+ All Categories
Home > Documents > VoIP Best Practices for Fejlanalyse

VoIP Best Practices for Fejlanalyse

Date post: 03-Sep-2014
Category:
Upload: catharine24
View: 758 times
Download: 0 times
Share this document with a friend
Description:
 
Popular Tags:
116
Welcome to Implementing VoIP: VoIP Network Best Practices
Transcript
Page 1: VoIP Best Practices for Fejlanalyse

Welcome toImplementing VoIP:

VoIP Network Best Practices

Page 2: VoIP Best Practices for Fejlanalyse

Implementing VoIP:VoIP Network Best Practices

Page 3: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Agenda Introductions From Hype to Adoption VoIP Myths Anatomy of a VoIP Call VoIP Metrics Lab 1: VoIP in ActionBreak The Three Phases of Successful VoIP Deployment

Phase 1: Site Survey and Testing Phase 2: Monitoring the Roll Out Phase 3: Ongoing Troubleshooting and Maintenance

Break Lab 2: VoIP Call Monitoring Best Practices Summary Network Instruments Solutions Set Q&A

Page 4: VoIP Best Practices for Fejlanalyse

First things first:Introductions

Page 5: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Douglas Smith

President and Co-Founder of Network Instruments Oversees

FinanceSalesMarketingProduction

Works closely on product design with company CEO, Roman Oliynyk

A part of the networking community since 1985 Awarded degrees in Math and Economics

from University of Wisconsin-Madison

Page 6: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Charles Thompson

Manager of Sales Engineering Works directly with the Network Instruments

sales team and partner channel to provide…Technical expertiseProfessional services In-depth product information for enterprise

accounts Travels throughout North America conducting

workshops and presentations on network analysis

Personally trained thousands of network managers on the Observer product line

Page 7: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005

Network Instruments

Founded in 1994

40,000 licenses sold ~4K new customers

annually

12 offices worldwide

Sold in over 75 countries

2005 growth Overall: 24%

Celebrating 11 years of continued company growth

Network InstrumentsCompany Growth

Page 8: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

History of Product Innovation 1st affordable Windows-based analyzer

1st distributed software-based protocol analyzer

1st to include SNMP for switched environments

1st 802.11 a/b/g wireless analyzer and remote probe

1st combined wired and wireless solution together

1st to support 64-bit Windows

1st to develop multi-session, multi-user probes

1st to integrate application analysis

1st to develop enterprise-ready VoIP Expert

Page 9: VoIP Best Practices for Fejlanalyse

Distributed Architecture Advantages

Page 10: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Distributed Network Analysis Architecture

Page 11: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

NI-DNA™ - Distributed Network Analysis

NI-DNA provides Distributed and complete functionality for every type of Network topology in any location using the most intelligent Analysis tools

Unified Code Unified Code SetSet

Two key components: the console, which displays data and the probe, which is used for data collection and processing.

ScalabilityScalability

FlexibilityFlexibility

ModularityModularity

AffordabilitAffordabilit

yy

Page 12: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

NI-DNA provides Distributed and complete functionality for every type of Network topology in any location using the most intelligent Analysis tools

Local/Remote Local/Remote VisibilityVisibility

Observer console includes a local probe for local analysis and connects to remote probes.

VisibilityVisibility

EfficiencyEfficiency

ProductivityProductivity

SecuritySecurity

NI-DNA™ - Distributed Network Analysis

Page 13: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Multi-Topology Multi-Topology SupportSupport

NI-DNA provides Distributed and complete functionality for every type of Network topology in any location using the most intelligent Analysis tools

Observer’s single user interface can manage multiple Gigabit links, 802.11 connections, 10/100/1000 Ethernet and Wide Area networks.

AdaptabilityAdaptability

SimplicitySimplicity

TransparencyTransparency

ReliabilityReliability

NI-DNA™ - Distributed Network Analysis

Page 14: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Analysis OptionsSoftware

Probe

GigaStor

10/100/1000 Probe Appliance

WAN and Gigabit Probe Appliances

Top TalkersMultiHop Analysis

Connection Dynamics

Application Analysis

SNMP Management

VoIP Analysis

Gigabit and WANObserver Suite System

Page 15: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Snapshot of Customers

Page 16: VoIP Best Practices for Fejlanalyse

From Hype to Adoption

Page 17: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

From Hype to Adoption

Market researchers expect the number of VoIP users worldwide to increase

from around five million in 2004 to 200 million subscribers in 2010

http://www.heise.de/english/newsticker/news/64129

Page 18: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

From Hype to Adoption

“Ninety-nine percent of all VoIP network implementations that fail

do so because IT departments didn’t do their homework.”

-- William Stofega, VoIP research director, IDC

Page 19: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

VoIP Monitoring and Analysis Challenges

Current, competing tools were designed for lab use No method of quickly determining status and health No mechanism for understanding aggregate call quality VoIP dependencies are not implemented properly Separate tools increase learning curve, reduce ROI

Other VoIP tools

Observer 11

Page 20: VoIP Best Practices for Fejlanalyse

Common VoIP Myths

Page 21: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

VoIP Myths

Myth #1

Running VoIP without Quality of Service

is acceptable

Page 22: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Contention = Delay Why is Quality of Service important?

Managing VoIP means managing delay

Even a network with large bandwidth capabilities can have poor call quality due to network contention

QoS measures can help make VoIP traffic less susceptible to adverse network conditions

QoS offers VoIP traffic more consistent availability

Page 23: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

VoIP Myths

Myth #2

No VoIP Site Survey is necessary

Page 24: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Site Surveys are Critical

With the decision to implement VoIP, one of two choices are usually made

IT managers keep network conditions the same and add VoIP traffic

IT managers upgrade their bandwidth capacity

Page 25: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Site Surveys are Critical Result

Does not solve or address potential VoIP problems

Network adjustments are made after deployment has begun

Deployment issues can cause user resistance to VoIP technology

Adding bandwidth may not be necessary or offer value

Page 26: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Common VoIP Myths

Myth #3

Voice conversations are secure

Page 27: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

VoIP Conversations are a Security Risk

VoIP is another piece of network data

Tools are used to capture not only voice conversations but to also generate audio playback for later use

Higher-end VoIP systems may offer a way to encrypt data but many existing or lower-end systems do not

VoIP traffic is most vulnerable on the LAN since Internet WAN traffic is typically through VPNs

Consider wiretapping rules and regulations

Page 28: VoIP Best Practices for Fejlanalyse

Anatomy of a VoIP Call

Page 29: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

How does VoIP work?

H ow VoIP phones send audio s tream s over a network

W A NLA N LA N

S e nd R e ce ive

LA N

01001101 01001101

E n cod e a nd pac ke t ize N e tw o rk d e la y, jitte r, & pa cke t los s J it te r sm o o th ing , de cod e , & p la yb ack

To ta l de la y b udg e t o f 1 50 m s o r le ss (one w a y)

Page 30: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

How does VoIP work?

VoIP phones use codecs to translate analog sound streams into digital packets for transmission

On the receiving end, the codec translates the packets back to analog

To ensure normal conversations, all of this musthappen as close to real-time as possible

Page 31: VoIP Best Practices for Fejlanalyse

VoIP Metrics

Page 32: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

VoIP Basics

What is VoIP?

Packetized voice traffic sent over an IP network

What challenges does it bring?

Competes with other traffic on the network

A new technology that needs real-time, consistent monitoring

Sensitive to delay

Page 33: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

VoIP Basics Understanding VoIP begins with understanding

delay

Normal trafficNot sensitive to delayExample: FTP, HTTP, e-mail, etc.

Tolerant trafficSensitive to delayLoss tolerantBuffered by receiverExample: streaming video, Internet radio,

etc.

Real-time trafficDelay and loss sensitiveExample: VoIP

Page 34: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

VoIP Terms

Jitter

R-Factor / MOS

Burstiness / Gap / Gap Duration

QoS / TOS / Precedence

Compression Techniques (Codecs)

Page 35: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Jitter What is it?

Jitter is the variation in the time between packets transmitted and received

For example, if a packet stream leaves a device with 30 ms packet spacing and arrives with 50 ms packet spacing, the jitter is 20 ms

3

N etw orkIP P hone

010011011234

567

8

9

54

Jitte r buffer Codec

8

VoIP packets can arrive at the receiving phone out of sequence, late, early, or not at a ll. IP phones use a to reconstruct the packet stream at the receiving end, duplicating m issing packets or filling in with white when necessary.

jitter buffercomfort noise

Jitter buffe ring and packe t loss concea lm ent

67

9

Page 36: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Jitter Why measure it?

Understanding jitter gives hard facts to help improve call quality

Excessive jitter will confuse callers about who is speaking and who is listening

Adjusting jitter buffers can help at the expense of increased latency and thus, clipping. Jitter buffer overflow will introduce dropped packets.

Page 37: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Observer’s Jitter MeasurementIn aggregate…

and per call…

Page 38: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Call Quality Scoring

What is it?

Industry standard methodologies for associating a grade to a call

Page 39: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Call Quality Scoring

R-factor Identifies live call quality using a single

source of visibility Based on E-Model (ITU G.107)Scale: 1-100Typically the maximum value would be

93.2 after standard degradation Codec usedNetwork delay Jitter bufferPacket loss

Page 40: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Call Quality Scoring

MOS User satisfaction level with a callTakes into account a number of different factors

Handset qualityAmbient noiseNetwork performance

Scale: 1-54.0 and higher considered satisfied4.5 and higher extremely satisfied

On simulated calls, traffic is captured at the destination and compared to the originalsent data to identify degradation

Page 41: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Call Quality Scoring

Why measure Call Quality?Provides objective and subjective scores

to evaluate existing conditions to compare with historical conditions.

Page 42: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Observer’s Call Quality Scoring

In aggregate…

per call…

and Expert…

Page 43: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Burstiness and Burst Density What is it?

A burst is a period of time characterized by high rates of packet loss

Burst percentage is the % of time bursts are occurring Burst density is the rate of VoIP data packets lost

during a burst period

Why measure it?

Higher rates affect call quality, especially when coupled with long average burst duration times

Possible reason for packet loss include network congestion, media failure, and link failure

Page 44: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Gap Density and Duration What is it?

Gaps are the periods between bursts A gap is a period of time characterized by lower levels of

packet loss than the burst periods that bound it Gap density is the percent of packet loss during gaps Average gap duration is measured in time

Why measure it?

Knowing the gap helps define the burst In most cases, packet loss during gaps is rendered

insignificant by concealment techniques built into the VoIP infrastructure

Page 45: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Observer’s Burst and Gap Density

In aggregate…

and per call…

Page 46: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Settings for QoS / Precedence Support for multiple definitions of Quality of Service (QoS)

Also known as Precedence or Type Of Service (TOS)

What is it? QoS is a bit setting used by routers and switches to

prioritize packet flow

Why measure it? Incorrectly set QoS can

lead to VoIP or other network contention

Contention will lead to delays in packet delivery, reducing call quality

Page 47: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Observer’s QoS/TOS/Precedence

In aggregate…

per call…

and Decode…

Page 48: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Compression Techniques

Codec is a term for Coder/Decoder

Different compression techniques (codecs) G.711: 64kbps (no compression) G.729: 8kbps G.723: 6.3kbps, 5.3kbps

Higher compression reduces R-Factor and MOS but also reduces potential contention

Page 49: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Which Codecs Are Used?In aggregate…

per call…

and Decode…

Page 50: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

How does VoIP work?

H ow VoIP phones send audio s tream s over a network

W A NLA N LA N

S e nd R e ce ive

LA N

01001101 01001101

E n cod e a nd pac ke t ize N e tw o rk d e la y, jitte r, & pa cke t los s J it te r sm o o th ing , de cod e , & p la yb ack

To ta l de la y b udg e t o f 1 50 m s o r le ss (one w a y)

Page 51: VoIP Best Practices for Fejlanalyse

Lab 1

Capture and Decode of a VoIP Call

Page 52: VoIP Best Practices for Fejlanalyse

Break

Page 53: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Agenda Introductions From Hype to Adoption VoIP Myths Anatomy of a VoIP Call VoIP Metrics Lab 1: VoIP in ActionBreak The Three Phases of Successful VoIP Deployment

Phase 1: Site Survey and Testing Phase 2: Monitoring the Roll Out Phase 3: Ongoing Troubleshooting and Maintenance

Break Lab 2: VoIP Call Monitoring Best Practices Summary Network Instruments Solutions Set Q&A

Page 54: VoIP Best Practices for Fejlanalyse

Phase 1: Site Survey and Testing

Page 55: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Site Surveys are Critical

Conduct a Site Survey to review…WAN link bandwidth levelsCurrent traffic flowsView existing switches for bottlenecks and

choke pointsDetermine needs through testing and modelingPlacement of analysis tools

The more you know about your network the better prepared you are to properly integrate VoIP

Page 56: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

WAN Link Bandwidth Levels

Summary

Port 1 Source DCE

Port 2 Source DTE

Port 2 Source DCE

Port 1 Source DTE

Page 57: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Long-Term Trending

Page 58: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Estimate VoIP Impact

How will VoIP traffic affect the network?

First, determine number of potential users Assume users spend 20% of their day on the phone

Includes active calls as well as VM retrievalVideo will add to utilization

Varies based on site

Determine the codec in use; for example: G.711: 64kbps (no compression) G.729: 8kbps G.723: 6.3kbps, 5.3kbps

Page 59: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Examples: VoIP Impact

100 users on site, 20% usage = 20 concurrent sessionsG.711 Codec: 1.28 MbpsG.729 Codec: 160 kbpsG.723 Codec: ~120 kbps

Bandwidth impact using a T1 at 1.54 MbpsG.711 Codec: 83%G.729 Codec: 10%G.723 Codec: 8%

Page 60: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Current Traffic Flows

Assuming one drop per user, evaluate connection speeds and current usage

If multiple network drops per user, not applicable

Page 61: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Find Bottlenecks and Choke Points

Determining switch, router, and device utilization Review uplinks and shared pipes

Page 62: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Testing and Modeling

Do a pilot test to generate sample calls in various network conditions

Capture live data and model hypothetical situations

Switch codecs to find optimal performance

Use Observer’s “What-If” Analysis to predict response

Here is an example using Observer…

Page 63: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Testing and Modeling

Review Observer’s UDP Events to find live calls

Page 64: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Testing and Modeling

G.711

1 User

Page 65: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Testing and Modeling

G.711

100 SimultaneousUsers

Page 66: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Testing and Modeling

G.711

1000 SimultaneousUsers

Page 67: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Placement of Analysis Tools

Where should you place your analyzer tools for maximum visibility?

Depends on what you’re wanting to seeEach call includes both client and server

communications

If you need access to all local conversations…Use a SPAN session on the access layerAssign all VoIP traffic to a dedicated VLAN

Page 68: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Points of Visibility Consider a sample network

VoIP ca llm anage r

C ore sw itch

A ccess layer

VoIP ca llm anage rC ore sw itch

A ccess layer

M PLSM esh

East CoastO ffice

W est CoastO ffice

Page 69: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Points of Visibility

Capturing local IP traffic shows

Phone’s communication with its local call manager

Both sides of the full-duplex connection between local phones

Both sides of the full-duplex connection between phones located across a WAN

Page 70: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Points of Visibility

VoIP C allM an ager

A ccess sw itch

VoIP C allM an ager

MPLSMesh

East CoastOffice

West CoastOffice

C onnection vis ible to ana lyzerC onnection h idden from ana lyzer

Page 71: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Points of Visibility

Need a more coherent view of calls across WAN links?

Use a SPAN session to mirror…

Both the uplink traffic between the core and MPLS mesh

All traffic flowing to and from the call manager

Page 72: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Points of Visibility

VoIP C allM an ager

A ccess sw itch

VoIP C allM an ager

MPLSMesh

East CoastOffice

West CoastOffice

C onnection vis ible to ana lyzerC onnection h idden from ana lyzer

C oreS w itch

Page 73: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Points of Visibility

For complete coverage, and complete visibility connect analysis probes to both the core and access layers at each site

Page 74: VoIP Best Practices for Fejlanalyse

Phase 2: Monitoring the Roll Out

Page 75: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Verifying VoIP Health

Cumulative VoIP MetricsSatisfaction Scoring Aggregate Jitter Total CallsCodec Verification

Network Configuration and PerformanceQuality of Service / PrecedenceVerifying VLAN ConfigurationReviewing Link Utilization

Page 76: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Monitoring Overall VoIP Health

Call Scoring

Aggregate Jitter

High jitter or low call scoring is an issue

If this is the case, go back and review your setups

Page 77: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Monitoring Overall VoIP Health

Codecs Used

Total Calls

Is the network responding as expected with the total number of calls?

Is the right Codec being used?

Page 78: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Monitoring Overall VoIP Health

QoS

Is Quality of Service / Precedence configured properly?

Page 79: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Verifying VLAN Setup

Identify VLAN setups and verify that VoIP traffic exists in its appropriate VLAN

Page 80: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Verifying VLAN Setup

Is the station in its appropriate VLAN?

Page 81: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Link Utilization

Verify utilization for each link

Ensure that what you see here coincides with information gathered from “What-If” Analysis in the testing phase

Page 82: VoIP Best Practices for Fejlanalyse

Phase 3: Troubleshooting and Ongoing Maintenance

Page 83: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

When Problems Arise

TroubleshootingReal-time nature of the callCall flow analysisAutomated problem identification and resolutionCall mapping for jitter, lost packets, and

utilization spikesUse trending data to report on period in question

for traffic analysis

Ongoing MaintenanceProactive MonitoringSchedule Reporting

Page 84: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Real-Time Call Analysis

Review calls in real-time

Track for any inconsistencies

Page 85: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Call Flow Analysis

Identify call in question Track individual stream that comprise the call Drill down to Connection Dynamics

Page 86: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Connection Dynamics

Page 87: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Expert Help

Speed problem resolution by obtaining instant possibilities of network issues

Automate problem resolution

Page 88: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Call Mapping

Compare jitter to bandwidth utilization to understand RTP/RTCP response time

Is this a bandwidth issue?

Page 89: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Trending Obtain a snapshot of a

time period in question Check to see if current

conditions are deviating from historical data

Page 90: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Monitoring and Alerting

Select which VoIP characteristics should be continuously monitored

Page 91: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Monitoring and Alerting

Determine what threshold levels are acceptable and set triggers accordingly

Page 92: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Monitoring and Alerting

Customize the appropriate network action based on the event

Page 93: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Monitoring and Alerting

Review Expert thresholds crossed or exceeded

Shows where thresholds

were exceeded

Page 94: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Scheduled Reporting Customize reports to provide the necessary insight for long-

term analysis and planning Schedule the reports for automatic delivery on a daily,

weekly, monthly, or even yearly basis

Page 95: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Sample Report

Choose from a variety of report options and types or create custom reports

Page 96: VoIP Best Practices for Fejlanalyse

Break

Page 97: VoIP Best Practices for Fejlanalyse

Lab 2

Live VoIP Troubleshooting

Page 98: VoIP Best Practices for Fejlanalyse

Summary

Page 99: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #1

Understand and measure the various components of call

quality

Page 100: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #2

Implement Quality of Service

Prioritization

Page 101: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #3

Conduct a Site Survey

Page 102: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #4

Deploy analysis tools strategically for

maximum visibility

Page 103: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #5

Implement VLANs to help isolate and

monitor VoIP issues

Page 104: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #6

Monitor the rollout to ensure a positive user

experience

Page 105: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #7

Compare jitter to overall network bandwidth utilization to understand response time

Page 106: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #8

Set up your analyzer to proactively monitor

VoIP activity

Page 107: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #9

Automate problem resolution

Page 108: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Best Practice #10

Baseline your network traffic

Page 109: VoIP Best Practices for Fejlanalyse

Network Instruments Solution Set

Page 110: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Analysis OptionsSoftware

Probe

GigaStor

10/100/1000 Probe Appliance

WAN and Gigabit Probe Appliances

Top TalkersMultiHop Analysis

Connection Dynamics

Application Analysis

SNMP Management

VoIP Analysis

Gigabit and WANObserver Suite System

Page 111: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Customer Feedback

“So far, Observer’s VoIP capabilities have helped cut down CI Travel’s

phone bill by about 25-30 percent.”

Paul Ingram, CI Travel

Page 112: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Solid Reviews and Testimonials

Observer continues to receive stellar reviews from industry pundits and our valued customers

“…it is the best packet analysis package we have tested .”

- Dave Bailey, IT Week, December 1, 2005

“Traffic statistics in Observer 11's VoIP Expert tool are more robust, with call summary, quality scoring and detailed per-call metrics such as call status, current jitter, call setup, duration, teardown, MOS/R-factor and QoS levels.”

- Dan Hong, Redmond, November 16, 2005

“Like all Observer features, VoIP Expert is based on the Network Instruments Distributed Network Analysis architecture, which means VOIP analysis is available across multiple topologies such as local-area network, wide-area network, Gigabit Ethernet and 802.11a/b/g.”

- Michelle Speir Hasse, Federal Computer Week, November 21, 2005

Page 113: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Recent Wins

Large-scale GigaStor deployment

Sniffer replacement For maintaining customer

networks

Large-scale 10/100/1000 appliance deployment for 90% of U.S. locations

Sniffer replacement For comprehensive visibility

Large-scale 10/100/1000 appliance deployment across U.S. locations

Sniffer replacement For distributed analysis

Large scale Expert probe deployment

For real-time network monitoring

Page 114: VoIP Best Practices for Fejlanalyse

Enterprise Pricing

Page 115: VoIP Best Practices for Fejlanalyse

© 2006 Network Instruments, LLC

Enterprise Pricing

VoIP Analysis included at no additional charge Shipped with a 64-bit Core, with support for 32-bit systems Gigabit and WAN Appliances are all 64-bit systems

Expert Observer Includes VoIP US$ 2,895

Observer Suite Includes VoIP US$ 3,995

10/100/1000 Probe Appliance Includes VoIP US$ 2,495

Gigabit Probe Appliance Includes VoIP US$ 11,995

2 TB GigaStor Includes VoIP US$ 19,995

4 TB GigaStor Includes VoIP US$ 35,000

8 TB GigaStor Includes VoIP US$ 50,000

Network Instruments continues to lead the analysis industry in performance and value

Page 116: VoIP Best Practices for Fejlanalyse

Thank You

For more information:Network Instruments, LLC

Chuck Oxleyphone: 416-285-9191

toll-free: 1-800-526-7919 x3897e-mail: [email protected]

www.networkinstruments.com


Recommended