1. DESIGN AND MANAGEMENT OF COMPUTER
NETWORKS
Presented By
CSK
@ oxford
engineering
college - Trichy
APPLICATION
REQUIREMENTS
2. Types of requirement analysis
ī§ User
ī§ Application
ī§ Device
ī§ Network
ī§ Other
3. Application Requirements
ī§ Application requirements are requirements
that are determined from application
information, experience, or testing, and
represent what is needed by applications.
ī§ Application requirements are more technical
than user requirements but may still be
subjective.
4. Application requirement
ī§ network applications based on human
factors and technology attributes.
ī§ The first term, human factors, addresses
human perception of different kinds of
media, such as conventional text, audio and
video.
ī§ The second term, technology attributes,
represents the different technological aspects
of these network applications, such as data
processing applications, web applications,
system applications(CPU, Memory(storage)) .
5. Example Application requirement
ī§ Application requests (for example, web page
requests)
ī§ Database transactions (for example, data
queries or updates)
ī§ Messaging protocols (for example, putting a
message on the queue)
ī§ Authentication service (for example,
encryption, decryption, login purpose)
ī§ API calls (for example, restful interface calls)
7. Application system
ī§ Tier 1:Web server: used to distribute requests to
one or more application servers. This web server
has load balancing capabilities and constitutes
the web tier.
ī§ Tier 2: Application server: used to host the e-commerce
application. These servers constitute
the application tier.
ī§ Tier 3:Database server: used to store the
application's data. This server resides at the
database tier
9. Application Types
âē Based on service and performance requirements,
applications were type as:
mission-critical ī RMA
rate-critical ī CAPACITY, or
real-time/interactiveī DELAY
These application types are described by their
requirements and service metrics.
10. Application Types
A loss of any part of RMA in such applications
may be serious or disastrous, such as:
âē Loss of revenue/profit or customers.
âē Un-recoverable information or situation.
âē Loss of sensitive data.
âē Loss of life / business .
In terms of capacity, there are some applications
that require a predictable/guessable, bounded/
limited, or high degree of capacity include voice
and non-buffered video.
11. Application Types
ī§ Delay: It can take a long time for a packet to
be delivered across the networks.
ī§ From an application service perspective,
īē optimizing the total,
īē end-to-end(source to destination), or
īē round-trip(cycle) delay is usually the most
important things.
12. Applications Groups
It is often useful to group applications with similar performance
characteristics.(nokia, samsung,micromax)
Application can be identified using the requirements analysis
process.
âē Telemetry Applications(wireless : radio, ultrasonic, or infrared, blue-tooth
systems)
âē Visualization Applications: computer graphics.: 2D,3D
âē Distributed Applications: software that is executed or run on multiple
computers within a network.(middleware / SOA platform)
âē Web, Access and Use Applications(php/ mysql)
âē Operations(Logical / arithmetic), Administration and
Maintenance.
13. Application Locations
to determine where application applies in an
environment.
This will help in mapping traffic flows during the
flow analysis process.
Application types, their performance
requirements, their locations, and application
groups form the interface between the
application component and the rest of the
system.
14.
15. ī§ Device : piece of equipment that has been
made for some special purpose.
18. Device Type
ī§ Devices can be grouped into three categories:
īē generic computing devices: (laptop , mobile phone),
their requirements are important from an end-to-end
perspective,
īē they provide the interface between applications and
the network.
īē Servers(windows/unix ): have an impact on the traffic
flows within the system.
īē specialized devices(wireless) : (blue-tooth/IR/ blue
tooth headset) are devices that provide specific
functions to their users.
19. Performance Characteristics
īē For many environments, it may be difficult to
determine or measure the performance
characteristics of its devices.
īē Note that device problems frequently are
misinterpreted as network problems.
īē Understanding at the device component level can
help you recognize such bottlenecks/problems
early in the analysis process.
20. Device Locations
īē Location information helps to determine the
relationships among components of the system.
īē Location information also helps to determine the
traffic flow characteristics for the system.
īē The interface between the device component and
the rest of the system consists of the types of
devices, their location dependencies, and their
performance characteristics.
25. Existing & Migration / populate
ī§ Most network architectures/designs today
need to incorporate existing networks.
ī§ This includes
īē system upgrades,
īē migrating (move from one part of something to
another part)to a new or different technology or
īē protocol, or upgrading network infrastructure.
26. Existing & Migration / populate
īē Sometimes the network architecture and design
must accommodate any dependencies and
constraints imposed by the existing network.
ī§ Examples include the following:
īē Scaling dependencies. How will new network
change the size and scope of the system? or will
the change be within the LAN/MAN/WAN
boundaries of the existing network?
27. Location dependencies
.
īē Based on the two â ways
ī Performance constraints:
ī Performance constraints:
28. Location dependencies
īē Performance constraints:
īē Existing network performance characteristics
should be integrated into the performance
requirements of the planned network.
īē Network, system, and support service dependencies.
īē Features :
ī includes network addressing strategies, security,
choices and configurations of routing protocols, and
naming strategies.
29. Location dependencies
īē Interoperability dependencies:
īē The boundaries between existing and planned
networks are points where service information
and performance guarantees need to be
translated.
īē Network obsolescence/ old model. Whenever
possible, it should be noted that parts of the
network will need to be transitioned out of the
planned network.
30. Network Management & Security
ī§ There are four categories of network
management tasks:
īē Monitoring for event notification
īē Monitoring for metrics and planning
īē Network configuration
īē Troubleshooting
31. List of some potential network
management requirements:
īē Monitoring methods
īē Instrumentation methods.
īē These include the network management protocols
(SNMPv3, CMIP, RMON), parameter lists (MIBs),
monitoring tools, and access methods.
īē Sets of characteristics for monitoring.
īē Centralized versus distributed monitoring.
īē Performance requirements.
32. List of some potential(risk)
network management
requirements:
īē it is also need to be determined a security risks by
performing a risk analysis for both the existing
network and planned network.
īē Security requirements and the results of the risk
analysis are used to develop a security plan and
define security policies for the network.