CIS 460 - Network Analysis and Design Introduction & Overview Chapter 1 - Analyzing Business Goals and Constraints.

Slides:



Advertisements
Similar presentations
Business Strategies that Work: Employing People with Disabilities
Advertisements

Infrastructure Services. Introducing Al-Futtaim Technologies One of the regions leading System Integrators Strong partnerships with leading global ICT.
ITGS: MUST KNOW TERMS NETWORK. Internet Global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve.
Top-Down Network Design Chapter Fourteen Documenting Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Introduction to Network Design. 2 u Increase revenue and profit u Improve corporate communications u Shorten product-development cycles and increase employee.
TCP/IP Protocol Suite 1 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference between.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
CSE 550 Computer Network Design
1 Chapter 7 IT Infrastructures Business-Driven Technology
1 K. Salah Module 1.1: Introduction (cont.) Business Goals and Constraints Analyzing Technical Goals.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
OPERATIONS and LOGISTICS MANAGEMENT
Networking Solutions Chapter 2 – The OSI Model. The Layered Approach Similar to a company like ◦ Advantages ◦Divides the network into ◦Multiple vendors.
Copyright 2002 Year 2 - Chapter 4/Cisco 3 - Module 4 LAN Design By Carl Marandola.
WAN Technology Overview Lecture 3: Introduction to WAN.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
ORGANIZATIONAL STRUCTURE
Documenting Network Design
WELCOME!. Page: 2 Agenda One is impressive – two make a powerful team! Networking solutions, the Extreme way Coffee Break Security solutions, the NetScreen.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Study the barriers of Green Supply Chain Management Implementation in Iranian industries using Analytic Hierarchy Process.
Chapter 15 Systems Development
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
Chapter 11 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
CIS 321—IS Analysis & Design Chapter 4: Analysis— Investigating System Requirements.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Chapter 2 Introduction to Cost Management Systems
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Cisco – Semester 1 – Chapter 2 Network Fundamentals And The OSI Model.
7-1 Chapter 7 IT Infrastructures Business-Driven Technology.
Creating the Business Plan
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Chapter Fifteen The Research Report 15-2 Key Terms & Definitions Organizing the Report: 1.Title Page 2.Table of Contents 3.Executive Summary 4.Background.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
CCNA 1 v3.0 Module 2 Networking Fundamentals. Objectives.
NETE Computer Network Analysis and DesignSlide 1 Documenting Network Design NETE-4635 Computer Network Analysis and Design.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
LAN DESIGN – first step 5 ISB – school year 2006/07.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Network design Topic 1 Business goals. Agenda Network life cycle Network design process Business goals Scope Constraints.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
Lecture 1: Introduction to WAN
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
NTC 249 ASSIST Learning for leading/ntc249assistdotcom.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
1 © 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Communicating over the Network Network Fundamentals – Chapter 2.
NTC 249 edu Experience Tradition/ntc249edudotcom FOR MORE CLASSES VISIT
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Chapter 1 Introduction to Networking
Networking in the Enterprise
Networking in the Enterprise
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Discovering Computers 2010: Living in a Digital World Chapter 14
Introduction to Business (MRK 151)
Managing the Delivery of Information Services
Top-Down Network Design Chapter Fourteen Documenting Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Module 5 - Switches CCNA 3 version 3.0.
CIS460 – NETWORK ANALYSIS AND DESIGN
KNOWLEDGE MANAGEMENT (KM) Session # 34
Topic 12: Virtual Private Networks
Presentation transcript:

CIS Network Analysis and Design Introduction & Overview Chapter 1 - Analyzing Business Goals and Constraints

Student Introductions Name Company or Government Service Job Title/Description Networking Experience Seeking Certification Course Expectations

Using Top-Down Network Design Methodology – Good network design must recognize that a customer's requirements embody many business and technical goals, including availability scalability affordability security manageability service level

Using Top-Down Network Design Methodology (cont’d) Quick response bottom up connect the dots approach can be used if goals and applications are well known Top-down approach performs requirements analysis before technology selection to prevent not capturing the customer’s most important needs Begins at the upper layers of the OSI reference model before moving to lover layers. Focuses on applications, sessions and data transport before the selection of routers, switches, and media that operates at the lower layers.

Using Top-Down Network Design Methodology (cont’d) Explores divisional and group structures Iterative. Recognizes that the logical and the physical design may change as more information is gathered Get the big picture first and then spiral downward into detailed technical requirements and specifications

Analyzing Business Goals Understand your customer’s business goals and constraints is critical to designing a network that meets customer’s objectives and approval. – Working with your client- research business, what industry, suppliers, market, products, services, and competitive advantages –Criteria for success - goals to meet, how success is defined –Consequences of failure - project fails, does not perform to specifications, how visible to upper- management, unforeseen behavior disrupt business operations

Changes in Enterprise Networks Undergoing major changes - making vast amounts of corporate data available to employees, customers, and business partners. Have become mission critical. Budgets have been reduced, greater worker productivity, use fewer people, decrease recurring WAN costs Telecommunications/networking have merged

Changes in Enterprise Networks (Cont’d) Today web surfing is common, increased outsourcing, alliances, partnerships, and virtual corporations. Global network-business model Virtual Private Networking (VPN) is growing Improve corporate communication, CAD?CAM to improve productivity, shorten development cycles Provide Better customer service

Typical Network Design Business Goals Increase revenue and profit Improve corporate communications Shorten product-development cycles Build partnerships Expand into worldwide markets Move to a global-network business model Modernize out-dated technologies

Identifying the Scope of a Network Design Project New network or a modification, single, set of LANs, a set of WAN or remote-access or the whole enterprise network. USE OSI to specify the types of functionality of new network design. Define scope in terms of segment, LAN, Building network, Campus network, remote access, WAN or enterprise network

Identify a customer’s network applications After determining business goals and scope now time to focus on real reason networks exist: Use a chart of network applications such as Table 1-1 and identify their criticality as extremely, somewhat and not critical

Analyzing Business Constraints Analyze business constraints Politics and Policies - office politics, personnel issues (advocates/opponents), job loss, client's business style, policies regarding protocols, standards, vendors, policies regarding distributed authority for network design and implementation Budgetary and Staffing constraints Scheduling

Business Goals Checklist Use a checklist similar to the one on page 17