CH/S6CA/Nov. 2008
SOHO Network Design and Implementation
The following phases are involved in the network development process:
i.Need analysis
ii.Design
iii.Setup
iv.Testing
v.End-user support
Documentation is needed in different phases in the network development process.
One can go back to the previous phase(s) if necessary.
Need analysis
Need analysis begins with the acquisition of external information
i.forecasts of how the new network/service will operate;
ii.the economic information concerning costs; and
iii.the technical details of the network’s capabilities
The role of forecasting.
i.It is necessary to estimate the expected traffic intensity and thus the traffic load that the network must support.
ii.Traffic intensity
a.It is a measure of the average occupancy of a server or resource during a specified period of time, normally a busy hour.
b.It is defined as the ratio of the time during which a facility is cumulatively occupied to the time this facility is available for occupancy.
where
a is the average arrival rate of packets (e.g. packets/sec)
L is the average packet length (e.g. in bits), and
R is the transmission rate (e.g. bits/sec).
c.A traffic intensity greater than one means that the rate at which bits arrive exceeds the rate bits can be transmitted and queuing delay will grow without bound (if the traffic intensity stays the same).
d.If the traffic intensity is less than one, then the router can handle more average traffic.
The identified needs should be translated into user requirements and specifications.
Design
The network should be designed in a way that it can meet every requirement generated in the need analysis phase.
In the design phase, one should consider (with reference to Notes “SOHO Networking”)
i.network layout
ii.transmission media. (p. 14)
iii.topology (p. 15-16)
iv.protocol(s)
v.network devices
vi.server(s)
vii.software
a.operating system (Windows server, Linux)
b.application software
c.utilities (network monitoring software)
viii.cost
a.setup cost (fixed cost)
b.on-going support cost (variable cost)
ix.security measures
x.scalability measures
xi.internet access (broadband or leased line)
xii.static IP addressing system or DHCP
Network Diagram
i.The network will be built in the setup phase according to the network diagram.
ii.In the above diagram, three personal computers and a server are connected to a switch; the server is further connected to a printer and a gateway router, which is connected via a WAN link to the Internet.
iii.The network diagram will be kept updated during the end-user support phase to facilitate on-going maintenance and support.
iv.A network diagram may include the following information::
a.Network layout.
b.Category / Model name of network devices / servers / user machines
c.Location of devices / servers / user machines
d.IP address of devices / servers (User IP addresses will not be recorded if DHCP is used)
e.Machine names
f.Transmission media used
g.Other additional remarks are useful for further reference and support.
Cisco uses its own brand of networking symbols:Here are some more sample network diagrams:
Setup
In this phase, the actual network will be set up. Steps include:
i.Wiring
ii.Physical installation of machines
iii.Installing additional components on machines (E.g. Extra hard disk for RAID, extra power supply_
iv.Software Setup
a.Installing OS
b.Other configurations (E.g. setting IP, joining domain)
c.Setting sharing resources like folders on harddisks.
d.Installing other software
e.To save time, we can install everything on a “template” machine, then clone the image of this machine to other machines so that all machines will look similar in their settings.
Folder/file-sharing permissions:
Read, write, execute rights, etc.
Testing
Testing is the process used to justify whether the network installed in the setup phase fulfils the requirements stated in the need analysis phase.
Test Plan:
i.Written before conducting the test.
ii.Used to specify what test cases should be conducted.
iii.Should be drafted according to user’s requirement and the network design.
Test results should be recorded and stored in the Test Report.
End-user support
User training
i.Teacher users how to use the system. E.g. login, print file, etc.
ii.Tell the users the rules and best practice they should obey in using the system. E.g. password policy, security policy, etc.
iii.Documents involved: teaching materials, regulation documents.
Ad hoc support
i.Solve uses’ problems upon requests
ii.Supporting details should be recorded in a log for the following purposes:
a.Knowledge sharing between supporting team members
b.For further analysis (e.g. which printer brand goes wrong most frequently)
House-keeping Work. E.g.
i.Regular backup
ii.Server cleanup
iii.Virus engine update
iv.Installing software patches
v.Update the network diagram if there is any change in the network (E.g. Changing router location)
Documentation
Document used in different phases:
Phase / Document(s) / RemarksNeed Analysis / User requirement, specification / Capture requirements from users
Design / Network diagram / Record the layout of the network and the resources involved
Testing / Test plan / Include the test cases to be conducted (Done before conducting the test)
Test report / Report the test results (Done after the test)
End-user support / User manual / Training materials / Teach users how to access the network
User regulations / State the rules users should obey in order to use the network
Maintenance log / Is used by supporting staff for recording for further reference
Network diagram (updated) / When there is any change in the network layout, the network diagram should be updated.
Documentation is an on-going process in network development process and should be involved in various phases in network development.
User document (e.g. user manual and teaching materials) should be easy to read and avoid technical jargons.
SOHO Network Management and Security
i.Monitoring, fine-tuning and troubleshooting
ii.Backup
a.Importance
b.Solution, e.g. RAID, UPS, network backup servers, etc.
iii.Security threats and measures
a.Threats: virus, worm, Trojan programs, spyware, unauthorized access, interception
b.Measures: Anti-virus programs, authentication, access and user right control, packet filtering, public and private key encryption, WEP, IPsec used in VPN, etc.
The major purpose of a database system is to provide users with an abstract view of the system. The system hides certain details of how data is stored and created and maintained. Complexity should be hidden from database users.
Data Abstraction
It refers to the suppression of details of data organization and storage and the highlighting of the essential features for an improved understanding of data
There are several levels of abstraction:
i.Physical Level:
a.How the data are stored.
b.E.g. index, B-tree, hashing.
c.Lowest level of abstraction.
d.Complex low-level structures described in detail.
Reference:
SOHO Network Design and Implementationpage 1