19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2 Campus <strong>QoS</strong> <strong>Design</strong><br />

Cisco IP Phones<br />

Version 3.3<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

<strong>QoS</strong> <strong>Design</strong> Overview<br />

One solution is to place a call to the networking help desk when the move is scheduled, so that the switch<br />

ports can be reconfigured to trust/untrust the endpoints as required. However, this approach dampens the<br />

mobility business advantage of IP telephony, since manual network administration is then be required to<br />

complete the move.<br />

Another solution is to have an intelligent exchange of information between the switch and the devices<br />

plugged into their ports. If the switch discovers a device that is trustworthy, then it can extend trust to it<br />

dynamically; if not, then not.<br />

Cisco IP Phones use the latter solution. In the current Cisco implementation, the intelligent exchange of<br />

information is performed using Cisco Discovery Protocol (CDP).<br />

Figure 2-6 shows a conditional trust boundary extension granted to an IP Phone that has passed a CDP<br />

exchange.<br />

Figure 2-6 Conditionally-Trusted Endpoint—Trust Boundary Extension and Operation<br />

4<br />

1<br />

“CoS 5 = DSCP 46”<br />

“CoS 3 = DSCP 24”<br />

“CoS 0 = DSCP 0”<br />

“I see you’re an IP phone.”<br />

So I will trust your CoS.”<br />

Phone VLAN = 110<br />

“Voice = 5, Signaling = 3”<br />

All PC traffic is reset to CoS 0.<br />

1 Switch and phone exchange CDP; trust boundary is extended to IP phone.<br />

2 Phone sets CoS to 5 for VoIP and to 3 for Call-Signaling traffic.<br />

3 Phone rewrites CoS from PC Port to 0.<br />

4<br />

Switch trusts CoS from phone and maps CoS DSCP for output queuing.<br />

The sequence shown in Figure 2-6 is the following:<br />

1. Switch and phone exchange CDP; trust boundary is extended to IP Phone.<br />

2. Phone sets CoS to 5 for VoIP and to 3 for call signaling traffic.<br />

3. Phone rewrites CoS from PC to 0.<br />

IP Phone<br />

TRUST BOUNDARY<br />

2<br />

3<br />

PC VLAN = 10<br />

PC sets CoS to 5 for all traffic.<br />

4. Switch trusts CoS from phone and maps CoS to DSCP for output queuing.<br />

CDP is a lightweight, proprietary protocol engineered to perform neighbor discovery. It was never<br />

intended as a security or authentication protocol. Therefore, to improve the security of conditional trust<br />

extension, the next generation of Cisco IP Telephony products will incorporate the use of advanced<br />

protocols to perform authentication.<br />

The following overview of some of the main IP Phones helps to explain their impact on access edge <strong>QoS</strong><br />

design.<br />

Cisco 7902G— The 7902G is an entry-level IP phone that addresses the voice¬communication<br />

needs of areas where only a minimal amount of features is required, such as lobbies, hallways, and<br />

break rooms. These phones probably would not be moved. The 7902G has only a single 10BASE-T<br />

Ethernet port on the back of the phone; therefore, there is no hardware support to connect a PC to it.<br />

2-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!