Analog Interfaces

A gateway can have many types of analog interfaces FXS (Foreign Exchange Station), FXO (Foreign Exchange Office), and E& M (Earth and Magneto or Ear and Mouth). An FX connection has a station and an office end. The office end (FXO) provides services such as battery, dial tone, digit collection, and ringing to the other end, namely the station (FXS). The FXS interface of a gateway is meant for analog phones, fax machines, and modems. To those devices, the gateway acts like the PSTN central...

Applying Link Efficiency Mechanisms

Link efficiency mechanisms discussed in this section might not be necessary on all interfaces and links. It is important that you identify network bottlenecks and work on the problem spots. On fast links, many link efficiency mechanisms are not supported, and if they are, they might have negative results. On slow links and where bottlenecks are recognized, you must calculate the overhead-to-data ratios and consider all compression options. On some links, you can perform full link compression....

Automation with Cisco AutoQoS

Cisco AutoQoS is capable of performing the following tasks and might generate appropriate configurations to accomplish them Defining the trust boundaries (or extended trust boundaries) and re-marking incoming traffic on trusted and untrusted links Defining traffic classes based on the applications and protocols discovered in the network Creating queuing mechanisms with proper configurations such as bandwidth guarantee for each traffic type, based on the DiffServ model Enabling...

Basic Voice Encoding Converting Analog to Digital

Converting analog voice signal to digital format and transmitting it over digital facilities (such as T1 E1) had been created and put into use before Bell (a North American telco) invented VoIP technology in 1950s. If you use digital PBX phones in your office, you must realize that one of the first actions that these phones perform is converting the analog voice signal to a digital format. When you use your regular analog phone at home, the phone sends analog voice signal to the telco CO. The...

Basic Voice Encoding Converting Digital to Analog

When a switch or router that has an analog device such as a telephone, fax, or modem connected to it receives a digital voice signal, it must convert the analog signal to digital or VoIP before transmitting it to the other device. Figure 1-5 shows that router R1 receives an analog signal and converts it to digital, encapsulates the digital voice signal in IP packets, and sends the packets to router R2. On R2, the digital voice signal must be de-encapsulated from the received packets. Next, the...

Benefits of Packet Telephony Networks

Many believe that the biggest benefit of packet telephony is toll bypass, or simply long-distance cost savings. However, because the cost of a long-distance call to most parts of the world has decreased substantially, this is not even one of the top three reasons for migrating to packet telephony networks in the North American market. The main benefits of packet telephony networks are as follows More efficient use of bandwidth and equipment, and lower transmission costs Packet telephony...

C

CAC (call admission control), 15, 49, 69 calculating bandwidth for VoIP, 34-42 call control models, 16-19 processing, 45 routing, 15 call admission control, 15, 49, 69 campus maps, adding, 310-312 campus networks, QoS, 188-190 carrier sense multiple access collision avoid (CSMA CA), 236-235 carrier sense multiple access collision detect (CSMA CD), 236 CAS (channel associated signaling), 14 CBWFQ (Class-Based Weighted Fair Queuing), 138-139 benefits drawbacks, 140 classification, 139-140...

Chapter

Autonomous access points are configured individually. They require individual configuration because each access point operates independently. However, centralized configuration, monitoring, and management can be done through CiscoWorks WLSE. WDS provides the radio monitoring and management communication between the autonomous access points and CiscoWorks WLSE. A WLAN Controller configures and controls lightweight access points. The lightweight access points depend...

Cisco IOS Policing and Shaping Mechanisms

Cisco IOS offers class-based traffic policing. Using modular QoS command-line interface (MQC), class-based traffic policing is applied to a class within a policy map with the police command. As stated in the previous section, Cisco IOS offers different Token Bucket schemes for policing single bucket single rate, dual bucket single rate, and dual bucket dual rate. Furthermore, multiaction policing meaning taking multiple actions when traffic conforms, exceeds, or violates is also supported by...

Cisco Unified Call Manager Functions

Cisco CallManager (CCM) is call processing software it is the main component of the Cisco Unified Communication System. CCM supports the MGCP, H.323, SIP, and SCCP IP Telephony signaling protocols. Within the MGCP context, CCM acts as the CA and controls MGCP gateways, and within the SCCP context, it controls the IP phones (Skinny Clients). CCM interacts with H.323 and SIP devices. Cisco CallManager version 5.0 supports SIP clients, such as SIP-based IP phones. CallManager servers form a...

Cisco Unified Wireless Networks

The Cisco Unified Wireless Network is a total-enterprise solution composed of five comprehensive elements. The Cisco Unified Wireless Network enables the use of advanced wireless services and addresses security concerns. It also addresses deployment, control, and the management of WLAN components and RF. Following are the five elements of Cisco Unified Wireless Network Client devices Use the Cisco Compatible Extensions program to help ensure interoperability. The Cisco Compatible Extensions...

Cisco VoIP Implementations

This chapter describes Cisco Voice over IP (VoIP) implementations. Expect to see several exam questions based on the material in this chapter. This chapter has five major topics. The first topic helps you understand the basic components of VoIP networks and the benefits of VoIP networks. The second topic is about converting an analog voice signal to a digital voice signal and the concepts of sampling, quantization, compression, and digital signal processors (DSP). The third section discusses...

Cisco Wireless Control System

Cisco WCS is an advanced centralized WLAN solution for LWAPs. It provides configuration, firmware, radio management, and IDS for LWAP and their associated controllers. The same configuration, performance monitoring, security, fault management, and accounting options found on the individual controllers also exist on the WCS. It is designed to support 50 Cisco WLCs and 1500 APs. Administrators can define operator permissions within the administration menu where accounts and maintenance tasks are...

Cisco Works Wireless LAN Solution Engine

CiscoWorks WLSE is part of the CiscoWorks network management products. CiscoWorks WLSE provides centralized management for autonomous APs. WLANs benefit from the WLSE major features such as configuration, fault and policy monitoring, reporting, firmware, and radio management. In addition, the RF and device-management features help reduce operating expenses and deployment. CiscoWorks WLSE covers fault, configuration, and performance management, which are three of the FCAPS (Fault, Configuration,...

Cisco Works WLSE and WLSE Express

Two versions of CiscoWorks WLSE are available based on the network sizes WLSE and WLSE Express. WLSE is for medium to large enterprise WLAN solutions with up to 2500 managed devices. WLSE requires an external AAA server such as a Cisco ACS server since the WLSE does not include one. CiscoWorks WLSE Express includes AAA providing security services that support 802.1x LEAP, Protected Extensible Authentication Protocol (PEAP), Extensible Authentication Protocol-Flexible Authentication via Secure...

Class Based Weighted Fair Queuing

CBWFQ addresses some of the limitations of PQ, CQ, and WFQ. CBWFQ allows creation of user-defined classes, each of which is assigned to its own queue. Each queue receives a user-defined (minimum) bandwidth guarantee, but it can use more bandwidth if it is available. In contrast to PQ, no queue in CBWFQ is starved. Unlike PQ and CQ, you do not have to define classes of traffic to different queues using complex access lists. WFQ does not allow creation of user-defined classes, but CBWFQ does...

Classification and Marking

With QoS, you intend to provide different treatments to different classes of network traffic. Therefore, it is necessary to define traffic classes by identifying and grouping network traffic. Classification does just that it is the process or mechanism that identifies traffic and categorizes it into classes. This categorization is done using traffic descriptors. Common traffic descriptors are any of the following Ingress (or incoming) interface CoS value on ISL or 802.1p frame Source or...

Command Syntax Conventions

The conventions used to present command syntax in this book are the same ones used in the IOS Command Reference. The Command Reference describes these conventions as follows Boldface indicates commands and keywords that are entered literally as shown. In actual configuration examples and output (not general command syntax), boldface indicates commands that are manually input by the user (such as a show command). Italics indicate arguments for which you supply actual values. Vertical bars ( )...

Common AutoQoS Problems

AutoQoS was developed to automate QoS configuration for common enterprise network scenarios. Therefore, the configuration that AutoQoS yields does not necessarily suit and satisfy the requirements of every network. Following are the three most common Cisco AutoQoS issues that might arise Too many traffic classes are generated classification is overengineered. The configuration that AutoQoS generates does not adapt automatically to changing network traffic conditions. The configuration that...

Congestion Avoidance

Congestion avoidance is used to avoid tail drop, which has several drawbacks. RED and its variations, namely WRED and CBWRED, are commonly used congestion-avoidance techniques used on Cisco router interfaces. Congestion avoidance is one of the main pieces of a QoS solution. When the hardware queue (transmit queue, TxQ) is full, outgoing packets are queued in the interface software queue. If the software queue becomes full, new arriving packets are tail-dropped by default. The packets that are...

Congestion Avoidance Policing Shaping and Link Efficiency Mechanisms

This chapter intends to give you an overview of three main quality of service (QoS) concepts congestion avoidance, traffic shaping and policing, and link efficiency mechanisms. Each concept is presented in its own section. WRED and class-based WRED are the main mechanisms covered in the Congestion Avoidance section. Traffic shaping and policing concepts are explained in the second section you will learn the purpose of these mechanisms and where it is appropriate to use them. Different...

Contents

Chapter 1 Cisco VoIP Implementations 5 Do I Know This Already Quiz 5 Foundation Topics 10 Introduction to VoIP Networks 10 Benefits of Packet Telephony Networks 10 Packet Telephony Components 11 Analog Interfaces 13 Digital Interfaces 14 Stages of a Phone Call 15 Distributed Versus Centralized Call Control 16 Digitizing and Packetizing Voice 19 Basic Voice Encoding Converting Analog to Digital 19 Basic Voice Encoding Converting Digital to Analog 20 The Nyquist Theorem 21 Quantization 22...

Contents at a Glance

Chapter 1 Cisco VoIP Implementations 5 Part II Quality of Service 55 Chapter 3 Classification, Marking, and NBAR 93 Chapter 4 Congestion Management and Queuing 123 Chapter 5 Congestion Avoidance, Policing, Shaping, and Link Efficiency Mechanisms 149 Chapter 6 Implementing QoS Pre-Classify and Deploying End-to-End QoS 177 Chapter 8 Wireless LAN QoS Implementation 231 Chapter 9 Introducing 802.1x and Configuring Encryption and Authentication on Lightweight Access Points 255 Appendix A Answers to...

Converged Network Issues Related to QoS

A converged network supports different types of applications, such as voice, video, and data, simultaneously over a common infrastructure. Accommodating these applications that have different sensitivities and requirements is a challenging task on the hands of network engineers. The acceptable end-to-end delay for the Voice over IP (VoIP) packets is 150 to 200 milliseconds (ms). Also, the delay variation or jitter among the VoIP packets must be limited so that the buffers at the receiving end...

Definition of QoS and the Three Steps to Implementing It

Following is the most recent definition that Cisco educational material provides for QoS QoS is the ability of the network to provide better or special service to a set of users or applications or both to the detriment of other users or applications or both. The earliest versions of QoS tools protected data against data. For instance, priority queuing made sure packets that matched an access list always had the right of way on an egress interface. Another example is WFQ, which prevents small...

Deploying Endto End QoS

End-to-end QoS means that all the network components between the end points of a network communication dialogue need to implement appropriate QoS mechanisms consistently. If, for example, an enterprise (customer) uses the services and facilities of a service provider for connectivity between its headquarters and branch offices, both the enterprise and the service provider must implement the proper IP QoS mechanisms. This ensures end-to-end QoS for the packets going from one enterprise location...

Differentiated Services Model

Differentiated Services (DiffServ) is the newest of the three QoS models, and its development has aimed to overcome the limitations of its predecessors. DiffServ is not a guaranteed QoS model, but it is a highly scalable one. The Internet Engineering Task Force (IETF) description and discussion on DiffServ are included in RFCs 2474 and 2475. Whereas IntServ has been called the Hard QoS model, DiffServ has been called the Soft QoS model. IntServ, through usage of signaling and admission control,...

Digital Interfaces

Gateways can also connect to telco and PBX switches using digital interfaces. A gateway can have BRI or T1 E1 digital interfaces. Using a T1 connection is common in North America, whereas E1 lines are more common in Europe. You can configure the T1 E1 interface controller as an ISDN PRI or as Channelized T1 E1 and use channel associated signaling (CAS). BRI and PRI interfaces use common channel signaling (CCS), where a D (Delta) channel is dedicated to a messaging style of signaling, such as...

Digital Signal Processors

Voice-enabled devices such as voice gateways have special processors called DSPs. DSPs are usually on packet voice DSP modules (PVDM). Certain voice-enabled devices such as voice network modules (VNM) have special slots for plugging PVDMs into them. Figure 1-8 shows a network module high density voice (NM-HDV) that has five slots for PVDMs. The NM in Figure 1-8 has four PVDMs plugged into it . Different types of PVDMs have different numbers of DSPs, and each DSP handles a certain number of...

Digitizing and Packetizing Voice

Upon completion of this section, you will be able to identify the steps involved in converting an analog voice signal to a digital voice signal, explain the Nyquist theorem, the reason for taking 8000 voice samples per second and explain the method for quantization of voice samples. Furthermore, you will be familiar with standard voice compression algorithms, their bandwidth requirements, and the quality of the results they yield. Knowing the purpose of DSP in voice gateways is the last...

Distributed Versus Centralized Call Control

Two major call control models exist distributed call control and centralized call control. The H.323 and SIP protocols are classified as distributed, whereas the MGCP protocol is considered as a centralized call control VoIP signaling protocol. In the distributed model, multiple devices are involved in setup, maintenance, teardown, and other aspects of call control. The voice-capable devices that perform these tasks have the intelligence and proper configuration to do so. Figure 1-3 shows a...

Do I Know This Already Quiz

The purpose of the Do I Know This Already quiz is to help you decide whether you really need to read this entire chapter. The 20-question quiz, derived from the major sections of this chapter, helps you determine how to spend your limited study time. Table 1-1 outlines the major topics discussed in this chapter and the Do I Know This Already quiz questions that correspond to those topics. You can keep track of your score here, too. Table 1-1 Do I Know This Already Foundation Topics...

Effects of VAD on Bandwidth

VAD is a feature that is available in voice-enabled networks. VAD detects silence (speech pauses) and one-way audio and does not generate data as a result, it produces bandwidth savings. This does not happen in circuit-switched voice networks such as the PSTN, where a channel (usually a 64 Kbps DS0) is dedicated to a call regardless of the amount of activity on that circuit. It is common for about one-third of a regular voice call to be silence therefore, the concept of VAD for bandwidth saving...

Endto End Delay

There are different types of delay from source to destination. End-to-end delay is the sum of those different delay types that affect the packets of a certain flow or application. Four of the important types of delay that make up end-to-end delay are as follows Processing delay is the time it takes for a device such as a router or Layer 3 switch to perform all the tasks necessary to move a packet from the input (ingress) interface to the output (egress) interface. The CPU type, CPU utilization,...

Endto End Delivery of Voice

To review the traditional model of voice communication over the PSTN, imagine a residential phone that connects to the telco CO switch using an analog telephone line. After the phone goes off-hook and digits are dialed and sent to the CO switch, the CO switch, using a special signaling protocol, finds and sends call setup signaling messages to the CO that connects to the line of the destination number. The switches within the PSTN are connected using digital trunks such as T1 E1 or T3 E3. If...

Enterprise IP Telephony Deployment Models

Many IP Telephony deployment options, utilizing Cisco Unified CallManager, are available. The option that is suitable for an enterprise depends on the organization of that enterprise, its business strategy, budget, and objectives. You can deploy the options presented here in combination (hybrid models) or slightly differently. The four main options are as follows Multisite with centralized call processing Multisite with distributed call processing

Enterprise Voice Implementations

The main telephony elements of an enterprise Cisco VoIP implementation are gateway, gatekeeper, Cisco Unified CallManager, and Cisco IP phones. Cisco IP phones need CallManager, because it acts as an IP PBX for the Cisco IP phones. The gateways provide connectivity between analog, digital, and IP-based telephony devices and circuits. Gatekeeper is an H.323 device that provides call routing or CAC services. Enterprise voice implementations can vary based on many factors. One of those factors is...

F

Fair-queue 16 command, 141 fair-queue command, 135 FastTrack traffic, NBAR, 116-117 fault monitoring, WLSE, 295 FECN (forward explicit congestion DiffServ, 100 EXP (MPLS), 100 inner QoS, 241 Over the Air QoS, 245 FIFO (first in, first out), 128-132 filters, MAC, 259 firmware, WLSE, 295 first in, first out, 128-132 Foreign Exchange Office (FXO), 13 Foreign Exchange Station (FXS), 13 forward explicit congestion notification AutoQoS, 209 important packets first, 66 four-way handshakes, 264 fragile...

Features of This Book

Do I Know This Already Quizzes Each chapter begins with a quiz that helps you determine the amount of time you need to spend studying that chapter. If you follow the directions at the beginning of the chapter, the Do I Know This Already quiz directs you to study all or particular parts of the chapter. Foundation Topics These are the core sections of each chapter. They explain the protocols, concepts, and configuration for the topics in that chapter. If you need to learn about the topics in a...

Feedback Information

At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community. Readers' feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book or otherwise alter it to better suit your needs, you can contact us through e-mail at...

Foundation Summary

The Foundation Summary is a collection of information that provides a convenient review of many key concepts in this chapter. If you are already comfortable with the topics in this chapter, this summary can help you recall a few details. If you just read this chapter, this review should help solidify some key facts. If you are doing your final preparation before the exam, the information in this section is a convenient way to review the day before the exam. Benefits of packet telephony networks...

Goals and Methods

The most important and somewhat obvious goal of this book is to help you pass the Optimizing Converged Cisco Networks (ONT) exam 642-845. In fact, if the primary objective of this book were different, the book title would be misleading however, the methods used in this book to help you pass the ONT exam are also designed to make you much more knowledgeable about how to do your job. Although this book and the accompanying CD-ROM together have more than enough questions to help you prepare for...

Header Compression

Header compression reduces serialization delay and results in less bandwidth usage, yielding more throughput and more available bandwidth. As the name implies, header compression compresses headers only for example, RTP header compression compresses Real-time Transport Protocol (RTP), User Datagram Protocol (UDP), and IP headers, but it does not compress the application data. This makes header compression especially useful for cases in which application payload size is small. Without header...

How This Book Is Organized

Although you can read this book cover to cover if you want to, it is designed to be flexible and allow you to easily move between chapters and sections of chapters to cover just the material that you need more work with. Chapter 1 of this book matches the Cisco VoIP Implementations module of the Cisco ONT official training curriculum. Chapter 2 of this book matches the Introduction to IP QoS module of the Cisco ONT official training curriculum. Chapters 3, 4, 5, and 6 of this book match the...

Identifying Voice Commands in IOS Configurations

Cisco routers that have proper interfaces can be configured to provide connectivity between analog or digital telephony devices over an IP network they are called voice gateways in those circumstances. Figure 1-16 shows two voice gateways, R1 and R2, each with an analog phone connected to its FXS interface. To provide connectivity between the two phones over the IP network, in addition to basic configurations, each of the routers (gateways) needs one plain old telephone service (POTS) and one...

Implementing and Verifying AutoQoS

Before you implement AutoQoS and enable it on router interfaces, it is useful to know the router AutoQoS deployment restrictions. Some design considerations are also worth learning with regard to deploying AutoQoS on routers. Finally, you must know the prerequisites for configuring AutoQoS on Cisco routers. You can enable Cisco AutoQoS Enterprise on certain types of interfaces and permanent virtual circuits (PVCs) only. These are the interface and PVC types on which you can enable AutoQoS...

Implementing QoS Pre Classify

QoS pre-classify was designed so that tunneled interfaces could classify packets on the output interface before data was encrypted and tunneled. Considering the growth of VPN popularity, the ability to classify traffic within a tunnel for QoS purposes is increasingly in demand. QoS pre-classify allows Cisco IOS QoS features and services to remain effective even on tunnel interfaces and when encryption is used. Therefore, service providers and customers can continue to provide appropriate...

Info

In the first scenario displayed in Figure 3-6, the trust boundary is placed on the Cisco IP phone. The phone sets resets the CoS field to 0 (000 binary) for the frames it receives from the PC as it forwards them to the switch. The CoS value on the IP phone-generated frames that are carrying voice signaling is set to 3 (011 binary), and it is set to 5 (101 binary) for those that are carrying voice. The access switch is configured to trust the markings of the traffic received on the port that the...

Integrated Services Model

The Integrated Services (IntServ) model, developed in the mid-1990s, was the first serious attempt to provide end-to-end QoS, which was demanded by real-time applications. IntServ is based on explicit signaling and managing reserving network resources for the applications that need it and demand it. IntServ is often referred to as Hard-QoS, because Hard-QoS guarantees characteristics such as bandwidth, delay, and packet loss, thereby providing a predictable service level. Resource Reservation...

Interpreting and Modifying AutoQoS Configurations

The show auto qos command displays all the QoS mechanisms (and the corresponding configurations) that Cisco AutoQoS has enabled on a router, with or without autodiscovery. Therefore, you can inspect all the QoS templates that were generated as a result of applying Cisco AutoQoS. You can gather several particular facts from the output of the show auto qos command, the most important of which are these The number of traffic classes. The classification options used. The traffic markings performed....

