Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Persistent and No persistent Connections
HTTP can use both persistent and non persistent connection. By defaults uses persistent connections.
Persistent Connections
HTTP persistent connection also called HTTP keep alive or HTTP connection reuses is the idea of using the same TCP connection to send and receive multiple HTTP request / responses as opposed to opening a new one for every single request/ response pair using persistent connections is very important for improving HTTP performance.
HTTP specifies a persistent connection by default. With persistent connection the server leaves the TCP connection open after sending a response. Subsequent request an denture web page can be sent over a single persistent TCP connection moreover multiple web pages residing on the same server can be sent from the server to same client over a single persistent TCP connection. The HTTP server close a connection when it isn't used for certain time ( a configurable time out interval).
These are several advantages of using persistent connections including:
a.Network friendly less network traffic due to fewer setting up and tearing down of TCP connections.
b.Reduced latency on subsequent request. Due to avoidance of initial TCP handshake.
c.Long lasting connection allowing TCP sufficient time to determine the congestion state of the network thus to react appropriately.
There are two versions of persistent connections.
Security risks present on the networks Lots of risks are present everywhere on Internet as well as on Intranet, if it is not known what is being done. Every day a number of
Q. Show the Flow characteristics? Flow characteristics Reliability - if lacking means that packets or ACKs are lost - more important with FTP, SMTP than with audio
Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des
What is the minimum size of MTU bytes is
Can you define the method of CIDR?
What is MAC address in Networking? The address for a device as it is recognized at the Media Access Control (MAC) layer in the network architecture. MAC address is usually kept
Serialized data is not generally sent at a uniform rate by a channel. Instead, there is usually a burst of regularly spaced binary data bits followed by a pause, after which the da
Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or
A logic gate drives a load, which has a resistance of 1 kÙ and a capacitance of 20 pF. The printed circuit track connecting the gate to its load has an 40 pF capacitance to ground.
Q. Illustrate Transport Layer Responsibilities ? - Process-to-process delivery of whole message - Port addressing - Segmentation and reassembly - Connection control co
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd