Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Persistent and No persistent Connections
HTTP can use both persistent and non persistent connection. By defaults uses persistent connections.
Persistent Connections
HTTP persistent connection also called HTTP keep alive or HTTP connection reuses is the idea of using the same TCP connection to send and receive multiple HTTP request / responses as opposed to opening a new one for every single request/ response pair using persistent connections is very important for improving HTTP performance.
HTTP specifies a persistent connection by default. With persistent connection the server leaves the TCP connection open after sending a response. Subsequent request an denture web page can be sent over a single persistent TCP connection moreover multiple web pages residing on the same server can be sent from the server to same client over a single persistent TCP connection. The HTTP server close a connection when it isn't used for certain time ( a configurable time out interval).
These are several advantages of using persistent connections including:
a.Network friendly less network traffic due to fewer setting up and tearing down of TCP connections.
b.Reduced latency on subsequent request. Due to avoidance of initial TCP handshake.
c.Long lasting connection allowing TCP sufficient time to determine the congestion state of the network thus to react appropriately.
There are two versions of persistent connections.
DNS - Protocol Attacks Generally, in the DNS protocol, flaws are based on the implementation issues. The three common issues are generally, associated which can be of one of t
Identify and briefly explain any four key requirements that need to be examined when considering deploying a WLAN technology.
Q. Focus of Reliability Control? - Implementation of the OSI model puts emphasis on providing a reliable data transfer service while the TCP/IP model treats reliability as an e
In case of any new event switch do broadcast, after that always do Unicast.
In reg-mem architecture, clock cycle is 10 ns wide. It is proposed that reg-reg architecture be used instead, that reduces the clock cycle by 2 ns. However, it requires an addition
What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can
Network Layer and Routing As discussed in previous chapters the physical layer provides connection sand services to the data link layer while the data link layer is
Cut-Through is the best mode of switching. Store and Forward reads in the whole frame, confirms the frame is valid, and then forwards the frame onto the wire. Cut-Through only chec
What is difference among Path and Classpath? Path and Classpath are operating system level environment variales. Path is used explain where the system can find the executabl
Byte Number TCP number all data bytes that are transmitted in a connection. Numbering is independent in each direction when TCP receives bytes of data a process. It stor
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd