SlideShare a Scribd company logo
1 of 38
NETWORK
DESIGN & ANALYSIS
Dr. Liyth Nissirat
REQUIREMENTS ANALYSIS: CONCEPTS
REQUIREMENTS ANALYSIS: CONCEPTS
• USER REQUIREMENTS
• APPLICATION REQUIREMENTS
• DEVICE REQUIREMENTS
• NETWORK REQUIREMENTS
• OTHER REQUIREMENTS
• THE REQUIREMENTS SPECIFICATION AND MAP
USER REQUIREMENTS
USER REQUIREMENTS
REQUIREMENTS ANALYSIS: CONCEPTS
• USER REQUIREMENTS
• APPLICATION REQUIREMENTS
• DEVICE REQUIREMENTS
• NETWORK REQUIREMENTS
• OTHER REQUIREMENTS
• THE REQUIREMENTS SPECIFICATION AND MAP
APPLICATION REQUIREMENTS
• APPLICATION TYPES
• APPLICATION GROUPS
• APPLICATION LOCATIONS
APPLICATION TYPES
BASED ON SERVICE AND PERFORMANCE REQUIREMENTS, WE TYPE APPLICATIONS
AS MISSION-CRITICAL, RATE-CRITICAL, OR REAL-TIME/INTERACTIVE, WHERE
• MISSION-CRITICAL APPLICATIONS HAVE PREDICTABLE, GUARANTEED, AND/OR HIGH
PERFORMANCE RMA REQUIREMENTS
• RATE-CRITICAL APPLICATIONS HAVE PREDICTABLE, GUARANTEED, AND/OR HIGH-
PERFORMANCE CAPACITY REQUIREMENTS
• REAL-TIME AND INTERACTIVE APPLICATIONS HAVE PREDICTABLE, GUARANTEED,
AND/OR HIGH PERFORMANCE DELAY REQUIREMENTS
APPLICATION TYPES
RELIABILITY, MAINTAINABILITY, AVAILABILITY
(RMA)
A loss of any part of RMA in some applications may be serious or disastrous, such
as:
• Loss of revenue or customers. examples include applications that handle
lots of transactions and money, such as investment banking, airline
reservation, or credit card processing applications.
• Unrecoverable information or situation. telemetry processing and
teleconferencing applications are good examples of this type of reliability.
• Loss of sensitive data. examples include customer id/billing and intelligence
gathering applications.
• Loss of life. examples include transportation or health-care monitoring
applications.
APPLICATION TYPES
CAPACITY
• There are some applications that require a predictable, bounded, or high degree
of capacity. such applications, termed here rate-critical applications, include
voice, non-buffered video, and some “tele∗service” applications.
• Rate-critical applications may require thresholds, limits, or guarantees on
minimum, peak, and/or sustained capacities.
• In file transfer (such as in ftp running over TCP), the application receives
whatever capacity is available from the network, based on the state of the
network at that time as well as interactions between TCP and the lower layers.
APPLICATION TYPES
DELAY
APPLICATION GROUPS
• Telemetry/Command-and-control Applications.
• Visualization Applications.
• Distributed-computing Applications.
• Web Development, Access, And Use Applications.
• Bulk Data Transport Applications.
• Tele∗Service Applications.
• Operations, Administration, Maintenance, And Provisioning (Oam&p)
Applications.
• Client–Server Applications.
APPLICATION LOCATIONS
REQUIREMENTS ANALYSIS: CONCEPTS
• USER REQUIREMENTS
• APPLICATION REQUIREMENTS
• DEVICE REQUIREMENTS
• NETWORK REQUIREMENTS
• OTHER REQUIREMENTS
• THE REQUIREMENTS SPECIFICATION AND MAP
DEVICE REQUIREMENTS
• DEVICE TYPES
• PERFORMANCE CHARACTERISTICS
• DEVICE LOCATIONS
DEVICE TYPES
DEVICE TYPES
PERFORMANCE CHARACTERISTICS
PERFORMANCE CHARACTERISTICS
• Storage performance, that is, flash, disk-drive, or tape performance
• Processor (CPU) performance
• Memory performance (access times)
• Bus performance (bus capacity and arbitration efficiency)
• OS performance (effectiveness of the protocol stack and APIs, e.g., the number
of memory copies in the protocol stack, or the cost of execution of a given OS
on a particular processor)
• Device driver performance
DEVICE LOCATIONS
REQUIREMENTS ANALYSIS: CONCEPTS
• USER REQUIREMENTS
• APPLICATION REQUIREMENTS
• DEVICE REQUIREMENTS
• NETWORK REQUIREMENTS
• OTHER REQUIREMENTS
• THE REQUIREMENTS SPECIFICATION AND MAP
NETWORK REQUIREMENTS
• EXISTING NETWORKS AND MIGRATION
• NETWORK MANAGEMENT AND SECURITY
EXISTING NETWORKS AND MIGRATION
• Scaling dependencies
• Location dependencies
• Performance constraints
• Network, system, and support service dependencies
• Interoperability dependencies
• Network obsolescence
NETWORK MANAGEMENT AND SECURITY
There are four categories of network management tasks:
• Monitoring for event notification
• Monitoring for metrics and planning
• Network configuration
• Troubleshooting
NETWORK MANAGEMENT AND SECURITY
Network management requirements
• Monitoring methods
• Instrumentation methods. these include the network management protocols
(SNMPV3, CMIP, RMON), parameter lists (MIBS), monitoring tools, and access
methods
• Sets of characteristics for monitoring
• In-band versus out-of-band monitoring
• Centralized versus distributed monitoring
• Performance requirements
NETWORK MANAGEMENT AND SECURITY
REQUIREMENTS ANALYSIS: CONCEPTS
• USER REQUIREMENTS
• APPLICATION REQUIREMENTS
• DEVICE REQUIREMENTS
• NETWORK REQUIREMENTS
• OTHER REQUIREMENTS
• THE REQUIREMENTS SPECIFICATION AND MAP
OTHER REQUIREMENTS
• SUPPLEMENTAL PERFORMANCE REQUIREMENTS
• FINANCIAL REQUIREMENTS
• ENTERPRISE REQUIREMENTS
SUPPLEMENTAL PERFORMANCE
REQUIREMENTS
• Three characteristics of performance that reflect the customer’s impact on our
network design are operational suitability, supportability, and confidence.
• Operational suitability is a measure of how well our network design can be
configured, monitored, and adjusted by the customer’s operators.
• Supportability is a measure of how well the customer can keep the system
performing, as designed, over the entire life of the system.
• Confidence is a measure of the ability of the network to deliver data without
error or loss at the required throughput.
FINANCIAL REQUIREMENTS
• Funding is often bounded by an overall cost limit, consisting of both one-time
and recurring components.
• One-time costs are based on the actual planning and construction of the
network and consist of network architecture, design, procurement, deployment,
integration, and testing, and all hardware/software components, as well as the
initial installation or establishment of any services from service providers.
• Recurring costs are for tasks and items that are expected to occur or be
replaced/upgraded on a periodic basis.
ENTERPRISE REQUIREMENTS
• There may be times when you have to consider requirements for the network
that are commonly considered to be enterprise requirements, such as phone,
fax, voice, and video.
• The integration of these types of requirements over the same transmission
infrastructure as data is becoming common, and such enterprise requirements
need to be considered as part of the overall requirements for the network.
REQUIREMENTS ANALYSIS: CONCEPTS
• USER REQUIREMENTS
• APPLICATION REQUIREMENTS
• DEVICE REQUIREMENTS
• NETWORK REQUIREMENTS
• OTHER REQUIREMENTS
• THE REQUIREMENTS SPECIFICATION AND MAP
THE REQUIREMENTS SPECIFICATION AND MAP
THE REQUIREMENTS SPECIFICATION AND MAP
THE REQUIREMENTS SPECIFICATION AND MAP
THE REQUIREMENTS SPECIFICATION AND MAP
THE REQUIREMENTS SPECIFICATION AND MAP
THANK YOU

More Related Content

Similar to network design 3.pptx

Профессиональные сервисы для Центров Обработки Данных
Профессиональные сервисы для Центров Обработки Данных Профессиональные сервисы для Центров Обработки Данных
Профессиональные сервисы для Центров Обработки Данных TERMILAB. Интернет - лаборатория
 
How to Ensure Business Continuity in the Cloud
How to Ensure Business Continuity in the Cloud How to Ensure Business Continuity in the Cloud
How to Ensure Business Continuity in the Cloud Uni Systems S.M.S.A.
 
How to ensure Business Continuity in the Cloud
How to ensure Business Continuity in the CloudHow to ensure Business Continuity in the Cloud
How to ensure Business Continuity in the CloudUni Systems S.M.S.A.
 
performancetestinganoverview-110206071921-phpapp02.pdf
performancetestinganoverview-110206071921-phpapp02.pdfperformancetestinganoverview-110206071921-phpapp02.pdf
performancetestinganoverview-110206071921-phpapp02.pdfMAshok10
 
Large Financial Services Company Reduces Deployment Time by 75%
Large Financial Services Company Reduces Deployment Time by 75%Large Financial Services Company Reduces Deployment Time by 75%
Large Financial Services Company Reduces Deployment Time by 75%AppViewX
 
Business analyst| Murex training at Analyst360
Business analyst| Murex training at Analyst360Business analyst| Murex training at Analyst360
Business analyst| Murex training at Analyst360Analyst Murex training
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computingnewbie2019
 
Hi600 u08_inst_slides
Hi600 u08_inst_slidesHi600 u08_inst_slides
Hi600 u08_inst_slidesljmcneill33
 
Post-Mainframe Managed Services
Post-Mainframe Managed ServicesPost-Mainframe Managed Services
Post-Mainframe Managed ServicesModern Systems
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...DineshKumar746335
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
Se lect9 btech
Se lect9 btechSe lect9 btech
Se lect9 btechIIITA
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkDellNMS
 
Un it 2-se-mod-staff
Un it 2-se-mod-staffUn it 2-se-mod-staff
Un it 2-se-mod-staffvijisvs2012
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysiscsk selva
 

Similar to network design 3.pptx (20)

Профессиональные сервисы для Центров Обработки Данных
Профессиональные сервисы для Центров Обработки Данных Профессиональные сервисы для Центров Обработки Данных
Профессиональные сервисы для Центров Обработки Данных
 
How to Ensure Business Continuity in the Cloud
How to Ensure Business Continuity in the Cloud How to Ensure Business Continuity in the Cloud
How to Ensure Business Continuity in the Cloud
 
How to ensure Business Continuity in the Cloud
How to ensure Business Continuity in the CloudHow to ensure Business Continuity in the Cloud
How to ensure Business Continuity in the Cloud
 
performancetestinganoverview-110206071921-phpapp02.pdf
performancetestinganoverview-110206071921-phpapp02.pdfperformancetestinganoverview-110206071921-phpapp02.pdf
performancetestinganoverview-110206071921-phpapp02.pdf
 
Large Financial Services Company Reduces Deployment Time by 75%
Large Financial Services Company Reduces Deployment Time by 75%Large Financial Services Company Reduces Deployment Time by 75%
Large Financial Services Company Reduces Deployment Time by 75%
 
Analyst360 2
Analyst360 2Analyst360 2
Analyst360 2
 
Business analyst| Murex training at Analyst360
Business analyst| Murex training at Analyst360Business analyst| Murex training at Analyst360
Business analyst| Murex training at Analyst360
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computing
 
Hi600 u08_inst_slides
Hi600 u08_inst_slidesHi600 u08_inst_slides
Hi600 u08_inst_slides
 
HCL- Network Build
HCL- Network BuildHCL- Network Build
HCL- Network Build
 
Post-Mainframe Managed Services
Post-Mainframe Managed ServicesPost-Mainframe Managed Services
Post-Mainframe Managed Services
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
 
sla nptl.pptx
sla nptl.pptxsla nptl.pptx
sla nptl.pptx
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Se lect9 btech
Se lect9 btechSe lect9 btech
Se lect9 btech
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
RESUME16
RESUME16RESUME16
RESUME16
 
Un it 2-se-mod-staff
Un it 2-se-mod-staffUn it 2-se-mod-staff
Un it 2-se-mod-staff
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 

More from aida alsamawi

Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxaida alsamawi
 
Lecture 2 Part II Physical Layer Fundamentals.pptx
Lecture 2 Part II Physical Layer Fundamentals.pptxLecture 2 Part II Physical Layer Fundamentals.pptx
Lecture 2 Part II Physical Layer Fundamentals.pptxaida alsamawi
 
network design 2.pptx
network design 2.pptxnetwork design 2.pptx
network design 2.pptxaida alsamawi
 
network design 5.pptx
network design 5.pptxnetwork design 5.pptx
network design 5.pptxaida alsamawi
 
network design 6.pptx
network design 6.pptxnetwork design 6.pptx
network design 6.pptxaida alsamawi
 
network design 8.pptx
network design 8.pptxnetwork design 8.pptx
network design 8.pptxaida alsamawi
 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptxaida alsamawi
 

More from aida alsamawi (7)

Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptx
 
Lecture 2 Part II Physical Layer Fundamentals.pptx
Lecture 2 Part II Physical Layer Fundamentals.pptxLecture 2 Part II Physical Layer Fundamentals.pptx
Lecture 2 Part II Physical Layer Fundamentals.pptx
 
network design 2.pptx
network design 2.pptxnetwork design 2.pptx
network design 2.pptx
 
network design 5.pptx
network design 5.pptxnetwork design 5.pptx
network design 5.pptx
 
network design 6.pptx
network design 6.pptxnetwork design 6.pptx
network design 6.pptx
 
network design 8.pptx
network design 8.pptxnetwork design 8.pptx
network design 8.pptx
 
network design 7.pptx
network design 7.pptxnetwork design 7.pptx
network design 7.pptx
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Recently uploaded (20)

