Implementation Of Wireless Technology: Energy Consumption And Communication

Name:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Project title:

Implementation of wireless technology

Week No:

7

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Date:

Planning

Milestone

Planned

Actual

Comment

Assessment 3 completion

the collected resources is being analyzed with the use of annotated bibliography

Analysis is being completed

I completed my project successfully and delivered the analysis using annotated bibliography

Issues

Description

Date

Action results

Finished

Quality of the analysis might lack as compared to expectation

Y

Project Plan

Name:

Project title:

Implementation of wireless technology

Week No:

8

Date:

Planning

Milestone

Planned

Actual

Comment

Assessment 3 upload

Keep up to date with the lectures and knowledge gained in the class

Uploaded assessment 3

I get to know about the criticalness of the annotated bibliography and data analysis

Issues

Description

Date

Action results

Finished

Less reliable papers

Annotated bibliography is done for completing the research

Y

Name:

Project title:

Implementation of wireless technology

Week No:

9

Date:

Planning

Milestone

Planned

Actual

Comment

Complete Quiz

The gathered knowledge will help in gaining better marks

Completed online quiz

Issues

Description

Date

Action results

Finished

Less marks

Done the online quiz

Y

The aim of the report is to develop a project plan that will be able to meet the requirements and needs associated with implementation of a wireless technologies. The project plan will describe a plan that will organize the implementation process in an effective way. With a good implementation technology the project can be successfully completed.

Project problem domain

The problem related to the Capstone project includes

  • Radio spectrum
  • Manual interference
  • Power consumption relating to storage device  

The aim of the report is to solve the problem faced with the implementation of wireless technology. The main problem faced with the implementation of this project is with the security of radio spectrum and manual interferences directly effects the user. Apart from this another problem that can affect the domain is related to the power consumption. This report will help in understanding and facilitating the enhanced way of communicating without any kind of barrier involved in this sector.  

Conceptual framework is used to represent the researcher’s way of examining the phenomenon. This will describe the actions taken by the researcher in order to frame the requirements needed to complete the study. The framework includes identifying the specific variables important for implementation of wireless technology. There are total 8 categories that lies within the conceptual framework, this includes:

  • The experience of presence faced within the environment
  • Environment itself
  • The task that is on focus
  • The activities performed by each participants associated with the project
  • The rules followed by the members while interacting within the environment

Wireless technology is used for dynamic research domain. With the implementation of wireless technology the network security can be improved. Another reason of implementing wireless technology are it offers latest encryption. The problems like hacking snooping can be avoided with the use of strong password and with implementation of better hardware and software security (Wang, et al., 2014). The amount of mobility gets increased with the use of wireless technology. With the use of wireless technology productivity can be increased as well. Moreover as there is no wires involved in the connection of this network the chances of getting tripped over any cables reduces. The aim of the report is to analyse the process of implementing wireless communication in the network (Smith, 2015). There are several technology included within the wireless protocols. This includes WLAN, WPA, WEP, Wi-Fi and other wireless broadband. Wireless technologies are used to describe the communication in which the electromagnetic waves are used rather than wires. There are several protocols that are needed to be maintained while implementing wireless technologies. With the use of wireless infrastructure networks can be managed efficiently. Before implementing wireless technology, this becomes necessary to understand about the benefits offered by these technology. The way wireless technology will help in increasing the productivity needs to be clear. Wireless technology offers many benefits such as flexible, affordable and efficient. Secondly, it is necessary to plan the implementation of wireless technology. These includes understanding the investment and calculating the profits they may return. After assessing the implementation features and the necessary capabilities, the plan needs to be implemented. The wireless communication after implementation needs to include some security features that will help in protecting the technology and will secure the communication. This includes WEP encryption, MAC addressing and traditional VPN securities control.  The report has discussed about the problem domains associated with the implementation of wireless technology. This becomes essential to develop a wireless technology that will energy efficient. The need to maintain the energy efficiency in wireless technology are due to the design problem, green technology policy and cost (Marin?i?, Kerner & Šimuni?, 2016). The way energy can be saved includes active/sleep modes, directional antenna, schedule management, interference management, cognitive radio and high transmission speed. In order to improve the communication between different devices implementation of internet of things will be beneficial.

Rationale

There are two types of research method qualitative and quantitative. Qualitative research is a research that includes investigative research. This includes providing a solution to the problem faced while working with this project. The research includes collection of data that varies from semi structured to unstructured techniques. This includes looking at the non-numerical data. There are several sources that incudes artifacts, participant’s observation and archival records. Quantitative research is done with the help of statistical data and with developing questionaries’ and conducting surveys (Lewis, 2015). There are four types of quantitative research this are experimental, descriptive, correlation and quasi experimental. In this project qualitative research method is being used. This report has included the budget for developing the plan in detail with Gantt chart.

Data collection method used in this report is secondary. In this method the analysis is doe on already collected data (Hanvey, 2018). The sources used for secondary data method collection includes data collected from research papers, organizational departments and information collected by governments.

