Why UC Applications Still Cause Network Headaches (And How to Fix Them)
June 09, 2017

Chris Bloom

Share this

Unified Communications (UC) applications such as VoIP and Video streaming have been around in the enterprise setting now for almost two decades. It's rather remarkable, then, that for all of their business benefits and popularity, UC applications still post so many headaches for network engineers. With that in mind, are there steps that network engineers can and should be taking to make these applications more reliable, and deliver better quality of service to their users? I believe there are, so let's take a look at some tips.

Rather than being generated digitally, the origin of UC data is a fluid and continuous analog stream. For that reason, data from UC applications such as VoIP need to be managed in real time. Unfortunately, as digital files are transferred over any network, it's common for some of those packets to be dropped or to be delivered out of sync, resulting in poor sound quality, delays, static and sound gaps.

Email and document transfer applications generally cause far less obvious problems on the network thanks to TCP's built-in checks and acknowledgements, giving it the ability to resend and reorganize data into a perfect digital copy of the original. This isn't the case for UDP, which is a best-effort protocol often used by UC applications. Once a UDP packet has been sent, there is no mechanism to acknowledge or retransmit that packet if it gets delayed or corrupted due to latency, jitter or packet loss. VoIP technologies often employ tools such as DSP algorithms that compensate for up to 30 milliseconds of missing data, however anything above that threshold will be noticed by the listener.

This is where modern network analysis and diagnostic solutions come in. These tools give network engineers the ability to monitor and analyze all network traffic, including VoIP and other UC applications, for signs of network traffic issues. Armed with information about latency, throughput, and other network problems, IT teams have the power to resolve issues, maintain a QoS experience, mitigate poor performance caused by a competition for network bandwidth, and monitor compliance with established network policies and vendor SLAs.

It all starts with taking a proactive approach to UC application management. This involves being aware of the ways in which applications affect the network and other applications, but it also requires leveraging the full value of a network analysis solution to provide ongoing expert analysis of possible issues. Here are a few simple tips.

1. Understand your network's behavior

There are certain things an IT team needs to understand about the network's behavior, including its general health. The best way to assess this is to establish baselines of the existing infrastructure across the entire enterprise network. Knowing how the network behaves on a regular basis will prepare you to spot and deal with any issues that UC applications may have.

2. Beware of the three-headed beast: Jitter, Latency and Packet Loss

Jitter, latency, and packet loss are common, but they can cause havoc to UC applications on a converged network. This is where network visibility and analytics tools are invaluable as they alert the IT team to performance problems and enable proactive management of UC applications by adjusting configurations or adding extra capacity.

3. Monitor constantly

Monitoring UC applications includes a combination of metrics for general network performance and specific end-user quality of experience (QoE). Constant monitoring will validate QoS operations, reveal network traffic patterns that affect UC applications, and provide alerts whenever there's a drop in performance.

4. Zoom in on VoFi

VoFi is just another data type on your network, but using VoIP over wireless introduces the possibility of extra interference and other issues. Once the IT team has performed a scan of the 802.11 bands in use, 2.4GHz, 5GHz, etc., it's a good idea to isolate VoFi traffic for things like call quality, call volume (number of calls), and network utilization for VoFi versus all other data. If a more detailed analysis is needed, check the signaling for each call, including detail about any packet bounces.

You may also want to observe individual flows, since the packet paths between the caller and the callee can differ. Also check the quality of the voice transmission, including an analysis of latency, packet loss, jitter, and MOS and R-Factor voice quality metrics. If you're not sure how these metrics compare with “real world” quality, it helps to play back sections of a sample call to hear how it actually sounded.

5. Don't be afraid to tweak the network

Application traffic changes all the time. When you see issues crop up, don't be afraid to tweak the network to maintain levels of performance.

Although UC applications data is basically just another type of traffic on the network, ensuring that they work seamlessly can be a big challenge for IT teams. It's always best to start by testing the overall environment and the end user experience, and from there you can gradually drill down into specific problem areas to find a resolve the issues. Being proactive about network health will absolutely result in fewer problems down the line.

Chris Bloom is Senior Manager of Technical Alliances at Savvius
Share this

The Latest

July 19, 2018

According to a recent survey, critical IT incidents cost the average organization upwards of $6 million per year. This infographic outlines 4 easy steps to automate incident management, reducing downtime and costs to organizations ...

July 17, 2018

The essential value resulting from data-driven processes has become progressively linked with analytics. Once considered a desired complement to intuitive decision-making, analytics has developed into a main focus of mission-critical applications across industries for any number of use cases ...

July 16, 2018

The question of SaaS-based technology over the past decade has quickly changed from "should we?" to "how soon can we?" even for the most customized and regulated of industries. This macro move toward SaaS has also encouraged a series of IT "best practices" that have potential impacts on the employee digital experience, organizational risk and ultimately, productivity ...

July 11, 2018

Optimization means improving the performance of your human and technology resources while keeping a watchful eye. To accomplish this, we must have clear, crisp visibility into the metrics relevant to the delivery of workspace applications to your end users and to the devices – the endpoints – they use to be productive ...

July 09, 2018

As tech headlines flash across my email, the CMDB, and its federated equivalent, the CMS, are almost never mentioned. And yet when I do research, dialog with IT, or support our consulting team, the CMDB/CMS many times still remains paramount ...

June 28, 2018

Given the size and complexity of today's IT networks it can be almost impossible to detect just when and where a security breach or network failure might occur. It's critical, therefore, that businesses have complete visibility over their IT networks, and any applications and services that run on those networks, in order to protect their customers' information, assure uninterrupted service delivery and, of course, comply with the GDPR ...

June 27, 2018

A new breed of solution has been born that simultaneously provides the precision of packet-based analytics with the speed of flow-based monitoring (at a reasonable cost). Here are more reasons to use these new NPM/APM analytics solutions ...

June 26, 2018

A new breed of solution has been born that simultaneously provides the precision of packet-based analytics with the speed of flow-based monitoring (at a reasonable cost). Here are 6 reasons to use these new NPM/APM analytics solutions ...

June 21, 2018

There’s no doubt that digital innovations are transforming industries, and business leaders are left with little or no choice – either embrace digital processes or suffer the consequences and get left behind ...

June 20, 2018

Looking ahead to the rest of 2018 and beyond, it seems like many of the trends that shaped 2017 are set to continue, with the key difference being in how they evolve and shift as they become mainstream. Five key factors defining the progression of the digital transformation movement are ...