Layer 2 12 QoS Mpls Exp Field

MPLS packets are IP packets that have one or more 4-byte MPLS headers added. The IP packet with its added MPLS header is encapsulated in a Layer 2 protocol data unit (PDU) such as Ethernet before it is transmitted. Therefore, the MPLS header is often called the SHIM or layer 2 1 2 header. Figure 3-3 displays an MPLS-IP packet encapsulated in an Ethernet frame. The EXP (experimental) field within the MPLS header is used for QoS purposes. The EXP field was designed as a 3-bit field to be...

Layer 2 Payload Compression

Layer 2 payload compression, as the name implies, compresses the entire payload of a Layer 2 frame. For example, if a Layer 2 frame encapsulates an IP packet, the entire IP packet is compressed. Layer 2 payload compression is performed on a link-by-link basis it can be performed on WAN connections such as PPP, Frame Relay, high-level data link control (HDLC), X.25, and Link Access Procedure, Balanced (LAPB). Cisco IOS supports Stacker, Predictor, and Microsoft Point-to-Point Compression (MPPC)...

Legacy Command Line Interface CLI

Legacy CLI was the method used up to about six years ago to implement QoS on network devices. Legacy CLI requires configuration of few to many lines of code that for the most part would have to be applied directly at the interface level. Configuration of many interfaces required a lot of typing or cutting and pasting. Maintaining consistency, minimizing errors, and keeping the configuration neat and understandable were difficult to do using legacy CLI. Legacy CLI configuration required the user...

Link Efficiency Mechanisms

The main link efficiency mechanisms deployed today are compression- and fragmentation-based. There are several types of compression link compression, layer 2 payload compression, RTP header compression, and TCP header compression. Fragmentation is usually combined with interleaving. Compression makes link utilization more efficient, and it is a QoS technique that actually makes more bandwidth available. Fragmentation aims at reducing the expected delay of packets by reducing the maximum packet...

Low Latency Queuing

Neither WFQ nor CBWFQ can provide guaranteed bandwidth and low-delay guarantee to selected applications such as VoIP that is because those queuing models have no priority queue. Certain applications such as VoIP have a small end-to-end delay budget and little tolerance to jitter (delay variation among packets of a flow). LLQ includes a strict-priority queue that is given priority over other queues, which makes it ideal for delay and jitter-sensitive applications. Unlike the plain old PQ,...

Measuring Traffic Rates

The operating systems on Cisco devices measure traffic rates using a bucket and token scheme. The token and bucket scheme has a few variations single bucket with single rate, dual bucket with single rate, and dual bucket with dual rates. The Cisco ONT course covers only the single bucket with single rate model. To transmit one byte of data, the bucket must have one token. Tokens are put into the bucket at the rate equivalent to the SLA rate for example, for a Frame Relay virtual circuit, the...

Modular QoS Command Line Interface MQC

Cisco introduced MQC to address the shortcomings of the legacy CLI and to allow utilization of the newer QoS tools and features available in the modern Cisco IOS. With the MQC, traffic classification and policy definition are done separately. Traffic policies are defined after traffic classes. Different policies might reference the same traffic classes, thereby taking advantage of the modular and reusable code. When one or more policies are defined, you can apply them to many interfaces,...

Multisite with Centralized Call Processing Model

In the multisite with centralized call processing model, the Cisco Unified CallManager (CCM) cluster and application servers are placed at one of the sites usually a main or central site. This IP Telephony solution spans multiple sites in other words, all devices such as IP phones and MGCP gateways at all sites are under the control of the CCM cluster at the central site. Notice that even though call processing is centralized, DSP resources can be distributed. If network connectivity, such as...

Multisite with Distributed Call Processing Model

In the multisite with distributed call processing model, each site has its own Cisco Unified CallManager cluster controlling all call processing aspects of that site hence the term distributed call processing. Application servers and DSP resources are also distributed at all sites. Sites, in this case, do not depend on the call processing offered at another site. In distributed call processing, each site has a CallManager cluster. Please note that the other resources (voice mail, IPCC, IVR, DSP...

On campus

On the service provider cloud Table 6-3 provides a short list of important QoS-related tasks that might be necessary at different locations on the customer and provider premises. Implementing these and possibly other tasks on both the customer and provider devices supports the effort to provide end-to-end QoS. Table 6-3 Necessary QoS Tasks (at Different Spots) for End-to-End QoS Table 6-3 Necessary QoS Tasks (at Different Spots) for End-to-End QoS Phone and access switch configurations WRED...

Overview of WLAN Security

Affordability, ease of use, and convenience of wireless devices, wireless local-area networks (WLAN), and related technologies have caused a substantial increase in their usage over recent years. At the same time, the number of reported attacks on wireless devices and networks has surged. Hackers have access to affordable wireless devices, wireless sniffers, and other tools. Unfortunately, the default wireless security settings are usually open and vulnerable to intrusion and attacks. For...

Packet Telephony Components

A packet telephony network must perform several mandatory functions, and it can perform many optional ones. This requires existence and proper operation of various components. Some devices can perform multiple functions simultaneously for example, for a small deployment a gateway can also act as a gatekeeper. The following is a list of the major components of a packet telephony network, but not all of the components are always present and utilized Phones There might be analog phones, PBX...

Protocols Used in Voice Encapsulation

Even though the term VoIP implies that digitized voice is encapsulated in IP packets, other protocol headers and mechanisms are involved in this process. Although the two major TCP IP transport layer protocols, namely TCP and UDP, have their own merits, neither of these protocols alone is a suitable transport protocol for real-time voice. RTP, which runs over UDP using UDP ports 16384 through 32767, offers a good transport layer solution for real-time voice and video. Table 1-5 compares TCP,...

Qa

Some of the questions that follow challenge you more than the exam by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions appear in Appendix A. 1. List at least three benefits of packet telephony networks. 2. List at least three important components of a packet telephony (VoIP) network. 3. List three types of analog...

QoS Pre Classify Applications

Two commonly used tunneling protocols that are relevant to VPNs, discussed in the ONT course, are GRE and IPsec. Because these tunneling protocols, at the tunnel end points, encapsulate the original IP packet and use a new IP header, the original IP header is no longer available to the QoS mechanisms on the outbound (egress) interface. The good news is that the original ToS byte of an IP packet is copied to a ToS byte of the new IP header. Therefore, if the QoS mechanisms on the egress...

QoS Service Class

Planning and implementing QoS policies entails three main steps Step 1 Identify network traffic and its requirements. Step 2 Divide the identified traffic into classes. Step 3 Define QoS policies for each class. In Step 1, you use tools such as NBAR to identify the existing traffic in the network. You might discover many different traffic types. In Step 1, you must then recognize and document the relevance and importance of each recognized traffic type to your business. In Step 2, you group the...

QoS Service Level Agreements SLAs

An SLA is a contractual agreement between an enterprise (customer) and a service provider regarding data, voice, and other service or a group of services. Internet access, leased line, Frame Relay, and ATM are examples of such services. After the SLA is negotiated, it is important that it is monitored for compliance of the parties involved with the terms of the agreement. The service provider must deliver services as per the qualities assured in the SLA, and the customer must submit traffic at...

R

See RF radio frequency identification, 305 radio management, WLSE, 295 radio resource management (RRM), 301 RADIUS (Remote Authentication Dial In User Service) EAP features, 260 servers, 262 random early detection (RED), 154-156 random wait timers, 236 random-detect command, 158 rates CIR, 165, 186 packets, 35 traffic, 165-167 RC4 vulnerabilities, 259 Real-Time Protocol Control Protocol (RTCP), 117 Real-time Transport Protocol. See RTP REAP (Remote-Edge Access Point), 293...

Reducing Header Overhead

An effective way of reducing the overhead imposed by IP, UDP, and RTP is Compressed RTP (cRTP). cRTP is also called RTP header compression. Even though its name implies that cRTP compresses the RTP header only, the cRTP technique actually significantly reduces the overhead imposed by all IP, UDP, and RTP protocol headers. cRTP must be applied on both sides of a link, and essentially the sender and receiver agree to a hash (number) that is associated with the 40 bytes of IP, UDP, and TCP...

Single Site Model

In the single-site model, as the name implies, the enterprise has one site, and within that site it has a Cisco CallManager cluster deployed. The local IP phones and perhaps MGCP gateways are under the control of CCM, and CCM can communicate with H.323 and SIP devices. Calls that are external to and from the site are routed through a gateway to the PSTN. The gateway DSPs can provide codec, compression, transcoding, or conferencing resources. If the site has a WAN connection to another place,...

Sitetosite VPNs

The first category of VPN, remote access VPN, is either client-initiated or network access server (NAS)-initiated. When a person uses a VPN client application to establish a secure tunnel across an Internet service provider (ISP) (shared) network directly to an enterprise network, the VPN is referred to as client-initiated. In the network access server (NAS)-initiated case, however, the user dials in to the ISP, and the ISP NAS in turn establishes a secure tunnel to the enterprise private...

Some nonIP applications

HTTP applications based on URL, MIME type, or host name You can enable Cisco AutoQoS Enterprise on certain types of interfaces and permanent virtual circuits (PVCs) only. These are the interface and PVC types that you can enable AutoQoS Enterprise for on a Cisco router Serial interfaces with PPP or HDLC encapsulation. Frame Relay point-to-point subinterfaces. (Multipoint is not supported.) ATM point-to-point subinterfaces (PVCs) on both slow (< 768 kbps) and fast serial (> 768 kbps)...

Stages of a Phone Call

The three most popular VoIP signaling and control protocols are H.323, which is an ITU standard Media Gateway Control Protocol (MGCP), which is an Internet Engineering Task Force (IETF) standard and Session Initiation Protocol (SIP), also an IETF standard. Regardless of the signaling protocol used, a phone call has three main stages call setup, call maintenance, and call teardown. During call setup, the destination telephone number must be resolved to an IP address, where the call request...

Step 1 Identifying Traffic Types and Their Requirements

Identifying traffic types and their requirements, the first step in implementing QoS, is composed of the following elements or substeps Perform a network audit It is often recommended that you perform the audit during the busy hour (BH) or congestion period, but it is also important that you run the audit at other times. Certain applications are run during slow business hours on purpose. There are scientific methods for identifying the busy network moments, for example, through statistical...

Step 2 Classifying Traffic Based on the Requirements Identified

The definition of traffic classes does not need to be general it must include the traffic (application) types that were observed during the network audit step. You can classify tens or even hundreds of traffic variations into very few classes. The defined traffic classes must be in line with business objectives. The traffic or application types within the same class must have common requirements and business requirements. The exceptions to this rule are the applications that have not been...

The Need for Wireless LAN QoS

They are mostly implemented as extensions to, but are occasionally deployed as overlays to, wired LANs, or replacements for wired LANs. The difference between wired and wireless LANs is in the physical layer and in the MAC layer. Please note that Logical Link Control (LLC) and MAC are considered upper and lower sublayers of the OSI Layer 2 Data Link Control (DLC) layer, respectively. Upper-layer protocols and applications such as IP, TCP, and FTP run identically...

The Need for WLAN Management

WLAN management is one piece of a puzzle for network managers to understand. WLANs address the business drivers such as mobile users, Wi-Fi enabled notebooks, and anytime, anywhere access. WLAN management helps Network Managers plan for scalable WLANs that are both centralized and secure. WLAN management within the Cisco Unified Wireless Network is composed of five elements. Those elements are fundamental to building successful enterprise-class WLANs that are scalable, centralized, and secure.

The Nyquist Theorem

The number of samples taken per second during the sampling stage, also called the sampling rate, has a significant impact on the quality of digitized signal. The higher the sampling rate is, the better quality it yields however, a higher sampling rate also generates higher bits per second that must be transmitted. Based on the Nyquist theorem, a signal that is sampled at a rate at least twice the highest frequency of that signal yields enough samples for accurate reconstruction of the signal at...

This chapter covers the following subjects

802.1x and EAP Authentication Protocols Configuring Encryption and Authentication on Lightweight Access Points Introducing 802.1x and Configuring Encryption and Authentication on Lightweight Access Points This chapter is composed of three sections. In the first section, you are provided with an introduction to wireless security, its issues, and how it has evolved. In the next section, the 802.1 extensible authentication protocol (EAP) and some of its popular variants are presented. Wireless...

Traffic Shaping and Policing

Traffic shaping and policing are two different mechanisms for traffic conditioning. Both mechanisms measure the rate of different traffic classes against a policy or SLA. SLA stands for service level agreement, and it is usually set up between an enterprise and a service provider with regard to bandwidth, traffic rates, reliability, availability, QoS, and billing matters. Traffic shaping usually buffers the traffic that is in excess of the policy agreement. Policing either drops the excess...

Two Step Deployment of AutoQoS Enterprise on Routers

Deploying AutoQoS for the Enterprise on Cisco routers is a two-step (or two-phase) process. Step 1 is the auto-discovery step. Step 2 is generation and deployment of MQC-based QoS policies based on the discovery step. AutoQoS discovery uses NBAR protocol discovery. The type and volume of traffic on the network is discovered and analyzed in real-time to be able to generate realistic policies in Step 2. Generally speaking, the longer the auto-discovery runs, the more accurate the results will be....

U

UDP (User Datagram Protocol), 15, 30-32 underutilization, 154 unicast key management, 269 unification, networks, 291 updating images, 296 routing, 192 upgrading firmware, WLSE, 295 User Datagram Protocol. See UDP utilization AF DSCP, 104 CoS bits, 98-99 MOS, 24 MPD, 154 versatile interface processor (VIP), 65 access, 237 classification, 189 endpoints, 12 keywords, 117 LWAPs, 308 rogue APs, 313 views, WCS, 300-301 VIP (versatile interface processor), 65 VIP-DTS (virtual IP distributed traffic...

Verifying AutoQoS on Cisco Routers and lOSBased Catalyst Switches

Monitoring and verifying AutoQoS on routers and switches have similarities and differences. Recall that AutoQoS Enterprise, which includes an initial protocol discovery phase, is not supported on Catalyst switches yet. On the other hand, Cisco Catalyst switches have a unique behavior of mapping the CoS setting of the incoming frames to DSCP, using a CoS-to-DSCP mapping scheme this is useful for egress interface queuing purposes. On both Cisco routers and Cisco IOS-based Catalyst switches, the...

Voice Gateway Functions on a Cisco Router

The Cisco family of voice gateways, including integrated services routers (ISR), provide connectivity between analog interfaces, digital interfaces, and IP Telephony devices. Examples of analog interfaces are FXS and FXO. Examples of analog devices are analog phones, fax machines, and modems. T1 E1 and BRI are examples of digital interfaces. A PBX is usually connected to a gateway using T1 E1 interfaces, even though using an E& M interface is also possible. You can set up a gateway...

WAN Edge QoS Implementations

WAN edge QoS configurations are performed on CE and PE devices that terminate WAN circuits. Commonly used WAN technologies are Frame Relay and ATM. Important QoS features implemented on the CE and PE devices are LLQ, compression, fragmentation and interleaving, policing, and shaping. Figure 6-6 shows a customer site connected to a provider IP network through a Frame Relay connection between a CE device and a PE device. Note that a similar connection between the CE and the PE devices exists at...

WCS Location Tracking Options

The three WCS tracking options are increasingly enhanced with features. Tracking refers to the management of wireless assets and how each version can help improve on that task. The simplest version of Cisco WCS, WCS Base, informs managers which AP a device is associated with. This allows managers to have an approximation of the device location. The optional version, called WCS Location, is the second level of WCS. It provides users with the RF fingerprinting technology and can provide location...

WCS

Cisco WCS can use real floor, building, and campus plans to view the physical and RF environments together. This section discusses adding a campus map and a new building. Use the following steps to add a campus map Step 1 Save the map in a format such as .png, .jpg, .jpeg, or .gif. Do not worry about the size, because WCS will manage it. Step 2 Browse to the map and import it from anywhere in the file system. Step 5 From the Select a Command drop-down menu, choose New Campus and click Go. Step...

