SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
www.wildpackets.com© WildPackets, Inc.
VoIP and VoFi
Monitoring and Analysis
January 2015
Jay Botelho
Director of Product Management
WildPackets
jbotelho@wildpackets.com
Follow me @jaybotelho
© WildPackets, Inc. 2
Agenda
‱ VoIP – Still Top of Mind in Network Performance
Monitoring
‱ VoIP/VoFi/Video Is Just Different!
‱ Key Metrics
‱ Monitoring and Analyzing VoIP/VoFi Issues
www.wildpackets.com© WildPackets, Inc.
VoIP – Still Top of Mind in
Network Performance Monitoring
© WildPackets, Inc. 4
TRAC NPM Research
Demographics
Early 2014
406 participants
Company type:
 70% - Enterprise
 28% - Service
Providers
Company size:
 41% - Large organizations
 38% - Medium
 21% - Small
Geography
 56% - North America
 24% - EMEA
 14% - APAC
© WildPackets, Inc. 5
Key IT Initiatives Impacting
Network Performance
48%
54%
59%
65%
66%
69%
72%
BYOD
Public Cloud services
Video conferencing
Virtual desktops
Enterprise Mobility
Big Data
VoIP
© WildPackets, Inc. 6
36%
40%
41%
59%
64%
Ability to improve performance for home
office users
Managing recreational traffic
Increase in number of IP flows to be managed
Managing bandwidth consumption per
user/subscriber
Managing real-time applications (VoIP, video,
etc.)
Key Challenges for
Managing Network Traffic
© WildPackets, Inc. 7
Key Challenges for
Managing UC Performance
24%
31%
38%
44%
44%
52%
Time spent on extracting session details
Inability to correlate multiple network layers
Visibility into bandwidth utilization
Visibility into the quality of user experience
Visibility into each session for UC technologies
Visibility into the impact of UC deployments on
other applications on the network
© WildPackets, Inc. 8
And It’s Not Just VoIP 

‱ Percentage of all forms of video (TV, VoD, Internet,
and P2P) will be approximately 90 percent of global
consumer traffic by 2015
‱ Internet video to TVs will increase 17-fold by 2015
http://www.cisco.com/en/US/solutions/collateral/ns341/n
s525/ns537/ns705/ns827/white_paper_c11-481360.pdf
www.wildpackets.com© WildPackets, Inc.
VoIP/Video Is Just Different!
© WildPackets, Inc. 10
VoIP/Video Is Just Different!
‱ Packet delivery not guaranteed
‱ Small and consistent packet
sizes
‱ Highly regular packet spacing
‱ Reliable packet delivery
‱ Large and variable packet
sizes
‱ Widely varying packet
spacing
VoIP Data
© WildPackets, Inc. 11
The Impact of "Just One More Call"
‱ Although a network link may be able to support a
number of concurrent calls, one additional call is
often enough to cause quality problems 

x1113
x2111
x1112
x1111
1st Call
2nd Call
3rd Call
x2112
x2113
Example: The WAN can support 2 simultaneous calls.
What happens when a third call is attempted???
© WildPackets, Inc. 12
The Impact of "Just One More Call"
‱ Although a network link may be able to support a
number of concurrent calls, one additional call is
often enough to cause quality problems 

x1113
x2111
x1112
x1111
1st Call
2nd Call
3rd Call
x2112
x2113
Example: The WAN can support 2 simultaneous calls.
What happens when a third call is attempted???
Call #3 Causes Poor Quality for ALL Calls
© WildPackets, Inc. 13
Quantitative Interference Impacts on VoFi
Source: Farpoint Group
© WildPackets, Inc. 14
Quantitative Interference Impacts on VidFi
Source: Farpoint Group
© WildPackets, Inc. 15
Packet-by-Packet
VoFi Call
Wired VoIP Call
www.wildpackets.com© WildPackets, Inc.
Key Metrics
© WildPackets, Inc. 17
Key RTP (VoIP/VoFi/Video) Metrics
CAMP IT Pinpointing the Problem 17
Packet
Loss
JitterLatency
© WildPackets, Inc. 18
Latency
Queue Latency &
Decision Latency
Network
Propagation
Delay
Encoding / Decoding
Compression / Decompression
Jitter Buffer Latency
0 ms
100 ms
200 ms
300 ms
400 ms
500 ms
600 ms
700 ms
800
ms
The ITU
recommends a
maximum one-
way delay of
150 ms for
VoIP
© WildPackets, Inc. 19
Latency's Effects
‱ Talkover
‒ Occurs when excessive latency delays audio
– Conversation cadence is not natural or comfortable
– Callers feel as if they must “push to talk” or say “over” to control the
conversation
‱ Echo
‒ The speaker’s voice feeds back into the listener’s microphone
‒ The speaker then hears his own voice returning from the listener’s end,
but delayed due to latency
‒ Most callers find it difficult to maintain normal speech when echo delay
is prolonged
‒ Some VoIP systems attempt to cancel echo, but are not always
successful
High latency may also cause additional troubles such as loss of
synchronization between audio and video for multimedia sessions.
© WildPackets, Inc. 20
Jitter
‱ Jitter is the variance in packet delivery intervals to the listener
‱ Jitter buffer adds additional delay to voice reaching the ear piece in
case other packets need to catch up
‱ Packets delayed too long in the network are not allowed to enter the
jitter buffer
Packets delayed more than the buffer delay
(100 ms as an example) are dropped
. . .. .. . . ........
......
Packets are buffered and
delayed at the Receiver
The “jitter” buffer releases
a G.711 packet every 20 ms
A G.711 packet sent
every 20 ms
Packet jitter and drops
31
2
4
© WildPackets, Inc. 21
Jitter's Effects
‱ Jitter causes weird “sound effects” that vary with
jitter severity and environmental factors
‱ Examples include:
‒ Static
‒ Stuttering or uneven audio – abnormal speech rhythm
‒ For multimedia systems, video may be “jerky” or irregular
‱ If jitter levels are high, packet loss can result
‒ In some cases, severe jitter may sound similar to packet loss,
even if no packets are actually dropped
© WildPackets, Inc. 22
Packet Loss
‱ Packet dropped due to physical layer corruption
‱ Congestion without adequate QoS provisions
‱ Jitter buffer discards due to excessive latency
© WildPackets, Inc. 23
Packet Loss Effects
‱ Causes missing sounds, syllables, words, or phrases
‒ DSP algorithms may compensate for up to 30 ms of missing data
‒ More than 30 ms of missing audio is noticeable by listeners
‱ An average person speaks at a rate of about 200 words per
minute
‒ That’s 3.33 words/sec = 300 ms per word
‒ For G.711, we would need to lose 15 consecutive RTP packets to lose
a whole word
‒ Dropping 15 packets/sec for G.711 would be a loss rate of 30%
‱ But losing only a few packets can still be very noticeable
‒ Loss of more than 2 consecutive packets will be heard
‒ Loss rates ≄ 2% will have a strong impact on quality
‒ Losses of 5 – 10% make calls all but intolerable
‒ Bursty periods of packet loss are worse than more dispersed loss
© WildPackets, Inc. 24
Measuring Key RTP Metrics
© WildPackets, Inc. 25
Making Sense of the Metrics
‱ A single value to reflect the user’s QoE (quality of experience)
‱ Mean Opinion Score (MOS) – several flavors
‒ Algorithmic simulation of subjective audio assessment
‒ Most commonly used varieties are MOS-LQ (listening quality) and
MOS-CQ (conversational quality)
‒ Possible range of 1 (poor) to 5 (excellent)
‒ Maximum possible MOS = 4.4 with G.711
‒ Typical range in most networks is 3.5 – 4.2
‱ R-Factor – several flavors
‒ Based on latency, jitter, packet loss, bit rate, and signal-to-noise ratio,
codec effects (for low bit-rate codecs)
‱ The ITU algorithms consider about 20 quality inputs
‒ Possible range of 0 (poor) to 100 (excellent)
‒ Provides LQ, CQ, and other score variants
© WildPackets, Inc. 26
Measuring MOS and R-Factor
© WildPackets, Inc. 27
Review of Key RTP Metrics
‱ Latency
‱ Jitter
‱ Packet Loss
‱ MOS
‱ R-Factor
© WildPackets, Inc. 28
Data Impacts on VoIP
© WildPackets, Inc. 29
Got QoS?
‱ One of the most potent weapons for fighting VoIP
troubles is to provision Quality of Service (QoS)
‱ QoS enables network devices to prioritize and give
preference to packet streams that are sensitive to delay,
packet loss, jitter, and other performance inhibitors
‱ Standards-based QoS methods include:
‒ IP Differentiated Services (DiffServ)
‒ MAC Layer QoS with IEEE 802.1p
‒ VLANs
‱ QoS may be obtained or supplemented via proprietary
means, such as traffic shaping via various flow
processing algorithms
‱ Watch for too much differentiated traffic!
© WildPackets, Inc. 30
Ready for QoS?
‱ QoS provisions are based on the “weakest link”
concept
‒ If any device in a data path does not support QoS, then media
streams will not be afforded the preference they require for good
performance
‱ Pre-deployment assessment must ensure that ALL
devices can recognize and respond to QoS
parameters in packet headers
‒ Switches, routers, firewalls, proxies, and any other devices that
touch RTP packets must be “VoIP-friendly”
© WildPackets, Inc. 31
Monitoring QoS Configuration
www.wildpackets.com© WildPackets, Inc.
Troubleshooting RTP Issues
© WildPackets, Inc. 33
VoIP Dashboard View
© WildPackets, Inc. 34
Calls View
© WildPackets, Inc. 35
Media View
© WildPackets, Inc. 36
Call Data Record (CDR)
Provides comprehensive, real-time
statistical and quality report for base-
lining, and 100% visibility into calls
© WildPackets, Inc. 37
Down To The Details 

© WildPackets, Inc. 38
Identifying Unauthorized RTP Traffic
‱ Look for bandwidth hogs
‱ Use filters and alarms
www.wildpackets.com© WildPackets, Inc.
Q&A
Thank You!
WildPackets, Inc.
1340 Treat Boulevard, Suite 500
Walnut Creek, CA 94597
(925) 937-3200

Weitere Àhnliche Inhalte

Was ist angesagt?

802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?STelligence Company
 
Tech Support in the Modern Age
Tech Support in the Modern AgeTech Support in the Modern Age
Tech Support in the Modern AgeLisa Menestrina
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisThe blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisSavvius, Inc
 
Unv banking & finance video surveillance solution v1.00
Unv banking & finance video surveillance solution v1.00Unv banking & finance video surveillance solution v1.00
Unv banking & finance video surveillance solution v1.00Abul Hasnat Sohel
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016Fanky Christian
 
Juniper Services and Support
Juniper Services and SupportJuniper Services and Support
Juniper Services and SupportMarketingArrowECS_CZ
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
 
Cybernetyx introduction
Cybernetyx introductionCybernetyx introduction
Cybernetyx introductionFanky Christian
 
Juniper Services and Support
Juniper Services and SupportJuniper Services and Support
Juniper Services and SupportMarketingArrowECS_CZ
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
 
Overview OpManager
Overview OpManagerOverview OpManager
Overview OpManagerFanky Christian
 
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...APNIC
 
DCMS AKCP Product Presentation
DCMS AKCP Product PresentationDCMS AKCP Product Presentation
DCMS AKCP Product PresentationFanky Christian
 
How to deploy AppInternals in azure
How to deploy AppInternals in azureHow to deploy AppInternals in azure
How to deploy AppInternals in azureIan Downard
 
ThousandEyes at Zendesk
ThousandEyes at ZendeskThousandEyes at Zendesk
ThousandEyes at ZendeskThousandEyes
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionAlan Percy
 

Was ist angesagt? (20)

802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?
 
Tech Support in the Modern Age
Tech Support in the Modern AgeTech Support in the Modern Age
Tech Support in the Modern Age
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisThe blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysis
 
Unv banking & finance video surveillance solution v1.00
Unv banking & finance video surveillance solution v1.00Unv banking & finance video surveillance solution v1.00
Unv banking & finance video surveillance solution v1.00
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
 
CV-ROB
CV-ROBCV-ROB
CV-ROB
 
Juniper Services and Support
Juniper Services and SupportJuniper Services and Support
Juniper Services and Support
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
Cybernetyx introduction
Cybernetyx introductionCybernetyx introduction
Cybernetyx introduction
 
Juniper Services and Support
Juniper Services and SupportJuniper Services and Support
Juniper Services and Support
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 
Overview OpManager
Overview OpManagerOverview OpManager
Overview OpManager
 
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 - Technical Key...
 
DCMS AKCP Product Presentation
DCMS AKCP Product PresentationDCMS AKCP Product Presentation
DCMS AKCP Product Presentation
 
How to deploy AppInternals in azure
How to deploy AppInternals in azureHow to deploy AppInternals in azure
How to deploy AppInternals in azure
 
ThousandEyes at Zendesk
ThousandEyes at ZendeskThousandEyes at Zendesk
ThousandEyes at Zendesk
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 

Andere mochten auch

SIP dilivery methods and ROI
SIP dilivery methods and ROISIP dilivery methods and ROI
SIP dilivery methods and ROImarkbiltonsmith
 
ServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for ShoretelServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for ShoretelServicePilot
 
SIP in Service Quality Monitoring
SIP in Service Quality MonitoringSIP in Service Quality Monitoring
SIP in Service Quality MonitoringTTI Telecom
 
Introduction to TTI Telecom
Introduction to TTI TelecomIntroduction to TTI Telecom
Introduction to TTI TelecomTTI Telecom
 
Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management ThousandEyes
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP ThousandEyes
 
Monitoring Network Performance in China
Monitoring Network Performance in ChinaMonitoring Network Performance in China
Monitoring Network Performance in ChinaThousandEyes
 

Andere mochten auch (8)

SIP dilivery methods and ROI
SIP dilivery methods and ROISIP dilivery methods and ROI
SIP dilivery methods and ROI
 
ServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for ShoretelServicePilot VoIP and UC monitoring for Shoretel
ServicePilot VoIP and UC monitoring for Shoretel
 
SIP in Service Quality Monitoring
SIP in Service Quality MonitoringSIP in Service Quality Monitoring
SIP in Service Quality Monitoring
 
Introduction to TTI Telecom
Introduction to TTI TelecomIntroduction to TTI Telecom
Introduction to TTI Telecom
 
Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management ThousandEyes VoIP Performance Management
ThousandEyes VoIP Performance Management
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
Monitoring Network Performance in China
Monitoring Network Performance in ChinaMonitoring Network Performance in China
Monitoring Network Performance in China
 

Ähnlich wie Bright talk voip vofi webinar jan2015-v2

VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
860 dspi voip testing
860 dspi voip testing860 dspi voip testing
860 dspi voip testingtrilithicweb
 
ENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxZikoSuryaLesmana
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdfyohansurya2
 
ETE405-lec8.pdf
ETE405-lec8.pdfETE405-lec8.pdf
ETE405-lec8.pdfmashiur
 
IR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdfIR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdfChandanPrajwal
 
Maior Technical Profile
Maior Technical ProfileMaior Technical Profile
Maior Technical Profilemaior_technology
 
ETE405-lec8.pptx
ETE405-lec8.pptxETE405-lec8.pptx
ETE405-lec8.pptxmashiur
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
 
Multimedia-Applications.ppt
Multimedia-Applications.pptMultimedia-Applications.ppt
Multimedia-Applications.pptLightYagami490518
 
VoIP Termination Issues: What They are and How to Prevent Them
VoIP Termination Issues: What They are and How to Prevent ThemVoIP Termination Issues: What They are and How to Prevent Them
VoIP Termination Issues: What They are and How to Prevent ThemBankai Group
 
Advanced radio over IP
Advanced radio over IPAdvanced radio over IP
Advanced radio over IPComms Connect
 
Performance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdfPerformance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdfPhcng785014
 
Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2mashiur
 

Ähnlich wie Bright talk voip vofi webinar jan2015-v2 (20)

VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
860 dspi voip testing
860 dspi voip testing860 dspi voip testing
860 dspi voip testing
 
ENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptxENSA_Module_9-QoS Concept.pptx
ENSA_Module_9-QoS Concept.pptx
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
ETE405-lec8.pdf
ETE405-lec8.pdfETE405-lec8.pdf
ETE405-lec8.pdf
 
seminar4
seminar4seminar4
seminar4
 
IR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdfIR-Optimising-Your-Network.pdf
IR-Optimising-Your-Network.pdf
 
Maior Technical Profile
Maior Technical ProfileMaior Technical Profile
Maior Technical Profile
 
ETE405-lec8.pptx
ETE405-lec8.pptxETE405-lec8.pptx
ETE405-lec8.pptx
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
pvitwp
pvitwppvitwp
pvitwp
 
pvitwp
pvitwppvitwp
pvitwp
 
Multimedia-Applications.ppt
Multimedia-Applications.pptMultimedia-Applications.ppt
Multimedia-Applications.ppt
 
moip
moipmoip
moip
 
VoIP Termination Issues: What They are and How to Prevent Them
VoIP Termination Issues: What They are and How to Prevent ThemVoIP Termination Issues: What They are and How to Prevent Them
VoIP Termination Issues: What They are and How to Prevent Them
 
Advanced radio over IP
Advanced radio over IPAdvanced radio over IP
Advanced radio over IP
 
Performance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdfPerformance & Monitoring Performance.pdf
Performance & Monitoring Performance.pdf
 
Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2
 

Mehr von Savvius, Inc

Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringSavvius, Inc
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 UpdateSavvius, Inc
 
Real Packets from Virtual Servers
Real Packets from Virtual ServersReal Packets from Virtual Servers
Real Packets from Virtual ServersSavvius, Inc
 

Mehr von Savvius, Inc (17)

Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
 
Real Packets from Virtual Servers
Real Packets from Virtual ServersReal Packets from Virtual Servers
Real Packets from Virtual Servers
 

KĂŒrzlich hochgeladen

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 

KĂŒrzlich hochgeladen (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Bright talk voip vofi webinar jan2015-v2

