Persistent and no persistent connections, Computer Networking

Assignment Help:

Persistent and No persistent Connections

HTTP can use  both  persistent  and non persistent connection. By defaults  uses persistent  connections.

Persistent Connections

HTTP persistent  connection also called HTTP keep alive or HTTP connection reuses is the idea  of using the same TCP connection to send and receive multiple HTTP  request / responses  as opposed  to opening a new one for every single  request/ response  pair using persistent  connections  is very  important  for improving HTTP performance.

HTTP  specifies  a persistent connection by  default. With persistent  connection  the server leaves the TCP connection open after sending a response. Subsequent  request an denture web page can be sent over a single persistent TCP connection moreover multiple web pages residing on the same server can be sent  from the server to  same  client over a single persistent TCP connection. The HTTP server close  a connection  when  it isn't  used for  certain  time ( a configurable time out interval).

These  are several advantages of using  persistent  connections including:

a.Network  friendly  less network  traffic due  to fewer setting up  and tearing down of  TCP connections.

b.Reduced latency on subsequent  request. Due to avoidance of initial TCP handshake.

c.Long lasting  connection allowing TCP sufficient time to determine  the congestion  state  of the network  thus to  react appropriately.

There  are two  versions  of persistent  connections.

 


Related Discussions:- Persistent and no persistent connections

What is beaconing, What is Beaconing? The process that permits a networ...

What is Beaconing? The process that permits a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not rece

Case study, #questi Scenario: Your Case Study must be based on the informat...

#questi Scenario: Your Case Study must be based on the information provided. There will be no additional information. This must be submitted in a .doc, or .pdf format. If you sen

Define the method of encryption and decryption using by ssl, Encryption/dec...

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

Parts count method, PARTS COUNT METHOD This prediction method is appli...

PARTS COUNT METHOD This prediction method is applicable at preliminary stages, during bid proposal and early design phases; when insufficient information is available regardin

Show scalability and reliability of computer network, How do you account fo...

How do you account for higher scalability and reliability of computer network? Ans: Computer network will have a large number of computers, which can share database, software

Discuss an example of threats in computer software, Discuss an example of t...

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

Ethernet cable, what is max length of cable I can use

what is max length of cable I can use

Checksum - transport layer, Checksum This 16 bits field contain  th...

Checksum This 16 bits field contain  the checksum. The  calculation of the   checksum for TCP follows  the same  procedure as the  described for  UDP. However the inclusion

Substantial capital investments in new networks, Question: (a) How can...

Question: (a) How can governments provide the mobile industry with the long-term clarity and certainty it needs to make substantial capital investments in new networks? (b)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd