Testing Network Performance with Real Traffic
|
|
- Harold Wilson
- 8 years ago
- Views:
Transcription
1 Testing Network Performance with Real Traffic Mike Danseglio w w w. s c r i p t l o g i c. c o m / s m b I T
2 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic Corporation in the United States of America and other countries. All other trademarks and registered trademarks are property of their respective owners. 2 Testing Network Performance with Real Traffic
3 Is your network utilization different from year to year? How about day to day or even minute to minute? There are virtually no network caretakers that believe their network remains consistent over time. Network traffic is unpredictable. A number of factors enter in to causing this unpredictability. But the net impact is that an effective network administrator needs to understand the impact of changing network traffic. This article shows you the common pitfalls that network administrators encounter as the analyze existing and new network capacity. You ll also see what the impact of the changing traffic patterns can be, and the tools that you can use to both understand and plan your network effectively. In particular you will learn how network impact is not just measured in traffic volume. This common misconception leads to far too many network utilization issues. Often network latency and dropped packets are more likely caused by the types of traffic and how they are handled. But there are straightforward methods to identify this situation and enable you to choose a resolution that fits your requirements. All Traffic is Not Created Equal You ve watched video over the Internet. But have you ever wondered how the video renders seamlessly in your browser? We take it for granted that once the video starts it plays smoothly and without major interruptions. Delays and rebuffering errors have decreased exponentially over the last few years as a direct result of three factors: increased bandwidth, lower latency, and better codecs. Under the covers, Internet-based video can consume a ton of bandwidth. It is easy for a network administrator to blame video content for poor network performance and block it from her infrastructure. But video isn t really to blame. Most codecs and applications treat video transfer as low-priority traffic. Now consider the use of PC-based video and audio conferencing systems like Go To Meeting or Microsoft Live Meeting. How is it that the performance for these applications remains acceptable even when the network is very busy? It is a result of the previously mentioned factors and also that network traffic with a higher business value or less tolerant to network interruption is prioritized higher than other traffic. This type of behavior is usually referred to broadly as Quality of Service (QoS) and is implemented in most network components and hosts. For example, a network switch that encounters both Microsoft Live Meeting and YouTube traffic at the same time typically gives preference to the Live Meeting traffic because this traffic carries time-sensitive information such as interactive audio and video conversations. The switch may delay or drop the YouTube traffic if necessary to preserve the QoS of the Live Meeting stream. While this is probably a good thing, failing to account for this behavior during planning and operations causes confusion in capacity management and network performance analysis. A network manager might believe that a highly utilized network is impacting critical business functions when it actually is not. The best way to find out, as you ll see, is to test it out. 3 Testing Network Performance with Real Traffic
4 Understanding Traffic Impact on Infrastructure Most networks have a variety of traffic including video, audio, large data transfers, small data transfers, etc. Each of these uses, and indeed each application, may have a different expectation of network performance. Voice over IP (VoIP) applications expect very low network latency, and streaming video applications account for higher latency and dropped packets. While this statement seems obvious, it is different for each network, and does not actually apply to some implementations. Your business places an importance on different traffic types that is unique to your business model, users, management, etc. The use of different traffic types and the requirements for the performance of each type are the two components that should guide your network analysis and planning. Notice that I didn t mention traffic capacity. Actually, raw network traffic capacity is becoming less of a concern in today s infrastructure. Surplus capacity is prevalent. But that doesn t mean everything works perfectly. Testing Networks with Accurate Traffic Simulations To actually find out whether networks are handing your unique requirements as expected, you need to test them with the kind of traffic that is in use on your network today. Throwing random packets onto the wire is fun, sure, but the test results are valid only when all users throw random packets onto the wire. As you can guess, very few networks are like that. For example, a common network traffic analysis might break down to look something like this: Figure 1: Network Traffic Utilization Your network testing needs to account for this pattern. Luckily there are two ways you can make this happen: replaying recorded network traffic and simulating the traffic types. This is the only way to accurately determine how far you can push your infrastructure before it fails to meet expectations. Accurate testing is also the only way to really determine whether a vendor s product will meet your needs, regardless of stated product specifications. 4 Testing Network Performance with Real Traffic
5 Before we get into the specifics of network testing procedures we need to define the network you will test on. The test network must accurately represent the production infrastructure. A common misconception is that the test network must be a 1:1 representation. The same components must exist if the test requires them, for example a switch, a bridge, a stateful inspection firewall, and so on. But a test network is nearly always a smaller scale. In my experience I ve only seen two test networks that were 1:1 mirrors of their production counterpart, and these were created for very specific reasons. Network Replay Testing This option is the most widely used because it has been available for years and is largely unchanged. To test, the network administrator records a sample of network traffic using a network monitoring device or software package such as Wireshark or Network Monitor. The sample needs to be large enough to accurately represent use of the network over time so it should be at least a day s worth and recorded from more than one point in the network. 5 Testing Network Performance with Real Traffic Figure 2: Wireshark Traffic info The recorded traffic sample is then taken to an isolated test network and replayed onto the wire. Performance is measured at the appropriate points such as the client, the switch, the Internet connection point, and so on. This test validates the network performance under as accurate a load as possible it is really what happened on the network. Most network administrators find value in further testing the network by performing a stress test. This test is actually very simple to implement with the recorded traffic: 1. Use the same infrastructure and recorded traffic as the performance test 2. Replay the recorded traffic from multiple systems simultaneously 3. Continue increasing the systems replaying traffic until something breaks 4. Analyze the break to learn the maximum capacity threshold, point of failure, and then predict possible future breaks The chief drawback to using recorded traffic to test network performance is that some traffic is time-bound and dynamic. As a result it will not accurately represent the network. One example of this is a momentary network condition that corrupts some traffic and causes applications to receive out of sequence packets. The error recovery
6 is very difficult to create using replay. Another challenge is time-stamped data. Many applications ensure that data is not compromised by an attacker by time-stamping it, and that traffic will likely not be valid during a replay attack. This could cause applications to both drop the suspect traffic and decrease network load, or go into a retry state and increase network load. Network Traffic Simulation Testing Simulating network traffic using a hardware or software traffic generator is both an old and new approach. Applications have been around for some time that randomly create valid network packets and put them on the wire. The packets can be somewhat customized to carry specific payload sizes; require routing, and other basic choices. Figure 3: Traffic Generators Previous network traffic generators were limited in what traffic they could generate and transmit. This was often due to limited computer or device computing power or network interface restrictions. As a result the older traffic generators were unable to truly flood a network segment or link. While this could still be useful for testing normal load, it could fall short of truly stress-testing a network or infrastructure. Another limit was the interface and usability of the actual appliance, which frequently required in-depth training to deploy correctly. Modern network traffic generators are far more useful than their predecessors. They are streamlined to take advantage of more computing and network interface resources and are more efficient than ever before. Commonplace operating systems like Windows have also opened up resources to applications that require this level of performance while maintaining a common look and feel. The result of these advancements is applicationstyle software that runs on Windows and is simple to use, yet can generate any style and volume of traffic, from small quantities of pseudo-random data to enough QoS-specific data to make even the most robust network break down and expose the weak points. The network traffic generator is particularly useful when you need to conduct realistic testing of unique network applications. It is often used in conjunction with functional testing. For example, to validate that VoIP performance is not impacted by other network traffic, you can perform this test: 6 Testing Network Performance with Real Traffic
7 1. Setup a test network with two VoIP clients, a VoIP server, and the intermediate network infrastructure and configuration that represents your environment 2. Establish a VoIP conversation using the same software or devices that are used in the production environment 3. Introduce a random traffic generator that creates common traffic on the same segment at the same volume as your typical network load 4. Turn up the traffic volume and packet size until the network is nearly saturated In this test the VoIP traffic is typically prioritized higher than the traffic coming from the generator. The expected result is that the VoIP conversation remains clear while the network infrastructure avoids jitter or packet loss for the VoIP packets. Other packets will likely drop or become delayed, but that s fine. It is the higher priority traffic that we are testing. A Word of Caution You surely already understand that a test network must be completely isolated from the production environment. This is not unique to network bandwidth testing pretty much any kind of stress test must be isolated to ensure it doesn t impact the rest of the IT infrastructure. But network playback and traffic generation testing evoke a somewhat unique response. Almost any firewall will slam shut and set off every alert it has when you begin these tests. It doesn t really matter whether the firewall runs on Windows, a router, a switch, a dedicated filter, or anything else. Firewalls are designed to detect and prevent exactly what you re intentionally doing during these tests. From a security view these tests often look identical to a denial of service (DoS) attack, many of which have profoundly impacted businesses. For that reason you will probably need to disable all firewalls in the test environment. And if, somehow, the test network is connected to the production network, you can expect a rapid and wholly unpleasant response to your test. 7 Testing Network Performance with Real Traffic
Hosted Voice. Best Practice Recommendations for VoIP Deployments
Hosted Voice Best Practice Recommendations for VoIP Deployments Thank you for choosing EarthLink! EarthLinks best in class Hosted Voice phone service allows you to deploy phones anywhere with a Broadband
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationVOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
More informationwhitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More information5 IPTV MONITORING BEST PRACTICES
5 IPTV MONITORING BEST PRACTICES Chances are you ve seen Internet Protocol TV (IPTV) but didn t know it. Different types of IPTV are popping up in our daily lives ranging from Video-On-Demand to being
More informationResilient Voice Architecture
Resilient Voice Architecture TM for Hosted Business Voice Learn how to ensure a robust, resilient and redundant Hosted PBX network TM with Teledynamic s Resilient Voice Architecture 1 Contents What is
More informationNetwork Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
More informationIP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
More informationHOSTED VOICE Bring Your Own Bandwidth & Remote Worker. Install and Best Practices Guide
HOSTED VOICE Bring Your Own Bandwidth & Remote Worker Install and Best Practices Guide 2 Thank you for choosing EarthLink! EarthLinks' best in class Hosted Voice phone service allows you to deploy phones
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationIs Your Network Ready for VoIP? > White Paper
> White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its
More informationA Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
More informationLucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
More information--------- Virtual Office. Network Tests. Revision 1.0. 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.
