Network Design Methodologies Guide
Network Design Methodologies Guide
2015-2016
INGENIERIE RESEAUX
NET - DESIGN
Methodologies de Conception Reseaux
What is a Network?
What is “Network Design”?
Top-Down Network Design
Network Development Life Cycle (NDLC)
Network Analysis and Design Methodology
Types of Network Design
And Then What?
Management view
Technical view
A network is a utility
–Computers and their users are customers of the network utility
The network must accommodate the needs of
customers
–As computer usage increases so does the requirements of the
network utility
Resources will be used to manage the network
The Network Utility is NOT free!
–Someone must pay the cost of installing and maintaining the
network
–Manpower is required to support the network utility
Connections
–Provided by Hardware that ties things together
Wire/Fiber/Wireless Transport Mechanisms
Routers
Switches/Hubs
Computers
Communications/Protocols
–Provided by Software
–A common language for 2 systems to communicate with each other
TCP/IP (Internet/Windows NT)
IPX / SPX (Novell Netware 4)
AppleTalk
Other Network OS
Services
–The Heart of Networking
–Cooperation between 2 or more systems to perform some function - Applications
telnet
FTP
HTTP
SMTP
File transfer Very long Very low Very low Very high
Transaction
100 Bytes Few Kbps
Processing
WWW Traffic
Addressing
Access Patterns
Network
Security Management
WAN
Methodology
Many network design tools and methodologies that have been used
resemble the “connect-the-dots” game
These tools let you place internetworking devices on a palette and connect
them with LAN or WAN media
Methodology (1/2)
Good network design
–Recognizes that a customer’s requirements embody many business and technical goals
–May specify a required level of network performance, i.e., service level
–Includes difficult network design choices and tradeoffs that must be made when designing the
logical network before any physical devices or media are selected
When a customer expects a quick response to a network design request
–A bottom-up (connect-the-dots) network design methodology can be used, if the customer’s
applications and goals are well known
Methodology (2/2)
Network designers often think they understand a customer’s applications
and requirements.
However, after the network installation, they may discover that:
–They did not capture the customer's most important needs
–Unexpected scalability and performance problems appear as the number of network users
increases
Process (1/2)
Begins at the upper layers of the OSI reference model before moving to
the lower layers
–Focuses on applications, sessions, and data transport before the selection of routers, switches,
and media that operate at the lower layers
Explores divisional structures to find the people:
–For whom the network will provide services, and
–From whom to get valuable information to make the design succeed
Process (2/2)
It is an iterative process:
–It is important to first get an overall view of a customer's requirements
–More detail can be gathered later on protocol behavior, scalability requirements, technology
preferences, etc.
Recognizes that the logical model and the physical design may change as
more information is gathered
A top-down approach lets a network designer get “the big picture” first
and then spiral downward into detailed technical requirements and
specifications
Analysis
Management Design
Simulation/
Prototyping
Monitoring
Implementation
Data collection
–Traffic
–Costs
–Constraints
Design process
Performance analysis
Fine tuning
A painstaking iterative process
Plan:
–Network requirements are identified in this phase
–Analysis of areas where the network will be installed
–Identification of users who will require network services
Design:
–Accomplish the logical and physical design, according to
requirements gathered during the Plan phase
Implement:
–Network is built according to the Design specifications
–Implementation also serves to verify the design
Operate:
–Operation is the final test of the effectiveness of the design
–The network is monitored during this phase for performance problems
and any faults, to provide input into the Optimize phase
Optimize:
–Based on proactive network management which identifies and resolves
problems before network disruptions arise
–The optimize phase may lead to a network redesign
if too many problems arise due to design errors, or
as network performance degrades over time as actual
use and capabilities diverge
–Redesign may also be required when requirements change significantly
Retire:
–When the network, or a part of the network, is out-of-date, it may be
taken out of production
–Although Retire is not incorporated into the name of the life cycle
(PDIOO), it is nonetheless an important phase
48
UPL NET - DESIGN
2015-2016
Top-Down Network Design Steps
systems
Analyze
development life
requirements
cycle (SDLC).
Implemen Develop
t and test physical
network design
Test,
optimize, and
document
design 49
UPL NET - DESIGN
2015-2016
The PDIOO Network Life Cycle
Plan Design
Implement Plan
Operate
Optimize
Design
Retire
Optimize
Implemen
t
Operate
50
UPL NET - DESIGN
2015-2016 Network Design Steps
Phase 1 – Analyze Requirements
–Analyze business goals and constraints
–Analyze technical goals and tradeoffs
–Characterize the existing network
–Characterize network traffic
51
UPL
2015-2016 Network Design Steps NET - DESIGN
52
UPL
2015-2016 Network Design Steps NET - DESIGN
53
UPL
2015-2016 Network Design Steps NET - DESIGN
54
UPL
2015-2016 One More Look NET - DESIGN
Performance
Management
CSE-550-T112 55
UPL NET - DESIGN
2015-2016
Information Flows between Network
Analysis, Architecture, and Design
- Overall Guidelines -
Start with a clearly defined problem:
–Identify affected parties and representatives
–Held brainstorming sessions to define problems and requirements of a solution
Understand strategic business objectives defined by senior management
Collect baseline data from customer groups about the current status of the
system and network
–This is used to measure eventual impact of the installed network
Perform a feasibility study: problem definition and associated alternative
recommendations for further study
- Users’ Needs -
Lecture Notes - 1
CSE-550-T112 67
UPL NET - DESIGN
2015-2016
Lecture Notes - 1
CSE-550-T112 68
UPL NET - DESIGN
2015-2016
Lecture Notes - 1
CSE-550-T112 69
UPL NET - DESIGN
2015-2016
Analysis and Design Processes
Technology upgrades
Ambiguous Requirements
Conflicting Requirements
Lack of Documentation
–Existing network
–Vendor information
Network Management
Security
–What is enough security?
–What is too much security?
Security and management can not be dealt with as
‘afterthoughts’. It is not an add-on feature, it has to be
integrated within.
Firewall
200Kbs
10Mb/s 10Mb/s
T1 1.5Mb/s
Ethernet Ethernet
Network
Users
TT Restoration
New Performance & Traffic Data
Technology
Fault TT
Installation
Dr. Khalid Salah (ICS, KFUPM), CSE 550 Lecture Slides, Term 032
Dr. Marwan Abu-Amara (COE, KFUPM), CSE 550 Lecture Slides, Term 052
P. Oppenheimer, “Top-Down Network Design,” Cisco Press, 3rd edition, 2010
J. McCabe, “Network Analysis, Architecture, and Design” Morgan Kaufmann
Publishers, Inc., 3rd edition, 2007
J. E. Goldman, “Applied Data Communications - A Business-Oriented Approach”, 1998
Mani Subramanian, “Network Management – Principles and Practice” by, Pearson,
Second Edition, 2010.