Cisco Cisco Unified IP Interactive Voice Response (IVR) 8.0(1) Release Note
7-11
Cisco Unified Contact Center Express Solution Reference Network Design
Chapter 7 Bandwidth, Security, and QoS Considerations
Security
Use
WAN (with IP Telephony QoS enabled). These numbers are derived from testing where an entire call
session to Cisco Unified CCX agents, including G.729 RTP streams, is sent across the WAN.
Approximately 30% of bandwidth is provisioned for voice. Voice drops are more of an issue when you
are running RTP in conjunction with Cisco Agent Desktop and other background traffic across the WAN.
These voice drops might occur with a specific number of agents at a certain link speed, and those
possible scenarios are denoted by the entry N/A (not applicable) in
session to Cisco Unified CCX agents, including G.729 RTP streams, is sent across the WAN.
Approximately 30% of bandwidth is provisioned for voice. Voice drops are more of an issue when you
are running RTP in conjunction with Cisco Agent Desktop and other background traffic across the WAN.
These voice drops might occur with a specific number of agents at a certain link speed, and those
possible scenarios are denoted by the entry N/A (not applicable) in
In remote agent deployments, QoS mechanisms should be used to optimize WAN bandwidth utilization.
Advanced queuing and scheduling techniques should be used in distribution and core areas as well. For
information on QoS traffic classification, see
Advanced queuing and scheduling techniques should be used in distribution and core areas as well. For
information on QoS traffic classification, see
. For
provisioning guidelines for centralized call processing deployments, refer the Cisco IP Telephony
Solution Reference Network Design documentation, available online at:
Solution Reference Network Design documentation, available online at:
.
Security
Security can be implemented on many levels. Applications security is clearly dependent upon security
implemented at the infrastructure level. For more details on security at the network infrastructure level,
refer the security design considerations in the Cisco IP Telephony Solution Reference Network Design
documentation, available online at
implemented at the infrastructure level. For more details on security at the network infrastructure level,
refer the security design considerations in the Cisco IP Telephony Solution Reference Network Design
documentation, available online at
Corporate Data Access
Aside from call routing, Cisco Unified CCX or Cisco Unified IP IVR scripts often process enterprise
data from existing corporate data stores such as a database or a corporate directory server for functions
such as account authorization and order status. Often, these data stores already exist and share data with
other enterprise applications.
data from existing corporate data stores such as a database or a corporate directory server for functions
such as account authorization and order status. Often, these data stores already exist and share data with
other enterprise applications.
shows an example of a network where voice and data
components reside in separate VLANs and are separated by a firewall.
Table 7-9
Remote Agents Supported by Cisco Unified CCX Across a WAN Link
Frame Relay
128 KB
256 KB
512 KB
768 KB
T1
G.729
3
7
15
25
38
G. 711
N/A
N/A
N/A
N/A
14