In the technology design requirements, it is important to factor in the business needs of the firm that drive the technology applications and provide a rich picture that details the concerns of stakeholders involved. In this case, the end users/staff, managers, brokers, and IT heads are the major stakeholders in the new systems. In the system, security, reliability, authenticity, scalability, and effectiveness in data transfer are the major concern areas, considering that the network system handles important and sensitive company information and deals with the security policies set. This is considering that WWTC is an online broker and online data sharing puts the integrity and security of the data at risk while other technical aspects may also affect the process.
The firm requires a network that is easier to manage and is more cost-effective and one that facilitates smooth user-provider interactions on a real platform (Van der Merwe et al., 2010). The system end users require systems that are easy to operate, secure, and associates require customized applications such as the Stock and Bond Analytical and the Market Tracking Applications. The overriding stakeholder requirement is thus secure systems that handle data in accordance with the security policies and is able to facilitate fast and easy sharing of data. The security design is aimed at protecting three critical assets: information, people, and property. In mapping the security technologies identity, considerations based on the use of IP address to identify incoming traffic on Internet links are important (Frankel, Graveman, Pearce, & Rooks, 2010). An important consideration in relation to the online business is that the firm operates in a complex and highly dynamic environment. For this reason, there is a need to have a moderate formalization and centralization of the command centers and servers. Centralized routing protocols should be deployed on the several nodes inside the network to facilitate a stream-controlled medium access. In the network, nodes are immobile, thus it is practical to have a routing protocol that accommodates a centralized entity. A centralized entity means that management of the entire network is easier for the managers and the IT heads as it eliminates data frame collisions.
Security and reliability are important issues when designing a network infrastructure. The security requirement for users such as data encryption, applications restriction, and account restriction must be considered in the design of active directory structure. The design of the network infrastructure needs to also reflect the individual security needs of the different locations in the business and thus the need to create domains for each location. It needs to take data protection into account and also the rights of users as stakeholders in the assessment. A solid design plan is necessary to develop an easy-to-use interface for the users and associates. For the online business, the systems often rely on client/server applications that surround activities such as inventory control and supply chain. WLANs are thus mission-critical applications as they facilitate fast data access and data security. LAN and wireless internet connections provide the users with the mobility they need in terms of checking inventory because it facilitates instantaneous updates to backend systems and databases (Van der Merwe et al., 2010). Several LAN technologies such as routing and switching can be used to segment LANs and reduce network resources contention, considering that the resources within the Active Directory in relation to the security information may be required for different operations within domains. This provides huge cost savings in terms of timeliness and improved accuracy which is a major concern for managers and IT heads. The introduction of Voice over IP (VoIP) is also important by providing two-way computation functionalities and web-based application support.
Taking into consideration a solid design plan is thus an important part of the success of the new system because each technology aspect incorporated is aimed at making data transfer fast, reliable, and secure thus making it easy to manage and control costs of data sharing.
References
Frankel, S., Graveman, R., Pearce, J., & Rooks, M. (2010). Guidelines for the secure deployment of IPv6: Recommendations of the National Institute of Standards and Technology. NIST Special Publication, 800-119. Gaithersburg, MD: National Institute of Standards and Technology.
Van der Merwe, J., Ramakrishnan, K. K., Fairchild, M., Flavel, A., Houle, J., Lagar-Cavilla, H. A., & Mulligan, J. (2010). Towards a Ubiquitous Cloud Computing Infrastructure. In Proceedings of the 17th Local and Metropolitan Area Networks (LANMAN), 2010, (pp. 1-6). IEEE.