Professional Documents
Culture Documents
Physical Design
Customer Name
Directions for using template:
Read the Guidance (Arial blue font in brackets) to understand the information that
should be placed in each section of this template. Then delete the Guidance and
replace the placeholder within <<Begin text here>> with your response. There may be
additional Guidance in the Appendix of some documents, which should also be
deleted once it has been used.
Some templates have four levels of headings. They are not indented, but can be
differentiated by font type and size:
Heading 1 Arial Bold 16 font
Heading 2 Arial Bold Italic 14 font
Heading 3 Arial Bold 13 font
Heading 3 Arial Bold Italic 12 font
You may elect to indent sections for readability.
Author
Author Position
Date
Version: 1.0
07/12/2016
07/12/2016
Reviewers
Name
Version
Version Approved
Distribution
Name
Document Properties
Item
Details
Document Title Physical Design
Author
Creation Date
Last Updated
07/12/2016
Change Reference
Position
Position
Date
Table of Contents
Physical Design Summary..............................................................................................4
Environment Constraints, and Assumptions...................................................................4
Dependencies..................................................................................................................4
Project Dependencies.................................................................................................4
Hardware Environment Dependencies.......................................................................4
Software Environment Dependencies........................................................................5
Application Development...............................................................................................5
User Services (UI User Interface)...........................................................................5
Component <<Component Name>> Design........................................................5
Business Services (Middle-tier Business Logic)........................................................7
Component <<Component Name>> Design........................................................7
Data Services Tier.......................................................................................................9
Component <<Component Name>> Design........................................................9
Database Design...................................................................................................11
Infrastructure Deployment............................................................................................12
Solution Topologies..................................................................................................12
Intranet Communication...........................................................................................12
Services.................................................................................................................12
Protocols...............................................................................................................12
Security.................................................................................................................13
Internet Communication...........................................................................................13
Services.................................................................................................................13
Protocols...............................................................................................................13
Security.................................................................................................................13
Extranet Communication..........................................................................................13
Services.................................................................................................................14
Protocols...............................................................................................................14
Security.................................................................................................................14
Network Diagnostics Impact....................................................................................14
Authentication/Active Directory/NT Domain Strategy............................................14
Addressing................................................................................................................14
Client Tier.............................................................................................................15
Server Tier............................................................................................................15
DHCP Configurations...........................................................................................15
Name Resolution......................................................................................................15
WINS Configurations...........................................................................................15
DNS Configurations.............................................................................................15
Remote Access..........................................................................................................15
Naming Standards....................................................................................................15
Server Placement......................................................................................................15
Server Sizing............................................................................................................16
Administrative Model...............................................................................................16
Individual Product/Service Features to be Implemented..........................................16
Service <<Service Name>> Configuration..........................................................16
07/12/2016
Configuration of Environment.................................................................................16
Security Strategy..........................................................................................................16
Security Design Implications...................................................................................17
Security Implementation Issues................................................................................17
Security Operational Support Considerations..........................................................17
Installation and Setup...................................................................................................17
Hardware Requirements...........................................................................................17
Software Requirements............................................................................................17
Un-Installation..............................................................................................................17
Design for Deployment................................................................................................18
Design for Migration....................................................................................................18
Design for Integration...................................................................................................18
Accessibility Support....................................................................................................18
Multi-language Support................................................................................................18
Design for Supportability.............................................................................................18
Logging/Eventing.....................................................................................................19
Error Messages.........................................................................................................19
Diagnostic Tools.......................................................................................................19
Recovery from Corruption/Error Messaging............................................................19
Issues............................................................................................................................19
Appendix......................................................................................................................20
07/12/2016
07/12/2016
Dependencies
[Description: The Dependencies section identifies the project, hardware, and
software dependencies and resources required to enable development to begin.]
Project Dependencies
[Description: The Project Dependencies section defines project-related conditions
that must be in place for the development team to be successful. This may include
having specifically skilled people on the team, depending on an external project, or
requiring a deliverable from a related project team.]
07/12/2016
Application Development
[Description: The Application Development section describes the design for any
applications that exist within the solution. Applications may include custom code and
components. The sub-sections provide topic ideas that may help build a cohesive
picture of the physical implementation.]
Behavioral Summary
[Description: The Behavioral Summary section describes the expected component
behavior, including a high-level description of services and value.]
07/12/2016
Justification]
07/12/2016
Behavioral Summary
[Description: The Behavioral Summary section describes the expected component
behavior, including a high-level description of services and value.]
07/12/2016
07/12/2016
Behavioral Summary
[Description: The Behavioral Summary section describes the expected component
behavior, including a high-level description of services and value.]
07/12/2016
Database Design
[Description: The Database Design section defines the complete database
strategy.]
07/12/2016
Database Schema
[Description: The Database Schema section defines the databases, table structures,
and field/record descriptions and their structures. The database schema can be
represented using a schema-modeling tool.]
Infrastructure Deployment
[Description: The Infrastructure Deployment section is applicable if the solution
includes implementing, deploying, and migrating a packaged infrastructure product or
service. The sub-sections provide topic ideas that may help build a cohesive picture
of the physical implementation.]
Solution Topologies
[Description: The Solution Topologies section provides a general explanation of the
solutions topology architecture. This should include physical machine locations,
07/12/2016
10
network design topologies, and site topologies. Include both central and remote site
topologies if applicable. A visual or graphic depiction of this topology may provide
clarity.]
Intranet Communication
[Description: The Intranet Communication section describes the server and services
communication strategy within the firewall boundaries for the solution.]
Services
[Description: The Services section itemizes all intranet communication product
services to be implemented within the solution.]
Protocols
[Description: The Protocols section itemizes the network protocols supported. This
should include a list of configuration options/issues required within all tiers of
solution.]
Security
[Description: The Security section lists the security configuration
options/requirements specific to intranet communication.]
Internet Communication
[Description: The Internet Communication section describes how the solution will
provide for or be dependent upon Internet connectivity. It also defines the perceived
impact of the solution upon the existing Internet services, and lists any additional
services required (firewall support, encryption/secure communication strategy, etc.).]
07/12/2016
11
Services
[Description: The Services section itemizes all Internet communication product
services to be implemented within the solution.]
Protocols
[Description: The Protocols section itemizes the network protocols supported. This
should include a list of configuration options/issues required within all tiers of
solution.]
Security
[Description: The Security section lists the security configuration
options/requirements specific to Internet communication.]
Extranet Communication
[Description: The Extranet Communication section describes how the solution will
provide for or be dependent upon Extranet connectivity. It also defines the perceived
impact of the solution upon the existing Extranet services, and lists any additional
services required (VPN, private network, B2B or partner relationship, trust
environments established between partners, etc.).]
Services
[Description: The Services section itemizes all extranet communication product
services to be implemented within the solution.]
07/12/2016
12
Protocols
[Description: The Protocols section itemizes the network protocols supported. This
should include a list of configuration options/issues required within all tiers of
solution.]
Security
[Description: The Security section lists the security configuration
options/requirements specific to extranet communication.]
Addressing
[Description: The Addressing section describes the method for network address
assignment and management (DHCP/Static IP, etc.). This entire section may not
apply to the solution or be greatly reduced in scope if the deployment is exclusive to
an isolated environment (i.e., a single instance on a single machine.). However, if
planning a large-scale, multi-tier deployment, this section is probably more relevant
when each tier is defined independently.]
Client Tier
<<Begin text here>>
Server Tier
<<Begin text here>>
07/12/2016
13
DHCP Configurations
<<Begin text here>>
Name Resolution
[Description: The Name Resolution section describes the method for resolving host
(server) and client names on the networks (DNS/WINS, etc.).]
WINS Configurations
<<Begin text here>>
DNS Configurations
<<Begin text here>>
Remote Access
[Description: The Remote Access section describes how the feature(s) work when
connected via remote access or slow links.]
Naming Standards
[Description: The Naming Standards section defines all naming standards required
by the new application or infrastructure environment. This should include naming
conventions for components, including server, sites, organization units, workstations,
etc.]
Server Placement
[Description: The Server Placement section describes the guidelines for placing
servers, both centrally or remote.]
Server Sizing
[Description: The Server Sizing section describes the guidelines for configuring
servers.]
07/12/2016
14
Administrative Model
[Description: The Administrative Model section describes how the servers and
clients will be administrated.]
Configuration of Environment
[Description: The Configuration of Environment section defines the overall
environment configuration that addresses the solutions performance, scalability,
reliability, and security. In an implementation/deployment/migration project, this
section is likely to be extensive.]
Security Strategy
[Description: The Security Strategy section describes the solution-wide strategy to
ensure security of all components. This section is coordinated with the Security Plan
(a section of the Master Project Plan). The sub-sections provide additional detail on
key elements of the solutions security.]
07/12/2016
15
Hardware Requirements
[Description: The Hardware Requirements section identifies the hardware
components that will be required for installation. The hardware installation
procedures can be found in the Deployment Plan.]
Software Requirements
[Description: The Software Requirements section identifies the software
components that will be required for installation. The software installation procedures
can be found in the Deployment Plan.]
Un-Installation
[Description: The Un-Installation section describes the strategy for the solutions
removal from its deployment environment.]
07/12/2016
16
Accessibility Support
[Description: The Accessibility Support section describes the design elements that
meet handicap and accessibility requirements.]
Multi-language Support
[Description: The Multi-Language Support section describes the design elements
that meet multi-language requirements.]
Logging/Eventing
[Description: The Logging/Eventing section describes how logging will occur within
the solution.]
07/12/2016
17
Error Messages
[Description: The Error Messages section describes how error messages will be
created and communicated within the solution.]
Diagnostic Tools
[Description: The Diagnostic Tools section describes how diagnostic tools are
integrated into the solution and how they will function.]
Issues
[Description: The Issues section identifies any unresolved issues that are related to
the solutions physical design. This information should list the issue and its
implications to the design.]
07/12/2016
18
Appendix
07/12/2016
19