Business Requirements Document and Work Breakdown Structure
Autor: effingloser • October 29, 2012 • Essay • 803 Words (4 Pages) • 2,223 Views
Business Requirements Document and Work Breakdown Structure
Business Requirements Document
User Requirements
The proposed wireless addition to Riordan Manufacturing’s (RM) Wide Area Network (WAN) is expected to allow users to provide a more efficient system for plant production. The wireless system is expected to be incorporated throughout each RM location. Users will have the capability to send and receive messages in each RM location, as well as access large amounts of information wirelessly through the wireless network. Users will have the ability to transfer information ranging from CAD drawings, to inter-office memos, to payroll information not just in one location, but throughout all RM locations. Users will also have the opportunity to reach out and talk to other locations and clients across the country.
This integrated approach for wireless information sharing should allow users to receive timely important internal information and improve business turn-around. The wireless system will also help clean out the current wired network infrastructure, and should simplify troubleshooting.
System Requirements
The wireless system is to encompass all RM locations with a wireless network that is connected to the current RM WAN. The proposed wireless network infrastructure will be composed of a standardized system of routers, servers and wireless access points. This standardization will allow RM to save costs by using a single vendor to provide the wireless infrastructure. Standardization will also allow easier troubleshooting by allowing current IT personnel to only troubleshoot problems in a single vendor’s wireless system instead of various disparate systems.
Wireless security is an important feature of the project. The easy network access of the wireless system can also be its downfall by providing unauthorized users access to potentially sensitive company information. Aside from giving users their own username and password, a proactive approach to system security will be taken and will involve locking down wireless access points to only recognize company hardware, installing firewalls, and automatic software updates to name a few. Network monitoring will also be enforced in each wireless location to identify problems and potential security issues.
Functional Requirements
The functional requirements of the wireless system includes ease-of-use, high-speed access, and high security. The wireless network is to be designed and used with company employees in mind. The wireless network will be intuitive to use for company employees as its design mirrors other wireless networks currently found in other companies. The wireless network must be able to deliver content as quickly as possible with not delay and with minimum down times. Security
...