the body, including the size of the length fields, is 114234. The bottom message is an example of acorresponding response 272. A response that is successful need not differ from the response to a normal PUT request. The lack of a lock token header denotes a successful unlock.FIG. 11 shows an example POST+PROPFIND+LOCK method request 290 and acorresponding response 292. Therequest 290 causes the server to put a resource or file, set some properties, and unlock the file or resource. -
FIG. 12 shows an error handling table and examples of aresponse 302 using extended error handling. A number of types of errors can occur when creating a resource on a server via an extended HTTP authoring request, for example, insufficient permissions, a resource checked out by another user or not checked at all, a quota violation, or a blocked filename or file type, the presence of a virus, etc. Other errors such as a missing property can occur when attempting to write to a file or resource. When an authoring error occurs on a server, typically the server may have rich system-level information about the error. Previously, when a module or server that implements WebDAV methods would encounters an error it would translate that error to a standard HTTP error code. A client might attempt to provide a useful message about the error code, perhaps using a corresponding hardcoded message string. However, the standard HTTP error codes are not rich enough to support the number and types of errors which users can encounter using extended HTTP authoring. Therefore, an extension is optionally provided to extend the error information fed back to a client, while keeping the existing HTTP error code, which allows for backward compatibility. This extended error handling is accomplished by including in responses information specific to system-level errors on the server. - As seen in
FIG. 12 , extended error handling can be realized using a new HTTP header, for instance “X-MSDAVEXT_ERROR: Decimal; String”. The decimal portion is a code that maps to a system-level error such as a Unix file control error or a Win32 error. Preferably, the String portion is in UTF-8 format. - Regarding compounding extensions of web authoring protocols in general, it should be noted that some proxy servers may attempt to interpret requests and send back cached responses. Therefore, it is preferable that clients only use the new extensions or methods with POST rather than GET. Furthermore, when responding to a concatenated method or verb as discussed above, a server should mark a response to indicate that it should not be cached, using, for example, a header like “cache-control: private”.
- The server and client processes for using extended compound authoring methods are fairly straight forward given conventions as discussed above. Publicly available source code and documentation can be consulted to determine how to implement servers and clients with the functionality for performing atomic authoring methods and in particular locking and property functionality. This functionality can be performed in serial fashion when a compound method is encountered. For example, whereas previously a server may have had a function to handle a LOCK method and a function to handle a POST method, roughly, those functions can be invoked consecutively when a compounded POST+LOCK method is received.
- Although HTTP and WebDAV have been discussed above, the ideas discussed above are expected to be applicable to any future variations or versions of HTTP and WebDAV. Furthermore, a standard protocol is considered to refer to any future or current standard protocol.
- In conclusion, those skilled in the art will realize that storage devices utilized to store program instructions can be distributed across a network. For example a remote computer may store an example of the process described as software. A local or terminal computer may access the remote computer and download a part or all of the software to run the program. Alternatively the local computer may download pieces of the software as needed, or distributively process by executing some software instructions at the local terminal and some at the remote computer (or computer network). Those skilled in the art will also realize that by utilizing conventional techniques known to those skilled in the art, all or a portion of the software instructions may be carried out by a dedicated circuit, such as a DSP, programmable logic array, or the like.
- All of the embodiments and features discussed above can be realized in the form of information stored in volatile or non-volatile computer or device readable medium. This is deemed to include at least media such as CD-ROM, magnetic media, flash ROM, etc., storing machine executable instructions, or source code, or any other information that can be used to enable a computing device to perform the various embodiments. This is also deemed to include at least volatile memory such as RAM storing information such as CPU instructions during execution of a program carrying out an embodiment.
Claims (20)
1. Volatile or non-volatile machine-readable media storing information to enable a device to perform a process for servicing requests from clients, the process comprising:
handling standard HTTP get requests, standard HTTP post requests, and standard HTTP options requests and sending responses to corresponding clients;
handling HTTP standard or non-standard authoring requests that direct the device to lock/unlock resources or direct the device to obtain or set properties of resources; and
when errors occur handling the HTTP authoring requests, returning responses comprising error information that is not a HTTP status code.
2. Media according to claim 1 , where the error information corresponds to a system error of the device that caused the errors to occur.
3. Media according to claim 1 , where the error information comprises an extended error header name and an accompanying header field comprising information identifying and/or describing a corresponding error.
4. Media according to claim 3 , wherein the header field comprises a system error code of the device.
5. Media according to claim 3 , wherein the header field comprises a string specifically describing the error.
6. Media according to claim 3 , wherein the header field comprises a system error code of the device, the error code comprising or identifying a system error of the device.
7. Media according to claim 3 , wherein the system error comprises a file locking error, or a file or directory read error, or a file or directory write error.
8. Volatile or non-volatile medium for storing digital data, the medium storing an HTTP response, the HTTP response comprising:
a standard HTTP status code header and corresponding HTTP error code; and
an indication of a server-side error, where the indication is not defined by a standard HTTP.
9. Medium according to claim 8 , wherein the indication comprises an HTTP header field specifically defined for conveying extended error information other than standard HTTP error codes.
10. Medium according to claim 9 , wherein the header field comprises a field name not defined by a standard HTTP protocol and a field body that carries extended error information about the server-side error.
11. Medium according to claim 10 , wherein the field body identifies a particular type of server-side error and that error does not correspond to a standard HTTP error code.
12. Medium according to claim 10 , wherein the field body comprises an operating system error code or a string describing an operating system error.
13. Medium according to claim 12 , wherein the server-side error comprises an operating system locking error, or an error reading or writing a server file or server directory.
14. Volatile or non-volatile storage for use with a processing device and storing information for enabling the processing device to perform a process, the process comprising:
generating an HTTP request and sending the HTTP request to a server;
receiving from the server an HTTP response to the HTTP request; and
parsing the HTTP response for a non-standard extended error header and extracting from the non-standard extended error header information about an error on the server.
15. A storage according to claim 14 , wherein the HTTP request further comprises a standard HTTP status code header and corresponding error number.
16. A storage according to claim 15 , wherein the information about the error on the system comprises detail about a specific type of file system or operating system error on the server.
17. A storage according to claim 14 , wherein the information about the error on the server comprises an operating system error number.
18. A storage according to claim 14 , wherein the information about the error on the server comprises a string describing an operating system error.
19. A storage according to claim 14 , wherein the information about the error on the server identifies or describes a specific system-level error of the server.
20. A storage according to claim 14 , wherein the HTTP requests comprises an HTTP-based authoring request, either compounded or non-compounded, and the error on the server was an error performing a locking-related or properties-related method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/243,350 US20070050375A1 (en) | 2005-08-31 | 2005-10-04 | Extended HTTP error channel |
US11/598,489 US8010850B2 (en) | 2005-08-31 | 2006-11-13 | Client extended error handling |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/217,626 US7600030B2 (en) | 2005-08-31 | 2005-08-31 | Compounding of HTTP authoring protocol |
US11/243,350 US20070050375A1 (en) | 2005-08-31 | 2005-10-04 | Extended HTTP error channel |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/217,626 Continuation US7600030B2 (en) | 2005-08-31 | 2005-08-31 | Compounding of HTTP authoring protocol |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/217,626 Continuation-In-Part US7600030B2 (en) | 2005-08-31 | 2005-08-31 | Compounding of HTTP authoring protocol |
US11/598,489 Continuation-In-Part US8010850B2 (en) | 2005-08-31 | 2006-11-13 | Client extended error handling |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070050375A1 true US20070050375A1 (en) | 2007-03-01 |
Family
ID=37805592
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/217,626 Expired - Fee Related US7600030B2 (en) | 2005-08-31 | 2005-08-31 | Compounding of HTTP authoring protocol |
US11/243,350 Abandoned US20070050375A1 (en) | 2005-08-31 | 2005-10-04 | Extended HTTP error channel |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/217,626 Expired - Fee Related US7600030B2 (en) | 2005-08-31 | 2005-08-31 | Compounding of HTTP authoring protocol |
Country Status (8)
Country | Link |
---|---|
US (2) | US7600030B2 (en) |
KR (1) | KR101279690B1 (en) |
CN (1) | CN101243659B (en) |
BR (1) | BRPI0614275A2 (en) |
CA (1) | CA2617059C (en) |
NO (1) | NO20080231L (en) |
RU (1) | RU2433460C2 (en) |
WO (1) | WO2007027426A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532930A (en) * | 2013-09-18 | 2014-01-22 | 万达信息股份有限公司 | Distributed service system-oriented extension protocol |
US8930443B1 (en) * | 2010-03-19 | 2015-01-06 | Amazon Technologies, Inc. | Distributed network page generation |
CN105872090A (en) * | 2016-05-27 | 2016-08-17 | 四川长虹电器股份有限公司 | HTTP communication method based on extension status codes |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6629127B1 (en) * | 1999-07-26 | 2003-09-30 | Microsoft Corporation | Methods and systems for processing HTTP requests |
US7873710B2 (en) * | 2007-02-06 | 2011-01-18 | 5O9, Inc. | Contextual data communication platform |
US7747784B2 (en) * | 2008-03-04 | 2010-06-29 | Apple Inc. | Data synchronization protocol |
US8490052B2 (en) * | 2008-10-14 | 2013-07-16 | Microsoft Corporation | Declarative programming model for authoring and execution control and data flow for resource oriented system |
US8438295B2 (en) | 2008-10-14 | 2013-05-07 | Microsoft Corporation | Declarative programming model for modeling and execution of triggers for resource oriented system |
US8533666B2 (en) * | 2008-10-17 | 2013-09-10 | Microsoft Corporation | Interactive design environments to visually model, debug and execute resource oriented programs |
US8725834B2 (en) * | 2012-03-16 | 2014-05-13 | Sap Ag | Access of resources by way of hypertext transfer protocol |
US20140280484A1 (en) * | 2013-03-15 | 2014-09-18 | Oliver Klemenz | Dynamic Service Extension Infrastructure For Cloud Platforms |
KR101512040B1 (en) * | 2013-10-24 | 2015-04-14 | 에스케이텔레콤 주식회사 | Method and apparatus for processing traffic |
JP2015179894A (en) | 2014-03-18 | 2015-10-08 | キヤノン株式会社 | Information processing apparatus, system, information processing method, and program |
US10171548B2 (en) * | 2014-08-26 | 2019-01-01 | Mavenir Systems, Inc. | Method and system for efficient enrichment of upper layer protocol content in transmission control program (TCP) based sessions |
Family Cites Families (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2964831B2 (en) | 1993-03-31 | 1999-10-18 | 富士ゼロックス株式会社 | Structural data processing device |
US5848234A (en) | 1993-05-21 | 1998-12-08 | Candle Distributed Solutions, Inc. | Object procedure messaging facility |
US5491822A (en) | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Multi-phase commit processing for creation and deletion of managed objects |
US5793966A (en) | 1995-12-01 | 1998-08-11 | Vermeer Technologies, Inc. | Computer system and computer-implemented process for creation and maintenance of online services |
WO1997007638A1 (en) | 1995-08-15 | 1997-02-27 | Broadcom Eireann Research Limited | A communications network management system |
US5956483A (en) | 1996-06-28 | 1999-09-21 | Microsoft Corporation | System and method for making function calls from a web browser to a local application |
US5935211A (en) | 1996-07-10 | 1999-08-10 | Microsoft Corporation | Distributed notification |
US6208952B1 (en) | 1996-10-24 | 2001-03-27 | Microsoft Corporation | Method and system for delayed registration of protocols |
KR100207710B1 (en) | 1996-12-27 | 1999-07-15 | 윤종용 | Printing apparatus for pda and method therefor |
US6012087A (en) | 1997-01-14 | 2000-01-04 | Netmind Technologies, Inc. | Unique-change detection of dynamic web pages using history tables of signatures |
US5999979A (en) | 1997-01-30 | 1999-12-07 | Microsoft Corporation | Method and apparatus for determining a most advantageous protocol for use in a computer network |
US6408336B1 (en) | 1997-03-10 | 2002-06-18 | David S. Schneider | Distributed administration of access to information |
US6128653A (en) | 1997-03-17 | 2000-10-03 | Microsoft Corporation | Method and apparatus for communication media commands and media data using the HTTP protocol |
US6260148B1 (en) | 1997-04-04 | 2001-07-10 | Microsoft Corporation | Methods and systems for message forwarding and property notifications using electronic subscriptions |
US6266701B1 (en) | 1997-07-02 | 2001-07-24 | Sitara Networks, Inc. | Apparatus and method for improving throughput on a data network |
CN1108685C (en) * | 1997-08-06 | 2003-05-14 | 塔奇勇公司 | Distributed system and method for prefetching objects |
US6067558A (en) | 1997-09-18 | 2000-05-23 | Wendt; James Gordon | Method and apparatus for providing increased content from a resource constrained device |
US6401097B1 (en) | 1998-01-23 | 2002-06-04 | Mccotter Thomas M. | System and method for integrated document management and related transmission and access |
US6208640B1 (en) | 1998-02-27 | 2001-03-27 | David Spell | Predictive bandwidth allocation method and apparatus |
US6356920B1 (en) | 1998-03-09 | 2002-03-12 | X-Aware, Inc | Dynamic, hierarchical data exchange system |
US6029200A (en) | 1998-03-09 | 2000-02-22 | Microsoft Corporation | Automatic protocol rollover in streaming multimedia data delivery system |
US6253217B1 (en) | 1998-08-31 | 2001-06-26 | Xerox Corporation | Active properties for dynamic document management system configuration |
US6269380B1 (en) | 1998-08-31 | 2001-07-31 | Xerox Corporation | Property based mechanism for flexibility supporting front-end and back-end components having different communication protocols |
US6332127B1 (en) | 1999-01-28 | 2001-12-18 | International Business Machines Corporation | Systems, methods and computer program products for providing time and location specific advertising via the internet |
GB2351573A (en) | 1999-06-26 | 2001-01-03 | Ibm | Using webdav with an asynchronous transport |
US6675353B1 (en) * | 1999-07-26 | 2004-01-06 | Microsoft Corporation | Methods and systems for generating XML documents |
US6691119B1 (en) | 1999-07-26 | 2004-02-10 | Microsoft Corporation | Translating property names and name space names according to different naming schemes |
US6557040B1 (en) | 1999-07-26 | 2003-04-29 | Microsoft Corporation | Providing for the omission of root information from depth-related requests according to standard request/response protocols |
US6581099B1 (en) | 1999-07-26 | 2003-06-17 | Microsoft Corporation | Accessing sources of resources within standard request-response protocols |
US6356907B1 (en) | 1999-07-26 | 2002-03-12 | Microsoft Corporation | Providing for data types of properties according to standard request-response protocols |
US6629127B1 (en) | 1999-07-26 | 2003-09-30 | Microsoft Corporation | Methods and systems for processing HTTP requests |
US6449633B1 (en) | 1999-07-26 | 2002-09-10 | Microsoft Corporation | Access source control of resources within standard request-response protocols |
US6351748B1 (en) | 1999-07-26 | 2002-02-26 | Microsoft Corporation | File system level access source control of resources within standard request-response protocols |
US6947991B1 (en) | 1999-09-13 | 2005-09-20 | Novell, Inc. | Method and apparatus for exposing network administration stored in a directory using HTTP/WebDAV protocol |
US6526435B1 (en) * | 1999-10-04 | 2003-02-25 | Microsoft Corporation | Method and system for downloading selected rows within a listing using HyperText Transport Protocol (HTTP) |
US6944642B1 (en) | 1999-10-04 | 2005-09-13 | Microsoft Corporation | Systems and methods for detecting and resolving resource conflicts |
US6694335B1 (en) | 1999-10-04 | 2004-02-17 | Microsoft Corporation | Method, computer readable medium, and system for monitoring the state of a collection of resources |
US6760886B1 (en) | 1999-11-17 | 2004-07-06 | International Business Machines Corporation | Ensuring referential integrity when using WebDAV for distributed development of a complex software application |
US6658476B1 (en) | 1999-11-29 | 2003-12-02 | Microsoft Corporation | Client-server protocol support list for standard request-response protocols |
US6615231B1 (en) | 1999-12-15 | 2003-09-02 | Microsoft Corporation | System and method for directing requests to specific processing |
US6408298B1 (en) | 1999-12-15 | 2002-06-18 | Microsoft Corporation | Methods and systems for copying and moving across virtual namespaces |
US6839735B2 (en) | 2000-02-29 | 2005-01-04 | Microsoft Corporation | Methods and systems for controlling access to presence information according to a variety of different access permission types |
US6654794B1 (en) * | 2000-03-30 | 2003-11-25 | International Business Machines Corporation | Method, data processing system and program product that provide an internet-compatible network file system driver |
US7210099B2 (en) * | 2000-06-12 | 2007-04-24 | Softview Llc | Resolution independent vector display of internet content |
US6842770B1 (en) | 2000-08-18 | 2005-01-11 | Apple Computer, Inc. | Method and system for seamlessly accessing remotely stored files |
US7437429B2 (en) | 2001-02-13 | 2008-10-14 | Microsoft Corporation | System and method for providing transparent access to distributed authoring and versioning files including encrypted files |
US20030074392A1 (en) | 2001-03-22 | 2003-04-17 | Campbell Yogin Eon | Methods for a request-response protocol between a client system and an application server |
US20030050964A1 (en) | 2001-09-07 | 2003-03-13 | Philippe Debaty | Method and system for context manager proxy |
US6985936B2 (en) | 2001-09-27 | 2006-01-10 | International Business Machines Corporation | Addressing the name space mismatch between content servers and content caching systems |
US7036052B2 (en) | 2001-10-22 | 2006-04-25 | Microsoft Corporation | Remote error detection by preserving errors generated throughout a software stack within a message |
US6748470B2 (en) | 2001-11-13 | 2004-06-08 | Microsoft Corporation | Method and system for locking multiple resources in a distributed environment |
CA2414952A1 (en) | 2002-12-20 | 2004-06-20 | Ibm Canada Limited-Ibm Canada Limitee | Adapting a document repository to support fine-grained change requests, lightweight transactions and asynchronous notifications |
US20040163086A1 (en) | 2003-02-14 | 2004-08-19 | Richard Friedman | WebDAV servlet |
US20040163037A1 (en) * | 2003-02-17 | 2004-08-19 | Richard Friedman | System and method for invoking WebDAV methods via non-WebDAV protocols |
US20040193940A1 (en) * | 2003-02-21 | 2004-09-30 | Snyder Joseph J. | WebDAV unit test framework |
US20040167983A1 (en) | 2003-02-21 | 2004-08-26 | Richard Friedman | WebDAV URL connection |
US20040215747A1 (en) | 2003-04-11 | 2004-10-28 | Jonathan Maron | System and method for a configuration repository |
EP1494130A1 (en) | 2003-06-30 | 2005-01-05 | Sap Ag | Method and system for displaying additional data fields in web based business applications |
US7266116B2 (en) | 2004-12-13 | 2007-09-04 | Skylead Assets Limited | HTTP extension header for metering information |
-
2005
- 2005-08-31 US US11/217,626 patent/US7600030B2/en not_active Expired - Fee Related
- 2005-10-04 US US11/243,350 patent/US20070050375A1/en not_active Abandoned
-
2006
- 2006-08-15 KR KR1020087001923A patent/KR101279690B1/en not_active Expired - Fee Related
- 2006-08-15 RU RU2008107741/08A patent/RU2433460C2/en not_active IP Right Cessation
- 2006-08-15 WO PCT/US2006/031705 patent/WO2007027426A1/en active Application Filing
- 2006-08-15 BR BRPI0614275-3A patent/BRPI0614275A2/en not_active IP Right Cessation
- 2006-08-15 CN CN200680029286XA patent/CN101243659B/en not_active Expired - Fee Related
- 2006-08-15 CA CA2617059A patent/CA2617059C/en not_active Expired - Fee Related
-
2008
- 2008-01-15 NO NO20080231A patent/NO20080231L/en unknown
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8930443B1 (en) * | 2010-03-19 | 2015-01-06 | Amazon Technologies, Inc. | Distributed network page generation |
US9876879B2 (en) | 2010-03-19 | 2018-01-23 | Amazon Technologies, Inc. | Distributed network page generation |
CN103532930A (en) * | 2013-09-18 | 2014-01-22 | 万达信息股份有限公司 | Distributed service system-oriented extension protocol |
CN105872090A (en) * | 2016-05-27 | 2016-08-17 | 四川长虹电器股份有限公司 | HTTP communication method based on extension status codes |
Also Published As
Publication number | Publication date |
---|---|
BRPI0614275A2 (en) | 2011-03-22 |
US20070050512A1 (en) | 2007-03-01 |
US7600030B2 (en) | 2009-10-06 |
RU2008107741A (en) | 2009-09-10 |
WO2007027426A1 (en) | 2007-03-08 |
NO20080231L (en) | 2008-05-23 |
KR20080039382A (en) | 2008-05-07 |
CA2617059A1 (en) | 2007-03-08 |
CN101243659A (en) | 2008-08-13 |
CA2617059C (en) | 2013-07-23 |
KR101279690B1 (en) | 2013-06-27 |
CN101243659B (en) | 2011-11-23 |
RU2433460C2 (en) | 2011-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2617059C (en) | Compounding of http authoring protocol | |
US8010850B2 (en) | Client extended error handling | |
Mogul et al. | Delta encoding in HTTP | |
CN103259864B (en) | Data synchronization protocol | |
US8086691B2 (en) | Method and device for exchanging data between mobile stations in a peer to peer network | |
US6658476B1 (en) | Client-server protocol support list for standard request-response protocols | |
US11153365B2 (en) | Transfer of files with arrays of strings in soap messages | |
US7451236B2 (en) | Document distribution and storage system | |
US20050131900A1 (en) | Methods, apparatus and computer programs for enhanced access to resources within a network | |
JP2004213670A (en) | Improved synchronization method between server and client | |
JP2004215279A (en) | Method for streaming data between server and client | |
CN112653757A (en) | File management system, method and equipment | |
CN101506805A (en) | Method and apparatus for multi-format data exchange | |
Mogul et al. | RFC3229: Delta encoding in HTTP | |
Douglis et al. | ERS/USDA January 2002 | |
Taylor et al. | Web Services Protocols | |
JPH0455934A (en) | print server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0509 Effective date: 20141014 |