• 沒有找到結果。

Designing a Voice over IP Network

N/A
N/A
Protected

Academic year: 2022

Share "Designing a Voice over IP Network"

Copied!
14
0
0

加載中.... (立即查看全文)

全文

(1)

Designing a Voice over IP Network

(2)

Introduction

n

The design of any network involves striking a balance between three requirements.

n Meeting the capacity needed to handle the projected demand (capacity)

n Minimizing the capital and operational cost of the network (cost)

n Ensuring high network reliability and availability (quality)

n

Meeting one or more of the requirements often means making sacrifices elsewhere.

n

What is the acceptable degree?

(3)

An Overall Approach

n

Understanding the expected traffic demand

n Where traffic will come from and go to

n What typical per-subscriber usage is expected

n

Establishing network design criteria

n Build-ahead, voice-coding schemes, network technology (such as softswitch versus H.323)

n

Vendor and product selection

n

Network topology, connectivity and bandwidth requirements

n

Physical connectivity

(4)

Design Criteria [1/2]

n

Build-Ahead or Capacity Buffer

n Avoiding the necessity for constant redesigning as traffic demand increases

n Providing a buffer in case traffic demand increases faster than expected

n

Fundamental Technology Assumptions

n H.323 vs. Softswitch

n MGCP vs. MEGACO

n Should we use external SGs with Sigtran or deploy MGCs that support SS7 directly?

n

Network-Level Redundancy

E.g., Failure of MGCs, Failure of network interfaces

(5)

Design Criteria [2/2]

n Voice Coder/Decoder (Codec) Selection Issues

n Actual coder/decoder to use

n Packetization interval

n Silence suppression

n Blocking Probability

n A call will be blocked due to a lack of available channels.

n The Erlang is the standard measure of traffic on a circuit- switched network.

n One Erlang corresponds to a channel being occupied for one hour.

n Depending on the number of available channels and the

amount of offered traffic, there is a statistical probability that a channel will be available when a user wants to make a call.

n QoS Protocol Considerations and Layer 2 Protocol Choices (e.g., Frame Relay, ATM or PPP)

(6)

Product and Vendor Selection

n

Generic VoIP Product Requirements

n Node-Level Redundancy

n N+1 redundancy

n Node Availability

n 99.999 percent availability

n Mean Time Between Failure (MTBF) values provided by vendors for each component of a given node

n Alarms and Statistics

n For the network operator to fully understand the performance of the network

n

Element Management

n E.g., SNMP for interfaces between the network elements and EMS

(7)

Traffic Forecasts

n Voice Usage Forecast

n (MoUs per subscriber per month) x (fraction during work days) x (percentage in busy hour) / (work days per month)

n E.g., 120x0.6x0.2/21=0.686 MoU/sub/busy hour

n 0.686/60=0.0114 Erlangs/sub/busy hour

n The driving factor for the network elements that reside in the bearer path

n Busy-hour call attempt (BHCA)

n Assume that the average call length is 5 minutes (300 seconds).

n =Erlangs/MHT (average call length) =0.0114x3600/300=0.137

n The critical factor for call-control entities such as MGCs

n A subscriber with 120 MoUs per month will make 0.137 calls each busy hour.

n Traffic Distribution Forecast

(8)

Network Topology

n

How many network elements of a given type will be in each location

n

The bandwidth requirements between those

network elements and the outside world

(9)

MG Locations and PSTN Trunk Dimensioning

n At least 1 MG in each of the 12 cities where the service is provided

n To determine the size of the trunk groups to the PSTN

n From Voice Usage Forecast, we know how much traffic we will send.

n From Traffic Distribution Forecast, we know how

much traffic we will receive.

(10)

MGC Quantities and Placement

n

Assume that BHCA is the limiting factor.

n

A call passes between two MGs controlled

n By the same MGC

n By different MGCs

n

Determining the number and location of MGCs can be an iterative process.

1. An initial estimate of the number of MGCs

2. To allocate MGs to MGCs

3. To determine the total BHCA to be supported by each MGC

4. See if the initial MGC allocation fits within the MGC BHCA limit.

(11)

Calculating VoIP Bandwidth Requirements

n

The bandwidth required between MGs for VoIP traffic

n

The bandwidth required for a single call depends on the following factors.

n Voice-coding scheme

n Packetization interval

n The use of silence suppression

n Probability of excessive packet collision

n Packet will be lost or delayed as a result of too many speakers talking at one time.

(12)

Peak in the Number of Simultaneous Speakers

n Consider n speakers. If voice activity is 40 percent, then the probability of an individual user speaking at a given instant is 40 percent.

n The probability that exactly x subscribers are speaking at a given time

n Pa(x) = (n,x) px(1-p)n-x, where p=0.4

n The probability that there are no more than x speakers at a time

n Pb(x) = Pa(0)+Pa(1)+… +Pa(x)

n To determine the value of x

n Seeking Pb(x)=0.999 or greater

n Normal distribution function instead of binomial

(13)

Bandwidth Requirement

n

VoIP Bandwidth

n Voice packet size + 40 octets (for IP, UDP and RTP) + WAN layer 2 overhead + MPLS overhead (if

applicable)

n RTCP bandwidth should be limited to about 5% of the actual VoIP bandwidth.

n

Signaling and OA&M Bandwidth

n Between MGC and MG

n Between MGC and SG

n Between SG and STP

n Between MGC and MGC

n Between each network element and EMS

(14)

Physical Connectivity

n To determine how we will connect the different cities to provide the

bandwidth we need

n Each city has an

alternative path to every other city to ensure the network does not fail.

參考文獻

相關文件

QUAPP 317 Annotated Bibliography on Bilevel Programming and Mathematical Programs.. with

command line, he specifies an arbitrary (but specific; in this case, 9989) local port that ssh should forward through the secure tunnel to the remote Windows ma- chine’s port

command line, he specifies an arbitrary (but specific; in this case, 9989) local port that ssh should forward through the secure tunnel to the remote Windows ma- chine’s port

n How to build redundancy and diversity into a VoIP network without losing sight of the trade-off between network quality and network cost (network dimensioning, traffic

„ Transport voice traffic using the Internet Protocol (IP). „ One of the greatest challenges to VoIP is voice

A subgroup N which is open in the norm topology by Theorem 3.1.3 is a group of norms N L/K L ∗ of a finite abelian extension L/K.. Then N is open in the norm topology if and only if

Physical & Link layers + CISCO switch link layer functions.. Wireless physical and link layers + Access

例如 : http ( 網頁伺服器所用的協定 ) 定義了 client 如何向 server request 網頁及 server 如何 將網頁及其中的各種內容回傳給 client 。. 提供服務給 application layer