There are several ethical issues that are faced while implementing wireless technology. Wireless technology are does not provide much security, thus they are vulnerable to attack. This becomes essential to maintain the security otherwise unauthorized person will get access to the information transmitted within the devices (Yang, et al., 2015). This act is unethical and thus needs to be taken care. Apart from these squatters impact the wireless networks a lot. While implementing wireless technologies the organization needs to understand that it is being ethically used and efficiently implemented.

Compliance requirements are referred to working by the rule such as following some policy, specification, law or standard. Violation of this requirements may lead to legal punishments and also includes federal fines. There are several laws and regulations that are applicable for federal assistance. There are several compliance requirements this includes: activities allowed or unallowed, allowable cost principles, cash management, Davis Bacon Act, eligibility  equipment and real property management , matching, level of effort, marketing, period of availability of federal funds, procurement and suspension and debarment, program income , real property acquisition and reallocation assistance , reporting , sub recipient monitoring and special tests and provisions. If the project implemented in this report fulfil all the requirements than only it is eligible to be implemented. As violation of this may will lead to legal actions on the project managers.  

The main risk associated with the implementation of wireless technology is with the security issues, data interception, radio jamming, and denial of service and network intrusions. Thus it is essential to mitigate this risk. In order to mitigate the risk strong passwords can be used and with the help of encryption security can be enhanced (Denzin, 2017). By limiting the Wi-Fi signals the risk of unauthorized users can be restricted, wireless intrusion prevention system will be useful and will protect the communication from intrusions. Rogue AP detection is another device that helps in providing better security.

Task Name

Duration

Start

Finish

Implementation of wireless technology

58 days

Mon 14-01-19

Wed 03-04-19

   Planning

9 days

Mon 14-01-19

Thu 24-01-19

      Research

3 days

Mon 14-01-19

Wed 16-01-19

      Resource accumulation

1 day

Thu 17-01-19

Thu 17-01-19

      project charter documentation

1 day

Fri 18-01-19

Fri 18-01-19

      PID formation

1 day

Mon 21-01-19

Mon 21-01-19

      Submission of documents

1 day

Tue 22-01-19

Tue 22-01-19

      initiation meeting

1 day

Wed 23-01-19

Wed 23-01-19

      sign off

1 day

Thu 24-01-19

Thu 24-01-19

      kick off project

0 days

Thu 24-01-19

Thu 24-01-19

   Design

13 days

Fri 25-01-19

Tue 12-02-19

      Project problem domain

2 days

Fri 25-01-19

Mon 28-01-19

      Analysis

1 day

Tue 29-01-19

Tue 29-01-19

      identification of technical requirements

2 days

Wed 30-01-19

Thu 31-01-19

      identification of non-technical requirements

1 day

Fri 01-02-19

Fri 01-02-19

      hardware requirements

2 days

Mon 04-02-19

Tue 05-02-19

      Software requirements

2 days

Wed 06-02-19

Thu 07-02-19

      identification of already existing networks

1 day

Fri 08-02-19

Fri 08-02-19

      survey of power consumption technologies

2 days

Mon 11-02-19

Tue 12-02-19

   Implementation

19 days

Wed 13-02-19

Mon 11-03-19

      Setting up of network peripheral

4 days

Wed 13-02-19

Mon 18-02-19

      software design

5 days

Tue 19-02-19

Mon 25-02-19

      software and hardware integration

10 days

Tue 26-02-19

Mon 11-03-19

   Closing

17 days

Tue 12-03-19

Wed 03-04-19

      development of final documents

5 days

Tue 12-03-19

Mon 18-03-19

      testing

3 days

Tue 19-03-19

Thu 21-03-19

      testing documentation

3 days

Fri 22-03-19

Tue 26-03-19

      Evaluation

3 days

Wed 27-03-19

Fri 29-03-19

      submission of documents

2 days

Mon 01-04-19

Tue 02-04-19

      sign off

1 day

Wed 03-04-19

Wed 03-04-19

      project closed

0 days

Wed 03-04-19

Wed 03-04-19

References 

Denzin, N. K. (2017). The research act: A theoretical introduction to sociological methods. Routledge.

Hanvey, C. (2018). Data Collection Methods. In Wage and Hour Law (pp. 19-46). Springer, Cham.

Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), 473-475.

Marin?i?, A., Kerner, A., & Šimuni?, D. (2016, April). Interoperability of IoT wireless technologies in ambient assisted living environments. In Wireless Telecommunications Symposium (WTS), 2016 (pp. 1-6). IEEE.

Smith, J. A. (Ed.). (2015). Qualitative psychology: A practical guide to research methods. Sage.

Wang, C. X., Haider, F., Gao, X., You, X. H., Yang, Y., Yuan, D., … & Hepsaydir, E. (2014). Cellular architecture and key technologies for 5G wireless communication networks. IEEE Communications Magazine, 52(2), 122-130.

Wang, Y., Lin, F., Yang, S., Cai, P., & Igarashi, S. (2018, June). Efficiency Optimization of Wirelss Power Transfer System with Traction Motor Load for Modern Tram. In 2018 IEEE PELS Workshop on Emerging Technologies: Wireless Power Transfer (Wow) (pp. 1-5). IEEE.

Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Di Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20-27. 

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP