Lecture 1-1
Lecture 1-1
Lectures 1
Course Materials
Slides
Notes
Text book
Oppenheimer, P. (2011). Top-down network design.
Indianapolis, IN: Cisco Press.
Mc. Cabe, D. James : “Network Analysis, Architecture and
Design: 4th Edition“ , Morgan Kaufmann
2
Grading Policy
Component Weightage
Mid-term Exam 20
Final Exam 50
Project and Presentation 20
Quizzes and Assignment 10
Introduction
What is a Network?
What is “Network Analysis and Architecture”?
What is “Network Design”?
Top-Down Network Design
Network Development Life Cycle (NDLC)
Network Analysis and Design Methodology
Types of Network Design
4
What is a Network?
Management view
Technical view
5
The Management View (1/3)
A network is a utility
Computers and their users are customers of the network
utility
The network must accommodate the needs of customers
As computer usage increases so does the requirements of
the network utility
8
The Technical View (1/2)
A “Network” really can be thought of as three parts and they
all need to be considered when working on a network design
project:
Connections
Communications/Protocols
Services
Connections
Provided by Hardware that ties things together
Wire/Fiber/Wireless Transport Mechanisms
Routers
Switches/Hubs
Computers
9
The Technical View (2/2)
Communications/Protocols
Provided by Software
A common language for 2 systems to communicate with each other
TCP/IP (Internet/Windows NT)
IPX / SPX (Novell Netware 4)
AppleTalk
Other Network OS
Services
The Heart of Networking
Cooperation between 2 or more systems to perform some function -
Applications
telnet
FTP
HTTP
SMTP
10
Network analysis
1-12
Network design
15
Application Characteristics
Applications Message Message Delay need Reliability
Length arrival rate need
File transfer Very long Very low Very low Very high
16
Application Bandwidths
Transaction
100 Bytes Few Kbps
Processing
17
A Look on Multimedia Networking
Video standard Bandwidth per WAN services
user
19
Network Design: Achievable?
WWW Traffic
Addressing
Access Patterns
Network
Security
WAN Management
21
Traditional Network Design Methodology
22
Top-Down Network Design Methodology (1/2)
24
Top-Down Network Design Process (1/2)
25
Top-Down Network Design Process (2/2)
It is an iterative process:
It is important to first get an overall view of a
customer's requirements
More detail can be gathered later on protocol behavior,
scalability requirements, technology preferences, etc.
Recognizes that the logical model and the physical
design may change as more information is gathered
Management Design
Simulation/
Prototyping
Monitoring
Implementation
27
Network Design and Implementation Cycle
28
Network Design and Implementation Cycle (1/3)
Analyze requirements:
Interviews with users and technical personnel
Understand business and technical goals for a
new or enhanced system
Characterize the existing network: logical and
physical topology, and network performance
Analyze current and future network traffic,
including traffic flow and load, protocol
behavior, and QoS requirements
29
Network Design and Implementation Cycle (2/3)
31
Another Perspective
Data collection
Traffic
Costs
Constraints
Design process
Performance analysis
Fine tuning
A painstaking iterative process
32
PDIOO Network Life Cycle (1/3)
(Cisco)
Plan:
Network requirements are identified in this phase
Analysis of areas where the network will be installed
Identification of users who will require network services
Design:
Accomplish the logical and physical design, according
to requirements gathered during the Plan phase
Implement:
Network is built according to the Design specifications
Implementation also serves to verify the design
33
PDIOO Network Life Cycle (2/3)
(Cisco)
Operate:
Operation is the final test of the effectiveness of the design
The network is monitored during this phase for performance
problems and any faults, to provide input into the Optimize
phase
Optimize:
Based on proactive network management which identifies
and resolves problems before network disruptions arise
The optimize phase may lead to a network redesign
if too many problems arise due to design errors, or
Retire:
When the network, or a part of the network, is out-of-date, it
may be taken out of production
35
One More Look
Business Network Implement Operations
Planning Design Network
Develop Operations
Define Objectives Develop Create
Policies and
and Requirements Architecture Implementation Plan
Capabilities
Performance
Management
36
Information Flows between Network
Analysis, Architecture, and Design
37
Network Analysis and Design Methodology
- Overall Characteristics -
Political awareness:
Corporate culture: hierarchical, distributed, or open
Backroom politics can play a role in systems design
Find ways to ensure objectivity of the analysis and design
process (e.g., measurable goals)
Buy-in:
Reach consensus on the acceptability of results of each stage
Approved results of one stage become the foundation or
starting point for the next stage
39
Makes the final presentation smoother
Network Analysis and Design Methodology
- Critical Success Factors of the NDLC (2/3) -
Communication:
With all groups
Write memos, communicate with key people in person,
etc.
40
Network Analysis and Design Methodology
- Critical Success Factors of the NDLC (3/3) -
Process/Product awareness:
Stay focused: what is the process/product at each
stage?
Keep meeting on track: no off-subject discussions
Be honest with yourself:
Be your own harshest critic (no one else knows the
potential weaknesses or areas for improvement in your
proposal better than you)
Use peer reviews
Not all weaknesses can be corrected (e.g., financial or
time constraints)
41
Network Analysis and Design Methodology
- Overall Guidelines -
Start with a clearly defined problem:
Identify affected parties and representatives
Held brainstorming sessions to define problems and
requirements of a solution
Understand strategic business objectives defined by
senior management
Collect baseline data from customer groups about
the current status of the system and network
This is used to measure eventual impact of the
installed network
Perform a feasibility study: problem definition and
associated alternative recommendations for further
study
42
Customer’s Requirements
- Understanding the Customer -
A good network design must recognize the customer’s
requirements - need to make sure your design meets
THEIR needs and not just YOURS!
The “Customer” may be your own firm, the “who” you are
designing the network for
Need an overview of a customer’s requirements
The best designed network will fail miserably without
the support of people
43
Customer’s Requirements
- Users’ Needs -
What do the users want?
Services
What do the users need?
What don’t they know but they need?
Organize and Prioritize Requirement
44
Customer’s Requirements
- How they are used -
User Requirements
Performance Requirements
• Timeliness
Delay
• Interactivity
• Reliability
• Quality Reliability
• Security
• Affordability
• User Numbers
Capacity
• User Locations
• User Growth
45
Analysis and Design Processes
Set and achieve goals
Maximizing performance
Minimizing cost
Optimization with trade-offs
Recognizing trade-offs
No single ‘best’ answer
Hierarchies
Provide structure in the network
Redundancy
Provides availability & reliability
46
Approaches Used for Design
Heuristic – by using various algorithms
Exact – by working out mathematical
solutions based on linear programming, etc.,
minimizing certain cost functions
Simulation – often used when no exact
analytical form exists. Experiments are
conducted on simplified models to see the
performance of a network
47
Design and Study of a System
48
Art or Science?
49
Types of Network Design
New network design
50
New Network Design
Actually starting from scratch
51
Re-engineering a Network Design
52
Network Expansion Design
Network designs that expand network
capacity
Technology upgrades
53
This Whole Thing is Messy
This Whole Thing is Messy
Ambiguous Requirements
55
This Whole Thing is Messy
Conflicting Requirements
56
This Whole Thing is Messy
57
This Whole Thing is Messy
Lack of Documentation
Existing network
Vendor information
58
This Whole Thing is Messy
Network Management
59
This Whole Thing is Messy
Security
What is enough security?
What is too much security?
Security and management can not be dealt
with as ‘afterthoughts’. It is not an add-on
feature, it has to be integrated within.
Firewall
200Kbs
10Mb/s 10Mb/s
T1 1.5Mb/s
Ethernet Ethernet
60
This Whole Thing is Messy
61
Operations, Administration, Maintenance, Provisioning
(OAM&P)
Network
Management
Network
Users
TT Restoration
New Performance & Traffic Data
Technology
Fault TT
Installation
63