Академический Документы
Профессиональный Документы
Культура Документы
Lecture 1
Agenda
Walk though Syllabus
Introduction to material to be
covered
Introduction to a simulation tool
OPNET IT Guru/ Modeler
Course Overview
Learn to identify customer needs
Learn to assess business goals
Map to network goals
Study/understand/analyze performance of a
given network
Design a network / upgrade as per needs
Combine WAN technologies with LAN technologies
Learn to evaluate the security goals of the network
and to integrate these goals in the design (after /
before?)
This course is NOT about learning different
network protocols or using OPNET.
3
Class Details
Date and Time:
Every M, W, F - 9-10 AM
Instructor:
Name: Nirmala Shenoy
Office: E0033
Office Hours:
Thursday 12-1
Tuesday 10.30 11.30
Email:
Nirmala.Shenoy@snu.edu.in
Communication
Email through SNU account
Check Blackboard for announcements,
assignments, quizzes, templates etc.
Course Description
This course will examine the design and
performance of networks.
Students will learn to design networks based on
identified needs and analyze the performance of
that network.
The designs include site, campus, and enterprise.
WAN technologies will be combined with LAN
technologies in the design of enterprise networks.
Students will learn to assess the business goals and
their application to the network goals. Students will
learn to evaluate the security goals of the network
and to integrate these goals in the design.
Attendance
Make sure you sign your name in each class.
You may miss two lectures without penalty.
For subsequent absences, you will lose 1 point (out
of your total Attendance points) for each absence.
Missing Class Practices will be subjected to penalty unless
there is an emergency. If you become seriously ill or have
a family emergency, it is your responsibility to
communicate with the Professor as soon as you are able,
preferably before class. The Professor reserves the right
to require documentation.
8
Course Policies
Maintain a notebook and keep notes for every
lecture.
No social Networking/non relevant sites should
be opened during the class.
No food and drinks allowed in the class.
Lecture slides will be regularly posted.
Class practice assignments (based on certain
modules) should be completed by students in
class.
See Announcement Section regularly for other
information.
9
Cheating Policies
Any attempt to pass of someone elses work as
your own or to assist someone else in such an
effort is considered cheating. The penalty for a
first offence will be a score of zero on the
evaluation component in question for all
involved students. A second offence will result
in a failing grade for the course.
Please familiarize yourself with the University
policy on Unfair Means & Plagiarism.
Proxy attendance will be considered as a
cheating event
10
Grading Scheme
Evaluation Weight
Instrument age
Midterm
15%
Test I ??
Assignment
20%
s
Project
20%
Time
Comment
1 hour
Closed Book, In
Class
Open Book,
Submit Online
Presentation and
report
Attendance
10%
Comprehen
sive Exam
35%
-- See
Attendance and
Participation
3 hours
Closed Book, In
Class
By due
date
By due
date and
time
11
Grading Policy
Scores obtained in all the
components of Evaluation shall be
totaled and the final score will be
converted into letter grades as per
University policy.
Students taking this course to
improve their earlier grade are
reminded that this grade replaces
the previous grade (regardless of
which is higher).
12
Make Up Policy
No make-up will be granted for any component of
evaluation unless
(a) you have emailed the instructor with the necessary
reason(s) as soon as possible before the date of
evaluation and a make-up date has been agreed upon,
OR
(b) unforseeable circumstances prevent you from
keeping the original date. In either case, you may
need to submit supporting documents.
The decision of the Course Instructor-in-charge in all
these matters shall be final.
13
Material to be covered
14
Reading
Required Text:
Oppenheimer, Pricilla. Top-Down
Network Design, Second Edition/ Third
edition. Cisco Press, Indianapolis, IN,
2004.
- Second or Third Edition
15
Useful References
Course Material
Phase I
Phase II
Phase III
Phase IV
17
OPNET SIGNIFICANCE
18
Why OPNET?
Networking technology
has become too complex
for traditional analytical
methods or rules of thumb
to yield an accurate
understanding of
system behavior
19
Enterprises
Abbott Labs
ABN AMRO
Accenture
Aerospatiale
Atofina Petrochemicals
AG Edwards
Bank of Oklahoma
Booz-Allen & Hamilton
CACI Federal
Cal Fed
Capital One
Charles Schwab & Co.
Citicorp
Compaq Global Services
CSC
Cummins Engine Co.
CVS Pharmacy
DaimlerChrysler
Dell Computers
DHL
DirecTV
Entergy
Enterprise Rent a Car
Ernst & Young
FBI
Federal Reserve Bank
Fidelity Investments
First American
First Citizen
Service Providers
AirTouch
AT&T
AT&T Wireless
Belgacom
Bell Canada
BellSouth
British Telecom
Cable & Wireless
Chunghwa Telecom
Compuserve
Deutsche Telekom
Dolphin Telecom
Enron
France Telecom
Hungarian Telecom
Hutchison 3G
ITALTEL SpA
Indonesia Telecom
Infonet
Inmarsat
Intelsat
KDDI
Korea Telecom
LG TeleCom
Network Access Slns
Nextel
NTT DoCoMo
NTT Group
Omnitel
One 2 One
Orange PCS
Orbital Sciences
Polish Telecom
PT Comunicacoes
QoS Networks
Qwest
SBC
SK Telecom
Sprint
SWIFT
Swisscom
Telekom Austria
Telecom Italia
Telecom Italia Mobile
Teledesic
Telefonica
Telenor
TELUS
Telstra
UUNET
Verizon
Vodafone
Williams
WIND SpA
WorldCom
20
Federal Customers
DoD
Army Research
Laboratories (ARL)
CIA
Defense Information
Systems Agency (DISA)
Joint Staff (J6)
National Communication
System
National Ground
Intelligence Center
National Guard
National Institute Mapping
Agency (NIMA)
National Security Agency
NATO
Naval Information
WarfareCenter
Naval Postgraduate School
Naval Research
Laboratories (NRL)
Naval Surface
Warfare Center (NSWC)
Naval Underwater
Warfare Center (NUSC)
Civilian
NRaD/NCCOSC
Tri-Service Information
Management Program
Office (TIMPO)
US Army CECOM
US Army Combined
Arms Center
US Army HQDA/DISC4
US Army Missile
Command
US Army Signal Center
US Army Signal
Command
US Marine Corps
US Military Academy
US AirForce SSG
US Air Force ESC
US Air Force AFCA
US Air Force HQ 38th EIW
US Air Force Information
Warfare Center
US Air Force PAC
US Air Force RADC
Coast Guard
Department of Agriculture
Department of Commerce
Department of State
FAA
FBI
Federal Railroad
Administration
IRS
Idaho National
Engineering &
Environmental Lab
Jet Propulsion
Laboratory
Lawrence Livermore
National Lab
Lincoln Labs
Contractors/Partners
NASA- Ames
Research Center
NASA- Goddard Space
Flight Center
NASA- Glenn
Research Center
National Simulation
Center
National Institutes
of Health
Oak Ridge National Labs
Sandia National Labs
Tennessee Valley
Authority
US Agency for
International Development
US Senate
Aerospace Corporation
Adroit Systems
ARINC
AT&T Bell Laboratories
Booz-Allen & Hamilton
BBN
BDM
Boeing
BTG
Computer Sciences
Corp.
CACI Federal Systems
Dyncorp
GEC Marconi
General Dynamics
GTE
Harris
Hazeltine
Hughes
IITRI
IITRI
ITT
KPMG
Lockheed Martin
Logicon
Magnavox
MIT Lincoln Labs
MITRE
Motorola
Nichols Research
Northop Gruman
PRC
PSC
Rand
Raytheon
Rockwell
SAIC
Space Systems
Spectral Systems
SRI
TASC
Techno-Sciences
Trident Systems
TRW
Westinghouse
Veridian
21
Designing Networks
Before designing a network you must gather
data and understand the data : customer needs
business goals
business climate
Government and Industry Regulations
23
Design Fundamentals
Two Basic Designs techniques
Top Down
Bottom Up
24
Design infrastructure
Choose the devices needed to
support the infrastructure
Select the desired protocols needed
Configure devices to support traffic
needs.
25
Network Architecture /
Topology ?
26
Scalability
Capability
Availability
Usability
Manageability
Adaptability
Affordability
Compatibility
Maintainability
27
28
Design Fundamentals
Which one is the best?
And the answer is ..
Depends
On what
How many bottoms-up you have had during the design stage.
29
Design Fundamentals
Actually depends upon circumstances
Bottom up
Temporary network
Short notice, small change
You know customer needs do you?
Top down
Permanent network, time to study and analyze
Larger network design
Dont understand customer need or corporate
goals
30
OPTIMIZING !!
31
Design Fundamentals
Bottom up
Temporary network
Short notice, small change
You know customer needs or do you?
Top down
Permanent network, time to study and analyze
Larger network design
Dont understand customer need or corporate
goals
32
OPTIMIZING !!
33
Top-Down Network
Design
Phase I Chapter 1
Analyzing Business Goals and Constraints
34
Road Map
Use a systematic top-down process to
design the network
Analyze the customers business goals
Identify network applications
Address business objectives,
35
Iterative process
Get overall view of customer expectation from the network
Later gather details on scalability, protocols, technology
preferences
ITERATIVE
Identify/understand
location and needs of user communities that access or
change data and processes.
37
38
Monitor and
optimize
network
performance
Develop
logical
design
Develop
physical
design
Implement
and test
network
Test, optimize,
and document
design
39
Afterthoug
ht?
41
Additional Steps
If the customer buys the design two
additional steps result
Implement and test the network
Manage (Monitor and Optimize
network performance, adds, deletes,
changes, maintenance)
44
Design
Retire
Optimize
Implement
Operate
45
46
47
Increase revenue
Reduce operating costs
Improve communications
Shorten product development cycle
Expand into worldwide markets
Build partnerships with other companies
Offer better customer support or new
customer services
ANY OR ALL PRIORITIZE
48
Security
Resiliency (fault tolerance)
Business continuity after a disaster
Network projects must be prioritized based
on fiscal goals
Networks must offer the low delay required
for real-time applications such as VoIP
Cost reduction is critical
49
52
53
54
55
Security
Get a copy of the security policy
Policy affects the new design?
New design affect the policy?
Viable policy
Privacy?
56
57
Large in scope?
An entire redesign of an enterprise network
Networks Today
Difficult to predict data flow traffic
flow
Mobile user proliferation
Data travel paths changes with user
movement
Disaster recovery
Systematic and modular design
59
Analyzing Business
Constraints
60
Business Constraints
Budget
Staffing
Schedule
Politics and policies
61
New project
In-house networking staff
How to provide for extra staffing
Contain costs
63
64
65
66
67
68
69
User communities
Data stores
Protocols
Current logical and physical architecture
Current performance
71
Network Applications
Name of
Type of
Application Application
New
Criticality
Application?
Comments
72
Network Applications
Name of
Type of
Application Application
Registration
Accounting
Payroll
Billing
New
Criticality
Application?
student records
no
financial
employee pay
financial
no
Yes
critical
defined cycles
semi critical
very critical
No
Comments
monthly cycles
bi weekly and bi monthly
very critical
Defined Cycles
73