CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS



Similar documents
NOS for Network Support (903)

White Paper. Requirements of Network Virtualization

Top-Down Network Design

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Designing for Cisco Internetwork Solutions

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

Networking Systems (10102)

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science

IT Governance Overview

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

HOW TO DEVELOP A STRATEGIC NETWORK PLAN

Planeamento e Gestão de Redes. Análise de Requisitos

Real-Time (Paradigms) (51)

Enterprise Network Solution

Please purchase PDF Split-Merge on to remove this watermark.

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Fundamentals of a Windows Server Infrastructure MOC 10967

Solution Brief. Secure and Assured Networking for Financial Services

Communication Networks. MAP-TELE 2011/12 José Ruela

Security Design.

APPENDIX 8 TO SCHEDULE 3.3

Automated Network Control for

ControlLogix and CompactLogix 5370 Segmentation Methods for Plant-wide/ Site-wide Networks with OEM Convergence-ready Solutions

Top-Down Network Design

Network Management Slide Set 3

Cloud Computing - Architecture, Applications and Advantages

APPENDIX 8 TO SCHEDULE 3.3

Course Outline. ttttttt

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Gathering Network Requirements

Clustering and Queue Replication:

Cisco Network Optimization Service

Infoblox Grid TM. Automated Network Control for. Unifying DNS Management and Extending the Infoblox Grid TM to the F5 Global Traffic Manager

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Availability Management: A CA Service Management Process Map

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Network System Design Lesson Objectives

Hosted PBX Platform-asa-Service. Offering

Cisco Video Surveillance Services

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

Lecture 4: Introduction to Computer Network Design

IT Cost Reduction. Doing More with Less. Anita Ballaney, Vishwanath Shenoy, Michael Gavigan. Strategic IT cost reduction - Doing More with Less

Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network

Extend the value of your core business systems.

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Network Design Methodology

Service resiliency and reliability Quality of Experience Modelling requirements A PlanetLab proposal. PDCAT'08 - Dunedin December 1-4, 2008

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Gaining Operational Efficiencies with the Enterasys S-Series

Trademark Notice. General Disclaimer

ITC Corporate Connect

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

Contents. Foreword. Acknowledgments

IBM Tivoli Network Manager software

November Defining the Value of MPLS VPNs

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Understanding ITIL Service Portfolio Management and the Service Catalog. An approach for implementing effective service lifecycle management

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

ADTRAN Overview Brochure

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

Local Area Networks (LANs) Blueprint (May 2012 Release)

WAN and VPN Solutions:

Avaya Virtualization Provisioning Service

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

Introduction. The Inherent Unpredictability of IP Networks # $# #

Huawei One Net Campus Network Solution

Cisco Advanced Services for Network Security

SAP Performance Management. A Trend Study by Compuware and PAC

COSMOCOM WHITEPAPER SERIES

Packetized Telephony Networks

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

TOPOLOGIES NETWORK SECURITY SERVICES

Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer

VoIP / SIP Planning and Disclosure

Transcription:

CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS Expected Outcomes Able to analyse a computer network requirements Able to analyse business goals and constraint Able to understand and apply the Top-Down Network Design Methodology

Top-Down Network Design Network design should be a complete process that matches business needs to available technology to deliver a system that will maximize an organization s success Following a formal design process increases your chances of success. Also decrease the following: 1. Failure to meet requirements 2. Creeping requirements- Specification addition and changes can disastrously increase the amount of time, effort and money. All change requests must be clearly documented, communicated and evaluated. 3. Missed deadlines and budget overruns 4. Dissatisfied end users 5. Dissatisfied management

Start at the Top Don t just start connecting the dots Analyse business and technical goals first Explore divisional and group structures to find out who the network serves and where they reside Determine what applications will run on the network and how those applications behave on a network Focus on Layer 7 and above first Layer 8 of the OSI model encompasses office politics, budgets, training, and other human factors.

Layers of the OSI Model Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Layer 1 Application Presentation Session Transport Network Data Link Physical

Structured Design A focus is placed on understanding : data flow, data types, and processes that access or change the data. the location and needs of user communities that access or change data and processes. Several techniques and models can be used to characterize the existing system, new user requirements, and a structure for the future system. A logical model is developed before the physical model. The logical model represents the basic building blocks, divided by function, and the structure of the system. The physical model represents devices and specific technologies and implementations.

Systems Development Life Cycles SDLC: Does it mean Synchronous Data Link Control or Systems Development Life Cycle? The latter for the purposes of this class! Typical systems are developed and continue to exist over a period of time, often called a systems development life cycle (SDLC) The process of creating a new system or changing an existing system is called a life cycle Life cycle: A new network is => Planned -> Designed -> Implemented - > Maintained

Top-Down Network Design Steps Analyze requirements Monitor and optimize network performance Develop logical design Implement and test network Test, optimize, and document design Develop physical design

Network Design Steps Phase 1&2 Analyze Requirements Analyze business goals and constraints Revenue, profit, policy, politics, corporate structure Analyze users need Analyze application needs Analyze technical goals and tradeoffs No downtime, access data anywhere Characterize the existing network Characterize network traffic

../Network Design Steps Phase 2 Logical Network Design Design a network topology Design models for addressing and naming Select switching and routing protocols Develop network security strategies Develop network management strategies

../Network Design Steps Phase 3 Physical Network Design Select technologies and devices for campus networks for enterprise networks

../Network Design Steps Phase 4 Testing, Optimizing, and Documenting the Network Design Test the network design Optimize the network design Document the network design

The Network Life Cycle Plan Design Optimize Retire Implement Operate

Business Goals Increase revenue Reduce operating costs Improve communications Shorten product development cycle Expand into worldwide markets Build partnerships with other companies Offer better customer support or new customer services

Recent Business Priorities Mobility Security Resiliency (fault tolerance) Business continuity after a disaster Network projects must be prioritized based on fiscal goals Networks must offer the low delay required for real-time applications such as VoIP

Business Constraints Budget Staffing Schedule Politics and policies

Collect Information Before the First Meeting Before meeting with the client, whether internal or external, collect some basic business-related information Such as Products produced/services supplied Financial viability Customers, suppliers, competitors Competitive advantage

Meet With the Customer Try to get A concise statement of the goals of the project What problem are they trying to solve? How will new technology help them be more successful in their business? What must happen for the project to succeed?

../Meet With the Customer What will happen if the project is a failure? Is this a critical business function? Is this project visible to upper management? Who s on your side?

../Meet With the Customer Discover any biases For example Will they only use certain company s products? Do they avoid certain technologies? Do the data people look down on the voice people or vice versa? Talk to the technical and management staff

../Meet With the Customer Get a copy of the organization chart This will show the general structure of the organization It will suggest users to account for It will suggest geographical locations to account for

../Meet With the Customer Get a copy of the security policy How does the policy affect the new design? How does the new design affect the policy? Is the policy so strict that you (the network designer) won t be able to do your job? Start cataloging network assets that security should protect Hardware, software, applications, and data Less obvious, but still important, intellectual property, trade secrets, and a company's reputation

The Scope of the Design Project Small in scope? Allow sales people to access network via a VPN Large in scope? An entire redesign of an enterprise network Use the OSI model to clarify the scope New financial reporting application versus new routing protocol versus new data link (wireless, for example) Does the scope fit the budget, capabilities of staff and consultants, schedule?

Gather More Detailed Information Applications Now and after the project is completed Include both productivity applications and system management applications User communities Data stores Protocols Current logical and physical architecture Current performance

Network Applications Name of Application Type of Application New Application? Criticality Comments

Summary Systematic approach Focus first on business requirements and constraints, and applications Gain an understanding of the customer s corporate structure Gain an understanding of the customer s business style Top-Down Network Design i.e. analysing your customer s business goal Business Goal The capability to run network applications to meet business objectives and within business constraints(budgets, limited personnel, tight timeframes)