iTP Secure WebServer System Administrator's Guide (Version 7.0)
Introduction to the iTP Secure WebServer
iTP Secure WebServer System Administrator’s Guide—523346-012
1-5
Features and Standards Supported by iTP Secure
WebServer
•
National Center for Supercomputing Applications (NCSA) format in image maps
The iTP Secure WebServer supports NCSA-formatted image-map files in addition
to the CERN format. The iTP Secure WebServer also provides support for the
point directive in NCSA-formatted image maps.
•
Byte-range protocol
The iTP Secure WebServer supports the proposed Byte Range Retrieval
Extension to HTTP. This means, for example, that the iTP Secure WebServer can
send Adobe Portable Document Format (PDF) documents one page at a time,
rather than an entire document at once, to users of the Adobe Acrobat Reader
version 3.0 or later. This method permits high-quality PDF documents to be
displayed like HTML documents.
•
Content encoding (compression) types
This feature enables the iTP Secure WebServer to return the proper encoding type
for compressed files.
•
Administration server
The iTP Secure WebServer Administration Server provides a Web-browser
interface for defining the iTP Secure WebServer configuration, starting and
stopping the iTP Secure WebServer, and monitoring noteworthy events such as
errors.
•
Statistics collection through command-line
iTP Secure WebServer provides a command-line utility, statscom, to collect httpd
statistics. This utility is run using the command line and can be run by both
administrators and normal users. For more information, see Collecting httpd
Statistics Using statscom on page 6-7.
•
PUT, OPTIONS, and TRACE request methods
A browser or Web client (using HTTP/1.1) uses the PUT request method to replace
or create the content at a specified location. The iTP Secure WebServer accepts
PUT requests and enables you to specify a script to perform validation before
permitting an update.
A browser or Web client uses the OPTIONS request method to determine the
options or requirements associated with a resource, or the capabilities of a server,
without necessarily retrieving or acting on the resource.
A browser or Web client uses the TRACE method to see the data that is being
received at the other end of the request chain. The data can then be used for
testing or diagnostic information.
•
Persistent connections
Rather than establish a new TCP/IP connection for each URL (for instance a new
connection to retrieve an embedded graphic) the iTP Secure WebServer allows the