Why does http at the application layer uses tcp

Assignment Help Computer Networking
Reference no: EM13187821

Suppose a client computer with IP address 127.192.92.30 in building ZZ requests a large web page from the server in building XX (www.xyz.com). Assume that the client computer has just been turned on and does not know any addresses other than those in its configuration tables. Assume that all gateways and Web Servers know all the network layer and data link layer addresses.

a. Explain what messages would be sent and how they would flow through the network

       i) to deliver the Web page request to the server and

       ii) as the Web server sent the requested page to the client.

b. Why does HTTP at the application layer uses TCP while DNS uses UDP when it passes its message packet with overhead to the Transport Layer and then hand it off to the Network Layer?

Reference no: EM13187821

Questions Cloud

Find the rate of change of the volume of water : find the rate of change of the volume of water in the container, with respect to time, when h=3 cm. indicate units of measure.
What is the length of the prism : the volume of a rectangular prism is 208 cm2. if the area of one end is 16cm2, what is the length of the prism.
Is the buying power increasing or decreasing : Is the buying power increasing or decreasing? Why? At what rate will the buying power be changing two years from now?
Explain which course of action you favour : Assume that the experts sre correct and Canada is losing its competitiveness relative to other countries. We can take strong action to reverse this trend, or we can continue on as we have been doing. Explain which course of action you favour.
Why does http at the application layer uses tcp : Why does HTTP at the application layer uses TCP while DNS uses UDP when it passes its message packet with overhead to the Transport Layer and then hand it off to the Network Layer?
Different methods available for collecting survey data : Compare and contrast the different methods available for collecting survey data and include examples that are different from what is used in the textbook.
How many units will the consumer buy in total : qd=1000-5p mr=200-0.4q marginal cost is constant at $20. The firm is considering quantity discount. The firs 400 units can be purchased at $120 and further units at $80. How many units will the consumer buy in total
Hottest topics in the 90''s was the development : One of the hottest topics in the 90's was the development and use of teams within the organization, particularly self-managed work teams. A reason frequently cited for support of these self-managed teams is that they reduce the number of managers req..
What will happen to price of advertisement : A monopolist has two types of customers. There are 100 of Type A, who will each pay up to $10 for a single unit of the good, and 50 of Type B, who will each pay up to either $8. Neither is willing to purchase additional units at any price. If it m..

Reviews

Write a Review

Computer Networking Questions & Answers

  Explore ways to secure a wireless network

Explore ways to secure a wireless network and present your findings in a brief report(1 page is fine, more is ok). Talk about your own experiences with using a wireless network, including the things you do to keep the network secure.

  Explain why it is recommended to secure windows

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows.

  Solution for real-time analytical processing diminishes

When merging transaction and analytical processing problem occurs. Real-time analytical processing diminishes performance of transaction processing. Find the solution to this problem which many companies use?

  Explain multiprogramming and time-sharing environment

Write down two such problems? Can we make sure same degree of security in time-shared machine as in dedicated machine?

  Investigate methods by which user gain access to network

Investigate the methods by which users could gain access to the network. Pay particular attention to: The problems of having open access for all users.

  Pros and cons of long distances agreements

The telephone communication systems and long distances agreements are managed by a telecommunications department in the headquarters that reports to the vice president of finance. Outline pros and cons of both alternatives.

  Two hosts, a and b, are separated by 20,000

two hosts, A and B, are separated by 20,000 kilometers and are connected by a link of R=2 Mbps, and there are 4 routers between A and B. Suppose the propagation speed over the link is 2.5*108 meters/sec, average queueing time is 2ms,

  Separation of a lan from the outside world

Discuss how may two routers be used to give separation of a LAN from the outside world?

  Create the network for use in training environment

You are asked to create the network for use in training environment. It must be mobile, ... Mobile Training is small training firm which offers mobile classrooms.

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

  Disadvantages of several different web technologies

Describe the advantages and disadvantages of several different Web 2.0 technologies. How could these technologies be used for good? What types of problems might these technologies cause?

  Write steps for computer in company browse site using url

Personel.mycompany.com in URL address box to browse this Web site. Write down steps do you take so that each computer in company can browse the site using URL?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd