Verified Document

Network Project Scope Discussion Of Dissertation

The second milestone will be reached when all of the hardware and networking is successfully installed. The final milestone will be completed when the software is fully configured and the project is ready to turn over to the end user for integration into the primary business function. Risk Analysis

The risks associated with this project will be the greatest in the networking and software configuration phases. The cost-benefit calculated such a favourable number that this should offset many of the concerns associated with these risks. Even still, the project proposal will attempt to expand on these risks so that any potential delays can be avoided. The first risk is that the networking phase goes array. This could happen as a result...

The first being that the installation crew is not adequately experienced and the second can occur if not enough time or effort is placed into the networking planning stage. Once again it will be up to the project manager to make sure these requirements are both met.
The server configuration phase represents another potential risk. Configurations of this magnitude can become quite complicated and any delays can generally be attributed to the same factors as the potential delays in networking; one is inexperienced technicians and the other is poor planning. This risks are somewhat mitigated in this project because a bulk of the server configuration will be done by the vendor as included in the budget forecast.

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now