Databases in VoIP and SMS
Back to Articles
VoIP SMS Databases Software Whitepaper Development

Databases in VoIP and SMS

April 11, 2018 3 min
Aivis Olsteins

Aivis Olsteins

The importance of data in any online business can not be underestimated. The data is central also to the VoIP and SMS operations. Here we will shortly discuss some of the general principles when designing and implementing database systems for VoIP and SMS operations.

In regular web applications (like this blog for example) the primary goal for database is to quickly serve large number of clients and occasionally make infrequent, large writes. While that can become quite complex task for very large and traffic heavy sites, it is still relatively easy task in terms of the goals, i.e. the goals are clearly defined. In opposite, VoIP or SMS system database goals can be far more complex and sometimes contradict each other. 

First, let's list main types of data to take care of:

  1. Key system data which change relatively slowly, grow at low rate. Examples: customer and account data, tariff tables, payments, routes, setting and other supplementary data. The requirements are:
  2. High availability
  3. Fast read access (example - real time time authorization)
  4. relatively fast write access (example- balance updates)
  5. High reliability (e. g. - financial transactions)
  6. Fast growing usage reports: like call detail records, message logs. The requirements are:
  7. Large storage, growth can be millions of records per day, write only, no updates
  8. Fast write access (i. e. real time billing systems)
  9. Low speed read access
  10. Data partitioning or purging possibility
  11. Live system state data: active sessions, registrations, connections and similar. The requirements are:
  12. Very fast read and write access, faster than disk read/write
  13. Can cope with non perfect reliability
  14. Aggregated data for reporting. The requirements are:
  15. Good indexing to ensure fast reads
  16. High reliability

As we can see from above, the data is very diverse, and may require completely different storage and access solutions for each type. While we don't want to recommend any specific database solution or implementation, here are some observations gathered from experience.

  1. Most probably there is no single database engine which can fit all types of data requirements.
  2. For Key system data, the relational database would probably be best choice, with possibility to implement multi-master (cluster) replication. Such a solution can ensure very high degree of availability and reliability. Clustered solutions increase read speeds by directing read requests sequentially to all nodes in the cluster, thus getting higher speed than single instance systems. While multi-master systems theoretically can be slower on writes (because they ned to ensure writes are propagated to all nodes in cluster), there are many techniques today which greatly reduces this associated overhead;
  3. CDR and other logs: This is one of the most difficult tasks to implement. The data growth rates are extremely high, with several millions of records created daily on largest systems. since these are write only operations, we advise to use master-slave systems, with possibility to fail over. It is also good idea to separate this database system from key system data for reasons of manageability: in case of problems in the key system cluster if there is a need to completely restore one or several nodes, it is better not to have the very large data set of CDRs getting in the way.
  4. Live system data can be stored in memory type storage, key-value stores. Most of them can also be replicated for high availability. The offer very fast access speeds, far beyond what the disk-based database systems can offer.
  5. Finally: aggregated data: this data is usually built from the CDR and other logs. They are essential for reporting and for producing financial data (invoices). Therefore they should be capable of indexing, so can be read and queried in various ways.

As you can see above, the database for VoIP or SMS application faces far more difficult challenges that a conventional database system for typical online application. Proper design is key to having highly reliable and capable system.

 

 

Share this article

Aivis Olsteins

Aivis Olsteins

An experienced telecommunications professional with expertise in network architecture, cloud communications, and emerging technologies. Passionate about helping businesses leverage modern telecom solutions to drive growth and innovation.

Related Articles

How Voice AI Reduces Agent Burnout and Boosts Satisfaction

How Voice AI Reduces Agent Burnout and Boosts Satisfaction

Reduce Burnout with Voice AI: Offload Repetitive Calls, Real‑Time Agent Assist, 40–80% Less ACW, Calmer Escalations, Healthier Occupancy, Proactive Deflection & PCI‑Safe Flows—Happier Agents, Faster Resolutions, Better Coaching, Faster Ramp

Read Article
Seamless Voice AI Integrations: Salesforce, HubSpot, and ERP Systems

Seamless Voice AI Integrations: Salesforce, HubSpot, and ERP Systems

Seamless Voice AI Integrations with Your Stack: Salesforce & HubSpot CRM + SAP/Oracle/NetSuite/Dynamics ERP; OAuth2 & mTLS Security; Real‑Time Read/Write (Cases, Orders, Payments, Scheduling); Warm Transfers, Context; Audit Logs, SLAs, iPaaS Support

Read Article
Measuring Voice AI Success: The KPIs That Matter—CSAT, Containment, Speed, Accuracy, Reliability, and ROI

Measuring Voice AI Success: The KPIs That Matter—CSAT, Containment, Speed, Accuracy, Reliability, and ROI

Voice AI KPI Scorecard: CSAT/NPS, FCR & Containment, Time‑to‑First‑Word & p95 Latency, Intent/Slot Accuracy & ASR WER, Groundedness, Tool Success (Payments/IDV/Scheduling), Warm Xfers, Uptime/Reliability, Consent/Redact, Cost per Resolution & ROI

Read Article
Sensitive Data in Voice AI: PCI‑Safe Payments, HIPAA‑Compliant PHI, Redaction & Tokenization

Sensitive Data in Voice AI: PCI‑Safe Payments, HIPAA‑Compliant PHI, Redaction & Tokenization

Managing Sensitive Data in Voice AI: PCI‑Safe Payments (DTMF Masking, Tokenization), HIPAA‑Compliant PHI Segregation, Redaction/De‑Identification, End‑to‑End Encryption, Zero‑Trust Access, Residency/Retention, DSAR Deletion, SIEM‑Audited Trails

Read Article

SUBSCRIBE TO OUR NEWSLETTER

Stay up to date with the latest news and updates from our telecom experts