Why UC Applications Still Cause Network Headaches (And How to Fix Them)
June 09, 2017

Chris Bloom
Savvius

Share this

Unified Communications (UC) applications such as VoIP and Video streaming have been around in the enterprise setting now for almost two decades. It's rather remarkable, then, that for all of their business benefits and popularity, UC applications still post so many headaches for network engineers. With that in mind, are there steps that network engineers can and should be taking to make these applications more reliable, and deliver better quality of service to their users? I believe there are, so let's take a look at some tips.

Rather than being generated digitally, the origin of UC data is a fluid and continuous analog stream. For that reason, data from UC applications such as VoIP need to be managed in real time. Unfortunately, as digital files are transferred over any network, it's common for some of those packets to be dropped or to be delivered out of sync, resulting in poor sound quality, delays, static and sound gaps.

Email and document transfer applications generally cause far less obvious problems on the network thanks to TCP's built-in checks and acknowledgements, giving it the ability to resend and reorganize data into a perfect digital copy of the original. This isn't the case for UDP, which is a best-effort protocol often used by UC applications. Once a UDP packet has been sent, there is no mechanism to acknowledge or retransmit that packet if it gets delayed or corrupted due to latency, jitter or packet loss. VoIP technologies often employ tools such as DSP algorithms that compensate for up to 30 milliseconds of missing data, however anything above that threshold will be noticed by the listener.

This is where modern network analysis and diagnostic solutions come in. These tools give network engineers the ability to monitor and analyze all network traffic, including VoIP and other UC applications, for signs of network traffic issues. Armed with information about latency, throughput, and other network problems, IT teams have the power to resolve issues, maintain a QoS experience, mitigate poor performance caused by a competition for network bandwidth, and monitor compliance with established network policies and vendor SLAs.

It all starts with taking a proactive approach to UC application management. This involves being aware of the ways in which applications affect the network and other applications, but it also requires leveraging the full value of a network analysis solution to provide ongoing expert analysis of possible issues. Here are a few simple tips.

1. Understand your network's behavior

There are certain things an IT team needs to understand about the network's behavior, including its general health. The best way to assess this is to establish baselines of the existing infrastructure across the entire enterprise network. Knowing how the network behaves on a regular basis will prepare you to spot and deal with any issues that UC applications may have.

2. Beware of the three-headed beast: Jitter, Latency and Packet Loss

Jitter, latency, and packet loss are common, but they can cause havoc to UC applications on a converged network. This is where network visibility and analytics tools are invaluable as they alert the IT team to performance problems and enable proactive management of UC applications by adjusting configurations or adding extra capacity.

3. Monitor constantly

Monitoring UC applications includes a combination of metrics for general network performance and specific end-user quality of experience (QoE). Constant monitoring will validate QoS operations, reveal network traffic patterns that affect UC applications, and provide alerts whenever there's a drop in performance.

4. Zoom in on VoFi

VoFi is just another data type on your network, but using VoIP over wireless introduces the possibility of extra interference and other issues. Once the IT team has performed a scan of the 802.11 bands in use, 2.4GHz, 5GHz, etc., it's a good idea to isolate VoFi traffic for things like call quality, call volume (number of calls), and network utilization for VoFi versus all other data. If a more detailed analysis is needed, check the signaling for each call, including detail about any packet bounces.

You may also want to observe individual flows, since the packet paths between the caller and the callee can differ. Also check the quality of the voice transmission, including an analysis of latency, packet loss, jitter, and MOS and R-Factor voice quality metrics. If you're not sure how these metrics compare with “real world” quality, it helps to play back sections of a sample call to hear how it actually sounded.

5. Don't be afraid to tweak the network

Application traffic changes all the time. When you see issues crop up, don't be afraid to tweak the network to maintain levels of performance.

Although UC applications data is basically just another type of traffic on the network, ensuring that they work seamlessly can be a big challenge for IT teams. It's always best to start by testing the overall environment and the end user experience, and from there you can gradually drill down into specific problem areas to find a resolve the issues. Being proactive about network health will absolutely result in fewer problems down the line.

Chris Bloom is Senior Manager of Technical Alliances at Savvius
Share this

The Latest

March 19, 2024

If there's one thing we should tame in today's data-driven marketing landscape, this would be data debt, a silent menace threatening to undermine all the trust you've put in the data-driven decisions that guide your strategies. This blog aims to explore the true costs of data debt in marketing operations, offering four actionable strategies to mitigate them through enhanced marketing observability ...

March 18, 2024

Gartner has highlighted the top trends that will impact technology providers in 2024: Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider ...

March 15, 2024

In MEAN TIME TO INSIGHT Episode 4 - Part 1, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses artificial intelligence and network management ...

March 14, 2024

The integration and maintenance of AI-enabled Software as a Service (SaaS) applications have emerged as pivotal points in enterprise AI implementation strategies, offering both significant challenges and promising benefits. Despite the enthusiasm surrounding AI's potential impact, the reality of its implementation presents hurdles. Currently, over 90% of enterprises are grappling with limitations in integrating AI into their tech stack ...

March 13, 2024

In the intricate landscape of IT infrastructure, one critical component often relegated to the back burner is Active Directory (AD) forest recovery — an oversight with costly consequences ...

March 12, 2024

eBPF is a technology that allows users to run custom programs inside the Linux kernel, which changes the behavior of the kernel and makes execution up to 10x faster(link is external) and more efficient for key parts of what makes our computing lives work. That includes observability, networking and security ...

March 11, 2024

Data mesh, an increasingly important decentralized approach to data architecture and organizational design, focuses on treating data as a product, emphasizing domain-oriented data ownership, self-service tools and federated governance. The 2024 State of the Data Lakehouse report from Dremio presents evidence of the growing adoption of data mesh architectures in enterprises ... The report highlights that the drive towards data mesh is increasingly becoming a business strategy to enhance agility and speed in problem-solving and innovation ...

March 07, 2024
In this digital era, consumers prefer a seamless user experience, and here, the significance of performance testing cannot be overstated. Application performance testing is essential in ensuring that your software products, websites, or other related systems operate seamlessly under varying conditions. However, the cost of poor performance extends beyond technical glitches and slow load times; it can directly affect customer satisfaction and brand reputation. Understand the tangible and intangible consequences of poor application performance and how it can affect your business ...
March 06, 2024

Too much traffic can crash a website ... That stampede of traffic is even more horrifying when it's part of a malicious denial of service attack ... These attacks are becoming more common, more sophisticated and increasingly tied to ransomware-style demands. So it's no wonder that the threat of DDoS remains one of the many things that keep IT and marketing leaders up at night ...

March 05, 2024

Today, applications serve as the backbone of businesses, and therefore, ensuring optimal performance has never been more critical. This is where application performance monitoring (APM) emerges as an indispensable tool, empowering organizations to safeguard their applications proactively, match user expectations, and drive growth. But APM is not without its challenges. Choosing to implement APM is a path that's not easily realized, even if it offers great benefits. This blog deals with the potential hurdles that may manifest when you actualize your APM strategy in your IT application environment ...