1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Case Study: Cisco Manages the AVVID Environment.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Voice Issues.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Inter-VLAN Routing Routing And Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
1 © 2004 Cisco Systems, Inc. All rights reserved. Rich Gore Cisco Cisco Case Study: Migrating the Cisco WAN to the Cisco 7600 Series Router.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 © 2004 Cisco Systems, Inc. All rights reserved. Rich Gore Case Study: Small Mobile Office Cisco Information Technology December.
Improving Availability in Multilayer Switched Networks
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Cisco Case Study: Cisco Uses WAN VPNs for Cost-
1 © 2003 Cisco Systems, Inc. All rights reserved. Rich Gore Case Study: IP Telephony / Extension Mobility Cisco Information Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
1 CCM Deployment Models Wael K. Valencia Community College.
1 © 2004 Cisco Systems, Inc. All rights reserved. Rich Gore Cisco Case Study: Cisco field office in São Paulo, Brazil Cisco Information.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing And Switching.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 1: Hierarchical Network Design
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Semester 3, v Chapter 3: Virtual LANs
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
1 © 2004 Cisco Systems, Inc. All rights reserved. Case Study: Cisco VPN Client Cisco Information Technology May 19, 2004.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
1 © 2004 Cisco Systems, Inc. All rights reserved. Rich Gore Case Study: Cisco Global Wireless LAN Software Migration Cisco Information.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2006 Cisco Systems, Inc. All rights reserved. 3.5: Implementing QoS with Cisco AutoQoS.
Mario D’Silva National Technology Specialists Unified Communications UNC307.
ENABLING companies to DEPLOY wireless data solutions Application Development Tools Remote Deployment and Management LAN/WAN environments.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Windows Small Business Server 2003 R2 Powering Small Businesses.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Case Study: Cisco VPN Client
Chapter 1: Explore the Network
Working at a Small-to-Medium Business or ISP – Chapter 8
Planning and Troubleshooting Routing and Switching
Chapter 1: Explore the Network
Case Study: Cisco Global Wireless LAN Software Migration
IS4550 Security Policies and Implementation
Routing and Switching Essentials v6.0
IS4680 Security Auditing for Compliance
Global One Communications
Presentation transcript:

1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Case Study: Cisco Manages the AVVID Environment for High Quality, High Availability, and Cost Savings Cisco Information Technology April 21, 2004

222 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient converged voice and data network Solution Focus on the areas of voice quality, availability, change management, security, monitoring, and support Results Cisco® AVVID (Architecture for Voice, Video and Integrated Data) supports 55,000 employees and contractors with target availability of percent Next Steps Continue to evolve and expand Cisco AVVID deployment through new processes and procedures, and through the introduction of new applications that simplify operations and increase productivity

333 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Challenge―Quality, Availability, Support Deliver voice quality and availability equal to or better than what users were accustomed to with traditional PBX/TDM telephony Build redundancies into the network well beyond those found in traditional standalone voice and data networks Create robust change management processes and standard practices Ensure proper segmentation of voice and data packets on the same physical network as well as prevent data network security threats from affecting voice services Shift from the traditional, reactive mindset of monitoring PBX-based voice to a proactive mindset where problems are identified before they affect service Create new, effective support models and procedures in this new, converged environment

444 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Solution—Voice Quality Perform a Voice over IP (VoIP) audit to identify network readiness for voice Establish separate Virtual LANs (VLANs) for voice Trust priority traffic, rewrite other non-latency-sensitive data traffic to zero, and provide priority queuing at the WAN edge for voice and voice signaling traffic Ensure consistent Call Admission Control (CAC) bandwidth parameters across the IP telephony infrastructure Test codecs, both in a lab environment and with a pilot group of users and steering committee, to ensure that the voice quality requirements of end users are met

555 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID VLAN=10 VVID=110 VLAN=11 VVID=111 Floor 1 Primary VLAN 110 Primary VLAN 10 VLAN=12 VVID=112 VLAN=13 VVID=113 Floor 2 Cisco® Catalyst® 6500 Series Switch – Layer 3 routing Cisco Catalyst 6500 Series Switch – Layer 2 voice and data switching IP phone Voice and Data VLANs

666 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Solution―Availability Centralize Cisco® CallManager clusters into regional hub sites, minimizing the number of clusters to greatly simplify management and maintain resilience Provide diverse routing for voice gateways with multiple paths out of each cluster Equip core, distribution, and access switches with high availability features Provide redundant core and distribution routers throughout the network Build redundancy into WAN routes through Hot Standby Routing Protocol (HSRP) Reduce the number of Cisco CallManagers in the network by supporting Survivable Remote Site Telephony (SRST) features in local site routers Evaluate unique business requirements, based on a cost-benefit analysis, to ensure having a proper disaster recovery plan in place

777 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Distribution layer redundancy Network core redundancy HSRP between core routers Cisco Building Cisco® Catalyst® 6500 Series Switch – Layer 3 routing Cisco Catalyst 6500 Series Switch – Layer 2 voice and data switching Gigabit Ethernet over Fiber Ethernet over cable IP phone Building router redundancy High Availability Layers Fiber redundancy on diverse paths HSRP between building routers Fiber diverse paths from switch to router Multiple cables from desk to switch Network Node HSRP High Availability Architecture

888 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Solution—Change Management Hold change management meetings regularly and frequently to review all changes that could affect client services Integrate voice and data teams into a single change management review board Create detailed process for change management requests and continually evaluate and revise policies as needed Create alias that includes all IT personnel who interact with the voice and data network, enabling personnel to review all change requests affecting the voice network worldwide Adopt a policy that no changes affecting voice services can be performed before 9:00 p.m. local time Establish standard configurations globally for LANs, WAN, and change management procedures

999 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Solution―Security Run antivirus software on all Cisco® CallManagers, automatically update as new DAT files are released by the support team, and generate compliance reports daily to identify hosts that have failed to download the latest DAT file Run Cisco Security Agent, a threat protection software client, on all Cisco CallManagers Implement standard Internet access controls such as firewalls, DMZ, and intrusion detection systems (IDSs), and deploy strong authentication mechanisms for remote access VPN users Require standard OS and application set for antivirus protection on all PCs and use automated desktop management software to allow for responsive remediation of infected devices Require RFC1918 space for all labs, use a proxy server to access the Internet, provide virus filtering at the edge using Cisco Application and Content Networking System (ACNS) Software, and limit traffic that can be sourced from a lab through access control lists (ACLs)

10 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Solution—Monitoring Create monitoring procedures with standardized monitoring policies for all network resources, continually measure availability on these devices, and send and pager notification within five minutes when established thresholds have been reached Continually monitor for network resource availability through ping tests using an internally developed SNMP monitoring system Monitor voice gateway utilization and trunk availability on a regular basis to allow proper bandwidth provisioning Periodically run application checks on Cisco® CallManagers to monitor dial tone availability and that Trivial File Transfer Protocol (TFTP) downloads for IP phones are available Monitor configuration backups for Cisco CallManagers, voice gateways, and LAN/WAN devices through automated daily reports that verify configuration compliance, and manually audit all connectivity, topology, network maps, and configurations at least once every six months Run Perl script weekly to verify redundant paths

11 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Solution—Support Provide escalation path for support teams consisting of subject matter experts in voice, LAN, and WAN, and enforce escalations through proper channels Form steering committee prior to any implementation, which includes clients, and create specific training plans for each implementation Develop comprehensive implementation and support documentation, and store in easy-to-get-to online location Execute OS patches and upgrades through remote administration tools such as Virtual Network Computing (VNC) and Remote Insight Board (RIB) Use change management process for all Cisco® CallManager application patches and upgrades, and preserve current software image by powering down the CallManager and removing the redundant drive prior to a major application upgrade

12 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Solution—Support (continued) Review effects on telephony infrastructure from other device upgrades such as LANs, WANs, voice gateways, and phones Use Cisco® multilevel administration access to provide multiple levels of security to Cisco CallManager administration A project manager and project champion at the senior management level are important during deployment and throughout the operational phase In a mixed voice and data traffic environment, it is important to have a team with strong cross-functional skills to address all the issues that may arise

13 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Results—Delivering Quality and Availability Currently, Cisco® deployment of Cisco AVVID supports about 55,000 employees and contractors at approximately 300 sites globally Cisco IT’s target for Cisco AVVID availability is percent

14 © 2004 Cisco Systems, Inc. All rights reserved. Presentation_ID Next Steps—Evolve and Expand Add integrated telephony and video capabilities to the converged network Continually improve the disaster recovery plan Converge voice and data traffic over the WAN where it is economically feasible Implement new applications to increase productivity

15 © 2004 Cisco Systems, Inc. All rights reserved. Rich Gore This publication describes how Cisco has benefited from the deployment of its own products. Many factors may have contributed to the results and benefits described; Cisco does not guarantee comparable results elsewhere. CISCO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties, therefore this disclaimer may not apply to you. For additional Cisco IT Case Studies on a variety of business solutions, go to Cisco Work