Professional Documents
Culture Documents
SAP BUSINESS
COMMUNICATIONS
MANAGEMENT SOFTWARE
(SAP BCM)
© SAP AG
©SAP AG 2007
© Copyright 2012 SAP AG. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express
permission of SAP AG. The information contained herein may be changed without prior notice.
Some software products marketed by SAP AG and its distributors contain proprietary software components of
other software vendors.
Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of
Adobe Systems Incorporated in the United States and/or other countries.
Innovaphone, IP3000 and IP6000 are registered trademarks of innovaphone AG.
Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or
registered trademarks of Citrix Systems, Inc.
Hewlett-Packard is a registered trademark of Hewlett-Packard Company. (Hewlett-Packard®)
HP is a registered trademark of Hewlett-Packard Company. (HP®)
HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®, World Wide Web
Consortium, Massachusetts Institute of Technology
IBM, DB2, DB2 Universal Database, OS/2, Parallel Sysplex, MVS/ESA, AIX, S/390, AS/400, OS/390,
OS/400, iSeries, pSeries, xSeries, zSeries, z/OS, AFP, Intelligent Miner, WebSphere, Netfinity, Tivoli,
Informix, i5/OS, POWER, POWER5, OpenPower and PowerPC are trademarks or registered trademarks of
IBM Corporation.
Audiocodes and Mediant are trademarks or registered trademarks of Audiocodes Limited.
Java is a registered trademark of Sun Microsystems, Inc.
JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented
and implemented by Netscape.
MaxDB is a trademark of MySQL AB, Sweden.
Microsoft, Windows, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation.
Oracle is a registered trademark of Oracle Corporation.
SNMPc, is a trademark of Castle Rock Computing.
UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.
SAP, R/3, mySAP, mySAP.com, xApps, xApp, SAP NetWeaver, and other SAP products and services
mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in
Germany and in several other countries all over the world. All other product and service names mentioned are
the trademarks of their respective companies. Data contained in this document serves informational purposes
only. National product specifications may vary.
These materials are subject to change without notice. These materials are provided by SAP AG and its
affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any
kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only
warranties for SAP Group products and services are those that are set forth in the express warranty statements
accompanying such products and services, if any. Nothing herein should be construed as constituting an
additional warranty.
CONTENTS
5 Gateways 36
5.1 Distributing gateways 36
5.2 Connecting to a PBX 37
5.3 Miscellaneous settings 38
5.4 Cisco gateways 39
7 Customer LAN 50
7.1 Availability 50
7.2 Ability to carry voice 50
8 Storage systems 52
8.1 RAID arrays 52
8.2 SAN systems 53
10 User terminals 57
10.1 CDT 57
10.2 IP Desk Phones 57
11 Security 59
11.1 Network traffic control 59
11.2 Identification, authentication and authorization 59
11.3 Signed software modules 59
11.4 Encrypted network traffic 59
14 Sizing 64
16 Glossary 67
4
INTRODUCTION TO SAP BCM INFRASTRUCTURE
Manage phone calls, emails, short messages and web contacts in a single, software-based solution.
Utilize a full range of communication devices such as soft phones on PC desktops, IP desk phones and
mobile phones.
Connect mobile and globally scattered workforce.
Manage distributed know-how and utilize the right people with the right skills from front-office agents to
back-office specialists.
Smooth migration, security, reliability and scalability upon deployment.
SAP BCM infrastructure is everything needed to run the SAP BCM software, such as servers, networks,
gateways and terminals. An enterprise can set up a SAP BCM in-house system or a service provider can offer
SAP BCM functionality to end customers. In-house and service provider setups are basically similar and the
main differences are due to service providers striving towards multitenant and/or multi-instance setups to
achieve cost efficiency and simultaneously facing a variety of and sometimes even contradictory end user
requirements. While an in-house system does not logically differ from a hosted service entity providing the
same service, an in-house system may be considered more stable in terms of various software and hardware
updates. This puts harder requirements on operations and manageability for service providers who, on top of
this, have their own requirements on for example scalability, security and total cost of ownership (TCO).
CMC
PSTN/PLMN subscribers
IP over
GPRS/EDGE/3G
PSTN
Internet
PLMN
PRI
- Electrical and mechanical adaptation
-ISDN Q.931 to/from SIP or H.323
GATEWAY conversion (signalation)
- 64 kbit/s PCM to/from G.711
conversion (audio stream) BCM
Server
(CS)
100/1000Base-T Ethernet
IP v4
Client
BCM & IIS SIP / IP desk
SQL CDT terminals
Server phone
Server
5
INTRODUCTION TO SAP BCM INFRASTRUCTURE
Figure 1 shows a basic SAP BCM in-house landscape in which a voice over IP (VoIP-) gateway is connected to
the telephone network over a 2 Mbit/s PRI line. The gateway adapts the protocols and characteristics on the
PSTN side to those used on the local area network (LAN) side. The PRI line is provided by a telco and a
telephone number range is normally included with the subscription. The gateway and the LAN is setup and
maintained by the Enterprise. Communication Mobile Client (CMC), the mobile client of SAP BCM, gains
access over IP over GPRS/EDGE/3G through a SAP BCM Connection Server in a demilitarized zone (DMZ). In
this simplified landscape illustrating the principles, the SAP BCM Server contains any required SAP BCM
modules and integration interfaces whereas the SQL Server contains operational and reporting databases.
Real setups might contain separate SQL Servers for operational and reporting purposes and SAP BCM
components might be distributed over two or more servers depending on performance, administrative, security
etc. conditions.
PSTN
Internet
PLMN
BCM
Server
SQL (CEM, CD, MsgToMail, BCM & IIS
Server MsgToSMS, MsgCleaner, Server
PDC, HAC, AS, IA, VUA) (CS, MRS,
HBR, SBR, ETC, UIMS,
Integration Interfaces)
Service link
WAN
Access link
SIP / IP/
phone
100/1000Base-T Ethernet
IP v4
Client
CDT terminals
6
INTRODUCTION TO SAP BCM INFRASTRUCTURE
Figure 2 shows a basic SAP BCM service provider landscape. The service provider could equally well be an
external commercial service provider or an internal corporate department providing the service to other
departments. It contains the same SAP BCM components as the in-house landscape. Terminals and users
reside in an enterprise network connected to a service provider network over a wide area network (WAN)
connection. Multitenant and/or multi-instance setups are key issues for a service provider to achieve acceptable
TCO. To be able to run several customers securely on a shared infrastructure, the service provider network is
compartmentalized into an inside network and an access network. Direct customer access is restricted to SAP
BCM components in the access network only on an as-needed basis and SAP BCM components in the access
network are granted access to resources in the inside network on an as-needed basis. The multitenant and/or
multi-instance architecture allows for several customers to share common service provider equipment and
resources, such as servers and networks, facilitating service provider efficiency and competitiveness on the
market.
Chapter 2, Site landscapes and connectivity covers this topic in more detail.
Some environmental and facility requirements are dictated by server and network equipment manufacturers
and are based on requirements from semiconductor and component manufacturers. Required operating
conditions such as temperature and humidity must be matched and power must be supplied for the services to
run. Available options are for example measures for power failures, alternate call routing and supplying power
for emergency calls.
Some requirements may arise from legislation, corporate security policies and risk management. These may
include administrative roles, passage control and site locations. Environmental and facility requirements should
only partly be considered technical IT issues because they are also business strategy issues and dealing with
them is company and service provider individual.
Chapter 3, Environmental and facility recommendations, covers this topic in more detail.
Deciding the needed server setup requires investigation in and awareness of for example estimated capacity
demands in terms simultaneous phone calls, number of users and customers. Affecting factors may have very
different importance in different setups. Some factors might be relatively static for enterprises providing the
services internally and some might be even unforeseeable for service providers. Especially service providers
should consider their estimated growth speed, scaling strategy and intended service level agreements (SLA).
An in-house system might consist of a couple of entry-level servers whereas a service provider might run
clustered SQL databases, distribute SAP BCM components over several servers, provide failover nodes for
each and benefit from fault-tolerant LAN’s and fault-tolerant high performance storage area networks (SAN).
Supported operating systems are English versions of Windows Server 2003 and Windows Server 2003 R2,
both referred to as Windows 2003 in this context, and 32 and 64 bit Windows Server 2008. Supported editions
are Standard and Enterprise. SAP BCM is a 32-bit software. Microsoft SQL runs on 64-bit systems as well.
Datacenter and Itanium editions are not supported.
7
INTRODUCTION TO SAP BCM INFRASTRUCTURE
For supported and recommended hardware, operating systems and software see appendix A, SAP BCM
infrastructure compatibility list (ICL).
Chapter 4, Server hardware, operating systems and software covers this topic in more detail.
DHCP, TFTP
TELNET Q.931
HTTP Q.921
VoIP GATEWAY
SIP, H.323 64 kbit/s PCM
G.711, G.729 56 kbit/s PCM
........
Figure 3. Gateways provide electrical and mechanical adaptation between PSTN and IP/Ethernet networks and
perform protocol and voice stream translation.
SAP BCM supported gateways are available with support for E1, T1 and J1 PRI lines to the PSTN. E1 lines are
used in Europe, T1 in America and J1 in Japan.
One E1 line may be channelized into 32 DS0 channels, one of which is used for synchronization, one as the D-
channel (signaling channel) and 30 as bearer channels for voice streams (phone calls). One T1 or J1 line may
be channelized into 24 DS0 channels, one of which is used as the D-channel.
Gateways are connected to IP networks with 10/100 Base-T Ethernet links. Gateways are controlled by SAP
BCM using the protocols SIP or H.323. Gateways typically support at least dynamic host configuration protocol
DHCP for IP address provisioning, trivial file transfer protocol (TFTP) for configuration provisioning and Telnet
for configuration. Most gateways also provide a web interface for administration and configuration.
Gateways may be distributed geographically for example over different telco areas or to different satellite sites
of a service provider or customer. This allows local calls to satellite sites and enables cost optimization by
routing calls over IP to the most profitable gateway. Distribution of gateways may thus influence telephony
costs and may also have positive impact on failure resistance and data line bandwidth demands. Gateways
may also be connected to private branch exchanges (PBX) over PRI enabling calls between legacy telephony
systems and VoIP systems. In fact, interconnecting the two systems is a commonly used method allowing for
flexible migration phases.
High service availability and manageability are crucial for a service provider. Among many other things, service
supply and underlying infrastructure have to be carefully designed to meet market demands. Growth strategies
8
INTRODUCTION TO SAP BCM INFRASTRUCTURE
have to be prepared and risk mapping must be done. Various problem scenarios are covered by building fault
tolerance and automatic or manual failover mechanisms. Nevertheless, a service provider providing numerous
customers’ with business critical communications services is encouraged to prepare for the unexpected and
narrow down the impacts of service supply failures. This can be done for example by segmenting the
production environment into more or less self-sufficient production units constricting the impacts of a failure of
one production unit from other production units. To be self-sufficient, a unit would include all layers from the
bottom of the infrastructure all the way to the service interface towards the customer. It is an ongoing task of
growth, risk and business management to decide how many production units to run, how to design them and
when to start new ones. Figure 4 shows one approach of segmenting the data center LAN.
Customer A Customer E
Service Service
realization realization
BCM/IIS BCM/IIS
MGMT BCM
BCM/IIS SERVER SERVER(S) BCM/IIS
AD
SERVER(S)
SQL BCM
CLUSTER SERVER(S)
BCM/IIS BCM/IIS
BCM/IIS BCM/IIS
Access
Medium Network Network Core Network
Figure 4. A sample segmentation model of data center LAN. The middlemost area constitutes a fault-tolerant
core network all services depend on. The next orbit is a medium network for purposes of separating the core
network from the outermost access network, where the services are made available for the customers. The
green and red areas, service realizations, describe the required portion to produce a service for a customer.
The landscape conforms to the basic service provider landscape shown in figure 1, except for the missing CMC
option.
9
INTRODUCTION TO SAP BCM INFRASTRUCTURE
office or via WAN/MAN links interconnecting the offices to a common access link or via any combination of
these.
10
INTRODUCTION TO SAP BCM INFRASTRUCTURE
WAN WAN
Access links
Site 3 Site 3
LAN LAN
Client Client
Enterprise Enterprise
Network Network
Figure 6. A multi-site customer LAN with one Figure 7. A multi-site customer LAN with one
access link per site. common access link.
Figure 6 shows a landscape of a customer with three sites, each connected directly to the SAP BCM service
provider. External telephony is routed over the access links. Internal telephony may be routed over the access
links or links interconnecting the sites. Back-up connectivity may be provided over the links interconnecting the
sites.
Figure 7 shows a landscape of a customer with three sites sharing a common access link to the SAP BCM
service provider. Links interconnecting the sites must be dimensioned for carrying the telephony traffic and
back-up routes and/or access links should be considered.
Sorting out the most suitable approach for each case involves investigating the current enterprise network
topology and its fault tolerance, finding out user concentrations and estimating the bandwidth demand on
different parts of the network. Also, existing traffic profiles and regular and casual peak loads should be
considered especially on interconnecting links, which often are slower than the site LANs. Quality of service
(QoS) controls may be applied to the interconnecting links and sometimes to the site LANs as well.
In general, there are three factors deteriorating voice quality in a network point of view. They are too long one-
way delay, packet loss and jitter. One way delay problems suggest network design problems and that
fundamental incompatibility exist between the current network implementation and the demand of carrying
quality voice over it. For example, it could be a too slow link over a too long distance without even theoretical
ability to achieve demanded performance.
Packet loss or extensive number of retransmissions and cyclic redundancy check (CRC) errors implies
hardware or configuration problems, such as speed or duplex mismatches, poor connectors, damaged or poorly
mounted cabling or exceeded environmental conditions. These two problem types, too long one-way delay and
packet loss, including retransmissions and CRC errors, are remedied by one time actions. Once the root cause
is identified, the problem is solvable permanently. Drops can be monitored in many ways, for example routers
and switches usually have drop counters. Too long one-way delay is immediately recognized by overlapping
speakers. Delays can be estimated from the round trip shown by ping.
Jitter is variation of one-way delay and is compensated to a limited extent by jitter buffers on gateways and
terminals. A constant stream of digitized voice data must be supplied to an AD converter in order to get
constant analog sound. If the digitized voice stream is interrupted or delayed, there will be an outage on the
analog sound deteriorating the voice quality. Jitter problems can be remedied by applying QoS controls and
revising network topologies to minimize congestions.
11
INTRODUCTION TO SAP BCM INFRASTRUCTURE
SAP BCM allows for setups with redundant servers. This means there are preconfigured up-to-date failover
servers available in case of server crashes. These, kind of disposable, servers should not contain any user
data, such as recorded files, voicemails or attachments. Neither should they contain any usage data that is not
afforded to be lost in case of a server crash.
All failover events are not invisible to users and securing server storage improves reliability and eases system
maintenance. This can be done using fault-tolerant disk configurations such as
- RAID-1
- RAID-5
- RAID-10
Some data must be made available for all servers sharing a common role, such as SQL servers and file
servers. For example if a SQL Server cluster node fails, a back-up node must be able to mount the storage and
access the database. Clustered server packages with integrated disk arrays constitute one possibility to fulfill
this requirement. Another possibility is to use Storage Area Networks (SANs).
SANs provide centralized storage capacity to distributed servers in such a way that the storage seems to be
locally attached in the operating systems point of view. Servers can be booted from SANs so SANs makes it
possible to use diskless servers, in the sense that no disks are installed physically in the server.
This approach allows servers to be easily replaceable “dummy” electronics boards that are ever less
individualized or designated for any specific task, potentially giving more flexibility in production operations,
upgrades and scaling tasks. SANs provide high performance disk I/O. Servers are connected to the SANs with
Fibre Channel links or Ethernet links. In the former case the server requires a host bus adaptor (HBA).
SANs introduce a potential for regarding different life spans for servers and storage. Although a SAN system is
scalable itself and there are different classes of SANs, a SAN system is one of the biggest single investments in
a SAN-based SAP BCM infrastructure. Whilst being that, a longer life span should be considered for a SAN
than for a server as perfectly intact servers grow old as operating systems and applications evolve.
Telephony connections refer to E1/T1/J1 PRI links carrying phone calls between gateways and the PSTN. SAP
BCM does not directly require any special technology for data links as long as sufficient IP performance is
provided and the same applies to the telephony links as long as the gateways they are connected to provide
SIP or H.323 over IP on the network side.
SAP BCM supported gateways support ISDN PRI E1/T1/J1 telephony links. Telephony links are provided by a
telco and telephone number ranges are allocated to each link or group of links. Gateways, and thus telephony
12
INTRODUCTION TO SAP BCM INFRASTRUCTURE
links, may be concentrated in a data center or distributed to customer premises, branch offices or other points
of presence. For availability purposes, telephony links may also be distributed over two or more telephone
exchanges or sometimes even over two or more telcos.
Access and service links are required in service provider cases only. For a service provider, it is often
reasonable to build a high-density service link to one or more ISPs and have them provide the access links to
the customers. If telephony links are centralized in the data center, all SAP BCM related traffic will pass over
the service and access links. If gateways are distributed to customer locations, a relevant part of the voice
streams may exist only inside the customer LAN and thus access link bandwidth demand may decrease.
Deciding the capacity and the customer side endpoint of the access link involves estimation of the maximum
number of simultaneous calls and call density estimations per locations in order to find the most suitable
endpoint location. Minimizing the network distance between the endpoint and the call density center allows for
maximum average call quality expectations.
Chapter 9, Telephony and data connections, covers this topic in more detail.
Communication Desktop (CDT) is the SAP BCM Microsoft IE browser based soft phone including numerous
features such as directories and PRS (presence) profile management. A handset or headset is used with CDT.
The handset/headset connects to a USB port of a PC either directly or via an adaptor performing the analog-to-
digital (A/D) transformation. The BCM Outlook phone is an alternative for CDT with suppressed functionality.
Supported IP desk phones are SIP phones. IP desk phones are voice stream and signaling information
endpoints and they are quite independent units resembling legacy telephone terminals. They do not provide the
advanced features of CDT.
Mobile SAP BCM terminals are Nokia or Ericsson cellular phones running SAP CMC. SAP CMC provides
directory services, PRS management and call control to mobile users. The SIP functionality on some Nokia
phones enables to connect them to SAP BCM as SIP terminals over a wireless LAN.
In general, security aspects are present in several different levels and viewpoints. The primary concern of a
service provider might be to ensure the availability and integrity of the data center, that is, their business and
the services provided to customers, whereas the concerns of the customer might be availability and
confidentiality. Although the slightly different security viewpoints affect the security issue, overall security must
be considered and both service provider and customer demands must be met.
When the service is provided by a service provider and utilized by an end user, it is obvious that security roles
and responsibilities are divided to both parts. From the network landscape it can be observed that the data
connection between the data center and the service provider poses a potential threat from the service provider
to the customer and vice versa.
Important security mechanisms are access lists, traffic filtering and virtual LAN (VLAN) segmentation. Figure 8
gives an overview of protocols used by SAP BCM. Signed soft phone and mobile terminal components assure
the integrity and the manufacturer of the components. Server side authentication is achieved by certificates
from trusted certificate authorities.
13
INTRODUCTION TO SAP BCM INFRASTRUCTURE
CDT http(s)
RTP
WACP ODBC
CDT SQL
RTP
RTP
WACP
CEM&CD
RTP
CDT
H.323
H.323 Bridge
PSTN
Interactions and attitudes of individuals can devastate even the best systems or make the worst possible
systems appear excellent. Therefore, it is important to understand existing fault tolerance and its entities,
mutual impacts between systems and/or their components and to undertake working methods to support
aspired service levels. High availability is not reachable with technical measures alone.
Enabling switchover operations due to maintenance task and/or failures requires that the ability to produce a
service exists in two or more places. The ability to produce a service includes CPU power, storage,
configuration data and network connectivity and so on. Making this ability generally available for all services
requires good management of SAP BCM infrastructure, awareness of available resources, awareness of the
committed service levels, proactive approaches in developing the infrastructure, engagement in undistorted
14
INTRODUCTION TO SAP BCM INFRASTRUCTURE
working methods and continuous testing. The idea of using only switchovers and not fallbacks is an important
part of testing. Switchover moves the source of the service in question from one entity to another and thus tests
the entities.
Adapting the switchover mechanism to version updates can result in that live production entities are never
updated. Arranging for a group of at least three similar service entities, one being active and two being standby,
enables to apply an update and to test it with minimal downtime. The update is applied to one of the standby
entities to which cannot be switched over to during the update. The other standby entity is there in case of a
failure of the active entity during the update.
When the update is applied, the entity can be tested, even by the customer, and when it is approved, a
switchover is performed to the updated entity. One of the remaining entities needs to be updated as well to
provide an equal version switchover entity or if it unacceptable to switchover from the updated version to the
previous version, an updated service entity must be arranged for in advance. Eventually, the old entities and
related resources are freed and available for other updates.
The described updating and maintenance practice allows for the actual updates and maintenance tasks being
performed during normal office hours without having to adapt to maintenance windows and strict time frames.
The update experienced by the user is only a rapid switchover.
SAP BCM provides management tools only for the application, such as:
- System Configurator
Management tools for the infrastructure are provided by each device manufacturer or some third party provider.
These tools include Telnet and/or browser-based device configuration and server management tools, such as
HP server management tools, simple network management protocol (SNMP) agents by hardware
manufacturers and SNMP management software.
High availability includes also ensuring quality voice in the customer LAN by implementing QoS. This protects
against voice quality impairments due to heavy network bandwidth consumption which may be caused by new
or improperly configured software or increased usage of existing software.
Chapter 12, Availability and manageability, covers this topic in more detail.
- Schedules
- Queues
- Prompts
When call volumes and server and agent locations are recognized, the network topology is decided. This
includes deciding the number of PRI lines, number of gateways and their locations and when this is done, the
15
INTRODUCTION TO SAP BCM INFRASTRUCTURE
number of required access links and their capacities can be decided. Also high availability requirements affect
the designing phase in terms of volume, number of access and telephony lines and number of servers used.
One important decision is whether to provide full or partial capacity in a failure situation. Full capacity means
that for some resources, double capacity is at hand when operating normally. These are crucial steps that might
have undesired impact if they are poorly designed and/or implemented.
Deployment also includes decisions on what terminals and accessories to use, such as the type of handsets
and/or headsets to be used with CDT and deciding the type of IP desk phones and to purchase these.
Once the above steps are completed, access lists can be designed. Typically, there is a firewall, router or layer
3 switch providing access control between the users and the servers. The particular access control
configuration depends on the used IP address ranges, the terminal and gateway models and the used
protocols.
The SAP BCM related client software is needed mainly by CDT. These are ActiveX components available as
msi files. The SAP BCM ActiveX components are signed by Wicom Communications Oy to convince the user of
their trustworthiness. These components can be distributed in any way suitable, e.g. using Microsoft systems
management server (SMS) or by installing copying them manually to each workstation. All CDT configurations
are done within CDT or via SAP BCM Management utilities by an administrator. IE, local firewall and so on
configurations are done with the respective software.
IP desk phone configurations are done manually using the keypad or (semi)automatically using DHCP, TFTP,
Telnet and/or browser-based administration tools. The facilities vary slightly between different manufacturers.
So far the soft phone is clearly the dominating terminal and IP desk phone configurations have mostly been
made manually using the keyboard of the phone and/or using a browser.
Chapter 13, Deployment, software distribution and configuration, covers this topic in more detail.
The resource requirements of different SAP BCM components and the capacity they provide are discussed
here, for example a SIP bridge (SBR) can handle a maximum of 700 simultaneous SIP calls. Sizing does not
take count in capacity requirements for high availability solutions, it tells only what is required and achieved by
a single component or device. Spare and failover capacity has to be considered separately.
Scaling goes closely along with sizing and is covered as well. Especially for a service provider it is crucial to
consider scaling from the very beginning and to design the system accordingly in order to maximize cost
efficiency and prepare for future increases.
Since the current hardware development is rapid it would be easy to believe that hardware investments made in
advance are not profitable. However, over time hardware does not constitute the most expensive portion of the
business and standardizing might increase working efficiency and thus give savings in labor costs.
Designing a SAP BCM infrastructure that has high availability and is scalable should start with recognizing
some goals and margins, such as estimated total volumes in terms of:
- Customers
- End users
- Data lines
- Telephony lines
16
INTRODUCTION TO SAP BCM INFRASTRUCTURE
Particularly important is also to estimate the life cycle of the SAP BCM technical infrastructure, for example a
storage system may serve significantly longer than a server that might become outdated in three years.
Sizing rules are not always so simple and unambiguous because the usage pattern may vary a lot from case to
case depending on for example the implemented integrations channels. Especially e-mail channels and
channels that are converted into e-mail channels, such as web channels, may deal with numerous attachments
of various sizes that consume storage and network capacity.
To throw some light on sizing as number of servers, there are implemented systems with one Microsoft SQL
Server (cluster) and two SAP BCM servers perfectly dealing with up to 660 simultaneous calls and there are
systems where additional three servers have been installed as SIP and/or H.323 bridges dealing with 2000
simultaneous calls. Factors such as higher redundancy demands and backup sites may require additional
servers to be installed.
Usually the most expensive servers are high end, SAN attached and clustered Microsoft SQL servers and SAP
BCM application servers are more affordable.
17
ENVIRONMANTAL AND FACILITY RECOMMENDATIONS
The specific behavior and functionality of any SAP BCM system is determined by the set of modules used and
their configurations. Any specific module is responsible for a logical set of functionality, for example if there is a
demand for sending and/or receiving SMS messages, the SMSToMail module is needed.
Channels refer to communications channels used to communicate externally and/or internally such as
telephony, fax and email.
Virtual units are used for administrative grouping of services. In a multitenant environment, where several
customers are served by the same hardware, virtual units are assigned customer specific resources such as IP-
addresses, directories and other settings.
Federation bridges enable two or more organizations to constitute a VoIP society where VoIP calls can traverse
from one to the other without passing through the PSTN.
2.1 Modules
A SAP BCM module is discrete product module run as a process. Modules are run in some virtual units context,
which typically contains its own resources such as IP-addresses, log file directories and configuration data.
CDT (Communications desktop) is the SAP BCM soft phone and the primary graphical user interface.
CMC, Communication Mobile Client is a UI for mobile phones running on Symbian platforms.
Communication Toolbar for MS Outlook (CT Outlook) is a plug-in to Microsoft Outlook providing
basic telephony functionality and one way calendar event feed from Microsoft Outlook to SAP BCM.
Infrastructure Administrator (IA) is for controlling and monitoring SAP BCM software, for example
managing services, platforms, virtual units, web sites and viewing technical logs.
System Configurator GUI is for managing call switching and stream protocols, Queues, Services and
SAP BCM Administrator accounts.
Alarm Server (AS), receives XML and/or HTTP alarms from any applications and filters and converts
them to SMS, email and/or SNMP alarms/messages and forwards them to desired targets.
Call Dispatcher is for call routing, switching and control.
Chat Portal Server provides a Chat Portal Interface for integrating third party chat servers.
Chat Server manages chat discussions between participants.
Connection Server (CS) provides a secure TCP tunnel between clients and servers.
18
ENVIRONMANTAL AND FACILITY RECOMMENDATIONS
Contact Event Manager (CEM) is the core module of SAP BCM managing for example contact
requests, queues and contacts event auditing.
Data Collector collects event data from various sources and stores them along with some pre-
calculated aggregates into various databases.
External Terminal Controller (ETC) poses IP desk phones as CDT phones towards CEM.
File Replication Service (FRS) performs file replication between local/remote directories.
H.323 Bridge, (HBR) handles initiating, receiving, and controlling calls to/from H.323 gateways. It also
contains an H.323 registrar. It performs protocol translation from H.323 to SAP BCM protocols and vice
versa.
High Availability Controller (HAC) is for monitoring and controlling software processes and
performing failover operations.
Media Routing Server (MRS) is for handling audio and video streams to and from other modules or
components.
Message to Mail (MsgToMail) sends e-mail messages from SAP BCM using SMTP (simple mail
transfer protocol).
Monitoring Database stores and provides current statistics information.
Reporting Database stores and provides reporting information.
SAP CIC Adapter enables usage of SAP BCM contact center solutions as an integrated part of the
SAP myCRM solution.
SIP Bridge, (SBR) handles initiating, receiving, and controlling calls to/from SIP gateways and IP desk
phones. It also contains a SIP registrar and performs protocol translation from SIP to SAP BCM
protocols and vice versa.
SMS Engine sends and receives SMS messages between GSM network’s Short Message Service
Centers and the CEM database.
SMS to Mail (SMSToMail) converts received SMS messages into email messages.
WebClient is an IIS extension module providing a scripting language for generating HTML and XML
documents from data in databases and various HTML or XML templates.
- Voice (telephony)
- E-mail
- Chat
- Web
- SMS
19
ENVIRONMANTAL AND FACILITY RECOMMENDATIONS
- Fax
Communications events from each channel are received and routed by SAP BCM according to predefined
rules, such as timetables, queues and skills.
The naming convention of virtual units is free, but specially in service provider setups it is worth creating a
naming convention suitable for supporting daily operations and maintenance. Logical and consistent naming
convention eases recognition and thus decreases the risk of human errors.
A grouping of services and processes to virtual units based on their functionality and access requirements is
recommended.
20
ENVIRONMANTAL AND FACILITY RECOMMENDATIONS
INTERNET
- CMC CUSTOMER NETWORK
- CDT - VU_X
DMZ - Communication Toolbar MRS
- VUA - Outbound Desktop FRS
- VU_DMZ - Communication Task Management SBR
Internet Chat Client - IP Desk Phones HBR
CS_n
Figure 9 shows a sample VU configuration. VU and module names ending with “_n” can typically have more
than one active instance and n is used to number those instances. It is recommendable to name the first
instance as VU_1 or module_1, although future instances seem unlikely, because it makes it simpler to keep
the naming convention later, if more instances are added after all.
The VUs in picture 9 can be further split into smaller VUs as follows:
- VU_WEB_USER can be split into 2 VUs each containing Web Server and one of the other modules.
- VU_INT can be split into 2 VUs each containing Web Server and one of the other modules.
- VU_INTERNAL_n can be split into 2 VUs each containing Web Server and one of the other modules.
21
ENVIRONMANTAL AND FACILITY RECOMMENDATIONS
- Local gateways in the customer network are used (SBR and/or HBR).
- Local gateways retrieve prompts from local servers (MRS and/or FRS).
Configuring VU_X also requires to setup a local VUA. Prompts are typically maintained by the service provider
and replicated to the customer site with FRS.
For the above setup the recommended minimum number of servers is five. Failover servers must be added to
this number. Failover servers do not have to be dedicated for a particular system, for example a pool of
production servers can target a single failover server. How many production servers a failover server serves is
based on risk analysis and is a business decision. The recommended five servers are:
In an in-house setup, the network structure may be reduced as much as to one network containing all VUs or to
two networks if CMC and/or Internet Chat Client are used. In the latter case, it is strongly advised that VU_DMZ
reside in a DMZ network.
22
ENVIRONMANTAL AND FACILITY RECOMMENDATIONS
To outsource the hosting of networks and servers not only saves one from the maintenance burden but may
also significantly increase available expertise regarding the outsourced parts and enables the outsourcer to
concentrate the efforts on SAP BCM operations.
- Emergencies
- Fire and smoke contaminants
- Building collapse or explosion
- Utility loss (electrical power, air conditioning, heating, cooling)
- Water damage (pipe breakage)
- Release of toxic material
- Natural disasters
- Earth movement (such as earthquakes and mudslides)
- Storm damage (such as snow, ice and floods)
- Human intervention
- Sabotage
- Vandalism
- War
- Strikes
- Walls (from the floor to the ceiling), floors, ceilings and doors have acceptable fire and strength
ratings. Windows are normally not acceptable. Doors must resist forcible entry.
- no nearby water pipes and shutoff valve locations are known and accessible
- passage control with audit trails
- intrusion detection and alarm
- fire detection, fire alarm and fire extinguishing
Emergency procedures should be implemented and practiced, such as:
23
ENVIRONMANTAL AND FACILITY RECOMMENDATIONS
An online UPS is very similar to the least expensive standby UPS in that it has the same two power sources
and a transfer switch that selects between them. It is the exact opposite from the standby UPS in that there
is no transfer time in the event of a power failure and it efficiently filters off peaks and noise coming from the
wall because those affect only the battery charger and not the inverter supplying the output power.
Power failures in the power distribution network are instantly covered by UPS devices. In a power failure
situation UPS devices are able to supply power for short times only, for a couple of hours, depending on the
UPS capacity and the power consumption. Generators are needed to protect against power failures that last
longer than the UPS is able to supply power. UPS devices cover easily the time it takes for generators to
start.
3.2.2 HVAC
HVAC stands for heating, ventilation and air conditioning. HAVC is needed to keep humidity and
temperature at acceptable levels, which are important parameters for electronic equipment.
Electronic components are designed to operate at some specified temperatures at which specified
tolerances are valid. Increasing temperature usually decreases electrical resistances and specified
tolerances ceases to apply and eventually the functionality becomes undefined.
Anti-static flooring is used to prevent static electricity and high voltage static electricity shocks from breaking
electrical circuits. Increased humidity leads to increased electrical conductivity in the air and prevents static
electricity but too high humidity leads to corrosion of leads of electrical components.
HVAC should be arranged so that it is tolerant to failure of one single HVAC system.
3.2.3 Utilities
Utilities that ease management and maintenance are appropriate equipment shelves and cable routes.
Rack cabinets are excellent for installation of rack servers and network devices. Devices should be easy to
install, recognize and remove. Well-defined cable routes allow for easily adding required cabling and for
removing unnecessary cabling.
3.2.4 Connectivity
Cable routes to the data center premises should be investigated. There should be at least two totally
separate routes entering the building on different walls. The separation of routes should remain inside the
building as close to the data center as possible. Alternate routes protect against failures on one of the
routes. Such failures could be caused for example by fire or by a digger breaking the cable miles away.
24
ENVIRONMANTAL AND FACILITY RECOMMENDATIONS
3.2.5 Sites
Multiple sites provide continuity guaranties in case of major incidents such as fires and total loss of
connectivity despite of alternate routes. In some cases alternate sites are required by law.
The same recommendations are valid for each site. Distances between sites should guarantee adequate
separation and independency of common data and power supply network nodes. This should be verified
with the local power supply operator and telco. In general, the distance should be at least 15 km.
Sites should be connected to each other with dual links backing up each other. These links and cable routes
should be all the way separate from each other. Typically IP and FC (Fibre Channel) connectivity is required
between sites, FC for connecting storage systems and IP for all the remaining traffic.
IP and FC connections can be carried over a single mode fiber pair by multiplexing different wavelengths or
colors to the same fiber pair. A third inter-site connection based on different technology such as SDH
(synchronous digital hierarchy) is recommendable for cluster heartbeat control traffic. Inter-site fiber
connections are typically 1 Gbit/s and for a third heartbeat connection 2 Mbit/s should be sufficient.
Multi-site landscape enables also partial service distribution. For example a customer setup can have PSTN
gateways in more than one site which can provide PSTN connectivity to more than one telephone
exchange.
25
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
4.1 Servers
Prerequisites for the server configuration are:
Site and network topology together with capacity demands prescribes the number of servers in the basic set
and their specifications. Capacity refers to the number of virtual units and/or modules required.
Availability demands add failover servers to the number of servers in the basic setup.
Facility demands states the physical shape of the servers, such as tower, rack mounted or blade servers.
It is a good idea to start understanding and/or designing the network layout properly and recognizing the
network location of involved SAP BCM components. For example in an in-house setup or demonstration
system, there might be only one core network, the enterprise LAN, and thus all components would reside there.
In such a case, the minimum number of servers is two, one running the databases and one running the other
components. This setup is suitable only for systems with light load and low availability requirements.
Site and network topology affects the number of servers required. Different network zones, such as DMZ and/or
management network, require separate servers. Site and network topology might also place requirements for
additional network interfaces on multi homed servers. The setup in figure 9, SAP BCM virtual unit configuration
sample, requires a minimum of four servers if no virtual units are located in the customer network.
Capacity demands affect the number of multi instance virtual units and/or modules (those named VU_n or
module_n in section 2.3., Virtual units) required and thus may also affect the number of servers. One server
may run more than one instance of any multi instance virtual unit or module. The restrictions of virtual unit and
module capacity do not necessarily correlate to CPU or I/O power. They can be due to the number of threads a
process may create or some other operating system or software-specific features. Chapter 14, Sizing, covers
this topic in more detail.
Availability demands determine precautions for eventual fault incidences and procedures for maintenance
tasks. Precautions for fault incidences are failover mechanisms. Failover can be configured in the following
ways:
26
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
- Manual failover
- Automatic failover
Manual and automatic failover is covered in chapter 12, Availability and maintenance. This topic may affect
the number of required servers. With manual failover, an operator can choose the most suitable one of the
available failover destinations. With automatic failover, capacity must be prepared in advance at one or more
specific failover destinations.
If the set of active SAP BCM servers are only moderately utilized and the capacity budget allows it, failover
destinations may be configured within the set without using dedicated standby servers for failover. If utilization
increases over time, the setup can be reconfigured with one or more dedicated standby failover servers.
When maintenance tasks can be performed outside office hours there is no 24/7 demand and there is no
demand for additional failover destinations for maintenance reasons. If it is not possible to perform maintenance
outside office hours because of a 24/7 demand, failover destinations must be available to enable uninterrupted
service during maintenance.
- Storage servers with significant file I/O, storage capacity and backup demands
Storage servers refer to SAP BCM (SQL) database servers and file servers. SAP BCM database servers are
used for storing for example system configuration, user accounts and call detail records (CDR). File servers are
used for storing for example prompts, voice mail messages, recordings and attachments. Storage servers
contain both static data (configuration and user data) and dynamic accounting data (CDR).
The static data is crucial to the operation of SAP BCM and therefore attention must be paid to its availability. It
is recommended that static data is kept on clustered servers and that the data is regularly backed up.
The dynamic data is not crucial to the ongoing operation of SAP BCM, but its value is often essential because
of billing, production control, service control or other business related issues and may thus be vital to the
service provider and/or to the customer. It is recommended that dynamic data is kept on clustered servers and
that the data is regularly backed up.
27
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
Application servers run different SAP BCM virtual units. They retrieve process and/or store data between users,
other modules and data storages. Application servers are replaceable in the sense that they do not contain any
crucial data and their assignments can therefore be overtaken by other servers.
Performance characteristics have emphasis on file I/0 and storage capacity for storage servers and network I/0
and CPU for application servers.
- Tower
- Rack
- Blade
Tower servers are recommended for in-house setups, where the existing facilities do not require any other type
of servers to be selected. Tower servers often have the space for sufficient RAID (redundant array of
inexpensive disks) disks, integrated sophisticated RAID controllers and enough slots for possible additional
RAID controllers and network interface cards. The drawbacks of tower servers compared to the others are:
Rack servers are designed to be mounted in a server cabinet. The advantages of using rack servers are:
Rack servers come in different sizes or heights. The height of rack servers is measured in units (U) where one
U is the minimum height of a device that can be installed in a cabinet. A cabinet may contain for example 40 or
42 U. One U servers are usually suitable for application servers whereas, storage servers require more space
for disks and possible additional network and/or RAID boards. Rack mount kits are available for some tower
servers.
Attention should be paid to the cooling of rack mounted servers. Cooled air should flow through the cabinet, for
example from the bottom to the top.
Rack-mounted servers are a good choice for enterprises and service providers running several servers.
28
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
Blade servers are electronics boards that are installed to a blade chassis. The blade chassis is installed in a
similar cabinet as rack servers. The blade chassis provides power and required interfaces to the blade. Benefits
of blade servers are:
Regardless of the selected chassis type, the following features are recommended:
- Management, such as HP ILO and/or SNMP for retrieving notifications of possible failures or
arising problems.
- Separate physical network interfaces for each network (core, access, management) the server
connects to.
29
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
Server, File
Application
Application
SAP BCM
SAP BCM
SAP BCM
SAP BCM
Storage
Storage
Server,
Server
server
server
Feature
SQL
light
>2 >= 2
CPU speed 1 GHz > 1 GHz 1 GHz >= 2 GHz 2 GHz 1 GHz
GHz GHz
4 – 32
RAM 1 GB 1 GB 1 GB 2 - 4 GB 4 GB 1 GB >= 2 GB
GB
100 or 1000
100 100 100 100 100 1000
Network interface 1000 Base-
Base-T Base-T Base-T Base-T Base-T Base-T
Base-T T
Number of network
1 1 1 1-2 1 1-3 1 1-3
interfaces
Operating system on
Yes Yes Yes - Yes Yes Yes Yes
local disks
Operating system on
- - - Yes - No - No
SAN
A SAP BCM light application server is running only few SAP BCM components. For example, a SAP BCM CS
(connection server) located in a DMZ serving connections from SAP BCM CMC clients could be considered a
light server.
The design aspects of the entirety may lead to standardizing application server configurations and to thus make
the hardware interchangeable, so that any SAP BCM light application server can be assigned the tasks of any
other SAP BCM light application server without any need to upgrade the hardware. An arrangement including
some minor additional investments in hardware, such as RAM, are required but is facilitates in maintenance
efforts.
It is possible to assign processor resources in a multi-core environment running multiple SQL Server instances
so that, for example, each SQL Server instance uses its own CPU core.
SQL Servers benefit from all available RAM. In a multi-instance installation, the amount of RAM available for
each instance can be configured. Especially in reporting and analysis, but not limited to these, the performance
30
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
- Network topology: Dual-hosted servers require at least two network interfaces. A server can
be connected for example to an access network and to a management network or to an access
network and to a core network.
- High availability: Network teaming (a dual connection providing fault tolerance) requires at
least two network interfaces.
- Clustering: It is recommended that at least three network connections are made available for
cluster control and heartbeat traffic and that at least one them is dedicated for this purpose.
The best location, which would be local or SAN disks, of the operating system and the data is affected by the
intended maintenance procedures:
- Using servers, especially blade servers, retrieving the operating system from SAN and storing
data to SAN and not having any local disks, makes the servers “dummy” electronics boards
with no identity. This enables fast and easy reassignments of servers to different tasks and can
be useful for example during version updates and when applying patches.
- All servers should have at least a mirrored (RAID-1) disk configuration. In some cases, for
example with DMZ servers, it might be more reasonable to use local disks.
- Cluster servers should always have local disks for the operating system and SAN disks for
data to ensure proper cluster control and data availability at all times.
The hyphen “-“ in the table indicates a neutral attitude. The decision is usually made based on existing
possibilities and on design aspects of the entirety.
31
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
Enterprise edition
Enterprise edition
Standard edition
Standard edition
Standard edition
Windows 2003
Windows 2003
Feature
Max memory 4 GB 32 GB 4 GB 64 GB 32 GB 1 TB
Standard editions are recommended for SAP BCM application servers. Enterprise edition is recommended for
SAP BCM storage servers because of the larger amount of maximum memory and the clustering capability. If
clustering is not required for file servers, standard edition can be used. It is recommended to always apply the
latest services packs provided by Microsoft.
4.3 Software
Software refers to third party software required to run SAP BCM or supporting it in some way, such as SQL
Server. Essential software and/or operating system services for SAP BCM are:
SAP BCM servers are usually added to a Windows domain. Some exceptions exist, for example a SAP BCM
CS Server installed in a DMZ zone does not typically belong to any domain. Windows Server Active Directory is
used for maintaining Windows user and computer accounts in that domain. Windows user accounts are created
for SAP BCM administrators, operators and services.
32
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
Microsoft Internet Information Server 6.0 is used for running SAP BCM web services, such as the CDT and
Administrator interfaces.
Microsoft SQL Server 2005 or SQL Server 2008 is the database system used by SAP BCM. See section 4.3.1,
Microsoft SQL Server, for more information about Microsoft SQL Server.
Microsoft Certificate Services (CA) can be used to create self-granted server certificates for encrypted SSL
connections. Parties (such as hosts and services) connecting to services using self-granted certificates must
recognize the issuing CA as a trusted root.
Windows 2003 or later DHCP Server can be used to provide gateways, IP desk phones and other equipment
residing in the server network with IP-addresses and additional information, such as boot files, configuration
files and configuration information.
A TFTP server (any available) can be configured in the DHCP information as a destination where additional
configuration information is available. Configuration information can also be stored from a device to a TFTP
server for example as a backup.
A syslog server can be used to log messages from devices such as IP Desk Phones and gateways. Most
devices provide alternative log levels to avoid storing uninteresting information. A syslog server with the ability
to filter syslog events and forward selected ones via e-mail and/or notifying of essential events via SNMP
(simple network management protocol) is recommended.
33
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
There are three licensing models for SQL Server of which Per Processor Licenses are recommended. One Per
Processor License is required for each processor running a SQL Server instance. This licensing mode does not
require any CALs (client access licenses). One Per Processor License allows for running a multi-core
processor. Below are the most important features of the editions and differences between them in relation to
SAP BCM.
Enterprise edition
Enterprise edition
SQL Server 2005
Standard edition
Feature
Operating Operating 64 GB 2 TB
Max RAM system system
maximum maximum
Yes (2 Yes
Failover clustering Yes Yes nodes) (op.sys
max)
One Per Processor License allows for more than one instances of SQL Server to be run on the same host.
Each instance can be configured with a maximum amount of memory and with one or more cores.
SQL Servers running the reporting databases should have the SQL Server options Analysis Services and
Reporting Services installed.
If e-mail notifications are needed, for example, from voice mails and SMS messages, SMTP (simple mail
transfer protocol) needs to be installed. SMTP is included with IIS, but not installed by default and is an option
that needs to be selected manually.
One IIS server can contain several web sites, one per each installed virtual unit, for example, VU_WEB_USER.
Each web site and thus virtual unit can and preferably should be assigned a unique IP address. Backup
instances of each web site should share that same unique IP address.
34
SERVER HARDWARE, OPERATING SYSTEMS AND SOFTWARE
4.3.3 Certificates
SAP BCM uses SSL server certificates to authenticate SAP BCM servers and to encrypt traffic between servers
and clients. Servers refer to SAP BCM components listening to connection attempts. Clients refer to SAP BCM
components initiating connections. Both servers and clients can be SAP BCM service components.
Authentication succeeds when all of the following are true:
- The URL connected to matches the name the certificate is issued to.
- The certificate date is valid.
- The issuer of the certificate is trusted by the client.
Certificates can be obtained from any certification authority (CA) trusted by the client. Windows Server 2003
contains by default several trusted certification authority certificates. Trusted CAs can be added by adding their
certificates among the trusted certification authorities.
For internal usage, for example, for authentication and encryption inside the core or access network, the
certification authority services included with Windows Server 2003 can be used. They are not installed by
default and need to be selected manually. For self-granted certificates, the certificate of the issuer needs to be
distributed to the clients, usually manually.
For public usage or usage over the Internet from numerous clients, for example CMC, certificates issued by
public certificate authorities are required to avoid massive distribution of CA certificates to numerous clients.
Public certificate authorities are for example VeriSign and Thawte.
35
GATEWAYS
5 Gateways
Gateways connect PSTN networks to IP networks and enable calls to pass from one to the other. In in-house
cases gateways are installed in the customer LAN. In service provider cases, they are typically installed in the
service provider network but they can also be distributed over the customer LAN or over the service provider
network and customer LAN.
SAP BCM uses traditionally H.323 as the control protocol for gateways. SIP is also supported and it is slowly
becoming more esteemed than H.323. The SAP BCM control component in front of the gateways is either a
H.323 bridge or a SIP bridge.
Finding suitable locations for gateways is an important step in designing each SAP BCM landscape. Affecting
factors are:
Because of the real-time requirement of voice streams, the networks ability to carry them is considered in
landscape design. To be able to optimize the networks ability to carry voice, it is essential to understand the
possible voice stream paths and to recognize the possible endpoints. Gateways are voice stream endpoints in
the LAN. The other voice stream endpoint is either an immediate endpoint such as:
- IP desk phone
- CDT
- IVR
- Voice Mail
- In some special cases, another gateway
Or, it can be an intermediate endpoint, such as the SAP BCM MRS (media routing server) component, which
forwards the voice stream to a next endpoint.
MRS may also be an immediate voice stream endpoint depending on its function. MRS is used to:
Distributing gateways may at the same time increase the required gateway capacity as they come in multiples
of E1/T1/J1 ports.
For example a company has two offices and a one E1 line in the service center network. Less
demand for a maximum of 30 simultaneous than a 2 Mbit/s data link is required but smaller
calls. If nationwide telephone numbering is used, data links with sufficient capacity are often not
the company can manage with one gateway and available.
36
GATEWAYS
Network
.
Site 1 Site 2
LAN LAN
Client Client
Enterprise
Network
Back-up capacity is often wanted, which also comes in multiples of E1/T1/J1 lines and gateways. Combining
the nationwide telephone numbering with gateways distributed to both offices provides this back-up capacity if
sufficient IP bandwidth is available for carrying voice between the offices.
The back-up capacity can also be arranged by locating both gateways in the service provider network and by
ordering the E1/T1/J1 lines to different telephone exchanges in the PSTN. This presumes that the PSTN
cabling routes are sufficiently separated all the way to the gateways in order to eliminate single points of failure.
This also usually presumes that nationwide numbering or the same regional numbering is used.
For example the company A has a telephone number range of 250 1300 – 250 1799. The SAP BCM migration
is not yet completed and 300 subscriptions are created in SAP BCM while 200 still exist on the traditional PBX.
SAP BCM subscriptions are assigned the numbers 250 1300 – 250 1599 and the numbers 250 1600 – 250
1799 are still in the PBX.
To enable calls between all employees, a gateway is installed to connect the SAP BCM system to the PBX. The
E1/T1/J1 port of the gateway is used to connect to the PBX and as normally, the Ethernet port is used to
connect to the SAP BCM system.
The PBX is configured to route all, except the numbers 250 1600 – 250 1799, to the port where the gateway is
connected.
The gateway is configured to route the numbers 250 1600 – 250 1799 to the port where the PBX is connected.
37
GATEWAYS
PSTN
All but
250 1600 All but 250 1300
- -
250 1799 250 1300 250 1799
PBX -
250 1799
250 1600
-
250 1799
SAP BCM System
Another way to do the interconnection is showed in figure 14, where the gateway is connected between the
PSTN and the PBX. This setup requires a gateway that has at least two E1/T1/J1 ports and the capability to
route configured number ranges as showed in figure 14. For example innovaphone IP3000 DD and
innovaphone IP6000 can be used in the setup below. Usually this setup is reasonable when only one E1/T1/J1
connection is needed to connect to the PSTN.
PSTN
250 1600
-
All but 250 1799
250 1600
- PBX
250 1799
38
GATEWAYS
ISDN is sometimes referred to as DSS1 (digital signaling system 1). The protocol used on the PSTN side
should be ISDN S2. R2 is not supported.
Cisco 2600, 2600XM, 2811, 2821, 2851, 2691 3600, 3700 series and 3800 series multiservice Modular Access
routers are supported. Up to 4 HDV Network Modules can be installed on a single router depending on the
router model. See appendix A, ICL, for more information.
Each HDV Network module has one VWIC slot. The VWIC provides the interface to the PSTN, E1, T1 or J1.
VWICs are available with one or two T1/E1/J1 ports.
Up to 5 PDVMs can be installed on each HDV Network Module. The amount of required PDVMs depends on
the amount of simultaneous calls and codec being used.
39
DATA CENTER LAN
SAP BCM service availability is extremely important to the customers and to the users. It appears far more
critical than traditional IT systems like e-mail and World Wide Web. The most important features of the data
center LAN are:
- Performance
- Availability
The data center LAN is crucial to the SAP BCM service availability as the SAP BCM service availability cannot
exceed the data center LAN availability. The performance of the data center LAN is vital to the SAP BCM
service availability because only minor and occasional voice distortions are sustained.
6.1 Performance
Different traffic shapes apply to different network boundaries. Between a management network and a core
network, there is management traffic, such as SNMP traffic and traffic related to configuration tasks. Between a
core network and an access network there are mainly database queries and SAP BCM Control Traffic. Unlike
voice streams, these do not have real time demands.
Voice streams are typically carried from voice endpoints in the access networks over service and access links
to voice endpoints in the customer LAN. Voice endpoints are any immediate or intermediate devices or services
transmitting or receiving voice, such as CDTs, IP desk phones, VoIP gateways, routers, CSs and MRSs.
It is recommended to keep the network layout as straight-forward as possible by minimizing the network
distance between endpoints. Doing this provides more robustness against voice distortions due to increasing
delay caused by increasing overall utilization. This also minimizes the number of devices a particular service
depends on and minimizes the points of failure. Increased overall utilization can be caused for example by new
end users and customers, but also by poor configuration allowing or generating unnecessary traffic.
The above can be applied the other way around too. In a data center access network serving several
customers, minimizing the network distance between service endpoints may decrease the number of services
that depend on any particular device and can therefore be considered as a kind of segmentation into smaller
failure domains.
However switched networks allow for traffic isolation between parties and traffic is not unnecessarily
propagated all over the network. Therefore in a switched network with the nominal capacity of 100 Mbit/s, two
or more simultaneous fully utilized 100 Mbit/s connections may exist.
Switched networks are strongly recommended for SAP BCM data center networks as well as customer LANs.
Small SOHO (small office home office) sites with only a few hosts and modestly utilized networks are an
exception.
40
DATA CENTER LAN
The maximum aggregate performance of a switched network depends on the network topology and on the
performance of the network devices themselves. The absolute maximum capacity of any link and switch port is
its nominal speed. Two switches connected together over a 100 Mbit/s link cannot carry more than 100 Mbit/s
data to each other although the total demand from other ports would exceed this as depicted below.
Switch 1 Switch 2
A B C D E F G H A B C D E F G H
40 Mbit/s
40 Mbit/s
40 Mbit/s
40 Mbit/s
40 Mbit/s
40 Mbit/s
100 Mbit/s
b it/s
0M N
d 12 TIO
n S
ma GE
De CON
Devices contributing to one and the same service should be located close by in the network to minimize the
network distances and thus to optimize the network performance as figure 16 shows..
Switch 1 Switch 2
A B C D E F G H A B C D E F G H
40 Mbit/s
40 Mbit/s
40 Mbit/s
40 Mbit/s
40 Mbit/s
40 Mbit/s
100 Mbit/s
/s
bit N
8 0 M TIO
nd ES
ma NG
De CO
NO
Figure 16. Network distance between related services is minimized to optimize performance. The host or
segment connected to switch 1, port F, has been moved to switch 2, port H.
One solution is to use 1000 Base-T links between switches, but it is still recommended to minimize the network
distance between related devices and services. Every additional hop introduces a potential delay and a
potential point of failure.
Based on this, it seems that in a switched network the aggregate capacity is a multiplier n times the nominal
network capacity, where the multiplier n depends on the network topology and the capability and speed of the
switches to queue and forward traffic. However, queuing traffic introduces delivery delays eventually distorting
the voice quality.
Service segmentation provides some certainty of service availability and service infrastructure should be
divided into self-sufficient parts independent on incidents in other parts. Therefore it is recommended to have
another access network in advance before the previous is utilized to its reasonable extents.
41
DATA CENTER LAN
It would occur that a 100 Base-T access network would be capable of serving approximately
100 Mbit/s x 0,4 x 0,8 = 32 Mbit/s access and service links.
In switched, well-structured network this might apply to one switch in the network. The network utilization varies
over time as the number of simultaneous calls and directory queries varies. Unlike traditional IT systems like e-
mail, where it is possible to wait some seconds in a congestion situation, a SAP BCM system must be designed
to carry-real time voice at any moment as dimensioned. Average loads do not count and dimensioning must
apply to peak loads.
6.1.3 VLAN
Virtual LANs (VLANs) provide broadcast filtering, security, address summarization and traffic flow management.
VLANs can be used to provide the segmentation services traditionally provided by routers in LAN
configurations, for example to split a large access network into segments and by doing this, increasing
manageability and security. By definition, switches may not bridge IP traffic between VLANs because it would
violate the integrity of the VLAN broadcast domain.
VLANs have the same attributes as physical LANs but they allow for end stations to be grouped together even
if they are not on the same LAN segment. In a legacy network, end stations are assigned to networks based on
geography. Using VLANs, networks can be logically grouped without physical LAN topology restrictions.
Two kinds of VLANs exist. One is based on the protocol IEEE 802.1Q, where Ethernet frames are tagged with
VLAN information allowing for VLAN multiplexing over trunk lines. These VLANs are suitable for reaching
logical core, management and access networks over multiple sites. Each VLAN appears as one and the same
network regardless of its physical location.
The other kind of VLANs are port-based VLANs. With port-based VLANs two or more switch ports are assigned
a VLAN identifier which groups the ports together to a port-based VLAN. Traffic cannot flow between ports
belonging to different VLANs without passing through a VLAN router. Multi-VLAN ports may be configured to
provide services, for example management or database, to multiple VLANs.
6.2 Availability
The data center LAN availability focuses on keeping the network serve its purpose by avoiding unnecessary or
unwarranted traffic and by preparing for failures. Together with diligent network management, operation and
monitoring, access control and fault tolerance are central elements of high availability. Prioritizing may also be
considered a protection mechanism with similarities to access control.
See chapter 11, Security, for access control at outer network boundaries as protection against external threats.
In this context, access control is considered as an enabler for network robustness which is done with access
lists on switches. Access control can be based on, for example, any of the following:
The data center LAN may be segmented into different networks to obtain more granular control over it and the
network traffic in it. Such segments may be, for example core, access and management networks where
boundary controls are implemented and/or virtual LANs (VLAN) assigned to a customer or a group of
customers.
Access controls inside a segment, or even inside a data center LAN, can be implemented with switches but on
the outside boundary towards a customer or another organization, more sophisticated firewalls are
recommended.
Access control contributes to availability and high quality of service. It may constrain the distribution of
unnecessary or even malicious traffic caused by:
Access control should be carefully planned and clear benefits and objectives should be recognized, such as
allowing specified traffic shapes or protecting organization limits. Good options are allowing only voice streams
and control protocols to voice endpoints or allowing only traffic to and from a specific organization. Access
control should be kept as simple as possible and well documented.
6.2.2 Prioritizing
Prioritizing involves categorizing traffic into different traffic classes and to assign priorities to those classes.
Categorization of traffic can mainly be based on the same factors as access control and it can also be based on
a type of service identifier (ToS or ToS bit). Traffic with higher priority is passed through network devices, such
as switches and routers, before traffic with lower priority. ToS bits are usually set by endpoint but it is also
possible in some cases to set ToS bits on network devices on the transmission path.
In opposite to access control, which strictly allows or rejects traffic, prioritizing does not initially reject traffic but
instead allows higher prioritized traffic pass before lower prioritized traffic. With increased utilization and
congestion, prioritizing will eventually cause low priority traffic to be dropped and thus allow higher priority traffic
to be carried over the network.
Prioritizing is a mechanism providing control over bandwidth usage. It does not provide means to counteract
low bandwidth. Prioritizing may provide higher availability in the same cases as access control and it could also
be seen as a performance factor.
43
DATA CENTER LAN
The fault tolerance of the data center LAN is a part of the overall SAP BCM service fault tolerance and it relates
to fault tolerance implemented by network topology designs, network hardware and network protocols.
The following questions can be used when deciding on the degree of the fault tolerance:
-
- Independent service pools are required to constrain the service breaks.
- Partially independent service pools sharing common clustered service pools are required
If not, then the failover probability must be minimized by adding robustness to each component
Each step costs additionally and each incidence has its price, probability and estimated recurrence. However,
the reasoning described below is difficult and laborious to use when drilling into a variety of details and
equipment. Another is that the cost of an incidence is easily underestimated.
In general, it is recommended that all simple fault tolerance measures are implemented, such as:
44
DATA CENTER LAN
6.2.3.2 Teaming
Teaming is a technique using two or more network cards to connect a server to the network. The team or the
group of network cards appears as one logical network card in the operating system. The remaining network
cards assume the traffic of the failed card, if one network card in the group fails. The virtual network card has
one MAC address and one or more IP addresses just as real network cards do. Teamed network cards also
share the network load increasing the available network bandwidth and providing load balancing.
Teaming is recommended to be used at least with clustered switches capable of continuing the server
connectivity in case a part of the switch cluster goes down. Teaming is also supported by some gateways.
Basically, providing the SAP BCM services from two or more alternative sites requires:
- Alternative premises with far enough distance between them. The distance depends on the
disaster prepared for. For protection against fire emergencies, collapsed buildings, power
outages and data link outages, a suitable distance could be about 20 km or more. Power and
data network structures should be discussed with respective providers before deciding
alternative locations.
Partially or fully duplicated production equipment, such as servers and gateways. It is possible
to run only selected services with standby failover on remote sites.
- Common data storage, preferably a real-time mirrored SAN between the sites.
Obviously providing real time failover services from alternative sites is costly. However, the actual case might
be that only a fragment of the customers demand this high availability and disaster tolerance. Establishing
alternative production sites provides also more production capacity and preparing for alternative sites might be
a good growth strategy from the very beginning. This reduces the risk of having too much of the service
provider business on one site and reduces the initial costs by keeping premises and facilities a little bit smaller
at the beginning.
The majority of multi-site concerns are exactly the same as with single sites because multi-sites are run with,
for example identical servers and data links. The points to focus on are:
Since MAC addresses are not divided into network and host portions, a host cannot determine from the MAC
address of another host if that is on the same network or not.
To be able to address hosts on other networks, IP addresses are used. IP addresses contain a host portion and
a network portion. When addressing another host, it is in the same network if the senders and receivers
network portion of the IP address is the same. Otherwise, it is on a different network and will be addressed to
via a router.
Hosts and services are configured with IP addresses. For example, an IP desk phone is configured to find its
registrar at the IP address 10.10.0.5.
The IP desk phone uses ARP (address resolution protocol) to determine the MAC address of the registrar by
sending an ARP request containing the IP address 10.10.0.5 and the MAC address of the sender. ARP
requests are sent with Ethernet broadcast addresses and received by every other host in that network. The
host configured with the IP address 10.10.0.5 replies with an ARP reply containing its MAC address. This way,
MAC addresses are changed between hosts and the rest of the communication continues using these MAC
addresses. MAC addresses are stored by the hosts in ARP tables until they expire and requested for again.
The SAP BCM high availability concept includes virtual IP addresses assigned to SAP BCM services. The
virtual IP address hides the actual server or site from the user.
The SAP BCM high availability concept is based on virtual units having more than one instance sharing the
same IP address and of which only one instance is active at a time. However, each instance has its own
network interfaces and its own MAC addresses that must be resolvable by the router connecting to the
customer.
Therefore, sites must be in the same broadcast domain and there must not be a routed connection between
them.
Single mode (SM) optical fibers are recommended as the physical link media between sites, because of their
excellent ability to carry information over long distances without any repetition or other electronic intermediate
devices constituting points of failure. One fiber link consists of two fiber strains or a fiber pair. For fault
tolerance, two separately routed fiber pairs are used.
CWDM (coarse wavelength division multiplexing) is used to deploy different services such as IP and FC over a
single fiber pair. CWDM is an optical technology for transmitting several channels, each in a separate
wavelength or color, over the same fiber strand. Unlike DWDM (dense wavelength division multiplexing) which
can transmit 32 or more channels on the same fiber, CWDM uses a more loose spacing between channels and
is less expensive than DWDM. The International Telecommunication Union (ITU) has standardized a 20 nm
channel spacing grid for use with CWDM with the wavelengths between 1310 nm and 1610 nm.
46
DATA CENTER LAN
Site 1 Site 2
Gray Gray
Violet Violet
Blue Blue
Green Green
Yellow Yellow
Orange SM Fiber pair Orange
Red Red
Brown
(receiving & Brown
transmitting)
Figure 17. Multiplexing several channels over a optical fiber pair (CWDM).
Figure 17 shows two eight channel CWDM multiplexers connected over a SM fiber pair. Each channel can be
used to interconnect a 1000 Base-T Ethernet network, VLAN or Fibre Channel network between the sites.
Figure 18 shows an Ethernet network or a VLAN connection between two sites. The four edge switches are
connected together in a ring. The spanning tree protocol is used to determine active path between the sites.
Site 1 Site 2
Spanning Tree
Figure 18. Two fiber links routed physically apart are used to interconnect the sites.
47
DATA CENTER LAN
HSRP does not inform the other HSRP group of an event where the active router changes. If the Ethernet port
of an active router goes down and the active router in that group is changed, traffic from the other group is still
destined over the WAN to the previously active router. Therefore, a routing protocol is needed to cover the
return path.
48
DATA CENTER LAN
Such disks appear to the hosts as single logical disks and are mounted, for example, by SQL clusters at
failover.
For occasions when gateways on either site are not able to respond reasonably to incoming calls, for example,
no answer is sent from the gateway to the PSTN, an alternative destination is required the incoming calls. The
primary alternative destination would be respective gateways on the other site, but overflows could be defined
to any PSTN destination.
Running multi-site services requires also for databases and file sharing services to be available at both sites.
This is achieved using Microsoft cluster services, SQL clusters and distributed real-time mirrored SANs.
49
CUSTOMER LAN
7 Customer LAN
The customer LAN refers to the LAN where the SAP BCM service is used. Different site topologies are already
covered in the section 1.6, Introduction to customer LAN. 100 Base-T and/or 1000 Base T switched networks
are recommended. There are two concerns related to the customer LAN:
- Availability
7.1 Availability
For the customer LAN availability, valid techniques are explained in:
- Ring topologies can be used to interconnect departments, floors and sites as explained in
the section 6.3.2, Connecting sites together
- For sites in different subnets, HSRP in combination with a rapid-converging routing protocol
can be used as explained in
the section 6.3.3, Data connectivity and routing
If there is heavy utilization and especially if there are heavy load peaks, it is advisable to find out the cause of
the heavy utilization and/or the heavy peaks to verify that they are permissible and rational. When it is
confirmed and possibly counter-measured that there is no dispensable traffic, a utilization baseline has been
found. This baseline is used to recognize the available capacity for voice.
It should be observed that average utilization is not the whole truth about the ability to carry voice. A LAN with
very modest average utilization but frequent high load peaks may show totally unworthy of carrying voice. The
high load peaks may cause significant distortion to voice. A LAN carrying most of the calls perfectly well but at
the same time disrupting the voice a few times a day is not acceptable.
Prioritizing traffic is an efficient method to attach heavy load peaks in a LAN where the average utilization is
moderate.
Voice traffic can be identified by the ToS bit set by SAP BCM or by constructing access lists on routers or
switches filtering traffic into categories based on, for example, sender and/or receiver IP address or protocol.
For configuration details see the documentation of the network device.
50
CUSTOMER LAN
Categorization
High Priority
Port 1 High priority
input buffer queues are
Eth emtied first
Port x
Medium Priority output buffer
Port 2
Eth
input buffer
Low Priority
Port n
input buffer
Figure 18 shows the principal of queuing and prioritizing traffic. A received Ethernet frame is buffered in the
input buffer. The frame is analyzed to determine the category of it and moved to the buffer with respective
priority. Frames in higher priority buffers are transmitted before frames (depending on the prioritization
algorithm) in lower priority buffers. Frames in each buffer have no mutual priority, they are sent on a first-in first-
out basis.
- Buffer overflows:
May indicate too heavy utilization, bad network topology or malfunctioning hardware.
- Suspected speed and/or duplex mismatches:
Indicates configuration problems. Auto settings might not work properly or manual settings do
not match.
- The number of collisions and late collisions:
May indicate too heavy utilization, malfunctioning hardware or bad network topology.
51
STORAGE SYSTEMS
8 Storage systems
Storage systems refer to the disks, disk arrays and SAN systems used for storing data. SAN systems use disk
arrays internally. Disk arrays provide better availability and sometimes also faster performance than single
disks. Faster performance is achieved especially in reading operations by reading several disks in parallel. SAN
systems are mostly based on high speed optical fiber connections providing better throughput than traditional
connections.
- Mirroring
Mirroring involves copying data to more than one disk.
- Striping
Striping involves splitting of data across more than one disk.
- Error correction.
Error correction involves storing redundant data such as parity to enable problem detection
and possibly problem fixing.
The most interesting RAID designs or levels are:
- RAID 1
All data is written to two identical disks, which allows for loss of one disk without data-loss.
- RAID 5
Striped set with distributed parity allowing for loss of one disk without data-loss.
- RAID 1+0 (or RAID 10).
Two or more mirrored sets are striped to provide a bigger disk allowing for loss of several disks
as long as no mirror set loses its both disks.
RAID 5
Logical
RAID 1 disks
A,B&C
Logical disk A1 A2 A3 Ap
B1 B2 Bp B3
C1 Cp C2 C3
Disk 1 Disk 2
Disk 1 Disk 2 Disk 3 Disk 4
RAID 1 arrays are recommended to be used in SAP BCM application servers with local disks and for the
operating system in SQL clusters. RAID 5 arrays or RAID 1+0 arrays are recommended to be used as
database storage.
52
STORAGE SYSTEMS
It is recommended that SAP BCM application servers boot from SAN but that cluster servers, such as Microsoft
SQL clusters, have local disks for the operating system and that the databases are on the SAN.
SANs usually utilize a Fibre Channel fabric topology made up of Fibre Channel switches, where devices are
connected to each other through one or more Fibre Channel switches. Host bus adapters (HBA) are used
connect servers to Fiber Channel switches. Each server and storage is connected to two switches for fault
tolerance.
SAN
attached
servers
Fiber Channel
Switches
Storage 1 Storage 2
Figure 21. Fibre Channel switched fabric topology
Figure 21 shows storages 1 and 2 that reside at different sites. The figure contains cascaded switches for
illustration purposes. The shown topology could be run with two Fibre Channel switches.
Using manufacturer-specific SAN options, logical disks can be mirrored to different storages making data
available in real-time at different locations.
Snapshots can be used to preserve a copy of the data at the given moment. Benefits of snapshots are, for
example, separated partitions that can be analyzed without influencing the production environment and
establishing truly identical test environments.
53
TELEPHONY AND DATA CONNECTIONS
- Overall topology and service and access links are covered as follows:
1.1 Introduction to site landscapes and connectivity
1.6 Introduction to customer LAN
6.6.3 Data connectivity and routing
Every 3.91 microseconds 8 bits from one channel is sent down the line followed by 8 bits from the next channel
during the next 3.91 microseconds, and so on, in a round-robin fashion throughout all the channels and thus, 32
channels are used once every 125 microseconds.
Service providers may consider preparing for coming demands by obtaining, for example, E3 or bigger trunks to
their sites in advance and having the telco splitting them into E1 lines at the site. One E3 trunk contains 16 E1
lines. The suggested arrangement helps maintaining the technical sanity and might speed up new deployments
as only configuration remains to be done when taking more lines in use.
Lines are taken in use by subscribing them. It is recommended that subscriptions are made by the customers
and that they are invoiced for the telephone traffic by the telco directly.
Subscriptions include a telephone number range. In most cases only numbers from this number range can be
shown as A numbers or calling party numbers.
1 1 1 1 1 1
2 2 2 2 2 2
3 3 3 3 3 3
15 15 15 0 1 2 3 15 16 17 31 0 1 2 3 15 16 17 31 15 15 15
17 17 17 17 17 17
31 31 31 31 31 31
54
TELEPHONY AND DATA CONNECTIONS
as using E3 trunks does on the telephone network side. Similarly, service links provide better technical sanity,
cost efficiency and expedited deployment times because the access links only need to be physically installed.
Dimensioning of service links is straight-forward as the required bandwidth is the sum of the bandwidth of the
access links. Dimensioning of access links relies on:
- E1 lines x 30 or
- T1 or J1 lines x 23
The codec G.711 creates a 64 kbit/s stream for a signal sampled at 8 kHz and G.729 creates an 8 kbit/s stream
correspondingly. This stream is the payload to be carried over the IP network. The stream is sliced into packets
of, for example, 20 ms of the stream. To be able deliver these packets, they are wrapped into RTP, UDP and IP
headers and finally, also in transport medium dependent headers. The choice of packet length is a trade-off
between latency and packet overhead.
20 ms of a G.711 stream is 64000 kbit/s x 0.02 s = 1280 bits -> 1280 bits / 8 = 160 octets.
20 ms of a G.729 stream is 8000 kbit/s x 0.02 s = 160 bits -> 160 bits / 8 = 20 octets.
It should be noticed that some gateways and/or IP desk phones accept only multiplies of 20 ms and therefore,
20 ms is a good default value.
As figure 23 shows, carrying RTP voice over Ethernet involves 78 octets overhead, Ethernet 38 octets and
IP/UDP/RTP 40 octets. The 38 octets are transmission-media dependent and apply to Ethernet only. HDLC
(High-Level Data link Control) and PPP (point-to-point protocol) are typically used, for example, on 2 Mbit/s
access links based on the SDH network. HDLCs overhead is 6 to 7 octets and PPPs overhead is 7 to 9 octets.
The IP/UDP/RTP header can generally be thought of as a fixed overhead of 40 octets per packet, though on
point-to-point links RTP header compression can reduce this to 2 to 4 octets (RFC 2508).
Sending 20 ms voice in each Ethernet frame means that 50 frames are send each second. This gives total
bandwidth demand of:
- 50 times per second x (78 octets + 160 octets) x 8 = 95.2 kbit/s for G.711 over Ethernet
- 50 times per second x (78 octets + 20 octets) x 8 = 39.2 kbit/s for G.729 over Ethernet
- 50 times per second x (7 octets + 160 octets) x 8 = 66.8 kbit/s for G.711 over HDLC
55
TELEPHONY AND DATA CONNECTIONS
- 50 times per second x (7 octets + 20 octets) x 8 = 10.8 kbit/s for G.729 over HDLC
- 50 times per second x (9 octets + 160 octets) x 8 = 67.6 kbit/s for G.711 over PPP
- 50 times per second x (9 octets + 20 octets) x 8 = 11.6 kbit/s for G.729 over PPP
Certain codecs support silence suppression. Voice Activity Detection (VAD) suppresses the transmission of
data during silence periods. As only one person normally speaks at a time, this can reduce the demand for
bandwidth by as much as 50 percent. The receiving codec will normally generate comfort noise during the
silence periods.
As a conclusion, based on earlier experiences a good rule of thumb is that G.711 requires 80 kbit/s and G.729
requires 40 kbit/s per simultaneous call on a HDL or PPP link. This includes the voice stream, signaling
information and CDT user interface. This rule may not be applicable in inbound and outbound call center cases,
where calls are interleaved very little or not at all.
Capacity demands for other channels, such as e-mail, are estimated based on information received from the
customer, for example, average sizes and e-mail frequencies. This capacity is added on top of the capacity
calculated for telephony.
56
USER TERMINALS
10 User terminals
The SAP BCM user terminals are CDT (SAP BCM soft phone), IP desk phones and mobile terminals. CDT
provides the broadest scale of functionality and is the primary user interface. IP desk phones are usually used
in negotiation rooms and other places where PCs are not available. SAP BCM CMC is a mobile client offering
some CDT functionality to mobile users. It runs on Nokia and Sony Ericsson Symbian phones.
10.1 CDT
CDT is a browser based telephone user interface including sophisticated functionality for enterprise telehony,
switchboard and call center users. It runs on Windows XP, Windows Vista and Windows 7 and IE 7, 8 and 9.
USB handsets and headsets are used with CDT. Headsets are also available as wireless. Handsets may
include keypads for dialing, such as Cyberphone W and VX-200. Headsets may include volume control, mute,
on-hook and off-hook functions. Headsets are either monaural or binaural, they come with one earpiece or with
two earpieces.
USB devices are powered either via the USB bus or they have external power supplies. In cases where many
USB devices are used and/or high power USB devices are used, consider using external USB HUBs with
external power supplies. The current supplied by the USB bus is limited to maximum of 500 mA.
For information about supported handsets and headsets, see appendix A SAP BCM infrastructure
compatibility list.
The IP desk phone settings may be done manually using the keypad. The phones usually contain a web server
for administration and additional configurations can be done using a browser once mandatory IP settings are
effective. Theses settings are:
- IP address
- Subnet mask
- Default router (in some cases)
IP desk phones can also be configured automatically using DHCP (Dynamic Host Configuration Protocol) and
TFP (Trivial File Transfer Protocol).
DHCP servers are servers that are assigned a pool of IP addresses that they lease to hosts upon their DHCP
requests. The DHCP reply typically contains at least the following information:
- IP address
57
USER TERMINALS
- Subnet mask
- Default router
- DNS (Domain Name System) IP address
The DHCP may be configured to provide, for example, the following additional information as well:
TFTP servers are also useful for making configuration backups even if the initial configuration is done in some
other way.
IP desk phones can be, in most cases, powered by external power supplies or by PoE (Power over Ethernet).
PoE requires the connected switch to support it or to arrange a separate PoE adapter between the switch and
the IP desk phone. PoE utilizes otherwise unused wires in CAT 5/6 LAN cables.
To power
supply
PoE
Adapter
Unpowered Powered
LAN cable LAN cable
For supported IP Desk and Mobile Phones, refer to appendix A, SAP BCM infrastructure compatibility list.
58
SECURITY
11 Security
SAP BCM security relies on infrastructure security described earlier as follows:
In the access network layer, where the customer is considered as a known endpoint, more granular
segmentation is advised by constructing VLANs for different customers. Routing between customers is not
recommended. If there is a demand to pass VoIP calls from a customer to another, it should be done via MRS.
Network traffic control is implemented with firewalls and access-lists on switches and routers and using VLANs.
For information needed to configure access lists, see the documentation of the SAP BCM ports and protocols.
Partially authorized SAP BCM administrators are authorized by fully authorized SAP BCM administrators.
59
AVAILABILITY AND MANAGEABILITY
- Spanning tree, introduced in 6.3.2 Connecting sites together. This is applicable for in LANs
in general
- SQL and File server clusters, introduced in 4.3.1 Microsoft SQL Server 2005
- Server and hardware fault tolerance, introduced in 4.1.2.2 Server chassis and operability
SAP BCM components for a particular service are installed on two or more HAC nodes and configured with
identical settings. One of these is active at any given time and referred to as the active node or the active
instance. The standby nodes remain inactive as long as they receive OK status information from the active
node. Failover nodes are prioritized primarily by the name of the instance element and secondarily by the ID of
the instance element. The failover entity is one or more virtual units.
s
tatu
u l ar s ons
Reg tificati
no
Figure 25. HAC nodes. The node 1 is active and the nodes 2 and 3 are prepared failover destinations.
HAC failover can also be initiated manually, for example, for the duration of maintenance tasks. HAC can also
be configured to notify the SAP BCM Alarm Server about its statuses.
60
AVAILABILITY AND MANAGEABILITY
- E-mail messages
- SMS messages
12.3 SNMP
SNMP (simple network management protocol) is part of the Internet Protocol Suite as defined by Internet
Engineering Task Force (IETF). SNMP is used in network management systems to monitor network attached
devices for conditions that warrant administrative attention.
Several SNMP management systems exist on the market and there is no particular preference for any of them.
- SNMP TRAP
SAP BCM sends only SNMP traps. SNMP GET and SET messages can be used for managing other SAP BCM
infrastructure devices supporting SNMP.
SNMP management systems typically include sophisticated functions, such as ability to:
- Send e-mail and SMS alerts initiated by events in the monitored system.
- Export event data to files, sheets or syslog servers for reporting purposes.
61
AVAILABILITY AND MANAGEABILITY
12.4 Miscellaneous
SAP BCM operators should consider stopping unnecessary Windows services to minimize server and network
utilization and vulnerability. Furthermore SAP BCM operators should consider stopping the optimization of SQL
Server performance. For more information see the documentation of Windows Server and SQL Server.
SAP BCM Infrastructure Administrator (IA) and Virtual Unit Administrator (VUA) are used to install and
configure SAP BCM components. For more information see the documentation of SAP BCM.
62
DEPLOYMENT, SOFTWARE DISTRIBUTION AND CONFIGURATION
Service providers may consider running different SAP BCM infrastructures with different service level
characteristics, such as 24/7 and 24/5. The implementation of each service agreement would be possible in a
SAP BCM infrastructure where the service level characteristics match or exceed the requirements in the
corresponding service level agreement.
This arrangement may clarify the urgency of administrative and operative alternation in case of incidents. This
arrangement also adds flexibility for maintenance windows during which routine maintenance tasks are
performed without explicit notifications.
The terminal.msi file contains all client-side software components but they are also available as separate
installation files. For example added and/or updated support for headsets and handsets are provided as, for
example, terminal_HS_device.msi files, where device is the name of the device or its manufacturer.
63
SIZING
14 Sizing
Sizing is covered in this document as follows:
- 7 Customer LAN
The basic principle is that SAP BCM is a modular system that scales up by adding components to achieve
increased capacity. Components with high utilization can be multiplied. The following are exceptions:
- There can be only one CEM server per each customer instance.
- There can be only one CEM database per each customer instance.
- There can be only one CPM database per each customer instance.
The remaining components are not critical capacity-wise or can be multiplied to increase capacity. Database
server performance is increased by scaling up the hardware, such as disks, memory and CPU. One CEM
server is capable of handling at least 100000 calls per hour.
For components that can be multiplied, the following maximum limits are recommended:
- MRS 800 simultaneous prompts or recordings or 1000 simultaneous NAT calls or SRTP calls
64
INTEROPERABILITY WITH OTHER SYSTEMS
LAN
Extensions Extensions
100 - 199 200 - 299
xxx100 – xxx200 -
xxx199 xxx299
PSTN
Figure 29. SAP BCM and Microsoft OCS are sharing common
gateway capacity.
Incoming calls are routed based on the dialed number to either SAP BCM or Microsoft OCS. A dial peer is
configured on the gateway (Cisco in this sample) for both SAP BCM and Microsoft OCS. Both dial peers define
a session target (the SAP BCM and Microsoft OCS SIP counterparts) with which the control protocol is
negotiated and a destination pattern that matches the dialed telephone numbers with either of the systems.
Outbound calls are routed on both systems to the gateway and by the gateway to the PSTN.
65
INTEROPERABILITY WITH OTHER SYSTEMS
LAN
Extensions Extensions
100 - 199 200 - 299
Calls between SAP BCM and Microsoft OCS can be routed via the gateway. The drawback of this configuration
is that internal calls consume gateway capacity.
LAN
Extensions Extensions
100 - 199 200 - 299
100 - 199
200 - 299
SAP BCM Outgoing Microsoft
calls OCS
xxx100 – xxx200 -
xxx199 xxx299
xxx100 – xxx200 -
xxx199 xxx299
PSTN
An alternative way to route calls between SAP BCM and Microsoft OCS is to configure a SIP trunk between
them. According to the standards, this is possible, but it has not been fully tested yet. The same is true for
Cisco Call Manager.
66
GLOSSARY
16 Glossary
ABBREVIATION (TERM) DESCRIPTION OR SYNONYM
10Base-T Standards for Ethernet over twisted pair or copper-
100Base-TX based computer networking physical connectivity
1000Base-T methods. The currently most widely used of these are
10BASE-T, 100BASE-TX, and 1000BASE-T running
at 10 Mbit/s, 100 Mbit/s and 1000 Mbit/s (1 Gbit/s)
respectively.
3G (third generation) The level of development related to wireless
technologies. The preceding levels were 1G (included
analog standards such as FDMA and NMT), 2G
(included digital standards such as CDMA and GSM),
and 2.5G (included the packet-based GPRS
standard). The 3G standards include UMTS (based on
GSM) and WCDMA (based on CDMA).
A number The number where the call or message comes from
(i.e. the caller’s number or the source number).
Absence A user is away or not available and cannot be
reached.
ACD (automatic call distributor) A module which manages inbound calls by using the
destination number.
A/D, A/D conversion Analog to digital conversion and vice versa
ActiveX ActiveX is a component object model (COM)
developed by Microsoft for Windows platforms.
Software based on ActiveX technology is prevalent in
the form of Internet Explorer plugins and, more
commonly, in ActiveX controls, ActiveX based
applications launched from web pages
Agent A user who handles queue calls and interacts with
customers. Usually related to contact centers.
AS (alarm server) A server receiving alarms from a HAC node and
distributing those alarms according to its rule sets.
ASP (application service provider) An enterprise that provides other enterprises or
individuals remote access to application programs and
services over the Internet.
ATL, ATLTERMINAL The core module required for the phone functions in
the Communication Desktop (CDT) application. This
ActiveX component is installed on a client workstation.
Attended transfer An active call is not transferred to another number
until you see whether it is answered or not. The call is
put on hold automatically, and you can release and
continue it if the other party does not answer.
Compare to the blind transfer method.
Auto-allocation mode The call queue mode where you get automatically the
next inbound call from the queues you are currently
logged into (i.e. serving as an agent). Each call is
offered separately to the agents who are logged into
the queue. Compare to hunt group mode.
Availability information Indicates whether a user is absent or present. Related
to PRS profiles in the Communication Desktop (CDT)
application.
67
GLOSSARY
75
APPENDIX A: SAMPLE SAP BCM SERVERS
76