Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
Requirements Analysis -
Concepts
1. Objectives
2. Background
3. User Requirements
4. Application Requirements
5. Device Requirements
6. Network Requirements
7. Other Requirements
8. The requirements Specification and Map
9. Conclusions
10. Exercises
2
Objectives
In this chapter we expand the concept of
requirements for a network.
We talk about different types of
requirements, from the user, application,
device, and network components.
And you learn about grouping requirements
together, and mapping the locations of
applications and devices.
The combination of all the requirements and
locations is expressed in two documents:
1. a requirements specification and 3
Requirements Analysis -
Concepts
1. Objectives
2. Background
3. User Requirements
4. Application Requirements
5. Device Requirements
6. Network Requirements
7. Other Requirements
8. The requirements Specification and Map
9. Conclusions
10. Exercises
4
Background
Network analysis process begins with
Requirement Analysis which is:
Identifying, gathering, deriving, and understanding
system requirements and their characteristics;
developing thresholds and limits for performance to
distinguish between low- and high-performance
services;
and determining where best-effort, predictable, and
guaranteed services may apply in the network.
A requirements specification is a document that
lists and prioritizes the requirements gathered for
your architecture and design.
The requirements map shows the location
dependencies between applications and devices,
which will be used for flow analysis. 5
Background
Requirements and Features
Requirements are descriptions of the
network functions and performance
needed in order for the network to
successfully support its users,
applications, and devices (and thus the
success of the network project).
Requirements that are determined to be
necessary for the success of the network
project are termed core or fundamental
requirements.
6
Background (Cont)
Example 2.1. Examples of core requirements
and their associated metrics are:
Performance: The network shall be capable of
providing a minimum end-to-end throughput of
100 Mb/s between end devices. Metric:
Measurement between select end devices (the set of
which TBD), using applications from (Application
List), under test conditions (Conditions List).
3. User Requirements
4. Application Requirements
5. Device Requirements
6. Network Requirements
7. Other Requirements
8. The requirements Specification and Map
9. Conclusions
10. Exercises
9
The Needs for Requirement Analysis
Requirements analysis helps the designer
to better understand the probable behavior
of the network being built. This result in
several payoffs:
More objective, informed choices of network
technologies and services
The ability to apply technology and topology
candidates to networks
Networks and elements properly sized to users
and applications
A better understanding of where and how to
apply services in the network 10
User Requirements
The term user represents primarily the
end users of the system but can be
expanded to include everyone involved in
the system, such as network and system
administrators and management.
4. Application Requirements
5. Device Requirements
6. Network Requirements
7. Other Requirements
8. The requirements Specification and Map
9. Conclusions
10. Exercises
17
Application Requirements
Application requirements are
requirements that are determined from
application information, experience, or
testing, and represent what is needed by
applications to successfully operate on
the system.
21
Types of Applications
Real-time applications are those that have a
strict timing relationship between source and
destination, with one or more timers set for
the receipt of information at the destination.
Information received after the timer(s) expire at
the destination is considered worthless and is
dropped.
Non-real-time applications like asynchronous
applications are relatively insensitive to time,
assuming either no timing relationship
between source and destination, or a timing
relationship outside the bounds of the
applications session 22
Types of Applications
Interactive applications assume some timing
relationship between source and destination
while the application session is active;
however, the timing relationship is not as
strict as in real-time.
Common interactive applications, such as telnet,
FTP, and Web applications etc.
Interactive burst applications are those for
which the end-to-end or round-trip network
delay is the predominant delay for that
application.
Example: During a telnet session, the predominant
delay experienced by the user is from
23 the network,
Types of Applications
Interactive bulk applications, by contrast, are
those for which processing at the device or
application component is the predominant
delay.
An example of interactive bulk applications is
large file transfer (e.g., FTP).
24
Application Groups
25
Application Locations
5. Device Requirements
6. Network Requirements
7. Other Requirements
8. The requirements Specification and Map
9. Conclusions
10. Exercises
28
Device Requirements
Super computers
Medical
computing
devices
Network
Cameras
30
Device Requirements
(Cont)
Devices can be grouped into three
categories:
Generic computing devices are the desktop
and laptop computers that most users have.
Examples include Windows-based PCs,
laptops and handheld devices, and Mac and
LINUX-based workstations etc.
Servers are computing devices that provide a
service to one or more users (i.e., clients).
They are typically more powerful, in terms of
memory, processing, networking, and
peripherals, than users desktop or laptop
31
devices. Examples of servers include
Device Requirements
(Cont)
Specialized devices are devices that provide
specific functions to their users. Specialized
devices generally do not support direct
access to user applications, but rather
gather, produce, or process information to be
sent to users. Examples of specialized
devices include supercomputers, parallel or
distributed-computing systems, data
gathering and processing systems, medical
devices, networked cameras or tools etc.
32
Device Requirements
(Cont)
Performance Characteristics
Performance can be measured for various
components of the device: hardware,
firmware, and software.
For many environments, it may be difficult
to determine or measure the performance
characteristics of its devices.
Components within a device are proprietary,
and performance information about them can
be sketchy or unavailable.
Software and firmware driving the device, such
as the operating system (OS), device
33 drivers,
Device Requirements
(Cont)
Therefore, whenever possible,
determining this information for a
standard device and creating a
template is a practical solution.
35
Device Requirements
(Cont)
By looking at each of these components as integral
to the overall performance of the device (and of the
system), we are applying the end-to-end perspective
within the devicethe host in effect becomes a
microcosm of the system. What we are looking for in
performance characteristics includes
Storage performance, that is, flash, disk-drive, or
tape performance
Processor (CPU) performance
Memory performance (access times)
Bus performance (bus capacity and arbitration
efficiency)
OS performance 36
Device Requirements
(Cont)
Device Locations:
Knowing the locations of existing or
expected generic computing devices,
servers, and specialized devices can be
helpful in determining
the relationships among users,
applications, and
networks, as well as the start toward
determining traffic flow characteristics for the
system.
37
Device Requirements
Figure (Cont)
2.11 illustrates an environment of three campuses
(buildings are shown in gray). Generic computing, servers,
and specialized devices are shown for each building. Instead
of picturing each user desktop device, a total for each
building is noted. The number of each server is shown as well.
6. Network Requirements
7. Other Requirements
8. The requirements Specification and Map
9. Conclusions
10. Exercises
40
Network Requirements
(Cont)
Sometimes the network architecture and
design must accommodate any
dependencies and constraints imposed by
the existing network. Examples include the
following:
Scaling dependencies.
Location dependencies.
Performance constraints.
Interoperability dependencies.
Network obsolescence.
43
Network Requirements
(Cont)
Network Management and Security
There are four categories of network
management tasks:
1. Monitoring for event notification
2. Monitoring for metrics and planning
3. Network configuration
4. Troubleshooting
44
Network Requirements
(Cont)
Network Management and Security
(Cont)
Monitoring entails obtaining values for
network management parameters from
network devices (routers, hubs,
switches, etc.) of the system, processing
the data, displaying some or all of the
data to network operators, and archiving
the data.
Monitoring for event notification involves
taking a frequent snapshot of the
45
network, in order to understand the
Network Requirements
(Cont)
If the data are collected for a long term
analysis of network performance, the
monitoring is for metrics and capacity,
RMA, and/or delay engineering.
(Cont)
In preparation for developing security
requirements for the network, we first
need to determine security risks.
We will perform a risk analysis for both the
existing network and our planned network,
to gather information about current
security and requirements for new security
features.
Risk analysis often contains a risk assessment
matrix, which lists potential security problems,
system components that need to be
protected, and the perceived likelihood
48 and
Network Requirements
(Cont)
7. Other Requirements
8. The requirements Specification and Map
9. Conclusions
10. Exercises
50
Other Requirements
There are other requirements that apply
across all of the components of the
system:
Supplemental Performance Requirements
Financial requirements
Enterprise requirements
51
Other Requirements
(Cont)
Supplemental Performance
Requirements:
Three characteristics of performance that reflect
the customers impact on the network design
are:
1. Operational suitability: is a measure of how well
our network design can be configured,
monitored, and adjusted by the customers
operators.
2. Supportability: is a measure of how well the
customer can keep the system performing, as
designed, over the entire life of the system.
52
3. Confidence: is a measure of the ability of the
Other Requirements
(Cont)
Financial Requirements
The level of funding is usually a constraint to the
architecture and design;
Therefore, it is important to know what this level
is as early in the analysis process as possible, in
order to avoid creating an architecture and design
that are not economically feasible.
The financial requirements gathered during the
analysis process will be combined with the users
affordability requirements, to form a complete
financial picture of the network.
53
Other Requirements
(Cont)
Enterprise Requirements
There may be times when you have to
consider requirements for the network
that are commonly considered to be
enterprise requirements, such as phone,
FAX, voice, and video.
The integration of these types of
requirements over the same transmission
infrastructure as data is becoming
common, and such enterprise
requirements need to be considered
54
as
Requirements Analysis -
Concepts
1. Objectives
2. Background
3. User Requirements
4. Application Requirements
5. Device Requirements
6. Network Requirements
7. Other Requirements
57
The Requirements
Specification and Map
(Cont)
Example 2.2. Requirements Analysis for a Company LAN.
A first attempt was made to gather requirements for building a LAN network. The
results were as follows:
2. Each area in the building must support Fast Ethernet connections to the
backbone.
58
The Requirements Specification and
Map (Cont)
Example 2.2. ( Cont)
6. Engineering users have workstations with GigE NICs.
61
FIGURE 2.16 The Beginning of a Requirements Map
Requirements Analysis -
Concepts
1. Objectives
2. Background
3. User Requirements
4. Application Requirements
5. Device Requirements
6. Network Requirements
7. Other Requirements
8. The requirements Specification and Map
9. Conclusions
10. Exercises
62
Conclusion
The requirements analysis process is about
identifying, collecting, and evaluating requirements
for the network.
9. Conclusions
10. Exercises
64