Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Persistent and No persistent Connections
HTTP can use both persistent and non persistent connection. By defaults uses persistent connections.
Persistent Connections
HTTP persistent connection also called HTTP keep alive or HTTP connection reuses is the idea of using the same TCP connection to send and receive multiple HTTP request / responses as opposed to opening a new one for every single request/ response pair using persistent connections is very important for improving HTTP performance.
HTTP specifies a persistent connection by default. With persistent connection the server leaves the TCP connection open after sending a response. Subsequent request an denture web page can be sent over a single persistent TCP connection moreover multiple web pages residing on the same server can be sent from the server to same client over a single persistent TCP connection. The HTTP server close a connection when it isn't used for certain time ( a configurable time out interval).
These are several advantages of using persistent connections including:
a.Network friendly less network traffic due to fewer setting up and tearing down of TCP connections.
b.Reduced latency on subsequent request. Due to avoidance of initial TCP handshake.
c.Long lasting connection allowing TCP sufficient time to determine the congestion state of the network thus to react appropriately.
There are two versions of persistent connections.
What are NETBIOS and NETBEUI? NETBIOS is a programming interface that permits I/O requests to be sent to and received from a remote computer and it hides the networking hardwar
Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr
What are the functions of the typical server program? Ans) It waits for client-initiated requests. Implements many requests at the similar time. Takes care of VIP clients first.
Shortest path The dijkstra algorithms four steps to discover what it called the shortest path tree . a.The algorithm beings to build the tree identifying its root.
Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements a form of authentication that requires a challenge and a response. A CHAP authenticator
I have a project on Information Communication Technology(I.C.T). So sir I want to know that what is internet? and how it works?
Explain about the Integrating Intranet These Intranets are designed to replace the complexity of in-house communications and processing systems that large organisations ofte
Router(config-if)# no cdp enable is the command to disable CDP on an interface
advantages and disadvantages of time sharing system
FDDI Media Class B or SAS (single-attachment stations) attach to one ring Class A or DAS (dual attachment stations) attach to both rings. SASs is attached to the primary rin
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd