SlideShare a Scribd company logo
1 of 46
TERM PAPER: NETWORKING
1
Term Paper: Networking
CIS 505: Communication Technologies
TERM PAPER: NETWORKING
2
Networking
Introduction:
This paper will produce much information about the
Wireless technology which is the wider
communication type. It has many advantages, and many ethical
and legal concerns. Also, there are
some mitigation mechanisms that can be used to protect the
wireless connection from any bad issue.
So, it will research about the SWOT analysis of this technology
to improve this communication type.
Next, the evolution of this technology will be presented in this
paper with the future role in the next
years. Lastly, It will include the diagram of the Wireless
technology communication structure.
The executive summary, and the importance of the wireless
technology:
The Wireless is wider communication type which means
synchronous connecting to many
devices via single modems without wires. IT has many
advantages; like the following:
� It connects many devices remotely and in the same time; like
the connections of the wireless
PC, wireless laptop, wireless printer, and wireless phone at the
same time with the single
wireless router.
� Its signals can access all the locations, especially to the
locations that impossible accessed via
the wires.
� It eliminates the dangerous of the wires in the home.
� It eliminates the cost of the wires.
TERM PAPER: NETWORKING
3
� The continuous connection between the device and the
Internet, without reactivate the
connection every time.
All these good points in wireless connectivity make
research on this topic is important. So, it
will research about the SWOT analysis of this technology to
improve this communication type. Then,
it will explain some ethical and legal concerns that related with
the wireless connection with the
mitigation mechanisms. Next, the evolution of this technology
will be presented in this paper with the
future role in the next years. Lastly, it will include the diagram
of the Wireless technology
communication structure. (science-technology-
world.blogspot.com, 2009).
SWOT Analysis:
SWOT analysis Which refers to the Strength, Weakness,
Threats, and Opportunities. It is
the assessment tool that used to analyze the external and
internal business factors in order to
assess, and improve the products, or services of this business.
The external factors include the
Threats and opportunities; while the internal factors include the
Strengths and Weaknesses. The
strengths are the good characteristics, and the weakness are the
bad characteristics; while the
threats are the vulnerabilities of the bad points, and the
opportunities are the good points that can
be exploited by the manufacturers to enhance the products or
the services. (Harmon et al., 2015).
The Wireless technology is like any other services have
many characteristics with many
threats and opportunities. So, the SWOT analysis to the
Wireless service as the following:
� The strengths:
TERM PAPER: NETWORKING
4
� It is free wire connection.
� It has Global coverage.
� It has the ability to access all the locations, especially the
places that couldn't be
accessed by the wires.
� It has a flexible connection for many devices at the same
time, with the ability to
improve the connection.
� It is used widely by many devices, satellite, wireless LAN
WLAN, Pans, mobile
telephone, laptops, cellular phones, GPS, remote garage-door
opener, etc.
� It is cheaper and easier to be maintained than the wire
connection.
� Weaknesses:
� Its infrastructures are expensive.
� It is affected by the physical obstructions, and weather
conditions.
� Sometimes, the interference occurs between many devices.
� The big effort is needed to safe the wireless connection.
(Maru, 2014).
� Opportunities:
� There are many opportunities to resolve the wireless threats;
protecting the
enterprise connection.
� It can find a policy framework for determining the protection
requirements,
administration features, and so on.
� Protecting the sensitive data by many defensive mechanisms.
TERM PAPER: NETWORKING
5
� Threats:
� The security and privacy issues are very big threats (like the
Denial of Service
DoS, and eavesdropping), and the biggest challenges of the
wireless technology,
especially the growth of this problem is continuous. (Mathias,
2006).
An ethical and legal concerns:
There are many ethical and legal concerns with the using
to the Wireless technology, and
every one of these issues because of many reasons and from
many sources. The followings are
these ethical and legal concerns:
� The privacy: Keeping the personal information is a big
challenge with the wireless
connection. The medical healthcare record is one of the sources
that contain the personal
information about the patients. So, it must protect these
documents away from an
intrusion or hacking tries. The using of the security defensive
mechanisms (like the
antivirus, firewalls, IDS, etc.) is one of these protection types.
Also, it can let the patients
to access their documents directly to keep their privacy.)
� The security: It is a very big issue that needs several defense
mechanisms. The using of
the wireless means unlimited access to the resources and
locations. Also, it means the
access to the personal information and sensitive data can be
remote without the physical
entry. There are many sources of the security problem with the
wireless communication;
like the Internet connection, the Web-based access, the
unauthorized access, the
authentication, the viruses, the application, etc. every one of
these threats need to be
TERM PAPER: NETWORKING
6
resolved by many procedures and steps that must be used by the
users and companies.
(Ameen et al., 2012).
The security issue and its avoidance (with detail):
The Wireless connection is very big security challenge
because of its free connection (no
physical connection), unlimited access to the information, and
many other reasons. There are
many threats kinds that must be known to prevented or
mitigated by many security defense
mechanisms:
� Threats:
� Access control attack: It is the attack that tries to access the
network by the
wireless devices; like the MAC spoofing, Wardriving, etc.
� Confidentiality attack that can be used to access the private
or sensitive
information when it transmitted over the Internet.
Eavesdropping and Man in the
middle are the examples of this attack.
� Integrity attack is the attack that alters the information by
controlling the wireless
connections; for example, the Denial of Service DoS attack.
� Authentication attack is used by the intruders to steal the
account information of
the users to be used in another time to access the private
network. The login
cracking, and VPN cracking are examples of this attack.
TERM PAPER: NETWORKING
7
� Availability attack is used to deny the user access to the
information or services or
idle these sources that accessed by the users, like using the
Denial of Service
attack. (Phifer, 2009).
The following are some countermeasures for mitigating
practices to prevent the
vulnerabilities and threats from occurring:
� The Authentication vulnerability can be avoided by applying
a strong session
management; like the choosing a strong password did not permit
the system to remember
the account information, making the log out from the system
correctly, and keeping the
expire date.
� The injection attack can be avoided by ensuring from any
data before inputting it, to
prevent any exploiting to any data by the hacker.
� It can mitigate the risk of the Cross-Site Scripting (XSS)
attack by being aware of any
link that must be trusted, and it did not have any special
characters.
� Also, it can protect any Sensitive data from any exposure by
using the strong algorithm to
save the password, using the encryption algorithms, and delete
any additional data that is
not needed.
� Lastly, Invalidated redirects and forwards and using the sites
with unknown
vulnerabilities can be avoided by preventing the using of the
forwards and redirects links,
and it must use only the trusted webs. (Gregory, 2009).
TERM PAPER: NETWORKING
8
Also, there are some defense mechanisms to keep the
security of the business, like the
following:
� The policies are some guidelines for some procedures and
items that must be followed by
all the managers, employees, and administrators to keep the
security. For examples of the
policy, items are deleting all unused data, limiting the
legitimating for everyone in the
company, etc.
� The awareness and education programs are the rules of some
practices like the preventing
the open to any suspicious link.
� The Mitigating to the vulnerabilities by some practices, such
as the patch management,
access control management, least privilege, and so on.
� Mitigating the threats by some principles: "organizations
should perform threat
mitigation to detect and stop malware before it can affect its
targets. This section
describes several types of security tools that can mitigate
malware threats: anti-virus
software, spyware detection and removal utilities, intrusion
prevention systems (IPS), and
firewalls and routers." (Mell et al., 2005, pg. 3.6).
The Wireless technology evolution:
In the last years, an enormous evolution has occurred in
the communication services,
especially with the Wireless connection.
TERM PAPER: NETWORKING
9
� It is supported in all smartphones. Many new standards
appeared; like the 802.11ac
which increases the data bandwidth in the mobile devices with
higher capacity. Also, the
appearing of the 802.11ad that is the multi-Gigabit in the short
range. Then, the 802.11ah
was created to increase the battery life with the smart and
sensor home. One of the big
achievements in the wireless is the solving to the traffic
problem that increases the
throughput and data access. Therefore, the next generation of
the wireless (802.11ac) is
3x throughput than the previous one, lower latency, and more
bandwidth of the data.
� It became the center of the smart home, by the Universal
technology. The home was
provided by many services (like, the Multimedia, various home
operations, Life
management, and Bring Your Own Device BYOD technique.),
and was connected via the
smart gateway to the Cloud computing technique.
� And, it opened the door for many new applications and
services. (www.qualcomm.com,
2014).
The future of the Wireless technology:
The future of the Wireless technology is the competition
to the wireless alternatives (like
the Bluetooth). It will create the new standards to compete for
these alternatives in order to be
used by the products that use the IoT Internet of Things, and
machine to machine applications.
The new standards are HaLow (802.11ha) will join the WiFi AC
(802.11ac), and WiGig
(802.11ad). The WiGig uses the shorter bandwidth of the data
(60 GHz) but with faster access
than the previous standard. Now, the HaLow will use the
shortest bandwidth of data which is
TERM PAPER: NETWORKING
10
(900 MHz) with the fastest access. “But it's conceivable that the
same underlying concepts could
be applied to new flavors of Wi-Fi -- for example, controlling
the Wi-Fi ac and WiGig devices
and new Wi-Fi HaLow machines permitted to connect to
corporate WLANs and carrier
networks, respectively.” (Phifer, 2016).
Figure (1): The Wireless technology communication structure
TERM PAPER: NETWORKING
11
Conclusion:
The wireless communication is the wide communication
types. It has big importance
among the other technologies. Also, it has many advantages,
and on another side, it has many
ethical and legal issues; like the privacy and security issues that
must be avoided by many
security defense mechanisms. This technology was evolved in
the late years, and it will improve
its services in the next years. This paper produced all these
topics with more details, Lastly, it
contained the diagram for the Wireless technology
communication structure.
TERM PAPER: NETWORKING
12
References
(science-technology-world.blogspot.com). (2009). The article of
(Importance of Wireless Network).
Retrieved from http://science-technology-
world.blogspot.com/2009/06/importance-of-wireless-
network.html
Harmon et al. (2015). The article of (SWOT analysis). Retrieved
from Research Starter. Salem
Press Encyclopedia (Strayer university library).
Maru, D. (2014). The article of (Wireless Communication).
Retrieved from
http://www.slideshare.net/Darshan246/wireless-communication-
30415774
Mathias, C. (2006). The article of (Wireless security: Threats,
strategies, and opportunities for
the channel). Retrieved from
http://searchitchannel.techtarget.com/tip/Wireless-security-
Threats-
strategies-and-opportunities-for-the-channel
Ameen, M. et al. (2012). The article of (Security and Privacy
Issues in Wireless Sensor
Networks for Healthcare Applications). Journal of Medical
Systems (J MED SYST), Feb2012;
36(1): 93-101. (9p)
Phifer, L. (2009). The article of (A list of wireless network
attacks). Retrieved from
http://searchsecurity.techtarget.com/feature/A-list-of-wireless-
network-attack
Gregory, P. (2009). CISSP Guide to Security Essentials, 1e.
(eBook)
TERM PAPER: NETWORKING
13
Mell et al. (2005). The article of (Guide to Malware Incident
Prevention and Handling).
Recommendations of the National Institute of Standards and
Technology. Retrieved from
http://csrc.nist.gov/publications/nistpubs/800-83/SP800-83.pdf
(www.qualcomm.com). (2014). The article of (The Wi-Fi
Evolution: An Integral part of the
wireless landscape), (pdf).
Phifer, L. (2016) The article of (Looking at the future of
wireless technology at CES 2016).
Retrieved from
http://searchnetworking.techtarget.com/tip/Looking-at-the-
future-of-wireless-
technology-at-CES-2016
This document was created with the Win2PDF “print to PDF”
printer available at
http://www.win2pdf.com
This version of Win2PDF 10 is for evaluation and non-
commercial use only.
This page will not be added after purchasing Win2PDF.
http://www.win2pdf.com/purchase/
Running head: NETWORKING
Term Paper: Networking
CIS/505
2
Executive Summary
Today’s generation are embedded in social media, digital and
mobile as a way of life.
Expectations are shifting requiring all industries to meet these
needs through multichannel
mobile interaction methods. As these changes take place, people
in society are frequently
changing their attitudes, goals and requirements from all
enterprises. Society is embracing digital
technologies more than ever demanding a more convenient
online experience. Industries are
being challenged to develop technical strategies to simplify
daily tasks that are faster, more
secure and more contextual.
Although mobile-savvy individuals want ubiquitous access,
businesses have struggled to
provide pure-mobile services due to challenges related to
security, providing always-on
connectivity and replicating the online experience. Technical
capabilities have become so
sophisticated that stationary devices i.e. telephones, facsimile
(fax) machines, computers and
other communication devices connected to wires to power
sources and telecommunication
networks are ever-present in many industries. The primary
challenge is to develop affordable,
reliable, widespread capabilities for untethered
communications. By relating and combining the
attributes of wireless and mobile technologies it will enhance
the individuals online experience.
Therefore, wireless technology is the link for mobile
communication.
This paper will focus on how wireless technology has evolved
in today’s society in
addition to the role it plays in wireless communications and
networking solutions. Some of the
current trends and future applications will be examined and
addressed through a SWOT analysis
to identify the current state of wireless technologies and the
effects it has on network security
3
issues and networking solutions. It will examine the ethical and
legal concerns governing
wireless technology. The prediction of how communication
technology will play a role in the
future and improvements for both personal and commercial use
will be explained. Time
management in the workplace and identifying employee rights
to spend personal time on social
media sites on company time will be also addressed.
Introduction
Wireless Technology is among biggest contributions to today’s
society. Wireless
technologies are now more attractive than ever in terms of their
performance, quality and cost.
In today’s society life is managed on the go desiring the ability
to access and transact business in
real-time from any mobile device. The growth of wireless
network has achieved that goal and
has enabled capabilities for the use of personal devices
anywhere and anytime. This has helped
play a role in the future of technology as the evolution of
technology is constantly changing.
The term wireless refers to communications sent without wires
or cables. It is the process
of sending information through invisible waves in the air.
Information such as data, voice, and
video are carried through the radio frequency of the
electromagnetic spectrum. Some of the
devices used for wireless communication are cordless
telephones, mobiles, GPS units, wireless
computer parts, and satellite television.
The strong public demand for wireless services is fueling
intense industrial and
government activity, including research and development
(R&D) aimed at improving the quality
and reducing costs of wireless technology, design of innovative
systems and services, and
implementation of new technical standards and policies. This
dynamic environment is producing
diverse wireless technologies and standards, in stark contrast to
other areas of communications
4
marked by a convergence toward uniformity. All this activity
will bring the reality of the next
century close to the vision of "anytime, anywhere"
communications. (Council, 1997)
Driving the evolution of wireless broadband technology is
customers’ increasing
expectations for speed, bandwidth and global access. Customers
today are connected 24/7 via
their wireless devices and want immediate access to the
applications and content they use most:
business productivity tools, streaming video, social networking
and more. The desire for instant
access creates a need for greater bandwidth, improved
responsiveness and faster upload and
download speeds than was offered by previous generations of
wireless technologies. Wireless
carriers’ networks need to function more like landline IP-based
networks to achieve the speeds
and connectedness customers have come to expect.
SWOT Analysis
In business, several elements must be considered, one of which
is most important is
conducting a SWOT analysis. SWOT is an acronym that stands
Strengths, Weaknesses,
Opportunities and Threats. “A SWOT analysis is an organized
list of your business’s strengths,
weaknesses, opportunities and threats. (Berry, 2014)
Weaknesses and strengths represent the
core factors of the company while opportunities and threats
represent the external factors. The
analysis is part of the initial planning process to determine what
is needed to sustain the business
and meet mission and vision statements.
The importance of conducting an internal and external
comprehensive analysis serves to
identify the internal and external strengths and weaknesses of
the business model. All wireless
technologies past, present and future have strengths and
weaknesses because each technology
has been or will be developed to solve a particular problem. In
order for a SWOT analysis to be
5
conducted the organization must be able to understand how the
company operates and know its
strengths and weaknesses.
Addressing a company’s strengths should be conducted from
internal and external
perspective that expresses the customer’s views and needs.
Once the strengths are established
then the weaknesses of the company need to be addressed and
determine what needs to be
improved and what is contributing to losses that is affecting the
company’s sales and revenue.
“Weaknesses are aspects of your business that detract from the
value you offer or place you at a
competitive disadvantage.” (Berry, 2014)
Weaknesses can be overcome by using effective strategic
planning that will allow the
company to make the necessary adjustments. “Weaknesses are
aspects of your business that
detract from the value you offer or place you at a competitive
disadvantage.” (Berry, 2014) To
maximize growth, profitability remaining competitive and
minimizing risk, organizations must
continually monitor internal and external environmental factors
and adjust their strategy
accordingly. To do that, it's important to know what the internal
and external factors can consist
of in addition to, what is needed to sustain the business and
meet organizational goals.
Ethical and Legal Concerns Surrounding Wireless
Communication
An important concern with any new technology is deciding how
current laws deal with
new issues that this new generation of products might raise.
Several actions that used to be taken
for granted now can possibly be perceived as illegal. With the
market for wireless applications
and hardware growing at a phenomenal rate, as with most new
technologies that gains market
acceptance, the deployment phase is usually followed by the
discovery of security issues.
6
The legal and ethical issues pertinent to the use of cell phones,
PDAs and other
telecommunication mobile devices are evolving as rapidly as
technology itself. Issues center
around using these devices in a manner that respects the rights,
safety and privacy of others.
Legal concerns about misuse of e-mail and the Internet relate to
liability and privacy. Most
employers want to trust employees and respect their privacy,
however they fear the organization
will be liable for the content of e-mail messages. Gossip,
derogatory comments, lewd or obscene
messages or graphics, harassing messages, or any number of
other things can be retrieved from
e-mail files and used as evidence. Having such messages
originate within the workplace
negatively affects the organization’s responsibility for a
harassment free environment and could
ultimately tarnish their image and decrease productivity.
The fear of litigation and the concern over wasted time prompts
some organizations to
monitor staff use of electronic resources. Special network and
software programs exist just for
this purpose. The Electronic Privacy Act gives an employer the
right to access an employee’s e-
mail and voicemail messages that are maintained on a system
provided by the employer. To
eliminate this fear and improve awareness, clear policies on the
use of electronic company
resources are developed and become a part of the hiring
process.
Another privacy issue includes Internet research. Technology
makes it feasible to gather
information about computer users without their knowledge or
permission. This practice many
consider to be unethical and an invasion of individual privacy.
Objections arise because
advertisers on the Internet may secure information from sites to
track ones’ preferences and
online shopping habits. To alleviate concerns about cookies,
organizations frequently include a
7
privacy statement on their Web sites that explains the type of
information that will be gathered
and its use.
Company Time
An employer has the right to monitor all employees who utilize
company resources on
the network during company time. Social networking has made
it easy for employees to
communicate and share information with colleagues, connect
with customers, and advertise for
the business. Employees are able to remotely connect to the
company’s network and still have
the same access to social media sites to include Facebook,
LinkedIn, and Twitter to share
information. Employees have a right to privacy, however not on
company time. “Unfortunately,
American and international laws do not directly address social
networking site usage” (Coco,
Kaupins, Little, 2012, p.1). Employees should be aware and
limit the amount of time spent on
social networking sites, unless it is work-related. Corporate
policies on social networking should
provide clear, concise direction to as a part of security
awareness to all employees to govern
usage. Corporate policies should also provide consistent
monitoring of employees with constant
reminders or notifications routinely as a form of policy
enforcement.
Technology Improvements
Radio systems, such as mobile phones and wireless internet
connections, have become an
integral part of modern life. However, today's devices use twice
as much of the radio spectrum as
is necessary. New technology is being developed that could
fundamentally change radio design
and could increase data rates and network capacity, reduce
power consumption, create cheaper
devices and enable global roaming.
8
This important change in radio design could offer a range of
benefits. In Wi-Fi systems
this would double the capacity of a Wi-Fi access point, allowing
more users and higher data
rates. For cellular systems, full-duplex operation would also
deliver increased capacity and data
rates, or alternatively the network operators could provide the
same total network capacity with
fewer base station sites, giving obvious benefits in the cost and
environmental impact of running
the network.
In today's mobile devices, a separate filtering component is
required for each frequency
band, and because of this, today's mobiles phone do not support
all of the frequency channels
which are in use across the world. Different devices are
manufactured for different regions of the
world, and there are currently no 4G phones capable of
unrestricted global roaming. Replacing
these filters with the research team's duplexer circuit would
create smaller and cheaper devices,
and would allow manufacturers to produce a single model for
the entire world. This would
enable global roaming on 4G and would further decrease cost
through greater economies of
scale.
Future Role of Wireless Technology for Personal and
Commercial Use
Wireless technology is a powerful tool utilized to aid in
boosting productivity and
encouraging information sharing. With untethered access to
documents, emails, applications and
other network resources, employees can travel where they need
to and have constant access to
the tools required to do their jobs. Some of the ways both
individuals and businesses alike are
taking advantage of wireless technology through increased
mobility and collaboration, improved
responsiveness, better access to information and easier network
scalability.
9
Wireless communication technology gives mobile access to
information through a variety
of portable communication devices. Organizations and
individuals alike are increasingly
dependent on computers and other technology devices to handle
the volume and complexity of
information communicated through daily operations. In years to
come, all aspects of wireless
communications are subject to rapid change globally. These
changes include rapidly expanding
public demand for products and services, major changes in
government policies, emergence of a
variety of new systems for delivering communications services
to wireless terminals and
profound changes in communications industries as evidenced by
mergers, alliances involving
some the world’s largest corporations. Beyond the enduring
need for improved efficiency, there
are two key technology developments, neither of which is
particularly unique to wireless, that are
expected to continue to fuel the advancement of wireless
technologies for the foreseeable future:
cloud computing and the Internet of Things (IoT).
With the development of cloud computing, data has become
mobile, transferable, and
instantly accessible. Cloud computing refers to a network model
in which applications reside on
network servers and are accessed from end clients. Cloud
computing typically relies heavily on
the concept of virtualization, where servers may actually be
virtual appliances and an actual
physical device may be hosting many virtual appliances. To end
users, it may appear as if they
are accessing a physical server, but in reality they are accessing
a piece of software that is
emulating a physical server. This concept of virtualization
allows for significant network
abstraction and rapid reconfiguration to meet user needs.
Although cloud computing is an incredibly powerful concept for
information technology,
this trend has placed enormous strain on the communications
infrastructure. It has also presented
10
security risks, regulatory compliance, and connectivity and
availability issues as a concern that
still prevents some businesses from adopting the use of cloud
technology. With end users
increasingly accessing both applications and content from the
cloud, their bandwidth
consumption has significantly increased.
Cloud computing is expected to increase, and combined with
increasing user mobility
and mobile computing, this trend will continue to place strain
on wireless communications
infrastructure. Cloud computing is one of the main reasons we
expect the time frame between
major commercial technology releases to continue to shorten.
The Internet of Things (IoT) is the vision of connecting devices
that can generate data
and information that can be accessed from anywhere via the
Internet. This connectivity allows
governments, businesses, and individuals to make data-driven
decisions in real time. The most
common view of the IoT refers to the persistent inclusion of
Internet connectivity, usually
wireless, in common everyday objects.
In the Internet of Things (IoT) model, Internet connectivity
extends beyond traditional
devices such as laptops and smartphones to include everyday
items such as refrigerators,
microwave ovens, dishwashers, thermostats, automobiles, and
road signs. Micro-
electromechanical systems (MEMS) are embedded into objects
to enable communication and
interaction with the environment. These objects can range from
humans with implanted medical
devices to controllers in oil refineries. Current projections
estimate tens of billions of devices
will be connected to the Internet by 2020, and wireless
technology will be a key enabler.
11
Conclusion
Cconsumer demand is stimulating many advances in wireless
communications
technology. The future of wireless technology is significant as
it represents the frontier of
communication. However, determining which wireless
technologies should be used in the future
has become an increasingly daunting endeavor considering the
variety of options available.
Innovation and integration of mobile and wireless technologies
are an on-going process, which
have given shape to the industry.
Wireless technology is a part of the past, present and future.
This term paper completed
the examination of the SWOT analysis. It evaluated the current
ethical and legal concerns
surrounding wireless technology. It analyzed the improvements
over the last two (2) years, and
it predicted the future role of wireless technology for both
personal and commercial use.
12
Figure 1
13
References
Bishop, J. (2010). Tough on data misuse, tough on the causes of
data misuse: A review of New
Labour’s approach to information security and regulating
themisuse of digital
information (1997–2010). International Review of Law,
Computers & Technology.
Retrieved from
http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=6&sid
=62b7dcd1-7470-4d08-
81d4-2c7744ea7e35%40sessionmgr113&hid=111
Berry, T (2014). What is SWOT Analysis? Retrieved from
http://articles.bplans.com/how-to-
perform-swot-analysis/
Beaver, K. (2013). The Top 5 Network Security Vulnerabilities
that Are Often
Overlooked. Retrieved from: Acunetix Web Application
Security:
http://www.acunetix.com/blog/featured/the-top-5-network-
security-vulnerabilities/
Blackman, C., & Srivastava, L. (2011). Telecommunications
Regulation Handbook. Washington,
DC: The World Bank.
Cernauskas, D., & Tarantino, A. (2011). Essentials of Risk
Management in Finance. Hoboken:
John Wiley & Sons, Inc.
Council, N. R. (1997). The Evolution of Untethered
Communications. Washington, D.C.:
National Academy Press.
Duato, J., & Pinkston, T. M. (2006, July 14). Interconnection
Networks. Retrieved from:
MIT.edu:
http://web.mit.edu/6.173/www/currentsemester/readings/R07-
interconnection-
networks-hennessy-patterson.pdf
FCC. (n.d.). Cyber Security Planning Guide. Retrieved March
18, 2014, from Federal
14
Communications Commission:
http://transition.fcc.gov/cyber/cyberplanner.pdf
Jensen, K. (2010). A Bright Future for Wireless Technology.
Valve Magazine, 1-4. Retrieved
from:
http://www2.emersonprocess.com/siteadmincenter/PM%20Articl
es/VM_WNT10_WIRE
LESS_LR.pdf
Kaupins, G., Coco, M., & Little, A. (2012). Organizational
Social Networking Usage and
Policy Retrictions. International Journal of Business. Retrieved
from
http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=12&si
d=a10aaaed-4292-425e-
87e0-1ced8c8ed50a%40sessionmgr111&hid=111
Stallings, W. (2009). Business Data Communications, Sixth
Edition. Upper Saddle River:
Pearson Education, Inc.
Stark, J. (2012, April 16). The 10 Principles of Mobile Interface
Design. Retrieved from:
www.netmagazine.com:
http://www.netmagazine.com/features/10-principles-mobile-
interface-design
US-CERT. (2008). Using Wireless Technolgoy Securely.
Retrieved from: www.us-cert.gov:
https://www.us-
cert.gov/sites/default/files/publications/Wireless-Security.pdf
Term Paper: Networking
Due Week 10 and worth 200 points
Select one of the following topics in which you will base your
responses in the form of a term paper:
� Network Neutrality
� Web2.0
� Wireless Technology
� Broadband Convergence
� U.S. Telecommunication Policy
� Internet Security
� IPv6
� WWAN
� WLAN
� DNSSEC
� WAN
Write a fully developed paper in which you:
1. Compose an executive summary highlighting the paper’s
contents and reasoning for your chosen topic.
2. Conduct a SWOT analysis by analyzing the strengths,
weaknesses, application opportunities, and threats
from competitors of the chosen topic.
3. Evaluate the current ethical and legal concerns surrounding
your topic.
4. Select one ethical or legal concern surrounding your topic,
take a position on the issue, and provide
rationale.
5. Analyze the improvements over the last two years to your
communication technology topic, and suggest
an improvement based on its current usage.
6. Predict the future role of the communication technology
you’ve selected for both personal and commercial
use.
7. Create a diagram that illustrates the communication structure
of your chosen technology in Visio or its
open source alternative software. Note: The graphically
depicted solution is not included in the required
page length.
8. Use at least eight quality resources in this assignment. Note:
Wikipedia and similar websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
� Be typed, double-spaced, using Times New Roman font (size
12), with one-inch margins on all sides;
references must follow APA or school-specific format. Check
with your professor for any additional
instructions.
� Include a cover page containing the title of the assignment,
the student’s name, the professor’s name, the
course title, and the date. The cover page and the reference page
are not included in the required page
length.
� Include charts or diagrams created in Visio or Dia. The
completed diagrams/charts must be imported into
the Word document before the paper is submitted.
The specific course learning outcomes associated with this
assignment are:
� Evaluate the need for information communication in the
business environment.
� Evaluate the basic technology of information communication.
� Analyze the roles of the Internet and the basic protocols that
are the foundation of the
Internet and address the critical issue of quality of service
(QoS).
� Analyze the technologies and architectures that have been
developed for networking
over shorter distances.
This document was created with the Win2PDF “print to PDF”
printer available at
http://www.win2pdf.com
This version of Win2PDF 10 is for evaluation and non-
commercial use only.
This page will not be added after purchasing Win2PDF.
http://www.win2pdf.com/purchase/

More Related Content

Similar to TERM PAPER NETWORKING .docx

Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxSALU18
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxjeffreye3
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
 

Similar to TERM PAPER NETWORKING .docx (13)

CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 

More from AASTHA76

(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docxAASTHA76
 
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docxAASTHA76
 
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docxAASTHA76
 
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docxAASTHA76
 
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docxAASTHA76
 
(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docxAASTHA76
 
(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docxAASTHA76
 
(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docxAASTHA76
 
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docxAASTHA76
 
(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docxAASTHA76
 
(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docxAASTHA76
 
#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docxAASTHA76
 
$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docxAASTHA76
 
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docxAASTHA76
 
#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docxAASTHA76
 
$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docxAASTHA76
 
#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docxAASTHA76
 
#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docxAASTHA76
 
#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docxAASTHA76
 
#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docxAASTHA76
 

More from AASTHA76 (20)

(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx
 
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
 
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
 
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
 
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
 
(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx
 
(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx
 
(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx
 
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
 
(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx
 
(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx
 
#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx
 
$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx
 
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
 
#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx
 
$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx
 
#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx
 
#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx
 
#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx
 
#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

TERM PAPER NETWORKING .docx

  • 1. TERM PAPER: NETWORKING 1 Term Paper: Networking CIS 505: Communication Technologies TERM PAPER: NETWORKING 2
  • 2. Networking Introduction: This paper will produce much information about the Wireless technology which is the wider communication type. It has many advantages, and many ethical and legal concerns. Also, there are some mitigation mechanisms that can be used to protect the wireless connection from any bad issue. So, it will research about the SWOT analysis of this technology to improve this communication type. Next, the evolution of this technology will be presented in this paper with the future role in the next years. Lastly, It will include the diagram of the Wireless technology communication structure. The executive summary, and the importance of the wireless technology: The Wireless is wider communication type which means synchronous connecting to many devices via single modems without wires. IT has many advantages; like the following: � It connects many devices remotely and in the same time; like the connections of the wireless PC, wireless laptop, wireless printer, and wireless phone at the
  • 3. same time with the single wireless router. � Its signals can access all the locations, especially to the locations that impossible accessed via the wires. � It eliminates the dangerous of the wires in the home. � It eliminates the cost of the wires. TERM PAPER: NETWORKING 3 � The continuous connection between the device and the Internet, without reactivate the connection every time. All these good points in wireless connectivity make research on this topic is important. So, it will research about the SWOT analysis of this technology to improve this communication type. Then, it will explain some ethical and legal concerns that related with the wireless connection with the mitigation mechanisms. Next, the evolution of this technology
  • 4. will be presented in this paper with the future role in the next years. Lastly, it will include the diagram of the Wireless technology communication structure. (science-technology- world.blogspot.com, 2009). SWOT Analysis: SWOT analysis Which refers to the Strength, Weakness, Threats, and Opportunities. It is the assessment tool that used to analyze the external and internal business factors in order to assess, and improve the products, or services of this business. The external factors include the Threats and opportunities; while the internal factors include the Strengths and Weaknesses. The strengths are the good characteristics, and the weakness are the bad characteristics; while the threats are the vulnerabilities of the bad points, and the opportunities are the good points that can be exploited by the manufacturers to enhance the products or the services. (Harmon et al., 2015). The Wireless technology is like any other services have many characteristics with many threats and opportunities. So, the SWOT analysis to the Wireless service as the following:
  • 5. � The strengths: TERM PAPER: NETWORKING 4 � It is free wire connection. � It has Global coverage. � It has the ability to access all the locations, especially the places that couldn't be accessed by the wires. � It has a flexible connection for many devices at the same time, with the ability to improve the connection. � It is used widely by many devices, satellite, wireless LAN WLAN, Pans, mobile telephone, laptops, cellular phones, GPS, remote garage-door opener, etc. � It is cheaper and easier to be maintained than the wire connection. � Weaknesses:
  • 6. � Its infrastructures are expensive. � It is affected by the physical obstructions, and weather conditions. � Sometimes, the interference occurs between many devices. � The big effort is needed to safe the wireless connection. (Maru, 2014). � Opportunities: � There are many opportunities to resolve the wireless threats; protecting the enterprise connection. � It can find a policy framework for determining the protection requirements, administration features, and so on. � Protecting the sensitive data by many defensive mechanisms. TERM PAPER: NETWORKING 5 � Threats: � The security and privacy issues are very big threats (like the Denial of Service
  • 7. DoS, and eavesdropping), and the biggest challenges of the wireless technology, especially the growth of this problem is continuous. (Mathias, 2006). An ethical and legal concerns: There are many ethical and legal concerns with the using to the Wireless technology, and every one of these issues because of many reasons and from many sources. The followings are these ethical and legal concerns: � The privacy: Keeping the personal information is a big challenge with the wireless connection. The medical healthcare record is one of the sources that contain the personal information about the patients. So, it must protect these documents away from an intrusion or hacking tries. The using of the security defensive mechanisms (like the antivirus, firewalls, IDS, etc.) is one of these protection types. Also, it can let the patients to access their documents directly to keep their privacy.) � The security: It is a very big issue that needs several defense mechanisms. The using of
  • 8. the wireless means unlimited access to the resources and locations. Also, it means the access to the personal information and sensitive data can be remote without the physical entry. There are many sources of the security problem with the wireless communication; like the Internet connection, the Web-based access, the unauthorized access, the authentication, the viruses, the application, etc. every one of these threats need to be TERM PAPER: NETWORKING 6 resolved by many procedures and steps that must be used by the users and companies. (Ameen et al., 2012). The security issue and its avoidance (with detail): The Wireless connection is very big security challenge because of its free connection (no physical connection), unlimited access to the information, and many other reasons. There are
  • 9. many threats kinds that must be known to prevented or mitigated by many security defense mechanisms: � Threats: � Access control attack: It is the attack that tries to access the network by the wireless devices; like the MAC spoofing, Wardriving, etc. � Confidentiality attack that can be used to access the private or sensitive information when it transmitted over the Internet. Eavesdropping and Man in the middle are the examples of this attack. � Integrity attack is the attack that alters the information by controlling the wireless connections; for example, the Denial of Service DoS attack. � Authentication attack is used by the intruders to steal the account information of the users to be used in another time to access the private network. The login cracking, and VPN cracking are examples of this attack.
  • 10. TERM PAPER: NETWORKING 7 � Availability attack is used to deny the user access to the information or services or idle these sources that accessed by the users, like using the Denial of Service attack. (Phifer, 2009). The following are some countermeasures for mitigating practices to prevent the vulnerabilities and threats from occurring: � The Authentication vulnerability can be avoided by applying a strong session management; like the choosing a strong password did not permit the system to remember the account information, making the log out from the system correctly, and keeping the expire date. � The injection attack can be avoided by ensuring from any data before inputting it, to prevent any exploiting to any data by the hacker. � It can mitigate the risk of the Cross-Site Scripting (XSS)
  • 11. attack by being aware of any link that must be trusted, and it did not have any special characters. � Also, it can protect any Sensitive data from any exposure by using the strong algorithm to save the password, using the encryption algorithms, and delete any additional data that is not needed. � Lastly, Invalidated redirects and forwards and using the sites with unknown vulnerabilities can be avoided by preventing the using of the forwards and redirects links, and it must use only the trusted webs. (Gregory, 2009). TERM PAPER: NETWORKING 8 Also, there are some defense mechanisms to keep the security of the business, like the following: � The policies are some guidelines for some procedures and items that must be followed by
  • 12. all the managers, employees, and administrators to keep the security. For examples of the policy, items are deleting all unused data, limiting the legitimating for everyone in the company, etc. � The awareness and education programs are the rules of some practices like the preventing the open to any suspicious link. � The Mitigating to the vulnerabilities by some practices, such as the patch management, access control management, least privilege, and so on. � Mitigating the threats by some principles: "organizations should perform threat mitigation to detect and stop malware before it can affect its targets. This section describes several types of security tools that can mitigate malware threats: anti-virus software, spyware detection and removal utilities, intrusion prevention systems (IPS), and firewalls and routers." (Mell et al., 2005, pg. 3.6). The Wireless technology evolution: In the last years, an enormous evolution has occurred in
  • 13. the communication services, especially with the Wireless connection. TERM PAPER: NETWORKING 9 � It is supported in all smartphones. Many new standards appeared; like the 802.11ac which increases the data bandwidth in the mobile devices with higher capacity. Also, the appearing of the 802.11ad that is the multi-Gigabit in the short range. Then, the 802.11ah was created to increase the battery life with the smart and sensor home. One of the big achievements in the wireless is the solving to the traffic problem that increases the throughput and data access. Therefore, the next generation of the wireless (802.11ac) is 3x throughput than the previous one, lower latency, and more bandwidth of the data. � It became the center of the smart home, by the Universal technology. The home was
  • 14. provided by many services (like, the Multimedia, various home operations, Life management, and Bring Your Own Device BYOD technique.), and was connected via the smart gateway to the Cloud computing technique. � And, it opened the door for many new applications and services. (www.qualcomm.com, 2014). The future of the Wireless technology: The future of the Wireless technology is the competition to the wireless alternatives (like the Bluetooth). It will create the new standards to compete for these alternatives in order to be used by the products that use the IoT Internet of Things, and machine to machine applications. The new standards are HaLow (802.11ha) will join the WiFi AC (802.11ac), and WiGig (802.11ad). The WiGig uses the shorter bandwidth of the data (60 GHz) but with faster access than the previous standard. Now, the HaLow will use the shortest bandwidth of data which is
  • 15. TERM PAPER: NETWORKING 10 (900 MHz) with the fastest access. “But it's conceivable that the same underlying concepts could be applied to new flavors of Wi-Fi -- for example, controlling the Wi-Fi ac and WiGig devices and new Wi-Fi HaLow machines permitted to connect to corporate WLANs and carrier networks, respectively.” (Phifer, 2016). Figure (1): The Wireless technology communication structure TERM PAPER: NETWORKING 11 Conclusion: The wireless communication is the wide communication types. It has big importance among the other technologies. Also, it has many advantages, and on another side, it has many
  • 16. ethical and legal issues; like the privacy and security issues that must be avoided by many security defense mechanisms. This technology was evolved in the late years, and it will improve its services in the next years. This paper produced all these topics with more details, Lastly, it contained the diagram for the Wireless technology communication structure. TERM PAPER: NETWORKING 12 References (science-technology-world.blogspot.com). (2009). The article of (Importance of Wireless Network).
  • 17. Retrieved from http://science-technology- world.blogspot.com/2009/06/importance-of-wireless- network.html Harmon et al. (2015). The article of (SWOT analysis). Retrieved from Research Starter. Salem Press Encyclopedia (Strayer university library). Maru, D. (2014). The article of (Wireless Communication). Retrieved from http://www.slideshare.net/Darshan246/wireless-communication- 30415774 Mathias, C. (2006). The article of (Wireless security: Threats, strategies, and opportunities for the channel). Retrieved from http://searchitchannel.techtarget.com/tip/Wireless-security- Threats- strategies-and-opportunities-for-the-channel Ameen, M. et al. (2012). The article of (Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications). Journal of Medical Systems (J MED SYST), Feb2012; 36(1): 93-101. (9p) Phifer, L. (2009). The article of (A list of wireless network attacks). Retrieved from
  • 18. http://searchsecurity.techtarget.com/feature/A-list-of-wireless- network-attack Gregory, P. (2009). CISSP Guide to Security Essentials, 1e. (eBook) TERM PAPER: NETWORKING 13 Mell et al. (2005). The article of (Guide to Malware Incident Prevention and Handling). Recommendations of the National Institute of Standards and Technology. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-83/SP800-83.pdf (www.qualcomm.com). (2014). The article of (The Wi-Fi Evolution: An Integral part of the wireless landscape), (pdf). Phifer, L. (2016) The article of (Looking at the future of wireless technology at CES 2016). Retrieved from http://searchnetworking.techtarget.com/tip/Looking-at-the- future-of-wireless- technology-at-CES-2016
  • 19. This document was created with the Win2PDF “print to PDF” printer available at http://www.win2pdf.com This version of Win2PDF 10 is for evaluation and non- commercial use only. This page will not be added after purchasing Win2PDF. http://www.win2pdf.com/purchase/ Running head: NETWORKING
  • 20. Term Paper: Networking CIS/505 2 Executive Summary Today’s generation are embedded in social media, digital and
  • 21. mobile as a way of life. Expectations are shifting requiring all industries to meet these needs through multichannel mobile interaction methods. As these changes take place, people in society are frequently changing their attitudes, goals and requirements from all enterprises. Society is embracing digital technologies more than ever demanding a more convenient online experience. Industries are being challenged to develop technical strategies to simplify daily tasks that are faster, more secure and more contextual. Although mobile-savvy individuals want ubiquitous access, businesses have struggled to provide pure-mobile services due to challenges related to security, providing always-on connectivity and replicating the online experience. Technical capabilities have become so sophisticated that stationary devices i.e. telephones, facsimile (fax) machines, computers and other communication devices connected to wires to power sources and telecommunication networks are ever-present in many industries. The primary challenge is to develop affordable,
  • 22. reliable, widespread capabilities for untethered communications. By relating and combining the attributes of wireless and mobile technologies it will enhance the individuals online experience. Therefore, wireless technology is the link for mobile communication. This paper will focus on how wireless technology has evolved in today’s society in addition to the role it plays in wireless communications and networking solutions. Some of the current trends and future applications will be examined and addressed through a SWOT analysis to identify the current state of wireless technologies and the effects it has on network security 3 issues and networking solutions. It will examine the ethical and legal concerns governing wireless technology. The prediction of how communication technology will play a role in the future and improvements for both personal and commercial use
  • 23. will be explained. Time management in the workplace and identifying employee rights to spend personal time on social media sites on company time will be also addressed. Introduction Wireless Technology is among biggest contributions to today’s society. Wireless technologies are now more attractive than ever in terms of their performance, quality and cost. In today’s society life is managed on the go desiring the ability to access and transact business in real-time from any mobile device. The growth of wireless network has achieved that goal and has enabled capabilities for the use of personal devices anywhere and anytime. This has helped play a role in the future of technology as the evolution of technology is constantly changing. The term wireless refers to communications sent without wires or cables. It is the process of sending information through invisible waves in the air. Information such as data, voice, and video are carried through the radio frequency of the electromagnetic spectrum. Some of the
  • 24. devices used for wireless communication are cordless telephones, mobiles, GPS units, wireless computer parts, and satellite television. The strong public demand for wireless services is fueling intense industrial and government activity, including research and development (R&D) aimed at improving the quality and reducing costs of wireless technology, design of innovative systems and services, and implementation of new technical standards and policies. This dynamic environment is producing diverse wireless technologies and standards, in stark contrast to other areas of communications 4 marked by a convergence toward uniformity. All this activity will bring the reality of the next century close to the vision of "anytime, anywhere" communications. (Council, 1997) Driving the evolution of wireless broadband technology is customers’ increasing
  • 25. expectations for speed, bandwidth and global access. Customers today are connected 24/7 via their wireless devices and want immediate access to the applications and content they use most: business productivity tools, streaming video, social networking and more. The desire for instant access creates a need for greater bandwidth, improved responsiveness and faster upload and download speeds than was offered by previous generations of wireless technologies. Wireless carriers’ networks need to function more like landline IP-based networks to achieve the speeds and connectedness customers have come to expect. SWOT Analysis In business, several elements must be considered, one of which is most important is conducting a SWOT analysis. SWOT is an acronym that stands Strengths, Weaknesses, Opportunities and Threats. “A SWOT analysis is an organized list of your business’s strengths, weaknesses, opportunities and threats. (Berry, 2014) Weaknesses and strengths represent the core factors of the company while opportunities and threats represent the external factors. The
  • 26. analysis is part of the initial planning process to determine what is needed to sustain the business and meet mission and vision statements. The importance of conducting an internal and external comprehensive analysis serves to identify the internal and external strengths and weaknesses of the business model. All wireless technologies past, present and future have strengths and weaknesses because each technology has been or will be developed to solve a particular problem. In order for a SWOT analysis to be 5 conducted the organization must be able to understand how the company operates and know its strengths and weaknesses. Addressing a company’s strengths should be conducted from internal and external perspective that expresses the customer’s views and needs. Once the strengths are established
  • 27. then the weaknesses of the company need to be addressed and determine what needs to be improved and what is contributing to losses that is affecting the company’s sales and revenue. “Weaknesses are aspects of your business that detract from the value you offer or place you at a competitive disadvantage.” (Berry, 2014) Weaknesses can be overcome by using effective strategic planning that will allow the company to make the necessary adjustments. “Weaknesses are aspects of your business that detract from the value you offer or place you at a competitive disadvantage.” (Berry, 2014) To maximize growth, profitability remaining competitive and minimizing risk, organizations must continually monitor internal and external environmental factors and adjust their strategy accordingly. To do that, it's important to know what the internal and external factors can consist of in addition to, what is needed to sustain the business and meet organizational goals. Ethical and Legal Concerns Surrounding Wireless Communication An important concern with any new technology is deciding how
  • 28. current laws deal with new issues that this new generation of products might raise. Several actions that used to be taken for granted now can possibly be perceived as illegal. With the market for wireless applications and hardware growing at a phenomenal rate, as with most new technologies that gains market acceptance, the deployment phase is usually followed by the discovery of security issues. 6 The legal and ethical issues pertinent to the use of cell phones, PDAs and other telecommunication mobile devices are evolving as rapidly as technology itself. Issues center around using these devices in a manner that respects the rights, safety and privacy of others. Legal concerns about misuse of e-mail and the Internet relate to liability and privacy. Most employers want to trust employees and respect their privacy, however they fear the organization
  • 29. will be liable for the content of e-mail messages. Gossip, derogatory comments, lewd or obscene messages or graphics, harassing messages, or any number of other things can be retrieved from e-mail files and used as evidence. Having such messages originate within the workplace negatively affects the organization’s responsibility for a harassment free environment and could ultimately tarnish their image and decrease productivity. The fear of litigation and the concern over wasted time prompts some organizations to monitor staff use of electronic resources. Special network and software programs exist just for this purpose. The Electronic Privacy Act gives an employer the right to access an employee’s e- mail and voicemail messages that are maintained on a system provided by the employer. To eliminate this fear and improve awareness, clear policies on the use of electronic company resources are developed and become a part of the hiring process. Another privacy issue includes Internet research. Technology makes it feasible to gather information about computer users without their knowledge or
  • 30. permission. This practice many consider to be unethical and an invasion of individual privacy. Objections arise because advertisers on the Internet may secure information from sites to track ones’ preferences and online shopping habits. To alleviate concerns about cookies, organizations frequently include a 7 privacy statement on their Web sites that explains the type of information that will be gathered and its use. Company Time An employer has the right to monitor all employees who utilize company resources on the network during company time. Social networking has made it easy for employees to communicate and share information with colleagues, connect with customers, and advertise for the business. Employees are able to remotely connect to the company’s network and still have
  • 31. the same access to social media sites to include Facebook, LinkedIn, and Twitter to share information. Employees have a right to privacy, however not on company time. “Unfortunately, American and international laws do not directly address social networking site usage” (Coco, Kaupins, Little, 2012, p.1). Employees should be aware and limit the amount of time spent on social networking sites, unless it is work-related. Corporate policies on social networking should provide clear, concise direction to as a part of security awareness to all employees to govern usage. Corporate policies should also provide consistent monitoring of employees with constant reminders or notifications routinely as a form of policy enforcement. Technology Improvements Radio systems, such as mobile phones and wireless internet connections, have become an integral part of modern life. However, today's devices use twice as much of the radio spectrum as is necessary. New technology is being developed that could fundamentally change radio design
  • 32. and could increase data rates and network capacity, reduce power consumption, create cheaper devices and enable global roaming. 8 This important change in radio design could offer a range of benefits. In Wi-Fi systems this would double the capacity of a Wi-Fi access point, allowing more users and higher data rates. For cellular systems, full-duplex operation would also deliver increased capacity and data rates, or alternatively the network operators could provide the same total network capacity with fewer base station sites, giving obvious benefits in the cost and environmental impact of running the network. In today's mobile devices, a separate filtering component is required for each frequency band, and because of this, today's mobiles phone do not support all of the frequency channels which are in use across the world. Different devices are
  • 33. manufactured for different regions of the world, and there are currently no 4G phones capable of unrestricted global roaming. Replacing these filters with the research team's duplexer circuit would create smaller and cheaper devices, and would allow manufacturers to produce a single model for the entire world. This would enable global roaming on 4G and would further decrease cost through greater economies of scale. Future Role of Wireless Technology for Personal and Commercial Use Wireless technology is a powerful tool utilized to aid in boosting productivity and encouraging information sharing. With untethered access to documents, emails, applications and other network resources, employees can travel where they need to and have constant access to the tools required to do their jobs. Some of the ways both individuals and businesses alike are taking advantage of wireless technology through increased mobility and collaboration, improved responsiveness, better access to information and easier network scalability.
  • 34. 9 Wireless communication technology gives mobile access to information through a variety of portable communication devices. Organizations and individuals alike are increasingly dependent on computers and other technology devices to handle the volume and complexity of information communicated through daily operations. In years to come, all aspects of wireless communications are subject to rapid change globally. These changes include rapidly expanding public demand for products and services, major changes in government policies, emergence of a variety of new systems for delivering communications services to wireless terminals and profound changes in communications industries as evidenced by mergers, alliances involving some the world’s largest corporations. Beyond the enduring need for improved efficiency, there are two key technology developments, neither of which is
  • 35. particularly unique to wireless, that are expected to continue to fuel the advancement of wireless technologies for the foreseeable future: cloud computing and the Internet of Things (IoT). With the development of cloud computing, data has become mobile, transferable, and instantly accessible. Cloud computing refers to a network model in which applications reside on network servers and are accessed from end clients. Cloud computing typically relies heavily on the concept of virtualization, where servers may actually be virtual appliances and an actual physical device may be hosting many virtual appliances. To end users, it may appear as if they are accessing a physical server, but in reality they are accessing a piece of software that is emulating a physical server. This concept of virtualization allows for significant network abstraction and rapid reconfiguration to meet user needs. Although cloud computing is an incredibly powerful concept for information technology, this trend has placed enormous strain on the communications infrastructure. It has also presented
  • 36. 10 security risks, regulatory compliance, and connectivity and availability issues as a concern that still prevents some businesses from adopting the use of cloud technology. With end users increasingly accessing both applications and content from the cloud, their bandwidth consumption has significantly increased. Cloud computing is expected to increase, and combined with increasing user mobility and mobile computing, this trend will continue to place strain on wireless communications infrastructure. Cloud computing is one of the main reasons we expect the time frame between major commercial technology releases to continue to shorten. The Internet of Things (IoT) is the vision of connecting devices that can generate data and information that can be accessed from anywhere via the Internet. This connectivity allows governments, businesses, and individuals to make data-driven
  • 37. decisions in real time. The most common view of the IoT refers to the persistent inclusion of Internet connectivity, usually wireless, in common everyday objects. In the Internet of Things (IoT) model, Internet connectivity extends beyond traditional devices such as laptops and smartphones to include everyday items such as refrigerators, microwave ovens, dishwashers, thermostats, automobiles, and road signs. Micro- electromechanical systems (MEMS) are embedded into objects to enable communication and interaction with the environment. These objects can range from humans with implanted medical devices to controllers in oil refineries. Current projections estimate tens of billions of devices will be connected to the Internet by 2020, and wireless technology will be a key enabler. 11
  • 38. Conclusion Cconsumer demand is stimulating many advances in wireless communications technology. The future of wireless technology is significant as it represents the frontier of communication. However, determining which wireless technologies should be used in the future has become an increasingly daunting endeavor considering the variety of options available. Innovation and integration of mobile and wireless technologies are an on-going process, which have given shape to the industry. Wireless technology is a part of the past, present and future. This term paper completed the examination of the SWOT analysis. It evaluated the current ethical and legal concerns surrounding wireless technology. It analyzed the improvements over the last two (2) years, and it predicted the future role of wireless technology for both personal and commercial use. 12
  • 39. Figure 1 13 References Bishop, J. (2010). Tough on data misuse, tough on the causes of data misuse: A review of New Labour’s approach to information security and regulating themisuse of digital information (1997–2010). International Review of Law, Computers & Technology.
  • 40. Retrieved from http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=6&sid =62b7dcd1-7470-4d08- 81d4-2c7744ea7e35%40sessionmgr113&hid=111 Berry, T (2014). What is SWOT Analysis? Retrieved from http://articles.bplans.com/how-to- perform-swot-analysis/ Beaver, K. (2013). The Top 5 Network Security Vulnerabilities that Are Often Overlooked. Retrieved from: Acunetix Web Application Security: http://www.acunetix.com/blog/featured/the-top-5-network- security-vulnerabilities/ Blackman, C., & Srivastava, L. (2011). Telecommunications Regulation Handbook. Washington, DC: The World Bank. Cernauskas, D., & Tarantino, A. (2011). Essentials of Risk Management in Finance. Hoboken: John Wiley & Sons, Inc. Council, N. R. (1997). The Evolution of Untethered Communications. Washington, D.C.:
  • 41. National Academy Press. Duato, J., & Pinkston, T. M. (2006, July 14). Interconnection Networks. Retrieved from: MIT.edu: http://web.mit.edu/6.173/www/currentsemester/readings/R07- interconnection- networks-hennessy-patterson.pdf FCC. (n.d.). Cyber Security Planning Guide. Retrieved March 18, 2014, from Federal 14 Communications Commission: http://transition.fcc.gov/cyber/cyberplanner.pdf Jensen, K. (2010). A Bright Future for Wireless Technology. Valve Magazine, 1-4. Retrieved from: http://www2.emersonprocess.com/siteadmincenter/PM%20Articl es/VM_WNT10_WIRE
  • 42. LESS_LR.pdf Kaupins, G., Coco, M., & Little, A. (2012). Organizational Social Networking Usage and Policy Retrictions. International Journal of Business. Retrieved from http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=12&si d=a10aaaed-4292-425e- 87e0-1ced8c8ed50a%40sessionmgr111&hid=111 Stallings, W. (2009). Business Data Communications, Sixth Edition. Upper Saddle River: Pearson Education, Inc. Stark, J. (2012, April 16). The 10 Principles of Mobile Interface Design. Retrieved from: www.netmagazine.com: http://www.netmagazine.com/features/10-principles-mobile- interface-design US-CERT. (2008). Using Wireless Technolgoy Securely. Retrieved from: www.us-cert.gov: https://www.us- cert.gov/sites/default/files/publications/Wireless-Security.pdf
  • 43. Term Paper: Networking Due Week 10 and worth 200 points Select one of the following topics in which you will base your responses in the form of a term paper: � Network Neutrality � Web2.0 � Wireless Technology � Broadband Convergence � U.S. Telecommunication Policy � Internet Security � IPv6 � WWAN � WLAN � DNSSEC � WAN Write a fully developed paper in which you: 1. Compose an executive summary highlighting the paper’s contents and reasoning for your chosen topic. 2. Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities, and threats from competitors of the chosen topic. 3. Evaluate the current ethical and legal concerns surrounding your topic. 4. Select one ethical or legal concern surrounding your topic, take a position on the issue, and provide rationale. 5. Analyze the improvements over the last two years to your communication technology topic, and suggest
  • 44. an improvement based on its current usage. 6. Predict the future role of the communication technology you’ve selected for both personal and commercial use. 7. Create a diagram that illustrates the communication structure of your chosen technology in Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 8. Use at least eight quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. Your assignment must follow these formatting requirements: � Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. � Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. � Include charts or diagrams created in Visio or Dia. The completed diagrams/charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are:
  • 45. � Evaluate the need for information communication in the business environment. � Evaluate the basic technology of information communication. � Analyze the roles of the Internet and the basic protocols that are the foundation of the Internet and address the critical issue of quality of service (QoS). � Analyze the technologies and architectures that have been developed for networking over shorter distances. This document was created with the Win2PDF “print to PDF” printer available at http://www.win2pdf.com This version of Win2PDF 10 is for evaluation and non- commercial use only. This page will not be added after purchasing Win2PDF.