0% found this document useful (0 votes)
222 views22 pages

Network Analysis Design

The document discusses the network development life cycle (NDLC) which includes two main phases: analysis and design. The analysis phase involves baselining the existing network and analyzing needs for the new network. This information is then used in the design phase to specify protocols, hardware, and the global connection for the new network. The implementation phase involves purchasing hardware/software, installing/testing the new system, training users, and creating documentation. The NDLC aims to efficiently upgrade networks based on collected information.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX or read online on Scribd
0% found this document useful (0 votes)
222 views22 pages

Network Analysis Design

The document discusses the network development life cycle (NDLC) which includes two main phases: analysis and design. The analysis phase involves baselining the existing network and analyzing needs for the new network. This information is then used in the design phase to specify protocols, hardware, and the global connection for the new network. The implementation phase involves purchasing hardware/software, installing/testing the new system, training users, and creating documentation. The NDLC aims to efficiently upgrade networks based on collected information.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX or read online on Scribd
You are on page 1/ 22

CHAPTER 15

NETWORK ANALYSIS, DESIGN, AND


IMPLEMENTATION

Members Group :
Nurul Farhha Bt Rosland
Nurul Izzah Bt Mat Sanidon
Wan Aznie Bt Wan Ali
Yuzniza Bt Yunus
Network Development
2
Life Cycle (NDLC)

 What ?
 A set of strategies for upgrading (or totally
replacing) an organization’s network system.

 Derived from a well established system, the


system development life cycle (SDLC), generic
methodology for developing any system
Cont…
3

 There’s several reason why SLDC is different


with NLDC :

 Network system needs to be replaced more


frequently
 Network system expands more rapidly
 Cost of network installation is decreasing
continuously
Cont..
4

 Based on the differences, the network


designer has agreed that SLDC should be
replaced by NLDC because NLDC:

 Development process take less time


 The cost of the process must be less to justify the
frequency
Differences SLDC and NLDC
5

SLDC NLDC
 Has 5 phases  Has 2 phases:
 Planning  Analysis
 Analysis  Design
 Design  Implementation
 Implementation Remove:
 Maintenance • Planning : long and
expensive phase
• Maintenance : not included
in network designer task
1. Analysis Phase
6

 Analysis phase in network development life


cycle (NDLC) is made of 2 major steps :

 analysis of the existing system (baselining)


 analysis of the needs for the new network
1.1 Baselining
7

 Baselining is the measurement and recording of


characteristics and features of the existing network
system over a specific period of time.
 This is several study analyst must do :
 System users
 System nodes
 Protocols
 Application programs
 Network traffic
Cont..
8

 System Users - baselining usually the measurement of


system users (average, peak and maximum). Other
measurement is the types of applications used, the
number of hours system used, and the level of
utilization.
 System Nodes- the information collected about
system nodes include the number of nodes, type of
nodes, logical location of nodes , serial number and
etc.
 Protocols- contain the type of protocol for example
TCP/IP, the version, the computer on which it is
installed, and level of utilization.
Cont..
9

 Application Programs- contain the type of application, the


computer on which it is installed and frequency of utilization.
 Network Traffic- the most important measurement in baselining is
the collection of network traffic information. Carefully measure
and record needs for:
 Throughput (average and peak)
 Frame size (average and maximum)
 Number of frames per second (average and peak)
 Number of collisions (average and peak)
 Number of dropped frames due to error detection
(average and peak)
 Number of dropped frames due to congestion (average
and peak)
1.2 Need Analysis
10

 Defines the characteristics of the new


proposed network system.
 Have 2 separate activities :
 Scope needs analysis
 User needs analysis
Cont..
11

 Scope needs analysis defines the logical layout of the


new network system. The analysis composed of 3 parts :
 Local networks
 Backbones
 Global access
 Local Networks- these are the network will connect
internal user (desktop computers inside a building or on
a floor) to the network system.
 Backbones Network- connect local networks to create
a network system for the organization.
 Global Connection- part of the network system and part
of the baseline analysis.
Cont..
12

 User needs analysis must be carefully evaluated. \ A user


needs :
 Hardware resources

 Software resources

 Bandwidth

 Hardware Resources- runs an application program


(desktop computer, printer, storage device-hard drive).
 Software Resources- perform a task (application
programs and data).
 Bandwidth- downloads the application program and
data.
2. Design Phase
13

 Uses the information collected during the


analysis phase to create specification for
the new network system.

 Four major activities:


 Upper Layer Protocols
 Lower Layer Protocols
 Hardware
 Global Connection / Internet
2.1 Upper Layer Protocols
14

 Protocol to be run on network system involves two


steps:
I. Defining the protocol suite
 Choices: TCP/IP, Windows 2000, Novell
 Decision based on factors such as
Application to be used
Type of equipment needed
Type of interaction between the nodes

II. Defining the types and location of servers


 selection of the application layer protocols
 where they should be installed
 Ex: if TCP/IP protocol suite is chosen in previous step. The designer may
choose to use:
 SMTP and POP to handle e-mail
 TELNET to handle login
 FTP to handle file transfer
2.2 Lower Layer Protocols
15

 Depends on the capacity needs of each network.


 Capacity of networks is the number of bits per
second each network can handle.
 Information collected during baselining and user
needs analysis - determine the capacity of
network.
 Choice of capacity automatic defines the protocol
to be used at lower layers.
 Ex: capacity of 100Mbps = 100BASE-T
 Decision about each local network and the
backbone need, not be the same.
2.3 Hardware
16

 Type and number of computer needed -


Information collected during base lining and user
needs report.
 Type and number of hardware pieces required to
create a network – information obtain from scope
needs report and lower layer protocols.
 Ex: 10BASE-T for a network with 20 users, a hub with
at least 20 ports is needed.
 Types of transmission medium is UTP
 Scope need analysis – length of the cable needed
2.4 Global Connection
17

 How organization connected to other


organization or other sites of the same
organization?
 Depends on factors including:
 Needs for security
 Total capacity
 Bandwidth of the backbone
 Ex: T-1 Line
3. Implementation Phase
18

PURCHASING
OR RENTING
NEW INSTALLATION OF
HARDWARE & NEW HARDWARE
SOFTWARE & SOFTWARE
STEPS
IMPLIMENTATI
ON
PHASE

TESTING OF THE
TRAINING OF SYSTEM &
USERS DOCUMENTATIO
N
19
PURCHASIN
G

New hardware or software can either be done by internal staff the


vendor specialists or a third party
USER
20
TRAINING

Training in accessing the system and the use of the


new hardware

Need to know the benefits of the upgrade

Can be trained individually or in groups based on


level
21 TESTING

After the users are trained , the system is tested.


Tested can be done by monitoring the system.

Identify error and problem.


DOCUMENTATI
22 ON

To maintained efficiently.

User Documentation
SYSTEM
- Users need to
DOCUMENTATIO
know the N
commands, Can be
potential problems, maintenance and
the person to call must be system
in case of documentation for 3
malfunction phases system

You might also like