SlideShare a Scribd company logo
Chapter 14 Network Design and Management Data Communications and Computer Networks: A  Business User’s Approach
  Data Communications and Computer Networks     Chapter 14 Introduction Properly designing a computer network is a difficult task.  It requires planning and analysis, feasibility studies, capacity planning, and baseline creation skills. Performing network management is difficult too.  A network manager must possess computer and people skills, management skills, financial skills, and be able to keep up with changing technology.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle (SDLC) Every business has a number of goals.  System planners and management personnel within a company try to generate a set of questions, or problems, to help the company achieve those goals. To properly understand a problem, analyze all possible solutions, select the best solution, and implement and maintain the solution, you need to follow a well-defined plan. SDLC is a methodology, or plan, for a structured approach to the development of a business system.
Systems Development Life Cycle SDLC involves several phases.  These phases are often: Planning Analysis Design Implementation Maintenance These phases are cyclical and usually never ending.
  Data Communications and Computer Networks     Chapter 14 Cycle of the phases
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle A  systems analyst  is typically responsible for managing a project and following the SDLC phases. Anyone, however, may be called upon to assist a systems analyst. Or anyone may have to assume some of the duties of a systems analyst. Individuals that are called upon to support a computer network should understand the basic phases of SDLC.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle Planning Phase - Identify problems, opportunities, and objectives. Analysis Phase - Determine information requirements.  Information requirements can be gathered by sampling and collecting hard data, interviewing, questionnaires, observing environments, and prototyping. Design Phase - Design the system that was recommended and approved at the end of the analysis phase.
  Data Communications and Computer Networks     Chapter 14 Systems Development Life Cycle Implementation Phase - The system is installed and preparations are made to move from the old system to the new. Maintenance Phase - The longest phase, involves the ongoing maintenance of the project. Maintenance may require personnel to return to an earlier phase to perform an update.
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 Network Modeling When updating or creating a new computer system, the analyst will create a set of models for both the existing system (if there is one) and the proposed system. Network models can either demonstrate the current state of the network or can model the desired computer network. A  location connectivity diagram  is a network modeling tool that depicts the various locations involved in a a network and the interconnections between those locations.
  Data Communications and Computer Networks     Chapter 14 Network Modeling An  overview location connectivity diagram  shows the big picture of geographic locations of network facilities. External users and mobile users can be identified, as well as the locations primary to a business. A  detailed location connectivity diagram  is a close-up model of a single location and the networks that reside at the location. Working groups and the distances between those groups can be identified with a detailed diagram.
  Data Communications and Computer Networks     Chapter 14 X means a special site
  Data Communications and Computer Networks     Chapter 14
Feasibility Studies There are a number of ways to determine if a proposed system is going to be feasible. Technically feasible  means the proposed system can be created and implemented using currently existing technology. It can be done. Financially feasible  means the proposed system can be built given the company’s current financial ability. We can afford it. Operationally feasible  means the system operates as designed and implemented. It’ll work after we build it and it will be  used.
Feasibility Studies Time feasible  means the system can be constructed in an agreed upon time frame. Payback analysis ascertains costs and benefits of proposed system usually on an annual basis. Payback analysis is a good technique to use to determine financial feasibility. To calculate payback analysis, you must know all the expenses that will be incurred to create and maintain the system, as well as all possible income derived from the system. You must also be aware of the  time value of money  (a dollar today is worth more than one dollar promised a year from now because the dollar can be invested).
System Costs: One time costs: Personal costs Computer usage costs for analysis Hardware and software Training, support and management Supplies, furniture, space Recurring costs: Lease payments Licenses Salaries of support personal Ongoing supplies Maintenance Planned replacement
  Data Communications and Computer Networks     Chapter 14
Note profit at 6 th  year
  Data Communications and Computer Networks     Chapter 14 Capacity Planning Capacity planning involves trying to determine the amount of network bandwidth necessary to support an application or a set of applications. A number of techniques exist for performing capacity planning, including linear projection, computer simulation, benchmarking, and analytical modeling. Linear projection involves predicting one or more network capacities based on the current network parameters and multiplying by some constant.
  Data Communications and Computer Networks     Chapter 14 Capacity Planning A computer simulation involves modeling an existing system or proposed system using a computer-based simulation tool. Benchmarking involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Analytical modeling involves the creation of mathematical equations to calculate various network values.
  Data Communications and Computer Networks     Chapter 14 Creating a Baseline Involves the measurement and recording of a network’s state of operation over a given period of time. A baseline can be used to determine current network performance and to help determine future network needs. Baseline studies should be ongoing projects, and not something started and stopped every so many years.
  Data Communications and Computer Networks     Chapter 14 Creating a Baseline To perform a baseline study, you should: Collect information on number and type of system nodes, including workstations, routers, bridges, switches, hubs, and servers. Create an up-to-date roadmap of all nodes along with model numbers, serial numbers and any address information such as IP or Ethernet addresses. Collect information on operational protocols used throughout the system.
  Data Communications and Computer Networks     Chapter 14 Creating a Baseline To perform a baseline study, you should: List all network applications, including the number, type and utilization level. Create a fairly extensive list of statistics to help meet your goals.  These statistics can include average network utilization, peak network utilization, average frame size, peak frame size, average frames per second, peak frames per second, total network collisions, network collisions per second, total runts, total jabbers, total CRC errors, and nodes with highest percentage of utilization.
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 Network Manager Skills A good network manager will possess many skills: Computer skills People skills Management skills Financial planning skills Knowledge of statistics Speaking and writing skills
Generating Useable Statistics Statistics, properly generated, can be an invaluable aid to demonstrating current system demands and predicting future needs. Mean time between failures (MTBF)   Mean time to repair (MTTR) Availability  is the probability that a particular component or system will be available during a fixed time period Reliability  is the probability that over a period of time the particular component or device will be available
Generating Useable Statistics Mean time between failures (MTBF)  is the average time a device or system will operate before it fails.  (from the manufacturer!) Large or small? Mean time to repair (MTTR)  is the average time necessary to repair a failure within the computer system. Includes swap time, time to bring the system back up, replacement time, etc. Large or small?
Generating Useable Statistics Availability  is the probability that a particular component or system will be available during a fixed time period. A( t ) = a/(a+b) + b/(a+b) x e -(a+b)t   A = 1 means the system is nearly always operational in which: a  = 1/MTTR b  = 1/MTBF e  = natural log function t  = the time interval
Generating Useable Statistics Suppose we want to calculate the availability of a modem that has a MTBF of 3000 hours and a MTTR of 1 hour. The availability of this modem for an 8-hour period is: a = 1/1 b = 1/3000 = 0.00033 A(8 hours) =1/(1 + 0.00033) + 0.00033/(1 + 0.00033) x e -(1 + 0.00033)8 =  0.9997 + 0.00033 x 0.000335 =  0.9997 Not available 3 out of 10,000 times you want it.
  Data Communications and Computer Networks     Chapter 14 Generating Useable Statistics Reliability  is the probability that over a period of time the particular component or device will be available (not fail): R( t ) =  e   – bt   R( 0 ) =  e   – 0  = 1 in which: b  = 1/MTBF t  = the time interval of the operation
  Data Communications and Computer Networks     Chapter 14 Generating Useable Statistics What is the reliability of a modem if the MTBF is 3000 hours and a transaction takes 20 minutes, or 1/3 of an hour (0.333 hours): R(0.333 hours) = e  -(1/3000)(0.333)  = e  -0.000111  = 0.99989 Not reliable for .011 percent of the time.
  Data Communications and Computer Networks     Chapter 14 Generating Useable Statistics So what do you want? Availability and reliability between 0.9999 and 0.99999 is desired! What is this in number of hours between failure for a year of service?
  Data Communications and Computer Networks     Chapter 14 Managing Operations There are many services and functions available to assist an individual in managing computer network operations. One of the more useful is  Simple Network Management Protocol (SNMP) . SNMP is an industry standard designed to manage network components from a remote location. Currently in version 3, SNMP supports agents, managers, and the Management Information Base (MIB).
  Data Communications and Computer Networks     Chapter 14 Managing Operations A managed element has management software, called an  agent , running in it. A second object, the SNMP  manager , controls the operations of a managed element and maintains a database of information about all managed elements. A manager can query an agent to return current operating values, or can instruct an agent to perform a particular action. The  Management Information Base (MIB)  is a collection of information that is organized hierarchically and describes the operating parameters of all managed agents.
  Data Communications and Computer Networks     Chapter 14 Managing Operations SNMP operates on a network between the application layer and the UDP/IP layer (not TCP/IP) – the transport layer.
  Data Communications and Computer Networks     Chapter 14 Network Diagnostic Tools To assist a network support person, a number of diagnostic tools are available: Electrical testers (voltage, etc.) Cable testers (open circuits, etc.) Network testers (view the entire network0 Protocol analyzers (monitors packets)
  Data Communications and Computer Networks     Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation Returning to BringBring Corporation from an earlier chapter, let’s complete our design, including e-mail and Internet access for each of the four sites. A linear projection can be used to estimate the amount of Internet traffic at each site. An overview location connectivity diagram gives us a big picture of the network interconnections.
  Data Communications and Computer Networks     Chapter 14
  Data Communications and Computer Networks     Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation A second linear projection can be used to determine the amount of local area network traffic within each site.

More Related Content

PDF
NETWORK PLANNING AND DESIGN,
University of Colombo School of Computing
 
PPT
Chapter15 -- implementing and managing networks
Raja Waseem Akhtar
 
PDF
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...
IDES Editor
 
PPT
Chapter13 -- ensuring integrity and availability
Raja Waseem Akhtar
 
RTF
Visualization of Computer Forensics Analysis on Digital Evidence
Muhd Mu'izuddin
 
PPT
Chapter14 -- networking security
Raja Waseem Akhtar
 
PDF
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
ijmpict
 
PPTX
A TALE of DATA PATTERN DISCOVERY IN PARALLEL
Jenny Liu
 
NETWORK PLANNING AND DESIGN,
University of Colombo School of Computing
 
Chapter15 -- implementing and managing networks
Raja Waseem Akhtar
 
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...
IDES Editor
 
Chapter13 -- ensuring integrity and availability
Raja Waseem Akhtar
 
Visualization of Computer Forensics Analysis on Digital Evidence
Muhd Mu'izuddin
 
Chapter14 -- networking security
Raja Waseem Akhtar
 
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
ijmpict
 
A TALE of DATA PATTERN DISCOVERY IN PARALLEL
Jenny Liu
 

What's hot (18)

PDF
Integration of a Predictive, Continuous Time Neural Network into Securities M...
Chris Kirk, PhD, FIAP
 
DOCX
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
DOCX
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
 
PDF
TYBSC CS SEM 5 AI NOTES
WE-IT TUTORIALS
 
PDF
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
VladislavKashansky
 
PDF
Support Vector Machine–Based Prediction System for a Football Match Result
iosrjce
 
PDF
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
IJECEIAES
 
PDF
Iaetsd performance voting algorithms for software safety
Iaetsd Iaetsd
 
PDF
Design and Implementation of Low Power DSP Core with Programmable Truncated V...
ijsrd.com
 
PDF
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Kashif Mehmood
 
DOC
RobertClarkResume
Bob Clark
 
PDF
Desktop Grid Scheduling
Piyush Kandpal
 
PDF
Rachit Mishra_stock prediction_report
Rachit Mishra
 
PDF
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...
Ajay Taneja
 
PDF
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
 
PDF
50120130406041 2
IAEME Publication
 
PDF
FPGA based Efficient Interpolator design using DALUT Algorithm
cscpconf
 
Integration of a Predictive, Continuous Time Neural Network into Securities M...
Chris Kirk, PhD, FIAP
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
 
TYBSC CS SEM 5 AI NOTES
WE-IT TUTORIALS
 
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
VladislavKashansky
 
Support Vector Machine–Based Prediction System for a Football Match Result
iosrjce
 
An Investigation towards Effectiveness in Image Enhancement Process in MPSoC
IJECEIAES
 
Iaetsd performance voting algorithms for software safety
Iaetsd Iaetsd
 
Design and Implementation of Low Power DSP Core with Programmable Truncated V...
ijsrd.com
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Kashif Mehmood
 
RobertClarkResume
Bob Clark
 
Desktop Grid Scheduling
Piyush Kandpal
 
Rachit Mishra_stock prediction_report
Rachit Mishra
 
Machine Learning Data Life Cycle in Production (Week 2 feature engineering...
Ajay Taneja
 
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
 
50120130406041 2
IAEME Publication
 
FPGA based Efficient Interpolator design using DALUT Algorithm
cscpconf
 
Ad

Viewers also liked (16)

PPTX
Presentatie brink en fleer
jangmeijer
 
PDF
Presentatie architektenburo Smid en Peters
jangmeijer
 
PDF
Communicating Environmental Friendliness through Product Design and Appearance
Seos Design
 
PPT
UDL edenfield t
Tabitha Edenfield
 
PPT
2
ohluis
 
PPT
location barcelone2
ohluis
 
PPT
Final video t_edenfield
Tabitha Edenfield
 
PPT
location barcelone 1
ohluis
 
PPTX
Kernhem Oplevering
jangmeijer
 
PPT
Og for group meeting 23march10
W4in
 
KEY
IDBM Pro sustainable design lecture, 25.8.2011, Design Factory
Seos Design
 
PPTX
Presentatie BIM stage bij Van den Berg Architecten
jangmeijer
 
PPTX
Presentatie vibes
jangmeijer
 
KEY
dr.dk/presse
Lars Silberbauer
 
PPTX
Presentatie lksvdd architecten
jangmeijer
 
PPTX
Kvm
Paulo Silva
 
Presentatie brink en fleer
jangmeijer
 
Presentatie architektenburo Smid en Peters
jangmeijer
 
Communicating Environmental Friendliness through Product Design and Appearance
Seos Design
 
UDL edenfield t
Tabitha Edenfield
 
location barcelone2
ohluis
 
Final video t_edenfield
Tabitha Edenfield
 
location barcelone 1
ohluis
 
Kernhem Oplevering
jangmeijer
 
Og for group meeting 23march10
W4in
 
IDBM Pro sustainable design lecture, 25.8.2011, Design Factory
Seos Design
 
Presentatie BIM stage bij Van den Berg Architecten
jangmeijer
 
Presentatie vibes
jangmeijer
 
dr.dk/presse
Lars Silberbauer
 
Presentatie lksvdd architecten
jangmeijer
 
Ad

Similar to Ch14 (20)

PPS
Network Design and Management
tlerell
 
PDF
Lesson02 - Network Design & LAN
Angel G Diaz
 
PDF
Lesson - 02 Network Design and Management
Angel G Diaz
 
PDF
Top Down Network Design - ebrahma.com
Pawan Sharma
 
DOC
Cloud data management
ambitlick
 
PPT
Chapter01
Somrak Rungwanlapa
 
PDF
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
anandatalapatra
 
DOCX
16 & 2 marks in i unit for PG PAWSN
Dhaya kanthavel
 
PPT
Chapter01.ppt
SangeethaVal
 
PPT
Chapter 1 - Analyzing Business Goals and Constraints.ppt
kong100
 
PDF
Computer network unit 1 notes
Ravi Rajput
 
PPT
Chapter01
Muhammad Ahad
 
PPTX
Chapternetworkdesign d1 [Autosaved].pptx
peterhaile1
 
PDF
Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...
The Air Force Office of Scientific Research
 
PPT
Sept 2017 network design
shahin raj
 
PPT
Chapter02
Somrak Rungwanlapa
 
PDF
Data and computer communications networking and internetworking 1st Edition G...
schiyjhisel18
 
PPT
Itmg360 chapter one_v05
raj_rohit
 
PDF
Data and computer communications networking and internetworking 1st Edition G...
rauerekart
 
PDF
Solution manual for Business Data Communications- Infrastructure, Networking ...
romtwatb2022
 
Network Design and Management
tlerell
 
Lesson02 - Network Design & LAN
Angel G Diaz
 
Lesson - 02 Network Design and Management
Angel G Diaz
 
Top Down Network Design - ebrahma.com
Pawan Sharma
 
Cloud data management
ambitlick
 
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
anandatalapatra
 
16 & 2 marks in i unit for PG PAWSN
Dhaya kanthavel
 
Chapter01.ppt
SangeethaVal
 
Chapter 1 - Analyzing Business Goals and Constraints.ppt
kong100
 
Computer network unit 1 notes
Ravi Rajput
 
Chapter01
Muhammad Ahad
 
Chapternetworkdesign d1 [Autosaved].pptx
peterhaile1
 
Bonneau - Complex Networks/Foundations of Information Systems - Spring Review...
The Air Force Office of Scientific Research
 
Sept 2017 network design
shahin raj
 
Data and computer communications networking and internetworking 1st Edition G...
schiyjhisel18
 
Itmg360 chapter one_v05
raj_rohit
 
Data and computer communications networking and internetworking 1st Edition G...
rauerekart
 
Solution manual for Business Data Communications- Infrastructure, Networking ...
romtwatb2022
 

Recently uploaded (20)

PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
The Future of Artificial Intelligence (AI)
Mukul
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 

Ch14

  • 1. Chapter 14 Network Design and Management Data Communications and Computer Networks: A Business User’s Approach
  • 2. Data Communications and Computer Networks Chapter 14 Introduction Properly designing a computer network is a difficult task. It requires planning and analysis, feasibility studies, capacity planning, and baseline creation skills. Performing network management is difficult too. A network manager must possess computer and people skills, management skills, financial skills, and be able to keep up with changing technology.
  • 3. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle (SDLC) Every business has a number of goals. System planners and management personnel within a company try to generate a set of questions, or problems, to help the company achieve those goals. To properly understand a problem, analyze all possible solutions, select the best solution, and implement and maintain the solution, you need to follow a well-defined plan. SDLC is a methodology, or plan, for a structured approach to the development of a business system.
  • 4. Systems Development Life Cycle SDLC involves several phases. These phases are often: Planning Analysis Design Implementation Maintenance These phases are cyclical and usually never ending.
  • 5. Data Communications and Computer Networks Chapter 14 Cycle of the phases
  • 6. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle A systems analyst is typically responsible for managing a project and following the SDLC phases. Anyone, however, may be called upon to assist a systems analyst. Or anyone may have to assume some of the duties of a systems analyst. Individuals that are called upon to support a computer network should understand the basic phases of SDLC.
  • 7. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle Planning Phase - Identify problems, opportunities, and objectives. Analysis Phase - Determine information requirements. Information requirements can be gathered by sampling and collecting hard data, interviewing, questionnaires, observing environments, and prototyping. Design Phase - Design the system that was recommended and approved at the end of the analysis phase.
  • 8. Data Communications and Computer Networks Chapter 14 Systems Development Life Cycle Implementation Phase - The system is installed and preparations are made to move from the old system to the new. Maintenance Phase - The longest phase, involves the ongoing maintenance of the project. Maintenance may require personnel to return to an earlier phase to perform an update.
  • 9. Data Communications and Computer Networks Chapter 14
  • 10. Data Communications and Computer Networks Chapter 14 Network Modeling When updating or creating a new computer system, the analyst will create a set of models for both the existing system (if there is one) and the proposed system. Network models can either demonstrate the current state of the network or can model the desired computer network. A location connectivity diagram is a network modeling tool that depicts the various locations involved in a a network and the interconnections between those locations.
  • 11. Data Communications and Computer Networks Chapter 14 Network Modeling An overview location connectivity diagram shows the big picture of geographic locations of network facilities. External users and mobile users can be identified, as well as the locations primary to a business. A detailed location connectivity diagram is a close-up model of a single location and the networks that reside at the location. Working groups and the distances between those groups can be identified with a detailed diagram.
  • 12. Data Communications and Computer Networks Chapter 14 X means a special site
  • 13. Data Communications and Computer Networks Chapter 14
  • 14. Feasibility Studies There are a number of ways to determine if a proposed system is going to be feasible. Technically feasible means the proposed system can be created and implemented using currently existing technology. It can be done. Financially feasible means the proposed system can be built given the company’s current financial ability. We can afford it. Operationally feasible means the system operates as designed and implemented. It’ll work after we build it and it will be used.
  • 15. Feasibility Studies Time feasible means the system can be constructed in an agreed upon time frame. Payback analysis ascertains costs and benefits of proposed system usually on an annual basis. Payback analysis is a good technique to use to determine financial feasibility. To calculate payback analysis, you must know all the expenses that will be incurred to create and maintain the system, as well as all possible income derived from the system. You must also be aware of the time value of money (a dollar today is worth more than one dollar promised a year from now because the dollar can be invested).
  • 16. System Costs: One time costs: Personal costs Computer usage costs for analysis Hardware and software Training, support and management Supplies, furniture, space Recurring costs: Lease payments Licenses Salaries of support personal Ongoing supplies Maintenance Planned replacement
  • 17. Data Communications and Computer Networks Chapter 14
  • 18. Note profit at 6 th year
  • 19. Data Communications and Computer Networks Chapter 14 Capacity Planning Capacity planning involves trying to determine the amount of network bandwidth necessary to support an application or a set of applications. A number of techniques exist for performing capacity planning, including linear projection, computer simulation, benchmarking, and analytical modeling. Linear projection involves predicting one or more network capacities based on the current network parameters and multiplying by some constant.
  • 20. Data Communications and Computer Networks Chapter 14 Capacity Planning A computer simulation involves modeling an existing system or proposed system using a computer-based simulation tool. Benchmarking involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. Analytical modeling involves the creation of mathematical equations to calculate various network values.
  • 21. Data Communications and Computer Networks Chapter 14 Creating a Baseline Involves the measurement and recording of a network’s state of operation over a given period of time. A baseline can be used to determine current network performance and to help determine future network needs. Baseline studies should be ongoing projects, and not something started and stopped every so many years.
  • 22. Data Communications and Computer Networks Chapter 14 Creating a Baseline To perform a baseline study, you should: Collect information on number and type of system nodes, including workstations, routers, bridges, switches, hubs, and servers. Create an up-to-date roadmap of all nodes along with model numbers, serial numbers and any address information such as IP or Ethernet addresses. Collect information on operational protocols used throughout the system.
  • 23. Data Communications and Computer Networks Chapter 14 Creating a Baseline To perform a baseline study, you should: List all network applications, including the number, type and utilization level. Create a fairly extensive list of statistics to help meet your goals. These statistics can include average network utilization, peak network utilization, average frame size, peak frame size, average frames per second, peak frames per second, total network collisions, network collisions per second, total runts, total jabbers, total CRC errors, and nodes with highest percentage of utilization.
  • 24. Data Communications and Computer Networks Chapter 14
  • 25. Data Communications and Computer Networks Chapter 14 Network Manager Skills A good network manager will possess many skills: Computer skills People skills Management skills Financial planning skills Knowledge of statistics Speaking and writing skills
  • 26. Generating Useable Statistics Statistics, properly generated, can be an invaluable aid to demonstrating current system demands and predicting future needs. Mean time between failures (MTBF) Mean time to repair (MTTR) Availability is the probability that a particular component or system will be available during a fixed time period Reliability is the probability that over a period of time the particular component or device will be available
  • 27. Generating Useable Statistics Mean time between failures (MTBF) is the average time a device or system will operate before it fails. (from the manufacturer!) Large or small? Mean time to repair (MTTR) is the average time necessary to repair a failure within the computer system. Includes swap time, time to bring the system back up, replacement time, etc. Large or small?
  • 28. Generating Useable Statistics Availability is the probability that a particular component or system will be available during a fixed time period. A( t ) = a/(a+b) + b/(a+b) x e -(a+b)t A = 1 means the system is nearly always operational in which: a = 1/MTTR b = 1/MTBF e = natural log function t = the time interval
  • 29. Generating Useable Statistics Suppose we want to calculate the availability of a modem that has a MTBF of 3000 hours and a MTTR of 1 hour. The availability of this modem for an 8-hour period is: a = 1/1 b = 1/3000 = 0.00033 A(8 hours) =1/(1 + 0.00033) + 0.00033/(1 + 0.00033) x e -(1 + 0.00033)8 = 0.9997 + 0.00033 x 0.000335 = 0.9997 Not available 3 out of 10,000 times you want it.
  • 30. Data Communications and Computer Networks Chapter 14 Generating Useable Statistics Reliability is the probability that over a period of time the particular component or device will be available (not fail): R( t ) = e – bt R( 0 ) = e – 0 = 1 in which: b = 1/MTBF t = the time interval of the operation
  • 31. Data Communications and Computer Networks Chapter 14 Generating Useable Statistics What is the reliability of a modem if the MTBF is 3000 hours and a transaction takes 20 minutes, or 1/3 of an hour (0.333 hours): R(0.333 hours) = e -(1/3000)(0.333) = e -0.000111 = 0.99989 Not reliable for .011 percent of the time.
  • 32. Data Communications and Computer Networks Chapter 14 Generating Useable Statistics So what do you want? Availability and reliability between 0.9999 and 0.99999 is desired! What is this in number of hours between failure for a year of service?
  • 33. Data Communications and Computer Networks Chapter 14 Managing Operations There are many services and functions available to assist an individual in managing computer network operations. One of the more useful is Simple Network Management Protocol (SNMP) . SNMP is an industry standard designed to manage network components from a remote location. Currently in version 3, SNMP supports agents, managers, and the Management Information Base (MIB).
  • 34. Data Communications and Computer Networks Chapter 14 Managing Operations A managed element has management software, called an agent , running in it. A second object, the SNMP manager , controls the operations of a managed element and maintains a database of information about all managed elements. A manager can query an agent to return current operating values, or can instruct an agent to perform a particular action. The Management Information Base (MIB) is a collection of information that is organized hierarchically and describes the operating parameters of all managed agents.
  • 35. Data Communications and Computer Networks Chapter 14 Managing Operations SNMP operates on a network between the application layer and the UDP/IP layer (not TCP/IP) – the transport layer.
  • 36. Data Communications and Computer Networks Chapter 14 Network Diagnostic Tools To assist a network support person, a number of diagnostic tools are available: Electrical testers (voltage, etc.) Cable testers (open circuits, etc.) Network testers (view the entire network0 Protocol analyzers (monitors packets)
  • 37. Data Communications and Computer Networks Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation Returning to BringBring Corporation from an earlier chapter, let’s complete our design, including e-mail and Internet access for each of the four sites. A linear projection can be used to estimate the amount of Internet traffic at each site. An overview location connectivity diagram gives us a big picture of the network interconnections.
  • 38. Data Communications and Computer Networks Chapter 14
  • 39. Data Communications and Computer Networks Chapter 14 Capacity Planning and Network Design In Action: BringBring Corporation A second linear projection can be used to determine the amount of local area network traffic within each site.