Network Design Report For Vip Tv Australia Information Technology Essay

VIP TV Australia is a television broadcaster that delivers 30 channels of digital video content via satellite. After a successful take-over on the stock market in 2000, the new owners had neglected to update the existing network infrastructure. As technology improves, the current equipments have turn out to be unreliable and difficult to maintain. Therefore it is necessary to update the network infrastructure, so as to maintain and support VIP TV’s day-to-day operations efficiently.

VIP TV is currently utilizing Fiber Distributed Data Interface (FDDI) network. FDDI was once a popular networking standard owning to its increased reliability, ubiquity, latency, efficiency at a low cost. However, it has been rendered as obsolete presently. Nevertheless, Gigabit Ethernet has been implemented to replace the existing FDDI backbone.

VIP TV’s diverse networking specifications can be classified into two distinct categories, which are:

Digital Broadcast

Management Information Systems (MIS)

Digital Broadcast

In Digital Broadcasting, one has to address the requirements for the management of applications which deals with the broadcast of content, which includes the Network Operation Centre application and Automation File Server. Most of the On-Air functions and equipments of VIP TV are sensitive to timing latencies that exceeds 20ms. Therefore network latencies must be well-managed. A slight failure can cause a domino effect, causing latencies to be increased tremendously within the network. Video digitalizing in the network will be handled by a separate Serial Digital Interface network based on SMPTE 292 standard.

Management Information Systems

Management Information Systems compromises the traditional applications functions such as management, finance, marketing, human resourcing and engineering. This represents the second element of the business equation for VIP TV.

Analysis Product

Initial Conditions

Project Objective

The objective of the project is to update the existing network infrastructure of VIP TV by changing the existing FDDI ring topology network to a Gigabit Ethernet network.

Project Scope

The scope of the network design compromises 3 subnets for “Digital Platform”, “Management Information Systems” and its “Executive Officers”. Based on the specifications, there are 2 main sites, The Central Sydney and The Northern Sydney. There will also be 57 hosts in the entire network.

The distributions of 57 hosts to the users in the network are delegated as follows:

Digital Platform

Technical Operators X (5)

Schedule and Programming Staff X (2)

IT Techs X (1)

Management Information Systems

Scheduling and Programming X (10)

Accounts and Finance X (10)

Human Resources X (5)

Operators and IT Techs X (8)

Management Information Systems – Executive Officers

CEO X (3)

CIO X (3)

Strategy and Planning X (10)

Total hosts distributed: (57)

Design Architectures and Goals

Initial Design Architecture

FDDI Ring Technology Network

IBM AS400 Server

Proposed Design Architecture

Gigabit Ethernet Network

IBM iServer

The above shows the Initial Design Architecture and the Proposed Design Architecture. The main idea of the implementation is to upgrade the current FDDI Ring Technology Network to the proposed Gigabit Ethernet Network. We will change the IBM AS400 Server to support the IBM iServer too. Connections between Central Sydney and Northern Sydney will also be made. Generally, the existing network design will be improved.

Design Goals

Reduce current operating costs

Introduce a more reliable network Infrastructure

Establish simultaneous connections between multiple components in the network

Constraints of Network Design

The main constraint of implementing the proposed network design is the financial issue. In order to update the existing network infrastructure to the proposed design, a large sum of money is expected to be invested. With the management low financial budget, it is not easy to implement the entire design with the budget given. Changing of network equipments is another issue to take note of, as they are relatively costly. However, with careful financial planning and discussions for a higher budget from the management will help to avoid the problem of financial shortage.

Requirement Specifications

User Requirements

Index

Requirements

Analysis Outcome

Relates To

Priority

1

57 Hosts

Distributions to Users

Hosts Distributed

Management

Nil

Network Requirements

Index

Requirements

Analysis Outcome

Relates To

Priority

1

Good TV

transmission quality

Clients Satisfaction

Management

High

2

Replace

FDDI Network

FDDI Network Replaced

Network Team

High

3

Gigabit Ethernet connections supported

in every buildings

Gigabit Ethernet

Connections Implemented

Management

Medium

4

. Confirmation of fibre optic suitability for

Gigabit Ethernet

Suitability Confirmed

Network Team

Low

5

Manage Latencies in digital broadcast environment

Latencies Managed

Network Team

High

6

Prioritise reliability and availability for MIS applications

MIS Applications Prioritized

Management

& Network Team

High

Application Requirements

Index

Requirements

Analysis Outcome

Relates To

Priority

1

Ensure Business services

available & accessible

Available & Accessible

Management

Medium

2

Ensure NOC equipments sensitive to latencies when

exceed 20ms

NOC Equipments

Sensitivity Ensured

Network Team

High

3

NOC Maximum file sizes transferred within 20ms, time frame is 5Kb

upload & download

Requirement Met

Network Team

High

4

Ensure AFS equipment sensitive to latencies when

exceed 20 ms

AFS Equipments

Sensitivity Ensured

Network Team

High

5

AFS Maximum file sizes transferred from NOC to POD, time frame is 2Kb

Read also  Study On The Insourcing And Outsourcing Process Information Technology Essay

upload & download

Requirement Met

Network Team

High

Index

Requirements

Analysis Outcome

Relates To

Priority

6

Replace

IBM AS400 Servers

IBM AS400

Servers Replaced

Management

High

7

Setup firewall to block all non-route protocols

Firewall Setup Successfully

Network Team

Low

8

Integrate HP Open view with critical business processes

HP Open View Integrated

Management

High

9

Deploy network monitoring for HP Open view

HP Open View Deployed

Management

High

Device Requirements

Index

Requirements

Analysis Outcome

Relates To

Priority

1

Ensure POD devices sensitive to latencies when exceed 20ms

POD Devices

Sensitivity Ensured

Users & Network Team

High

2

Ensure MuX computers sensitive to latencies when

exceed 20ms

MuX Equipments

Sensitivity Ensured

Users & Network Team

High

3

Ensure MuX computers transferred within 20ms, time frame is 1Kb

upload & 5kb download

Requirement Met

Network Team

High

Application Requirements Map

IBM iServer

Electronic Program Menu Information

HP Overview System using SMNP

Flow Analysis

Based on the specifications and requirements given, we will need to derive a flow model to represent the data flow in the company’s internal network system. This is done by first identifying the different sources of data and their individual requirements.

Flow Models

North Sydney Operations Centre (NOC)

Chief database keep tracks of the programming over the company’s channels. Programmes and advertising names are then entered here along with the schedules that have been composed for programming. Information from NOC is sent to the Multiplexer Computer and the Automation File Server (AFS).

Requirements:

Timing latencies may not exceed 20 ms

Maximum file size transmitted within 20ms time frame: 5kB upload and 5kB download

Network Operations Centre (NOC) flow

Automation File Server (AFS)

Central event control point for the digital video platform play out devices (PODs). It translates programmed events into triggers of PODs, plays programmes and forward checks, the availability of advertisements and programmes.

Requirements:

Timing latencies may not exceed 20 ms.

Maximum file size transmitted within 20ms time frame: 2kB upload and 2kB download

Automation File Server (AFS)

Play out Devices (PODs)

PODs Comprise of hard disc drives, digital tape recorders and etc.

Requirements:

Timing latencies may not exceed 20 ms.

Maximum file size transmitted within 20ms time frame: 2kB upload and 2kB download

Play out Devices (PODs)

Multiplexer and Multiplexer Computer

Multiplexes video feeds with embedded audio and graphics information onto a single carrier for up-linking to the satellite.

Requirements:

Timing latencies may not exceed 20 ms.

Maximum file size transmitted within 20ms time frame: 1kB upload and 5kB download

Multiplexer and Multiplexer Computer Flow

System Application and Products (SAP) and Management Information Systems (MIS)

The existing IBM AS400 Servers will be replaced with an IBM iServer. The supply chain software module of SAP will be implemented. This would support the current business goals by enabling greater monitoring of critical revenue generation processes.

Requirements:

Timing latencies may not exceed 20 ms.

Maximum file size transmitted within 20ms time frame: 2kB upload and 2kB download

SAP and MIS Flow

Network Monitoring System and Simple Network Management Protocol (SNMP)

To achieve a more integrated implementation of HP OpenView with critical business processes, it will monitor both the on-air playback systems and the SAP system.

Requirements:

Timing latencies may not exceed 20 ms.

Maximum file size transmitted within 20ms time frame: 1kB upload and 1kB download

Network Monitoring Flow

Identified Flow Maps

Flow Information for Prioritization

Functions

Performance

No. of Users

Model

Capacity

Reliability (%)

Delay

Network Operations Centre (NOC)

Client-Server

5kB upload

5kB download

99.95%

20 ms

8

Automation File Server (AFS)

Client-Server

2kB upload

2kB download

99.99%

20 ms

Nil

Play Out Devices (PODs)

Client-Server

2kB upload

2kB download

99.99%

20 ms

Nil

Multiplexer and Multiplexer Computer

Peer-to-Peer

1kB upload

5kB download

99.99%

20 ms

Nil

SAP and MIS

Client-Server

2kB upload

2kB download

99.999%

20 ms

57

Network Monitoring

Distributed-Computing

1kB upload

1kB download

99.999%

20 ms

9

Flows Prioritized by Number of Users Served

Functions

Performance

No. of Users

Priority

Model

Capacity

Reliability (%)

Delay

SAP and MIS

Client-Server

2kB upload

2kB download

99.999%

20 ms

57

1

Network Monitoring

Distributed-Computing

1kB upload

1kB download

99.999%

20 ms

9

2

Network Operations Centre (NOC)

Client-Server

5kB upload

5kB download

99.95%

20 ms

8

3

Automation File Server (AFS)

Client-Server

2kB upload

2kB download

99.99%

20 ms

Nil

3

Play Out Devices (PODs)

Client-Server

2kB upload

2kB download

99.99%

20 ms

Nil

3

Multiplexer and Multiplexer Computer

Peer-to-Peer

1kB upload

5kB download

99.99%

20 ms

Nil

3

Flows Prioritized by Reliability

Functions

Performance

No. of Users

Priority

Model

Capacity

Reliability (%)

Delay

SAP and MIS

Client-Server

2kB upload

2kB download

99.999%

20 ms

57

1

Network Monitoring

Distributed-Computing

1kB upload

1kB download

99.999%

20 ms

9

1

Automation File Server (AFS)

Client-Server

2kB upload

2kB download

99.99%

20 ms

2

Play Out Devices (PODs)

Client-Server

Read also  The Introduction To Argos And Amazon Information Technology Essay

2kB upload

2kB download

99.99%

20 ms

2

Multiplexer and Multiplexer Computer

Peer-to-Peer

1kB upload

5kB download

99.99%

20 ms

2

Network Operations Centre (NOC)

Client-Server

5kB upload

5kB download

99.95%

20 ms

8

3

Architecture Products

Network Architecture

In the Network Architecture, we had made an analysis and shall present the disadvantages of using the current Token Ring Topology and the advantages of the proposed Tree Topology. In this implementation, we will be replacing the Token Ring Topology to the Tree Topology with the combination of Star Topology, to effectively enhance the whole network architecture. The proposed solution is stable and reliable to handle large volumes of data and users. The ability to scale in for future upgrades and changes also meets the core requirements for VIP TV Australia.

Disadvantages of Token Ring Topology

Every nodes connected together are in a circle or ring connection.

If one node is having problems or connection is lost, the entire network will be down

It is tough to analyze and identify the problem

Much effort will be required for problem identification

Cost for troubleshooting will be costly and unnecessary

Only the node with the token will be able to transmit data to another node

Entire network will be down when upgrading individual nodes

Advantages of Tree Topology

Every nodes connected together are using a point-to-point wiring to a centralized hub or switch.

If one node is having problems, other nodes will not be affected

It is easier to analyze and identify the problem

Transmission of data can be done together.

Entire network will not be down when upgrading individual nodes

The Tree Topology Diagram

The Network Design Implementation

Addressing and Routing

In Address and Routing, the main objective is to help VIP TV keep its costs low by reducing unnecessary operating costs and produce scalable solutions. In order to achieve the above, we will implement by using Variable-Length Sub-Netting (VLSM). This will minimize the use of address spaces and allow unused address spaces for other further expansion.

Addressing and Routing Architecture

Workgroup

Network Address

Subnet Mask

Broadcast Address

MIS – Operations Centre

198.62.240.0

255.255.255.192

198.62.240.63

MIS – Executive Officers

198.62.240.64

255.255.255.224

198.62.240.95

Digital Platform -Operations Centre

198.62.240.96

255.255.255.240

198.62.240.111

Current Network Requirements

Network Requirement Table

Centre / Office Name

Role of Staff

Number of staffs

MIS – Operations Centre

Schedule and Programming

10

Accounts and Finance

10

Human Resources

15

Operators and IT Techs

8

Total:

33

MIS – Executive Office

CEO

3

CIO

3

Strategy and Planning

10

Total:

16

Digital Platform – Operations Centre

Technical Operators

5

Schedule and Programming

2

IT Techs

1

Total:

8

Network Addressing Requirements

Work Group

No. of Host Required

Network Address

Subnet Mask

Mask

Max. No. of Hosts

Useable IP Address Range

Broadcast Address

MIS – Operations Centre

33

198.62.240.0

255.255.255.192

/26

62

198.62.240.1 – 198.62.240.62

198.62.240.63

MIS – Executive Officers

16

198.62.240.64

255.255.255.224

/27

30

198.62.240.65 -198.62.240.94

198.62.240.95

Digital Platform – Operations Centre

8

198.62.240.96

255.255.255.240

/28

14

198.62.240.97 – 198.62.240.110

198.62.240.111

Device Type

Manufacturer

Model Number

Number of devices required

Routers

Net Gear

Range Max NEXT

4

Firewalls

CISCO

ASA 5580

3

Port switches (4)

CISCO

MDS 9000

1

Port switches (24)

CISCO

MDS 9100

1

Port switches (34)

CISCO

MDS 9100

1

Port switches (40)

CISCO

MDS 9100

1

MuX

CISCO

6920 Rate Mux

1

Servers

IBM

iServer

2

Workstations

Apple

iMac

1Network Device Requirements

Network Management

Network Management refers to a broad range of functions associated with the management and control of a network. It can be viewed as a structure containing multiple layers such as Business Management, Service Management, Network Management, Element Management, and Network-Element Management. Network Management can be divided into two basic functions:

Transport of management information across the system

Management of network management information elements.

These functions consist of a variety of tasks consisting of Monitoring, Configuring, Troubleshooting and many others which are performed by users, administrators and network personnel. These tasks correspond to four categories of network management which we are implementing.

Event Notification Monitoring

Trend Analysis and Planning

Configuration of Network Parameters

Network Troubleshooting

Network Management Mechanism

Network management protocol is one of the popular network management mechanisms. The network management protocol provides functionality for the collection and configuration of parameters from the various network devices. The network management protocol which is adopted by VIP TV is the Simple Network Management Protocol (SNMP).

SNMP collects and configures parameters through simple commands. There are also provisions for the unsolicited notification of events through traps. Traps are user-configurable thresholds for parameters which crossed, will send the values of parameters to a specific location. Parameters that are accessible via SNMP are grouped into Management Information Bases (MIBs).

One of the advantages of SNMP is that it makes it easier for an administrator to manage devices from different vendors by delivering management information in a common, non-proprietary manner. Another advantage of SNMP is that it can acquire data that normally could not be picked up by other network devices and it is easier to instrument network devices with SNMP.

Read also  History Of Intruder Knowledge Versus Attack Sophistication Information Technology Essay

HP OpenView and ITIL

The heart of VIP TV existing network monitoring system is a HP OpenView system using SNMP. There is a requirement from the upper management, for a more integrated of HP OpenView with critical business processes to be implemented. This is achieved by utilizing the Information Technology Infrastructure Library (ITIL) that HP OpenView supports to develop service assurance monitoring of two critical value chains, namely the On-air Playback Systems and Revenue Generation.

ITIL is a set of guidelines and practices for the management of IT services. It provides a cohesive set of best practices as well as documentations on how to plan, deliver and support IT service features. HP OpenView was one of the early adopters of IT Service Management and has a rich implementation of features that support ITIL.

HP OpenView and ITIL Integration

The diagram below shows how HP OpenView corresponds to the ITIL processes. The upper portion of the diagram illustrates the ITIL functions that supports IT Service Delivery. While the lower portion of the diagram illustrates the ITIL functions that supports IT Service Support.

HP OpenView and ITIL Integration

OpenView Tools Architecture Components

The following table lists the OpenView tools that correlate to the functions of ITIL and the OpenView Architecture Components.

OpenView Architecture Components

ITIL Functions

OpenView Supporting Tools

Fault Management

Incident Management,

Problem Management

Network Monitoring Tools, Operations, ECS, TeMIP, Application SPIs

Performance

Management

Capacity Management,

Availability Management,

Change Management

Internet Services, Performance Insight, Performance Manager, Problem Diagnosis, Storage Optimizer, Transaction Analyzer

Service Management

Configuration Management

Operations, Service Reporter, Service Navigator, Service Desk

Customer Experience

Service Level Management

Internet Services, Web Transaction Observer, Service Information Portal

Service Delivery

Configuration Management

Service Activator, TeMIP Framework

Service Usage

Financial Management,

Capacity Management

Dynamic Net Value Analyzer, Enterprise Usage Manager, Storage Area Manager

Mechanism Monitoring

The monitoring process involves collecting of data about the desired characteristics, processing, displaying and archiving. The data is collected through SNMP and will need to be processed as they may not reflect the characteristics we desire to monitor.

Sets of raw and processed data will be displayed on the standard monitor in VIP TV, IT department. These data will only be available to the IT Technicians and Operators in graph forms and text logs.

These data will also be saved to a storage unit at the network management server where they would stay for a period of two years before they are moved to the tertiary storage and the archive storage. The reason for this is that yearly audits can be done at the tertiary storage before they are moved to the archives for permanent storage.

Event Notification Monitoring

An event is a situation that occurs in the network that is noteworthy. This includes problems or failures in the network devices across the network or when a characteristic crosses a certain threshold value. Events are essential to the IT operators and technicians as it helps them to identify problems early and troubleshoots them. Depending on the type of event, it may set off an alarm on the operator’s workstation when it occurs and the event will also be noted in a log file for further review. It is essential that we detects events early and therefore, real-time analysis will be implemented whereby thresholds or boundaries may be set on end-to-end , per-link, or per-element characteristics for short term or immediate notification of events.

Trend Analysis and Planning Monitoring

The same characteristics are used for event monitoring for trend analysis and planning. Trend analysis is the act of collecting information and attempting to derive a pattern or trend from the information. In the premise of a network environment, trend analysis is used to determine long-term network behaviours or trends to plan for future network growth.

With ITIL, HP OpenView could specifically function in support of ITIL functions which allow the HP OpenView system to monitor network traffic more efficiently. All configurations and incident information will be consolidated in one common database. This will increase efficiency and data transfer rate. This will also bring additional benefits such as automated root cause analysis, priority based service and trend analysis.

Mechanism Instrumentations

Instrumentation refers to a set of essential tools needed for monitoring and probing of network management data. These tools can be combined with monitoring, display, storage and processing to form a complete management system. Monitoring tools which would be used includes utilities such as ping, Traceroute and TCPdump. For direct-access mechanisms, telnet and FTP will be utilized.

Mechanism Configurations

Architecture Consideration

In-band and out-band Management

Performances

Performances Goals

Performances Mechanism Applications

Security and Privacy Plans

Network Security

Systems Security

Password Security

Email Security

Order Now

Order Now

Type of Paper
Subject
Deadline
Number of Pages
(275 words)