Verified Document

Latest Network Media Technology Case Study

Wireless Solution The author of this report has been asked to assess and offer recommendations regarding the network setup for Richton Toys. There is currently a fairly dated but operational Cat5 setup in the office area, which is located on half a floor of a thirty floor office building. However, some users have taken to using an 802.11b wireless network. The Chief Executive Officer of Richton is very concerned about the wireless security of that setup given that corporate espionage in the toy industry is rampant. The author will give some recommendations about what should be done and why. While the existing Cat5 setup is not a completely dinosaur, the use of an extremely outmoded wireless technology and security standard is a disaster waiting to happen.

Analysis

The one thing that absolutely must change with the Richton internet access setup is the wireless technology in use. The 802.11b router that is being used should be uninstalled and banned from the office as the technology is nearly a generation old (2000) (. Anyone caught using an unsecure router (which that 802.11b router almost certainly is) should be written up for fired on the spot. As noted by the details...

That means that there are tons of people within the reception path of a wireless network. The reach was probably not too wide from the 802.11b antenna but that reach would expand greatly if an 802.11n or 802.11ac antenna was used. The author of this report would assert that the former of those two would probably work fine but using the latter, which is much faster, would be the wiser course (Kelly, 2014).
Scrapping the existing laptops to make the switch would not be necessary. However, any laptop that has anything below 802.11n access (802.11b and 802.11g, probably) should be scrapped. If the laptop itself is fine and it is just the wireless that is deficient, a USB network adapter can be a stopgap but those could be lost or stolen quite easily. New laptops with 802.11n or 802.11ac (either would work, since the technology is typically backwards compatible) would be ideal. Regardless, any new wireless router that is installed should have WPA-2 encryption that is operating at the highest bit strength possible. 256 bits should be easy to purchase and easy to implement. That all being said, the…

Sources used in this document:
References

Beal, V. (2015). What is Cat-7? Webopedia. Webopedia.com. Retrieved 10 August 2015, from http://www.webopedia.com/TERM/C/Cat_7.html

Cable Organizer. (2015). What Is The Difference Between Cat 5, Cat 5e, and Cat 6 Cable?. Cableorganizer.com. Retrieved 10 August 2015, from http://www.cableorganizer.com/articles/cat5-cat5e-cat6.htm

HTCC. (2015). WPA2 Encryption Basics. Cybercoyote.org. Retrieved 10 August 2015, from http://cybercoyote.org/classes/wifi/wpa2.shtml

Kelly, G. (2014). 802.11ac vs. 802.11n WiFi: What's The Difference?. Forbes. Retrieved 10 August 2015, from http://www.forbes.com/sites/gordonkelly/2014/12/30/802-11ac-vs.-802-11n-wifi-whats-the-difference/
Cite this Document:
Copy Bibliography Citation

Related Documents

Media and United States Foreign
Words: 2319 Length: 8 Document Type: Term Paper

ACCOUNTS OF INVOLVEMENT ABU-GHRAIB EPISODE International Media played vital role when the United States was in search of enough evidence for launching military attacks against Iraq. The government was provided with accounts of significant importance and relevance related to the Sadam Hussein and his government. The media secretly photographed different installations that were alleged by the Security Council and United States as sites for nuclear weaponry and plants. The United States submitted

Media Bias Knowledge Is Rarely
Words: 7231 Length: 20 Document Type: Term Paper

The spin that often surrounds war, is fundamentally damaging even if it is intended as damage control for the nation as a whole, or at the very least the leaders of the nation. Public Belief It has been hinted at within this work that the old adage, the public does not necessarily believe what it hears, but it hears what it believes is at play when it comes to media. As

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Media Institutions and Regulations
Words: 1753 Length: 6 Document Type: Term Paper

Media Institutions and Regulations: A Discussion on the Twitter Phenomenon Words change meaning all the time. Take, for example, awful. Today, it means something terrible, but it used to mean filled with awe (aweful). In this case, a different spelling has led to a different interpretation. Yet sometimes, the same word may mean the same exact thing, only in a completely different context. This refers to the example of Twitter. Traditionally, "twitter"

Network Support Technologies Case Study
Words: 2733 Length: 10 Document Type: Case Study

Network Support Technologies Case Study Project Scope, Schedule, and Budget Type and Configuration of the Network Hardware Specifications Software Specifications User Policies and Legal Issues Life of Equipment Project Costs Providing an Online Radio Service Second Life Information is now growing at speeds never thought imaginable. Today's world of Information Technology (IT) has provided the dynamic platform in which exponentially growing information resources emerge. This complex arena of knowledge management provides tremendous advantages to modern society. It allows individuals greater

Network Standards
Words: 2900 Length: 9 Document Type: Research Paper

Network Standards A Brief Look Since 1995 This is a research paper that focuses on network standards and protocols that involve strategies in management. Leadership strategies cannot handle the need for network standards to handle billions of users and user generated applications. Therefore management strategies are more appropriate. Furthermore the history of network standards shows layering through the OSI models follows a management approach vs. A leadership approach. In the OSI model, there

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now