--------- Virtual Office Network Tests Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885
More information7 Questions to Ask Video Conferencing Providers
7 Questions to Ask Video Conferencing Providers CONTENTS Introduction...3 1. How many people can participate in your video conferences?...3 2. What kind of endpoints does the solution support or require?...4
More information5Get rid of hackers and viruses for
Reprint from TechWorld /2007 TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS # # # Load balancing is basically a simple task where
More informationCONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE
CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE Engineering Version 1.3 June 3, 2015 Table of Contents Foreword... 3 Current Network... 4 Understanding Usage/Personas... 4 Modeling/Personas...
More informationA SENSIBLE GUIDE TO LATENCY MANAGEMENT
A SENSIBLE GUIDE TO LATENCY MANAGEMENT By Wayne Rash Wayne Rash has been writing technical articles about computers and networking since the mid-1970s. He is a former columnist for Byte Magazine, a former
More informationVoice over IP Networks: Ensuring quality through proactive link management
White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity
More informationCustomer Network Assessment
--------- Customer Network Assessment Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 Contents Important Notes for all Tests...
More informationNEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
More informationSimplify VoIP Network Setup and Troubleshooting with NetTool VoIP
Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP Introduction As businesses search for new ways to cut costs and increase efficiency, they are moving their phone systems to VoIP (voice
More informationAccess the Test Here http://myspeed.visualware.com/index.php
VoIP Speed Test Why run the test? Running a VoIP speed test is an effective way to gauge whether your Internet connection is suitable to run a hosted telephone system using VoIP technology. A number of
More informationHow To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
More informationFrequently Asked Questions about Integrated Access
Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the
More informationHow Network Transparency Affects Application Acceleration Deployment
How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration
More informationObserver Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
More informationJuly, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.
Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local
More informationVoice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more
More informationVoice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationFive Hosted VoIP Features
Five Hosted VoIP Features WHITEPAPER: three FUNDAMENTALS for consistently good voip call quality www.megapath.com Every week, businesses across the country are converting to Voice over IP (VoIP) communication
More informationCreating Business-Class VoIP: Ensuring End-to-End Service Quality and Performance in a Multi-Vendor Environment. A Stratecast Whitepaper
: Ensuring End-to-End Service Quality and Performance in a Multi-Vendor Environment A Executive Summary Creating Business-Class VoIP Traditional voice services have always been reliable, available, and
More informationVoice Quality: The Ultimate Differentiator in VoIP Providers
Business Phone Service Quality Voice Quality: The Ultimate Differentiator in VoIP Providers By Robert Conner, CEO of sipvine, Inc. Alternative providers of business phone services are now entrenched in
More informationNetwork Instruments white paper
Network Instruments white paper MONITORING SERVICE DELIVERY IN AN MPLS ENVIRONMENT A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee highbandwidth capacity
More information--------- Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.
--------- Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 Contents Important Notes for all Tests... 3 Tests and
More informationOn the Edge: A Hybrid Approach to Cloud Communications for SMBs
On the Edge: A Hybrid Approach to Cloud Communications for SMBs Table of Contents Introduction....3 The QoS Problem....3 Edge Devices...4 QoS Techniques Multiservice Business Gateways Hybrid Deployments....5
More informationToll-bypass Long Distance Calling... 1. What Is VOIP?... 2. Immediate Cost Savings... 3. Applications... 3. Business Quality Voice...
telephony internet access remote access modems Content Toll-bypass Long Distance Calling... 1 What Is VOIP?... 2 That Was Then... This is Now... Immediate Cost Savings... 3 Applications... 3 Office-to-office
More informationWireless Network Quality of Service WHITE PAPER
Wireless Network Quality of Service WHITE PAPER Executive Summary Most wireless deployments rely on cellular data networks for connectivity, which have bandwidth constraints. The quality of service (QoS)
More informationIVCi s IntelliNet SM Network
IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class
More informationKnowledge Is Power: Do what s best for the client.
Knowledge Is Power: Do what s best for the client. 1. Understanding Voice and Data Differences Even when they are carried on the same network, voice traffic and data traffic cannot be handled the same
More informationStrata CTX IP Telephone Programming Guidelines
TOSHIBA OFFICE PRODUCTS GROUP COPIERS FAX TELEPHONES PROJECTORS Technical Support TECHNICAL INFORMATION BULLETIN TTB 03-5 08/14/03 Strata CTX IP Telephone Programming Guidelines This bulletin contains
More informationMICROSOFT LYNC 101: ENSURE UC EVERYTHING
MICROSOFT LYNC 101: ENSURE UC EVERYTHING Although the Microsoft Lync platform is somewhat of a newcomer to the unified communications world, it has turned a lot of network heads. Teams with significant
More informationWhite Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
More informationVoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationVOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
More informationThe Financial Benefits of Using LiveAction Software for Network QoS
White Paper The Financial Benefits of Using LiveAction Software for Network QoS How implementing network quality of service management can provide quantifiable cost savings, improved profitability and
More informationMULTIPOINT VIDEO CALLING
1 A Publication of 2 VIDEO CONFERENCING MADE SIMPLE. TELEMERGE S ALL-IN-ONE VIDEO COLLABORATION Everything you need to enable adoption, right here. Request A Demo Learn More THE FOUR PILLARS Telemerge
More informationWhitepaper. A Guide to Ensuring Perfect VoIP Calls. www.sevone.com blog.sevone.com info@sevone.com
A Guide to Ensuring Perfect VoIP Calls VoIP service must equal that of landlines in order to be acceptable to both hosts and consumers. The variables that affect VoIP service are numerous and include:
More informationDEPLOYING VoIP SECURELY
DEPLOYING VoIP SECURELY Everyone knows that Voice-over-IP (VoIP) has been experiencing rapid growth. Even still, you might be surprised to learn that: 10% of all voice traffic is now transmitted with VoIP
More informationClearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
More informationATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.
KEY VOIP TERMS 1 ACD: Automatic Call Distribution is a system used to determine how incoming calls are routed. When the ACD system receives an incoming call it follows user-defined specifications as to
More informationTesting Packet Switched Network Performance of Mobile Wireless Networks IxChariot
TEST PLAN Testing Packet Switched Network Performance of Mobile Wireless Networks IxChariot www.ixiacom.com 915-6649-01, 2006 Contents Testing Packet Switched Network Performance of Mobile Wireless Networks...3
More informationMonitoring Service Delivery in an MPLS Environment
Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationTraffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
More informationLab Testing Summary Report
Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection
More informationManaging Data, Voice, and Converged IP Networks
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Managing Data, Voice, and Converged IP Networks April 2005 Adapted
More informationUsing the ClearSight Analyzer To Troubleshoot the Top Five VoIP Problems And Troubleshooting Streaming Video
Using the ClearSight Analyzer To Troubleshoot the Top Five VoIP Problems And Troubleshooting Streaming Video With the prevalence of Voice over IP applications within the enterprise, it is important to
More informationMulti-layered Security Solutions for VoIP Protection
Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper
More informationVoice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
More informationVoice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
More informationReasons to Choose the Juniper ON Enterprise Network
Reasons to Choose the Juniper ON Enterprise Network Juniper s enterprise access products meet the always-on needs of today s enterprises by delivering solutions that are reliable, simple, and smart. The
More informationCIR (down/up) 256k/64k 320k/96k 384k/128k. Throughput allowance 2 GB 4 GB 6 GB. (down/up) in unexpectedly high fees.
Broadband Satellite: Enterprise Class or Cookie Cutter? There are a wide range of broadband satellite services available from a wide variety of network operators. What are the differences between them?
More informationReceiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
More informationBusiness Telephone Systems What Options are Right for My Business?
