Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Granada Project
UC Workshop DAY 1 & 2
Haroon Raees
Network Consulting Engineer (haraees@cisco.com)
Aug 14, 2012
Cisco Confidential
Agenda Day 1
Introductions
Analysis of Current and Future Deployment
Synergy with IP LAN/WAN Infra
UC on UCS Architecture
CUCM Design Guidelines
AD Integration
CUCM General Applications
Unified Messaging
Q&A
Cisco Confidential
Agenda Day 2
MeetingPlace and WebEx Solution
Cisco Unified Presence
Desktop Client Deployment Guidelines
WiFi Softclient Deployment Guidelines
Q&A
Cisco Confidential
Introductions
Cisco Team
Haroon Raees (UC NCE and Design Lead)
Diaa Hussein (PM)
Abdulrahman Al Moaiqel
SBM Team
Hani Al Taher (Project Lead)
Hussam Alhamarsheh (UC Project Engineer)
Ahmed AL-Qadoumi
Mohamed Khair
SEC Team
Meshal Al-Fouwnais
Cisco Confidential
Workshop Objectives
Brief introduction of relevant IPT/UC Technology
Requirement discovery and design session for IPT/UC solution
The output of the workshop will be the input for the IPT/UC LLD
To understand SEC Granada project IPT/UC requirements
To understand more about the SEC existing voice setup
Round table discussion on the design and architecture options
proposed
Cisco Confidential
Cisco Confidential
UC
Endpoints
Attendant
Console on
CUC
Extension
Mobility and
Other IPT
Native Srvs
UC
Services
CUP
Customer
Care
UC Processing
Agents
CUC
UC on UCS
LDAP
Directory
PSTN/IP
Gateway
&
Media
Resources
XML Ph
Srvs
(Novatek)
The
ht
Colured/Highlig
e
ar
ed items
included in SEC
Granada BoQ
UC Infrastructure
Gateway/
Survivable
Remote
Comms
Endpoints
PSTN
Meeting
Place
Xcode
IP WAN
Campus
Access
Switch
Distribution/
Core Switch
WAN
Aggregation
Router
Branch
Router
Access
Switch
Branch
Network Infrastructure
Cisco Confidential
Cisco Confidential
Applications
(Vmail, MP)
PSTN
Unified CM
Cluster 1
Unified CM
Cluster 1
IP WAN
Jedddah
Riyadh HQ
Single Unified CM Cluster, Full or partial distributed
Applications
(Vmail, CUP, MP)
Unified CM
Cluster 1
Mega Cluster
Transparent use of PSTN if IP WAN unavailable
Centralized Publisher with local call processing
2012 Cisco and/or its affiliates. All rights reserved.
SEC Granada
Cisco Confidential
Deployment Models
STM Links
Mobily Link
SEC Granada
Riyadh HQ
Single point of administration, feature transparency (e.g. Extension Mobility), unified dial plan
SEC will have a dedicated link for VoIP and UC traffic between HQ and Granada
Maximum 80-ms round-trip delay between any two Unified CM across the WAN
Min of 1.544 Mbps for ICCS signaling for each 10,000 BHCA between sites
Min of 1.544 Mbps for database and other inter-server traffic for every subscriber server remote to Pub
Cisco Confidential
10
Cisco Confidential
11
Campus UC Networks:
Hierarchical
Network
Design
Without a Rock Solid Foundation the Rest Doesnt Matter
Access/Distribution/Core hierarchyeach layer has specific
Access
Distribution
Core
Distribution
role
For SEC similar routing and switching approach has been
followed
Modular scalable topologybuilding blocks
Easy to grow, understand, and troubleshoot
Creates small fault domainsclear demarcations and
isolation
Promotes load balancing and redundancy
Promotes deterministic traffic patterns
Incorporates balance of both Layer 2 and Layer 3
technology, leveraging the strength of both
Utilizes Layer 3 Routing for load balancing, fast
convergence, scalability, and control
Sub-second convergence possible
Si
Si
Si
Si
Si
Si
Access
2012 Cisco and/or its affiliates. All rights reserved.
Building Block
Cisco Confidential
12
Campus UC Networks:
The Access Layer
UC Feature Rich EnvironmentNot Just About Connectivity
To Core
Si
Si
Distribution
Access
The Access Layer provides aggregation for Voice, Video and Data endpoints
Can provide switched or routed accessis typically feature rich
13
UC Campus Networks:
The Access Layer
Voice and Data VLANs
Voice VLAN ID = 110
802.1Q Encapsulation
with 802.1p Layer 2
CoS
Data VLAN ID = 10
Native VLANNo
Configuration Changes
Needed on PC
Separate Voice and Data VLANs create partitioned broadcast domains in separate IP
subnets. Phone VLANs to not span multiple switches.
Cisco Discovery Protocol (CDP) will be used during Phone boot up to configure Voice
VLAN ID so it will be enabled on Access Ethernet Switches
For Securitydifferent network policies can be applied for different subnets; e.g. WORM
attacks can be contained to the Data VLANs
CDP allows the switch to discover the attached inline powered device and negotiate the
power requirements to optimize power consumption in the switch
Shall Ethernet ports on switches be reserved for voice and Data? YES or NO?
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
14
switches
Voice VLAN shall have presence in one and only one access
layer switch
This practice eliminates topological loops at Layer 2 avoiding
temporary flow interruptions due to Spanning Tree convergence.
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
15
Access
Distribution
Core
WAN Aggregators
1
2
Si
Trust Boundary
For scalability, classification should be done as close to the edge
as possible
The outermost trusted devices represent the trust boundary
Optimal Trust Boundary: Trusted Endpoint
be Agreed with LAN
1 A device is trusted if it correctly classifies packets To
Team
2
3
Cisco Confidential
16
Smooth
Benign
Drop sensitive
Delay sensitive
UDP priority
Video-Conf
Bursty
Greedy
Drop sensitive
Delay sensitive
UDP priority
Data
Smooth/bursty
Benign/greedy
Drop insensitive
Delay insensitive
TCP retransmits
Cisco Confidential
17
PSTN
SRST
Router
IP WAN
Campus
2012 Cisco and/or its affiliates. All rights reserved.
Branch Office
Cisco Confidential
18
L3 Classification
L2
IPP
PHB
DSCP
CoS
Routing
CS6
48
Voice
EF
46
Video Conferencing
AF41
34
Streaming Video
CS4
32
Mission-Critical Data
AF31*
26
Call Signaling
CS3*
24
Transactional Data
AF21
18
Network Management
CS2
16
Bulk Data
AF11
10
Scavenger
CS1
Best Effort
Cisco Confidential
19
network
avoid transcoding of Codecs
Cisco Confidential
20
Cisco Confidential
21
Create separate SSID for Voice over WLAN, controlled by the Wireless Controller
Cisco Confidential
22
UC on UCS Architecture
Cisco Confidential
23
UC Application
UC Application
UC Application
Cisco Confidential
24
VMs
Cisco Confidential
25
Virtualized UC Architecture
Note: Local Storage will
be used
UCS C210 M2 VCD3
(Shared Apps)
Virtual UC Apps
Hypervisor
UCS CXXX
Management:
- UCS Manager
- vSphere/vCenter
PSTN/
PTT
Nexus
Nexus
LAN
Rest of
Intranet
Cisco Confidential
26
VMware Virtualization
Cisco Confidential
27
Cisco Confidential
28
UC on VMware ESXi
Why ESXi Only?
Appliance Model
Performance
Secure
Cisco Confidential
29
VMware Management
vSphere Client
vSphere Client
2
1
vCenter Server
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
30
Product
Users
vCPU
RAM
vDisk
vNIC
CUCM 8.5
7,500
6 GB
2 x 80 GB
1 vNIC
Ucxn 8.5
5,000
4 GB
2 x 200 GB
1 vNIC
CUP 8.5
2,500
4 GB
1 x 80 GB
1 vNIC
- do -
- do -
MeetingPlace
8.5
Dedicated
- do UCS Server
Cisco Confidential
31
Core2
TFTP-2
Core3
Core4
CPU-2
CUP-1
Core5
Core6
Leave
idle for
UCxn
Core1
UCXN-1
(5K)
Core2
Core3
Core4
Core5
Core6
Core5
Core6
Core2
SUB-5
Core3
Core4
CPU-2
CUP-1
Core5
Core6
Leave
idle for
UCxn
Core1
UCXN-2
(5K)
Core2
Core3
Core4
CUCM VM OVAs
RES CUCM VM OVAs
Messaging VM OVAs
Cisco Unified Presence
VM OVAs
Cisco Confidential
32
Configuration example:
Use 2 GE ports from the Motherboard and 2 GE ports from the PCIe card for the VM traffic. Configure them with NIC
teaming
Use 2 GE ports from the PCIe card for ESXi Management
CIMC
VM Traffic
ESXi
Management
MGMT
Cisco Confidential
33
Upstream switch
Port Channel
Etherchannel / vPC
No Port Channel /
No vPC
No Etherchannel
Cisco Confidential
34
34
EtherChannel
EtherChannel
EtherChannel
EtherChannel
vPC Peerlink
vPC
vmnic0
vmnic1
vmnic2
PC
vmnic3
vSwitch
vSwitch
vmnic0
vmnic1
PC
vmnic2
vmnic3
vSwitch1
vSwitch1
vSwitch2
vSwitch2
vNIC
1
vNIC
2
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004048
http://www.cisco.com/application/pdf/en/us/guest/netsol/ns304/c649/ccmigration_09186a00807a15d0.pdf
http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9402/white_paper_c11-623265.html
Cisco Confidential
35
35
CIMC
Pt
LOM
Pt-1
Nexus
BC NIC Pt4
BC NIC Pt2&3
Nexus
Cisco Confidential
36
PSTN/
SIP
Nexus
Nexus
Cisco Confidential
37
Cisco Confidential
38
Cisco Confidential
39
Offhook
Dialed Digits
Alerting (Ringback)
Connect Media
Unified CM
g
e
L
)
g
ng
in
i
l
R
a
t( k
n
r
ia
g
e
Al hoo ed
Si
f
M
Media
(RTP Stream)
f
O ect
nn
o
C
IP Phone B
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
40
Offhook
Dialed Digits
Alerting (Ringback)
Connect Media
Unified CM
Cluster
ICCS
(OLC)
na
g
i
S
Media
(RTP Stream)
g3
e
L
g
g)
lin
Rin
(
)
rt
LC
Ale ook
O
(
ia
fh
f
d
O Me
t
ec
n
n
Co
IP Phone B
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
41
IP Phone A
Leg 1
Unified CM
Media
IP WAN
Sign
alin
g Leg
IP Phone B
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
42
Unified CM
Cluster
ICCS
Signaling Leg 1
IP WAN
Signaling Leg 2
Media
(RTP Stream)
IP Phone A
2012 Cisco and/or its affiliates. All rights reserved.
IP Phone B
Cisco Confidential
43
Deployment Models
SEC Granada
Voice Mail
Distance
Riyadh HQ
Single point of administration, feature transparency (e.g. Extension Mobility), unified dial plan
SEC will have a dedicated link for VoIP and UC traffic between HQ and Granada
Maximum 80-ms round-trip delay between any two Unified CM across the WAN
Min of 1.544 Mbps for ICCS signaling for each 10,000 BHCA between sites
Min of 1.544 Mbps for database and other inter-server traffic for every subscriber server remote to Pub
Cisco Confidential
44
Configure two CUCM servers per site for load balancing and redundancy
Best Practices
Configure Unified CM groups and device pools to allow devices within the site to register
Under a WAN failure condition, sites without access to the publisher database will lose some
functionality. For example, system administration at the remote site will not be able to add,
modify, or delete any part of the configuration. However, users can continue to access the
user-facing Features
Under WAN failure conditions, calls made to phone numbers that are not currently
communicating with the subscriber placing the call, will result in either a fast-busy tone or a
call forward (possibly to voicemail or to a destination configured under Call Forward
Unregistered)
Cisco Confidential
45
DSP Resources
Conferencing
DSP Resources
Transcoding
Conf
Xcode
Cisco Unity
Vmail Server
d
e
l
i
a
F
Intra-Cluster
Communications
(ICCS)
Unified CM Subscriber
JTAPI
IP-IVR
IP Phones
Active
Unified CM Server
Directory Services
Music on Hold
Software Conferencing
Software MTP
TFTP
Call Processing
CTI/QBE I/F
SCCP I/F
MGCP I/F
H.323 I/F
SIP I/F
Directory Services
Music on Hold
Software Conferencing
Software MTP
TFTP
Call Processing
CTI/QBE I/F
SCCP I/F
MGCP I/F
H.323 I/F
SIP I/F
Cisco Confidential
46
Backu
p
Bac k u
Prim
Phone Set 1
To 7,500 IP Phones
phones/server
ary
To 15,000 IP Phones
Publisher and
TFTP Server(s)
1 to 3750: Primary
3751 to 7500: Backup
Publisher and
TFTP Server(s)
1
3750
7501
11,250
3751
7500
11,251
15,000
To 30,000 IP Phones
Publisher and
TFTP Server(s)
1
3750
3751 to
7500
7501
11,250
11,251
15,000
15,001
18,250
18,251
22,500
22,501
26,250
26,251
30,000
Cisco Confidential
47
Publisher Database
(All Data Writable)
DB Replication
DB
DB
DB
DB
DB
Message Waiting
Indicator (MWI)
Privacy Enable/Disable
Device Mobility
Cisco Confidential
48
Unified CM Cluster
loss of connectivity to
Unified CM
No Services (e.g. hold,
Signaling
Traffic
Lin
re
u
l
ai
F
k
Signaling
Traffic
phones re-register to
backup Unified CM
Media
SCCP IP Phone
SIP IP Phone
Cisco Confidential
49
Cisco Confidential
50
Core routing
Cisco Confidential
51
Dialing
Different types of dialed number (destinations)
Cisco Confidential
52
Dialing Habits
For every type of number we need to define the format to be used for these
numbers
Enterprise dial plans at least need to define how to get an outside line to dial
externally
Site access code and site codes shall be defined for all sites
PBXs will have site-codes as well
Between CUCM and PABX of same city and entity, calls shall be routed
based on 5 digits without using site codes. But sites codes for all PBXs
shall be defined
Applications
Directories
Cisco Confidential
53
Call
Routing
Simple
Future Expansion
Cisco
Network
Legal
Digit
Analysis
Factors:
How to
Implement
Cost
Class of Service
Other Vendors
Cisco Confidential
54
Operator Code
HelpDesk Code
Cisco Confidential
55
Cisco Confidential
56
Cisco Confidential
57
LDAP Directories
DirSync
DirSync Tool
Tool Pulls
Pulls Main
Main
User
User Attributes
Attributes from
from
Directory
Directory into
into DB
DB
User
User Passwords
Passwords Are
Are
Not
Not Synced
Synced
DirSync
DB
LDAP(S)
Authentication
Corporate
Directory
User
Lookup
IMS
(Microsoft AD,
Netscape/iPlanet)
Cisco Unified
CM Server
WWW
Authentication
TP
HT
PS
T
HT
User
Lookup
Directories
Button
IP Phone
Cisco Confidential
58
LDAP Directories
IMS
IMS Can
Can Be
Be
Configured
Configured to
to
Authenticate
Authenticate All
All
End-Users
End-Users Against
Against
Corporate
Corporate Directory
Directory
DirSync
DB
Corporate
Directory
Authentication
(Microsoft AD,
Netscape/iPlanet)
IMS
User
Lookup
Cisco Unified
CM 7.X Server
WWW
Authentication
TP
HT
PS
T
HT
User
Lookup
Directories
Button
IP Phone
Cisco Confidential
59
database
If Publisher is unreachable, the CDRs and CMRs are stored on the
FTP/SFTP.
Solution also allows third-party applications to retrieve CDR/CMR files on
Cisco Confidential
60
Cisco Confidential
61
Extension Mobility
Functionality
Device Profile
6279
662796
62798
Home
Sue Mobile
Cisco Confidential
62
Call Rings
Remote Destination
408 555-7890
Enterprise
Call to Remote
Destination
408 555-7890
Routed via
Gateway
408 555-7890
PSTN
Gateway
Cisco Unified
CM Cluster
Remote
Destination:
408 555-7890
PSTN
Call Placed to
Associated Remote
Destination
408 555-7890
1
Dials: 1 408 555-1234
Phone A
2
Remote
Destination
Profile
Call Extended
to Desk Phone
Mobile Users
Enterprise DN
Call Extended to
Remote Destination
Profile
Shared Line
Call to mobile users Enterprise directory number rings at desk phone and
Remote Destination phone:
Cisco Confidential
63
3 PSTN
Gateway
5551234
MobileConnect On
jsmith
408 555-7890
PSTN
DN: 408 555-1234
Phone A
Enterprise
Mobile Connect
Call Answered
and in Progress
at Desk Phone
Desk Pone
Pickup
Mobile Connect
Call Answered and
in Progress at
Remote Destination
PSTN
Gateway
408 555-7890
PSTN
3
Phone A
Call Continues
Uninterrupted
Between Caller
and Desk Phone
Enterprise
Cisco Confidential
64
Media Resources
Conference Bridge
IVR
Transcoding
DSPs needed to transcode multiple CODEC types (e.g., G.711 to
G.729)
Cisco
Unified
CM
Cluster
Music
on Hold
Music on Hold
Transcoder
MTP
Xcode
MTP
Conference
Bridge
Conf
PSTN
IP WAN
...
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
65
UnifIED MESSAGING
Cisco Confidential
66
Cisco Confidential
67
Cisco Confidential
68
Cisco Confidential
69
Cisco Personal
Communications Assistant
IP Phone with
VisualVoicemail
Cisco Unified CM
Exchange
2003/2007
LDAP
2012 Cisco and/or its affiliates. All rights reserved.
Outlook
With ViewMail
Cisco Confidential
71
Cisco clients will still have complete access to voice messages if any
or all of Microsoft Exchange infrastructure is down
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
72
2000/2003/2008
Active/Active Cluster
Server Pair
not supported
Active Directory
2008
Stand-alone Server
agreement
Active Directory
2000/2003
Cisco Confidential
73
Unity Connection
Active/Active
Cluster
Exchange Client
Access Server
Bandwidth/Latency TBD
CUCM
Cluster CoW
HQ
Granada Site
Cisco Confidential
74
Cisco Confidential
75
would have voice ports registered to the local Unified CM subscriber server(s)
In a purely distributed messaging implementation with clustering over the WAN,
each site in the cluster would have its own Cisco Unity messaging server with
messaging infrastructure components
In the event of a WAN failure in this model, all remote sites that use centralized
appropriate region and location by means of calling search spaces and device
pools configured on the Unified CM server
In addition, to associate telephony users with a specific group of voicemail ports,
Cisco Confidential
76
Cisco Confidential
77
Unity Assistant
replacement
coming (9.0)
Based on HTML
v5.0
Uses REST-
Cisco Confidential
78
9971
9951
8961
Unity Connection 8.5 also supports the Visual Voicemail 7.x
midlet for older phone models
Cisco Confidential
79
Cisco Confidential
80
Cisco Confidential
81
Cisco Confidential
82
WebEx Scheduling
Architecture
meetings
Supported
or MCS (optional)
MeetingPlace Scheduling
(Currently used in SEC)
Audio Only
Supports Audio/Video only
No WebEx required
Single System Supported
meetings
Support for Ad-Hoc meetings using
Reservationless meetings
Support for Ad-Hoc meetings using
Cisco Confidential
83
Cisco Confidential
84
Cisco Firewall
Primary Meeting Director
MP A/V
Node
MP A/V
Node
MP A/V
Node
MP A/V
Node
MP A/V
Node
MP A/V
Node
Global Cisco IP Telephony Network (Global PSTN Call-In Numbers for MP, Internal Call-Routing)
Eastern MP
Users
2012 Cisco and/or its affiliates. All rights reserved.
Western MP
Users
Cisco Confidential
85
Webex Cloud
Webex Client
Guest Users
Productivity Tools
User Database
Federated SSO
Permissions
Site Admin
Express
OR
Media Server(s)
Hardware
Media Server(s)
MP Meeting
Director (MD)
WebEx Scheduling Model Required
Dual MDs provide active redundancy
TSP Proxy to WebEx
Meetings Broker Director
Events Aggregator
User Sync
Linux/Informix DB
Co-resident with MP App Server
(Smaller deployments up to 4 Nodes)
MP Webex Node
for MCS/ASR
Optional
On premises Internal Webex
Meeting attendees attend here
(Data only)
Multiple nodes active load
balancing and redundancy
Linux OS (no DB)
ASR web and/or HQ Video
mixing
Cisco Confidential
86
settings:
Cisco Confidential
87
Step 1: Decide on how many Conferencing nodes and associated sites are required? This
Step 2: Decide which nodes will be the Meeting Director nodes. Ideally MD Nodes will be
Step 3: Decide how to combine the sites into regions based on data centers deployed in
customer enterprise.
recommended)
For 2-4 nodes you will usually have two combined Meeting Directors with Conferencing nodes
For larger systems you should have two Meeting Director-only nodes and up to 14 conferencing
nodes.
Meeting Director nodes are the first two nodes deployed in the system automatically
It is recommended the Meeting Director Nodes are Regional Master Nodes.
Meeting Director nodes should be located at the most reliable network data center locations.
Cisco Confidential
88
Server Type
Voice
Video
Hardware Media
Server
Max 2000 audio
ports
Codecs: G.711,
G.729ab, G.722, iLBC (166
ports/blade)
Echo Cancellation (128 ms max)
Automatic Gain Control (AGC)
In-band (Voice band) DTMF
detection
sRTP Encryption
Codecs: G.711u/a,
G.729a/G.722 (reduced capacity)
sRTP in 8.5.2 (reduced capacity)
Line Echo Cancellation (reduced
capacity)
Video (reduced capacity)
sRTP Encryption
No iLBC
Automatic Gain Control (Now
Supported)
HMS
Software Media
Server
Max 1200 audio
ports G.711
EMS
Cisco Confidential
89
Cisco Confidential
90
USA Node #1
1.
2.
3.
4.
5.
6.
7.
EMEA Node #1
Cisco Confidential
91
Cisco Confidential
92
Cisco Confidential
93
Cisco Confidential
94
Cisco Confidential
95
Features Summary
Scheduled Conference Single Meeting ID for Webex/Audio
Personal MeetingPlace Conference (Reservationless)
Audio Only Profiles for WebEx with MP Audio
Simplified Set-Up for WebEx
Dual Audio Vendor Support
WebEx Attendee ID Support for dial-in Audio conferences
Support for (+) Dialing
Simplified Setup for WebEx
Dialing changes or Customization of VUI menus
Audio Prompts for Recordings
Cisco Confidential
96
Cisco Confidential
97
Cisco Confidential
98
Email Notification
Cisco Confidential
99
WBS27 FR26+
Host Profiles determine which Audio is used
Default set by System Administrator per user
Add new MP Audio / Video Nodes for increased capacity quickly from MP
Administration
Remove MP Audio / Video Nodes for maintenance without any system down-time
Cisco Confidential
100
Cisco Confidential
101
Cisco Confidential
102
Note: Previous versions of MP could manage user profiles directly from MP or via
directory synchronization (a.k.a MP Owned profiles) are still supported.
Cisco Confidential
103
profiles
Common fields used by MP managed from WebEx
(user/first/last name, host id, email, password, profile id/number, PIN, language, time zone, user
type, status)
Profile id/num assigned automatically unless customer manages profiles via API.
Preferred site managed from MP (Only need to change in special cases.)
Audio/video parameters managed from MP (Rarely need to change)
Cisco Confidential
104
Cisco Confidential
105
Primary to Secondary Meeting Director failover time is 1 minute (Recommended less than 200 ms
RTT)
With 300 ms Round Trip time between the A/V Conferencing Nodes and MD, the Primary to
Secondary Meeting Director failover time is 3 minutes
With increase in network latency, adding a new node will take more time to complete
In the case where adding a node exceeds 30 minutes, the operation will timeout
Meeting Director to Cisco WebEx cloud must be able to establish connections outbound TCP 443
only to the Internet (only SOCKS proxy is supported)
Bandwidth for TSP API and user profile synchronization is minimal
Cisco WebEx Node for ASR or MCS must be able to establish connections outbound TCP 443 only
to the Internet (No web proxy supported)
Bandwidth is dependent on the total number of external meetings with data sharing in progress
Internal Meetings do not have any bandwidth impact to the Cisco WebEx collaboration cloud.
Cisco Confidential
106
4 Mbps minimum bandwidth for the WAN link between any two nodes. Nodes can
be standalone Meeting Director Nodes or Conferencing Nodes
Cisco Confidential
107
High Capacity (G.711) Conference node at full capacity requires 150 Mbps for RTP
Calculate actual SIP traffic for estimated peak calls per Conferencing Node
Size 1200 G.711 total SIP calls on UC Manager (75 % additional load from MP
Conferencing Node via SIP refer)
Cisco Confidential
108
Cisco Confidential
112
Cisco Confidential
113
Cisco Confidential
114
Microsoft
Exchange
MeetingPlace/
MeetingPlace
Express
Cisco Unity/Unity
Connection
Carriers /
other vendors
PBXs
IBM Lotus
Sametime
Cisco
WebEx
Jabber
GoogleTalk
Cisco Unified
Presence 8.5
Microsoft
LCS/OCS
XMPP
WebDAV
LDAP
SIP/SIMPLE
CTI/QBE
CSTA over SIP
SCCP
H.323
IMAP
SOAP
HTTP/HTTPS
JTAPI
Unified CM 8.x
LDAPv3
Third Party
XMPP
Client
Unified Personal
Communicator 8.0
Unified Personal
Communicator 7.x
Cisco Confidential
115
CUMA
Unified Personal
Communicator 7.x
Unified Mobility
Advantage 7.x
Cisco
Agent
Desktop
Expert
Advisor
Unified Application
Environment
SIP Interface
Unified CM
Sync Agents
AXL/SOAP
Unified CM
Microsoft
Exchange
Calendar
Third Party Open API
ICM
SIP/SIMPLE
SIP Proxy
future
SIP/SIMPLE
Presence Engine /
Instant Message Bridge
XMPP
XCP Route Fabric
Unified Personal
Communicator 8.x
Third Party XMPP Client
(Spark, Adium, Pidgin,
MomentIM, etc)
XMPP
ICM
Expert
Advisor future
Cisco
Agent
Desktop
Third Party
Compliance
Server
Instant Messaging
Compliance and
Logging
Jabber XCP
XDB
ODBC
PostgreSQL
Cisco Confidential
116
1A
2A
1B
2b
ODBC
Sub-cluster 1
Sub-cluster 2
PostgreSQL
Cisco
Unified CM
8.5
SIP Trunk
AXL/SOAP
CTI/QBE
Intercluster Peer
IDS Global User Data
Cisco Confidential
117
LDAP
Sync
Cisco Unified
Communications
Manager Cluster
Publisher
Database Sync
Subscriber
at
io
Replication
io
at
lic
lic
Re
p
p
Re
n
io
Subscriber
at
lic
Subscriber
p
Re
Publisher
Cisco Unified
Presence Cluster
Subscriber
Cisco Confidential
118
Inter-Domain
Federation
Cisco Confidential
119
Cisco Confidential
120
DMZ
Adaptive
Security
Appliance
Unified
CM
Access
Proxy
Microsoft
Office Communications
Server 2007
Internet
Unified
Presence 8.5
Microsoft Office
Communicator
Unified Personal
Unified Personal
Communicator 7.x Communicator 8.5
Domain A
SIP/SIMPLE
XMPP
Intercluster Peer
2012 Cisco and/or its affiliates. All rights reserved.
Domain B
Cisco Confidential
121
DMZ
Unified
CM
Unified
Presence 8.5
Unified Personal
Unified Personal
Communicator 7.x Communicator 8.5
Domain A
SIP/SIMPLE
XMPP
Intercluster Peer
2012 Cisco and/or its affiliates. All rights reserved.
Internet
IBM Lotus Sametime
Connect Clients
Adaptive
Security
Appliance
Unified
Presence 8.5
Domain B
Cisco Confidential
122
Cisco Confidential
123
Cisco
Cisco Webex Unified Personal
Communicator
Connect
Cisco UC
Integration
for Microsoft
Cisco UC
Integration
for RTX
Cisco
Quad Phone
Developer &
Integrator SDK
Cisco Unified
Infrastructure
Services
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
124
Cisco Confidential
125
Version
8.0
Cisco Confidential
126
Version
8.5
Cisco Confidential
127
Version
8.5
1A
Primary
Node
Automatic Failover
XMPP
1B
SOAP
Backup
Node
Cisco Confidential
128
Version
8.5
Scheduling
(Authenticating)
Joining
Authenticating
Meeting
Room
Get a chat
message
with link
Cascading
Meeting
Room
Click to
join
Click to
join
Meeting
Room
Meeting
Room
Get a chat
message
with link
Cisco Confidential
129
Version
8.5
Cisco Confidential
130
d in
e
t
r
o
p
p
u
S
( 3)
0
.
8
C
P
U
C
132
d in
Supporte
( 3)
CUPC 8.0
133
Cisco
Unified
Presence
135
MS Office
Integration
Enhanced
Directory
Integration
CUP Auto
Discovery
DHTML
Extensibility
IM/Presence
Group Chat
Persistent Chat
Directory Integration
Audio/Call Control
Deskphone Mode
Visual Voicemail
Web Escalation
CUP HA Support
720p
HD/Deskphone
Video
File
Transfer
Predictive Search
in Personal
Contacts &
Directory
New CSF
Libraries
Cisco Confidential
136
Basic IM &
Presence
Basic Audio &
Video
Audio & Video Conferencing
Visual Voicemail
Web Conferencing
Advance IM & Presence
Cisco Confidential
137
PC & MAC
Smart Phones
Cisco Confidential
138
All-in-one UC Application
Presence & IM
Voice, Video, voice messaging
Desktop sharing, conferencing
Cisco Confidential
139
Cisco Confidential
140
TelePresence into
Jabber for Windows
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
141
Dedicated Client
for TelePresence-only
All-in-one UC Client
Cisco UC Customer
Cisco Confidential
142
Ciscojabbervideo.com
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
143
Add collaboration to
this well
Requires full client install
(headless) to do voice,
video
www.jabberrdeveloper.com
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
144
Cisco Confidential
145
Version
8.0
Cisco Confidential
146
New enhanced
conversation control
pane
New pane design
Drag Icon integrated into
panel styling, drop
target is now full icon
pane
Cisco Confidential
147
Cisco Confidential
148
Version
8.5(1)
In Desk phone mode the audio will be through the Desk phone and the
Video will be displayed on the PC
Only possible if PC is tethered to the 89/99xx phone. Server Health
screen will show CAST connected as well as CTI connected
Video will only ever appear on one device :
If the 89/99xx phone has its own camera attached then it will refuse the CAST
connection and Video will be displayed on the phone
Otherwise Video will be displayed on the PC
Cisco Confidential
149
Word Excel
PowerPoint Outlook
Cisco Confidential
150
Cisco Confidential
151
Version
8.5(1)
Login sequence
Following Communicator
login, Integration login
process automatically initiated
Cisco Confidential
152
Cisco Cius
Cisco Confidential
154
Cisco Confidential
155
Video Out
Virtual
Desktop
Virtual
Desktop
on Cius
Display Port
USB/BT
Cisco Cius
Keyboard/
Mouse
Cisco Confidential
156
Cisco Unified
Communications
UC Manager
(Manageability)
Unity Connection
Lifelike
Video
Meeting
Center
Cisco Jabber IM
Cisco Quad
Cisco Show and Share
Instant
Messaging
Virtual
Teaming
Video
Creation
and Access
Cisco Confidential
157
Location
WiFi based
GPS
Input
On-screen QWERTY KB
Capacitive multi-touch
Cameras
Front (720p 30 fps HD video)
Rear (5 Megapixel, 720p)
Audio
AAC-LD, AAC-LC, HE-AAC,
MP3, WAV, G.711, G.722,
G.729, iSAC, iLB
Built-in Stereo Speaker System
Microphone
Video
H.264/AVC 720p 30fps
Adobe Flash video
Sensors
Accelerometer
Ambient light sensor
Battery
Replaceable
Cisco Confidential
158
RF Excellence
Roaming
Fast re-authentication
with CCKM
L2 enhancements for
faster roaming and
extending battery life
Security
Power Management
EAP-FAST (WPA2)
Management Frame
Protection (802.11w)
AnyConnect 3.0, Identity
Services Engine Support
Unscheduled Automatic
Power Save Delivery
Dynamic Transmit Power
Control
Cisco Confidential
159
In order to determine if VoWLAN can be deployed, the environment must be evaluated to ensure the
following items meet Cisco guidelines.
Signal
The cell edge should be designed to -67 dBm where there is a 20-30% overlap of adjacent access points at that
signal level.
This ensures that the Cisco Cius always has adequate signal and can hold a signal for at least 5 seconds in order
to roam seamlessly.
Channel Utilization
Channel Utilization levels should be kept under 50%.
If using the Cisco Cius, this is provided via the QoS Basic Service Set (QBSS), which equates to around 105.
Noise
Noise levels should not exceed -92 dBm, which allows for a Signal to Noise Ratio (SNR) of 25 dB where a -67
dBm signal should be maintained.
Packet Loss / Delay
Per voice guidelines, packet loss should not exceed 1% packet loss, otherwise voice quality can be degraded
significantly.
Jitter should be kept at a minimal (< 100 ms)
Retries
802.11 retransmissions should be less than 20%.
Multipath
Multipath should be kept to a minimal as this can create nulls and reduce signal levels.
Cisco Confidential
160
Cisco CM Configuration
Wireless LAN can be configured on an enterprise phone, common
phone profile or individual phone configuration level.
In the enterprise phone configuration menu, WLAN can be configured
to override common settings.
Cisco Confidential
161
Cisco Confidential
162
Use the following guidelines which are outlined in our deployment guides when configuring the access point:
Enable Clean Air for Cisco Aironet 3500 Series access points
Disable P2P (Peer to Peer) Blocking Action / Public Secure Packet Forwarding (PSPF)
Ensure Aggressive Load Balancing in the Controller configuration or Client Load Balancing in the
WLAN configuration are disabled
Note: The WLAN Controller configuration should be validated by using the WLC config analyzer.
https://supportforums.cisco.com/docs/DOC-1373
Cisco Confidential
163
Traffic Type
DSCP
802.1p
WMM
Voice
EF (46)
Video
AF41 (34)
Call Control
CS3 (24)
Cisco Confidential
164
WLAN Profiles
The Wireless LAN configuration must be done locally at the
connection.
Configure the following information when enabling a network
profile:
Network SSID
Security
Open, WPA/WPA2 PSK, 802.1x EAP
Frequency Band
Auto, 2.4 GHz, 5 GHz (Auto gives preference to the strongest signal)
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
165
Accessories
HD media station
3 USB ports
3.5-mm headset jack
10/100/1000-Gbps switch ports for wired
connections and Power over Ethernet (PoE)
Additional speaker for wideband hands-free
communications
DisplayPort to connect to a larger display for
an immersive video experience and for a
virtualized desktop experience
Two handset options: standard and slimline
Charging dock
Elegant charging dock to recharge the
replaceable battery
Carrying case
Provides LCD protection while transporting the
Cisco Cius business tablet
Cisco Confidential
166
Q&A
Cisco Confidential
167
BAckUP SLides
Cisco Confidential
168