Overview

Network design and design methodology describes a process that involves 9 concrete steps and a series of activities for these activities. As mentioned above, this is a technical lifecycle that supports technical initiatives such as Windows migration, IP telephony, and wireless design to name a few. The methodology begins with examining business business requirements. It is essential to understand the company's business model, business leaders, and how they develop from a business point of view. This will be the basis for a design proposal that serves the company's business, technical, and operational requirements.

first STEP: BUSINESS REQUIREMENTS

Any design project starts with understanding what the company is doing and what it needs from a business point of view. This begins with understanding their business model, which actually describes how your business operates from a business and business perspective, to generate revenue and reduce costs. Many vendors have now made a return on investment return (ROI) for new implementations such as Unified Communications and Telephony. This is an effective sales tool that demonstrates the cost-effectiveness of investments over time.

This is a list of some typical business drivers:

• Reduces operating costs

• Generates Revenue

• Customer Satisfaction

• Employee Productivity

This list includes some typical business requirements: [19659005] • Budget constraints

• Office Consolidations

• Corporate Mergers and Acquisitions

• Remote Remote Access

• New Office and Employee Execution

• New Data Center Applications

• Cost-effective Network Management

• Supplier Contracts

STEP 2: PLANNING REQUIREMENTS

Now that you understand the core business requirements of your company, you can specify standard and custom design requirements. The process of planning requirements focuses on the definition of technical aspects. These requirements, together with business requirements, build the framework that is used to determine infrastructure, security, and management. Design requirements are standard and other. Standard design requirements are general and are similar to design projects. Mixed requirements are those that are not within the standard requirements

• Standard Design Requirements

• Performance

• Availability

• Scalability

• Standards Compatibility

• Quick Installation

3. STEP: NETWORK ASSESSMENT

After completing a network survey, the company's business and design requirements were completed. The network survey provides a quick snapshot of the current network for infrastructure, performance, availability, monitoring and security. This information is used to make effective strategic recommendations and design recommendations to the customer for specific information system modifications. The network assessment model has 3 consecutive activities, which are evaluation, analysis and recommendations. The current network is examined on the basis of five primary surveys: infrastructure, performance, availability, management and security. When the surveys are completed, the collected information will then review the trends, problems and problems that negatively affect the network.

4th STEP: SELECTING INFRASTRUCTURE

After network survey, we are ready to plan your network. This phase began to build infrastructure with a special series that promotes the selection and design of effective equipment. It is important to take into account business requirements, design requirements, and network assessment when building an infrastructure.

The following numbered list describes specific infrastructure elements and their unique order. Enterprise WAN Topology

2. Campus Topology

3. Traffic Model

4. Selection of Equipment

5. Circuits

6. Routing Protocol Design

7. Addressing

8. Entry Agreements

9. iOS Services

10. Domain Name Services

11. DHCP Services

5. STEP: SECURITY STRATEGY

We must now define a security strategy to provide infrastructure. The necessity of corporate network security should not be overlooked by the spread of the Internet. Companies continue to take advantage of the state infrastructure to link national and international offices, business partners and new corporate acquisitions. Security requirements and network assessment recommendations should guide the selection of security devices, protocols, and processes.

6th STEP: NETWORK MANAGEMENT STRATEGY

This section defines a network management strategy for managing all equipment defined by infrastructure and security. It is necessary to determine how the equipment should be verified and determine whether the current management strategy is appropriate or whether new applications, equipment, protocols, and processes need to be identified. The management components were then integrated with infrastructure and security to complete the design of the proposed plan. These primary elements contain all well-defined management strategies and should be taken into account when developing their strategy.

• 7 Management Groups

• SNMP Applications

• Managed Devices and Events

7. STEP: FOR THE CONCEPT [19659002] All infrastructures, security and management elements need to be explored right now by verifying a conceptual plan. It is important to test the current design, configuration, and iOS versions in a non-production environment or in the production network with limited disturbances. For example, implementing another network module in a router may require you to change the current iOS version. Changes can affect WAN or campus modules already installed on production routers. This is the true value of verifying the concept and verifying that new devices and iOS versions are integrated with each device and the network. The following list describes the advantages of demonstrating the concept of network design. Evidence of the concept result needs to be explored and used to modify the current infrastructure, security and management specifications before creating a design proposal. The conceptual model proposed here is proof of prototype design, equipment availability, test definition, construction equipment script and test results. Prototype Design

2. Ordering Equipment

3. Definition of Tests

4. Building Tools Scripts

5. Examination of Test Results

8. STEP: PLANNING PROPOSAL / REVIEW

After completing the concept, you are ready to make a design proposal for the plan review meeting. The target audience may be the Director, the CIO, the CTO, the Senior Network Engineer, the Consultant, or anyone who approves the project budget. It is important that you present your ideas in a clear and professional way. If presentation is required, the performance slide works well and can be used to support concepts in the design document. The emphasis is on the standard design proposal and the order in which the information is presented

The draft work plan is submitted to the customer after dealing with any concerns about the evidence of concept insurance tests. The design examination gives you the opportunity to present your designer's proposal to the customer and discuss the problems. This is the time for customers to identify their concerns and design engineer to clarify issues. The focus is on reaching agreement on possible modifications and changes to infrastructure, security and management before implementation. Business and design requirements may vary from the start date of the project, which sometimes requires changes to infrastructure, security, and driving standards. The changes must conform to the conceptual tests prior to the final change of the design proposal.

ninth STEP: IMPLEMENTATION

In the final step, we define the implementation process for the given plan. This describes the proposed implementation methodology of the proposed design, which can minimize disruption to the manufacturing network. It must be efficient and cost-effective. Like the previous methodologies, there is a sequence that should also be applied. Once the implementation is complete, the network is listening to all the problems. Modifying design and configuration can be solved for any problem or problem.

Copyright 2006 Shaun Hummel All rights reserved

Leave a Reply

Your email address will not be published. Required fields are marked *