انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة
الكلية كلية تكنولوجيا المعلومات
القسم قسم شبكات المعلومات
المرحلة 4
أستاذ المادة سعاد عبد الاله عبد الحسين الاسدي
18/10/2016 12:13:28
PPDIOO is methodology that derived from the Cisco Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) methodology.
It reflects a network’s lifecycle. Prepare Phase: The Prepare phase involves establishing the organizational (business) requirements, developing a network strategy, and proposing a high-level conceptual architecture, identifying technologies that can best support the architecture. Plan Phase: This phase involves identifying the network requirements, which are based on the goals for the network, where the network will be installed, who will require which network services.
The Plan phase also involves assessing the sites where the network will be installed and any existing networks, and performing a gap analysis to determine if the existing system infrastructure, sites, and operational environment can support the proposed system.
A project plan helps manage the tasks, responsibilities, critical milestones, and resources required to implement the changes to the network.
The output of this phase is a set of network requirements. Design Phase: This phase involves designing the network according to the initial requirements determined in the Plan phase, incorporating any additional data gathered during network analysis and through discussion with managers and network users. The network design specification that is produced is a comprehensive detailed design that meets current business and technical requirements and incorporates specifications to support availability, reliability, security, scalability, and performance.
This design specification provides the basis for the implementation activities. Implementation Phase: Implementation and verification begins after the design has been approved.
The network and any additional components are built according to the design specifications, with the goal of integrating devices without disrupting the existing network or creating points of vulnerability.
المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .
|