Lesson 4 - Characterizing The Existing Internetwork
Lesson 4 - Characterizing The Existing Internetwork
Note:
Unshielded Twisted Pair wiring doesn't work if
the total run from a host to a network
connectivity device is over 100 meters long.
Checking Architectural and Environmental Constraints
Ventilation
Power
Refraction. When an RF signal passes from a medium with one density into a medium with
another density, the signal can be bent.
Diffraction. results when a region through which the RF signal can pass easily is adjacent
to a region in which reflective obstructions exist.
Check the Health of the
Existing
PerformanceInternetwork
Availability
Bandwidth utilization
Accuracy
Efficiency
Response time
Status of major routers, switches, and firewalls
Analyzing network traffic
Volume of network traffic
The current and future demand requirements can be used to predict
the volume of network traffic. Various elements will contribute to the
amount of traffic on the network.
To provide some insight into the amount of traffic to expect, ask the
following questions:
How many users will be accessing the network?
What is the expected volume and type of data/files users will create?
In medium to large networks users typically store data/files on
central servers. Accessing and working with this data will generate
network traffic.
Will users be accessing other data stores such as databases, intranets,
streaming content, email, instant messaging, VoIP etc. If so, how
many users will be using these services and what will be the degree of
activity?
How much will multimedia rich content will be used within the
network? Data such as audio and video a very network intensive and
can cause serious network degradation if overused or not controlled.
Which applications will be run from the server and which will be
locally installed on client computers? Some applications, such as
databases and content management systems may require intensive
server and network utilization. Users typically access these resources
through a web-based front end.
What network services are hosted onsite? In larger networks services
and protocols such as domain controllers, directory services, DNS,
DHCP, SNMP, SMTP, NAT, SPI etc may be used. These all generate
more network traffic.
Areclient standard operating environments
(SOEs) installed via remote installation or
network imaging systems? These systems can
generate very large volumes of traffic.
When are server and client maintenance task
performed? Tasks such as backups, virus
scans, file searches etc may not necessarily
produce any extra network traffic but they
can consume a large proportion of system
resources. This can result in there not being
enough resources remaining to service
network requests.
Characteristics of network traffic
In addition to the volume, the characteristics of the traffic also
need to be predicted. This requires a prediction of the type of
traffic that is expected.
Some questions you should ask include:
Is the traffic constant or intermittent?
Is the traffic being generated by a critical business system or a
peripheral system?
Does the source of the traffic require high speed, uninterrupted
transmission or can it be throttled back or postponed?
What parts of the network are being affected by the traffic and
can it be isolated?
Once you have predicted the traffic expected on the network, you
can tailor your network design to ensure optimal performance.
Future traffic
It is important to take into account the expected future traffic.
Is the network expected to grow rapidly, or do you know of additional
capabilities that will be implemented at a later date?
If this is the case, then third party tools may need to be acquired. It
is important to thoroughly test these tools before use.
Through the smart use of network analysis tools, simulations,
benchmarks and vendor supplied data an accurate estimate of
network performance can be established. This can prove invaluable in
detecting and preventing poor network performance before a network
design is implemented.