SlideShare a Scribd company logo
1 of 12
Accessing
Network Needs
• The first step in network design should be to gather() data
such as the corporate structure, the current topology, &
applications in use, information flows within the company
,the budget & the resource available.
• Analyze the customers’ business & technical goals.
• Determine what new applications & services must be
supported by the new network design.
• Discuss the criteria for the success of the internetwork
with your customer.
Develop the structure of the new internetwork.
• Determine the type of network that best fits a company ’s
needs.
• Choose the appropriate media & hardware with which to
construct a successful network.
• Design a scalable & simple topology , determine the hard &
software to be deployed & select the network management
strategy.
• Estimate the expected performance of the new internetwork
using simulation & modeling tools.
• Access the costs of your design.
• Implement your design.
• Monitor your new internetwork. Is it working like you
expected? Is the utilization on all links like you expected?
Network Size & Scale
• Scale is usually the first & most important determination in
network planning as it will often determine your other
decisions.
• Most often we need to focus on the two or three network
scales that impact small & mid-sized organizations (LANs,
WANs, & CANs).
• A local area network(LAN) is designed & implemented in a
single building or office. Its primary function is the
interconnection of the computing resource within a single
organization.
Network Size & Scale
• A wide area network(WAN)connects a single office or branch
LAN to its parent organization ’s network & all the millions
of networks that together make up the Internet .WAN spans
across wide geographical boundaries(metropolitan, regional ,
or national).
• A campus area network(CAN)connects multiple LANs
belonging to the same organization when they ’re in close
geographic distance. As with WANs, an organization can
build its own CAN, but most opt to lease facilities from their
ISPs(Internet service provider).
Application
Decide on the applications requirements in the network based
on following factors:
• How many applications will be installed & accessed?
• Where they will be installed? On Server or at client side?
• Who can access which application?
• Establish authentication & authorization procedure required
for access permissions for applications in the network?
Users
Users are one of the most important stack holder for any
network.
• Decide how many users will be in the network?
• How many Roles & rights to manages?
• How to create & implement groups & establish policies?
Network Services
This point focus on the services the network is to provide base
on the company need. This may include different network
services like:
• File sharing
• Mail Server
• Fax Service
• Directory Service
• Disk storage
• Disk Storage.
• Print Sharing.
• Web Hosting & Deployment.
• Database Sharing.
Security & Safety
• Server-based networks are also more secure than peer-to-peer
networks.
• With a peer-to-peer network, all resources are shared equally
across the network.
• Security is often the primary reason for choosing a server –
based approach to networking.
• In a server-based environment, one administrator who sets the
policy & applies it to every user on the network can mange
security.
Accessing network needs

More Related Content

What's hot

Hybrid application development
Hybrid application developmentHybrid application development
Hybrid application developmentKnoldus Inc.
 
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanSOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanHaseeb Shalmani
 
.Net framework vs .net core a complete comparison
.Net framework vs .net core  a complete comparison.Net framework vs .net core  a complete comparison
.Net framework vs .net core a complete comparisonKaty Slemon
 
Android Application Seminar_Usman
Android Application Seminar_UsmanAndroid Application Seminar_Usman
Android Application Seminar_UsmanUsman Sait
 
Primeiros passos para estruturar uma equipe front-end
Primeiros passos para estruturar uma equipe front-endPrimeiros passos para estruturar uma equipe front-end
Primeiros passos para estruturar uma equipe front-endDiego Eis
 
INSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPSINSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPSRohan Nyayadhish
 
Cross platform mobile development
Cross platform mobile developmentCross platform mobile development
Cross platform mobile developmentPeter Friese
 
Webform and Drupal 8
Webform and Drupal 8Webform and Drupal 8
Webform and Drupal 8Philip Norton
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharingKhagendra Chapre
 
Criação Web com Bootstrap e Material Design
Criação Web com Bootstrap e Material DesignCriação Web com Bootstrap e Material Design
Criação Web com Bootstrap e Material DesignDaniel Brandão
 
Aula 5 -Avaliação de interfaces de usuário - testes com usuários
Aula 5 -Avaliação de interfaces de usuário - testes com usuáriosAula 5 -Avaliação de interfaces de usuário - testes com usuários
Aula 5 -Avaliação de interfaces de usuário - testes com usuáriosAndré Constantino da Silva
 
Arquitetura de Software Na Pratica
Arquitetura de Software Na PraticaArquitetura de Software Na Pratica
Arquitetura de Software Na PraticaAlessandro Kieras
 
Usabilidade - Uma introdução
Usabilidade - Uma introduçãoUsabilidade - Uma introdução
Usabilidade - Uma introduçãoErico Fileno
 
Difference between .net core and .net framework
Difference between .net core and .net frameworkDifference between .net core and .net framework
Difference between .net core and .net frameworkAnsi Bytecode
 
Introduction to Xamarin.Forms
Introduction to Xamarin.FormsIntroduction to Xamarin.Forms
Introduction to Xamarin.FormsXamarin
 
Flutter presentation.pptx
Flutter presentation.pptxFlutter presentation.pptx
Flutter presentation.pptxFalgunSorathiya
 
How to build a Whatsapp clone in 2 hours
How to build a Whatsapp clone in 2 hoursHow to build a Whatsapp clone in 2 hours
How to build a Whatsapp clone in 2 hoursOursky
 

What's hot (20)

Hybrid application development
Hybrid application developmentHybrid application development
Hybrid application development
 
J530 9 jms
J530 9 jmsJ530 9 jms
J530 9 jms
 
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanSOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
 
.Net framework vs .net core a complete comparison
.Net framework vs .net core  a complete comparison.Net framework vs .net core  a complete comparison
.Net framework vs .net core a complete comparison
 
Android Application Seminar_Usman
Android Application Seminar_UsmanAndroid Application Seminar_Usman
Android Application Seminar_Usman
 
Primeiros passos para estruturar uma equipe front-end
Primeiros passos para estruturar uma equipe front-endPrimeiros passos para estruturar uma equipe front-end
Primeiros passos para estruturar uma equipe front-end
 
INSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPSINSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPS
 
Blazor
BlazorBlazor
Blazor
 
Cross platform mobile development
Cross platform mobile developmentCross platform mobile development
Cross platform mobile development
 
Webform and Drupal 8
Webform and Drupal 8Webform and Drupal 8
Webform and Drupal 8
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharing
 
Criação Web com Bootstrap e Material Design
Criação Web com Bootstrap e Material DesignCriação Web com Bootstrap e Material Design
Criação Web com Bootstrap e Material Design
 
Aula 5 -Avaliação de interfaces de usuário - testes com usuários
Aula 5 -Avaliação de interfaces de usuário - testes com usuáriosAula 5 -Avaliação de interfaces de usuário - testes com usuários
Aula 5 -Avaliação de interfaces de usuário - testes com usuários
 
Arquitetura de Software Na Pratica
Arquitetura de Software Na PraticaArquitetura de Software Na Pratica
Arquitetura de Software Na Pratica
 
Usabilidade - Uma introdução
Usabilidade - Uma introduçãoUsabilidade - Uma introdução
Usabilidade - Uma introdução
 
Difference between .net core and .net framework
Difference between .net core and .net frameworkDifference between .net core and .net framework
Difference between .net core and .net framework
 
Multi user chat system using java
Multi user chat system using javaMulti user chat system using java
Multi user chat system using java
 
Introduction to Xamarin.Forms
Introduction to Xamarin.FormsIntroduction to Xamarin.Forms
Introduction to Xamarin.Forms
 
Flutter presentation.pptx
Flutter presentation.pptxFlutter presentation.pptx
Flutter presentation.pptx
 
How to build a Whatsapp clone in 2 hours
How to build a Whatsapp clone in 2 hoursHow to build a Whatsapp clone in 2 hours
How to build a Whatsapp clone in 2 hours
 

Similar to Accessing network needs

Why is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxWhy is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxBluechip Gulf IT Services
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computingDeepak Shukla
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Agora Group
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...RahulJain989779
 
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxChapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxhaileysuszelalem
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computingeShikshak
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingUOS
 
CloudComputing
CloudComputingCloudComputing
CloudComputingAdi Challa
 
Cloud description
Cloud descriptionCloud description
Cloud descriptionthanuambika
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkDr Geetha Mohan
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkDellNMS
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computingnewbie2019
 
Data center proposal
Data center proposalData center proposal
Data center proposalMuhammad Ahad
 

Similar to Accessing network needs (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Why is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxWhy is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptx
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
 
Design of network
Design of networkDesign of network
Design of network
 
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxChapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CloudComputing
CloudComputingCloudComputing
CloudComputing
 
Cloud description
Cloud descriptionCloud description
Cloud description
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
cloud computing Architecture in Details.ppt
cloud computing Architecture in Details.pptcloud computing Architecture in Details.ppt
cloud computing Architecture in Details.ppt
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computing
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and History
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and HistoryLecture 1.Basics of cloud computing, Advantage and Disadvantage and History
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and History
 

More from rahuldaredia21

Designing a network | Rahul Daredia
Designing a network | Rahul DarediaDesigning a network | Rahul Daredia
Designing a network | Rahul Darediarahuldaredia21
 
Data types in java | What is Datatypes in Java | Learning with RD | Created b...
Data types in java | What is Datatypes in Java | Learning with RD | Created b...Data types in java | What is Datatypes in Java | Learning with RD | Created b...
Data types in java | What is Datatypes in Java | Learning with RD | Created b...rahuldaredia21
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)rahuldaredia21
 
Java History or Backgoround.
Java History or Backgoround. Java History or Backgoround.
Java History or Backgoround. rahuldaredia21
 
FunctionS of management
FunctionS of managementFunctionS of management
FunctionS of managementrahuldaredia21
 
Dns resolving domain name
Dns resolving domain nameDns resolving domain name
Dns resolving domain namerahuldaredia21
 
Active directory architecture
Active directory architectureActive directory architecture
Active directory architecturerahuldaredia21
 

More from rahuldaredia21 (12)

Designing a network | Rahul Daredia
Designing a network | Rahul DarediaDesigning a network | Rahul Daredia
Designing a network | Rahul Daredia
 
Data types in java | What is Datatypes in Java | Learning with RD | Created b...
Data types in java | What is Datatypes in Java | Learning with RD | Created b...Data types in java | What is Datatypes in Java | Learning with RD | Created b...
Data types in java | What is Datatypes in Java | Learning with RD | Created b...
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)
 
Process of Staffing.
Process of Staffing.Process of Staffing.
Process of Staffing.
 
Process of Organizing
Process of OrganizingProcess of Organizing
Process of Organizing
 
Java History or Backgoround.
Java History or Backgoround. Java History or Backgoround.
Java History or Backgoround.
 
FunctionS of management
FunctionS of managementFunctionS of management
FunctionS of management
 
Dns resource record
Dns resource recordDns resource record
Dns resource record
 
Dns resolving domain name
Dns resolving domain nameDns resolving domain name
Dns resolving domain name
 
Directory service
Directory serviceDirectory service
Directory service
 
Dhcp
DhcpDhcp
Dhcp
 
Active directory architecture
Active directory architectureActive directory architecture
Active directory architecture
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Accessing network needs

  • 2. • The first step in network design should be to gather() data such as the corporate structure, the current topology, & applications in use, information flows within the company ,the budget & the resource available. • Analyze the customers’ business & technical goals. • Determine what new applications & services must be supported by the new network design. • Discuss the criteria for the success of the internetwork with your customer.
  • 3. Develop the structure of the new internetwork. • Determine the type of network that best fits a company ’s needs. • Choose the appropriate media & hardware with which to construct a successful network. • Design a scalable & simple topology , determine the hard & software to be deployed & select the network management strategy. • Estimate the expected performance of the new internetwork using simulation & modeling tools.
  • 4. • Access the costs of your design. • Implement your design. • Monitor your new internetwork. Is it working like you expected? Is the utilization on all links like you expected?
  • 5. Network Size & Scale • Scale is usually the first & most important determination in network planning as it will often determine your other decisions. • Most often we need to focus on the two or three network scales that impact small & mid-sized organizations (LANs, WANs, & CANs). • A local area network(LAN) is designed & implemented in a single building or office. Its primary function is the interconnection of the computing resource within a single organization.
  • 6. Network Size & Scale • A wide area network(WAN)connects a single office or branch LAN to its parent organization ’s network & all the millions of networks that together make up the Internet .WAN spans across wide geographical boundaries(metropolitan, regional , or national). • A campus area network(CAN)connects multiple LANs belonging to the same organization when they ’re in close geographic distance. As with WANs, an organization can build its own CAN, but most opt to lease facilities from their ISPs(Internet service provider).
  • 7. Application Decide on the applications requirements in the network based on following factors: • How many applications will be installed & accessed? • Where they will be installed? On Server or at client side? • Who can access which application? • Establish authentication & authorization procedure required for access permissions for applications in the network?
  • 8. Users Users are one of the most important stack holder for any network. • Decide how many users will be in the network? • How many Roles & rights to manages? • How to create & implement groups & establish policies?
  • 9. Network Services This point focus on the services the network is to provide base on the company need. This may include different network services like: • File sharing • Mail Server • Fax Service • Directory Service • Disk storage
  • 10. • Disk Storage. • Print Sharing. • Web Hosting & Deployment. • Database Sharing.
  • 11. Security & Safety • Server-based networks are also more secure than peer-to-peer networks. • With a peer-to-peer network, all resources are shared equally across the network. • Security is often the primary reason for choosing a server – based approach to networking. • In a server-based environment, one administrator who sets the policy & applies it to every user on the network can mange security.