ITS 405 Portfolio Project Scenario: Worldwide Advertising In
Its405 Portfolio Project Scenarioworldwide Advertising Inc Wai Has
Worldwide Advertising, Inc. (WAI) has hired you as an IT consultant to design and implement their core IT services. They are a new advertising company with no existing IT staff, and they plan to establish two locations, one in Los Angeles and one in New York. The company will start with 300 employees across several departments: Executives (10), Accounts and Sales (150), Creative, Media and Production (100), Human Resources and Finances (30), and IT (10). Most staff will work in Los Angeles, with at least one person from each department at the New York site. Network infrastructure is already in place, with a secure IPSec tunnel connecting the sites. Security mechanisms are handled separately. Some departments require data privacy from others. You are to propose a solution for the deployment and configuration of their IT infrastructure suitable for the next 2–3 years, considering their size, departmental needs, and geographic distribution, while ensuring data security and privacy where needed. Assumptions may be made regarding unspecified details, but should be clearly identified. The cost should be within the company's budget. Equipment, existing network setup, and security mechanisms are to be considered fixed inputs; the focus is on providing efficient, secure, and scalable core IT services including network, servers, storage, and user support.
Paper For Above instruction
The task of designing and implementing a comprehensive IT infrastructure for Worldwide Advertising Inc. (WAI) involves considering multiple factors such as organizational size, departmental needs, geographic distribution, security requirements, and scalability over the next two to three years. This includes selecting appropriate network architecture, server solutions, storage options, user management, and data privacy mechanisms, all aligned with the company's growth trajectory and operational demands.
Network Architecture and Connectivity
Given that WAI has existing network equipment at both Los Angeles and New York sites and a secure IPSec tunnel, the foundational network connection is established. To support the company's current and near-future needs, a Virtual Local Area Network (VLAN) segmentation can be employed to logically separate departments within each physical site, enhancing security and manageability. Implementing a scalable Wide Area Network (WAN) infrastructure with quality of service (QoS) features will ensure efficient inter-site communication, minimizing latency and maintaining security over the public internet.
Given the distributed workforce, implementing a centralized Virtual Private Network (VPN) management system with client access for telecommuting staff will be advantageous. Cloud-based SaaS solutions for collaboration tools and email can complement on-premise servers, ensuring flexibility and affordability.
Server and Storage Solutions
For servers, a hybrid approach can be adopted, combining on-premises servers with cloud services. Virtualization technology, such as VMware or Hyper-V, will enable WAI to maximize resource utilization, ease management, and facilitate rapid provisioning. Virtual machines can host critical applications, departmental file servers, and domain controllers.
Storage solutions should include network-attached storage (NAS) or storage area networks (SANs) for high-speed access within data centers, coupled with cloud storage for off-site backups and disaster recovery. This hybrid approach offers scalability; as data volume grows, additional on-premises storage modules can be integrated, or cloud storage can be expanded as needed.
User and Data Management
Implementing a centralized Active Directory (AD) environment will manage user accounts, permissions, and departmental access rights effectively. Role-based access control (RBAC) will ensure that each department accesses only their designated data, preserving confidentiality—finance teams, for instance, will not have access to production data.
Furthermore, deployment of a Mobile Device Management (MDM) system will secure mobile and remote access. Data encryption at rest and in transit will provide additional security, complying with best practices and regulatory standards.
Data Privacy and Security
To meet data privacy needs, creating separate network segments or virtual LANs (VLANs) for departments requiring privacy will be essential. Using access controls and encryption ensures that sensitive financial or HR data remains confidential. Regular audits and monitoring via intrusion detection systems (IDS) are recommended, even if security mechanisms are outside the scope of this plan.
Data backup and disaster recovery plans should employ automated, encrypted backups stored off-site or in the cloud, facilitating quick recovery in case of data loss or breaches. Implementing data loss prevention (DLP) tools will prevent accidental leaks of sensitive information.
Scalability and Future-Proofing
The selected infrastructure should accommodate growth, either through scalable on-premise hardware or by leveraging cloud-based solutions. Cloud services such as Infrastructure as a Service (IaaS) can be scaled up or down based on demand, providing flexibility without significant capital expenditures.
Automated provisioning and management tools, such as Infrastructure as Code (IaC), will help WAI maintain efficient operations as it expands or modifies its infrastructure in subsequent years.
Implementation Considerations
Phased deployment is recommended, starting with core services such as user accounts, domain configuration, and network segmentation. Staff training on security best practices and IT policies will ensure smooth adoption. Continuous monitoring and periodic reviews are vital components for maintaining performance and security compliance over time.
Furthermore, clear documentation of the entire setup will facilitate future maintenance and updates, especially as the in-house IT team takes over responsibilities.
Assumptions and Limitations
It is assumed that existing network equipment is compatible with proposed solutions and that all security hardware is functioning optimally. The company’s budget constraints limit hardware acquisition to cost-effective solutions, with an emphasis on scalable cloud services. Any unforeseen growth or changes in organizational structure may necessitate adjustments to the implemented infrastructure.
Conclusion
By combining on-premises virtualization, cloud storage, centralized user management, departmental data segregation, and scalable networking architecture, WAI can achieve a secure, efficient, and adaptable IT environment. This setup will support their operations over the next 2–3 years, facilitating growth while maintaining data integrity and security.
References
- Cisco. (2022). Designing Enterprise Networks. Cisco Press.
- Microsoft. (2023). Active Directory Domain Services Overview.
- VMware. (2022). Virtualization Best Practices.
- Amazon Web Services. (2023). AWS Cloud Storage Solutions.
- Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 46(2), 186-204.
- NIST. (2020). Guidelines for Data Security and Privacy.
- Gibson, M., & Cleary, P. (2021). Cloud Computing and Data Privacy.
- Brooks, H., & Jones, L. (2022). IT Infrastructure Management Strategies.
- Tan, K. H., & Kannan, V. R. (2020). Supply Chain Management & Cloud Computing.
- Schubert, P., & Draxler, H. (2021). Future Directions in Cloud Security.