SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
3/28/2013
1
Assessing Network Readiness
Copyright 2012 by InfoComm International®
Network Readiness - Introduction
• This session includes the following topics:
• Service Level Agreements
• Service Target Levels
• Ports and Protocols
3/28/2013
2
Service Level Agreements
Copyright 2012 by InfoComm International®
The Importance of Documentation
When you install a new service or system:
– How often does the system need to work perfectly?
– How long should the system last?
– Whose fault is it if it stops working?
– How soon does it need to be fixed?
Revolutionary idea: the customer is NOT always right.
3/28/2013
3
Copyright 2012 by InfoComm International®
Needs Analysis
• Operational Needs
• Determines the
Applications
• Determines the Tasks that
can be done
• Determines the Functions
and Features
Needs
Applications
Tasks
Functions and Features
Copyright 2012 by InfoComm International®
Equipment List
3/28/2013
4
Copyright 2012 by InfoComm International®
Service Level Agreement - Definition
• AV needs analysis - usually captured in
Program Report
Based on needs analysis/program meeting
Comes from the architectural field
Focused on physical space
• IT service requirements - usually captured
in SLA
Defined by the ITIL
Not tied to user's physical location
Focused on network requirements
Copyright 2012 by InfoComm International®
Service Level Agreement Definition
3/28/2013
5
Copyright 2012 by InfoComm International®
Service Level Agreement Definition
It’s a contract!
Copyright 2012 by InfoComm International®
Types of Service Level Agreements
– Service-based SLAs cover one service for everyone that uses it
– Customer-Based SLAs cover all services provided to a group
– Multi-Level SLAs include a customer SLA for the enterprise,
customer SLAs for groups, and service SLAs
3/28/2013
6
Copyright 2012 by InfoComm International®
Service-Based SLA
• A fixed level of
service offered to a
wide range of users
• Standardized
services offered at
standardized prices
Copyright 2012 by InfoComm International®
Customer-Based
• Services
specific to the
individual
customer’s
needs
• Not necessarily
transferrable to
a class of
customers
3/28/2013
7
Copyright 2012 by InfoComm International®
SLA Use Guidelines
All types of service providers should use SLAs.
Any time a new service is added to the network, an SLA
is updated or created.
SLAs can exist in hierarchies.
SLAs thoroughly document system limitations.
SLAs evolve over time.
Copyright 2012 by InfoComm International®
Service Level Agreement Components
3/28/2013
8
Copyright 2012 by InfoComm International®
The SLA Lifecycle
1.Needs analysis - just like a program
report.
2.Service targets - must be measurable.
3.Roles and Responsibilities - could include
pricing.
4.Measure and Enforce - weekly
measurements at first.
5.Review - service providers and customers
are held accountable.
Copyright 2012 by InfoComm International®
AV's Role in the SLA
• Roles with respect to the SLA differ according to project.
As an end user help identify service targets
As a customer define the need and sign the SLA
SLA As a service provider write and sign the SLA
3/28/2013
9
Service Targets
Copyright 2012 by InfoComm International®
Service Targets - Introduction
• This section includes the following topics:
– Bandwidth
– Latency
– Packet Loss
3/28/2013
10
Copyright 2012 by InfoComm International®
Bandwidth Usage Target Factors
Traffic is bursty.
You cant specify the whole capacity for use.
How much can you specify? 70%? 50%?
Using VLANs, QoS, and traffic shaping, more bandwidth
can be specd for use.
Consult the network manager.
Copyright 2012 by InfoComm International®
LAN to WAN Bottlenecks
LANs are exponentially faster than WANs
"Bottlenecks" can occur, like a six-lane highway merging
to two lanes
Determine the speed of the WAN
Optimize design to keep high bit-rate traffic within LAN
3/28/2013
11
Copyright 2012 by InfoComm International®
Quality of Service
Applications will take as much
bandwidth as they can.
Insufficient bandwidth mean
lost packets and/or long
delays.
QoS prioritizes data and/or
reserves bandwidth.
Copyright 2012 by InfoComm International®
Bandwidth: Matching Content to the Network
70% of the rated network capacity is really available (or what
network manager says)
Rated capacity is based on bottleneck point speed
Allows for collision avoidance, even in a switched network
30% of available network can be used for streaming media.
Otherwise other traffic has to wait
QoS (Quality of Service) is required
Bandwidth management (throttling)
3/28/2013
12
Copyright 2012 by InfoComm International®
Streaming and QoS
Has QoS been implemented?
Existing differentiated service classes
Resource Reservation Protocol (RSVP)
Policy-based QoS rules
Traffic shaping
Copyright 2012 by InfoComm International®
Conferencing and Bandwidth
– QoS is required – videoconferencing should
have its own class of service
– Bandwidth is only relevant in terms of network
segment
• 4 Mbps on one segment + 4 Mbps on another segment = 4 Mbps total
– Your goal is to find per segment usage
Formula: Bandwidth per Segment for an MCU Call
(Bit Rate + 20% overhead ) * Number of Simultaneous Calls = Bandwidth Required
Each endpoint = simultaneous call.
If IPSec VPN is being used add an additional 5% of overhead.
3/28/2013
13
Copyright 2012 by InfoComm International®
Common Videoconferencing Bit Rates
Endpoint Type Rate
Mobile/Software‐based 192 kbps
384 kbps
Desktop/Room‐based 512 Kbps
768 Kbps
HD Desktop/Room‐based 1024 Kbps
1472 Kbps
Immersive 1920 Kbps
3840 Kbps
4096 Kbps
Copyright 2012 by InfoComm International®
Videoconferencing Bandwidth Example
Multipoint call with 6 endpoints
MCU and one endpoint at hub
Two 768 kbps streams from one
site
1.9 Mbps streams from all others
How much bandwidth is required?
3/28/2013
14
Copyright 2012 by InfoComm International®
Videoconferencing Bandwidth Example
• Hub Site LAN
• [(0.768 + (0.768 * 0.2)) * 2] + [(1.9 + (1.9 * 0.2)) * 4] =
• [(0.768 + 0.154) * 2] + [(1.9 + 0.4) * 4] =
• [(0.922) * 2] + [(2.3) * 4] =
• 1.844 + 9.2 =
• 11 Mbps
Copyright 2012 by InfoComm International®
Videoconferencing Bandwidth Example
Branch to Hub WAN Spokes
[0.768 + (0.768 * 0.2)] * 2 = 
(0.768 + 0.154) * 2 = 
0.922 * 2 = 
1.844 Mbps 
[1.9 + (1.9 * 0.2)] * 1 = 
[1.9 + (0.4)] * 1 = 
2.3 * 1 = 
2.3 Mbps 
3/28/2013
15
Copyright 2012 by InfoComm International®
Dedicated Network Links for
Videoconferencing
Video can use up to 70% of a dedicated link
Audio can use even more
If MPLS is used, make sure dedicated links have their
own access link to the MPLS provider
Copyright 2012 by InfoComm International®
Latency Target Factors
Network response time
Is there QoS?
Is there packet shaping?
Presentation layer latency
Application specific factors
3/28/2013
16
Copyright 2012 by InfoComm International®
Latency
How much latency is inherent?
o Internal speed test server
o www.speedtest.net
o www.speakeasy.net
o www.dslreports.com
How much latency is acceptable?
o Videoconferencing: 200 msec
o High fidelity audio: approx 50 sec
o Desktop video (streaming): 1 sec!
Will data be encrypted?
Copyright 2012 by InfoComm International®
Videoconferencing Latency
Manufacturers claim to tolerate up to 200 ms
IEEE 401 recommends no more than 100 ms
Test inherent latency - provide dedicated links as
necessary
Encryption will introduce additional latency
3/28/2013
17
Copyright 2012 by InfoComm International®
Packet Loss Target Factors
How many packets can your application can be expected
to drop?
Calculate peak and average bandwidth consumption
Compare to peak and average available throughput
Assess impact of dropped packets
Reserve bandwidth or reduce scale if necessary
Ports and Protocols
3/28/2013
18
Copyright 2012 by InfoComm International®
Ports and Protocols - Introduction
• This section includes the following topics:
– Ports and Protocols
– Firewalls
– Ports and Protocols Document
Copyright 2012 by InfoComm International®
Ports
• Port number - indicates the application that
sent/will use the data
System ports (0 - 1023) - assigned to standards track
protocols
User ports (1024 - 49151) - assigned to application upon
request
Dynamic ports (49152 - 65535) - cannot be assigned
• Socket – combination of Port and IP address; identifies a
unique session
3/28/2013
19
Copyright 2012 by InfoComm International®
Common Ports for AV
Protocol  TCP Port(s)  UDP Ports 
HHTP 80
Secure HTTP (HTTPS) 443
File Transfer Protocol (FTP) 20 (data), 21 (control)
Secure Shell (SSH) 22 22
Telnet 23
Simple Network Management Protocol 
(SNMP)
161 161
Domain Name System 53 53
Copyright 2012 by InfoComm International®
Identifying Ports and Protocols
Opening a port is a security concern.
Required ports should be documented for the network
manager.
Required ports should be listed in manufacturer specs.
Verify specs using a network analyzer.
3/28/2013
20
Copyright 2012 by InfoComm International®
Firewall
Firewall: any technology that protects
from intrusion/regulates traffic
May allow all traffic except what’s
forbidden
May forbid all traffic except what’s
allowed
Either way: document and coordinate!
Copyright 2012 by InfoComm International®
Ports and Protocols Document
Communicates and documents device
connectivity needs.
Device narrative
Interdevice communication
Device properties
Routing and addressing
If applicable: SNMP management and conferencing
addressing
Passwords (if requested)
Start the argument early, and everybody wins.
3/28/2013
21
Copyright 2012 by InfoComm International®
Network Readiness - Summary
• This section includes the following topics:
– Service Level Agreements
– Service Targets
– Ports and Protocols
• Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Chapter11
Chapter11Chapter11
Chapter11
 
Chapter12
Chapter12Chapter12
Chapter12
 
Industrial Ethernet, Part 1: Technologies
Industrial Ethernet, Part 1: TechnologiesIndustrial Ethernet, Part 1: Technologies
Industrial Ethernet, Part 1: Technologies
 
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
 
Server-based and Network-assisted Solutions for Adaptive Video Streaming
Server-based and Network-assisted Solutions for Adaptive Video StreamingServer-based and Network-assisted Solutions for Adaptive Video Streaming
Server-based and Network-assisted Solutions for Adaptive Video Streaming
 
Chapter02
Chapter02Chapter02
Chapter02
 
2596 - Integrating PureApplication System Into Your Network
2596 - Integrating PureApplication System Into Your Network2596 - Integrating PureApplication System Into Your Network
2596 - Integrating PureApplication System Into Your Network
 
Chapter01
Chapter01Chapter01
Chapter01
 
Netpod - The Merging of NPM & APM
Netpod - The Merging of NPM & APMNetpod - The Merging of NPM & APM
Netpod - The Merging of NPM & APM
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
Chapter04
Chapter04Chapter04
Chapter04
 
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...Example of One  of my Desgins  for Cyber &Networking Solutions for Customers ...
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
 
Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
 
Transition from PROFIBUS to PROFINET Network | Webinar
Transition from PROFIBUS to PROFINET Network | WebinarTransition from PROFIBUS to PROFINET Network | Webinar
Transition from PROFIBUS to PROFINET Network | Webinar
 
02 requirements and technology for Modern Network by Nader Elmansi
02 requirements and technology for Modern Network by Nader Elmansi02 requirements and technology for Modern Network by Nader Elmansi
02 requirements and technology for Modern Network by Nader Elmansi
 
Example
ExampleExample
Example
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
 
Whitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest MindsWhitepaper: Network Virtualization - Happiest Minds
Whitepaper: Network Virtualization - Happiest Minds
 
