Process of skype is a web-based service, Computer Networking

Assignment Help:

Skype is a web-based service which offers cheap and free phone calls. Explain step by step (in terms of networking technology) what really happens from the point when you initiate a call until the receiver picks up the call.

Marking criteria

1. Correct information about the networking technology used by Skype is provided.

(5 marks)

2. Each step is outlined clearly and precisely. (5 marks)

3. Answer is clear and well written. (5 marks)

4. Appropriate and authentic references have been used. (3 marks)

5. APA reference style has been used correctly. (2 marks)

The user who uses the Skype is known as Skype clients. The server of the Skype authenticates this Skype user and makes its present to others Skype clients. The Skype server also checks the firewall and IP address of the client computer that uses the Skype's.  If a user wants to connect to Skype network the cache of the host computer must contain the valid entry. So in this case TCP connection must be established otherwise login will fail. So the following are the steps that are performed during Skype connection:

Start the Skype connection
Send UDP packet to Host Computer 
 If no response comes within 5 seconds 
Attempts the TCP connection with host computer at port number 80(HTTP).    
If not connected then attempt TCP Connection with Host Computer on port    443(HTTPS)
If not connected again attempt++.
If attempt==5 then fails the connection
else         
Again wait for 6 seconds           
Go to step 2
Again the steps will repeat until it get success

Related Discussions:- Process of skype is a web-based service

DHCP, Describe DHCP concept

Describe DHCP concept

Describe in detail how rsvp actually works, Normal 0 false fa...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What are reasons behind using layered protocols, What are reasons behind us...

What are reasons behind using layered protocols  Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay

Explain the concept of token passing, Token Passing S...

Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Illustrate addressing, Addressing Complicated addressing scheme because...

Addressing Complicated addressing scheme because there may be intermediate stations (APs), identified by flags

Example of go back - N protocol, Q. Example of go back - N protocol? Th...

Q. Example of go back - N protocol? The window size is 4. A sender has sent frame 6 as well as the timer expires for frame 3 (frame 3 not ACKn'd). The sender goes back as we

What are instance variables, What are instance variables? Instance vari...

What are instance variables? Instance variables are those which are explained at the class level. Instance variables require not be initialized before using them as they are au

Concept of internetwork and intranetwork routing protocols, Describe the co...

Describe the concept of internetwork and intranetwork routing protocols?

Determine theoretical data capacity of the wireless channel, Consider a sim...

Consider a simple wireless data link using channel bandwidth of 40 kHz. The transmit power level is 20 dBm, the link attenuation is 40 dB and the SNRdB at the receiver is 20 dB.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd