Methods of delivering voice communications and multimedia over IP networks
Voice over Internet Protocol (VoIP),[a] also known asIP telephony, is a set of technologies used primarily for voice communication sessions overInternet Protocol (IP) networks, such as theInternet.[2] VoIP enablesvoice calls to be transmitted as data packets, facilitating various methods ofvoice communication, including traditional applications like Skype, Microsoft Teams, Google Voice, andVoIP phones. Regular telephones can also be used for VoIP by connecting them to the Internet viaanalog telephone adapters (ATAs), which convert traditional telephone signals into digital data packets that can be transmitted over IP networks.
The broader termsInternet telephony,broadband telephony, andbroadband phone service specifically refer to the delivery of voice and other communication services, such asfax,SMS, andvoice messaging, over the Internet, in contrast to the traditionalpublic switched telephone network(PSTN), commonly known asplain old telephone service (POTS).
VoIP technology has evolved to integrate withmobile telephony, includingVoice over LTE (VoLTE) andVoice over NR (Vo5G), enabling seamless voice communication overmobile data networks. These advancements have extended VoIP's role beyond its traditional use in Internet-based applications. It has become a key component of modern mobile infrastructure, as4G and5G networks rely entirely on this technology for voice transmission.
The steps and principles involved in originating VoIP telephone calls are similar to traditional digitaltelephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding. Instead of being transmitted over acircuit-switched network, the digital information is packetized and transmission occurs as IP packets over apacket-switched network. They transport media streams using special media delivery protocols that encode audio and video withaudio codecs andvideo codecs. Various codecs exist that optimize the media stream based on application requirements and network bandwidth; some implementations rely onnarrowband andcompressed speech, while others supporthigh-fidelity stereo codecs.
Early providers of voice-over-IP services used business models and offered technical solutions that mirrored the architecture of the legacy telephone network. Second-generation providers, such asSkype, built closed networks for private user bases, offering the benefit of free calls and convenience while potentially charging for access to other communication networks, such as the PSTN. This limited the freedom of users to mix-and-match third-party hardware and software. Third-generation providers, such asGoogle Talk, adopted the concept offederated VoIP.[3] These solutions typically allow dynamic interconnection between users in any two domains of the Internet, when a user wishes to place a call.
In addition toVoIP phones, VoIP is also available on many personal computers and other Internet access devices. Calls and SMS text messages may be sent viaWi-Fi or the carrier'smobile data network.[4] VoIP provides a framework for consolidation of all modern communications technologies using a singleunified communications system.
VoIP technology has been adapted for use inmobile networks, leading to the development of advanced systems designed to support voice communication over modern data infrastructures. Among these are Voice over LTE (VoLTE) and Voice over 5G (Vo5G), which enable voice communication over IP-based mobile infrastructures. In contrast to traditional VoIP services, which often function independently of global telephone numbering systems, VoLTE and Vo5G are directly connected tomobile operators' infrastructures, providing seamless connectivity to the international telephone network.[5][6]
VoLTE, introduced as part of4GLTE networks, enables voice communication over an IP-based infrastructure initially developed for data transmission. It offers features such as high-definition voice (HD Voice) and faster call setup times compared tocircuit-switched networks.[7]
Vo5G, the5G equivalent of VoLTE, utilizes the increased speed, reduced latency, and greater capacity of 5G networks to further enhance these capabilities.[8] Both VoLTE and Vo5G maintain compatibility with traditionalpublic switched telephone networks (PSTNs), allowing users to make and receive calls to and from anytelephone number worldwide.
These technologies differ from standalone VoIP services by being fully integrated with mobile network operators. This integration ensures additional features such asemergency call support andquality-of-service guarantees, making them a central part of modern mobile telecommunication systems.
A variety of functions are needed to implement VoIP communication. Some protocols perform multiple functions, while others perform only a few and must be used in concert. These functions include:
Network andtransport – Creating reliable transmission over unreliable protocols, which may involve acknowledging receipt of data and retransmitting data that wasn't received.
Session management – Creating and managing asession (sometimes glossed as simply a "call"), which is a connection between two or more peers that provides a context for further communication.
Signaling – Performing registration (advertising one's presence and contact information) and discovery (locating someone and obtaining their contact information), dialing (including reportingcall progress), negotiating capabilities, and call control (such as hold, mute, transfer/forwarding, dialing DTMF keys during a call [e.g. to interact with anautomated attendant orIVR], etc.).
Media description – Determining what type of media to send (audio, video, etc.), how to encode/decode it, and how to send/receive it (IP addresses, ports, etc.).
Media – Transferring the actual media in the call, such as audio, video, text messages, files, etc.
Quality of service – Providing out-of-band content or feedback about the media such assynchronization, statistics, etc.
Security – Implementing access control, verifying the identity of other participants (computers or people), and encrypting data to protect the privacy and integrity of the media contents and/or the control messages.
H.323, one of the first VoIP call signaling and control protocols that found widespread implementation.[10] Since the development of newer, less complex protocols such as MGCP and SIP, H.323 deployments are increasingly limited to carrying existing long-haul network traffic.[11]
Mass-market VoIP services use existingbroadband Internet access, by which subscribers place and receive telephone calls in much the same manner as they would via the PSTN. Full-service VoIP phone companies provide inbound and outbound service withdirect inbound dialing. Many offer unlimited domestic calling and sometimes international calls for a flat monthly subscription fee. Phone calls between subscribers of the same provider are usually free when flat-fee service is not available.[12]
A VoIP phone is necessary to connect to a VoIP service provider. This can be implemented in several ways:
Dedicated VoIP phones connect directly to the IP network using technologies such as wiredEthernet orWi-Fi. These are typically designed in the style of traditional digital business telephones.
Ananalog telephone adapter connects to the network and implements the electronics and firmware to operate a conventional analog telephone attached through a modular phone jack. Some residential Internet gateways andcable modems have this function built in.
Softphone application software installed on a networked computer that is equipped with a microphone and speaker, or headset. The application typically presents a dial pad and display field to the user to operate the application by mouse clicks or keyboard input.[13]
It is increasingly common for telecommunications providers to use VoIP telephony over dedicated and public IP networks as abackhaul to connect switching centers and to interconnect with other telephony network providers; this is often referred to asIP backhaul.[14][15]
Smartphones may have SIP clients built into the firmware or available as an application download.[16][17]
Because of the bandwidth efficiency and low costs that VoIP technology can provide, businesses are migrating from traditional copper-wire telephone systems to VoIP systems to reduce their monthly phone costs. In 2008, 80% of all newPrivate branch exchange (PBX) lines installed internationally were VoIP.[18] For example, in the United States, theSocial Security Administration is converting its field offices of 63,000 workers from traditional phone installations to a VoIP infrastructure carried over its existing data network.[19][20]
VoIP allows both voice anddata communications to be run over a single network, which can significantly reduce infrastructure costs. The prices of extensions on VoIP are lower than for PBX and key systems. VoIP switches may run on commodity hardware, such aspersonal computers. Rather than closed architectures, these devices rely on standard interfaces.[21] VoIP devices have simple, intuitive user interfaces, so users can often make simple system configuration changes. Dual-mode phones enable users to continue their conversations as they move between an outside cellular service and an internalWi-Fi network, so that it is no longer necessary to carry both a desktop phone and a cell phone. Maintenance becomes simpler as there are fewer devices to oversee.[21]
VoIP solutions aimed at businesses have evolved intounified communications services that treat all communications—phone calls, faxes, voice mail, e-mail, web conferences, and more—as discrete units that can all be delivered via any means and to any handset, including cellphones. Two kinds of service providers are operating in this space: one set is focused on VoIP for medium to large enterprises, while another is targeting the small-to-medium business (SMB) market.[22]
Skype, which originally marketed itself as a service among friends, began to cater to businesses in 2009, providing free-of-charge connections between any users on the Skype network and connecting to and from ordinary PSTN telephones for a charge.[23]
In general, the provision of VoIP telephony systems to organizational or individual users can be divided into two primary delivery methods: private or on-premises solutions, or externally hosted solutions delivered by third-party providers. On-premises delivery methods are more akin to the classic PBX deployment model for connecting an office to local PSTN networks.
While many use cases still remain for private or on-premises VoIP systems, the wider market has been gradually shifting towardCloud orHosted VoIP solutions. Hosted systems are also generally better suited to smaller or personal use VoIP deployments, where a private system may not be viable for these scenarios.
Hosted orCloud VoIP solutions involve a service provider or telecommunications carrier hosting the telephone system as a software solution within their own infrastructure.
Typically this will be one or moredata centers with geographic relevance to the end-user(s) of the system. This infrastructure is external to the user of the system and is deployed and maintained by the service provider.
Endpoints, such as VoIP telephones or softphone applications (apps running on a computer or mobile device), will connect to the VoIP service remotely. These connections typically take place over public internet links, such as local fixed WAN breakout or mobile carrier service.
In the case of a private VoIP system, the primary telephony system itself is located within the private infrastructure of the end-user organization. Usually, the system will be deployed on-premises at a site within the direct control of the organization. This can provide numerous benefits in terms of QoS control (seebelow), cost scalability, and ensuring privacy and security of communications traffic. However, the responsibility for ensuring that the VoIP system remains performant and resilient is predominantly vested in the end-user organization. This is not the case with a Hosted VoIP solution.
Private VoIP systems can be physical hardware PBX appliances, converged with other infrastructure, or they can be deployed as software applications. Generally, the latter two options will be in the form of a separate virtualized appliance. However, in some scenarios, these systems are deployed on bare metal infrastructure or IoT devices. With some solutions, such as 3CX, companies can attempt to blend the benefits of hosted and private on-premises systems by implementing their own private solution but within an external environment. Examples can include data center collocation services, public cloud, or private cloud locations.
For on-premises systems, local endpoints within the same location typically connect directly over theLAN. For remote and external endpoints, available connectivity options mirror those of Hosted or Cloud VoIP solutions.
However, VoIP traffic to and from the on-premises systems can often also be sent over secure private links. Examples include personal VPN,site-to-site VPN, private networks such as MPLS and SD-WAN, or via private SBCs (Session Border Controllers). While exceptions and private peering options do exist, it is generally uncommon for those private connectivity methods to be provided by Hosted or Cloud VoIP providers.
Communication on the IP network is perceived as less reliable in contrast to the circuit-switched public telephone network because it does not provide a network-based mechanism to ensure that data packets are not lost, and are delivered in sequential order. It is a best-effort network without fundamentalquality of service (QoS) guarantees. Voice, and all other data, travels in packets over IP networks with fixed maximum capacity. This system may be more prone to data loss in the presence of congestion[b] than traditionalcircuit switched systems; a circuit switched system of insufficient capacity will refuse new connections while carrying the remainder without impairment, while the quality of real-time data such as telephone conversations on packet-switched networks degrades dramatically.[25] Therefore, VoIP implementations may face problems withlatency, packet loss, andjitter.[25][26]
By default, network routers handle traffic on a first-come, first-served basis. Fixed delays cannot be controlled as they are caused by the physical distance the packets travel. They are especially problematic when satellite circuits are involved because of the long distance to ageostationary satellite and back; delays of 400–600 ms are typical. Latency can be minimized by marking voice packets as being delay-sensitive with QoS methods such asDiffServ.[25]
Network routers on high volume traffic links may introduce latency that exceeds permissible thresholds for VoIP. Excessive load on a link can cause congestion and associatedqueueing delays andpacket loss. This signals a transport protocol likeTCP to reduce its transmission rate to alleviate the congestion. But VoIP usually usesUDP not TCP because recovering from congestion through retransmission usually entails too much latency.[25] So QoS mechanisms can avoid the undesirable loss of VoIP packets by immediately transmitting them ahead of any queued bulk traffic on the same link, even when the link is congested by bulk traffic.
VoIP endpoints usually have to wait for the completion of transmission of previous packets before new data may be sent. Although it is possible to preempt (abort) a less important packet in mid-transmission, this is not commonly done, especially on high-speed links where transmission times are short even for maximum-sized packets.[27] An alternative to preemption on slower links, such as dialup anddigital subscriber line (DSL), is to reduce the maximum transmission time by reducing themaximum transmission unit. But since every packet must contain protocol headers, this increases relative header overhead on every link traversed.[27]
The receiver must resequence IP packets that arrive out of order and recover gracefully when packets arrive too late or not at all.Packet delay variation results from changes inqueuing delay along a given network path due to competition from other users for the same transmission links. VoIP receivers accommodate this variation by storing incoming packets briefly in aplayout buffer, deliberately increasing latency to improve the chance that each packet will be on hand when it is time for thevoice engine to play it. The added delay is thus a compromise between excessive latency and excessivedropout, i.e. momentary audio interruptions.
Although jitter is a random variable, it is the sum of several other random variables that are at least somewhat independent: the individual queuing delays of the routers along the Internet path in question. Motivated by thecentral limit theorem, jitter can be modeled as aGaussian random variable. This suggests continually estimating the mean delay and its standard deviation and setting the playout delay so that only packets delayed more than several standard deviations above the mean will arrive too late to be useful. In practice, the variance in latency of many Internet paths is dominated by a small number (often one) of relatively slow and congestedbottleneck links. Most Internet backbone links are now so fast (e.g. 10 Gbit/s) that their delays are dominated by thetransmission medium (e.g. optical fiber) and the routers driving them do not have enough buffering for queuing delays to be significant.[28]
The RTCP extended report VoIP metrics block specified byRFC3611 is generated by an VoIP phone or gateway during a live call and contains information on packet loss rate, packet discard rate (because of jitter), packet loss/discard burst metrics (burst length/density, gap length/density), network delay, end system delay, signal/noise/echo level,mean opinion scores (MOS) and R factors and configuration information related to the jitter buffer. VoIP metrics reports are exchanged between IP endpoints on an occasional basis during a call, and an end of call message sent via SIP RTCP summary report or one of the other signaling protocol extensions. VoIP metrics reports are intended to support real-time feedback related to QoS problems, the exchange of information between the endpoints for improved call quality calculation and a variety of other applications.
DSL modems typically provide Ethernet connections to local equipment, but inside they may actually beAsynchronous Transfer Mode (ATM) modems.[c] They useATM Adaptation Layer 5 (AAL5) to segment each Ethernet packet into a series of 53-byte ATM cells for transmission, reassembling them back into Ethernet frames at the receiving end.
Using a separatevirtual circuit identifier (VCI) for voice over IP has the potential to reduce latency on shared connections. ATM's potential for latency reduction is greatest on slow links because worst-case latency decreases with increasing link speed. A full-size (1500 byte) Ethernet frame takes 94 ms to transmit at 128 kbit/s but only 8 ms at 1.5 Mbit/s. If this is the bottleneck link, this latency is probably small enough to ensure good VoIP performance without MTU reductions or multiple ATM VCs. The latest generations of DSL,VDSL andVDSL2, carry Ethernet without intermediate ATM/AAL5 layers, and they generally supportIEEE 802.1p priority tagging so that VoIP can be queued ahead of less time-critical traffic.[25]
ATM has substantial header overhead: 5/53 = 9.4%, roughly twice the total header overhead of a 1500 byte Ethernet frame. This "ATM tax" is incurred by every DSL user whether or not they take advantage of multiple virtual circuits – and few can.[25]
Several protocols are used in thedata link layer andphysical layer for quality-of-service mechanisms that help VoIP applications work well even in the presence ofnetwork congestion. Some examples include:
IEEE 802.11e is an approved amendment to theIEEE 802.11 standard that defines a set of quality-of-service enhancements for wireless LAN applications through modifications to themedia access control (MAC) layer. The standard is considered of critical importance for delay-sensitive applications, such as voice over wireless IP.
IEEE 802.1p defines 8 different classes of service (including one dedicated to voice) for traffic on layer-2 wiredEthernet.
TheITU-TG.hn standard, which provides a way to create a high-speed (up to 1 gigabit per second)Local area network (LAN) using existing home wiring (power lines, phone lines andcoaxial cables). G.hn provides QoS by means of Contention-Free Transmission Opportunities (CFTXOPs) which are allocated to flows (such as a VoIP call) that require QoS and which have negotiated acontract with the network controllers
The quality of voice transmission is characterized by several metrics that may be monitored by network elements and by the user agent hardware or software. Such metrics include networkpacket loss, packetjitter, packetlatency (delay), post-dial delay, and echo. The metrics are determined by VoIP performance testing and monitoring.[30][31][32][33][34][35]
A VoIP media gateway controller (akaClass 5 Softswitch) works in cooperation with a media gateway (aka IP Business Gateway) and connects the digital media stream, so as to complete the path for voice and data. Gateways include interfaces for connecting to standard PSTN networks. Ethernet interfaces are also included in the modern systems which are specially designed to link calls that are passed via VoIP.[36]
E.164 is a global numbering standard for both the PSTN andpublic land mobile network (PLMN). Most VoIP implementations supportE.164 to allow calls to be routed to and from VoIP subscribers and the PSTN/PLMN.[37] VoIP implementations can also allow other identification techniques to be used. For example,Skype allows subscribers to chooseSkype names (usernames)[38] whereas SIP implementations can useUniform Resource Identifier (URIs) similar toemail addresses.[39] Often VoIP implementations employ methods of translating non-E.164 identifiers to E.164 numbers and vice versa, such as the Skype-In service provided by Skype[40] and theE.164 number to URI mapping (ENUM) service in IMS and SIP.[41]
Echo can also be an issue for PSTN integration.[42] Common causes of echo includeimpedance mismatches in analog circuitry and an acoustic path from the receive to transmit signal at the receiving end.
Local number portability (LNP) andmobile number portability (MNP) also impact VoIP business. Number portability is a service that allows a subscriber to select a new telephone carrier without requiring a new number to be issued. Typically, it is the responsibility of the former carrier to "map" the old number to the undisclosed number assigned by the new carrier. This is achieved by maintaining a database of numbers. A dialed number is initially received by the original carrier and quickly rerouted to the new carrier. Multiple porting references must be maintained even if the subscriber returns to the original carrier. TheFederal Communications Commission (FCC) mandates carrier compliance with these consumer-protection stipulations. In November 2007, the FCC in the United States released an order extending number portability obligations to interconnected VoIP providers and carriers that support VoIP providers.[43]
A voice call originating in the VoIP environment also facesleast-cost routing (LCR) challenges to reach its destination if the number is routed to a mobile phone number on a traditional mobile carrier. LCR is based on checking the destination of each telephone call as it is made, and then sending the call via the network that will cost the customer the least. This rating is subject to some debate given the complexity of call routing created by number portability. With MNP in place, LCR providers can no longer rely on using the network root prefix to determine how to route a call. Instead, they must now determine the actual network of every number before routing the call.[44]
Therefore, VoIP solutions also need to handle MNP when routing a voice call. In countries without a central database, like the UK, it may be necessary to query the mobile network about which home network a mobile phone number belongs to. As the popularity of VoIP increases in the enterprise markets because of LCR options, VoIP needs to provide a certain level of reliability when handling calls.
A telephone connected to aland line has a direct relationship between a telephone number and a physical location, which is maintained by the telephone company and available to emergency responders via the national emergency response service centers in form of emergency subscriber lists. When an emergency call is received by a center the location is automatically determined from its databases and displayed on the operator console.
In IP telephony, no such direct link between location and communications end point exists. Even a provider having wired infrastructure, such as a DSL provider, may know only the approximate location of the device, based on theIP address allocated to the network router and the known service address. Some ISPs do not track the automatic assignment of IP addresses to customer equipment.[45]
IP communication provides for device mobility. For example, a residential broadband connection may be used as a link to avirtual private network of a corporate entity, in which case the IP address being used for customer communications may belong to the enterprise, not the residential ISP. Suchoff-premises extensions may appear as part of an upstream IP PBX. On mobile devices, e.g., a 3G handset or USB wireless broadband adapter, the IP address has no relationship with any physical location known to the telephony service provider, since a mobile user could be anywhere in a region with network coverage, even roaming via another cellular company.
At the VoIP level, a phone or gateway may identify itself by its account credentials with aSession Initiation Protocol (SIP) registrar. In such cases, theInternet telephony service provider (ITSP) knows only that a particular user's equipment is active. Service providers often provide emergency response services by agreement with the user who registers a physical location and agrees that, if an emergency number is called from the IP device, emergency services are provided to that address only.
Such emergency services are provided by VoIP vendors in the United States by a system calledEnhanced 911 (E911), based on theWireless Communications and Public Safety Act. The VoIP E911 emergency-calling system associates a physical address with the calling party's telephone number. All VoIP providers that provide access to the public switched telephone network are required to implement E911, a service for which the subscriber may be charged. "VoIP providers may not allow customers to opt-out of 911 service."[45] TheVoIP E911 system is based on a static table lookup. Unlike in cellular phones, where the location of an E911 call can be traced usingassisted GPS or other methods, the VoIP E911 information is accurate only if subscribers keep their emergency address information current.[46]
Sendingfaxes over VoIP networks is sometimes referred to as Fax over IP (FoIP). Transmission of fax documents was problematic in early VoIP implementations, as most voice digitization and compressioncodecs are optimized for the representation of the human voice and the proper timing of the modem signals cannot be guaranteed in a packet-based, connectionless network.
A standards-based solution for reliably delivering fax-over-IP is theT.38 protocol. The T.38 protocol is designed to compensate for the differences between traditional packet-less communications over analog lines and packet-based transmissions which are the basis for IP communications. The fax machine may be a standard device connected to ananalog telephone adapter (ATA), or it may be a software application or dedicated network device operating via an Ethernet interface.[47] Originally, T.38 was designed to use UDP or TCP transmission methods across an IP network.
Some newer high-end fax machines have built-in T.38 capabilities which are connected directly to a network switch or router. In T.38 each packet contains a portion of the data stream sent in the previous packet. Two successive packets have to be lost to actually losedata integrity.
Telephones for traditional residential analog service are usually connected directly to telephone companyphone lines which provide direct current to power most basic analog handsets independently of locally available electrical power. The susceptibility of phone service to power failures is a common problem even with traditional analog service where customers purchase telephone units that operate with wireless handsets to a base station, or that have other modern phone features, such as built-in voicemail or phone book features.
VoIP phones and VoIP telephone adapters connect torouters orcable modems which typically depend on the availability ofmains electricity or locally generated power.[48] Some VoIP service providers use customer premises equipment (e.g., cable modems) with battery-backed power supplies to assure uninterrupted service for up to several hours in case of local power failures. Such battery-backed devices typically are designed for use with analog handsets. Some VoIP service providers implement services to route calls to other telephone services of the subscriber, such a cellular phone, in the event that the customer's network device is inaccessible to terminate the call.
Secure calls are possible using standardized protocols such asSecure Real-time Transport Protocol. Most of the facilities of creating asecure telephone connection over traditional phone lines, such as digitizing and digital transmission, are already in place with VoIP. It is necessary only toencrypt andauthenticate the existing data stream. Automated software, such as avirtual PBX, may eliminate the need for personnel to greet and switch incoming calls.
The security concerns for VoIP telephone systems are similar to those of other Internet-connected devices. This means thathackers with knowledge ofVoIP vulnerabilities can performdenial-of-service attacks, harvest customer data, record conversations, and compromise voicemail messages. Compromised VoIP user account or session credentials may enable an attacker to incur substantial charges from third-party services, such as long-distance or international calling.
Standards for securing VoIP are available in theSecure Real-time Transport Protocol (SRTP) and theZRTP protocol foranalog telephony adapters, as well as for somesoftphones.IPsec is available to securepoint-to-point VoIP at the transport level by usingopportunistic encryption. Though many consumer VoIP solutions do not support encryption of the signaling path or the media, securing a VoIP phone is conceptually easier to implement using VoIP than on traditional telephone circuits. A result of the lack of widespread support for encryption is that it is relatively easy to eavesdrop on VoIP calls when access to the data network is possible.[49] Free open-source solutions, such asWireshark, facilitate capturing VoIP conversations.
Government and military organizations use various security measures to protect VoIP traffic, such as voice over secure IP (VoSIP), secure voice over IP (SVoIP), and secure voice over secure IP (SVoSIP).[50] The distinction lies in whether encryption is applied in the telephone endpoint or in the network.[51] Secure voice over secure IP may be implemented by encrypting the media with protocols such asSRTP andZRTP. Secure voice over IP usesType 1 encryption on a classified network, such asSIPRNet.[52][53][54][55] Public Secure VoIP is also available with free GNU software and in many popular commercial VoIP programs via libraries, such as ZRTP.[56]
In June 2021, theNational Security Agency (NSA) released comprehensive documents describing the four attack planes of a communications system – the network, perimeter, session controllers andendpoints – and explaining security risks and mitigation techniques for each of them.[57][58]
Voice over IP protocols and equipment providecaller ID support that is compatible with the PSTN. Many VoIP service providers also allow callers to configure custom caller ID information.[59]
Wireline telephones which are manufactured in, imported to, or intended to be used in the US with Voice over IP service, on or after February 28, 2020, are required to meet thehearing aid compatibility requirements set forth by theFederal Communications Commission.[60]
VoIP has drastically reduced the cost of communication by sharing network infrastructure between data and voice.[61][62] A single broadband connection has the ability to transmit multiple telephone calls.
This section needs to beupdated. Please help update this article to reflect recent events or newly available information.(April 2022)
As the popularity of VoIP grows, governments are becoming more interested in regulating VoIP in a manner similar to PSTN services.[63]
Throughout the developing world, particularly in countries where regulation is weak orcaptured by the dominant operator, restrictions on the use of VoIP are often imposed, including inPanama where VoIP is taxed, Guyana where VoIP is prohibited.[64] InEthiopia, where the government is nationalizing telecommunication service, it is a criminal offense to offer services using VoIP. The country has installed firewalls to prevent international calls from being made using VoIP. These measures were taken after the popularity of VoIP reduced the income generated by the state-ownedtelecommunications company.[citation needed][65]
In theEuropean Union, the treatment of VoIP service providers is a decision for each national telecommunications regulator, which must use competition law to define relevant national markets and then determine whether any service provider on those national markets has "significant market power" (and so should be subject to certain obligations). A general distinction is usually made between VoIP services that function over managed networks (via broadband connections) and VoIP services that function over unmanaged networks (essentially, the Internet).[citation needed]
The relevant EU Directive is not clearly drafted concerning obligations that can exist independently of market power (e.g., the obligation to offer access to emergency calls), and it is impossible to say definitively whether VoIP service providers of either type are bound by them.[citation needed][67]
InOman, it is illegal to provide or use unauthorized VoIP services, to the extent that web sites of unlicensed VoIP providers have been blocked.[citation needed] Violations may be punished with fines of 50,000 Omani Rial (about 130,317 US dollars), a two-year prison sentence or both. In 2009, police raided 121 Internet cafes throughout the country and arrested 212 people for using or providing VoIP services.[68]
In theUnited Arab Emirates (UAE), it is illegal to provide or use unauthorized VoIP services. Web sites of unlicensed VoIP providers have been blocked. Some VoIP services such asSkype were allowed.[71] In January 2018, internet service providers in UAE blocked all VoIP apps, including Skype, but permitting only 2 government-approved VoIP apps (C’ME and BOTIM).[72][73] In opposition, a petition onChange.org garnered over 5000 signatures, in response to which the website was blocked in UAE.[74]
On March 24, 2020, the United Arab Emirates loosened restriction on VoIP services earlier prohibited in the country, to ease communication during theCOVID-19 pandemic. However, popular instant messaging applications such asWhatsApp,Skype, andFaceTime remained blocked from being used for voice and video calls, constricting residents to use paid services from the country's state-owned telecom providers.[75]
InIndia, it is legal to use VoIP, but it is illegal to haveVoIP gateways inside India.[76] This effectively means that people who have PCs can use them to make a VoIP call to other computers but not to a normal phone number. Foreign-based VoIP server services are illegal to use in India.[76]
Internet telephony is permitted to the ISP with restrictions. The following services are permitted:[77]
PC to PC; within or outside India
PC / a device / Adapter conforming to the standard of any international agencies like- ITU or IETF etc. in India to PSTN/PLMN abroad.
Any device / Adapter conforming to standards of International agencies like ITU, IETF etc. connected to ISP node with static IP address to similar device / Adapter; within or outside India.
Except whatever is described incondition (ii) above[clarification needed], no other form of Internet Telephony is permitted.
In India no Separate Numbering Scheme is provided to the Internet Telephony. Presently the 10 digit Numbering allocation based on E.164 is permitted to the Fixed Telephony, GSM, CDMA wireless service. For Internet Telephony, the numbering scheme shall only conform to IP addressing Scheme ofInternet Assigned Numbers Authority (IANA). Translation of E.164 number / private number to IP address allotted to any device and vice versa, by ISP to show compliance with IANA numbering scheme is not permitted.
The Internet Service Licensee is not permitted to have PSTN/PLMN connectivity. Voice communication to and from a telephone connected to PSTN/PLMN and following E.164 numbering is prohibited in India.
InSouth Korea, only providers registered with the government are authorized to offer VoIP services. Unlike many VoIP providers, most of whom offer flat rates, Korean VoIP services are generally metered and charged at rates similar to terrestrial calling. Foreign VoIP providers encounter high barriers to government registration. This issue came to a head in 2006 whenInternet service providers providing personal Internet services by contract toUnited States Forces Korea (USFK) members residing on USFK bases threatened to block off access to VoIP services used by USFK members as an economical way to keep in contact with their families in the United States, on the grounds that the service members' VoIP providers were not registered. A compromise was reached between USFK and Korean telecommunications officials in January 2007, wherein USFK service members arriving in Korea before June 1, 2007, and subscribing to the ISP services provided on base could continue to use their US-based VoIP subscription, but later arrivals are required to use a Korean-based VoIP provider, which by contract will offer pricing similar to the flat rates offered by US VoIP providers.[78]
In the United States, the FCC requires all interconnected VoIP service providers to comply with requirements comparable to those for traditional telecommunications service providers.[79] VoIP operators in the US are required to supportlocal number portability; make service accessible to people with disabilities; pay regulatory fees,universal service contributions, and other mandated payments; and enable law enforcement authorities to conduct surveillance pursuant to theCommunications Assistance for Law Enforcement Act (CALEA).
Operators ofInterconnected VoIP (fully connected to the PSTN) are mandated to provideEnhanced 911 service without special request, provide for customer location updates, clearly disclose any limitations on their E-911 functionality to their consumers, obtain affirmative acknowledgements of these disclosures from all consumers,[80] and may not allow their customers to opt-out of 911 service.[81] VoIP operators also receive the benefit of certain US telecommunications regulations, including an entitlement tointerconnection and exchange of traffic withincumbent local exchange carriers via wholesale carriers. Providers ofnomadic VoIP service—those who are unable to determine the location of their users—are exempt from state telecommunications regulation.[82]
Another legal issue that theUS Congress is debating concerns changes to theForeign Intelligence Surveillance Act. The issue in question is calls between Americans and foreigners. The NSA is not authorized to tap Americans' conversations without a warrant—but the Internet, and specifically VoIP does not draw as clear a line to the location of a caller or a call's recipient as the traditional phone system does. As VoIP's low cost and flexibility convinces more and more organizations to adopt the technology, surveillance for law enforcement agencies becomes more difficult. VoIP technology has also increased federal security concerns because VoIP and similar technologies have made it more difficult for the government to determine where a target is physically located when communications are being intercepted, and that creates a whole set of new legal challenges.[83]
The early developments ofpacket network designs byPaul Baran and other researchers were motivated by a desire for a higher degree of circuit redundancy and network availability in the face of infrastructure failures than was possible in the circuit-switched networks intelecommunications of the mid-twentieth century.Danny Cohen first demonstrated a form ofpacket voice in 1973 which was developed intoNetwork Voice Protocol which operated across the earlyARPANET.[84][85]
In the two decades following the 1974 demo, various forms of packet telephony were developed and industry interest groups formed to support the new technologies. Following the termination of the ARPANET project, and expansion of theInternet for commercial traffic, IP telephony was tested and deemed infeasible for commercial use until the introduction of VocalChat in the early 1990s and then in Feb 1995 the official release of Internet Phone (or iPhone for short) commercial software byVocalTec, based on a patent byLior Haramaty andAlon Cohen,[89] and followed by other VoIP infrastructure components such as telephony gateways and switching servers. Soon after it became an established area of interest in commercial labs of the major IT concerns, notably at AT&T, whereMarian Croak and her team filed many patents related to the technology.[citation needed] By the late 1990s, the firstsoftswitches became available, and new protocols, such asH.323, MGCP andSession Initiation Protocol (SIP) gained widespread attention. In the early 2000s, the proliferation of high-bandwidth always-on Internet connections to residential dwellings and businesses, spawned an industry of Internet telephony service providers (ITSPs). The development of open-source telephony software, such asAsterisk PBX, fueled widespread interest and entrepreneurship in voice-over-IP services, applying new Internet technology paradigms, such ascloud services to telephony.
