Requirements Definition

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Chabot College Chapter 2 Review Questions Semester IIIELEC Semester III ELEC
T.Sharon-A.Frank 1 Multimedia Quality of Service (QoS)
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Protocols and the TCP/IP Suite
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Computer Communication & Networks
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Chapter 4: Managing LAN Traffic
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Communicating over the Network Network Fundamentals – Chapter 2.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Hands-on Networking Fundamentals
The OSI Model.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Network design Topic 2 Existing network infrastructure.
Protocol Layering Chapter 11.
Chapter 12 The Network Development Life Cycle
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Protocols and the TCP/IP Suite
Youngstown State University Cisco Regional Academy
Overview of Data Communications and Networking
Instructor Materials Chapter 6: Quality of Service
Chapter 9 Optimizing Network Performance
Local Area Networks Honolulu Community College
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Click to edit Master subtitle style
Computer Data Communications
Computer Networks and Internets, 5e By Douglas E. Comer
© 2002, Cisco Systems, Inc. All rights reserved.
Network Administration CNET-443
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Telecommunication ELEC503
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Transport Layer Unit 5.
Protocols and the TCP/IP Suite
Module 5 - Switches CCNA 3 version 3.0.
Chapter 3: Open Systems Interconnection (OSI) Model
Module 8: Ethernet Switching
Overview of Data Communications and Networking
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Switching Techniques.
Net301 LECTURE 10 11/19/2015 Lect
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Data Communication Networks
Data Communication Chapter 1 Introduction 1.#.
Optical communications & networking - an Overview
Protocols and the TCP/IP Suite
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter-5 Traffic Engineering.
OSI Reference Model Unit II
Computer Networks DA2402.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

Requirements Definition Chapter – 4 Requirements Definition

Outline User Requirements Items to be inventoried Requirement categories Traffic sizing Traffic characteristics Time and Delay consideration Network Delay elements Connectivity types Availability and Reliability Service Aspects Budget constraints

User requirements There are two basic steps that is to be fulfilled by the designer, that is - Performance and Documentation of an inventory of current network and requirements & documentation of the expectation of new network. Cisco recommends 12 items is to be inventoried in the customers current network but we are taking only 7 items

The items to be inventoried Inventory steps Description 1 Existing Application. Document current application across the network. 2 Existing network Document current protocol. protocol across the network.

Inventory steps Description 3 Network topology and Create a high level Addressing. topology map of the current network, including all major segments, routers, bridges, switches and other device 4 Potential bottlenecks Monitoring use of in current network. bandwidth and traffic patterns

Inventory steps Description 5 Existing network Measure network Performance. Performance between, various hosts and servers. Understand how application performance is driven by latency verses bandwidth. 6 Existing network Same as network topology use and addressing

Inventory steps Description 7 Status of existing Document revision levels, routers. Memory use, CPU use and buffer drops, determine if there is a processing limitation under load

Inventory steps Description 8 Existing Network Management system Document all network management tools being used and which platform they run.

Inventory steps Description 9 Over all health Of existing network Measure the perceived existing health of the network , based on specific criteria.

Requirement categories Requirement are classified into three different categories, they are as follows Business Requirements Security Requirements Manageability Requirements

Business Requirements Business requirements includes the following items. Timeline Staffing Training Budgets and Project approval

Security Requirements Security requirements are very critical to most business, it includes the following. Who can access the network? Each resource. What can be accessed and when? Determine the appropriate security level for the resources and network you are trying to protect.

Manageability Requirements Manageability Requirements can vary across the board from simple PING program documentation that each device in the network is alive to full blown network management system.

Performance Requirements Performance Requirements cover bandwidth requirements and QoS ( lost packets, jitter, and latency) . Applications along with users drive performance requirements, but the final driver is budget justification .

Traffic sizing Traffic comes in many sizes in many shapes and sizes. Which is having many protocols and formats. It travels in many types and patterns . It requires special methods of processing and handling. The traffic is measured in two common formats 1. Units of measure and 2. Packaging of these units 1. Units of measure means, bits, bytes message block. 2.Packaging of these units means, file, packets, frames or cell.

Traffic characteristics The traffic characteristics depends upon four network variables they are, delay, loss, jitter and throughput. Characteristics Definition Delay Measures the time for a packet to travel between two network devices. PING measures round -trip delay between two network devices. Delay in networks might not be symmetrical so the delay from A to B might be different than the delay from B to A. Jitter Measures the difference in one way delay over time for different packets sent between two network points.

Traffic characteristics Characteristics Definition Lost Packet Measures the number of packets deleted or percentage dropped in the network due to any error or congestion over the total number of packets transmitted. Burstiness Measures how infrequent a source send traffic. Burstiness is defined as the ratio of peak to average rate of traffic based on specific sampling period for the data. Throughput Measures how much data is required to be transmitted in a specified time frame. Ex. bits/sec or packets/sec.

Protocol The full suit of user protocols must be defined for both existing and planned applications. This include all protocols serving all seven layers of OSI reference model Which protocol is used on both side the application side and the network side. This is because the network devices like routers, switches or bridges heavily depends on protocols.

Time and Delay considerations Time and Delay considerations is most important aspects of data communications networking and How applications and protocols manage delay. Response time : It is defined as the round trip delay from source to destination, or the time required it takes a user to send a request until he or she receives a reply.

Time and Delay considerations There are three elements of delay. Media access delay Serialization delay Network delay They are explained in the picture on next slide.

Network Delay Elements

Network Delay Elements Media Access Delay : It means to take access the media of or LAN. The time will be very small under normal conditions but under load and congestion, the delay could be factor. . Serialization Delay : The time it takes to output onto a serial link. Network Delay: The time it takes for a packet frame / cell to travel across the service provider's network. Network delay components can also include the software / hardware, switching / routing delays.

Connectivity User connectivity will be defined by existing or available connectivity methods. For, example some remote locations might have only dial, xDSL, or cable access.

User-to-network The following points are to be examined for user-to- network connectivity. What is minimum speed required for connectivity? What types of devices will be connected? What type of data rates can they transmit? What is distance involved between user equipment and data communication equipment?

What are the vendors software and hardware vendor specifics? What mode of addressing is required for access? What are protocols required for basic connectivity?

Network-to-network connectivity Once the user-to-network interface has been defined, any network-to-network connectivity requirements for new or existing networks can also be defined To what extent is everywhere connectivity required? Will the connectivity be homogenous or heterogeneous? Will private, public or hybrid network access be required? What type of technology will be used for network interfaces and internetworking? Some examples are: Multipoint or point-to-point. Multiplexing or concentration Switched (Circuit, Packet or Cell) Bridge or routed Hybrid.

Service aspects Service aspects such as network management, billing, security, user support and disaster recovery are important topic with range of standard and proprietary solutions. Network designer must understand the capabilities offered by each technology and protocol.

Budget constraints It means the limitations of budget: The designer must design the network within a given budget, accommodating the largest number of users and applications within the available budget. This becomes a balance between cost, capabilities and connectivity. A network becomes cost justified if it improves operating efficiency, helps users meet corporate objectives. There are two things who controls the network budget, the network manager and the users, but most often it is the network manager. When user have budgetary control the question is, what is placed on the network? When network manager has control and the user is a customer, the user tries to place everything possible over the network.

Videos https://www.youtube.com/watch?v=qpKgVTCm06c