  • 1. www.wildpackets.com© WildPackets, Inc. VoIP and VoFi Monitoring and Analysis January 2015 Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com Follow me @jaybotelho
  • 2. © WildPackets, Inc. 2 Agenda ‱ VoIP – Still Top of Mind in Network Performance Monitoring ‱ VoIP/VoFi/Video Is Just Different! ‱ Key Metrics ‱ Monitoring and Analyzing VoIP/VoFi Issues
  • 3. www.wildpackets.com© WildPackets, Inc. VoIP – Still Top of Mind in Network Performance Monitoring
  • 4. © WildPackets, Inc. 4 TRAC NPM Research Demographics Early 2014 406 participants Company type:  70% - Enterprise  28% - Service Providers Company size:  41% - Large organizations  38% - Medium  21% - Small Geography  56% - North America  24% - EMEA  14% - APAC
  • 5. © WildPackets, Inc. 5 Key IT Initiatives Impacting Network Performance 48% 54% 59% 65% 66% 69% 72% BYOD Public Cloud services Video conferencing Virtual desktops Enterprise Mobility Big Data VoIP
  • 6. © WildPackets, Inc. 6 36% 40% 41% 59% 64% Ability to improve performance for home office users Managing recreational traffic Increase in number of IP flows to be managed Managing bandwidth consumption per user/subscriber Managing real-time applications (VoIP, video, etc.) Key Challenges for Managing Network Traffic
  • 7. © WildPackets, Inc. 7 Key Challenges for Managing UC Performance 24% 31% 38% 44% 44% 52% Time spent on extracting session details Inability to correlate multiple network layers Visibility into bandwidth utilization Visibility into the quality of user experience Visibility into each session for UC technologies Visibility into the impact of UC deployments on other applications on the network
  • 8. © WildPackets, Inc. 8 And It’s Not Just VoIP 
 ‱ Percentage of all forms of video (TV, VoD, Internet, and P2P) will be approximately 90 percent of global consumer traffic by 2015 ‱ Internet video to TVs will increase 17-fold by 2015 http://www.cisco.com/en/US/solutions/collateral/ns341/n s525/ns537/ns705/ns827/white_paper_c11-481360.pdf
  • 10. © WildPackets, Inc. 10 VoIP/Video Is Just Different! ‱ Packet delivery not guaranteed ‱ Small and consistent packet sizes ‱ Highly regular packet spacing ‱ Reliable packet delivery ‱ Large and variable packet sizes ‱ Widely varying packet spacing VoIP Data
  • 11. © WildPackets, Inc. 11 The Impact of "Just One More Call" ‱ Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems 
 x1113 x2111 x1112 x1111 1st Call 2nd Call 3rd Call x2112 x2113 Example: The WAN can support 2 simultaneous calls. What happens when a third call is attempted???
  • 12. © WildPackets, Inc. 12 The Impact of "Just One More Call" ‱ Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems 
 x1113 x2111 x1112 x1111 1st Call 2nd Call 3rd Call x2112 x2113 Example: The WAN can support 2 simultaneous calls. What happens when a third call is attempted??? Call #3 Causes Poor Quality for ALL Calls
  • 13. © WildPackets, Inc. 13 Quantitative Interference Impacts on VoFi Source: Farpoint Group
  • 14. © WildPackets, Inc. 14 Quantitative Interference Impacts on VidFi Source: Farpoint Group
  • 15. © WildPackets, Inc. 15 Packet-by-Packet VoFi Call Wired VoIP Call
  • 17. © WildPackets, Inc. 17 Key RTP (VoIP/VoFi/Video) Metrics CAMP IT Pinpointing the Problem 17 Packet Loss JitterLatency
  • 18. © WildPackets, Inc. 18 Latency Queue Latency & Decision Latency Network Propagation Delay Encoding / Decoding Compression / Decompression Jitter Buffer Latency 0 ms 100 ms 200 ms 300 ms 400 ms 500 ms 600 ms 700 ms 800 ms The ITU recommends a maximum one- way delay of 150 ms for VoIP
  • 19. © WildPackets, Inc. 19 Latency's Effects ‱ Talkover ‒ Occurs when excessive latency delays audio – Conversation cadence is not natural or comfortable – Callers feel as if they must “push to talk” or say “over” to control the conversation ‱ Echo ‒ The speaker’s voice feeds back into the listener’s microphone ‒ The speaker then hears his own voice returning from the listener’s end, but delayed due to latency ‒ Most callers find it difficult to maintain normal speech when echo delay is prolonged ‒ Some VoIP systems attempt to cancel echo, but are not always successful High latency may also cause additional troubles such as loss of synchronization between audio and video for multimedia sessions.
  • 20. © WildPackets, Inc. 20 Jitter ‱ Jitter is the variance in packet delivery intervals to the listener ‱ Jitter buffer adds additional delay to voice reaching the ear piece in case other packets need to catch up ‱ Packets delayed too long in the network are not allowed to enter the jitter buffer Packets delayed more than the buffer delay (100 ms as an example) are dropped . . .. .. . . ........ ...... Packets are buffered and delayed at the Receiver The “jitter” buffer releases a G.711 packet every 20 ms A G.711 packet sent every 20 ms Packet jitter and drops 31 2 4
  • 21. © WildPackets, Inc. 21 Jitter's Effects ‱ Jitter causes weird “sound effects” that vary with jitter severity and environmental factors ‱ Examples include: ‒ Static ‒ Stuttering or uneven audio – abnormal speech rhythm ‒ For multimedia systems, video may be “jerky” or irregular ‱ If jitter levels are high, packet loss can result ‒ In some cases, severe jitter may sound similar to packet loss, even if no packets are actually dropped
  • 22. © WildPackets, Inc. 22 Packet Loss ‱ Packet dropped due to physical layer corruption ‱ Congestion without adequate QoS provisions ‱ Jitter buffer discards due to excessive latency
  • 23. © WildPackets, Inc. 23 Packet Loss Effects ‱ Causes missing sounds, syllables, words, or phrases ‒ DSP algorithms may compensate for up to 30 ms of missing data ‒ More than 30 ms of missing audio is noticeable by listeners ‱ An average person speaks at a rate of about 200 words per minute ‒ That’s 3.33 words/sec = 300 ms per word ‒ For G.711, we would need to lose 15 consecutive RTP packets to lose a whole word ‒ Dropping 15 packets/sec for G.711 would be a loss rate of 30% ‱ But losing only a few packets can still be very noticeable ‒ Loss of more than 2 consecutive packets will be heard ‒ Loss rates ≄ 2% will have a strong impact on quality ‒ Losses of 5 – 10% make calls all but intolerable ‒ Bursty periods of packet loss are worse than more dispersed loss
  • 24. © WildPackets, Inc. 24 Measuring Key RTP Metrics
  • 25. © WildPackets, Inc. 25 Making Sense of the Metrics ‱ A single value to reflect the user’s QoE (quality of experience) ‱ Mean Opinion Score (MOS) – several flavors ‒ Algorithmic simulation of subjective audio assessment ‒ Most commonly used varieties are MOS-LQ (listening quality) and MOS-CQ (conversational quality) ‒ Possible range of 1 (poor) to 5 (excellent) ‒ Maximum possible MOS = 4.4 with G.711 ‒ Typical range in most networks is 3.5 – 4.2 ‱ R-Factor – several flavors ‒ Based on latency, jitter, packet loss, bit rate, and signal-to-noise ratio, codec effects (for low bit-rate codecs) ‱ The ITU algorithms consider about 20 quality inputs ‒ Possible range of 0 (poor) to 100 (excellent) ‒ Provides LQ, CQ, and other score variants
  • 26. © WildPackets, Inc. 26 Measuring MOS and R-Factor
  • 27. © WildPackets, Inc. 27 Review of Key RTP Metrics ‱ Latency ‱ Jitter ‱ Packet Loss ‱ MOS ‱ R-Factor
  • 28. © WildPackets, Inc. 28 Data Impacts on VoIP
  • 29. © WildPackets, Inc. 29 Got QoS? ‱ One of the most potent weapons for fighting VoIP troubles is to provision Quality of Service (QoS) ‱ QoS enables network devices to prioritize and give preference to packet streams that are sensitive to delay, packet loss, jitter, and other performance inhibitors ‱ Standards-based QoS methods include: ‒ IP Differentiated Services (DiffServ) ‒ MAC Layer QoS with IEEE 802.1p ‒ VLANs ‱ QoS may be obtained or supplemented via proprietary means, such as traffic shaping via various flow processing algorithms ‱ Watch for too much differentiated traffic!
  • 30. © WildPackets, Inc. 30 Ready for QoS? ‱ QoS provisions are based on the “weakest link” concept ‒ If any device in a data path does not support QoS, then media streams will not be afforded the preference they require for good performance ‱ Pre-deployment assessment must ensure that ALL devices can recognize and respond to QoS parameters in packet headers ‒ Switches, routers, firewalls, proxies, and any other devices that touch RTP packets must be “VoIP-friendly”
  • 31. © WildPackets, Inc. 31 Monitoring QoS Configuration
  • 33. © WildPackets, Inc. 33 VoIP Dashboard View
  • 34. © WildPackets, Inc. 34 Calls View
  • 35. © WildPackets, Inc. 35 Media View
  • 36. © WildPackets, Inc. 36 Call Data Record (CDR) Provides comprehensive, real-time statistical and quality report for base- lining, and 100% visibility into calls
  • 37. © WildPackets, Inc. 37 Down To The Details 

  • 38. © WildPackets, Inc. 38 Identifying Unauthorized RTP Traffic ‱ Look for bandwidth hogs ‱ Use filters and alarms
  • 39. www.wildpackets.com© WildPackets, Inc. Q&A Thank You! WildPackets, Inc. 1340 Treat Boulevard, Suite 500 Walnut Creek, CA 94597 (925) 937-3200