1 1 VoIP Reliability in Managed Service Deployments Technical White Paper Introduction This White Paper introduces the Aspen 365 family of network appliances and explains how service providers offering a managed VoIP solution targeted at small businesses can utilize them to provide superior quality and reliability. Different flavors of VoIP service providers, along with their differing deployment models, are considered. Some are Internet Service Provider (ISP) neutral, some offer bundled Internet access with a VoIP package, and others offer a bundled private network link of some sort. The Aspen 365 series addresses all these scenarios, using a comprehensive and flexible software feature set, which is remotely manageable and secure. Aspects of VoIP Reliability There are 3 major aspects to reliability in managing a VoIP service for business customers: 1. The overall availability and quality of voice communications. 2. The security of the customer s VoIP equipment, and equally important, the security of the VoIP provider s infrastructure. If either is compromised by attackers, the VoIP service ceases to be reliable. 3. Meeting expectations of business customers in ease of provisioning and rapid time to recover when problems are discovered i.e. serviceability. In the remainder of this paper, these criteria and the various features of the Aspen 365 that address them are explored and discussed. The last section explains how the Aspen 365 can be deployed in a variety of scenarios. 1. Availability and Quality of VOIP Complete control of both voice and data traffic is provided. A key goal is to give providers a complete spectrum of choices as to (a) if voice and data will be allowed to mix on the same Internet link (b) in the case of allowed mixing, how that mixing is to be controlled (c) in the case of fail over and backup, how backup is controlled. A range of user policies from ultra-conservative (no mixing allowed) to ultra-liberal (aggressive mixing of voice and data with QoS controls) is supported. A managed VoIP provider may opt for conservative methods of voice-data mixing, while an enterprise building its own solution may opt to be more aggressive with voice-data
2 2 mixing in order to optimize on the number and cost of Internet links. All these issues are articulated in greater detail in the next section. 1.1 Controls and Flexibility Can a network link be tagged as preferred for voice? How should backup of the voice link be arranged? How many links should be dedicated to voice only, and how many to data? The Aspen 365 series allows a total of 8 network links to be configured for voice and data with various load-sharing policies decided by the user or service provider. When a voice link fails, is voice traffic allowed to fail over to a link carrying data traffic? If yes, can a quality of service control be put in effect giving higher priority to Voice traffic? Conversely, when a link reserved for only data traffic fails, can the data traffic be allowed to fail over to the voice link? Fail over policies can be symmetrical for data and voice, or they can be one-way voice fail over only. The Aspen 365 supports either choice. 1.2 Graceful Fail Back After a Previously Failed Link Recovers In cases where the service provider has configured via policy controls a preferred link for voice, the Aspen 365 will strictly enforce this policy. If the voice link fails, new voice calls will be diverted to one or more backup links that have been configured. The question that arises is what happens when the preferred voice link becomes operational again? Since the existing media streams at that instant (if any) are successfully running on the backup link, attempting to move them immediately to the preferred voice link will result in the voice calls being broken. The Aspen 365 in this situation implements the correct actions - which is to not move existing calls being currently transported on the backup link, wait for them to complete, and in the meanwhile if any new voice calls do get set up, place these new calls on the preferred voice link. This behavior is sometimes referred to as graceful failback. Without graceful failback voice calls are disrupted twice, once when the preferred voice link fails, and a second time when the preferred voice link recovers. 1.3 Reliable Detection of ISP States It is vital to avoid false positives. A false positive is when an ISP or network link carrying VoIP is falsely declared as DOWN. The Aspen 365 implements various patent pending ISP state detection algorithms that avoid the known pitfalls of less sophisticated equipment, which tend to rely on ICMP tests, or other simple mechanisms. Because the Aspen software monitors and uses live application traffic as a background test on each link, the risk of false positive syndrome is minimized if not altogether eliminated. The VoIP provider can also specify custom application level probes, based on UDP or TCP, to accurately determine that the VoIP infrastructure (Registration Servers, etc) is accessible via any specific path. Often, for security reasons, such servers wisely disable
3 3 ICMP. It also happens at times that some ISP along the Internet path may temporarily disable ICMP. Avoiding false positives in VoIP networks is important because in the worst case, the link flips up and down repeatedly, resulting in broken voice, or in the best case, the voice traffic is needlessly placed on a backup link mixed with unpredictable data traffic. In addition, the Aspen 365 has the ability to detect a third state, in addition to just an ISP UP or ISP DOWN state, and this is the ISP UNSTABLE state. These are links which repeatedly flip up and down. A link detected as unstable, after a threshold number of UP-DOWN transitions has been reached, will be kept in a down state for a longer length of time and subject to more stringent performance tests before being brought to the UP state. Lastly, alternate ISP links can be chosen for reasons other than simple hard failures or instability. The Aspen 365 is also optionally capable of re-routing RTP media streams to superior alternate links, based on real-time measurement and statistics collection of actual RTP stream performance over each link. For instance, a link susceptible to a steady packet loss may pass tests for Link Up/Down but fail tests for adequate voice quality. 1.4 Quality of Service and Priority Queues The Aspen 365 includes selective enabling, on each link, of a priority queue for RTP streams tagged as belonging to a specific VoIP provider. These streams are identified by tracking the state-transitions to RTP stemming from SIP exchanges with a specific provider s infrastructure. It is important to note that this tagging and classification is independent of the DiffServ marking on the packet. In other words, even if the voice and data streams are identically marked as DiffServ Best Effort, a common default behavior, the Aspen 365 will correctly identify the RTP streams that require high priority service. The RTP packets in the priority queue will always be serviced first; when it is empty the packets in the non-priority queue will then be serviced. This ensures that, for the duration of voice fail over when voice and data traffic mix, the voice quality will always be maximized. If anything, the data traffic may degrade slightly during this period, but that is a tradeoff that usually makes sense for most customers. 1.5 Scaling and Quality of Service A single DSL Internet link can usually handle a small number of concurrent VoIP phone calls. In provisioning for larger customers, the ability to split the IP phone traffic over multiple DSL links can often be an advantage in cost and availability terms, as DSL is very inexpensive in comparison to T1. The Aspen N356 includes a variety of policy controls for load balancing the IP phone traffic. Static placement on individual links such as by the IP address or phone number of the phone, as well as more dynamic methods (round robin or available bit rate load balancing) can be applied on up to 8 DSL or any other broadband (such as cable modem, fixed wireless) links. This feature may be of interest to providers that bundle Internet DSL (or other) links together with the managed VoIP service.
4 2. VoIP Security for Businesses and Providers Providers need to ensure (1) that their business customers are protected adequately from Internet attack and fraud, and (2) that their own infrastructure is protected from attack and fraud using the customer premises as a backdoor for Internet or physical-premises intrusion attacks. 2.1 Stateful Firewall for VoIP 4 An optional VoIP firewall is included in the Aspen 365, to be used when a separate VoIP firewall does not exist (In cases where the customer runs their own VoIP firewall behind the Aspen 365, this feature can be disabled leaving enabled only the VoIP traffic management features). In many deployments by VoIP providers, the customer may often have an existing firewall for the Data VLAN. In deploying new IP phones and a second private or Internet link bundled with the VoIP service, the built in firewall in the Aspen 365 enables the following security benefits: Automatic creation of a separate VLAN for Voice, which ensures that any security breaches that might occur inside the Data VLAN are kept isolated from the Voice VLAN A stateful firewall that tracks SIP exchanges and only opens up UDP/RTP ports based on a validated SIP state transition involving authorized SIP servers, and which closes these ports after the IP phone call has concluded. This stateful firewall ensures also that intrusion attempts and ports scans from outside are blocked and will fail. Security management with optional use of a built in DHCP server supporting multiple IP address pools, along with Network Address Translation (NAT) and Port Address Translation (PAT). Continuous validation of the hardware MAC address and associated IP address and PSTN number associated with an IP phone, useful in fraud detection and prevention. 2.2 Network Admission Control for IP Phones By constant checking of the hardware MAC address on any IP phone, an optional knob is available to block both SIP and RTP traffic from any device whose hardware address is unauthorized. Such traffic will not be forwarded into the provider s IP infrastructure. This feature applies to providers that are able to maintain lists of the MAC addresses associated with the IP phones they ship out to business customers, and maintain some kind of registration procedure that requires enforcement of a MAC address-phone number (PSTN) association. Admission control can be enabled using either (1) the phone s MAC address, or (2) the phone s manufacturer name.
5 Because blocking such traffic can have drastic effects, this feature will need to be explicitly enabled at configuration time. 2.3 Intruder Detection via SIP Auto Detect 5 The Aspen 365 auto-detects all SIP traffic, regardless of the SIP/UDP port being used. An option is provided to transmit alert messages to the provider s centralized monitoring system when such devices are detected. Alerting is one step short of blocking, which is described in 2.2 above. It is also an option that needs to be explicitly enabled. 3. Serviceability and Provisioning The Aspen 365 has been engineered for ease of serviceability by VoIP service providers, which includes ease of IP phone provisioning as well. The dual CPU architecture of the Aspen 365 includes a built in VoIP protocol analyzer tool, as well as real-time network measurement tools for jitter, packet loss and other metrics affecting call-quality. These can run concurrently without impacting the network performance of the Aspen 365 while under potentially heavy voice and data load. By cutting down on time spent resolving problems, and minimizing the need for escalated intervention, providers can reduce overall costs while improving customer retention. For example: a problem as simple as a loose Ethernet cable attached to an IP phone can be discovered and rectified over the phone. 3.1 IP Phone Provisioning An optional feature for bulk provisioning is provided, whereby a reserved DHCP pool of IP addresses and an automatically created VLAN are made available to support first-time install procedures. An option to create an automatic VLAN based on the name of the phone manufacturer simplifies the process (since the need for the user or the provider s installer to type in the hardware MAC address is eliminated) 3.2 Secure Remote Management Secure remote access (via SSH, SCP) into the Aspen 365 management processor is provided; the packet forwarding processor is non-ip addressable and acts as a built-in firewall protecting the management processor from unauthorized access. Multiple levels of operations staff user can operate in different shells concurrently. An IP access control list can be used to limit access if desired to specific source computers or servers. Up to 8 different Internet links can be used to access the appliance, to either troubleshoot an IP phone remotely or to push out configuration files in an automated manner. This ensures survivable remote access during various problem conditions that may afflict individual links. Simple problems such as a device not properly connected or powered off can be easily detected by first level technical support remotely inspecting the Aspen 365 management console.
6 3.3 Real-Time VoIP Protocol Tracing 6 At times, a VoIP service request over the phone will require escalation to a protocolknowledgeable technician. The non-technical customer reporting the problem with phone service will communicate the phone (PSTN) number having the problem. The Aspen 365 allows a technician to remotely start a real time trace of all IP packet activity on any such identified IP phone including protocol traces showing SIP and RTP state transitions. Filters by IP address and PSTN numbers are included, to ease the effort of isolating a specific phone. 3.4 Pro-Active Real Time Measurements The Aspen 365 packet forwarding processor is capable of continuously measuring the RTP payload, in order to proactively measure packet loss, round-trip time, payload receiver bit rate, jitter and other call-quality parameters. It does this as a background task on all VoIP calls in progress. This can be enabled as a proactive means of measuring call quality and detecting problems in advance of customers calling to complain. Alerts on various conditions can be generated to a centralized management console. 4. Aspen 365 How it Fits in VoIP Deployment Models Having a Layer 2 switch personality while performing advanced VoIP security and traffic management functions enables the Aspen 365 to be highly flexible in the way it fits into new business customer LANs. The next few sections serve to illustrate this flexibility in deployment and application.
7 4.1 Provisioning with Data LAN Bypass 7 In this model, the VoIP provider bundles a private DSL or frame relay or T1 link with the managed voice service. The existing Internet link is used purely as a backup to the private link; the 365 ensures that voice stays on the private link, and will gracefully handle all failure and recovery events (see Section 1.2). Model 1: Managed VoIP Private Links Bundled, with Data Bypass SIP Infrastructure of ISP 2 Private DSL or Frame Relay or Other private line Voice on private bundled link, can fail over to existing ISP if private link fails, with higher QoS for VoIP/RTP when fail over occurs Aspen 365 Firewall Internet ISP 1 (pre-exists) Switch ISP 1 can be a backup link for Voice; however if ISP 1 fails data traffic is prevented from failing over to ISP 2 SIP based IP phones 1. Built in VoIP Security 2. SIP auto detect 3. Network Admission Control 4. Multi link Quality of Service 5. Remote serviceability vlan 2 Data Fig 1 In addition, data traffic will never fail over to the private voice link by design, since (see Fig 1 above) the data firewall is physically by-passed.
8 4.2 Provisioning without Data LAN By Pass The deployment model in Fig 1 above does have the limitation that when the voice link fails, voice traffic moves to the backup data link, where it has no quality-of-service guarantees. A deployment model that removes this limitation is shown below. Model 2: Managed VoIP Private Links Bundled Enhanced QoS 8 SIP Infrastructure of ISP 2 Internet Private DSL or Frame Relay or Other private line Voice on private bundled link, can fail over to existing ISP if private link fails, with higher QoS for VoIP/RTP when fail over occurs ISP 1 (pre-exists) Aspen 365 Firewall ISP 1 can be a backup link for Voice; however if ISP 1 fails data traffic is prevented from failing over to ISP 2 SIP based IP phones 1. Built in VoIP Security 2. SIP auto detect 3. Network Admission Control 4. Multi link Quality of Service 5. Remote serviceability vlan 2 Data Fig 2 Here, both the Data and Voice VLANs are behind the Aspen 365 appliance. Whenever the voice link fails, data and voice will mingle on the pre-existing Internet link reserved for data originally. The Aspen 365 implements a priority queue for the RTP based voice traffic, thus shaping traffic so that voice gets the best link service, at the cost of some possibly slight degradation to the data traffic performance. Additionally, the Aspen 365 has been engineered with 2 features that make the data firewall placement a risk-free process: (1) By having a layer 2-switch personality, the data traffic from the existing firewall is simply bridged through to its natural router hardware address by the Aspen 365. The software will never place the data traffic on the voice link unless it is explicitly configured to do so. (An option exists where if the data link fails, data traffic recovers on the voice link, but this option is disabled by default). (2) A second feature, which is useful at install time, is wire mode this allows the box to be installed physically (while powered off or on) without disrupting the data network or existing firewall. During the install procedure, application data traffic continues to flow through the Aspen 365 as though it was a physical cable, bypassing the software completely.
9 9 4.3 Provisioning with Multiple ISP Links This type of deployment model (see Fig 3 below) is suited to an ISP that is able to provide multiple DSL or cable-modem links, together with path diverse fixed wireless services in a bundle, together with a managed VoIP offering. This kind of a provider adds value by providing resilience and bandwidth for the data network traffic as well, at little risk of disruption to data or voice traffic. Model 3: Multiple ISP Links Bundled Internet access links (1 or more) delivered with VoIP service Here, ISP 1 and 2 used for Voice only Data is kept on ISP 4 always, with ISP 3 as a backup if ISP 4 fails VoIP can fail over to ISP 3 or 4 or both, if ISP 1 or 2 or both fail ISP 1(VOIP) DSL Internet ISP 2(VOIP) DSL Aspen 365 ISP 3 Wireless ISP 4 T1 (primary data) Separate VLAN for VoIP is created automatically 1. Built in VoIP Security 2. SIP auto detect 3. Network Admission Control 4. Multi link Quality of Service 5. Remote serviceability Firewall Data LAN Fig 3 Here, because of the larger number of IP phones and expected call volume, 2 DSL links are bundled in for the VoIP traffic as preferred links. The Aspen 365 intelligently load balances the VoIP media streams on the 2 DSL links. Here the customer is shown as having a primary Internet link (pre-existing) called ISP 4 for data traffic only. The VoIP provider in addition to providing VoIP service, bundles in 2 DSL links (ISP 1 and ISP 2 in Fig 2) and a high speed fixed wireless link (ISP 3). The wireless link can serve as a backup for either the primary data link or the primary voice links. The Aspen 365 has a flexible set of link policy management knobs. For example, voice traffic can be programmed to fail over to the wireless first, then the T1 if the wireless were to be down or even degraded due to higher packet loss and signal noise. Additionally, data traffic can be load balanced on both the wireless and T1 link based on application type and various thresholds (such as overflow and utilization).
10 VoIP Provider that is ISP Neutral In this model, the managed VoIP provider provides no bundled links; the customer independently buys multiple ISP links to ensure maximum voice uptime. Model 4: Managed VoIP - ISP neutral VoIP service works with any and all ISP links provisioned by customer VoIP provider does not provide Internet access (e.g. Vonage) Internet ISP 1 ISP 2 ISP 3 Separate VLAN for VoIP is created automatically Aspen Built in VoIP Security 2. SIP auto detect 3. Network Admission Control 4. Multi link Quality of Service 5. Remote serviceability Firewall Data LAN Fig 4 In this case, the Aspen 365 is either managed by the provider or by the business customer. In Fig 4, the customer purchases 3 Internet links. Traffic is managed in such a way that the goals of multi-link quality of service, maximum uptime and optimum bandwidth cost are attained. ISP 1 could be primary for voice, ISP 2 primary for data, and ISP 3 a backup for either one of the first 2, Alternate policies are also possible; the policy management framework is very flexible for both load balancing and fail over options. Conclusion We have introduced the Aspen 365, focused on VoIP traffic management and managed VoIP providers, or enterprises using a managed VoIP service. The Aspen 365 delivers reliability of VoIP traffic, including its quality and security. The security of the managed provider s infrastructure has built in protections that can be enabled if needed. Serviceability features and real time measurement of VoIP payload streams have been engineered for rapid problem troubleshooting, as well as pro-active service engineering prior to problems being reported.
1 High Availability, Security and Peak Performance in Hosted VoIP Deployments Introduction Technical White Paper The hosted VoIP market continues to grow dramatically with more and more providers offering
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 firstname.lastname@example.org
HOSTED VOICE Bring Your Own Bandwidth & Remote Worker Install and Best Practices Guide 2 Thank you for choosing EarthLink! EarthLinks' best in class Hosted Voice phone service allows you to deploy phones
Hosted Voice Best Practice Recommendations for VoIP Deployments Thank you for choosing EarthLink! EarthLinks best in class Hosted Voice phone service allows you to deploy phones anywhere with a Broadband
TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
PART I - Single Office Setups Truffle boosting WAN banwidth and reliability for a single office The Truffle Broadband Bonding Network Appliance enables an SMB (Small and Medium Sized Business) or an enterprise
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity
Configuring Campus Switches to Support Voice BCMSN Module 7 1 The Basics VoIP is a technology that digitizes sound, divides that sound into packets, and transmits those packets over an IP network. VoIP
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia email@example.com 1. Introduction Modern
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
Your new VoIP Network is working great Right? How to Know April 2012 Executive Summary This paper discusses the importance of measuring and monitoring the voice quality of VoIP calls traversing the data
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Introduction The EdgeMarc 4508T4W combines multiple voice and data features into a single, easy to use converged networking router. It includes models that have up to 4 T1 WAN interfaces or a single Ethernet
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
Com.X Router/Firewall Module Use Cases White Paper Version 1.0, 21 May 2014 2014 Far South Networks Document History Version Date Description of Changes 1.0 2014/05/21 Preliminary 2014 Far South Networks
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE Engineering Version 1.3 June 3, 2015 Table of Contents Foreword... 3 Current Network... 4 Understanding Usage/Personas... 4 Modeling/Personas...
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
LAN Planning Guide XO Hosted PBX Document version: 1.05 Issue date: 1 May 2013 Table of Contents Table of Contents... i About this Document... 1 Introduction: Components of XO Hosted PBX... 1 LAN Fundamentals...
VoIP 101: An introduction to the basics of Voice over Internet Protocol How to guide Introduction You may have heard of VoIP that it s the future of telephone service, and that you can save a lot of money
Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite EXECUTIVE SUMMARY CISCOLIVE Europe 2010 Annual Cisco IT and communications conference Event held at Barcelona,
Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover White Paper Page 1 Table of Contents Executive Summary... 3 Considering The Options: Upgrades, Redundancy and
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with
Application Note - LRE SOHOware Long Reach Ethernet (LRE) Solution LRE Technology Benefits SOHOware solution is based on Very high bit-rate DSL (VDSL) robust technology Solution supports transfer rates
Voice over IP Probe! for Network Operators and! Internet Service Providers Product Presentation September 2011 2011 ADVENAGE GmbH Agenda Voice over IP Probe Key Facts VoIP Probe in a Nutshell Use Cases
FortiVoice Version 7.00 VoIP Configuration Guide FortiVoice Version 7.00 VoIP Configuration Guide Revision 2 14 October 2011 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and terms are subject
IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
Copyright 2002 Quick Eagle Networks Inc. All rights reserved. The White Paper Series Safety in Numbers Using Multiple WAN Links to Secure Your Network Roger J. Ruby Sr. Product Manager August 2002 Executive
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business
Information about IP Proprietary Telephones Hybrid IP-PBX Model No. KX-TDA50/KX-TDA100 KX-TDA200/KX-TDA600 Thank you for purchasing a Panasonic Hybrid IP-PBX. Please read this manual carefully before using
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Aspen Solutions Branch Office IP Telephony: Improving the Reliability of Voice over Virtual Private Networks TECHNICAL NOTE Introduction IP PBX and IP phones are increasingly being deployed by small and
ZEROOUTAGES WHITE PAPER Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES - WHITE PAPER Single Side / Balancing The ZeroOutages solution makes for a perfect link bonding/balancing device for
Elfiq Networks Vital for Hospitality Contents Elfiq Link Balancer Overview... 3 Internet Continuity... 4 LAN Failsafe... 4 3G/4G Mobile Carrier Support... 4 Bandwidth Management... 5 Time of Day Conditions...
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
In Brief Applications UC & VoIP Challenge Cut telecom cost by finding an alternative to costly MPLS Improve Internet connectivity speeds Fortify business continuity Solution Mushroom Networks Truffle Internet
nexvortex SIP Trunking Implementation & Planning Guide V1.5 510 S PRING S TREET H ERNDON VA 20170 +1 855.639.8888 Introduction Welcome to nexvortex! This document is intended for nexvortex Customers and
VoIP CONFIGURATION GUIDE FOR MULTI-LOCATION NETWORKS INTRODUCTION About this guide This guide is designed to help you plan and configure a TalkSwitch multi-location network for Voice over IP (VoIP). NOTE:
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and
Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features