RVP Control Protocol (RVPCP)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Science Clay
Active In SP

Posts: 712
Joined: Jan 2009
01-03-2009, 10:04 AM

RVP Control Protocol (RVPCP)

The control protocol was initially developed for point-to-point data applications like the control messages that configure and maintain the data link between the client and the server. During an RVP/IP session, only one class of RVP/IP control message is exchanged: RVPCP ADD VOICE (operation code 12) packet which is used to send the UDP port used by the client (for subsequent voice data packets) to the server. This message always takes a single parameter of type RVPCP UDP PORT (type code 9), which always has a length of exactly two and a value that is the two-byte UDP port to which voice data packets should be addressed.

[para]The server responds with a packet containing the code RVPCP ADD VOICE ACK (operation code 13) which contains exactly one parameter, the server's voice UDP port. If RVP/IP is operating in "dynamic voice" mode, this exchange must be repeated whenever the voice channel needs to be reestablished, i.e., whenever the phone goes off-hook. Most of the functionality of this protocol is unnecessary when using TCP/IP.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: rvp ip, rvpcp, rvp control,
Popular Searches: e85 colorado, e85 blend, e85 alcohol content, rvp ip** tutorials notes for 7th sem embedded system, e85 alcohol carb, e85 alcohol gasoline, e85 rvp**im**bluetooth encryption in verilog,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,412 31-03-2015, 09:08 AM
Last Post: Guest
  Fuzzy MLS: An Experiment on Quantified Risk– Adaptive Access Control seminar projects maker 0 353 30-09-2013, 04:23 PM
Last Post: seminar projects maker
  Control Panel PPT seminar projects maker 0 228 25-09-2013, 12:36 PM
Last Post: seminar projects maker
  Open Core Protocol ( OCP ) An Introduction to Interface Specification seminar projects maker 0 522 24-09-2013, 12:29 PM
Last Post: seminar projects maker
  Optimizing Handover Performance in Host Identity Protocol seminar tips 5 2,542 21-08-2013, 09:11 AM
Last Post: study tips
  INTERNET PROTOCOL VERSION 6 PPT study tips 0 561 06-08-2013, 03:20 PM
Last Post: study tips
  Protocols and the TCP/IP Protocol Suite PPT study tips 0 335 03-08-2013, 03:17 PM
Last Post: study tips
  Internet protocol resolver PPT study tips 0 366 31-07-2013, 02:59 PM
Last Post: study tips
  CYBER CRIMES AND STEPS TO PREVENT AND CONTROL REPORT study tips 0 425 20-07-2013, 04:57 PM
Last Post: study tips
  Management Control System Report study tips 1 456 20-07-2013, 03:17 PM
Last Post: study tips