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

network design 3.pptx

  • 3. REQUIREMENTS ANALYSIS: CONCEPTS • USER REQUIREMENTS • APPLICATION REQUIREMENTS • DEVICE REQUIREMENTS • NETWORK REQUIREMENTS • OTHER REQUIREMENTS • THE REQUIREMENTS SPECIFICATION AND MAP
  • 6. REQUIREMENTS ANALYSIS: CONCEPTS • USER REQUIREMENTS • APPLICATION REQUIREMENTS • DEVICE REQUIREMENTS • NETWORK REQUIREMENTS • OTHER REQUIREMENTS • THE REQUIREMENTS SPECIFICATION AND MAP
  • 7. APPLICATION REQUIREMENTS • APPLICATION TYPES • APPLICATION GROUPS • APPLICATION LOCATIONS
  • 8. APPLICATION TYPES BASED ON SERVICE AND PERFORMANCE REQUIREMENTS, WE TYPE APPLICATIONS AS MISSION-CRITICAL, RATE-CRITICAL, OR REAL-TIME/INTERACTIVE, WHERE • MISSION-CRITICAL APPLICATIONS HAVE PREDICTABLE, GUARANTEED, AND/OR HIGH PERFORMANCE RMA REQUIREMENTS • RATE-CRITICAL APPLICATIONS HAVE PREDICTABLE, GUARANTEED, AND/OR HIGH- PERFORMANCE CAPACITY REQUIREMENTS • REAL-TIME AND INTERACTIVE APPLICATIONS HAVE PREDICTABLE, GUARANTEED, AND/OR HIGH PERFORMANCE DELAY REQUIREMENTS
  • 9. APPLICATION TYPES RELIABILITY, MAINTAINABILITY, AVAILABILITY (RMA) A loss of any part of RMA in some applications may be serious or disastrous, such as: • Loss of revenue or customers. examples include applications that handle lots of transactions and money, such as investment banking, airline reservation, or credit card processing applications. • Unrecoverable information or situation. telemetry processing and teleconferencing applications are good examples of this type of reliability. • Loss of sensitive data. examples include customer id/billing and intelligence gathering applications. • Loss of life. examples include transportation or health-care monitoring applications.
  • 10. APPLICATION TYPES CAPACITY • There are some applications that require a predictable, bounded, or high degree of capacity. such applications, termed here rate-critical applications, include voice, non-buffered video, and some “tele∗service” applications. • Rate-critical applications may require thresholds, limits, or guarantees on minimum, peak, and/or sustained capacities. • In file transfer (such as in ftp running over TCP), the application receives whatever capacity is available from the network, based on the state of the network at that time as well as interactions between TCP and the lower layers.
  • 12. APPLICATION GROUPS • Telemetry/Command-and-control Applications. • Visualization Applications. • Distributed-computing Applications. • Web Development, Access, And Use Applications. • Bulk Data Transport Applications. • Tele∗Service Applications. • Operations, Administration, Maintenance, And Provisioning (Oam&p) Applications. • Client–Server Applications.
  • 14. REQUIREMENTS ANALYSIS: CONCEPTS • USER REQUIREMENTS • APPLICATION REQUIREMENTS • DEVICE REQUIREMENTS • NETWORK REQUIREMENTS • OTHER REQUIREMENTS • THE REQUIREMENTS SPECIFICATION AND MAP
  • 15. DEVICE REQUIREMENTS • DEVICE TYPES • PERFORMANCE CHARACTERISTICS • DEVICE LOCATIONS
  • 19. PERFORMANCE CHARACTERISTICS • Storage performance, that is, flash, disk-drive, or tape performance • Processor (CPU) performance • Memory performance (access times) • Bus performance (bus capacity and arbitration efficiency) • OS performance (effectiveness of the protocol stack and APIs, e.g., the number of memory copies in the protocol stack, or the cost of execution of a given OS on a particular processor) • Device driver performance
  • 21. REQUIREMENTS ANALYSIS: CONCEPTS • USER REQUIREMENTS • APPLICATION REQUIREMENTS • DEVICE REQUIREMENTS • NETWORK REQUIREMENTS • OTHER REQUIREMENTS • THE REQUIREMENTS SPECIFICATION AND MAP
  • 22. NETWORK REQUIREMENTS • EXISTING NETWORKS AND MIGRATION • NETWORK MANAGEMENT AND SECURITY
  • 23. EXISTING NETWORKS AND MIGRATION • Scaling dependencies • Location dependencies • Performance constraints • Network, system, and support service dependencies • Interoperability dependencies • Network obsolescence
  • 24. NETWORK MANAGEMENT AND SECURITY There are four categories of network management tasks: • Monitoring for event notification • Monitoring for metrics and planning • Network configuration • Troubleshooting
  • 25. NETWORK MANAGEMENT AND SECURITY Network management requirements • Monitoring methods • Instrumentation methods. these include the network management protocols (SNMPV3, CMIP, RMON), parameter lists (MIBS), monitoring tools, and access methods • Sets of characteristics for monitoring • In-band versus out-of-band monitoring • Centralized versus distributed monitoring • Performance requirements
  • 27. REQUIREMENTS ANALYSIS: CONCEPTS • USER REQUIREMENTS • APPLICATION REQUIREMENTS • DEVICE REQUIREMENTS • NETWORK REQUIREMENTS • OTHER REQUIREMENTS • THE REQUIREMENTS SPECIFICATION AND MAP
  • 28. OTHER REQUIREMENTS • SUPPLEMENTAL PERFORMANCE REQUIREMENTS • FINANCIAL REQUIREMENTS • ENTERPRISE REQUIREMENTS
  • 29. SUPPLEMENTAL PERFORMANCE REQUIREMENTS • Three characteristics of performance that reflect the customer’s impact on our network design are operational suitability, supportability, and confidence. • Operational suitability is a measure of how well our network design can be configured, monitored, and adjusted by the customer’s operators. • Supportability is a measure of how well the customer can keep the system performing, as designed, over the entire life of the system. • Confidence is a measure of the ability of the network to deliver data without error or loss at the required throughput.
  • 30. FINANCIAL REQUIREMENTS • Funding is often bounded by an overall cost limit, consisting of both one-time and recurring components. • One-time costs are based on the actual planning and construction of the network and consist of network architecture, design, procurement, deployment, integration, and testing, and all hardware/software components, as well as the initial installation or establishment of any services from service providers. • Recurring costs are for tasks and items that are expected to occur or be replaced/upgraded on a periodic basis.
  • 31. ENTERPRISE REQUIREMENTS • There may be times when you have to consider requirements for the network that are commonly considered to be enterprise requirements, such as phone, fax, voice, and video. • The integration of these types of requirements over the same transmission infrastructure as data is becoming common, and such enterprise requirements need to be considered as part of the overall requirements for the network.
  • 32. REQUIREMENTS ANALYSIS: CONCEPTS • USER REQUIREMENTS • APPLICATION REQUIREMENTS • DEVICE REQUIREMENTS • NETWORK REQUIREMENTS • OTHER REQUIREMENTS • THE REQUIREMENTS SPECIFICATION AND MAP