Download Usage of Wireless Network technologies

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Transcript
McDonalds Company Networking Assignment
Prepared By:
Ghada odea
Sara alsmaiel 200600362
Saba almohawis 201000230
COLLEGE OF BUSINESS ADMINISTRATION
Spring 2012
1
McDonald Business profile:
Mission:
McDonald's mission is to be the world's best quick service restaurant experience. Being the best
means providing outstanding quality, service, cleanliness, and value, so that we make every
customer in every restaurant smile."
McDonald’s personnel are its strength company aim is to improve the skills of the employees
to deliver quality products and better prepared for the future challenges.
Vision: To provide quality food at affordable price
McDonald’s employee is company strength.
 Product and Services are as energy which helps in customers benefit.
 Company motto to grow their skills and improve their standard of living as well as
prepare for their future.
The story of McDonalds started in 1954, when its founder Raymond Kroc saw a hamburger
stand in San Bernardino, California and established a nationwide fast food chain restaurant. Kroc
proved himself as a pioneer who revolutionized the American restaurant industry. Today
McDonalds is the world largest fast food chain offering 47 million customers daily. McDonalds
is now one of the most valuable company in the globally, worth more than $25 billion. The
Golden Arches of M shape its cartoons mascot Ronald McDonald have gained universal
recognition
For being a successful McDonalds company, the importance of not only necessary to make
decisions, but to implement the right ones. McDonald’s present success, as shown in its leading
position, can be led back among other things to a number of beneficial decisions. A business
decision is a process with the selection of an action often out of a number of alternatives.
McDonalds adopted the business strategy where franchise Model Only 15% of the total
number of restaurants is owned by the Company. The remaining 85% is operated by franchisees.
The company follows a complete business framework of training and monitoring of its
franchises to ensure that they adhere to the Service Quality, Service, Cleanliness and Value
propositions offered by the company to its customers.
 Product Consistency By developing a sophisticated supplier networked operation and
distribution system, the company has been able to achieve consistent product taste and
quality across geographies.
 Act like a retailer and think like a brand McDonalds focuses not only on delivering sales
for the immediate present, but also protecting its long term brand reputation.
2
Introduction:
Big Corporate like McDonalds have outlets spread all across the globe by ever increasing
need to connect them to their local head offices and ultimately to the parent company corporate
head office. The McDonalds had various franchises and local partnership in many countries for
business expansions purpose. So the ultimate aim is to connect the business information and data
flow between the corporate head office to the branches all across the globe. Present day business
needs the strong networking .The main idea for ascertaining the latest networking solutions
available to help the McDonalds large network across the globe to make sure that the McDonalds
data is fully protected from intruders, hackers or malwares. The present danger facing whole
McDonalds is about the data security where ERP (Enterprise Resources applications) application
of latest networking tools and solutions is pre-requisite for McDonald’s s to have secure network
where over billions of dollars of business took place.
The below assignment is an attempt to analyze for taking the decisions to use the various
networking tools and solutions available for the management of McDonalds in order to take a
balance choice in different market across the globe.
Problem Statement: Network
The business presence in all over the world makes the McDonalds to have secure methods
of data transfer between the branches and corporate headquarters by choosing the various
networking tools and communication methods.
Solution: For McDonalds Business through connection methods:
The connection method (CM) is the process of designing and developing the general
framework for automated network deduction
for connectivity purpose. The connection type
can be wired or wireless deduction. The CM (Connection method) is process through which
McDonalds planning to connect their branch computers and country servers through various
networking devices for smooth flowing of market data through their internal and external
networking connecting tools and devices.
3
Problem solution for McDonald’s business by using of Optical
fiber for networking purpose.
An optical fiber is most advanced tool for effective data flow for McDonalds data transfer
through transparent use of fiber which is made up of pure glass(silica) that helps in transmitting
any type of primary or secondary data through wired LAN(Local area network) . Presently the
optical fiber network wire is widely used to transmit the huge volume of data of various forms
effectively as compare to metal wires which is only good for transferring the electricity only. The
application of fiber optic technology is applied in various means to transfer secondary data from
local country servers to main server at head offices with wrapped data bundles.
The use of Optical fibers for data transfer by transparent core covered by cladding materials
with lower index of refraction with a dim light is provided for deduction purpose that supports
the paths of transverse model multi-model fibers (MMF) and single-mode fibers (SMF). The
designing and connecting the fiber networks is most crucial for money transfer jobs assignment
as this need a special effort to join all the fibers correctly and then spliced together for smooth
data flow.
Problem Statement: Wired Network
For adopting the wired network in McDonald’s branches is one option for the business for
seamless transfer of order taking from customers to kitchen management and execution of
orders.
Solution: Adaptation of wired network in McDonalds branches:
McDonald’s network is process in which data and files transferred through the medium of
wired networks as it is inter-organization connectivity for sharing the same platform for running
the McDonalds functioning purpose. Wired network usually develop with networking tools like
wires, routers switches, computers or laptops and connect with each other by wires. The primary
objective of developing wired network is to help the employees of the organiasiton to share files
4
and internal information among themselves from their computers or laptops and in addition to
that all the computers get connected through work group and ultimately connected to internet
also for effective communication inside- out or outside- in basis.
The various tools like router or switch had been used to design and develop professional
network for intra or other type important McDonald’s data transfers.
Business Advantages for adopting Wired networking methods in McDonald:
The wired network system had many advantages like
 Free data flow through wires preferred.
 Flexibility to connect through the office building by put wires all around the office space
for getting convenient locations.
 More secure and less chances of data lost and data disturbance.
Business Disadvantages for adopting Wired networking methods in McDonald:
The wired network system had disadvantages also
 Costly options as this network wires needs to put while the building construction process
started. .
 Less compatibly with new technological gadgets and devices.
 Less Reliability, if some minor problems occur in router or switch the while system stop
working.
5
Usage of Wireless Network technologies:
. Wireless data transfer is a new advanced sophisticated technology applicable for transferring
the
highly complex and flexible data through various means of communication devices and
system. Wireless network is a newly established design network with the use radio signals
devices that helps to transfer files and data from one gadget to other computers or mobile
stations.
McDonalds Business Usage of Wireless Technologies:
Wireless technology is widely used all over the world by McDonalds for having
communication equipment that has many applications and this can be adopted in parallel
extension of wired LAN. The Wired local area network is easy and complex way of information
transferring in the corporate world where all the computers are connected in the office through
wires and by various gadgets in the McDonalds. The information work flow and data transfer
may also require the wireless technologies where wireless gadgets is more useful for data
transfer process. The data transfer can be happen within the bound walls of corporate house.
Wireless networks works for McDonalds Company for using wire networking that relies on
copper and/or fiber optic cabling. Wireless networks are growing in popularity because of their
compatibility and mobility. Wireless devices have been gaining popularity in recent years.
Cellular phones and other wireless communication devices have driven demand for new wireless
technology. While traditional wired solutions provide a sense or reliability, convenience has
become a large part of consumers needs. And McDonalds now have everything that enabled
phone offering services to the consumers. However, marketing and media has played a large role
in the consumer’s perspective of wireless devices. The information below is factual, and
provides a non-biased evaluation of current wired and wireless technology. Wireless isn't really a
new technology... The military has been using "line of sight" micro-wave towers for decades.
Everyone knows the most common wireless technology: cellular phones. However, this
technology has several problems. The table below portrays the pros and cons of wireless
technology.
6
Business Advantages for McDonalds’ for adopting Wireless Networking Services:
Wireless technology is more conveniently use on tight places as McDonalds
do not have to
worry about running wires in tight places, or obtaining low-voltage permits. The range of
wireless technology can be impressive. While the equipment you use may break (just as wired
equipment would) the signals themselves never break. In comparison to wireless eventually
getting old or corroded, this is a great advantage.
Business Disadvantages for McDonalds’ for adopting Wireless Networking Services
On the negative side, wireless technology suffers easily from interference. Other source of EM
(electro-magnetic radiation) can cause problems for wireless signals. While wired technologies
suffer from this as well, wireless signals are affected more frequently. Another down-side to WiFi is the price. High-end wireless equipment comes with a serious price tag. Installing the
equipment can be tricky depending on the environment. McDonalds may have trouble with
signal strength from out-door antennas that may be adversely affected by temperature or
humidity. Wireless technology also has implications in regards to security. Remember that wiretapping can be done, but you must have physical access to a wire. However, this becomes much
easier with a wireless signal. These signals can be intercepted by simply being the range of a
wireless signal. Another problem is speed. While some Wi-Fi equipment producers claim they
can transmit data at 108 Mbits/sec, this is a deceptive marketing scam. See the details in this
article. Wireless speed is not even close to gigabit or 10 gigabit speeds that are attained using
wires. Lastly, the quality of service is anything but effective. Wireless technology does not and
probably never will operate in the five 9's of reliability
7
McDonalds Wireless LANs usage:
Wireless LAN (WLAN) is a vastly used by McDonalds as new advanced sophisticated
technology applicable for transferring the
mobile orders and can able to track the delivery
process under which order managed process improvement through various means of
communication wireless devices and system
McDonalds’ WLAN is used all over the world in the shopping malls by having communication
equipment and home delivery business that has huge applications for tracking the order delivery
process and shipment of order on time to the customers
Enterprise private network:
The private enterprise network is mainly operated earlier over telecommunications networks.
And during the last decade in the spread of Internet technology evolved, a new type of network
called virtual private networks originated. This type of network was built over public
infrastructure, and the data was encrypted to protect it from hackers.
McDonald’s enterprise private network is a computer network that helps McDonalds to
distribute the weekly promotion details and promotion materials with special prices for each
event. As McDonalds is having number of branches all over the city of Dammam and Khobar
and each one had to connect in a secure way over a network. An enterprise private network is
mainly set up to share computer resources
The business specific requirement for taking care of day-to-days operations needs special private
McDonalds enterprise private networks when privacy is maintained through security procedures
and tunneling protocols like Layer 2 Tunneling Protocol.
Some of the advantages of McDonalds’ enterprise private network are:
 The messages are secure because they are encrypted.
 They are cost effective and measurable benefits.
 They help to centralize IT work flow from all around the world.
 EPN enable business coordination, smooth data flow for decision making process.
8
Business use of Internet Technologies: McDonalds’ Business Solutions
The borderless world where the vast use of Internet protocol suite is the set of communications
tools used by McDonalds for the Internet based online McDonald’s transactions and similar
networks, and generally the most popular protocol stack for wide area networks (WAN). It is
commonly known as TCP/IP, because of its most important protocols: Transmission Control
Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in
this standard
TCP/IP provides end-to-end connection using the medium that need the usage of McDonald’s
business data transmitted should be in specific format, addressed, transmitted, routed and
received at the specified destination where the information is useful. It has four abstraction
layers, each with its own usage. From lowest to highest, the layers are:
 The link layer (commonly Ethernet) contains data and information communication
technologies for a local network.
 The internet layer (IP) connects local networks information for establishing internet
working on different places
 The transport layer (TCP) handles host-to-host communication between two or more
computers.
 The application layer (for example HTTP) contains all protocols information for specific
data communications services on a process-to-process individual level (for example how
a web browser communicates with a web server).
 The TCP/IP model and related protocols are managed by the tool called Internet
Engineering Task Force (IETF).
9
Intranets and extranets:
An "intranet" is the generic term for a collection of Private McDonald’s computer networks
within an organization. An "extranet" is a computer network that allows controlled access from
the outside for specific online business or educational purposes. Intranets and extranets are
communication tools designed to enable easy information sharing within workgroups,
Intranet usage in McDonald’s business operations?
In essence, an intranet is a business' own Private McDonald’s website. It is a confidential
business network that uses the same underlying structure and network protocols as the internet
and is protected from unauthorized users by a firewall.
Intranets enhance existing communication between employees and provide a common
knowledge base and storage area for everyone in customers business. They also provide users
with easy access to McDonalds’ data, systems and email from their desktops.
Because intranets are secure and easily accessible via the internet, this enables staff to do work
from any location simply by using a web browser. This can help small businesses to be flexible
and control office overheads by allowing employees to work from almost any location, including
their home and customer sites.
Other types of intranet are available that merge the regular features of intranets with those often
found in software such as McDonalds. These are known as online offices or web offices.
Creating a web office will allow you to organize and manage information and share documents
and calendars using a familiar web browser function, which is accessible from anywhere in the
world.
Business types of content found on intranets:
 Business Administrative – promotion calendars, emergency procedures, meeting room
arrangements.
10
 Corporate business plans, client/customer lists, document templates, branding guidelines,
mission statements, press coverage and staff newsletters
 Financial - annual reports ,income statement and MCDONALDS business performance
 IT - virus alerts, tips on dealing with problems with hardware, software and networks,
policies on corporate use of email and internet access and a list of online training courses
and support
 Marketing campaign data flow with competitive intelligence with links to competitor
websites, corporate brochures, latest marketing initiatives, press releases, presentations
 human resources - appraisal procedures and schedules, employee policies, expenses
forms and annual leave requests, staff discount schemes, new vacancies
 individual projects - current project details, team contact information, project
management information, project documents, time and expense reporting
 external information resources - route planning and mapping sites, industry
MCDONALDS research sites and search engines
Usage of extranet?
Extranet is similar to an intranet but it is made accessible to selected external partners such as
business partners, suppliers, key customers, etc, for exchanging data and applications and sharing
information.
As with an intranet, an extranet can also provide remote access to corporate systems for staff that
spends lots of time out of the office, for instance those in sales or customer support, or home
workers.
Extranet users should be a well-defined group and access must be protected by rigorous
identification routines and security features.
McDonald’s usage of an extranet for business application?
McDonalds and financial Businesses operations of all sizes are under increasing pressure to use
online ordering, electronic order tracking and financial management system.
11
At the same time small McDonalds are keen to meet the demands of larger McDonald’s s like
MCDONALDS
in terms of working flexibly, adopting new technologies and enabling the
exchange of business information and transactions.
Extranets offer a cheap and efficient way for businesses to connect with their trading partners. It
also means that your business partners and suppliers can access the information they need 24
hours a day.
The ability of the extranet to automate the trading tasks between you and your trading partners
can lead to enhanced business relationships and help to integrate your business firmly within
their supply chain.
Star network:
A star network is a local area network (LAN) in which all nodes (McDonald’s workstations or
other devices) are directly connected to a common central Server computer. Every McDonald’s
workstation is indirectly connected to every other through the central computer. In some star
networks, the central computer can also operate as a workstation.
The star network with five workstations (or six, if the central computer acts as a workstation).
Each workstation is sphere, the central computer is shown as a larger sphere, and connections are
shown as straight lines. The connections can be wired or wireless links.
The star network topology used by McDonald’s s that works well when workstations are at
scattered points. It is easy to add or remove workstations.
12
If the workstations are reasonably close to the vertices of a convex polygon and the system
requirements are modest, the ring network topology may serve the intended purpose at lower
cost than the star network topology. If the workstations lie nearly along a straight line, the bus
network topology may be best.
In a star network, a cable failure will isolate the workstation that it links to the central computer,
but only that workstation will be isolated. All the other workstations will continue to function
normally, except that they will not be able to communicate with the isolated workstation. If any
workstation goes down, none of the other workstations will be affected. But if the central
computer goes down, the entire network will suffer degraded performance or complete failure. If
redundancy is required, the mesh network topology may be preferable.
13
Hardware Requirements for network interface cards:
The interface cards present in the computers helps in recognizing the data sources from where
the data is flowing and this interface cards had to be compatible with other devices The most
common language or protocol for LANs is Ethernet,. A lesser-used protocol is to address the
transmitting location. When building a LAN, a network interface card must be installed in each
computer on the network and all NICs in the network must be of the same architecture. For
example, all must either be Ethernet cards, Token Ring cards, or an alternate technology.
Business Application of Network card in McDonalds Company:
A network interface card is widely used in all McDonald’s computers that more commonly
referred to as a NIC, is a device that allows computers to be joined together in a LAN, or local
area network. Networked computers communicate with each other using a given protocol or
agreed-upon language for transmitting data packets between the different machines, known as
nodes. The network interface card acts as the liaison for the machine to both send and receive
data on the Local area Network (LAN).
An Ethernet network interface card is installed in an available slot inside the computer. The
NIC assigns a unique address called a MAC (media access control) to the machine. The MACs
on the network are used to direct traffic between the computers. The back plate of the network
interface card features a port that looks similar to a phone jack, but is slightly larger. This port
accommodates an Ethernet cable, which resembles a thicker version of a standard telephone line.
Ethernet cable must run from each network interface card to a central hub or switch. The hub or
switch acts like a relay, passing information between computers using the MAC addresses and
allowing resources like printers and scanners to be shared along with data.
A network interface card does not have to be hard wired with physical cable. Wireless Ethernet
cards are installed like their wired counterparts, but rather than a port for an Ethernet cable, the
card features a small antenna. The card communicates with the central wireless switch or hub via
radio waves. Wireless LANs may have some restrictions depending on the material the building
14
is made from. For example the McDonalds lead in walls can block signals between the network
interface card and hub or switch.
When buying components for a LAN, make sure the NICs and hub or switch have the same
capabilities. The entire network must be either wired or wireless, so a wireless network interface
card cannot talk to a wired switch or hub. In addition, newer versions of hardware will likely
support more features and/or greater speeds than older versions. Make sure your central switch
or hub can utilize the highest capabilities of the network interface card under consideration.
For those who wish to connect LANs located in different areas of the city, state or country, ATM
(asynchronous transfer mode) can create wide area networks or WANs by connecting LANs
together. LANs are still built with a network interface card in each networked computer, but
ATM uses broadband Internet access to link the LANs to online ATM switches. This type of
ATM WAN is referred to as an Internetwork.
Switches:
A network switch or switching hub is a computer networking device that connects network
segments or network devices. The term commonly refers to a multi-port network bridge that
processes and routes data at the data link layer (layer 2) of the OSI model. Switches that
15
additionally process data at the network layer (layer 3) and above are often referred to as layer-3
switches or multilayer switches.
A switch is a telecommunication device which receives a message from any device connected
to it and then transmits the message only to that device for which the message was meant. This
makes the switch a more intelligent device than a hub (which receives a message and then
transmits it to all the other devices on its network.) The network switch plays an integral part in
most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number
of linked managed switches. Small office/home office (SOHO) applications typically use a
single switch, or an all-purpose converged device such as a residential gateway to access small
office/home broadband services such as DSL or cable internet. In most of these cases, the enduser device contains a router and components that interface to the particular physical broadband
technology.
McDonalds used switches for connecting different computer and printers for data flow:
A McDonalds Ethernet switch operates at the data link layer of the OSI model to create a
separate collision domain for each switch port. With 4 computers (e.g., A, B, C, and D) on 4
switch ports, A and B can transfer McDonalds data back and forth, while C and D also do so
simultaneously, and the two conversations will not interfere with one another. In the case of a
hub, they would all share the bandwidth and run in half duplex, resulting in collisions, which
would then necessitate retransmissions. Using a switch is called micro segmentation. This allows
computers to have dedicated bandwidth on point-to-point connections to the network and to
therefore run in full duplex without collisions.
McDonalds uses number of network switches or switching hubs that connects network
segments or network devices. The term commonly refers to a multi-port network bridge that
processes and routes data at the data link layer (layer 2) of the OSI model. Switches that
additionally process data at the network layer (layer 3) and above are often referred to as layer-3
switches or multilayer switches.
16
A McDonalds switches is a telecommunication device which receives a message from any
device connected to it and then transmits the message only to that device for which the message
was meant. This makes the switch a more intelligent device than a hub (which receives a
message and then transmits it to all the other devices on its network.) The network switch plays
an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs
contain a number of linked managed switches. Small office/home office (SOHO) applications
typically use a single switch, or an all-purpose converged device such as a residential gateway to
access small office/home broadband services such as DSL or cable internet. In most of these
cases, the end-user device contains a router and components that interface to the particular
physical broadband technology.
Role of McDonald’s s switches in networks:
McDonald’s switches may operate at one or more layers of the OSI model, including data link
and network. A device that operates simultaneously at more than one of these layers is known as
a multilayer switch.
The modular network switch has three network modules and one power supply.
While switches may learn about topologies at many layers, and forward at one or more layers,
they do tend to have common features. Other than for high-performance applications, modern
commercial switches use primarily Ethernet interfaces.
At any layer, a modern switch may implement power over Ethernet (PoE), which avoids the need
for attached devices, such as a VoIP phone or wireless access point, to have a separate power
supply. Since switches can have redundant power circuits connected to uninterruptible power
supplies, the connected device can continue operating even when regular office power fails.
McDonald’s switches are very important to transfer the data both internally and connected to
the external media like local country servers through IP address and connecting through the
business servers.
17
Routers:
Router Application on network:
The router is connected to at least two networks and decides which way to send each
information packet based on its current understanding of the state of the networks it is connected
to. A router is located at any gateway (where one network meets another), including each pointof-presence on the Internet. A router is often included as part of a network switch.
Usage of Router in McDonalds Business:
The presence of McDonalds branches all over the world had adopted the routers to connect
various branches in the city with packet-switched networks such as the Internet, a router is a
device or, in some cases, software in a computer, that determines the next network point to
which a packet should be forwarded toward its destination.
A router may create or maintain a table of the available routes and their conditions and use this
information along with distance and cost algorithms to determine the best route for a given
packet. Typically, a packet may travel through a number of network points with routers before
arriving at its destination. Routing is a function associated with the Network layer (layer 3) in the
18
standard model of network programming, the Open Systems Interconnection (OSI) model. A
layer-3 switch is a switch that can perform routing functions.
A router is a router that interfaces and connect with an asynchronous transfer mode (ATM)
network. A brooder is a network bridge combined with a router for data flow.
McDonald’s home and business computer users who have high-speed Internet connections such
as cable, satellite, or DSL, a router can act as a hardware firewall component. This is even true
even if the home or business has only one computer to have this hardware. Many IT engineers
believe that the use of a router products provides better protection against hacking than a
software firewall, because no computer Internet Protocol address are directly exposed to the
Internet. This makes port scans methods essentially impossible. In addition, a router does not
consume computer resources as a software firewall does. Commercially manufactured routers are
easy to install, reasonably priced, and available for hard-wired or wireless networks.
Data Security Issue:
Encryption:
Data Encryption is the conversion of data into a form, called a cipher text that cannot be easily
understood by unauthorized people. Decryption is the process of converting encrypted data back
into its original form, so it can be understood.
The use of encryption/decryption is as old as the art of communication. In wartime, a cipher,
often incorrectly called a code, can be employed to keep the enemy from obtaining the contents
of transmissions. (Technically, a code is a means of representing a signal without the intent of
keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution
of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice
signals by inverting the sideband frequencies. More complex ciphers work according to
sophisticated computer algorithms that rearrange the data bits in digital signals.
19
In order to easily recover the contents of an encrypted signal, the correct decryption key is
required. The series of main keys is algorithm that reverses the work of the encryption algorithm.
Alternatively, a computer can be used in an attempt to break the cipher. The more complex the
encryption algorithm, the more difficult it becomes to eavesdrop on the communications without
access to the key.
McDonald’s data Encryption/decryption:
The
encryption/decryption
of
sensitive
data
is
especially
important
in
wireless
communications. This is because wireless circuits are easier to tap than their hard-wired
counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of
sensitive transaction, such as a credit-card purchase online, or the discussion of a McDonalds ’
secret between different departments in the organization. The stronger the cipher -- that is, the
harder it is for unauthorized people to break it -- the better, in general. However, as the strength
of encryption/decryption increases, so does the cost.
In recent years, a controversy has arisen over so-called strong encryption. This refers to ciphers
that are essentially unbreakable without the decryption keys. While most companies and their
customers view it as a means of keeping secrets and minimizing fraud, some local and European
governments view strong encryption as a potential tool by which terrorists might evade sensitive
data or information. These governments had strong apprehension that including that of the
United States; want to set up a key-escrow arrangement. This means everyone who uses a cipher
would be required to provide the government with a copy of the key. Decryption keys would be
stored in a key secure place, used only by concerned authorities, and used only if backed up by a
local government rules and regulations. The widespread opponents of these schemes have put up
the strong case that criminals could hack into the key-database and illegally obtain, steal, or alter
the information with the knowledge and taking undue advantage of sensitive information...
Supporters claim that while this is a possibility that the implementing the key escrow scheme is
very strong basic step for keeping the data better than doing nothing to prevent Hackers from
freely using encryption/decryption.
20
Business Data Authentication:
Authentication is the process of determining whether someone or something is authorized to
get access in to the network systems through which the information can be access, manipulated
and altered with the fact that who or what it is declared to be authoritative level for excessive
rights for information. In private and public computer networks (including the Internet),
authentication is commonly done through the use of logon passwords. Knowledge of the
password is assumed to guarantee that the user is authentic. Each user registers initially (or is
registered by someone else), using an assigned or self-declared password which can be in the
combination of number or alphabets or both. On each subsequent use, the user must know and
use the previously declared password. The weakness in this system for transactions that are
significant (such as the exchange of information) is that passwords can often be stolen,
accidentally revealed, or forgotten.
Importance of Data authentication for McDonalds authorizes users;
This is very important security measure to let only the authorized users to get access the
information according to their level of authority, This is decided by management committee is to
whom they are given the responsibility and according their position in company and for this
reason, Internet business and many other transactions require a more stringent authentication
process. The use of digital certificates issued and verified by a Certificate Authority (CA) as part
of a public key hardware infrastructure which is considered likely to become the standard work
flow process to perform authentication on the Internet. Logically, authentication needs
authorization to access the network.
21
Conclusion & Recommendations:
By above analysis of various networking tools and technologies which is used by McDonalds
for effective business data flow inside and outside the organizations. The presence of McDonalds
outlets all around the world made the IT department task more tougher in order to gather and
distribute the most important and complex data for recording, summarizing and analyzing the
data for business assessment, decision making and to know the financial health of the company.
Usage of both wired and wireless networking tools is prerequisite depend upon the country
with availability of technical knowhow and McDonalds had adopted the policy of enterprise
networking system to coordinate and integrated all the information both vertically and
horizontally in the organization for free data work flow in order to communicate effectively
about the latest weakened promo offers, special discounts and flow of branches information to
local server followed by country server then ultimately to corporate head quarters in US.
22
References:
1)
CISCO networking tools book.
2) Data Communications and Networking [Hardcover] Behrouz A Forouzan (Author), Behrouz
Forouzan (Author)
3) Business Data Communications and Networking
By: Jerry FitzGerald, Alan Dennis
23