Larry o brien fieldbus foundation english
Larry o brien fieldbus foundation englishLarry o brien fieldbus foundation english
Larry o brien fieldbus foundation english
 
N
NN
N
 

Ähnlich wie Assessing Network Readiness

M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
Angel Garcia
 
Pmw2 k3ni 1-1b
Pmw2 k3ni 1-1bPmw2 k3ni 1-1b
Pmw2 k3ni 1-1b
hariclant1
 
sprintnet-smartshare_info-and-benchmarks
sprintnet-smartshare_info-and-benchmarkssprintnet-smartshare_info-and-benchmarks
sprintnet-smartshare_info-and-benchmarks
Reza Mamati
 

Ähnlich wie Assessing Network Readiness (20)

INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network Readiness
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 
Public Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssurancePublic Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service Assurance
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
Chapter04
Chapter04Chapter04
Chapter04
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
QoS in IP Network.pptx
QoS in IP Network.pptxQoS in IP Network.pptx
QoS in IP Network.pptx
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
 
Lanka government cloud: what, why & how?
Lanka government cloud: what, why & how?Lanka government cloud: what, why & how?
Lanka government cloud: what, why & how?
 
PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)
 
Pmw2 k3ni 1-1b
Pmw2 k3ni 1-1bPmw2 k3ni 1-1b
Pmw2 k3ni 1-1b
 
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph DatabaseTelecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
Paul Polakos (Bel Labs, Alcatel-Lucent, USA) - Network Virtualisation
Paul Polakos (Bel Labs, Alcatel-Lucent, USA) - Network VirtualisationPaul Polakos (Bel Labs, Alcatel-Lucent, USA) - Network Virtualisation
Paul Polakos (Bel Labs, Alcatel-Lucent, USA) - Network Virtualisation
 
sprintnet-smartshare_info-and-benchmarks
sprintnet-smartshare_info-and-benchmarkssprintnet-smartshare_info-and-benchmarks
sprintnet-smartshare_info-and-benchmarks
 

Mehr von rAVe [PUBS]

Universal Serial Bus (USB) Deep Dive Technology Exploration for AV Design and...
Universal Serial Bus (USB) Deep Dive Technology Exploration for AV Design and...Universal Serial Bus (USB) Deep Dive Technology Exploration for AV Design and...
Universal Serial Bus (USB) Deep Dive Technology Exploration for AV Design and...
rAVe [PUBS]
 

Mehr von rAVe [PUBS] (20)

Kayye's Krystal Ball - Updated 2019
Kayye's Krystal Ball - Updated 2019Kayye's Krystal Ball - Updated 2019
Kayye's Krystal Ball - Updated 2019
 
Installation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT Systems Installation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT Systems
 
Universal Serial Bus (USB) Deep Dive Technology Exploration for AV Design and...
Universal Serial Bus (USB) Deep Dive Technology Exploration for AV Design and...Universal Serial Bus (USB) Deep Dive Technology Exploration for AV Design and...
Universal Serial Bus (USB) Deep Dive Technology Exploration for AV Design and...
 
Avoiding Pitfalls in Digital Signage Installations and Content
Avoiding Pitfalls in Digital Signage Installations and Content Avoiding Pitfalls in Digital Signage Installations and Content
Avoiding Pitfalls in Digital Signage Installations and Content
 
AV in an IT World
AV in an IT WorldAV in an IT World
AV in an IT World
 
An Unbiased Explanation of AV-over-IP - Updated March 2019
An Unbiased Explanation of AV-over-IP - Updated March 2019An Unbiased Explanation of AV-over-IP - Updated March 2019
An Unbiased Explanation of AV-over-IP - Updated March 2019
 
Introduction to Windows Collaboration Displays
Introduction to Windows Collaboration DisplaysIntroduction to Windows Collaboration Displays
Introduction to Windows Collaboration Displays
 
Digital Signage Content Strategies for Savvy Integrators
Digital Signage Content Strategies for Savvy IntegratorsDigital Signage Content Strategies for Savvy Integrators
Digital Signage Content Strategies for Savvy Integrators
 
Kayye’s Krystal Ball 2018
Kayye’s Krystal Ball 2018Kayye’s Krystal Ball 2018
Kayye’s Krystal Ball 2018
 
UPDATED: OLED, The Curve of the Future
UPDATED: OLED, The Curve of the FutureUPDATED: OLED, The Curve of the Future
UPDATED: OLED, The Curve of the Future
 
An Unbiased Explanation of AV-over-IP
An Unbiased Explanation of AV-over-IPAn Unbiased Explanation of AV-over-IP
An Unbiased Explanation of AV-over-IP
 
Top 10 (+2) Things Gary Kayye Saw at InfoComm 2018
Top 10 (+2) Things Gary Kayye Saw at InfoComm 2018Top 10 (+2) Things Gary Kayye Saw at InfoComm 2018
Top 10 (+2) Things Gary Kayye Saw at InfoComm 2018
 
The Future of Digital Signage in Smart Connected Cities
The Future of Digital Signage in Smart Connected Cities The Future of Digital Signage in Smart Connected Cities
The Future of Digital Signage in Smart Connected Cities
 
An Introduction and Comparison of Dante, AVB and CobraNet Methodologies
An Introduction and Comparison of Dante, AVB and CobraNet MethodologiesAn Introduction and Comparison of Dante, AVB and CobraNet Methodologies
An Introduction and Comparison of Dante, AVB and CobraNet Methodologies
 
The Internet of Things Conference at E4
The Internet of Things Conference at E4The Internet of Things Conference at E4
The Internet of Things Conference at E4
 
The Future of Meeting Rooms and Classrooms is the 4K Digital Canvas
The Future of Meeting Rooms and Classrooms is the 4K Digital CanvasThe Future of Meeting Rooms and Classrooms is the 4K Digital Canvas
The Future of Meeting Rooms and Classrooms is the 4K Digital Canvas
 
OLED Curve of the Future
OLED Curve of the FutureOLED Curve of the Future
OLED Curve of the Future
 
Dante Audio Networking Fundamentals
Dante Audio Networking FundamentalsDante Audio Networking Fundamentals
Dante Audio Networking Fundamentals
 
Installation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT SystemsInstallation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT Systems
 
Designing Commercial Systems for Maximum Performance and Profit
Designing Commercial Systems for Maximum Performance and ProfitDesigning Commercial Systems for Maximum Performance and Profit
Designing Commercial Systems for Maximum Performance and Profit
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

Assessing Network Readiness

  • 1. 3/28/2013 1 Assessing Network Readiness Copyright 2012 by InfoComm International® Network Readiness - Introduction • This session includes the following topics: • Service Level Agreements • Service Target Levels • Ports and Protocols
  • 2. 3/28/2013 2 Service Level Agreements Copyright 2012 by InfoComm International® The Importance of Documentation When you install a new service or system: – How often does the system need to work perfectly? – How long should the system last? – Whose fault is it if it stops working? – How soon does it need to be fixed? Revolutionary idea: the customer is NOT always right.
  • 3. 3/28/2013 3 Copyright 2012 by InfoComm International® Needs Analysis • Operational Needs • Determines the Applications • Determines the Tasks that can be done • Determines the Functions and Features Needs Applications Tasks Functions and Features Copyright 2012 by InfoComm International® Equipment List
  • 4. 3/28/2013 4 Copyright 2012 by InfoComm International® Service Level Agreement - Definition • AV needs analysis - usually captured in Program Report Based on needs analysis/program meeting Comes from the architectural field Focused on physical space • IT service requirements - usually captured in SLA Defined by the ITIL Not tied to user's physical location Focused on network requirements Copyright 2012 by InfoComm International® Service Level Agreement Definition
  • 5. 3/28/2013 5 Copyright 2012 by InfoComm International® Service Level Agreement Definition It’s a contract! Copyright 2012 by InfoComm International® Types of Service Level Agreements – Service-based SLAs cover one service for everyone that uses it – Customer-Based SLAs cover all services provided to a group – Multi-Level SLAs include a customer SLA for the enterprise, customer SLAs for groups, and service SLAs
  • 6. 3/28/2013 6 Copyright 2012 by InfoComm International® Service-Based SLA • A fixed level of service offered to a wide range of users • Standardized services offered at standardized prices Copyright 2012 by InfoComm International® Customer-Based • Services specific to the individual customer’s needs • Not necessarily transferrable to a class of customers
  • 7. 3/28/2013 7 Copyright 2012 by InfoComm International® SLA Use Guidelines All types of service providers should use SLAs. Any time a new service is added to the network, an SLA is updated or created. SLAs can exist in hierarchies. SLAs thoroughly document system limitations. SLAs evolve over time. Copyright 2012 by InfoComm International® Service Level Agreement Components
  • 8. 3/28/2013 8 Copyright 2012 by InfoComm International® The SLA Lifecycle 1.Needs analysis - just like a program report. 2.Service targets - must be measurable. 3.Roles and Responsibilities - could include pricing. 4.Measure and Enforce - weekly measurements at first. 5.Review - service providers and customers are held accountable. Copyright 2012 by InfoComm International® AV's Role in the SLA • Roles with respect to the SLA differ according to project. As an end user help identify service targets As a customer define the need and sign the SLA SLA As a service provider write and sign the SLA
  • 9. 3/28/2013 9 Service Targets Copyright 2012 by InfoComm International® Service Targets - Introduction • This section includes the following topics: – Bandwidth – Latency – Packet Loss
  • 10. 3/28/2013 10 Copyright 2012 by InfoComm International® Bandwidth Usage Target Factors Traffic is bursty. You cant specify the whole capacity for use. How much can you specify? 70%? 50%? Using VLANs, QoS, and traffic shaping, more bandwidth can be specd for use. Consult the network manager. Copyright 2012 by InfoComm International® LAN to WAN Bottlenecks LANs are exponentially faster than WANs "Bottlenecks" can occur, like a six-lane highway merging to two lanes Determine the speed of the WAN Optimize design to keep high bit-rate traffic within LAN
  • 11. 3/28/2013 11 Copyright 2012 by InfoComm International® Quality of Service Applications will take as much bandwidth as they can. Insufficient bandwidth mean lost packets and/or long delays. QoS prioritizes data and/or reserves bandwidth. Copyright 2012 by InfoComm International® Bandwidth: Matching Content to the Network 70% of the rated network capacity is really available (or what network manager says) Rated capacity is based on bottleneck point speed Allows for collision avoidance, even in a switched network 30% of available network can be used for streaming media. Otherwise other traffic has to wait QoS (Quality of Service) is required Bandwidth management (throttling)
  • 12. 3/28/2013 12 Copyright 2012 by InfoComm International® Streaming and QoS Has QoS been implemented? Existing differentiated service classes Resource Reservation Protocol (RSVP) Policy-based QoS rules Traffic shaping Copyright 2012 by InfoComm International® Conferencing and Bandwidth – QoS is required – videoconferencing should have its own class of service – Bandwidth is only relevant in terms of network segment • 4 Mbps on one segment + 4 Mbps on another segment = 4 Mbps total – Your goal is to find per segment usage Formula: Bandwidth per Segment for an MCU Call (Bit Rate + 20% overhead ) * Number of Simultaneous Calls = Bandwidth Required Each endpoint = simultaneous call. If IPSec VPN is being used add an additional 5% of overhead.
  • 13. 3/28/2013 13 Copyright 2012 by InfoComm International® Common Videoconferencing Bit Rates Endpoint Type Rate Mobile/Software‐based 192 kbps 384 kbps Desktop/Room‐based 512 Kbps 768 Kbps HD Desktop/Room‐based 1024 Kbps 1472 Kbps Immersive 1920 Kbps 3840 Kbps 4096 Kbps Copyright 2012 by InfoComm International® Videoconferencing Bandwidth Example Multipoint call with 6 endpoints MCU and one endpoint at hub Two 768 kbps streams from one site 1.9 Mbps streams from all others How much bandwidth is required?
  • 14. 3/28/2013 14 Copyright 2012 by InfoComm International® Videoconferencing Bandwidth Example • Hub Site LAN • [(0.768 + (0.768 * 0.2)) * 2] + [(1.9 + (1.9 * 0.2)) * 4] = • [(0.768 + 0.154) * 2] + [(1.9 + 0.4) * 4] = • [(0.922) * 2] + [(2.3) * 4] = • 1.844 + 9.2 = • 11 Mbps Copyright 2012 by InfoComm International® Videoconferencing Bandwidth Example Branch to Hub WAN Spokes [0.768 + (0.768 * 0.2)] * 2 =  (0.768 + 0.154) * 2 =  0.922 * 2 =  1.844 Mbps  [1.9 + (1.9 * 0.2)] * 1 =  [1.9 + (0.4)] * 1 =  2.3 * 1 =  2.3 Mbps 
  • 15. 3/28/2013 15 Copyright 2012 by InfoComm International® Dedicated Network Links for Videoconferencing Video can use up to 70% of a dedicated link Audio can use even more If MPLS is used, make sure dedicated links have their own access link to the MPLS provider Copyright 2012 by InfoComm International® Latency Target Factors Network response time Is there QoS? Is there packet shaping? Presentation layer latency Application specific factors
  • 16. 3/28/2013 16 Copyright 2012 by InfoComm International® Latency How much latency is inherent? o Internal speed test server o www.speedtest.net o www.speakeasy.net o www.dslreports.com How much latency is acceptable? o Videoconferencing: 200 msec o High fidelity audio: approx 50 sec o Desktop video (streaming): 1 sec! Will data be encrypted? Copyright 2012 by InfoComm International® Videoconferencing Latency Manufacturers claim to tolerate up to 200 ms IEEE 401 recommends no more than 100 ms Test inherent latency - provide dedicated links as necessary Encryption will introduce additional latency
  • 17. 3/28/2013 17 Copyright 2012 by InfoComm International® Packet Loss Target Factors How many packets can your application can be expected to drop? Calculate peak and average bandwidth consumption Compare to peak and average available throughput Assess impact of dropped packets Reserve bandwidth or reduce scale if necessary Ports and Protocols
  • 18. 3/28/2013 18 Copyright 2012 by InfoComm International® Ports and Protocols - Introduction • This section includes the following topics: – Ports and Protocols – Firewalls – Ports and Protocols Document Copyright 2012 by InfoComm International® Ports • Port number - indicates the application that sent/will use the data System ports (0 - 1023) - assigned to standards track protocols User ports (1024 - 49151) - assigned to application upon request Dynamic ports (49152 - 65535) - cannot be assigned • Socket – combination of Port and IP address; identifies a unique session
  • 19. 3/28/2013 19 Copyright 2012 by InfoComm International® Common Ports for AV Protocol  TCP Port(s)  UDP Ports  HHTP 80 Secure HTTP (HTTPS) 443 File Transfer Protocol (FTP) 20 (data), 21 (control) Secure Shell (SSH) 22 22 Telnet 23 Simple Network Management Protocol  (SNMP) 161 161 Domain Name System 53 53 Copyright 2012 by InfoComm International® Identifying Ports and Protocols Opening a port is a security concern. Required ports should be documented for the network manager. Required ports should be listed in manufacturer specs. Verify specs using a network analyzer.
  • 20. 3/28/2013 20 Copyright 2012 by InfoComm International® Firewall Firewall: any technology that protects from intrusion/regulates traffic May allow all traffic except what’s forbidden May forbid all traffic except what’s allowed Either way: document and coordinate! Copyright 2012 by InfoComm International® Ports and Protocols Document Communicates and documents device connectivity needs. Device narrative Interdevice communication Device properties Routing and addressing If applicable: SNMP management and conferencing addressing Passwords (if requested) Start the argument early, and everybody wins.
  • 21. 3/28/2013 21 Copyright 2012 by InfoComm International® Network Readiness - Summary • This section includes the following topics: – Service Level Agreements – Service Targets – Ports and Protocols • Questions?