SlideShare ist ein Scribd-Unternehmen logo
1 von 60
Downloaden Sie, um offline zu lesen
Confirm Client Requirements,[object Object]
Confirm Client Requirements,[object Object],This theory will cover the following:,[object Object],[object Object],[object Object]
Confirm Client Requirements,[object Object],A prerequisite to good network design is to discuss the client’s networking needs, as this will enable you to analyse the various issues which the network needs to address.,[object Object]
Confirm Client Requirements,[object Object],To do this you will need to arrange several meetings with the client.,[object Object]
Confirm Client Requirements,[object Object],Initially these meetings will probably focus on fairly broad managerial type issues, but as you obtain more and more information about the client’s needs you can then arrange meetings to discuss specific issues. ,[object Object]
Confirm Client Requirements,[object Object],Defining Business Objectives,[object Object]
Confirm Client Requirements,[object Object],You should start the analysis process by asking the client some questions about the desired functionality of the network, such as:,[object Object]
Confirm Client Requirements,[object Object],[object Object]
What business applications does the client need to support?
Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support?
Does the client require electronic mail and Internet, perhaps even a web server?,[object Object]
Is the client planning to incorporate EFTPOS operations into the network?
What is the estimated size of the network; how many users will the network service?
How important is network security?
Does the client have an existing network, and what is its function?,[object Object]
Confirm Client Requirements,[object Object],As you create the plan, consider which parts you can do now and which can be addressed later, taking care of critical business functions first.,[object Object]
Confirm Client Requirements,[object Object],The following points address some of the issues that should be included in the network plan:,[object Object]
Confirm Client Requirements,[object Object],1. Sizing the network,[object Object],It is important to have a clear idea of the network’s expected size, taking in to consideration the number of users and the level of use.,[object Object]
Confirm Client Requirements,[object Object],1. Sizing the network,[object Object],Plan for future growth by building in extra capacity from the beginning.,[object Object]
Confirm Client Requirements,[object Object],1. Sizing the network,[object Object],Consider what capacity the client may need in two or three years and how an increase in the number of users will affect data storage needs.,[object Object]
Confirm Client Requirements,[object Object],1. Sizing the network,[object Object],A good network should be designed to grow easily with the careful addition of existing technology.,[object Object]
Confirm Client Requirements,[object Object],2. Follow a standard approach,[object Object],It is important that you plan and build the network using standard industry-proven components.,[object Object]
Confirm Client Requirements,[object Object],2. Follow a standard approach,[object Object],As business relationships change, the network may need to interconnect with others.,[object Object]
Confirm Client Requirements,[object Object],2. Follow a standard approach,[object Object],It is therefore wise to design a network that is not likely to pose compatibility problems.,[object Object]
Confirm Client Requirements,[object Object],2. Follow a standard approach,[object Object],If you are designing a network for an independent branch of a larger organisations, obtain copies of current network operations and use these as your standard.,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],What types of external connections will the network need?  Is Internet access necessary?,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],If so, will a dial-up connection suffice, or will you need a fill-time dedicated link?,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],Will the client require remote access for their staff?,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],One of the most challenging aspects of designing a network involves setting up links to external networks.,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],Not only are these the most technically complex tasks of implementing a network, but they also carry significant costs, that the client needs to be aware of from the very beginning.,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],Many organisations maintain a ‘web presence’ via the development of an Internet home page, allowing them to showcase their goods and services to the general public.  ,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],However, there is much more to the Internet than simply creating a home page.,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],It is important to make the client aware of the various Internet services available as well as the technical issues surrounding the implementation of those services.,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],You need to make sure that the client is well informed about the potential security issues involved in connecting their network to the Web.,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],The first question you should ask the client is what level of Internet access they require: do they want the use the Internet to promote their own business or to access information?,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],If the organisation simply wants to set up a home page to provide client information, then they may choose to contract an Internet Service Provider (ISP) and a web designer to maintain their web presence, with little if any interruption to internal network services.,[object Object]
Confirm Client Requirements,[object Object],3. Connectivity,[object Object],If the organisation decides that they would like their staff to have Internet access, to be able to send emails and browse the web, then the task becomes more difficult, and more costly.,[object Object]
Confirm Client Requirements,[object Object],4. Security,[object Object],While the network operating system is responsible for maintain the overall security of the network, especially in terms of user access and authentication, the type of network hardware used can also have an impact on security.,[object Object]
Confirm Client Requirements,[object Object],4. Security,[object Object],Consider the following hardware-related security risks:,[object Object]
Confirm Client Requirements,[object Object],4. Security,[object Object],The nature of wireless networking means that a potential hacker does not need to have physical access to the network.,[object Object]
Confirm Client Requirements,[object Object],4. Security,[object Object],Establishing a permanent Internet connection via ADSL potentially makes the network accessible to anybody connected to the Web.,[object Object]
Confirm Client Requirements,[object Object],4. Security,[object Object],The risk may be minor, but it is important to make the client aware that a risk exists,[object Object]
Confirm Client Requirements,[object Object],4. Security,[object Object],Of course there are also a number of hardware solutions that can be implemented to help minimize risk and improve security.  ,[object Object]
Confirm Client Requirements,[object Object],4. Security,[object Object],For example,[object Object],[object Object]
Using a switch or bridge to partition sensitive areas of a network from public access areas,[object Object]
Confirm Client Requirements,[object Object],4. Security,[object Object],For example, a video store is going to have limited security requirements whereas a legal firm is going to have significant security requirements.,[object Object]
Confirm Client Requirements,[object Object],5. Interoperability,[object Object],This refers to the hardware’s ability to communicate and interact with different hardware and operating systems.,[object Object]
Confirm Client Requirements,[object Object],5. Interoperability,[object Object],When recommending new hardware you need to consider what type of hardware is already in use and make sure that the new component is compatible.,[object Object]
Confirm Client Requirements,[object Object],5. Interoperability,[object Object],You should also consider what standards exist within the industry: if most other industries in this organisation use XYZ, and you advise the client to use ABC then you need to make sure that the two systems are compatible.,[object Object]
Confirm Client Requirements,[object Object],6. Ease of use,[object Object],The hardware needs to be easy to use, especially for the end user.,[object Object]
Confirm Client Requirements,[object Object],6. Ease of use,[object Object],In situations where the client requires ongoing administration access to the system, then the recommended hardware should come with an easy-to-use configuration interface, as well as good quality documentation.,[object Object]
Confirm Client Requirements,[object Object],7. Software compatibility,[object Object],You need to know what software the client intends to run, both now and in the near future.,[object Object]
Confirm Client Requirements,[object Object],7. Software compatibility,[object Object],Advising the client on a particular piece of hardware, only find that it does not support the client’s operating system or application software is embarrassing and can be extremely expensive.,[object Object]
Confirm Client Requirements,[object Object],8. Warranty,[object Object],Most manufacturers offer some level of warranty on their hardware, but these can vary greatly not only from manufacturer to manufacturer but also from item to item.,[object Object]
Confirm Client Requirements,[object Object],8. Warranty,[object Object],For example, some manufacturers have a ‘return to base warranty’ which means that if a hardware component fails, it needs to be couriered back to the manufacturer for inspection and repairs or replacement, and this can take several weeks.,[object Object]
Confirm Client Requirements,[object Object],9. Cost,[object Object],Most clients will tell you that the most important requirement they have is cost and they are right.,[object Object]
Confirm Client Requirements,[object Object],9. Cost,[object Object],However what many people fail to realize is that the cheapest option is not always the best, and what the client really needs is not the cheapest but the best value for money.,[object Object]
Confirm Client Requirements,[object Object],9. Cost,[object Object],As an IT professional advising a client on network hardware it is your responsibility to ensure that the hardware you recommend offers the best value for money possible.,[object Object]
Confirm Client Requirements,[object Object],10. Existing Infrastructure,[object Object],If a network already exists, then it is important to consider the existing infrastructure as it may limit what options are available.  In order to do this you will need to meet with other technical staff as well as gain access to any existing network documentation.,[object Object]
Confirm Client Requirements,[object Object],10. Existing Infrastructure,[object Object],Some of the issues you will need to address include:,[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Monitor and administer system and network
Monitor and administer system and network Monitor and administer system and network
Monitor and administer system and network Gera Paulos
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptxJaleto Sunkemo
 
