Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Deployment of VoIP in Data Networks Deployment of VoIP in Data Networks Dr. Khaled Salah

Similar presentations


Presentation on theme: "1 Deployment of VoIP in Data Networks Deployment of VoIP in Data Networks Dr. Khaled Salah"— Presentation transcript:

1 1 Deployment of VoIP in Data Networks Deployment of VoIP in Data Networks Dr. Khaled Salah salah@kfupm.edu.sa

2 2 A step-by-step Methodology To deploy VoIP in Data Networks

3 K. Salah3 Outline Introduction and challenging questions Introduction and challenging questions Existing tools Existing tools Drawbacks of existing tools Drawbacks of existing tools Eight-step Methodology Eight-step Methodology Case Study Case Study Analytical tool Analytical tool

4 K. Salah4 Introduction Importance of VoIP Importance of VoIP  Unification of data and voice networks  It is easier to run, manage, and maintain.  Future – NGN and Triple Play Existing IP networks are best effort and VoIP requires QoS Existing IP networks are best effort and VoIP requires QoS Challenging questions Challenging questions  What are the QoS requirements for VoIP?  How will the new VoIP load impact the QoS of currently running network services and applications?  Will my existing network support VoIP and satisfy the standardized QoS requirements?  If so, how many VoIP calls can the network support before upgrading prematurely any part of the existing network hardware?

5 K. Salah5 Existing Tools Ample of commercial tools Ample of commercial tools NetIQ Brix Networks Agilent Cisco Avaya Siemens Uses two common approaches for assessing the deployment of VoIP Uses two common approaches for assessing the deployment of VoIP  Take network measurements and then predict the readiness based on the health of network  Inject real VoIP traffic and measure QoS

6 K. Salah6 Drawbacks of Existing Tools Cost Cost Injection approach can be intrusive to operation of existing network Injection approach can be intrusive to operation of existing network None offers a comprehensive approach or methodology for successful VoIP deployment. None offers a comprehensive approach or methodology for successful VoIP deployment.  No answers to all challenging questions, e.g. Number of calls Call distribution Call flow Future growth Impact on existing network apps

7 K. Salah7 Case Study

8 K. Salah8 Methodology Determine VoIP characteristics and requirements Determine VoIP characteristics and requirements Determine VoIP traffic flow and call distribution Determine VoIP traffic flow and call distribution Define performance thresholds and growth capacity Define performance thresholds and growth capacity Perform network measurements Perform network measurements Early modifications to existing network Early modifications to existing network Theoretical Analysis Theoretical Analysis OPNET Simulation OPNET Simulation Comparison of Simulation and Analysis Comparison of Simulation and Analysis Final modifications to existing network Final modifications to existing network

9 K. Salah9

10 10

11 K. Salah11 VoIP Traffic Characteristics, Requirements, and Assumptions A point-to-point conversation for all VoIP calls with no call conferencing A point-to-point conversation for all VoIP calls with no call conferencing Hardware Hardware  Gatekeeper or CallManager handles signaling for establishing, terminating, and authorizing connections of all VoIP calls. H.323 or SIP  Gateway responsible for converting VoIP calls to/from the Public Switched Telephone Network (PSTN).  VoIP Terminal IP phones Desktop with IP SoftPhones  As an engineering and design issue, the placement of these nodes in the network becomes crucial.

12 K. Salah12 VoIP end-to-end Components Encoder Encoder Packetizer Packetizer Playback Buffer Playback Buffer Decoder Decoder

13 K. Salah13 Common ITU-T codecs and their defaults G.711u gives a MOS of 4.4 G.711u gives a MOS of 4.4 Other codes use (to decrease rate): Other codes use (to decrease rate):  compression  silence suppression  packet loss concealment  encapsulating voice packets in one Ethernet frame

14 K. Salah14 End-to-End Delay for a Single Voice Packet The end-to-end delay is sometimes referred to by M2E or Mouth-to- Ear delay The end-to-end delay is sometimes referred to by M2E or Mouth-to- Ear delay G.714 imposes a maximum total one-way packet delay of 150ms end- to-end for VoIP applications G.714 imposes a maximum total one-way packet delay of 150ms end- to-end for VoIP applications 200ms was found to be acceptable by experimentation 200ms was found to be acceptable by experimentation Sources of delay: Sources of delay: (i) encoding, compression, and packetization delay at the sender (ii) propagation, transmission and queuing delay in the network (iii) buffering, decompression, depacketization, decoding, and playback delay at the receiver.

15 K. Salah15 VoIP Traffic Characteristics and Requirements M2E delay for a single call M2E delay for a single call  150ms according to G.714  Sender: 25 ms  Receiver: 45 ms Higher than the sender. It includes jitter buffer delay which is at most 2 packets or 40 ms  Network: 80 ms

16 K. Salah16 Bandwidth for a Single Call The required bandwidth for a single call, one direction, is 64 kbps. The required bandwidth for a single call, one direction, is 64 kbps. G.711 codec samples 20ms of voice per packet. Therefore, 50 such packets need to be transmitted per second. G.711 codec samples 20ms of voice per packet. Therefore, 50 such packets need to be transmitted per second. Each packet contains 160 voice samples in order to give 8000 samples per second. PCM sampling & quantization is done every 125us. Each packet contains 160 voice samples in order to give 8000 samples per second. PCM sampling & quantization is done every 125us. Each packet is sent in one Ethernet frame. With every packet of size 160 bytes, headers of additional protocol layers are added. These headers include RTP + UDP + IP + Ethernet with preamble of sizes 12 + 8 + 20 + 26, respectively. Each packet is sent in one Ethernet frame. With every packet of size 160 bytes, headers of additional protocol layers are added. These headers include RTP + UDP + IP + Ethernet with preamble of sizes 12 + 8 + 20 + 26, respectively. Therefore, a total of 226 bytes, or 1808 bits, needs to be transmitted 50 times per second, or 90.4 kbps, in one direction. Therefore, a total of 226 bytes, or 1808 bits, needs to be transmitted 50 times per second, or 90.4 kbps, in one direction. For both directions, the required bandwidth for a single call is 100 pps or 180.8 kbps assuming a symmetric flow. For both directions, the required bandwidth for a single call is 100 pps or 180.8 kbps assuming a symmetric flow.

17 K. Salah17 Other Assumptions Voice calls are symmetric and no voice conferencing Voice calls are symmetric and no voice conferencing We also ignore the signaling traffic generated by the gatekeeper. We also ignore the signaling traffic generated by the gatekeeper. Worst-case scenario is considered signaling traffic involving the gatekeeper is mostly generated prior to the establishment of the voice call and when the call is finished. This traffic is relatively small compared to the actual voice call traffic. gatekeeper generates no or very limited signaling traffic throughout the duration of the VoIP call for an already established on-going call No QoS mechanisms that can enhance the quality of packet delivery in IP networks, such as No QoS mechanisms that can enhance the quality of packet delivery in IP networks, such as IEEE 802.1p/Q IETF’s RSVP DiffServ MPLS

18 K. Salah18

19 K. Salah19 VoIP Traffic Flow and Call Distribution Knowing the current telephone call usage or volume of the enterprise is an important step for a successful VoIP deployment. Knowing the current telephone call usage or volume of the enterprise is an important step for a successful VoIP deployment. Collecting statistics about of the present call volume and profiles is essential. Collecting statistics about of the present call volume and profiles is essential.  Sources PBX database Telephone records Billing Key characteristics of existing calls can include the number of calls, number of concurrent calls, time, duration, etc Key characteristics of existing calls can include the number of calls, number of concurrent calls, time, duration, etc  We want to investigate if these characteristics can be still met when migrating to VoIP Locations of the call endpoints, i.e., the sources and destinations, as well as their corresponding path or flow Locations of the call endpoints, i.e., the sources and destinations, as well as their corresponding path or flow Call distribution must include percentage of calls within and outside of a floor, building, department, or organization. Call distribution must include percentage of calls within and outside of a floor, building, department, or organization. As a good capacity planning measure, it is recommended to base the VoIP call distribution on the busy hour traffic of phone calls for the busiest day of a week or a month. As a good capacity planning measure, it is recommended to base the VoIP call distribution on the busy hour traffic of phone calls for the busiest day of a week or a month. The projected extra calls need to be also combined with current statistics The projected extra calls need to be also combined with current statistics

20 K. Salah20 Call Distribution

21 K. Salah21

22 K. Salah22 Define Performance Thresholds and Growth Capacity The maximum tolerable end-to-end delay The maximum tolerable end-to-end delay  determined by the most sensitive application to run on the network 150ms for VoIP  It is imperative to note that if the network has certain delay- sensitive applications, the delay for these applications should be monitored, when introducing VoIP traffic, such that they do not exceed their required maximum values. The utilization bounds or thresholds of network resources The utilization bounds or thresholds of network resources  Factors to consider: current utilization, future plans, and foreseen growth of the network.  It is extremely important not to utilize fully the network resources. Packet loss Packet loss  Depends on network service or application  For VoIP, 0.1% to 5% packet loss is acceptable

23 K. Salah23 Future Growth What is the projected growth in users, network services, business, etc.? What is the projected growth in users, network services, business, etc.? In our study we will ascertain that 25% of the available network capacity is reserved for future growth and expansion. In our study we will ascertain that 25% of the available network capacity is reserved for future growth and expansion.  we will apply this evenly to all network resources of the router, switches, and switched- Ethernet links.

24 K. Salah24

25 K. Salah25 Perform Network measurements Need to characterize the existing network traffic load, utilization, and flow Need to characterize the existing network traffic load, utilization, and flow Background traffic profiling Background traffic profiling Available tools: Available tools:  Open-source MRTG, STG, SNMPUtil, and GetIF  Commercial HP OpenView, Cisco Netflow, Lucent VitalSuite, Patrol DashBoard, Omegon NetAlly, Avaya ExamiNet, NetIQ Vivinet Assessor, etc.

26 K. Salah26 Perform Network measurements Network measurements must be performed for network elements such as routers, switches, and links. Network measurements must be performed for network elements such as routers, switches, and links. Numerous types of measurements and statistics can be obtained using measurement tools. Numerous types of measurements and statistics can be obtained using measurement tools.  As a minimum, traffic rates in bps (bits per second) and pps (packets per second) must be measured for links directly connected to routers and switches. To get adequate assessment, network measurements have to be taken over a long period of time, at least 24- hour period. To get adequate assessment, network measurements have to be taken over a long period of time, at least 24- hour period.  Sometimes it is desirable to take measurements over several days or a week.

27 K. Salah27

28 K. Salah28 Worst-case network measurements

29 K. Salah29

30 K. Salah30 Upfront Network Assessment and Modifications Examine if any immediate modifications are necessary Examine if any immediate modifications are necessary  may include adding and placing new servers or devices, upgrading PCs, and re-dimensioning heavily utilized links. As a good upgrade rule, topology changes need to be kept to minimum and should not be made unless it is necessary and justifiable. Over- engineering the network and premature upgrades are costly and considered as poor design practices As a good upgrade rule, topology changes need to be kept to minimum and should not be made unless it is necessary and justifiable. Over- engineering the network and premature upgrades are costly and considered as poor design practices

31 K. Salah31 Changes to topology Links are underutilized, no need for 1G links Links are underutilized, no need for 1G links Shared links must be replaced with full-duplex switched Shared links must be replaced with full-duplex switched  shared Ethernet offers zero QoS and are not recommended for real-time and delay-sensitive applications as it introduces excessive and variable latency under heavy loads and when subjected to intense bursty traffic Add gatekeeper and gateway Add gatekeeper and gateway  connecting the gatekeeper to Switch 1 is practical in order to keep the traffic local.  Connecting the gateway to Switch 2 balances the projected load on both switches.  It is more reliable and fault-tolerant not to connect both nodes to the same switch in order to eliminate problems that stem from a single point of failure.

32 K. Salah32 Original Topology

33 K. Salah33 New Topology with VoIP Components

34 K. Salah34

35 K. Salah35 The analytical approach Bandwidth bottleneck analysis Bandwidth bottleneck analysis Delay analysis Delay analysis The actual number of VoIP calls that the network can sustain and support is bounded by those two metrics. The actual number of VoIP calls that the network can sustain and support is bounded by those two metrics. Depending on the network under study, either the available bandwidth or delay can be the key dominant factor in determining the number of calls that can be supported. Depending on the network under study, either the available bandwidth or delay can be the key dominant factor in determining the number of calls that can be supported.

36 K. Salah36 BW bottleneck analysis

37 K. Salah37 Network Delay Analysis Poisson VoIP Traffic Poisson VoIP Traffic Using Jackson Theorem Using Jackson Theorem Links: M/D/1 Links: M/D/1 Router and Switches: M/M/1 Router and Switches: M/M/1

38 K. Salah38

39 K. Salah39 Network Capacity Algorithm i.Add background traffic ii.Add one call based on distribution and flow iii.For each node calculate the new arrival rate – not all nodes are affected. iv.Compute packet network delay for all flows by summing up individual delays per node v.If network delay < 80 ms, go to ii, otherwise STOP.

40 K. Salah40

41 K. Salah41 Worst incurred delay vs. number of VoIP calls

42 K. Salah42 Analytical Tool Generic Generic GUI GUI  With drag-and-drop features Analytical engine Analytical engine  BW bottleneck analysis  Compute iteratively the network delay

43 K. Salah43

44 K. Salah44 Simulation Using OPNET Using OPNET Will be discussed in great detail in next presentation

45 K. Salah45 Comparison A way to validate results of both simulation and analysis (or expert intuition). A way to validate results of both simulation and analysis (or expert intuition).

46 K. Salah46

47 K. Salah47 Pilot Deployment Before embarking on changing any of the network equipment, it is always recommended to build a pilot deployment of VoIP in a test lab to ensure smooth upgrade and transition with minimum disruption of network services. Before embarking on changing any of the network equipment, it is always recommended to build a pilot deployment of VoIP in a test lab to ensure smooth upgrade and transition with minimum disruption of network services. A pilot deployment is the place for the network engineers, support and maintenance team to get firsthand experience with VoIP systems and their behavior. A pilot deployment is the place for the network engineers, support and maintenance team to get firsthand experience with VoIP systems and their behavior. New VoIP devices and equipment are evaluated, configured, tuned, tested, managed, monitored, etc. New VoIP devices and equipment are evaluated, configured, tuned, tested, managed, monitored, etc. Get comfortable with how VoIP works, how it mixes with other traffic, how to diagnose and troubleshoot potential problems. Get comfortable with how VoIP works, how it mixes with other traffic, how to diagnose and troubleshoot potential problems. Simple VoIP calls can be set up and some benchmark testing can be performed. Simple VoIP calls can be set up and some benchmark testing can be performed.

48 K. Salah48 To Summarize A step-by-step methodology on how VoIP can be deployed successfully A step-by-step methodology on how VoIP can be deployed successfully The methodology can help network researchers and designers to determine quickly and easily how well VoIP will perform on a network prior to deployment. The methodology can help network researchers and designers to determine quickly and easily how well VoIP will perform on a network prior to deployment. Prior to the purchase and deployment of VoIP equipment, it is possible to predict the number of VoIP calls that can be sustained by the network while satisfying QoS requirements of all existing and new network services and leaving enough capacity for future growth. Prior to the purchase and deployment of VoIP equipment, it is possible to predict the number of VoIP calls that can be sustained by the network while satisfying QoS requirements of all existing and new network services and leaving enough capacity for future growth.

49 K. Salah49


Download ppt "1 Deployment of VoIP in Data Networks Deployment of VoIP in Data Networks Dr. Khaled Salah"

Similar presentations


Ads by Google