Designing your MOM Solution

The primary purpose of the designing phase is to document your current network topology, and to map your MOM solution to your current topology. This design phase also includes designing the user experience and planning for hardware requirements, based on the resulting topology design. This phase of the project requires cross-team collaboration to obtain an accurate picture of your current network topology, and to propose and review MOM topologies. Key roles during this phase are the MOM Topology Designer and the Network Security Designer. These two roles work together to ensure that the MOM implementation works with your organizations network security requirements and security boundaries. The main sections of the design phase are:

  • Evaluate and Map the Current Network Topology

  • Identify and Map Computer Monitoring Scenarios

  • Identify and Map Network Operations Center Monitoring Scenarios

  • Identify and Map Reporting and Reporting Database Scenarios

  • Design the MOM Topology

Evaluate and Map the Current Network Topology

Start the design phase by gathering accurate topology maps of your current network environment. Include data that might impact the deployment of MOM components and agents, including the following:

  • Link speeds between remote locations

  • Domain trust relationships

  • Firewalls

  • Also, document current and future plans for:

  • Network growth

  • Significant modifications to the network infrastructure

Identify and Map Computer Monitoring Scenarios

Create a separate map to diagram the proposed computer monitoring scenarios, including:

  • Physical location of computers.

  • Location of applications and computers to be monitored.

  • Service level monitoring--agent and/or agentless monitoring requirements.

  • Security features (untrusted domains and firewalls).

Identify and Map Network Operations Center Monitoring Scenarios

Create a separate map to diagram the Network Operations Centers, and data centers that require access to MOM functionality, including the following:

  • Physical location.

  • Number and type of MOM users.

  • MOM functionality required by MOM users.

  • Security features (untrusted domains and firewalls).

Identify and Map Reporting and Reporting Database Scenarios

Create a separate map to diagram the Reporting and Reporting database components, including the following:

  • Physical location of Reporting servers.

  • Data storage considerations.

  • Security considerations, including security access for users running and viewing reports.