SlideShare una empresa de Scribd logo
1 de 39
Chapter 14 Network Design and Management Data Communications and Computer Networks: A  Business User’s Approach
  Data Communications and Computer Networks     Chapter 14 Introduction Properly designing a computer network is a difficult task.  It requires planning and analysis, feasibility studies, capacity planning, and baseline creation skills. Performing network management is difficult too.  A network manager must possess computer and people skills, management skills, financial skills, and be able to keep up with changing technology.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle (SDLC) Every business has a number of goals.  System planners and management personnel within a company try to generate a set of questions, or problems, to help the company achieve those goals. To properly understand a problem, analyze all possible solutions, select the best solution, and implement and maintain the solution, you need to follow a well-defined plan. SDLC is a methodology, or plan, for a structured approach to the development of a business system.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14 Cycle of the phases
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle A  systems analyst  is typically responsible for managing a project and following the SDLC phases. Anyone, however, may be called upon to assist a systems analyst. Or anyone may have to assume some of the duties of a systems analyst. Individuals that are called upon to support a computer network should understand the basic phases of SDLC.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle Planning Phase - Identify problems, opportunities, and objectives. Analysis Phase - Determine information requirements.  Information requirements can be gathered by sampling and collecting hard data, interviewing, questionnaires, observing environments, and prototyping. Design Phase - Design the system that was recommended and approved at the end of the analysis phase.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle Implementation Phase - The system is installed and preparations are made to move from the old system to the new. Maintenance Phase - The longest phase, involves the ongoing maintenance of the project. Maintenance may require personnel to return to an earlier phase to perform an update.
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 Network Modeling When updating or creating a new computer system, the analyst will create a set of models for both the existing system (if there is one) and the proposed system. Network models can either demonstrate the current state of the network or can model the desired computer network. A  location connectivity diagram  is a network modeling tool that depicts the various locations involved in a a network and the interconnections between those locations.
  Data Communications and Computer Networks     Chapter 14 Network Modeling An  overview location connectivity diagram  shows the big picture of geographic locations of network facilities. External users and mobile users can be identified, as well as the locations primary to a business. A  detailed location connectivity diagram  is a close-up model of a single location and the networks that reside at the location. Working groups and the distances between those groups can be identified with a detailed diagram.
  Data Communications and Computer Networks     Chapter 14 X means a special site
  Data Communications and Computer Networks     Chapter 14
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feasibility Studies Time feasible  means the system can be constructed in an agreed upon time frame. Payback analysis ascertains costs and benefits of proposed system usually on an annual basis. Payback analysis is a good technique to use to determine financial feasibility. To calculate payback analysis, you must know all the expenses that will be incurred to create and maintain the system, as well as all possible income derived from the system. You must also be aware of the  time value of money  (a dollar today is worth more than one dollar promised a year from now because the dollar can be invested).
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14
Note profit at 6 th  year
  Data Communications and Computer Networks     Chapter 14 Capacity Planning Capacity planning involves trying to determine the amount of network bandwidth necessary to support an application or a set of applications. A number of techniques exist for performing capacity planning, including linear projection, computer simulation, benchmarking, and analytical modeling. Linear projection involves predicting one or more network capacities based on the current network parameters and multiplying by some constant.
  Data Communications and Computer Networks     Chapter 14 Capacity Planning A computer simulation involves modeling an existing system or proposed system using a computer-based simulation tool. Benchmarking involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Analytical modeling involves the creation of mathematical equations to calculate various network values.
  Data Communications and Computer Networks     Chapter 14 Creating a Baseline Involves the measurement and recording of a network’s state of operation over a given period of time. A baseline can be used to determine current network performance and to help determine future network needs. Baseline studies should be ongoing projects, and not something started and stopped every so many years.
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Generating Useable Statistics Statistics, properly generated, can be an invaluable aid to demonstrating current system demands and predicting future needs. Mean time between failures (MTBF)   Mean time to repair (MTTR) Availability  is the probability that a particular component or system will be available during a fixed time period Reliability  is the probability that over a period of time the particular component or device will be available
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Generating Useable Statistics Suppose we want to calculate the availability of a modem that has a MTBF of 3000 hours and a MTTR of 1 hour. The availability of this modem for an 8-hour period is: a = 1/1 b = 1/3000 = 0.00033 A(8 hours) =1/(1 + 0.00033) + 0.00033/(1 + 0.00033) x e -(1 + 0.00033)8 =  0.9997 + 0.00033 x 0.000335 =  0.9997 Not available 3 out of 10,000 times you want it.
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14 Generating Useable Statistics What is the reliability of a modem if the MTBF is 3000 hours and a transaction takes 20 minutes, or 1/3 of an hour (0.333 hours): R(0.333 hours) = e  -(1/3000)(0.333)  = e  -0.000111  = 0.99989 Not reliable for .011 percent of the time.
  Data Communications and Computer Networks     Chapter 14 Generating Useable Statistics So what do you want? Availability and reliability between 0.9999 and 0.99999 is desired! What is this in number of hours between failure for a year of service?
  Data Communications and Computer Networks     Chapter 14 Managing Operations There are many services and functions available to assist an individual in managing computer network operations. One of the more useful is  Simple Network Management Protocol (SNMP) . SNMP is an industry standard designed to manage network components from a remote location. Currently in version 3, SNMP supports agents, managers, and the Management Information Base (MIB).
  Data Communications and Computer Networks     Chapter 14 Managing Operations A managed element has management software, called an  agent , running in it. A second object, the SNMP  manager , controls the operations of a managed element and maintains a database of information about all managed elements. A manager can query an agent to return current operating values, or can instruct an agent to perform a particular action. The  Management Information Base (MIB)  is a collection of information that is organized hierarchically and describes the operating parameters of all managed agents.
  Data Communications and Computer Networks     Chapter 14 Managing Operations SNMP operates on a network between the application layer and the UDP/IP layer (not TCP/IP) – the transport layer.
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation Returning to BringBring Corporation from an earlier chapter, let’s complete our design, including e-mail and Internet access for each of the four sites. A linear projection can be used to estimate the amount of Internet traffic at each site. An overview location connectivity diagram gives us a big picture of the network interconnections.
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation A second linear projection can be used to determine the amount of local area network traffic within each site.

Más contenido relacionado

La actualidad más candente

Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
Integration of a Predictive, Continuous Time Neural Network into Securities M...
Integration of a Predictive, Continuous Time Neural Network into Securities M...Integration of a Predictive, Continuous Time Neural Network into Securities M...
Integration of a Predictive, Continuous Time Neural Network into Securities M...Chris Kirk, PhD, FIAP
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
 
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive ApplicationsM3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive ApplicationsVladislavKashansky
 
Support Vector Machine–Based Prediction System for a Football Match Result
Support Vector Machine–Based Prediction System for a Football Match ResultSupport Vector Machine–Based Prediction System for a Football Match Result
Support Vector Machine–Based Prediction System for a Football Match Resultiosrjce
 
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC IJECEIAES
 
Iaetsd performance voting algorithms for software safety
Iaetsd performance voting algorithms for software safetyIaetsd performance voting algorithms for software safety
Iaetsd performance voting algorithms for software safetyIaetsd Iaetsd
 
Design and Implementation of Low Power DSP Core with Programmable Truncated V...
Design and Implementation of Low Power DSP Core with Programmable Truncated V...Design and Implementation of Low Power DSP Core with Programmable Truncated V...
Design and Implementation of Low Power DSP Core with Programmable Truncated V...ijsrd.com
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Kashif Mehmood
 
RobertClarkResume
RobertClarkResumeRobertClarkResume
RobertClarkResumeBob Clark
 
Desktop Grid Scheduling
Desktop Grid SchedulingDesktop Grid Scheduling
Desktop Grid SchedulingPiyush Kandpal
 
Rachit Mishra_stock prediction_report
Rachit Mishra_stock prediction_reportRachit Mishra_stock prediction_report
Rachit Mishra_stock prediction_reportRachit Mishra
 
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...
 Machine Learning Data Life Cycle in Production (Week 2   feature engineering... Machine Learning Data Life Cycle in Production (Week 2   feature engineering...
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...Ajay Taneja
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
FPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT AlgorithmFPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT Algorithmcscpconf
 

La actualidad más candente (19)

Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
Integration of a Predictive, Continuous Time Neural Network into Securities M...
Integration of a Predictive, Continuous Time Neural Network into Securities M...Integration of a Predictive, Continuous Time Neural Network into Securities M...
Integration of a Predictive, Continuous Time Neural Network into Securities M...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
Mis
MisMis
Mis
 
TYBSC CS SEM 5 AI NOTES
TYBSC CS SEM 5 AI NOTESTYBSC CS SEM 5 AI NOTES
TYBSC CS SEM 5 AI NOTES
 
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive ApplicationsM3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
 
Support Vector Machine–Based Prediction System for a Football Match Result
Support Vector Machine–Based Prediction System for a Football Match ResultSupport Vector Machine–Based Prediction System for a Football Match Result
Support Vector Machine–Based Prediction System for a Football Match Result
 
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
 
Iaetsd performance voting algorithms for software safety
Iaetsd performance voting algorithms for software safetyIaetsd performance voting algorithms for software safety
Iaetsd performance voting algorithms for software safety
 
Design and Implementation of Low Power DSP Core with Programmable Truncated V...
Design and Implementation of Low Power DSP Core with Programmable Truncated V...Design and Implementation of Low Power DSP Core with Programmable Truncated V...
Design and Implementation of Low Power DSP Core with Programmable Truncated V...
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
 
RobertClarkResume
RobertClarkResumeRobertClarkResume
RobertClarkResume
 
Desktop Grid Scheduling
Desktop Grid SchedulingDesktop Grid Scheduling
Desktop Grid Scheduling
 
Rachit Mishra_stock prediction_report
Rachit Mishra_stock prediction_reportRachit Mishra_stock prediction_report
Rachit Mishra_stock prediction_report
 
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...
 Machine Learning Data Life Cycle in Production (Week 2   feature engineering... Machine Learning Data Life Cycle in Production (Week 2   feature engineering...
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
50120130406041 2
50120130406041 250120130406041 2
50120130406041 2
 
FPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT AlgorithmFPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT Algorithm
 

Destacado

Presentatie brink en fleer
Presentatie brink en fleerPresentatie brink en fleer
Presentatie brink en fleerjangmeijer
 
Presentatie architektenburo Smid en Peters
Presentatie architektenburo Smid en PetersPresentatie architektenburo Smid en Peters
Presentatie architektenburo Smid en Petersjangmeijer
 
Communicating Environmental Friendliness through Product Design and Appearance
Communicating Environmental Friendliness through Product Design and AppearanceCommunicating Environmental Friendliness through Product Design and Appearance
Communicating Environmental Friendliness through Product Design and AppearanceSeos Design
 
location barcelone2
location barcelone2location barcelone2
location barcelone2ohluis
 
location barcelone 1
location barcelone 1location barcelone 1
location barcelone 1ohluis
 
Kernhem Oplevering
Kernhem OpleveringKernhem Oplevering
Kernhem Opleveringjangmeijer
 
Og for group meeting 23march10
Og for group meeting 23march10Og for group meeting 23march10
Og for group meeting 23march10W4in
 
IDBM Pro sustainable design lecture, 25.8.2011, Design Factory
IDBM Pro sustainable design lecture, 25.8.2011, Design FactoryIDBM Pro sustainable design lecture, 25.8.2011, Design Factory
IDBM Pro sustainable design lecture, 25.8.2011, Design FactorySeos Design
 
Presentatie BIM stage bij Van den Berg Architecten
Presentatie BIM stage bij Van den Berg ArchitectenPresentatie BIM stage bij Van den Berg Architecten
Presentatie BIM stage bij Van den Berg Architectenjangmeijer
 
Presentatie vibes
Presentatie vibesPresentatie vibes
Presentatie vibesjangmeijer
 
Presentatie lksvdd architecten
Presentatie lksvdd architectenPresentatie lksvdd architecten
Presentatie lksvdd architectenjangmeijer
 

Destacado (16)

Presentatie brink en fleer
Presentatie brink en fleerPresentatie brink en fleer
Presentatie brink en fleer
 
Presentatie architektenburo Smid en Peters
Presentatie architektenburo Smid en PetersPresentatie architektenburo Smid en Peters
Presentatie architektenburo Smid en Peters
 
Communicating Environmental Friendliness through Product Design and Appearance
Communicating Environmental Friendliness through Product Design and AppearanceCommunicating Environmental Friendliness through Product Design and Appearance
Communicating Environmental Friendliness through Product Design and Appearance
 
UDL edenfield t
UDL edenfield tUDL edenfield t
UDL edenfield t
 
2
22
2
 
location barcelone2
location barcelone2location barcelone2
location barcelone2
 
Final video t_edenfield
Final video t_edenfieldFinal video t_edenfield
Final video t_edenfield
 
location barcelone 1
location barcelone 1location barcelone 1
location barcelone 1
 
Kernhem Oplevering
Kernhem OpleveringKernhem Oplevering
Kernhem Oplevering
 
Og for group meeting 23march10
Og for group meeting 23march10Og for group meeting 23march10
Og for group meeting 23march10
 
IDBM Pro sustainable design lecture, 25.8.2011, Design Factory
IDBM Pro sustainable design lecture, 25.8.2011, Design FactoryIDBM Pro sustainable design lecture, 25.8.2011, Design Factory
IDBM Pro sustainable design lecture, 25.8.2011, Design Factory
 
Presentatie BIM stage bij Van den Berg Architecten
Presentatie BIM stage bij Van den Berg ArchitectenPresentatie BIM stage bij Van den Berg Architecten
Presentatie BIM stage bij Van den Berg Architecten
 
Presentatie vibes
Presentatie vibesPresentatie vibes
Presentatie vibes
 
dr.dk/presse
dr.dk/pressedr.dk/presse
dr.dk/presse
 
Presentatie lksvdd architecten
Presentatie lksvdd architectenPresentatie lksvdd architecten
Presentatie lksvdd architecten
 
Kvm
KvmKvm
Kvm
 

Similar a Ch14

Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Managementtlerell
 
Lesson02 - Network Design & LAN
Lesson02 - Network Design & LANLesson02 - Network Design & LAN
Lesson02 - Network Design & LANAngel G Diaz
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementAngel G Diaz
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionArlene Smith
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirementscsk selva
 
43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt43194352-Feasibility-study.ppt
43194352-Feasibility-study.pptIsmathIqbal2
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerPerformance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerIOSRjournaljce
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
 
Corporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxCorporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxvanesaburnand
 
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...lobnaqassem2
 
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docxCONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docxdonnajames55
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinJavier Guillermo, MBA, MSc, PMP
 
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...Osama M. Khaled
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1ahariclant1
 

Similar a Ch14 (20)

Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
 
Lesson02 - Network Design & LAN
Lesson02 - Network Design & LANLesson02 - Network Design & LAN
Lesson02 - Network Design & LAN
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and Management
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
 
Final
FinalFinal
Final
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerPerformance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
 
Ch7
Ch7Ch7
Ch7
 
Ch7
Ch7Ch7
Ch7
 
Corporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxCorporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docx
 
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
 
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docxCONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
 
Scheduling in CCE
Scheduling in CCEScheduling in CCE
Scheduling in CCE
 
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1a
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Ch14

