NETW563 Wireless Networks Course


NETW563 Wireless Networks Course
Evaluate the needs of the business. Identify and clearly state the problems and issues. If there appears…


NETW563 Wireless Networks Course

NETW563 Wireless Networks Course

A+ Entire Course: Case Study Week 2, 6| Course Project Week 3, 7| Midterm Exam|  You Decide Week 5| Discussions Week 1-7| Final Exam

Sporting Goods Company Course Project Proposal Week 3

The objective of the project is to recommend a wireless solution for a sporting goods company. This is an individual project. You will be required to submit two assignments for the project. Because of this, you may need to spend additional time and effort in Week 3 to produce the proposal which will form the basis for your project.

Plan on utilizing the Writing Source, available under Student Resources under the Course Home tab on the left, or make use of the official style guide entitled, Writing the Research Paper: A Handbook, 6th edition, by Anthony C. Winkler and Jo Ray McCuen. This handbook includes information on the following styles: APA, MLA, CEE, CMS, and Columbia Online (ISBN – 1413001785).

Scenario: The Wireless Technology Company (WTC), a company that assists organizations and businesses with issues involving network planning and design, has hired you as a consultant. The Athlete’s Shack (TAS) is a chain of sporting goods stores. Because TAS has grown in popularity, it now has 10 stores in the area. TAS is considering implementing a wireless technology that will link all of its stores through wireless broadband service, installing WLANs in each store, and providing its employees with iPads for better customer service. TAS is unsure how to start this process. They have asked WTC for help, and WTC has turned to you.

Create a technical, detailed-oriented report for TAS that explains the process of the project. The format of your technical paper should be based on the following:

Table of Contents

The Table of Contents is a key tool. Use it to format and organize your paper. You can use the headings below as the main sections of your paper. If you are unfamiliar with the Table of Contents utility in MS Word, check out the video in the Hub Writing Center, located under the Student Resources tab.

Executive Summary

The Executive Summary includes the specific findings of the research in a short format optimized for a quick read by decision makers. It gives an overview of the organization and summarizes the findings.


Evaluate the needs of the business. Identify and clearly state the problems and issues. If there appears to be more than one problem or issue, decide if they are separate or related issues. What are the problems that you are tasked with solving? Provide a detailed analysis of the causes of the problem or issue. Be sure the causes you identify relate directly to the problem or issue. Discuss the concepts, ideas, and insights that are most valuable in helping you make sense of your project. Cite all sources.


Explore the solutions appropriate to solve the identified problems or issues. Be sure the solutions are logical and based on your analysis. The solutions should effectively treat the problem, not the symptoms. Also, discuss the anticipated outcomes (both positive and negative) of implementing each of the possible solutions you identified. Describe exactly what should be done and how it should be done, including by whom, with whom, and in what sequence. Be specific about your recommended solution and implementation.


A picture is worth a thousand words, especially when you are describing a network solution. Diagrams should add value and not simply take up space.


List all references used in your paper. All references must be cited in two places: within the text and on the reference list. Choose references judiciously and cite them accurately. Refer to Writing the Research Paper or use the videos in the Hub Writing Center, located under the Student Resources Tab, to understand how to cite sources appropriately.


The final project report will provide detailed information on the assessment of the problem, the solution selection process, the key steps in the solution’s implementation, the evaluation and monitoring parameters of the solution, and the key stakeholders….

NETW563 Wireless Networks Course

Wireless Solution for The Athlete’s Shack (TAS) – Retail Chain – Course Project Week 7


The project implementation includes the acquisition of the necessary hardware and software, installation of wireless access points, installation and configuration of wireless controllers, software installation, router installation…

NETW563 Wireless Networks Course

Comparing Municipal WiFi Networks Case Study Week 2

Municipal WiFi  – Hot or Not?

A number of U.S. cities have launched municipal WiFi networks over the past few years. Research three deployments, anywhere in the world, and compare the networks in terms of architecture, applications, cost to the consumer, and success.

Subjects Covered:  Consumers, Customer relations, Information technology, Innovation, Internet, Market research, Marketing strategy, Pricing, Product introduction, Telecommunications industry.

In Case Study 1, focus on the following issues:

  • Applications for the service
  • Cost of the service for the users and the cost to the city for deployment
  • What factors influenced the success or failure of the project


Municipal wifi is criticized as it is difficult to provide free wifi services from a cost and performance perspective.  The city will have to incur losses, and performance will be affected as more people use it.  There are also issues related to security and privacy.  Many cities in the US launched free wifi networks…

NETW563 Wireless Networks Course

Midterm Exam

(TCO A) A wireless client network interface card performs each of the following tasks except (Points : 5)

Transmitting the packet over radio waves.

Determining when to send the packet.

Dividing data into packets.

Sending packets to a wired network through a root remote wireless bridge.

(TCO A) A _____ is a million hertz. (Points : 5)





(TCO C) The bit pattern used in a WLAN direct sequence spread spectrum transmission is called the (Points : 5)

Barker code.

Oscillation modulation.

Chip set.

XOR Inverse (XORI).

(TCO C) _____ is a group of wireless devices that is served by a single access point (AP). (Points : 5)

Basic Service Set

Ad hoc mode

Extended Service Set

Independent Service Set

(TCO D) Each of the following is a design goal of a site survey except (Points : 5)

Implement a wired network infrastructure.

Achieve the best possible performance from a WLAN.

Determine the best location for access points.

Develop wired networks optimized for a variety of applications.

(TCO D) A device that converts direct current from a battery to alternating current is a(n) (Points : 5)

DC-to-AC converter.

AC-to-DC converter.

Universal Power Adapter (UPA).

Power Converter (PC).

(TCO E) After the security flaws in WEP were publicized, the IEEE TGi task group released a new proposed implementation known as what? (Points : 5)




Dynamic TKIP

(TCO E) WPA and WPA2 were created by which organization? (Points : 5)



Wi-Fi Alliance

Wireless Research Resource Group (WRRG)

(TCO A) Give a brief summary of the characteristics of IEEE 802.11b, 802.11a, and 802.11g wireless networks. (Points : 10)

IEEE 802.11b maximizes the throughput and makes it as high as eleven megabits per second but it…

(TCO A) What are some limitations to infrared wireless LAN systems? (Points : 10)

The limited range is one of the obvious limitations to infrared wireless LAN systems. It does…

(TCO C) What is fragmentation, and how does fragmentation reduce collisions? (Points : 10)

Fragmentation pertains to the process of splitting up the datagram into simpler components so that they can all be…

(TCO C) What are two disadvantages of IEEE 802.11g networks? (Points : 10)

One of the disadvantages of IEEE 802.11g networks is that the number of channels that can be accessed is…

(TCO D) Explain channel reuse. (Points : 10)

Wireless signals always have a group of channels that are allocated to a particular location, which can be…

(TCO E) Explain how WEP violates the “cardinal rule” of cryptography. (Points : 10)

The application of the WEP violates the cardinal rule of cryptography in the sense that cryptography  requires…

NETW563 Wireless Networks Course

You Decide Richton Toys Week 5

Scenario Summary

Richton Toys is an independent toy designer and has been around for about 2 years. Up until now, they have occupied 1/2 of a floor in a 30-story office tower, and are currently using a CAT5 ethernet LAN that a previous tenant installed for their network. Recently, several users have installed a 802.11b network on their own. Moore H. Pschorr, the company CEO, is becoming concerned about the network setup, as corporate espionage is rampant in the toy industry, but so far, the WLAN is popular with his teams. Additionally, the sales department has been complaining about how unprofessional it is to have problems with or lose a connection during a sales meeting or conference. At this point in time, Richton Toys does not have a formal I.T. department, though Jim Coombes, a very tech-savvy user is currently managing it on the side. He also has some ideas for improving the network but may not have all of the skills to make the best decisions. Since the Human Resources department has a clearer view of the company’s future growth in the near future, CEO Moore has asked them to bring in your consulting firm to listen to some ideas from the team, and to provide them with some solid direction where to go….


The first step that should be taken in the development of a strategy to respond to Richton Toy Company’s situation is to assess their networking needs and to evaluate the various options available for…

NETW563 Wireless Networks Course

Recommendation for Municipal Wifi in Bayton City Case Study Week 6

Bayton is small Midwestern city of 30, 000 people. The town is located on Lake Michigan and supports a large 600 slip marina that is adjacent to the downtown business district. The downtown has been in decline for the past 15 years. There are a few restaurants, but most of the buildings are boarded up. A number of economic development projects have been tried in the past, but nothing seems to stick. However, there is small historic district surrounding the downtown that has been moderately successful in attracting some “urban pioneers” who have purchased old historic homes and performed renovations.

A telecommunications consultant has proposed a municipal WiFi network for the downtown and marina. The consultant claims that this network will bring in businesses and spark a redevelopment of the downtown.  It could also be used to connect mobile public service personnel such as police, firefighters, and the water department. The signal would blanket the marina, downtown, and offer some penetration into the historic district. The consultant is seeking a $50,000 commitment from the city to cover the initial cost of equipment and deployment and would negotiate a yearly maintenance contract. The consultant claims that new businesses, increased traffic at the marina, and the savings on the public service network would offset the cost of the network.

Currently, Internet access is available downtown through Comcast and AT&T DSL There is an adequate 3G wireless footprint throughout the city. The marina is not served by Comcast or a telco DSL service.

You are a local IT professional and the mayor has asked you to evaluate this proposal and make a recommendation to the city council. Use the information obtained in Case Study 1 to support your decision.

Subjects Covered: Information technology, Internet, Service management, Technology & operations, Telecommunications, Telecommunications industry.

In Case Study 2, focus on the following issues:

– The potential of the Municipal WiFi network to spark investment based on your previous research

– The potential to leverage the network for municipal services such as police, fire, meter reading, etc…based on your previous research

– The potential for the city to provide a internet access as a public utility, akin to the water department or garbage collection based on your previous research


A number of municipal wifi implementations have been successful.  For example, Arcata, a town in California, has implemented free municipal wifi.  It can be accessed by…

NETW563 Wireless Networks Course

Course Discussions Week 1-7 All Students Posts – 385 Pages

Week 1 All Students Posts – 53 Pages

Standards – 26 Pages

Wireless technology has relied on standards since its outset. How has this assisted in the widespread acceptance of standards, and how do standards make it easier for us to purchase and use a wide variety of products?  Standards are very important in everything. Why do we need standards in Wireless Technology? Why is it important? What would happen if we did not have standards?

Standardization and regulation of used frequencies needs to be in place so that the whole wireless industry can produce components which understand each other.  Several standards are being used and freely available in the market today.

Standards form the fundamental building blocks for product development by establishing consistent protocols that can be universally understood and adopted.  Standards also make it easier to understand and compare competing products…

Antennas and RF – 27 Pages

All forms of electromagnetic energy, from gamma rays to radio waves, travel through space in waves. How are radio waves generated, and how do they propagate? Discuss the physical differences between radio waves and light or heat waves.  What is polarization? What is the concept of wave propagation?

Radio waves are generated by the electromagnetic field being sent through the antenna or dish in pulses.  Once the current is stopped then the signal stops. When it is started up and stopped repeatedly then that is when you start to see the waves transmit.

Radio waves can cover almost any distance depending on the frequency and the angle of the dish and power output.  It can bounce inside the atmosphere until a destination is reached forever.
I have used HF to talk to Japan from NC as it can bounce over mountains.  I have also used UHF to for short wave sorta far distances but it does not bounce as much as just flex a bit and VHF which is basically line of sight only without any interference in the way to stop it.

Light does not bend in the traditional manor. It can be manipulated through fiber wires but the waves can be directional through reflection, refraction and diffraction…

Week 2 All Students Posts – 61 Pages

Wireless Modulation – 33 Pages

What are the four primary wireless modulation schemes? Which ones are used for WLANs, and what are their relative advantages and disadvantages?  What is Modulation? How does it work? Why do we use modulation?

Modulation is defined as the use of one electrical signal to control a primary variable of another. To illustrate if an audio signal voltage is used to control the “amplitude” of a carrier signal, the result is amplitude modulation. The main purpose of modulation in a communication system is to generate a modulated signal suited to the characteristics of a transmission channel. In radio communications, modulation is needed in the transmission systems to transfer the message into the available high frequency radio channel. Modulation is also used in voice-band modems where digital data modulate the carrier frequencies inside the voice frequency band…

Access Control – 28 Pages

The MAC layer has the primary responsibility of controlling access to the wireless medium. What are the two procedures for transmitting on a WLAN specified by the IEEE 802.11 standard?

The two procedures for transmitting on a WLAN is DCF and PCF. DCF (Distributed Coordination Function) is when you share wireless medium, it’s transmitted in a way for you to avoid collisions altogether. The way to explain this is for example let’s say you are at an internet cafe and there is several people waiting to use the computer. When a person gets up, in order to avoid a collision of everybody rushing to use the open computer, everyone has a number and the person number who is called out is the one that is able to use the computer. The others would have to wait until there number is called out.

PCF (Point Coordination Function) is when an access point serves as the polling device or point coordinator in the transmission process. The way to explain is for example a star bus topology. You have one computer in the middle that is responsible for transmitting information to four other computers on the network. First the Main computer sends out a transmission to all the other computers telling them to pause there transmissions for a certain time frame. Then the main computer sends a transmission to each computer individually to see if they need to transmit information to another computer on the network. If the first computer does not need to transmit anything, then the computer sends a null value to the main computer to inform it that it has nothing to transmit. The main computer then goes to the second computer. If the second computer does have something to transmit, then the main computer allows the second computer to transmit the information…

Week 3 All Students Posts – 55 Pages

Designing the WLAN – 31 Pages

Explain the steps in designing a WLAN. How do you determine the network type, access point management strategy, and location of the APs?  How do you go about it?  Discuss the considerations that may affect the type of wireless network selected. Explain the situations in which it would be appropriate to use each of the three wireless standards.

Well, it depends on what or who the WLAN is being designed for. You should always carefully planning and discuss what is feasible and what are not, what devices should be used, and making sure that you are adhering to the client finance limits as well. You also have to determine what type network design is already in place and how to upgrade or enhance that network design or what is best to create a new network design. Making sure that every AP requirement is met in terms of up to 10Mbps or 100Mbps for Ethernet connectivity. Also with APs you have to determine their locations for installation for better performance, because obstruction can play a factor on the business performance, in terms for interferences. Cable length can be a factor as well, PoE, regulations and policy rules, if the client wants to Point-to-Point, LOS that will allow you to be able to view each of these antennas clearly without them having any interferences of obstruction in their viewpoint, or laser FSO. On the other hand, there are many more reasons to think about when it comes to designing a WLAN…

Site Survey Analyzers – 24 Pages

What is the purpose of the analyzers? How can the information be used for configuration or troubleshooting purposes?  What are site surveys? Are they mandatory and you go without them? How is the information obtained from them can be used for configuring or troubleshooting?

A site survey is an in-depth examination and analysis of a proposed wireless LAN site in order to meet design goals. Doing a site survey is very essential for a company because analyzing a site will make determinations of where Access Points needs to be placed. Additionally, site surveys will answer questions such as determining if certain electronic devices would interfere with WLAN signals and would wireless signals from outside organizations interfere with the company’s wireless signals…

Week 4 All Students Posts – 54 Pages

Security Organizations – 27 Pages

Discuss some of the organizations dedicated to information security. Explain these organizations’ missions and goals. Is there an organization dedicated to wireless security? If so, please describe the organization and its goals…

NIST – National Institute of Standards and Technology

  • The information system security policy should directly address the use of 802.11, Bluetooth, and other wireless technologies.
  • Configuration/change control and management practices should ensure that all equipment has the latest software release, including security feature enhancements and patches for discovered vulnerabilities.
  • Standardized configurations should be employed to reflect the security policy, and to ensure change of default values and consistency of operations.
  • Security training is essential to raise awareness about the threats and vulnerabilities inherent in the use of wireless technologies.

Robust cryptography is essential to protect data transmitted over the radio channel, and theft of equipment is a major concern…

Securing the WLAN – 27 Pages

How have the IEEE 802.11 security mechanisms for wireless networks fallen far short of their goal? What are the vulnerabilities?  How did WPA fix the problem in WEP?

WPA (Wi-Fi Protected Access) includes built in authentication support. WEP does not offer this. Additionally, WPA uses two encryption standard technologies: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). TKIP enhances WEP by adding a per-packet key mixing function to de-correlate the public initialization vectors (IVs) from weak keys. TKIP also enhances WEP by adding a re-keying mechanism to provide fresh encryption and integrity keys which makes TKIP protected networks more resistant to cryptanalytic attacks involving key reuse. AES is a data encryption scheme which uses three different key sizes (128-bit, 192-bit, and 256-bit). AES was adopted by the U.S. government in 2002 as the encryption standard for protecting sensitive but unclassified electronic data…

NETW563 Wireless Networks Course

Week 5 All Students Posts – 52 Pages

SNMP – 26 Pages

SNMP is a protocol that allows computers and network equipment to gather data about network performance. It is part of the TCP/IP protocol suite. Discuss the role of a software agent in SNMP, and explain the purpose of the MIB. Explain how the SNMP management station gathers data, and describe the types of data that it collects and stores. Discuss how this information can be used for monitoring.

The SNMP manager sends query request to SNMP agents with correct credentials. The agents then gather information about the local system and store them in a format that can be queried from a continuous updated database called MIB (management information base). The SNMP agent then configures which SNMP managers have access to the information and can also act as in intermediary to report information on devices it can connect to that are not configured for SNMP traffic. Some of the commands that the agents use to collect the data is GetRequest, GetNextRequest, and GetBulkRequest…

Troubleshooting – 26 Pages

Define the term troubleshooting. What does it mean to you? Discuss why troubleshooting wireless networks can be more challenging than troubleshooting wired networks. Please back up your posts with supporting evidence.  When you are in the networking domain, you will hear the term “troubleshooting” a lot. What does it mean in particular?  Which is more challenging to troubleshoot, wireless or wired networks and why?

Troubleshooting means that there is a “problem” and now you have start looking into it to identify the actual issue and then work on resolving that issue.

Wired Networks can be easier to troubleshoot than wireless networks because there are actual parts connecting devices together instead of dead air.  Wired networks are not a maze of antennas, signal strengths and fading.   You can see and trace the problem from device to another with minor stress.

Wireless networks require you to dig deeper into them to find out where the problem lays.  We know that it is not a cable that connects them all together so we can either diagnose the cables that are each individual device, the signal between the devices or something internal to each device.

Security can also be taken out for the most part in a wired network.  If you can see the wires of the network then you can assume that no one is physically inside your system. Wireless networks open avenues for people to try and gain access without even being by the devices…

NETW563 Wireless Networks Course

Week 6 All Students Posts – 57 Pages

Getting to 4G – 29 Pages

Is the United States on track for 4G deployment? What barriers do you foresee preventing widespread acceptance and deployment?  What is the evolution of cellular technology?  What are the current 3G technologies?

1G technology started back in the 1980s and operated off the AMPS, NMT, and TACS network. This established the mobile connectivity between devices and mobile voice services.

2G technology started back in the 1990 in operated off the D-AMPS, GSM/GPRS, cdmaOne network. 2G allowed more voice capacity on the network. On 1G, you were only allow to have one user per channel but on 2G, you could have up to 8 users per channel. cdmaOne was the foundation of 3G

3G started around the 2000s and operated on the CDMA2000/EV-DO, WCDMA/HSPA+, TD-SCDMA networks. 3G allowed users to use internet on there mobile devices and broadband in there homes. 2G had speeds of up to <0.5 Mbps while 3G you could get up to 14.7 Mbps.

4G started around the 2010s and operate on the LTE and LTE Advance networks. 4G provides more data capacity for richer content. 4G spans out to international mobility for users…

The Future of Satellite Radio – 28 Pages

In 2008, XM and Sirius Radio were allowed to merge. Why did the FCC allow this merger? What is the future of this technology?  Why did the FCC reverse course and allow this merger?  Is satellite radio still a valid business model? Do you use it?

The FCC decided to let the company merge because “The Merger is in the public interest and will provide consumers with greater flexibility and choices”. There were some guidelines in place in order for them to merger. First there prices has to remain with the same prices for three years and that 8% of channels for noncommercial programmers. The future of Satellite radio is very slim. I know personally I don’t use satellite radio because I have my iPod connected to my car, so I can listen to what every playlist I want to for free without having to pay a monthly subscription. Majority of America now stream music to their phones and download music digitally…

NETW563 Wireless Networks Course

Week 7 All Students Posts – 53 Pages

Traffic Shaping – 25 Pages

What is traffic shaping? Why is traffic shaping a controversial topic?  Has traffic shaping been applied to wireless networks?  What is the reasoning behind traffic shaping in the wireless world?

Traffic shaping, also known as “packet shaping,” is the practice of regulating network data transfer to assure a certain level of performance, quality of service (QoS) or return on investment (ROI). The practice involves delaying the flow of packets that have been designated as less important or less desired than those of prioritized traffic streams.

Traffic shaping is very important because this helps regulate getting important information over the network quicker than data that is not important. Also, ISP can use it to limit bandwidth for customers so that they can sell it and gain more customers for the network…

Wireless Network Planning – 28 Pages

In a cellular or PCS network, what are some of the areas where traffic engineering comes into play? For example, one could use traffic engineering to determine the number of trunks needed to backhaul wireless traffic from the MSC to the PSTN. What are some other points in the network that should be sized?  What is Traffic Engineering? Where is it mainly done at a cellular network? How does traffic engineering help our network?

Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network. This helps the network by minimize or eliminate high-loss situations and balance the QoS (Quality of Service) against the cost of operating and maintaining the network…

NETW563 Wireless Networks Course

Final Exam

(TCO A) An access point has a(n) _____ interface that allows it to connect to a wired network. (Points : 5)





(TCO A) How often an event occurs can create different ______. (Points : 5)




gigapops (GPS)

(TCO B) What is not an advantage of LEO satellites over GEO satellites? (Points : 5)

Require fewer hand-off

Reduced propagation delay

Coverage can be better localized

Better conservation of spectrum

(TCO C) _____ is a group of wireless devices that is served by a single access point (AP). (Points : 5)

Basic Service Set

Ad hoc mode

Extended Service Set

Independent Service Set

(TCO D) Each of the following are locations in which businesses install wireless networks for increased employee productivity except (Points : 5)



common areas.

Remote parking lots.

 (TCO E) Guarding the availability of information is achieved by (Points : 5)

access control.

closed system authentication.

wireless protection environment (WPE).

frame count check (FCC).

(TCO F) What is the equivalent of one Erlang? (Points : 5)

60 call seconds

36 centum call seconds

3600 centum call seconds

1 minute

(TCO G) _____ provides users the freedom to roam beyond their home subnets while still maintaining their home IP addresses. (Points : 5)

Mobile IP



Routing Initiation Protocol (RIP)

(TCO A) What is polarization, and why is it important to WLANs? (Points : 30)

Polarization is an expression of the manner by which the lines of electric flux are oriented in…

(TCO B) In cellular systems, what are the two types of channels used between the mobile unit and the base station? What are their functions? (Points : 30)

The two types of channels are the control and traffic channels.  Control channels are used for exchanging…

(TCO C) Explain how power management functions on an infrastructure network. (Points : 30)

The access point controls power management in an infrastructure network. In this regard,…

(TCO D) When would you recommend using a thin access point over a fat access point? (Points : 30)

I would recommend using a thin access point when cost is an issue because…

(TCO E) What is a man-in-the-middle attack, and how can one be launched against a wireless network? (Points : 30)

A man-in-the-middle attack is defined as follows:

“[An activity] in which a malicious user inserts himself between two…

(TCO E) What is a dictionary attack? (Points : 30)

A dictionary attack is “a technique or method used to breach the computer security of a password-protected…

(TCO F) Blocked calls can be handled in two ways. Describe the two methods of handling blocked calls. (Points : 30)

Two ways of blocking phone calls are the following:

To get the carriers help by availing of features that would enable the blocking…

(TCO G) Explain how Simple Network Management Protocol collects data and the type of data that is gathered. (Points : 30)

The simple network management protocol is the central network system that monitors…

NETW563 Wireless Networks Course