ICTTEN611
PRODUCE AN ICT NETWORK ARCHITECTURE DESIGN
CHAPTER 1: PREPARE TO PRODUCE
ICT ARCHITECTURE
u This chapter will help you learn about the following:
• Obtain the client’s business specifications and business requirements
from appropriate person
• Review specifications and requirements to identify the type of ICT
network and network specifications required
• Consult with key stakeholders to identify their requirements
• Assess business problems, opportunities and objectives, and confirm
details with appropriate person
1.1 Obtain the client’s business specifications and business requirements
from appropriate person
1.3 Consult with key stakeholders to identify their requirements
u What is stakeholder consultation?
u It enables us to identify trends and emerging
challenges which are currently or will in the future
impact on the organisation.
• Identify and track needs and expectations
• Identify and track perceptions and attitudes
• Provide feedback on specific planned
developments
• Evaluate implementations and actions
• Establish the brand values and positioning of
the corporation as seen by others
v The two forms of Benefits Of Consultation
consultation
1. Consultation on specific Ø Firstly, decision making will be more informed and in tune with
those who the actions will affect.
developments, projects,
Secondly, there will be greater satisfaction from stakeholders
ventures. Ø
with the outcome. Through the engagement process, those
who decisions will affect will feel they have inputted into the
2. Ongoing consultation to final outcome and that everyone’s views have been taken into
account. Depending on the method of consultation, they will
track and monitor also understand that their perspective may not be shared by
stakeholder perceptions all and that there is a need for compromise.
within the broader Ø This in turn will lead to a greater chance of a successful
operating environment implementation of the initiative. Stakeholders will feel
ownership of the venture, and are therefore more likely to want
forms of consultation. the venture to succeed.
Ø Finally, consulting with people who will be affected by a
development is an example of best practice. It represents
good governance and transparency, demonstrates a desire to
engage in meaningful two-way communication, and
recognizes the important contribution stakeholders at all levels
can make to future changes which will directly or indirectly
affect them
Stakeholders consultation methods
Meeting
Email
Survey
budget costs estimate
budget allocation
current system functionality
future plan
growth forecast
technical requirements
timeline and issues with the current system
Business specification
business
application
network or
people in the business plan
organisation.
Business
requirements
nature of the
existing system
business
mission
statement
1.2 Review specifications and requirements to identify the type of ICT
network and network specifications required
u What is network architecture
The network architecture is the physical
and logical design which include
hardware, software, transmission media
and protocols. It provide detail overview
of the organisation network. It is used to
classify all the network layers step-by-
step in logical form by describing each
step in detail.
Network architecture are classified
in two major categories:
Network
Architectures
Client-server
Peer-to-peer
Client-server architectures
u In the client-server architectural model,
a system is decomposed into client
and server processors or processes.
u Servers provide computational
resources (or services), which clients
consume.
u Typically a server provides services to
many clients.
u It is also common for clients to
consume services from multiple
services.
Two-tier architecture
Client-server
architectures
are commonly
organised into Three-tier architecture
layers referred
to as “tiers”.
Multi-tier architecture
Peer-to-Peer Architecture
u In a peer-to-peer network, tasks are
allocated to every device on the
network. Furthermore, there is no real
hierarchy in this network, all
computers are considered equal
and all have the same abilities to use
the resources available on this
network.
Types of ICT network
Personal area
network, or PAN
Local area network, or
LAN
Metropolitan area
network, or MAN
Wide area network, or
WAN
Types of ICT network in brief
1. Personal Area Network (PAN)
• The smallest and most basic type of network, a PAN is made up of a wireless
modem, a computer or two, phones, printers, tablets, etc., and revolves
around one person in one building.
2. Local Area Network
• A local area network, or LAN, consists of a computer network at a single site,
typically an individual office building.
3. Metropolitan Area Network (MAN)
• These types of networks are larger than LANs but smaller than WANs – and
incorporate elements from both types of networks.
Networks
uAccess Network
o An access network is a user network that connects
subscribers to a particular service provider and,
through the carrier network, to other networks such as
the Internet.
u Core Networks
o The facilities and devices used for the core or
backbone networks are usually routers and switches,
with switches being used more often. The
technologies used for the core facilities are mainly
network and data link layer technologies.
uCellular network
o A cellular network is a radio network distributed over
land through cells where each cell includes a fixed
location transceiver known as base station.
Cells in a Network
u A typical cellular network can be envisioned as a
mesh of hexagonal cells, as shown in Figure, each
with its own base station at the centre. The cells
slightly overlap at the edges to ensure that users
always remain within range of a base station.
Optical network
u An optical network is a type
of data communication
network built with optical
fiber technology. It utilizes
optical fiber cables as the
primary communication
medium for converting data
and passing d
u Fiber optic
What is radio frequency (RF)?
u It refers to the frequency band at which wireless
telecommunications signals are being transmitted and broadcast.
u Radio Frequency (RF) Technology:
u Radio frequency (RF) technology is present in a range of
applications, from cell phones to RF identification (RFID) tags.
u Frequency, Channel, Alternate channel, network, Radio,
Transmission, message, call sign.
Radio frequency identification (RFID)
RFID is similar to barcoding in that data from a tag or label are captured by a device that
stores the data in a database.
How does RFID work?
RFID belongs to a group of technologies referred to as Automatic Identification and Data
Capture (AIDC). AIDC methods automatically identify objects, collect data about them and
enter those data directly into computer systems with little or no human intervention.
RFID applications
Inventory management
Asset tracking
Personnel tracking
Controlling access to restricted areas
ID Badging
Supply chain management
Counterfeit prevention (e.g. in the pharmaceutical industry)
Network topology and its types
It is the arrangement of network, including its nodes and
connecting line.
Bus
topology
Ring
topology
Mesh
topology
Tree
Topology
Hybrid
topology
u Bus topology is a network type in which every
computer and network device is connected to
single cable. When it has exactly two endpoints,
BUS
then it is called Linear Bus topology.
Topology
RING Topology
u It is called ring topology because it
forms a ring as each computer is
connected to another computer,
with the last one connected to the
first. Exactly two neighbours for each
device
STAR Topology
u In this type of topology all the
computers are connected to
a single hub through a cable.
This hub is the central node
and all others nodes are
connected to the central
node.
MESH Topology
u In flooding, the same data is
transmitted to all the network nodes,
hence no routing logic is required.
The network is robust, and the its very
unlikely to lose the data. But it leads
to unwanted load over the network.
TREE Topology
u It has a root node and all other nodes
are connected to it forming a hierarchy.
It is also called hierarchical topology. It
should at least have three levels to the
hierarchy.
HYBRID Topology
u It is two different types of
topologies which is a mixture
of two or more topologies.
1.4 Review Assess business problems, opportunities and objectives, and
confirm details with appropriate person.
What is business problem? A well-defined problem often contains its
own solution within it, and it saves time,
money and resources.
Steps to define the problem
Explore the current situation
Paint a picture in words by including the “presenting problem,” the impact it is having, the
consequences of not solving the problem, and the emotions the problem is creating for those involved.
Explain
Once you have examined and clearly explained the situation, draft a simple problem statement by filling
in the blank: The problem that we are trying to solve is: ___________. Distill the problem to its simplest form
possible.
Ask yourself.
“Why is that a problem?” If the answer is another problem, then congratulate yourself for moving from
the “presenting problem” to a deeper problem.
System scope
Investigate and identify Present findings and Designing the improved Implementing, Confirm the information
problems, opportunities alternatives system evaluating and
and objectives maintaining the new
system
CHAPTER 2. PRODUCE PRELIMINARY ICT
NETWORK ARCHITECTURE DESIGN
Ø This chapter helps to understand the following:
Ø Ascertain technical requirements, including hardware, software and
network elements according to specifications
Ø Select software solutions to suit business platform
Ø Develop preliminary physical network diagrams as a preface to
architecture blueprint
Ø Produce a document on the possible impact of the network design
on the business requirements
2.1 Ascertain technical requirements, including hardware,
software and network elements according to specifications.
Basic elements of a The interrelationship
computer network of these basic
include Hardware, elements constitutes
Software, and the infrastructure of
Protocols. the network.
cabling network, cellular phone network, internet protocol TV
Hardware
u
(IPTV), IT network elements:
u gateway
u local area network (LAN) switch
u router
u server
u wireless network
u multimedia
u optical network
u radio network
u RFID equipment
u switching equipment
u transmission equipment
u voice and data equipment.
Software
• commercial
• customised software
• in-house
• network management
• operating system
• packaged
• patches
• vendor propriety
What is
operating
system and
its functions
Basic Functions of the Operating system
1. Interface 2. Coordinate 3. Provide
between the user hardware environment for
and the hardware components software to function
4. Provide structure 5. Monitor system
for data health and
management functionality
Network protocol
Internet Wireless Network Network Routing TCP/IP Security
Protocols Protocols Protocols protocols
Linux vs. Microsoft Windows Servers
u Linux and Microsoft Windows are the two main web-hosting services
on the market. Linux is an open source software server, which makes
it cheaper and easier to use than a Windows server. Windows is a
Microsoft product designed to make Microsoft a profit.
Advantages of a Linux
server or a Windows
server
u Cost savings
u Access to open source
applications
u More reliable
u Easier to modify
Benefits of Windows servers over Linux
servers
Better
Remote
integration with More Scripting
Better support desktop
Microsoft complete frameworks
access
products
2.3 Develop preliminary physical network diagrams
as a preface to architecture blueprint.
u Software to develop network diagram:
Cisco
MS
Lucidchart Draw.io Packet
project
tracer
Select Select a network diagram template
Name Name the network diagram
How to draw a
network Remove Remove existing elements that you don’t need on your diagram
diagram with Add Add network components to the diagram
Lucid chart
(free software) Name Name the items in your network diagram
Draw Draw connections between components
Add Add a title and share your network diagram
2.4 Produce a document on the possible impact of
the network design on the business requirements
downtimes
improved efficiency
improved response times
increased return on investment
lower operational costs and user friendly network
CHAPTER 3. EVALUATE PRELIMINARY DESIGN AND
LIKELY PERFORMANCE USING FORECAST DEMANDS
u This chapter focuses on the following:
• Predict forecast traffic demands, and impact on network design, from
current and future demand requirements
• Benchmark design using expected performance parameters
• Review design’s likely performance profile
• Determine costs involved with a range of supplier products
• Produce an evaluation report on predicted performance and costs of
the network architecture design, addressing business specifications and
recommendations
3.1 Predict forecast traffic u Capacity Planning for your Future Needs
demands, and impact on u There are two primary reasons you want the ability
network design, from to forecast bandwidth capacity needs:
current and future demand maintaining or improving network performance in
requirements order to ensure critical IT services, and managing
the cost of bandwidth. By analysing bandwidth
3.2 Benchmark design
consumption using NetFlow data you will be armed
using expected with measurable data to help you make
performance parameters bandwidth decisions, which in turn eases the
3.3 Review design’s likely capacity planning process.
performance profile
u QoS policies for Managing Critical IT Services
u Historical data on NetFlow helps Capacity Planning
Better Forecasting Increases Productivity
u Detailed NetFlow data collection
can solve most of your puzzle in
capacity planning. It helps plan
network capacity more accurately—
by deploying greater bandwidth for
advanced networking services—as
you scale up. Leveraging NetFlow,
one can easily check if bandwidth
growth is aligned with resources
utilized in the current environment
and plan for the future.
3.4 Determine costs involved with a range of
supplier products
u Finding and selecting suppliers
• Make a shortlist of companies and rate their services against your priorities – quality, reliability, returns policy, price, location,
terms.
• Talk with the sales representatives to check out if they're knowledgeable about their products, and will keep you updated
regularly about new and deleted models.
• Use industry databases and association websites to find lists of local suppliers – including the Industry Capability
Network External link (opens in same window).
• Get personal recommendations from other business owners – members of our Facebook group I am a business owner in
Victoria External link (opens in same window) are always willing to give recommendations.
• Do a credit and trade references check – including searching the Personal Property Securities Register (PPSR) External link
(opens in same window). Note that if the supplier has a large number of PPSR listings, this could indicate the goods they sell
are on consignment, the goods have been provided with credit from their suppliers, or the business has substantial debt
payable within 12 months relating to plant and equipment.
• Negotiate delivery charges, times and – if possible – delivery when required, called 'just-in-time (JIT).
• Regularly monitor the selected supplier(s) against your priorities – as your business, and the supplier's business grows, often the
priorities change.
Maintaining supplier relationships
having regular contact with them to discuss the progress of your business – they often
might be able to assist with increased credit terms, new products, etc
always paying your invoices by the agreed payment terms
making sure there are processes in place when suppliers are not paid on time – such
as providing a contact name and details so the supplier can discuss the situation
communicating any late payments with the supplier, and setting up an agreed
payment plan – summarise this agreement in writing and ensure the senior finance
person, or owner receives a copy.
3.5 Produce an u How to write an evaluation report
evaluation report on u Writing an evaluation report helps you
predicted share key findings and recommendations
performance and with internal and external stakeholders.
costs of the network
architecture design, You will need:
addressing business § data that you
specifications and have collected and analysed
recommendations
§ an understanding of the people who will be
reading your report
§ helpful colleagues to read your drafts.
Writing evaluation report consists
u 1. Consider your audience
u 2.Plan your report
u 3. Write about your findings
u 4. Write accurately and clearly
u 5. Develop your recommendations
u 6. Involve people in the reporting process
u 7.Finish the report
CHAPTER 4. FINALISE NETWORK
DESIGN AND OBTAIN APPROVAL
u This chapter focuses on the following:
• Review benchmarks, requirements and final design proposed
• Determine support and training requirements needed
• Obtain latest technical specifications and pricing by contacting
possible vendors
• Document network design and present documentation to appropriate
person for approval
• Obtain sign off on final business solution
Internal benchmarking
Benefits Challenges
• most cost efficient • fosters mediocrity
• relatively easy • limits options for growth
• low cost • low performance improvement
• fast • can create atmosphere of
competitiveness
• good practice/training with
benchmarking process • not much of a stretch
• information sharing • internal bias
• easy to transfer lessons learned • may not yield best-in-class comparisons
• common language
• gain a deeper understanding of your
own process
• makes a great starting point for future
benchmarking studies
Generic benchmarking
u Benefits Challenges
• high payoff; u difficult concept
• non-competitive/nonthreatening u can be difficult to identify best-in-
class
• broad, new perspective
u takes a long time to plan
• innovative
u known world-class companies are
• high potential for discovery
inundated with requests
• examines multiple industries
u quantum changes can bring high
• can compare to world risk, escalate fear
u class organisations in your process
4.2 Determine support
and training
requirements needed
Gap analysis
1. Analyse your current state
2. Identify the ideal future state
3. Bridge that gap
SWOT
analysis
McKinsey 7S Framework
Nadler-Tushman Model
Support requirements
u you may need the following expertise to implement the network
architecture.
Organisational IT support or a netwok administratator
Vandors for different hardware and software
Installation team
Electrician
ICT security expert
Training requirments
Training Training
ICT staff other staff
How to use data
Data backup
and information
Update regarding
new policies and
Security
procedures
related to ICT
What steps to
follow to make
Maintenance
the ICT network
safe
Policies and
procedures
4.3 Obtain latest technical specifications and pricing by contacting possible vendors
4.4 Document network design and present documentation to appropriate person for approval
Network documentation
u Layer 1 and 2 diagram
Rack layout diagram
Useful network u
u Wi-Fi diagram
documentation u Cable plan
u Routing protocol diagram
u Security diagram
u Cloud services diagram
u Patching table
u Asset tracking
u Password vault
Present documents to the client
Cut Cut to the chase & get to the point
Pause and ask Pause and ask questions
Sell Sell the vision
Lead Lead with stories, not data
Use Use PowerPoint or Keynote wisely
Keep Keep it short & precise
Have Have a clear agenda
4.5 Obtain sign off on final business solution
u How sign-off works
u Client sign-off can occur for various points in the design and
production of documentation. Sign-off makes certain people
accountable for the completion of various stages. Those with
authority to sign can be accountable for the cost of
documentation and its quality and integrity, or both. It is the
client who decides when the work is completed and
functional.
u Sign-off times
u For technical documents, signed client approval and review
by other stakeholders are generally required at the outset of
planning, where the project is approved, and again at the end
of the project.
Procedures for sign-off
Phase Activity Related approvals
Planning Project initiation Feasibility report approval
Content specification The determination of the scope of Approval of scope document and
client requirements and the scope of publishing schedule or timeline
work
Implementation Development completion Approval of technical review
Production and Design completions Client validation and approval of
evaluation technical documentation structure
Completion of documentation Review and user testing approval
Approval of printer’s proofs or web site
screens, or both
Strategies for gaining sign-off
u After all the stages of design and production, you still need to be well prepared when
seeking final sign-off on technical documentation. In addition to being on top of the
subject and purpose of documentation, you may need to know:
Ø the business the organisation operates in
Ø your organisation’s ways of doing business.
u While the purposes and procedures for sign-off may be clear, a client’s sign-off and
agreeing to accept the hand-over of a finished product should not be seen as a simple
formality. Many projects stumble and fail at this last hurdle, because approval was a
process that was taken for granted.
u You should sometimes be prepared for a less-than-smooth ride when you want work
approved—even after all the elements of documentation have been thoroughly double-
checked.
END