Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Persistent and No persistent Connections
HTTP can use both persistent and non persistent connection. By defaults uses persistent connections.
Persistent Connections
HTTP persistent connection also called HTTP keep alive or HTTP connection reuses is the idea of using the same TCP connection to send and receive multiple HTTP request / responses as opposed to opening a new one for every single request/ response pair using persistent connections is very important for improving HTTP performance.
HTTP specifies a persistent connection by default. With persistent connection the server leaves the TCP connection open after sending a response. Subsequent request an denture web page can be sent over a single persistent TCP connection moreover multiple web pages residing on the same server can be sent from the server to same client over a single persistent TCP connection. The HTTP server close a connection when it isn't used for certain time ( a configurable time out interval).
These are several advantages of using persistent connections including:
a.Network friendly less network traffic due to fewer setting up and tearing down of TCP connections.
b.Reduced latency on subsequent request. Due to avoidance of initial TCP handshake.
c.Long lasting connection allowing TCP sufficient time to determine the congestion state of the network thus to react appropriately.
There are two versions of persistent connections.
Name the physical interfaces that PPP can be configured on a Cisco router: Ans) A. Asynchronous serial B. HSSI C. ISDN D. Synchronous serial These four of th
Question : a) Describe the following core components of a cellular based network: i) Cell ii) MSC iii) HLR & VLR iv) PSTN b) Explain why frequency reuse is consi
what is difference between Star and Mesh topology?
State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s
Question: a) The Systems Administrator of Acme Company performs the backup of the website database file every day at 15:50. The original file location is database.sql. The Ad
Problem 1 Bring out the differences between POP and IMAP4 Problem 2 Discuss User Datagram protocol Problem 3 Explain the various steps in TCP congestion control
Radio Waves - Frequency ranges: 3 KHz to 1 GHz - Omni directional - Susceptible to interference by other antennas utilizing same frequency or band - Ideal for long-di
Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are
Q. Show the Communication between Switches? Communication between Switches - Must know which station belongs to which VLAN as well as membership of stations connected to
Explain in dteail about the intranet The first Web browser was called Mosaic, and the HTML concept, although not a new one, has accelerated data access and research. In short,
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd