SlideShare a Scribd company logo
1 of 26
Top-Down Network Design
Chapter One
Analyzing Business Goals and Constraints
Copyright 2010 Cisco Press & Priscilla Oppenheimer
Top-Down Network Design
• Network design should be a complete
process that matches business needs to
available technology to deliver a system that
will maximize an organization’s success.
– In the LAN area it is more than just buying a few
devices.
– In the WAN area it is more than just calling the
phone company.
Start at the Top
• Don’t just start connecting the dots.
• Analyze business and technical goals first.
• Explore divisional and group structures to
find out who the network serves and where
they reside.
• Determine what applications will run on the
network and how those applications behave
on a network.
• Focus on Layer 7 and above first.
Layers of the OSI Model
Application
Presentation
Session
Transport
Network
Data Link
PhysicalLayer 1
Layer 7
Layer 6
Layer 5
Layer 4
Layer 3
Layer 2
Structured Design
• A focus is placed on understanding data flow, data types, and
processes that access or change the data.
• A focus is placed on understanding the location and needs of
user communities that access or change data and processes.
• Several techniques and models can be used to characterize the
existing system, new user requirements, and a structure for the
future system.
• A logical model is developed before the physical model.
– The logical model represents the basic building blocks, divided by
function, and the structure of the system.
– The physical model represents devices and specific technologies and
implementations.
Systems Development Life
Cycles
• SDLC: Does it mean Synchronous Data Link Control or
Systems Development Life Cycle?
• The latter for the purposes of this class!
• Typical systems are developed and continue to exist over a
period of time, often called a systems development life
cycle (SDLC).
Analyze
requirements
Develop
logical
design
Develop
physical
design
Test, optimize,
and document
design
Monitor and
optimize
network
performance
Implement
and test
network
Top-Down Network Design Steps
Network Design Steps
• Phase 1 – Analyze Requirements
– Analyze business goals and constraints
– Analyze technical goals and tradeoffs
– Characterize the existing network
– Characterize network traffic
Network Design Steps
• Phase 2 – Logical Network Design
– Design a network topology
– Design models for addressing and naming
– Select switching and routing protocols
– Develop network security strategies
– Develop network management strategies
Network Design Steps
• Phase 3 – Physical Network Design
– Select technologies and devices for campus networks
– Select technologies and devices for enterprise networks
Network Design Steps
• Phase 4 – Testing, Optimizing, and Documenting the
Network Design
– Test the network design
– Optimize the network design
– Document the network design
The PDIOO Network Life Cycle
Plan
Design
Implement
Operate
Optimize
Retire
Business Goals
• Increase revenue
• Reduce operating costs
• Improve communications
• Shorten product development cycle
• Expand into worldwide markets
• Build partnerships with other companies
• Offer better customer support or new
customer services
Recent Business Priorities
• Mobility
• Security
• Resiliency (fault tolerance)
• Business continuity after a disaster
• Network projects must be prioritized based
on fiscal goals
• Networks must offer the low delay required
for real-time applications such as VoIP
Business Constraints
• Budget
• Staffing
• Schedule
• Politics and policies
Collect Information Before the First Meeting
• Before meeting with the client, whether
internal or external, collect some basic
business-related information
• Such as
– Products produced/Services supplied
– Financial viability
– Customers, suppliers, competitors
– Competitive advantage
Meet With the Customer
• Try to get
– A concise statement of the goals of the
project
• What problem are they trying to solve?
• How will new technology help them be
more successful in their business?
• What must happen for the project to
succeed?
Meet With the Customer
• What will happen if the project is a failure?
– Is this a critical business function?
– Is this project visible to upper management?
– Who’s on your side?
Meet With the Customer
• Discover any biases
– For example
• Will they only use certain company’s
products?
• Do they avoid certain technologies?
• Do the data people look down on the
voice people or vice versa?
– Talk to the technical and
management staff
Meet With the Customer
– Get a copy of the organization chart
• This will show the general structure of the organization
• It will suggest users to account for
• It will suggest geographical locations to account for
Meet With the Customer
– Get a copy of the security policy
• How does the policy affect the new design?
• How does the new design affect the policy?
• Is the policy so strict that you (the network
designer) won’t be able to do your job?
– Start cataloging network assets that security
should protect
• Hardware, software, applications, and data
• Less obvious, but still important, intellectual
property, trade secrets, and a company's reputation
The Scope of the Design Project
• Small in scope?
– Allow sales people to access network via a VPN
• Large in scope?
– An entire redesign of an enterprise network
• Use the OSI model to clarify the scope
– New financial reporting application versus new
routing protocol versus new data link (wireless, for
example)
• Does the scope fit the budget, capabilities of staff
and consultants, schedule?
Gather More Detailed Information
• Applications
– Now and after the project is completed
– Include both productivity applications and
system management applications
• User communities
• Data stores
• Protocols
• Current logical and physical architecture
• Current performance
Network Applications
Name of
Application
Type of
Application
New
Application?
Criticality Comments
Summary
• Systematic approach
• Focus first on business requirements and
constraints, and applications
• Gain an understanding of the customer’s
corporate structure
• Gain an understanding of the customer’s
business style
Review Questions
• What are the main phases of network design per the
top-down network design approach?
• What are the main phases of network design per the
PDIOO approach?
• Why is it important to understand your customer’s
business style?
• What are some typical business goals for
organizations today?

More Related Content

What's hot

Dc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingDc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingSyaiful Ahdan
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2Muhammad Ahad
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network DesignSteven Cahill
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-conceptsMuhammad Ahad
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2Muhammad Ahad
 
FAST ETHERNET
FAST ETHERNET FAST ETHERNET
FAST ETHERNET Sujitha14
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 

What's hot (20)

Chapter11
Chapter11Chapter11
Chapter11
 
Dc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingDc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switching
 
Chapter03
Chapter03Chapter03
Chapter03
 
Chapter09
Chapter09Chapter09
Chapter09
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Token ring
Token ringToken ring
Token ring
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 
FAST ETHERNET
FAST ETHERNET FAST ETHERNET
FAST ETHERNET
 
Network management
Network managementNetwork management
Network management
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Chapter14
Chapter14Chapter14
Chapter14
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 

Viewers also liked

01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructureMuhammad Ahad
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slidesMuhammad Ahad
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)Muhammad Ahad
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1Muhammad Ahad
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-conceptsMuhammad Ahad
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slidesMuhammad Ahad
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence Muhammad Ahad
 

Viewers also liked (13)

01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
Chapter13
Chapter13Chapter13
Chapter13
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
Chapter04
Chapter04Chapter04
Chapter04
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
 
06. security concept
06. security concept06. security concept
06. security concept
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
 
Artificial Intelligence
Artificial Intelligence Artificial Intelligence
Artificial Intelligence
 

Similar to Chapter01

Network Analysis & Design
Network Analysis & DesignNetwork Analysis & Design
Network Analysis & DesignErmanHamid3
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
Chapter 7 Development Strategies
Chapter 7 Development StrategiesChapter 7 Development Strategies
Chapter 7 Development StrategiesMeryl C
 
Chapternetworkdesign d1 [Autosaved].pptx
Chapternetworkdesign d1 [Autosaved].pptxChapternetworkdesign d1 [Autosaved].pptx
Chapternetworkdesign d1 [Autosaved].pptxpeterhaile1
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture Daljit Banger
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network designshahin raj
 
E governance and enteerprise architecture
E governance and enteerprise architectureE governance and enteerprise architecture
E governance and enteerprise architectureKumar
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
 
1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptxHaniYousef8
 
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)Lucas Jellema
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projectsKhalid Kahloot
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructureMohammad Salman
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and designPreeti Mishra
 
SERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMARSERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMARPavan Kumar
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 

Similar to Chapter01 (20)

Chapter01.ppt
Chapter01.pptChapter01.ppt
Chapter01.ppt
 
Chapter01
Chapter01Chapter01
Chapter01
 
Network Analysis & Design
Network Analysis & DesignNetwork Analysis & Design
Network Analysis & Design
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Chapter 7 Development Strategies
Chapter 7 Development StrategiesChapter 7 Development Strategies
Chapter 7 Development Strategies
 
Chapternetworkdesign d1 [Autosaved].pptx
Chapternetworkdesign d1 [Autosaved].pptxChapternetworkdesign d1 [Autosaved].pptx
Chapternetworkdesign d1 [Autosaved].pptx
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network design
 
Chapter 12 developiong business&it solutions
Chapter 12  developiong business&it solutionsChapter 12  developiong business&it solutions
Chapter 12 developiong business&it solutions
 
E governance and enteerprise architecture
E governance and enteerprise architectureE governance and enteerprise architecture
E governance and enteerprise architecture
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
 
1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx
 
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)
 
Best practice for_agile_ds_projects
Best practice for_agile_ds_projectsBest practice for_agile_ds_projects
Best practice for_agile_ds_projects
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructure
 
requirements analysis and design
requirements analysis and designrequirements analysis and design
requirements analysis and design
 
SERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMARSERVICENOW PPT BY PAVANKUMAR
SERVICENOW PPT BY PAVANKUMAR
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
11.ppt
11.ppt11.ppt
11.ppt
 
A case of Fusion Middleware - iLOUG 2013
A case of Fusion Middleware - iLOUG 2013A case of Fusion Middleware - iLOUG 2013
A case of Fusion Middleware - iLOUG 2013
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Chapter01

  • 1. Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2010 Cisco Press & Priscilla Oppenheimer
  • 2. Top-Down Network Design • Network design should be a complete process that matches business needs to available technology to deliver a system that will maximize an organization’s success. – In the LAN area it is more than just buying a few devices. – In the WAN area it is more than just calling the phone company.
  • 3. Start at the Top • Don’t just start connecting the dots. • Analyze business and technical goals first. • Explore divisional and group structures to find out who the network serves and where they reside. • Determine what applications will run on the network and how those applications behave on a network. • Focus on Layer 7 and above first.
  • 4. Layers of the OSI Model Application Presentation Session Transport Network Data Link PhysicalLayer 1 Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2
  • 5. Structured Design • A focus is placed on understanding data flow, data types, and processes that access or change the data. • A focus is placed on understanding the location and needs of user communities that access or change data and processes. • Several techniques and models can be used to characterize the existing system, new user requirements, and a structure for the future system. • A logical model is developed before the physical model. – The logical model represents the basic building blocks, divided by function, and the structure of the system. – The physical model represents devices and specific technologies and implementations.
  • 6. Systems Development Life Cycles • SDLC: Does it mean Synchronous Data Link Control or Systems Development Life Cycle? • The latter for the purposes of this class! • Typical systems are developed and continue to exist over a period of time, often called a systems development life cycle (SDLC).
  • 7. Analyze requirements Develop logical design Develop physical design Test, optimize, and document design Monitor and optimize network performance Implement and test network Top-Down Network Design Steps
  • 8. Network Design Steps • Phase 1 – Analyze Requirements – Analyze business goals and constraints – Analyze technical goals and tradeoffs – Characterize the existing network – Characterize network traffic
  • 9. Network Design Steps • Phase 2 – Logical Network Design – Design a network topology – Design models for addressing and naming – Select switching and routing protocols – Develop network security strategies – Develop network management strategies
  • 10. Network Design Steps • Phase 3 – Physical Network Design – Select technologies and devices for campus networks – Select technologies and devices for enterprise networks
  • 11. Network Design Steps • Phase 4 – Testing, Optimizing, and Documenting the Network Design – Test the network design – Optimize the network design – Document the network design
  • 12. The PDIOO Network Life Cycle Plan Design Implement Operate Optimize Retire
  • 13. Business Goals • Increase revenue • Reduce operating costs • Improve communications • Shorten product development cycle • Expand into worldwide markets • Build partnerships with other companies • Offer better customer support or new customer services
  • 14. Recent Business Priorities • Mobility • Security • Resiliency (fault tolerance) • Business continuity after a disaster • Network projects must be prioritized based on fiscal goals • Networks must offer the low delay required for real-time applications such as VoIP
  • 15. Business Constraints • Budget • Staffing • Schedule • Politics and policies
  • 16. Collect Information Before the First Meeting • Before meeting with the client, whether internal or external, collect some basic business-related information • Such as – Products produced/Services supplied – Financial viability – Customers, suppliers, competitors – Competitive advantage
  • 17. Meet With the Customer • Try to get – A concise statement of the goals of the project • What problem are they trying to solve? • How will new technology help them be more successful in their business? • What must happen for the project to succeed?
  • 18. Meet With the Customer • What will happen if the project is a failure? – Is this a critical business function? – Is this project visible to upper management? – Who’s on your side?
  • 19. Meet With the Customer • Discover any biases – For example • Will they only use certain company’s products? • Do they avoid certain technologies? • Do the data people look down on the voice people or vice versa? – Talk to the technical and management staff
  • 20. Meet With the Customer – Get a copy of the organization chart • This will show the general structure of the organization • It will suggest users to account for • It will suggest geographical locations to account for
  • 21. Meet With the Customer – Get a copy of the security policy • How does the policy affect the new design? • How does the new design affect the policy? • Is the policy so strict that you (the network designer) won’t be able to do your job? – Start cataloging network assets that security should protect • Hardware, software, applications, and data • Less obvious, but still important, intellectual property, trade secrets, and a company's reputation
  • 22. The Scope of the Design Project • Small in scope? – Allow sales people to access network via a VPN • Large in scope? – An entire redesign of an enterprise network • Use the OSI model to clarify the scope – New financial reporting application versus new routing protocol versus new data link (wireless, for example) • Does the scope fit the budget, capabilities of staff and consultants, schedule?
  • 23. Gather More Detailed Information • Applications – Now and after the project is completed – Include both productivity applications and system management applications • User communities • Data stores • Protocols • Current logical and physical architecture • Current performance
  • 24. Network Applications Name of Application Type of Application New Application? Criticality Comments
  • 25. Summary • Systematic approach • Focus first on business requirements and constraints, and applications • Gain an understanding of the customer’s corporate structure • Gain an understanding of the customer’s business style
  • 26. Review Questions • What are the main phases of network design per the top-down network design approach? • What are the main phases of network design per the PDIOO approach? • Why is it important to understand your customer’s business style? • What are some typical business goals for organizations today?

Editor's Notes

  1. Layer 8 of the OSI model encompasses office politics, budgets, training, and other human factors.
  2. Resiliency means how much stress a network can handle and how quickly the network can rebound from problems, including security breaches, natural and unnatural disasters, human error, and catastrophic software or hardware failures. Some experts, including Howard Berkowitz, have a mild dislike of the word “resiliency” as it sounds too much like a stretched rubber band or a trampoline. As Berkowitz says in his excellent book, WAN Survival Guide (Wiley 2001), “I avoid designing networks that stretch too far, bounce up and down, or oscillate between normal and backup states.” So he likes “fault tolerance,” but he points out that it does not mean “immune to any conceivable threat.” Berkowitz states that, “A sufficient quantity of explosives can overcome the tolerance of any network.” :-)
  3. User communities, data stores, protocols, and the current architecture and performance will be discussed in the next few chapters. This chapter focuses on business needs and applications, which should be the first area of research in a top-down network design project. Network design is iterative, however, so many topics are addressed more than once as the designer gathers more detailed information and conducts more precise planning. So, gaining a general understanding of the size and location of user communities, for example, might be appropriate at this stage of the design project, but user communities should be investigated again when characterizing network traffic.