SlideShare a Scribd company logo
1 of 34
DESIGN AND MANAGEMENT OF COMPUTER 
NETWORKS 
Presented By 
CSK 
@ oxford 
engineering 
college - Trichy 
APPLICATION 
REQUIREMENTS
Types of requirement analysis 
ī‚§ User 
ī‚§ Application 
ī‚§ Device 
ī‚§ Network 
ī‚§ Other
Application Requirements 
ī‚§ Application requirements are requirements 
that are determined from application 
information, experience, or testing, and 
represent what is needed by applications. 
ī‚§ Application requirements are more technical 
than user requirements but may still be 
subjective.
Application requirement 
ī‚§ network applications based on human 
factors and technology attributes. 
ī‚§ The first term, human factors, addresses 
human perception of different kinds of 
media, such as conventional text, audio and 
video. 
ī‚§ The second term, technology attributes, 
represents the different technological aspects 
of these network applications, such as data 
processing applications, web applications, 
system applications(CPU, Memory(storage)) .
Example Application requirement 
ī‚§ Application requests (for example, web page 
requests) 
ī‚§ Database transactions (for example, data 
queries or updates) 
ī‚§ Messaging protocols (for example, putting a 
message on the queue) 
ī‚§ Authentication service (for example, 
encryption, decryption, login purpose) 
ī‚§ API calls (for example, restful interface calls)
Application system
Application system 
ī‚§ Tier 1:Web server: used to distribute requests to 
one or more application servers. This web server 
has load balancing capabilities and constitutes 
the web tier. 
ī‚§ Tier 2: Application server: used to host the e-commerce 
application. These servers constitute 
the application tier. 
ī‚§ Tier 3:Database server: used to store the 
application's data. This server resides at the 
database tier
Types of application 
requirements
Application Types 
â€ē Based on service and performance requirements, 
applications were type as: 
mission-critical īƒ  RMA 
rate-critical īƒ  CAPACITY, or 
real-time/interactiveīƒ  DELAY 
These application types are described by their 
requirements and service metrics.
Application Types 
A loss of any part of RMA in such applications 
may be serious or disastrous, such as: 
â€ē Loss of revenue/profit or customers. 
â€ē Un-recoverable information or situation. 
â€ē Loss of sensitive data. 
â€ē Loss of life / business . 
In terms of capacity, there are some applications 
that require a predictable/guessable, bounded/ 
limited, or high degree of capacity include voice 
and non-buffered video.
Application Types 
ī‚§ Delay: It can take a long time for a packet to 
be delivered across the networks. 
ī‚§ From an application service perspective, 
īƒē optimizing the total, 
īƒē end-to-end(source to destination), or 
īƒē round-trip(cycle) delay is usually the most 
important things.
Applications Groups 
It is often useful to group applications with similar performance 
characteristics.(nokia, samsung,micromax) 
Application can be identified using the requirements analysis 
process. 
â€ē Telemetry Applications(wireless : radio, ultrasonic, or infrared, blue-tooth 
systems) 
â€ē Visualization Applications: computer graphics.: 2D,3D 
â€ē Distributed Applications: software that is executed or run on multiple 
computers within a network.(middleware / SOA platform) 
â€ē Web, Access and Use Applications(php/ mysql) 
â€ē Operations(Logical / arithmetic), Administration and 
Maintenance.
Application Locations 
to determine where application applies in an 
environment. 
This will help in mapping traffic flows during the 
flow analysis process. 
Application types, their performance 
requirements, their locations, and application 
groups form the interface between the 
application component and the rest of the 
system.
ī‚§ Device : piece of equipment that has been 
made for some special purpose.
Device Requirements
Device Requirements
Device Type 
ī‚§ Devices can be grouped into three categories: 
īƒē generic computing devices: (laptop , mobile phone), 
their requirements are important from an end-to-end 
perspective, 
īƒē they provide the interface between applications and 
the network. 
īƒē Servers(windows/unix ): have an impact on the traffic 
flows within the system. 
īƒē specialized devices(wireless) : (blue-tooth/IR/ blue 
tooth headset) are devices that provide specific 
functions to their users.
Performance Characteristics 
īƒē For many environments, it may be difficult to 
determine or measure the performance 
characteristics of its devices. 
īƒē Note that device problems frequently are 
misinterpreted as network problems. 
īƒē Understanding at the device component level can 
help you recognize such bottlenecks/problems 
early in the analysis process.
Device Locations 
īƒē Location information helps to determine the 
relationships among components of the system. 
īƒē Location information also helps to determine the 
traffic flow characteristics for the system. 
īƒē The interface between the device component and 
the rest of the system consists of the types of 
devices, their location dependencies, and their 
performance characteristics.
Network requirements 
ī‚§ Network : interconnected systems. 
ī‚§ Components of a computer network: 
ī‚§ Hosts : (PCs, laptops, handhelds) 
ī‚§ routers & switches : (IP router, Ethernet switch) 
ī‚§ links : (wired, wireless) 
ī‚§ Protocols : (IP, TCP, CSMA/CD, CSMA/CA) 
ī‚§ Applications: (network services) 
ī‚§ humans and service agents
Network Requirements
Existing & Migration / populate 
ī‚§ Most network architectures/designs today 
need to incorporate existing networks. 
ī‚§ This includes 
īƒē system upgrades, 
īƒē migrating (move from one part of something to 
another part)to a new or different technology or 
īƒē protocol, or upgrading network infrastructure.
Existing & Migration / populate 
īƒē Sometimes the network architecture and design 
must accommodate any dependencies and 
constraints imposed by the existing network. 
ī‚§ Examples include the following: 
īƒē Scaling dependencies. How will new network 
change the size and scope of the system? or will 
the change be within the LAN/MAN/WAN 
boundaries of the existing network?
Location dependencies 
. 
īƒē Based on the two – ways 
ī‚  Performance constraints: 
ī‚  Performance constraints:
Location dependencies 
īƒē Performance constraints: 
īƒē Existing network performance characteristics 
should be integrated into the performance 
requirements of the planned network. 
īƒē Network, system, and support service dependencies. 
īƒē Features : 
ī‚  includes network addressing strategies, security, 
choices and configurations of routing protocols, and 
naming strategies.
Location dependencies 
īƒē Interoperability dependencies: 
īƒē The boundaries between existing and planned 
networks are points where service information 
and performance guarantees need to be 
translated. 
īƒē Network obsolescence/ old model. Whenever 
possible, it should be noted that parts of the 
network will need to be transitioned out of the 
planned network.
Network Management & Security 
ī‚§ There are four categories of network 
management tasks: 
īƒē Monitoring for event notification 
īƒē Monitoring for metrics and planning 
īƒē Network configuration 
īƒē Troubleshooting
List of some potential network 
management requirements: 
īƒē Monitoring methods 
īƒē Instrumentation methods. 
īƒē These include the network management protocols 
(SNMPv3, CMIP, RMON), parameter lists (MIBs), 
monitoring tools, and access methods. 
īƒē Sets of characteristics for monitoring. 
īƒē Centralized versus distributed monitoring. 
īƒē Performance requirements.
List of some potential(risk) 
network management 
requirements: 
īƒē it is also need to be determined a security risks by 
performing a risk analysis for both the existing 
network and planned network. 
īƒē Security requirements and the results of the risk 
analysis are used to develop a security plan and 
define security policies for the network.
THANK YOU

More Related Content

What's hot

M03 2 Behavioral Diagrams
M03 2 Behavioral DiagramsM03 2 Behavioral Diagrams
M03 2 Behavioral Diagrams
Dang Tuan
 
Subnet questions with ans(networking)
Subnet questions with ans(networking)Subnet questions with ans(networking)
Subnet questions with ans(networking)
welcometofacebook
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web Architecture
Chamnap Chhorn
 
Adsl, adsl2, adsl2+ etc
Adsl, adsl2, adsl2+ etcAdsl, adsl2, adsl2+ etc
Adsl, adsl2, adsl2+ etc
Prince Mehra
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
AbDul ThaYyal
 

What's hot (20)

Active browser web page
Active browser web pageActive browser web page
Active browser web page
 
Bandwidth utilization
Bandwidth utilizationBandwidth utilization
Bandwidth utilization
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
M03 2 Behavioral Diagrams
M03 2 Behavioral DiagramsM03 2 Behavioral Diagrams
M03 2 Behavioral Diagrams
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Kirtesh Khandelwal,Project on HTML and CSS ,Final Year BCA , Dezyne E'cole Co...
Kirtesh Khandelwal,Project on HTML and CSS ,Final Year BCA , Dezyne E'cole Co...Kirtesh Khandelwal,Project on HTML and CSS ,Final Year BCA , Dezyne E'cole Co...
Kirtesh Khandelwal,Project on HTML and CSS ,Final Year BCA , Dezyne E'cole Co...
 
Classless subnetting
Classless subnettingClassless subnetting
Classless subnetting
 
Subnet questions with ans(networking)
Subnet questions with ans(networking)Subnet questions with ans(networking)
Subnet questions with ans(networking)
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web Architecture
 
Transport services
Transport servicesTransport services
Transport services
 
Adsl, adsl2, adsl2+ etc
Adsl, adsl2, adsl2+ etcAdsl, adsl2, adsl2+ etc
Adsl, adsl2, adsl2+ etc
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
10 floor-office-building-network-design
10 floor-office-building-network-design10 floor-office-building-network-design
10 floor-office-building-network-design
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Unit -1 Circuit Switch and Data gram Switch
Unit -1 Circuit Switch and Data gram SwitchUnit -1 Circuit Switch and Data gram Switch
Unit -1 Circuit Switch and Data gram Switch
 

Viewers also liked

Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
Steven Cahill
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
hunni123
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
Steven Cahill
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
hapy
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
hapy
 
Sample Business Requirement Document
Sample Business Requirement DocumentSample Business Requirement Document
Sample Business Requirement Document
Isabel Elaine Leong
 
Sample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library BlogSample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library Blog
ALATechSource
 
arithmetic logic unit
arithmetic logic unitarithmetic logic unit
arithmetic logic unit
Shimak Sharook
 

Viewers also liked (20)

Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 
Network design
Network designNetwork design
Network design
 
Sample Business Requirement Document
Sample Business Requirement DocumentSample Business Requirement Document
Sample Business Requirement Document
 
Sample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library BlogSample Project Requirements Document – Library Blog
Sample Project Requirements Document – Library Blog
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysis
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
08 (IDNOG02) SP Transition to NG Infrastructure based on NFV Service Offering...
08 (IDNOG02) SP Transition to NG Infrastructure based on NFV Service Offering...08 (IDNOG02) SP Transition to NG Infrastructure based on NFV Service Offering...
08 (IDNOG02) SP Transition to NG Infrastructure based on NFV Service Offering...
 
What Healthcare Can Teach The Enterprise
What Healthcare Can Teach The EnterpriseWhat Healthcare Can Teach The Enterprise
What Healthcare Can Teach The Enterprise
 
GUI Testing
GUI TestingGUI Testing
GUI Testing
 
Week 12 mixed methods
Week 12   mixed methodsWeek 12   mixed methods
Week 12 mixed methods
 
Windows 98
Windows 98Windows 98
Windows 98
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
Design of network
Design of networkDesign of network
Design of network
 
arithmetic logic unit
arithmetic logic unitarithmetic logic unit
arithmetic logic unit
 

Similar to Requirment anlaysis , application, device, network requirements

NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
Javier Guillermo, MBA, MSc, PMP
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
Anwar Kamal
 
Yongsan presentation 2
Yongsan presentation 2Yongsan presentation 2
Yongsan presentation 2
GovCloud Network
 
IntroToMEC.pptx
IntroToMEC.pptxIntroToMEC.pptx
IntroToMEC.pptx
AliArsal5
 
A3: application-aware acceleration for wireless data networks
A3: application-aware acceleration for wireless data networksA3: application-aware acceleration for wireless data networks
A3: application-aware acceleration for wireless data networks
Zhenyun Zhuang
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
Rick Kingsley
 

Similar to Requirment anlaysis , application, device, network requirements (20)

Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...service methodology, service description, service characteristics, performanc...
service methodology, service description, service characteristics, performanc...
 
Other requirements, requirement specification and map
Other requirements, requirement specification and mapOther requirements, requirement specification and map
Other requirements, requirement specification and map
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
Yongsan presentation 2
Yongsan presentation 2Yongsan presentation 2
Yongsan presentation 2
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
Software architecture unit 4
Software architecture unit 4Software architecture unit 4
Software architecture unit 4
 
IntroToMEC.pptx
IntroToMEC.pptxIntroToMEC.pptx
IntroToMEC.pptx
 
lec-01-WP.pdf
lec-01-WP.pdflec-01-WP.pdf
lec-01-WP.pdf
 
Flow analysis overview
Flow analysis overviewFlow analysis overview
Flow analysis overview
 
Infrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructureInfrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructure
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
A3: application-aware acceleration for wireless data networks
A3: application-aware acceleration for wireless data networksA3: application-aware acceleration for wireless data networks
A3: application-aware acceleration for wireless data networks
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
Chapter 1 v n.2
Chapter 1 v n.2Chapter 1 v n.2
Chapter 1 v n.2
 

More from csk selva

More from csk selva (15)

Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Identifying and developing flows modified
Identifying and developing flows modifiedIdentifying and developing flows modified
Identifying and developing flows modified
 
Flow spec algorithm
Flow spec algorithmFlow spec algorithm
Flow spec algorithm
 
Flow models
Flow modelsFlow models
Flow models
 
Thresholds and limits
Thresholds and limitsThresholds and limits
Thresholds and limits
 
Requirements mapping
Requirements mappingRequirements mapping
Requirements mapping
 
Developing supplemental performance requirements
Developing supplemental performance requirementsDeveloping supplemental performance requirements
Developing supplemental performance requirements
 
Developing service metrics
Developing service metricsDeveloping service metrics
Developing service metrics
 
Developing rma requirements
Developing rma requirementsDeveloping rma requirements
Developing rma requirements
 
Developing requirements specification
Developing requirements specificationDeveloping requirements specification
Developing requirements specification
 
Developing delay requirements
Developing delay requirementsDeveloping delay requirements
Developing delay requirements
 
Developing capacity requirements
Developing capacity requirementsDeveloping capacity requirements
Developing capacity requirements
 
CHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOURCHARACTERIZING BEHAVIOUR
CHARACTERIZING BEHAVIOUR
 
overview of analysis, architecture and design process
overview of analysis, architecture and design processoverview of analysis, architecture and design process
overview of analysis, architecture and design process
 

Recently uploaded

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 

Recently uploaded (20)

Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >āŧ’8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >āŧ’8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >āŧ’8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >āŧ’8448380779 Escort Service
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
AndrÊs Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
AndrÊs Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024AndrÊs Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
AndrÊs Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 

Requirment anlaysis , application, device, network requirements

  • 1. DESIGN AND MANAGEMENT OF COMPUTER NETWORKS Presented By CSK @ oxford engineering college - Trichy APPLICATION REQUIREMENTS
  • 2. Types of requirement analysis ī‚§ User ī‚§ Application ī‚§ Device ī‚§ Network ī‚§ Other
  • 3. Application Requirements ī‚§ Application requirements are requirements that are determined from application information, experience, or testing, and represent what is needed by applications. ī‚§ Application requirements are more technical than user requirements but may still be subjective.
  • 4. Application requirement ī‚§ network applications based on human factors and technology attributes. ī‚§ The first term, human factors, addresses human perception of different kinds of media, such as conventional text, audio and video. ī‚§ The second term, technology attributes, represents the different technological aspects of these network applications, such as data processing applications, web applications, system applications(CPU, Memory(storage)) .
  • 5. Example Application requirement ī‚§ Application requests (for example, web page requests) ī‚§ Database transactions (for example, data queries or updates) ī‚§ Messaging protocols (for example, putting a message on the queue) ī‚§ Authentication service (for example, encryption, decryption, login purpose) ī‚§ API calls (for example, restful interface calls)
  • 7. Application system ī‚§ Tier 1:Web server: used to distribute requests to one or more application servers. This web server has load balancing capabilities and constitutes the web tier. ī‚§ Tier 2: Application server: used to host the e-commerce application. These servers constitute the application tier. ī‚§ Tier 3:Database server: used to store the application's data. This server resides at the database tier
  • 8. Types of application requirements
  • 9. Application Types â€ē Based on service and performance requirements, applications were type as: mission-critical īƒ  RMA rate-critical īƒ  CAPACITY, or real-time/interactiveīƒ  DELAY These application types are described by their requirements and service metrics.
  • 10. Application Types A loss of any part of RMA in such applications may be serious or disastrous, such as: â€ē Loss of revenue/profit or customers. â€ē Un-recoverable information or situation. â€ē Loss of sensitive data. â€ē Loss of life / business . In terms of capacity, there are some applications that require a predictable/guessable, bounded/ limited, or high degree of capacity include voice and non-buffered video.
  • 11. Application Types ī‚§ Delay: It can take a long time for a packet to be delivered across the networks. ī‚§ From an application service perspective, īƒē optimizing the total, īƒē end-to-end(source to destination), or īƒē round-trip(cycle) delay is usually the most important things.
  • 12. Applications Groups It is often useful to group applications with similar performance characteristics.(nokia, samsung,micromax) Application can be identified using the requirements analysis process. â€ē Telemetry Applications(wireless : radio, ultrasonic, or infrared, blue-tooth systems) â€ē Visualization Applications: computer graphics.: 2D,3D â€ē Distributed Applications: software that is executed or run on multiple computers within a network.(middleware / SOA platform) â€ē Web, Access and Use Applications(php/ mysql) â€ē Operations(Logical / arithmetic), Administration and Maintenance.
  • 13. Application Locations to determine where application applies in an environment. This will help in mapping traffic flows during the flow analysis process. Application types, their performance requirements, their locations, and application groups form the interface between the application component and the rest of the system.
  • 14.
  • 15. ī‚§ Device : piece of equipment that has been made for some special purpose.
  • 18. Device Type ī‚§ Devices can be grouped into three categories: īƒē generic computing devices: (laptop , mobile phone), their requirements are important from an end-to-end perspective, īƒē they provide the interface between applications and the network. īƒē Servers(windows/unix ): have an impact on the traffic flows within the system. īƒē specialized devices(wireless) : (blue-tooth/IR/ blue tooth headset) are devices that provide specific functions to their users.
  • 19. Performance Characteristics īƒē For many environments, it may be difficult to determine or measure the performance characteristics of its devices. īƒē Note that device problems frequently are misinterpreted as network problems. īƒē Understanding at the device component level can help you recognize such bottlenecks/problems early in the analysis process.
  • 20. Device Locations īƒē Location information helps to determine the relationships among components of the system. īƒē Location information also helps to determine the traffic flow characteristics for the system. īƒē The interface between the device component and the rest of the system consists of the types of devices, their location dependencies, and their performance characteristics.
  • 21.
  • 22. Network requirements ī‚§ Network : interconnected systems. ī‚§ Components of a computer network: ī‚§ Hosts : (PCs, laptops, handhelds) ī‚§ routers & switches : (IP router, Ethernet switch) ī‚§ links : (wired, wireless) ī‚§ Protocols : (IP, TCP, CSMA/CD, CSMA/CA) ī‚§ Applications: (network services) ī‚§ humans and service agents
  • 23.
  • 25. Existing & Migration / populate ī‚§ Most network architectures/designs today need to incorporate existing networks. ī‚§ This includes īƒē system upgrades, īƒē migrating (move from one part of something to another part)to a new or different technology or īƒē protocol, or upgrading network infrastructure.
  • 26. Existing & Migration / populate īƒē Sometimes the network architecture and design must accommodate any dependencies and constraints imposed by the existing network. ī‚§ Examples include the following: īƒē Scaling dependencies. How will new network change the size and scope of the system? or will the change be within the LAN/MAN/WAN boundaries of the existing network?
  • 27. Location dependencies . īƒē Based on the two – ways ī‚  Performance constraints: ī‚  Performance constraints:
  • 28. Location dependencies īƒē Performance constraints: īƒē Existing network performance characteristics should be integrated into the performance requirements of the planned network. īƒē Network, system, and support service dependencies. īƒē Features : ī‚  includes network addressing strategies, security, choices and configurations of routing protocols, and naming strategies.
  • 29. Location dependencies īƒē Interoperability dependencies: īƒē The boundaries between existing and planned networks are points where service information and performance guarantees need to be translated. īƒē Network obsolescence/ old model. Whenever possible, it should be noted that parts of the network will need to be transitioned out of the planned network.
  • 30. Network Management & Security ī‚§ There are four categories of network management tasks: īƒē Monitoring for event notification īƒē Monitoring for metrics and planning īƒē Network configuration īƒē Troubleshooting
  • 31. List of some potential network management requirements: īƒē Monitoring methods īƒē Instrumentation methods. īƒē These include the network management protocols (SNMPv3, CMIP, RMON), parameter lists (MIBs), monitoring tools, and access methods. īƒē Sets of characteristics for monitoring. īƒē Centralized versus distributed monitoring. īƒē Performance requirements.
  • 32. List of some potential(risk) network management requirements: īƒē it is also need to be determined a security risks by performing a risk analysis for both the existing network and planned network. īƒē Security requirements and the results of the risk analysis are used to develop a security plan and define security policies for the network.
  • 33.