How to implement an IP telephony-enabled mobile infrastructure Published: 1 August 2007
Transcription
How to implement an IP telephony-enabled mobile infrastructure Published: 1 August 2007
How to implement an IP telephony-enabled mobile infrastructure Published: 1 August 2007 © 2007 SAS Global Communications Limited. Reproduction of this publication in any form without express permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. SAS does not accept liability for errors, omissions or inadequacies in the information or its interpretation. The opinions expressed in this document are based on judgements at the date of publication and are subject to change without notice. All Rights Reserved. Table of contents Introduction ............................................................................................................................... 3 Glossary ................................................................................................................................... 3 What you need to know about mobility ..................................................................................... 4 Autonomous access points ................................................................................................... 4 Lightweight access points ..................................................................................................... 4 Access point deployment – general considerations .............................................................. 5 Voice coverage .................................................................................................................. 5 Signal and bandwidth performance. .................................................................................. 5 Battery life ......................................................................................................................... 5 Integrating mobile users with the network ......................................................................... 5 Quality of service ............................................................................................................... 6 Technology comparisons ...................................................................................................... 8 Implementing a mobile infrastructure ........................................................................................ 9 RF audit and channel management ...................................................................................... 9 Security ............................................................................................................................. 9 Access point deployment................................................................................................. 10 Structured cabling; route planning ................................................................................... 10 Guest access................................................................................................................... 10 The MOS test .................................................................................................................. 11 How to monitor and manage the infrastructure ....................................................................... 13 Dead-zone coverage ........................................................................................................... 13 Roaming.............................................................................................................................. 13 Appliance location detection ............................................................................................... 14 Rogue device detection ...................................................................................................... 14 AP monitoring ..................................................................................................................... 15 Monitoring QoS ................................................................................................................... 16 Fixed mobile convergence - now and in the future ................................................................. 18 Conclusion .............................................................................................................................. 19 About SAS .............................................................................................................................. 20 List of Figures Figure 1-1 WLAN ............................................................................................................................................... 4 Figure 1-2 Routers............................................................................................................................................. 6 Figure 1-3 Mobile infrastructure ......................................................................................................................... 7 Figure 1-4 Technology comparisons.................................................................................................................. 8 Figure 1-5 RF audit and channel management .................................................................................................. 9 Figure 1-6 Upgrading a data WLAN to a converged WLAN ............................................................................. 11 Figure 1-7 MOS test ........................................................................................................................................ 11 Figure 1-8 RF coverage and signal strength .................................................................................................... 13 Figure 1-9 Appliance location detection ........................................................................................................... 14 Figure 2-1 Rogue device detection .................................................................................................................. 14 Figure 2-2 AP monitoring ................................................................................................................................. 15 Figure 2-3 Monitoring QoS .............................................................................................................................. 16 Figure 2-4 Seamless connectivity between fixed and wireless networks ......................................................... 18 Published: 1 August 2007 © SAS Global Communications Limited Page 2 of 20 Introduction Enterprises are becoming increasingly aware of the business benefits to be gained from mobility; greater productivity, cost savings and flexible working. Mobility projects, however, invariably raise concerns about reliability, security and support, particularly when they herald the introduction of voice, video and other QoS-dependent applications. This white paper provides advice on avoiding the common pitfalls of mobility through following a best-practice approach to planning, installing and integrating an IP telephony-enabled mobile network. It also focuses on the main priorities for supporting a mobile infrastructure and outlines proven techniques for proactive network management. Glossary FMC – Fixed/ mobile convergence GPRS – General packet radio services GSM – Global system for mobile communications LWAPP – Lightweight access point protocol MAC address – Media access control Nanocell – Localised cell phone network QoS/CoS - Quality of service/ class of service (AF/EF/standard) RF – Radio frequency rd UMTS – Universal mobile telecommunications service is a 3 generation VoIP - Voice over IP – analogue traffic converted to IP at the router. VoWLAN – Voice over WLAN WAP – Wireless access point WiFi – Wireless fidelity WiMAX – Worldwide interoperability for microwave access WLAN – Wireless local area network Published: 1 August 2007 © SAS Global Communications Limited Page 3 of 20 What you need to know about mobility Configuration of a wireless LAN requires deployment of specialised technology to deliver wireless voice connectivity within any current IT infrastructure. The first area of consideration is enabling wireless network connectivity by use of access WiFi point technology. Figure 1-1 WLAN WAN service Carrier router PSTN / BRI / PRI Firewall VPN Voice gateway router WAN router Web server Application server SAN Default gateway Application server Printer Switch gateway Email server Switch WiFi switch Work station WIP phone UM server Call control server Switch gateway IP phone Laptop Figure 1-1 shows a common configuration of local area network components found in most office environments. Wireless access points (note the WiFi switch highlighted) effectively perform the same task as a standard LAN switch, connecting wireless devices into the core network. Considerable versatility can be gained through utilisation of different types of access point units: internal, external, and those that support directional aerials or antennae when booster coverage is required. Most importantly, however, is the consideration that needs to be given to the differences between autonomous and lightweight access points and how these differences affect network capability and long-term management. (WiMAX, also known as radio broadband, should not be confused with WiFi or WLAN access points. This is the system for point-to-point connectivity over large distances, used mostly by carriers and ISPs where a fixed-line broadband service is unavailable). Autonomous access points Autonomous access points proliferate at the lower end of the market, commonly in use in domestic or standalone situations where the access point itself comprises the configuration and control settings for wireless connectivity. Lightweight access points Lightweight access points, on the other hand, are centrally controlled and managed and, in effect, create a single WLAN over multiple APs. Each AP works in tandem with other APs to deliver a single hotspot. Lightweight access points are controlled by a central wireless LAN controller, a separate switched device sitting on the network. Published: 1 August 2007 © SAS Global Communications Limited Page 4 of 20 When access points are used for voice traffic, or in large areas across multiple offices, increased demands are placed upon their performance. Advanced usage requirements such as voice and video militate in favour of lightweight intelligent access points, as opposed to standalone autonomous access points. Lightweight intelligent access points join together to form one wireless cell and enable users to roam seamlessly between different access points whilst making voice calls. In addition, the central controller adjusts the access point’s power up or down depending on utilisation and coverage required. It also allows a level of intelligence whereby traffic can be switched between access points; the controller enables connection to access points depending on the aggregate level of traffic on the network rather than the proximity of the device to the individual user. Autonomous access points will not work together in the same way. Access point deployment – general considerations Voice coverage Access points provide a lower range of coverage for voice traffic than they do for data. When deploying the protocols required for voice on an existing wireless network, it is frequently the case that coverage is insufficient, even though it may have been faultless for data. In this situation, further configuration may be required in the form of additional access points or directional aerials to ensure the requisite coverage and create a seamless cell. Signal and bandwidth performance. Bandwidth performance suffers as the signal drops; the greater the distance from the access point, the lower the amount of bandwidth available. This may not be of great concern, since many applications, including IP telephony, require only a small amount of bandwidth, so users encounter no problems since their service utilises the available bandwidth, even though it may be minimised. Battery life Devices, such as PDAs or dual-mode devices, which use access points, consume more battery life than traditional devices that connect through the GSM GPRS cellular network. It may therefore be necessary to replace existing devices or upgrade their power supply to maximise running time. Integrating mobile users with the network Mobile users, who sit outside the core internal network, will be connecting through other security and communication gateways for remote access. Traffic going to any external mobile users will pass through the LAN default gateway, where it is directed to the correct remote access communication route. Published: 1 August 2007 © SAS Global Communications Limited Page 5 of 20 Figure 1-2 Routers WAN service Carrier router PSTN / BRI / PRI VPN Firewall WAN router Voice gateway router Web server Application server SAN Switch gateway Default gateway Application server Printer Email server Switch WiFi switch Work station WIP phone UM server Call control server Switch gateway IP phone Laptop The wide area network router, shown on the left in Figure 1-2, takes traffic out through an MPLS network to other sites on the WAN. These can be other company offices or home offices. Through deployment of lightweight access points, it is possible to configure a wireless network to include additional access points in offices other than just the head office. These can all be controlled and configured through a central wireless LAN (WLAN) controller to create a standard WLAN across geographically diverse sites. This allows staff who move between offices to use a standard wireless authentication configuration to gain access to the corporate network and resources. Connectivity would be provided to the mobile devices even though they are at remote locations, routed through the wide area network and back to the central site. Regardless of which office mobile users visit they would always enjoy the same functionality as staff with fixed connectivity to the core internal network. Quality of service Even with the correct configuration and sufficient bandwidth to support all applications, when voice is involved, quality of service must be maintained throughout the network. This will entail the configuration of quality of service, by introducing parameters such as expedited forwarding (EF) used for voice. Expedited forwarding ensures that voice quality is maintained across every device that makes up the local area network and wide area network. The voice gateway router, shown on the right in Figure 1-2, provides PSTN connectivity to the outside world, including mobile devices. The voice gateway router connects to the outside world through a PSTN dial network, using an ISDN 30 (primary rate) or an ISDN 2 (basic rate) line. At this point, as management of the call is handed off to the carrier PSTN network, so control over quality of service is relinquished to the carrier. Carrier networks invariably ensure that quality of service is maintained. The mobile device, if outside the office environment, will be connected through the base transceiver station system (BTS); the latter being the most likely route for mobile traffic. The Published: 1 August 2007 © SAS Global Communications Limited Page 6 of 20 BTS is the national network of mobile masts which house the antennae providing the cellular network. The BTS identifies the GSM, GPRS or 3G device and ensures that the call is delivered to the end node. With some mobile devices using GSM/GPRS/3G and IP they are always connected to the corporate network through the Internet or through a VPN rather than through the voice gateway router that connects to the carrier PSTN network. It is likely that, in the future, significant benefits will accrue from using a single carrier for both Internet connectivity, or landline connectivity, and mobile GSM or GPRS services also known as fixed mobile convergence (FMC). This will be at the point when carriers are able to recognise exactly where devices are located and the medium through which they are connected. This will also signify the arrival of presence. Presence offers connection to the user regardless of location. The network shown in Figure 1-3 shows office users connecting through an IP telephony system, connected to the IP backbone. For internal calls the signal runs across the LAN and is delivered to the user’s IP handset. Figure 1-3 Mobile infrastructure The head office user does not need to track down the number for the mobile device that a remote user may happen to be using at any particular point in time. Simply by dialling the extension number of the intended call recipient, presence will identify the best mode of contact and, if the call recipient is not immediately available, will send a message to the appropriate data device. Published: 1 August 2007 © SAS Global Communications Limited Page 7 of 20 Technology comparisons Figure 1-4 Technology comparisons Feature / benefit GSM GPRS PSTN ISDN 2 UMTS/3G DSL WiFi - 802.11a WiFi - 802.11b WiFi - 802.11g WiFi - 802.11n WiMAX - 802.16 Ethernet - Cat5e - 802.3 - 10BaseT Ethernet - Fibre - 802.3 - 10BaseF Speed 9kbps 56kbps 56kbps 64kps 385kbps 2mbps 54Mbps 11Mbps 54Mbps 100Mbps+ 70Mbps 10/100/1000Mbps 1000Mbps+ Signal distance Cell dependent Cell dependent 33.5Km 33.5Km Cell dependent 7.5Km WAP dependent WAP dependent WAP dependent WAP dependent 51.5Km 165Km 12Km QoS enabled No No No Yes No Yes Yes Yes Yes Yes Yes Yes Yes Figure 1-4 shows the different speed and signal distances available from each of the communication technologies that can be used in creating a mobile network. GSM is fairly restricted, at 9.6 kbps. Whilst certain data applications are possible, they are limited to basic text. Data applications have never been fully developed over GSM networks due to this speed restriction. GPRS constitutes a significant improvement on GSM, increasing the bandwidth up to 56kbps. This is the level at which the last generation of typical modems over PSTN analogue dial networks were able to connect. 56K is adequate for delivery of email text messages, basic screen shots and basic images. This bandwidth is insufficient, however, for feature-rich Internet browsing experiences and use of online applications. Moving further up the scale, in the UK, DSL capability now goes up to 8MB, with even higher bandwidth services soon to be available. WiFi currently offers three technologies: 802.11a, b and g. all of which offer point to multipoint connectivity. In the near future 802.11n is expected to be the next specification ratified for WiFi, with a significant jump up to 100Mbps+. Some access points currently enable the combined use of 802.11a and 802.11g, providing 108 kbps throughput by using both specifications. WiMAX offers high capability at 70Mbps over a very large distance, 5l.5 kilometres. This is purely for node-to-node connectivity; access to data services for a rural community location, for example, or a location not connected to the current DSL infrastructure. Structured cabling, in particular fibre, still provides significant bandwidth improvements over all other scenarios in a local office point-to-point environment. Published: 1 August 2007 © SAS Global Communications Limited Page 8 of 20 Implementing a mobile infrastructure RF audit and channel management The first step in implementing a mobile infrastructure is to undertake an RF (radio frequency) audit of the building or site. Figure 1-5 RF audit and channel management Coverage assessment Figure 1-5 shows a CAD image of one floor of a multiple tenancy office building, overlaid with the results of the RF audit for the floor. At the top end of the building there is no coverage whilst at the bottom there is a high range of cover. This information is invaluable in itself when implementing a mobile infrastructure, but RF audits can be used for more than simply revealing the building’s coverage. Security Understanding the arrangements that need to be made for security is one of the prime benefits of an RF audit. On the right in Figure 1-5 is a table of different access points in use on the site. An apparent anomaly is highlighted in the number of channels in use, focussing particularly on the number of devices using channel 6. In all WiFi protocols there are a limited number of channels available for use. This means that in multiple tenancy buildings there can be WLAN availability issues as WLANs from each floor compete for the limited channels available. In Published: 1 August 2007 © SAS Global Communications Limited Page 9 of 20 this example 18 APs are using channel 6. The impact of this will be that users will experience loss of the WLAN as the APs compete for the same channel. In a shared office environment, or a busy urban area, a number of access points will be in use and it is necessary for a company to determine which access points are its own and which relate to other businesses. This then facilitates access point configuration on a separate channel that is both available and secure from other users. It may be that in office environments tenants will have to agree a combined channel usage strategy to ensure that all their WLANs operate without conflict. Investigation of such anomalies leads to greater precision in access point deployment and eradication of any potential security and WLAN availability issues. Access points can then be fine-tuned to ensure minimum bleed into other tenant areas where coverage is not required; achieved by use of directional aerials and LWAPP controllers to direct access points internally into the building. Access point deployment Fundamentally, an RF audit is essential from a practical perspective; providing an essential appreciation of where and how access points should be deployed. These audits are cheap and cost-effective and will often recoup their investment by reducing the number of access points required for deployment or, perhaps, reducing the need for additional wireless LAN controllers. This in itself would be a cost benefit, not least because the process results in good documentation of exactly what coverage is available, and where (see Figure 1-5). Structured cabling; route planning As well as helping to decide upon optimum locations for access points, the RF audit, through the CAD image and the details of the office building, facilitates route planning for the structured cabling that serves them. Delivering power to the access points is another consideration. If power sockets are not available then a decision might be taken to use power over Ethernet switches to inject power into the structured cabling to keep the devices configured. This allows for a much cleaner and simpler WLAN deployment, quicker moves, adds and changes of APs, as well as providing business continuity options such as enabling the WLAN to be available during power outages. Guest access In terms of providing Internet access for guest users, the options are to give blanket coverage to an entire office area, through an open or password protected WLAN that both staff and guests use (not advised), or as a better option, to provide a secondary password protected network for guests, in the reception area or selected meeting rooms. This second network can be delivered either through additional separate access points, a completely separate WLAN secure from the corporate WLAN, or simply through using the existing corporate WLAN, and using VLANs to create a separate password protected guest network. An RF audit makes it possible to fine-tune and adjust the devices within a network to deliver services down to users. It also assists in the introduction of VoWLAN where existing data WLANs need to be reviewed to assess their suitability to carry voice traffic. Published: 1 August 2007 © SAS Global Communications Limited Page 10 of 20 Figure 1-6 Upgrading a data WLAN to a converged WLAN In Figure 1-6, the left side shows how four access points were initially deployed to provide access point coverage or WiFi access coverage throughout a building. The shading shows the strength of signal that was found in each of the offices at the initial audit. On the right it can be seen that the number of access points has been reduced to three. By using directional aerials and re-tuning the configuration, significantly better coverage and significantly higher bandwidth have been provided throughout the building. The MOS test Quality of service is critical to delivery of voice over a wireless network or VoWLAN. The most effective way to determine the quality of service availability on a network is through a testing system known as mean opinion score (the MOS test) covering all aspects of the network infrastructure, not just individual devices or components or the wireless network. The MOS test monitors the delay, jitter and packet loss across any path, whether a structured network, wireless network or a hybrid. A MOS test will test each network segment to assess its ability to support QoS and identify any device along the intended voice path which may not be fit for the purpose. Figure 1-7 MOS test Published: 1 August 2007 © SAS Global Communications Limited Page 11 of 20 The rankings range from 5 for ‘excellent’ to 1 for ‘bad’; these are used to judge voice quality. 4.34 is judged to be ‘carrier quality’ and users are always very satisfied with this level of service. 3.6 is judged to be ‘business quality’ but some users might be dissatisfied with this quality. 3.1 is where users are really dissatisfied. Figure 1-7 details the results from a MOS test report for a company with six offices, each of which has an IP address, shown on the left, which represents the wide area network router and the local area network core switch. In this test, the overall network was let down by the IP address, 10.8.1.240, second from bottom, as the jitter and data loss were unacceptable. Due to that one address, the whole network failed the test (although 10.8.1.253 also showed considerable loss but this was owing to the 10.8.1.240). In this instance there were two issues affecting the network, the WAN router being set to half duplex instead of full duplex and an incorrect QoS setting on the carrier network. Important to remember is that the MOS test is not specific to the network devices (e.g. access points or to individual mobile devices), it tests each network segment to see if it can support voice traffic. In effect it covers the voice path (i.e. the route a voice call would travel over the WAN and LAN) across every segment of the network; across local area network switches, into the IP telephony device and through the routers. If traffic is to be routed across a wide area network, the quality of service requested must be consistent to maintain the quality of the call and support the optimum number of calls being made. Published: 1 August 2007 © SAS Global Communications Limited Page 12 of 20 How to monitor and manage the infrastructure A number of parameters are taken into account when monitoring and managing the infrastructure. These range from RF coverage and signal strength, through to monitoring bandwidth and application performance and QoS. Dead-zone coverage Close infrastructure monitoring provides the best guarantee of availability for access points connecting to the network, particularly when WLANs are supporting business critical applications or voice services. Figure 1-8 RF coverage and signal strength Figure 1-8 represents the network map of a live infrastructure and shows access points deployed in an office. It also shows how data can be displayed by channel, power level, MAC address or users connected. A large amount of data can be collected from a WLAN for precise management. By virtue of the deployment of lightweight access points there are many benefits. One of the main benefits is that a fault-tolerant WLAN is created. For example, when one access point fails or is not available for maintenance purposes, the other access points located within its vicinity can increase their signal strength to compensate for the dead zone. Roaming It is also important to ensure continuity of service when staff are moving between APs – particularly when using voice applications such as IPT. Should a user walk around the building he or she needs to be able to move from cell to cell without interruption or loss of the call. In the case of data applications, in an autonomous scenario where wireless LAN controllers are not deployed, there will be a small jump in the data as it passes from one access point to another while the data or the connection is re-configured. With most applications the jump may be indiscernible or may take the form of a small pause. Such a jump would not be acceptable on a voice call. This is another major benefit of LWAPP controllers – the hand-off of the voice call between APs. Published: 1 August 2007 © SAS Global Communications Limited Page 13 of 20 Appliance location detection Appliance location detection is a monitoring parameter which facilitates not only precise identification of the location of the access points but also the location of the individual users connected to the network. Figure 1-9 Appliance location detection Overlaid on the same network map as shown in Figure 1-8 are the devices, within the network, which utilise the access point configuration. In a lightweight access point system, the system will re-configure itself to spread additional user connections across access points, should a cluster of users access one particular access point; their demand on the WLAN can be load-balanced. Users will not be accommodated simply by the nearest available access point with the strongest signal. The network will be spread to deliver services via a number of access points available in the area. Appliance location detection also enables the identification of rogue devices. Rogue device detection Figure 2-1 Rogue device detection Published: 1 August 2007 © SAS Global Communications Limited Page 14 of 20 The device indicated in Figure 2-1 is transmitting on the WiFi network, and has been introduced outside the scope of the internal corporate network. Identifying rogue devices is important for a number of reasons: Through this process, access points can be traced that may have been configured in the office area without approval as well as staff members using their laptops to share the corporate WLAN. As an example, there was a hotel chain which had a central agreement with a carrier for deployment of hot spots at each location. The management team was aware that individual hotels had in the past signed up to different agreements with different carriers on an individual basis. For consistency of presentation to customers and guests it was important for the management team to ascertain if the group was offering more than one scenario or more than one access point configuration so that the standalone hot spots could be identified and removed. Whilst offering a uniform message to a selected target audience is important to companies operating within certain sectors, there is one area of rogue device detection of concern to all businesses and organisations: security. In the corporate environment potential security risks, posed by rogue devices, have to be investigated. It may simply be a case of a device on another floor in the building over which the company or organisation has no jurisdiction that may be affecting WLAN availability. A company needs to be able to locate the access point and identify who is responsible for the AP in order to reach a resolution. Companies in multiple-tenancy buildings will need to discuss a channel management strategy with other tenants to ensure that all their respective WLANs operate without issue. AP monitoring Figure 2-2 AP monitoring Access point monitoring is not only an invaluable trouble-shooting mechanism, identifying problems and opportunities as dealt with in this section, but can also provide input for trending and capacity planning. It can help identify the need for office relocation, expansion, contraction or simply employee relocation, whilst, at the same time, enabling an organisation to assess the impact of such adjustments. Published: 1 August 2007 © SAS Global Communications Limited Page 15 of 20 Access point monitoring can also help ensure a level of change control and policy enforcement, particularly concerning lightweight access points. Whilst this will be coordinated through the wireless LAN controller it can also accommodate changes such as software upgrades to ensure consistent levels of service, offering seamless levels of connectivity, regardless of which access point users connect into. Understanding the utilisation levels of different devices is an additional benefit that comes from the process of monitoring the access points and ensures adequate end user performance. Although the fundamental logic of access point deployment may initially have been sound, organisations and users are dynamic, and usage patterns change over time. Redeployment of access points is necessitated most commonly by office refurbishments, staff changes or application changes. It is a common occurrence that some access points are then under-utilised whilst others are stretched. Monitoring QoS The prime objective of monitoring quality of service is to ensure that it is maintained long-term and understand the average as well as peak QoS demands. Figure 2-3 Monitoring QoS The test shown in Figure 2-3 was conducted to monitor the quality of service across an international wide area network infrastructure over a three-day period (from 27 April). At the start of the period, the system failed, dropping below the acceptable threshold for quality of service delivery At the top, in blue, is the overall MOS test result. Peaks and troughs are in evidence throughout at any period of time. The quality of service is varied and as the peak shown on the far top right-hand side shows where quality of service reached the threshold beyond which voice quality is affected. The MOS test shows the average utilisation and performance as well as peak demand and shows that both were being accommodated within the QoS parameters on the WAN and LAN.. Published: 1 August 2007 © SAS Global Communications Limited Page 16 of 20 Configuration changes were made through the first day, with demonstrable improvements; packet loss, jitter and delay were all reduced and an acceptable level of service was established. In this example, these issues were caused by incorrect router configuration, i.e. where some legacy routers did not support QoS and incorrect WAN configuration. Nonetheless there were still peaks, outside the threshold parameters. On the afternoon of the 28th there was a spike, a peak in the delay, above and beyond the threshold. Again, in this example, the peaks were caused by testing that was being undertaken on the video conference units in order to set the correct QoS parameters. By monitoring such occurrences longer term, user’s expectations can be managed; interim adjustments can be made to correct problem issues before the overall quality of service is lost on the network. Ongoing monitoring also permits time-stamped remedial investigations if users complain of voice quality problems after implementation and any changes to the voice path on any segment of the corporate network. Published: 1 August 2007 © SAS Global Communications Limited Page 17 of 20 Fixed mobile convergence - now and in the future Figure 2-4 Seamless connectivity between fixed and wireless networks Fixed mobile convergence (FMC) is the phrase used to describe seamless connectivity between the fixed and wireless network. This is now a dominant trend within the telecommunications industry. FMC takes place when a mobile device can access corporate data or applications irrespective of whether it is connected via a fixed or wireless network within or outside the office premises. This is increasingly being achieved through dual-mode (GSM and IP) mobile handsets. Dualmode is now commonly advertised as a feature of PDA devices and mobile phones; meaning they are capable of GSM, GPRS 3G and WiFi connectivity and can hop from one network to another. The ultimate goal of fixed mobile convergence is to optimise transmission of all voice, video, and standard data communications, across any device or location, and over any available network. It is likely that, in the very near future, devices will appear on the market that can connect and be switched between wired and wireless networks without any user intervention. Such devices will not only make life easier for mobile workers and people generally on the move but they will also facilitate the use of presence. Presence is where the systems can not only determine the multiple ways in which a user is able to communicate, but will also work out the best mode of communication with another user by assessing the communication status of the other user. If a user is not in the office when another user dials their extension number, the telephone system will automatically recognise that they are not available at that time and select the best contact medium, which may be a call to their mobile or home phone or an email. Presence assesses a user’s availability from data entered in their ‘diary’ to determine the best method by which to communicate with them at any given point in time. The user may pick up a telephone to make the call but the core system will automatically recognise that the person being called is not available and determine the best method to communicate with them in the quickest possible form, that most likely to elicit a response. Published: 1 August 2007 © SAS Global Communications Limited Page 18 of 20 Conclusion Currently, there is no single technology solution designed to facilitate mobility in every scenario. The market is characterised by combinations of different technologies being used to produce combined solutions. Seamless connectivity in different mobile scenarios is thus available and deployable. The decision whether or not to implement an IPT-enabled mobile infrastructure should be informed by a number of well-considered steps: Review business drivers and demands for IP telephony-enabled mobility; identifying what is really driving the need for mobility to be connected through the internal IP telephony system. Identify and test solution components and their interdependencies. It is important to assess the entire network infrastructure for quality of service and not simply the individual mobility solution, whether that is the wireless LAN, a PDA or connectivity through a GPRS device. The MOS test is the perfect benchmarking assessment for network readiness for mobile voice. Conduct user group trials to test and develop the solution before it is finally deployed. Set limited expectations for the deliverables from fixed mobile convergence. Whilst perfect anywhere-anytime connectivity will be available in the near future, being the goal of the industry, it is yet to arrive and expectations should be managed accordingly. Ascertain whether or not the existing carrier used by the company is able to support fixed mobile convergence and gain an understanding of the road map to which they are working. It will become increasingly important to work with a single carrier who can support the many demands that may be put upon a converged network infrastructure. From wireless hot spots, to the Internet, and onto the cellular dial network, the ability to provide seamless connectivity will militate strongly in favour of single carrier agreements. Understand the current carrier hardware and application limitations. With a wide variety of connectivity options comes a huge variation in bandwidth and signal distancing. Ensure ease of use. Currently the solution is not easy to use and this could create a barrier to adoption amongst intended users. The launch of the Blackberry created immense excitement since users could simply turn on the device and receive emails instantly. They would send an email and it would go just as instantly, with no need to invoke a third party package or try to synchronise or connect to another system such as a VPN, before they could actually use the system. Ease of use means instant adoption and this could be the deciding success factor when an IPT enabled mobile infrastructure is implemented. This is very, very important to remember. Published: 1 August 2007 © SAS Global Communications Limited Page 19 of 20 About SAS SAS Global Communications is a major provider of managed and professional network services. The company provides consultancy and implementation services to design, build and manage converged IP networks for enterprises of all sizes. Since its inception in 1989, the company has successfully delivered more than 2000 highly commended solutions, to a broad spectrum of clients including many renowned brands, such as Coca Cola Enterprises, The Body Shop International and Millennium and Copthorne Hotels. For more information contact: SAS Global Communications Limited SAS House Blackhouse Road Colgate, Horsham West Sussex RH13 6HS Tel: +44 (0) 1293 851951 Fax: +44 (0) 1293 852200 Email: [email protected] www.sas.co.uk Published: 1 August 2007 © SAS Global Communications Limited Page 20 of 20