Skype is a software application that allows you to make free phone calls to more than 75 million population worldwide, and shockingly cheap calls to practically in any place else on Earth! As a effect of that, Skype has become the fastest growing aid in the history of the Internet. Recently, the enterprise was acquired by eBay, someone else step transmit towards achieving the final goal of manufacture Skype the world's largest communication company.
Skype is easy to setup and use. It allows its users to make crystal clear calls, regardless of their location, send instant messages, switch seamlessly between text and voice communication, make video calls, seminar calls, transfer files, call landlines and cell phones for a fraction of the cost of a traditional call. Skype is truly manufacture a revolution in the way we communicate.
How To Rigister The Best Host
But how does it actually work? This report focuses on describing the Skype network and the technology behind it.
Skype is a type of peer-to-peer Voice-Over-Ip client, based on the Kazaa file sharing program. The developers of Skype claim that it provides best voice quality than similar applications like Msn and Yahoo Messenger. It also encrypts calls end-to-end.
There are two types of machines in the Skype network - ordinary host (Skype Client) and Super Node (Sn). An ordinary host is the computer of a quarterly user who has the application installed and connects to the network in order to quote with other users. The Super Nodes are the end-point of ordinary hosts in the network. In other words, ordinary hosts join together to the Super Nodes. Any computer with a group Ip and proper hardware configuration can be a Sn. An ordinary host must join together to a super node and must register itself with the Skype login server for a thriving login. The Skype login server is the only central unit in the whole network. It market the usernames and respective passwords of all Skype users. Nslookups have shown that this server is located in Denmark. All Super Nodes join together to the login server in attempt to verify the username password of the client. It market your Skype Name, your e-mail address, and an encrypted representation of your password.
If you are a quarterly Skype user, then your computer is carefully an 'ordinary host' that connects to a Super Node. The Super Nodes are servers, located in separate parts of the world. But your Skype client, must know to which Sn it has to connect. Therefore, every Skype client (Sc) maintains a local table that contains the Ips and corresponding ports of Super Nodes. This is called a host cache and it stored in the Windows Registry of the given Sc. So basically, every time you load up Skype, it reads the date from the host cache, takes the first Ip and port from there and tries to join together to this Sn. If the connection fails for some surmise (the Sn is offline; it is no longer part of the network, etc) then it reads the next line from the table. In case it fails to join together to any of the Ips listed, the Skype returns a login error upon start-up. Hence, the host cache must comprise at least one valid entry in order for the application to join together to the network and work properly. Valid entry means an Ip address and port whole of an online Super Node. The path to the table in the Windows Registry is Hkey_Current_User / Software / Skype / Phone / Lib / connection / Hostcache. You can verify that on your computer by chance the Start menu, then click Run and enter 'regedit', without the dashes. Of course, the exact path could be separate in the next versions of the application.
As a concept, Super Nodes were introduced in the third-generation P2P networks. They allow improved quest performance, reduced file-transfer latency, network scalability, and the quality to resume interrupted downloads and simultaneously download segments of one file from multiple peers. Basically, they help ordinary hosts join together to each other and guide efficiently the encrypted network traffic.
Super Nodes are also responsible for the 'Global Indexing'. This technology enables you to quest for other users in the network. The enterprise guarantees that it will find a user if he has registered and has logged in while the last 72 hours.
A very entertaining occasion about the Skype network is that it 'self-modifiable'. If you have the application installed, your computer may turn into a Super Node, without you even knowing it, because those capabilities don't have a noticeable impact on a computer's performance. Sns basically store the addresses of up to some hundred Skype users, without carrying any voice, text or file-transfer data. In that manner, the more Skype users come online, the more supernodes become ready to strengthen the capacity of the network.
Skype routes the traffic intelligently by selecting the optimum data transfer path. Since it uses either Tcp or Udp protocol, it breaks the whole data stream into detach packets, which can take separate paths to the end destination. The final arrangement is done at the receiving end.
As far as security and privacy are concerned, Skype uses industrialized Encryption Standard, known as Rijndel, used also by the U.S. Government organizations to protect sensitive data. Skype uses 256-bit encryption.
The programmers of Skype have implemented wideband codecs which allows it to profess a good sound quality at a bandwidth of 32kb/s and allow frequencies between 5-8,000Hz to pass trough.
Your list of contacts, the application market in the Windows Registry. This is called the Buddy list and once again, it is digitally encrypted. So, the list is local for every machine, or in other words, it's not downloaded from the central server.
Let's briefly quote the tasks of the Skype client. First it connects to the network. It then listens on singular ports for incoming calls, refreshes the host cache table, uses wideband codecs, maintains the buddy list, encrypts messages and determines if there is a firewall or not.
The login process:
The login process is the most important one and it consists of some phases. As mentioned, Sc must join together to a valid Sn in order to authenticate the username and password with the Central Server.
Skype gets the fist Ip from the host cache, sends it a Udp packet and waits for response. If there is no response after 5 seconds, it sends a Tcp packet to the same Ip. It tries to construct a Tcp connection to the Hc Ip address and port 80 (Http port). If still unsuccessful, it tried to join together to Ip address and port 443 (Https port). If this does not work either, it reads the next address in the Hc. If Skype is unable to join together to a Sn, it will report a login failure.
The application comes with some build-in addresses of separate nodes, called bootstrap super nodes.
If the connection attempt is successful, the client must authenticate the user name and password with the Skype login server, which holds all user names and passwords and makes sure they are unique across the whole network. When the application connects to an Sn, it receives an modern list of other active Sns, so it has the most current information.
The Media transfer process:
The video/voice communication through Skype is established through Udp. The trick here is that quite often, one of the users is behind a firewall or a router, hence it doesn't have a real Ip address. But if both Skype clients are on real Ips, then the media traffic flows directly between them over Udp. The size of the voice packet is 67 bytes, which is actually the size of Udp payload. One second conversation results in practically 140 voice packets being exchanged both ways, or 3-16 kilobytes/s.
If one of the callee or both of them do not have a group Ip, then they send voice traffic to someone else online Skype node over Udp or Tcp. The developers of Skype have favorite to use Udp for voice transmission as much as possible.
An entertaining fact is that even if both sides are not speaking, voice packets will still be flowing between them. The purpose of these so called 'silent packages' is to keep the connection alive.
Conclusion:
There are some factors responsible for the success of Skype. First of all, the voice quality is best compared to other applications. It works without a problem on computers with firewall. It is very easy to setup and use. Skype's security is also a big advantage. all that is being transferred across the network is being encrypted to ensure privacy. As a effect of that, even if hackers intercept the data being transferred, they won't be able to decode it.
The Skype application does not comprise any adware or spyware. But, there are cases when third parties have managed to add such functionalities (not only for Skype), so it's actually important that you download it from the right place. Therefore, do it either from the lawful website, or from respected sites as http://www.freesecuredownloads.com/skype/index.html.
How Skype WorksRelated : black friday news
ไม่มีความคิดเห็น:
แสดงความคิดเห็น