Professional Documents
Culture Documents
CIS 505 Term Paper Networking
CIS 505 Term Paper Networking
CIS 505 Term Paper Networking
Sheena Lindsey-Smith
CIS/505
Executive Summary
Today’s generation are embedded in social media, digital and mobile as a way of life.
Expectations are shifting requiring all industries to meet these needs through multichannel
mobile interaction methods. As these changes take place, people in society are frequently
changing their attitudes, goals and requirements from all enterprises. Society is embracing digital
technologies more than ever demanding a more convenient online experience. Industries are
being challenged to develop technical strategies to simplify daily tasks that are faster, more
connectivity and replicating the online experience. Technical capabilities have become so
sophisticated that stationary devices i.e. telephones, facsimile (fax) machines, computers and
networks are ever-present in many industries. The primary challenge is to develop affordable,
reliable, widespread capabilities for untethered communications. By relating and combining the
attributes of wireless and mobile technologies it will enhance the individuals online experience.
This paper will focus on how wireless technology has evolved in today’s society in
addition to the role it plays in wireless communications and networking solutions. Some of the
current trends and future applications will be examined and addressed through a SWOT analysis
to identify the current state of wireless technologies and the effects it has on network security
issues and networking solutions. It will examine the ethical and legal concerns governing
3
wireless technology. The prediction of how communication technology will play a role in the
future and improvements for both personal and commercial use will be explained. Time
management in the workplace and identifying employee rights to spend personal time on social
Introduction
technologies are now more attractive than ever in terms of their performance, quality and cost.
In today’s society life is managed on the go desiring the ability to access and transact business in
real-time from any mobile device. The growth of wireless network has achieved that goal and
has enabled capabilities for the use of personal devices anywhere and anytime. This has helped
play a role in the future of technology as the evolution of technology is constantly changing.
The term wireless refers to communications sent without wires or cables. It is the process
of sending information through invisible waves in the air. Information such as data, voice, and
video are carried through the radio frequency of the electromagnetic spectrum. Some of the
devices used for wireless communication are cordless telephones, mobiles, GPS units, wireless
The strong public demand for wireless services is fueling intense industrial and
government activity, including research and development (R&D) aimed at improving the quality
and reducing costs of wireless technology, design of innovative systems and services, and
implementation of new technical standards and policies. This dynamic environment is producing
diverse wireless technologies and standards, in stark contrast to other areas of communications
4
marked by a convergence toward uniformity. All this activity will bring the reality of the next
expectations for speed, bandwidth and global access. Customers today are connected 24/7 via
their wireless devices and want immediate access to the applications and content they use most:
business productivity tools, streaming video, social networking and more. The desire for instant
access creates a need for greater bandwidth, improved responsiveness and faster upload and
download speeds than was offered by previous generations of wireless technologies. Wireless
carriers’ networks need to function more like landline IP-based networks to achieve the speeds
SWOT Analysis
Opportunities and Threats. “A SWOT analysis is an organized list of your business’s strengths,
weaknesses, opportunities and threats. (Berry, 2014) Weaknesses and strengths represent the
core factors of the company while opportunities and threats represent the external factors. The
analysis is part of the initial planning process to determine what is needed to sustain the business
identify the internal and external strengths and weaknesses of the business model. All wireless
technologies past, present and future have strengths and weaknesses because each technology
has been or will be developed to solve a particular problem. In order for a SWOT analysis to be
5
conducted the organization must be able to understand how the company operates and know its
perspective that expresses the customer’s views and needs. Once the strengths are established
then the weaknesses of the company need to be addressed and determine what needs to be
improved and what is contributing to losses that is affecting the company’s sales and revenue.
“Weaknesses are aspects of your business that detract from the value you offer or place you at a
Weaknesses can be overcome by using effective strategic planning that will allow the
company to make the necessary adjustments. “Weaknesses are aspects of your business that
detract from the value you offer or place you at a competitive disadvantage.” (Berry, 2014) To
maximize growth, profitability remaining competitive and minimizing risk, organizations must
continually monitor internal and external environmental factors and adjust their strategy
accordingly. To do that, it's important to know what the internal and external factors can consist
of in addition to, what is needed to sustain the business and meet organizational goals.
An important concern with any new technology is deciding how current laws deal with
new issues that this new generation of products might raise. Several actions that used to be taken
for granted now can possibly be perceived as illegal. With the market for wireless applications
and hardware growing at a phenomenal rate, as with most new technologies that gains market
acceptance, the deployment phase is usually followed by the discovery of security issues.
6
The legal and ethical issues pertinent to the use of cell phones, PDAs and other
telecommunication mobile devices are evolving as rapidly as technology itself. Issues center
around using these devices in a manner that respects the rights, safety and privacy of others.
Legal concerns about misuse of e-mail and the Internet relate to liability and privacy. Most
employers want to trust employees and respect their privacy, however they fear the organization
will be liable for the content of e-mail messages. Gossip, derogatory comments, lewd or obscene
messages or graphics, harassing messages, or any number of other things can be retrieved from
e-mail files and used as evidence. Having such messages originate within the workplace
negatively affects the organization’s responsibility for a harassment free environment and could
The fear of litigation and the concern over wasted time prompts some organizations to
monitor staff use of electronic resources. Special network and software programs exist just for
this purpose. The Electronic Privacy Act gives an employer the right to access an employee’s e-
mail and voicemail messages that are maintained on a system provided by the employer. To
eliminate this fear and improve awareness, clear policies on the use of electronic company
Another privacy issue includes Internet research. Technology makes it feasible to gather
information about computer users without their knowledge or permission. This practice many
advertisers on the Internet may secure information from sites to track ones’ preferences and
online shopping habits. To alleviate concerns about cookies, organizations frequently include a
7
privacy statement on their Web sites that explains the type of information that will be gathered
Company Time
An employer has the right to monitor all employees who utilize company resources on
the network during company time. Social networking has made it easy for employees to
communicate and share information with colleagues, connect with customers, and advertise for
the business. Employees are able to remotely connect to the company’s network and still have
the same access to social media sites to include Facebook, LinkedIn, and Twitter to share
information. Employees have a right to privacy, however not on company time. “Unfortunately,
American and international laws do not directly address social networking site usage” (Coco,
Kaupins, Little, 2012, p.1). Employees should be aware and limit the amount of time spent on
social networking sites, unless it is work-related. Corporate policies on social networking should
provide clear, concise direction to as a part of security awareness to all employees to govern
usage. Corporate policies should also provide consistent monitoring of employees with constant
Technology Improvements
Radio systems, such as mobile phones and wireless internet connections, have become an
integral part of modern life. However, today's devices use twice as much of the radio spectrum as
is necessary. New technology is being developed that could fundamentally change radio design
and could increase data rates and network capacity, reduce power consumption, create cheaper
This important change in radio design could offer a range of benefits. In Wi-Fi systems
this would double the capacity of a Wi-Fi access point, allowing more users and higher data
rates. For cellular systems, full-duplex operation would also deliver increased capacity and data
rates, or alternatively the network operators could provide the same total network capacity with
fewer base station sites, giving obvious benefits in the cost and environmental impact of running
the network.
In today's mobile devices, a separate filtering component is required for each frequency
band, and because of this, today's mobiles phone do not support all of the frequency channels
which are in use across the world. Different devices are manufactured for different regions of the
world, and there are currently no 4G phones capable of unrestricted global roaming. Replacing
these filters with the research team's duplexer circuit would create smaller and cheaper devices,
and would allow manufacturers to produce a single model for the entire world. This would
enable global roaming on 4G and would further decrease cost through greater economies of
scale.
encouraging information sharing. With untethered access to documents, emails, applications and
other network resources, employees can travel where they need to and have constant access to
the tools required to do their jobs. Some of the ways both individuals and businesses alike are
taking advantage of wireless technology through increased mobility and collaboration, improved
dependent on computers and other technology devices to handle the volume and complexity of
information communicated through daily operations. In years to come, all aspects of wireless
communications are subject to rapid change globally. These changes include rapidly expanding
public demand for products and services, major changes in government policies, emergence of a
variety of new systems for delivering communications services to wireless terminals and
some the world’s largest corporations. Beyond the enduring need for improved efficiency, there
are two key technology developments, neither of which is particularly unique to wireless, that are
expected to continue to fuel the advancement of wireless technologies for the foreseeable future:
With the development of cloud computing, data has become mobile, transferable, and
instantly accessible. Cloud computing refers to a network model in which applications reside on
network servers and are accessed from end clients. Cloud computing typically relies heavily on
the concept of virtualization, where servers may actually be virtual appliances and an actual
physical device may be hosting many virtual appliances. To end users, it may appear as if they
are accessing a physical server, but in reality they are accessing a piece of software that is
emulating a physical server. This concept of virtualization allows for significant network
this trend has placed enormous strain on the communications infrastructure. It has also presented
10
security risks, regulatory compliance, and connectivity and availability issues as a concern that
still prevents some businesses from adopting the use of cloud technology. With end users
increasingly accessing both applications and content from the cloud, their bandwidth
Cloud computing is expected to increase, and combined with increasing user mobility
and mobile computing, this trend will continue to place strain on wireless communications
infrastructure. Cloud computing is one of the main reasons we expect the time frame between
The Internet of Things (IoT) is the vision of connecting devices that can generate data
and information that can be accessed from anywhere via the Internet. This connectivity allows
governments, businesses, and individuals to make data-driven decisions in real time. The most
common view of the IoT refers to the persistent inclusion of Internet connectivity, usually
In the Internet of Things (IoT) model, Internet connectivity extends beyond traditional
devices such as laptops and smartphones to include everyday items such as refrigerators,
electromechanical systems (MEMS) are embedded into objects to enable communication and
interaction with the environment. These objects can range from humans with implanted medical
devices to controllers in oil refineries. Current projections estimate tens of billions of devices
will be connected to the Internet by 2020, and wireless technology will be a key enabler.
11
Conclusion
communication. However, determining which wireless technologies should be used in the future
has become an increasingly daunting endeavor considering the variety of options available.
Innovation and integration of mobile and wireless technologies are an on-going process, which
Wireless technology is a part of the past, present and future. This term paper completed
the examination of the SWOT analysis. It evaluated the current ethical and legal concerns
surrounding wireless technology. It analyzed the improvements over the last two (2) years, and
it predicted the future role of wireless technology for both personal and commercial use.
12
Figure 1
Mobile Device
Wireless PDA
Wireless Laptop
The Internet
Wired Desktop
Wired Tablet PC
13
References
Bishop, J. (2010). Tough on data misuse, tough on the causes of data misuse: A review of New
vid=6&sid=62b7dcd1-7470-4d08-81d4-2c7744ea7e35%40sessionmgr113&hid=111
perform-swot-analysis/
Beaver, K. (2013). The Top 5 Network Security Vulnerabilities that Are Often
http://www.acunetix.com/blog/featured/the-top-5-network-security-vulnerabilities/
Cernauskas, D., & Tarantino, A. (2011). Essentials of Risk Management in Finance. Hoboken:
MIT.edu: http://web.mit.edu/6.173/www/currentsemester/readings/R07-interconnection-
networks-hennessy-patterson.pdf
FCC. (n.d.). Cyber Security Planning Guide. Retrieved March 18, 2014, from Federal
Jensen, K. (2010). A Bright Future for Wireless Technology. Valve Magazine, 1-4. Retrieved
from:
http://www2.emersonprocess.com/siteadmincenter/PM%20Articles/VM_WNT10_WIRE
LESS_LR.pdf
Kaupins, G., Coco, M., & Little, A. (2012). Organizational Social Networking Usage and
http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=12&sid=a10aaaed-4292-425e-
87e0-1ced8c8ed50a%40sessionmgr111&hid=111
Stallings, W. (2009). Business Data Communications, Sixth Edition. Upper Saddle River:
Stark, J. (2012, April 16). The 10 Principles of Mobile Interface Design. Retrieved from:
www.netmagazine.com: http://www.netmagazine.com/features/10-principles-mobile-
interface-design
https://www.us-cert.gov/sites/default/files/publications/Wireless-Security.pdf