. . . "With reference now to FIG. 79, a message flow diagram of a request to downlink data is depicted in accordance with an advantageous embodiment." .