Chapter 2: A Chain of Requests