Process of skype is a web-based service, Computer Networking

Assignment Help:

Skype is a web-based service which offers cheap and free phone calls. Explain step by step (in terms of networking technology) what really happens from the point when you initiate a call until the receiver picks up the call.

Marking criteria

1. Correct information about the networking technology used by Skype is provided.

(5 marks)

2. Each step is outlined clearly and precisely. (5 marks)

3. Answer is clear and well written. (5 marks)

4. Appropriate and authentic references have been used. (3 marks)

5. APA reference style has been used correctly. (2 marks)

The user who uses the Skype is known as Skype clients. The server of the Skype authenticates this Skype user and makes its present to others Skype clients. The Skype server also checks the firewall and IP address of the client computer that uses the Skype's.  If a user wants to connect to Skype network the cache of the host computer must contain the valid entry. So in this case TCP connection must be established otherwise login will fail. So the following are the steps that are performed during Skype connection:

Start the Skype connection
Send UDP packet to Host Computer 
 If no response comes within 5 seconds 
Attempts the TCP connection with host computer at port number 80(HTTP).    
If not connected then attempt TCP Connection with Host Computer on port    443(HTTPS)
If not connected again attempt++.
If attempt==5 then fails the connection
else         
Again wait for 6 seconds           
Go to step 2
Again the steps will repeat until it get success

Related Discussions:- Process of skype is a web-based service

Compare error detection and error correction, Compare Error Detection and E...

Compare Error Detection and Error Correction: The correction of errors is more difficult than the detection. In error detection, checks only any error has happened. In error co

Bit stuffing, bit stuffing program in python

bit stuffing program in python

Illustrate about sliding window protocols, Q. Illustrate about Sliding Wind...

Q. Illustrate about Sliding Window Protocols? - Sliding window - Keeps the unacknowledged outstanding frames in sender - Keeps the expected frames in receiver - Sequen

Analyze snort or pcap data from a public wifi hotspot, The project idea is ...

The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r

Describe transport and tunnel mode in detail, Can you describe transport an...

Can you describe transport and tunnel mode in detail with datagram packets?

Guided and unguided transmission media, Name various types of guided and un...

Name various types of guided and unguided transmission media. If you are connecting your office computers through a local area network which transmission media would you use? Why?

What do you use the aux port for, The auxiliary port is used to link a mode...

The auxiliary port is used to link a modem to for dial backups.

Find the domain, Find the domain Name of 128.252.160.200

Find the domain Name of 128.252.160.200

Efficiency vs. number of processors, Efficiency :- The other main metr...

Efficiency :- The other main metric used for performance measurement is efficiency of parallel computer system i.e. how the resources of the parallel systems are being utilized

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd