Implementation of Wireless Technology Project Plan
Verified
Added on 2023/05/30
|15
|2379
|236
AI Summary
This report aims to develop a project plan for the implementation of wireless technology. It includes a detailed analysis of the project problem domain, research question, methodology, risk analysis, and compliance requirements. The report also discusses the ethical issues and conceptual framework associated with the project.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: EMERGING TECHNOLOGIES EMERGING TECHNOLOGIES Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
3EMERGING TECHNOLOGIES Name:<Please Fill> Project title:Implementation of wireless technology Week No:8Date:<Please Fill> Planning MilestonePlannedActualComment Assessment 3 uploadKeep up to date with thelecturesand knowledge gained in the class Uploaded assessment 3 I get to know about thecriticalnessof theannotated bibliographyand data analysis Issues DescriptionDateAction resultsFinished Less reliable papers<Please fill>Annotated bibliography is done forcompletingthe research Y Name:<Please Fill> Project title:Implementation of wireless technology Week No:9Date:<Please Fill>
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4EMERGING TECHNOLOGIES Planning MilestonePlannedActualComment Complete QuizThegathered knowledge will help ingainingbetter marks Completedonline quiz - Issues DescriptionDateAction resultsFinished Less marks<Please fill>Done the online quizY Rationale The aim of the report is to develop a project plan that will be able to meet the requirements and needs associated with implementation of a wireless technologies. The project plan will describe a plan that will organize the implementation process in an effective way. With a good implementation technology the project can be successfully completed. Project problem domain The problem related to the Capstone project includes Radio spectrum Manual interference Power consumption relating to storage device
5EMERGING TECHNOLOGIES Purpose and justification The aim of the report is to solve the problem faced with the implementation of wireless technology. The main problem faced with the implementation of this project is with the security of radio spectrum and manual interferences directly effects the user. Apart from this another problem that can affect the domain is related to the power consumption. This report will help in understanding and facilitating the enhanced way of communicating without any kind of barrier involved in this sector. Research question Question 1:how the energy consumption can be decreased in sector of implementation? Question 2:how the communication would be prevailing between different devices? Conceptual Framework Conceptual framework is used to represent the researcher’s way of examining the phenomenon. This will describe the actions taken by the researcher in order to frame the requirements needed to complete the study. The framework includes identifying the specific variables important for implementation of wireless technology. There are total 8 categories that lies within the conceptual framework, this includes: The experience of presence faced within the environment Environment itself The task that is on focus The activities performed by each participants associated with the project The rules followed by the members while interacting within the environment
6EMERGING TECHNOLOGIES Methodology Analysis Wireless technology is used for dynamic research domain. With the implementation ofwirelesstechnologythenetworksecuritycanbeimproved.Anotherreasonof implementing wireless technology are it offers latest encryption. The problems like hacking snooping can be avoided with the use of strong password and with implementation of better hardware and software security (Wang, et al., 2014). The amount of mobility gets increased with the use of wireless technology. With the use of wireless technology productivity can be increased as well. Moreover as there is no wires involved in the connection of this network the chances of getting tripped over any cables reduces. The aim of the report is to analyse the process of implementing wireless communication in the network (Smith, 2015). There are several technology included within the wireless protocols. This includes WLAN, WPA, WEP, Wi-Fi and other wireless broadband. Wireless technologies are used to describe the communication in which the electromagnetic waves are used rather than wires. There are several protocols that are needed to be maintained while implementing wireless technologies. Withtheuseofwirelessinfrastructurenetworkscanbemanagedefficiently.Before implementing wireless technology, this becomes necessary to understand about the benefits offered by these technology. The way wireless technology will help in increasing the productivity needs to be clear. Wireless technology offers many benefits such as flexible, affordable and efficient. Secondly, it is necessary to plan the implementation of wireless technology. These includes understanding the investment and calculating the profits they may return. After assessing the implementation features and the necessary capabilities, the plan needs to be implemented. The wireless communication after implementation needs to include some security features that will help in protecting the technology and will secure the communication. This includes WEP encryption, MAC addressing and traditional VPN
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7EMERGING TECHNOLOGIES securities control.The report has discussed about the problem domains associated with the implementationofwirelesstechnology.Thisbecomesessentialtodevelopawireless technology that will energy efficient. The need to maintain the energy efficiency in wireless technology are due to the design problem, green technology policy and cost (Marinčić, Kerner & Šimunić, 2016). The way energy can be saved includes active/sleep modes, directional antenna, schedule management, interference management, cognitive radio and high transmission speed. In order to improve the communication between different devices implementation of internet of things will be beneficial. Research methods There are two types of research method qualitative and quantitative. Qualitative research is a research that includes investigative research. This includes providing a solution to the problem faced while working with this project. The research includes collection of data that varies from semi structured to unstructured techniques. This includes looking at the non- numerical data. There are several sources that incudes artifacts, participant’s observation and archival records. Quantitative research is done with the help of statistical data and with developing questionaries’ and conducting surveys (Lewis, 2015). There are four types of quantitative research this are experimental, descriptive, correlation and quasi experimental. In this project qualitative research method is being used. This report has included the budget for developing the plan in detail with Gantt chart. Data collection Data collection method used in this report is secondary. In this method the analysis is doe on already collected data (Hanvey, 2018). The sources used for secondary data method collection includes data collected from research papers, organizational departments and information collected by governments.
8EMERGING TECHNOLOGIES Ethical issues Thereareseveralethicalissuesthatarefacedwhileimplementingwireless technology. Wireless technology are does not provide much security, thus they are vulnerable to attack. This becomes essential to maintain the security otherwise unauthorized person will get access to the information transmitted within the devices (Yang, et al., 2015). This act is unethical and thus needs to be taken care. Apart from these squatters impact the wireless networksalot.Whileimplementingwirelesstechnologiestheorganizationneedsto understand that it is being ethically used and efficiently implemented. Compliance requirements Compliance requirements are referred to working by the rule such as following some policy, specification, law or standard. Violation of this requirements may lead to legal punishments and also includes federal fines. There are several laws and regulations that are applicable for federal assistance. There are several compliance requirements this includes: activities allowed or unallowed, allowable cost principles, cash management, Davis Bacon Act, eligibilityequipment and real property management , matching, level of effort, marketing,periodofavailabilityoffederalfunds,procurementandsuspensionand debarment,programincome,realpropertyacquisitionandreallocationassistance, reporting,subrecipientmonitoringandspecialtestsandprovisions.Iftheproject implementedinthisreportfulfilalltherequirementsthanonlyitiseligibletobe implemented. As violation of this may will lead to legal actions on the project managers.
9EMERGING TECHNOLOGIES Project plan Poster
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10EMERGING TECHNOLOGIES Work Breakdown Structure Implementation of wireless technology Planning Research Resource accumulation project charter documentation PID formation Submission of documents initiaton meeeting sign off kick off project Design Project problem domain analysis identification of technical requirements identification of non technical requirements hardware requirements Software requirements identification of already existing networks survey of power consumption technologies Implemention Setting up of network peripheral software design software and hardware integration Closing development of final documents testing testing documentation evaluation submission of documents sign off project closed Risk Analysis The main risk associated with the implementation of wireless technology is with the securityissues,datainterception,radiojamming,anddenialofserviceandnetwork intrusions. Thus it is essential to mitigate this risk. In order to mitigate the risk strong passwords can be used and with the help of encryption security can be enhanced (Denzin, 2017). By limiting the Wi-Fi signals the risk of unauthorized users can be restricted, wireless intrusionpreventionsystemwillbeusefulandwillprotectthecommunicationfrom intrusions. Rogue AP detection is another device that helps in providing better security. Duration
13EMERGING TECHNOLOGIES References Denzin, N. K. (2017). The research act: A theoretical introduction to sociological methods. Routledge. Hanvey, C. (2018). Data Collection Methods. In Wage and Hour Law (pp. 19-46). Springer, Cham. Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), 473-475. Marinčić, A., Kerner, A., & Šimunić, D. (2016, April). Interoperability of IoT wireless technologiesinambientassistedlivingenvironments.InWireless Telecommunications Symposium (WTS), 2016 (pp. 1-6). IEEE. Smith, J. A. (Ed.). (2015). Qualitative psychology: A practical guide to research methods. Sage. Wang, C. X., Haider, F., Gao, X., You, X. H., Yang, Y., Yuan, D., ... & Hepsaydir, E. (2014). Cellulararchitectureandkeytechnologiesfor5Gwirelesscommunication networks.IEEE Communications Magazine,52(2), 122-130. Wang, Y., Lin, F., Yang, S., Cai, P., & Igarashi, S. (2018, June). Efficiency Optimization of Wirelss Power Transfer System with Traction Motor Load for Modern Tram. In 2018 IEEE PELS Workshop on Emerging Technologies: Wireless Power Transfer (Wow) (pp. 1-5). IEEE. Yang,N.,Wang,L.,Geraci,G.,Elkashlan,M.,Yuan,J.,&DiRenzo,M.(2015). Safeguarding5Gwirelesscommunicationnetworksusingphysicallayer security.IEEE Communications Magazine,53(4), 20-27.