Provide remote help desk support
Provide remote help desk supportProvide remote help desk support
Provide remote help desk supportJaleto Sunkemo
 
Implement maintenance procedures
Implement maintenance proceduresImplement maintenance procedures
Implement maintenance proceduresGera Paulos
 
Access and use internet
Access and use internetAccess and use internet
Access and use internetGera Paulos
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Determine best fit topology
Determine best fit topologyDetermine best fit topology
Determine best fit topologyAbenezer Abiti
 
Best fit topology - LO1 part II
Best fit topology - LO1 part IIBest fit topology - LO1 part II
Best fit topology - LO1 part IIAbenezer Abiti
 
Software project plannings
Software project planningsSoftware project plannings
Software project planningsAman Adhikari
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)Nimmi Weeraddana
 
What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)Amit Nirala
 
End User Support Presentation
End User Support Presentation End User Support Presentation
End User Support Presentation Self employed
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
 
Introduction of software project management
Introduction of software project managementIntroduction of software project management
Introduction of software project managementREHMAT ULLAH
 

Was ist angesagt? (20)

Monitor and administer system and network
Monitor and administer system and network Monitor and administer system and network
Monitor and administer system and network
 
System Administration
System AdministrationSystem Administration
System Administration
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
Provide remote help desk support
Provide remote help desk supportProvide remote help desk support
Provide remote help desk support
 
Implement maintenance procedures
Implement maintenance proceduresImplement maintenance procedures
Implement maintenance procedures
 
Access and use internet
Access and use internetAccess and use internet
Access and use internet
 
Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
 
Chapter05
Chapter05Chapter05
Chapter05
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Determine best fit topology
Determine best fit topologyDetermine best fit topology
Determine best fit topology
 
Best fit topology - LO1 part II
Best fit topology - LO1 part IIBest fit topology - LO1 part II
Best fit topology - LO1 part II
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
 
Utp & fiber 1
Utp & fiber 1Utp & fiber 1
Utp & fiber 1
 
Software project plannings
Software project planningsSoftware project plannings
Software project plannings
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
Chapter02
Chapter02Chapter02
Chapter02
 
What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)
 
End User Support Presentation
End User Support Presentation End User Support Presentation
End User Support Presentation
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Introduction of software project management
Introduction of software project managementIntroduction of software project management
Introduction of software project management
 

Andere mochten auch

Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirementshapy
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementscsk selva
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needshunni123
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of TypographySteven Cahill
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing EquipmentSteven Cahill
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysiscsk selva
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site SecuritySteven Cahill
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network DesignSteven Cahill
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And MethodologiesSteven Cahill
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To NetworkingSteven Cahill
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirementshapy
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your WebsiteSteven Cahill
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 

Andere mochten auch (20)

Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
The Art Of Typography
The Art Of TypographyThe Art Of Typography
The Art Of Typography
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Markup Documents
Markup DocumentsMarkup Documents
Markup Documents
 
Purchasing Equipment
Purchasing EquipmentPurchasing Equipment
Purchasing Equipment
 
Writing For The Web
Writing For The WebWriting For The Web
Writing For The Web
 
Browsers
BrowsersBrowsers
Browsers
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 
Testing Frameworks And Methodologies
Testing Frameworks And MethodologiesTesting Frameworks And Methodologies
Testing Frameworks And Methodologies
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
Planning Your Website
Planning Your WebsitePlanning Your Website
Planning Your Website
 
Quality Management
Quality ManagementQuality Management
Quality Management
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 

Ähnlich wie Confirm Client Requirements

Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Dinesh Kumar
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design Muhd Mu'izuddin
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
 
A reliable network cabling infrastructure is a critical component for busines...
A reliable network cabling infrastructure is a critical component for busines...A reliable network cabling infrastructure is a critical component for busines...
A reliable network cabling infrastructure is a critical component for busines...InfiniteNetworksInc
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Securityphanleson
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docxbriancrawford30935
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12VannaSchrader3
 
Network Capability Profile
Network Capability ProfileNetwork Capability Profile
Network Capability Profilepds2k.com
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
BASC presentation on security and application architecture
BASC presentation on security and application architectureBASC presentation on security and application architecture
BASC presentation on security and application architecturewbjwilliams3
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 

Ähnlich wie Confirm Client Requirements (20)

Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
Module 4 Assignment
Module 4 AssignmentModule 4 Assignment
Module 4 Assignment
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
A reliable network cabling infrastructure is a critical component for busines...
A reliable network cabling infrastructure is a critical component for busines...A reliable network cabling infrastructure is a critical component for busines...
A reliable network cabling infrastructure is a critical component for busines...
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
7 Questions to Ask Data Centre Providers
7 Questions to Ask Data Centre Providers7 Questions to Ask Data Centre Providers
7 Questions to Ask Data Centre Providers
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
 
Network Capability Profile
Network Capability ProfileNetwork Capability Profile
Network Capability Profile
 
Rohan_Purekar
Rohan_PurekarRohan_Purekar
Rohan_Purekar
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
BASC presentation on security and application architecture
BASC presentation on security and application architectureBASC presentation on security and application architecture
BASC presentation on security and application architecture
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Computer Networking Concepts
Computer Networking ConceptsComputer Networking Concepts
Computer Networking Concepts
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 

Mehr von Steven Cahill

Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And ProtocolsSteven Cahill
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 

Mehr von Steven Cahill (7)

Google
GoogleGoogle
Google
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Web Standards And Protocols
Web Standards And ProtocolsWeb Standards And Protocols
Web Standards And Protocols
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Website Performance
Website PerformanceWebsite Performance
Website Performance
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 

Kürzlich hochgeladen

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 

Kürzlich hochgeladen (20)

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 

Confirm Client Requirements

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. What business applications does the client need to support?
  • 10. Does the client simply want to have shared access to word processing files, or do they have multi-user databases to support?
  • 11.
  • 12. Is the client planning to incorporate EFTPOS operations into the network?
  • 13. What is the estimated size of the network; how many users will the network service?
  • 14. How important is network security?
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. Will the new hardware be compatible with the existing hardware?
  • 62.
  • 63. Will the new hardware enable any new functions to be undertaken (for example, video conferencing)?
  • 64. How many users will benefit from the installation of the new hardware?
  • 65.