Why do internet telephony protocols run on top

Assignment Help Computer Networking
Reference no: EM13692221

Question: Why do Internet telephony protocols run on top of UDP rather than on TCP · Internet telephony protocols used to drive audio and video traffic Audio and video messages are more interested in speed instead of reliability Internet telephony protocols run on top of UDP rather than on TCP because of the congestion control of TCP which throttles sending in times of congestion on the network.

UDP is use because a connection is not needed to be maintained by some internet telephony applications.

Can you provide the answer with reference to computer networking?

Reference no: EM13692221

Questions Cloud

How could those redundancies lead to anomalies : If you want to produce a listing of the file contents by last name, area code, city, state, or zip code, how would you alter the file structure?
What is the inductive hypothesis : Show that the base case is true and What is the inductive hypothesis P(k)?
How might the tables be related to one another : What tables would you create, and what would the table components be and How might the (independent) tables be related to one another?
Designing the instruction set : For a 3-operand ADD instruction that only uses register addressing mode, how long (number of bits) should the instruction be?
Why do internet telephony protocols run on top : Why do Internet telephony protocols run on top of UDP rather than on TCP - UDP is use because a connection is not needed to be maintained by some internet telephony applications.
Program that would display a letter to a friend : Writing a c++ program that would display a letter to a friend? It should have a proper format like name, friends name, address.....etc
Decimal to the ieee 32 bit floating point : Numbers from decimal to the IEEE 32 bit floating point - binary IEEE 32-bit floating point to decimal.
Inheriting from the jframe class : What is the difference between inheriting from the JFrame class and using a JFrame member variable?
Convert the decimal fractions to binary : Convert the following decimal fractions to binary with a maximum of six places to the right of the binary point:

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss the security of the network

Discuss the security of the network and suggest best practices for securing the business network.

  Develop a project plan depicting the project tasks

Develop a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network and develop a network architecture diagram depicting the wireless networking equipment, security devices, and a..

  Determine maximum number of users supported per cell

If each cell is to offer capacity which is 90% of perfect scheduling, determine maximum number of users which can be supported per cell where omnidirectional antennas are utilized at each base station.

  Reason why you would not install cables

Give me two reason why you would not install cables in ducts that are used to transport dust loos stock, flammable vapors or in those ducts that are used for ventilattion for cooking?

  Dbms consider a movie database in which data is recorded

consider a movie database in which data is recorded about the movie industry. the data requirements are summarized as

  Company a has about 100 employees

Company A has about 100 employees spread over three locations in the same city, all linked by fast network connections. The IT/IS administration is centralized and includes the helpdesk.

  Determine the bandwidth-delay product r tprop

Assume two hosts, A and B, are separated by 20,000 kilometers and are connected by direct link of R = 1 Mbps. Determine the bandwidth-delay product, R * Tprop?

  Explain get nearest server request from client

Each of network segments has at least one NetWare server on it. Which of the given replies to Get Nearest Server (GNS) request from client?

  Prepare design for private line network private line

How to create "rough design" to this network "prepare a rough design for private line network which would bring 256 kbps private line to each of bank's fifty branch offices.

  Explain approach to defeating the tiny fragment attack

Thus, an intermediate fragment may pass through the filter before the initial fragment is rejected. How can this situation be handled?

  Alex is a network administrator and keeps receiving a

consider the following scenarios and on the basis of your understanding of these scenarios create a report in a

  1 a discuss the importance of scada securityb why are scada

1. a. discuss the importance of scada security.b. why are scada systems particularly vulnerable to cyber treats? c.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd