Why does http at the application layer uses tcp

Assignment Help Computer Networking
Reference no: EM13310589

Suppose a client computer with IP address 127.192.92.30 in building ZZ requests a large web page from the server in building XX (www.xyz.com). Assume that the client computer has just been turned on and does not know any addresses other than those in its configuration tables. Assume that all gateways and Web Servers know all the network layer and data link layer addresses.

a. Explain what messages would be sent and how they would flow through the network

i) to deliver the Web page request to the server and

ii) as the Web server sent the requested page to the client.

b. Why does HTTP at the application layer uses TCP while DNS uses UDP when it passes its message packet with overhead to the Transport Layer and then hand it off to the Network Layer?

 


Attachment:- assignment.doc

Reference no: EM13310589

Questions Cloud

Find the maximum kintetic energy of electrons : The wavelength associated with the cut-off frequency for silver is 325 nm. Find the maximum kintetic energy of electrons
Determine the clean filter head loss in filter bed composed : Determine the clean filter head loss in a filter bed composed of 0.3 m of uniform anthracite (with an average size of 1.6 mm) placed over 0.3 m of uniform sand ( with an average size of 0.5 mm) for a filtration rate of 160 L/m^2.min.
Explain the enthalpy of vaporization of ethanol : The enthalpy of vaporization of ethanol is 38.7 kJ/mol at its boiling point (78°C). Calculate the value of DeltaSsurr when 1.00 mole of ethanol is vaporized at 78.0°C and 1.00 atm
How much does the aggregate in the wheel barrow weigh : You fill a 2 cubic foot wheelbarrow to the top with aggregate. If the specific gravity of the aggregate is 2.548 and 18% of the aggregate is void spaces, how much does the aggregate in the wheel barrow weigh
Why does http at the application layer uses tcp : Why does HTTP at the application layer uses TCP while DNS uses UDP when it passes its message packet with overhead to the Transport Layer and then hand it off to the Network Layer?
What is the distance between nodes : A guitar string is fixed between two points, 53.0cm apart. Its linear density is 12.0g/m. Now suppose the string is vibrating in its third harmonic. What is the distance between nodes
Explain what is this formula in terms of delta-p : What formula is used to find the work needed to compress water from atmospheric pressure to a higher pressure (with ambient Temperature)? I know about w = integral (-PdV), but V is constant. What is this formula in terms of delta-P
Design simple horizontal curve to connect roadway tangents : Design a simple horizontal curve to connect two roadway tangents that deflect at an angle chosen between 50 and 75 degrees. Assign a station to the curve PI and select a curvature of 6 degrees.
Evaluate monoxide gas burns in oxygen : Carbon monoxide gas burns in oxygen to form carbon dioxide gas. Write a balanced equation for the reaction and determine the volume of oxygen needed to react completely with 174 mL of CO at 40.0°C

Reviews

Write a Review

Computer Networking Questions & Answers

  Create a report exploring the stages

Create a report exploring the stages involved in a specific attack (of your choice) against a computing system.

  Illustrate direct mapping and address bits for tag field

The main memory of a computer is organized as 128 blocks, with a block size of 16 words. The cache has eight block frames. Illustrate direct mapping and address bits that recognize the tag field, the block number, and the word number.

  Why an organization block icmp traffic

CMP provides many useful services, yet some organizations block ICMP traffic. Why should an organization block ICMP traffic?

  Explaining multiple mono-alphabetic substitution ciphers

Consider improved version of Vigenere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic substitution ciphers are used.

  Implementing wireless technologies

it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

  Analyze network security threats and vulnerabilities

Given the need for secure, online business communications, analyze network security threats and vulnerabilities and design network security solutions

  Social effect of online social networks

What is the social effect of online social networks? 200 words Describe an experience in facebook. at least 100 words.

  Strategy planning for corporate

In another year, after all assignments are completed, you consider to convert back to a volunteer basis with AllTechComm, and to discover more profitable employment, preferably with a major company.

  Company a has about 100 employees

Company A has about 100 employees spread over three locations in the same city, all linked by fast network connections. The IT/IS administration is centralized and includes the helpdesk.

  Implement windows network infrastructure

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized (considering how group policy will be used and users will be organized)?

  A certain area is covered by a cellular radio

A certain area is covered by a cellular radio system with 84 cells and a cluster size of N. 300 voice channels are available in the system. Users are uniformly distributed over the area covered by the cellular system

  Quality of service

The ability of a network to deliver predictable results. Quality of Service (QoS) is a major consideration for any new or existing communications implementation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd