Cisco BR1400 Deployment Manual page 17

1400 series
Hide thumbs Also See for BR1400:
Table of Contents

Advertisement

3.2.1 Voice over IP
Using the QoS feature, voice traffic can be prioritized by defining a policy and assigning that policy
to the VLAN carrying the voice traffic.
At this time, the 1400 series Bridge supports voice only in P2P links. Voice in a P2MP
configuration is limited and has not been fully tested yet, however; it will support some number of
simultaneous voice calls as it has the same QoS mechanisms as point to point networks. Keep in
mind, since there is no over the air QoS coordination between end points, it will not be as efficient
as point to point network. Voice in P2MP networks will be possible when PCF mode is
implemented down the line.
The maximum number of voice lines for P2P links in the table below. The number of voice calls
shown in the table has been taken along with the data traffic running in the network. Number of
voice lines has been calculated by setting a maximum jitter bound of 25 ms. This cannot be
guaranteed for 6 and 9 mbps rates. For P2P links supporting voice those rates needs to be
disabled or the voice quality will be poorer depending on the rest of the network architecture.
Rate (Mbps)
54
48
36
24
18
12
9
6
Maximum number of calls for P2P for G711 and G729 codec (jitter<25 ms)
Table 4.
3.3 Security
Security is a major part of any enterprise deployment and as such Cisco has spent quite a bit of
time on ensuring the security of not only the wireless links as a whole but also the Bridge itself.
Multiple types of security levels are available on 1400 Series Bridge.
Configuring your own SSID on the 1400 Bridges provides a rudimentary level of security. 1400
Bridge also provides different type of encryptions on the data going across the link, like Static
Wired Equivalent Privacy (WEP), Dynamic WEP using LEAP, TKIP (Temporal Key Integrity
Protocol) and MIC (Message Integrity Check). 1400 wireless bridge supports Cisco Wireless
Enhanced Authentication Protocol (LEAP). LEAP is a Cisco proprietary implementation
conforming to the IEEE 802.1x Draft Security Standard for port-based network access control.
LEAP authenticates the user and assigns a new WEP key every time a client associates or
Copyright © 2004 Cisco Systems, Inc. All rights reserved.
# Calls G.711
15
15
15
15
15
15
NO SUPPORT
NO SUPPORT
Page 17 of 53
# Calls G.729
44
44
44
44
44
44
NO SUPPORT
NO SUPPORT

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

1400 series

Table of Contents