Why do internet telephony protocols run on top

Assignment Help Computer Networking
Reference no: EM13692221

Question: Why do Internet telephony protocols run on top of UDP rather than on TCP · Internet telephony protocols used to drive audio and video traffic Audio and video messages are more interested in speed instead of reliability Internet telephony protocols run on top of UDP rather than on TCP because of the congestion control of TCP which throttles sending in times of congestion on the network.

UDP is use because a connection is not needed to be maintained by some internet telephony applications.

Can you provide the answer with reference to computer networking?

Reference no: EM13692221

Questions Cloud

How could those redundancies lead to anomalies : If you want to produce a listing of the file contents by last name, area code, city, state, or zip code, how would you alter the file structure?
What is the inductive hypothesis : Show that the base case is true and What is the inductive hypothesis P(k)?
How might the tables be related to one another : What tables would you create, and what would the table components be and How might the (independent) tables be related to one another?
Designing the instruction set : For a 3-operand ADD instruction that only uses register addressing mode, how long (number of bits) should the instruction be?
Why do internet telephony protocols run on top : Why do Internet telephony protocols run on top of UDP rather than on TCP - UDP is use because a connection is not needed to be maintained by some internet telephony applications.
Program that would display a letter to a friend : Writing a c++ program that would display a letter to a friend? It should have a proper format like name, friends name, address.....etc
Decimal to the ieee 32 bit floating point : Numbers from decimal to the IEEE 32 bit floating point - binary IEEE 32-bit floating point to decimal.
Inheriting from the jframe class : What is the difference between inheriting from the JFrame class and using a JFrame member variable?
Convert the decimal fractions to binary : Convert the following decimal fractions to binary with a maximum of six places to the right of the binary point:

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the purposes of poe in wlan design

Explain the purposes of POE in WLAN design. Provide at least 3 scenarios of POE being used as the prime element in WLAN design to address the projects cost

  Displays within the zenmap gui scan report

What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity?

  Determine actual maximum channel capacity

Determine the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Formula for the correction factor for mobile antenna

Explain fully why you chose that solution, why it is of more advantage than the other solutions.  Explain what other specific (how high, how much power, etc.) choices you might suggest to increase system performance as measured by received signal ..

  Research on aspects of network administration and support

Peer-to-Peer, Client/Server and Virtualization platforms can be used to setup networks for organizations small in size. Compare the three mentioned platforms and mention their associated merits in relation to administration, security and usability

  Describe the network management software components

Describe the network management software components. Side server components, middleware components and northbound interface and explain the elements and capabilities of a fault, configuration, accounting, performance, and security server

  Discuss how we use the control panel to configure specific

some commentators have suggested that companies today have not adequately configured computers and network resources

  Describe how sites must be interconnected

Describe how the sites must be interconnected, where main data store will be located, how sites will connect to it, and what security measures will be implemented.

  Discuss security implications for netbooks

Why do you think companies often fail to harden their servers adequately? Justify your explanation.

  1what are your objectives with the penetration of the

1.what are your objectives with the penetration of the market?2.assess the strengthsweaknesses and opportunitiesthreats

  Create communication system for transmission

Create communication system (block diagram) which will permit transmission of these 4 sources over  telephone channel using: Time division multiplexing by using PCM, suppose 8-bit samples.

  The senior network administrator would like you to get

you are a networking intern at richman investments. you recently developed a design for a remote access control policy

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd