Richard's Plumbing Co. has rapidly grown to become a multi-state business, and it has recently acquired Mr. Plumber, a smaller company with multiple outlets located in the same states. Each of the companies has its own data network. Mr. Plumber's network connects the field offices with the databases at the main office. During its earlier expansion, Richard's Plumbing implemented a network solution that provides mobile access to the customer database for the employees who respond to customer calls. Richard's employees currently use laptops with wireless access cards with prepaid air time. With the acquisition of Mr. Plumber, Richard's wants to put all employees on one network and give them wireless access directly into the customer database. They would like to reduce the size of the equipment that employees must carry with them and eliminate the use of air cards.

list and define the requirements
create the project steps that need to be completed
identify the technology that needs to be incorporated
identify issues and security risks
explain how testing will be done to ensure that requirements are met and the wireless network is secure.

Requirements:

1. Network Integration: The ability to connect all employees, including those from Mr. Plumber, to a single network.
2. Wireless Access: Provide wireless access to the customer database for all employees.
3. Device Optimization: Reduce the size and number of devices employees need to carry.
4. Cost Reduction: Eliminate the need for prepaid air cards.

Project Steps:
1. Assess Current Network Infrastructure: Evaluate the existing networks of both Richard's Plumbing Co. and Mr. Plumber to identify compatibility and connectivity issues.
2. Design a Unified Network Architecture: Develop a network design that integrates both companies' networks while ensuring secure connectivity across multiple locations.
3. Upgrade Network Hardware: Procure and install new networking equipment, such as routers, switches, and wireless access points, to support the unified network.
4. Migrate Data: Transfer the customer database from Mr. Plumber's network to Richard's Plumbing Co.'s network, ensuring data integrity and minimal downtime.
5. Implement Wireless Access: Set up wireless access points and configure secure access protocols to allow employees to connect to the customer database wirelessly.
6. Device Consolidation: Evaluate and select suitable devices, such as tablets or smartphones, that can replace laptops and air cards, while meeting the requirements of accessing the customer database.
7. Deploy New Devices: Distribute the selected devices to employees and provide necessary training to ensure a smooth transition.
8. Monitor and Optimize: Regularly monitor and optimize the network performance to address any issues or bottlenecks that may arise.

Technology Requirements:
1. Networking Equipment: Routers, switches, and wireless access points to support the unified network infrastructure.
2. Wireless Access: Secure wireless access points with authentication protocols, such as WPA2, to provide access to the customer database.
3. Device Consolidation: Tablets or smartphones capable of securely accessing the customer database.

Issues and Security Risks:
1. Network Compatibility: Ensuring seamless integration between Richard's Plumbing Co. and Mr. Plumber's networks may present technical challenges.
2. Data Security: Protecting customer data from unauthorized access during network integration and wireless access implementation.
3. Device Security: Ensuring the security of the selected devices and implementing measures to safeguard against device theft or loss.

Testing the Wireless Network's Security and Meeting Requirements:
1. Penetration Testing: Conduct security assessments to identify vulnerabilities and weaknesses in the wireless network, including attempts to gain unauthorized access.
2. Authentication and Encryption Testing: Verify that appropriate authentication methods, such as username-password or certificate-based authentication, are working correctly. Test encryption protocols, such as WPA2, to ensure data transmission security.
3. Network Performance Testing: Evaluate the network's performance, including data transfer speeds and latency, to ensure it meets the required levels for efficient access to the customer database.
4. User Acceptance Testing: Engage a group of employees to perform real-world tasks on the wireless network and provide feedback on its usability, effectiveness, and security.
5. Ongoing Monitoring: Implement continuous network monitoring to identify and address any security threats or performance issues that may arise.