Solution for a client of Wireless Technology

solution for a client of Wireless Technology Company. They are a company that assists organizations and businesses when it comes to issues that involve networking, bandwidth, productivity and connectivity. The client in need of a solution right now is The Athlete’s Shack. They are a chain of sporting goods stores with about ten stores in the area. While the company has a technology framework in place, they are lacking a wireless element and they wish to add one. Beyond that, they wish to make use of iPads that can thus link to the wireless infrastructure in the stores. The Athlete’s Shack is unsure on how to initiate and start the process and that is why they are turning to the Wireless Technology Company.

Executive Summary

The Athlete’s Shack is in need of a solution that allows for wireless connectivity along with the use of iPads as a mean to make the sales and operations process simpler. However, simply slapping a wireless router and some iPads into each store is not the solution if The Athlete’s Shack truly wants to do things the right way. To truly get the most out of technology, they should look at everything including the internet bandwidth they have at each location, the internal bandwidth they have at each location, how the stores are connected to each other or to the home office, whether sales and other important data is being backed up or not and in what manner(s) it is happening, the amount of control that The Athlete’s Shack is leveraging as it relates to wasteful or dangerous activities on the part of their employees (e.g. surfing porn sites on company computers, getting computer viruses, etc.) and so forth. Further, The Athlete’s Shack, if they have the money, should make a strong move to upgrade now and future-proof their setup as much as they can rather than making incremental updates as the years go on. Things move quickly when it comes to technology upgrades and it best to be ahead of the curve rather than barely with it. For example, 802.11n internet would be a good modern choice but the choice of the future would be the 802.11ac standard as it is the best thing out there right now and it is readily available for fairly low cost (Cisco, 2015).

Assessment

In looking at the situation in play with The Athlete’s Shack, it is clear that there are several components that will be necessary or optimal for TAS to make use of. They are as follows:

Wireless routers at each store that allow for connectivity between the on-site network and the iPads in the hands of the employees. For security purposes, that wireless router will need to be equipped with the latest and greatest encryption. At this stage in the technology and wireless encryption game, the best solution would probably be WPA-2 256-bit encryption (Information Week, 2015). This encryption standard is available from commonly available routers made by companies like Linksys and Netgear, just to name two (Ngo, 2015).

Network speed is an issue as well. Wireless N (802.11n) is probably the most economic yet fast solution available but 802.11ac is faster and would provide the most significant amount of “future-proofing.” In other words, if The Athlete’s Shack were to implement a 802.11ac framework now, the chances they would “have” to upgrade in the near future are quite slim as 802.11ac provides speeds north of wired Gigabit in many applications and instances

Also important, and for reasons mentioned shortly, is the internet speed in place at The Athlete’s Shack locations. While a lot of the information flowing in the store’s network will remain internal to the network, there would also be communication with the internet at large (e.g. external websites, etc.) and there would also be communication between stores in the form of programs like points of sales, shared network drives and so forth.

To secure the store-to-store communications over the internet, this would require what is known as a virtual private network, or VPN for short. While many networks are self-contained and all exist at one single location, others networks are more virtual and abstract in nature in that they are linked like a local area network (LAN) but the computers in said network could literally be anywhere where an internet connection exists. This makes the use of virtual private networks very lucrative and attractive. However, while communication between disparate computers is possible without a VPN, it is highly unadvised. This is due to the fact that the communications are not generally encrypted as they go from place to place. Not only will the communications be encrypted on a VPN, but the communications will all be linked and pulled together via the VPN framework. This will ensure proper functionality and connectivity.

There is also the need for firewalls and anti-virus software frameworks at each store and on each device so that the machines involved do not get breached. Attacks that can be rendered and felt include computer viruses, worms (write once, read many), malware and so forth. A lot of these nasty programs are encountered and “caught” when surfing the wrong websites. As much as is possible, the use of the internet at The Athlete’s Shack locations should be limited to required business tasks and operations. Regardless of the restrictions in place, the sites and activity that is going on should be monitored at all times to ensure that nobody is engaging in activity that is endangering to the company and/or is counter to the required productivity needed from the employees. For example, a bored employee using an iPad to watch YouTube is going to suck up a lot of bandwidth that should be spent on real work rather than pointless misbehavior (Casey, 2015).

Also important to take into account are things like ergonomics and the accessories that comes with the gear that will be purchased. For example, all computer stations should have comfortable chairs and ergonomically-designed keyboards. Further, the iPads should come with mounts or carrying cases that make them easy to position and hold. At no point should an iPad be used and wielded outside of a protective case. Further, the protective case should require a tool to remove and there should be an alarm that sounds if the iPad is removed from the store.

The iPads themselves should have security on them. A simple passcode should be enough. However, employees must be trained to lock their iPads when not in use, not allow customers to watch their screen as they enter the passcode and so forth. Further, the internet router, modem and other similar equipment should be secured in a networking cabinet or something of that nature. The cabinet needs to breathe and have airflow but only authorized personnel should ever be touching the router or similar equipment. iPads that are not in use should be stored in a locked room or cabinet as they are attractive to thieves (which can include employees) and an iPad falling into the wrong hands could lead to corporate espionage from a competitor or other malfeasance from a hacker or hacker group.

As was easily learned by the TJX/TJ Maxx fiasco, transmitting information wirelessly can be very perilous (Ou, 2007). Even more recent events like the Target and Home Depot hacks prove that even the biggest firms can be made susceptible to sensitive information being stolen (Sidel, 2015). All information that can be transmitted via wired internet…should be. All point of sales transactions should be done on wired stations…just to be completely safe. TJX got caught using an encryption standard (WEP) that was known to be “cracked” and the same is not true of WPA or WPA2 at this time. However, even “reputable” standards and technologies have been compromised from time to time. The Secure Socket Layer (SSL) Heartbleed exploit is but one example (Trend Micro, 2015). As far as Target and Home Depot, the lesson to be learned from their screw-ups is to be very careful when granting access to information in the system. To be honest, The Athlete’s Shack is small enough that an integration of vendor/supplier logins into the TAS network is probably not worth the trouble or time it would take to do it right. Further, whatever information is needed by those external parties can probably be managed by administrators with TAS.

Lastly, we come to the last major prong of any good IT system and that is backup. Presuming that The Athlete’s Shack has a corporate office, all points of sales and internal reporting information should be kept within the VPN and thus should be backed up to the home office. Beyond that, there should be a backup that is offsite from any of the TAS locations including the corporate office. It is best to have a backup within the network and one that is outside of it. It is also good to have an onsite backup and an offsite backup. Presuming the VPN is functioning and presuming that the offsite backup is online, the VPN/third party combo would effectively get the job done. As with the other things mentioned, any movement of data from site to site needs to be encrypted. If data is moved via VPN, this would automatically be the case, obviously. When it comes to offsite backups, many to most offer a litany of encryption options like Blowfish and so forth when it comes to copying local data to an offsite backup site (Carbonite, 2015).

Solution

The author of this workup will now offer the technical equipment and software solutions that should be used as part of what was mentioned in the assessment noted above.

WLAN/Wireless Router

(Amazon, 2015)

Above is the router that the author of this report would personally recommend for the ATS locations. It is the Netgear Nighthawk. As per the suggestions noted before, this is a 802.11 AC router and has a top speed of 3.2 gigabits per second. The router makes use of tri-band WiFi, has a 1 GHz dual-core processor and a total of six antenna. The price for each router is a little steep in that they cost about $275 a piece. However, this would only be $3,000 total for the entire group of TAS stores. The three bands come in speeds of 1300 mbps (two of them) and 600 mbps, thus the grand total of 3200 mbps (or 3.2 gigabits). The router has built-in VPN support. As such, setting up a VPN with these routers would be fairly easy to do. The router also has two USB ports onboard with one being a 2.0 port and the other being a 3.0 port. Of course, the Nighthawk and any other router in its class has WPA-2 encryption support built in (Netgear, 2015).

Virtual Private Network

(WikiMedia, 2015)

The diagram above shows the basic gist of how a VPN works. As noted before, what makes a VPN “virtual” is that not all of the computers are in the same place yet they are linked together like a conventional local area network would be, at least in many respects. There can even be remote and roaming users that are out and about that can still be connected to the network and still access it all the same. However, any roaming users would need internet and would need credentials to get into VPN. This is actually a good thing because it would make a stolen iPad from TAS quite useless in terms of data private to TAS as much of that data (if not all of it) would actually be stored at the home office or one of the stores. In short, the reason a VPN should be used by TAS is because it allows them to be connected yet in an encrypted manner despite the disparate location of the computers and equipment involved (Geier, 2015).

iPad’s

(Verizon Wireless, 2015)

Pictured above are is the iPad Air 2. It is one of four iPad models that Apple is currently marketing and selling. The other three are iPad Air (1), the iPad Mini 2 and the iPad Mini 3. The reason that the Air 2 is chosen for this solution is because it is the only one of the four iPads that has wireless 802.11ac built in. Further, the iPad Air 2’s start at $499 for the 16 GB model (Apple, 2015).

Local Area Network

(DOT, 2015)

Above is a rough representation of what each location of TAS would look like in terms of network structure. There would be the local file server, the printer, the workstations (and/or iPads in the case of TAS) and the firewall. The firewall would be the starting point to go out to the internet and communicate with the other computers that are on the virtual private network. This would be the computers that are at other TAS store locations as well as the corporate offices. The red circle in the diagram above would be taken up by the Nighthawk router mentioned before (Inc., 2015).

Equipment Mounting/Storage

(Amazon, 2015)

The Nighthawk router or other small equipment should be in a locked room with restricted access to all but the most senior employees at least location. If the layout of the store does not make this practical, a cabinet like the one above can be used so that the router can be mounted where it needs to be but cannot be taken or damaged by someone with ill intentions.

(Amazon, 2015)

The above is a more robust option as compared to the one on the prior page. This cabinet would be used to store battery backup, the servers themselves and the router…among other things. The particular model above was selling on Amazon.com for $1,295 as of 8/23/2015.

Ergonomics/Accessories

(Amazon, 2015).

The above is just one of many options when it comes to cases for the iPad Air 2. It would be important to focus on two things regardless of the cases bought. First, the case needs to offer a shield and bump protection for the iPad. Second, whatever case is selected should be easily held and manipulated as this will become obviously important for the people carrying the iPads.

Conclusion

To wrap things up succinctly, the bare minimum that TAS would need to do to get where they say they want to go is a good wireless router with strong encryption and the iPads for their sales associates. However, going for a fuller solution that includes the most up-to-date wireless speed, the most up-to-date iPad, a virtual private network and backup is the best solution so as to allow for future-proofing and most efficacy/productivity when completing daily tasks. The speed, functionality and disaster recover frameworks would all be there. However, it is up to TAS to decide how much they want to spend, how often they wish to upgrade and how seriously they are taking the technology part of their business.

References

Amazon. (2015). NETGEAR Nighthawk X6 AC3200 Tri-Band Wi-Fi Router (R8000). Amazon.com.

Retrieved 23 August 2015, from http://www.amazon.com/NETGEAR-Nighthawk-AC3200-Tri-Band-

R8000/dp/B00KWHMR6G/ref=sr_1_4?ie=UTF8&qid=1440365411&sr=8-4&keywords=wireless+AC

Apple. (2015). Apple. Apple. Retrieved 23 August 2015, from http://apple.com

Carbonite. (2015). Business Cloud Backup Explained | Carbonite. Carbonite.com. Retrieved 23 August

2015, from http://www.carbonite.com/online-backup/business/how-it-works

Casey, K. (2013). 9 Bandwidth Hogs: Reality Vs. Myth – Network Computing. Network Computing.

Retrieved 23 August 2015, from http://www.networkcomputing.com/networking/9-bandwidth-hogs-reality-vs.-myth/d/d-id/1108365?

Cisco. (2015). 802.11ac: The Fifth Generation of Wi-Fi Technical White Paper. Cisco. Retrieved 23

August 2015, from http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-3600-

series/white_paper_c11-713103.html

DOT. (2015). Chapter 2-Page 3 – Telecommunications Handbook for Transportation Professionals.

Ops.fhwa.dot.gov. Retrieved 23 August 2015, from http://ops.fhwa.dot.gov/publications/telecomm_handbook/chapter2_03.htm

Geier, E. (2015). How (and why) to set up a VPN today. PCWorld. Retrieved 23 August 2015, from http://www.pcworld.com/article/2030763/how-and-why-to-set-up-a-vpn-today.html

Inc. (2015). Local Area Networks (LANs). Inc.com. Retrieved 23 August 2015, from http://www.inc.com/encyclopedia/local-area-networks-lans.html

Information Week,. (2015). Learn The Basics Of WPA2 Wi-Fi Security – InformationWeek.

InformationWeek. Retrieved 23 August 2015, from http://www.informationweek.com/learn-the-basics-of-wpa2-wi-fi-security/d/d-id/1039894?

Netgear. (2015). NETGEAR. Netgear.com. Retrieved 23 August 2015, from http://netgear.com

Ngo, D. (2015). Best 802.11ac routers of 2015 – CNET. CNET. Retrieved 23 August 2015, from http://www.cnet.com/topics/networking/best-networking-devices/802-11ac/

Ou, G. (2007). TJX’s failure to secure Wi-Fi could cost $1B | ZDNet. ZDNet. Retrieved 23 August 2015,

from http://www.zdnet.com/article/tjxs-failure-to-secure-wi-fi-could-cost-1b/

Sidel, R. (2015). After Target and Home Depot Breaches, Small Lenders Object to Settlements. WSJ.

Retrieved 23 August 2015, from http://www.wsj.com/articles/after-target-and-home-depot-breaches-small-lenders-object-to-settlements-1430175638

Trend Micro,. (2015). Heartbleed OpenSSL Exploit Vulnerability – Trend Micro USA. Trendmicro.com.

Retrieved 23 August 2015, from http://www.trendmicro.com/us/security/heartbleed/

Verizon Wireless,. (2015). Cell Phones, Smartphones & the Largest 4G LTE Network – Verizon Wireless.

Verizonwireless.com. Retrieved 23 August 2015, from http://www.verizonwireless.com/

WikiMedia,. (2010). File:Virtual Private Network overview.svg – Wikimedia Commons.

Commons.wikimedia.org. Retrieved 23 August 2015, from https://commons.wikimedia.org/wiki/File:Virtual_Private_Network_overview.svg


Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently
 

Online Academic Help With Different Subjects

Literature

Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.

Finance

Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!

Psychology

While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.

Engineering

Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.

Nursing

In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.

Sociology

Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.

Business

We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!

Statistics

We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.

Law

Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper