Modeling your network topology
The first step towards configuring IBM® Sametime® Bandwidth Manager is to model your network topology. By understanding your network, and the locations that are connected on the network, you can identify the bandwidth bottlenecks where bandwidth constraints are wanted. In this way, you can plan the sites and links that will enable you to place constraints on bandwidth use.
About this task
- A site represents a physical location on the corporate network, defined by a set of IP ranges. A site can represent an office location, a building, a campus, or even an entire city. The Bandwidth Manager uses the IP ranges defined for each site to associate endpoints with the site where they are located. This method assumes that IP ranges are unique within the enterprise's network.
- The dedicated line between the two sites is modeled as a direct link between these sites. Each link is uniquely defined by the two sites it connects.
Bandwidth management for unmanaged calls
Sametime endpoints can call a SIP endpoint not registered with the Sametime SIP Registrar. Such calls are referred to as "unmanaged calls" or calls to "unmanaged endpoints".
- Whether to allow such calls to proceed even if they exceed bandwidth capacity or have no route during ICE re-INVITE.
- The bandwidth allocation to apply to such calls
Allowing such calls to proceed also affects NAT-traversed calls, even if they are "managed calls" in that initial IP addresses are found for both endpoints.
Bandwidth usage is configured for combinations of sites and links. Modeling your network topology helps you gain a clear overview of the sites on your network, so you can configure the allowable bandwidth and call routing values for the audio and video traffic that passes between them.
Procedure
To optimize bandwidth management, you must understand your organization's network and usage needs. For best results, model your network and settings on paper before you attempt to configure them in the Bandwidth Manager, by completing the following steps:
What to do next
Once you have a visual model of your network components plus a clear understanding of the call rates in effect and the different classes of user, you are ready to begin deployment.