Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
McDonalds Company Networking Assignment Prepared By: Ghada odea Sara alsmaiel 200600362 Saba almohawis 201000230 COLLEGE OF BUSINESS ADMINISTRATION Spring 2012 1 McDonald Business profile: Mission: McDonald's mission is to be the world's best quick service restaurant experience. Being the best means providing outstanding quality, service, cleanliness, and value, so that we make every customer in every restaurant smile." McDonald’s personnel are its strength company aim is to improve the skills of the employees to deliver quality products and better prepared for the future challenges. Vision: To provide quality food at affordable price McDonald’s employee is company strength. Product and Services are as energy which helps in customers benefit. Company motto to grow their skills and improve their standard of living as well as prepare for their future. The story of McDonalds started in 1954, when its founder Raymond Kroc saw a hamburger stand in San Bernardino, California and established a nationwide fast food chain restaurant. Kroc proved himself as a pioneer who revolutionized the American restaurant industry. Today McDonalds is the world largest fast food chain offering 47 million customers daily. McDonalds is now one of the most valuable company in the globally, worth more than $25 billion. The Golden Arches of M shape its cartoons mascot Ronald McDonald have gained universal recognition For being a successful McDonalds company, the importance of not only necessary to make decisions, but to implement the right ones. McDonald’s present success, as shown in its leading position, can be led back among other things to a number of beneficial decisions. A business decision is a process with the selection of an action often out of a number of alternatives. McDonalds adopted the business strategy where franchise Model Only 15% of the total number of restaurants is owned by the Company. The remaining 85% is operated by franchisees. The company follows a complete business framework of training and monitoring of its franchises to ensure that they adhere to the Service Quality, Service, Cleanliness and Value propositions offered by the company to its customers. Product Consistency By developing a sophisticated supplier networked operation and distribution system, the company has been able to achieve consistent product taste and quality across geographies. Act like a retailer and think like a brand McDonalds focuses not only on delivering sales for the immediate present, but also protecting its long term brand reputation. 2 Introduction: Big Corporate like McDonalds have outlets spread all across the globe by ever increasing need to connect them to their local head offices and ultimately to the parent company corporate head office. The McDonalds had various franchises and local partnership in many countries for business expansions purpose. So the ultimate aim is to connect the business information and data flow between the corporate head office to the branches all across the globe. Present day business needs the strong networking .The main idea for ascertaining the latest networking solutions available to help the McDonalds large network across the globe to make sure that the McDonalds data is fully protected from intruders, hackers or malwares. The present danger facing whole McDonalds is about the data security where ERP (Enterprise Resources applications) application of latest networking tools and solutions is pre-requisite for McDonald’s s to have secure network where over billions of dollars of business took place. The below assignment is an attempt to analyze for taking the decisions to use the various networking tools and solutions available for the management of McDonalds in order to take a balance choice in different market across the globe. Problem Statement: Network The business presence in all over the world makes the McDonalds to have secure methods of data transfer between the branches and corporate headquarters by choosing the various networking tools and communication methods. Solution: For McDonalds Business through connection methods: The connection method (CM) is the process of designing and developing the general framework for automated network deduction for connectivity purpose. The connection type can be wired or wireless deduction. The CM (Connection method) is process through which McDonalds planning to connect their branch computers and country servers through various networking devices for smooth flowing of market data through their internal and external networking connecting tools and devices. 3 Problem solution for McDonald’s business by using of Optical fiber for networking purpose. An optical fiber is most advanced tool for effective data flow for McDonalds data transfer through transparent use of fiber which is made up of pure glass(silica) that helps in transmitting any type of primary or secondary data through wired LAN(Local area network) . Presently the optical fiber network wire is widely used to transmit the huge volume of data of various forms effectively as compare to metal wires which is only good for transferring the electricity only. The application of fiber optic technology is applied in various means to transfer secondary data from local country servers to main server at head offices with wrapped data bundles. The use of Optical fibers for data transfer by transparent core covered by cladding materials with lower index of refraction with a dim light is provided for deduction purpose that supports the paths of transverse model multi-model fibers (MMF) and single-mode fibers (SMF). The designing and connecting the fiber networks is most crucial for money transfer jobs assignment as this need a special effort to join all the fibers correctly and then spliced together for smooth data flow. Problem Statement: Wired Network For adopting the wired network in McDonald’s branches is one option for the business for seamless transfer of order taking from customers to kitchen management and execution of orders. Solution: Adaptation of wired network in McDonalds branches: McDonald’s network is process in which data and files transferred through the medium of wired networks as it is inter-organization connectivity for sharing the same platform for running the McDonalds functioning purpose. Wired network usually develop with networking tools like wires, routers switches, computers or laptops and connect with each other by wires. The primary objective of developing wired network is to help the employees of the organiasiton to share files 4 and internal information among themselves from their computers or laptops and in addition to that all the computers get connected through work group and ultimately connected to internet also for effective communication inside- out or outside- in basis. The various tools like router or switch had been used to design and develop professional network for intra or other type important McDonald’s data transfers. Business Advantages for adopting Wired networking methods in McDonald: The wired network system had many advantages like Free data flow through wires preferred. Flexibility to connect through the office building by put wires all around the office space for getting convenient locations. More secure and less chances of data lost and data disturbance. Business Disadvantages for adopting Wired networking methods in McDonald: The wired network system had disadvantages also Costly options as this network wires needs to put while the building construction process started. . Less compatibly with new technological gadgets and devices. Less Reliability, if some minor problems occur in router or switch the while system stop working. 5 Usage of Wireless Network technologies: . Wireless data transfer is a new advanced sophisticated technology applicable for transferring the highly complex and flexible data through various means of communication devices and system. Wireless network is a newly established design network with the use radio signals devices that helps to transfer files and data from one gadget to other computers or mobile stations. McDonalds Business Usage of Wireless Technologies: Wireless technology is widely used all over the world by McDonalds for having communication equipment that has many applications and this can be adopted in parallel extension of wired LAN. The Wired local area network is easy and complex way of information transferring in the corporate world where all the computers are connected in the office through wires and by various gadgets in the McDonalds. The information work flow and data transfer may also require the wireless technologies where wireless gadgets is more useful for data transfer process. The data transfer can be happen within the bound walls of corporate house. Wireless networks works for McDonalds Company for using wire networking that relies on copper and/or fiber optic cabling. Wireless networks are growing in popularity because of their compatibility and mobility. Wireless devices have been gaining popularity in recent years. Cellular phones and other wireless communication devices have driven demand for new wireless technology. While traditional wired solutions provide a sense or reliability, convenience has become a large part of consumers needs. And McDonalds now have everything that enabled phone offering services to the consumers. However, marketing and media has played a large role in the consumer’s perspective of wireless devices. The information below is factual, and provides a non-biased evaluation of current wired and wireless technology. Wireless isn't really a new technology... The military has been using "line of sight" micro-wave towers for decades. Everyone knows the most common wireless technology: cellular phones. However, this technology has several problems. The table below portrays the pros and cons of wireless technology. 6 Business Advantages for McDonalds’ for adopting Wireless Networking Services: Wireless technology is more conveniently use on tight places as McDonalds do not have to worry about running wires in tight places, or obtaining low-voltage permits. The range of wireless technology can be impressive. While the equipment you use may break (just as wired equipment would) the signals themselves never break. In comparison to wireless eventually getting old or corroded, this is a great advantage. Business Disadvantages for McDonalds’ for adopting Wireless Networking Services On the negative side, wireless technology suffers easily from interference. Other source of EM (electro-magnetic radiation) can cause problems for wireless signals. While wired technologies suffer from this as well, wireless signals are affected more frequently. Another down-side to WiFi is the price. High-end wireless equipment comes with a serious price tag. Installing the equipment can be tricky depending on the environment. McDonalds may have trouble with signal strength from out-door antennas that may be adversely affected by temperature or humidity. Wireless technology also has implications in regards to security. Remember that wiretapping can be done, but you must have physical access to a wire. However, this becomes much easier with a wireless signal. These signals can be intercepted by simply being the range of a wireless signal. Another problem is speed. While some Wi-Fi equipment producers claim they can transmit data at 108 Mbits/sec, this is a deceptive marketing scam. See the details in this article. Wireless speed is not even close to gigabit or 10 gigabit speeds that are attained using wires. Lastly, the quality of service is anything but effective. Wireless technology does not and probably never will operate in the five 9's of reliability 7 McDonalds Wireless LANs usage: Wireless LAN (WLAN) is a vastly used by McDonalds as new advanced sophisticated technology applicable for transferring the mobile orders and can able to track the delivery process under which order managed process improvement through various means of communication wireless devices and system McDonalds’ WLAN is used all over the world in the shopping malls by having communication equipment and home delivery business that has huge applications for tracking the order delivery process and shipment of order on time to the customers Enterprise private network: The private enterprise network is mainly operated earlier over telecommunications networks. And during the last decade in the spread of Internet technology evolved, a new type of network called virtual private networks originated. This type of network was built over public infrastructure, and the data was encrypted to protect it from hackers. McDonald’s enterprise private network is a computer network that helps McDonalds to distribute the weekly promotion details and promotion materials with special prices for each event. As McDonalds is having number of branches all over the city of Dammam and Khobar and each one had to connect in a secure way over a network. An enterprise private network is mainly set up to share computer resources The business specific requirement for taking care of day-to-days operations needs special private McDonalds enterprise private networks when privacy is maintained through security procedures and tunneling protocols like Layer 2 Tunneling Protocol. Some of the advantages of McDonalds’ enterprise private network are: The messages are secure because they are encrypted. They are cost effective and measurable benefits. They help to centralize IT work flow from all around the world. EPN enable business coordination, smooth data flow for decision making process. 8 Business use of Internet Technologies: McDonalds’ Business Solutions The borderless world where the vast use of Internet protocol suite is the set of communications tools used by McDonalds for the Internet based online McDonald’s transactions and similar networks, and generally the most popular protocol stack for wide area networks (WAN). It is commonly known as TCP/IP, because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in this standard TCP/IP provides end-to-end connection using the medium that need the usage of McDonald’s business data transmitted should be in specific format, addressed, transmitted, routed and received at the specified destination where the information is useful. It has four abstraction layers, each with its own usage. From lowest to highest, the layers are: The link layer (commonly Ethernet) contains data and information communication technologies for a local network. The internet layer (IP) connects local networks information for establishing internet working on different places The transport layer (TCP) handles host-to-host communication between two or more computers. The application layer (for example HTTP) contains all protocols information for specific data communications services on a process-to-process individual level (for example how a web browser communicates with a web server). The TCP/IP model and related protocols are managed by the tool called Internet Engineering Task Force (IETF). 9 Intranets and extranets: An "intranet" is the generic term for a collection of Private McDonald’s computer networks within an organization. An "extranet" is a computer network that allows controlled access from the outside for specific online business or educational purposes. Intranets and extranets are communication tools designed to enable easy information sharing within workgroups, Intranet usage in McDonald’s business operations? In essence, an intranet is a business' own Private McDonald’s website. It is a confidential business network that uses the same underlying structure and network protocols as the internet and is protected from unauthorized users by a firewall. Intranets enhance existing communication between employees and provide a common knowledge base and storage area for everyone in customers business. They also provide users with easy access to McDonalds’ data, systems and email from their desktops. Because intranets are secure and easily accessible via the internet, this enables staff to do work from any location simply by using a web browser. This can help small businesses to be flexible and control office overheads by allowing employees to work from almost any location, including their home and customer sites. Other types of intranet are available that merge the regular features of intranets with those often found in software such as McDonalds. These are known as online offices or web offices. Creating a web office will allow you to organize and manage information and share documents and calendars using a familiar web browser function, which is accessible from anywhere in the world. Business types of content found on intranets: Business Administrative – promotion calendars, emergency procedures, meeting room arrangements. 10 Corporate business plans, client/customer lists, document templates, branding guidelines, mission statements, press coverage and staff newsletters Financial - annual reports ,income statement and MCDONALDS business performance IT - virus alerts, tips on dealing with problems with hardware, software and networks, policies on corporate use of email and internet access and a list of online training courses and support Marketing campaign data flow with competitive intelligence with links to competitor websites, corporate brochures, latest marketing initiatives, press releases, presentations human resources - appraisal procedures and schedules, employee policies, expenses forms and annual leave requests, staff discount schemes, new vacancies individual projects - current project details, team contact information, project management information, project documents, time and expense reporting external information resources - route planning and mapping sites, industry MCDONALDS research sites and search engines Usage of extranet? Extranet is similar to an intranet but it is made accessible to selected external partners such as business partners, suppliers, key customers, etc, for exchanging data and applications and sharing information. As with an intranet, an extranet can also provide remote access to corporate systems for staff that spends lots of time out of the office, for instance those in sales or customer support, or home workers. Extranet users should be a well-defined group and access must be protected by rigorous identification routines and security features. McDonald’s usage of an extranet for business application? McDonalds and financial Businesses operations of all sizes are under increasing pressure to use online ordering, electronic order tracking and financial management system. 11 At the same time small McDonalds are keen to meet the demands of larger McDonald’s s like MCDONALDS in terms of working flexibly, adopting new technologies and enabling the exchange of business information and transactions. Extranets offer a cheap and efficient way for businesses to connect with their trading partners. It also means that your business partners and suppliers can access the information they need 24 hours a day. The ability of the extranet to automate the trading tasks between you and your trading partners can lead to enhanced business relationships and help to integrate your business firmly within their supply chain. Star network: A star network is a local area network (LAN) in which all nodes (McDonald’s workstations or other devices) are directly connected to a common central Server computer. Every McDonald’s workstation is indirectly connected to every other through the central computer. In some star networks, the central computer can also operate as a workstation. The star network with five workstations (or six, if the central computer acts as a workstation). Each workstation is sphere, the central computer is shown as a larger sphere, and connections are shown as straight lines. The connections can be wired or wireless links. The star network topology used by McDonald’s s that works well when workstations are at scattered points. It is easy to add or remove workstations. 12 If the workstations are reasonably close to the vertices of a convex polygon and the system requirements are modest, the ring network topology may serve the intended purpose at lower cost than the star network topology. If the workstations lie nearly along a straight line, the bus network topology may be best. In a star network, a cable failure will isolate the workstation that it links to the central computer, but only that workstation will be isolated. All the other workstations will continue to function normally, except that they will not be able to communicate with the isolated workstation. If any workstation goes down, none of the other workstations will be affected. But if the central computer goes down, the entire network will suffer degraded performance or complete failure. If redundancy is required, the mesh network topology may be preferable. 13 Hardware Requirements for network interface cards: The interface cards present in the computers helps in recognizing the data sources from where the data is flowing and this interface cards had to be compatible with other devices The most common language or protocol for LANs is Ethernet,. A lesser-used protocol is to address the transmitting location. When building a LAN, a network interface card must be installed in each computer on the network and all NICs in the network must be of the same architecture. For example, all must either be Ethernet cards, Token Ring cards, or an alternate technology. Business Application of Network card in McDonalds Company: A network interface card is widely used in all McDonald’s computers that more commonly referred to as a NIC, is a device that allows computers to be joined together in a LAN, or local area network. Networked computers communicate with each other using a given protocol or agreed-upon language for transmitting data packets between the different machines, known as nodes. The network interface card acts as the liaison for the machine to both send and receive data on the Local area Network (LAN). An Ethernet network interface card is installed in an available slot inside the computer. The NIC assigns a unique address called a MAC (media access control) to the machine. The MACs on the network are used to direct traffic between the computers. The back plate of the network interface card features a port that looks similar to a phone jack, but is slightly larger. This port accommodates an Ethernet cable, which resembles a thicker version of a standard telephone line. Ethernet cable must run from each network interface card to a central hub or switch. The hub or switch acts like a relay, passing information between computers using the MAC addresses and allowing resources like printers and scanners to be shared along with data. A network interface card does not have to be hard wired with physical cable. Wireless Ethernet cards are installed like their wired counterparts, but rather than a port for an Ethernet cable, the card features a small antenna. The card communicates with the central wireless switch or hub via radio waves. Wireless LANs may have some restrictions depending on the material the building 14 is made from. For example the McDonalds lead in walls can block signals between the network interface card and hub or switch. When buying components for a LAN, make sure the NICs and hub or switch have the same capabilities. The entire network must be either wired or wireless, so a wireless network interface card cannot talk to a wired switch or hub. In addition, newer versions of hardware will likely support more features and/or greater speeds than older versions. Make sure your central switch or hub can utilize the highest capabilities of the network interface card under consideration. For those who wish to connect LANs located in different areas of the city, state or country, ATM (asynchronous transfer mode) can create wide area networks or WANs by connecting LANs together. LANs are still built with a network interface card in each networked computer, but ATM uses broadband Internet access to link the LANs to online ATM switches. This type of ATM WAN is referred to as an Internetwork. Switches: A network switch or switching hub is a computer networking device that connects network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that 15 additionally process data at the network layer (layer 3) and above are often referred to as layer-3 switches or multilayer switches. A switch is a telecommunication device which receives a message from any device connected to it and then transmits the message only to that device for which the message was meant. This makes the switch a more intelligent device than a hub (which receives a message and then transmits it to all the other devices on its network.) The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a residential gateway to access small office/home broadband services such as DSL or cable internet. In most of these cases, the enduser device contains a router and components that interface to the particular physical broadband technology. McDonalds used switches for connecting different computer and printers for data flow: A McDonalds Ethernet switch operates at the data link layer of the OSI model to create a separate collision domain for each switch port. With 4 computers (e.g., A, B, C, and D) on 4 switch ports, A and B can transfer McDonalds data back and forth, while C and D also do so simultaneously, and the two conversations will not interfere with one another. In the case of a hub, they would all share the bandwidth and run in half duplex, resulting in collisions, which would then necessitate retransmissions. Using a switch is called micro segmentation. This allows computers to have dedicated bandwidth on point-to-point connections to the network and to therefore run in full duplex without collisions. McDonalds uses number of network switches or switching hubs that connects network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3) and above are often referred to as layer-3 switches or multilayer switches. 16 A McDonalds switches is a telecommunication device which receives a message from any device connected to it and then transmits the message only to that device for which the message was meant. This makes the switch a more intelligent device than a hub (which receives a message and then transmits it to all the other devices on its network.) The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a residential gateway to access small office/home broadband services such as DSL or cable internet. In most of these cases, the end-user device contains a router and components that interface to the particular physical broadband technology. Role of McDonald’s s switches in networks: McDonald’s switches may operate at one or more layers of the OSI model, including data link and network. A device that operates simultaneously at more than one of these layers is known as a multilayer switch. The modular network switch has three network modules and one power supply. While switches may learn about topologies at many layers, and forward at one or more layers, they do tend to have common features. Other than for high-performance applications, modern commercial switches use primarily Ethernet interfaces. At any layer, a modern switch may implement power over Ethernet (PoE), which avoids the need for attached devices, such as a VoIP phone or wireless access point, to have a separate power supply. Since switches can have redundant power circuits connected to uninterruptible power supplies, the connected device can continue operating even when regular office power fails. McDonald’s switches are very important to transfer the data both internally and connected to the external media like local country servers through IP address and connecting through the business servers. 17 Routers: Router Application on network: The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any gateway (where one network meets another), including each pointof-presence on the Internet. A router is often included as part of a network switch. Usage of Router in McDonalds Business: The presence of McDonalds branches all over the world had adopted the routers to connect various branches in the city with packet-switched networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. A router may create or maintain a table of the available routes and their conditions and use this information along with distance and cost algorithms to determine the best route for a given packet. Typically, a packet may travel through a number of network points with routers before arriving at its destination. Routing is a function associated with the Network layer (layer 3) in the 18 standard model of network programming, the Open Systems Interconnection (OSI) model. A layer-3 switch is a switch that can perform routing functions. A router is a router that interfaces and connect with an asynchronous transfer mode (ATM) network. A brooder is a network bridge combined with a router for data flow. McDonald’s home and business computer users who have high-speed Internet connections such as cable, satellite, or DSL, a router can act as a hardware firewall component. This is even true even if the home or business has only one computer to have this hardware. Many IT engineers believe that the use of a router products provides better protection against hacking than a software firewall, because no computer Internet Protocol address are directly exposed to the Internet. This makes port scans methods essentially impossible. In addition, a router does not consume computer resources as a software firewall does. Commercially manufactured routers are easy to install, reasonably priced, and available for hard-wired or wireless networks. Data Security Issue: Encryption: Data Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals. 19 In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The series of main keys is algorithm that reverses the work of the encryption algorithm. Alternatively, a computer can be used in an attempt to break the cipher. The more complex the encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the key. McDonald’s data Encryption/decryption: The encryption/decryption of sensitive data is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a McDonalds ’ secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- the better, in general. However, as the strength of encryption/decryption increases, so does the cost. In recent years, a controversy has arisen over so-called strong encryption. This refers to ciphers that are essentially unbreakable without the decryption keys. While most companies and their customers view it as a means of keeping secrets and minimizing fraud, some local and European governments view strong encryption as a potential tool by which terrorists might evade sensitive data or information. These governments had strong apprehension that including that of the United States; want to set up a key-escrow arrangement. This means everyone who uses a cipher would be required to provide the government with a copy of the key. Decryption keys would be stored in a key secure place, used only by concerned authorities, and used only if backed up by a local government rules and regulations. The widespread opponents of these schemes have put up the strong case that criminals could hack into the key-database and illegally obtain, steal, or alter the information with the knowledge and taking undue advantage of sensitive information... Supporters claim that while this is a possibility that the implementing the key escrow scheme is very strong basic step for keeping the data better than doing nothing to prevent Hackers from freely using encryption/decryption. 20 Business Data Authentication: Authentication is the process of determining whether someone or something is authorized to get access in to the network systems through which the information can be access, manipulated and altered with the fact that who or what it is declared to be authoritative level for excessive rights for information. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password which can be in the combination of number or alphabets or both. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of information) is that passwords can often be stolen, accidentally revealed, or forgotten. Importance of Data authentication for McDonalds authorizes users; This is very important security measure to let only the authorized users to get access the information according to their level of authority, This is decided by management committee is to whom they are given the responsibility and according their position in company and for this reason, Internet business and many other transactions require a more stringent authentication process. The use of digital certificates issued and verified by a Certificate Authority (CA) as part of a public key hardware infrastructure which is considered likely to become the standard work flow process to perform authentication on the Internet. Logically, authentication needs authorization to access the network. 21 Conclusion & Recommendations: By above analysis of various networking tools and technologies which is used by McDonalds for effective business data flow inside and outside the organizations. The presence of McDonalds outlets all around the world made the IT department task more tougher in order to gather and distribute the most important and complex data for recording, summarizing and analyzing the data for business assessment, decision making and to know the financial health of the company. Usage of both wired and wireless networking tools is prerequisite depend upon the country with availability of technical knowhow and McDonalds had adopted the policy of enterprise networking system to coordinate and integrated all the information both vertically and horizontally in the organization for free data work flow in order to communicate effectively about the latest weakened promo offers, special discounts and flow of branches information to local server followed by country server then ultimately to corporate head quarters in US. 22 References: 1) CISCO networking tools book. 2) Data Communications and Networking [Hardcover] Behrouz A Forouzan (Author), Behrouz Forouzan (Author) 3) Business Data Communications and Networking By: Jerry FitzGerald, Alan Dennis 23