| Top-Down Model | Information Systems Development Process |
| Business | Strategic business planning Business processing re engineering |
| Applications | Systems development life cycle Systems analysis and design Application development life cycle |
| Data | Database analysis and design Database distribution analysis |
| Network | Network Development Life Cycle Network analysis and design |
| Technology | Physical network design Network implementation Technology analysis |
| Problem definition and feasibility study | ||
| Strategic information system design; develop request for proposal(RFP) | ||
| Develop RFP | ||
| Evaluate RFPs and vendor demonstration | ||
| Make or buy decision | ||
| ||
| Final proposal | ||
| Approval and implementation | ||
| Monitoring and management |
| Success Factor | Explanation |
|---|---|
| Identification of all potential customers and constituencies | No one likes to feel left out or that their input does not matter. |
| Political awareness | Awareness of the corporate political environment as well as the overall corporate culture can have a large impact on a project's success |
| Buy-in | As each stage is concluded, buy-in or agreement as to conclusions from all affected customer groups is of critical importance |
| Communications | Do not assume others know what is going on with the project. Write memos, newsletters, send E-mail, or communicate with key people in person |
| Detailed project documentation | Document every phone call and every meeting. Keep the project well organized from day one with copies of all correspondence |
| Process/product awareness | Keep in mind what is the process and product for each step in the network analysis and design methodology |
| Be honest with yourself | Identify weak points in your proposal and address them accordingly. Play "devil's advocate" with your proposal and prepare for possible objections |
| Data Traffic Analysis Type | Data Traffic Analysis Description |
|---|---|
| Payload Type Analysis | Most locations will require at least voice an data. Video conferencing and multimedia may need to be supported. |
| Transaction analysis | Use process flow / document flow analysis to identify each type of transaction |
| Time Studies | Analyze when and how often each transaction type occurs |
| Traffic Volume Analysis | used to map bandwidth requirements |
| Mission-critical analysis | may dictate need for special data security procedures |
| Protocol stack analysis | look at alternatives |
| Acquisition | Operation | Incremental Change/Anticipated Growth | Total: | |||||
|---|---|---|---|---|---|---|---|---|
| Hardware |
|
|||||||
| Software |
|
|||||||
| Personnel |
|
|||||||
| Communications |
|
|||||||
| Facilities |
|
|||||||
| Totals |
| Analysis | Design | Simulation (performance modeling software) | Monitoring | Management | |
|---|---|---|---|---|
| Examples | SYNERGIS NEUSTAR | COMDISCO BONES MAKE Systems NETMAKER CACI Products COMNET III INTERNETIX LANSIM |
Monitoring Software Frontier Software NETSCOUT ProTools Foundation Manager Concord Communications TRACKER Protocol Analyzers Network General Distributed Sniffer |
Hewlett-Packard OPENVIEW IBM NETVIEW SUN SUNNET MANAGER |