SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
Chapter 14 Network Design and Management Data Communications and Computer Networks: A  Business User’s Approach
  Data Communications and Computer Networks     Chapter 14 Introduction Properly designing a computer network is a difficult task.  It requires planning and analysis, feasibility studies, capacity planning, and baseline creation skills. Performing network management is difficult too.  A network manager must possess computer and people skills, management skills, financial skills, and be able to keep up with changing technology.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle (SDLC) Every business has a number of goals.  System planners and management personnel within a company try to generate a set of questions, or problems, to help the company achieve those goals. To properly understand a problem, analyze all possible solutions, select the best solution, and implement and maintain the solution, you need to follow a well-defined plan. SDLC is a methodology, or plan, for a structured approach to the development of a business system.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14 Cycle of the phases
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle A  systems analyst  is typically responsible for managing a project and following the SDLC phases. Anyone, however, may be called upon to assist a systems analyst. Or anyone may have to assume some of the duties of a systems analyst. Individuals that are called upon to support a computer network should understand the basic phases of SDLC.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle Planning Phase - Identify problems, opportunities, and objectives. Analysis Phase - Determine information requirements.  Information requirements can be gathered by sampling and collecting hard data, interviewing, questionnaires, observing environments, and prototyping. Design Phase - Design the system that was recommended and approved at the end of the analysis phase.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle Implementation Phase - The system is installed and preparations are made to move from the old system to the new. Maintenance Phase - The longest phase, involves the ongoing maintenance of the project. Maintenance may require personnel to return to an earlier phase to perform an update.
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 Network Modeling When updating or creating a new computer system, the analyst will create a set of models for both the existing system (if there is one) and the proposed system. Network models can either demonstrate the current state of the network or can model the desired computer network. A  location connectivity diagram  is a network modeling tool that depicts the various locations involved in a a network and the interconnections between those locations.
  Data Communications and Computer Networks     Chapter 14 Network Modeling An  overview location connectivity diagram  shows the big picture of geographic locations of network facilities. External users and mobile users can be identified, as well as the locations primary to a business. A  detailed location connectivity diagram  is a close-up model of a single location and the networks that reside at the location. Working groups and the distances between those groups can be identified with a detailed diagram.
  Data Communications and Computer Networks     Chapter 14 X means a special site
  Data Communications and Computer Networks     Chapter 14
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feasibility Studies Time feasible  means the system can be constructed in an agreed upon time frame. Payback analysis ascertains costs and benefits of proposed system usually on an annual basis. Payback analysis is a good technique to use to determine financial feasibility. To calculate payback analysis, you must know all the expenses that will be incurred to create and maintain the system, as well as all possible income derived from the system. You must also be aware of the  time value of money  (a dollar today is worth more than one dollar promised a year from now because the dollar can be invested).
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14
Note profit at 6 th  year
  Data Communications and Computer Networks     Chapter 14 Capacity Planning Capacity planning involves trying to determine the amount of network bandwidth necessary to support an application or a set of applications. A number of techniques exist for performing capacity planning, including linear projection, computer simulation, benchmarking, and analytical modeling. Linear projection involves predicting one or more network capacities based on the current network parameters and multiplying by some constant.
  Data Communications and Computer Networks     Chapter 14 Capacity Planning A computer simulation involves modeling an existing system or proposed system using a computer-based simulation tool. Benchmarking involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Analytical modeling involves the creation of mathematical equations to calculate various network values.
  Data Communications and Computer Networks     Chapter 14 Creating a Baseline Involves the measurement and recording of a network’s state of operation over a given period of time. A baseline can be used to determine current network performance and to help determine future network needs. Baseline studies should be ongoing projects, and not something started and stopped every so many years.
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Generating Useable Statistics Statistics, properly generated, can be an invaluable aid to demonstrating current system demands and predicting future needs. Mean time between failures (MTBF)   Mean time to repair (MTTR) Availability  is the probability that a particular component or system will be available during a fixed time period Reliability  is the probability that over a period of time the particular component or device will be available
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Generating Useable Statistics Suppose we want to calculate the availability of a modem that has a MTBF of 3000 hours and a MTTR of 1 hour. The availability of this modem for an 8-hour period is: a = 1/1 b = 1/3000 = 0.00033 A(8 hours) =1/(1 + 0.00033) + 0.00033/(1 + 0.00033) x e -(1 + 0.00033)8 =  0.9997 + 0.00033 x 0.000335 =  0.9997 Not available 3 out of 10,000 times you want it.
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14 Generating Useable Statistics What is the reliability of a modem if the MTBF is 3000 hours and a transaction takes 20 minutes, or 1/3 of an hour (0.333 hours): R(0.333 hours) = e  -(1/3000)(0.333)  = e  -0.000111  = 0.99989 Not reliable for .011 percent of the time.
  Data Communications and Computer Networks     Chapter 14 Generating Useable Statistics So what do you want? Availability and reliability between 0.9999 and 0.99999 is desired! What is this in number of hours between failure for a year of service?
  Data Communications and Computer Networks     Chapter 14 Managing Operations There are many services and functions available to assist an individual in managing computer network operations. One of the more useful is  Simple Network Management Protocol (SNMP) . SNMP is an industry standard designed to manage network components from a remote location. Currently in version 3, SNMP supports agents, managers, and the Management Information Base (MIB).
  Data Communications and Computer Networks     Chapter 14 Managing Operations A managed element has management software, called an  agent , running in it. A second object, the SNMP  manager , controls the operations of a managed element and maintains a database of information about all managed elements. A manager can query an agent to return current operating values, or can instruct an agent to perform a particular action. The  Management Information Base (MIB)  is a collection of information that is organized hierarchically and describes the operating parameters of all managed agents.
  Data Communications and Computer Networks     Chapter 14 Managing Operations SNMP operates on a network between the application layer and the UDP/IP layer (not TCP/IP) – the transport layer.
  Data Communications and Computer Networks     Chapter 14 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Data Communications and Computer Networks     Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation Returning to BringBring Corporation from an earlier chapter, let’s complete our design, including e-mail and Internet access for each of the four sites. A linear projection can be used to estimate the amount of Internet traffic at each site. An overview location connectivity diagram gives us a big picture of the network interconnections.
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation A second linear projection can be used to determine the amount of local area network traffic within each site.

Weitere ähnliche Inhalte

Was ist angesagt?

Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
Integration of a Predictive, Continuous Time Neural Network into Securities M...
Integration of a Predictive, Continuous Time Neural Network into Securities M...Integration of a Predictive, Continuous Time Neural Network into Securities M...
Integration of a Predictive, Continuous Time Neural Network into Securities M...Chris Kirk, PhD, FIAP
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
 
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive ApplicationsM3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive ApplicationsVladislavKashansky
 
Support Vector Machine–Based Prediction System for a Football Match Result
Support Vector Machine–Based Prediction System for a Football Match ResultSupport Vector Machine–Based Prediction System for a Football Match Result
Support Vector Machine–Based Prediction System for a Football Match Resultiosrjce
 
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC IJECEIAES
 
Iaetsd performance voting algorithms for software safety
Iaetsd performance voting algorithms for software safetyIaetsd performance voting algorithms for software safety
Iaetsd performance voting algorithms for software safetyIaetsd Iaetsd
 
Design and Implementation of Low Power DSP Core with Programmable Truncated V...
Design and Implementation of Low Power DSP Core with Programmable Truncated V...Design and Implementation of Low Power DSP Core with Programmable Truncated V...
Design and Implementation of Low Power DSP Core with Programmable Truncated V...ijsrd.com
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Kashif Mehmood
 
RobertClarkResume
RobertClarkResumeRobertClarkResume
RobertClarkResumeBob Clark
 
Desktop Grid Scheduling
Desktop Grid SchedulingDesktop Grid Scheduling
Desktop Grid SchedulingPiyush Kandpal
 
Rachit Mishra_stock prediction_report
Rachit Mishra_stock prediction_reportRachit Mishra_stock prediction_report
Rachit Mishra_stock prediction_reportRachit Mishra
 
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...
 Machine Learning Data Life Cycle in Production (Week 2   feature engineering... Machine Learning Data Life Cycle in Production (Week 2   feature engineering...
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...Ajay Taneja
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
FPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT AlgorithmFPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT Algorithmcscpconf
 

Was ist angesagt? (19)

Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
Integration of a Predictive, Continuous Time Neural Network into Securities M...
Integration of a Predictive, Continuous Time Neural Network into Securities M...Integration of a Predictive, Continuous Time Neural Network into Securities M...
Integration of a Predictive, Continuous Time Neural Network into Securities M...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
Mis
MisMis
Mis
 
TYBSC CS SEM 5 AI NOTES
TYBSC CS SEM 5 AI NOTESTYBSC CS SEM 5 AI NOTES
TYBSC CS SEM 5 AI NOTES
 
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive ApplicationsM3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
 
Support Vector Machine–Based Prediction System for a Football Match Result
Support Vector Machine–Based Prediction System for a Football Match ResultSupport Vector Machine–Based Prediction System for a Football Match Result
Support Vector Machine–Based Prediction System for a Football Match Result
 
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
 
Iaetsd performance voting algorithms for software safety
Iaetsd performance voting algorithms for software safetyIaetsd performance voting algorithms for software safety
Iaetsd performance voting algorithms for software safety
 
Design and Implementation of Low Power DSP Core with Programmable Truncated V...
Design and Implementation of Low Power DSP Core with Programmable Truncated V...Design and Implementation of Low Power DSP Core with Programmable Truncated V...
Design and Implementation of Low Power DSP Core with Programmable Truncated V...
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
 
RobertClarkResume
RobertClarkResumeRobertClarkResume
RobertClarkResume
 
Desktop Grid Scheduling
Desktop Grid SchedulingDesktop Grid Scheduling
Desktop Grid Scheduling
 
Rachit Mishra_stock prediction_report
Rachit Mishra_stock prediction_reportRachit Mishra_stock prediction_report
Rachit Mishra_stock prediction_report
 
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...
 Machine Learning Data Life Cycle in Production (Week 2   feature engineering... Machine Learning Data Life Cycle in Production (Week 2   feature engineering...
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
50120130406041 2
50120130406041 250120130406041 2
50120130406041 2
 
FPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT AlgorithmFPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT Algorithm
 

Andere mochten auch

Presentatie brink en fleer
Presentatie brink en fleerPresentatie brink en fleer
Presentatie brink en fleerjangmeijer
 
Presentatie architektenburo Smid en Peters
Presentatie architektenburo Smid en PetersPresentatie architektenburo Smid en Peters
Presentatie architektenburo Smid en Petersjangmeijer
 
Communicating Environmental Friendliness through Product Design and Appearance
Communicating Environmental Friendliness through Product Design and AppearanceCommunicating Environmental Friendliness through Product Design and Appearance
Communicating Environmental Friendliness through Product Design and AppearanceSeos Design
 
location barcelone2
location barcelone2location barcelone2
location barcelone2ohluis
 
location barcelone 1
location barcelone 1location barcelone 1
location barcelone 1ohluis
 
Kernhem Oplevering
Kernhem OpleveringKernhem Oplevering
Kernhem Opleveringjangmeijer
 
Og for group meeting 23march10
Og for group meeting 23march10Og for group meeting 23march10
Og for group meeting 23march10W4in
 
IDBM Pro sustainable design lecture, 25.8.2011, Design Factory
IDBM Pro sustainable design lecture, 25.8.2011, Design FactoryIDBM Pro sustainable design lecture, 25.8.2011, Design Factory
IDBM Pro sustainable design lecture, 25.8.2011, Design FactorySeos Design
 
Presentatie BIM stage bij Van den Berg Architecten
Presentatie BIM stage bij Van den Berg ArchitectenPresentatie BIM stage bij Van den Berg Architecten
Presentatie BIM stage bij Van den Berg Architectenjangmeijer
 
Presentatie vibes
Presentatie vibesPresentatie vibes
Presentatie vibesjangmeijer
 
Presentatie lksvdd architecten
Presentatie lksvdd architectenPresentatie lksvdd architecten
Presentatie lksvdd architectenjangmeijer
 

Andere mochten auch (16)

Presentatie brink en fleer
Presentatie brink en fleerPresentatie brink en fleer
Presentatie brink en fleer
 
Presentatie architektenburo Smid en Peters
Presentatie architektenburo Smid en PetersPresentatie architektenburo Smid en Peters
Presentatie architektenburo Smid en Peters
 
Communicating Environmental Friendliness through Product Design and Appearance
Communicating Environmental Friendliness through Product Design and AppearanceCommunicating Environmental Friendliness through Product Design and Appearance
Communicating Environmental Friendliness through Product Design and Appearance
 
UDL edenfield t
UDL edenfield tUDL edenfield t
UDL edenfield t
 
2
22
2
 
location barcelone2
location barcelone2location barcelone2
location barcelone2
 
Final video t_edenfield
Final video t_edenfieldFinal video t_edenfield
Final video t_edenfield
 
location barcelone 1
location barcelone 1location barcelone 1
location barcelone 1
 
Kernhem Oplevering
Kernhem OpleveringKernhem Oplevering
Kernhem Oplevering
 
Og for group meeting 23march10
Og for group meeting 23march10Og for group meeting 23march10
Og for group meeting 23march10
 
IDBM Pro sustainable design lecture, 25.8.2011, Design Factory
IDBM Pro sustainable design lecture, 25.8.2011, Design FactoryIDBM Pro sustainable design lecture, 25.8.2011, Design Factory
IDBM Pro sustainable design lecture, 25.8.2011, Design Factory
 
Presentatie BIM stage bij Van den Berg Architecten
Presentatie BIM stage bij Van den Berg ArchitectenPresentatie BIM stage bij Van den Berg Architecten
Presentatie BIM stage bij Van den Berg Architecten
 
Presentatie vibes
Presentatie vibesPresentatie vibes
Presentatie vibes
 
dr.dk/presse
dr.dk/pressedr.dk/presse
dr.dk/presse
 
Presentatie lksvdd architecten
Presentatie lksvdd architectenPresentatie lksvdd architecten
Presentatie lksvdd architecten
 
Kvm
KvmKvm
Kvm
 

Ähnlich wie Ch14

Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Managementtlerell
 
Lesson02 - Network Design & LAN
Lesson02 - Network Design & LANLesson02 - Network Design & LAN
Lesson02 - Network Design & LANAngel G Diaz
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementAngel G Diaz
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionArlene Smith
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirementscsk selva
 
43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt43194352-Feasibility-study.ppt
43194352-Feasibility-study.pptIsmathIqbal2
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerPerformance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerIOSRjournaljce
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
 
Corporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxCorporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxvanesaburnand
 
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...lobnaqassem2
 
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docxCONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docxdonnajames55
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinJavier Guillermo, MBA, MSc, PMP
 
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...Osama M. Khaled
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1ahariclant1
 

Ähnlich wie Ch14 (20)

Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
 
Lesson02 - Network Design & LAN
Lesson02 - Network Design & LANLesson02 - Network Design & LAN
Lesson02 - Network Design & LAN
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and Management
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
 
requirment anlaysis , user requirements
requirment anlaysis , user requirementsrequirment anlaysis , user requirements
requirment anlaysis , user requirements
 
Final
FinalFinal
Final
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt43194352-Feasibility-study.ppt
43194352-Feasibility-study.ppt
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerPerformance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
 
Ch7
Ch7Ch7
Ch7
 
Ch7
Ch7Ch7
Ch7
 
Corporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxCorporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docx
 
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
Chapter007.Infrastructure, Cloud Computing, Metrics, and Business Continuity ...
 
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docxCONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
CONSULTANT ANALYSIS FOR MEDICAL FACILITY2CONSULTANT ANALYSIS FO.docx
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
 
Scheduling in CCE
Scheduling in CCEScheduling in CCE
Scheduling in CCE
 
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1a
 

Kürzlich hochgeladen

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Kürzlich hochgeladen (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Ch14

  • 1. Chapter 14 Network Design and Management Data Communications and Computer Networks: A Business User’s Approach
  • 2. Data Communications and Computer Networks Chapter 14 Introduction Properly designing a computer network is a difficult task. It requires planning and analysis, feasibility studies, capacity planning, and baseline creation skills. Performing network management is difficult too. A network manager must possess computer and people skills, management skills, financial skills, and be able to keep up with changing technology.
  • 3. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle (SDLC) Every business has a number of goals. System planners and management personnel within a company try to generate a set of questions, or problems, to help the company achieve those goals. To properly understand a problem, analyze all possible solutions, select the best solution, and implement and maintain the solution, you need to follow a well-defined plan. SDLC is a methodology, or plan, for a structured approach to the development of a business system.
  • 4.
  • 5. Data Communications and Computer Networks Chapter 14 Cycle of the phases
  • 6. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle A systems analyst is typically responsible for managing a project and following the SDLC phases. Anyone, however, may be called upon to assist a systems analyst. Or anyone may have to assume some of the duties of a systems analyst. Individuals that are called upon to support a computer network should understand the basic phases of SDLC.
  • 7. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle Planning Phase - Identify problems, opportunities, and objectives. Analysis Phase - Determine information requirements. Information requirements can be gathered by sampling and collecting hard data, interviewing, questionnaires, observing environments, and prototyping. Design Phase - Design the system that was recommended and approved at the end of the analysis phase.
  • 8. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle Implementation Phase - The system is installed and preparations are made to move from the old system to the new. Maintenance Phase - The longest phase, involves the ongoing maintenance of the project. Maintenance may require personnel to return to an earlier phase to perform an update.
  • 9. Data Communications and Computer Networks Chapter 14
  • 10. Data Communications and Computer Networks Chapter 14 Network Modeling When updating or creating a new computer system, the analyst will create a set of models for both the existing system (if there is one) and the proposed system. Network models can either demonstrate the current state of the network or can model the desired computer network. A location connectivity diagram is a network modeling tool that depicts the various locations involved in a a network and the interconnections between those locations.
  • 11. Data Communications and Computer Networks Chapter 14 Network Modeling An overview location connectivity diagram shows the big picture of geographic locations of network facilities. External users and mobile users can be identified, as well as the locations primary to a business. A detailed location connectivity diagram is a close-up model of a single location and the networks that reside at the location. Working groups and the distances between those groups can be identified with a detailed diagram.
  • 12. Data Communications and Computer Networks Chapter 14 X means a special site
  • 13. Data Communications and Computer Networks Chapter 14
  • 14.
  • 15. Feasibility Studies Time feasible means the system can be constructed in an agreed upon time frame. Payback analysis ascertains costs and benefits of proposed system usually on an annual basis. Payback analysis is a good technique to use to determine financial feasibility. To calculate payback analysis, you must know all the expenses that will be incurred to create and maintain the system, as well as all possible income derived from the system. You must also be aware of the time value of money (a dollar today is worth more than one dollar promised a year from now because the dollar can be invested).
  • 16.
  • 17. Data Communications and Computer Networks Chapter 14
  • 18. Note profit at 6 th year
  • 19. Data Communications and Computer Networks Chapter 14 Capacity Planning Capacity planning involves trying to determine the amount of network bandwidth necessary to support an application or a set of applications. A number of techniques exist for performing capacity planning, including linear projection, computer simulation, benchmarking, and analytical modeling. Linear projection involves predicting one or more network capacities based on the current network parameters and multiplying by some constant.
  • 20. Data Communications and Computer Networks Chapter 14 Capacity Planning A computer simulation involves modeling an existing system or proposed system using a computer-based simulation tool. Benchmarking involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Analytical modeling involves the creation of mathematical equations to calculate various network values.
  • 21. Data Communications and Computer Networks Chapter 14 Creating a Baseline Involves the measurement and recording of a network’s state of operation over a given period of time. A baseline can be used to determine current network performance and to help determine future network needs. Baseline studies should be ongoing projects, and not something started and stopped every so many years.
  • 22.
  • 23.
  • 24. Data Communications and Computer Networks Chapter 14
  • 25.
  • 26. Generating Useable Statistics Statistics, properly generated, can be an invaluable aid to demonstrating current system demands and predicting future needs. Mean time between failures (MTBF) Mean time to repair (MTTR) Availability is the probability that a particular component or system will be available during a fixed time period Reliability is the probability that over a period of time the particular component or device will be available
  • 27.
  • 28.
  • 29. Generating Useable Statistics Suppose we want to calculate the availability of a modem that has a MTBF of 3000 hours and a MTTR of 1 hour. The availability of this modem for an 8-hour period is: a = 1/1 b = 1/3000 = 0.00033 A(8 hours) =1/(1 + 0.00033) + 0.00033/(1 + 0.00033) x e -(1 + 0.00033)8 = 0.9997 + 0.00033 x 0.000335 = 0.9997 Not available 3 out of 10,000 times you want it.
  • 30.
  • 31. Data Communications and Computer Networks Chapter 14 Generating Useable Statistics What is the reliability of a modem if the MTBF is 3000 hours and a transaction takes 20 minutes, or 1/3 of an hour (0.333 hours): R(0.333 hours) = e -(1/3000)(0.333) = e -0.000111 = 0.99989 Not reliable for .011 percent of the time.
  • 32. Data Communications and Computer Networks Chapter 14 Generating Useable Statistics So what do you want? Availability and reliability between 0.9999 and 0.99999 is desired! What is this in number of hours between failure for a year of service?
  • 33. Data Communications and Computer Networks Chapter 14 Managing Operations There are many services and functions available to assist an individual in managing computer network operations. One of the more useful is Simple Network Management Protocol (SNMP) . SNMP is an industry standard designed to manage network components from a remote location. Currently in version 3, SNMP supports agents, managers, and the Management Information Base (MIB).
  • 34. Data Communications and Computer Networks Chapter 14 Managing Operations A managed element has management software, called an agent , running in it. A second object, the SNMP manager , controls the operations of a managed element and maintains a database of information about all managed elements. A manager can query an agent to return current operating values, or can instruct an agent to perform a particular action. The Management Information Base (MIB) is a collection of information that is organized hierarchically and describes the operating parameters of all managed agents.
  • 35. Data Communications and Computer Networks Chapter 14 Managing Operations SNMP operates on a network between the application layer and the UDP/IP layer (not TCP/IP) – the transport layer.
  • 36.
  • 37. Data Communications and Computer Networks Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation Returning to BringBring Corporation from an earlier chapter, let’s complete our design, including e-mail and Internet access for each of the four sites. A linear projection can be used to estimate the amount of Internet traffic at each site. An overview location connectivity diagram gives us a big picture of the network interconnections.
  • 38. Data Communications and Computer Networks Chapter 14
  • 39. Data Communications and Computer Networks Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation A second linear projection can be used to determine the amount of local area network traffic within each site.