SlideShare a Scribd company logo
Lesson 02
Network Design and Management




                            1
Systems Development Life Cycle
Every business has a number of goals.
System planners and management personnel within a company
try to generate a set of questions, or problems, to help the
company achieve those goals.
To properly understand a problem, analyze all possible
solutions, select the best solution, and implement and maintain
the solution, you need to follow a well-defined plan.
SDLC is a methodology, or plan, for a structured approach to
the development of a business system.


                                                            2
Systems Development Life Cycle
SDLC involves several phases. These phases are often:
• Planning
• Analysis
• Design
• Implementation
• Maintenance
These phases are cyclical and usually never ending.


                                                        3
4
Systems Development Life Cycle
A systems analyst is typically responsible for managing a
project and following the SDLC phases.
Anyone, however, may be called upon to assist a systems
analyst.
Or anyone may have to assume some of the duties of a systems
analyst.
Individuals that are called upon to support a computer network
should understand the basic phases of SDLC.



                                                            5
Systems Development Life Cycle
Planning Phase - Identify problems, opportunities, and objectives.
Analysis Phase - Determine information requirements.            Information
requirements can be gathered by sampling and collecting hard data,
interviewing, questionnaires, observing environments, and prototyping.
Design Phase - Design the system that was recommended and approved at
the end of the analysis phase.
Implementation Phase - The system is installed and preparations are made to
move from the old system to the new.
Maintenance Phase - The longest phase, involves the ongoing maintenance of
the project.
Maintenance may require personnel to return to an earlier phase to perform
an update.

                                                                        6
Network Modeling
When updating or creating a new computer system, the analyst will create a
set of models for both the existing system (if there is one) and the proposed
system.
Network models can either demonstrate the current state of the network or
can model the desired computer network.
A series of connectivity maps are network modeling tools that depict the
various locations involved over a wide and local areas and the
interconnections between those locations.
An wide area connectivity map shows the big picture of geographic locations
of network facilities.
External users and mobile users can be identified, as well as the locations
primary to a business.


                                                                              7
Network Modeling
To identify each connection between sites:
d = distance of the connection (usually shown in either miles or kilometers)
s = security level (high, medium, low, or none)
du = duplexity (full duplex, half duplex, or simplex)
dr = data rate desired (in bps)
l = latency, or acceptable delay time across the network (usually in milliseconds, or
ms)
QoS = Quality of Service (CBR - constant bit rate, VBR - variable bit rate, ABR -
available bit rate, UBR - unreliable bit rate, or none)
de = delivery rate (sometimes called throughput percentage)




                                                                                        8
9
Connection from L.A. to Chicago might be:
       d = 2250
       s = medium
       du = full
       dr = 256 Kbps
       l = 200 ms
       QoS = ABR
       de = 99.9%


                                            10
11
Network Modeling
An metropolitan area connectivity map shows the design of a
metropolitan area and its network facilities.
      QoS = VBR
      dr = 100 Mpbs
      s = high
      d = 5 km
      failover = 50 ms
      de = 99.9%



                                                        12
13
Network Modeling
An local area overview connectivity map shows the design of a
big picture design of a local area network.
       QoS = none
       dr = 100 Mpbs
       s = none
       d = 85 m
       du = full
       thru = 50%




                                                          14
15
Network Modeling
An local area detailed connectivity map shows the close-up
design of a local area network, including switches, routers,
hubs, and servers.
Much like the homework we did earlier showing LAN
connections.




                                                         16
17
Feasibility Studies
There are a number of ways to determine if a proposed system is going to be feasible.
Technically feasible means the proposed system can be created and implemented
using currently existing technology.
Financially feasible means the proposed system can be built given the company’s
current financial ability.
Operationally feasible means the system operates as designed and implemented.
Time feasible means the system can be constructed in an agreed upon time frame.
Payback analysis is a good technique to use to determine financial feasibility.
To calculate payback analysis, you must know all the expenses that will be incurred
to create and maintain the system, as well as all possible income derived from the
system.
You must also be aware of the time value of money (a dollar today is worth more than
one dollar promised a year from now because the dollar can be invested).

                                                                                  18
19
20
Capacity Planning
Capacity planning involves trying to determine the amount of network bandwidth
necessary to support an application or a set of applications.
A number of techniques exist for performing capacity planning, including linear
projection, computer simulation, benchmarking, and analytical modeling.
Linear projection involves predicting one or more network capacities based on the
current network parameters and multiplying by some constant.
A computer simulation involves modeling an existing system or proposed system
using a computer-based simulation tool.
Benchmarking involves generating system statistics under a controlled environment
and then comparing those statistics against known measurements.
Analytical modeling involves the creation of mathematical equations to calculate
various network values.


                                                                             21
Creating a Baseline

Involves the measurement and recording of a network’s state of operation
over a given period of time.
A baseline can be used to determine current network performance and to help
determine future network needs.
Baseline studies should be ongoing projects, and not something started and
stopped every so many years. To perform a baseline study, you should:
• Collect information on number and type of system nodes, including
workstations, routers, bridges, switches, hubs, and servers.
• Create an up-to-date roadmap of all nodes along with model numbers, serial
numbers and any address information such as IP or Ethernet addresses.
• Collect information on operational protocols used throughout the system.


                                                                             22
Creating a Baseline
To perform a baseline study, you should:
• List all network applications, including the number, type and
utilization level.
• Create a fairly extensive list of statistics to help meet your
goals. These statistics can include average network utilization,
peak network utilization, average frame size, peak frame size,
average frames per second, peak frames per second, total
network collisions, network collisions per second, total runts,
total jabbers, total CRC errors, and nodes with highest
percentage of utilization.



                                                             23
24
Network Manager Skills
A good network manager will possess many skills:
• Computer skills
• People skills
• Management skills
• Financial planning skills
• Knowledge of statistics
• Speaking and writing skills



                                                   25
Generating Useable Statistics
Statistics, properly generated, can be an invaluable aid to
demonstrating current system demands and predicting future
needs.
Mean time between failures (MTBF) is the average time a
device or system will operate before it fails.
Mean time to repair (MTTR) is the average time necessary to
repair a failure within the computer system.
Availability is the probability that a particular component or
system will be available during a fixed time period.
Availability % = (Total available time – Downtime) / Total
               available time
                                                             26
Generating Useable Statistics
Suppose we want to calculate the availability of a modem that for
one month (24 hours per day for 30 days, or 720 hours), knowing
the modem will be down for two hours during that period:

Availability % = (720 – 2) / 720
               = 0.997

Reliability is defined by the equation:

                       R(t) = e -bt

in which:      b = 1/MTBF
               t = the time interval of the operation
                                                            27
Generating Useable Statistics
What is the reliability of a modem if the MTBF is 3000 hours
and a transaction takes 20 minutes, or 1/3 of an hour (0.333
hours):

R(0.333 hours) = e -(1/3000)(0.333) = e -0.000111 = 0.99989




                                                               28
Managing Operations
There are many services and functions available to assist an individual in managing
computer network operations.
One of the more useful is Simple Network Management Protocol (SNMP).
SNMP is an industry standard designed to manage network components from a
remote location.
Currently in version 3, SNMP supports agents, managers, and the Management
Information Base (MIB).
A managed element has management software, called an agent, running in it.
A second object, the SNMP manager, controls the operations of a managed element
and maintains a database of information about all managed elements.
A manager can query an agent to return current operating values, or can instruct an
agent to perform a particular action.
The Management Information Base (MIB) is a collection of information that is
organized hierarchically and describes the operating parameters of all managed
agents.

                                                                               29
Network Diagnostic Tools
To assist a network support person, a number of diagnostic tools
are available:
• Electrical testers
• Cable testers
• Network testers
• Protocol analyzers




                                                             30
Capacity Planning and Network Design In
Action: Sample Corporation
Sample Corporation complete design, including e-mail and
Internet access for each of the four sites.
A linear projection can be used to estimate the amount of
Internet traffic at each site.
An wide area connectivity map gives us a big picture of the
network interconnections.




                                                        31
32
Capacity Planning and Network Design In
Action: Sample Corporation
A second linear projection can be used to determine the amount
of local area network traffic within each site.




                                                           33
34
Lesson 02

Local Area Networks



                      35
Why Interconnect?
To separate / connect one corporate division with another.
To connect two LANs with different protocols.
To connect a LAN to the Internet.
To break a LAN into segments to relieve traffic congestion.
To provide a security wall between two different types of users.




                                                              36
Hubs
As seen earlier, a hub interconnects two or more workstations
into a local area network.
When a workstation transmits to a hub, the hub immediately
resends the data frame out all connecting links.
A hub can be managed or unmanaged. A managed hub
possesses enough processing power that it can be managed from
a remote location.



                                                         37
Bridges
A bridge (or bridge-like device) can be used to connect two
similar LANs, such as two CSMA/CD LANs.
A bridge can also be used to connect two closely similar LANs,
such as a CSMA/CD LAN and a token ring LAN.
The bridge examines the destination address in a frame and
either forwards this frame onto the next LAN or does not.
The bridge examines the source address in a frame and places
this address in a routing table, to be used for future routing
decisions.

                                                           38
39
Transparent Bridges
A transparent bridge does not need programming but observes
all traffic and builds routing tables from this observation.
This observation is called backward learning.
Each bridge has two connections (ports) and there is a routing
table associated with each port.
A bridge observes each frame that arrives at a port, extracts the
source address from the frame, and places that address in the
port’s routing table.
A transparent bridge is found with CSMA/CD LANs.

                                                              40
41
42
Transparent Bridges
A transparent bridge can also convert one frame format to
another, but this does not happen too often anymore since most
networks are CSMA/CD.
Note that some people / manufacturers call a bridge such as this
a gateway or sometimes a router.
The bridge removes the headers and trailers from one frame
format and inserts (encapsulates) the headers and trailers for the
second frame format.



                                                               43
Remote Bridges
A remote bridge is capable of passing a data frame from one
local area network to another when the two LANs are separated
by a long distance and there is a wide area network connecting
the two LANs.
A remote bridge takes the frame before it leaves the first LAN
and encapsulates the WAN headers and trailers.
When the packet arrives at the destination remote bridge, that
bridge removes the WAN headers and trailers leaving the
original frame.

                                                           44
45
Spanning Tree Algorithm
What happens if you have many LANs interconnected with
multiple bridges, such as shown in the next slide?
Data that leaves one workstation could travel to a bridge, across
the next network, into the next bridge, and back onto the first
network.
A packet may continue to cycle like this forever!




                                                              46
47
48
Spanning Tree Algorithm
How do we stop this from happening?
Disconnect one of the bridges?         Maybe we want bridge
redundancy in case one bridge fails.
How about applying the spanning tree algorithm.
How is the algorithm applied?




                                                        49
Spanning Tree Algorithm
Step 1: Designate a Root Bridge
Step 2: Mark one port of each bridge as the Root Port. The root port is the
port with the least-cost path from that bridge to the root bridge. The root ports
are denoted with an asterisk.
Step 3: The next step is to select a designated bridge for each LAN. A
designated bridge has the least-cost path between that LAN and the root
bridge. Mark the corresponding port that connects that LAN to its designated
bridge with two asterisks.
Step 4: If a port has no asterisks, that port is redundant and can be “removed”.
Keep all ports with one or two asterisks. The resulting configuration is shown
in Figure 8-7c.
Note there is now only one way to get to any LAN or bridge from any other
LAN or bridge.

                                                                             50
51
Switches
A switch is a combination of a hub and a bridge.
It can interconnect two or more workstations, but like a bridge, it observes traffic flow
and learns.
When a frame arrives at a switch, the switch examines the destination address and
forwards the frame out the one necessary connection.
Workstations that connect to a hub are on a shared segment.
Workstations that connect to a switch are on a switched segment.
The backplane of a switch is fast enough to support multiple data transfers at one time.
A switch that employs cut-through architecture is passing on the frame before the
entire frame has arrived at the switch.
Multiple workstations connected to a switch use dedicated segments. This is a very
efficient way to isolate heavy users from the network.
A switch can allow simultaneous access to multiple servers, or multiple simultaneous
connections to a single server.

                                                                                     52
53
54
Virtual LANs
A virtual LAN, or VLAN, is a logical subgroup within a local area network
that is created via switches and software rather than by manually moving
wiring from one network device to another
Even though the employees and their actual computer workstations may be
scattered throughout the building, LAN switches and VLAN software can be
used to create a “network within a network.”
A relatively new standard, IEEE 802.1Q, was designed to allow multiple
devices to intercommunicate and work together to create a virtual LAN
Instead of sending a technician to a wiring closet to move a workstation cable
from one switch to another, an 802.1Q-compliant switch can be remotely
configured by a network administrator




                                                                           55
Isolating Traffic Patterns with Switches
Whether shared or dedicated segments are involved, the primary
goal of a switch is to isolate a particular pattern of traffic from
other patterns of traffic or from the remainder of the network
Switches, because of their backplane, can also allow multiple
paths of communications to simultaneously occur




                                                                56
57
58
Isolating Traffic Patterns with Switches
Using a pair of routers, it is possible to interconnect to switched
segments, essentially creating one large local area network




                                                                59
60
Full Duplex Switches
A full duplex switch allows for simultaneous transmission and
reception of data to and from a workstation.
This full duplex connection helps to eliminate collisions.
To support a full duplex connection to a switch, at least two pairs
of wires are necessary - one for the receive operation and one for
the transmit operation. Most people install four pairs today, so
wiring is not the problem.



                                                                61
62
Network Servers
Network servers provide the storage necessary for LAN
software.
They are usually the focal point for the network operating
system.
Increasingly, network servers are functioning as bridges,
switches, and routers. By adding the appropriate card, a server
can assume multiple functions.



                                                           63
Routers
The device that connects a LAN to a WAN or a WAN to a WAN.
A router accepts an outgoing packet, removes any LAN headers and trailers, and
encapsulates the necessary WAN headers and trailers.
Because a router has to make wide area network routing decisions, the router has to
dig down into the network layer of the packet to retrieve the network destination
address.
Thus, routers are often called “layer 3 devices”. They operate at the third layer, or OSI
network layer, of the packet.
Routers often incorporate firewall functions.
An example of a router’s operation is shown on the next slide.



                                                                                     64
65
A Small Office Sample
A small office with 20 workstations in one room and 15
workstations in another room were connected to a server via
100BaseTX.
One hub was kept in a closet near the 20 workstations while a
second hub was near the server.




                                                          66
Small Office Solution Sample




                               67
A Small Office Sample
Now the owner wants to connect the LAN to the Internet.
He adds a router next to the server and connects it to the hub.
He connects the router to a high-speed telephone line such as a
T-1 service.
He will also have to program the router to perform IP addressing
and firewall functions.




                                                                  68
Small Office Solution Sample




                               69
A Small Office Sample
Now network usage is so high that he must consider segmenting
the network.
He decides to install a database server near the original server
and replace both hubs with switches.




                                                             70
Small Office Solution Sample




                               71

More Related Content

What's hot

6 network devices
6 network devices6 network devices
6 network devicesMuuluu
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
Abdelkhalik Mosa
 
Types of Network And Devices
Types of Network And DevicesTypes of Network And Devices
Types of Network And Devices
Hanshul Arya
 
Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)
Jatin Singh
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
nakomuri
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1nixon
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
bwire sedrick
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
csk selva
 
Lan and Its Components
Lan and Its ComponentsLan and Its Components
Lan and Its Components
International Islamic University
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
sarmad ali
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
Menaga Selvaraj
 
2. network elements
2. network elements2. network elements
2. network elements
Shyam Nagarajan
 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
Xi'an Jiaotong-Liverpool University
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )finalJai Kumar
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
Sorcia D'Arceuil
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
eSAT Publishing House
 

What's hot (20)

6 network devices
6 network devices6 network devices
6 network devices
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
 
Types of Network And Devices
Types of Network And DevicesTypes of Network And Devices
Types of Network And Devices
 
Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Exploration lan switching_chapter1
Exploration lan switching_chapter1Exploration lan switching_chapter1
Exploration lan switching_chapter1
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Lan and Its Components
Lan and Its ComponentsLan and Its Components
Lan and Its Components
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
2. network elements
2. network elements2. network elements
2. network elements
 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 

Viewers also liked

Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
network Switch
 network Switch network Switch
network Switch
zeeshan hanif
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
keyur Nandaniya
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
IT Tech
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Bridges and gateways 52
Bridges and gateways 52Bridges and gateways 52
Bridges and gateways 52myrajendra
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
Mukesh Tekwani
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
Pradeep Kumar TS
 
Basic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling SystemBasic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling System
Md. Abdul Awal
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
Jan Aldrich Dorado
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 

Viewers also liked (20)

Networking devices
Networking devicesNetworking devices
Networking devices
 
network Switch
 network Switch network Switch
network Switch
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Chapter ii
Chapter iiChapter ii
Chapter ii
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Network switch
Network switchNetwork switch
Network switch
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Bridges and gateways 52
Bridges and gateways 52Bridges and gateways 52
Bridges and gateways 52
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 
3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Chapter2 thesis
Chapter2 thesisChapter2 thesis
Chapter2 thesis
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Basic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling SystemBasic Campus Network Design - Network Cabling System
Basic Campus Network Design - Network Cabling System
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 

Similar to Lesson02 - Network Design & LAN

Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
tlerell
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementAngel G Diaz
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
Arlene Smith
 
Cloud data management
Cloud data managementCloud data management
Cloud data managementambitlick
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
Dhaya kanthavel
 
Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...
YOU SHENG CHEN
 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptx
AsfawGedamu
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
Khubaib Ahmad Kunjahi
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
eShikshak
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Engr. Md. Jamal Uddin Rayhan
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
Angela Hays
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
IOSR Journals
 
PETRUCCI_Andrea_Research_Projects_and_Publications
PETRUCCI_Andrea_Research_Projects_and_PublicationsPETRUCCI_Andrea_Research_Projects_and_Publications
PETRUCCI_Andrea_Research_Projects_and_PublicationsAndrea PETRUCCI
 
Network analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptNetwork analysis and design unite_-i.ppt
Network analysis and design unite_-i.ppt
asaijohn
 
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
KumarSuman24
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
Craig Burma
 

Similar to Lesson02 - Network Design & LAN (20)

Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
 
Ch14
Ch14Ch14
Ch14
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and Management
 
Scheduling in CCE
Scheduling in CCEScheduling in CCE
Scheduling in CCE
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...Paper sharing_resource optimization scheduling and allocation for hierarchica...
Paper sharing_resource optimization scheduling and allocation for hierarchica...
 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptx
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
 
Final_Report
Final_ReportFinal_Report
Final_Report
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
F01113945
F01113945F01113945
F01113945
 
PETRUCCI_Andrea_Research_Projects_and_Publications
PETRUCCI_Andrea_Research_Projects_and_PublicationsPETRUCCI_Andrea_Research_Projects_and_Publications
PETRUCCI_Andrea_Research_Projects_and_Publications
 
Network analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptNetwork analysis and design unite_-i.ppt
Network analysis and design unite_-i.ppt
 
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
 

More from Angel G Diaz

SQL Developer installation-guide
SQL Developer installation-guideSQL Developer installation-guide
SQL Developer installation-guideAngel G Diaz
 
Lesson 01 - Introduction to SQL
Lesson 01 - Introduction to SQLLesson 01 - Introduction to SQL
Lesson 01 - Introduction to SQLAngel G Diaz
 
Lesson 01 - Network Assessment
Lesson 01 - Network AssessmentLesson 01 - Network Assessment
Lesson 01 - Network Assessment
Angel G Diaz
 
OracleXE & SQLDeveloper Install
OracleXE & SQLDeveloper InstallOracleXE & SQLDeveloper Install
OracleXE & SQLDeveloper Install
Angel G Diaz
 
GNS3 Simulator Installation
GNS3 Simulator InstallationGNS3 Simulator Installation
GNS3 Simulator Installation
Angel G Diaz
 
WAMP & Joomla! Installation
WAMP & Joomla! InstallationWAMP & Joomla! Installation
WAMP & Joomla! Installation
Angel G Diaz
 
COIS 420 - Practice04
COIS 420 - Practice04COIS 420 - Practice04
COIS 420 - Practice04
Angel G Diaz
 
COIS 420 - Practice 03
COIS 420 - Practice 03COIS 420 - Practice 03
COIS 420 - Practice 03
Angel G Diaz
 
COIS 420 - Practice02
COIS 420 - Practice02COIS 420 - Practice02
COIS 420 - Practice02
Angel G Diaz
 
COIS 420 - Practice01
COIS 420 - Practice01COIS 420 - Practice01
COIS 420 - Practice01
Angel G Diaz
 
Errors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlErrors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlAngel G Diaz
 
Errors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlErrors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlAngel G Diaz
 
Making Connections Efficient: Multiplexing and Compression
Making Connections Efficient: Multiplexing and CompressionMaking Connections Efficient: Multiplexing and Compression
Making Connections Efficient: Multiplexing and CompressionAngel G Diaz
 
Making Connections
Making ConnectionsMaking Connections
Making ConnectionsAngel G Diaz
 
Conducted and Wireless Media
Conducted and Wireless MediaConducted and Wireless Media
Conducted and Wireless MediaAngel G Diaz
 
Fundamentals of Data and Signals
Fundamentals of Data and SignalsFundamentals of Data and Signals
Fundamentals of Data and SignalsAngel G Diaz
 
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsAngel G Diaz
 
Cois240 lesson01
Cois240 lesson01Cois240 lesson01
Cois240 lesson01
Angel G Diaz
 

More from Angel G Diaz (18)

SQL Developer installation-guide
SQL Developer installation-guideSQL Developer installation-guide
SQL Developer installation-guide
 
Lesson 01 - Introduction to SQL
Lesson 01 - Introduction to SQLLesson 01 - Introduction to SQL
Lesson 01 - Introduction to SQL
 
Lesson 01 - Network Assessment
Lesson 01 - Network AssessmentLesson 01 - Network Assessment
Lesson 01 - Network Assessment
 
OracleXE & SQLDeveloper Install
OracleXE & SQLDeveloper InstallOracleXE & SQLDeveloper Install
OracleXE & SQLDeveloper Install
 
GNS3 Simulator Installation
GNS3 Simulator InstallationGNS3 Simulator Installation
GNS3 Simulator Installation
 
WAMP & Joomla! Installation
WAMP & Joomla! InstallationWAMP & Joomla! Installation
WAMP & Joomla! Installation
 
COIS 420 - Practice04
COIS 420 - Practice04COIS 420 - Practice04
COIS 420 - Practice04
 
COIS 420 - Practice 03
COIS 420 - Practice 03COIS 420 - Practice 03
COIS 420 - Practice 03
 
COIS 420 - Practice02
COIS 420 - Practice02COIS 420 - Practice02
COIS 420 - Practice02
 
COIS 420 - Practice01
COIS 420 - Practice01COIS 420 - Practice01
COIS 420 - Practice01
 
Errors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlErrors, Error Detection, and Error Control
Errors, Error Detection, and Error Control
 
Errors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlErrors, Error Detection, and Error Control
Errors, Error Detection, and Error Control
 
Making Connections Efficient: Multiplexing and Compression
Making Connections Efficient: Multiplexing and CompressionMaking Connections Efficient: Multiplexing and Compression
Making Connections Efficient: Multiplexing and Compression
 
Making Connections
Making ConnectionsMaking Connections
Making Connections
 
Conducted and Wireless Media
Conducted and Wireless MediaConducted and Wireless Media
Conducted and Wireless Media
 
Fundamentals of Data and Signals
Fundamentals of Data and SignalsFundamentals of Data and Signals
Fundamentals of Data and Signals
 
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications
 
Cois240 lesson01
Cois240 lesson01Cois240 lesson01
Cois240 lesson01
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Lesson02 - Network Design & LAN

  • 1. Lesson 02 Network Design and Management 1
  • 2. Systems Development Life Cycle Every business has a number of goals. System planners and management personnel within a company try to generate a set of questions, or problems, to help the company achieve those goals. To properly understand a problem, analyze all possible solutions, select the best solution, and implement and maintain the solution, you need to follow a well-defined plan. SDLC is a methodology, or plan, for a structured approach to the development of a business system. 2
  • 3. Systems Development Life Cycle SDLC involves several phases. These phases are often: • Planning • Analysis • Design • Implementation • Maintenance These phases are cyclical and usually never ending. 3
  • 4. 4
  • 5. Systems Development Life Cycle A systems analyst is typically responsible for managing a project and following the SDLC phases. Anyone, however, may be called upon to assist a systems analyst. Or anyone may have to assume some of the duties of a systems analyst. Individuals that are called upon to support a computer network should understand the basic phases of SDLC. 5
  • 6. Systems Development Life Cycle Planning Phase - Identify problems, opportunities, and objectives. Analysis Phase - Determine information requirements. Information requirements can be gathered by sampling and collecting hard data, interviewing, questionnaires, observing environments, and prototyping. Design Phase - Design the system that was recommended and approved at the end of the analysis phase. Implementation Phase - The system is installed and preparations are made to move from the old system to the new. Maintenance Phase - The longest phase, involves the ongoing maintenance of the project. Maintenance may require personnel to return to an earlier phase to perform an update. 6
  • 7. Network Modeling When updating or creating a new computer system, the analyst will create a set of models for both the existing system (if there is one) and the proposed system. Network models can either demonstrate the current state of the network or can model the desired computer network. A series of connectivity maps are network modeling tools that depict the various locations involved over a wide and local areas and the interconnections between those locations. An wide area connectivity map shows the big picture of geographic locations of network facilities. External users and mobile users can be identified, as well as the locations primary to a business. 7
  • 8. Network Modeling To identify each connection between sites: d = distance of the connection (usually shown in either miles or kilometers) s = security level (high, medium, low, or none) du = duplexity (full duplex, half duplex, or simplex) dr = data rate desired (in bps) l = latency, or acceptable delay time across the network (usually in milliseconds, or ms) QoS = Quality of Service (CBR - constant bit rate, VBR - variable bit rate, ABR - available bit rate, UBR - unreliable bit rate, or none) de = delivery rate (sometimes called throughput percentage) 8
  • 9. 9
  • 10. Connection from L.A. to Chicago might be: d = 2250 s = medium du = full dr = 256 Kbps l = 200 ms QoS = ABR de = 99.9% 10
  • 11. 11
  • 12. Network Modeling An metropolitan area connectivity map shows the design of a metropolitan area and its network facilities. QoS = VBR dr = 100 Mpbs s = high d = 5 km failover = 50 ms de = 99.9% 12
  • 13. 13
  • 14. Network Modeling An local area overview connectivity map shows the design of a big picture design of a local area network. QoS = none dr = 100 Mpbs s = none d = 85 m du = full thru = 50% 14
  • 15. 15
  • 16. Network Modeling An local area detailed connectivity map shows the close-up design of a local area network, including switches, routers, hubs, and servers. Much like the homework we did earlier showing LAN connections. 16
  • 17. 17
  • 18. Feasibility Studies There are a number of ways to determine if a proposed system is going to be feasible. Technically feasible means the proposed system can be created and implemented using currently existing technology. Financially feasible means the proposed system can be built given the company’s current financial ability. Operationally feasible means the system operates as designed and implemented. Time feasible means the system can be constructed in an agreed upon time frame. Payback analysis is a good technique to use to determine financial feasibility. To calculate payback analysis, you must know all the expenses that will be incurred to create and maintain the system, as well as all possible income derived from the system. You must also be aware of the time value of money (a dollar today is worth more than one dollar promised a year from now because the dollar can be invested). 18
  • 19. 19
  • 20. 20
  • 21. Capacity Planning Capacity planning involves trying to determine the amount of network bandwidth necessary to support an application or a set of applications. A number of techniques exist for performing capacity planning, including linear projection, computer simulation, benchmarking, and analytical modeling. Linear projection involves predicting one or more network capacities based on the current network parameters and multiplying by some constant. A computer simulation involves modeling an existing system or proposed system using a computer-based simulation tool. Benchmarking involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Analytical modeling involves the creation of mathematical equations to calculate various network values. 21
  • 22. Creating a Baseline Involves the measurement and recording of a network’s state of operation over a given period of time. A baseline can be used to determine current network performance and to help determine future network needs. Baseline studies should be ongoing projects, and not something started and stopped every so many years. To perform a baseline study, you should: • Collect information on number and type of system nodes, including workstations, routers, bridges, switches, hubs, and servers. • Create an up-to-date roadmap of all nodes along with model numbers, serial numbers and any address information such as IP or Ethernet addresses. • Collect information on operational protocols used throughout the system. 22
  • 23. Creating a Baseline To perform a baseline study, you should: • List all network applications, including the number, type and utilization level. • Create a fairly extensive list of statistics to help meet your goals. These statistics can include average network utilization, peak network utilization, average frame size, peak frame size, average frames per second, peak frames per second, total network collisions, network collisions per second, total runts, total jabbers, total CRC errors, and nodes with highest percentage of utilization. 23
  • 24. 24
  • 25. Network Manager Skills A good network manager will possess many skills: • Computer skills • People skills • Management skills • Financial planning skills • Knowledge of statistics • Speaking and writing skills 25
  • 26. Generating Useable Statistics Statistics, properly generated, can be an invaluable aid to demonstrating current system demands and predicting future needs. Mean time between failures (MTBF) is the average time a device or system will operate before it fails. Mean time to repair (MTTR) is the average time necessary to repair a failure within the computer system. Availability is the probability that a particular component or system will be available during a fixed time period. Availability % = (Total available time – Downtime) / Total available time 26
  • 27. Generating Useable Statistics Suppose we want to calculate the availability of a modem that for one month (24 hours per day for 30 days, or 720 hours), knowing the modem will be down for two hours during that period: Availability % = (720 – 2) / 720 = 0.997 Reliability is defined by the equation: R(t) = e -bt in which: b = 1/MTBF t = the time interval of the operation 27
  • 28. Generating Useable Statistics What is the reliability of a modem if the MTBF is 3000 hours and a transaction takes 20 minutes, or 1/3 of an hour (0.333 hours): R(0.333 hours) = e -(1/3000)(0.333) = e -0.000111 = 0.99989 28
  • 29. Managing Operations There are many services and functions available to assist an individual in managing computer network operations. One of the more useful is Simple Network Management Protocol (SNMP). SNMP is an industry standard designed to manage network components from a remote location. Currently in version 3, SNMP supports agents, managers, and the Management Information Base (MIB). A managed element has management software, called an agent, running in it. A second object, the SNMP manager, controls the operations of a managed element and maintains a database of information about all managed elements. A manager can query an agent to return current operating values, or can instruct an agent to perform a particular action. The Management Information Base (MIB) is a collection of information that is organized hierarchically and describes the operating parameters of all managed agents. 29
  • 30. Network Diagnostic Tools To assist a network support person, a number of diagnostic tools are available: • Electrical testers • Cable testers • Network testers • Protocol analyzers 30
  • 31. Capacity Planning and Network Design In Action: Sample Corporation Sample Corporation complete design, including e-mail and Internet access for each of the four sites. A linear projection can be used to estimate the amount of Internet traffic at each site. An wide area connectivity map gives us a big picture of the network interconnections. 31
  • 32. 32
  • 33. Capacity Planning and Network Design In Action: Sample Corporation A second linear projection can be used to determine the amount of local area network traffic within each site. 33
  • 34. 34
  • 35. Lesson 02 Local Area Networks 35
  • 36. Why Interconnect? To separate / connect one corporate division with another. To connect two LANs with different protocols. To connect a LAN to the Internet. To break a LAN into segments to relieve traffic congestion. To provide a security wall between two different types of users. 36
  • 37. Hubs As seen earlier, a hub interconnects two or more workstations into a local area network. When a workstation transmits to a hub, the hub immediately resends the data frame out all connecting links. A hub can be managed or unmanaged. A managed hub possesses enough processing power that it can be managed from a remote location. 37
  • 38. Bridges A bridge (or bridge-like device) can be used to connect two similar LANs, such as two CSMA/CD LANs. A bridge can also be used to connect two closely similar LANs, such as a CSMA/CD LAN and a token ring LAN. The bridge examines the destination address in a frame and either forwards this frame onto the next LAN or does not. The bridge examines the source address in a frame and places this address in a routing table, to be used for future routing decisions. 38
  • 39. 39
  • 40. Transparent Bridges A transparent bridge does not need programming but observes all traffic and builds routing tables from this observation. This observation is called backward learning. Each bridge has two connections (ports) and there is a routing table associated with each port. A bridge observes each frame that arrives at a port, extracts the source address from the frame, and places that address in the port’s routing table. A transparent bridge is found with CSMA/CD LANs. 40
  • 41. 41
  • 42. 42
  • 43. Transparent Bridges A transparent bridge can also convert one frame format to another, but this does not happen too often anymore since most networks are CSMA/CD. Note that some people / manufacturers call a bridge such as this a gateway or sometimes a router. The bridge removes the headers and trailers from one frame format and inserts (encapsulates) the headers and trailers for the second frame format. 43
  • 44. Remote Bridges A remote bridge is capable of passing a data frame from one local area network to another when the two LANs are separated by a long distance and there is a wide area network connecting the two LANs. A remote bridge takes the frame before it leaves the first LAN and encapsulates the WAN headers and trailers. When the packet arrives at the destination remote bridge, that bridge removes the WAN headers and trailers leaving the original frame. 44
  • 45. 45
  • 46. Spanning Tree Algorithm What happens if you have many LANs interconnected with multiple bridges, such as shown in the next slide? Data that leaves one workstation could travel to a bridge, across the next network, into the next bridge, and back onto the first network. A packet may continue to cycle like this forever! 46
  • 47. 47
  • 48. 48
  • 49. Spanning Tree Algorithm How do we stop this from happening? Disconnect one of the bridges? Maybe we want bridge redundancy in case one bridge fails. How about applying the spanning tree algorithm. How is the algorithm applied? 49
  • 50. Spanning Tree Algorithm Step 1: Designate a Root Bridge Step 2: Mark one port of each bridge as the Root Port. The root port is the port with the least-cost path from that bridge to the root bridge. The root ports are denoted with an asterisk. Step 3: The next step is to select a designated bridge for each LAN. A designated bridge has the least-cost path between that LAN and the root bridge. Mark the corresponding port that connects that LAN to its designated bridge with two asterisks. Step 4: If a port has no asterisks, that port is redundant and can be “removed”. Keep all ports with one or two asterisks. The resulting configuration is shown in Figure 8-7c. Note there is now only one way to get to any LAN or bridge from any other LAN or bridge. 50
  • 51. 51
  • 52. Switches A switch is a combination of a hub and a bridge. It can interconnect two or more workstations, but like a bridge, it observes traffic flow and learns. When a frame arrives at a switch, the switch examines the destination address and forwards the frame out the one necessary connection. Workstations that connect to a hub are on a shared segment. Workstations that connect to a switch are on a switched segment. The backplane of a switch is fast enough to support multiple data transfers at one time. A switch that employs cut-through architecture is passing on the frame before the entire frame has arrived at the switch. Multiple workstations connected to a switch use dedicated segments. This is a very efficient way to isolate heavy users from the network. A switch can allow simultaneous access to multiple servers, or multiple simultaneous connections to a single server. 52
  • 53. 53
  • 54. 54
  • 55. Virtual LANs A virtual LAN, or VLAN, is a logical subgroup within a local area network that is created via switches and software rather than by manually moving wiring from one network device to another Even though the employees and their actual computer workstations may be scattered throughout the building, LAN switches and VLAN software can be used to create a “network within a network.” A relatively new standard, IEEE 802.1Q, was designed to allow multiple devices to intercommunicate and work together to create a virtual LAN Instead of sending a technician to a wiring closet to move a workstation cable from one switch to another, an 802.1Q-compliant switch can be remotely configured by a network administrator 55
  • 56. Isolating Traffic Patterns with Switches Whether shared or dedicated segments are involved, the primary goal of a switch is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network Switches, because of their backplane, can also allow multiple paths of communications to simultaneously occur 56
  • 57. 57
  • 58. 58
  • 59. Isolating Traffic Patterns with Switches Using a pair of routers, it is possible to interconnect to switched segments, essentially creating one large local area network 59
  • 60. 60
  • 61. Full Duplex Switches A full duplex switch allows for simultaneous transmission and reception of data to and from a workstation. This full duplex connection helps to eliminate collisions. To support a full duplex connection to a switch, at least two pairs of wires are necessary - one for the receive operation and one for the transmit operation. Most people install four pairs today, so wiring is not the problem. 61
  • 62. 62
  • 63. Network Servers Network servers provide the storage necessary for LAN software. They are usually the focal point for the network operating system. Increasingly, network servers are functioning as bridges, switches, and routers. By adding the appropriate card, a server can assume multiple functions. 63
  • 64. Routers The device that connects a LAN to a WAN or a WAN to a WAN. A router accepts an outgoing packet, removes any LAN headers and trailers, and encapsulates the necessary WAN headers and trailers. Because a router has to make wide area network routing decisions, the router has to dig down into the network layer of the packet to retrieve the network destination address. Thus, routers are often called “layer 3 devices”. They operate at the third layer, or OSI network layer, of the packet. Routers often incorporate firewall functions. An example of a router’s operation is shown on the next slide. 64
  • 65. 65
  • 66. A Small Office Sample A small office with 20 workstations in one room and 15 workstations in another room were connected to a server via 100BaseTX. One hub was kept in a closet near the 20 workstations while a second hub was near the server. 66
  • 68. A Small Office Sample Now the owner wants to connect the LAN to the Internet. He adds a router next to the server and connects it to the hub. He connects the router to a high-speed telephone line such as a T-1 service. He will also have to program the router to perform IP addressing and firewall functions. 68
  • 70. A Small Office Sample Now network usage is so high that he must consider segmenting the network. He decides to install a database server near the original server and replace both hubs with switches. 70