SlideShare une entreprise Scribd logo
1  sur  60
Confirm Client Requirements
Confirm Client Requirements This theory will cover the following: ,[object Object],[object Object]
Confirm Client Requirements A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues which the network needs to address.
Confirm Client Requirements To do this you will need to arrange several meetings with the client.
Confirm Client Requirements Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
Confirm Client Requirements Defining Business Objectives
Confirm Client Requirements You should start the analysis process by asking the client some questions about the desired functionality of the network, such as:
Confirm Client Requirements ,[object Object]
What business applications does the client need to support?
Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support?
Does the client require electronic mail and Internet, perhaps even a web server?,[object Object]
Is the client planning to incorporate EFTPOS operations into the network?
What is the estimated size of the network; how many users will the network service?
How important is network security?
Does the client have an existing network, and what is its function?,[object Object]
Confirm Client Requirements As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
Confirm Client Requirements The following points address some of the issues that should be included in the network plan:
Confirm Client Requirements 1. Sizing the network It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use.
Confirm Client Requirements 1. Sizing the network Plan for future growth by building in extra capacity from the beginning.
Confirm Client Requirements 1. Sizing the network Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs.
Confirm Client Requirements 1. Sizing the network A good network should be designed to grow easily with the careful addition of existing technology.
Confirm Client Requirements 2. Follow a standard approach It is important that you plan and build the network using standard industry-proven components.
Confirm Client Requirements 2. Follow a standard approach As business relationships change, the network may need to interconnect with others.
Confirm Client Requirements 2. Follow a standard approach It is therefore wise to design a network that is not likely to pose compatibility problems.
Confirm Client Requirements 2. Follow a standard approach If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
Confirm Client Requirements 3. Connectivity What types of external connections will the network need?  Is Internet access necessary?
Confirm Client Requirements 3. Connectivity If so, will a dial-up connection suffice, or will you need a fill-time dedicated link?
Confirm Client Requirements 3. Connectivity Will the client require remote access for their staff?
Confirm Client Requirements 3. Connectivity One of the most challenging aspects of designing a network involves setting up links to external networks.
Confirm Client Requirements 3. Connectivity Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
Confirm Client Requirements 3. Connectivity Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public.
Confirm Client Requirements 3. Connectivity However, there is much more to the Internet than simply creating a home page.
Confirm Client Requirements 3. Connectivity It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services.
Confirm Client Requirements 3. Connectivity You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
Confirm Client Requirements 3. Connectivity The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information?
Confirm Client Requirements 3. Connectivity If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services.
Confirm Client Requirements 3. Connectivity If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
Confirm Client Requirements 4. Security While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
Confirm Client Requirements 4. Security Consider the following hardware-related security risks:
Confirm Client Requirements 4. Security The nature of wireless networking means that a potential hacker does not need to have physical access to the network.
Confirm Client Requirements 4. Security Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
Confirm Client Requirements 4. Security The risk may be minor, but it is important to make the client aware that a risk exists
Confirm Client Requirements 4. Security Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security.
Confirm Client Requirements 4. Security For example ,[object Object]
Using a switch or bridge to partition sensitive areas of a network from public access areas,[object Object]
Confirm Client Requirements 4. Security For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
Confirm Client Requirements 5. Interoperability This refers to the hardware’s ability to communicate and interact with different hardware and operating systems.
Confirm Client Requirements 5. Interoperability When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible.
Confirm Client Requirements 5. Interoperability You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
Confirm Client Requirements 6. Ease of use The hardware needs to be easy to use, especially for the end user.
Confirm Client Requirements 6. Ease of use In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
Confirm Client Requirements 7. Software compatibility You need to know what software the client intends to run, both now and in the near future.
Confirm Client Requirements 7. Software compatibility Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
Confirm Client Requirements 8. Warranty Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item.
Confirm Client Requirements 8. Warranty For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
Confirm Client Requirements 9. Cost Most clients will tell you that the most important requirement they have is cost and they are right.
Confirm Client Requirements 9. Cost However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money.
Confirm Client Requirements 9. Cost As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
Confirm Client Requirements 10. Existing Infrastructure If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available.  In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation.
Confirm Client Requirements 10. Existing Infrastructure Some of the issues you will need to address include: ,[object Object]

Contenu connexe

Tendances

Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk supportGera Paulos
 
ICT-DBA-level4
ICT-DBA-level4ICT-DBA-level4
ICT-DBA-level4Infotech27
 
Network design
Network designNetwork design
Network designcsk selva
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copyJaleto Sunkemo
 
Monitoring and Supporting Data Conversion.pdf
Monitoring and Supporting  Data Conversion.pdfMonitoring and Supporting  Data Conversion.pdf
Monitoring and Supporting Data Conversion.pdfseifusisay06
 
Determine best fit topology
Determine best fit topologyDetermine best fit topology
Determine best fit topologyAbenezer Abiti
 
Best fit topology - LO1 part II
Best fit topology - LO1 part IIBest fit topology - LO1 part II
Best fit topology - LO1 part IIAbenezer Abiti
 
Basic requirements for internet connection
Basic requirements for internet connectionBasic requirements for internet connection
Basic requirements for internet connectioncolorsof
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
 
Conduct / facilitate user training
Conduct / facilitate user trainingConduct / facilitate user training
Conduct / facilitate user trainingGera Paulos
 
Best fit topology - lo1 part iii
Best fit topology - lo1 part iiiBest fit topology - lo1 part iii
Best fit topology - lo1 part iiiAbenezer Abiti
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Creating Technical documentation
Creating Technical documentationCreating Technical documentation
Creating Technical documentationMewledMohammed
 
build a small wireless LAN LO2
build a small wireless LAN LO2build a small wireless LAN LO2
build a small wireless LAN LO2Jaleto Sunkemo
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networkingJafar Nesargi
 

Tendances (20)

Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk support
 
ICT-DBA-level4
ICT-DBA-level4ICT-DBA-level4
ICT-DBA-level4
 
Network design
Network designNetwork design
Network design
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
 
Monitoring and Supporting Data Conversion.pdf
Monitoring and Supporting  Data Conversion.pdfMonitoring and Supporting  Data Conversion.pdf
Monitoring and Supporting Data Conversion.pdf
 
Determine best fit topology
Determine best fit topologyDetermine best fit topology
Determine best fit topology
 
Best fit topology - LO1 part II
Best fit topology - LO1 part IIBest fit topology - LO1 part II
Best fit topology - LO1 part II
 
Basic requirements for internet connection
Basic requirements for internet connectionBasic requirements for internet connection
Basic requirements for internet connection
 
Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Conduct / facilitate user training
Conduct / facilitate user trainingConduct / facilitate user training
Conduct / facilitate user training
 
Best fit topology - lo1 part iii
Best fit topology - lo1 part iiiBest fit topology - lo1 part iii
Best fit topology - lo1 part iii
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Introduction to ms access database
Introduction to ms access databaseIntroduction to ms access database
Introduction to ms access database
 
Creating Technical documentation
Creating Technical documentationCreating Technical documentation
Creating Technical documentation
 
Types of server
Types of serverTypes of server
Types of server
 
build a small wireless LAN LO2
build a small wireless LAN LO2build a small wireless LAN LO2
build a small wireless LAN LO2
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
DHCP
DHCPDHCP
DHCP
 

En vedette

Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirementshapy
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needshunni123
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of TypographySteven Cahill
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing EquipmentSteven Cahill
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysiscsk selva
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site SecuritySteven Cahill
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network DesignSteven Cahill
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And MethodologiesSteven Cahill
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To NetworkingSteven Cahill
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirementshapy
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your WebsiteSteven Cahill
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 

En vedette (20)

Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of Typography
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Markup Documents
Markup DocumentsMarkup Documents
Markup Documents
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing Equipment
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Browsers
BrowsersBrowsers
Browsers
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And Methodologies
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your Website
 
Quality Management
Quality ManagementQuality Management
Quality Management
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 

Similaire à Confirm Client Requirements

Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Dinesh Kumar
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design Muhd Mu'izuddin
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Securityphanleson
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docxbriancrawford30935
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12VannaSchrader3
 
Network Capability Profile
Network Capability ProfileNetwork Capability Profile
Network Capability Profilepds2k.com
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxrock73
 
BASC presentation on security and application architecture
BASC presentation on security and application architectureBASC presentation on security and application architecture
BASC presentation on security and application architecturewbjwilliams3
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 

Similaire à Confirm Client Requirements (20)

Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
7 Questions to Ask Data Centre Providers
7 Questions to Ask Data Centre Providers7 Questions to Ask Data Centre Providers
7 Questions to Ask Data Centre Providers
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
 
Network Capability Profile
Network Capability ProfileNetwork Capability Profile
Network Capability Profile
 
Rohan_Purekar
Rohan_PurekarRohan_Purekar
Rohan_Purekar
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
BASC presentation on security and application architecture
BASC presentation on security and application architectureBASC presentation on security and application architecture
BASC presentation on security and application architecture
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 

Plus de Steven Cahill

Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And ProtocolsSteven Cahill
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 

Plus de Steven Cahill (7)

Google
GoogleGoogle
Google
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And Protocols
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Website Performance
Website PerformanceWebsite Performance
Website Performance
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 

Dernier

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Confirm Client Requirements

  • 2.
  • 3. Confirm Client Requirements A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues which the network needs to address.
  • 4. Confirm Client Requirements To do this you will need to arrange several meetings with the client.
  • 5. Confirm Client Requirements Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
  • 6. Confirm Client Requirements Defining Business Objectives
  • 7. Confirm Client Requirements You should start the analysis process by asking the client some questions about the desired functionality of the network, such as:
  • 8.
  • 9. What business applications does the client need to support?
  • 10. Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support?
  • 11.
  • 12. Is the client planning to incorporate EFTPOS operations into the network?
  • 13. What is the estimated size of the network; how many users will the network service?
  • 14. How important is network security?
  • 15.
  • 16. Confirm Client Requirements As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
  • 17. Confirm Client Requirements The following points address some of the issues that should be included in the network plan:
  • 18. Confirm Client Requirements 1. Sizing the network It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use.
  • 19. Confirm Client Requirements 1. Sizing the network Plan for future growth by building in extra capacity from the beginning.
  • 20. Confirm Client Requirements 1. Sizing the network Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs.
  • 21. Confirm Client Requirements 1. Sizing the network A good network should be designed to grow easily with the careful addition of existing technology.
  • 22. Confirm Client Requirements 2. Follow a standard approach It is important that you plan and build the network using standard industry-proven components.
  • 23. Confirm Client Requirements 2. Follow a standard approach As business relationships change, the network may need to interconnect with others.
  • 24. Confirm Client Requirements 2. Follow a standard approach It is therefore wise to design a network that is not likely to pose compatibility problems.
  • 25. Confirm Client Requirements 2. Follow a standard approach If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
  • 26. Confirm Client Requirements 3. Connectivity What types of external connections will the network need? Is Internet access necessary?
  • 27. Confirm Client Requirements 3. Connectivity If so, will a dial-up connection suffice, or will you need a fill-time dedicated link?
  • 28. Confirm Client Requirements 3. Connectivity Will the client require remote access for their staff?
  • 29. Confirm Client Requirements 3. Connectivity One of the most challenging aspects of designing a network involves setting up links to external networks.
  • 30. Confirm Client Requirements 3. Connectivity Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
  • 31. Confirm Client Requirements 3. Connectivity Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public.
  • 32. Confirm Client Requirements 3. Connectivity However, there is much more to the Internet than simply creating a home page.
  • 33. Confirm Client Requirements 3. Connectivity It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services.
  • 34. Confirm Client Requirements 3. Connectivity You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
  • 35. Confirm Client Requirements 3. Connectivity The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information?
  • 36. Confirm Client Requirements 3. Connectivity If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services.
  • 37. Confirm Client Requirements 3. Connectivity If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
  • 38. Confirm Client Requirements 4. Security While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
  • 39. Confirm Client Requirements 4. Security Consider the following hardware-related security risks:
  • 40. Confirm Client Requirements 4. Security The nature of wireless networking means that a potential hacker does not need to have physical access to the network.
  • 41. Confirm Client Requirements 4. Security Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
  • 42. Confirm Client Requirements 4. Security The risk may be minor, but it is important to make the client aware that a risk exists
  • 43. Confirm Client Requirements 4. Security Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security.
  • 44.
  • 45.
  • 46. Confirm Client Requirements 4. Security For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
  • 47. Confirm Client Requirements 5. Interoperability This refers to the hardware’s ability to communicate and interact with different hardware and operating systems.
  • 48. Confirm Client Requirements 5. Interoperability When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible.
  • 49. Confirm Client Requirements 5. Interoperability You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
  • 50. Confirm Client Requirements 6. Ease of use The hardware needs to be easy to use, especially for the end user.
  • 51. Confirm Client Requirements 6. Ease of use In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
  • 52. Confirm Client Requirements 7. Software compatibility You need to know what software the client intends to run, both now and in the near future.
  • 53. Confirm Client Requirements 7. Software compatibility Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
  • 54. Confirm Client Requirements 8. Warranty Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item.
  • 55. Confirm Client Requirements 8. Warranty For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
  • 56. Confirm Client Requirements 9. Cost Most clients will tell you that the most important requirement they have is cost and they are right.
  • 57. Confirm Client Requirements 9. Cost However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money.
  • 58. Confirm Client Requirements 9. Cost As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
  • 59. Confirm Client Requirements 10. Existing Infrastructure If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available. In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation.
  • 60.
  • 61. Will the new hardware be compatible with the existing hardware?
  • 62.
  • 63. Will the new hardware enable any new functions to be undertaken (for example, video conferencing)?
  • 64. How many users will benefit from the installation of the new hardware?
  • 65.