WCS Summary Pages

The WCS Network Summary (Network Dashboard) page is displayed after logging in successfully. It is a top-level overview of the network with information about controllers, coverage areas, APs, and clients. Systems configuration and devices can be added from this page. Access the Network Summary page from other areas by choosing Monitor > Network Summary. Figure 10-2 shows a sample WCS Network Summary page. Figure 10-2 WCS Network Summary Page Figure 10-2 WCS Network Summary Page The Network...

WLAN Components

Figure 10-1 provides a clear hierarchy of the components that are required to build a WLAN. Figure 10-1 WLAN Components Cisco Wireless Solution Engine (WLSE) Client devices are the most obvious of the WLAN components. Client devices come in many forms such as PDAs, IP phones, notebooks, and bar-code scanners. Access Points are another obvious WLAN component either autonomous or lightweight. The APs are used to build the WLAN infrastructure. Configuration is performed independently on the...

WLAN Management

This chapter provides an understanding of the network manager's tools to discover, configure, and monitor the various components in a WLAN solution. Cisco offers autonomous and lightweight access points (LWAP), which can both be centrally managed. Centralization simplifies WLAN management and improves scalability. Lightweight access points and their associated controllers can be managed using the Cisco Wireless Control System (WCS). Autonomous access points can be managed using the CiscoWorks...

WLSE Configuration Templates

CiscoWorks WLSE supports performance optimization and high availability beyond the basic configuration and monitoring. The configuration is performed through a browser or web-based GUI. Templates ease the configuration and deployment of the WLAN environment. Several templates exist, such as these Automatic configuration of APs added to CiscoWorks WLSE Automatic RF configuration of APs Calculation of optimal RF configurations by APs

Wlse Ids Features

CiscoWorks WLSE includes intrusion detection features, such as these Rogue APs are automatically shut down when they are detected and located by disabling the switch ports. Ad hoc network devices are detected in addition to rogue APs. Man-in-the-middle attacks are detected via Message Integrity Check (MIC) failures. AP configuration monitoring ensures that security policies are always enforced. Sensor-mode APs can add enhanced features to the WLAN.

WLSE Key Benefits

Managing autonomous APs and bridges through CiscoWorks WLSE provides centralized management and RF visibility for the WLAN. This provides many key benefits, such as the following Improved WLAN security Wireless IDS with rogue AP detection handles security threats such as malicious intruders, ad hoc networks, excess 802.11 management frames that signal denial-of-service (DoS) attacks, and man-in-the-middle attacks. Simplified AP deployment Deployment Wizards automatically apply configuration...

WLSE Software Features

Network management of system-wide autonomous APs through CiscoWorks WLSE has these major software features Configuration One CiscoWorks WLSE console supports up to 2500 APs. Configuration changes can be performed in mass, individually, or in defined groups as desired or on a schedule time. All Cisco Aironet APs are supported. Fault and policy monitoring WLSE monitors device faults and performance threshold conditions such as memory, CPU, associations, Lightweight Extensible Authentication...

WLSE Summary

All the features CiscoWorks WLSE offers help improve the day-to-day WLAN management. CiscoWorks WLSE is a solution providing performance optimization and high availability for autonomous WLAN networks. Following are two features of WLSE that enforce optimization and high availability Auto re-site survey This feature can optimize the WLAN environment by selecting a more effective channel and adjusting the power levels. The most effective results come from performing a client walkabout during the...

Call Admission Control CAC

Call admission control is a feature that is configured to limit the number of concurrent calls. Usually, because the bandwidth of the WAN link is much less than LAN links, CAC is configured so that WAN bandwidth does not get oversubscribed by VoIP calls. CAC complements QoS configurations. For instance, if a strict priority queue with enough bandwidth for three voice calls is configured on all routers between two phones, although there are fewer than four concurrent calls, all will be good...

Cisco WLAN Implementation

Cisco offers two WLAN implementations. The first is the autonomous WLAN solution based on autonomous APs, and the second is the lightweight WLAN solution based on LWAPs and WLCs. Table 10-2 compares the two WLAN solutions. Table 10-2 Comparison of WLAN Implementation Solutions Table 10-2 Comparison of WLAN Implementation Solutions Management via CiscoWorks WLSE and Wireless Domain Services (WDS) The two WLAN solutions have different characteristics and advantages Autonomous APs Configuration is...

WCS System Features

The Cisco WCS operating system manages all data client, communications, and system administration functions and performs radio resource management (RRM) functions. Moreover, WCS manages systemwide mobility policies using the operating systems security solution and coordinates all security functions using the operating system security framework. Three user interfaces exist for Cisco WCS. The first is a full featured CLI that can be used to configure and monitor individual controllers. The second...

FirstInFirst Out Priority Queuing Round Robin and Weighted Round Robin Queuing

FIFO is the default queuing discipline in most interfaces except those at 2.048 Mbps or lower (E1). The hardware queue (TxQ) also processes packets based on the FIFO discipline. Each queue within a multiqueue discipline is a FIFO queue. FIFO is a simple algorithm that requires no configuration effort. Packets line up in a single FIFO queue packet class, priority, and type play no role in a FIFO queue. Without multiple queues and without a scheduling and dropping algorithm, high-volume and...

Network Based Application Recognition NBAR

NBAR is a Cisco IOS feature that can be used to perform three tasks Traffic statistics collection Because NBAR can discover which applications and protocols are running on your network and display volume and statistics about them, you can use it as a powerful yet simple tool to form the definitions of your network traffic classes (BAs). You can also use NBAR within class-based (CB) marking or other MQC-based tools to classify packets for purposes such as marking, policing, and queuing. NBAR is...