Persistent and no persistent connections, Computer Networking

Assignment Help:

Persistent and No persistent Connections

HTTP can use  both  persistent  and non persistent connection. By defaults  uses persistent  connections.

Persistent Connections

HTTP persistent  connection also called HTTP keep alive or HTTP connection reuses is the idea  of using the same TCP connection to send and receive multiple HTTP  request / responses  as opposed  to opening a new one for every single  request/ response  pair using persistent  connections  is very  important  for improving HTTP performance.

HTTP  specifies  a persistent connection by  default. With persistent  connection  the server leaves the TCP connection open after sending a response. Subsequent  request an denture web page can be sent over a single persistent TCP connection moreover multiple web pages residing on the same server can be sent  from the server to  same  client over a single persistent TCP connection. The HTTP server close  a connection  when  it isn't  used for  certain  time ( a configurable time out interval).

These  are several advantages of using  persistent  connections including:

a.Network  friendly  less network  traffic due  to fewer setting up  and tearing down of  TCP connections.

b.Reduced latency on subsequent  request. Due to avoidance of initial TCP handshake.

c.Long lasting  connection allowing TCP sufficient time to determine  the congestion  state  of the network  thus to  react appropriately.

There  are two  versions  of persistent  connections.

 


Related Discussions:- Persistent and no persistent connections

Explain systolic array interconnection networks, Systolic Array : This inte...

Systolic Array : This interconnection network is a kind of pipelined array architecture and it's intended for multidimensional flow of data. It is used for applying fixed algorithm

Create a client and a server - message queues & socket, Lab will require yo...

Lab will require you to create a client and a server that communicate over either message queues, sockets, or a well known fifo. The data passed will be a simple request/response i

Synchronous tdm and statistical tdm, Difference between synchronous tdm and...

Difference between synchronous tdm and statistical tdm

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

What is money laundering and how is money laundered, Question: a) (i)...

Question: a) (i) Describe the entire process of credit card processing, identifying the different steps and parties involved. (ii) What are the roles of the acquiring ban

Explain the authentication header (ah) protocol, Can you explain the Authen...

Can you explain the Authentication Header (AH) Protocol?

State about the communications network, State about the communications netw...

State about the communications network 1) The communications network may only accept blocks of data up to a specific size.   (2) Error control might be more effective with a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd