Creating a Practical IPv6 Transition Plan Jeff Doyle President Jeff Doyle and Associates, Inc. Global IPv6 Summit in China 15 - 17 April, 2008.

Slides:



Advertisements
Similar presentations
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Advertisements

CATIA V4 Software Deployment Project Proposal
Systems Analysis and Design in a Changing World
IS Theories & Practices Systems Architecture & Infrastructure IS 655: Supplementary Note 1 CSUN Information Systems.
Panorama Consulting Group LLC ERP Assessment, Selection, and Planning SAMPLE APPROACH.
Modern Systems Analysis and Design Third Edition Chapter 11 Selecting the Best Alternative Design Strategy 11.1.
Copyright 2006 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Third Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
Managing the Information Technology Resource Jerry N. Luftman
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Fundamentals of Information Systems, Second Edition
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Information Systems Development – The System Approach 1. “System.
Copyright 2004 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Second Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
1 Introduction to System Engineering G. Nacouzi ME 155B.
Copyright 2004 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Second Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Business Transformation Health Check
Global Business Transformation Master (GBTM) Certification
Unified Software Practices v 5.0-D Copyright  1998 Rational Software, all rights reserved 1 /26 RUP Architecture.
Copyright 2004 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Second Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4.1.
Server Virtualization: Navy Network Operations Centers
SYS364 Evaluating Alternatives. Objectives of the Systems Analysis Phase determine, analyze, organize and document the requirements of a new information.
Software Engineering Chapter 15 Construction Leads to Initial Operational Capability Fall 2001.
RUP Fundamentals - Instructor Notes
Software Development *Life-Cycle Phases* Compiled by: Dharya Dharya Daisy Daisy
Moving into Design SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED. 1 Roberta M. Roth.
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
OSF/ISD Project Portfolio Management Framework January 17, 2011.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4.1.
The Challenge of IT-Business Alignment
Feasibility Study.
Copyright 2001 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Chapter 3 Systems Planning and Selection 3.1.
Chapter 12: Systems Investigation and Analysis. Agenda  How to Develop a CBIS?  Systems Development Life Cycle (SDLC)  Prototyping  Join Application.
Lecture 7. Review of Lecture 6 Project Scheduling: The process of defining project activities, determining their sequence, estimating their duration Scheduling.
Managing Project Resources. Project Resources Human Resources Project stakeholders: – Customers – Project team members – Support staff Systems analyst.
Software Engineering Principles Principles form the basis of methods, techniques, methodologies and tools Principles form the basis of methods, techniques,
CHECKPOINTS OF THE PROCESS Three sequences of project checkpoints are used to synchronize stakeholder expectations throughout the lifecycle: 1)Major milestones,
Acquiring Information Systems and Applications
Accounting Information System By Rizwan Waheed M.Com 710.
Notes of Rational Related cyt. 2 Outline 3 Capturing business requirements using use cases Practical principles  Find the right boundaries for your.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Rational Unified Process (RUP) Process Meta-model Inception Phase These notes adopted and slightly modified from “RUP Made Easy”, provided by the IBM Academic.
Modern Systems Analysis and Design Third Edition Chapter 11 Selecting the Best Alternative Design Strategy 11.1.
11 i Upgrade: Is an Assessment Useful for Your Company? By: Bernard Doyle, Applications Software Technology Corp. Marie Klein, Information Resources Inc.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 11 Selecting.
Rational Unified Process (RUP)
Integration integration of all the information flowing through a company – financial and accounting, human resource information, supply chain information,
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Essentials of Systems Analysis and Design Fourth Edition Joseph S. Valacich Joey F.
MOSTAFA MAZEN MOIS 549 The ERP Selection Process Survival Guide Article from:
Chapter 11 Selecting the Best Alternative Design Strategy Modern Systems Analysis and Design Third Edition 11.1.
+ Lec#1: Planning, Designing, and Operating Local Area Networks 1 st semester CT.
1 Project Management Software management is distinct and often more difficult from other engineering managements mainly because: – Software product is.
1 SCR756 – Enhancements to the MarkeTrak application –Fondly called - MarkeTrak Phase 3 –ERCOT CEO determined that SCR756 is not necessary prior to the.
Unified Software Practices v 5.0-D Copyright  1998 Rational Software, all rights reserved 1 /26 Rational Unified Process – Part 2 Original slides modified.
Iterative development and The Unified process
Process 4 Hours.
Chapter 11 Project Management.
BANKING INFORMATION SYSTEMS
WORK BREAKDOWN STRUCTURE
Chapter 1 (pages 4-9); Overview of SDLC
Systems analysis and design, 6th edition Dennis, wixom, and roth
Systems analysis and design, 6th edition Dennis, wixom, and roth
Modern Systems Analysis and Design Third Edition
Modern Systems Analysis and Design Third Edition
Chapter 11 Selecting the Best Alternative Design Strategy
Modern Systems Analysis and Design Third Edition
Chapter 11 Selecting the Best Alternative Design Strategy
Modern Systems Analysis and Design Third Edition
Presentation transcript:

Creating a Practical IPv6 Transition Plan Jeff Doyle President Jeff Doyle and Associates, Inc. Global IPv6 Summit in China April, 2008

Planning = Risk Management Copyright © 2008 Jeff Doyle and Associates, Inc. Any network change project imposes risks. New technology RISK Comprehensive planning RISK

Prerequisites Copyright © 2008 Jeff Doyle and Associates, Inc. Transition Plan Transition Plan

Prerequisites Copyright © 2008 Jeff Doyle and Associates, Inc. Transition Plan Transition Plan Feasibility Study Feasibility Study

The Feasibility Study Problem Statement Change Assessment Standards Assessment Vendor Assessment Risk Assessment Cost Assessment Value Assessment Timeframe Assessment Recommendations Copyright © 2008 Jeff Doyle and Associates, Inc.

Feasibility Study: The Problem Statement What problems are you trying to solve? Are there alternative solutions? Factors to weigh when evaluating solutions: Cost Technological maturity In-house expertise Outsourced expertise Multi-problem solution Hardware and software support Copyright © 2008 Jeff Doyle and Associates, Inc. IPv6 is not an objective; it is a potential solution to a problem! IPv6 is not an objective; it is a potential solution to a problem!

Feasibility Study: Change Assessment What must be changed? Only need a rough estimate here Factors to consider: Upgrades of existing hardware and software Configuration changes to existing systems New hardware and software External peering Staff education Copyright © 2008 Jeff Doyle and Associates, Inc.

Feasibility Study: Standards Assessment What standards are relevant to the project? Are the standards mature? Or, do they exist at all? Immature standards pose a risk Are there competing standards? This is also a sign of immaturity Copyright © 2008 Jeff Doyle and Associates, Inc.

Feasibility Study: Vendor Assessment Not vendor selection Resulting vendor list is input to vendor selection in the implementation plan The longer the list, the lower the risk Copyright © 2008 Jeff Doyle and Associates, Inc.

Feasibility Study: Risk Assessment Risk identification is essential to risk mitigation Prerequisites: Change assessment Standards assessment Vendor assessment Factors to consider: Potential cost overruns Stability of standards Vendor roadmap dependencies Potential vendor interoperability problems Partner and service provider dependencies Supportable backout plans at every project phase Copyright © 2008 Jeff Doyle and Associates, Inc.

Feasibility Study: Cost Assessment Cost rough-in only Cost estimates influence the value assessment High costs can negate value Cost estimates influence timeframes Adjusting milestones might reduce costs Copyright © 2008 Jeff Doyle and Associates, Inc.

Feasibility Study: Value Assessment Value balances against cost Essential for gaining funding Essential for gaining executive buy-in Copyright © 2008 Jeff Doyle and Associates, Inc.

Feasibility Study: Timeframe Assessment Time rough-in only Factors to consider: Standards stability Vendor roadmaps Cost variability over time Staff training and development Copyright © 2008 Jeff Doyle and Associates, Inc.

Feasibility Study: Recommendations Go / No-go decision point Feasibility study makes the case for funding Feasibility study provides inputs for implementation plan Copyright © 2008 Jeff Doyle and Associates, Inc. Transition Plan Transition Plan Feasibility Study Feasibility Study

The Transition Plan Copyright © 2008 Jeff Doyle and Associates, Inc. Transition plan or implementation plan? Implementation Plan Detailed design Configurations Execution scripts Schedules Resource allocations Backout plans Implementation Plan Detailed design Configurations Execution scripts Schedules Resource allocations Backout plans Transition Plan Transition Plan

The Transition Plan High-level design Inventory Milestones Vendor evaluation and selection Support and interoperability testing Training Methodology Cost and risk Analysis Copyright © 2008 Jeff Doyle and Associates, Inc.

The Transition Plan: High-Level Design Feasibility study starts with “what” Transition plan starts with “how” High-level design specifies how transition is accomplished Takes inputs from the change assessment Copyright © 2008 Jeff Doyle and Associates, Inc.

The Transition Plan: Inventory Detailed listing of all systems, HW and SW, that IPv6 will touch Input for IPv6 readiness assessment Examples: Routers and switches Management systems Backoffice systems Security systems End-user operating systems End-user services Copyright © 2008 Jeff Doyle and Associates, Inc.

The Transition Plan: Milestones Sets project phases Sets dates for completion of phases Takes input from timeframe assessment Influences choice of methodology Copyright © 2008 Jeff Doyle and Associates, Inc.

The Transition Plan: Vendor Evaluation and Selection Takes input from vendor assessment Requires detailed evaluation criteria Lab testing is highly encouraged Copyright © 2008 Jeff Doyle and Associates, Inc.

The Transition Plan: Support and Interoperability Testing Essential risk mitigation step First implementation should not be on your production network! Takes input from high-level design Testplans should include: Design component validation Design architectural validation Vendor capability validation Component interoperability validation Network modeling adds high value here Testing provides primary inputs to implementation project Copyright © 2008 Jeff Doyle and Associates, Inc.

The Transition Plan: Training Who must be trained? Top-tier network architects Management Operations How should training be delivered? Self-development In-house programs Packaged outsourced training What are the training milestones? Lab testing is a good training opportunity Copyright © 2008 Jeff Doyle and Associates, Inc.

The Transition Plan: Methodology “Flash cuts” are always dangerous Implementation should be incremental Phase execution Stop Test Validate Move to next phase Core-to-edge approach usually best for IPv6 Core IPv6 deployment usually the simplest step Network support systems usually the hardest step IPv6 does not “touch” end users until very end Core deployment contributes to operational experience Copyright © 2008 Jeff Doyle and Associates, Inc.

The Transition Plan: Cost and Risk Analysis Go / No-go decision point Detailed breakdown of costs Accurate analysis of risk Inputs: Cost assessment Risk assessment All earlier steps of transition plan Copyright © 2008 Jeff Doyle and Associates, Inc. Even if IPv6 project is delayed at this step, it should not be canceled. IPv6 is not an option, it is inevitable. Even if IPv6 project is delayed at this step, it should not be canceled. IPv6 is not an option, it is inevitable.

Thank You! (303)