  • 1. Chapter 14 Network Design and Management Data Communications and Computer Networks: A Business User’s Approach
  • 2. Data Communications and Computer Networks Chapter 14 Introduction Properly designing a computer network is a difficult task. It requires planning and analysis, feasibility studies, capacity planning, and baseline creation skills. Performing network management is difficult too. A network manager must possess computer and people skills, management skills, financial skills, and be able to keep up with changing technology.
  • 3. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle (SDLC) Every business has a number of goals. System planners and management personnel within a company try to generate a set of questions, or problems, to help the company achieve those goals. To properly understand a problem, analyze all possible solutions, select the best solution, and implement and maintain the solution, you need to follow a well-defined plan. SDLC is a methodology, or plan, for a structured approach to the development of a business system.
  • 4.
  • 5. Data Communications and Computer Networks Chapter 14 Cycle of the phases
  • 6. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle A systems analyst is typically responsible for managing a project and following the SDLC phases. Anyone, however, may be called upon to assist a systems analyst. Or anyone may have to assume some of the duties of a systems analyst. Individuals that are called upon to support a computer network should understand the basic phases of SDLC.
  • 7. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle Planning Phase - Identify problems, opportunities, and objectives. Analysis Phase - Determine information requirements. Information requirements can be gathered by sampling and collecting hard data, interviewing, questionnaires, observing environments, and prototyping. Design Phase - Design the system that was recommended and approved at the end of the analysis phase.
  • 8. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle Implementation Phase - The system is installed and preparations are made to move from the old system to the new. Maintenance Phase - The longest phase, involves the ongoing maintenance of the project. Maintenance may require personnel to return to an earlier phase to perform an update.
  • 9. Data Communications and Computer Networks Chapter 14
  • 10. Data Communications and Computer Networks Chapter 14 Network Modeling When updating or creating a new computer system, the analyst will create a set of models for both the existing system (if there is one) and the proposed system. Network models can either demonstrate the current state of the network or can model the desired computer network. A location connectivity diagram is a network modeling tool that depicts the various locations involved in a a network and the interconnections between those locations.
  • 11. Data Communications and Computer Networks Chapter 14 Network Modeling An overview location connectivity diagram shows the big picture of geographic locations of network facilities. External users and mobile users can be identified, as well as the locations primary to a business. A detailed location connectivity diagram is a close-up model of a single location and the networks that reside at the location. Working groups and the distances between those groups can be identified with a detailed diagram.
  • 12. Data Communications and Computer Networks Chapter 14 X means a special site
  • 13. Data Communications and Computer Networks Chapter 14
  • 14.
  • 15. Feasibility Studies Time feasible means the system can be constructed in an agreed upon time frame. Payback analysis ascertains costs and benefits of proposed system usually on an annual basis. Payback analysis is a good technique to use to determine financial feasibility. To calculate payback analysis, you must know all the expenses that will be incurred to create and maintain the system, as well as all possible income derived from the system. You must also be aware of the time value of money (a dollar today is worth more than one dollar promised a year from now because the dollar can be invested).
  • 16.
  • 17. Data Communications and Computer Networks Chapter 14
  • 18. Note profit at 6 th year
  • 19. Data Communications and Computer Networks Chapter 14 Capacity Planning Capacity planning involves trying to determine the amount of network bandwidth necessary to support an application or a set of applications. A number of techniques exist for performing capacity planning, including linear projection, computer simulation, benchmarking, and analytical modeling. Linear projection involves predicting one or more network capacities based on the current network parameters and multiplying by some constant.
  • 20. Data Communications and Computer Networks Chapter 14 Capacity Planning A computer simulation involves modeling an existing system or proposed system using a computer-based simulation tool. Benchmarking involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Analytical modeling involves the creation of mathematical equations to calculate various network values.
  • 21. Data Communications and Computer Networks Chapter 14 Creating a Baseline Involves the measurement and recording of a network’s state of operation over a given period of time. A baseline can be used to determine current network performance and to help determine future network needs. Baseline studies should be ongoing projects, and not something started and stopped every so many years.
  • 22.
  • 23.
  • 24. Data Communications and Computer Networks Chapter 14
  • 25.
  • 26. Generating Useable Statistics Statistics, properly generated, can be an invaluable aid to demonstrating current system demands and predicting future needs. Mean time between failures (MTBF) Mean time to repair (MTTR) Availability is the probability that a particular component or system will be available during a fixed time period Reliability is the probability that over a period of time the particular component or device will be available
  • 27.
  • 28.
  • 29. Generating Useable Statistics Suppose we want to calculate the availability of a modem that has a MTBF of 3000 hours and a MTTR of 1 hour. The availability of this modem for an 8-hour period is: a = 1/1 b = 1/3000 = 0.00033 A(8 hours) =1/(1 + 0.00033) + 0.00033/(1 + 0.00033) x e -(1 + 0.00033)8 = 0.9997 + 0.00033 x 0.000335 = 0.9997 Not available 3 out of 10,000 times you want it.
  • 30.
  • 31. Data Communications and Computer Networks Chapter 14 Generating Useable Statistics What is the reliability of a modem if the MTBF is 3000 hours and a transaction takes 20 minutes, or 1/3 of an hour (0.333 hours): R(0.333 hours) = e -(1/3000)(0.333) = e -0.000111 = 0.99989 Not reliable for .011 percent of the time.
  • 32. Data Communications and Computer Networks Chapter 14 Generating Useable Statistics So what do you want? Availability and reliability between 0.9999 and 0.99999 is desired! What is this in number of hours between failure for a year of service?
  • 33. Data Communications and Computer Networks Chapter 14 Managing Operations There are many services and functions available to assist an individual in managing computer network operations. One of the more useful is Simple Network Management Protocol (SNMP) . SNMP is an industry standard designed to manage network components from a remote location. Currently in version 3, SNMP supports agents, managers, and the Management Information Base (MIB).
  • 34. Data Communications and Computer Networks Chapter 14 Managing Operations A managed element has management software, called an agent , running in it. A second object, the SNMP manager , controls the operations of a managed element and maintains a database of information about all managed elements. A manager can query an agent to return current operating values, or can instruct an agent to perform a particular action. The Management Information Base (MIB) is a collection of information that is organized hierarchically and describes the operating parameters of all managed agents.
  • 35. Data Communications and Computer Networks Chapter 14 Managing Operations SNMP operates on a network between the application layer and the UDP/IP layer (not TCP/IP) – the transport layer.
  • 36.
  • 37. Data Communications and Computer Networks Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation Returning to BringBring Corporation from an earlier chapter, let’s complete our design, including e-mail and Internet access for each of the four sites. A linear projection can be used to estimate the amount of Internet traffic at each site. An overview location connectivity diagram gives us a big picture of the network interconnections.
  • 38. Data Communications and Computer Networks Chapter 14
  • 39. Data Communications and Computer Networks Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation A second linear projection can be used to determine the amount of local area network traffic within each site.