5 | Understanding Network Controls and Solutions

Slides:



Advertisements
Similar presentations
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
Advertisements

CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Microsoft ® Lync™ Server 2010 Network Assessment Module 14 Microsoft Corporation.
Maintaining and Updating Windows Server 2008
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 CCM Deployment Models Wael K. Valencia Community College.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
Reduce costs through converged communications Reduce travel via A/V/W conferencingYes Reduce audio conferencing service chargesYes Reduce.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Existing PBX Existing Phone Handsets Numbering Plan to digit Internal extensions 9 for an outside line 3 digits.
Communication Networks Fourth Meeting. Types of Networks  What is a circuit network?  Two people are connected and allocated them their own physical.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Leading provider of secure mobility for the enterprise Aruba MOVE Architecture Industry’s most secure WLAN Easiest BYOD & Guest Access Zero-touch.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
IT-Pro59 Optimize your Network for Skype for Business.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
1 Configuring Sites Configuring Site Settings Configuring Inter-Site Replication Troubleshooting Replication Maintaining Server Settings.
Top Issues! Top Troubleshooting Voice Issues.
Johan Delimon 26/04/2016 BE-COM E-COMMUNICATIONS EVENT THE INNER WORKINGS OF SKYPE FOR BUSINESS: NETWORKING.
Basic Edge Core switch Training for Summit Communication.
02 | Network Discovery.
The Secrets of Media Flows in Skype for Business
Voice Performance Measurement and related technologies
Instructor Materials Chapter 1: LAN Design
4 | Usage and Traffic Modeling
Chapter 9 Optimizing Network Performance
Instructor Materials Chapter 8: Network Troubleshooting
Lab A: Planning an Installation
Topics discussed in this section:
Lync Network Assessment Methodologies
Cisco Unified Communications Management
IEEE 802 OmniRAN Study Group: SDN Use Case
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Wide Area Network.
3 | Analyzing Server, Network, and Client Health
Killtest Microsoft Exam
Chapter 4: Routing Concepts
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Introduction to Networking
Lec3: Network Management
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Routing.
Get Microsoft Exam Real Questions - Microsoft Dumps Dumps4Download
Real Microsoft Exam Questions and Answers
Packet Sniffing.
Routing and Switching Essentials v6.0
Network Optimizer Optimize Your Business & Cloud Networks
Multimedia and Networks
Migrating to Office 365 from Google mail and exchange
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Lync Network Readiness Assessment Exam
Requirements Definition
Lync Network Readiness Assessment Exam
09 | Configuring Lync Online
Routing.
Exceptions and networking
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lec1: Introduction to Network Management
Presentation transcript:

5 | Understanding Network Controls and Solutions

Planning Quality of Service 20335B Planning Quality of Service 07: Understanding Network Controls and Solutions Planning considerations include the ability to: Define QoS classification: Different types of network traffic, with port-based and protocol-based traffic are the most common classification methods Watch QoS policies implemented on existing switch infrastructures: They can help ensure that client DSCP markings are not stripped or reset Achieve guaranteed QoS by enabling DSCP marking of packets as they leave communication endpoints Be sure to relate your coverage of QoS to network assessment, and not get too entrenched into QoS on its own.

Configuring Quality of Service 20335B Configuring Quality of Service 07: Understanding Network Controls and Solutions Considerations include the ability to: Verify that the QoS markings in place throughout the network are legitimate: Avoids configuration issues on the switch infrastructure Review the planning requirements for network port usage Address common questions about manual port configuration scenarios such as: Is it possible to assign a dedicated number and range of ports per Skype for Business Server modality? What are some of scenarios in which you’d recommend this? Allocate a separate and dedicated range for each Skype for Business Server modality  

Creating Quality of Service Policies 20335B Creating Quality of Service Policies 07: Understanding Network Controls and Solutions Examples of QoS settings for Internal Edge interface Ports Description 49152-54000 Used for audio, the client is configured to use 20 ports; for example, ports 53081-54000. Other servers, such as an A/V Conferencing server, use ports 49152-54000. 54001-60000 Used for video, the Skype for Business Server client is configured to use 20 ports; for example, ports 54001-54020. Other servers, such as a A/V Conferencing server, use ports 54001-60000. 60001-65000 Used for application sharing, the client is configured to use 20 ports; for example, 60001-60020. Other servers, such as a Conferencing server, use ports 60001-65000. 65000-65020 Used for file transfer, the client is configured to use 20 ports; for example 65001-65020. This is a point-to-point file transfer only. Use the table on the slide to explain settings for QoS

Overview of Call Admission Control 20335B Overview of Call Admission Control 07: Understanding Network Controls and Solutions Main CAC design attributes in Skype for Business Server 2015: It is simple to deploy and manage without additional equipment, such as specially configured routers: Creating a complete CAC configuration depends on network complexity Maintaining a CAC policy depends on change management processes at the network It addresses critical unified communication (UC) use cases, such as roaming users and multiple points of presence: CAC policies are enforced according to where the endpoint is located, not where the user is homed It can be applied to video calls and audio/video conferencing sessions It provides the flexibility to enable representation of various kinds of network topologies  

Network Regions These include: 20335B Network Regions 07: Understanding Network Controls and Solutions These include: Common network region cmdlets: New-CsNetworkRegion. Get-CsNetworkRegion, Set-CsNetworkRegion, and Remove- CsNetworkRegion Network region routes that determine which linked path the connection will traverse from one region to another Network region links that are used to review and configure links between two network regions as part of CAC Network inter-site policies that define bandwidth limitations between sites that are directly linked  

Call Admission Control Best Practices 07: Understanding Network Controls and Solutions These include the ability to: Ensure that WANs are adequately provisioned for current and anticipated media traffic Monitor network usage and call detail records so that you can choose optimal CAC settings and update CAC settings as network usage changes Use CAC bandwidth policies to complement QoS settings If you want to reroute blocked calls onto the PSTN, verify PSTN functionality and capacity  

Call Established Over WAN 7: Skype for Business Server 2015 and Networking A normal call over the WAN that can go through because no restrictions apply. Using the steps on the slide, walk the students through the call-establishment process depicted on the slide. Start at the next slide to show the sequence of the call. This slide shows all five steps in the process on one slide because that is what the student sees in their manual. Students can follow along by referring to the steps in their manual. 1 2 3 4 5

1 of 5 1 20337B 7: Skype for Business Server 2015 and Networking Start at this slide and walk students through the process. Alice initiates a call to Bob. Go to the next slide. 1

2 of 5 1 2 20337B 7: Skype for Business Server 2015 and Networking Alice initiates a call to Bob. Bob’s Skype for Business 2015 client receives a call notification. Go to the next slide. 1 2

3 of 5 3 1 2 20337B 7: Skype for Business Server 2015 and Networking Alice initiates a call to Bob. Bob’s Skype for Business 2015 client receives a call notification. Bob’s Skype for Business 2015 client checks the CAC policy to determine whether the call can be established. Go to the next slide. 1 2 3

4 of 5 3 1 2 4 20337B 7: Skype for Business Server 2015 and Networking Alice initiates a call to Bob. Bob’s Skype for Business 2015 client receives a call notification. Bob’s Skype for Business 2015 client checks the CAC policy to determine whether the call can be established. Bob’s Skype for Business 2015 client accepts the call. Go to the next slide. 3 1 2 4

20337B 5 of 5 7: Skype for Business Server 2015 and Networking Alice initiates a call to Bob. Bob’s Skype for Business 2015 client receives a call notification. Bob’s Skype for Business 2015 client checks the CAC policy to determine whether the call can be established. Bob’s Skype for Business 2015 client accepts the call. The call is established and audio flows across the WAN link. 3 1 2 4 5

Call Rerouted Over PSTN 20337B Call Rerouted Over PSTN 7: Skype for Business Server 2015 and Networking Using the steps in the table, walk the students through the call-rerouting process depicted on the slide. Because the WAN connection has no more available bandwidth, the CAC policy triggers a reroute. Start at the next slide to show the sequence of the call. This slide shows all the steps in the process on one slide because that is what the student sees in their manual. Students can follow along by referring to the steps in their manual. 3 1 2 4 5a 5b 5c

1 of 5 1 20337B 7: Skype for Business Server 2015 and Networking Start at this slide and walk students through the process. Alice initiates a call to Bob. Go to the next slide. 1

2 of 5 1 2 20337B 7: Skype for Business Server 2015 and Networking Alice initiates a call to Bob. Bob’s Skype for Business 2015 client receives a call notification. Go to the next slide. 1 2

3 of 5 3 1 2 20337B 7: Skype for Business Server 2015 and Networking Alice initiates a call to Bob. Bob’s Skype for Business 2015 client receives a call notification. Bob’s Skype for Business 2015 client checks the CAC policy to determine whether the call can be established. Go to the next slide. 1 2 3

4 of 5 3 1 2 4 20337B 7: Skype for Business Server 2015 and Networking Alice initiates a call to Bob. Bob’s Skype for Business 2015 client receives a call notification. Bob’s Skype for Business 2015 client checks the CAC policy to determine whether the call can be established. The call is not allowed to be established over the WAN. Go to the next slide. 3 1 2 4

20337B 5 of 5 7: Skype for Business Server 2015 and Networking Alice initiates a call to Bob. Bob’s Skype for Business 2015 client receives a call notification. Bob’s Skype for Business 2015 client checks the CAC policy to determine whether the call can be established. The call is not allowed to be established over the WAN. 5a. The call cannot be routed over the Internet. 5b. The call is rerouted to the PSTN. 5c. The call audio flows across the PSTN. 3 1 2 4 5a 5b 5c

Media Endpoint Requirements 20337B Media Endpoint Requirements 7: Skype for Business Server 2015 and Networking CAC bandwidth policy check is performed by called endpoint. Call to legacy client will ignore CAC: Will always be established Bandwidth will not be managed  

Synthetic Transactions 20335B Synthetic Transactions 07: Understanding Network Controls and Solutions In Microsoft Skype for Business Server 2015, synthetic transactions provide rich logging that records: The time that the activity started The time that the activity finished The action that was performed Informational, verbose, warning, or error messages generated when the activity ran SIP registration messages Exception records or diagnostic codes generated when the activity ran The net result of running the activity Examples of actions that were performed include creating, joining, or leaving a conference, signing on to Skype for Business Server, sending an instant message, and so on.

Skype for Business Centralized Logging Service 07: Understanding Network Controls and Solutions Centralized Logging Service Agent    ClsAgent runs on every machine with Skype for Business Server deployed. It listens ( on ports TCP 50001-50003) for commands from ClsController over WCF and sends responses back to the controller. It manages log sessions (start/stop/update), and searches logs. It also performs housekeeping operations like log archiving and purges. Centralized Logging Service Controller Cmdlets   The Skype for Business Server Management Shell sends Start, Stop, Flush, and Search commands to the ClsAgent. When search commands are sent, the resulting logs are returned to the ClsControllerLib.dll and aggregated. The controller sends commands to the agent, receives the status of those commands and manages the search log file data as it is returned from all agents on any computer in the search scope, and aggregates the log data into a meaningful and ordered output set. The information in the following topics is focused on using the Skype for Business Server Management Shell. Skype for Business 2015 — Centralized Logging Service (CLS): Start/Stop and Flush trace logging on all servers in a deployment from one place  

Centralized Logging Service 20335B Centralized Logging Service 07: Understanding Network Controls and Solutions CLSController FE CLSAgent Start, Stop, Search commands Start, Stop, Search commands   Search results FE CLSAgent CLS Agent: Runs on every Skype for Business Server Controlled by CLS Controller Manages log files CLS Controller: Controls the agents (Start, Stop, Flush) Aggregates search results from all agents Available on every Skype for Business Server Managed through Skype for Business Server Management Shell Search results Start, Stop, Search commands FE CLSAgent Search results

Other Troubleshooting and Diagnostics Tools 07: Understanding Network Controls and Solutions These include: Skype for Business Network Monitor with Skype for Business Parsers Remote Connectivity Analyzer Snooper Event logging (CAPI2) Nslookup/Telnet Testing UDP Lync Connectivity Analyzer  

Analyzing Your Network Assessment Results 20335B Analyzing Your Network Assessment Results 08: Making Recommendations for Network Readiness Present and future considerations Present Future Issue Existing issues facing today Planned upgrades Findings Location and type of issues across the enterprise network Consider the issues in usage modeling Highlight the issues as risks Identify sites with future and parallel upgrade plans Saturated links Highlight the network upgrades as potential risk The table on the slide covers considerations to make when analyzing the data. Both present and future issues should be considered.

Analyzing the Modeling Phase Results 20335B Analyzing the Modeling Phase Results 08: Making Recommendations for Network Readiness Graphical results: Focus on Skype for Business RTC bandwidth requirements and availability: Helps to quickly identify which sites might be lacking bandwidth for Skype for Business RTC traffic Useful for creating executive-level reports in a network assessment final report You can choose which site results to graph  

It Is About Interpretation 08: Making Recommendations for Network Readiness When analyzing feedback from the data: Look for the unexpected Flat graphs = Good results 0.5% average packet loss on a managed line is optimal quality, but it should be flagged Familiarize yourself with the customer’s network before starting to analyze it: Example: 300ms delay between the US and India is bad according to the graphical results, but it is to be expected  

Guidelines for Analysis 20335B Guidelines for Analysis 08: Making Recommendations for Network Readiness These include: The greater the distance between locations, the higher the delay Review line characteristics: On a managed line, packet loss and high jitter should not occur Try to group results: If site A to site B, and site A to site C show issues, but site B to site C does not, focus on site A When in doubt, verify  

Developing Recommendations 20335B Developing Recommendations 08: Making Recommendations for Network Readiness How to make recommendations: Analysis + Context/Discovery = Recommendations Overlay simulation data with discovery data Do not wait until the end of the simulation to discuss data Remember – the goal is not to solve, but identify Offer the students some example recommendations. Use the slide to guide the examples, or offer some anecdotes that coincide with the topic content.

Creating Reports and Documents 20335B Creating Reports and Documents 08: Making Recommendations for Network Readiness Include the following: Present a summary of your results Document what you learned that influenced the engagement in each phase: Discovery Modeling Simulation What risks did you uncover that the customer should consider? Create a slide for each site that you tested  

Information to Summarize 20335B Information to Summarize 08: Making Recommendations for Network Readiness Include the following: List of locations, sites, and the number of users List of defined personas Completed bandwidth calculations Documented historical data (WAN metrics) QoS policies completed Traffic simulation completed