SlideShare a Scribd company logo
Confirm Client Requirements
Confirm Client Requirements This theory will cover the following: ,[object Object],[object Object]
Confirm Client Requirements A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues which the network needs to address.
Confirm Client Requirements To do this you will need to arrange several meetings with the client.
Confirm Client Requirements Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
Confirm Client Requirements Defining Business Objectives
Confirm Client Requirements You should start the analysis process by asking the client some questions about the desired functionality of the network, such as:
Confirm Client Requirements ,[object Object]
What business applications does the client need to support?
Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support?
Does the client require electronic mail and Internet, perhaps even a web server?,[object Object]
Is the client planning to incorporate EFTPOS operations into the network?
What is the estimated size of the network; how many users will the network service?
How important is network security?
Does the client have an existing network, and what is its function?,[object Object]
Confirm Client Requirements As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
Confirm Client Requirements The following points address some of the issues that should be included in the network plan:
Confirm Client Requirements 1. Sizing the network It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use.
Confirm Client Requirements 1. Sizing the network Plan for future growth by building in extra capacity from the beginning.
Confirm Client Requirements 1. Sizing the network Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs.
Confirm Client Requirements 1. Sizing the network A good network should be designed to grow easily with the careful addition of existing technology.
Confirm Client Requirements 2. Follow a standard approach It is important that you plan and build the network using standard industry-proven components.
Confirm Client Requirements 2. Follow a standard approach As business relationships change, the network may need to interconnect with others.
Confirm Client Requirements 2. Follow a standard approach It is therefore wise to design a network that is not likely to pose compatibility problems.
Confirm Client Requirements 2. Follow a standard approach If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
Confirm Client Requirements 3. Connectivity What types of external connections will the network need?  Is Internet access necessary?
Confirm Client Requirements 3. Connectivity If so, will a dial-up connection suffice, or will you need a fill-time dedicated link?
Confirm Client Requirements 3. Connectivity Will the client require remote access for their staff?
Confirm Client Requirements 3. Connectivity One of the most challenging aspects of designing a network involves setting up links to external networks.
Confirm Client Requirements 3. Connectivity Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
Confirm Client Requirements 3. Connectivity Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public.
Confirm Client Requirements 3. Connectivity However, there is much more to the Internet than simply creating a home page.
Confirm Client Requirements 3. Connectivity It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services.
Confirm Client Requirements 3. Connectivity You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
Confirm Client Requirements 3. Connectivity The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information?
Confirm Client Requirements 3. Connectivity If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services.
Confirm Client Requirements 3. Connectivity If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
Confirm Client Requirements 4. Security While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
Confirm Client Requirements 4. Security Consider the following hardware-related security risks:
Confirm Client Requirements 4. Security The nature of wireless networking means that a potential hacker does not need to have physical access to the network.
Confirm Client Requirements 4. Security Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
Confirm Client Requirements 4. Security The risk may be minor, but it is important to make the client aware that a risk exists
Confirm Client Requirements 4. Security Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security.
Confirm Client Requirements 4. Security For example ,[object Object]
Using a switch or bridge to partition sensitive areas of a network from public access areas,[object Object]
Confirm Client Requirements 4. Security For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
Confirm Client Requirements 5. Interoperability This refers to the hardware’s ability to communicate and interact with different hardware and operating systems.
Confirm Client Requirements 5. Interoperability When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible.
Confirm Client Requirements 5. Interoperability You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
Confirm Client Requirements 6. Ease of use The hardware needs to be easy to use, especially for the end user.
Confirm Client Requirements 6. Ease of use In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
Confirm Client Requirements 7. Software compatibility You need to know what software the client intends to run, both now and in the near future.
Confirm Client Requirements 7. Software compatibility Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
Confirm Client Requirements 8. Warranty Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item.
Confirm Client Requirements 8. Warranty For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
Confirm Client Requirements 9. Cost Most clients will tell you that the most important requirement they have is cost and they are right.
Confirm Client Requirements 9. Cost However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money.
Confirm Client Requirements 9. Cost As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
Confirm Client Requirements 10. Existing Infrastructure If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available.  In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation.
Confirm Client Requirements 10. Existing Infrastructure Some of the issues you will need to address include: ,[object Object]

More Related Content

What's hot

System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
Uc Man
 
The basics of computer networking
The basics of computer networkingThe basics of computer networking
The basics of computer networking
Arti Parab Academics
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
IgguuMuude
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administratorguest371b1b4
 
install active directory and configure domain controller
install active directory and configure domain controllerinstall active directory and configure domain controller
install active directory and configure domain controller
AlRomaniRashad
 
Conduct / facilitate user training
Conduct / facilitate user trainingConduct / facilitate user training
Conduct / facilitate user training
Gera Paulos
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administrator
Khang-Ling Loh
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
Chapter11
Chapter11Chapter11
Chapter11
Muhammad Ahad
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
Daniel P Wallace
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
Kerry Cole
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
Khang-Ling Loh
 
Network design
Network designNetwork design
Network design
csk selva
 
build small WLAN.pptx
build small WLAN.pptxbuild small WLAN.pptx
build small WLAN.pptx
Jaleto Sunkemo
 
Chapter12
Chapter12Chapter12
Chapter12
Muhammad Ahad
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Cloud federation.pptx
Cloud federation.pptxCloud federation.pptx
Cloud federation.pptx
Ybhh
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
professional practice
 professional practice   professional practice
professional practice
LakshithaSemasinghe
 

What's hot (20)

System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
The basics of computer networking
The basics of computer networkingThe basics of computer networking
The basics of computer networking
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administrator
 
install active directory and configure domain controller
install active directory and configure domain controllerinstall active directory and configure domain controller
install active directory and configure domain controller
 
Conduct / facilitate user training
Conduct / facilitate user trainingConduct / facilitate user training
Conduct / facilitate user training
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administrator
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
 
Chapter11
Chapter11Chapter11
Chapter11
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
 
Cyber security
Cyber security Cyber security
Cyber security
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Network design
Network designNetwork design
Network design
 
build small WLAN.pptx
build small WLAN.pptxbuild small WLAN.pptx
build small WLAN.pptx
 
Chapter12
Chapter12Chapter12
Chapter12
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Cloud federation.pptx
Cloud federation.pptxCloud federation.pptx
Cloud federation.pptx
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
professional practice
 professional practice   professional practice
professional practice
 

Viewers also liked

Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirementshapy
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
csk selva
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needshunni123
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of TypographySteven Cahill
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing EquipmentSteven Cahill
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
csk selva
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site SecuritySteven Cahill
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network DesignSteven Cahill
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And MethodologiesSteven Cahill
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To NetworkingSteven Cahill
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirementshapy
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your WebsiteSteven Cahill
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 

Viewers also liked (20)

Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of Typography
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Markup Documents
Markup DocumentsMarkup Documents
Markup Documents
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing Equipment
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Browsers
BrowsersBrowsers
Browsers
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And Methodologies
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your Website
 
Quality Management
Quality ManagementQuality Management
Quality Management
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 

Similar to Confirm Client Requirements

Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
Dinesh Kumar
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
Muhd Mu'izuddin
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
Debanjan Paul
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
monicafrancis71118
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
Vision Concepts Infrastructure Services Solution
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
phanleson
 
7 Questions to Ask Data Centre Providers
7 Questions to Ask Data Centre Providers7 Questions to Ask Data Centre Providers
7 Questions to Ask Data Centre Providers
NTT Communications ICT Solutions
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx
briancrawford30935
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
VannaSchrader3
 
Network Capability Profile
Network Capability ProfileNetwork Capability Profile
Network Capability Profile
pds2k.com
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
ThousandEyes
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 
BASC presentation on security and application architecture
BASC presentation on security and application architectureBASC presentation on security and application architecture
BASC presentation on security and application architecture
wbjwilliams3
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
ThousandEyes
 

Similar to Confirm Client Requirements (20)

Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
7 Questions to Ask Data Centre Providers
7 Questions to Ask Data Centre Providers7 Questions to Ask Data Centre Providers
7 Questions to Ask Data Centre Providers
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
 
Network Capability Profile
Network Capability ProfileNetwork Capability Profile
Network Capability Profile
 
Rohan_Purekar
Rohan_PurekarRohan_Purekar
Rohan_Purekar
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
BASC presentation on security and application architecture
BASC presentation on security and application architectureBASC presentation on security and application architecture
BASC presentation on security and application architecture
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 

More from Steven Cahill

Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And ProtocolsSteven Cahill
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 

More from Steven Cahill (7)

Google
GoogleGoogle
Google
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And Protocols
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Website Performance
Website PerformanceWebsite Performance
Website Performance
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Confirm Client Requirements

  • 2.
  • 3. Confirm Client Requirements A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues which the network needs to address.
  • 4. Confirm Client Requirements To do this you will need to arrange several meetings with the client.
  • 5. Confirm Client Requirements Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
  • 6. Confirm Client Requirements Defining Business Objectives
  • 7. Confirm Client Requirements You should start the analysis process by asking the client some questions about the desired functionality of the network, such as:
  • 8.
  • 9. What business applications does the client need to support?
  • 10. Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support?
  • 11.
  • 12. Is the client planning to incorporate EFTPOS operations into the network?
  • 13. What is the estimated size of the network; how many users will the network service?
  • 14. How important is network security?
  • 15.
  • 16. Confirm Client Requirements As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
  • 17. Confirm Client Requirements The following points address some of the issues that should be included in the network plan:
  • 18. Confirm Client Requirements 1. Sizing the network It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use.
  • 19. Confirm Client Requirements 1. Sizing the network Plan for future growth by building in extra capacity from the beginning.
  • 20. Confirm Client Requirements 1. Sizing the network Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs.
  • 21. Confirm Client Requirements 1. Sizing the network A good network should be designed to grow easily with the careful addition of existing technology.
  • 22. Confirm Client Requirements 2. Follow a standard approach It is important that you plan and build the network using standard industry-proven components.
  • 23. Confirm Client Requirements 2. Follow a standard approach As business relationships change, the network may need to interconnect with others.
  • 24. Confirm Client Requirements 2. Follow a standard approach It is therefore wise to design a network that is not likely to pose compatibility problems.
  • 25. Confirm Client Requirements 2. Follow a standard approach If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
  • 26. Confirm Client Requirements 3. Connectivity What types of external connections will the network need? Is Internet access necessary?
  • 27. Confirm Client Requirements 3. Connectivity If so, will a dial-up connection suffice, or will you need a fill-time dedicated link?
  • 28. Confirm Client Requirements 3. Connectivity Will the client require remote access for their staff?
  • 29. Confirm Client Requirements 3. Connectivity One of the most challenging aspects of designing a network involves setting up links to external networks.
  • 30. Confirm Client Requirements 3. Connectivity Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
  • 31. Confirm Client Requirements 3. Connectivity Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public.
  • 32. Confirm Client Requirements 3. Connectivity However, there is much more to the Internet than simply creating a home page.
  • 33. Confirm Client Requirements 3. Connectivity It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services.
  • 34. Confirm Client Requirements 3. Connectivity You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
  • 35. Confirm Client Requirements 3. Connectivity The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information?
  • 36. Confirm Client Requirements 3. Connectivity If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services.
  • 37. Confirm Client Requirements 3. Connectivity If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
  • 38. Confirm Client Requirements 4. Security While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
  • 39. Confirm Client Requirements 4. Security Consider the following hardware-related security risks:
  • 40. Confirm Client Requirements 4. Security The nature of wireless networking means that a potential hacker does not need to have physical access to the network.
  • 41. Confirm Client Requirements 4. Security Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
  • 42. Confirm Client Requirements 4. Security The risk may be minor, but it is important to make the client aware that a risk exists
  • 43. Confirm Client Requirements 4. Security Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security.
  • 44.
  • 45.
  • 46. Confirm Client Requirements 4. Security For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
  • 47. Confirm Client Requirements 5. Interoperability This refers to the hardware’s ability to communicate and interact with different hardware and operating systems.
  • 48. Confirm Client Requirements 5. Interoperability When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible.
  • 49. Confirm Client Requirements 5. Interoperability You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
  • 50. Confirm Client Requirements 6. Ease of use The hardware needs to be easy to use, especially for the end user.
  • 51. Confirm Client Requirements 6. Ease of use In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
  • 52. Confirm Client Requirements 7. Software compatibility You need to know what software the client intends to run, both now and in the near future.
  • 53. Confirm Client Requirements 7. Software compatibility Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
  • 54. Confirm Client Requirements 8. Warranty Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item.
  • 55. Confirm Client Requirements 8. Warranty For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
  • 56. Confirm Client Requirements 9. Cost Most clients will tell you that the most important requirement they have is cost and they are right.
  • 57. Confirm Client Requirements 9. Cost However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money.
  • 58. Confirm Client Requirements 9. Cost As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
  • 59. Confirm Client Requirements 10. Existing Infrastructure If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available. In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation.
  • 60.
  • 61. Will the new hardware be compatible with the existing hardware?
  • 62.
  • 63. Will the new hardware enable any new functions to be undertaken (for example, video conferencing)?
  • 64. How many users will benefit from the installation of the new hardware?
  • 65.