SlideShare une entreprise Scribd logo
1  sur  26
Top-Down Network Design

               Chapter One

   Analyzing Business Goals and Constraints



        Copyright 2010 Cisco Press & Priscilla Oppenheimer
Top-Down Network Design
• Network design should be a complete
  process that matches business needs to
  available technology to deliver a system that
  will maximize an organization’s success.
  – In the LAN area it is more than just buying a few
    devices.
  – In the WAN area it is more than just calling the
    phone company.
Start at the Top
• Don’t just start connecting the dots.
• Analyze business and technical goals first.
• Explore divisional and group structures to
  find out who the network serves and where
  they reside.
• Determine what applications will run on the
  network and how those applications behave
  on a network.
• Focus on Layer 7 and above first.
Layers of the OSI Model
 Layer 7   Application

 Layer 6   Presentation

 Layer 5     Session

 Layer 4    Transport

 Layer 3    Network

 Layer 2    Data Link
 Layer 1    Physical
Structured Design
• A focus is placed on understanding data flow, data types, and
  processes that access or change the data.
• A focus is placed on understanding the location and needs of
  user communities that access or change data and processes.
• Several techniques and models can be used to characterize the
  existing system, new user requirements, and a structure for the
  future system.
• A logical model is developed before the physical model.
   – The logical model represents the basic building blocks, divided by
     function, and the structure of the system.
   – The physical model represents devices and specific technologies and
     implementations.
Systems Development Life
             Cycles
• SDLC: Does it mean Synchronous Data
  Link Control or Systems Development Life
  Cycle?
• The latter for the purposes of this class!
• Typical systems are developed and continue
  to exist over a period of time, often called a
  systems development life cycle (SDLC).
Top-Down Network Design Steps
                     Analyze
                   requirements


     Monitor and                      Develop
       optimize                       logical
       network                         design
     performance




      Implement                      Develop
       and test                      physical
       network                        design
                   Test, optimize,
                   and document
                       design
Network Design Steps

• Phase 1 – Analyze Requirements
  –   Analyze business goals and constraints
  –   Analyze technical goals and tradeoffs
  –   Characterize the existing network
  –   Characterize network traffic
Network Design Steps

• Phase 2 – Logical Network Design
  –   Design a network topology
  –   Design models for addressing and naming
  –   Select switching and routing protocols
  –   Develop network security strategies
  –   Develop network management strategies
Network Design Steps

• Phase 3 – Physical Network Design
  – Select technologies and devices for campus
    networks
  – Select technologies and devices for enterprise
    networks
Network Design Steps

• Phase 4 – Testing, Optimizing, and
  Documenting the Network Design
  – Test the network design
  – Optimize the network design
  – Document the network design
The PDIOO Network Life Cycle
                  Plan



                                Design

                   Retire
    Optimize




                            Implement

               Operate
Business Goals
•   Increase revenue
•   Reduce operating costs
•   Improve communications
•   Shorten product development cycle
•   Expand into worldwide markets
•   Build partnerships with other companies
•   Offer better customer support or new
    customer services
Recent Business Priorities
• Mobility
• Security
• Resiliency (fault tolerance)
• Business continuity after a disaster
• Network projects must be prioritized based
  on fiscal goals
• Networks must offer the low delay required
  for real-time applications such as VoIP
Business Constraints

•   Budget
•   Staffing
•   Schedule
•   Politics and policies
Collect Information Before the
           First Meeting
• Before meeting with the client, whether
  internal or external, collect some basic
  business-related information
• Such as
  –   Products produced/Services supplied
  –   Financial viability
  –   Customers, suppliers, competitors
  –   Competitive advantage
Meet With the Customer
• Try to get
  – A concise statement of the goals of the
    project
     • What problem are they trying to solve?
     • How will new technology help them be
       more successful in their business?
     • What must happen for the project to
       succeed?
Meet With the Customer
• What will happen if the project is a failure?
  – Is this a critical business function?
  – Is this project visible to upper management?
  – Who’s on your side?
Meet With the Customer
   • Discover any biases
     – For example
        • Will they only use certain company’s
          products?
        • Do they avoid certain technologies?
        • Do the data people look down on the
          voice people or vice versa?
     – Talk to the technical and
       management staff
Meet With the Customer
– Get a copy of the organization chart
   • This will show the general structure of the organization
   • It will suggest users to account for
   • It will suggest geographical locations to account for
Meet With the Customer
– Get a copy of the security policy
   • How does the policy affect the new design?
   • How does the new design affect the policy?
   • Is the policy so strict that you (the network
     designer) won’t be able to do your job?
– Start cataloging network assets that security
  should protect
   • Hardware, software, applications, and data
   • Less obvious, but still important, intellectual
     property, trade secrets, and a company's reputation
The Scope of the Design Project
• Small in scope?
  – Allow sales people to access network via a VPN
• Large in scope?
  – An entire redesign of an enterprise network
• Use the OSI model to clarify the scope
  – New financial reporting application versus new
    routing protocol versus new data link (wireless, for
    example)
• Does the scope fit the budget, capabilities of staff
  and consultants, schedule?
Gather More Detailed Information
• Applications
    – Now and after the project is completed
    – Include both productivity applications and
      system management applications
•   User communities
•   Data stores
•   Protocols
•   Current logical and physical architecture
•   Current performance
Network Applications
Name of     Type of       New          Criticality   Comments
Application Application   Application?
Summary

• Systematic approach
• Focus first on business requirements and
  constraints, and applications
• Gain an understanding of the customer’s
  corporate structure
• Gain an understanding of the customer’s
  business style
Review Questions
• What are the main phases of network design per the
  top-down network design approach?
• What are the main phases of network design per the
  PDIOO approach?
• Why is it important to understand your customer’s
  business style?
• What are some typical business goals for
  organizations today?

Contenu connexe

Tendances

Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017Daljit Banger
 
Adventures in enterprise architecture
Adventures in enterprise architectureAdventures in enterprise architecture
Adventures in enterprise architectureJeff Bramwell
 
Strategic Partnership for Rail IT Engagement
Strategic Partnership for Rail IT EngagementStrategic Partnership for Rail IT Engagement
Strategic Partnership for Rail IT EngagementTim Groenwals
 
Digital Asset Management and Archival Preservation
Digital Asset Management and Archival PreservationDigital Asset Management and Archival Preservation
Digital Asset Management and Archival PreservationLAC Group
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Daljit Banger
 
Supporting New Products In The Supply Chain
Supporting New Products In The Supply ChainSupporting New Products In The Supply Chain
Supporting New Products In The Supply ChainDrew Forte
 
EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) Daljit Banger
 
Approach To It Strategy And Architecture
Approach To It Strategy And ArchitectureApproach To It Strategy And Architecture
Approach To It Strategy And ArchitectureAlan McSweeney
 
O.Savchenko FWDays workshop Software Architecture
O.Savchenko FWDays workshop Software ArchitectureO.Savchenko FWDays workshop Software Architecture
O.Savchenko FWDays workshop Software ArchitectureAlexandr Savchenko
 
Align technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessmentsAlign technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessmentsThe Spitfire Group
 
Information Capabilities Framework (ICF)
Information Capabilities Framework (ICF)Information Capabilities Framework (ICF)
Information Capabilities Framework (ICF)Arsalan Khan, M.Sc.
 

Tendances (17)

Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017
 
2012 Resume
2012 Resume2012 Resume
2012 Resume
 
Adventures in enterprise architecture
Adventures in enterprise architectureAdventures in enterprise architecture
Adventures in enterprise architecture
 
Strategic Partnership for Rail IT Engagement
Strategic Partnership for Rail IT EngagementStrategic Partnership for Rail IT Engagement
Strategic Partnership for Rail IT Engagement
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
 
Digital Asset Management and Archival Preservation
Digital Asset Management and Archival PreservationDigital Asset Management and Archival Preservation
Digital Asset Management and Archival Preservation
 
It Governance Methodology Cox
It Governance Methodology CoxIt Governance Methodology Cox
It Governance Methodology Cox
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World
 
Supporting New Products In The Supply Chain
Supporting New Products In The Supply ChainSupporting New Products In The Supply Chain
Supporting New Products In The Supply Chain
 
2012 Resume
2012 Resume2012 Resume
2012 Resume
 
Domain Driven Design
Domain Driven DesignDomain Driven Design
Domain Driven Design
 
EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015)
 
Approach To It Strategy And Architecture
Approach To It Strategy And ArchitectureApproach To It Strategy And Architecture
Approach To It Strategy And Architecture
 
O.Savchenko FWDays workshop Software Architecture
O.Savchenko FWDays workshop Software ArchitectureO.Savchenko FWDays workshop Software Architecture
O.Savchenko FWDays workshop Software Architecture
 
Align technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessmentsAlign technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessments
 
Information Capabilities Framework (ICF)
Information Capabilities Framework (ICF)Information Capabilities Framework (ICF)
Information Capabilities Framework (ICF)
 

En vedette

TCI 2014 Top-Down & Bottom-up approach? Evaluation of French clusters – 2003/...
TCI 2014 Top-Down & Bottom-up approach? Evaluation of French clusters – 2003/...TCI 2014 Top-Down & Bottom-up approach? Evaluation of French clusters – 2003/...
TCI 2014 Top-Down & Bottom-up approach? Evaluation of French clusters – 2003/...TCI Network
 
Top-Down Approach to Monitoring
Top-Down Approach to MonitoringTop-Down Approach to Monitoring
Top-Down Approach to MonitoringBigPanda
 
Top-down and bottom-up informatics: who has the high ground?
Top-down and bottom-up informatics: who has the high ground?Top-down and bottom-up informatics: who has the high ground?
Top-down and bottom-up informatics: who has the high ground?Vince Smith
 
History of Social Media - Media Kitchen
History of Social Media - Media KitchenHistory of Social Media - Media Kitchen
History of Social Media - Media KitchenThe Media Kitchen
 
Mobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorMobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorThe Media Kitchen
 
What Is The Top Down Approach 2010 Pps
What Is The Top Down Approach 2010   PpsWhat Is The Top Down Approach 2010   Pps
What Is The Top Down Approach 2010 PpsSaima Khan
 
From Top Down to Bottoms Up - The New Digital Media Approach @themediakitchen
From Top Down to Bottoms Up - The New Digital Media Approach @themediakitchenFrom Top Down to Bottoms Up - The New Digital Media Approach @themediakitchen
From Top Down to Bottoms Up - The New Digital Media Approach @themediakitchenThe Media Kitchen
 
Paper bottom up-to_top-down...
Paper bottom up-to_top-down...Paper bottom up-to_top-down...
Paper bottom up-to_top-down...EIFLINQ2014
 
Top Down Approach to Project Portfolio Management - Why Is It Important?
Top Down Approach to Project Portfolio Management - Why Is It Important?Top Down Approach to Project Portfolio Management - Why Is It Important?
Top Down Approach to Project Portfolio Management - Why Is It Important?Synquis - Project Management Software
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notationsEhtisham Ali
 
16. Algo analysis & Design - Data Structures using C++ by Varsha Patil
16. Algo analysis & Design - Data Structures using C++ by Varsha Patil16. Algo analysis & Design - Data Structures using C++ by Varsha Patil
16. Algo analysis & Design - Data Structures using C++ by Varsha Patilwidespreadpromotion
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5Gewurtz
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notationsNikhil Sharma
 
Theories on teaching reading
Theories on teaching readingTheories on teaching reading
Theories on teaching readingdyandelacruz24
 

En vedette (20)

TCI 2014 Top-Down & Bottom-up approach? Evaluation of French clusters – 2003/...
TCI 2014 Top-Down & Bottom-up approach? Evaluation of French clusters – 2003/...TCI 2014 Top-Down & Bottom-up approach? Evaluation of French clusters – 2003/...
TCI 2014 Top-Down & Bottom-up approach? Evaluation of French clusters – 2003/...
 
Top-Down Approach to Monitoring
Top-Down Approach to MonitoringTop-Down Approach to Monitoring
Top-Down Approach to Monitoring
 
Top-down and bottom-up informatics: who has the high ground?
Top-down and bottom-up informatics: who has the high ground?Top-down and bottom-up informatics: who has the high ground?
Top-down and bottom-up informatics: who has the high ground?
 
History of Social Media - Media Kitchen
History of Social Media - Media KitchenHistory of Social Media - Media Kitchen
History of Social Media - Media Kitchen
 
Mobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile BehaviorMobile 101 Class 1: Technology and Mobile Behavior
Mobile 101 Class 1: Technology and Mobile Behavior
 
What Is The Top Down Approach 2010 Pps
What Is The Top Down Approach 2010   PpsWhat Is The Top Down Approach 2010   Pps
What Is The Top Down Approach 2010 Pps
 
From Top Down to Bottoms Up - The New Digital Media Approach @themediakitchen
From Top Down to Bottoms Up - The New Digital Media Approach @themediakitchenFrom Top Down to Bottoms Up - The New Digital Media Approach @themediakitchen
From Top Down to Bottoms Up - The New Digital Media Approach @themediakitchen
 
Paper bottom up-to_top-down...
Paper bottom up-to_top-down...Paper bottom up-to_top-down...
Paper bottom up-to_top-down...
 
Top Down Approach to Project Portfolio Management - Why Is It Important?
Top Down Approach to Project Portfolio Management - Why Is It Important?Top Down Approach to Project Portfolio Management - Why Is It Important?
Top Down Approach to Project Portfolio Management - Why Is It Important?
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
 
16. Algo analysis & Design - Data Structures using C++ by Varsha Patil
16. Algo analysis & Design - Data Structures using C++ by Varsha Patil16. Algo analysis & Design - Data Structures using C++ by Varsha Patil
16. Algo analysis & Design - Data Structures using C++ by Varsha Patil
 
Top down design
Top down designTop down design
Top down design
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
 
Theories on teaching reading
Theories on teaching readingTheories on teaching reading
Theories on teaching reading
 
The top down approach
The top down approachThe top down approach
The top down approach
 
Algorithm Introduction
Algorithm IntroductionAlgorithm Introduction
Algorithm Introduction
 
Top down construction presentation
Top down construction presentationTop down construction presentation
Top down construction presentation
 
Top down-bottom-up
Top down-bottom-upTop down-bottom-up
Top down-bottom-up
 
An introduction to project accounting
An introduction to project accountingAn introduction to project accounting
An introduction to project accounting
 

Similaire à Chapter01

Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
Network Analysis & Design
Network Analysis & DesignNetwork Analysis & Design
Network Analysis & DesignErmanHamid3
 
Chapter 7 Development Strategies
Chapter 7 Development StrategiesChapter 7 Development Strategies
Chapter 7 Development StrategiesMeryl C
 
Chapternetworkdesign d1 [Autosaved].pptx
Chapternetworkdesign d1 [Autosaved].pptxChapternetworkdesign d1 [Autosaved].pptx
Chapternetworkdesign d1 [Autosaved].pptxpeterhaile1
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
 
Cisco systems architecture
Cisco systems architectureCisco systems architecture
Cisco systems architectureDhanesh Gandhi
 
Principles of software architecture design
Principles of software architecture designPrinciples of software architecture design
Principles of software architecture designLen Bass
 
Value of Smart Business Networks
Value of Smart Business NetworksValue of Smart Business Networks
Value of Smart Business NetworksEric van Heck
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projectsKhalid Kahloot
 
E governance and enteerprise architecture
E governance and enteerprise architectureE governance and enteerprise architecture
E governance and enteerprise architectureKumar
 
1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptxHaniYousef8
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and designPreeti Mishra
 
SERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMARSERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMARPavan Kumar
 

Similaire à Chapter01 (20)

Chapter01
Chapter01Chapter01
Chapter01
 
Chapter01.ppt
Chapter01.pptChapter01.ppt
Chapter01.ppt
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Network Analysis & Design
Network Analysis & DesignNetwork Analysis & Design
Network Analysis & Design
 
Chapter 7 Development Strategies
Chapter 7 Development StrategiesChapter 7 Development Strategies
Chapter 7 Development Strategies
 
Enterprise Architecture
Enterprise Architecture Enterprise Architecture
Enterprise Architecture
 
Chapternetworkdesign d1 [Autosaved].pptx
Chapternetworkdesign d1 [Autosaved].pptxChapternetworkdesign d1 [Autosaved].pptx
Chapternetworkdesign d1 [Autosaved].pptx
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
 
BizProjects
BizProjectsBizProjects
BizProjects
 
BusinessProjects.com Market Segmentation and Entry Project
BusinessProjects.com Market Segmentation and Entry ProjectBusinessProjects.com Market Segmentation and Entry Project
BusinessProjects.com Market Segmentation and Entry Project
 
11.ppt
11.ppt11.ppt
11.ppt
 
Cisco systems architecture
Cisco systems architectureCisco systems architecture
Cisco systems architecture
 
Principles of software architecture design
Principles of software architecture designPrinciples of software architecture design
Principles of software architecture design
 
Value of Smart Business Networks
Value of Smart Business NetworksValue of Smart Business Networks
Value of Smart Business Networks
 
Solution Design Services An Overview
Solution Design Services  An OverviewSolution Design Services  An Overview
Solution Design Services An Overview
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projects
 
E governance and enteerprise architecture
E governance and enteerprise architectureE governance and enteerprise architecture
E governance and enteerprise architecture
 
1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and design
 
SERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMARSERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMAR
 

Dernier

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Chapter01

  • 1. Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer
  • 2. Top-Down Network Design • Network design should be a complete process that matches business needs to available technology to deliver a system that will maximize an organization’s success. – In the LAN area it is more than just buying a few devices. – In the WAN area it is more than just calling the phone company.
  • 3. Start at the Top • Don’t just start connecting the dots. • Analyze business and technical goals first. • Explore divisional and group structures to find out who the network serves and where they reside. • Determine what applications will run on the network and how those applications behave on a network. • Focus on Layer 7 and above first.
  • 4. Layers of the OSI Model Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical
  • 5. Structured Design • A focus is placed on understanding data flow, data types, and processes that access or change the data. • A focus is placed on understanding the location and needs of user communities that access or change data and processes. • Several techniques and models can be used to characterize the existing system, new user requirements, and a structure for the future system. • A logical model is developed before the physical model. – The logical model represents the basic building blocks, divided by function, and the structure of the system. – The physical model represents devices and specific technologies and implementations.
  • 6. Systems Development Life Cycles • SDLC: Does it mean Synchronous Data Link Control or Systems Development Life Cycle? • The latter for the purposes of this class! • Typical systems are developed and continue to exist over a period of time, often called a systems development life cycle (SDLC).
  • 7. Top-Down Network Design Steps Analyze requirements Monitor and Develop optimize logical network design performance Implement Develop and test physical network design Test, optimize, and document design
  • 8. Network Design Steps • Phase 1 – Analyze Requirements – Analyze business goals and constraints – Analyze technical goals and tradeoffs – Characterize the existing network – Characterize network traffic
  • 9. Network Design Steps • Phase 2 – Logical Network Design – Design a network topology – Design models for addressing and naming – Select switching and routing protocols – Develop network security strategies – Develop network management strategies
  • 10. Network Design Steps • Phase 3 – Physical Network Design – Select technologies and devices for campus networks – Select technologies and devices for enterprise networks
  • 11. Network Design Steps • Phase 4 – Testing, Optimizing, and Documenting the Network Design – Test the network design – Optimize the network design – Document the network design
  • 12. The PDIOO Network Life Cycle Plan Design Retire Optimize Implement Operate
  • 13. Business Goals • Increase revenue • Reduce operating costs • Improve communications • Shorten product development cycle • Expand into worldwide markets • Build partnerships with other companies • Offer better customer support or new customer services
  • 14. Recent Business Priorities • Mobility • Security • Resiliency (fault tolerance) • Business continuity after a disaster • Network projects must be prioritized based on fiscal goals • Networks must offer the low delay required for real-time applications such as VoIP
  • 15. Business Constraints • Budget • Staffing • Schedule • Politics and policies
  • 16. Collect Information Before the First Meeting • Before meeting with the client, whether internal or external, collect some basic business-related information • Such as – Products produced/Services supplied – Financial viability – Customers, suppliers, competitors – Competitive advantage
  • 17. Meet With the Customer • Try to get – A concise statement of the goals of the project • What problem are they trying to solve? • How will new technology help them be more successful in their business? • What must happen for the project to succeed?
  • 18. Meet With the Customer • What will happen if the project is a failure? – Is this a critical business function? – Is this project visible to upper management? – Who’s on your side?
  • 19. Meet With the Customer • Discover any biases – For example • Will they only use certain company’s products? • Do they avoid certain technologies? • Do the data people look down on the voice people or vice versa? – Talk to the technical and management staff
  • 20. Meet With the Customer – Get a copy of the organization chart • This will show the general structure of the organization • It will suggest users to account for • It will suggest geographical locations to account for
  • 21. Meet With the Customer – Get a copy of the security policy • How does the policy affect the new design? • How does the new design affect the policy? • Is the policy so strict that you (the network designer) won’t be able to do your job? – Start cataloging network assets that security should protect • Hardware, software, applications, and data • Less obvious, but still important, intellectual property, trade secrets, and a company's reputation
  • 22. The Scope of the Design Project • Small in scope? – Allow sales people to access network via a VPN • Large in scope? – An entire redesign of an enterprise network • Use the OSI model to clarify the scope – New financial reporting application versus new routing protocol versus new data link (wireless, for example) • Does the scope fit the budget, capabilities of staff and consultants, schedule?
  • 23. Gather More Detailed Information • Applications – Now and after the project is completed – Include both productivity applications and system management applications • User communities • Data stores • Protocols • Current logical and physical architecture • Current performance
  • 24. Network Applications Name of Type of New Criticality Comments Application Application Application?
  • 25. Summary • Systematic approach • Focus first on business requirements and constraints, and applications • Gain an understanding of the customer’s corporate structure • Gain an understanding of the customer’s business style
  • 26. Review Questions • What are the main phases of network design per the top-down network design approach? • What are the main phases of network design per the PDIOO approach? • Why is it important to understand your customer’s business style? • What are some typical business goals for organizations today?

Notes de l'éditeur

  1. Layer 8 of the OSI model encompasses office politics, budgets, training, and other human factors.
  2. Resiliency means how much stress a network can handle and how quickly the network can rebound from problems, including security breaches, natural and unnatural disasters, human error, and catastrophic software or hardware failures. Some experts, including Howard Berkowitz, have a mild dislike of the word “resiliency” as it sounds too much like a stretched rubber band or a trampoline. As Berkowitz says in his excellent book, WAN Survival Guide (Wiley 2001), “I avoid designing networks that stretch too far, bounce up and down, or oscillate between normal and backup states.” So he likes “fault tolerance,” but he points out that it does not mean “immune to any conceivable threat.” Berkowitz states that, “A sufficient quantity of explosives can overcome the tolerance of any network.” :-)
  3. User communities, data stores, protocols, and the current architecture and performance will be discussed in the next few chapters. This chapter focuses on business needs and applications, which should be the first area of research in a top-down network design project. Network design is iterative, however, so many topics are addressed more than once as the designer gathers more detailed information and conducts more precise planning. So, gaining a general understanding of the size and location of user communities, for example, might be appropriate at this stage of the design project, but user communities should be investigated again when characterizing network traffic.