Polycom V2IU 4350 user manual Closer Look at Traffic Management

Page 89

Configuring the V2IU 4350

Determining the maximum number of concurrent calls

The maximum number of concurrent calls that can be supported by the WAN access link is calculated using the following formula:

Max calls = (Maximum WAN upstream bandwidth * .85)/VoIP codec rate where,

Maximum WAN upstream bandwidth = value entered in step D above (in Kbps)

VoIP codec rate = 85.6Kbps for G.711 voice devices or 29.6Kbps for G.729 voice devices.

The maximum WAN upstream bandwidth is multiplied by .85 in the formula above to reduce the total bandwidth available for voice calls by 15%. This reduction is necessary because the 4350 automatically reserves 15% of the total WAN bandwidth for low priority data traffic so that it is not starved completely. Starving data traffic completely would increase the number of retry attempts and exacerbate congestion on the link during periods of peak usage.

Examples

The maximum number of G.711 voice calls supported by a T1 (1.536 Kbps) WAN is calculated as follows:

(1.536*.85)/85.6 = 15.3 or 15 total voice calls.

The maximum number of G.711 voice calls supported by a 768Kbps fractional

T1 WAN is calculated as follows:

(768*.85)/85.6 = 7.6 or 7 total voice calls

The maximum number of G.729 voice calls supported by a 256Kbps fractional

T1 WAN is calculated as follows:

(256*.85)/29.6 = 7.4 or 7 total voice calls

After determining the maximum number of voice calls CAC is enabled as follows:

1.Select the Enable Call Admission Control checkbox.

2.Enter Maximum number of calls allowed as calculated above.

3.Press Submit.

A Closer Look at Traffic Management in the 4350

The traffic management mechanisms provided by the 4350 are designed to ensure high priority real-time voice and video traffic is processed before lower priority data traffic. At the same time, bandwidth not in use by voice and video traffic is made available so that data traffic can burst up to full line rate making efficient use of WAN bandwidth. Traffic management mechanisms are

3 - 71

Image 89
Contents V2IU 4350 Converged Network Appliance Trademark Information Contents Page Contents Upgrading the V2IU 4350 System DiagnosticsSaving and Restoring the V2IU 4350 Configuration Contents Page V2IU 4350 Converged Network Appliance T1 Wide Area Network WAN Access RouterFeature Summary LED Label Activity Description Front Panel LEDsBack panel of the 4350E contains the following connections Back PanelRequired Tools and Materials Physical InstallationWall-Mount Installation Desktop InstallationRack-Mount Installation Connecting the Power and Cables AdministrationGetting Started Page Configuring the V2IU Configuration Guide For IP Centrex Applications Task Subtask Application? Configuration OutlineConfiguration Guide For Station Side IP PBX Applications Configure For Station Configuration Guide For Trunk Side IP PBX Applications Configure For Trunk Side IP Hotspot Configuration Guide For Hosted Video ApplicationsConfigure For Hosted Configuration Guide For Enterprise Video Applications Configure For Hosted Configure the LAN Interface System ConfigurationPress Submit Page Modify an Existing Vlan Configuration Configure the WAN Interface Configuring the V2IU Frame Relay Mode and Dlci Configure the Dhcp Server Mask Delete a Dhcp IP Address Configure Hostname, Snmp and Remote Logging Disable Snmp Change the Administration Password Enabling a Read-only User Read-only UserClick Submit How Subinterfaces WorksConfiguring Subinterfaces Viewing or Changing the ToS Byte Setting How the ToS Byte Setting WorksConfiguring the V2IU Configuration Configuring the V2IU Settings in the Embedded gatekeeper mode settings This is an advanced configuration option and should H.323 Settings page includes the following two buttons Alias Manipulation ActivityItem Description Neighboring H.323 Neighboring page includes the following buttons Regular Expressions Regular Expressions Symbol DescriptionHow Forwarding Rules Works Forwarding RulesConfiguring Forwarding Rules Page How Peering Proxy Works Peering ProxyPage Outbound from Site C to Site a Inbound from Site a to Site C Outbound from Site C to Public IP Endpoint Configuring Peering ProxyAdding an H.323 Prefix Entry Clients List Lock Enabling the Clients List Lock To configure clients list lock, use the following stepsActivity Monitor Type of Events Callee admission request received Call Termination Received invalid data Viewing the H.323 Activity MonitorVoIP Configuration Configure the VoIP ALG Programmed in your IP phone Configure VoIP Subnet Routing Enter a VoIP Subnet Route Configure IP Phones, IADs or Softphones NAT for Data Traffic Data Networking ConfigurationProtocolPublicIPAddress/netmask-portPrivateIPAddress-port Static IP routing Firewall Configuration Enable or disable the firewall Action Description Input format Traffic Management Configuration Enable Traffic Shaping Enable CAC Optionally enable priority IP addressesCloser Look at Traffic Management Upstream Traffic Management ClassifyingDownstream Traffic Management Page System Diagnostics Viewing Networking Information Viewing the ALG registration codeRouting Information Viewing Advanced System Information Passive Voice Call Monitoring Accessing Troubleshooting ToolsVerify Registered Voice and Video Devices Performing a Ping Test Restarting Networking Processes Ewn Command Saving and Restoring the V2IU 4350 ConfigurationCopy a Backup File to a Remote Tftp Server Create a Backup File and Save in Local FlashDownload a Backup File from a Remote Tftp Server List the Available Backup FilesDelete a Backup File Page Upgrading the V2IU Upgrade Procedure for Software Revision 1.3.11 or LaterPage Appendix Troubleshooting TipsSpecifications Regulatory Notices Other Rights and Limitations Regulatory Notices Warranty and Warranty Exclusions Regulatory Notices Page Regulatory Notices Page Regulatory Notices FCC Part 68 Notice to Users of Digital Service Industry Canada IC Notice Warranty and Repair Service Center