Submitted by: Submitted by manywan
Views: 436
Words: 5231
Pages: 21
Category: Business and Industry
Date Submitted: 01/28/2012 03:23 AM
INTERNET APPLICATION : SKYPE
ABSTRACT
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype allows its users to place voice calls and send text messages to other users of Skype clients. In essence, it is very similar to the MSN and Yahoo IM applications, as it has capabilities for voicecalls, instant messaging, audio conferencing, and buddy lists. However, the underlying protocols and techniques it employs are quite different.
This assignment provides a brief definition and history of Skype. It concentrates on its system, software, security and feature. This assignment also discusses criticism about performance of Skype and appends differences between Skype and other VoIP protocols.
Categories and Subject Descriptors
[Computer-Communication Networks]: Network Protocols-Application
General Terms
Algorithms, Design, Measurement, Performance, Security
Keywords
Peer-to-peer (p2p), Voice over IP (VoIP), Super Node (SN), Internet telephony, conferencing, Skype network (SN), Skype client (SC), host cache (HC)
1. INTRODUCTION
Skype is a peer-to-peer Internet telephony network founded by Niklas Zennström and Janus Friis, also founders of the file sharing application Kazaa and the peer-to-peer television application Joost. Even though it is similar to MSN and Yahoo IM application as it has capabilities for voice-calls, instant messaging, audio conferencing, and buddy lists but its employed different protocols and techniques that competes against existing open VoIP protocols such as SIP, IAX, and H.323.
Skype has experienced rapid growth in both popular usage and software development since launch, both of its free and its paid services.
The Skype communications system is notable for its broad range of features, including free voice and video conferencing, its ability to use peer to peer (decentralized) technology to overcome common firewall and NAT (Network address translation) problems, its use of transparent, strong encryption...