Persistent and no persistent connections, Computer Networking

Assignment Help:

Persistent and No persistent Connections

HTTP can use  both  persistent  and non persistent connection. By defaults  uses persistent  connections.

Persistent Connections

HTTP persistent  connection also called HTTP keep alive or HTTP connection reuses is the idea  of using the same TCP connection to send and receive multiple HTTP  request / responses  as opposed  to opening a new one for every single  request/ response  pair using persistent  connections  is very  important  for improving HTTP performance.

HTTP  specifies  a persistent connection by  default. With persistent  connection  the server leaves the TCP connection open after sending a response. Subsequent  request an denture web page can be sent over a single persistent TCP connection moreover multiple web pages residing on the same server can be sent  from the server to  same  client over a single persistent TCP connection. The HTTP server close  a connection  when  it isn't  used for  certain  time ( a configurable time out interval).

These  are several advantages of using  persistent  connections including:

a.Network  friendly  less network  traffic due  to fewer setting up  and tearing down of  TCP connections.

b.Reduced latency on subsequent  request. Due to avoidance of initial TCP handshake.

c.Long lasting  connection allowing TCP sufficient time to determine  the congestion  state  of the network  thus to  react appropriately.

There  are two  versions  of persistent  connections.

 


Related Discussions:- Persistent and no persistent connections

Whitney houston, contribution to afican American history

contribution to afican American history

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

Challenge handshake authentication protocols (chap), Challenge Handshake Au...

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Configure the management interface- spanning tree protocol, Configure the m...

Configure the management interface address on all three switches.  S1(config)#interface vlan1 S1(config-if)#ip address 172.17.10.1 255.255.255.0 S1(config-if)#no shutdown

Key components of inter-vlan routing , As configuring of VLANs helps in con...

As configuring of VLANs helps in controlling the size of broadcast domains. There are some key components of inter-VLAN routing such as VLAN capable switch Router Ro

Determine the method to protect the web servers, Determine the method to pr...

Determine the method to protect the Web servers The company should install additional levels of security measures since it is possible for hackers to generate and send data wit

Explain about the intranet hardware and software, Explain about the Intrane...

Explain about the Intranet hardware and software Intranets not only provide a secure environment for companies but also provide an excellent working environment that is full of

What is mesh network, What is mesh network? A network in which there ar...

What is mesh network? A network in which there are many network links among computers to provide multiple paths for data to travel.

Types of Networking, How can I identify the difference types of networks

How can I identify the difference types of networks

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd