Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.

Slides:



Advertisements
Similar presentations
THE BUSINESS PLAN The Business Plan Chp. 5 ITB.
Advertisements

Network Systems Sales LLC
What is it? What is it used for?
Chapter 1 Business Driven Technology
Top-Down Network Design Chapter Fourteen Documenting Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Troubleshooting Accessing the WAN – Chapter 8.
Systems Analysis and Design 9th Edition
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Chapter 2.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Introduction to Network Design. 2 u Increase revenue and profit u Improve corporate communications u Shorten product-development cycles and increase employee.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Chapter 1 Read (again) chapter 1.
CSE 550 Computer Network Design
1 K. Salah Module 1.1: Introduction (cont.) Business Goals and Constraints Analyzing Technical Goals.
Chapter 9: Moving to Design
Chapter 5: Supply Chain Performance Measurement and Financial Analysis
Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Documenting Network Design
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
The days of the corporate lone wolf are over. Stand alone VS. Networks.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 2 Robert D’Andrea 2013 Some slides provide by Priscilla Oppenheimer and used with permission.
Systems Analysis and Design CHAPTER 1
CIS 321—IS Analysis & Design Chapter 4: Analysis— Investigating System Requirements.
Module CC3002 Post Implementation Issues Lecture for Week 1 AY 2013 Spring.
Chapter 14 Enterprise Computing.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
CIS Network Analysis and Design Introduction & Overview Chapter 1 - Analyzing Business Goals and Constraints.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
Creating the Business Plan
1 LAN design- Chapter 1 CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino.
NETE Computer Network Analysis and DesignSlide 1 Documenting Network Design NETE-4635 Computer Network Analysis and Design.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Network Troubleshooting
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Network design Topic 1 Business goals. Agenda Network life cycle Network design process Business goals Scope Constraints.
Chapter 12 The Network Development Life Cycle
Computer Network Architecture Lecture 2: Fundamental of Network.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
The Marketing Plan Chapter 2. Section 2.1: Marketing Planning  Good marketing requires good planning Research your company Study your business environment.
Computer Networks.  Which is the best definition of a circuit switched network?  An electric circuit where the connections get switched based on who.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
What Is Enterprise Computing?
ITEC 275 Computer Networks – Switching, Routing, and WANs
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Discovering Computers 2010: Living in a Digital World Chapter 14
Wide Area Network.
Top-Down Network Design Chapter Fourteen Documenting Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer.
IS3120 Network Communications Infrastructure
IS4550 Security Policies and Implementation
Services in a Converged WAN
Network Troubleshooting
Services in a Converged WAN
Services in a Converged WAN
Chapter-6 Access Network Design.
Presentation transcript:

Top-Down Network Design Chapter One Analyzing Business Goals and Constraints

Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your customer's business goals. covers an important business constraint: workplace politics. a checklist to help you determine if you have addressed the business issues in a network design project

Top-Down Network Design Network design should be a complete process that matches business needs to available technology to deliver a system that will maximize an organization’s success In the LAN area it is more than just buying a few devices In the WAN area it is more than just calling the phone company

Start at the Top Don’t just start connecting the dots Analyze business and technical goals first Explore divisional and group structures to find out who the network serves and where they reside Determine what applications will run on the network and how those applications behave on a network Focus on Layer 7 and above first Layer 8 of the OSI model encompasses office politics, budgets, training, and other human factors.

Layers of the OSI Model Application Presentation Session Transport Network Data Link Physical Layer 1 Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2

Structured Design A focus is placed on understanding data flow, data types, and processes that access or change the data. A focus is placed on understanding the location and needs of user communities that access or change data and processes. Several techniques and models can be used to characterize the existing system, new user requirements, and a structure for the future system. A logical model is developed before the physical model. The logical model represents the basic building blocks, divided by function, and the structure of the system. The physical model represents devices and specific technologies and implementations.

Systems Development Life Cycles Typical systems are developed and continue to exist over a period of time, often called a systems development life cycle (SDLC) It is important to realize that most systems, including network systems, follow a cyclical set of phases, where the system is planned, created, tested, and optimized.

Top-Down Network Design Steps Analyze requirements Monitor and optimize network performance Develop logical design Develop physical design Implement and test network Test, optimize, and document design

Network Design Steps Phase 1 – Analyze Requirements Analyze business goals and constraints Analyze technical goals and tradeoffs Characterize the existing network Characterize network traffic

Network Design Steps Phase 2 – Logical Network Design Design a network topology Design models for addressing and naming Select switching and routing protocols Develop network security strategies Develop network management strategies

Network Design Steps Phase 3 – Physical Network Design Select technologies and devices for campus networks Select technologies and devices for enterprise networks

Network Design Steps Phase 4 – Testing, Optimizing, and Documenting the Network Design Test the network design Optimize the network design Document the network design

The PDIOO Network Life Cycle Plan Design Retire Optimize Implement Operate

Business Goals Increase revenue Reduce operating costs Improve communications Shorten product development cycle Expand into worldwide markets Build partnerships with other companies Offer better customer support or new customer services

Recent Business Priorities Mobility Security Resiliency (fault tolerance) Business continuity after a disaster Network projects must be prioritized based on fiscal goals Networks must offer the low delay required for real-time applications such as VoIP Resiliency means how much stress a network can handle and how quickly the network can rebound from problems, including security breaches, natural and unnatural disasters, human error, and catastrophic software or hardware failures. Some experts, including Howard Berkowitz, have a mild dislike of the word “resiliency” as it sounds too much like a stretched rubber band or a trampoline. As Berkowitz says in his excellent book, WAN Survival Guide (Wiley 2001), “I avoid designing networks that stretch too far, bounce up and down, or oscillate between normal and backup states.” So he likes “fault tolerance,” but he points out that it does not mean “immune to any conceivable threat.” Berkowitz states that, “A sufficient quantity of explosives can overcome the tolerance of any network.” :-)

Business Constraints Budget Staffing Schedule Politics and policies

Collect Information Before the First Meeting Before meeting with the client, whether internal or external, collect some basic business-related information Such as Products produced/Services supplied Financial viability Customers, suppliers, competitors Competitive advantage

Meet With the Customer Try to get A concise statement of the goals of the project What problem are they trying to solve? How will new technology help them be more successful in their business? What must happen for the project to succeed?

Meet With the Customer What will happen if the project is a failure? Is this a critical business function? Is this project visible to upper management? Who’s on your side?

Meet With the Customer Discover any biases For example Will they only use certain company’s products? Do they avoid certain technologies? Do the data people look down on the voice people or vice versa? Talk to the technical and management staff

Meet With the Customer Get a copy of the organization chart This will show the general structure of the organization It will suggest users to account for It will suggest geographical locations to account for

Meet With the Customer Get a copy of the security policy How does the policy affect the new design? How does the new design affect the policy? Is the policy so strict that you (the network designer) won’t be able to do your job? Start cataloging network assets that security should protect Hardware, software, applications, and data Less obvious, but still important, intellectual property, trade secrets, and a company's reputation

The Scope of the Design Project Small in scope? Allow sales people to access network via a VPN Large in scope? An entire redesign of an enterprise network Use the OSI model to clarify the scope New financial reporting application versus new routing protocol versus new data link (wireless, for example) Does the scope fit the budget, capabilities of staff and consultants, schedule?

Gather More Detailed Information Applications Now and after the project is completed Include both productivity applications and system management applications User communities Data stores Protocols Current logical and physical architecture Current performance User communities, data stores, protocols, and the current architecture and performance will be discussed in the next few chapters. This chapter focuses on business needs and applications, which should be the first area of research in a top-down network design project. Network design is iterative, however, so many topics are addressed more than once as the designer gathers more detailed information and conducts more precise planning. So, gaining a general understanding of the size and location of user communities, for example, might be appropriate at this stage of the design project, but user communities should be investigated again when characterizing network traffic.

Network Applications Name of Application Type of Application New Application? Criticality Comments

Summary Systematic approach Focus first on business requirements and constraints, and applications Gain an understanding of the customer’s corporate structure Gain an understanding of the customer’s business style