Process of skype is a web-based service, Computer Networking

Skype is a web-based service which offers cheap and free phone calls. Explain step by step (in terms of networking technology) what really happens from the point when you initiate a call until the receiver picks up the call.

Marking criteria

1. Correct information about the networking technology used by Skype is provided.

(5 marks)

2. Each step is outlined clearly and precisely. (5 marks)

3. Answer is clear and well written. (5 marks)

4. Appropriate and authentic references have been used. (3 marks)

5. APA reference style has been used correctly. (2 marks)

The user who uses the Skype is known as Skype clients. The server of the Skype authenticates this Skype user and makes its present to others Skype clients. The Skype server also checks the firewall and IP address of the client computer that uses the Skype's.  If a user wants to connect to Skype network the cache of the host computer must contain the valid entry. So in this case TCP connection must be established otherwise login will fail. So the following are the steps that are performed during Skype connection:

Start the Skype connection
Send UDP packet to Host Computer 
 If no response comes within 5 seconds 
Attempts the TCP connection with host computer at port number 80(HTTP).    
If not connected then attempt TCP Connection with Host Computer on port    443(HTTPS)
If not connected again attempt++.
If attempt==5 then fails the connection
else         
Again wait for 6 seconds           
Go to step 2
Again the steps will repeat until it get success
Posted Date: 7/10/2012 8:43:27 AM | Location : United States







Related Discussions:- Process of skype is a web-based service, Assignment Help, Ask Question on Process of skype is a web-based service, Get Answer, Expert's Help, Process of skype is a web-based service Discussions

Write discussion on Process of skype is a web-based service
Your posts are moderated
Related Questions
Explain the term- Encryption Because all of the user traffic, as well as control traffic, is digitized in second generation systems, it is a relatively simple matter to encrypt

Fragmentation - Wireless environment is very noisy - Corrupt frames must be retransmitted - Large frames must be divided into smaller ones to increase efficiency

Question 1 Describe the following a. Internet Technologies b. Networks c. Media Access Control Question 2 Explain the various classes of networks Question 3 Describe various m

100Base-FX Utilizes two identical optical fibers in star topology One fiber holds frames from the station to hub one from hub to station Encoding is 4B/5B Si

HTTP Request Message The first  line of  an HTTP request message  is called the  line. The subsequent lines are called  the header lines. The  request  line has  fields the me

Question: (a) Show by means of a diagram the Ethernet frame structure and describe the six fields of the Ethernet frame structure. (b) Explain the operation of the Carrier S

A logic gate drives a load, which has a resistance of 1 kÙ and a capacitance of 20 pF. The printed circuit track connecting the gate to its load has an 40 pF capacitance to ground.

Efficiency :- The other main metric used for performance measurement is efficiency of parallel computer system i.e. how the resources of the parallel systems are being utilized

Financial Services Today   financial services are totally depended  on computer network. Application includes credit history searchers foreign exchange and  investment service

Determine the term - Backend LAN Backend networks are used to interconnect large systems like mainframes, supercomputers, and mass storage devices. The key needs here is for bu