![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 2, Problem P3P
Explanation of Solution
HTTP client:
Let a HTTP client wants to revive a web document at a given URL. The IP address of the HTTP server is initially unknown. The transport and application layer protocols that are required in this scenario are mentioned below:
Transfer Layer Protocols:
TCP for HTTP:
For HTTP, the transfer layer protocol that can be used to revive a web document is TCP (Transmission Control Protocol). TCP stands for Transmission Control Protocol which is a standard that establishes and maintain a network conversion with the use of application programs.
UDP for DNS:
For UDP, the transfer layer protocol that can be used to revive a web document is UDP (User Datagram Protocol)...
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP
address of the HTTP server is initially unknown. What transport and application-layer
protocols besides HTTP are needed in this scenario?
Assume that Computer A, which is connected through an Ethernet cable to the Switch S1, is just powered on. The user opens a browser and then types a website address to receive the website from the Server (as shown in Figure 1). Write down all the important protocols that come into play by the time the first frame containing HTTP request reaches R1. (Note: Before HTTP frame, other frames have already been sent by other protocol(s).)
Write down all the protocols with reference to the TCP Model as follows?
Application Layer:
Transport Layer:
Internet Layer:
Link Layer:
Consider taking an HTTP client to look for a web document in a specified URL. Firstly, it is not known the IP address of the HTTP server. What are needed in this scenario for transport and application-layer protocols
apart from HTTP?
Chapter 2 Solutions
EBK COMPUTER NETWORKING
Ch. 2 - List five nonproprietary Internet applications and...Ch. 2 - Prob. R2RQCh. 2 - Prob. R3RQCh. 2 - Prob. R4RQCh. 2 - Prob. R5RQCh. 2 - Prob. R6RQCh. 2 - Prob. R7RQCh. 2 - Prob. R8RQCh. 2 - Prob. R9RQCh. 2 - Prob. R10RQ
Ch. 2 - Why do HTTP, SMTP, and POP3 run on top of TCP...Ch. 2 - Prob. R12RQCh. 2 - Prob. R13RQCh. 2 - Prob. R14RQCh. 2 - Prob. R15RQCh. 2 - Prob. R16RQCh. 2 - Prob. R17RQCh. 2 - From a users perspective, what is the difference...Ch. 2 - Prob. R19RQCh. 2 - Prob. R20RQCh. 2 - Prob. R21RQCh. 2 - Prob. R22RQCh. 2 - Prob. R23RQCh. 2 - Prob. R24RQCh. 2 - Prob. R25RQCh. 2 - In Section 2.7, the UDP server described needed...Ch. 2 - Prob. R27RQCh. 2 - Prob. P1PCh. 2 - Prob. P2PCh. 2 - Prob. P3PCh. 2 - Prob. P4PCh. 2 - Prob. P5PCh. 2 - Prob. P6PCh. 2 - Prob. P7PCh. 2 - Prob. P8PCh. 2 - Prob. P9PCh. 2 - Prob. P10PCh. 2 - Prob. P11PCh. 2 - Prob. P13PCh. 2 - Prob. P14PCh. 2 - Prob. P15PCh. 2 - Prob. P16PCh. 2 - Prob. P17PCh. 2 - Suppose you can access the caches in the local DNS...Ch. 2 - Prob. P21PCh. 2 - Prob. P22PCh. 2 - Prob. P23PCh. 2 - Prob. P25PCh. 2 - Prob. P26PCh. 2 - Prob. P27PCh. 2 - Prob. P28PCh. 2 - Prob. P29PCh. 2 - Prob. P30PCh. 2 - Prob. P31PCh. 2 - Prob. P32P
Knowledge Booster
Similar questions
- Assume that Computer A, which is connected through an Ethernet cable to the Switch S1, is just powered on. The user opens a browser and then types a website address to receive the website from the Server (as shown in Figure 1). Write down all the important protocols that come into play by the time the first frame containing http request reaches R1. (Note: Before http frame, other frames have already been sent by other protocol(s).) Write down all the protocols with reference to the TCP Model as follows. Application Layer: Transport Layer: Internet Layer: Link Layer: [Physical Layer (if needed)]: After writing down the protocols that come into play, briefly write the procedure as to what happensarrow_forward2. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. What transport and application-layer protocols besides HTTP are needed in this scenario? O TCP,UDP,DNS ТСР, DNS UDP,DNS ТСР, FTParrow_forwardIn HTTP version 1.0, a server marked the end of a transfer by closing the connection. Explain why, in terms of the TCP layer, this was a problem for servers. Find out how HTTP version 1.1 avoids this. How might a general-purpose request/reply protocol address this?arrow_forward
- Consider an HTTP client who wants to retrieve a Web document from a given URL. The IP address of the HTTP server (hosting the URL) is initially unknown. What transport and application layer protocols other than HTTP are needed in this scenario? Please consider who has to be contacted for the IP address and the methods used to do this. Also consider how the connection is established with the web server?arrow_forwardConnection-based protocols could be replaced by connectionless protocols. Look at the pros and cons of each to decide which one is best.arrow_forwardThe original HTTP protocol used TCP/IP as the underlying network protocol. For each page, graphic, or applet, a separate TCP session was constructed, used, and torn down. Because of the overhead of building and destroying TCP/IP connections, performance problems resulted from this implementation method. Would using UDP rather than TCP be a good alternative? What other changes could you make to improve HTTP performance?arrow_forward
- In this short introduction, consider the benefits and drawbacks of connectionless protocols as a possible replacement for connection-based protocols.arrow_forwardConsider connectionless protocols as a possible replacement for connection-based protocols and evaluate their benefits and drawbacks.arrow_forwardIt is necessary to investigate connectionless protocols as a potential substitute for connection-based protocols.arrow_forward
- It's prudent to assess the benefits and drawbacks of connectionless protocols against those that need connections, and vice versa.arrow_forwardplease answer with proper explanation and step by step solution. Question: Consider a fictional six-layer protocol hierarchy where layer 1 is the lowest layer, and layer 6 is the highest layer. Therefore, an application sends a message M by passing it to layer 6. All the even-numbered layers attach a trailer Ti (i = 2, 4, 6) to their payload, and all the odd-numbered layers attach a header Hi (i = 1, 3, 5) to their payload. Draw the headers, trailers, and original message M in the order they are sent out.arrow_forwardSuppose Alice with a Web-based e-mail account (such as Gmail) sends it message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice's host to Bob's host. Be sure to list the series of application -layer protocols that are used to movethe message between the two hosts.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337102063/9781337102063_smallCoverImage.gif)
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780357108291/9780357108291_smallCoverImage.jpg)
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,