A thorough security analysis is done at every stage of the protocol for understanding the risks and ways to combat it. The third stage is the key derivation process in protocols like Mickey which is thoroughly analyzed and done.
The article “Quantifying Skype User Satisfaction” is based on the various peer-to-peer protocols and thoroughly analysis of the model which is developed to measure the user satisfaction index. A detailed analysis of the communication and the various VoIP sessions that are responsible for making it happen. The Cox model is developed and analyzed for making the User satisfaction index interpretation quite strong with detailed analysis.
Most of the data is from journals and web related material which makes it quite usable to use the information for analysis and design. The variety of suggestions would make sure that all the analysis is well supported and framed for getting the right decision for the paper and its objectives. Pervez & Kjell (2005) defines as: “we must ourselves collect the data that are relevant to our particular study and research problem.”
The large academic text and journals which are required for making the right judgment for illustrating the theory and explanation of the various protocols are of good. The renowned nature of books and journals make sure that all the information is taken to its full extent.
The research method used is quite susceptible to various faults as security is not discussed in detail and more emphasis is given to VoIP protocols for their illustration. The in-depth discussion on the various VoIP protocols would make sure that all the various aspects are touched upon and illustrated in detail. The detailed discussion of the various VoIP protocols is an advantage of the paper and make sure that all the various scenarios are taken care to its maximum in deriving the gross attitude for fetching the objectives of the paper. The various