Friday, May 20, 2011

Chapter 07: Preparing the Campus Infrastructure for Advanced Services (Part01)

Advanced services in the campus network are driving a new era of mobility, collaboration, and virtual business. Consider a campus network that supports connectivity for any mobile device. Consider the cost-savings associated with high-definition video conferencing. Consider the business advantage of reducing travel costs associated with training and participating in virtual training. Consider attending a meeting in Asia from your desk? Consider using a single converged network for voice communications? Advanced services such as wireless, voice, and video in the campus network are delivering the mentioned applications to the campus network today.

Add a note hereThis chapter focuses on advanced services in the network to include wireless, voice, and video. The chapter is organized into sections where planning information is presented for wireless, voice, and video, followed by introductions to QoS and multicast, and ending with information on preparing and implementing wireless, voice, and video. QoS and multicast are introduced because QoS is a requirement for voice and video in the campus network, while multicast is used by several video applications.

Add a note here Planning for Wireless, Voice, and Video Application in the Campus Network

Add a note here As noted in the introduction, Cisco documentation considers wireless, voice, and video applications as advanced technologies. As time progresses, these advanced technologies are trending toward becoming a standard deployment technology. Each of these advanced technologies—wireless, voice, and video—stretches the technology breadth of most network engineers as the typical Layer 2 and 3 network technologies are broad enough by themselves. Of the three advance technologies, the wireless technology requires the most extra effort for application to the campus network.


Note

Add a note hereBecause this book is about switching, this chapter focuses only on wireless from the application in the enterprise. The term wireless in the context of this book is strictly limited to Wi-Fi in the campus and does not represent any cellular or other wireless technologies, such as Bluetooth.

Add a note hereIt is interesting to note that during the evolution of this title, Voice over IP (VoIP), a voice application built to use TCP/IP, has transitioned from a new sleek feature to an enterprise-class voice application in widespread use today. In addition, VoIP application in the network has been eased as well because the Cisco switches now support intelligent features that ease configuration of voice.


Note

Add a note hereIn the context of this chapter, the terms voice, IP telephony, and VoIP are used interchangeably to describe the application of telephony and its additional features and applications in the enterprise network.

Add a note hereVideo as an application is used in several enterprises for training, internal TV, and so on; however, most enterprises also use web-based video such as flash video to deliver enterprise video-on-demand training, and such. As with VoIP, video has transitioned from a nice feature to a standard feature found in campus networks. The next three subsections focus on the motivation behind deploying wireless, voice, and video in the campus network starting with wireless.

Add a note here The Purpose of Wireless Network Implementations in the Campus Network

Add a note hereThe motivation behind implementing wireless in the campus network is straightforward: productivity. End users who can access network resources without a physical connection in a meeting, conference room, at lunch, and so on are more productive than end users who do not have such access. Moreover, in today’s world of collaboration, end users of the campus network need to access resources from within meetings, trainings, water cooler talks, and so on. In the next few years, the wireless implementation in the campus network will be as standard as cellular phones. In brief, the following list highlights the motivation behind deploying wireless networks in the campus network:

  • Add a note here Productivity: Users gain productivity through the ability to access resources while in meetings, training, presentations, at lunch, and so on.

  • Add a note here Mobility: Users on the go within the campus can be mobile with access to campus resource, such as e-mail.

  • Add a note here Enhanced collaboration: Wireless networks enable enhanced user collaboration through the benefit of a network without wires.

  • Add a note here Campus interconnectivity: Wireless networks have the capability to interconnect remote offices, offsite networks, and so on that cannot interconnect to the campus network over traditional physical network cable.


Note

Add a note hereWireless network access points usually connect to the access layer of the campus network. However, certain cable plant or physical requirements might require these devices to be connected to the distribution or core layers. Nevertheless, an access point is considered an edge device from a campus networking point of view.


Note

Add a note hereThe motivation behind deploying wireless in the campus network is to provide mobility to end users and the associated productivity gains.

Add a note hereWireless free users from requiring a physical cable to access network resources. The next section discusses the advantages of converging voice with data in the campus network.

Add a note here The Purpose of Voice in the Campus Network

Add a note hereThe overlying purposes for using voice in a campus network is simple: cost-savings and increased productivity. Most enterprises have jumped onto the VoIP bandwagon and are successfully deploying this technology. Each of these enterprises has enjoyed success with these deployments as they have bought cost-savings and increased user productivity. In detail, the following list captures the motivations behind deploying voice in the campus network:

  • Add a note here More efficient use of bandwidth and equipment: For example, traditional telephony networks use a 64-kbps channel for every voice call. Packet telephony shares bandwidth among multiple logical connections and offloads traffic volumes from existing voice switches.

  • Add a note here Lower costs for telephony network transmission: A substantial amount of equipment is needed to combine 64-kbps channels into high-speed links for transport across the network. Packet telephony multiplexes voice traffic alongside data traffic. In other words, voice traffic and data traffic coexist on the same network infrastructure. This consolidation represents substantial savings on capital equipment and operations costs.

  • Add a note here Consolidation of voice and data network expense: Data networks that function as separate networks from voice networks become major traffic carriers. The underlying voice networks are converted to use the packet-switched architecture to create a single integrated communications network with a common switching and transmission system. The benefit is significant cost-savings on network equipment and operations.

  • Add a note here Increased revenue from new service: For instance, packet telephony enables new integrated services, such as broadcast-quality audio, unified messaging, and real-time voice and data collaboration. These services increase employee productivity and profit margins well above those of basic voice services. In addition, these services enable companies and service providers to differentiate themselves and improve their market position.

  • Add a note here Capability to leverage access to new communications devices: Using packet technology enables companies and service providers to reach devices that are largely in-accessible to the time-division multiplexing (TDM) infrastructures of today. Examples of such devices are computers, wireless devices, household appliances, personal digital assistants, and cable set-top boxes. Intelligent access to such devices enable companies and service providers to increase the volume of communications they deliver, the breadth of services they offer, and the number of subscribers they serve. Packet technology, therefore, enables companies to market new devices, including videophones, multimedia terminals, and advanced IP phones.

  • Add a note here Flexible pricing structure: Companies and service providers with packet-switched networks can transform their service and pricing models. Because network bandwidth can be dynamically allocated, network usage no longer needs to be measured in minutes or distance. Dynamic allocation gives service providers the flexibility to meet the needs of their customers in ways that bring them the greatest benefits.

  • Add a note here Emphasis on greater innovation in service: Unified communications use the IP infrastructure to consolidate communication methods that were previously independent; for example, fax, voice mail, e-mail, landline telephones, cellular telephones, call centers, and the web. The IP infrastructure provides users with a common method to access messages and initiate real-time communications—independent of time, location, or device.


Note

Add a note hereThe key motivations behind deploying voice in the campus network are cost-savings, increased efficiency of the network, and productivity gains from voice services.

Add a note hereIn summary, it is easy to understand why enterprises have and continue to deploy VoIP in the campus network. The next section details the purposes behind deploying wireless in the campus network.

Add a note hereFrom a deployment perspective, all voice devices and software applications for use by end users or customers connect to the access layer of the campus network. The processing and computing functions of voice are generally found in the data center. The “Planning for Wireless” section goes into further detail about planning for voice in the campus network.

Add a note here The Purpose of Video Deployments in the Campus Network

Add a note here Video has a unique purpose in the campus network as previously discussed. Its purpose is certain around collaboration. Perhaps the most interesting and practical use of video lately is TelePresence. If you have not experienced TelePresence, you need to. It is absolutely amazing how real it feels. Nonetheless, TelePresence requires a tremendous amount of bandwidth requirements that drive enterprise network bandwidth requirements not only in the campus but also among campus networks. The best application of TelePresence is communication across multiple campus and remote sites. In summary, the motivation behind deploying video in the campus network is as follows:

  • Add a note here Collaboration: Video conferencing technologies such as TelePresence and the video support in WebEx support enhanced collaboration.

  • Add a note here Cost-savings: Video technologies reduce travel costs by enabling remote users to attend meetings, trainings, and so on without being physically present.


Note

Add a note hereThe main motivation for deploying video in the campus network is enhanced collaboration and cost-savings associated with virtual trainings and meetings.

Add a note hereNow that the motivation behind each advanced technology is understood, the next three sections dive into the background information about the technology necessary to understand the planning and preparation behind each technology.

Add a note here Planning for the Campus Network to Support Wireless Technologies

Add a note hereWireless LANs are often compared to standard LANs and viewed as “LANs without cables.” WLANs actually integrate into the LAN infrastructure to extend it. It does have similarities with wired LANs. Nevertheless, it also presents important differences that you need to appreciate to perform a successful integration in the campus network. The next section provides some background information before discussing wireless LANs to campus LANs and the associated preparation.

Introduction to Wireless LANs (WLAN)

Add a note hereWireless networks solve the data exchange problem without wires. Following are different types of wireless data communication methods, each of which has its advantages and drawbacks:

  • Add a note here Infrared (III): High data rates, lower cost, and short distance

  • Add a note here Narrowband: Low data rates, medium cost, license required, limited distance

  • Add a note here Spread spectrum: Limited to campus coverage, medium cost, high data rates

  • Add a note here Personal Communications Service (PCS): Low data rates, medium cost, citywide coverage

  • Add a note here Cellular: Low to medium cost, national and worldwide coverage (typical cell phone carrier)

  • Add a note here Ultra-wideband (UWB): Short-range high-bandwidth coverage

Add a note hereAs implied in the list of communications method, wireless in the campus uses the spread spectrum methodology. The spread spectrum wireless focus is on the three unlicensed bands: 900 MHz, 2.4 GHz, and 5 GHz. The 900-MHz and 2.4-GHz bands are referred to as the Industrial, Scientific, and Medical (ISM) bands, and the 5-GHz band is commonly referred to as the Unlicensed National Information Infrastructure (UNII) band.

Add a note here Figure 7-1 refers to the frequencies for these bands. They are as follows:

  • Add a note here 900-MHz band: 902 MHz to 928 MHz

  • Add a note here 2.4-GHz band: 2.4 GHz to 2.483 GHz

  • Add a note here 5-GHz band: 5.150 MHz to 5.350 MHz, 5.725 MHz to 5.825 MHz, with some countries supporting middle bands between 5.350 MHz and 5.825 MHz

Click to collapse
Add a note hereFigure 7-1: Unlicensed Frequency Bands

Add a note hereThere are many different types of networks offered. Each unique network provides some defined coverage area. Figure 7-2 lists each wireless technology and illustrates the corresponding coverage areas.

Click to collapse
Add a note hereFigure 7-2: Wireless Technologies

Add a note here The following is a brief list of the different applications of wireless networks, starting with the smallest area:

  • Add a note here Personal-area network (PAN): Typically designed to cover your personal workspace. Radios are typically low-powered, do not offer options in antenna selection, and limit the size of the coverage area to approximately 15 to 20 feet radially. One such PAN network is Bluetooth. Good examples of this technology are communications between PCs and peripherals or between wireless phones and headsets. In the PAN wireless network, the customer owns 100 percent of the network; therefore, no airtime charges are incurred.

  • Add a note here LAN: Designed to be an enterprise-based network that enables for complete suites of enterprise applications to be used without wires. A LAN typically delivers Ethernet-capable speeds (up to 10 Gbps). In the LAN wireless network, the customer owns 100 percent of the network; therefore, no airtime charges are incurred.

  • Add a note here Metropolitan-area network (MAN): Deployed inside a metropolitan area, allowing wireless connectivity throughout an urban area. A MAN typically delivers up to broadband speeds (similar to digital subscriber line [DSL]) but is not capable of Ethernet speeds. In the wireless MAN, the wireless network might be from a licensed carrier, requiring the customer to purchase airtime, or it might be built out and supported by one entity, such as a police department. A new standard coming of age in the MAN is WiMAX. Information is available on the Internet with regard to WiMAX.

  • Add a note here WAN: Typically slower in speed but offers more coverage, sometimes including rural areas. Because of their vast deployment, all wireless WANs require that a customer purchase airtime for data transmission.

Add a note hereCampus networks, of course, apply LAN-based wireless networks (WLAN). Cisco offers a wide range of wireless products for the LAN and other applications such the MAN and WAN. WLAN products have limited range but relatively high-speeds in excess of 108 Mbps. Figure 7-3 illustrates the coverage areas and data rates of various wireless data networks in use today for WLANs.

Click to collapse
Add a note hereFigure 7-3: Wireless Data Networks

Add a note hereFor the purpose of applying WLANs to the campus network, note the speeds and range of WLAN products discussed at a high-level in this section. Because there are entire books dedicated to WLANs, it would be too much material to cover the technology in detail from a switching perspective. As such, the remainder of information on WLANs in this chapter focuses on planning and preparation in the campus network. Consult Cisco.com or other texts for additional information on how WLANs operate.

Cisco WLAN Solutions as Applied to Campus Networks

Add a note hereCisco classifies its campus network WLAN solutions and products into a framework denoted as the Cisco Unified Wireless Network, which is broken down into the following subelements:

  • Add a note here Client devices: Cisco Compatible or Cisco Aironet 802.11a/b/g/ client adapters are strongly recommended for the Cisco Unified Wireless Network. However, with more than 90 percent of shipping client devices certified as Cisco-compatible, almost any client device that you select should be Cisco-compatible certified. In addition, Cisco-compatible client devices interoperate with and support innovative and unique Cisco Unified Wireless Network features, such as fast secure roaming, integrated IPS, location services, and a variety of extensible authentication types.

  • Add a note here Mobility platform: Cisco offers access points and bridges for the carpeted enterprise, ruggedized environments, and challenging environments, such as the outdoors. Cisco Aironet lightweight access points are dynamically configured and managed through Lightweight Access Point Protocol (LWAPP), which is discussed later in this section. In addition, Cisco Aironet autonomous access points have the option to be converted to operate as lightweight access points running the LWAPP are supported. Note that not all Cisco Aironet autonomous AP models can be converted to LWAPP APs; see Cisco.com for more information.


    Note

    Add a note hereCisco offers a wide range of wireless AP models. For a complete and current reference of AP models, consult references to wireless AP models on Cisco.com.

  • Add a note here Network unification: The Cisco Unified Wireless Network leverages the customer’s existing wired network and investment in Cisco products. It supports a seamless network infrastructure across a range of platforms by unification with Cisco WLAN controllers.

  • Add a note here World-class network management: Cisco delivers a world-class network management system (NMS) that visualizes and helps secure your air space. The Cisco Wireless Control Systems (WCS) supports WLAN planning and design, radio frequency management, location tracking, and IPS, in addition to WLAN systems configuration, monitoring, and management. This platform easily manages multiple controllers and their associated lightweight access points.

  • Add a note here Unified advanced services: Cisco provides unified support of leading-edge applications. Cisco offers advanced services that are industry leading, innovative, and comprehensive. Wireless lightweight access points, location appliances, and wireless IP phones deliver the Cisco Unified Wireless Network advanced services.

Add a note hereAlthough detailed information and configuration of these elements is not necessary for switching, they can be referenced in voice deployments. The next section discusses similarities and differences of LANs and WLANs.

Comparing and Contrasting WLANs and LANs

Add a note here As previously noted, wired LANs require that users locate in one place and stay there. Because WLANs are an extension to the wired LAN network, they enable users to be mobile while using the mobile devices in different places without a wired network connection. A WLAN can be an overlay to, or substitute for, a traditional wired LAN network.

Add a note hereWith Cisco WLANs, mobile users can

  • Add a note hereMove freely around a facility

  • Add a note hereEnjoy real-time access to the wired LAN at wired Ethernet speeds

  • Add a note hereAccess all the resources of wired LANs

Add a note hereWLANs are essentially 802.11 LANs; recall the 802 nomenclature of 802 from CCNA switching. Fundamentally, the data in WLANs is sent over radio waves. In wired LANs, the data is sent over wires. However, the network interface of WLANs looks similar to wired LANs for the user.

Add a note hereThe following list summarizes similarities and differences between wired and wireless LANs:

  • Add a note hereBoth WLANs and wired LANs define the physical and data link layers and use MAC addresses. The same protocols and applications can be used over LANs and WLANs. Examples of such protocols are the IP and IP Security (IPsec) protocol for virtual private networks (VPN). Examples of applications are web, FTP, and Simple Network Management Protocol (SNMP) management.

  • Add a note hereIn WLANs, radio frequencies are used as the physical layer of the network.

  • Add a note hereWLANs use carrier sense multiple access collision avoidance (CSMA/CA) instead of carrier sense multiple access collision detection (CSMA/CD), which is used by Ethernet LANs. Collision detection is not possible because a sending station cannot receive at the same time that it is transmitting and, therefore, cannot detect a collision. Instead, the Request To Send (RTS) and Clear To Send (CTS) protocols are used to avoid collisions.

  • Add a note hereWLANs use a different frame format than wired Ethernet LANs. Additional information for WLANs is required in the Layer 2 header of the frame.

  • Add a note hereRadio waves used by WLANs have problems not found in wires.

  • Add a note hereConnectivity issues in WLANs can be caused by coverage problems, RF transmission, multipath distortion, and interference from other wireless services or other WLANs.

  • Add a note herePrivacy issues are possible because radio frequencies can reach outside the facility and physical cable plan.

  • Add a note hereIn WLANs, mobile clients are used to connect to the network.

  • Add a note hereMobile devices are often battery-powered.

  • Add a note hereWLANs are available worldwide; however, because WLANs use radio frequencies, they must follow country-specific regulations for RF power and frequencies. This requirement does not apply to wired LANs.

Add a note here WLANs obviously present challenges beyond wire LANs. Discussion of the problems, possible solutions, and further technical information about WLAN operations is outside the scope of this text. Consult Cisco.com for more information. The next section of the chapter introduces the standalone versus controller-based approaches to WLAN deployments, a topic critical to planning WLAN deployments in the campus.

Standalone Versus Controller-Based Approaches to WLAN Deployments in the Campus Network

Add a note hereFor a deployment of a Cisco Unified Wireless Network into a campus network, two deployment strategies exist for WLAN solutions. These deployment solutions are the standalone WLAN solution and the controller-based WLAN solution.

Add a note hereSynonymous with its naming, the standalone WLAN solution uses independent access points as a deployment strategy. For scaled WLAN deployments that use the standalone solution, Cisco recommends the use of Cisco Wireless LAN Solution Engine (WLSE) for centralized management and monitoring. Standalone WLAN solutions may be referred to as autonomous WLAN solutions in other documents and texts.

Add a note hereConversely, the controller-based WLAN solution uses centralized management systems to not only manage and monitor the access point, but also control, configure, and operate each access point. Controller-based WLAN solutions might be referred to as lightweight WLAN solutions in other documents and texts.

Add a note hereIn brief, standalone WLAN Solutions (Autonomous WLAN Solutions) are deployed using independent access points and optionally use a WLSE for centralized management. Controller-based WLAN solutions are deployed with a centralized controller, whereas the controller not only manages and monitors the access, but also controls, configures, and operates each access point.

Add a note hereThe following two subsections dive further into each WLAN solution to provide background information necessary to plan a campus network deployment.

Standalone WLAN Solution

Add a note here Figure 7-4 highlights a typical model for deploying the standalone WLAN solution in a campus network.

Image from book
Add a note hereFigure 7-4: Standalone WLAN Solution

Add a note hereAs previously noted, the standalone WLAN solution uses an independent (standalone) access point with centralized management and monitoring through a WLSE. Moreover, this solution also uses access control servers (ACS) in either a RADIUS or TACACS+ configuration for access control. Wireless domain services might be provided for radio frequency management and secure roaming. The Cisco switches deployed in the campus might support power of Ethernet (POE) to power the access points. PoE is discussed in further detail later in this chapter.

Add a note hereBecause each access point operates independently of each other in a standalone solution, the access points simply translate the wireless media (denoted 802.11) to Ethernet media (802.3.) and send the frames to the Cisco switch. The Cisco switch interprets the frames from the access point as any other Ethernet and switches the frames accordingly. In other words, the access point is relatively transparent to the switch from a traffic perspective.

Controller-Based WLAN Solution

Add a note here As previously discussed, the controller-based solution provides for centralized operation compared to a standalone solution. Figure 7-5 illustrates the components of a controller-based WLAN solution.

Image from book
Add a note hereFigure 7-5: Controller-Based WLAN Solution

Add a note hereThe definition of the devices shown in Figure 7-5 as part of a controller-based solution are described as follows:

  • Add a note hereController-based access points.

  • Add a note hereNetwork infrastructure with router and switches. Switches can be used to supply power to the access points (PoE).

  • Add a note hereCisco Wireless LAN Controller (WLC) for the control, configuration, and monitoring of the access points.

  • Add a note here Cisco Wireless Control System (WCS) for WLAN management (recommended).

  • Add a note hereCisco Wireless Location Appliance for location tracking (optional application server).

  • Add a note hereCisco Secure Access Control Server (ACS) for wireless security and authentication using RADIUS and TACACS+ protocol.

Add a note hereThe controller-based solution divides the processing of the 802.11 wireless protocols between the access points and a centralized Cisco Wireless LAN Controller (WLC). The processing of the 802.11 data and management protocols and the access point functionality is also split between the access points and the WLC. Even though this process sounds confusing, the designation between what the access points manages and what the WLC manages is simple. Most of the time, the access point manages critical functions, whereas the controller manages all the other functions.


Note

Add a note hereIn the controller-based WLAN solution, the process of the 802.11 wireless protocols is split between the access points and a centralized Cisco Wireless LAN controller. The access point manages the time-critical functions, whereas the controller manages all the other functions.


Note

Add a note hereWithin the wireless architecture design guides, the concept of dividing the frame and management processing functions between the access point and the WLC is referred to as a split MAC.

Add a note here Figure 7-6 illustrates the behavior of the split processing between the access point and the WLC.

Click to collapse
Add a note hereFigure 7-6: Split MAC of Controller-Based Solution

Add a note hereAs noted in Figure 7-6, the access point handles the portions of the protocol that have real-time requirements to include the following:

  • Add a note hereFrame exchanges handshake between a client and access point when transferring a frame over the air

  • Add a note hereTransmission of beacon frames

  • Add a note hereBuffering and transmission of frames for clients in power save operation

  • Add a note hereResponse to probe request frames from clients

  • Add a note hereForwarding notification of received probe requests to the controller

  • Add a note hereProviding real-time signal quality information to the controller with every received frame

  • Add a note here Monitoring each radio channel for noise, interference, and presence of other WLANs

  • Add a note hereMonitoring for the presence of other access points

Add a note hereAll remaining functionality is handled in the Cisco WLC, where time-sensitivity is not a concern and controllerwide visibility is required. The WLC functions include the following:

  • Add a note here802.11 authentication and de-authentication

  • Add a note here802.11 association and reassociation (mobility)

  • Add a note here802.11 frame translation and bridging

Add a note hereThe next two subsections focus on traffic handling and traffic flow of the controller-based solutions.

Traffic Handling in Controller-Based Solutions

Add a note hereTraffic handling in controller-based solutions is different than standalone solutions. Consider the following notes when planning for a wireless deployment in a campus network:

  • Add a note hereData and control messages are encapsulated between the access point and the WLAN controller using the Control and Provisioning of Wireless Access Points (CAPWAP) method or the Lightweight Access Point Protocol (LWAPP). Although both are standards-based, LWAPP was never adopted by any other vendor other than Cisco.

  • Add a note hereControl traffic between the access point and the controller is encapsulated with the LWAPP or CAPWAP and encrypted.

  • Add a note hereThe data traffic between the access point and controller is also encapsulated with LWAPP or CAPWAP. The data traffic is not encrypted. It is switched at the WLAN controller, where VLAN tagging and quality of service (QoS) are also applied.

  • Add a note hereThe access point accomplishes real-time frame exchange and certain real-time portions of MAC management. All client data traffic is sent via the WLAN controller.

  • Add a note hereWLAN controller and access point can be in the same or different broadcast domains and IP subnets. Access points obtain an IP address via DHCP, and then join a controller via a CAPWAP or LWAPP discovery mechanism.

Add a note hereThe next subsection discusses the traffic flow in a controller-based solution.

Traffic Flow in a Controller-Based Solution

Add a note here As previously noted, all traffic in a controller-based solution flows throw the WLC. For example, Figure 7-7 illustrates two clients communicating over a wireless network in a controller-based solution. As alluded to previously in Figure 7-6, the WLC is generally deployed in the distribution layer.

Image from book
Add a note hereFigure 7-7: Traffic Flow in a Controller-Based Solution

Add a note hereThe traffic between the two wireless mobile stations is forwarded from the access points to the controller and then sent to wireless mobile stations, respectively. Denote the traffic flows to the WLC and not between the mobile stations directly. The campus network switch simply switches Ethernet frames and is not aware that the frames ultimately end at a wireless client.


Note

Add a note hereIn review, traffic flow for wireless clients in a controller-based solution is via the WLC, which differs significantly from a standalone solution in which the access points send traffic natively.

Add a note hereControllers (WLC) in the controller-based solution are generally deployed in the distribution layer. As previously noted, access points are generally deployed in the access layer except where physical boundaries might require additional access points in other locations.

Hybrid Remote Edge Access Points (HREAP)

Add a note here HREAP are useful for providing high-availability of controller-based wireless solutions in remote offices. The purpose of these access points is to still offer wireless client connectivity when their connection to the controller (WLC) is lost. A typical controller-based access point always needs connectivity to its controller. When this connectivity is lost, the access point stops offering wireless services and starts looking for another controller. It restores wireless services only when it has regained connectivity to a controller.

Add a note hereHREAPs are controller-based access points. The main difference with standard controller-based access points is that the HREAP can survive the loss of connectivity to its controller. The HREAP reverts to a mode close to a standalone access point and remains to offer wireless access to its wireless clients.

Add a note here Figure 7-8 illustrates sample behavior of a HREAP solution.

Click to collapse
Add a note hereFigure 7-8: Example of a HREAP Deployment

Add a note hereThe HREAP is usually adapted to remote offices where only one or two access points are deployed; generally remote offices use wireless deployments for only a few access points because the size is usually small. Moreover, in a remote office situation, the controller is not local but accessed through a WAN connection. The HREAP might also be adapted to small offices with only one controller and no backup controller. Figure 7-8 illustrates an example of HREAP.


Note

Add a note here Of note, plan for deployment of HREAP for remote sites where redundant access points are limited.

Review of Standalone and Controller-Based WLAN Solutions

Add a note hereThe two WLAN solutions have different characteristics and advantages. Obviously for scaled wireless deployments, the controller-based solution offers significant advantages in terms of centralizing resources. Per the Cisco wireless design guides, any campus network with more than 200 users should utilize a controller-based solution for wireless deployments.

Add a note here Table 7-1 highlights and reviews the main differences to consider when planning for wireless network deployment in the campus network.

Add a note here Table 7-1: Comparison of Standalone and Controller-Based Wireless Solutions
Open table as spreadsheet

Add a note hereStandalone

Add a note hereController-Based

Add a note hereAccess point

Add a note hereStandalone IOS

Add a note hereController-based delivered IOS

Add a note hereConfiguration

Add a note hereVia access point

Add a note hereVia controller

Add a note hereOperation

Add a note hereIndependent

Add a note hereDependent on WLC

Add a note hereManagement and monitoring

Add a note hereVia WLSE

Add a note hereVia WCS

Add a note hereRedundancy

Add a note hereVia multiple access points

Add a note hereVia multiple WLAN controllers

Gathering Requirements for Planning a Wireless Deployment

Add a note hereWireless technology spans the scope of the topics covered in this text. Any comprehensive plan for a wireless deployment in a campus network should include advice from a trained specialist or consultant as a best practice.

Add a note hereIn review, you can use the following list of wireless requirements as a guide when working with specialists or consultants when planning a wireless deployment:

  • Add a note hereCollect requirements to determine how many ports of what type are needed and how they should be configured.

  • Add a note hereCheck the existing network to verify how the requirements can integrate into the existing deployment. You will often find that, beyond the pure port count issue, the impact on bandwidth might imply additional connections.

  • Add a note herePlan additional equipment needed to fulfill the requirements.

  • Add a note here Plan implementation.

  • Add a note hereImplement new network components.

Add a note hereMoreover, due to the nature of access point behavior, consider building a test plan to verify acceptable wireless implementation. In review of the behavior of an initial connection of a wireless client, it first detects the wireless network and tries to connect at Layer 2 (using 802.11). This connection might imply an 802.1X dialog between the access point (in autonomous mode) or the controller and a AAA server. When this step is complete, the wireless client tries to move to Layer 3 and obtains an IP address. The wireless client then has IP reachability to the network. Knowing these steps can help you troubleshoot wireless connectivity issues. For example, if the controller cannot communicate with the RADIUS server, the client might not associate to the wireless network.

Add a note hereThe following list illustrates a sample test for verifying a wireless deployment that can be used as a guide for creating your own test plan:

  • Add a note hereCan you reach the AP or WLC from management stations?

  • Add a note hereCan the AP reach the DHCP server?

  • Add a note hereDoes the AP get an IP address from the DHCP server?

  • Add a note hereCan the WLC reach the Radius or TACACS+ server?

  • Add a note hereDoes the client get an IP address?

  • Add a note hereCan the client access network, server, or Internet services?

Add a note here Planning for the Campus Network to Support Voice

Add a note hereVoice services running alongside the data network in the campus are becoming a standard of enterprise networks over traditional telephony networks for many reasons. As previously discussed, cost-savings is a major reason for voice deployments in the campus. Voice deployments in the campus are often referred to as VoIP deployments because from a technology perspective, voice in the campus network runs on top of TCP/IP. Nevertheless, the Return on Investment (ROI) associated with VoIP is significant as VoIP does require an initial start-up cost. However, the initial start-up cost will be returned in cost-savings over the life of the VoIP installation.

Add a note hereFrom a planning point-of-view, because the telephony services associated with VoIP runs over the campus network, data and voice application traffic must harmoniously coexist. As such, mechanisms must be set in place to differentiate traffic and to offer priority processing to delay sensitive voice traffic. We have all experienced the situation of poor audio quality, echo, jitter, and drop audio on our cell phones. Without careful planning, VoIP in the campus network might experience similar behaviors.

Add a note hereTo solve the differentiation problem, Cisco switches use QoS policies to mark and qualify traffic. In addition, Cisco switches can utilize a specific VLAN to keep voice traffic separate from other data to ensure that it is carried through the network with special handling and with minimal delay. Despite the specific configuration or implementation, design and implementation considerations need to be made for all campus switches supporting VoIP.


Note

Add a note here As a best practice, Voice deployment designs should include QoS, a separate VLAN for Voice Traffic, and Power over Ethernet (PoE).

Introduction to Unified Communications

Add a note hereFor reference when planning VoIP integration into the campus network, you need to review the entire VoIP architecture. Cisco refers to its architecture and suite of VoIP products and related services as Unified Communications. Unified Communications include more products and services than just the Cisco IP Phone. Figure 7-9 illustrates the products of the Cisco Unified Communications suite.

Click to collapse
Add a note hereFigure 7-9: Unified Communications Components

Add a note hereThe devices in Figure 7-9 are summarized as follows:

  • Add a note here IP Phone: Provides IP voice to the desktop.

  • Add a note here Gatekeeper: Provides connection admission control (CAC), bandwidth control and management, and address translation.

  • Add a note here Gateway: Provides translation between VoIP and non-VoIP networks, such as the public switched telephone network (PSTN). It also provides physical access for local analog and digital voice devices, such as telephones, fax machines, key sets, and PBXs.

  • Add a note here Multipoint control unit: Provides real-time connectivity for participants in multiple locations to attend the same videoconference or meeting.

  • Add a note here Call agent: Provides call control for IP phones, CAC, bandwidth control and management, and telephony address translation for IP addresses or telephone numbers.

  • Add a note here Application server: Provides services such as voice mail, unified messaging, and Cisco Unified Communications Manager Attendant Console.

  • Add a note here Videoconference station: Provides access for end-user participation in videoconferencing. The videoconference station contains a video capture device for video input and a microphone for audio input. The user can view video streams and hear the audio that originates at a remote user station.

Add a note hereThe deployment of Unified Communications may include either components, such as software voice applications, interactive voice response (IVR) systems, and softphones, provide additional services to meet the communications needs of your specific enterprise deployment. For planning purposes, a Unified Communications deployment may require assistance from other specialists or consultants.

Campus Network Design Requirements for Deploying VoIP

Add a note hereVoice traffic has extremely stringent QoS requirements. Voice traffic generally generates a smooth demand on bandwidth and has a minimal impact on other traffic, as long as voice traffic is managed.

Add a note hereWhen planning for a VoIP deployment, consider the following traffic requirements:

  • Add a note hereVoice packets are small, typically between 60 bytes and 120 bytes in size.

  • Add a note hereVoIP cannot tolerate drop or delay because it can lead to poor voice quality.

  • Add a note hereVoIP uses UDP because TCP retransmit capabilities are useless for voice.

  • Add a note hereSpecifically, for optimal voice quality, delay should be less than 150 ms one way.

  • Add a note hereAlthough no packet loss is ideal, acceptable packet loss is 1 percent.

Add a note hereThe QoS requirements for data traffic vary greatly. Different applications, such as a human resources application versus an ATM application, have different demands on the network. Even different versions of the same application can have varying network traffic characteristics.

Add a note hereData traffic can demonstrate either a smooth or bursty characteristic, depending on the application, but it differs from voice and video in terms of delay and drop sensitivity. Almost all data applications can tolerate some delay and generally can tolerate high drop rates. Figure 7-10 illustrates typical traffic rates of voice traffic versus application traffic.

Image from book
Add a note hereFigure 7-10: Comparing Voice and Data Traffic

Note

Add a note here In review, user data traffic generally uses a variable amount and is immune to average frame drops and latency. Conversely, voice traffic is generally low bandwidth but sensitive to frame drops and latency.

Add a note hereBecause data traffic can tolerate drops, the retransmit capabilities of TCP become important and, as a result, many data applications use TCP. Voice traffic uses UDP because there is no need to retransmit drop frames as the voice is real time.

Add a note hereIn enterprise networks, important (business-critical) applications are usually easy to identify. Most applications can be identified based on TCP or UDP port numbers. Some applications use dynamic port numbers that, to some extent, make classifications more difficult. Cisco IOS Software supports network-based application recognition (NBAR), which can be used to recognize dynamic port applications.

Add a note hereConsequently, it is important to plan for QoS in the campus for voice traffic to minimize traffic drops and latency in the campus network. Voice traffic is generally low-bandwidth compared to available bandwidth in the campus network.


Note

Add a note hereWhen designing campus networks with voice, plan for QoS to minimize latency and frame drops of voice traffic.

Add a note hereThe application of QoS occurs throughout the campus based on specific QoS configuration. The “Understanding QoS” section goes into detail about preparing and implementing QoS. The next section discusses planning for video in the campus network.

Add a note here Planning for the Campus Network to Support Video

Add a note hereFor networking professionals, video is often seen as just a Layer 7 application. Under this generic term, many different types of applications may be grouped, each of them having its own set of usage and technical specifications. Video applications are usually seen as bandwidth-intensive. Bandwidth-intensive applications are so named because they send a large number of frames onto the network. The content of the frame plays an important role in the overall bandwidth consumption. The content of the frame depends on the type of application for which video is used.

Add a note here Some video applications are real time, such as video conferencing or TelePresence. The main concern for this type of video is real time. Frames must transit without delay, and QoS is a critical element. Voice might be contained in the video flow or sent as a distinct flow.

Add a note hereSome other video applications are not as sensitive to real-time issues. They usually are one-way streams, where a client station is playing a video stream that is sent from a source. The client station might buffer part of the video flow. The main concern is often quality, and quality depends on several factors such as resolution, number of frames per second, type of codec, and so on, which is not dependent on the design of the campus network. A practical application of one-way streams is on-demand video used for training purposes.

Add a note hereBecause multiple persons might receive one-way video streams simultaneously, as in the case of watching a live video feed, the video feed might use multicast to send the traffic to multiple users simultaneously instead of sending traffic to each user autonomously. The “Understanding IP Multicast” section discusses this concept more. In brief, consider planning for deploying multicast for any application that sends traffic to multiple users concerning especially live video feeds.


Note

Add a note hereIn summary, real-time video applications such as TelePresence require the amble bandwidth for video traffic, QoS, and high-availability to ensure 99.9 percent uptime. Keep in mind, one-way video applications such as on-demand training are not as sensitive to latency and jitter as real-time video.

Add a note hereNote that real-time video applications are often peer-to-peer. Moreover, when planning for deployments, video applications deploy in the access layer just like a voice or data endpoint.

Voice and Video Traffic

Add a note hereYou need to understand the voice and video traffic profiles associated with video applications in the campus network. These traffic profiles ultimately drive the design of the campus network for a voice or video application.

Add a note hereAs illustrated in Figure 7-11, a video flow has different characteristics from a voice flow. Voice traffic is usually not bandwidth-intensive but requires steady bandwidth. Commonly, 50 voice packets would need to be sent per second for voice, each packet representing a few hundred bytes worth of voice data.

Click to collapse
Add a note hereFigure 7-11: Voice Versus Video Traffic

Add a note hereBecause of the nature of the algorithm used to encode the flow, video traffic has a different pattern. Traffic is often bursty, as each image or group of images needs several packets to be transmitted. Depending on the changes from one image to the next, there might be short time intervals without any network activity or sudden bursts when the whole image needs to be changed.

Add a note here Overall, real-time video streams typically consume a lot of bandwidth and are often bursty, although they usually do not consume all the available bandwidth. Consider these characteristics when preparing the campus network for video and voice.

Video Traffic Flow in the Campus Network

Add a note hereTraffic flow for video applications, in the case of peer-to-peer interactive video, is close to the voice flow. In Figure 7-12, two TelePresence (high-definition video conferencing) stations are communicating. The flow goes from one station to the access switch, then to the distribution switch, then to the core switch before reaching the distribution layer of the second building, and then to the access switch and the second station. This pattern is close to the voice flow between two phones. Just like a voice call, TelePresence stations may rely on a central server from where information about the session can be obtained. A detailed discussion of TelePresence is outside the scope of this book; consult Cisco.com for more details.

Click to collapse
Add a note hereFigure 7-12: Video Traffic Flow

Add a note hereData traffic does not often transit from one station to the other. Data clients usually communicate with data centers to upload or download data. Video streaming applications have the same behavior as data: They retrieve information from data centers and have little if no peer-to-peer interaction.

Add a note hereAs a result, when planning video integration into the campus network, denote whether the following applications will be deployed:

  • Add a note here Peer-to-peer applications, such as TelePresence

  • Add a note hereVideo streaming applications, such as video-on-demand training

  • Add a note hereVideo TV-type applications, such as Cisco IP TV

  • Add a note hereIP surveillance applications for security

Add a note hereDenoting these applications and referencing the material in this section can determine campus network design and configuration requirements.

Design Requirements for Voice, Data, and Video in the Campus Network

Add a note here Table 7-2 details the bandwidth, delay, jitter, packet loss, availability, power, security, and management requirements for planning voice, data, and video application in the campus network.

Add a note here Table 7-2: Design Requirements Review for Voice, Data, and Video
Open table as spreadsheet

Add a note hereRequirement

Add a note hereData

Add a note hereVoice

Add a note hereVideo

Add a note hereBandwidth

Add a note hereHigh

Add a note hereLow

Add a note hereHigh

Add a note hereDelay

Add a note hereIf less than a few msec, not applicable

Add a note hereLess than 150 msec

Add a note hereLess than 150 msec for real-time video

Add a note hereJitter

Add a note hereNot applicable

Add a note hereLow

Add a note hereLow

Add a note herePacket Loss

Add a note hereLess than 5%

Add a note hereLess than 1%

Add a note hereLess than 1%

Add a note hereAvailability

Add a note hereHigh

Add a note hereHigh

Add a note hereHigh

Add a note hereInline Power

Add a note hereNo

Add a note hereOptional

Add a note hereOptional for select devices

Add a note hereSecurity

Add a note hereHigh

Add a note hereMedium

Add a note hereLow or Medium

Add a note hereProvisioning

Add a note hereMedium Effort

Add a note hereSignificant Effort

Add a note hereMedium Effort

Add a note hereIn review, the tolerance to delay and jitter of video traffic depends on the type of video flow: Real time video, such as video conferencing with embedded voice, has the same delay and jitter constraints as voice traffic. One-way video streams are less sensitive to delay and jitter issues. Most video playing devices can buffer 5 seconds or more worth of video flow.

Add a note hereVideo traffic also has little tolerance to packet loss. If too many frames are lost, the image does not refresh properly and the user experience degrades. Here again, the quality depends on the type of application used. Tolerance to packet loss is often higher for slow rate and low-definition real-time interactive video flows than for one-way video streams.

Add a note hereThe next section discusses QoS, a requirement of most campus network designs, especially those that integrate voice and video.

No comments:

Post a Comment