×

TMCnet
ITEXPO begins in:   New Coverage :  Asterisk  |  Fax Software  |  SIP Phones  |  Small Cells
 

Feature Article
July 2002


Capacity Assessment Is The Key To A Successful Network

BY PHILIP JOUNG

With the rapid growth in data networking over the past decade, TCP/IP has emerged as the preeminent protocol running throughout much of our global network. Myriad applications and protocols run on TCP/IP-based networks, making its reliability and performance an important issue. Packet-based voice solutions have recently surfaced to take advantage of the efficiencies expected when using TCP/IP, the notable example being VoIP. VoIP aims to make voice communications not only less expensive, but to bring increased features to the end user, more manageability to the enterprises that use it, and high profitability for companies that succeed in delivering robust VoIP solutions.

Now, consider your current POTS phone line � it has become so reliable that barring extreme circumstances, everyone expects to get a successful dial tone and very high voice quality during a call. Current metrics put the uptime of POTS at 99.999 percent, making it one of the most reliable public utilities we use. The dedicated circuit used during a call also means a relatively high degree of security. Given this high reliability, quality, and security, VoIP � as a competing technology � has much to live up to.

Of all the protocols and applications that run on TCP/IP networks, VoIP is one of the most sensitive to network issues. Issues that are at best annoying with many other protocols and applications can often render VoIP unusable. E-mail and the protocols it uses, for example, can typically tolerate latencies in transmission, and are not significantly affected by jitter, IP fragmentation, or small amounts of packet loss. However, introduce small amounts of jitter, latency, or packet loss, and voice quality and usability with VoIP quickly degrades to an unacceptable level.

Given the complexity of most enterprise networks, adding VoIP infrastructure and functionality is a complex undertaking. Bandwidth must be allocated, quality of service rules devised and configured, and security features implemented. The only way to know for sure that VoIP service will be acceptable is through rigorous capacity assessment.

CAPACITY ASSESSMENT
What is capacity assessment? In general, it can be defined as testing the network under loads that replicate real-world conditions. We all understand that live networks (especially the Internet) will have a number of factors that complicate matters � large numbers of users performing large numbers of different tasks; different devices that react to and often alter the traffic; link latencies; packet loss; jitter; and the like. Capacity assessment incorporates these different factors during testing to ensure that the results of testing closely resemble what is or will be experienced in a live network. It combines the pertinent factors in user behavior and network behavior to assess the reliability, availability, scalability, and performance of the system under test. Capacity assessment with realism is the best way to achieve confidence in the final results.

Unless a network is dedicated to VoIP, many other things will be happening on the network. In most VoIP deployments, a shared network will be a given, as one of the major advantages for VoIP centers on saving money, and a dedicated network will typically not be cost effective. VoIP deployments should expect a network handling traffic with many different purposes, often with differing value and criticality to the enterprise.

Because of this diversity in network traffic, realism in the capacity assessment of critical networks will incorporate not only the application that is being tested (e.g., VoIP), but also all the other traffic that is running concurrently with that application (Web browsing, FTP, e-mail, streaming media, etc). These different protocols and applications will cause different stresses to the network, helping to locate possible issues and bottlenecks during testing.

USER BEHAVIOR
Most large networks will have users that fall into a certain pattern of usage. Some users will mostly browse the Web, others mainly download large files, others primarily talking on the phone via VoIP, and still others doing various other tasks. Quantifying these different user populations (and at times, predicting how their behaviors might evolve in the future) in order to incorporate their behaviors into testing will make capacity assessment results much more predictable, solid, and reliable.

Because of the variability of network traffic, I�ve included a list of user behaviors below that might be encountered in real networks. While they do not always directly apply to VoIP, they can cause effects that matter for other applications, indirectly affecting VoIP.

Downloads: Downloads of many small files simultaneously, large files, or streaming media can all have detrimental effects on network performance.

Bursty traffic: Users typically use networks in spurts, with periods in which the traffic jumps significantly from its normal amount. Simulating this user behavior can help ensure that the network handles these challenges effectively. These peaks often happen during critical periods, such as the crucial holiday buying season for an e-commerce Web site, the busy call volumes during the morning, or the streaming broadcast of a major event.

Frustration thresholds/user aborts: People browsing the Web often become frustrated when pages do not load after a few seconds and either try to reload or hit the stop key. This can cause further load on the system, since it continues to work on the original request even though the user already has moved on.

SSL usage: Use of secure sockets layer to encrypt data increases the security of network transactions, but carries a big price in terms of processing and network bandwidth.

Use of stateful applications: This can generally be defined as applications that keep track of the user throughout the session. Examples include Web sites that use cookies to maintain a user�s session, FTP logins, and SSL session IDs.

Browser versions: Different Web browsers can cause different types of load on a system. Some Web sites tailor content to specific browsers, which also uses processing cycles.

NETWORK BEHAVIOR
An important part of overall network performance will depend on what is happening to the traffic as it flows across the network. When certain conditions occur, they often create significant effects on system performance. Below are some common network issues:

Packet loss: Packet loss often happens from network/ system congestion, or transmission errors. Studies have shown that FTP performance drops by 50 percent with only three percent packet loss. Small amounts of packet loss cause clicks and pops in VoIP, but high levels can make the conversation unintelligible, or completely fail.

IP fragmentation: Devices often have a maximum amount of data they can accommodate at one time. When a device receives data that exceeds its maximum amount, it can fragment it into multiple chunks that need to be reassembled at the final destination. This reassembly takes processing, especially when the fragmented data arrives out of order.

Jitter: Applications that deal with real-time data, such as VoIP and streaming media can be especially sensitive to jitter. Jitter occurs when network data arrives at different rates. �Timing is everything!�

Latencies: High network latencies spell doom for real-time applications like VoIP. Indeed, a VoIP conversation becomes difficult to manage when network latency increases much above 250 milliseconds � people often end up speaking on top of one another. Network systems also exhibit increased loads with higher latencies because they must deal with increased network connections and buffering.

Data corruption: Corruption is usually a rare event in most modern networks. However, when it happens, the effects can be similar to packet loss.

QUALITY OF SERVICE
Because of the sensitivity of VoIP to network issues, having control of the user traffic being handled by the network is valuable. Mechanisms abound for helping to control this traffic, with the majority falling into the QoS (quality of service) umbrella.

QoS allows the network administrator to set priority levels for traffic. Therefore, VoIP traffic can be given a higher priority than say, instant messaging or Web surfing traffic. Capacity assessment will not only help ensure that the network properly applies and follows the rules set by the administrator, but also provide understanding into the effect of the rules on user traffic, especially for traffic that has been given lower priorities. Capacity assessment also provides information about how the QoS rules and the network will degrade once it approaches its capacity. This can be important in helping to predict failures before they occur, giving the administrator a chance to make changes to the network in advance of any detectable failures.

PAY A LITTLE NOW, OR PAY A LOT LATER
Given the complexity of the networks running at most enterprises and the business critical nature of the applications running on those networks, real-world capacity assessment should be part of any system prototyping or deployment. Although it involves a small amount of extra effort earlier on, the gains in system stability, performance, availability, and ultimately improved customer satisfaction and time-to-market more than pay for the up-front effort. Factor in the peace of mind gained from capacity assessment, and it becomes apparent that the justifications for not conducting capacity assessments are poor.

Capacity assessment can take place at all stages of a system project: Product selection: While scoping out different vendors� products, capacity assessment can prove, using your own parameters and network traffic mix, how the product functions and performs.

System design: Capacity assessment can help one choose between different design ideas, demonstrate scalability, compare performance, and can even scrutinize the tolerance of a design to certain user and network behaviors.

System deployment: Capacity assessment can help ensure that expected performance levels are being maintained and help adjust parameters.

Post-deployment: Realistic capacity assessment will validate the final performance of an entire system, providing a baseline from which future upgrades can be considered.

VoIP holds a lot of promise, and many investigations have commenced towards determining this technology�s eventual fit into the enterprise. Given the quality of the current POTS system in use, VoIP deployments must be sure to come close to matching that quality, or risk user complaints or even complete removal of the poorly functioning VoIP system. Real-world capacity assessment offers that extra insurance that the final VoIP deployment functions properly and scales effectively. The fact that the rest of the network will benefit from this assessment is simply an extra bonus that can help justify the effort.

Philip Joung is director of technical marketing at Caw Networks. Caw Networks� products are robust, customer-ready, highly scalable appliances that deliver unmatched performance and ease of deployment, use, maintenance, and administration. For more information visit the company online at www.caw.com.

[ Return To The July 2002 Table Of Contents ]



Today @ TMC
Upcoming Events
ITEXPO West 2012
October 2- 5, 2012
The Austin Convention Center
Austin, Texas
MSPWorld
The World's Premier Managed Services and Cloud Computing Event
Click for Dates and Locations
Mobility Tech Conference & Expo
October 3- 5, 2012
The Austin Convention Center
Austin, Texas
Cloud Communications Summit
October 3- 5, 2012
The Austin Convention Center
Austin, Texas