Browse Definitions :
Definition

persistent connection (HTTP persistent connection)

A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange.

HTTP has a persistent connection function that allows the channel to remain open rather than be closed after a requested exchange of data. TCP is a connection-oriented protocol: It starts a connection after confirmation from both ends that they are available and open to a data exchange. In a non-persistent connection, the channel closes when one host signals that it wants to end communications or when a certain amount of time has elapsed with no exchange of data. To maintain a persistent connection, TCP keep-alive packets are sent to prevent the connection from timing out.

 An open connection is faster for frequent data exchanges. Communications overhead is saved by leaving a connection open rather than opening and closing sessions for each request. Persistent connections can also be used with APIs to enable servers to push data to clients. Other benefits of persistent connections include reduced network congestion, latency and CPU and memory usage due to the lower number of connections; errors can also be reported without closing the connection.

Persistent connections added for HTTP 1.0 used an extra header to request the client keep the connection alive; HTTP 1.1 assumes all connections to be persistent unless otherwise specified. HTTP 2.0 expands the persistent connection to enable numerous requests and returns of data to be exchanged simultaneously over a single connection.

Persistent connections are also called HTTP keep-alive or HTTP connection reuse.

This was last updated in June 2016

Continue Reading About persistent connection (HTTP persistent connection)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close