SlideShare uma empresa Scribd logo
1 de 34
Networking Fundamentals Determining Client and Network Requirements
Determining Client and Network Requirements Introduction
Introduction Before you begin designing a network you need to have a clear sense of the client’s expectations. Too often in the past, technology has been purchased or developed without a clear idea of why it is needed. The aim is to find a solution that fits the requirements, not a requirement that fits the technology.
Determining Client and Network Requirements Identifying Organisational Requirements
Identifying Organisational Requirements A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues the network needs to address. To do this you will need to arrange several meetings with the client. Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
Defining Business Objectives You should start the analysis process by asking the client some questions about the desired functionality of the network, such as: What tasks would the client like to automate or make more efficient? What business applications does the client need to support? Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support? Does the client require electronic mail and Internet, perhaps even a web server? Is the client planning to incorporate EFTPOS operations into the network?  What is the estimated size of the network; how many users will the network service? How important is network security? Does the client have an existing network, and what is its function?
Defining Business Objectives Once you have considered all the business tasks and functions the client requires, write them down and assign priorities to each item – this is the beginning of your network plan. As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
Defining Business Objectives The following points address some of the issues that should be included in the network plan:
Defining Business Objectives Sizing the Network It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use. Plan for future growth by building in extra capacity from the beginning. Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs. A good network should be designed to grow easily with the careful addition of existing technology.
Defining Business Objectives Following a Standards Approach It is important that you plan and build the network using standard industry-proven components. As business relationships change, the network may need to interconnect with others. It is therefore wise to design a network that is not likely to pose compatibility problems. If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
Defining Business Objectives Connectivity What types of external connections will the network need? Is Internet access necessary? If so, will a dial-up connection suffice, or will you need a fill-time dedicated link?  Will the client require remote access for their staff? One of the most challenging aspects of designing a network involves setting up links to external networks. Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
Defining Business Objectives Connectivity Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public. However, there is much more to the Internet than simply creating a home page. It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services. You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
Defining Business Objectives Connectivity The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information? If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services. If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
Defining Business Objectives Security While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
Defining Business Objectives Security Consider the following hardware-related security risks:  The nature of wireless networking means that a potential hacker does not need to have physical access to the network.  Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
Defining Business Objectives Security The risk may be minor, but it is important to make the client aware that a risk exists. Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security. For example Using intelligent routers with built-in firewalls which offer a higher level of security than those without Using a switch or bridge to partition sensitive areas of a network from public access areas
Defining Business Objectives Security The level of security required is going to depend on the type of information stored on a system. For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
Defining Business Objectives Interoperability This refers to the hardware’s ability to communicate and interact with different hardware and operating systems. When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible. You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
Defining Business Objectives Ease of Use The hardware needs to be easy to use, especially for the end user.  In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
Defining Business Objectives Software Compatability You need to know what software the client intends to run, both now and in the near future.  Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
Defining Business Objectives Warranty Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item. For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
Defining Business Objectives Cost Most clients will tell you that the most important requirement they have is cost and they are right. However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money. As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
Defining Business Objectives Existing Infrastructure If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available. In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation
Defining Business Objectives Existing Infrastructure Some of the issues you will need to address include: Can any of the existing hardware be reused? Will the new hardware be compatible with the existing hardware? Will the new hardware be compatible with the existing software?  What effect will the new hardware have on productivity? Will the new hardware enable any new functions to be undertaken (for example, video conferencing)? How many users will benefit from the installation of the new hardware? How long will the new hardware take to install?  What sort of disruption to existing services is likely during the installation of the new hardware?
Determining Client and Networking Requirements Working with the Client
Working with the Client In order to ensure that the network design best suits the client’s needs, you will need to work closely with them over a number of days, weeks or even months. This will require you to organise meetings with the client. You will also need to meet with a number of different personnel within the client organisation, such as team managers, key employees, and with other maintenance support providers and managers.
Working with the Client It may not be necessary to meet with key employees as a group since mostly their team managers will represent them. It may be more productive to conduct a number of informal interviews or meetings with individual employees and simply make notes of their business requirements. You should make it clear that you value the contribution of these employees.
Conducting Meetings and Interviews Meetings and Interviews involve communication and collecting data, by asking questions and discussing various issues concerning the network requirements. The objective is to obtain information that can be analysed in order to determine requirements.
Conducting Meetings and Interviews To do this successfully, a range of skills are required: Speaking Listening Observing Understanding Questioning Analysing Note Taking
Conducting Meetings and Interviews Some helpful things to remember include: Your speech should be clear and understandable: do not talk too quickly and avoid technical jargon. Many clients just want a computer network that works, and are not concerned with all the technical detail. They also want to know that they are dealing with professionals, so remember to be courteous and helpful.
Conducting Meetings and Interviews Some helpful things to remember include: Develop good listening habits: concentrate on the speaker’s message and listen for the main ideas, concepts or principles. One technique that can be used to improve listening skills is ‘active listening’. This means listening to what the person is saying and mirroring what you believe has been said, by paraphrasing or summarising their words. In this way, errors and misconceptions can be corrected
Conducting Meetings and Interviews Some helpful things to remember include: Take notes, but do not write down everything word for word. Listen and think before writing, then record the key words. Notes help you recall information revealed during the interview.
Conducting Meetings and Interviews In between meetings, you should be talking to vendors of equipment and services relating to the network plan. You should be very familiar with the costs, the services offered and the weaknesses of these vendors. As you become familiar with these, you will be better positioned to understand and recommend an appropriate solution for the organisation.
Conducting Meetings and Interviews It is also useful to maintain good documentation throughout this process. This documentation will form the basis of a report you can present to management to summarise and clarify your findings. Management can then sign off on the report as a true and accurate description of the business needs.

Mais conteúdo relacionado

Mais procurados

ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
bwire sedrick
 
NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™
UzumakiMugiwara
 

Mais procurados (20)

Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network Services
 
Network testing and debugging
Network testing and debuggingNetwork testing and debugging
Network testing and debugging
 
Network design
Network designNetwork design
Network design
 
IT system and network administrator
IT system and network administratorIT system and network administrator
IT system and network administrator
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services  Installation & Configuration  - Windows Ser...Active Directory Domain Services  Installation & Configuration  - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
Cabling
Cabling Cabling
Cabling
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Chapter03
Chapter03Chapter03
Chapter03
 

Destaque

Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
Steven Cahill
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
hapy
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
hunni123
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
hapy
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of Typography
Steven Cahill
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing Equipment
Steven Cahill
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
Steven Cahill
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
Steven Cahill
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And Methodologies
Steven Cahill
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
Steven Cahill
 

Destaque (20)

Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
Design of network
Design of networkDesign of network
Design of network
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 
Markup Documents
Markup DocumentsMarkup Documents
Markup Documents
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of Typography
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing Equipment
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Browsers
BrowsersBrowsers
Browsers
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And Methodologies
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 

Semelhante a Determining Client And Networking Requirements

EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
Eric Hyman
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
monicafrancis71118
 

Semelhante a Determining Client And Networking Requirements (20)

EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
 
Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
Computer Networking Concepts
Computer Networking ConceptsComputer Networking Concepts
Computer Networking Concepts
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Choosing the Right Cloud Provider
Choosing the Right Cloud ProviderChoosing the Right Cloud Provider
Choosing the Right Cloud Provider
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
12 Steps To Soa Final
12 Steps To Soa Final12 Steps To Soa Final
12 Steps To Soa Final
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
 
Cloud Architect Company in India.pdf
Cloud Architect Company in India.pdfCloud Architect Company in India.pdf
Cloud Architect Company in India.pdf
 
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebookComparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Cloud Architect Company in India.pptx
Cloud Architect Company in India.pptxCloud Architect Company in India.pptx
Cloud Architect Company in India.pptx
 
Mit4032 cloud computing
Mit4032   cloud computingMit4032   cloud computing
Mit4032 cloud computing
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
 
Intranet Software
Intranet SoftwareIntranet Software
Intranet Software
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
An Overview of the Need For Colocation Services in Los Angeles.pdf
An Overview of the Need For Colocation Services in Los Angeles.pdfAn Overview of the Need For Colocation Services in Los Angeles.pdf
An Overview of the Need For Colocation Services in Los Angeles.pdf
 

Mais de Steven Cahill

Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
Steven Cahill
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your Website
Steven Cahill
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And Protocols
Steven Cahill
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
Steven Cahill
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
Steven Cahill
 

Mais de Steven Cahill (10)

Google
GoogleGoogle
Google
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Quality Management
Quality ManagementQuality Management
Quality Management
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your Website
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And Protocols
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Website Performance
Website PerformanceWebsite Performance
Website Performance
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Determining Client And Networking Requirements

  • 1. Networking Fundamentals Determining Client and Network Requirements
  • 2. Determining Client and Network Requirements Introduction
  • 3. Introduction Before you begin designing a network you need to have a clear sense of the client’s expectations. Too often in the past, technology has been purchased or developed without a clear idea of why it is needed. The aim is to find a solution that fits the requirements, not a requirement that fits the technology.
  • 4. Determining Client and Network Requirements Identifying Organisational Requirements
  • 5. Identifying Organisational Requirements A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues the network needs to address. To do this you will need to arrange several meetings with the client. Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues.
  • 6. Defining Business Objectives You should start the analysis process by asking the client some questions about the desired functionality of the network, such as: What tasks would the client like to automate or make more efficient? What business applications does the client need to support? Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support? Does the client require electronic mail and Internet, perhaps even a web server? Is the client planning to incorporate EFTPOS operations into the network? What is the estimated size of the network; how many users will the network service? How important is network security? Does the client have an existing network, and what is its function?
  • 7. Defining Business Objectives Once you have considered all the business tasks and functions the client requires, write them down and assign priorities to each item – this is the beginning of your network plan. As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.
  • 8. Defining Business Objectives The following points address some of the issues that should be included in the network plan:
  • 9. Defining Business Objectives Sizing the Network It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use. Plan for future growth by building in extra capacity from the beginning. Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs. A good network should be designed to grow easily with the careful addition of existing technology.
  • 10. Defining Business Objectives Following a Standards Approach It is important that you plan and build the network using standard industry-proven components. As business relationships change, the network may need to interconnect with others. It is therefore wise to design a network that is not likely to pose compatibility problems. If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.
  • 11. Defining Business Objectives Connectivity What types of external connections will the network need? Is Internet access necessary? If so, will a dial-up connection suffice, or will you need a fill-time dedicated link? Will the client require remote access for their staff? One of the most challenging aspects of designing a network involves setting up links to external networks. Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.
  • 12. Defining Business Objectives Connectivity Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public. However, there is much more to the Internet than simply creating a home page. It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services. You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.
  • 13. Defining Business Objectives Connectivity The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information? If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services. If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.
  • 14. Defining Business Objectives Security While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.
  • 15. Defining Business Objectives Security Consider the following hardware-related security risks: The nature of wireless networking means that a potential hacker does not need to have physical access to the network. Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.
  • 16. Defining Business Objectives Security The risk may be minor, but it is important to make the client aware that a risk exists. Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security. For example Using intelligent routers with built-in firewalls which offer a higher level of security than those without Using a switch or bridge to partition sensitive areas of a network from public access areas
  • 17. Defining Business Objectives Security The level of security required is going to depend on the type of information stored on a system. For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.
  • 18. Defining Business Objectives Interoperability This refers to the hardware’s ability to communicate and interact with different hardware and operating systems. When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible. You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.
  • 19. Defining Business Objectives Ease of Use The hardware needs to be easy to use, especially for the end user. In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.
  • 20. Defining Business Objectives Software Compatability You need to know what software the client intends to run, both now and in the near future. Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.
  • 21. Defining Business Objectives Warranty Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item. For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.
  • 22. Defining Business Objectives Cost Most clients will tell you that the most important requirement they have is cost and they are right. However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money. As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.
  • 23. Defining Business Objectives Existing Infrastructure If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available. In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation
  • 24. Defining Business Objectives Existing Infrastructure Some of the issues you will need to address include: Can any of the existing hardware be reused? Will the new hardware be compatible with the existing hardware? Will the new hardware be compatible with the existing software? What effect will the new hardware have on productivity? Will the new hardware enable any new functions to be undertaken (for example, video conferencing)? How many users will benefit from the installation of the new hardware? How long will the new hardware take to install? What sort of disruption to existing services is likely during the installation of the new hardware?
  • 25. Determining Client and Networking Requirements Working with the Client
  • 26. Working with the Client In order to ensure that the network design best suits the client’s needs, you will need to work closely with them over a number of days, weeks or even months. This will require you to organise meetings with the client. You will also need to meet with a number of different personnel within the client organisation, such as team managers, key employees, and with other maintenance support providers and managers.
  • 27. Working with the Client It may not be necessary to meet with key employees as a group since mostly their team managers will represent them. It may be more productive to conduct a number of informal interviews or meetings with individual employees and simply make notes of their business requirements. You should make it clear that you value the contribution of these employees.
  • 28. Conducting Meetings and Interviews Meetings and Interviews involve communication and collecting data, by asking questions and discussing various issues concerning the network requirements. The objective is to obtain information that can be analysed in order to determine requirements.
  • 29. Conducting Meetings and Interviews To do this successfully, a range of skills are required: Speaking Listening Observing Understanding Questioning Analysing Note Taking
  • 30. Conducting Meetings and Interviews Some helpful things to remember include: Your speech should be clear and understandable: do not talk too quickly and avoid technical jargon. Many clients just want a computer network that works, and are not concerned with all the technical detail. They also want to know that they are dealing with professionals, so remember to be courteous and helpful.
  • 31. Conducting Meetings and Interviews Some helpful things to remember include: Develop good listening habits: concentrate on the speaker’s message and listen for the main ideas, concepts or principles. One technique that can be used to improve listening skills is ‘active listening’. This means listening to what the person is saying and mirroring what you believe has been said, by paraphrasing or summarising their words. In this way, errors and misconceptions can be corrected
  • 32. Conducting Meetings and Interviews Some helpful things to remember include: Take notes, but do not write down everything word for word. Listen and think before writing, then record the key words. Notes help you recall information revealed during the interview.
  • 33. Conducting Meetings and Interviews In between meetings, you should be talking to vendors of equipment and services relating to the network plan. You should be very familiar with the costs, the services offered and the weaknesses of these vendors. As you become familiar with these, you will be better positioned to understand and recommend an appropriate solution for the organisation.
  • 34. Conducting Meetings and Interviews It is also useful to maintain good documentation throughout this process. This documentation will form the basis of a report you can present to management to summarise and clarify your findings. Management can then sign off on the report as a true and accurate description of the business needs.