SlideShare a Scribd company logo
Networking Fundamentals Determining Client and Network Requirements
Determining Client and Network Requirements Introduction
Introduction Before you begin designing a network you need to have a clear sense of the client’s expectations. Too often in the past, technology has been purchased or developed without a clear idea of why it is needed. The aim is to find a solution that fits the requirements, not a requirement that fits the technology.
Determining Client and Network Requirements Identifying Organisational Requirements
Identifying Organisational Requirements A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues the network needs to address. To do this you will need to arrange several meetings with the client. Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
Defining Business Objectives You should start the analysis process by asking the client some questions about the desired functionality of the network, such as: What tasks would the client like to automate or make more efficient? What business applications does the client need to support? Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support? Does the client require electronic mail and Internet, perhaps even a web server? Is the client planning to incorporate EFTPOS operations into the network?  What is the estimated size of the network; how many users will the network service? How important is network security? Does the client have an existing network, and what is its function?
Defining Business Objectives Once you have considered all the business tasks and functions the client requires, write them down and assign priorities to each item – this is the beginning of your network plan. As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
Defining Business Objectives The following points address some of the issues that should be included in the network plan:
Defining Business Objectives Sizing the Network It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use. Plan for future growth by building in extra capacity from the beginning. Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs. A good network should be designed to grow easily with the careful addition of existing technology.
Defining Business Objectives Following a Standards Approach It is important that you plan and build the network using standard industry-proven components. As business relationships change, the network may need to interconnect with others. It is therefore wise to design a network that is not likely to pose compatibility problems. If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
Defining Business Objectives Connectivity What types of external connections will the network need? Is Internet access necessary? If so, will a dial-up connection suffice, or will you need a fill-time dedicated link?  Will the client require remote access for their staff? One of the most challenging aspects of designing a network involves setting up links to external networks. Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
Defining Business Objectives Connectivity Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public. However, there is much more to the Internet than simply creating a home page. It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services. You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
Defining Business Objectives Connectivity The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information? If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services. If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
Defining Business Objectives Security While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
Defining Business Objectives Security Consider the following hardware-related security risks:  The nature of wireless networking means that a potential hacker does not need to have physical access to the network.  Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
Defining Business Objectives Security The risk may be minor, but it is important to make the client aware that a risk exists. Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security. For example Using intelligent routers with built-in firewalls which offer a higher level of security than those without Using a switch or bridge to partition sensitive areas of a network from public access areas
Defining Business Objectives Security The level of security required is going to depend on the type of information stored on a system. For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
Defining Business Objectives Interoperability This refers to the hardware’s ability to communicate and interact with different hardware and operating systems. When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible. You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
Defining Business Objectives Ease of Use The hardware needs to be easy to use, especially for the end user.  In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
Defining Business Objectives Software Compatability You need to know what software the client intends to run, both now and in the near future.  Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
Defining Business Objectives Warranty Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item. For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
Defining Business Objectives Cost Most clients will tell you that the most important requirement they have is cost and they are right. However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money. As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
Defining Business Objectives Existing Infrastructure If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available. In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation
Defining Business Objectives Existing Infrastructure Some of the issues you will need to address include: Can any of the existing hardware be reused? Will the new hardware be compatible with the existing hardware? Will the new hardware be compatible with the existing software?  What effect will the new hardware have on productivity? Will the new hardware enable any new functions to be undertaken (for example, video conferencing)? How many users will benefit from the installation of the new hardware? How long will the new hardware take to install?  What sort of disruption to existing services is likely during the installation of the new hardware?
Determining Client and Networking Requirements Working with the Client
Working with the Client In order to ensure that the network design best suits the client’s needs, you will need to work closely with them over a number of days, weeks or even months. This will require you to organise meetings with the client. You will also need to meet with a number of different personnel within the client organisation, such as team managers, key employees, and with other maintenance support providers and managers.
Working with the Client It may not be necessary to meet with key employees as a group since mostly their team managers will represent them. It may be more productive to conduct a number of informal interviews or meetings with individual employees and simply make notes of their business requirements. You should make it clear that you value the contribution of these employees.
Conducting Meetings and Interviews Meetings and Interviews involve communication and collecting data, by asking questions and discussing various issues concerning the network requirements. The objective is to obtain information that can be analysed in order to determine requirements.
Conducting Meetings and Interviews To do this successfully, a range of skills are required: Speaking Listening Observing Understanding Questioning Analysing Note Taking
Conducting Meetings and Interviews Some helpful things to remember include: Your speech should be clear and understandable: do not talk too quickly and avoid technical jargon. Many clients just want a computer network that works, and are not concerned with all the technical detail. They also want to know that they are dealing with professionals, so remember to be courteous and helpful.
Conducting Meetings and Interviews Some helpful things to remember include: Develop good listening habits: concentrate on the speaker’s message and listen for the main ideas, concepts or principles. One technique that can be used to improve listening skills is ‘active listening’. This means listening to what the person is saying and mirroring what you believe has been said, by paraphrasing or summarising their words. In this way, errors and misconceptions can be corrected
Conducting Meetings and Interviews Some helpful things to remember include: Take notes, but do not write down everything word for word. Listen and think before writing, then record the key words. Notes help you recall information revealed during the interview.
Conducting Meetings and Interviews In between meetings, you should be talking to vendors of equipment and services relating to the network plan. You should be very familiar with the costs, the services offered and the weaknesses of these vendors. As you become familiar with these, you will be better positioned to understand and recommend an appropriate solution for the organisation.
Conducting Meetings and Interviews It is also useful to maintain good documentation throughout this process. This documentation will form the basis of a report you can present to management to summarise and clarify your findings. Management can then sign off on the report as a true and accurate description of the business needs.

More Related Content

What's hot

Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
Engineer Safaetul Ahasan
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
Pulkit Singhal
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problems
Abenezer Abiti
 
System security
System securitySystem security
System security
sommerville-videos
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
Global Knowledge Training
 
Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
tlerell
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
System administration with automation
System administration with automationSystem administration with automation
System administration with automation
Shivam Srivastava
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
Gera Paulos
 
Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk support
Gera Paulos
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
IgguuMuude
 
IT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation SlidesIT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation Slides
SlideTeam
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
Dasarathi Dash
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
Atul Chounde
 
Network design
Network designNetwork design
Network design
csk selva
 
Overview of telecommunications and network
Overview of telecommunications and networkOverview of telecommunications and network
Overview of telecommunications and network
Ankush Mehrotra
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
03 cia
03 cia03 cia
03 cia
Jadavsejal
 

What's hot (20)

Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problems
 
System security
System securitySystem security
System security
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Network Design and Management
Network Design and ManagementNetwork Design and Management
Network Design and Management
 
Network management
Network managementNetwork management
Network management
 
System administration with automation
System administration with automationSystem administration with automation
System administration with automation
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk support
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
 
IT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation SlidesIT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation Slides
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
 
Network design
Network designNetwork design
Network design
 
Overview of telecommunications and network
Overview of telecommunications and networkOverview of telecommunications and network
Overview of telecommunications and network
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
03 cia
03 cia03 cia
03 cia
 

Viewers also liked

Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
csk selva
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirementshapy
 
Design of network
Design of networkDesign of network
Design of network
Aniruddh Brahmbhatt
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
csk selva
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needshunni123
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirementshapy
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
Mena M. Eissa
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of TypographySteven Cahill
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing EquipmentSteven Cahill
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site SecuritySteven Cahill
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network DesignSteven Cahill
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And MethodologiesSteven Cahill
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To NetworkingSteven Cahill
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your WebsiteSteven Cahill
 

Viewers also liked (20)

Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
Design of network
Design of networkDesign of network
Design of network
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 
Markup Documents
Markup DocumentsMarkup Documents
Markup Documents
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of Typography
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing Equipment
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Browsers
BrowsersBrowsers
Browsers
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And Methodologies
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your Website
 

Similar to Determining Client And Networking Requirements

Network upgrade
Network upgradeNetwork upgrade
Network upgrade
Debanjan Paul
 
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016Eric Hyman
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
monicafrancis71118
 
Computer Networking Concepts
Computer Networking ConceptsComputer Networking Concepts
Computer Networking Concepts
Bisnis Online Mandiri
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
Muhd Mu'izuddin
 
Choosing the Right Cloud Provider
Choosing the Right Cloud ProviderChoosing the Right Cloud Provider
Choosing the Right Cloud Provider
Rutter Networking Technologies
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
ThousandEyes
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
ssuser41d278
 
Cloud Architect Company in India.pdf
Cloud Architect Company in India.pdfCloud Architect Company in India.pdf
Cloud Architect Company in India.pdf
Regumsoft Technologies
 
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebookComparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
ProfitBricks
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
Cisco Enterprise Networks
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
E.S.G. JR. Consulting, Inc.
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
ThousandEyes
 
Cloud Architect Company in India.pptx
Cloud Architect Company in India.pptxCloud Architect Company in India.pptx
Cloud Architect Company in India.pptx
Regumsoft Technologies
 
Mit4032 cloud computing
Mit4032   cloud computingMit4032   cloud computing
Mit4032 cloud computing
smumbahelp
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
ThousandEyes
 
Intranet Software
Intranet SoftwareIntranet Software
Intranet Software
My Hub Intranet Solutions
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
William Francis
 

Similar to Determining Client And Networking Requirements (20)

Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
 
Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
Computer Networking Concepts
Computer Networking ConceptsComputer Networking Concepts
Computer Networking Concepts
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Choosing the Right Cloud Provider
Choosing the Right Cloud ProviderChoosing the Right Cloud Provider
Choosing the Right Cloud Provider
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
12 Steps To Soa Final
12 Steps To Soa Final12 Steps To Soa Final
12 Steps To Soa Final
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
 
Cloud Architect Company in India.pdf
Cloud Architect Company in India.pdfCloud Architect Company in India.pdf
Cloud Architect Company in India.pdf
 
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebookComparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Cloud Architect Company in India.pptx
Cloud Architect Company in India.pptxCloud Architect Company in India.pptx
Cloud Architect Company in India.pptx
 
Mit4032 cloud computing
Mit4032   cloud computingMit4032   cloud computing
Mit4032 cloud computing
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
 
Intranet Software
Intranet SoftwareIntranet Software
Intranet Software
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 

More from Steven Cahill

Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And ProtocolsSteven Cahill
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 

More from Steven Cahill (9)

Google
GoogleGoogle
Google
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Quality Management
Quality ManagementQuality Management
Quality Management
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And Protocols
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Website Performance
Website PerformanceWebsite Performance
Website Performance
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Determining Client And Networking Requirements

  • 1. Networking Fundamentals Determining Client and Network Requirements
  • 2. Determining Client and Network Requirements Introduction
  • 3. Introduction Before you begin designing a network you need to have a clear sense of the client’s expectations. Too often in the past, technology has been purchased or developed without a clear idea of why it is needed. The aim is to find a solution that fits the requirements, not a requirement that fits the technology.
  • 4. Determining Client and Network Requirements Identifying Organisational Requirements
  • 5. Identifying Organisational Requirements A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues the network needs to address. To do this you will need to arrange several meetings with the client. Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
  • 6. Defining Business Objectives You should start the analysis process by asking the client some questions about the desired functionality of the network, such as: What tasks would the client like to automate or make more efficient? What business applications does the client need to support? Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support? Does the client require electronic mail and Internet, perhaps even a web server? Is the client planning to incorporate EFTPOS operations into the network? What is the estimated size of the network; how many users will the network service? How important is network security? Does the client have an existing network, and what is its function?
  • 7. Defining Business Objectives Once you have considered all the business tasks and functions the client requires, write them down and assign priorities to each item – this is the beginning of your network plan. As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
  • 8. Defining Business Objectives The following points address some of the issues that should be included in the network plan:
  • 9. Defining Business Objectives Sizing the Network It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use. Plan for future growth by building in extra capacity from the beginning. Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs. A good network should be designed to grow easily with the careful addition of existing technology.
  • 10. Defining Business Objectives Following a Standards Approach It is important that you plan and build the network using standard industry-proven components. As business relationships change, the network may need to interconnect with others. It is therefore wise to design a network that is not likely to pose compatibility problems. If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
  • 11. Defining Business Objectives Connectivity What types of external connections will the network need? Is Internet access necessary? If so, will a dial-up connection suffice, or will you need a fill-time dedicated link? Will the client require remote access for their staff? One of the most challenging aspects of designing a network involves setting up links to external networks. Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
  • 12. Defining Business Objectives Connectivity Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public. However, there is much more to the Internet than simply creating a home page. It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services. You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
  • 13. Defining Business Objectives Connectivity The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information? If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services. If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
  • 14. Defining Business Objectives Security While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
  • 15. Defining Business Objectives Security Consider the following hardware-related security risks: The nature of wireless networking means that a potential hacker does not need to have physical access to the network. Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
  • 16. Defining Business Objectives Security The risk may be minor, but it is important to make the client aware that a risk exists. Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security. For example Using intelligent routers with built-in firewalls which offer a higher level of security than those without Using a switch or bridge to partition sensitive areas of a network from public access areas
  • 17. Defining Business Objectives Security The level of security required is going to depend on the type of information stored on a system. For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
  • 18. Defining Business Objectives Interoperability This refers to the hardware’s ability to communicate and interact with different hardware and operating systems. When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible. You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
  • 19. Defining Business Objectives Ease of Use The hardware needs to be easy to use, especially for the end user. In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
  • 20. Defining Business Objectives Software Compatability You need to know what software the client intends to run, both now and in the near future. Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
  • 21. Defining Business Objectives Warranty Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item. For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
  • 22. Defining Business Objectives Cost Most clients will tell you that the most important requirement they have is cost and they are right. However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money. As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
  • 23. Defining Business Objectives Existing Infrastructure If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available. In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation
  • 24. Defining Business Objectives Existing Infrastructure Some of the issues you will need to address include: Can any of the existing hardware be reused? Will the new hardware be compatible with the existing hardware? Will the new hardware be compatible with the existing software? What effect will the new hardware have on productivity? Will the new hardware enable any new functions to be undertaken (for example, video conferencing)? How many users will benefit from the installation of the new hardware? How long will the new hardware take to install? What sort of disruption to existing services is likely during the installation of the new hardware?
  • 25. Determining Client and Networking Requirements Working with the Client
  • 26. Working with the Client In order to ensure that the network design best suits the client’s needs, you will need to work closely with them over a number of days, weeks or even months. This will require you to organise meetings with the client. You will also need to meet with a number of different personnel within the client organisation, such as team managers, key employees, and with other maintenance support providers and managers.
  • 27. Working with the Client It may not be necessary to meet with key employees as a group since mostly their team managers will represent them. It may be more productive to conduct a number of informal interviews or meetings with individual employees and simply make notes of their business requirements. You should make it clear that you value the contribution of these employees.
  • 28. Conducting Meetings and Interviews Meetings and Interviews involve communication and collecting data, by asking questions and discussing various issues concerning the network requirements. The objective is to obtain information that can be analysed in order to determine requirements.
  • 29. Conducting Meetings and Interviews To do this successfully, a range of skills are required: Speaking Listening Observing Understanding Questioning Analysing Note Taking
  • 30. Conducting Meetings and Interviews Some helpful things to remember include: Your speech should be clear and understandable: do not talk too quickly and avoid technical jargon. Many clients just want a computer network that works, and are not concerned with all the technical detail. They also want to know that they are dealing with professionals, so remember to be courteous and helpful.
  • 31. Conducting Meetings and Interviews Some helpful things to remember include: Develop good listening habits: concentrate on the speaker’s message and listen for the main ideas, concepts or principles. One technique that can be used to improve listening skills is ‘active listening’. This means listening to what the person is saying and mirroring what you believe has been said, by paraphrasing or summarising their words. In this way, errors and misconceptions can be corrected
  • 32. Conducting Meetings and Interviews Some helpful things to remember include: Take notes, but do not write down everything word for word. Listen and think before writing, then record the key words. Notes help you recall information revealed during the interview.
  • 33. Conducting Meetings and Interviews In between meetings, you should be talking to vendors of equipment and services relating to the network plan. You should be very familiar with the costs, the services offered and the weaknesses of these vendors. As you become familiar with these, you will be better positioned to understand and recommend an appropriate solution for the organisation.
  • 34. Conducting Meetings and Interviews It is also useful to maintain good documentation throughout this process. This documentation will form the basis of a report you can present to management to summarise and clarify your findings. Management can then sign off on the report as a true and accurate description of the business needs.