Business Telephone Systems What Options are Right for My Business? A business phone system is the lifeblood of any successful business and whether you are setting up a new office or remote location, or
More informationVoIP Solutions Guide Everything You Need to Know
VoIP Solutions Guide Everything You Need to Know Simplify, Save, Scale VoIP: The Next Generation Phone Service Ready to Adopt VoIP? 10 Things You Need to Know 1. What are my phone system options? Simplify,
More informationVoice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
More informationYOUR QUESTIONS ANSWERED. A Practical Guide to VoIP for Small Businesses
YOUR QUESTIONS ANSWERED A Practical Guide to VoIP for Small Businesses FACING UP TO THE CHALLENGES. 1 What you need to know. Now. Your business is growing. Your customers expect great service. Your employees
More informationQuality of Service Testing in the VoIP Environment
Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,
More informationSelecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events
Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events Often, the only way to get to the root cause of unwelcome or intermittent events that occur on
More informationWhen Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING. www.pecb.com
When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING www.pecb.com Imagine a working environment comprised of a number of switches, routers, some terminals and file servers. Network
More informationAT&T Connect Video conferencing functional and architectural overview
AT&T Connect Video conferencing functional and architectural overview 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
More information5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
More informationIP Office: Simple, Powerful Communications for Small and Medium Size Businesses
IP Office: Simple, Powerful Communications for Small and Medium Size Businesses Successful companies are always looking for new ways to do more with less keeping their business flexible, innovative and
More informationVoIP 101: An introduction to the basics of Voice over Internet Protocol. How to guide
VoIP 101: An introduction to the basics of Voice over Internet Protocol How to guide Introduction You may have heard of VoIP that it s the future of telephone service, and that you can save a lot of money
More informationSecure VoIP for optimal business communication
White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product
More information12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, prajaks@buu.ac.th
More informationAchieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
More informationTroubleshooting VoIP and Streaming Video Problems
Using the ClearSight Analyzer to troubleshoot the top five VoIP problems and troubleshoot Streaming Video With the prevalence of Voice over IP and Streaming Video applications within the enterprise, it
More informationAdvanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
More informationDeploying Probes and Analyzers in an Enterprise Environment
Network Instruments White Paper Deploying Probes and Analyzers in an Enterprise Environment As an IT manager, you need visibility into every corner of the network, from the edge to the core. A distributed
More informationWHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY?
WHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY? CHOOSINGTHERIGHTWIDEAREANETWORKSOLUTION FORYOURMULTI-LOCATIONENTERPRISE ExecutiveBrief P a g e 1 Executive Brief What are the Key Benefits of MPLS Technology? Choosing
More informationBusiness case for VoIP Readiness Network Assessment
Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The
More informationSafeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
More informationBest Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
More informationWhite Paper. A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP
White Paper A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP The positive impact that hosted VoIP can have
More informationnetworks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER
Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery - Improving the way the world connects - WHITE PAPER Live On-Demand Video Streaming without Interruption
More informationEthernet Switch Evaluation For Streaming Media Multicast Applications
Ethernet Switch Evaluation For Streaming Media Multicast Applications Introduction In addition to many criteria relating to standards compliance, packet forwarding performance, layer 3 and 4 route discovery
More informationHow To: Diagnose Poor VoIP Calls through diagnostics.
How To: Diagnose Poor VoIP Calls through diagnostics. When problems arise with poor VoIP phone calls, where do you start looking to troubleshoot the issue? This is one of the many challenges of managing
More informationNetwork Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
More informationCISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS
CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS INTERNET TECHNOLOGIES DIVISION JANUARY 2005 1 Cisco IOS IP Service Level Agreements Presentation Agenda Overview
More informationADVANTAGES OF AV OVER IP. EMCORE Corporation
ADVANTAGES OF AV OVER IP More organizations than ever before are looking for cost-effective ways to distribute large digital communications files. One of the best ways to achieve this is with an AV over
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationBusiness Phone Security. Threats to VoIP and What to do about Them
Business Phone Security Threats to VoIP and What to do about Them VoIP and Security: What You Need to Know to Keep Your Business Communications Safe Like other Internet-based applications, VoIP services
More informationSecurity and the Mitel Teleworker Solution
Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks
More informationGetting Started with. Avaya TM VoIP Monitoring Manager
Getting Started with Avaya TM VoIP Monitoring Manager Contents AvayaTM VoIP Monitoring Manager 5 About This Guide 5 What is VoIP Monitoring Manager 5 Query Endpoints 5 Customize Query to Filter Based
More information10 QUESTIONS TO ASK BEFORE YOU BUY PHONE SERVICE FOR YOUR BUSINESS SHARE THIS DOCUMENT 1
10 QUESTIONS TO ASK BEFORE YOU BUY PHONE SERVICE FOR YOUR BUSINESS SHARE THIS DOCUMENT 1 TELEPHONE SERVICE TELEPHONE SERVICE Telephone service continues to be a critical factor to business success. What
More information