SlideShare a Scribd company logo
1 of 1
Download to read offline
Review 5 : Why is that voice and video traffic is often sent over TCP rather than UDP in today's
Internet? ( Hint: The answer we are looking for has nothing to do with TCP's congestion-control
mechanism.)
Jim Kurose and Keith Ross,”Computer Networking – A Top-Down Approach”, Addison-
Wesley, Seventh Edition, 2017.
ISBN-13: 978-0-13-359414-0
Solution
In today's Internet, voice and Video traffic is often sent over TCP (transmission control
protocol)
instead or UDP (user datagram protocol) because:
- Data transfer by TCP is reliable.
' The most rewalls are configured to blOCK UDP traffic. Using TCP for voice and Video traffic
allows the traffic go through the rewalls.
' connections that use voice/video are quite fast and hence prefer TCP as delays due to lost
packets WOUld be fewer.
' TCP's advantages over UDP include the fact that it has congestion control, reliable transport,
and ln-order receipt or segments.
' TCP's congestion control and reliability mechanisms lead to 100% delivery.

More Related Content

Similar to Review 5 Why is that voice and video traffic is often sent over TC.pdf

ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
mashiur
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
mashiur
 
PV Powerpoint
PV PowerpointPV Powerpoint
PV Powerpoint
Videoguy
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
Katie Gulley
 
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Dotnet  fast channel zapping with destination-oriented multicast for ip video...Dotnet  fast channel zapping with destination-oriented multicast for ip video...
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Ecwaytech
 
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Dotnet  fast channel zapping with destination-oriented multicast for ip video...Dotnet  fast channel zapping with destination-oriented multicast for ip video...
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Ecwayt
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
Ecwayt
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
ecwayprojects
 

Similar to Review 5 Why is that voice and video traffic is often sent over TC.pdf (20)

ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
Tcp and udp.transmission control protocol.user datagram protocol
Tcp and udp.transmission control protocol.user datagram protocolTcp and udp.transmission control protocol.user datagram protocol
Tcp and udp.transmission control protocol.user datagram protocol
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
Tcp vs udp difference and comparison diffen
Tcp vs udp   difference and comparison   diffenTcp vs udp   difference and comparison   diffen
Tcp vs udp difference and comparison diffen
 
TCP RemoteFX and IPQ
TCP RemoteFX and IPQTCP RemoteFX and IPQ
TCP RemoteFX and IPQ
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
PV Powerpoint
PV PowerpointPV Powerpoint
PV Powerpoint
 
IBM & Aspera
IBM & AsperaIBM & Aspera
IBM & Aspera
 
PACE-IT: Common Networking Potocols (part 1)
PACE-IT: Common Networking Potocols (part 1)PACE-IT: Common Networking Potocols (part 1)
PACE-IT: Common Networking Potocols (part 1)
 
Feature satip3
Feature satip3Feature satip3
Feature satip3
 
5 maximazing networkcapacity_v4-jorge_alvarado
5 maximazing networkcapacity_v4-jorge_alvarado5 maximazing networkcapacity_v4-jorge_alvarado
5 maximazing networkcapacity_v4-jorge_alvarado
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
chapter15.ppt
chapter15.pptchapter15.ppt
chapter15.ppt
 
A Review on Congestion Control Approaches for Real-Time Streaming Application...
A Review on Congestion Control Approaches for Real-Time Streaming Application...A Review on Congestion Control Approaches for Real-Time Streaming Application...
A Review on Congestion Control Approaches for Real-Time Streaming Application...
 
Internet Video
Internet VideoInternet Video
Internet Video
 
Feature satip3
Feature satip3Feature satip3
Feature satip3
 
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Dotnet  fast channel zapping with destination-oriented multicast for ip video...Dotnet  fast channel zapping with destination-oriented multicast for ip video...
Dotnet fast channel zapping with destination-oriented multicast for ip video...
 
Dotnet fast channel zapping with destination-oriented multicast for ip video...
Dotnet  fast channel zapping with destination-oriented multicast for ip video...Dotnet  fast channel zapping with destination-oriented multicast for ip video...
Dotnet fast channel zapping with destination-oriented multicast for ip video...
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 
Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 

More from jeeteshmalani1

How can you define the traits below and what are your thoughts on th.pdf
How can you define the traits below and what are your thoughts on th.pdfHow can you define the traits below and what are your thoughts on th.pdf
How can you define the traits below and what are your thoughts on th.pdf
jeeteshmalani1
 
Can someone help me setup this in JAVA Im new to java. Thanks.pdf
Can someone help me setup this in JAVA Im new to java. Thanks.pdfCan someone help me setup this in JAVA Im new to java. Thanks.pdf
Can someone help me setup this in JAVA Im new to java. Thanks.pdf
jeeteshmalani1
 
atify and describe the cult alue dimensions that help ural profile of.pdf
atify and describe the cult alue dimensions that help ural profile of.pdfatify and describe the cult alue dimensions that help ural profile of.pdf
atify and describe the cult alue dimensions that help ural profile of.pdf
jeeteshmalani1
 
Write a two- to three- page paper responding to the questions at the.pdf
Write a two- to three- page paper responding to the questions at the.pdfWrite a two- to three- page paper responding to the questions at the.pdf
Write a two- to three- page paper responding to the questions at the.pdf
jeeteshmalani1
 
Which of the following was true about the Great Depression in th.pdf
Which of the following was true about the Great Depression in th.pdfWhich of the following was true about the Great Depression in th.pdf
Which of the following was true about the Great Depression in th.pdf
jeeteshmalani1
 
What are the major concerns for corporations in developing and re.pdf
What are the major concerns for corporations in developing and re.pdfWhat are the major concerns for corporations in developing and re.pdf
What are the major concerns for corporations in developing and re.pdf
jeeteshmalani1
 
What basic auditing policy logs attempts to authenticate a user thro.pdf
What basic auditing policy logs attempts to authenticate a user thro.pdfWhat basic auditing policy logs attempts to authenticate a user thro.pdf
What basic auditing policy logs attempts to authenticate a user thro.pdf
jeeteshmalani1
 
What is a warrant in Toulmins model of a syllogismA) A legal do.pdf
What is a warrant in Toulmins model of a syllogismA) A legal do.pdfWhat is a warrant in Toulmins model of a syllogismA) A legal do.pdf
What is a warrant in Toulmins model of a syllogismA) A legal do.pdf
jeeteshmalani1
 
What are the main methods anthropologists use Give an example of ho.pdf
What are the main methods anthropologists use Give an example of ho.pdfWhat are the main methods anthropologists use Give an example of ho.pdf
What are the main methods anthropologists use Give an example of ho.pdf
jeeteshmalani1
 
The polarization of the CMB detected in the WMAP data is evidence fo.pdf
The polarization of the CMB detected in the WMAP data is evidence fo.pdfThe polarization of the CMB detected in the WMAP data is evidence fo.pdf
The polarization of the CMB detected in the WMAP data is evidence fo.pdf
jeeteshmalani1
 

More from jeeteshmalani1 (20)

How can you define the traits below and what are your thoughts on th.pdf
How can you define the traits below and what are your thoughts on th.pdfHow can you define the traits below and what are your thoughts on th.pdf
How can you define the traits below and what are your thoughts on th.pdf
 
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdf
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdffrank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdf
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdf
 
Does law provide liberty What is law How does law tend to be perve.pdf
Does law provide liberty What is law How does law tend to be perve.pdfDoes law provide liberty What is law How does law tend to be perve.pdf
Does law provide liberty What is law How does law tend to be perve.pdf
 
Consider two n times n matrices C and D that commute under matrix mul.pdf
Consider two n times n matrices C and D that commute under matrix mul.pdfConsider two n times n matrices C and D that commute under matrix mul.pdf
Consider two n times n matrices C and D that commute under matrix mul.pdf
 
Can someone help me setup this in JAVA Im new to java. Thanks.pdf
Can someone help me setup this in JAVA Im new to java. Thanks.pdfCan someone help me setup this in JAVA Im new to java. Thanks.pdf
Can someone help me setup this in JAVA Im new to java. Thanks.pdf
 
atify and describe the cult alue dimensions that help ural profile of.pdf
atify and describe the cult alue dimensions that help ural profile of.pdfatify and describe the cult alue dimensions that help ural profile of.pdf
atify and describe the cult alue dimensions that help ural profile of.pdf
 
21. Assume that mutations in the transformer (tra) and the male- spec.pdf
21. Assume that mutations in the transformer (tra) and the male- spec.pdf21. Assume that mutations in the transformer (tra) and the male- spec.pdf
21. Assume that mutations in the transformer (tra) and the male- spec.pdf
 
Write one Conditional Signal Assignment VHDL code statement in the b.pdf
Write one Conditional Signal Assignment VHDL code statement in the b.pdfWrite one Conditional Signal Assignment VHDL code statement in the b.pdf
Write one Conditional Signal Assignment VHDL code statement in the b.pdf
 
Write a two- to three- page paper responding to the questions at the.pdf
Write a two- to three- page paper responding to the questions at the.pdfWrite a two- to three- page paper responding to the questions at the.pdf
Write a two- to three- page paper responding to the questions at the.pdf
 
1. Match the following. DOE is pursuing the demonstration of one suc.pdf
1. Match the following. DOE is pursuing the demonstration of one suc.pdf1. Match the following. DOE is pursuing the demonstration of one suc.pdf
1. Match the following. DOE is pursuing the demonstration of one suc.pdf
 
Which of the following involve an increase in the entropy of the sys.pdf
Which of the following involve an increase in the entropy of the sys.pdfWhich of the following involve an increase in the entropy of the sys.pdf
Which of the following involve an increase in the entropy of the sys.pdf
 
Which of the following was true about the Great Depression in th.pdf
Which of the following was true about the Great Depression in th.pdfWhich of the following was true about the Great Depression in th.pdf
Which of the following was true about the Great Depression in th.pdf
 
What are the major concerns for corporations in developing and re.pdf
What are the major concerns for corporations in developing and re.pdfWhat are the major concerns for corporations in developing and re.pdf
What are the major concerns for corporations in developing and re.pdf
 
Which factors might account for the specificity of certain viruses f.pdf
Which factors might account for the specificity of certain viruses f.pdfWhich factors might account for the specificity of certain viruses f.pdf
Which factors might account for the specificity of certain viruses f.pdf
 
What basic auditing policy logs attempts to authenticate a user thro.pdf
What basic auditing policy logs attempts to authenticate a user thro.pdfWhat basic auditing policy logs attempts to authenticate a user thro.pdf
What basic auditing policy logs attempts to authenticate a user thro.pdf
 
What is a warrant in Toulmins model of a syllogismA) A legal do.pdf
What is a warrant in Toulmins model of a syllogismA) A legal do.pdfWhat is a warrant in Toulmins model of a syllogismA) A legal do.pdf
What is a warrant in Toulmins model of a syllogismA) A legal do.pdf
 
What are the main methods anthropologists use Give an example of ho.pdf
What are the main methods anthropologists use Give an example of ho.pdfWhat are the main methods anthropologists use Give an example of ho.pdf
What are the main methods anthropologists use Give an example of ho.pdf
 
Arrange the following parts and processes of eukaryotic gene expressi.pdf
Arrange the following parts and processes of eukaryotic gene expressi.pdfArrange the following parts and processes of eukaryotic gene expressi.pdf
Arrange the following parts and processes of eukaryotic gene expressi.pdf
 
The polarization of the CMB detected in the WMAP data is evidence fo.pdf
The polarization of the CMB detected in the WMAP data is evidence fo.pdfThe polarization of the CMB detected in the WMAP data is evidence fo.pdf
The polarization of the CMB detected in the WMAP data is evidence fo.pdf
 
Technical Performance Measures are quantitative measures that must be.pdf
Technical Performance Measures are quantitative measures that must be.pdfTechnical Performance Measures are quantitative measures that must be.pdf
Technical Performance Measures are quantitative measures that must be.pdf
 

Recently uploaded

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 

Review 5 Why is that voice and video traffic is often sent over TC.pdf

  • 1. Review 5 : Why is that voice and video traffic is often sent over TCP rather than UDP in today's Internet? ( Hint: The answer we are looking for has nothing to do with TCP's congestion-control mechanism.) Jim Kurose and Keith Ross,”Computer Networking – A Top-Down Approach”, Addison- Wesley, Seventh Edition, 2017. ISBN-13: 978-0-13-359414-0 Solution In today's Internet, voice and Video traffic is often sent over TCP (transmission control protocol) instead or UDP (user datagram protocol) because: - Data transfer by TCP is reliable. ' The most rewalls are configured to blOCK UDP traffic. Using TCP for voice and Video traffic allows the traffic go through the rewalls. ' connections that use voice/video are quite fast and hence prefer TCP as delays due to lost packets WOUld be fewer. ' TCP's advantages over UDP include the fact that it has congestion control, reliable transport, and ln-order receipt or segments. ' TCP's congestion control and reliability mechanisms lead to 100% delivery.