Voice over IP (VoIP)

Definition of Voice over IP (VoIP) in Network Encyclopedia.

What is Voice over IP (VoIP)?

Voice Over IP, or VoIP, is an umbrella term for a set of technologies that allow voice traffic to be carried over Internet Protocol (IP) internetworks such as the Internet.

Voice over IP (VoIP)
Voice over IP (VoIP)

The term “Voice over IP” was coined by the VoIP Forum, a consortium of companies dedicated to the development and extension of IP telephony technologies. Voice over IP (VoIP) is the prime example of “convergence” in the networking and telecommunications industry because it enables telephony and computer networking traffic to be combined into a single data stream of IP packets.

Various vendors have offered proprietary VoIP solutions, but most have recently moved toward standards-based solutions that implement the H.323 and T.120 communication protocols developed by the International Telecommunication Union (ITU). These include voice-encoding industry standards such as G.723 and G.729. One goal of these standards is to enable integration between IP telephony and global cellular telephony standards such as the Global System for Mobile Communications (GSM). However, the move toward standards has been slow, and only a few vendors offer end-to-end carrier-class VoIP services with acceptable levels of communication latency.

Vendors tout the following advantages of using VoIP technologies:

  • Lower long-distance costs: VoIP enables users to avoid long-distance charges by placing local calls to their Internet service provider (ISP) and having the encapsulated voice traffic move free of charge over the Internet. The problem with this approach is that transmission over the Internet is unpredictable and often has unacceptable levels of latency. One solution is for vendors to construct their own private IP internetworks for VoIP services, but this is an expensive prospect even for the largest carriers and has contributed to the slow progress in voice/data convergence. Some companies offer their own VoIP services to employees using the internal company network, but this approach is still costly and requires expertise to maintain. 
  • New solutions for remote access by mobile users: VoIP solutions allow users to communicate with remote stations using both voice and data integrated into a single IP data stream. For example, a user can browse a Web site and talk to customer support at the site simultaneously by using a single modem connection.

Advantages of VoIP?

Some VoIP services offer features and services that are not available with a traditional phone, or are available but only for an additional fee. You may also be able to avoid paying for both a broadband connection and a traditional telephone line.

Disadvantages of VoIP?

If you’re considering replacing your traditional telephone service with VoIP, there are some possible differences:

  • Some VoIP services don’t work during power outages and the service provider may not offer backup power.
  • Not all VoIP services connect directly to emergency services through 9-1-1. For additional information, see VoIP & 911 Advisory.
  • VoIP providers may or may not offer directory assistance/white page listings.

Voice over IP explained in video

Voice over IP – How VoIP work?

See also:


Articles posted after being checked by editors.

Recent Content

link to Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)

Public Key Infrastructure, also known as PKI, is a set of services that support the use of public-key cryptography in a corporate or public setting. A public key infrastructure (PKI) enables key pairs to be generated, securely stored, and securely transmitted to users so that users can send encrypted transmissions and digital signatures over distrusted public networks such as the Internet.
link to Digital Signature

Digital Signature

Digital Signature is an electronic signature that you can use to sign a document being transmitted by electronic means such as e-mail. Digital signatures validate the identity of the sender and ensure that the document they are attached to has not been altered by unauthorized parties during the transmission.