West consulting business description

Assignment Help Computer Network Security
Reference no: EM132347622

West Consulting Business Description

West Consulting is a graphic design and printing company. It is growing in consumer and sales volume and therefore, is expanding its local campus in Houston, Texas and adding a test location in China.

Business Problem

As a graphics design and printing company, West Consulting runs bandwidth-intensive applications from servers housed at their headquarters in Houston, Texas. IT leadership has determined that the current network continuously runs in a degraded state and users experience heavy latency when accessing the servers that house their customer Computer Aided Design (CAD) software.

Due to increased sales of their CAD designs, they need to expand their facilities. The company headquarters currently has 1,000 unique users amongst their two buildings and has decided to add another building and 500 users.

In addition, leadership has decided to expand into China to enable them to test their designs in a new and growing market. The footprint in China will be relatively small; approximately 30 people.

Solution

You are a Network Consultant for West Consulting. You are tasked with proposing an improved network design to support their growth and expansion plans.

Attachment:- West Consulting Network Design Summary.rar

Reference no: EM132347622

Questions Cloud

How threat actors can evade detection via threat correlation : Given the vast amount of known threat indicators and level of network activity today, How threat actors can evade detection via threat correlation ?
Program which prompts the user to enter a sentence : A program which prompts the user to enter a sentence. Your program should count and display the number of short (1-3 letters),
Advise flyways airlines fully as to what its legal position : LAW101 - Business Law - Advise Flyways Airlines fully as to what its legal position is, citing relevant case law and Advise him as what contractual liability
Determines experimentally the molar volume of oxygen : State of matter; Gaseous State- General Certificate of Education Advanced Level-GRADES 12-13-CHEMISTRY -Determines experimentally the molar volume of oxygen.
West consulting business description : West Consulting is a graphic design and printing company. It is growing in consumer and sales volume and therefore, is expanding its local campus in Houston,
Discuss the roles of clustering and k-means clustering : Using various examples, discuss the roles of Clustering and K-means Clustering in Big Data Analysis.
How do we incorporate or individual vpn : 500 words essay with all the required questions and references. When are VPN's used today? How do we incorporate or individual VPN? If so what are the benefits?
Cyber security attack on the water utility scada system : This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system.
Different active directory components : What are some of the different Active Directory components and what can they be best used for?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is an organizational security policy

What is an organizational security policy? What should occur following the handling of an incident with regard to the overall IT security management process?

  Malicious attacks and / or threats that you identified

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your ..

  Identify most significant cybersecurity threats to a company

For this assignment, imagine that you are a cybersecurity consultant hired to identify the most significant cybersecurity threats to a company.

  Write an research paper dealing with an internet security

write an research paper dealing with an INTERNET SECURITY, PRIVACY, or ETHICS ISSUE that interests you, and has not been resolved through legislation.

  What classess java provide to make network programming

IPv6 uses addresses that are 16 bytes long (128 bits ).  How many addresses is that per person in the world? and What classes does Java provide to make network programming easier

  Formulate plans for how to approach the immediate issue

formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

  Describe two of advantages associated with using types cable

Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure.

  Analyze the network diagram for pureland wastewater

Analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security per requirements.

  Discuss tools and techniques for removing malware

Discuss tools and techniques for removing Malware using the text Internet, and/or your job as reference for full credit. Discuss best practices for Microsoft Windows Group Policy using the text Internet and/or your job as reference for full credit.

  What are stateful inspection firewalls

Why are many of the reliable, effective biometric systems perceived as intrusive by users? What are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Describe steps that can be taken to help mitigate risks

Identify the standards involved in establishing an interoperable Internet PKI. Describe steps that can be taken to help mitigate risks

  It infrastructure management assessment item 2enterprise

assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd