Top-Down Model | Information Systems Development Process |
Business | Strategic business planning Business processing re engineering |
Applications | Systems development life cycle Systems analysis and design Application development life cycle |
Data | Database analysis and design Database distribution analysis |
Network | Network Development Life Cycle Network analysis and design |
Technology | Physical network design Network implementation Technology analysis |
Problem definition and feasibility study | ||
Strategic information system design; develop request for proposal(RFP) | ||
Develop RFP | ||
Evaluate RFPs and vendor demonstration | ||
Make or buy decision | ||
| ||
Final proposal | ||
Approval and implementation | ||
Monitoring and management |
Success Factor | Explanation |
---|---|
Identification of all potential customers and constituencies | No one likes to feel left out or that their input does not matter. |
Political awareness | Awareness of the corporate political environment as well as the overall corporate culture can have a large impact on a project's success |
Buy-in | As each stage is concluded, buy-in or agreement as to conclusions from all affected customer groups is of critical importance |
Communications | Do not assume others know what is going on with the project. Write memos, newsletters, send E-mail, or communicate with key people in person |
Detailed project documentation | Document every phone call and every meeting. Keep the project well organized from day one with copies of all correspondence |
Process/product awareness | Keep in mind what is the process and product for each step in the network analysis and design methodology |
Be honest with yourself | Identify weak points in your proposal and address them accordingly. Play "devil's advocate" with your proposal and prepare for possible objections |
Data Traffic Analysis Type | Data Traffic Analysis Description |
---|---|
Payload Type Analysis | Most locations will require at least voice an data. Video conferencing and multimedia may need to be supported. |
Transaction analysis | Use process flow / document flow analysis to identify each type of transaction |
Time Studies | Analyze when and how often each transaction type occurs |
Traffic Volume Analysis | used to map bandwidth requirements |
Mission-critical analysis | may dictate need for special data security procedures |
Protocol stack analysis | look at alternatives |
Acquisition | Operation | Incremental Change/Anticipated Growth | Total: | |||||
---|---|---|---|---|---|---|---|---|
Hardware |
|
|||||||
Software |
|
|||||||
Personnel |
|
|||||||
Communications |
|
|||||||
Facilities |
|
|||||||
Totals |
Analysis | Design | Simulation (performance modeling software) | Monitoring | Management | |
---|---|---|---|---|
Examples | SYNERGIS NEUSTAR | COMDISCO BONES MAKE Systems NETMAKER CACI Products COMNET III INTERNETIX LANSIM |
Monitoring Software Frontier Software NETSCOUT ProTools Foundation Manager Concord Communications TRACKER Protocol Analyzers Network General Distributed Sniffer |
Hewlett-Packard OPENVIEW IBM NETVIEW SUN SUNNET MANAGER |