Upload
aniruddh-brahmbhatt
View
292
Download
0
Embed Size (px)
Citation preview
Requirement Analysis Architecture Design Application User Network services Security and Safety Growth and capacity planning
Design Of Network
Design network consist three main phases
• Designing a network is typically broken into three sections:– Determine
requirements– Define the overall
architecture– Choose technology
and specific devices
Requirement analysis : in requirement analysis of network u need to
analysis whole network requirement including what type of network is suitable for the organization.
Device: which type of topology you are using at the first time you setup the network. It is also effect the geographical area where network will be setup.
Network : which type of network can be implemented
easily on the site . if organization require the peer to peer network than there is no needs of client/server architecture
Requirement Analysis
Requirements can come from many aspects of the network systemUser Requirements Application Requirements Device Requirements Network Requirements Other Requirements
Requirement Analysis
User requirements are often qualitative and very high level◦ What is ‘fast enough’ for
download? System response ?
◦ How good does video need to be?
◦ What’s my budget?
User Requirements
What groups of apps are being used?◦ Telemetry/command and control - remote devices◦ Visualization and simulation◦ Distributed computing◦ Web development, access, and use◦ Bulk data transport – FTP ◦ Teleservice – VOIP, teleconference◦ Operations, admin, maintenance, and
provisioning (OAM&P) – DNS, SMTP, SNMP◦ Client-server – ERP, SCM, CRM
Application requirement: In application requirement which is the best environment setup is suitable for the organization with cost effective and easily maintains is possible.
What kinds of devices are on your network?◦ Generic computing devices include normal PCs,
Macs, laptops, handheld computers, workstations◦ Servers include all flavors of server – file, print,
app/computation, and backup◦ Specialized devices include extreme servers
(supercomputers, massively parallel servers), data collection systems (POS terminals), industry-specific devices, networked devices (cameras, tools), stoplights, ATMs, etc.
Device Requirements
Issues with network integration include◦ Scaling dependencies – how will the size of the
existing network affect the new one? Will the existing network change structure, or just
add on a new wing?◦ Location dependencies – interaction between old
and new networks could change the location of key components
◦ Performance constraints – existing network could limit performance of the new one
Network Requirements
Network management and security issues need to be addressed throughout development◦ How will the network be monitored for events?◦ Monitoring for network performance?
What is the hierarchy for management data flow?◦ Network configuration?◦ Troubleshoot support?
Which type of architecture is suitable for the organization. Peer to peer and client server architecture Is needed.
Relationship within network function: It depends on the which type of
architecture design or selected It may be peer to peer(workgroup) or
client/server architecture.
Architecture:
It can be design with the use of physical dimensions of area with which topology is best for that organizations.
Topology: which is easily implemented on the requirement of network or which is best for the organizations
Equipment choice: it depends on the topology selection which layer swich is required and which type of cabling is used on the implementation.
Technology : which technology is suitable as per requirement.
Connectivity choice : connectivity you have to choose best technology is used for the Structuring a network :
Small size of network not requires the structure cabling than large size of require the structure cabling with the high speed connection of fiber optic.
If two buildings where connected for data transfer or uplink than it requires the fiber optic connectivity for faster data transfer.
Design
Excel Database Ms word Power point Email Calendar Presentation graphics
ApplicationIt depends on the organization requirement or which type of work in organization done.
File & print Telnet Ftp Backup and restore Internet web browsing Vpn Voice overip Dhcp server
Network services
How do you protect system resources and data from theft, damage, DoS, and unauthorized access?◦ VPN, encryption, firewalls, routing filters, NAT◦ Threat analysis, physical vs app security
Define security zones (cells) for different levels of security
Affects how other architectural components can interact with each other
security and safety
Growth and capacity means future up gradation is possible or not.
Number of user can be added after network is implemented.
Growth and capacity planning