SlideShare a Scribd company logo
Confirm Client Requirements
Confirm Client RequirementsThis theory will cover the following:Identify Organisational RequirementsConfirm Client RequirementsIdentify Organisational Requirements
Confirm Client RequirementsA prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues which the network needs to address.
Confirm Client RequirementsTo do this you will need to arrange several meetings with the client.
Confirm Client RequirementsInitially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
Confirm Client RequirementsDefining Business Objectives
Confirm Client RequirementsYou should start the analysis process by asking the client some questions about the desired functionality of the network, such as:
Confirm Client RequirementsWhat tasks would the client like to automate or make more efficient?
What business applications does the client need to support?
Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support?
Does the client require electronic mail and Internet, perhaps even a web server?Confirm Client RequirementsDoes the client require electronic mail and Internet, perhaps even a web server?
Is the client planning to incorporate EFTPOS operations into the network?
What is the estimated size of the network; how many users will the network service?
How important is network security?
Does the client have an existing network, and what is its function?Confirm Client RequirementsOnce you have considered all the business tasks and functions the client requires, write them down and assign priorities to each item – this is the beginning of your network plan.
Confirm Client RequirementsAs you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
Confirm Client RequirementsThe following points address some of the issues that should be included in the network plan:
Confirm Client Requirements1. Sizing the networkIt is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use.
Confirm Client Requirements1. Sizing the networkPlan for future growth by building in extra capacity from the beginning.
Confirm Client Requirements1. Sizing the networkConsider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs.
Confirm Client Requirements1. Sizing the networkA good network should be designed to grow easily with the careful addition of existing technology.
Confirm Client Requirements2. Follow a standard approachIt is important that you plan and build the network using standard industry-proven components.
Confirm Client Requirements2. Follow a standard approachAs business relationships change, the network may need to interconnect with others.
Confirm Client Requirements2. Follow a standard approachIt is therefore wise to design a network that is not likely to pose compatibility problems.
Confirm Client Requirements2. Follow a standard approachIf you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
Confirm Client Requirements3. ConnectivityWhat types of external connections will the network need?  Is Internet access necessary?
Confirm Client Requirements3. ConnectivityIf so, will a dial-up connection suffice, or will you need a fill-time dedicated link?
Confirm Client Requirements3. ConnectivityWill the client require remote access for their staff?
Confirm Client Requirements3. ConnectivityOne of the most challenging aspects of designing a network involves setting up links to external networks.
Confirm Client Requirements3. ConnectivityNot only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
Confirm Client Requirements3. ConnectivityMany organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public.
Confirm Client Requirements3. ConnectivityHowever, there is much more to the Internet than simply creating a home page.
Confirm Client Requirements3. ConnectivityIt is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services.
Confirm Client Requirements3. ConnectivityYou need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
Confirm Client Requirements3. ConnectivityThe first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information?
Confirm Client Requirements3. ConnectivityIf the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services.
Confirm Client Requirements3. ConnectivityIf the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
Confirm Client Requirements4. SecurityWhile the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
Confirm Client Requirements4. SecurityConsider the following hardware-related security risks:
Confirm Client Requirements4. SecurityThe nature of wireless networking means that a potential hacker does not need to have physical access to the network.
Confirm Client Requirements4. SecurityEstablishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
Confirm Client Requirements4. SecurityThe risk may be minor, but it is important to make the client aware that a risk exists
Confirm Client Requirements4. SecurityOf course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security.
Confirm Client Requirements4. SecurityFor exampleUsing intelligent routers with built-in firewalls which offer a higher level of security than those without
Using a switch or bridge to partition sensitive areas of a network from public access areasConfirm Client Requirements4. SecurityThe level of security required is going to depend on the type of information stored on a system.
Confirm Client Requirements4. SecurityFor example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
Confirm Client Requirements5. InteroperabilityThis refers to the hardware’s ability to communicate and interact with different hardware and operating systems.
Confirm Client Requirements5. InteroperabilityWhen recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible.
Confirm Client Requirements5. InteroperabilityYou should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
Confirm Client Requirements6. Ease of useThe hardware needs to be easy to use, especially for the end user.
Confirm Client Requirements6. Ease of useIn situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
Confirm Client Requirements7. Software compatibilityYou need to know what software the client intends to run, both now and in the near future.
Confirm Client Requirements7. Software compatibilityAdvising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
Confirm Client Requirements8. WarrantyMost manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item.
Confirm Client Requirements8. WarrantyFor example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
Confirm Client Requirements9. CostMost clients will tell you that the most important requirement they have is cost and they are right.
Confirm Client Requirements9. CostHowever what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money.
Confirm Client Requirements9. CostAs an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
Confirm Client Requirements10. Existing InfrastructureIf a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available.  In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation.
Confirm Client Requirements10. Existing InfrastructureSome of the issues you will need to address include:Can any of the existing hardware be reused?

More Related Content

PDF
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
EYOHAICTMEDIA
 
PPTX
connecte hardware peripherals level 1.ppt.pptx
BinyamBekeleMoges
 
PDF
Computer hardware-peripherals compress
Kefyalew Temesgen
 
PPTX
Administrating Network and Hardware Peripherals.pptx
bilisashobe430
 
PPTX
Care for Network and Computer Hardware L-2 (3).pptx
aytenewbelay1
 
PPTX
Small office Home office , network setup in details
apel7
 
PPTX
Module 08 Access & Use Database Application.pptx
Esubalew21
 
PDF
Best fit topology - LO1 part I
Abenezer Abiti
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
EYOHAICTMEDIA
 
connecte hardware peripherals level 1.ppt.pptx
BinyamBekeleMoges
 
Computer hardware-peripherals compress
Kefyalew Temesgen
 
Administrating Network and Hardware Peripherals.pptx
bilisashobe430
 
Care for Network and Computer Hardware L-2 (3).pptx
aytenewbelay1
 
Small office Home office , network setup in details
apel7
 
Module 08 Access & Use Database Application.pptx
Esubalew21
 
Best fit topology - LO1 part I
Abenezer Abiti
 

What's hot (20)

PPTX
Determining Client And Networking Requirements
Steven Cahill
 
PPTX
User and groups administrator
Aisha Talat
 
PPT
ACTIVE-DIRECTORY.ppt
mwti2
 
PPTX
Markup language classification, designing static and dynamic
Ankita Bhalla
 
PPT
How the internet works
ftcim
 
PPTX
build a small wireless LAN LO2
ziway
 
PPTX
Internet Applications
Marlon Jamera
 
PPTX
Active directory architecture
rahuldaredia21
 
PDF
Acceptance Criteria
Jeff Kosciejew
 
PPTX
Chain of responsibility pattern
KuntanSutar
 
PPTX
HTTP request and response
Sahil Agarwal
 
PPTX
Client server architecture
Bhargav Amin
 
PPTX
Requirement Engineering Processes & Eliciting Requirement
AqsaHayat3
 
PPTX
3.cloud service delivery models
DrRajapraveen
 
PPTX
requirement documentation
ratneshsinghparihar
 
DOC
Template FDW business requirement document
Rasananda BEHERA
 
PDF
Introduction to System and network administrations
girmayou1
 
PPTX
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Md. Abdul Barek
 
PDF
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
HamesKellor
 
PPT
Chain of responsibility
Shakil Ahmed
 
Determining Client And Networking Requirements
Steven Cahill
 
User and groups administrator
Aisha Talat
 
ACTIVE-DIRECTORY.ppt
mwti2
 
Markup language classification, designing static and dynamic
Ankita Bhalla
 
How the internet works
ftcim
 
build a small wireless LAN LO2
ziway
 
Internet Applications
Marlon Jamera
 
Active directory architecture
rahuldaredia21
 
Acceptance Criteria
Jeff Kosciejew
 
Chain of responsibility pattern
KuntanSutar
 
HTTP request and response
Sahil Agarwal
 
Client server architecture
Bhargav Amin
 
Requirement Engineering Processes & Eliciting Requirement
AqsaHayat3
 
3.cloud service delivery models
DrRajapraveen
 
requirement documentation
ratneshsinghparihar
 
Template FDW business requirement document
Rasananda BEHERA
 
Introduction to System and network administrations
girmayou1
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Md. Abdul Barek
 
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
HamesKellor
 
Chain of responsibility
Shakil Ahmed
 
Ad

Viewers also liked (20)

PPT
Week10 Analysing Client Requirements
hapy
 
PPT
Requirment anlaysis , application, device, network requirements
csk selva
 
PPT
Bussiness needs
hunni123
 
PDF
Networking devices
rupinderj
 
PPTX
The Art Of Typography
Steven Cahill
 
PPTX
Writing For The Web
Steven Cahill
 
PPTX
Writing For The Web
Steven Cahill
 
PPTX
Markup Documents
Steven Cahill
 
PPTX
Purchasing Equipment
Steven Cahill
 
PPTX
Writing For The Web
Steven Cahill
 
PPTX
Browsers
Steven Cahill
 
PPTX
Requirement analysis
csk selva
 
PPTX
Web Server Web Site Security
Steven Cahill
 
PPTX
Introduction To Network Design
Steven Cahill
 
PPTX
Testing Frameworks And Methodologies
Steven Cahill
 
PPTX
Introduction To Networking
Steven Cahill
 
PPT
Week8 Topic1 Translate Business Needs Into Technical Requirements
hapy
 
PPTX
Planning Your Website
Steven Cahill
 
PPTX
Quality Management
Steven Cahill
 
PPTX
Networking Standards And Protocols
Steven Cahill
 
Week10 Analysing Client Requirements
hapy
 
Requirment anlaysis , application, device, network requirements
csk selva
 
Bussiness needs
hunni123
 
Networking devices
rupinderj
 
The Art Of Typography
Steven Cahill
 
Writing For The Web
Steven Cahill
 
Writing For The Web
Steven Cahill
 
Markup Documents
Steven Cahill
 
Purchasing Equipment
Steven Cahill
 
Writing For The Web
Steven Cahill
 
Browsers
Steven Cahill
 
Requirement analysis
csk selva
 
Web Server Web Site Security
Steven Cahill
 
Introduction To Network Design
Steven Cahill
 
Testing Frameworks And Methodologies
Steven Cahill
 
Introduction To Networking
Steven Cahill
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
hapy
 
Planning Your Website
Steven Cahill
 
Quality Management
Steven Cahill
 
Networking Standards And Protocols
Steven Cahill
 
Ad

Similar to Confirm Client Requirements (20)

PDF
Top Down Network Design - ebrahma.com
Pawan Sharma
 
PDF
Network upgrade
Debanjan Paul
 
PDF
1. Lecturer 1 - Computer Network Design.pdf
KumbukaniLisilira
 
PDF
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Boney Maundu Slim
 
PDF
Step-by-Step Guide to Eval NSPs 2016
Eric Hyman
 
PDF
Computer Networking Concepts
Bisnis Online Mandiri
 
PDF
Tc Brochure
shylton
 
PPTX
M03-Build-a-small-wireless-Local AN.pptx
nurishmah016
 
PPTX
Chapternetworkdesign d1 [Autosaved].pptx
peterhaile1
 
PPTX
1606662359-chapter-1-top-down-network-design.pptx
MUhammadMiladAwan
 
DOCX
Cilent to server network plan
Ricky Asher
 
DOCX
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
VannaSchrader3
 
PPT
Network management objective
Dhani Ahmad
 
PDF
Game-Changing Demands on Network Management Require a Secure, Integrated, and...
Dana Gardner
 
PPTX
network engi بحث جميل للفائده القصوى ليت
ixi3gefixi
 
PDF
ICA2_handin_report222.docx
Philip Martin
 
PPTX
Computer network
Bharat Patel
 
PPTX
Chapter 10 System Architecture.Information Technology Project Management pptx
AxmedMaxamuudYoonis
 
Top Down Network Design - ebrahma.com
Pawan Sharma
 
Network upgrade
Debanjan Paul
 
1. Lecturer 1 - Computer Network Design.pdf
KumbukaniLisilira
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Boney Maundu Slim
 
Step-by-Step Guide to Eval NSPs 2016
Eric Hyman
 
Computer Networking Concepts
Bisnis Online Mandiri
 
Tc Brochure
shylton
 
M03-Build-a-small-wireless-Local AN.pptx
nurishmah016
 
Chapternetworkdesign d1 [Autosaved].pptx
peterhaile1
 
1606662359-chapter-1-top-down-network-design.pptx
MUhammadMiladAwan
 
Cilent to server network plan
Ricky Asher
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
VannaSchrader3
 
Network management objective
Dhani Ahmad
 
Game-Changing Demands on Network Management Require a Secure, Integrated, and...
Dana Gardner
 
network engi بحث جميل للفائده القصوى ليت
ixi3gefixi
 
ICA2_handin_report222.docx
Philip Martin
 
Computer network
Bharat Patel
 
Chapter 10 System Architecture.Information Technology Project Management pptx
AxmedMaxamuudYoonis
 

More from Steven Cahill (7)

PPTX
Google
Steven Cahill
 
PPTX
Network Hardware And Software
Steven Cahill
 
PPTX
Web Standards And Protocols
Steven Cahill
 
PPTX
Basic Security Requirements
Steven Cahill
 
PPTX
Disaster Recovery
Steven Cahill
 
PPTX
Website Performance
Steven Cahill
 
PPTX
Threats To The System
Steven Cahill
 
Network Hardware And Software
Steven Cahill
 
Web Standards And Protocols
Steven Cahill
 
Basic Security Requirements
Steven Cahill
 
Disaster Recovery
Steven Cahill
 
Website Performance
Steven Cahill
 
Threats To The System
Steven Cahill
 

Recently uploaded (20)

PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Doc9.....................................
SofiaCollazos
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 

Confirm Client Requirements

  • 2. Confirm Client RequirementsThis theory will cover the following:Identify Organisational RequirementsConfirm Client RequirementsIdentify Organisational Requirements
  • 3. Confirm Client RequirementsA prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues which the network needs to address.
  • 4. Confirm Client RequirementsTo do this you will need to arrange several meetings with the client.
  • 5. Confirm Client RequirementsInitially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
  • 7. Confirm Client RequirementsYou should start the analysis process by asking the client some questions about the desired functionality of the network, such as:
  • 8. Confirm Client RequirementsWhat tasks would the client like to automate or make more efficient?
  • 9. What business applications does the client need to support?
  • 10. Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support?
  • 11. Does the client require electronic mail and Internet, perhaps even a web server?Confirm Client RequirementsDoes the client require electronic mail and Internet, perhaps even a web server?
  • 12. Is the client planning to incorporate EFTPOS operations into the network?
  • 13. What is the estimated size of the network; how many users will the network service?
  • 14. How important is network security?
  • 15. Does the client have an existing network, and what is its function?Confirm Client RequirementsOnce you have considered all the business tasks and functions the client requires, write them down and assign priorities to each item – this is the beginning of your network plan.
  • 16. Confirm Client RequirementsAs you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
  • 17. Confirm Client RequirementsThe following points address some of the issues that should be included in the network plan:
  • 18. Confirm Client Requirements1. Sizing the networkIt is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use.
  • 19. Confirm Client Requirements1. Sizing the networkPlan for future growth by building in extra capacity from the beginning.
  • 20. Confirm Client Requirements1. Sizing the networkConsider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs.
  • 21. Confirm Client Requirements1. Sizing the networkA good network should be designed to grow easily with the careful addition of existing technology.
  • 22. Confirm Client Requirements2. Follow a standard approachIt is important that you plan and build the network using standard industry-proven components.
  • 23. Confirm Client Requirements2. Follow a standard approachAs business relationships change, the network may need to interconnect with others.
  • 24. Confirm Client Requirements2. Follow a standard approachIt is therefore wise to design a network that is not likely to pose compatibility problems.
  • 25. Confirm Client Requirements2. Follow a standard approachIf you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
  • 26. Confirm Client Requirements3. ConnectivityWhat types of external connections will the network need? Is Internet access necessary?
  • 27. Confirm Client Requirements3. ConnectivityIf so, will a dial-up connection suffice, or will you need a fill-time dedicated link?
  • 28. Confirm Client Requirements3. ConnectivityWill the client require remote access for their staff?
  • 29. Confirm Client Requirements3. ConnectivityOne of the most challenging aspects of designing a network involves setting up links to external networks.
  • 30. Confirm Client Requirements3. ConnectivityNot only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
  • 31. Confirm Client Requirements3. ConnectivityMany organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public.
  • 32. Confirm Client Requirements3. ConnectivityHowever, there is much more to the Internet than simply creating a home page.
  • 33. Confirm Client Requirements3. ConnectivityIt is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services.
  • 34. Confirm Client Requirements3. ConnectivityYou need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
  • 35. Confirm Client Requirements3. ConnectivityThe first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information?
  • 36. Confirm Client Requirements3. ConnectivityIf the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services.
  • 37. Confirm Client Requirements3. ConnectivityIf the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
  • 38. Confirm Client Requirements4. SecurityWhile the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
  • 39. Confirm Client Requirements4. SecurityConsider the following hardware-related security risks:
  • 40. Confirm Client Requirements4. SecurityThe nature of wireless networking means that a potential hacker does not need to have physical access to the network.
  • 41. Confirm Client Requirements4. SecurityEstablishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
  • 42. Confirm Client Requirements4. SecurityThe risk may be minor, but it is important to make the client aware that a risk exists
  • 43. Confirm Client Requirements4. SecurityOf course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security.
  • 44. Confirm Client Requirements4. SecurityFor exampleUsing intelligent routers with built-in firewalls which offer a higher level of security than those without
  • 45. Using a switch or bridge to partition sensitive areas of a network from public access areasConfirm Client Requirements4. SecurityThe level of security required is going to depend on the type of information stored on a system.
  • 46. Confirm Client Requirements4. SecurityFor example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
  • 47. Confirm Client Requirements5. InteroperabilityThis refers to the hardware’s ability to communicate and interact with different hardware and operating systems.
  • 48. Confirm Client Requirements5. InteroperabilityWhen recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible.
  • 49. Confirm Client Requirements5. InteroperabilityYou should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
  • 50. Confirm Client Requirements6. Ease of useThe hardware needs to be easy to use, especially for the end user.
  • 51. Confirm Client Requirements6. Ease of useIn situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
  • 52. Confirm Client Requirements7. Software compatibilityYou need to know what software the client intends to run, both now and in the near future.
  • 53. Confirm Client Requirements7. Software compatibilityAdvising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
  • 54. Confirm Client Requirements8. WarrantyMost manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item.
  • 55. Confirm Client Requirements8. WarrantyFor example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
  • 56. Confirm Client Requirements9. CostMost clients will tell you that the most important requirement they have is cost and they are right.
  • 57. Confirm Client Requirements9. CostHowever what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money.
  • 58. Confirm Client Requirements9. CostAs an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
  • 59. Confirm Client Requirements10. Existing InfrastructureIf a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available. In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation.
  • 60. Confirm Client Requirements10. Existing InfrastructureSome of the issues you will need to address include:Can any of the existing hardware be reused?
  • 61. Will the new hardware be compatible with the existing hardware?
  • 62. Will the new hardware be compatible with the existing software?Confirm Client Requirements10. Existing InfrastructureWhat effect will the new hardware have on productivity?
  • 63. Will the new hardware enable any new functions to be undertaken (for example, video conferencing)?
  • 64. How many users will benefit from the installation of the new hardware?
  • 65. How long will the new hardware take to install?Confirm Client Requirements10. Existing InfrastructureWhat sort of disruption to existing services is likely during the installation of the new hardware?Produced by Steven [email protected]