Skip to main content

Network Questions

Usability

  • How easy is it to set up and configure the network and related services?
  • How reliable and robust is the network and related services in handling traffic and user demand?
  • How easily can the network and related services be scaled to accommodate growth?
  • How secure is the network and related services in protecting against potential threats?
  • How well does the network and related services integrate with other systems and services in the architecture?
  • How user-friendly and intuitive are the interfaces for managing and monitoring the network and related services?
  • How well does the network and related services support remote access and connectivity for users?
  • How well does the network and related services support disaster recovery and business continuity?
  • How well does the network and related services support compliance with industry regulations and standards?
  • How well does the network and related services handle traffic routing and load balancing?

Cost

  • What are the costs associated with setting up and configuring the network and related services?
  • How does the cost of the network and related services change as the scale of usage increases?
  • Are there any additional costs for scaling or expanding the network and related services?
  • What are costs for maintaining and updating the network and related services?
  • What are costs for securing the network and related services?
  • What are costs for integrating the network and related services with other systems and services in the architecture?
  • What are costs for remote access and connectivity for users?
  • What are costs for disaster recovery and business continuity?
  • What are costs for compliance with industry regulations and standards?
  • What are costs for traffic routing and load balancing?
  • What are costs for monitoring and managing the network and related services?
  • What are costs for licensing or subscriptions for the network and related services?
  • What are costs for data transfer or bandwidth usage?
  • What are costs for data storage associated with the network and related services?

Reliability

  • How well does the Networking service handle:
    • failures?
    • network outages and disruptions?
    • security breaches and attacks?
    • natural disasters and other unexpected events?
    • power outages or other infrastructure failures?
    • software bugs and other technical issues?
    • human errors?
    • capacity issues?
    • network congestion?
    • data corruption or loss?
    • other types of incidents?
  • How reliable is the network and related services in maintaining uptime and availability?
  • Are there any built-in redundancy and failover mechanisms in place?
  • How often does the network and related services have scheduled maintenance?
  • Are there any service level agreements (SLAs) in place for the network and related services?

Operations

How well does the Networking service support:

  • DevOps practices and processes?
  • continuous integration and delivery?
  • automation and orchestration?
  • monitoring and observability?
  • incident management and response?
  • change management and rollbacks?
  • versioning and rollouts?
  • testing and validation?
  • logging and auditing?
  • backup and disaster recovery?
  • capacity planning and scaling?
  • infrastructure as code?
  • maintenance and updates?
  • Hollaboration and communication among teams?
  • compliance and security?

Performance

  • How many layers are in the network architecture?
    • Review the network design documentation: Look for diagrams or schematics that show the overall layout of the network and its various components.
    • Identify the different functional areas of the network: These may include areas such as access, distribution, and core layers.
    • Evaluate the logical and physical separation of the network: Look for areas of the network that are physically or logically separate, such as different VLANs or subnets.
    • Identify the devices used in each layer: Look for devices such as switches, routers, and firewalls that are used in different layers of the network.
    • Evaluate the routing protocols and topologies used: Look for routing protocols such as OSPF and BGP, and topologies such as star, ring, and mesh that are used in different layers of the network.
    • Identify the services and functions provided by each layer: Look for services such as security, traffic management
  • What type of network topology is being used (e.g. star, mesh, ring)?
    • physically observe the layout of the network, including the location of nodes (devices) and the connections between them
    • a star topology will have a central hub or switch to which all nodes are connected,
    • a mesh topology will have multiple connections between nodes.
    • network scanning and mapping tools
    • network monitoring and management softwar
    • documentation
  • What is the total number of nodes in the network?
  • What is the total number of hops in the network?
  • What is the total number of devices and services in the network?
  • Is the network segmented into multiple VPCs?
  • How many VPCs are in the network?
  • What type of VPN is being used?
  • What is the throughput of the VPN connection?
  • What is the latency of the VPN connection?
  • How many tunnels are established by the VPN connection?
  • What is the maximum number of concurrent connections supported by the VPN?
  • What is the total number of bytes transmitted in the VPN connection?
  • Are any compression algorithms being used with the VPN connection?
  • Are any encryption algorithms being used with the VPN connection?
  • What is the total number of packets transmitted in the VPN connection?
  • What is the total number of hops in the VPN connection?
  • What is the maximum number of simultaneous VPN tunnels that can be established?
  • How much jitter is expected in the VPN connection?
  • What are the maximum allowed retransmission attempts in the VPN connection?

Security

  • What type of authentication is used to access the Network, VPC, VPN?
  • How are users and privileged accounts authenticated?
  • What type of encryption is used for data transmission?
  • What type of encryption is used for data at rest?
  • Is there an audit logging system in place for tracking user activities?
  • Is there a vulnerability scanning system in place to detect and address security threats?
  • Is there a system in place to detect and address malicious attacks and intrusions?
  • Is there an intrusion detection system in place to detect and address malicious network activities?
  • Is there a method to alert on anomalous activities and alert system administrators?
  • What is the process for patching and updating systems and applications?
  • How is data transferred between the Network, VPC, and VPN?
  • Is there a system in place for managing access control for users?
  • Is there a system in place for monitoring the network, VPC, and VPN for suspicious activity?
  • How is access to the Network, VPC, and VPN controlled?
  • What type of firewalls are in place to protect the Network, VPC, and VPN?
  • Are there any threat detection systems in place to identify malicious activity?
  • How is data in transit protected from unauthorized access?
  • Are there any methods in place to detect data exfiltration?
  • Are there any methods in place to protect data from ransomware attacks?
  • Are there any methods in place to mitigate Denial of Service (DoS) attacks?