SlideShare a Scribd company logo
Network Design and
Management
COURSE INSTRUCTOR: FAROOQ JAVEED
 Network design should be a complete process that
matches business needs to available technology to
delivera system thatwill maximize an organization’s
success
 In the LAN area it is more than just buying a few
devices
 In the WAN area it is more than justcalling the phone
company
 Don’t just start connecting the dots
 Analyze business and technical goals first
 Exploredivisional and groupstructures to find out
who the network serves and where they reside
 Determine what applications will run on the
network and how thoseapplications behave on a
network
 Focus on Layer 7 and abovefirst
Application
Presentation
Session
Transport
Network
Data Link
Physical
Layer 1
Layer 7
Layer 6
Layer 5
Layer 4
Layer 3
Layer 2
 A focus is placed on understanding data flow, data types, and processes
thataccess orchange thedata.
 A focus is placed on understanding the location and needs of user
communities that access or change data and processes.
 Several techniques and models can be used to characterize theexisting
system, new userrequirements, and a structure for the futuresystem.
 A logical model is developed before the physicalmodel.
 The logical model represents the basic building blocks, dividedby function, and the
structure of thesystem.
 The physical model represents devices and specific technologiesand implementations.
 SDLC: Does it mean Synchronous Data LinkControl or Systems
Development LifeCycle?
 The latter forthe purposesof this class!
 Typical systemsaredeveloped and continue toexist over a period of
time, often called a systems development life cycle(SDLC)
Analyze
requirements
Develop
logical
design
Develop
physical
design
Test, optimize,
and document
design
Monitor and
optimize
network
performance
Implement
and test
network
 Phase 1 – Analyze Requirements
 Analyze business goals andconstraints
 Analyze technical goals andtradeoffs
 Characterize the existing network
 Characterize network traffic
 Phase 2 – Logical Network Design
 Design a networktopology
 Design models for addressing andnaming
 Select switching and routing protocols
 Develop network securitystrategies
 Develop network managementstrategies
 Phase 3 – Physical Network Design
 Select technologies and devices for campus networks
 Select technologies and devices for enterprisenetworks
 Phase 4 – Testing, Optimizing, and Documenting the
Network Design
 Test the network design
 Optimize the networkdesign
 Document the networkdesign
Plan
Design
Implement
Operate
Retire
Optimize
Network requirements are identified in this phase. This
phase also includes an analysis of areas where the
network will be installed and an identification of users
who will require network services
In this phase, the network designers accomplish
the bulk of the logical and physical design,
according to requirements gathered during the
plan phase
The network is built according to the design
specifications. Implementation also serves to
verify the design.
Operation is the final test of the effectiveness
of the design. The network is monitored
during this phase for performance problems
The optimize phase is based on proactive
network management that identifies and
resolves problems before network disruptions
arise. The optimize phase may lead to a
network redesign if too many problems arise
 Increase revenue
 Reduce operating costs
 Improvecommunications
 Shorten product developmentcycle
 Expand into worldwidemarkets
 Build partnerships with othercompanies
 Offer bettercustomersupportor new customer
services
 Mobility
 Security
 Resiliency (faulttolerance)
 Businesscontinuityaftera disaster
 Network projects must be prioritized basedon
fiscal goals
 Networks mustoffer the lowdelay required forreal-
time applications such asVoIP
 Budget
 Staffing
 Schedule
 Politics andpolicies
 Before meeting with the client, whether internal or
external, collect some basic business-related
information
 Such as
 Products produced/Services supplied
 Financial viability
 Customers, suppliers, competitors
 Competitiveadvantage
 Try toget
 A concise statement of the goals of the project
 What problem are they trying tosolve?
 Howwill new technology help them be more
successful in theirbusiness?
 What must happen fortheproject to succeed?
 What will happen if the project isa failure?
 Is this a critical businessfunction?
 Is this projectvisible to upper management?
 Who’s on yourside?
 Discover anybiases
 Forexample
 Will theyonly usecertain company’s products?
 Do they avoid certaintechnologies?
 Do thedata people look down on thevoice people or vice
versa?
 Talk to the technical andmanagement staff
 Get acopyof theorganization chart
 This will show thegeneral structureof theorganization
 Itwill suggestusers toaccount for
 Itwill suggestgeographical locations toaccount for
 Getacopyof the security policy
 Howdoes thepolicy affect the new design?
 Howdoes the new designaffect thepolicy?
 Is thepolicy so strict thatyou (the network designer) won’t beable todo
your job?
 Start cataloging network assets that security should protect
 Hardware, software, applications, anddata
 Less obvious, but still important, intellectualproperty, trade secrets, and a
company's reputation
 Small in scope?
 Allow sales people toaccess network viaaVPN
 Large in scope?
 An entire redesign of an enterprise network
 Use the OSI model to clarify the scope
 New financial reporting application versus new routing protocol
versus new data link (wireless, for example)
 Does the scope fit the budget, capabilitiesof staff and consultants,
schedule?
 Applications
 Now and after the project is completed
 Include both productivity applications and system management
applications
 Usercommunities
 Datastores
 Protocols
 Current logical and physicalarchitecture
 Current performance
Name of
Application
Type of
Application
New
Application?
Criticality Comments
 Systematicapproach
 Focus first on business requirements and constraints, and applications
 Gain an understanding of the customer’scorporate structure
 Gain an understanding of the customer’s business style
 Whatare the main phases of network design per the top-down
network designapproach?
 What are the main phases of network design per the PDIOO
approach?
 Why is it important to understandcustomer’s business style?
 What are some typical business goals for organizations today?

More Related Content

Similar to 1606662359-chapter-1-top-down-network-design.pptx

A Study on the Application of Web-Scale IT in Enterprises in IoT Era
A Study on the Application of Web-Scale IT in Enterprises in IoT EraA Study on the Application of Web-Scale IT in Enterprises in IoT Era
A Study on the Application of Web-Scale IT in Enterprises in IoT Era
Hassan Keshavarz
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
VannaSchrader3
 
Chapter01.ppt
Chapter01.pptChapter01.ppt
Chapter01.ppt
SangeethaVal
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
Anil
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
Jay van Zyl
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization
scoopnewsgroup
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Zeeve
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
Ulf Mattsson
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET Journal
 
Architecture Centered Publishing Systems
Architecture Centered Publishing SystemsArchitecture Centered Publishing Systems
Architecture Centered Publishing Systems
Glen Alleman
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
William Francis
 
Technology radar-may-2013
Technology radar-may-2013Technology radar-may-2013
Technology radar-may-2013
Carol Bruno
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
JoeFaghani
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
Debanjan Paul
 
Cloud computing gartner report
Cloud computing gartner reportCloud computing gartner report
Cloud computing gartner report
Sumeet Mayor
 
DEVSECOPS ON CLOUD STORAGE SECURITY
DEVSECOPS ON CLOUD STORAGE SECURITYDEVSECOPS ON CLOUD STORAGE SECURITY
DEVSECOPS ON CLOUD STORAGE SECURITY
IRJET Journal
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
philipnelson29183
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
Matt Mandich
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
BLACKSPAROW
 

Similar to 1606662359-chapter-1-top-down-network-design.pptx (20)

A Study on the Application of Web-Scale IT in Enterprises in IoT Era
A Study on the Application of Web-Scale IT in Enterprises in IoT EraA Study on the Application of Web-Scale IT in Enterprises in IoT Era
A Study on the Application of Web-Scale IT in Enterprises in IoT Era
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
 
Chapter01.ppt
Chapter01.pptChapter01.ppt
Chapter01.ppt
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
 
Architecture Centered Publishing Systems
Architecture Centered Publishing SystemsArchitecture Centered Publishing Systems
Architecture Centered Publishing Systems
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
Technology radar-may-2013
Technology radar-may-2013Technology radar-may-2013
Technology radar-may-2013
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
Cloud computing gartner report
Cloud computing gartner reportCloud computing gartner report
Cloud computing gartner report
 
DEVSECOPS ON CLOUD STORAGE SECURITY
DEVSECOPS ON CLOUD STORAGE SECURITYDEVSECOPS ON CLOUD STORAGE SECURITY
DEVSECOPS ON CLOUD STORAGE SECURITY
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 

Recently uploaded

一比一原版肯特大学毕业证UKC成绩单一模一样
一比一原版肯特大学毕业证UKC成绩单一模一样一比一原版肯特大学毕业证UKC成绩单一模一样
一比一原版肯特大学毕业证UKC成绩单一模一样
tobbk6s8
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
Kyungeun Sung
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
talaatahm
 
ADESGN3S_Case-Study-Municipal-Health-Center.pdf
ADESGN3S_Case-Study-Municipal-Health-Center.pdfADESGN3S_Case-Study-Municipal-Health-Center.pdf
ADESGN3S_Case-Study-Municipal-Health-Center.pdf
GregMichaelTapawan
 
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
kuapy
 
欧洲杯买球-欧洲杯买球买球网好的网站-欧洲杯买球哪里有正规的买球网站|【​网址​🎉ac123.net🎉​】
欧洲杯买球-欧洲杯买球买球网好的网站-欧洲杯买球哪里有正规的买球网站|【​网址​🎉ac123.net🎉​】欧洲杯买球-欧洲杯买球买球网好的网站-欧洲杯买球哪里有正规的买球网站|【​网址​🎉ac123.net🎉​】
欧洲杯买球-欧洲杯买球买球网好的网站-欧洲杯买球哪里有正规的买球网站|【​网址​🎉ac123.net🎉​】
jafiradnan336
 
Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
Bianca Woods
 
一比一原版(CSU毕业证书)查尔斯特大学毕业证如何办理
一比一原版(CSU毕业证书)查尔斯特大学毕业证如何办理一比一原版(CSU毕业证书)查尔斯特大学毕业证如何办理
一比一原版(CSU毕业证书)查尔斯特大学毕业证如何办理
67n7f53
 
Getting Data Ready for Culture Hack by Neontribe
Getting Data Ready for Culture Hack by NeontribeGetting Data Ready for Culture Hack by Neontribe
Getting Data Ready for Culture Hack by Neontribe
Harry Harrold
 
Best Digital Marketing Strategy Build Your Online Presence 2024.pptx
Best Digital Marketing Strategy Build  Your Online Presence 2024.pptxBest Digital Marketing Strategy Build  Your Online Presence 2024.pptx
Best Digital Marketing Strategy Build Your Online Presence 2024.pptx
pavankumarpayexelsol
 
Heuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdfHeuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdf
Jaime Brown
 
Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...
Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...
Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...
Designforuminternational
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NishantRathi18
 
CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
PabloMartelLpez
 
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
bo44ban1
 
一比一原版美国哥伦比亚大学毕业证Columbia成绩单一模一样
一比一原版美国哥伦比亚大学毕业证Columbia成绩单一模一样一比一原版美国哥伦比亚大学毕业证Columbia成绩单一模一样
一比一原版美国哥伦比亚大学毕业证Columbia成绩单一模一样
881evgn0
 
一比一原版(UoN毕业证书)纽卡斯尔大学毕业证如何办理
一比一原版(UoN毕业证书)纽卡斯尔大学毕业证如何办理一比一原版(UoN毕业证书)纽卡斯尔大学毕业证如何办理
一比一原版(UoN毕业证书)纽卡斯尔大学毕业证如何办理
f22b6g9c
 
modular-kitchen home plan civil engineering.pdf
modular-kitchen home plan civil engineering.pdfmodular-kitchen home plan civil engineering.pdf
modular-kitchen home plan civil engineering.pdf
RashmitaSwain3
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
Virtual Real Design
 
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
21uul8se
 

Recently uploaded (20)

一比一原版肯特大学毕业证UKC成绩单一模一样
一比一原版肯特大学毕业证UKC成绩单一模一样一比一原版肯特大学毕业证UKC成绩单一模一样
一比一原版肯特大学毕业证UKC成绩单一模一样
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
 
ADESGN3S_Case-Study-Municipal-Health-Center.pdf
ADESGN3S_Case-Study-Municipal-Health-Center.pdfADESGN3S_Case-Study-Municipal-Health-Center.pdf
ADESGN3S_Case-Study-Municipal-Health-Center.pdf
 
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
按照学校原版(UIUC文凭证书)伊利诺伊大学|厄巴纳-香槟分校毕业证快速办理
 
欧洲杯买球-欧洲杯买球买球网好的网站-欧洲杯买球哪里有正规的买球网站|【​网址​🎉ac123.net🎉​】
欧洲杯买球-欧洲杯买球买球网好的网站-欧洲杯买球哪里有正规的买球网站|【​网址​🎉ac123.net🎉​】欧洲杯买球-欧洲杯买球买球网好的网站-欧洲杯买球哪里有正规的买球网站|【​网址​🎉ac123.net🎉​】
欧洲杯买球-欧洲杯买球买球网好的网站-欧洲杯买球哪里有正规的买球网站|【​网址​🎉ac123.net🎉​】
 
Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
 
一比一原版(CSU毕业证书)查尔斯特大学毕业证如何办理
一比一原版(CSU毕业证书)查尔斯特大学毕业证如何办理一比一原版(CSU毕业证书)查尔斯特大学毕业证如何办理
一比一原版(CSU毕业证书)查尔斯特大学毕业证如何办理
 
Getting Data Ready for Culture Hack by Neontribe
Getting Data Ready for Culture Hack by NeontribeGetting Data Ready for Culture Hack by Neontribe
Getting Data Ready for Culture Hack by Neontribe
 
Best Digital Marketing Strategy Build Your Online Presence 2024.pptx
Best Digital Marketing Strategy Build  Your Online Presence 2024.pptxBest Digital Marketing Strategy Build  Your Online Presence 2024.pptx
Best Digital Marketing Strategy Build Your Online Presence 2024.pptx
 
Heuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdfHeuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdf
 
Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...
Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...
Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
 
CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
 
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
一比一原版阿肯色大学毕业证(UCSF毕业证书)如何办理
 
一比一原版美国哥伦比亚大学毕业证Columbia成绩单一模一样
一比一原版美国哥伦比亚大学毕业证Columbia成绩单一模一样一比一原版美国哥伦比亚大学毕业证Columbia成绩单一模一样
一比一原版美国哥伦比亚大学毕业证Columbia成绩单一模一样
 
一比一原版(UoN毕业证书)纽卡斯尔大学毕业证如何办理
一比一原版(UoN毕业证书)纽卡斯尔大学毕业证如何办理一比一原版(UoN毕业证书)纽卡斯尔大学毕业证如何办理
一比一原版(UoN毕业证书)纽卡斯尔大学毕业证如何办理
 
modular-kitchen home plan civil engineering.pdf
modular-kitchen home plan civil engineering.pdfmodular-kitchen home plan civil engineering.pdf
modular-kitchen home plan civil engineering.pdf
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
 
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
一比一原版亚利桑那大学毕业证(UA毕业证书)如何办理
 

1606662359-chapter-1-top-down-network-design.pptx

  • 1. Network Design and Management COURSE INSTRUCTOR: FAROOQ JAVEED
  • 2.
  • 3.  Network design should be a complete process that matches business needs to available technology to delivera system thatwill maximize an organization’s success  In the LAN area it is more than just buying a few devices  In the WAN area it is more than justcalling the phone company
  • 4.  Don’t just start connecting the dots  Analyze business and technical goals first  Exploredivisional and groupstructures to find out who the network serves and where they reside  Determine what applications will run on the network and how thoseapplications behave on a network  Focus on Layer 7 and abovefirst
  • 6.  A focus is placed on understanding data flow, data types, and processes thataccess orchange thedata.  A focus is placed on understanding the location and needs of user communities that access or change data and processes.  Several techniques and models can be used to characterize theexisting system, new userrequirements, and a structure for the futuresystem.  A logical model is developed before the physicalmodel.  The logical model represents the basic building blocks, dividedby function, and the structure of thesystem.  The physical model represents devices and specific technologiesand implementations.
  • 7.  SDLC: Does it mean Synchronous Data LinkControl or Systems Development LifeCycle?  The latter forthe purposesof this class!  Typical systemsaredeveloped and continue toexist over a period of time, often called a systems development life cycle(SDLC)
  • 9.  Phase 1 – Analyze Requirements  Analyze business goals andconstraints  Analyze technical goals andtradeoffs  Characterize the existing network  Characterize network traffic
  • 10.  Phase 2 – Logical Network Design  Design a networktopology  Design models for addressing andnaming  Select switching and routing protocols  Develop network securitystrategies  Develop network managementstrategies
  • 11.  Phase 3 – Physical Network Design  Select technologies and devices for campus networks  Select technologies and devices for enterprisenetworks
  • 12.  Phase 4 – Testing, Optimizing, and Documenting the Network Design  Test the network design  Optimize the networkdesign  Document the networkdesign
  • 13. Plan Design Implement Operate Retire Optimize Network requirements are identified in this phase. This phase also includes an analysis of areas where the network will be installed and an identification of users who will require network services In this phase, the network designers accomplish the bulk of the logical and physical design, according to requirements gathered during the plan phase The network is built according to the design specifications. Implementation also serves to verify the design. Operation is the final test of the effectiveness of the design. The network is monitored during this phase for performance problems The optimize phase is based on proactive network management that identifies and resolves problems before network disruptions arise. The optimize phase may lead to a network redesign if too many problems arise
  • 14.  Increase revenue  Reduce operating costs  Improvecommunications  Shorten product developmentcycle  Expand into worldwidemarkets  Build partnerships with othercompanies  Offer bettercustomersupportor new customer services
  • 15.  Mobility  Security  Resiliency (faulttolerance)  Businesscontinuityaftera disaster  Network projects must be prioritized basedon fiscal goals  Networks mustoffer the lowdelay required forreal- time applications such asVoIP
  • 16.  Budget  Staffing  Schedule  Politics andpolicies
  • 17.  Before meeting with the client, whether internal or external, collect some basic business-related information  Such as  Products produced/Services supplied  Financial viability  Customers, suppliers, competitors  Competitiveadvantage
  • 18.  Try toget  A concise statement of the goals of the project  What problem are they trying tosolve?  Howwill new technology help them be more successful in theirbusiness?  What must happen fortheproject to succeed?
  • 19.  What will happen if the project isa failure?  Is this a critical businessfunction?  Is this projectvisible to upper management?  Who’s on yourside?
  • 20.  Discover anybiases  Forexample  Will theyonly usecertain company’s products?  Do they avoid certaintechnologies?  Do thedata people look down on thevoice people or vice versa?  Talk to the technical andmanagement staff
  • 21.  Get acopyof theorganization chart  This will show thegeneral structureof theorganization  Itwill suggestusers toaccount for  Itwill suggestgeographical locations toaccount for
  • 22.  Getacopyof the security policy  Howdoes thepolicy affect the new design?  Howdoes the new designaffect thepolicy?  Is thepolicy so strict thatyou (the network designer) won’t beable todo your job?  Start cataloging network assets that security should protect  Hardware, software, applications, anddata  Less obvious, but still important, intellectualproperty, trade secrets, and a company's reputation
  • 23.  Small in scope?  Allow sales people toaccess network viaaVPN  Large in scope?  An entire redesign of an enterprise network  Use the OSI model to clarify the scope  New financial reporting application versus new routing protocol versus new data link (wireless, for example)  Does the scope fit the budget, capabilitiesof staff and consultants, schedule?
  • 24.  Applications  Now and after the project is completed  Include both productivity applications and system management applications  Usercommunities  Datastores  Protocols  Current logical and physicalarchitecture  Current performance
  • 26.  Systematicapproach  Focus first on business requirements and constraints, and applications  Gain an understanding of the customer’scorporate structure  Gain an understanding of the customer’s business style
  • 27.  Whatare the main phases of network design per the top-down network designapproach?  What are the main phases of network design per the PDIOO approach?  Why is it important to understandcustomer’s business style?  What are some typical business goals for organizations today?