Lesson 2 - Network Design Steps
Lesson 2 - Network Design Steps
Implement Develop
and test physical
network design
Test, optimize,
and document
design
Network Design Steps
• Phase 1 – Analyze Requirements
– Analyze business goals and constraints
– Analyze technical goals and tradeoffs
– Characterize the existing network
– Characterize network traffic
Network Design Steps
• Phase 2 – Logical Network Design
– Design a network topology
– Design models for addressing and naming
– Select switching and routing protocols
– Develop network security strategies
– Develop network management strategies
Network Design Steps
• Phase 3 – Physical Network Design
– Select technologies and devices for campus
networks
– Select technologies and devices for enterprise
networks
Network Design Steps
• Phase 4 – Testing, Optimizing, and Documenting the Network
Design
– Test the network design
– Optimize the network design
– Document the network design
– Both pilot and prototype are used to "test and verify designs"
The Pilot Network tests and verifies a design before the network is
launched.
The Prototype Network tests and verifies a design or redesign in an
isolated network before inflicting it on the real network.
• 5. Implementation Plan: for installations,
outsourcing, informing users, training,
measuring design effectiveness, and
fallback and future plans.
• Project Schedule: at least dates and deliverables for
major milestones
• Project Budget: funds available for purchases,
maintenance, support, licenses, training, and
staffing
– Return on Investment: how quickly the design will pay for
itself
Gathering and Listing Requirements
Requirements are gathered and developed with initial conditions
on the architecture and design, with input from users,
administration, and management
• Initial conditions are the basis for the start of the analysis
process.
• They help determine what you are designing toward, as well
as the reasons for the architecture and design.
• Initial conditions consist of the
(i) type of network project
(ii) the scope of the architecture and design
(iii)initial architecture/design goals, and
(iv)any outside forces acting on the network.
*
Type of Network Project
• New network
• Modification of an existing network
*
Analysis of network problems
• The network may not be functioning as
planned.
*
Network outsourcing
• Requirement analysis is helpful to allow for
outsourcing of resource operations,
administration, maintenance, and provisioning
(OAM&P) functions across multiple vendors.
*
Scope of Network Project
• Network size
• Number of sites
• Distance between sites
1. Funding limitations
2. Organizational rules and regulations
3. Time and schedule limitations
4. Technical constrains for existing users ,
applications, devices, networks and
management.
*
Network design constraints
• Existing components in the system will often act as constraints
in terms of the device’s performance – components ability to
process data from the network
• Users suffer from inertia, not wanting to change the ways in
which they do their work.
• Applications written to be used locally on a device or for a
particular network technology or protocol may have to be
modified to function on the new network.
*
Network design constraints
• Device interfaces and drivers may have to be changed
or upgraded.
*
Network requirement analysis
• What are requirements?
23
Requirements Analysis
• There can be lots of requirements, from a
variety of sources, with varying degrees of
achievability.
– User Requirements
– Application Requirements
– Device Requirements
– Network Requirements
– Other Requirements
24
User Requirements
• User requirements are
often qualitative and
very high level
– What is ‘fast enough’
for download? System
response (RTT)?
– How good does video
need to be?
– What’s my budget?
25
Requiremen
ts Become
More
Technical as
They Move
Closer to
Network
Devices
26
• Timeliness - user be able to access, transfer, or modify information within a
tolerable time frame. End-to-end or round-trip delay can be a useful
measurement.
• Interactivity – is of the response times of the system and network when they are
required to actively interact with users.
• Reliability - consistently available service.
• Presentation quality - user’s perception of audio, video, and/or data displays
• Adaptability - ability of the system to adapt to users’ changing needs
• Security - guarantee the confidentiality, integrity, and authenticity of a user’s
information and physical resources, as well as access to user and system resources.
• Affordability - purchases fit within a budget.
• Functionality - encompasses any functional requirement that the user has for the
system.
• Supportability - is a set of characteristics that describes how well the customer can
keep the network operating at designed performance, through the full range of
mission scenarios described by the customer during the requirements analysis
process.
• Future growth - is determining if and when users are planning to deploy and use
new applications and devices on the network.
27
• User requirements are the least technical and
are also the most subjective. As shown in
Figure 2.3, requirements become more
technical as they move from users to the
network.
28
Application requirements
• The application component interfaces with
the user and device components and is a key
part of the requirements analysis.
29
30
Application Requirements
• What types of apps are we using?
– Mission-critical - have predictable, guaranteed, and/or
highperformance RMA requirements
– Rate-critical – have predictable,guaranteed,and/orhigh-
performance capacity requirements
– Real-time and/or interactive - have predictable,
guaranteed, and/or highperformance delay requirements
32
Application Requirements
• Where are the
apps located?
• Are some only
used in certain
locations?
33
Device requirements
• These are requirements of devices that the network will support,
particularly the types of devices, their performance characteristics, and
their location information.
34
Device Requirements
• What kinds of devices are on your network?
– Generic computing devices include normal PCs,
Macs, laptops, handheld computers, workstations
– Servers include all flavors of server – file, print,
app/computation, and backup
– Specialized devices include extreme servers
(supercomputers, massively parallel servers), data
collection systems (POS terminals), industry-
specific devices, networked devices (cameras,
tools), stoplights, ATMs, etc.
35
Device Requirements
• Specialized
devices are
often location-
specific
36
Device Requirements
• We want an understanding of the device’s
performance – its ability to process data from
the network
– Device I/O rates
– Delay time for performing a given app function
37
Device Requirements
• Performance results from many factors
– Storage performance, that is, flash, disk drive,
or tape performance
– Processor (CPU) performance
– Memory performance (access times)
– Bus performance (bus capacity)
– OS performance (effectiveness of the protocol
stack and APIs)
– Device driver performance
38
Device Requirements
• The device locations
are also critical
– Often generic
devices can be
grouped by their
quantity
– Servers and
specialized stuff are
shown individually
39
Network requirements
40
Network Requirements
• Most network architectures/designs today need to
incorporate existing networks.
• Few networks today are built entirely from scratch. This
includes system upgrades, such as adding a new application to
the system, migrating to a new or different technology or
protocol, or upgrading the network infrastructure, and the
expansion or reduction of a system’s size or scope.
• Sometimes the network architecture and design must
accommodate any dependencies and constraints imposed by
the existing network.
41
Network Requirements
• Issues with network integration include
– Scaling dependencies – how will the size of the
existing network affect the new one?
• Will the existing network change structure, or just add
on a new wing?
– Location dependencies – interaction between old
and new networks could change the location of
key components
– Performance constraints – existing network could
limit performance of the new one
42
Network Requirements
– Network, system, and support service
dependencies
• Addressing, security, routing protocols and network
management can all be affected by the existing
network
– Interoperability dependencies
• Changes in technology or media at the interfaces
between networks need to be accounted for, as well as
QoS guarantees, if any
– Network obsolescence – do protocols or
technologies become obsolete during transition?
43
Network Requirements
• Network management and security issues
need to be addressed throughout
development
– How will the network be monitored for events?
– Monitoring for network performance?
• What is the hierarchy for management data flow?
– Network configuration?
– Troubleshoot support?
44
Network Requirements
• Security Effect/ Probability User Devices Servers Network Software Services Data
analysis can Unauthorized Access B/A B/B C/B A/B B/C A/B
include the Unauthorized Disclosure B/C B/B C/C A/B B/C A/B
45
Requirements Management
• The requirements you develop need to be
tracked and managed, just like any system’s
requirements
– Identify requirements by some form of ID and
short name
– Need a tool to track requirements, their status,
changes, sources, etc.
• Map location of apps and devices of the
existing network
*