a)
The video that is streamed directly from web server to media player will use TCP as the underlying protocol.
Hence the given statement is “True”.
b)
The user is capable of changing the encoding in the middle of the session to change the payload type of the RTP stream.
Hence the given statement is “True”.
c)
The application that uses the RTP can use any port to send and receive through any port numbers.
Hence, the given statement is “False”.
d)
The session that has a separate audio and video stream for each sender, the audio and video streams uses different SSRC.
Hence, the statement is “False”.
e)
Per-hop behavior defines the difference in the performance among the classes of traffic present in the diffserv network.
Hence, the given statement is “True”.
f)
According to the example given in the text, Alice indicates that the message to receive the audio from the bob.
Hence the given statement is “False”.
g)
According to the example given in the text, Alice indicates that the message to receive the audio from the bob through the port 48753.
Hence the given statement is “False”.
h)
The messages between the SIP entities are transmitted through a default port number 5060.
Hence the given statement is “True”.
i)
The SIP registration process is made using the REGISTER. Registration is the first step for making VOIP (Voice Over Internet Protocol).
Hence the given statement is “True”.
j)
H.323 mandates the G.711 audio encoding and the given is not the requirement of the SIP.
Hence the given statement is “False”.
Want to see the full answer?
Check out a sample textbook solutionChapter 9 Solutions
EBK COMPUTER NETWORKING
- SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts. A TCP connection is set up between a user agent and a server program. The server listens on TCP port 25 for incoming connection requests. The user end of the connection is on a TCP port number above 1023. You have defined the packet filter rule set shown in the table below. These rules permit and/or deny inbound and outbound traffic between the user agent and the mail server. Describe the purpose of each packet filter rule in the table. Rule Direction Source Address Destination Address Protocol Destination Port Action A2 In External Internal TCP 25 Permit B2 Out Internal External TCP > 1023 Permit C2 Out Internal External TCP 25 Permit D2 In External Internal TCP > 1023 Permit E2 Either Any Any Any Any Denyarrow_forwardHow do you read a data packet from a UDP port using recvfrom in C programming language? The data packet contains in order: type (1 byte unsigned integer) and payload data (0-4096 bytes).arrow_forwardComputer Science In Python, I am trying to make a client and server code that passes the payload with the requirements. The client has to specify the length of the data packet, up to max, specify how many times to pass the data packet, and specify the server IPv4 address. Both the client and the server need timer functions and compute the time needed to perform the number of sends both the Client and the server need to display the local and remote IPv4 addresses, total time, and bytes per second. Please help, Thanks.arrow_forward
- Assume that Computer A, which is connected through an Ethernet cable to the Switch S1, is just powered on. The user opens a browser and then types a website address to receive the website from the Server (as shown in Figure 1). Write down all the important protocols that come into play by the time the first frame containing HTTP request reaches R1. (Note: Before HTTP frame, other frames have already been sent by other protocol(s).) Write down all the protocols with reference to the TCP Model as follows? Application Layer: Transport Layer: Internet Layer: Link Layer:arrow_forwardAssume that Computer A, which is connected through an Ethernet cable to the Switch S1, is just powered on. The user opens a browser and then types a website address to receive the website from the Server (as shown in Figure 1). Write down all the important protocols that come into play by the time the first frame containing http request reaches R1. (Note: Before http frame, other frames have already been sent by other protocol(s).) Write down all the protocols with reference to the TCP Model as follows. Application Layer: Transport Layer: Internet Layer: Link Layer: [Physical Layer (if needed)]: After writing down the protocols that come into play, briefly write the procedure as to what happensarrow_forwardComputer Science Networks and should be done in C language. Create a UDP client and server program that not only is able to locally transfer files but it gives the client the ability to send multiple copies of the file to multiple servers. Once the server program is initiated, it waits until it receives client packets. It then reads and saves the payload of the packets. The client reads a file from the disk and sends it to each server over a UDP socket by breaking the file up into mtu-byte sized packets. Client needs to be concurrent in sending the packets to all of the servers using threadsarrow_forward
- Imagine that you are developing an application using TCP as your transport layer protocol. A new version of the protocol is implemented in your operating system that no longer rearranges outof-order data. Must you make any changes to the application to accomodate these changes? If so, what are some specific changes must you make?arrow_forwardb) A user, on an ethernet LAN, sends an HTTP request to a web server on a remote network. What is the destination MAC address of the frame carrying this request?arrow_forwardThe process by which each successive layer of the protocol stack appends its data onto the message is known as which of the following? encapsulation encryption transmission assemblyarrow_forward
- In a TCP data packet, if the sequence number has the value 001111, ACK number has the value 010110 and the urgent pointer has the value 001100 assuming that URG flag is set. What is the last urgent byte in the data section of the packet? All numbers are in binary.arrow_forwardSuppose that a Web server runs in Host C on port 80 . Suppose also that this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B. a) Are all of the requests being sent to the same port number at Host C? b) Will the client use port 80 in its local machine to communicate with the server? c) How does the server differentiate between the two requests?arrow_forwardIn a TCP connection, the initial sequence number at the client site is 2171. The client opens the connection, sends three segments, the second of which carries 1000 bytes of data, and closes the connection. What is the value of the sequence number in each of the following segments sent by the client? a. The SYN segment b. The data segment c. The FIN segmentarrow_forward
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning