Download Converged Networks Case Studies

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wireless security wikipedia , lookup

Net neutrality law wikipedia , lookup

IEEE 1355 wikipedia , lookup

Peering wikipedia , lookup

Computer network wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Distributed firewall wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Net bias wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Peer-to-peer wikipedia , lookup

Deep packet inspection wikipedia , lookup

Quality of service wikipedia , lookup

Transcript
T e c h n i c a l
Converged Networks
Case Studies
P a p e r
Converged Networks
Case Studies
Contents
Overview of Converged Networks
2
What Is Driving Converged Networks?
3
Cost Reduction
4
Emerging Technologies
5
Greater Flexibility and Functionality
5
Standards
6
Converged Network Architecture
6
Case Studies
7
Case 1: Converged Network Support for Call Centers
7
Phase 1: Single Call Center on a Dedicated LAN
8
Phase 2: Two Call Centers on Dedicated LANs, Interconnected by the PSTN
9
Phase 3: Multiple Call Centers on Dedicated LANs, Interconnected by a WAN
10
Phase 4: Multiple Call Centers on Dedicated LANs, Interconnected by a WAN,
with Customer Access over the Internet
11
Phase 5: Multiple Call Centers on Multi-Application LANs, Connected by a
WAN, with Customer Access over the Internet
12
Case 2: Converged Network Support for Financial Transaction Applications
14
Phase 1: Data Only
15
Phase 2: Voice and Data on Business-Critical Networks
16
Phase 3: Voice, Video, and Data on Business-Critical Networks with
Multiple Data Centers
17
Case 3: Converged Network Support for the Virtual Classroom and Corporate Training
18
Phase 1: Small Number of Dedicated LANs with an ATM Campus Backbone
Supporting ELANs
18
Phase 2: Larger Number of Dedicated LANs with a Packet Switched Backbone
19
Phase 3: Multi-Application LANs with a Packet Switched Backbone and
Supporting Video Return
20
Phase 4: Multiple Campuses Interconnected by a WAN
22
Phase 5: Multiple Campuses and Remote Home Sites Interconnected by a WAN
23
Case 4: Converged Network Support for Toll Reduction
25
Phase 1: Toll Reduction over Existing PSTN
26
Phase 2: Toll Reduction with Redundancy and Sophisticated Call Management
27
Phase 3: Toll Reduction for Enterprise Networks, Small/Medium Businesses,
and Consumers
28
Phase 4: Toll Reduction with Advanced Services and Standardization
31
Conclusion
32
1
Acronyms and
Abbreviations
Converged Networks
Case Studies
ACD
automated call distribution
Converged networking is an emerging technology
thrust that integrates voice, video, and data traffic on a single network. The market drivers for
converged networks are cost reduction; support
for sophisticated, highly integrated applications;
and the provision of greater network flexibility
and functionality.
This white paper presents four case studies
focusing on high-influence market segments and
applications that can benefit from converged networking technology. The selection of these examples is intended to provide a basic understanding
of the technology issues involved in network convergence. For each case study, the analysis includes
a set of required technology capabilities.
ATM
Asynchronous Transfer Mode
BGP4
Border Gateway Protocol
Version 4
CoS
Class of Service
CMTS
cable modem transmission
system
CWE
Collaborative Work
Environment
DHCP
Dynamic Host Configuration
Protocol
Overview of Converged Networks
As networking technology becomes pervasive,
opportunities arise for using it in new and
more creative ways. One example is that of
using data networks, rather than the traditional
circuit switched networks, to carry voice and
video traffic. The generic term for this kind of
use is converged networking. Converged networking offers many benefits, including cost
savings and the enabling of new, tightly integrated, multimedia applications.
The World Wide Web has permanently
changed the nature of networking. Before its
appearance, networking was the province of
specialized applications running in private
corporations and research institutions. Today,
networking is used by millions of people
around the world. The Internet has become
the backbone for small business communications. Networking has permanently changed
the way organizations do business.
Like most revolutionary technologies, the
Web has drawn together previously separate
activities and integrated them under a common framework. Web pages no longer provide
only text and static graphics; they also provide
animated graphics, audio, video, and other
multimedia content. Consequently, the Web
supports the convergence of content delivery
DNS
Domain Name Service
DSLAM
digital subscriber loop
access multiplexer
DVMRP
Distance Vector Multicast
Routing Protocol
ELAN
emulated LAN
IEEE
Institute of Electrical and
Electronics Engineers
IETF
Internet Engineering Task
Force
IGMP
Internet Group Management
Protocol
IP
Internet Protocol
IPsec
IP Security
ISDN
Integrated Services Digital
Network
2
over networks. The Web is to content delivery
what backplane buses are to computer systems.
The Web is one example of a larger trend
in networking. Formerly distinct activities are
undergoing integration into a common framework. Integration is occurring at a number of
different levels, most noticeably at the application level, where users expect ease of use
between different applications (such as Web
browsing, calendaring) as well as applications
that incorporate a diversity of data types (such
as documents that embed spreadsheets, graphics, and voice annotation). The motivation
behind this trend includes ease of use, reduced
cost, and increased functionality. Similarly,
users are showing interest in solutions that
provide a diverse range of functionality in a
single network (voice/data/video integration)
and offer the possibility of reduced cost (less
capital equipment acquisition, less need for a
range of technical experts in different areas).
The concept of convergence describes this
trend toward tighter integration. Converged
networking encompasses several aspects, all of
which are related to the aggregation of networking activity.
• Payload convergence is that aspect of converged networking wherein different data
types are carried in the same communications format. For example, while in the past
audio and video traffic was carried over circuit switched networks as Layer 1 bit
streams, while bursty data traffic was carried
over packet switched networks in Layer 3
datagrams, payload convergence describes
the trend to carry both audio/video and
bursty data traffic in Layer 3 datagrams.
Note, however, that payload convergence
does not prohibit the network from handling packets differently, according to their
service requirements.
• Protocol convergence is the movement
away from multiprotocol to single protocol
(typically IP) networks. While legacy networks are designed to handle many protocols (e.g., IP, IPX, AppleTalk) and one type
of data (so called “best effort”), converged
networks are designed to support one protocol and provide the services necessary for
•
•
•
•
•
multiple types of data (such as voice, oneway video, interactive video, best effort).
Physical convergence occurs when payloads
travel over the same physical network
equipment regardless of their service requirements. Both multimedia and Web traffic
can use the facilities of an edge network,
even though the former has more stringent
bandwidth, delay, and jitter requirements
than the latter. Resource reservation, priority queuing and other Quality of Service
(QOS) or Class of Service (COS) mechanisms within the network are used to differentiate the service requirements of one type
of traffic from another and to deliver the
necessary service to each.
Device convergence describes the trend in
network device architecture to support different networking paradigms in a single system. Thus, a switch may support Ethernet
packet forwarding, IP routing and Asynchronous Transfer Mode (ATM) switching.
Network devices may handle data, carried
by a common network protocol (i.e., IP),
that have separate service requirements (e.g.,
bandwidth guarantees, delay, and jitter constraints). In addition, an end system may
support both Web-based data applications
and packet telephony.
Application convergence represents the
appearance of applications that integrate
formerly separate functions. For example,
Web browsers allow the incorporation of
plug-in applications that allow Web pages
to carry multimedia content such as audio,
video, high-resolution graphics, virtual reality graphics, and interactive voice.
Technology convergence signifies the move
toward common networking technologies
that satisfy both LAN and WAN requirements. For example, ATM can be used to
provide both LAN and WAN services.
Organizational convergence is the centralization of networking, telecommunications,
and computing services under a single
authority, for example, the chief information officer. This provides the necessary
managerial framework for integrating voice,
video, and data on a single network.
These aspects of converged networking
allow the integration of voice, video, and data
services from the edge of the network to the
core. The following sections provides a brief
description of the market drivers for converged
networks and a summary of converged network architecture. The remainder of the paper
presents four application case studies for
converged networks and describes the technologies necessary to support successive
deployment phases for each application.
Acronyms and
Abbreviations
ISP
Internet service provider
ISSLL
Integrated Services over
Specific Link Layers
ISUP
ISDN User Part
ITU
International
Telecommunications Union
What Is Driving Converged Networks?
Several emerging forces are driving market
interest in converged networks:
• Cost reduction, both in capital outlay and
technical support expenditures
• The emergence of sophisticated, highly integrated applications that put new demands
on networks
• Greater network flexibility and functionality
• The emergence of industry standards
Organizations will replace their existing
voice, data, and video infrastructures by a converged network only if they anticipate substantial savings in both capital expenditure
and day-to-day operational costs. At the same
time, a converged network must deliver service at least equivalent to existing facilities.
Achieving the necessary cost/service
objective requires the use of emerging and
anticipated technologies. Organizations are
generally leery of using proprietary technologies when faced with major upgrades to their
networks. Consequently, the fundamental
technologies of converged networks must be
standards-based, and the network deployment
must be incremental.
Certain applications are difficult to support on existing communication infrastructures. For example, coordinating customer
voice calls with database accesses that manipulate customer records currently requires specialized application hardware and software.
Over a converged network, packet voice and
database access use a common network, allowing software applications to provide this service and eliminating the need for specialized
application hardware.
IVR
interactive voice response
L2TP
Layer 2 Tunneling Protocol
LAN
local area network
LDAP
Lightweight Directory
Access Protocol
LRU
line replaceable unit
MAC
Media Access Control
MCU
Multipoint Control Unit
NIC
network interface card
NSP
network service provider
ODBC
Open Database Connectivity
OSPF
Open Shortest Path First
PBX
private branch exchange
PPP
Point-to-Point Protocol
PPTP
Point-to-Point Tunneling
Protocol
3
Another market motivation for converged
networks is indirectly related to integrating
voice, video, and data on a single network.
Many of the characteristics necessary for a
converged network, such as robustness, manageability, availability, and so on, are also
desirable characteristics for legacy networks.
As the features that support these characteristics are developed, organizations without a
pressing need for converged networks will be
attracted to products containing such features
in order to improve their existing legacy
networks.
Acronyms and
Abbreviations
PSTN
public switched telephone
network
QoS
Quality of Service
RIP
Routing Information
Protocol
RMON
Remote Monitoring
RSVP
Resource Reservation
Protocol
Cost Reduction
The potential for cost reduction in converged
networks arises from the elimination of
unnecessary infrastructure duplication. It
must be noted that some duplication is desirable in order to meet reliability objectives.
However, there are unjustifiable costs associated with duplicate equipment acquisition and
maintenance for separate data, voice, and
video networks, duplicate management infrastructure for these networks, duplicate personnel to service these networks, and duplicate
facilities costs (for example, for cabling plant,
wire closet floor space, cooling) to bring the
services of these networks to users.
The University of Oklahoma in the U.S.
is deploying IP-based video conferencing to
Choctaw County high schools. They chose
IP-based video conferencing for several reasons.
Integrated Services Digital Network (ISDN)
availability is limited in Choctaw County. At
$92/month and requiring an expensive multiplexer, ISDN is too expensive. Finally, an IPbased system uses the same cable plant for
video conferencing as is used for Internet access.
Polaroid Corporation (Cambridge, Massachusetts) also sees cost reduction possibilities
in converged networking. “Users can reap
RTP
Real-Time Transport
Protocol
RTSP
Real-Time Streaming
Protocol
SLA
service level agreement
SONET
Synchronous Optical
Network
SS7
Signaling System 7
TCAP
Transaction Capabilities
Application Part
ToS
Type of Service
VC
virtual circuit
VPN
virtual private network
WAN
wide area network
xDSL
digital subscriber line
benefits by running voice over Frame Relay
internationally, as voice rates are far higher
outside the U.S.,” says George Deyett, telecommunications operations manager for Polaroid’s
20-country Frame Relay network. “The savings
pay for the cost of the equipment you need in
a matter of months.”1 The principle is simple.
If an enterprise can run all of its applications
on one network, it will save money.
Increasing economic pressures are forcing
network service providers (NSPs) to consider
technologies that provide the highest level of
service for the least cost. Greg Jacobsen, executive vice president of MCI Systemhouse
(Atlanta, Georgia), says, “Today, customers
have five bidders; they pit them against each
other to drive out the biggest penalties, costs,
and service levels, and they ride them like a
hawk.”2 Under scrutiny of this kind, NSPs
must determine the costs of service level agreements (SLAs) to ensure profitability. They
must also effectively manage their networks to
achieve those SLAs.
In the consumer and small business markets, moving long distance traffic onto packet
switched networks will provide significant
reductions in long-distance telephone bills.
For example, Level 3 Communications, Inc.
(Omaha, Nebraska) will provide an integrated telephony and data service that carries
voice traffic over an IP network. Level 3 has
attracted $2.5 billion from Kiewit Capital,
which they plan to spend building a new
international fiber network. Level 3 CEO
James Crowe says, “Our goal is to make every
fax and phone a terminal to access our IP network.” The cost advantages of IP packet
switching will drive this market. “We’re in the
middle of a fundamental change—the same as
the telegraph to the telephone,” Crowe continues. “IP enjoys a 100-to-one cost advantage
over switched networks.”3
1 “Cisco Plots Voice/Data Integration,” Computerworld, October 27, 1997; http://www.computerworld.com/.
2 Emily Kay, “Sleuthing for Services: Managers Closely Scrutinize Outsourcers as They Rely More on Third Parties to Keep
Their Networks Running,” LAN Times, July 1997.
3 Randy Barrett, “Billion-Dollar Net Telco Born,” Inter@ctive Week, January 19, 1998; http://www.zdnet.com/intweek/
daily/980119a.html.
xMDS
Multipoint Distribution
Service
4
Emerging Technologies
The merger of data, voice, and video traffic in
the home market is on the horizon. Communications technologies such as cable modems,
digital subscriber line (xDSL) services, and
Multipoint Distribution Service (xMDS) provide the necessary bandwidth and multiplexing capabilities to support multiple traffic
classes. Furthermore, there are preexisting distribution facilities (coaxial cable and fiber in
the case of cable modems, twisted pair in the
case of xDSL, and electromagnetic spectrum
in the case of xMDS) that enable the rapid
deployment of these technologies. In addition,
computer and communications equipment
manufacturers are developing low-cost products with the potential to utilize these new
interconnection technologies.
Coupling low-cost devices with low-cost
multimedia applications like Microsoft’s free
NetMeeting application will substantially
increase demand for multimedia applications.
This in turn will further accelerate the convergence of networks. The large number of devices
and media types will also encourage network
convergence. It is not economical to provide a
physically separate device for each media type.
Greater Flexibility and Functionality
Converged networks provide the necessary
infrastructure to support applications integrating voice, video, and data management. This
allows customers to achieve their objectives
more effectively and efficiently. The Gartner
Group writes, “We believe that interactive
media will have as much of an impact on corporate and government computing applications as client/server computing.”4
IT personnel in enterprise networks used
to worry about what power users might do to
their networks. With the availability of audio
and video sound clips on the Web and with
applications like PointCast gaining wide
acceptance, even average users are now a force
for convergence within the enterprise network.
In addition, enterprises are now providing
multimedia content on their own intranets.
Corporations use multimedia on their networks
to invigorate corporate training and more easily convey corporate messages. Guy Baltzelle,
instructional designer for AT&T Wireless
Services in Redmond, Washington, says, “Training on the wireless industry’s standards, protocols, network elements, and mobile switching
might seem static without some entertaining
graphics.”5 Without multimedia, corporate
messages and training would be less effective.
The MITRE Corporation (Bedford,
Massachusetts) is working on a Collaborative
Work Environment (CWE) application, which
incorporates text, audio, and multicast full
motion video. CWE provides users with a rich
set of information management tools, allowing them to carry out their job assignments
more effectively. MITRE intends to use CWE
both as an in-house tool and as a model for its
government customers.
The University of Mississippi also sees
their network converging and seeks the latest
networking technologies. When asked what
motivates the University to move to a converged network, network manager Mike
Myrick replies, “People are starting to experiment with multicast. Desktop video conferencing may be next.”6
Convergence is also an increasingly attractive prospect in the high-end Web site hosting
and collocation industry. Traditional sites provide low-priority transactions incorporating
text and graphics. Today’s sites also provide
audio and video as well as electronic commerce transactions, which require extremely
high priority and security. Dataquest predicts
the total collocation market will grow to $2.6
billion by the year 2001, from $633 million in
1997, with high-end business increasing
exponentially.7
4 Gartner Group, “Interactive Media: Integrative View and Commentary,” March 28, 1997.
5 Kathleen Murphy, “Multimedia Applications on Rise Within Corporate Webs: Shockwave, Other Tools Being More
Widely Deployed,” Webweek, December 6, 1996.
6 Jeff Caruso, “Ole Miss Students Tap VLAN’s Power; Layer 3 Moots Issue of Moves, Adds, Changes,” Techweb, December 1,
1997.
7 Michelle V. Rafter, “Exodus Invests in Data Centers as High-End Outsourcing Market Booms,” Webweek, December 15, 1997.
5
dge
LAN e rk
o
w
t
ne
dge
LAN e rk
o
w
t
ne
core
WAN rk
o
w
t
ne
Figure 1. WAN Core Network with LAN Edge
Networks
Standards
Converged networks depend on the availability of standards to ensure their widespread
deployment. Standards useful in a converged
network, such as International Telecommunications Union (ITU) H.323, Institute of Electrical and Electronics Engineers (IEEE)
802.1p/Q, and Real-Time Transport Protocol
(RTP), to name a few, have been developed
over the last several years and are now being
implemented in products.
ITU standards such as H.323 enable
packet switched networks to carry telephony
traffic. IEEE standards 802.1p and 802.1Q
support prioritization of data traffic at Layer
2, which enables QoS support. Gigabit Ethernet increases bandwidth, allowing converged
networks to carry increased traffic load. Internet Engineering Task Force (IETF) standards
such as RTP, Integrated Services over Specific
Link Layers (ISSLL), and Real-Time Streaming Protocol (RTSP) enable IP networks to
carry multimedia traffic.
dge
LAN e rk
o
w
t
e
n
dge
LAN e rk
o
w
t
ne
AN
lel W
Paral tworks
ne
core
Figure 2. Parallel WAN Core Networks
6
Converged Network
Architecture
There are many ways to implement a converged network. One
might assume a homogeneous infrastructure, either completely packetbased and connectionless (such as shared
and switched LANs, packet-service WANs) or
connection-oriented (such as ATM to the desktop and long-distance ATM clouds). In practice, neither of these architectural options is
viable, due to the different economic and performance requirements for LANs and WANs.
A converged network that spans large distances will have a WAN core network that is
surrounded by LAN edge networks (Figure 1).
In the general case, the edge networks will
be based on different technologies. Thus, one
edge network may be based on a switched
Ethernet fabric (i.e., one without Layer 3
routing), another on routed Ethernet segments, and a third on ATM LAN technology.
The core may be a single technology network, such as Frame Relay, ATM, or the Internet. Alternatively, it may consist of multiple
parallel networks, some connection-oriented
and some packet switched (Figure 2).
While it is possible to solve many QoS
problems in the LAN by radical overprovisioning, this is not economically feasible in a
WAN. Thus, WANs are engineered to optimize
their resource use for a particular class of traffic.
Pure packet-based networks, such as a large
portion of the Internet, provide good service
to bursty, non–time-critical traffic. They do
not deliver good service to traffic with tight
bandwidth, delay, and jitter
requirements. Connection-oriented networks such as ATM,
on the other hand, provide good
service to traffic with tight bandwidth, delay, and jitter requirements. However it is costly to use
these networks for bursty traffic, since
they reserve resources and charge for
them whether or not they are used.
Consequently, a converged network is
likely to use the parallel WAN networks
according to service requirements of the traffic routed to them. LANs will carry voice,
data, and video traffic over a common physical infrastructure. At the LAN/WAN boundary, traffic will be classified and routed over
the most appropriate WAN network. For
example, bursty, non–time-critical traffic will
be routed over a packet switched WAN. Multimedia data, however, will probably be routed
over a connection-oriented network, such as
ATM, that provides QoS guarantees.
Converged networks may be able to optimize application performance by customizing
network devices on an application-by-application basis. Filtering network traffic in a way
that identifies application traffic and then
handling that traffic according to the application’s unique processing requirements is an
example of this approach. The use of active
networking,8 whereby applications download
small programs or configuration data into network devices, is another example. There are
some important issues to address, such as
security, resource management, and interdevice coordination, but there is also an
opportunity to obtain significant competitive
advantage if the network can optimize services
for important applications.
Case Studies
Converged networks require new technology
for their implementation and deployment.
The remainder of this paper presents case
studies that illustrate the phased deployment
of technology to support four key applications
as they grow within a converged network.
Case studies are presented for the following
four applications:
• Call centers
• Financial transaction applications
• Virtual classrooms and corporate training
• Toll reduction
Case 1: Converged Network Support
for Call Centers
Call centers are business units that accept
telephone calls in order to provide customer
service, such as product purchase, product
maintenance, customer relations, and customer support. Centers may be third-party
outsourcing businesses or organizations within
a large corporation.
A call center is staffed by agents who accept
customer calls and then coordinate the provided service. Normally, this requires the agent
to associate the customer with records or other
information held in a database and to update
these records according to the service request.
A service call proceeds as follows. First,
the incoming call is routed to an appropriate
free agent. If no agents are available, the call is
routed to holding equipment that provides the
customer with an appropriate message and
then queues the call for service. When an
agent answers the call, the calling number may
be used to find a customer database record,
which provides the agent with information
necessary to service the call. In some cases the
customer may provide additional information,
such as account or tracking numbers, that is
used to retrieve additional data. Once the service call is complete, the agent releases it and
becomes available for further service requests.
Existing call centers utilize a variety of
proprietary call service equipment, known as
automated call distribution (ACD) servers,
which tie a public switched telephone network
(PSTN) call to a PC. These servers extract
incoming call information, such as the calling
ID, passing it to an application running on
the PC, which performs the necessary database access. They also provide hold-queue,
interactive voice response (IVR), accounting,
and monitoring services. ACD servers are
expensive and not easily customized to meet
customer requirements, and they present significant complexities when deployed in a distributed environment involving multiple call
center sites.
Consequently, there is significant motivation for customers to migrate to a converged
network solution. Converged networks allow
both the telephone call and the caller’s service
information to arrive at the agent over a
8 David L. Tennenhouse and Davide J. Wetherall, “Towards an Active Network Architecture,” Computer Communication
Review, ACM Special Interest Group on Data Communication, April, 1996, pp. 5–18.
7
enter
Call c
per
r
serve
tekee
3 ga
H.32
base
Data
PSTN
r
serve
LAN
mer
Custo
eway
3 gat
H.32
•••
t stat
Agen
Agen
Figure 1-1. Single Call Center on a Dedicated LAN
common communications fabric. The ACD
server is replaced by an ACD application running on a call center server that distributes
packet voice calls and coordinates them with
customer record retrieval. This reduces cost by
using standard, off-the-shelf hardware, provides the foundation for more flexible call center applications, and naturally allows the call
center application to be distributed over multiple call center sites.
The migration of call centers to converged networking is described here in five
phases. In each phase, the solution builds on
functionality made available in the preceding
phases. In addition, the solution provided at
each phase introduces new flexibility in how
the call center is deployed.
Phase 1: Single Call Center on a Dedicated LAN
Perhaps the simplest way to integrate call center voice and data on the same network is to
dedicate a LAN exclusively to call center operations (Figure 1-1).
This configuration is attractive to costconscious customers who have proprietary ACD
server equipment and who want to have more
flexibility in customizing their applications
and to decrease the complexity of multi-site
deployments. The call center server provides
some of the functionality of the ACD server,
including hold queues, IVR, and accounting
8
ion
ion
t stat
functions. To ensure the appropriate level of
service without introducing traffic prioritization, the LAN must be over-provisioned.
The following technologies are required
to implement this configuration:
• H.323 gateway. An H.323 gateway packetizes voice traffic arriving over the PSTN
and forwards it to an agent’s station.
• H.323 client on end system. The end system serving the call center agent must be
able to handle H.323 traffic.
• H.323 gatekeeper. An H.323 gatekeeper
provides basic call management functions
for routing calls coming through the H.323
gateway to an agent station.
• Multipoint Control Unit (MCU). An
MCU provides the functionality to implement teleconferencing, which allows multiple agents to cooperate to service an
incoming call.
• Efficient multicast routing and filtering.
To implement teleconferencing, the dedicated LAN must support efficient multicast
routing and filtering, which reduces the cost
of overprovisioning the LAN.
• Monitoring capabilities. LAN traffic must
be monitored to ensure that it is distributed
according to the policy implemented by the
call center server and that LAN resources
continue to be overprovisioned as the call
center grows. Both RMON2 and distributed RMON can be used for this purpose.
• Reliable Domain Name Service (DNS)/
Dynamic Host Configuration Protocol
s
enter
se
base
Data
erver
Call c
rver
r
eepe
LAN
eway
3 gat
gatek
3
H.32
•••
H.32
te
Priva
link
tion
t sta
Agen
Agen
enter
PSTN
Custo
ion
t stat
bas
Data
mer
Call c
ver
e ser
r
serve
er
LAN
eway
3 gat
3
H.32
eep
gatek
•••
H.32
tion
t sta
Agen
ion
t stat
Agen
Figure 1-2. Call Centers on Dedicated LANs Interconnected by the PSTN
(DHCP). As agents arrive at and leave work,
they must reconnect and disconnect their
machines from the call center application.
This means their PCs must obtain IP address
leases as well as locate various servers implementing the call center functions. Consequently, there must be reliable DNS and
DHCP services to ensure that calls are not
dropped during shift transitions.
• Resilient links and hot-swappable line
replaceable units (LRUs). The underlying
communications fabric must be reliable as
well. When links fail, backup links must automatically take over the new load. Resilient
links provide this capability. When network
devices experience failures in their compo-
nents, the smallest replaceable part that contains the failed component (an LRU) must be
swapped out and a correctly operating part
swapped in. To ensure the reliability necessary
for a call center, LRUs must be hot-swappable; that is, the network device should continue to operate while the LRU is replaced.
Phase 2: Two Call Centers on Dedicated LANs,
Interconnected by the PSTN
One way of generalizing the single dedicated
LAN call center is to allow it to be distributed
across multiple sites. In the simplest case, two
sites can be interconnected by the PSTN with
private link interconnection of the gatekeepers
(Figure 1-2).
9
C
er
p
ekee
3 gat
H.32
erver
nter s
all ce
H.32
erver
nter s
e
c
l
l
Ca
per
ekee
3 gat
ver
ser
base
Data
LAN
ay
ew
3 gat
H.32
base
•••
Data
r
serve
•••
PSTN
3
H.32
n
statio
Call
r
eepe
gatek
Agen
t
Agen
WAN
er
r serv
cente
ion
t stat
ion
t stat
Agen
t
Agen
eway
3 gat
H.32
LAN
n
statio
per
enter
Call c
PSTN
r
serve
Custo
mers
ekee
3 gat
H.32
mers
Custo
base
LAN
ay
ew
3 gat
H.32
Data
r
serve
LAN
ver
r
se se
ba
Data
•••
•••
ion
t stat
ion
t stat
Agen
tion
t sta
Agen
eway
3 gat
H.32
Agen
t
Agen
n
statio
Figure 1-3. Multiple Call Centers on Dedicated LANs Interconnected by a WAN
Using multiple call center sites is attractive
for a number of reasons:
• It allows the placement of call center sites in
different time zones, which increases the
hours during which the call center is operational.
• It allows customers to call a particular site
and still use the spare capacity of a remote
site when the first becomes oversubscribed.
• It decouples call site operations from limitations such as physical plant space, available phone numbers, and trained agent
availability.
• It allows large organizations to distribute
call center operations over a number of
administratively separate suborganizations
without requiring them to share space.
The following additional technologies are
required to support this configuration:
• H.323 gatekeeper coordination. Both sites
must have their own H.323 gatekeepers,
which must to coordinate with one another.
This requires a gatekeeper-to-gatekeeper
protocol supporting basic functionality.
10
• Signaling System 7 (SS7) integration with
H.323. When a call request arrives at an
H.323 gatekeeper that needs to be rerouted
to another call center, the gatekeeper (or
more likely an embedded SS7 gateway)
signals the rerouting information to the
PSTN using SS7, the call signaling protocol
used within the PSTN.
Phase 3: Multiple Call Centers on Dedicated
LANs, Interconnected by a WAN
The next level of generality supports multiple
call center sites by interconnecting them
through an overprovisioned WAN (Figure 1-3).
Call forwarding is achieved by H.323 gateway
support of SS7.
Since customer data may reside on a
remote database server, call center LANs are
interconnected by a WAN. This phase also
eliminates the private link required in phase 2,
since inter-gatekeeper traffic can now travel
over the WAN. These characteristics enable
large customers to build large call centers distributed over many sites.
directly from customer PCs using packet telephony over the Internet (Figure 1-4).
The addition of Internet access allows the
call center to service new customers who want
to receive service from their packet voice-capable PCs. This enlarges the market served by
the call center, thereby increasing potential
revenue.
The Internet currently does not provide
sufficient service guarantees to support business-grade voice traffic. However, the IETF is
working on this problem and may have a solution in a reasonable time frame. In addition,
use of the Internet introduces significant security issues that must be addressed.
The following additional technologies are
required for this configuration:
The following additional technology is
required for this configuration:
• Multicast distribution management and
troubleshooting. Support of an arbitrary
number of call center sites introduces scaling considerations for multicast, which is
required for MCU teleconferencing. In
order to effectively address this issue, the
converged network must support effective
multicast distribution management and
troubleshooting.
Phase 4: Multiple Call Centers on Dedicated
LANs, Interconnected by a WAN, with Customer
Access over the Internet
Another generalization of call centers operating over converged networks allows incoming
calls not only from the PSTN, but also
Call
per
H.32
3
ee
gatek
er
r serv
cente
eper
ateke
g
3
2
H.3
ver
e ser
bas
Data
LAN
ay
ew
3 gat
H.32
r
serve
enter
Call c
ver
e ser
•••
bas
Data
•••
PSTN
n
statio
Agen
per
tekee
23 ga
Call
tion
nt sta
Age
WAN
er
r serv
cente
ion
t stat
n
tatio
ts
Agen
t
Agen
eway
3 gat
H.32
LAN
r
eepe
3
H.32
H.3
PSTN
rver
ter se
Custo
en
Call c
gatek
mers
Custo
LAN
y
ewa
3 gat
H.32
rver
se se
t
Agen
3 ga
H.32
LAN
•••
ba
Data
•••
ion
t stat
Agen
y
tewa
r
serve
base
Data
tion
t sta
Agen
n
statio
t
Agen
n
statio
net
Inter
net
Inter
mers
custo
Figure 1-4. Multiple Call Centers on Dedicated Lans Interconnected by a WAN with Customer Access
over the Internet
11
mers
• IP differentiated services. The use of IP to
carry voice traffic requires support for prioritization. Current work in the IETF is investigating use of the Type of Service (ToS)
field in IP headers to tag traffic according to
its urgency, as well as resource reservation by
means of the Resource Reservation Protocol
(RSVP). RSVP is a signaling protocol used
for reservation, and ToS bits indicate a
desired priority. There must be mechanisms
in Layer 3 switches and routers to implement this priority, such as packet scheduling
algorithms in routers or 802.1p–compliant
priority queuing mechanisms in switches.
Either of these approaches, or another that
provides the necessary IP traffic handling
characteristics, is required to support business-grade packet telephony over the
Internet.
• ISSLL-LOW. In the most common case,
customer PCs will be connected to the
Internet via a dial-up link connected to
remote access equipment. Since voice and
data traffic will share a common link, a link
traffic prioritization scheme must be used to
ensure that voice traffic has precedence over
data traffic. The ISSLL-LOW standard
defines such a scheme.
• Virtual private networks (VPNs). Many
packet voice applications assume that packets sent between the sender and receiver
arrive in order. However, IP may re-order
packets carried over the Internet. Consequently, a VPN tunneling protocol, such as
Point-to-Point Tunneling Protocol (PPTP)
or Layer 2 Tunneling Protocol (L2TP),
must be used for voice traffic to ensure that
packets arrive in order at the receiver when
voice traffic transits the Internet.
• Media protection. Since the Internet does
not provide sufficient reliability for business-grade voice traffic, and since voice traffic is not suited for error correction schemes
based on retransmission, forward error correction techniques are necessary to ensure
the appropriate level of reliability for voice
traffic over the Internet.
• IP Security (IPsec). Traffic over the Internet
is inherently unsecure. Since call center
voice traffic may carry business-sensitive
12
data, it must be protected by a security protocol providing confidentiality, integrity,
and authentication services. IPsec is the
standard protocol for these services.
• Cryptographic policy management. Managing IPsec is an arduous task unless there is
some help in the form of cryptographic policy management. This is required in any
practical, large-scale deployment of IPsec.
• Security policy management. It is likely
that once customers can access call centers
directly over the Internet, new applications
will arise that utilize this direct connectivity.
This will turn call centers into extranets,
whereby customers are allowed access to
previously isolated systems. To control the
security threats this introduces, call centers
will require security policy management systems, such as the Multilayer Firewall and
Network Login, which protect the call center from security threats mounted from
within the call center LAN.
Phase 5: Multiple Call Centers on MultiApplication LANs, Connected by a WAN, with
Customer Access over the Internet
As the market for call centers on converged
networks matures, customers will require even
tighter integration of the center with the rest
of their business. For example, customers will
integrate call center and financial transaction
applications, such as SAP, in order to provide
business-critical services to callers. Thus,
LANs will be shared by call center operations
and other applications (Figure 1-5).
Implementing call center operations on a
multi-application LAN allows businesses to
integrate other applications with call center
activity. For example, call centers used for
product purchase or other business transactions could integrate call center services with
financial transaction services. This would
allow an agent to service an incoming call, use
the identified customer’s records to authorize
purchases, and then use the financial transaction application to execute them.
This is the first phase in which large-scale
converged networks are a factor, introducing
scaling, reliability, and prioritization requirements.
r
Othe erver
s
n
o
i
t
plica
r
Othe erver
ns
o
i
t
a
pplic
ap
a
r
Othe lient
c
o
i
t
a n
pplic
a
r
Othe lient
nc
o
i
t
a
c
appli
Call er
r serv
t
cen e
3
H.32 er
eep
k
e
t
a
g
Call er
r serv
t
n
ce e
3
H.32 er
ep
e
k
e
gat
ver
ser
base
Data
LAN
ay
ew
3 gat
H.32
base
•••
Data
r
serve
•••
PSTN
3
H.32
n
statio
r
eepe
gatek
Call
Agen
tion
nt sta
Age
WAN
rver
r se
cente
ion
t stat
ion
t stat
Agen
t
Agen
eway
3 gat
H.32
LAN
per
enter
Call c
PSTN
r
serve
Custo
mers
tekee
3 ga
H.32
mers
Custo
LAN
3
H.32
ay
gatew
y
tewa
r
serve
base
a
t
a
D
LAN
base
Data
•••
r
serve
•••
n
tatio
ent s
t
Agen
Ag
ion
t stat
Agen
n
tatio
ent s
Ag
on
licati
r app
t
clien
Othe
3 ga
H.32
r
Othe n
tio
a
c
i
l
app er
v
ser
n
o
licati
r app
Othe lient
c
net
Inter
ers
ustom
net c
Inter
Figure 1-5. Multiple Call Centers on Multi-Application LANs Connected by a WAN with Customer Access
over the Internet
The following additional technologies are
required for this configuration:
• Prioritization of LAN traffic. Priority queuing of LAN traffic requires tagging of
MAC-level frames and switch support for
priority queuing. IEEE standard 802.1Q
defines frame tagging, while 802.1p defines
how an 802.1D-compliant switch can
implement priority queuing based on those
tags. LAN equipment such as switches and
network interface cards (NICs) must support these standards (or their relevant parts)
so voice traffic can receive higher priority
than data traffic.
• Policy management of traffic prioritization. It is impractical to manually configure
a large number of switches and NICs in
order to implement a coordinated, high-
13
n
statio
ation
pplic
a
r
e
h
r
Ot
serve
priority service for voice traffic. Consequently, call centers on multi-application
LANs require policy management tools for
configuring priority information in network
devices.
• Bulk configuration of network devices. A
large scale converged network presents significant management problems that cannot
be met by manual device configuration. To
reduce costs and free network management
personnel to work on problems with solutions that cannot be automated, devices
must be managed as groups, rather than as
single systems. This requires network management tools that support coordinated
configuration of devices.
• Rapid, coordinated fault-recovery. When
parts of a large scale converged network fail,
manual methods of recovery are expensive
and time consuming. For call center support,
converged networks must provide rapid,
coordinated, and automated network fault
recovery.
• Enhanced gatekeeper-to-gatekeeper interactions. Basic gatekeeper functionality provides for call hand-off on a per call basis. In
a large scale converged network, more
sophisticated interactions are necessary. For
example, there may be a requirement for
load-balancing or fail-over between gateways
in different call center sites. Furthermore,
-end
Back rk
o
w
t
e
n
prise
Enter rk
o
netw
lients
SAP c
Figure 2-1. SAP Distributed Architecture
14
s
erver
tion s
ca
Appli
migration of agents between sites requires
dynamic distribution of agent location
information between gatekeepers.
Case 2: Converged Network Support for
Financial Transaction Applications
Financial transaction applications have a wide
range of uses within vertical market segments,
such as the financial industry, and within horizontal markets, such as the financial arms of
corporations in all industries. One of the most
common applications of this kind is SAP,
which is used for general ledger, accounts
payable, accounts receivable, manufacturing,
shipping and receiving, and order processing
and fulfillment, among other things.
SAP is a three-tiered application (Figure
2-1). A SAP client makes a request to an
application server, which implements all business logic. This functional distribution results
in a very thin client, which is advantageous
since the number of clients may be very large.
The application server accepts a client request
and accesses data in back-end databases to service the request.
A typical network supporting SAP separates the physical subnetwork holding the
database servers from the rest of the network,
i.e., from those parts holding the clients. The
application server acts as the mediator between
the two. In certain cases, other applications may access the database
servers as well.
Maintaining a separate physical back-end subnetwork for the
database servers is expensive. Not
only must the subnetwork have
dedicated equipment, but management of the enterprise network is incoherent. In effect
there are two networks to
manage, the database subnetwork and the rest of
the enterprise netvers
e ser
s
work. Consequently,
a
b
Data
IT organizations are
motivated to integrate the database subnetwork into the enterprise network.
To accomplish this integration, certain
business-critical requirements must be met.
Traffic between the application servers and the
databases must be high priority, since financial
transactions are the lifeblood of a commercial
company. Communications between the
application servers and the database must be
highly available and reliable. In some deployments (for example, the securities industry),
even a small delay in a transaction can cost
millions of dollars.
Integrating a financial transaction application into an enterprise is further complicated as companies move to converged
networks. In addition to data traffic, transactions must compete in these networks with
high QoS multimedia traffic, such as packet
voice. However, there are compelling reasons
other than cost why financial transaction
applications may need to use the services of a
converged network. An important example is
the use of such applications in call centers to
support product purchase, shipment tracking,
and other customer service objectives.
The migration of financial applications to
converged networks is described in three
phases. In each phase, the solution builds on
functionality made available in preceding
phases. In addition, the solution provided at
each phase generalizes the deployment scenarios for the application.
•
•
•
•
Phase 1: Data Only
Existing applications and network architecture
supporting financial transaction applications
is the baseline for financial transaction application deployment on converged networks.
This phase addresses how financial transaction applications currently operate. The basic
requirement is high availability and reliability
of network services.
The technologies required in this phase
are required in all subsequent phases. These
technologies are:
• Fast, convergent routing. When failures
occur in a large network, the routing protocol must react quickly to restore connectivity. Routing protocols such as Routing
Information Protocol (RIP) do not have this
characteristic, while Open Shortest Path
First (OSPF) does. Consequently, networks
•
•
supporting financial transaction applications should use OSPF.
Routing domain support. Large networks
supporting financial transaction applications
must be partitioned into routing domains;
otherwise it is difficult to contain failures
affecting routing information. Inter-domain
routing protocols such as Border Gateway
Protocol v4 (BGP4) are then necessary to
route between these domains.
Over-provisioned LANs and WANs. Business-critical applications such as SAP must
always have all necessary network resources
available for execution. In phase one, this is
guaranteed by radical overprovisioning of
LANs and WANs.
Monitoring capabilities. Monitoring of
LAN traffic is required to ensure that traffic
on the dedicated database LAN conforms to
site policy, and for capacity planning to
ensure that LAN resources continue to be
overprovisioned. Both RMON2 and distributed RMON can be used for this purpose.
Resilient links and hot-swappable LRUs.
Highly available and highly reliable networks must recover quickly from link and
network device failures. Resilient links allow
the network to continue in service when a
link fails. Hot-swappable LRUs allow network devices to be repaired while online
and in operation.
Reliable DNS/DHCP. The support of mission-critical applications in shared networks
requires stable IP address management.
When a client starts a transaction, it must
locate the appropriate application server,
which is normally identified by DNS name.
Consequently, DNS must provide a reliable
service. Similarly, when PCs running client
code boot, they must be able to obtain an
IP address, which requires a reliable DHCP
service.
Monitoring tools for network management. Rapid response to network failures
requires real-time monitoring tools that recognize and diagnose faults. Network management applications must tie into these
tools so that faults can be repaired quickly
before they become critical.
15
vers
e ser
bas
Data
lients
SAP c
prise
Enter rk
o
w
t
e
n
vers
n ser
catio
Appli
Figure 2-2. Voice and Data Support on a
Business-Critical Network
Phase 2: Voice and Data on Business-Critical
Networks
There are a number of reasons why a customer
might want to deploy a business-critical application on a converged network supporting
both voice and data. For example, in phase 5
of call center evolution described above, financial transaction software is used to service purchase requests made during a customer call
session. Furthermore, it is expensive to maintain a separate back-end network for application server–to-database interactions. Moving
such interactions over a common network
supporting multiple applications types
increases network operation efficiency.
Moving financial transaction applications
to a converged network requires the provision
of priority services. Once these are available,
the IT department can move the database
servers onto the enterprise network, thereby
eliminating the requirement for a separate
back-end subnetwork (Figure 2-2).
It may be that these departments will
migrate the database servers to the enterprise
network before supporting voice. However, the
set of technologies required to give financial
transaction traffic high priority are the same
set required to support both voice and highpriority data on a converged network. Consequently, the technology descriptions given here
apply to both situations. The following additional technologies are required for phase 2:
16
•
•
•
•
• IP differentiated services. The use of IP
to carry financial transaction traffic requires support for prioritization. Current work in the
IETF is investigating use of
the Type of Service (ToS) field
in IP headers to tag traffic
according to its urgency, as well
as resource reservation by means of the
Resource Reservation Protocol (RSVP).
RSVP is a signaling protocol used for
reservation, and ToS bits indicate a
desired priority. To implement this priority, there must be mechanisms in Layer
3 switches and routers such as packet scheduling algorithms in routers or 802.1p-compliant priority queuing mechanisms in
switches.
Prioritization of LAN traffic. Priority queuing of LAN traffic requires tagging of
MAC-level frames and switch support for
priority queuing. IEEE standard 802.1Q
defines frame tagging, while 802.1p defines
how an 802.1D-compliant switch can
implement priority queuing based on those
tags. LAN equipment such as switches and
NICs must support these standards.
Policy management of traffic prioritization. It is impractical to manually configure
a large number of switches and NICs. Consequently, financial transaction applications
require policy management tools for configuring priority information in network
devices.
Bulk configuration of network devices. A
large-scale converged network presents significant management problems that cannot
be met by manual device configuration. To
reduce costs and free network management
personnel to work on problems with solutions that cannot be automated, devices
must be managed as groups, rather than as
single systems. This requires network management tools that support coordinated
configuration of devices.
IPsec. Financial application data is sensitive
and requires protection from unauthorized
access. Moving this data in the clear across
the enterprise network presents a significant
opportunity for unscrupulous employees
•
•
•
•
and contractors to either sabotage businesscritical operations or obtain potentially
valuable information. The use of the confidentiality, integrity, and authentication
services of IPsec, which is the standard protocol for protecting IP traffic, eliminates
many of these security vulnerabilities.
Cryptographic policy management. Managing IPsec is an arduous task unless there is
some help in the form of cryptographic policy management. This is required in any
practical, large-scale deployment of IPsec.
Security policy management. IPsec provides strong security services, but is expensive in terms of both economic cost and
computing resources. It is best to place
IPsec protection across enterprise network
segments that have a high exposure to
attack. Within more isolated segments,
security policy management technologies
such as Multilayer Firewall and Network
Login can provide sufficient protection at a
lower cost.
VPNs. The application server–to-database
traffic of a financial transaction application
currently runs over a protected, dedicated
LAN. When the database servers are moved
to the enterprise, there is no reason why
they must be co-located. Some may be
located in different parts of the enterprise
and communications between them and the
applications servers may move over a WAN.
If the application protocol between the
application servers and databases relies on
certain Layer 2 characteristics, such as packets not being reordered, these characteristics
must be restored for operation across a
routed network. VPN tunnels provide these
reliability features.
ISSLL. In order to provide priority service
across LAN segments, 802.1p/Q tags must
be mapped into IP-differentiated service priorities. ISSLL is an emerging IETF standard
that defines how to perform this mapping.
Phase 3: Voice, Video, and Data on BusinessCritical Networks with Multiple Data Centers
In the final phase of integrating financial
transaction applications onto a converged network, voice, video, and data are carried by the
common network. The introduction of video
services may occur to achieve business-critical
objectives (such as to provide top company
executives with video-teleconferencing capabilities on their desktops) or for non-businesscritical purposes (such as broadcast talks or
business-related news programs to employee
desktops). In either case, video traffic may
stress networking equipment, introducing
more opportunity for network failure.
In this phase, database servers are placed
in multiple data centers, each under the control of a separate administration. Using multiple data centers provides backup of critical
data and allows a large company to organize
its financial work according to its organizational structure (for example, subsidiaries run
their own data centers, which interact with
those of other subsidiaries). The following
additional technologies are required for phase 3:
• Management of failover activity. Multiple
data centers allow auto fail-over when a center becomes unavailable. However, configuration of application servers so they move
their transactions to the appropriate databases in such failure situations may be complex. Consequently, establishing fail-over
policy in terms of high-level objectives is
necessary. This requires a failure policy
management system.
• Capacity planning and better monitoring
tools. To ensure that financial transaction
applications experience adequate service,
network capacity must be sufficient to support all high-priority traffic. Thus, capacity
planning is an important activity. Since converged networks are much more complex
than existing data-only networks, better
simulation and analysis tools are necessary.
In addition, better monitoring tools are
required to provide the data necessary for
simulations and analysis.
• Standardized benchmarking/testing
methodologies. When simulation and
analysis indicate a network upgrade, the IT
department must use network device performance data to determine what equipment is
needed and where it should be placed. Since
converged networks support classes of traffic
not normally observed in currently deployed
17
networks, network device vendors must
establish standard and enhanced benchmarking and testing methodologies so customers can accurately plan their future
equipment acquisitions.
• WAN compression. The use of multiple
data centers will create inter-center traffic
that in general will move over the WAN.
Since some of this traffic may consist of large
data transfers, WAN efficiency becomes an
issue. WAN compression techniques provide
for the most efficient use of WAN resources,
thereby reducing the cost of multiple data
center operations.
• Point-to-Point Protocol (PPP) over Synchronous Optical Network (SONET). In
addition to WAN compression, higher
WAN bandwidth will alleviate inter-center
traffic bottlenecks. PPP over SONET eliminates overhead imposed by technologies
such as ATM, thereby increasing the bandwidth delivered to the WAN customer for
the same cost.
Case 3: Converged Network Support for the
Virtual Classroom and Corporate Training
Customers in the education market include
public and private elementary and secondary
schools, vocational schools, trade schools,
community colleges, four-year colleges, bachelor and graduate degree-granting universities,
and professional graduate schools such as
those for law and medicine. In addition, local,
state, and federal government departments as
well as private industry generally contain organizations that provide educational services
similar to those offered by more traditional
schools.
The virtual classroom, where students
attend classes in locations remote from the
teacher or lecturer, provides an important
application for converged networks. Previously,
virtual classrooms were implemented using
traditional communications facilities over analog carrier equipment. However, there are
several opportunities for enhancing the educational experience by carrying voice, video, and
data traffic between the studio, where a lecture
or other educational content is produced, and
the premises where the students are located.
18
For example, whiteboard data can be used to
share a common drawing space between lecturer and student, allowing both to illustrate
points during a question and answer interaction. Class notes can be distributed electronically during lectures and annotated by the
teacher in real time to correct errors or improve
exposition. Students can hand in homework
electronically using e-mail, and then receive
individual help from a teacher during virtual
office hours. There are some early adopter
virtual classrooms based on digital communications supporting converged networking
features.
The basic architecture for a virtual classroom includes a studio, which may be a dedicated facility or a lecture hall equipped with
audio and camera equipment, and one or
more remote classrooms. The latter may be
halls or rooms with large-screen projection
equipment, rooms with individual desktop
machines dedicated to virtual classroom activity, or individual desktop machines located in
students’ own quarters. There is a requirement
for rendezvous between voice, video, and data
traffic created both at the studio and at the
remote classroom, which is a function of
video-conferencing software.
The migration of virtual classrooms to
fully converged networking solutions is
described in five phases. The first phase represents how a virtual classroom might be built
using existing networking capabilities. Each
succeeding phase builds on the technology of
the previous ones to provide more flexible
deployment options.
Phase 1: Small Number of Dedicated LANs with
an ATM Campus Backbone Supporting ELANs
The first phase of support for virtual classrooms utilizes LANs dedicated to virtual classroom communications interconnected by an
ATM campus backbone (Figure 3-1).
This configuration is attractive to customers who build remote classrooms exclusively for this purpose on a campus. Since the
LANs are dedicated, they carry only virtual
classroom traffic. Configurations in this phase
support voice and video traffic traveling from
the studio to the remote classrooms, but only
us
camp
ATM ne LAN
o
b
back
Dedi
cated
LAN
cated
Dedi
d LAN
io
Stud
cate
Dedi
LAN
•••
te
Remo
•••
class
room
m
ssroo
te cla
Remo
Figure 3-1. Dedicated Edge LANs Connected by
ATM Campus Backbone LAN
voice is returned in the opposite direction.
This eliminates complexities arising from providing and controlling video streams in both
directions.
To ensure an appropriate level of service,
overprovisioned edge LANs are required. Sufficient reserved virtual circuit (VC) bandwidth
is required to guarantee uncongested traffic
flows between the edge LANs. To eliminate
certain control problems, we assume there are
only a small number of edge LANs.
The following technologies are required
to implement this configuration:
• Media encoding. The studio must contain
video/audio encoding equipment, for example, that producing MPEG-1 streams. For
the return audio channels, a proprietary
scheme, such as CUSeeMe is used, or the
return audio may come out-of-band, for
example through PBX or H.323 equipment.
• Layer 2 multicast. Delivery of the outbound (i.e., studio to remote classroom)
video data uses Layer 2 multicast in the
edge LANs. A common emulated LAN
(ELAN) is used to interconnect the edge
LANs with the studio LAN for each session.
If sufficient bandwidth is available in the
edge LANs and ATM backbone, multiple
virtual classroom sessions can be supported
by using different ELANs for each session.
However, restrictions in ATM switching
equipment may limit the number of ELANs
available at any one time.
Optionally, to increase performance,
the ATM backbone may support Layer 2
multicast.
• ATM access devices. The access device
between the ATM network and an edge
LAN must support the specification of
bandwidth, delay, and jitter requirements
for ATM ELANs. This requirement ensures
the appropriate level of service for emulated
Layer 2 multicasting.
• Audio bridge. To mix the outbound and
return audio traffic, the studio must have an
audio bridge. This could be a digital or analog device.
• Resilient ATM switch fabric and hot-swappable LRUs. To provide the reliability necessary for virtual classrooms, the ATM
switch fabric must tolerate single failures of
switches and communication channels.
Edge LANs should use switches with hotswappable LRUs so field personnel can provide quick, online repair of devices.
Phase 2: Larger Number of Dedicated LANs with
a Packet Switched Backbone
The second phase eliminates the requirement
for a campus ATM backbone supporting
ELANs with QoS/CoS provisioning and
replaces it with a campus packet switched
backbone (Figure 3-2 on page 20). The edge
LANs are still dedicated and overprovisioned,
but no longer need be small in number. The
multimedia protocol is H.323.
This configuration is attractive, since
many educational institutions already have
19
cket
us pa
e
Camp backbon
ed
h
c
t
i
sw
cated
AN
ted L
Dedi
ca
Dedi
io
Stud
Dedi
cated
LAN
LAN
•••
sroom
e clas
t
Remo
•••
m
ssroo
te cla
Remo
Figure 3-2. Dedicated Edge LANs Connected by a Campus Packet Switched Backbone
packet switched backbones. Furthermore,
since the convergence protocol is IP, packet
switching is a better match for the traffic generated by virtual classrooms than ATM.
The following additional technologies are
required to support this configuration:
• Prioritization of LAN traffic. The campus
backbone must support 802.1p/Q tagging
and prioritization, so virtual classroom traffic receives the necessary level of service.
The dedicated LANs need not support
802.1p/Q, since they are overprovisioned.
The campus backbone access devices connecting to the edge networks must participate in the packet tagging activity, however.
• RSVP and RSVP proxy. The campus backbone must support RSVP so resources can
be reserved to ensure high-priority handling
of virtual classroom traffic. Since RSVP is
not currently supported on many end systems, an RSVP proxy may be required to
create an RSVP tunnel through the campus
backbone.
• H.323 client on end system. In order for
remote PCs to receive the H.323 broadcast
video, they must have an H.323 client.
• H.323 gatekeeper. Since the number of
edge LANs is no longer small in this configuration, the video-conferencing services must
support a higher level of control. H.323
provides the necessary encoding and transport services. An H.323 gatekeeper provides
the necessary voice/video call management
services.
20
• MCU. An MCU allows remote classrooms/
end systems to coordinate their traffic with
studio traffic and with the traffic of other
remote classrooms/end systems.
• Resilient links in campus backbone. The
ATM backbone in phase 1 provides a resilient fabric. The packet switched backbone
that replaces it must provide similar reliability, which resilient links and hot-swappable
LRUs (from phase 1) provide.
• Efficient multicast routing and filtering at
Layer 3. Distribution of the video and
audio content from the studio to remote
classrooms requires Layer 3 (e.g., IP) multicast services. Routers in the campus backbone must support the Distance Vector
Multicast Routing Protocol (DVMRP),
which is the least common denominator
multicast routing protocol.
Phase 3: Multi-Application LANs with a
Packet Switched Backbone and Supporting
Video Return
A further generalization of the configurations
in previous phases connects remote classrooms
and studios to multi-application LANs (Figure
3-3). Shared networking capabilities allow
each LAN to support more than one studio or
remote classroom. This flexibility introduces a
requirement for QoS/CoS support in the edge
LANs. (Some of the features for this support
are introduced in phase 2 for the core packet
switched backbone and are therefore not
repeated here.)
An interesting capability enabled by
QoS/CoS support in edge LANs is video
return. Thus, each remote classroom can
return to the studio video that is mixed with
the outbound video (e.g., Picture in Picture
display). This would be useful for displaying a
student that asks or answers a question as well
as periodic or random monitoring of student
attendance/body language.
An implied generalization in this phase is
an increased number of multi-application and
studio LANs. Thus, accommodating scale
becomes an issue. Since the edge LANs now
support many applications, end systems must
support QoS/CoS signaling to the network in
order to obtain the services necessary to support real-time video and audio. The confluence
of large-scale and QoS/CoS support introduces
a QoS/CoS policy management requirement
to allow network administrators to control
scarce networking resources according to established institutional policies.
The following additional technologies are
required to support this configuration:
• QoS/CoS in end systems. End systems must
support application-based packet classification and either 802.1p/Q tagging, RSVP, or
IP ToS tagging. This allows them to signal
their packet-handling requirements to the
network, which is necessary when LANs
carry traffic other than real-time video and
audio.
• Policy management of traffic prioritization.
Scaling concerns require network administrators to deal with high-level, business-
•
•
•
•
oriented issues rather than with device-level
commands and configuration data.
Bulk configuration of network devices.
Scaling also introduces device management
issues that require configuration of devices
on an aggregated basis. When a site has
thousands of network devices, each with a
large number of optional or configurable
features, point device management is no
longer effective. Network administrators
require the capability to manage devices
in groups based on their location and capabilities.
Multicast distribution management and
troubleshooting. Support of a large number
of edge LANs introduces scaling considerations for multicast. In order to effectively
address this issue, the converged network
must support effective multicast distribution management and troubleshooting.
Fast, convergent routing. When failures
occur in a large network, the routing protocol must react quickly to restore connectivity. Routing protocols such as RIP do not
have this characteristic, while OSPF does.
Consequently, networks supporting virtual
classrooms should use OSPF.
Rapid, coordinated fault recovery. When
parts of a large-scale converged network fail,
manual methods of recovery are expensive
and time-consuming. For virtual classroom
support, converged networks must provide
••
cket
us pa
e
Camp backbon
hed
c
t
i
w
s
-appl
Multi
Remo
on L
licati
ti-app
ic
Mul
N
on LA
Stud
ati
pplic
ulti-a
io
•••
M
sroom
e clas
t
Remo
•••
tudio
S
te
Remo
class
m
ssroo
te cla
AN
LAN
ation
•
room
Figure 3-3. Multi-Application Edge and Studio LANs Connected by a Campus Packet Switched Backbone
21
te cla
Remo
m
ssroo
•••
m
ssroo
e cla
t
Remo
•••
io
Stud
AN
L
ation
pplic
ulti-a
M
-appl
Multi
io
AN
tion L
tion
plica
Stud
LAN
-ap
ica
Multi
cket
us pa
e
Camp backbon
ed
h
c
t
i
sw
••
•
m
ssroo
te cla
Remo
WAN
••
cket
us pa
e
Camp backbon
d
e
h
c
t
swi
-appl
Multi
n LAN
tio
plica
lti-ap
n LAN
icatio
•
sroom
e clas
t
Remo
Mu
N
on LA
ti
plica
Stud
-ap
Multi
io
•••
te
Remo
•••
Stud
io
om
assro
te cl
Remo
Figure 3-4. Multiple Campuses Interconnected by
a Public WAN
rapid, coordinated, and automated network
fault recovery.
Phase 4: Multiple Campuses Interconnected
by a WAN
In phase 4, multiple campuses are interconnected over a WAN (Figure 3-4). Since much
of the traffic of a virtual classroom will be
multicast, reliable multicast services are
important. In addition, most WANs do not
support multicast, so this traffic must be tunneled. One limitation in this phase is that all
22
room
class
campus networks are
managed as a single administrative domain. This limitation is
removed in the next phase.
This phase supports more sophisticated
interactions between teacher and students,
such as use of a shared whiteboard. Since the
security of communications over a WAN may
be less than that required for educational services requiring payment, this phase also introduces security technology for protecting
communications over the WAN. In addition,
cost recovery for educational content moved
across a WAN requires the provision of
accounting services.
The following additional technologies are
required to support this phase:
• WAN QoS/CoS/ToS support. Moving virtual classroom traffic across the WAN
•
•
•
•
•
•
imposes bandwidth, delay, and jitter requirements on WAN services. An ATM-based
WAN has underlying resource reservation
mechanisms and signaling capabilities on
VC interfaces for QoS. Current Frame
Relay–based WANs do not support QoS/
CoS controls, so using them for virtual
classroom support requires this enhancement. Pure packet-based networks require
something like RSVP tunneling for WAN
QoS/CoS support.
DVMRP tunneling in WANs or Internet
Group Management Protocol (IGMP)
proxying. Current WANs do not support
multicast and such support is unlikely in
the near future. One way to solve this problem is to tunnel multicast traffic across the
WAN using mechanisms such as a DVMRP
tunnel. Another approach is to use a broadcast WAN service, such as that available in
satellite networks, and have the router at the
uplink point act as an IGMP proxy.
Policy-based WAN selection. Since video
classroom traffic will coexist with other traffic moved over the WAN between edge
LANs, there must be a way to select the
appropriate WAN services for each.
T.120 support. Using whiteboards requires
point-to-multipoint services, which are supported by T.120. A T.120 MCU is useful in
coordinating multiple users drawing on the
same whiteboard. T.120 can also support
remote camera control, which provides a
standard way of synchronizing remote video
return data.
IPsec. Traffic over a public WAN is inherently unsecure. Since virtual classrooms are
likely to be a costed service, they must be
protected by a security protocol providing
confidentiality, integrity, and authentication
services. IPsec is the standard protocol for
these services.
Cryptographic policy management. Managing IPsec is an arduous task unless there is
some help in the form of cryptographic policy management. This is required in any
practical, large-scale deployment of IPsec.
Security policy management. Interconnecting campuses with a WAN introduces problems of network and end system access
control. To control the security threats this
introduces, sites supporting cross-WAN virtual classrooms will require security policy
management systems, such as the Multilayer
Firewall and Network Login, which protect
sites against security threats mounted from
remote edge LANs.
• Accounting. Virtual classrooms will be used
for a variety of purposes, but pay-per-view
educational seminars and talks will form a
significant percentage of broadcast content.
To properly charge for these sessions requires
some sort of accounting technology.
Phase 5: Multiple Campuses and Remote Home
Sites Interconnected by a WAN
The last generalization discussed here supports
home access to the virtual classroom over
regional access networks forwarding traffic
through a WAN (Figure 3-5 on page 24). The
addition of home access raises a number of
technology issues. For example, there must be
sufficient bandwidth to the home to deliver
video and audio content as well as optionally
permit video return. Remote access equipment
servicing the access network customers must
support multicast or convert multicast into
point-to-multipoint traffic.
In this phase, multiple administrative
domains become an issue, since customers are
unlikely to allow administration of their computing resources by an educational institution.
Furthermore, a home may use the services of
multiple educational offerings, which would
preclude management by any one institution.
Also, the access networks are managed by the
carrier, not by either the educational institution or the home. Since this phase supports
multiple administrative domains, it allows the
management of multiple campus backbones
by more than one administration.
When campuses and homes are interconnected, the amount of service-sensitive traffic
moving over the converged network is likely
to increase substantially, and reliability of the
network becomes a much more serious issue.
Proactive approaches to ensuring network reliability become attractive in this phase. The
reliability of a WAN is generally much less
23
Remo
te cla
m
ssroo
•••
m
ssroo
e cla
t
Remo
•••
Stud
AN
io
on L
licati
-app
Multi
licati
-app
Multi
••
on LA
N
Multi
n
catio
appli
Stud
LAN
io
-
cket
us pa
e
Camp backbon
hed
c
t
i
w
s
•
ss
Acce
ork
netw
es
Hom
tuden
ts
m
ssroo
te cla
Remo
work
net
WAN
dents
e stu
Hom
twork
ss ne
Acce
••
cket
us pa
e
Camp backbon
ed
h
c
t
i
sw
ppl
ulti-a
icatio
n LAN
Multi
•
m
ssroo
te cla
Remo
n LAN
catio
appli
-
M
i
-appl
Multi
io
Stud
n LAN
catio
•••
oom
te
Remo
•••
te cla
Remo
io
Stud
m
ssroo
Figure 3-5. Multiple Campuses Interconnected by
a Public WAN with Home Student Access
than that of a typical LAN, so improvement
in this area is also critical.
The following additional technologies are
required to support this phase:
• Reliable multicast. To assist in the synchronization of whiteboard modifications so that
teacher and students see the same shared
information, this phase supports reliable
multicast. Such service is especially important when whiteboard traffic moves across
the WAN.
24
r
class
• High bandwidth to the
home. Virtual classroom to the
home requires the provision of high-bandwidth services. This means that access networks such as cable and xDSL facilities
must exist and that the core WAN must
support high-bandwidth service to a large
number of homes.
• Multicast support in remote access equipment. In order for homes to participate in
virtual classroom sessions, which are distributed as multicast streams, the remote access
equipment must support multicast and
either pass the multicast traffic on to the
home system or convert it to point-to-multipoint traffic.
• IGMP over PPP. In order for home systems
to join a multicast session, they must send
•
•
•
•
an IGMP message to their nearest multicastcapable router. Since home systems will generally connect to the access networks by PPP,
network equipment must support IGMP
over PPP.
Video/audio transcoding of virtual classroom content. It is unlikely that studio services will supply virtual classroom video and
audio data in the same format as all end systems are capable of handling. To accommodate this, video and audio transcoders must
run on gateways in the network to perform
the necessary conversions.
IP differentiated services. Since the Internet
will be the WAN in many cases in this
phase, it must support multicast service as
well as some service quality mechanism,
such as IP ToS tagging. This requires the
development of the necessary technology
and the adoption and deployment of that
technology by the ISPs.
QoS/CoS support across multiple administrative domains. In the previous phase, all
networks were under the control of a single
administrative domain. This phase requires
the coordination of QoS/CoS services provided by multiple administrative domains.
Not only must interfacing equipment
understand and implement the QoS/CoS
policies of the domains they interconnect,
managing the cross-administrative domain
QoS/CoS services requires the development
and deployment of a federated policy management system.
Predictive network failure tools. To ensure
a high-reliability network service for virtual
classrooms, it is useful to support technologies such as predictive network failure tools.
Case 4: Converged Network Support for
Toll Reduction
A significant shift in telephony service is on
the horizon. Toll traffic that currently travels
over circuit switched networks will be diverted
over packet-based WANs, thereby reducing
long-distance service costs. This reduction is
possible due to economies of scale that are driving down the cost of packet switching equipment in relation to the cost of circuit switched
devices. For the purposes of this case study, we
use the term toll reduction to describe the
diversion of toll traffic over packet-based
WANs.
The advantages of toll reduction are both
economic and technical. From an economic
perspective, customers receive long-distance
service at lower cost. Competitive pressure on
voice service carriers by data service carriers
will force voice carriers to offer toll reduction
services or risk a significant loss of market
share.
Toll reduction will initially be transparent
to customers, except for its reduced cost. In
later stages of toll reduction, carriers will take
advantage of the converged voice/data network to provide value-added services. For
example, in cooperation with local PSTN service providers, carriers might offer accounting
and billing information to customers over the
Web. They might provide e-mail arrival notification using LEDs or displays on packet voice
handsets. They could provide online white
and yellow pages services. They could provide
more advanced call management services, such
as displaying the phone number of an interrupting call when customers subscribe to call
waiting.
Toll reduction requires voice packetization, which will occur in carrier equipment
connected to the local PSTN. Prior to the
movement of packet voice traffic across the
WAN, the remote termination point for the
packet voice traffic is located. This is accomplished by translating the destination phone
number into an IP address, which identifies
the equipment that will convert the packet
voice into analog form and forward it over the
remote PSTN to the call’s destination. Once
call setup is achieved, the packet voice data is
routed over the intervening WAN, thereby
bypassing the long-distance circuit switched
network.
One advantage carriers enjoy is their
access to the voice circuit switched network. If
the load on their WAN network reaches a
level at which toll service quality becomes
degraded, the carrier can route the call over
the circuit switched network; this is called
backhauling. This allows carriers to manage
25
destination H.323 gateway will then place a
call over the remote PSTN to the destination
(Figure 4-1).
To utilize toll reduction, the customer
dials the H.323 gateway, enters a PIN or other
authentication information to establish his
identity (for authorization and accounting
purposes), and then enters the destination
phone number. The gateway translates the
phone number into the appropriate IP address
and establishes an H.323 session with the
H.323 gateway at that address. The remote
equipment then calls the destination phone
through the local PSTN, thereby establishing
the necessary local circuit switched connection.
Once the call is established, the local
H.323 gateway packetizes the voice traffic and
routes it over the WAN. At the remote gateway the packet voice is decoded and sent over
their capital expenses by growing the WAN
packet network incrementally over time.
Toll reduction is predicated on the capability of WANs to deliver acceptable bandwidth, delay, and jitter characteristics. Most
carriers have extensive experience in capacity
planning and understand their load models
well enough to overprovision their WAN service. In future offerings, packetized voice may
be carried directly from enterprises over direct
links to the WAN and from small/medium
businesses and home premises over broadband
services such as cable modem and xDSL.
Access network providers and enterprise network administrators are not as experienced in
provisioning their data networks to provide
acceptable voice quality. For these providers,
additional access network enhancements may
be necessary for toll-grade service.
Phase 1: Toll Reduction over Existing PSTN
In the first phase of toll reduction, carriers will
intercept toll traffic at an H.323 gateway connected to a local PSTN and move this traffic
over a packet switched WAN, delivering it to
an H.323 gateway near the calling party. The
eway
3 gat
H.32
PSTN
WAN
eway
3 gat
H.32
PSTN
Figure 4-1. Toll Reduction over Existing PSTN Services
26
Carri
er
the PSTN as normal voice data. The remote
end may decode the packet voice into analog
or digital form, using whatever codec standard
is appropriate for the local PSTN.
The following technologies are required
to implement this configuration:
• H.323 gateway. Both the local and remote
PSTN connection points must have an
H.323 gateway that accepts packet voice
data and decodes it into voice traffic suitable for sending and receiving over a PSTN.
The gateway must provide authentication
and accounting services, perhaps by interacting with other services connected to it
either locally or through the WAN. In this
phase, the H.323 gateway will support a
limited number of codecs, such as G.723.
Finally, the gateway must connect to the
PSTN through span lines of sufficient capacity, such as E1/T1, to handle a significant
amount of traffic.
• Directory server. The H.323 gateway must
translate the destination phone number provided by the customer into the IP address of
the remote gateway. This service is provided
by a phone directory server. In this phase, a
proprietary protocol is used for the interactions between the gateway and directory
server.
• Interactive voice response (IVR). In order
to service the customer’s call request, an
IVR system is required to guide the caller
through the appropriate steps (enter PIN,
enter destination phone number, etc.).
Phase 2: Toll Reduction with Redundancy and
Sophisticated Call Management
The next phase of toll reduction adds more
sophisticated call management facilities and
significant redundancy (Figure 4-2 on page 28).
Load management of the WAN benefits
from technology added in phase 2. To protect
the WAN from becoming congested, an
H.323 gatekeeper is added that manages calls
established through the H.323 gateways to
ensure that sufficient WAN resources are
available to service them. If the WAN is overloaded, the gatekeeper can communicate with
an SS7 gateway, rerouting the call to another
H.323 gateway or over circuit switched long-
distance equipment. Finally, Lightweight
Directory Access Protocol (LDAP), a standard
X.500 directory services access protocol, is
used to communicate with phone directory,
authentication, and accounting servers external to the H.323 gateway. In this phase, the
LDAP schemas are proprietary.
Significant redundancy is also added in
this phase with fully redundant H.323 gateways and gatekeepers and redundant SS7
gateways. The local and remote H.323 gateways are supported by a full complement of
gatekeepers, SS7 gateways, and phone directory, authentication, and accounting servers.
The following additional technologies are
required to support this phase:
• H.323 gatekeeper. A fully redundant
H.323 gatekeeper provides basic call management functions for routing calls coming
through an H.323 gateway.
• SS7 integration with H.323. When a call
request arrives at an H.323 gatekeeper that
needs to be rerouted to another gateway, the
gatekeeper signals an SS7 gateway, which
passes on the rerouting information to the
PSTN using the ISDN User Part (ISUP)
protocol.
• Accounting. In order to recover costs associated with toll reduction calls the carrier must
support a billing and accounting service. Two
additional servers are required: an authentication server and an accounting server. Both
utilize existing carrier functionality by interfacing to them through an Open Database
Connectivity (ODBC) interface.
• H.323 gatekeeper coordination. As toll
reduction becomes pervasive, carriers will
deploy multiple fully redundant H.323
gatekeepers, which will coordinate with
those in other parts of the carrier network.
This requires a gatekeeper-to-gatekeeper
protocol supporting basic functionality.
• Improved H.323 gateway. The deployment
of toll reduction access through cable modem
and xDSL access networks is likely to stress
existing H.323 gateway implementations.
Handling the increased load requires a more
robust gateway, supporting a larger number
of ports and providing greater reliability
than the gateway deployed in phase 1.
27
t
ndan
Redu epers
e
gatek
t
ndan
Redu teways
a
3g
H.32
n,
zatio
thori vers
u
a
,
ser
tory
Direc ccounting
and a
PSTN
eway
at
SS7 g
on,
rizati
utho ervers
a
,
y
r
s
to
Direc ccounting
and a
WAN
y
tewa
a
SS7 g
PSTN
t
ndan
Redu teways
3 ga
H.32
t
ndan
Redu epers
e
k
e
gat
er
Carri
Figure 4-2. Toll reduction with Sophisticated Call
Management and Redundancy
• Fax over IP. Traditional long-distance service allows customers to fax information
between local and remote points. Since fax
data is digital in nature, efficiencies are possible if fax analog data are converted to digital form when moved over the toll reduction
WAN.
• Resilient links and hot-swappable LRUs.
Not only must the H.323 gateway be reliable, the underlying communications fabric
must be reliable as well. This requires resilient links and LRUs. When links fail, backup
links must automatically take over the new
load. Resilient links provide this capability.
When network devices experience failures in
their components, the smallest replaceable
part that contains the failed component (an
28
LRU) must be swapped out and a correctly
operating part swapped in. LRUs must be
hot-swappable; that is, the network device
should continue to operate while the LRU
is replaced.
Phase 3: Toll Reduction for Enterprise Networks,
Small/Medium Businesses, and Consumers
In the third phase, carriers provide toll reduction services to small and medium businesses,
enterprises, and consumers (Figure 4-3).
These customers directly access the toll
reduction WAN through cable modem and
xDSL access networks or through direct links
(such as T1 or analog modem). Access control
in H.323 gateways handling inbound calls
from direct links and access networks (not
shown in the figure) protect the toll reduction
WAN from becoming congested by this direct
access traffic.
The following additional technologies are
required to support this phase:
• Broadband access. A cable modem transmission system (CMTS) allows both digital
data and traditional analog cable channels
m
Mode
er
Carri
t
ndan
Redu epers
e
gatek
t
ndan
Redu teways
3 ga
H.32
tion,
oriza rs
h
t
u
a
serve
tory,
Direc ccounting
and a
PSTN
m
Mode r xDSL
o
tion,
oriza rs
h
t
u
a
serve
tory,
Direc ccounting
and a
WAN
SS7
ay
gatew
y
tewa
a
SS7 g
m
Mode L
S
D
x
r
o
•
PSTN
t
ndan
Redu teways
a
g
3
H.32
t
ndan
Redu epers
e
gatek
••
prise
Enter
•••
ased
PC-b one
h
p
e
l
te
Figure 4-3. Toll Reduction Services for Enterprise Networks, Small/Medium Businesses, and Consumers
to coexist in the same system. Similarly, a
digital subscriber loop access multiplexer
(DSLAM) in a PSTN central office separates voice and data, allowing data to be
routed over a packet network, thus relieving
stress on the circuit switched network.
• Header compression. To ensure efficiencies
when voice and data are moved simultaneously over the same access network link,
voice traffic is compressed. Header compression complements voice data compression
in the voice traffic data, making voice pack-
ets compact. This is particularly important
for low-speed lines.
• IPsec. As toll reduction expands from an
exclusively carrier-based service to the small/
medium enterprise and mass market, the
security of voice traffic over the data network
will become an issue. This will require the
confidentiality and integrity services provided by IPsec.
• Cryptographic policy management. Managing IPsec is an arduous task unless there is
some help in the form of cryptographic
29
LAN
•
•
•
•
•
30
policy management. This is required in any
practical, large-scale deployment of IPsec.
IP differentiated services. Support of tollgrade voice service over cable modems,
xDSL, and analog modems requires prioritized handling of packet voice data, which
will require IP differentiated services in
those networks. Current work in the IETF
is investigating use of the Type of Service
(ToS) field in IP headers to tag traffic
according to its urgency, as well as resource
reservation by means of the Resource Reservation Protocol (RSVP). RSVP is a signaling protocol used for reservation, and ToS
bits indicate a desired priority. To implement this priority, there must be mechanisms in Layer 3 switches and routers such
as packet scheduling algorithms in routers
or 802.1p–compliant priority queuing
mechanisms in switches.
Policy management of traffic prioritization. Scaling concerns require network
administrators to deal with high-level business-oriented issues rather than with devicelevel commands and configuration data.
Carriers supporting toll reduction must
manage their QoS/CoS resources carefully
in order to achieve the efficiencies required
in a competitive environment. Policy management is the tool that provides the necessary level of control.
H.323 client on end system. In order for
toll reduction service to extend to the home,
PCs and IP-capable handsets must support
an H.323 client.
H.323 gatekeeper support for bandwidth
control. Toll-quality voice requires gatekeeper functionality that admits and routes
calls based on network load. This requires
interaction between the H.323 gateway and
network management systems.
Enhanced gatekeeper-to-gatekeeper interactions. Basic gatekeeper functionality provides for call handoff on a per-call basis. In
a large-scale deployment of toll reduction,
more sophisticated interactions are necessary.
For example, there may be a requirement
for load balancing or fail-over between gateways in different parts of a carrier’s network.
• Enhanced SS7 support. When calls originate in PCs or IP-capable handsets, the SS7
gateway used to route the outgoing call over
the PSTN must translate certain destinations (such as 800 numbers) using the
Transaction Capabilities Application Part
(TCAP) protocol.
• Capacity planning and better monitoring
tools. To ensure that toll reduction traffic
receives adequate service, WAN and access
network capacity must be sufficient to support it. Thus, capacity planning is an
important activity. Since converged networks are much more complex than existing, data-only networks, better simulation
and analysis tools are necessary. In addition,
better monitoring tools are required to provide the data necessary for simulations and
analysis.
• Home LANs. The provision of toll reduction will stimulate the home LAN market.
Multiple handsets/PCs in the home supporting packet voice will allow multiple,
simultaneous, outbound calls if there is a
home LAN to move the packet voice traffic
from the handsets to the access network
connection point.
• Home LAN QoS/CoS support. To ensure
that voice traffic transiting the home LAN
receives the appropriate level of service,
home LANs must support an appropriate
level of QoS/CoS. Since proposed home
LAN technologies are unswitched, MAC
access layer control algorithms for home
LANs must support QoS/CoS objectives.
• ISSLL-LOW. When toll reduction traffic
moves over analog modems, voice and data
traffic will share a common link. This
requires the use of a link traffic prioritization scheme to ensure voice traffic has
precedence over data traffic. The ISSLLLOW standard defines such a scheme.
• QoS/CoS in end systems. End systems must
support application-based packet classification and RSVP or IP ToS tagging. This allows
them to signal their packet handling
requirements to the carrier and access networks.
Phase 4: Toll Reduction with Advanced Services
and Standardization
As toll reduction services become common,
carriers will begin offering advanced services
to differentiate themselves from their competitors (Figure 4-4). They will offer multi-conferencing services based on IP multicasting and
provide advanced telephony features such as
call waiting and call forwarding. They will
interoperate with one another, which requires
settlement services to account for call
costs. Carriers will implement leastcost routing functions in their
WAN networks to locate the best H.323 gateway for a call or to determine when to backhaul traffic. These routing protocols will use
load, price, and congestion (among other factors) as input to their routing metrics. To
serve customers who connect to the toll reduction WAN through cable modem and xDSL,
carriers will support data created by highfidelity codecs at these customers’ premises.
In addition to these advanced services,
carriers will move away from proprietary
protocols for toll reduction and
move toward international
m
Mode
er
Carri
t
ndan
Redu epers
e
k
gate
t
ndan
Redu teways
a
g
.323
H
on,
rizati
utho ervers
a
,
y
r
s
to
Direc ccounting
and a
PSTN
m
Mode r xDSL
o
on,
rizati
utho ervers
a
,
y
r
s
to
Direc ccounting
and a
WAN
SS7
ay
a
g tew
ay
atew
SS7 g
m
Mode L
S
D
x
or
t
ndan
Redu teways
a
3g
H.32
PSTN
t
ndan
Redu epers
e
gatek
Soft
POTS
prise
Enter
LAN
•••
Figure 4-4. Toll Reduction with Advanced Services and Standardization
31
e
phon
d tele
ase
PC-b
PBX
standards, which should emerge during this
phase. They will migrate to a standard, fullfeatured, gatekeeper-to-gatekeeper protocol,
utilize standardized LDAP directory service
schemas, and install and use standardized
QoS/CoS services in their WAN networks.
The following additional technologies are
required to support this phase:
• Soft PBX. The origination of multiple outbound calls from an enterprise, small/
medium business, or home does not require
additional equipment. Supporting multiple
inbound calls is possible as well, but such
service requires a soft PBX. This can be provided either by access network head-end
equipment, by the carrier, or by equipment
sited within a customer’s premises. The soft
PBX will also handle calls traversing
premises POTS service.
• MCU. Multiconferencing support requires
an MCU, which coordinates separate voice
streams by multiplexing them into a single
aggregated flow. An appropriate MCU is
provided in the T.120 standard.
• Efficient multicast routing and filtering.
To implement multiconferencing, toll
reduction WANs and access networks must
support efficient multicast routing and filtering. This increases their efficiency when
handling multiconferencing traffic.
• Multicast distribution management and
troubleshooting. Support of an arbitrary
number of multiconferencing participants
introduces scaling considerations for multicast. In order to effectively address this
issue, toll reduction must support effective
multicast distribution management and
troubleshooting.
• Standardized LDAP schemas. To maintain
efficiencies, carriers will standardize the
LDAP schemas that are used to manage
32
•
•
•
•
phone directory, authentication, and
accounting services.
Advanced telephony services. Carriers will
implement such advanced telephony services as call waiting and call forwarding for
their toll reduction offerings.
Least-cost routing. To institute efficiencies
necessary to meet increasing competition in
the toll reduction market, carriers will design
and implement least-cost routing mechanisms, which take into account load, price,
and congestion when formulating routes.
Enhanced codecs support. As more customers use high-bandwidth access services
directly connected to the toll reduction
WAN, they will increase the fidelity of their
voice service by employing more advanced
audio codecs. Carriers will improve their
toll reduction services to support this class
of traffic.
Settlement services. Interexchange carriers
will offer settlement services to their carrier
customers so that calls can transit multiple
carrier networks.
Conclusion
The case studies presented in this paper offer a
suggestion of the wide range of applications
and business environments that will benefit
from network convergence in the coming
years. But in order to realize the benefits of
convergence—cost savings, improved network
control, increased flexibility and functionality—new capabilities are required in the network infrastructures. A phased deployment
can deliver benefits at each incremental step.
Whether or not an organization’s immediate
plans include convergence, today’s infrastructure investment should include features and
capabilities that position the network to support these applications in the future.
3Com Corporation
P.O. Box 58145
5400 Bayfront Plaza
Santa Clara, CA
95052-8145
Phone: 1 800 NET 3Com
or 1 408 326 5000
Fax: 1 408 326 5001
World Wide Web:
www.3com.com
Asia Pacific Rim
Sydney, Australia
Phone: 61 2 9937 5000
Fax: 61 2 9956 6247
Melbourne, Australia
Phone: 61 3 9866 8022
Fax: 61 3 9866 8219
Beijing, China
Phone: 86 10 68492 568
Fax: 86 10 68492 789
Shanghai, China
Phone: 86 21 6350 1581
Fax: 86 21 6350 1531
Hong Kong
Phone: 852 2501 1111
Fax: 852 2537 1149
India
Phone: 91 11 644 3974
Fax: 91 11 623 3192
Indonesia
Phone: 62 21 572 2088
Fax: 62 21 572 2089
Osaka, Japan
Phone: 81 6 536 3303
Fax: 81 6 536 3304
Tokyo, Japan
Phone: 81 3 3345 7251
Fax: 81 3 3345 7261
Korea
Phone: 82 2 3455 6300
Fax: 82 2 319 4710
Malaysia
Phone: 60 3 715 1333
Fax: 60 3 715 2333
New Zealand
Phone: 64 9 366 9138
Fax: 64 9 366 9139
Philippines
Phone: 632 892 4476
Fax: 632 811 5493
Singapore
Phone: 65 538 9368
Fax: 65 538 9369
Taiwan
Phone: 886 2 2 377 5850
Fax: 886 2 2 377 5860
Thailand
Phone: 662 231 8151 5
Fax: 662 231 8158
Poland
Phone: 48 22 6451351
Fax: 48 22 6451352
Russia
Phone: 7 095 258 09 40
Fax: 7 095 258 09 41
Peru
Phone: 51 1 221 5399
Fax: 51 1 221 5499
Venezuela
Phone: 58 2 953 8122
Fax: 58 2 953 9686
3Com Austria
Phone: 43 1 580 17 0
Fax: 43 1 580 17 20
3Com France
Phone: 33 1 69 86 68 00
Fax: 33 1 69 07 11 54
Carrier and Client Access
Phone: 33 1 41 97 46 00
Fax: 33 1 49 07 03 43
3Com Benelux B.V.
Belgium
Phone: 32 2 725 0202
Fax: 32 2 720 1211
Netherlands
Phone: 31 346 58 62 11
Fax: 31 346 58 62 22
3Com GmbH
Berlin, Germany
Phone: 49 30 3498790
Fax: 49 30 34987999
Munich, Germany
Phone: 49 89 627320
Fax: 49 89 62732233
3Com Mediterraneo
Milan, Italy
Phone: 39 2 253011
Fax: 39 2 27304244
Rome, Italy
Phone: 39 6 5279941
Fax: 39 6 52799423
3Com Canada
Calgary
Phone: 1 403 265 3266
Fax: 1 403 265 3268
Edmonton
Phone: 1 403 423 3266
Fax: 1 403 423 2368
Montreal
Phone: 1 514 683 3266
Fax: 1 514 683 5122
Ottawa
Phone: 1 613 566 7055
Fax: 1 613 233 9527
Toronto
Phone: 1 416 498 3266
Fax: 1 416 498 1262
Vancouver
Phone: 1 604 434 3266
Fax: 1 604 434 3264
3Com Iberia
Portugal
Phone: 351 1 3404505
Fax: 351 1 3404575
Spain
Phone: 34 1 509 69 00
Fax: 34 1 307 79 82
3Com Eastern Europe/CIS
Bulgaria
Phone: 359 2 962 5222
Fax: 359 2 962 4322
Czech/Slovak Republics
Phone: 420 2 21845 800
Fax: 420 2 21845 811
Hungary
Phone: 36 1 250 8341
Fax: 36 1 250 8347
3Com Latin America
U.S. Headquarters
Phone: 1 408 326 2093
Fax: 1 408 764 5730
Miami, Florida
Phone: 1 305 261 3266
Fax: 1 305 261 4901
Argentina
Phone: 54 1 312 3266
Fax: 54 1 314 3329
Brazil
Phone: 55 11 246 5001
Fax: 55 11 246 3444
Chile (also serving Bolivia and
Peru)
Phone: 56 2 633 9242
Fax: 56 2 633 8935
Colombia
Phone: 57 1 629 4847
Fax: 57 1 629 4503
Mexico
Phone:52 5 520 7841/ 7847
Fax: 52 5 520 7837
3Com Middle East
Phone: 971 4 319533
Fax: 971 4 316766
3Com Nordic AB
Denmark
Phone: 45 48 10 50 00
Fax: 45 48 10 50 50
Finland
Phone: 358 9 435 420 67
Fax: 358 9 455 51 66
Norway
Phone: 47 22 58 47 00
Fax: 47 22 58 47 01
Sweden
Phone: 46 8 587 05 600
Fax: 46 8 587 05 601
3Com Southern Africa
Phone: 27 11 807 4397
Fax: 27 11 803 7405
3Com Switzerland
Phone: 41 844 833 933
Fax: 41 844 833 934
3Com UK Ltd.
Edinburgh
Phone: 44 131 240 2900
Fax: 44 131 240 2903
Ireland
Phone: 353 1 820 7077
Fax: 353 1 820 7101
Manchester
Phone: 44 161 873 7717
Fax: 44 161 873 8053
Marlow
Phone: 44 1628 897000
Fax: 44 1628 897003
To learn more about 3Com products and services, visit our World Wide Web site at www.3com.com. 3Com is a publicly traded corporation (Nasdaq: COMS).
© 1998 3Com Corporation. All rights reserved. 3Com is a registered trademark of 3Com Corporation or its subsidiaries. AppleTalk is a trademark of Apple Computer. IPX is a trademark of Novell. PointCast
is a trademark of PointCast. SAP is a trademark of SAP AG. Other brand and product names may be trademarks or registered trademarks of their respective owners. All specifications are subject to change
without notice.
Printed in U.S.A. on recycled paper
500671-002 7/98