1977: Danny Cohen andJon Postel of the USCInformation Sciences Institute, andVint Cerf of the Defense Advanced Research Projects Agency (DARPA), agree to separate IP from TCP, and create UDP for carrying real-time traffic.
1986: Proposals from various standards organizations[specify] forVoice over ATM, in addition to commercial packet voice products from companies such asStrataCom
1991: Speak Freely, a voice-over-IP application, was released to the public domain.[92][93]
1992: The Frame Relay Forum conducts development of standards for voice overFrame Relay.
1992:InSoft Inc. announces and launches its desktop conferencing product Communique, which includes VoIP and video.[92][94] The company is credited with developing the first generation of commercial, US-based VoIP, Internet media streaming and real-time Internet telephony/collaborative software and standards that would provide the basis for the Real Time Streaming Protocol (RTSP) standard.[citation needed]
1993 Release of VocalChat, a commercial packet network PC voice communication software fromVocalTec.[citation needed]
1994: MTALK, a freeware LAN VoIP application forLinux[95]
1995:
VocalTec releasesInternet Phone commercial Internet phone software.[96][97]
ITU-T begins development of standards for the transmission and signaling of voice communications over Internet Protocol networks with theH.323 standard.[99]
US telecommunications companies petition the US Congress to ban Internet phone technology.[100]
G.729 speech codec introduced, using CELP (LPC) algorithm.[101]
The MDCT is adapted into the LD-MDCT algorithm, used in theAAC-LD standard.[107]
2001:INOC-DBA, the first inter-providerSIP network is deployed; this is also the first voice network to reach all seven continents.[108]
2003:Skype released in August 2003. This was the creation of Niklas Zennström and Janus Friis, in cooperation with four Estonian developers. It quickly became a popular program that helped democratize VoIP.
2004: Early commercial VoIP service providers proliferate.[citation needed]
2005:PhoneGnome VoIP service is launched by TelEvolution, Inc. of California.[109]
2006:G.729.1 wideband codec introduced, using MDCT and CELP (LPC) algorithms.[110]
2007: VoIP device manufacturers and sellers boom in Asia, specifically in the Philippines where many families of overseas workers reside.[111]
2009:SILK codec introduced, using LPC algorithm,[112] and used for voice calling inSkype.[113]
2010:Apple introducesFaceTime, which uses the LD-MDCT-based AAC-LD codec.[114]
2011:
Rise ofWebRTC technology which supports VoIP directly in browsers.
^Arora, Rakesh (November 23, 1999)."Voice Over IP : Protocols and Standards".cse.wustl.edu. Archived fromthe original on January 19, 2024. RetrievedMarch 19, 2024.Voice over IP (VOIP) uses the Internet Protocol (IP) to transmit voice as packets over an IP network. ...in the Internet, anyone can capture the packets meant for someone else. Some security can be provided by using encryption and tunneling. The common tunneling protocol used isLayer 2 Tunneling Protocol and the common encryption mechanism used isSecure Sockets Layer (SSL).
^Dunte, Markus; Ruland, Christoph (June 2007)."Secure Voice-over-IP"(PDF).International Journal of Computer Science and Network Security.7 (6):63–68.Archived(PDF) from the original on April 19, 2023.
^"Telecom Decision CRTC 2005-21".Canadian Radio-television and Telecommunications Commission. Government of Canada. April 4, 2005. RetrievedApril 29, 2017.
^Stapleton-Gray, Ross (2009).Inter-Network Operations Center Dial-by-ASN (INOC-DBA), a Resource for the Network Operator Community. Los Alamitos: IEEE Computer Society Press.ISBN978-0-7695-3568-5.
^Audio-MitschnittArchived February 10, 2013, at theWayback Machine vom Treffen der IETF-Codec-Arbeitsgruppe auf der Konferenz IETF79 in Peking, China mit einer Darstellung der grundlegenden Funktionsprinzipien durch Koen Vos (MP3, ~70 MiB)