Voice over Internet Protocol – Challenges
The challenges that are haunting VoIP service providers:
VoIP is still not well organized in several countries, resulting in a low standard of service. By default, IP routers handle voice traffic on a first-come, first-served basis. Traffic on high volume routers might exceed permissible thresholds for VoIP. Steps have to be taken to decrease the latency by marking voice data packets as being delay-sensitive with high tech methods such as DiffServ. When the load on a link grows so quickly that the queue of data packets overflows, congestion results and data packets are lost. For effective voice traffic services, engineers have to derive ways to take care of such issues.
Trust Models and Identification
A big challenge of using the online communication medium is that any mode of communication is inherently open to any security concerns. One of the most common issues is that of Identity and Trust. In the context of VoIP, it is about subscriber and network identity and trust. As the Internet is a distributed environment with no central control, the trust model and identification becomes important. At the basic level, the questions that have to be asked and answered are can the Network trust the subscriber, and it can the subscriber trust the network. To address this issue, a mutual authentication mechanism is used where both the sides can verify each other. One such example is establishing an IPSec tunnel between the client and the network.
SPIT (spam over Internet telephony) is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet. Though voice mail is already used for commercial messages, IP telephony makes a more effective channel because the sender can relay messages in large amount instead of dialing each number individually. Unscrupulous marketers use spambots to invest VoIP addresses or hack a computer to use the route VoIP calls. As the calls routed over IP are much more difficult to trace, the potential for fraud is greater here.
As IP telephony is still not widely used, this is not a big problem yet. However, as it becomes common over the next several years, it would become more attractive to spammers. Several vendors are developing products intended to address the problem.
IP spoofing is actually a lower level security issue. It is a concept where a rogue client can use a raw socket interface and spoof it’s IP to relate to other nodes. IP level spoofing can be taken care of in several ways including strong sequencing algorithms packet filtering. With modern technology, the problem of IP spoofing can be resolved efficiently.
Susceptibility of Power Failure
The susceptibility of a phone service to power failures is a common problem in several areas, especially in those regions which have traditional analog service in areas. VoIP service providers can take care of this problem by using customer premise equipment with battery-backed power supplies to assure uninterrupted service for up to several hours in case of local power failures.
All VoIP service providers have a stake in finding effective solutions to these challenges.