Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.
Scenario “We Make Windows”, Inc. (referred to as “WMW”) has hired you as an IT consultant for implementing their Windows network infrastructure. WMW is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WMW with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WMW wishes to implement the “right” solution to fit their needs now and for the next 2-3 years.
There are several details about WMW which will have an impact on your choices:
· WMW will start with 90 employees, in the following departments:
o Executives (9 employees) – manage and run the company
o Accounts and Sales Department (15 employees) – perform market research and maintain accounts
o Creative, Media and Production Department (49 employees) – advertising
o Human Resources and Finances (12 employees) – perform HR and financial duties
o IT (5 employees) – manage IT for the company
o WMW will have two sites, one in Los Angeles and one in New York. Most staff will be located in LA, with at least 1 person from each of the departments above located in NY.
· Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity. Please be sure to state these assumptions.
· Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
· Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). You may make assumptions about how data should be shared or kept private, but they must be stated in your paper.
· Assumptions can be made regarding any information not included here; all assumptions should be identified, however.
Topics to Cover Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.
Describe the technical and business reasons for each choice, citing other resources as appropriate.
The Windows Server 2016 operating system should be used for all aspects of the solution.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more