TERM PAPER: NETWORKING 1
Term Paper: Networking
CIS 505: Communication Technologies
TERM PAPER: NETWORKING 2
Networking
Introduction:
This paper will produce much information about the Wireless technology which is the wider
communication type. It has many advantages, and many ethical and legal concerns. Also, there are
some mitigation mechanisms that can be used to protect the wireless connection from any bad issue.
So, it will research about the SWOT analysis of this technology to improve this communication type.
Next, the evolution of this technology will be presented in this paper with the future role in the next
years. Lastly, It will include the diagram of the Wireless technology communication structure.
The executive summary, and the importance of the wireless technology:
The Wireless is wider communication type which means synchronous connecting to many
devices via single modems without wires. IT has many advantages; like the following:
� It connects many devices remotely and in the same time; like the connections of the wireless
PC, wireless laptop, wireless printer, and wireless phone at the same time with the single
wireless router.
� Its signals can access all the locations, especially to the locations that impossible accessed via
the wires.
� It eliminates the dangerous of the wires in the home.
� It eliminates the cost of the wires.
TERM PAPER: NETWORKING 3
� The continuous connection between the device and the Internet, without reactivate the
connection every time.
All these good points in wireless connectivity make research on this topic is important. So, it
will research about the SWOT analysis of this technology to improve this communication type. Then,
it will explain some ethical and legal concerns that related with the wireless connection with the
mitigation mechanisms. Next, the evolution of this technology will be presented in this paper with the
future role in the next years. Lastly, it will include the diagram of the Wireless technology
communication structure. (science-technology-world.blogspot.com, 2009).
SWOT Analysis:
SWOT analysis Which refers to the Strength, Weakness, Threats, and Opportunities. It is
the assessment tool that used to analyze the external and internal business factors in order to
assess, and improve the products, or services of this business. The external factors include the
Threats and opportunities; while the internal factors include the Strengths and Weaknesses. The
strengths are the good characteristics, and the.
2. Networking
Introduction:
This paper will produce much information about the
Wireless technology which is the wider
communication type. It has many advantages, and many ethical
and legal concerns. Also, there are
some mitigation mechanisms that can be used to protect the
wireless connection from any bad issue.
So, it will research about the SWOT analysis of this technology
to improve this communication type.
Next, the evolution of this technology will be presented in this
paper with the future role in the next
years. Lastly, It will include the diagram of the Wireless
technology communication structure.
The executive summary, and the importance of the wireless
technology:
The Wireless is wider communication type which means
synchronous connecting to many
devices via single modems without wires. IT has many
advantages; like the following:
� It connects many devices remotely and in the same time; like
the connections of the wireless
PC, wireless laptop, wireless printer, and wireless phone at the
3. same time with the single
wireless router.
� Its signals can access all the locations, especially to the
locations that impossible accessed via
the wires.
� It eliminates the dangerous of the wires in the home.
� It eliminates the cost of the wires.
TERM PAPER: NETWORKING
3
� The continuous connection between the device and the
Internet, without reactivate the
connection every time.
All these good points in wireless connectivity make
research on this topic is important. So, it
will research about the SWOT analysis of this technology to
improve this communication type. Then,
it will explain some ethical and legal concerns that related with
the wireless connection with the
mitigation mechanisms. Next, the evolution of this technology
4. will be presented in this paper with the
future role in the next years. Lastly, it will include the diagram
of the Wireless technology
communication structure. (science-technology-
world.blogspot.com, 2009).
SWOT Analysis:
SWOT analysis Which refers to the Strength, Weakness,
Threats, and Opportunities. It is
the assessment tool that used to analyze the external and
internal business factors in order to
assess, and improve the products, or services of this business.
The external factors include the
Threats and opportunities; while the internal factors include the
Strengths and Weaknesses. The
strengths are the good characteristics, and the weakness are the
bad characteristics; while the
threats are the vulnerabilities of the bad points, and the
opportunities are the good points that can
be exploited by the manufacturers to enhance the products or
the services. (Harmon et al., 2015).
The Wireless technology is like any other services have
many characteristics with many
threats and opportunities. So, the SWOT analysis to the
Wireless service as the following:
5. � The strengths:
TERM PAPER: NETWORKING
4
� It is free wire connection.
� It has Global coverage.
� It has the ability to access all the locations, especially the
places that couldn't be
accessed by the wires.
� It has a flexible connection for many devices at the same
time, with the ability to
improve the connection.
� It is used widely by many devices, satellite, wireless LAN
WLAN, Pans, mobile
telephone, laptops, cellular phones, GPS, remote garage-door
opener, etc.
� It is cheaper and easier to be maintained than the wire
connection.
� Weaknesses:
6. � Its infrastructures are expensive.
� It is affected by the physical obstructions, and weather
conditions.
� Sometimes, the interference occurs between many devices.
� The big effort is needed to safe the wireless connection.
(Maru, 2014).
� Opportunities:
� There are many opportunities to resolve the wireless threats;
protecting the
enterprise connection.
� It can find a policy framework for determining the protection
requirements,
administration features, and so on.
� Protecting the sensitive data by many defensive mechanisms.
TERM PAPER: NETWORKING
5
� Threats:
� The security and privacy issues are very big threats (like the
Denial of Service
7. DoS, and eavesdropping), and the biggest challenges of the
wireless technology,
especially the growth of this problem is continuous. (Mathias,
2006).
An ethical and legal concerns:
There are many ethical and legal concerns with the using
to the Wireless technology, and
every one of these issues because of many reasons and from
many sources. The followings are
these ethical and legal concerns:
� The privacy: Keeping the personal information is a big
challenge with the wireless
connection. The medical healthcare record is one of the sources
that contain the personal
information about the patients. So, it must protect these
documents away from an
intrusion or hacking tries. The using of the security defensive
mechanisms (like the
antivirus, firewalls, IDS, etc.) is one of these protection types.
Also, it can let the patients
to access their documents directly to keep their privacy.)
� The security: It is a very big issue that needs several defense
mechanisms. The using of
8. the wireless means unlimited access to the resources and
locations. Also, it means the
access to the personal information and sensitive data can be
remote without the physical
entry. There are many sources of the security problem with the
wireless communication;
like the Internet connection, the Web-based access, the
unauthorized access, the
authentication, the viruses, the application, etc. every one of
these threats need to be
TERM PAPER: NETWORKING
6
resolved by many procedures and steps that must be used by the
users and companies.
(Ameen et al., 2012).
The security issue and its avoidance (with detail):
The Wireless connection is very big security challenge
because of its free connection (no
physical connection), unlimited access to the information, and
many other reasons. There are
9. many threats kinds that must be known to prevented or
mitigated by many security defense
mechanisms:
� Threats:
� Access control attack: It is the attack that tries to access the
network by the
wireless devices; like the MAC spoofing, Wardriving, etc.
� Confidentiality attack that can be used to access the private
or sensitive
information when it transmitted over the Internet.
Eavesdropping and Man in the
middle are the examples of this attack.
� Integrity attack is the attack that alters the information by
controlling the wireless
connections; for example, the Denial of Service DoS attack.
� Authentication attack is used by the intruders to steal the
account information of
the users to be used in another time to access the private
network. The login
cracking, and VPN cracking are examples of this attack.
10. TERM PAPER: NETWORKING
7
� Availability attack is used to deny the user access to the
information or services or
idle these sources that accessed by the users, like using the
Denial of Service
attack. (Phifer, 2009).
The following are some countermeasures for mitigating
practices to prevent the
vulnerabilities and threats from occurring:
� The Authentication vulnerability can be avoided by applying
a strong session
management; like the choosing a strong password did not permit
the system to remember
the account information, making the log out from the system
correctly, and keeping the
expire date.
� The injection attack can be avoided by ensuring from any
data before inputting it, to
prevent any exploiting to any data by the hacker.
� It can mitigate the risk of the Cross-Site Scripting (XSS)
11. attack by being aware of any
link that must be trusted, and it did not have any special
characters.
� Also, it can protect any Sensitive data from any exposure by
using the strong algorithm to
save the password, using the encryption algorithms, and delete
any additional data that is
not needed.
� Lastly, Invalidated redirects and forwards and using the sites
with unknown
vulnerabilities can be avoided by preventing the using of the
forwards and redirects links,
and it must use only the trusted webs. (Gregory, 2009).
TERM PAPER: NETWORKING
8
Also, there are some defense mechanisms to keep the
security of the business, like the
following:
� The policies are some guidelines for some procedures and
items that must be followed by
12. all the managers, employees, and administrators to keep the
security. For examples of the
policy, items are deleting all unused data, limiting the
legitimating for everyone in the
company, etc.
� The awareness and education programs are the rules of some
practices like the preventing
the open to any suspicious link.
� The Mitigating to the vulnerabilities by some practices, such
as the patch management,
access control management, least privilege, and so on.
� Mitigating the threats by some principles: "organizations
should perform threat
mitigation to detect and stop malware before it can affect its
targets. This section
describes several types of security tools that can mitigate
malware threats: anti-virus
software, spyware detection and removal utilities, intrusion
prevention systems (IPS), and
firewalls and routers." (Mell et al., 2005, pg. 3.6).
The Wireless technology evolution:
In the last years, an enormous evolution has occurred in
13. the communication services,
especially with the Wireless connection.
TERM PAPER: NETWORKING
9
� It is supported in all smartphones. Many new standards
appeared; like the 802.11ac
which increases the data bandwidth in the mobile devices with
higher capacity. Also, the
appearing of the 802.11ad that is the multi-Gigabit in the short
range. Then, the 802.11ah
was created to increase the battery life with the smart and
sensor home. One of the big
achievements in the wireless is the solving to the traffic
problem that increases the
throughput and data access. Therefore, the next generation of
the wireless (802.11ac) is
3x throughput than the previous one, lower latency, and more
bandwidth of the data.
� It became the center of the smart home, by the Universal
technology. The home was
14. provided by many services (like, the Multimedia, various home
operations, Life
management, and Bring Your Own Device BYOD technique.),
and was connected via the
smart gateway to the Cloud computing technique.
� And, it opened the door for many new applications and
services. (www.qualcomm.com,
2014).
The future of the Wireless technology:
The future of the Wireless technology is the competition
to the wireless alternatives (like
the Bluetooth). It will create the new standards to compete for
these alternatives in order to be
used by the products that use the IoT Internet of Things, and
machine to machine applications.
The new standards are HaLow (802.11ha) will join the WiFi AC
(802.11ac), and WiGig
(802.11ad). The WiGig uses the shorter bandwidth of the data
(60 GHz) but with faster access
than the previous standard. Now, the HaLow will use the
shortest bandwidth of data which is
15. TERM PAPER: NETWORKING
10
(900 MHz) with the fastest access. “But it's conceivable that the
same underlying concepts could
be applied to new flavors of Wi-Fi -- for example, controlling
the Wi-Fi ac and WiGig devices
and new Wi-Fi HaLow machines permitted to connect to
corporate WLANs and carrier
networks, respectively.” (Phifer, 2016).
Figure (1): The Wireless technology communication structure
TERM PAPER: NETWORKING
11
Conclusion:
The wireless communication is the wide communication
types. It has big importance
among the other technologies. Also, it has many advantages,
and on another side, it has many
16. ethical and legal issues; like the privacy and security issues that
must be avoided by many
security defense mechanisms. This technology was evolved in
the late years, and it will improve
its services in the next years. This paper produced all these
topics with more details, Lastly, it
contained the diagram for the Wireless technology
communication structure.
TERM PAPER: NETWORKING
12
References
(science-technology-world.blogspot.com). (2009). The article of
(Importance of Wireless Network).
17. Retrieved from http://science-technology-
world.blogspot.com/2009/06/importance-of-wireless-
network.html
Harmon et al. (2015). The article of (SWOT analysis). Retrieved
from Research Starter. Salem
Press Encyclopedia (Strayer university library).
Maru, D. (2014). The article of (Wireless Communication).
Retrieved from
http://www.slideshare.net/Darshan246/wireless-communication-
30415774
Mathias, C. (2006). The article of (Wireless security: Threats,
strategies, and opportunities for
the channel). Retrieved from
http://searchitchannel.techtarget.com/tip/Wireless-security-
Threats-
strategies-and-opportunities-for-the-channel
Ameen, M. et al. (2012). The article of (Security and Privacy
Issues in Wireless Sensor
Networks for Healthcare Applications). Journal of Medical
Systems (J MED SYST), Feb2012;
36(1): 93-101. (9p)
Phifer, L. (2009). The article of (A list of wireless network
attacks). Retrieved from
18. http://searchsecurity.techtarget.com/feature/A-list-of-wireless-
network-attack
Gregory, P. (2009). CISSP Guide to Security Essentials, 1e.
(eBook)
TERM PAPER: NETWORKING
13
Mell et al. (2005). The article of (Guide to Malware Incident
Prevention and Handling).
Recommendations of the National Institute of Standards and
Technology. Retrieved from
http://csrc.nist.gov/publications/nistpubs/800-83/SP800-83.pdf
(www.qualcomm.com). (2014). The article of (The Wi-Fi
Evolution: An Integral part of the
wireless landscape), (pdf).
Phifer, L. (2016) The article of (Looking at the future of
wireless technology at CES 2016).
Retrieved from
http://searchnetworking.techtarget.com/tip/Looking-at-the-
future-of-wireless-
technology-at-CES-2016
19. This document was created with the Win2PDF “print to PDF”
printer available at
http://www.win2pdf.com
This version of Win2PDF 10 is for evaluation and non-
commercial use only.
This page will not be added after purchasing Win2PDF.
http://www.win2pdf.com/purchase/
Running head: NETWORKING
21. mobile as a way of life.
Expectations are shifting requiring all industries to meet these
needs through multichannel
mobile interaction methods. As these changes take place, people
in society are frequently
changing their attitudes, goals and requirements from all
enterprises. Society is embracing digital
technologies more than ever demanding a more convenient
online experience. Industries are
being challenged to develop technical strategies to simplify
daily tasks that are faster, more
secure and more contextual.
Although mobile-savvy individuals want ubiquitous access,
businesses have struggled to
provide pure-mobile services due to challenges related to
security, providing always-on
connectivity and replicating the online experience. Technical
capabilities have become so
sophisticated that stationary devices i.e. telephones, facsimile
(fax) machines, computers and
other communication devices connected to wires to power
sources and telecommunication
networks are ever-present in many industries. The primary
challenge is to develop affordable,
22. reliable, widespread capabilities for untethered
communications. By relating and combining the
attributes of wireless and mobile technologies it will enhance
the individuals online experience.
Therefore, wireless technology is the link for mobile
communication.
This paper will focus on how wireless technology has evolved
in today’s society in
addition to the role it plays in wireless communications and
networking solutions. Some of the
current trends and future applications will be examined and
addressed through a SWOT analysis
to identify the current state of wireless technologies and the
effects it has on network security
3
issues and networking solutions. It will examine the ethical and
legal concerns governing
wireless technology. The prediction of how communication
technology will play a role in the
future and improvements for both personal and commercial use
23. will be explained. Time
management in the workplace and identifying employee rights
to spend personal time on social
media sites on company time will be also addressed.
Introduction
Wireless Technology is among biggest contributions to today’s
society. Wireless
technologies are now more attractive than ever in terms of their
performance, quality and cost.
In today’s society life is managed on the go desiring the ability
to access and transact business in
real-time from any mobile device. The growth of wireless
network has achieved that goal and
has enabled capabilities for the use of personal devices
anywhere and anytime. This has helped
play a role in the future of technology as the evolution of
technology is constantly changing.
The term wireless refers to communications sent without wires
or cables. It is the process
of sending information through invisible waves in the air.
Information such as data, voice, and
video are carried through the radio frequency of the
electromagnetic spectrum. Some of the
24. devices used for wireless communication are cordless
telephones, mobiles, GPS units, wireless
computer parts, and satellite television.
The strong public demand for wireless services is fueling
intense industrial and
government activity, including research and development
(R&D) aimed at improving the quality
and reducing costs of wireless technology, design of innovative
systems and services, and
implementation of new technical standards and policies. This
dynamic environment is producing
diverse wireless technologies and standards, in stark contrast to
other areas of communications
4
marked by a convergence toward uniformity. All this activity
will bring the reality of the next
century close to the vision of "anytime, anywhere"
communications. (Council, 1997)
Driving the evolution of wireless broadband technology is
customers’ increasing
25. expectations for speed, bandwidth and global access. Customers
today are connected 24/7 via
their wireless devices and want immediate access to the
applications and content they use most:
business productivity tools, streaming video, social networking
and more. The desire for instant
access creates a need for greater bandwidth, improved
responsiveness and faster upload and
download speeds than was offered by previous generations of
wireless technologies. Wireless
carriers’ networks need to function more like landline IP-based
networks to achieve the speeds
and connectedness customers have come to expect.
SWOT Analysis
In business, several elements must be considered, one of which
is most important is
conducting a SWOT analysis. SWOT is an acronym that stands
Strengths, Weaknesses,
Opportunities and Threats. “A SWOT analysis is an organized
list of your business’s strengths,
weaknesses, opportunities and threats. (Berry, 2014)
Weaknesses and strengths represent the
core factors of the company while opportunities and threats
represent the external factors. The
26. analysis is part of the initial planning process to determine what
is needed to sustain the business
and meet mission and vision statements.
The importance of conducting an internal and external
comprehensive analysis serves to
identify the internal and external strengths and weaknesses of
the business model. All wireless
technologies past, present and future have strengths and
weaknesses because each technology
has been or will be developed to solve a particular problem. In
order for a SWOT analysis to be
5
conducted the organization must be able to understand how the
company operates and know its
strengths and weaknesses.
Addressing a company’s strengths should be conducted from
internal and external
perspective that expresses the customer’s views and needs.
Once the strengths are established
27. then the weaknesses of the company need to be addressed and
determine what needs to be
improved and what is contributing to losses that is affecting the
company’s sales and revenue.
“Weaknesses are aspects of your business that detract from the
value you offer or place you at a
competitive disadvantage.” (Berry, 2014)
Weaknesses can be overcome by using effective strategic
planning that will allow the
company to make the necessary adjustments. “Weaknesses are
aspects of your business that
detract from the value you offer or place you at a competitive
disadvantage.” (Berry, 2014) To
maximize growth, profitability remaining competitive and
minimizing risk, organizations must
continually monitor internal and external environmental factors
and adjust their strategy
accordingly. To do that, it's important to know what the internal
and external factors can consist
of in addition to, what is needed to sustain the business and
meet organizational goals.
Ethical and Legal Concerns Surrounding Wireless
Communication
An important concern with any new technology is deciding how
28. current laws deal with
new issues that this new generation of products might raise.
Several actions that used to be taken
for granted now can possibly be perceived as illegal. With the
market for wireless applications
and hardware growing at a phenomenal rate, as with most new
technologies that gains market
acceptance, the deployment phase is usually followed by the
discovery of security issues.
6
The legal and ethical issues pertinent to the use of cell phones,
PDAs and other
telecommunication mobile devices are evolving as rapidly as
technology itself. Issues center
around using these devices in a manner that respects the rights,
safety and privacy of others.
Legal concerns about misuse of e-mail and the Internet relate to
liability and privacy. Most
employers want to trust employees and respect their privacy,
however they fear the organization
29. will be liable for the content of e-mail messages. Gossip,
derogatory comments, lewd or obscene
messages or graphics, harassing messages, or any number of
other things can be retrieved from
e-mail files and used as evidence. Having such messages
originate within the workplace
negatively affects the organization’s responsibility for a
harassment free environment and could
ultimately tarnish their image and decrease productivity.
The fear of litigation and the concern over wasted time prompts
some organizations to
monitor staff use of electronic resources. Special network and
software programs exist just for
this purpose. The Electronic Privacy Act gives an employer the
right to access an employee’s e-
mail and voicemail messages that are maintained on a system
provided by the employer. To
eliminate this fear and improve awareness, clear policies on the
use of electronic company
resources are developed and become a part of the hiring
process.
Another privacy issue includes Internet research. Technology
makes it feasible to gather
information about computer users without their knowledge or
30. permission. This practice many
consider to be unethical and an invasion of individual privacy.
Objections arise because
advertisers on the Internet may secure information from sites to
track ones’ preferences and
online shopping habits. To alleviate concerns about cookies,
organizations frequently include a
7
privacy statement on their Web sites that explains the type of
information that will be gathered
and its use.
Company Time
An employer has the right to monitor all employees who utilize
company resources on
the network during company time. Social networking has made
it easy for employees to
communicate and share information with colleagues, connect
with customers, and advertise for
the business. Employees are able to remotely connect to the
company’s network and still have
31. the same access to social media sites to include Facebook,
LinkedIn, and Twitter to share
information. Employees have a right to privacy, however not on
company time. “Unfortunately,
American and international laws do not directly address social
networking site usage” (Coco,
Kaupins, Little, 2012, p.1). Employees should be aware and
limit the amount of time spent on
social networking sites, unless it is work-related. Corporate
policies on social networking should
provide clear, concise direction to as a part of security
awareness to all employees to govern
usage. Corporate policies should also provide consistent
monitoring of employees with constant
reminders or notifications routinely as a form of policy
enforcement.
Technology Improvements
Radio systems, such as mobile phones and wireless internet
connections, have become an
integral part of modern life. However, today's devices use twice
as much of the radio spectrum as
is necessary. New technology is being developed that could
fundamentally change radio design
32. and could increase data rates and network capacity, reduce
power consumption, create cheaper
devices and enable global roaming.
8
This important change in radio design could offer a range of
benefits. In Wi-Fi systems
this would double the capacity of a Wi-Fi access point, allowing
more users and higher data
rates. For cellular systems, full-duplex operation would also
deliver increased capacity and data
rates, or alternatively the network operators could provide the
same total network capacity with
fewer base station sites, giving obvious benefits in the cost and
environmental impact of running
the network.
In today's mobile devices, a separate filtering component is
required for each frequency
band, and because of this, today's mobiles phone do not support
all of the frequency channels
which are in use across the world. Different devices are
33. manufactured for different regions of the
world, and there are currently no 4G phones capable of
unrestricted global roaming. Replacing
these filters with the research team's duplexer circuit would
create smaller and cheaper devices,
and would allow manufacturers to produce a single model for
the entire world. This would
enable global roaming on 4G and would further decrease cost
through greater economies of
scale.
Future Role of Wireless Technology for Personal and
Commercial Use
Wireless technology is a powerful tool utilized to aid in
boosting productivity and
encouraging information sharing. With untethered access to
documents, emails, applications and
other network resources, employees can travel where they need
to and have constant access to
the tools required to do their jobs. Some of the ways both
individuals and businesses alike are
taking advantage of wireless technology through increased
mobility and collaboration, improved
responsiveness, better access to information and easier network
scalability.
34. 9
Wireless communication technology gives mobile access to
information through a variety
of portable communication devices. Organizations and
individuals alike are increasingly
dependent on computers and other technology devices to handle
the volume and complexity of
information communicated through daily operations. In years to
come, all aspects of wireless
communications are subject to rapid change globally. These
changes include rapidly expanding
public demand for products and services, major changes in
government policies, emergence of a
variety of new systems for delivering communications services
to wireless terminals and
profound changes in communications industries as evidenced by
mergers, alliances involving
some the world’s largest corporations. Beyond the enduring
need for improved efficiency, there
are two key technology developments, neither of which is
35. particularly unique to wireless, that are
expected to continue to fuel the advancement of wireless
technologies for the foreseeable future:
cloud computing and the Internet of Things (IoT).
With the development of cloud computing, data has become
mobile, transferable, and
instantly accessible. Cloud computing refers to a network model
in which applications reside on
network servers and are accessed from end clients. Cloud
computing typically relies heavily on
the concept of virtualization, where servers may actually be
virtual appliances and an actual
physical device may be hosting many virtual appliances. To end
users, it may appear as if they
are accessing a physical server, but in reality they are accessing
a piece of software that is
emulating a physical server. This concept of virtualization
allows for significant network
abstraction and rapid reconfiguration to meet user needs.
Although cloud computing is an incredibly powerful concept for
information technology,
this trend has placed enormous strain on the communications
infrastructure. It has also presented
36. 10
security risks, regulatory compliance, and connectivity and
availability issues as a concern that
still prevents some businesses from adopting the use of cloud
technology. With end users
increasingly accessing both applications and content from the
cloud, their bandwidth
consumption has significantly increased.
Cloud computing is expected to increase, and combined with
increasing user mobility
and mobile computing, this trend will continue to place strain
on wireless communications
infrastructure. Cloud computing is one of the main reasons we
expect the time frame between
major commercial technology releases to continue to shorten.
The Internet of Things (IoT) is the vision of connecting devices
that can generate data
and information that can be accessed from anywhere via the
Internet. This connectivity allows
governments, businesses, and individuals to make data-driven
37. decisions in real time. The most
common view of the IoT refers to the persistent inclusion of
Internet connectivity, usually
wireless, in common everyday objects.
In the Internet of Things (IoT) model, Internet connectivity
extends beyond traditional
devices such as laptops and smartphones to include everyday
items such as refrigerators,
microwave ovens, dishwashers, thermostats, automobiles, and
road signs. Micro-
electromechanical systems (MEMS) are embedded into objects
to enable communication and
interaction with the environment. These objects can range from
humans with implanted medical
devices to controllers in oil refineries. Current projections
estimate tens of billions of devices
will be connected to the Internet by 2020, and wireless
technology will be a key enabler.
11
38. Conclusion
Cconsumer demand is stimulating many advances in wireless
communications
technology. The future of wireless technology is significant as
it represents the frontier of
communication. However, determining which wireless
technologies should be used in the future
has become an increasingly daunting endeavor considering the
variety of options available.
Innovation and integration of mobile and wireless technologies
are an on-going process, which
have given shape to the industry.
Wireless technology is a part of the past, present and future.
This term paper completed
the examination of the SWOT analysis. It evaluated the current
ethical and legal concerns
surrounding wireless technology. It analyzed the improvements
over the last two (2) years, and
it predicted the future role of wireless technology for both
personal and commercial use.
12
39. Figure 1
13
References
Bishop, J. (2010). Tough on data misuse, tough on the causes of
data misuse: A review of New
Labour’s approach to information security and regulating
themisuse of digital
information (1997–2010). International Review of Law,
Computers & Technology.
40. Retrieved from
http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=6&sid
=62b7dcd1-7470-4d08-
81d4-2c7744ea7e35%40sessionmgr113&hid=111
Berry, T (2014). What is SWOT Analysis? Retrieved from
http://articles.bplans.com/how-to-
perform-swot-analysis/
Beaver, K. (2013). The Top 5 Network Security Vulnerabilities
that Are Often
Overlooked. Retrieved from: Acunetix Web Application
Security:
http://www.acunetix.com/blog/featured/the-top-5-network-
security-vulnerabilities/
Blackman, C., & Srivastava, L. (2011). Telecommunications
Regulation Handbook. Washington,
DC: The World Bank.
Cernauskas, D., & Tarantino, A. (2011). Essentials of Risk
Management in Finance. Hoboken:
John Wiley & Sons, Inc.
