Retrieved from https://studentshare.org/management/1619067-computer-technology-and-the-networked-organization
https://studentshare.org/management/1619067-computer-technology-and-the-networked-organization.
An important reason is that in this topology my companies system will have no disruptions to the network when connecting and removing devices. Under the architecture, the configurations of the company's peer-to-peer networking architecture will be put in place. This will be of help because all the computers in the network will have the same privilege, capabilities, and responsibility among themselves. This will enable file sharing and if anyone wants to acquire information from another customer then he will do it fast and also it is hard for the system to collapse because all computers depend on each other, not like a client-server where one computer is expected for file sharing.
The communication protocol used will be TCP/IP because it will enable the computers in the network to communicate without the help of central management. The reason why I will use TCP/IP in my company because it is compatible with various types of computer hardware and network configurations. Another reason why I found it relevant is it routable and so finds the most efficient path for the packets to move across the network.HOW I HAVE MAINTAINED AND SECURED THE NETWORK?I would have created a firewall that will not allow the people who are not in the network to get access to it.
This implies that it will set up control of the incoming and outgoing network traffic by analyzing the data packets and determining whether they should pass or not. Secondly, I will train my personnel and enforce a policy. having employees and customers who understand and adhere to the companies’ security policies will enable reduce security problems. I will create strong security passwords and strong forms of authentication to prevent guessing and cracking.Thirdly I will use security tools that will protect the operating system of every computer in the network from viruses, spyware, or any others forms of security method that will not allow employees to use unauthorized software applications and deny access.
The network would be encrypted to ensure data integrity or protect sensitive information.It will have an incident response and disaster contingency plan like backing up of the server if it becomes vulnerable somewhere that is not in the network's company. This will enable the system to continue even if it was invaded and had lost some information.Security is the most important form and that is why the system itself will use TCP/IP WHICH Ensures safety as it ensures data is delivered is at its intended destination through the use of error checking and the retransmission of corrupted and missing packets.
SOCIOTECHNICAL LINKAGE THAT I DEVELOPED.I intend to create a system answering machine that will take my customers to the intended employee of the customer's concern. Because my company is intended to give different types of advice to its customers. it doesn’t have to be an employee who first talks and then puts the call to the specified or requested topic that is ordered by the customer but develops an answering machine that sets the customers to call to the ordered forum of discussion.
Read More