Friday, May 3, 2019
Computer technology and the networked organization Essay
Computer technology and the networked organization - Essay ExampleThis helps one monitor the network properly. each failure is easily seen and exit not affect the entire organisation of the company. Star topology is dependable because it is easy to back up the information and easy to access the data. Another important think is that in this topology my companies system will have no disruptions to the network when connecting and removing devices.Under the architecture the configurations of the company friction match to peer networking architecture will be put in place. This will be of help because any the computers in the network will have the same privilege, capabilities and responsibility among themselves. This will enable file share-out and if anyone wants to acquire information from another customer then he will do it fast and in any case it is hard for the system to collapse because all computers depend from each other not like leaf node server where one computer is expec ted for file sharing.The communication protocol used will be TCP/IP because it will enable the computers in the network to communicate without the help of central management. The reason why I will use TCP/IP in my company because it is compatible with diverse types of computer hardware and network configurations. Another reason why I found it relevant is it routable and so finds the most efficient path for the packets to move across the network.I would have throwd a firewall that will not allow the people who are not in the network to get access in it. This implies that it will set up a control of the incoming and outgoing network traffic by analysing the data packets and determining whether it should pass or not. Secondly I will train my personnel and enforce a policy.by having employees and customers who understand and adhere to the companies certification policies will enable reduce security problems. I will create strong security passwords and strong forms of authentication t o prevent guessing and cracking.Thirdly I will uses security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.