Sie sind auf Seite 1von 4

Top-Down Network Design Tools

Page 1 of 4

Top-Down Network Design


by Priscilla Oppenheimer

Network Design Checklists


Part I (Identifying Your Customer's Needs and Goals) of Top-Down Network Design presents some checklists that you can use while gathering information to help you develop a network design. You can fill out the following checklists as you gather design information. See the book for more detail on each checklist. You can use the following checklists to determine if you have addressed your clients objectives and concerns. If you can't gather every piece of data mentioned in the checklists, make sure you document what is missing in case it becomes critical, but don't stall the project to gather every last detail. The book teaches an ideal network design methodology that you should try to follow, but if real-world constraints, such as uncooperative network design customers, budget cuts, and time constraints, hamper your ability to follow the methodology precisely, just follow it as much as you can. In general, the methodology still works even if some data is missing after you do your analysis. Chapter One: Analyzing Business Goals and Constraints
Business Goals Checklist
c d e f g c d e f g

I have researched the customers industry and competition. I understand the customers corporate structure.

c I have compiled a list of the customers business goals, starting with one overall business goal that d e f g explains the primary purpose of the network design project. c d e f g c d e f g c d e f g c d e f g c d e f g c d e f g

The customer has identified any mission-critical operations. I understand the customers criteria for success and the ramifications of failure. I understand the scope of the network design project. I have identified the customers network applications (using the Network Applications chart). The customer has explained policies regarding approved vendors, protocols, or platforms. The customer has explained any policies regarding open versus proprietary solutions.

c The customer has explained any policies regarding distributed authority for network design and d e f g implementation. c d e f g

I know the budget for this project.

http://www.topdownbook.com/checklists.html

17/10/2010

Top-Down Network Design Tools

Page 2 of 4

c I know the schedule for this project, including the final due date and major milestones, and I believe d e f g it is practical. c I have a good understanding of the technical expertise of my clients and any relevant internal or d e f g external staff. c d e f g c d e f g

I have discussed a staff-education plan with the customer. I am aware of any office politics that might affect the network design.

Chapter Two: Analyzing Technical Goals and Tradeoffs


Technical Goals Checklist
c I have documented the customers plans for expanding the number of sites, users, and servers for the d e f g next year and next two years.

The customer has told me about any plans to migrate departmental servers to a centralized data center.
c The customer has told me about any plans to integrate data stored on a legacy mainframe with the d e f g enterprise network.

c d e f g

The customer has told me about any plans to implement an extranet to communicate with partners or other companies.
c d e f g c d e f g c d e f g c d e f g c d e f g c d e f g c d e f g

c d e f g

I have documented a goal for network availability in percent uptime and/or MTBF and MTTR. I have documented any goals for maximum average network utilization. I have documented goals for network throughput. I have documented goals for packets per second (pps) throughput of internetworking devices. I have documented goals for accuracy and acceptable BERs. I have discussed with the customer the importance of using large frame sizes to maximize efficiency.

I have discussed with the customer the tradeoffs associated with large frame sizes and serialization delay.
c I have identified any applications that have a more restrictive response-time requirement than the d e f g industry standard of less than 100 ms. c d e f g

I have discussed network security risks and requirements with the customer.

http://www.topdownbook.com/checklists.html

17/10/2010

Top-Down Network Design Tools

Page 3 of 4

c I have gathered manageability requirements, including goals for performance, fault, configuration, d e f g security, and accounting management. c Working with my customer, I have developed a list of network design goals, including both business d e f g and technical goals. The list starts with one overall goal and includes the rest of the goals in priority order. Critical goals are marked as such.

I have updated the Network Applications chart to include the technical application goals shown in Table 22: Network Applications Technical Requirements.

c d e f g

Chapter Three: Characterizing the Existing Internetwork


Network Health Checklist
c d e f g c d e f g c d e f g c d e f g c d e f g c d e f g c d e f g

The network topology and physical infrastructure are well documented. Network addresses and names are assigned in a structured manner and are well documented. Network wiring is installed in a structured manner and is well labeled. Network wiring has been tested and certified. Network wiring between telecommunications closets and end stations is no more than 100 meters. Network availability meets current customer goals. Network security meets current customer goals.

c No LAN or WAN segments are becoming saturated (70 percent average network utilization in a 10d e f g minute window). c d e f g

There are no collisions on Ethernet full-duplex links.

c Broadcast traffic is less than 20 percent of all traffic on each network segment. (Some networks are d e f g more sensitive to broadcast traffic and should use a 10 percent threshold.)

Wherever possible and appropriate, frame sizes have been optimized to be as large as possible for the data-link layer in use.
c d e f g

c d e f g

No routers are overutilized. (Five-minute CPU utilization is under 75 percent.)

c On average, routers are not dropping more than 1 percent of packets. (For networks that are d e f g intentionally oversubscribed to keep costs low, a higher threshold can be used.)

Up-to-date router, switch, and other device configurations have been collected, archived, and analyzed as part of the design study.

c d e f g

http://www.topdownbook.com/checklists.html

17/10/2010

Top-Down Network Design Tools

Page 4 of 4

c The response time between clients and hosts is generally less than 100 milliseconds (1/10 of a d e f g second).

Chapter Four: Characterizing Network Traffic


Network Traffic Checklist
c d e f g

I have identified major traffic sources and stores and documented traffic flow between them.

c I have categorized the traffic flow for each application as being terminal/host, client/server, peer-tod e f g peer, server/server, or distributed computing. c d e f g c d e f g

I have estimated the bandwidth requirements for each application. I have estimated bandwidth requirements for routing protocols.

c I have characterized network traffic in terms of broadcast/multicast rates, efficiency, frame sizes, d e f g windowing and flow control, and error-recovery mechanisms. c d e f g

I have categorized the QoS requirements of each application.

c I have discussed the challenges associated with implementing end-to-end QoS and the need for d e f g devices across the network to do their part in implementing QoS strategies.

Back to the Top-Down Network Design Resources page. Back to the Top-Down Network Design home page. Copyright Priscilla Oppenheimer. Hosted by Open Door Networks.

http://www.topdownbook.com/checklists.html

17/10/2010

Das könnte Ihnen auch gefallen