StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Skype - Essay Example

Cite this document
Summary
To understand the generation of a VoIP telephone call from Skype, let’s consider both the sender’s side and the receiver’s side. Mr. A sends a telephone call from Skype to Mr. B’s phone. First of all a media channel is setup…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Skype
Read Text Preview

Extract of sample "Skype"

DQ1: Skype Skype uses VoIP (Voice over Internet Protocol), which is a service that allows us to make calls from a PC to an ordinary phone. Valdes and Roos (2012) state that, “VoIP can turn a standard Internet connection into a way to place free phone calls.” The voice call passes both through the Internet and through a telephone network. However, the mechanism is a bit complex as compared to an ordinary phone-to-phone call. The mechanism comes under the concept of Internet Telephony, which supports voice calls, SMS, and voice messaging services that are initiated through the internet and are intended for an ordinary phone.

To understand the generation of a VoIP telephone call from Skype, let’s consider both the sender’s side and the receiver’s side. Mr. A sends a telephone call from Skype to Mr. B’s phone. First of all a media channel is setup. The analog voice signals are converted into digital signals by the sound card, which are then encoded into packets and sent over the internet. When all signals have been packetized, they are then sent to a packet-switched network in Mr. B’s area, as Internet Protocol (IP) packets.

VoIP operators also set up gateways to act as a link between the caller and the called one (Wolf & Barnes 2011:2). Mr. A’s PC was the originating gateway, and the packet-switched network which received the packets was the end gateway, which will send the voice signals to the public switched telephone network (PSTN). PSTN, then, will direct these signals to Mr. B’s telephone as regular telephone calls. This is the process accomplished from the sender’s side, who bypasses the local telephone network and its charges.

Now, when Mr. B receives the call on his telephone, the process goes like this. The packets received on the packet-switched network as IP packets are decoded. The digital signals are converted back into analog signals, which finally produce the voice stream as sent by Mr. A. Hence, we see that when Skype makes calls from internet to an ordinary phone, both the internet and the PSTN are involved. Although you have to pay for this service, yet it is much cheaper than regular phone-to-phone calls.

That is why this service is widely in use today. References Valdes, R & Roos, D 2012, ‘How VoIP works’, How Stuff Works, viewed 1 March 2012, Wolf, K.H, & Barnes, R 2011, ‘Calling over the internet’, VoIP Emergency Calling: Foundations and Practice, John Wiley and Sons, USA. DQ2: Malicious Acts The concept is called ‘packet sniffing’. Thomas has used a packet sniffer to capture packets not intended for him. Packet sniffing is “the process of capturing and interpreting live data as it flows across a network in order to better understand what is happening on that network” (Sanders 2007:2).

Packet sniffer is a hardware or software that captures network traffic or packets of data. The packet sniffer must be on the same wire which is linking the two computers with each other. Since, packet sniffers are not easy to detect, Thomas might have installed a Trojan on Ali or Jim’s computer, and might have run a packet sniffer from their system, making the sniffer stay on the same wire. Thus, the network card is set into a promiscuous mode. Now, Thomas can view all usernames and passwords because “within a given network, username and password information is generally transmitted in clear text which means that the information would be viewable by analyzing the packets being transmitted” (Bradley 2012).

Hence, with the use of packer sniffer, Thomas can read all unencrypted data being transferred between Ali and Jim. This type of hacking is also called eavesdropping in which the Hacker can actually monitor the network traffic. Thomas, through eavesdropping, can perform many malicious activities through gaining control over the transmission of packets, by eavesdropping on the Internet Protocol (IP) based network. It is, again, a sniffer technology which captures data packets. Thomas can gain access to user accounts and privileges; can make the conversation confusing for Ali and Jim to understand; and, can use the information obtained in criminal activities.

He can also modify or tamper with the packets by placing a tap on the network line to interrupt packet transmission as they leave the sender’s point. He can use his packet capturing techniques to steal important information being exchanged between Ali and Jim. He can totally stop data packets from transmission. Hence, there are a lot of malicious activities that he can do by gaining control over the transmission of data packets between the sender and the receiver. In case of wireless networking, it becomes very important to encrypt all information that is being sent as data packets to the receiver.

