• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Skype Protocol

By Abhishek Ghosh June 27, 2013 7:37 am Updated on June 27, 2013

Skype Protocol

Advertisement

Skype protocol is a closed source, peer-to-peer architecture of protocol used by Skype. As Skype protocol is closed source, only Skype uses the protocol. Previously we wrote about VoIP or Voice Over IP, Skype Protocol is not interoperable with other VoIP network protocols. Mentionaly, Skype was the first peer-to-peer IP telephony network.

 

Architecture of Skype Protocol

 

Skype Protocol contains three types of sub entities –

  1. Supernodes
  2. Nodes or ordinary nodes
  3. Login server.

 

Each client device itself maintains a host cache with the IP address and port numbers of reachable supernodes. The Skype user directory is decentralized and distributed among the supernodes in the network.

Advertisement

---

The structure was so cleverly done, before 2012; actually any client device used to become a supernode itself. Supernodes relay communications on behalf of two other clients, both of which are behind firewalls or “one-to-many” Network address translation. There is no usage of Firewall by Skype Protocol, neither it support the use of the IPv6 protocol, making Skype Protocol a existing protocol with questionable privacy.

 

Other Notes on Skype Protocol

 

Skype Protocol

 

The RC4 encryption algorithm is used to obfuscate the payload of datagrams. It has two parts – the CRC32 of public source and destination IP and Skype’s packet ID which are taken Skype obfuscation layer’s initialization vector (IV). The XOR of these two 32-bit values is transformed to an 80-byte RC4 key using an unknown key engine. A notable misuse of RC4 in Skype can be found on TCP stream.

On 10 May 2011, Microsoft Corporation acquired Skype Communications for US$8.5 billion. Reverse engineering of the Skype protocol by inspecting/disassembling binaries is prohibited by the terms and conditions of Skype’s license agreement. However European Union law allows reverse-engineering a computer program without getting a permission from an author for inter-operability purposes. In the United States, the Digital Millennium Copyright Act grants a safe harbor to reverse engineer software for the purposes of interoperability with other software.

There are some claimed reversed engineered projects available against Skype Protocol :

 

Vim
1
 https://github.com/skypeopensource/skype_part3_source

 

There is a open source alternative of Skype Protocol but with much more security, named Jitsi.

Abhishek-GhoshTagged With skype protocol , Which of the following types of communications tools is used for voice over IP (Skype)? , paperuri:(06b860c88dbbcf3703d41377c3239447) , skype 프로토콜 , Types of communication tools used for voice over , Which of the following types of communications tools is used for voice over IP (Skype , Which of the following types of communications tools is used for voice over IP (Skype)
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Skype Protocol

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • What is Peer Production?

    Teamwork, also called peer production or mass collaboration, is a way of producing goods and services that relies on communities of self-organized individuals. In such communities, the work of many people is coordinated towards a shared outcome. Peer-to-peer production is a process that takes advantage of the new possibilities of collaboration offered by the Internet […]

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • The Importance of Voice and Style in Essay Writing

    Essay writing is an essential skill that every student must master to excel academically. However, it’s not enough to simply put down your thoughts on paper; your writing must have a unique voice and style that captures the attention of your readers. A strong writing style not only makes your essay more engaging but also […]

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy