Network Design The Process Of Gathering Technical Essay

PAGES
2
WORDS
665
Cite

Network Design The process of gathering technical requirements for a network design project may differ from one organization to another, but the requirements themselves can be described using many of the concepts discussed in the lecture this week (i.e. Scalability, Availability, Network performance, Security, Manageability, and Affordability).

Analyzing technical requirements for the customer is important in helping one best fulfill the customer's expectations. The various objectives that need to be fulfilled involve the factors of Scalability, Availability, Network performance, Security, Manageability, and Affordability.

Scalability

Scalability refers to the amount of growth that a network design can support. This is particularly important for large companies that are adding users, applications, additional sites, and external network connections all the time. The proposed network deign should be able to adapt to any envisioned additions. You will want to know the prospective amount of networks, users, servers, and/or sites that may be added to the network within the coming few years.

Availability

Availability refers to the amount of time that the network...

...

In mathematical terms, availability can be expressed as the percent uptime per year, month, week, day, or hour, compared to the total time in that period. For instance, a network that offers 24-hour, seven-days-a-week service, and is only up 165 hours in the 168-hour week, has availability that is 98.21% (*).
In technical terms, 'availability' is connected with 'resilience' referring to the amount of stress a network can handle and the rapidity that it bounces back from stress. Good availability equals good resilience.

Related to the concept of availability is disaster recovery. Any design of computer networks must take this aspect into consideration. Plans must be made as to how to save computer data from outages and from natural or man-made disasters.

Customer should specify availability requirements so that expectations are met.

Network performance

You should discuss expectations of network performance with client before designing network. Performance includes details of throughput, accuracy, efficiency, delay, and response time.

The following list should…

Sources Used in Documents:

Prioritizing the goals is helpful for both you and client, so you start off with the most important goal ending with that least important to client. A list of options, too, can be made and correlated with goals. In this way, you will be more likely to design a computer network that will meet client's expectations.

Source

Oppenheimer, P. (1999) Top-down network Design (3rd Ed.) Cisco Press.


Cite this Document:

"Network Design The Process Of Gathering Technical" (2012, August 17) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/network-design-the-process-of-gathering-109460

"Network Design The Process Of Gathering Technical" 17 August 2012. Web.24 April. 2024. <
https://www.paperdue.com/essay/network-design-the-process-of-gathering-109460>

"Network Design The Process Of Gathering Technical", 17 August 2012, Accessed.24 April. 2024,
https://www.paperdue.com/essay/network-design-the-process-of-gathering-109460

Related Documents

Cisco SAFE's Network Security Planning Network Security Cisco SAFE Cisco SAFE has significantly help in securing large internetwork that has remain a daunting challenge; this complexity has been facilitated through cloud computing as well as social networks. Cisco SAFE architecture offer guidelines of design and implementation which are detailed that is used for building secure and reliable network infrastructures as well as the policies supporting them. The guides have been established based on

Technical IBM Token Ring
PAGES 5 WORDS 1407

IBM Token Ring. The writer explores the history of the token ring, its functions and its future. The writer also discusses some of the trouble shooting methods that are used to correct any problems. TOKEN RING SYSTEM BY IBM International Business Machines (IBM) has been on the leading edge of technology since the explosi0on began. The technological explosion that has occurred in the last four decades has taken mankind to heights

Justifying Research Methods and Design Insider threats are one of the primary sources of risk to an enterprise network and to intellectual property. For decades, the internet security realm has been rather narrowly focused on pre-empting insider threats by mean of sophisticated architecture and conventional login identification barriers. More recently, internet communications and technology (ICT) experts have taken an active position by using technological capacity to identify risk patterns, and

TESOL: Materials and Course Design A situation analysis, giving all details available before the course begins: New comers of the TESOL school scheme will be assessed for their English language proficiency by the teachers assigned by TESOL (Teaching of English to speakers of other languages). Programming system will be run under this teacher - member of TESOL (Dorr, 2006). This TOSEL teacher is assigned to assist and teach student in establishing sound understanding

Free Wireless Networks
PAGES 20 WORDS 5062

Free Wireless Networks Since the construction of the information Superhighway, its' use to distribute information has become phenomenal. Information gathering and dissemination is the most valuable asset for a business to succeed. Demands for more and more efficient means of connecting to the Internet have driven exponential technological advances. So much so that the craze to connect has gone wireless and with this technology an entirely new set of issues, concerns

System Design: Oahu Base Area Network The aim of this paper is to examine and discuss the Navy's decision to build the largest local area network (LAN) connecting the U.S. Pacific Fleet using information-gathering techniques and design methods. The system has the capacity to connect sailors and marines within the 102-million square miles of the Pacific Fleet's command coverage. Moreover it will provide the indispensable access for supplying and training the