Brainstorming to collect data in corporate computer network design

Suppose you are appointed to conduct a project to design a computer network in your organization that contains many sites that need to be integrated into a single private corporate network, what are you going to do? As a team leader, a draft timetable should be developed first as a general, which includes brainstorming to collect data, to the extent possible, the model project, the budget estimates, in conjunction with the third and so on.

It 'prettydifficult to successfully launch a project without knowing exactly what the strengths and weaknesses of the supporting infrastructure, the system is based on. E 'therefore, a computer networking project should begin with a brainstorming session to gather as much data as possible.

Suppose that this computer network design will involve three sites: a head office based in Sydney, in a central office in Jakarta, and a remote site – the gold mine in the middle of Borneojungle. The principal of the organization would like to have all sites connected to a single computer network to allow communication between sites including data, voice or video conference and probably out of the course to allow easy communication with the world.

Requirements for telecommunications

The first data to the computer network design that must be collected is the system requirements for telecommunications. The question is howlink all sites to enable the communication system to happen. The following questions may be used to collect data for telecommunications needs.

1. How to organize the telecommunications service in remote site? We know that both the head office in Sydney and Jakarta are located in the area where you can find a lot of communications services. What about the remote site – the site in the jungle? It is recommended in conjunction with third-party companies who can provideWAN technology services – probably using the communication satellite link.

2. Collect the information that kind of communication will be allowed for the remote site office in Jakarta, only data, voice, video, or a combination thereof. This information is important to help determine the bandwidth satellite connection you need. In this way they relate to the budget by satellite is expensive.

3. What kind of WAN technology to link data between Jakarta and Sydney, frame relay,ISDN, VPN? Liaison with third parties – the telecommunications company will help.

Need to dig and find information more specific to the project. telecommunications requirements should be resolved before we can proceed to collect the requirements of other infrastructure in this case.

Network Infrastructure Requirements

second criterion for computer network design is to collect data on the networkinfrastructure requirements. All data relating both to the requirements of logical and physical infrastructure must be collected as far as possible. The following questions may be used to collect data.

1. How many hosts will be at each site, including workstations, servers, switches, routers, wireless access points and VoIP. This will help to calculate and design the IP address requirements.

2. Gathering the information with the main direction if they need to accommodate publicresources and sites in Sydney or Jakarta. If so, where will all the public transport is located within the private network or the DMZ (perimeter network)? This will help to design the safety of the entry point. By hosting public resources, the domain name must be designed safely, how to separate domain names between the public and internal use.

3. Gather information on safety requirements for the internal network. Will particulardepartments or sections of the border security needs? This will help you design your computer network if the network segmentation within the local network is necessary. It also helps in the design of how users are grouped and appropriate policies are developed to meet the safety requirements.

4. Gathering the information with the main direction of developing service level agreements with regard to the availability of network resources. Ascritical network resources affect the continuity of business, if they ever fail to work. This will help you design the requirements of redundant resources, such as the need for clustering, load balancing and so on.

5. Gather information regarding the location sites as good as any power is, how long the distance between each building that will connect to the network, you can run the network cabling or wireless connection. Ifthe wireless connection is necessary to examine how the damping factors will affect the wireless performance.

6. Collect the information if the users on the go or tele-workers will be allowed access to corporate network resources. This will help you design your VPN requirements and safety requirements regarding the authentication and authorization for the remote connection.

7. It digs even more necessary on the requirements of the infrastructure that is specificthe project. Having the data of "brainstorming" regarding infrastructure requirements can be drawn with regard to hardware, software, consultants and requirements for the implementation of its computer network.

Disaster Management

In a computer network design, disaster recovery and business continuity planning should be in mind. What if this problem should not base all decisions of the design includingselecting the location, hardware, software, models, involving the third and so on. For example in the construction of the server room, is a wise decision not to fill all the servers in a single room server. Another alternative server in the construction of several would be better to avoid a single point of failure in the case of main server room is completely burned in a fire disaster. The outline of the draft design of the computer network must be measured with precision. Security RiskThe assessment must be made to design the appropriate control to reduce the possible threats to occur and if the threats never occur, such action should be taken to enable the business to do at least the minimum operating level.

In computer network design must also consider the ease in keeping the system afterwards by the administrators, providing a complete documentation including operating manuals and disaster recoveryplanning.

With Grinsing Ki

December 21, 2010. Tags: , , , , , . computer network. Leave a comment.

Brainstorming to collect data for the design of computer network

Suppose that you need are called to lead a project from a network of computer graphics in your organization that contains many sites, the private network to integrate into a society, what do you want? As team leader, a period of time as the general project must first be developed, the brainstorming session to collect data as possible, the model project, budget estimates, contacts with the third and so on.

It 'prettydifficult to start a project correctly, without knowing exactly what the strengths and weaknesses of the supporting infrastructure, the system is based. It is, therefore, a computer network design should begin can collect data through brainstorming so far.

Take that design computer network Borneo involved three sites: one of the headquarters office in Sydney, one in Central Jakarta, and a remote site – the gold mine in the middle ofJungle. The head of the organization wants to pages linked from a single computer network to allow all the other sites of communication, including data, voice or video conference, and probably out of the path that facilitate communication with the whole world.

Telecommunications needs

The initial data for computer network design that is collected needs to system requirements for telecommunications. The most important question is howLink to allow all sites of the communication system is successful. The following questions may be used to collect data for the purposes of telecommunications.

First Performance-based providers of telecommunications services in remote site? We know that both the head office in Sydney and Jakarta is located in the area where you can find many communications services. And the remote site – the location in the middle of the jungle? Please contact the third party companies that can provide connectionWAN technology services – probably uses communications via satellite links.

Gather the information according to the type of communication to the remote site, the office in Jakarta to be allowed: data, voice, video, or a combination of these. This information is important to determine the extent to the satellite link bandwidth. This has budgetary implications, since the satellite connection is expensive.

Third type of WAN link technology to transfer data between Jakarta and Canberra, Frame Relay,ISDN, VPN? Contacts with the third – the telecommunications company to help.

You have to dig and find other data that are specific to the project. telecommunications requirements should be resolved before you can continue to collect the requirements of other infrastructure in this case.

Requests for network infrastructure

Second condition for computer network design is to collect data on the networkInfrastructure requirements. All data must be collected as possible, both logical and physical infrastructure needs. The following questions may be used to collect data.

How many guests will be first in every place, including workstations, servers, switches, routers, wireless access points and VoIP. This is the calculation of aid and development of specific IP address.

According Collect information with key management, if they need to accommodate publicResources in either Sydney or Jakarta sites. If yes, where are all the resources within the private network or the DMZ network (perimeter)? This is the project entry point for security help. With public funds hosting, domain name must be so insecure as the separation of domain names between the public and internal use by design.

Third Collect information on safety requirements for the internal network. Will specialSections or departments need security line? This will help in the design of computer network if the network segmentation is necessary within the local network. And to help and policies have been developed to meet the safety requirements in the design, such as user groups.

Fourth Pick up the key management to process information, the level of service agreements in relation to the availability of network resources. Ascritical network resources will impact on business continuity, though never work. This will help to plan resource requirements redundant, as the need of clustering, load balancing, and so forth.

Fifth Collect information on the situation in various websites, such as the performance is also, provided that the distances between buildings, which are connected to the network, you can run network cabling or wireless connection. Ifthe wireless connection is necessary to examine how the damping factor can affect wireless performance.

Sixth Collect the information that users should or tele-workers are allowed access to network resources on the corporate network. This will help you design your VPN requirements and safety requirements related to authentication and authorization for dial-up.

Seventh And even more necessary in excavations that certain requirements for infrastructurethe project. Knowing the data requirements for infrastructure brainstorming, you can budget in terms of hardware, software and consultants to implement the design of computer networks.

Disaster Management

Your computer network design, disaster recovery and business continuity planning should be the spirit. This is what, if the matter should not be any decision on the basis of design, includingSelect the location, hardware, software, models, the third act, and so on. For example, build the server room, not a wise decision to fill all servers in a single room server. Another alternative server in different buildings would have been better to avoid a single point of failure in the main server room is completely burned in the fire. The design of the display of computer network design must be carefully studied. Security Riskreduction advice needed to help design the appropriate control of potential dangers arise, and if the threats are always reminded to take measures so that the task will run at least a minimum operational level.

Your computer network design must also ease maintenance of the system followed by the administrators, providing a complete documentation, including manuals and Disaster RecoveryPlanning.

With Grinsing Ki

May 10, 2010. Tags: , , , , . computer network. Leave a comment.

Design a site like this with WordPress.com
Get started