1.How can implementing a wireless network be helpful in a disaster recovery event? What type(s) of wireless network would work in this instance?
2. There are different channels and frequencies which are utilized in typical 802.11x WiFi configurations, specifically in the 2.4GHz and 5GHz ranges. However, there are challenges involved in designing the layout of AP’s in an organization so that there is little signal overlap and signal loss.

For this discussion, review and consider the pro’s and con’s of 2.4GHz vs. 5GHz, and channel use in each range. Either using your current organization or one you are familiar with, determine and discuss how the channel and frequency range may best be implemented. Support your reasoning with external sources.

3. Wireless technologies involve much more than your typical Wi-Fi. Bluetooth has been around for a long time as well.

Implementing a wireless network

Implementing a wireless network

Supported by reliable, outside, academic, or peer-reviewed information, explain what are some of the limitations of Bluetooth technology?
What other wireless technologies exist and are often used in business?
4. There are many different 802.11x standards, each of which offers different performances and benefits.

For the discussion this week, identify and discuss in a 150-200-word response, supported by reliable, outside, academic, or peer-reviewed information, the current 802.11x standard and how it differs from previous versions.
Why do we continue to change the standards so frequently?
A couple of helpful resources are below:
MicrowaveJournal.com – Understanding-ieee-80211-and-wi-fi-standards
Wirelesstrainingsolutions.com – Future-fi-the-road-to-802-11-2020-and-beyond

5. Supported by reliable, outside, academic, or peer-reviewed information:
Discuss how wireless bridges and repeaters can expand functionality of WLANs and
How wireless controllers can simplify the management of WLANs.

6. Wireless network security is a very big topic as we always seem to be connected on our computers and mobile devices. There are a number of possible attack vectors which can give a bad actor access to or visibility of a connected device.

For this discussion, supported by reliable, outside, academic or peer-reviewed information:
Research a current security risk impacting mobile devices or computers connected over WiFi networks.
Address where the risks exist and recommendations for protecting devices
7. Supported by reliable, outside, academic or peer-reviewed information:
Define radio frequency identification (RFID) and near field communication (NFC)
Explain the challenges and security considerations of RFID and NFC.