Hosted VoIP: Take the headache and heartache out of VoIP, Part 2
Part 2 of this series investigates the QoS and security issues of the hosted VoIP model.
PREVIOUSLY: Introduction to the headaches of hosted VoIP
The good news is that VoIP has been around for a number of years, so some of its major risks are well understood. The industry is constantly developing best practices and tools and techniques for protecting and controlling VoIP networks. For instance, the International Organisation for Standardisation offers ISO 17799, which provides recommendations for information security management, also provides a common basis for developing organisational security standards. Similarly, the International Telecommunications Union's X.805 standard, pioneered by Bell Labs, defines security architecture for systems providing end-to-end communications. And NRIC, the Network Reliability and Interoperability Council, provides best practices guidance in a number of areas that relate to VoIP operations.
While the tools to deal with security concerns and VoIP exist, the time it takes to implement them may be the harder part of the equation. Because the industry is constantly evolving, security issues may pull away hours and hours of resource time from already strapped IT staffs.
Even the creation of a best practices model for an individual company is a laborious process. Typically these includes both and internal review that involved detailed -- users, administrators, managers and other employees -- as well as the more traditional security equipment assessments to show potential technical security gaps. A well-devised security plan must be able to include these unforeseeable risks and minimise them - however finding the time can be the trickiest part. In a hosted environment much of this work, especially keeping current with new types of attacks and solutions, will already be addressed.
The second major issue that is also commonly overlooked or minimised in the zealous race to move to a VoIP network is QoS. While QoS has long been discussed in data circles, when an IP network is carrying voice traffic it becomes an even more critical element. Just as planning is a key aspect to controlling the potential security issues; planning and network design are the foundation to building a VoIP network that delivers upon quality expectations. A good network design methodology includes prioritisation, traffic engineering, a plan to handle voice in a converged network and a restoration process.
In addition administrators must put a call admission control (CAC) process in place. CAC allows the customers to properly design the network to carry the traffic load even at the busiest times while still meeting QoS objectives. This complex process can be managed, for the most part by using one of the following methods: per call bandwidth reservation, local measurement based management, path-based management and link-based management. A network needs to carefully consider each choice, because the wrong one can have a direct impact on total voice quality.
In a traditional circuit based network voice is given a dedicated bandwidth allotment so the quality is assured. In a packet environment a customer must either predict voice quality in a new VoIP deployment or assess voice quality in an existing network to ensure end user satisfaction. Both scenarios can be managed by using a well-designed modelling process. One way to accomplish this is to combine both subjective testing with objective testing models. The subjective category includes the e-model scale of user satisfaction categories (ITU G.109) that set definitive end values and give a Mean Opinion Score (MOS). The objective components then measures network impairments such as delays, packet loss and echo, and computes a total score. In the case of a brand-new network these models are then combined with a network performance prediction tool (NPPT) that takes into account network information, VoIP traffic demand patterns and a network performance prediction algorithm to deliver a VoIP voice quality prediction report.
In the case of an existing network the e-model testing is still used for a voice quality assessment portion, but it is combined with other assessment tools such as network discovery, network performance measurement, delay assessment plan, delay assessment and root-cause analysis to deliver a VoIP voice quality assessment report.
While the industry has a number of different approaches to QoS it is clear that voice quality is key to the ultimate success of a VoIP deployment. The planning and traffic prediction make or break the deployment. The use of a hosted environment where detailed planning was built into the network design and will continue to be upgraded and monitored as new technology emerges may make a significant difference in overall performance.
Given today's competitive operating environments, the benefits of the hosted model provide some compelling reasons to consider it as a viable option. These may include lower overall operating expenses, ability to provide enhanced security, improved network performance and ability to quickly rollout new services such as VoIP. This approach allows enterprises to focus on their own core network competencies and re-deploy staff to areas that make the most use of their expertise.
As VoIP and a wide variety of other broadband communications applications including unified messaging, security and mobile extension applications that can extend the functionality of the office phone system to a mobile environment, continue to emerge on the scene, the network landscape is dramatically changing. The continuous push to add new technology is tipping the scales in what was once a closely guarded possession for organisations -- network operation. When customers combine the cost-effectiveness and the ability to immediately offer new services the decision to outsource is becoming clearer every day to both the network operator and enterprise CIO.