SlideShare a Scribd company logo
1 of 37
Download to read offline
www.wildpackets.com© WildPackets, Inc.
Jay Botelho
Director of Product Management
WildPackets
jbotelho@wildpackets.com
Follow me @jaybotelho
VoIP and VoFi
Quietly Competing For Your Network
Bandwidth
Show us your tweets!
Use today’s webinar hashtag:
#wp_voip
with any questions, comments, or feedback.
Follow us @wildpackets
© WildPackets, Inc. 2VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Agenda
• Overall VoIP Requirements and Metrics
• How RTP (VoIP) and TCP (Data) Coexist
• Unique Challenges of VoIP at 10G
• Unique Challenges of VoFi
• Troubleshooting VoIP Issues
• Company Overview
• Product Line Overview
www.wildpackets.com© WildPackets, Inc.
Overall VoIP Requirements
and Metrics
© WildPackets, Inc. 4VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Maybe Not So Quietly …
• Global Internet video traffic surpassed global peer-
to-peer (P2P) traffic in 2010
• Percentage of overall consumer Internet traffic
‒ 2010: 40%
‒ 2012: 50% (e)
‒ 2015: 62% (e) (excluding P2P video file sharing)
• Percentage of all forms of video (TV, VoD, Internet,
and P2P) will be approximately 90 percent of global
consumer traffic by 2015
• Internet video to TVs tripled in 2010 and will increase
17-fold by 2015
http://www.cisco.com/en/US/solutions/collateral/ns341/n
s525/ns537/ns705/ns827/white_paper_c11-481360.pdf
© WildPackets, Inc. 5VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Key RTP (VoIP/VoFi) Issues
CAMP IT Pinpointing the Problem 5
Jitter
Latency
Packet
Loss
© WildPackets, Inc. 6VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Assessing the Monster's Impact
• While traditional network applications are very tolerant of jitter,
latency, and even some degree of packet loss, VoIP/Video/VoFi
is very sensitive to these troubles
• Levels of jitter, latency, and packet loss that would be easily
tolerated on a data network can be devastating on a converged
VoIP/Video network
• Pre- and post-deployment network assessments are critical
‒ You must understand your network’s ability to accommodate VoIP
• Current latency, jitter, and packet loss
• QoS capabilities
• Current bandwidth utilization (is there any room for VoIP)
‒ You must maintain a constant vigil after deployment to watch for
imminent troubles
© WildPackets, Inc. 7VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Latency
Queue Latency &
Decision Latency
Network
Propagation
Delay
Encoding / Decoding
Compression / Decompression
Jitter Buffer Latency
0 ms
100 ms
200 ms
300 ms
400 ms
500 ms
600 ms
700 ms
800
ms
The ITU
recommends a
maximum one-
way delay of
150 ms for
VoIP
© WildPackets, Inc. 8VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Latency's Effects
• Talkover
‒ Occurs when excessive latency delays audio
– Conversation cadence is not natural or comfortable
– Callers feel as if they must “push to talk” or say “over” to control the
conversation
• Echo
‒ The speaker’s voice feeds back into the listener’s microphone
‒ The speaker then hears his own voice returning from the listener’s end,
but delayed due to latency
‒ Most callers find it difficult to maintain normal speech when echo delay
is prolonged
‒ Some VoIP systems attempt to cancel echo, but are not always
successful
High latency may also cause additional troubles such as loss of
synchronization between audio and video for multimedia sessions.
© WildPackets, Inc. 9VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Jitter
• Jitter is the variance in packet delivery intervals to the listener
• Jitter buffer adds additional delay to voice reaching the ear piece in
case other packets need to catch up
• Packets delayed too long in the network are not allowed to enter the
jitter buffer
Packets delayed more than the buffer delay
(100 ms as an example) are dropped
. . .. .. . . ........
......
Packets are buffered and
delayed at the Receiver
The “jitter” buffer releases
a G.711 packet every 20 ms
A G.711 packet sent
every 20 ms
Packet jitter and drops
31
2
4
© WildPackets, Inc. 10VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Jitter's Effects
• Jitter causes weird “sound effects” that vary with
jitter severity and environmental factors
• Examples include:
‒ Static
‒ Stuttering or uneven audio – abnormal speech rhythm
‒ For multimedia systems, video may be “jerky” or irregular
• If jitter levels are high, packet loss can result
‒ In some cases, severe jitter may sound similar to packet loss,
even if no packets are actually dropped
© WildPackets, Inc. 11VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Packet Loss
• Most commonly caused by:
‒ Packet dropped due to physical layer corruption
‒ Congestion without adequate QoS provisions
‒ Jitter buffer discards due to excessive latency
• Causes missing sounds, syllables, words, or phrases
‒ DSP algorithms may compensate for up to 30 ms of missing
data
‒ More than 30 ms of missing audio (e.g. 2 RTP packets for
G.711) is noticeable by listeners
© WildPackets, Inc. 12VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Packet Loss Effects
• Causes missing sounds, syllables, words, or phrases
‒ DSP algorithms may compensate for up to 30 ms of missing data
‒ More than 30 ms of missing audio is noticeable by listeners
• An average person speaks at a rate of about 200 words per
minute
‒ That’s 3.33 words/sec = 300 ms per word
‒ For G.711, we would need to lose 15 consecutive RTP packets to lose
a whole word
‒ Dropping 15 packets/sec for G.711 would be a loss rate of 30%
• But losing only a few packets can still be very noticeable
‒ Loss of more than 2 consecutive packets will be heard
‒ Loss rates ≥ 2% will have a strong impact on quality
‒ Losses of 5 – 10% make calls all but intolerable
‒ Bursty periods of packet loss are worse than more dispersed loss
© WildPackets, Inc. 13VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Quality Scoring for VoIP
• One of the best initial troubleshooting tools for VoIP traffic
• Mean Opinion Score (MOS) – several flavors
‒ Algorithmic simulation of subjective audio assessment
‒ Most commonly used varieties are MOS-LQ (listening quality) and
MOS-CQ (conversational quality)
‒ Possible range of 1 (poor) to 5 (excellent)
‒ Maximum possible MOS = 4.4 with G.711
‒ Typical range in most networks is 3.5 – 4.2
• R-Factor – several flavors
‒ Based on latency, jitter, packet loss, bit rate, and signal-to-noise ratio,
codec effects (for low bit-rate codecs)
• The ITU algorithms consider about 20 quality inputs
‒ Possible range of 0 (poor) to 100 (excellent)
‒ Provides LQ, CQ, and other score variants
www.wildpackets.com© WildPackets, Inc.
How RTP and TCP Coexist
© WildPackets, Inc. 15VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Network Traffic: Qualitative Analysis
• The quality of your network traffic is potentially more
important than its quantity when it comes to VoIP
• Many traffic streams are “bursty” in nature
‒ Burstiness my occur over long period of time, or may consist of
rapid, recurring traffic spikes
‒ Prolonged rises in utilization may decrease the number of calls
that can occur simultaneously
‒ Sharp spikes may cause very noticeable quality issues with
ongoing calls
• Your baseline monitoring should consider not only
averages and long-term trends, but also the short-
term peaks and dips that characterize your traffic
flow
© WildPackets, Inc. 16VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Network Traffic: Quantitative Analysis
• Most network engineers are concerned about the
amount of traffic on their networks
‒ Utilization (percentage of bandwidth)
‒ Throughput (bits or bytes per second)
• You also need to be concerned about individual
utilization components
‒ How much bandwidth and throughput can be attributed to each
application or process?
• Clarifies which application traffic may need to be tuned or
controlled
‒ How well or poorly will the baseline (trended) behavior of each
application interact with VoIP
• Don’t forget to also consider the reverse case – VoIP’s impact on
existing applications
© WildPackets, Inc. 17VoIP and VoFi – Quietly Competing For Your Network Bandwidth
The Impact of "Just One More Call"
• Although a network link may be able to support a
number of concurrent calls, one additional call is
often enough to cause quality problems…
x1113
x2111
x1112
x1111
1st Call
2nd Call
3rd Call
x2112
x2113
Example: The WAN can support 2 simultaneous calls.
What happens when a third call is attempted???
Call #3 Causes Poor Quality for ALL Calls
© WildPackets, Inc. 18VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Quality Score Trending
• Isolated scores are useful for validating single call
complaints, but overall VoIP health is best seen by
graphing long-term trends
0.00
0.50
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
8:45
9:15
9:45
10:15
10:45
11:15
11:45
12:15
12:45
13:15
13:45
14:15
14:45
15:15
15:45
16:15
16:45
17:15
MeanOpinionScore
Time
MOS
Overlaying VoIP trends
with network utilization,
errors, or other metrics
may reveal previously
unseen performance
relationships!
© WildPackets, Inc. 19VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Data Impacts on VoIP
© WildPackets, Inc. 20VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Got QoS?
• One of the most potent weapons for fighting VoIP
troubles is to provision Quality of Service (QoS)
parameters
• QoS enables network devices to prioritize and give
preference to packet streams that are sensitive to delay,
packet loss, jitter, and other performance inhibitors
• Standards-based QoS methods include:
‒ RSVP (nearly antiquated)
‒ IP Differentiated Services (DiffServ)
‒ MAC Layer QoS with IEEE 802.1p
‒ VLANs
• QoS may be obtained or supplemented via proprietary
means, such as traffic shaping via various flow
processing algorithms
© WildPackets, Inc. 21VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Ready for QoS?
• QoS provisions are based on the “weakest link”
concept
‒ If any device in a data path does not support QoS, then media
streams will not be afforded the preference they require for good
performance
• Pre-deployment assessment must ensure that ALL
devices can recognize and respond to QoS
parameters in packet headers
‒ Switches, routers, firewalls, proxies, and any other devices that
touch RTP packets must be “VoIP-friendly”
www.wildpackets.com© WildPackets, Inc.
Unique Challenges of VoIP at 10G
© WildPackets, Inc. 23VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Current Challenges
• Traditional NICs not up to the task
• Processing power is a limiting factor
• Storage capacity is a limiting factor
• I/O bus and disk write speeds are a limiting factor
• 10G forces clarity in analysis
• At 10G, it truly is looking for a needle in a haystack
• “Line rate” – be wary of that claim!
Importance: Packet-based PM tools remain only truly effective
approach to definitive monitoring and definitive troubleshooting –
Jim Frey, Enterprise Management Associates, Inc., July 2010
www.wildpackets.com© WildPackets, Inc.
Unique Challenges of VoFi
© WildPackets, Inc. 25VoIP and VoFi – Quietly Competing For Your Network Bandwidth
A Real World Example
Source: Farpoint Group
© WildPackets, Inc. 26VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Quantitative Interference Impacts on VoFi
Source: Farpoint Group
© WildPackets, Inc. 27VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Quantitative Interference Impacts on VidFi
Source: Farpoint Group
© WildPackets, Inc. 28VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Packet-by-Packet
VoFi Call
Wired VoIP Call
www.wildpackets.com© WildPackets, Inc.
Troubleshooting RTP Issues
© WildPackets, Inc. 30VoIP and VoFi – Quietly Competing For Your Network Bandwidth
VoIP Dashboard View
© WildPackets, Inc. 31VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Calls View
© WildPackets, Inc. 32VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Media View
© WildPackets, Inc. 33VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Down To The Details …
© WildPackets, Inc. 34VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Call Data Record (CDR)
Provides comprehensive, real-time
statistical and quality report for base-
lining, and 100% visibility into calls
© WildPackets, Inc. 35VoIP and VoFi – Quietly Competing For Your Network Bandwidth
Identifying Unauthorized RTP Traffic
• Look for bandwidth hogs
• Use filters and alarms
www.wildpackets.com© WildPackets, Inc.
Q&A
Show us your tweets!
Use today’s webinar hashtag:
#wp_voip
with any questions, comments, or feedback.
Follow us @wildpackets
Follow us on SlideShare!
Check out today’s slides on SlideShare
www.slideshare.net/wildpackets
www.wildpackets.com© WildPackets, Inc.
Thank You!
WildPackets, Inc.
1340 Treat Boulevard, Suite 500
Walnut Creek, CA 94597
(925) 937-3200

More Related Content

Viewers also liked

IEEE report on Advanced Sensor
IEEE report on Advanced SensorIEEE report on Advanced Sensor
IEEE report on Advanced SensorGaurav Maniar
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-WiresharkHarsh Singh
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIPKundan Singh
 
Cisco Certifications - A Complete Description of Entry Level to Architect Level
Cisco Certifications -  A Complete Description of Entry Level to Architect LevelCisco Certifications -  A Complete Description of Entry Level to Architect Level
Cisco Certifications - A Complete Description of Entry Level to Architect LevelNetwork Bulls
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
CONIET 2007: Nueva era en la VoIP, simple y sin límites
CONIET 2007: Nueva era en la VoIP, simple y sin límitesCONIET 2007: Nueva era en la VoIP, simple y sin límites
CONIET 2007: Nueva era en la VoIP, simple y sin límitesJack Daniel Cáceres Meza
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
Ieee rules for paper presentation
Ieee rules for paper presentationIeee rules for paper presentation
Ieee rules for paper presentationffunny
 

Viewers also liked (11)

IEEE report on Advanced Sensor
IEEE report on Advanced SensorIEEE report on Advanced Sensor
IEEE report on Advanced Sensor
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-Wireshark
 
Introduction to VoIP using SIP
Introduction to VoIP using SIPIntroduction to VoIP using SIP
Introduction to VoIP using SIP
 
Wireshark
WiresharkWireshark
Wireshark
 
Cisco Certifications - A Complete Description of Entry Level to Architect Level
Cisco Certifications -  A Complete Description of Entry Level to Architect LevelCisco Certifications -  A Complete Description of Entry Level to Architect Level
Cisco Certifications - A Complete Description of Entry Level to Architect Level
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
CONIET 2007: Nueva era en la VoIP, simple y sin límites
CONIET 2007: Nueva era en la VoIP, simple y sin límitesCONIET 2007: Nueva era en la VoIP, simple y sin límites
CONIET 2007: Nueva era en la VoIP, simple y sin límites
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
voip gateway
 voip gateway voip gateway
voip gateway
 
Ieee rules for paper presentation
Ieee rules for paper presentationIeee rules for paper presentation
Ieee rules for paper presentation
 

More from Savvius, Inc

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 

More from Savvius, Inc (20)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

VoIP and VoFi – Quietly Competing for Your Network Bandwidth

  • 1. www.wildpackets.com© WildPackets, Inc. Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com Follow me @jaybotelho VoIP and VoFi Quietly Competing For Your Network Bandwidth Show us your tweets! Use today’s webinar hashtag: #wp_voip with any questions, comments, or feedback. Follow us @wildpackets
  • 2. © WildPackets, Inc. 2VoIP and VoFi – Quietly Competing For Your Network Bandwidth Agenda • Overall VoIP Requirements and Metrics • How RTP (VoIP) and TCP (Data) Coexist • Unique Challenges of VoIP at 10G • Unique Challenges of VoFi • Troubleshooting VoIP Issues • Company Overview • Product Line Overview
  • 3. www.wildpackets.com© WildPackets, Inc. Overall VoIP Requirements and Metrics
  • 4. © WildPackets, Inc. 4VoIP and VoFi – Quietly Competing For Your Network Bandwidth Maybe Not So Quietly … • Global Internet video traffic surpassed global peer- to-peer (P2P) traffic in 2010 • Percentage of overall consumer Internet traffic ‒ 2010: 40% ‒ 2012: 50% (e) ‒ 2015: 62% (e) (excluding P2P video file sharing) • Percentage of all forms of video (TV, VoD, Internet, and P2P) will be approximately 90 percent of global consumer traffic by 2015 • Internet video to TVs tripled in 2010 and will increase 17-fold by 2015 http://www.cisco.com/en/US/solutions/collateral/ns341/n s525/ns537/ns705/ns827/white_paper_c11-481360.pdf
  • 5. © WildPackets, Inc. 5VoIP and VoFi – Quietly Competing For Your Network Bandwidth Key RTP (VoIP/VoFi) Issues CAMP IT Pinpointing the Problem 5 Jitter Latency Packet Loss
  • 6. © WildPackets, Inc. 6VoIP and VoFi – Quietly Competing For Your Network Bandwidth Assessing the Monster's Impact • While traditional network applications are very tolerant of jitter, latency, and even some degree of packet loss, VoIP/Video/VoFi is very sensitive to these troubles • Levels of jitter, latency, and packet loss that would be easily tolerated on a data network can be devastating on a converged VoIP/Video network • Pre- and post-deployment network assessments are critical ‒ You must understand your network’s ability to accommodate VoIP • Current latency, jitter, and packet loss • QoS capabilities • Current bandwidth utilization (is there any room for VoIP) ‒ You must maintain a constant vigil after deployment to watch for imminent troubles
  • 7. © WildPackets, Inc. 7VoIP and VoFi – Quietly Competing For Your Network Bandwidth Latency Queue Latency & Decision Latency Network Propagation Delay Encoding / Decoding Compression / Decompression Jitter Buffer Latency 0 ms 100 ms 200 ms 300 ms 400 ms 500 ms 600 ms 700 ms 800 ms The ITU recommends a maximum one- way delay of 150 ms for VoIP
  • 8. © WildPackets, Inc. 8VoIP and VoFi – Quietly Competing For Your Network Bandwidth Latency's Effects • Talkover ‒ Occurs when excessive latency delays audio – Conversation cadence is not natural or comfortable – Callers feel as if they must “push to talk” or say “over” to control the conversation • Echo ‒ The speaker’s voice feeds back into the listener’s microphone ‒ The speaker then hears his own voice returning from the listener’s end, but delayed due to latency ‒ Most callers find it difficult to maintain normal speech when echo delay is prolonged ‒ Some VoIP systems attempt to cancel echo, but are not always successful High latency may also cause additional troubles such as loss of synchronization between audio and video for multimedia sessions.
  • 9. © WildPackets, Inc. 9VoIP and VoFi – Quietly Competing For Your Network Bandwidth Jitter • Jitter is the variance in packet delivery intervals to the listener • Jitter buffer adds additional delay to voice reaching the ear piece in case other packets need to catch up • Packets delayed too long in the network are not allowed to enter the jitter buffer Packets delayed more than the buffer delay (100 ms as an example) are dropped . . .. .. . . ........ ...... Packets are buffered and delayed at the Receiver The “jitter” buffer releases a G.711 packet every 20 ms A G.711 packet sent every 20 ms Packet jitter and drops 31 2 4
  • 10. © WildPackets, Inc. 10VoIP and VoFi – Quietly Competing For Your Network Bandwidth Jitter's Effects • Jitter causes weird “sound effects” that vary with jitter severity and environmental factors • Examples include: ‒ Static ‒ Stuttering or uneven audio – abnormal speech rhythm ‒ For multimedia systems, video may be “jerky” or irregular • If jitter levels are high, packet loss can result ‒ In some cases, severe jitter may sound similar to packet loss, even if no packets are actually dropped
  • 11. © WildPackets, Inc. 11VoIP and VoFi – Quietly Competing For Your Network Bandwidth Packet Loss • Most commonly caused by: ‒ Packet dropped due to physical layer corruption ‒ Congestion without adequate QoS provisions ‒ Jitter buffer discards due to excessive latency • Causes missing sounds, syllables, words, or phrases ‒ DSP algorithms may compensate for up to 30 ms of missing data ‒ More than 30 ms of missing audio (e.g. 2 RTP packets for G.711) is noticeable by listeners
  • 12. © WildPackets, Inc. 12VoIP and VoFi – Quietly Competing For Your Network Bandwidth Packet Loss Effects • Causes missing sounds, syllables, words, or phrases ‒ DSP algorithms may compensate for up to 30 ms of missing data ‒ More than 30 ms of missing audio is noticeable by listeners • An average person speaks at a rate of about 200 words per minute ‒ That’s 3.33 words/sec = 300 ms per word ‒ For G.711, we would need to lose 15 consecutive RTP packets to lose a whole word ‒ Dropping 15 packets/sec for G.711 would be a loss rate of 30% • But losing only a few packets can still be very noticeable ‒ Loss of more than 2 consecutive packets will be heard ‒ Loss rates ≥ 2% will have a strong impact on quality ‒ Losses of 5 – 10% make calls all but intolerable ‒ Bursty periods of packet loss are worse than more dispersed loss
  • 13. © WildPackets, Inc. 13VoIP and VoFi – Quietly Competing For Your Network Bandwidth Quality Scoring for VoIP • One of the best initial troubleshooting tools for VoIP traffic • Mean Opinion Score (MOS) – several flavors ‒ Algorithmic simulation of subjective audio assessment ‒ Most commonly used varieties are MOS-LQ (listening quality) and MOS-CQ (conversational quality) ‒ Possible range of 1 (poor) to 5 (excellent) ‒ Maximum possible MOS = 4.4 with G.711 ‒ Typical range in most networks is 3.5 – 4.2 • R-Factor – several flavors ‒ Based on latency, jitter, packet loss, bit rate, and signal-to-noise ratio, codec effects (for low bit-rate codecs) • The ITU algorithms consider about 20 quality inputs ‒ Possible range of 0 (poor) to 100 (excellent) ‒ Provides LQ, CQ, and other score variants
  • 15. © WildPackets, Inc. 15VoIP and VoFi – Quietly Competing For Your Network Bandwidth Network Traffic: Qualitative Analysis • The quality of your network traffic is potentially more important than its quantity when it comes to VoIP • Many traffic streams are “bursty” in nature ‒ Burstiness my occur over long period of time, or may consist of rapid, recurring traffic spikes ‒ Prolonged rises in utilization may decrease the number of calls that can occur simultaneously ‒ Sharp spikes may cause very noticeable quality issues with ongoing calls • Your baseline monitoring should consider not only averages and long-term trends, but also the short- term peaks and dips that characterize your traffic flow
  • 16. © WildPackets, Inc. 16VoIP and VoFi – Quietly Competing For Your Network Bandwidth Network Traffic: Quantitative Analysis • Most network engineers are concerned about the amount of traffic on their networks ‒ Utilization (percentage of bandwidth) ‒ Throughput (bits or bytes per second) • You also need to be concerned about individual utilization components ‒ How much bandwidth and throughput can be attributed to each application or process? • Clarifies which application traffic may need to be tuned or controlled ‒ How well or poorly will the baseline (trended) behavior of each application interact with VoIP • Don’t forget to also consider the reverse case – VoIP’s impact on existing applications
  • 17. © WildPackets, Inc. 17VoIP and VoFi – Quietly Competing For Your Network Bandwidth The Impact of "Just One More Call" • Although a network link may be able to support a number of concurrent calls, one additional call is often enough to cause quality problems… x1113 x2111 x1112 x1111 1st Call 2nd Call 3rd Call x2112 x2113 Example: The WAN can support 2 simultaneous calls. What happens when a third call is attempted??? Call #3 Causes Poor Quality for ALL Calls
  • 18. © WildPackets, Inc. 18VoIP and VoFi – Quietly Competing For Your Network Bandwidth Quality Score Trending • Isolated scores are useful for validating single call complaints, but overall VoIP health is best seen by graphing long-term trends 0.00 0.50 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 8:45 9:15 9:45 10:15 10:45 11:15 11:45 12:15 12:45 13:15 13:45 14:15 14:45 15:15 15:45 16:15 16:45 17:15 MeanOpinionScore Time MOS Overlaying VoIP trends with network utilization, errors, or other metrics may reveal previously unseen performance relationships!
  • 19. © WildPackets, Inc. 19VoIP and VoFi – Quietly Competing For Your Network Bandwidth Data Impacts on VoIP
  • 20. © WildPackets, Inc. 20VoIP and VoFi – Quietly Competing For Your Network Bandwidth Got QoS? • One of the most potent weapons for fighting VoIP troubles is to provision Quality of Service (QoS) parameters • QoS enables network devices to prioritize and give preference to packet streams that are sensitive to delay, packet loss, jitter, and other performance inhibitors • Standards-based QoS methods include: ‒ RSVP (nearly antiquated) ‒ IP Differentiated Services (DiffServ) ‒ MAC Layer QoS with IEEE 802.1p ‒ VLANs • QoS may be obtained or supplemented via proprietary means, such as traffic shaping via various flow processing algorithms
  • 21. © WildPackets, Inc. 21VoIP and VoFi – Quietly Competing For Your Network Bandwidth Ready for QoS? • QoS provisions are based on the “weakest link” concept ‒ If any device in a data path does not support QoS, then media streams will not be afforded the preference they require for good performance • Pre-deployment assessment must ensure that ALL devices can recognize and respond to QoS parameters in packet headers ‒ Switches, routers, firewalls, proxies, and any other devices that touch RTP packets must be “VoIP-friendly”
  • 23. © WildPackets, Inc. 23VoIP and VoFi – Quietly Competing For Your Network Bandwidth Current Challenges • Traditional NICs not up to the task • Processing power is a limiting factor • Storage capacity is a limiting factor • I/O bus and disk write speeds are a limiting factor • 10G forces clarity in analysis • At 10G, it truly is looking for a needle in a haystack • “Line rate” – be wary of that claim! Importance: Packet-based PM tools remain only truly effective approach to definitive monitoring and definitive troubleshooting – Jim Frey, Enterprise Management Associates, Inc., July 2010
  • 25. © WildPackets, Inc. 25VoIP and VoFi – Quietly Competing For Your Network Bandwidth A Real World Example Source: Farpoint Group
  • 26. © WildPackets, Inc. 26VoIP and VoFi – Quietly Competing For Your Network Bandwidth Quantitative Interference Impacts on VoFi Source: Farpoint Group
  • 27. © WildPackets, Inc. 27VoIP and VoFi – Quietly Competing For Your Network Bandwidth Quantitative Interference Impacts on VidFi Source: Farpoint Group
  • 28. © WildPackets, Inc. 28VoIP and VoFi – Quietly Competing For Your Network Bandwidth Packet-by-Packet VoFi Call Wired VoIP Call
  • 30. © WildPackets, Inc. 30VoIP and VoFi – Quietly Competing For Your Network Bandwidth VoIP Dashboard View
  • 31. © WildPackets, Inc. 31VoIP and VoFi – Quietly Competing For Your Network Bandwidth Calls View
  • 32. © WildPackets, Inc. 32VoIP and VoFi – Quietly Competing For Your Network Bandwidth Media View
  • 33. © WildPackets, Inc. 33VoIP and VoFi – Quietly Competing For Your Network Bandwidth Down To The Details …
  • 34. © WildPackets, Inc. 34VoIP and VoFi – Quietly Competing For Your Network Bandwidth Call Data Record (CDR) Provides comprehensive, real-time statistical and quality report for base- lining, and 100% visibility into calls
  • 35. © WildPackets, Inc. 35VoIP and VoFi – Quietly Competing For Your Network Bandwidth Identifying Unauthorized RTP Traffic • Look for bandwidth hogs • Use filters and alarms
  • 36. www.wildpackets.com© WildPackets, Inc. Q&A Show us your tweets! Use today’s webinar hashtag: #wp_voip with any questions, comments, or feedback. Follow us @wildpackets Follow us on SlideShare! Check out today’s slides on SlideShare www.slideshare.net/wildpackets
  • 37. www.wildpackets.com© WildPackets, Inc. Thank You! WildPackets, Inc. 1340 Treat Boulevard, Suite 500 Walnut Creek, CA 94597 (925) 937-3200