Remember, every time you get a spam phone call, it’s because of the intentional lack of planning & regulation during the rollout of Voice Over IP (VOIP) technology. Yay Republican deregulation!!

VOIP developed Internet style, ie., as a raft of competing, fastest to market protocols with no central planning, coordination, or regulation. It made phone service cheaper, but the constant spam calls (using spoofed caller Ids) killed the usefulness of that service. For me, 99% of the phone calls I receive on my home (landline) phone are spam, using fake caller numbers & names permitted by VOIP. Yay deregulation!

Here are the sea of overlapping standards from the Voice over IP Wikipedia page:

A variety of functions are needed to implement VoIP communication. Some protocols perform multiple functions, while others perform only a few and must be used in concert. These functions include:

  • Network and transport – Creating reliable transmission over unreliable protocols, which may involve acknowledging receipt of data and retransmitting data that wasn’t received.
  • Session management – Creating and managing a session (sometimes glossed as simply a “call”), which is a connection between two or more peers that provides a context for further communication.
  • Signaling – Performing registration (advertising one’s presence and contact information) and discovery (locating someone and obtaining their contact information), dialing (including reporting call progress), negotiating capabilities, and call control (such as hold, mute, transfer/forwarding, dialing DTMF keys during a call [e.g. to interact with an automated attendant or IVR], etc.).
  • Media description – Determining what type of media to send (audio, video, etc.), how to encode/decode it, and how to send/receive it (IP addresses, ports, etc.).
  • Media – Transferring the actual media in the call, such as audio, video, text messages, files, etc.
  • Quality of service – Providing out-of-band content or feedback about the media such as synchronization, statistics, etc.
  • Security – Implementing access control, verifying the identity of other participants (computers or people), and encrypting data to protect the privacy and integrity of the media contents and/or the control messages.

VoIP protocols include:

I got two spam phone calls while writing this post. Thanks Republicans. At least I’m not burdened with onerous regulation <sarcasm>

Author: Ben Slade

I'm a software technologist with a political bent. My views tend toward the contrarian and slightly curmudgeonly end of the spectrum.

%d bloggers like this: