34
McDonalds Company Networking Assignment Prepared By: Ghada odea Sara alsmaiel 200600362 Saba almohawis 201000230 1

folder... · Web viewIt is commonly known as TCP/IP, because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP), which were the first

  • Upload
    letuyen

  • View
    217

  • Download
    3

Embed Size (px)

Citation preview

McDonalds Company Networking Assignment

Prepared By:

Ghada odea

Sara alsmaiel 200600362

Saba almohawis 201000230

COLLEGE OF BUSINESS ADMINISTRATION

Spring 2012

1

McDonald Business profile:

Mission:

McDonald's mission is to be the world's best quick service restaurant experience. Being the best means providing outstanding quality, service, cleanliness, and value, so that we make every customer in every restaurant smile."

McDonald’s personnel are its strength company aim is to improve the skills of the employees to deliver quality products and better prepared for the future challenges.

Vision: To provide quality food at affordable price

McDonald’s employee is company strength.

Product and Services are as energy which helps in customers benefit. Company motto to grow their skills and improve their standard of living as well as

prepare for their future.

The story of McDonalds started in 1954, when its founder Raymond Kroc saw a hamburger stand in San Bernardino, California and established a nationwide fast food chain restaurant. Kroc proved himself as a pioneer who revolutionized the American restaurant industry. Today McDonalds is the world largest fast food chain offering 47 million customers daily. McDonalds is now one of the most valuable company in the globally, worth more than $25 billion. The Golden Arches of M shape its cartoons mascot Ronald McDonald have gained universal recognition

For being a successful McDonalds company, the importance of not only necessary to make decisions, but to implement the right ones. McDonald’s present success, as shown in its leading position, can be led back among other things to a number of beneficial decisions. A business decision is a process with the selection of an action often out of a number of alternatives.

McDonalds adopted the business strategy where franchise Model Only 15% of the total number of restaurants is owned by the Company. The remaining 85% is operated by franchisees. The company follows a complete business framework of training and monitoring of its franchises to ensure that they adhere to the Service Quality, Service, Cleanliness and Value propositions offered by the company to its customers.

Product Consistency By developing a sophisticated supplier networked operation and distribution system, the company has been able to achieve consistent product taste and quality across geographies.

Act like a retailer and think like a brand McDonalds focuses not only on delivering sales for the immediate present, but also protecting its long term brand reputation.

2

Introduction:

Big Corporate like McDonalds have outlets spread all across the globe by ever increasing

need to connect them to their local head offices and ultimately to the parent company corporate

head office. The McDonalds had various franchises and local partnership in many countries for

business expansions purpose. So the ultimate aim is to connect the business information and data

flow between the corporate head office to the branches all across the globe. Present day business

needs the strong networking .The main idea for ascertaining the latest networking solutions

available to help the McDonalds large network across the globe to make sure that the McDonalds

data is fully protected from intruders, hackers or malwares. The present danger facing whole

McDonalds is about the data security where ERP (Enterprise Resources applications) application

of latest networking tools and solutions is pre-requisite for McDonald’s s to have secure network

where over billions of dollars of business took place.

The below assignment is an attempt to analyze for taking the decisions to use the various

networking tools and solutions available for the management of McDonalds in order to take a

balance choice in different market across the globe.

Problem Statement: Network

The business presence in all over the world makes the McDonalds to have secure methods

of data transfer between the branches and corporate headquarters by choosing the various

networking tools and communication methods.

Solution: For McDonalds Business through connection methods:

The connection method (CM) is the process of designing and developing the general

framework for automated network deduction for connectivity purpose. The connection type

can be wired or wireless deduction. The CM (Connection method) is process through which

McDonalds planning to connect their branch computers and country servers through various

networking devices for smooth flowing of market data through their internal and external

networking connecting tools and devices.

3

Problem solution for McDonald’s business by using of Optical

fiber for networking purpose.

An optical fiber is most advanced tool for effective data flow for McDonalds data transfer

through transparent use of fiber which is made up of pure glass(silica) that helps in transmitting

any type of primary or secondary data through wired LAN(Local area network) . Presently the

optical fiber network wire is widely used to transmit the huge volume of data of various forms

effectively as compare to metal wires which is only good for transferring the electricity only. The

application of fiber optic technology is applied in various means to transfer secondary data from

local country servers to main server at head offices with wrapped data bundles.

The use of Optical fibers for data transfer by transparent core covered by cladding materials

with lower index of refraction with a dim light is provided for deduction purpose that supports

the paths of transverse model multi-model fibers (MMF) and single-mode fibers (SMF). The

designing and connecting the fiber networks is most crucial for money transfer jobs assignment

as this need a special effort to join all the fibers correctly and then spliced together for smooth

data flow.

Problem Statement: Wired Network

For adopting the wired network in McDonald’s branches is one option for the business for

seamless transfer of order taking from customers to kitchen management and execution of

orders.

Solution: Adaptation of wired network in McDonalds branches:

McDonald’s network is process in which data and files transferred through the medium of

wired networks as it is inter-organization connectivity for sharing the same platform for running

the McDonalds functioning purpose. Wired network usually develop with networking tools like

wires, routers switches, computers or laptops and connect with each other by wires. The primary

objective of developing wired network is to help the employees of the organiasiton to share files

4

and internal information among themselves from their computers or laptops and in addition to

that all the computers get connected through work group and ultimately connected to internet

also for effective communication inside- out or outside- in basis.

The various tools like router or switch had been used to design and develop professional

network for intra or other type important McDonald’s data transfers.

Business Advantages for adopting Wired networking methods in McDonald:

The wired network system had many advantages like

Free data flow through wires preferred.

Flexibility to connect through the office building by put wires all around the office space

for getting convenient locations.

More secure and less chances of data lost and data disturbance.

Business Disadvantages for adopting Wired networking methods in McDonald:

The wired network system had disadvantages also

Costly options as this network wires needs to put while the building construction process

started. .

Less compatibly with new technological gadgets and devices.

Less Reliability, if some minor problems occur in router or switch the while system stop

working.

5

Usage of Wireless Network technologies:

. Wireless data transfer is a new advanced sophisticated technology applicable for transferring

the highly complex and flexible data through various means of communication devices and

system. Wireless network is a newly established design network with the use radio signals

devices that helps to transfer files and data from one gadget to other computers or mobile

stations.

McDonalds Business Usage of Wireless Technologies:

Wireless technology is widely used all over the world by McDonalds for having

communication equipment that has many applications and this can be adopted in parallel

extension of wired LAN. The Wired local area network is easy and complex way of information

transferring in the corporate world where all the computers are connected in the office through

wires and by various gadgets in the McDonalds. The information work flow and data transfer

may also require the wireless technologies where wireless gadgets is more useful for data

transfer process. The data transfer can be happen within the bound walls of corporate house.

Wireless networks works for McDonalds Company for using wire networking that relies on

copper and/or fiber optic cabling. Wireless networks are growing in popularity because of their

compatibility and mobility. Wireless devices have been gaining popularity in recent years.

Cellular phones and other wireless communication devices have driven demand for new wireless

technology. While traditional wired solutions provide a sense or reliability, convenience has

become a large part of consumers needs. And McDonalds now have everything that enabled

phone offering services to the consumers. However, marketing and media has played a large role

in the consumer’s perspective of wireless devices. The information below is factual, and

provides a non-biased evaluation of current wired and wireless technology. Wireless isn't really a

new technology... The military has been using "line of sight" micro-wave towers for decades.

Everyone knows the most common wireless technology: cellular phones. However, this

technology has several problems. The table below portrays the pros and cons of wireless

technology.

6

Business Advantages for McDonalds’ for adopting Wireless Networking Services:

Wireless technology is more conveniently use on tight places as McDonalds do not have to

worry about running wires in tight places, or obtaining low-voltage permits. The range of

wireless technology can be impressive. While the equipment you use may break (just as wired

equipment would) the signals themselves never break. In comparison to wireless eventually

getting old or corroded, this is a great advantage.

Business Disadvantages for McDonalds’ for adopting Wireless Networking Services

On the negative side, wireless technology suffers easily from interference. Other source of EM

(electro-magnetic radiation) can cause problems for wireless signals. While wired technologies

suffer from this as well, wireless signals are affected more frequently. Another down-side to Wi-

Fi is the price. High-end wireless equipment comes with a serious price tag. Installing the

equipment can be tricky depending on the environment. McDonalds may have trouble with

signal strength from out-door antennas that may be adversely affected by temperature or

humidity. Wireless technology also has implications in regards to security. Remember that wire-

tapping can be done, but you must have physical access to a wire. However, this becomes much

easier with a wireless signal. These signals can be intercepted by simply being the range of a

wireless signal. Another problem is speed. While some Wi-Fi equipment producers claim they

can transmit data at 108 Mbits/sec, this is a deceptive marketing scam. See the details in this

article. Wireless speed is not even close to gigabit or 10 gigabit speeds that are attained using

wires. Lastly, the quality of service is anything but effective. Wireless technology does not and

probably never will operate in the five 9's of reliability

7

McDonalds Wireless LANs usage:

Wireless LAN (WLAN) is a vastly used by McDonalds as new advanced sophisticated

technology applicable for transferring the mobile orders and can able to track the delivery

process under which order managed process improvement through various means of

communication wireless devices and system

McDonalds’ WLAN is used all over the world in the shopping malls by having communication

equipment and home delivery business that has huge applications for tracking the order delivery

process and shipment of order on time to the customers

Enterprise private network:

The private enterprise network is mainly operated earlier over telecommunications networks.

And during the last decade in the spread of Internet technology evolved, a new type of network

called virtual private networks originated. This type of network was built over public

infrastructure, and the data was encrypted to protect it from hackers.

McDonald’s enterprise private network is a computer network that helps McDonalds to

distribute the weekly promotion details and promotion materials with special prices for each

event. As McDonalds is having number of branches all over the city of Dammam and Khobar

and each one had to connect in a secure way over a network. An enterprise private network is

mainly set up to share computer resources

The business specific requirement for taking care of day-to-days operations needs special private

McDonalds enterprise private networks when privacy is maintained through security procedures

and tunneling protocols like Layer 2 Tunneling Protocol.

Some of the advantages of McDonalds’ enterprise private network are:

The messages are secure because they are encrypted.

They are cost effective and measurable benefits.

They help to centralize IT work flow from all around the world.

EPN enable business coordination, smooth data flow for decision making process.

8

Business use of Internet Technologies: McDonalds’ Business Solutions

The borderless world where the vast use of Internet protocol suite is the set of communications

tools used by McDonalds for the Internet based online McDonald’s transactions and similar

networks, and generally the most popular protocol stack for wide area networks (WAN). It is

commonly known as TCP/IP, because of its most important protocols: Transmission Control

Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in

this standard

TCP/IP provides end-to-end connection using the medium that need the usage of McDonald’s

business data transmitted should be in specific format, addressed, transmitted, routed and

received at the specified destination where the information is useful. It has four abstraction

layers, each with its own usage. From lowest to highest, the layers are:

The link layer (commonly Ethernet) contains data and information communication

technologies for a local network.

The internet layer (IP) connects local networks information for establishing internet

working on different places

The transport layer (TCP) handles host-to-host communication between two or more

computers.

The application layer (for example HTTP) contains all protocols information for specific

data communications services on a process-to-process individual level (for example how

a web browser communicates with a web server).

The TCP/IP model and related protocols are managed by the tool called Internet

Engineering Task Force (IETF).

9

Intranets and extranets:

An "intranet" is the generic term for a collection of Private McDonald’s computer networks

within an organization. An "extranet" is a computer network that allows controlled access from

the outside for specific online business or educational purposes. Intranets and extranets are

communication tools designed to enable easy information sharing within workgroups,

Intranet usage in McDonald’s business operations?

In essence, an intranet is a business' own Private McDonald’s website. It is a confidential

business network that uses the same underlying structure and network protocols as the internet

and is protected from unauthorized users by a firewall.

Intranets enhance existing communication between employees and provide a common

knowledge base and storage area for everyone in customers business. They also provide users

with easy access to McDonalds’ data, systems and email from their desktops.

Because intranets are secure and easily accessible via the internet, this enables staff to do work

from any location simply by using a web browser. This can help small businesses to be flexible

and control office overheads by allowing employees to work from almost any location, including

their home and customer sites.

Other types of intranet are available that merge the regular features of intranets with those often

found in software such as McDonalds. These are known as online offices or web offices.

Creating a web office will allow you to organize and manage information and share documents

and calendars using a familiar web browser function, which is accessible from anywhere in the

world.

Business types of content found on intranets:

Business Administrative – promotion calendars, emergency procedures, meeting room

arrangements.

10

Corporate business plans, client/customer lists, document templates, branding guidelines,

mission statements, press coverage and staff newsletters

Financial - annual reports ,income statement and MCDONALDS business performance

IT - virus alerts, tips on dealing with problems with hardware, software and networks,

policies on corporate use of email and internet access and a list of online training courses

and support

Marketing campaign data flow with competitive intelligence with links to competitor

websites, corporate brochures, latest marketing initiatives, press releases, presentations

human resources - appraisal procedures and schedules, employee policies, expenses

forms and annual leave requests, staff discount schemes, new vacancies

individual projects - current project details, team contact information, project

management information, project documents, time and expense reporting

external information resources - route planning and mapping sites, industry

MCDONALDS research sites and search engines

Usage of extranet?

Extranet is similar to an intranet but it is made accessible to selected external partners such as

business partners, suppliers, key customers, etc, for exchanging data and applications and sharing

information.

As with an intranet, an extranet can also provide remote access to corporate systems for staff that

spends lots of time out of the office, for instance those in sales or customer support, or home

workers.

Extranet users should be a well-defined group and access must be protected by rigorous

identification routines and security features.

McDonald’s usage of an extranet for business application?

McDonalds and financial Businesses operations of all sizes are under increasing pressure to use

online ordering, electronic order tracking and financial management system.

11

At the same time small McDonalds are keen to meet the demands of larger McDonald’s s like

MCDONALDS in terms of working flexibly, adopting new technologies and enabling the

exchange of business information and transactions.

Extranets offer a cheap and efficient way for businesses to connect with their trading partners. It

also means that your business partners and suppliers can access the information they need 24

hours a day.

The ability of the extranet to automate the trading tasks between you and your trading partners

can lead to enhanced business relationships and help to integrate your business firmly within

their supply chain.

Star network:

A star network is a local area network (LAN) in which all nodes (McDonald’s workstations or

other devices) are directly connected to a common central Server computer. Every McDonald’s

workstation is indirectly connected to every other through the central computer. In some star

networks, the central computer can also operate as a workstation.

The star network with five workstations (or six, if the central computer acts as a workstation).

Each workstation is sphere, the central computer is shown as a larger sphere, and connections are

shown as straight lines. The connections can be wired or wireless links.

The star network topology used by McDonald’s s that works well when workstations are at

scattered points. It is easy to add or remove workstations.

12

If the workstations are reasonably close to the vertices of a convex polygon and the system

requirements are modest, the ring network topology may serve the intended purpose at lower

cost than the star network topology. If the workstations lie nearly along a straight line, the bus

network topology may be best.

In a star network, a cable failure will isolate the workstation that it links to the central computer,

but only that workstation will be isolated. All the other workstations will continue to function

normally, except that they will not be able to communicate with the isolated workstation. If any

workstation goes down, none of the other workstations will be affected. But if the central

computer goes down, the entire network will suffer degraded performance or complete failure. If

redundancy is required, the mesh network topology may be preferable.

13

Hardware Requirements for network interface cards:

The interface cards present in the computers helps in recognizing the data sources from where

the data is flowing and this interface cards had to be compatible with other devices The most

common language or protocol for LANs is Ethernet,. A lesser-used protocol is to address the

transmitting location. When building a LAN, a network interface card must be installed in each

computer on the network and all NICs in the network must be of the same architecture. For

example, all must either be Ethernet cards, Token Ring cards, or an alternate technology.

Business Application of Network card in McDonalds Company:

A network interface card is widely used in all McDonald’s computers that more commonly

referred to as a NIC, is a device that allows computers to be joined together in a LAN, or local

area network. Networked computers communicate with each other using a given protocol or

agreed-upon language for transmitting data packets between the different machines, known as

nodes. The network interface card acts as the liaison for the machine to both send and receive

data on the Local area Network (LAN).

An Ethernet network interface card is installed in an available slot inside the computer. The

NIC assigns a unique address called a MAC (media access control) to the machine. The MACs

on the network are used to direct traffic between the computers. The back plate of the network

interface card features a port that looks similar to a phone jack, but is slightly larger. This port

accommodates an Ethernet cable, which resembles a thicker version of a standard telephone line.

Ethernet cable must run from each network interface card to a central hub or switch. The hub or

switch acts like a relay, passing information between computers using the MAC addresses and

allowing resources like printers and scanners to be shared along with data.

A network interface card does not have to be hard wired with physical cable. Wireless Ethernet

cards are installed like their wired counterparts, but rather than a port for an Ethernet cable, the

card features a small antenna. The card communicates with the central wireless switch or hub via

radio waves. Wireless LANs may have some restrictions depending on the material the building

14

is made from. For example the McDonalds lead in walls can block signals between the network

interface card and hub or switch.

When buying components for a LAN, make sure the NICs and hub or switch have the same

capabilities. The entire network must be either wired or wireless, so a wireless network interface

card cannot talk to a wired switch or hub. In addition, newer versions of hardware will likely

support more features and/or greater speeds than older versions. Make sure your central switch

or hub can utilize the highest capabilities of the network interface card under consideration.

For those who wish to connect LANs located in different areas of the city, state or country, ATM

(asynchronous transfer mode) can create wide area networks or WANs by connecting LANs

together. LANs are still built with a network interface card in each networked computer, but

ATM uses broadband Internet access to link the LANs to online ATM switches. This type of

ATM WAN is referred to as an Internetwork.

Switches:

A network switch or switching hub is a computer networking device that connects network

segments or network devices. The term commonly refers to a multi-port network bridge that

processes and routes data at the data link layer (layer 2) of the OSI model. Switches that

15

additionally process data at the network layer (layer 3) and above are often referred to as layer-3

switches or multilayer switches.

A switch is a telecommunication device which receives a message from any device connected

to it and then transmits the message only to that device for which the message was meant. This

makes the switch a more intelligent device than a hub (which receives a message and then

transmits it to all the other devices on its network.) The network switch plays an integral part in

most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number

of linked managed switches. Small office/home office (SOHO) applications typically use a

single switch, or an all-purpose converged device such as a residential gateway to access small

office/home broadband services such as DSL or cable internet. In most of these cases, the end-

user device contains a router and components that interface to the particular physical broadband

technology.

McDonalds used switches for connecting different computer and printers for data flow:

A McDonalds Ethernet switch operates at the data link layer of the OSI model to create a

separate collision domain for each switch port. With 4 computers (e.g., A, B, C, and D) on 4

switch ports, A and B can transfer McDonalds data back and forth, while C and D also do so

simultaneously, and the two conversations will not interfere with one another. In the case of a

hub, they would all share the bandwidth and run in half duplex, resulting in collisions, which

would then necessitate retransmissions. Using a switch is called micro segmentation. This allows

computers to have dedicated bandwidth on point-to-point connections to the network and to

therefore run in full duplex without collisions.

McDonalds uses number of network switches or switching hubs that connects network

segments or network devices. The term commonly refers to a multi-port network bridge that

processes and routes data at the data link layer (layer 2) of the OSI model. Switches that

additionally process data at the network layer (layer 3) and above are often referred to as layer-3

switches or multilayer switches.

16

A McDonalds switches is a telecommunication device which receives a message from any

device connected to it and then transmits the message only to that device for which the message

was meant. This makes the switch a more intelligent device than a hub (which receives a

message and then transmits it to all the other devices on its network.) The network switch plays

an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs

contain a number of linked managed switches. Small office/home office (SOHO) applications

typically use a single switch, or an all-purpose converged device such as a residential gateway to

access small office/home broadband services such as DSL or cable internet. In most of these

cases, the end-user device contains a router and components that interface to the particular

physical broadband technology.

Role of McDonald’s s switches in networks:

McDonald’s switches may operate at one or more layers of the OSI model, including data link

and network. A device that operates simultaneously at more than one of these layers is known as

a multilayer switch.

The modular network switch has three network modules and one power supply.

While switches may learn about topologies at many layers, and forward at one or more layers,

they do tend to have common features. Other than for high-performance applications, modern

commercial switches use primarily Ethernet interfaces.

At any layer, a modern switch may implement power over Ethernet (PoE), which avoids the need

for attached devices, such as a VoIP phone or wireless access point, to have a separate power

supply. Since switches can have redundant power circuits connected to uninterruptible power

supplies, the connected device can continue operating even when regular office power fails.

McDonald’s switches are very important to transfer the data both internally and connected to

the external media like local country servers through IP address and connecting through the

business servers.

17

Routers:

Router Application on network:

The router is connected to at least two networks and decides which way to send each

information packet based on its current understanding of the state of the networks it is connected

to. A router is located at any gateway (where one network meets another), including each point-

of-presence on the Internet. A router is often included as part of a network switch.

Usage of Router in McDonalds Business:

The presence of McDonalds branches all over the world had adopted the routers to connect

various branches in the city with packet-switched networks such as the Internet, a router is a

device or, in some cases, software in a computer, that determines the next network point to

which a packet should be forwarded toward its destination.

A router may create or maintain a table of the available routes and their conditions and use this

information along with distance and cost algorithms to determine the best route for a given

packet. Typically, a packet may travel through a number of network points with routers before

arriving at its destination. Routing is a function associated with the Network layer (layer 3) in the

18

standard model of network programming, the Open Systems Interconnection (OSI) model. A

layer-3 switch is a switch that can perform routing functions.

A router is a router that interfaces and connect with an asynchronous transfer mode (ATM)

network. A brooder is a network bridge combined with a router for data flow.

McDonald’s home and business computer users who have high-speed Internet connections such

as cable, satellite, or DSL, a router can act as a hardware firewall component. This is even true

even if the home or business has only one computer to have this hardware. Many IT engineers

believe that the use of a router products provides better protection against hacking than a

software firewall, because no computer Internet Protocol address are directly exposed to the

Internet. This makes port scans methods essentially impossible. In addition, a router does not

consume computer resources as a software firewall does. Commercially manufactured routers are

easy to install, reasonably priced, and available for hard-wired or wireless networks.

Data Security Issue:

Encryption:

Data Encryption is the conversion of data into a form, called a cipher text that cannot be easily

understood by unauthorized people. Decryption is the process of converting encrypted data back

into its original form, so it can be understood.

The use of encryption/decryption is as old as the art of communication. In wartime, a cipher,

often incorrectly called a code, can be employed to keep the enemy from obtaining the contents

of transmissions. (Technically, a code is a means of representing a signal without the intent of

keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution

of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice

signals by inverting the sideband frequencies. More complex ciphers work according to

sophisticated computer algorithms that rearrange the data bits in digital signals.

19

In order to easily recover the contents of an encrypted signal, the correct decryption key is

required. The series of main keys is algorithm that reverses the work of the encryption algorithm.

Alternatively, a computer can be used in an attempt to break the cipher. The more complex the

encryption algorithm, the more difficult it becomes to eavesdrop on the communications without

access to the key.

McDonald’s data Encryption/decryption:

The encryption/decryption of sensitive data is especially important in wireless

communications. This is because wireless circuits are easier to tap than their hard-wired

counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of

sensitive transaction, such as a credit-card purchase online, or the discussion of a McDonalds ’

secret between different departments in the organization. The stronger the cipher -- that is, the

harder it is for unauthorized people to break it -- the better, in general. However, as the strength

of encryption/decryption increases, so does the cost.

In recent years, a controversy has arisen over so-called strong encryption. This refers to ciphers

that are essentially unbreakable without the decryption keys. While most companies and their

customers view it as a means of keeping secrets and minimizing fraud, some local and European

governments view strong encryption as a potential tool by which terrorists might evade sensitive

data or information. These governments had strong apprehension that including that of the

United States; want to set up a key-escrow arrangement. This means everyone who uses a cipher

would be required to provide the government with a copy of the key. Decryption keys would be

stored in a key secure place, used only by concerned authorities, and used only if backed up by a

local government rules and regulations. The widespread opponents of these schemes have put up

the strong case that criminals could hack into the key-database and illegally obtain, steal, or alter

the information with the knowledge and taking undue advantage of sensitive information...

Supporters claim that while this is a possibility that the implementing the key escrow scheme is

very strong basic step for keeping the data better than doing nothing to prevent Hackers from

freely using encryption/decryption.

20

Business Data Authentication:

Authentication is the process of determining whether someone or something is authorized to

get access in to the network systems through which the information can be access, manipulated

and altered with the fact that who or what it is declared to be authoritative level for excessive

rights for information. In private and public computer networks (including the Internet),

authentication is commonly done through the use of logon passwords. Knowledge of the

password is assumed to guarantee that the user is authentic. Each user registers initially (or is

registered by someone else), using an assigned or self-declared password which can be in the

combination of number or alphabets or both. On each subsequent use, the user must know and

use the previously declared password. The weakness in this system for transactions that are

significant (such as the exchange of information) is that passwords can often be stolen,

accidentally revealed, or forgotten.

Importance of Data authentication for McDonalds authorizes users;

This is very important security measure to let only the authorized users to get access the

information according to their level of authority, This is decided by management committee is to

whom they are given the responsibility and according their position in company and for this

reason, Internet business and many other transactions require a more stringent authentication

process. The use of digital certificates issued and verified by a Certificate Authority (CA) as part

of a public key hardware infrastructure which is considered likely to become the standard work

flow process to perform authentication on the Internet. Logically, authentication needs

authorization to access the network.

21

Conclusion & Recommendations:

By above analysis of various networking tools and technologies which is used by McDonalds

for effective business data flow inside and outside the organizations. The presence of McDonalds

outlets all around the world made the IT department task more tougher in order to gather and

distribute the most important and complex data for recording, summarizing and analyzing the

data for business assessment, decision making and to know the financial health of the company.

Usage of both wired and wireless networking tools is prerequisite depend upon the country

with availability of technical knowhow and McDonalds had adopted the policy of enterprise

networking system to coordinate and integrated all the information both vertically and

horizontally in the organization for free data work flow in order to communicate effectively

about the latest weakened promo offers, special discounts and flow of branches information to

local server followed by country server then ultimately to corporate head quarters in US.

22

References:

1) CISCO networking tools book.

2) Data Communications and Networking [Hardcover] Behrouz A Forouzan (Author), Behrouz

Forouzan (Author)

3) Business Data Communications and Networking

By: Jerry FitzGerald, Alan Dennis

23