Council, N. R. (1997). The Evolution of Untethered
Communications. Washington, D.C.:
41. National Academy Press.
Duato, J., & Pinkston, T. M. (2006, July 14). Interconnection
Networks. Retrieved from:
MIT.edu:
http://web.mit.edu/6.173/www/currentsemester/readings/R07-
interconnection-
networks-hennessy-patterson.pdf
FCC. (n.d.). Cyber Security Planning Guide. Retrieved March
18, 2014, from Federal
14
Communications Commission:
http://transition.fcc.gov/cyber/cyberplanner.pdf
Jensen, K. (2010). A Bright Future for Wireless Technology.
Valve Magazine, 1-4. Retrieved
from:
http://www2.emersonprocess.com/siteadmincenter/PM%20Articl
es/VM_WNT10_WIRE
42. LESS_LR.pdf
Kaupins, G., Coco, M., & Little, A. (2012). Organizational
Social Networking Usage and
Policy Retrictions. International Journal of Business. Retrieved
from
http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=12&si
d=a10aaaed-4292-425e-
87e0-1ced8c8ed50a%40sessionmgr111&hid=111
Stallings, W. (2009). Business Data Communications, Sixth
Edition. Upper Saddle River:
Pearson Education, Inc.
Stark, J. (2012, April 16). The 10 Principles of Mobile Interface
Design. Retrieved from:
www.netmagazine.com:
http://www.netmagazine.com/features/10-principles-mobile-
interface-design
US-CERT. (2008). Using Wireless Technolgoy Securely.
Retrieved from: www.us-cert.gov:
https://www.us-
cert.gov/sites/default/files/publications/Wireless-Security.pdf
43. Term Paper: Networking
Due Week 10 and worth 200 points
Select one of the following topics in which you will base your
responses in the form of a term paper:
� Network Neutrality
� Web2.0
� Wireless Technology
� Broadband Convergence
� U.S. Telecommunication Policy
� Internet Security
� IPv6
� WWAN
� WLAN
� DNSSEC
� WAN
Write a fully developed paper in which you:
1. Compose an executive summary highlighting the paper’s
contents and reasoning for your chosen topic.
2. Conduct a SWOT analysis by analyzing the strengths,
weaknesses, application opportunities, and threats
from competitors of the chosen topic.
3. Evaluate the current ethical and legal concerns surrounding
your topic.
4. Select one ethical or legal concern surrounding your topic,
take a position on the issue, and provide
rationale.
5. Analyze the improvements over the last two years to your
communication technology topic, and suggest
44. an improvement based on its current usage.
6. Predict the future role of the communication technology
you’ve selected for both personal and commercial
use.
7. Create a diagram that illustrates the communication structure
of your chosen technology in Visio or its
open source alternative software. Note: The graphically
depicted solution is not included in the required
page length.
8. Use at least eight quality resources in this assignment. Note:
Wikipedia and similar websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
� Be typed, double-spaced, using Times New Roman font (size
12), with one-inch margins on all sides;
references must follow APA or school-specific format. Check
with your professor for any additional
instructions.
� Include a cover page containing the title of the assignment,
the student’s name, the professor’s name, the
course title, and the date. The cover page and the reference page
are not included in the required page
length.
� Include charts or diagrams created in Visio or Dia. The
completed diagrams/charts must be imported into
the Word document before the paper is submitted.
The specific course learning outcomes associated with this
assignment are:
45. � Evaluate the need for information communication in the
business environment.
� Evaluate the basic technology of information communication.
� Analyze the roles of the Internet and the basic protocols that
are the foundation of the
Internet and address the critical issue of quality of service
(QoS).
� Analyze the technologies and architectures that have been
developed for networking
over shorter distances.
This document was created with the Win2PDF “print to PDF”
printer available at
http://www.win2pdf.com
This version of Win2PDF 10 is for evaluation and non-
commercial use only.
This page will not be added after purchasing Win2PDF.