Network Questions
Usability
- How easy is it to set up and configure the network and related services?
- How reliable and robust is the network and related services in handling traffic and user demand?
- How easily can the network and related services be scaled to accommodate growth?
- How secure is the network and related services in protecting against potential threats?
- How well does the network and related services integrate with other systems and services in the architecture?
- How user-friendly and intuitive are the interfaces for managing and monitoring the network and related services?
- How well does the network and related services support remote access and connectivity for users?
- How well does the network and related services support disaster recovery and business continuity?
- How well does the network and related services support compliance with industry regulations and standards?
- How well does the network and related services handle traffic routing and load balancing?
Cost
- What are the costs associated with setting up and configuring the network and related services?
- How does the cost of the network and related services change as the scale of usage increases?
- Are there any additional costs for scaling or expanding the network and related services?
- What are costs for maintaining and updating the network and related services?
- What are costs for securing the network and related services?
- What are costs for integrating the network and related services with other systems and services in the architecture?
- What are costs for remote access and connectivity for users?
- What are costs for disaster recovery and business continuity?
- What are costs for compliance with industry regulations and standards?
- What are costs for traffic routing and load balancing?
- What are costs for monitoring and managing the network and related services?
- What are costs for licensing or subscriptions for the network and related services?
- What are costs for data transfer or bandwidth usage?
- What are costs for data storage associated with the network and related services?
Reliability
- How well does the Networking service handle:
- failures?
- network outages and disruptions?
- security breaches and attacks?
- natural disasters and other unexpected events?
- power outages or other infrastructure failures?
- software bugs and other technical issues?
- human errors?
- capacity issues?
- network congestion?
- data corruption or loss?
- other types of incidents?
- How reliable is the network and related services in maintaining uptime and availability?
- Are there any built-in redundancy and failover mechanisms in place?
- How often does the network and related services have scheduled maintenance?
- Are there any service level agreements (SLAs) in place for the network and related services?
Operations
How well does the Networking service support:
- DevOps practices and processes?
- continuous integration and delivery?
- automation and orchestration?
- monitoring and observability?
- incident management and response?
- change management and rollbacks?
- versioning and rollouts?
- testing and validation?
- logging and auditing?
- backup and disaster recovery?
- capacity planning and scaling?
- infrastructure as code?
- maintenance and updates?
- Hollaboration and communication among teams?
- compliance and security?
Performance
- How many layers are in the network architecture?
- Review the network design documentation: Look for diagrams or schematics that show the overall layout of the network and its various components.
- Identify the different functional areas of the network: These may include areas such as access, distribution, and core layers.
- Evaluate the logical and physical separation of the network: Look for areas of the network that are physically or logically separate, such as different VLANs or subnets.
- Identify the devices used in each layer: Look for devices such as switches, routers, and firewalls that are used in different layers of the network.
- Evaluate the routing protocols and topologies used: Look for routing protocols such as OSPF and BGP, and topologies such as star, ring, and mesh that are used in different layers of the network.
- Identify the services and functions provided by each layer: Look for services such as security, traffic management
- What type of network topology is being used (e.g. star, mesh, ring)?
- physically observe the layout of the network, including the location of nodes (devices) and the connections between them
- a star topology will have a central hub or switch to which all nodes are connected,
- a mesh topology will have multiple connections between nodes.
- network scanning and mapping tools
- network monitoring and management softwar
- documentation
- What is the total number of nodes in the network?
- What is the total number of hops in the network?
- What is the total number of devices and services in the network?
- Is the network segmented into multiple VPCs?
- How many VPCs are in the network?
- What type of VPN is being used?
- What is the throughput of the VPN connection?
- What is the latency of the VPN connection?
- How many tunnels are established by the VPN connection?
- What is the maximum number of concurrent connections supported by the VPN?
- What is the total number of bytes transmitted in the VPN connection?
- Are any compression algorithms being used with the VPN connection?
- Are any encryption algorithms being used with the VPN connection?
- What is the total number of packets transmitted in the VPN connection?
- What is the total number of hops in the VPN connection?
- What is the maximum number of simultaneous VPN tunnels that can be established?
- How much jitter is expected in the VPN connection?
- What are the maximum allowed retransmission attempts in the VPN connection?
Security
- What type of authentication is used to access the Network, VPC, VPN?
- How are users and privileged accounts authenticated?
- What type of encryption is used for data transmission?
- What type of encryption is used for data at rest?
- Is there an audit logging system in place for tracking user activities?
- Is there a vulnerability scanning system in place to detect and address security threats?
- Is there a system in place to detect and address malicious attacks and intrusions?
- Is there an intrusion detection system in place to detect and address malicious network activities?
- Is there a method to alert on anomalous activities and alert system administrators?
- What is the process for patching and updating systems and applications?
- How is data transferred between the Network, VPC, and VPN?
- Is there a system in place for managing access control for users?
- Is there a system in place for monitoring the network, VPC, and VPN for suspicious activity?
- How is access to the Network, VPC, and VPN controlled?
- What type of firewalls are in place to protect the Network, VPC, and VPN?
- Are there any threat detection systems in place to identify malicious activity?
- How is data in transit protected from unauthorized access?
- Are there any methods in place to detect data exfiltration?
- Are there any methods in place to protect data from ransomware attacks?
- Are there any methods in place to mitigate Denial of Service (DoS) attacks?