This prevents the hacker or packet sniffer to understand the data, even if it gets hacked. (Note for QAD: The two questions and their references have been separated as per the customer’s instructions.) References Bradley, T 2012, 'Introduction to Packet Sniffing’, About.com, viewed 1 March 2012, Sanders, C 2007, Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, No Starch Press, USA.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Skype Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Skype Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1444120-skype
(Skype Essay Example | Topics and Well Written Essays - 250 Words)
Skype Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1444120-skype.
“Skype Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1444120-skype.
  • Cited: 0 times

CHECK THESE SAMPLES OF Skype

Skype Reseach Paper

Thanks to the Internet, social networks such as Facebook, Twitter and Skype have enabled a majority of individuals to be able to communicate with each other while in different parts of the world (Ferrell & Hartline 2010).... Skype is one such company that has embraced technological advancements and enabled people to share, communicate and transact with each other irrespective of where they may be in the world.... Skype is a company that was established in the year 2003 by Niklas Zennstrom and Janus Friis (Ferrell & Hartline 2010)....
5 Pages (1250 words) Research Paper

Organizational Diagnosis. Skype

From the Seven Chosen Models a particular model would be specifically identified that would tend to resolve the problems faced by the VOIP Service Generating Company, Skype.... An effective analysis would be rendered and inferences drawn reflecting on the reasons as to why the particular model is taken for conducting the diagnosis of Skype....
5 Pages (1250 words) Essay

Case Study 3 - Input Diagnosis (skype)

Case Study 3 - Input Diagnosis (Skype) Table of Contents Organization's strategy of Skype 3 Porter's Three Generic Competitive Strategies 4 Organizational Inputs 4 Skype's Critical Inputs and its Effect on the Strategies 6 Nadler-Tushman Congruence Model 6 References 8 Organization's strategy of Skype An organization's business strategy is the choices, plans and decisions that are employed to achieve greater profitability and success....
4 Pages (1000 words) Essay

Types of Feedback Loops Used by Skype

CS 5 Skype Analysis Name Institution CS 5 Skype Analysis Introduction This paper will address the manner in which Skype can develop more and create extra organizational learning opportunities by use of the feedback loops.... There are two main types of feedback loops used by Skype in creating organizational learning opportunities.... The balancing loop is one of the two essential system structures by Skype.... Effective Strategies That Might be used in This Feedback by Skype To efficiently make use of this balancing loop, Skype must ascertain that there is an explicit well comprehended and accepted description of the preferred condition in the company system structure....
6 Pages (1500 words) Essay

Case Analysis of Skype

The term paper "Case Analysis of Skype" gives information about Skype.... hellip; The founders introduced Skype with a revolutionary idea of changing the telecommunication industry by offering all consumers access to a free and unlimited calling option that was of superior quality via software by the name of next generation Peer-to-Peer.... Skype was among the top-ranked Voice over Internet Protocol software.... With the help of P2P, Skype was able to operate at low cost and allow users to sign up for their accounts quickly (Jusevicius & Firantas, 2010)....
8 Pages (2000 words) Term Paper

Skype Forensics

This case study "Skype Forensics" discusses digital forensic in this high-tech world that is inevitable.... Skype is one such application that allows instant messaging, file transfers, voice and video calls, and screen sharing between users (Wallingford 2006).... The increased use of Skype is resulting in an increased number of cybercrimes as the users take advantage of the anonymity associated with its use.... he artifacts collected from a Skype conversation can be analyzed with the help of several investigation tools like 'Skype chat carver', 'Belkasoft Evidence Center', 'Chat Examiner', 'Epilog', 'Forensic Assistant', 'Internet Evidence Finder', 'Skype Extractor', 'SkypeAlyzer', 'SkypeLogview', and others (Mikhaylov 2013)....
6 Pages (1500 words) Case Study

Digital Forensic: Skype

This case study "Digital Forensic: Skype" discusses various available tools that will aid the digital forensic investigation process, document the steps involved in the investigation process along with the challenges that have to be faced during the course of the investigation process.... The increased use of Skype is resulting in an increased number of cybercrimes as the users take advantage of the anonymity associated with its use.... he artifacts collected from a Skype conversation can be analyzed with the help of several investigation tools like 'Skype chat carver', 'Belkasoft Evidence Center', 'Chat Examiner', 'Epilog', 'Forensic Assistant', 'Internet Evidence Finder', 'Skype Extractor', 'SkypeAlyzer', 'SkypeLogview', and others (Mikhaylov 2013)....
5 Pages (1250 words) Case Study

Skype and Its Characteristics

This work "Skype and Its Characteristics" describes the general features of Skype, benefits to individuals and organizations, the history of its development.... The author takes into account security issues concerning Skype.... From this work, it is clear about the main technical specifications on Skype.... nbsp;… Skype is an application software for instant text messaging and voice chat between two computer users who are online that also allows additional features such as video conferencing for multiple users, file transfer, and the ability to make telephone calls over the internet to landline and mobile phone networks....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us