Step 4: Prepare a SWOT Analysis Table You’ve identified the technologies and devices, and listed the goals and objectives for their use in the organization. In this step, you will justify adding these devices and technologies to the network infrastructure. In order to do this, perform a strengths, weaknesses, opportunities, and threats (SWOT) analysis of each device/technology being introduced into the infrastructure. A SWOT analysis is a framework that allows you to identify internal and external factors that can affect the implementation of new technology. Such a process can be helpful for decision making and strategic planning. Look at internal and external factors that could influence the successful introduction with respect to the company specific business model and operations. Internal factors are the strengths and weaknesses you found. External factors are the opportunities and threats identified during the SWOT analysis. Determine what these are. Address the following questio

IPv6 and IoT SWOT Analysis

The integration of any new technology into an existing information system must be economically and technologically justified. A SWOT analysis could be a perfect strategy to justify the impact of the IPv6 protocol on ShareStream’s information system. The SWOT analysis of IPv6 protocols is carried out in the table below to justify its implementation in ShareStream’s information systems.

IPv6 SWOT Analysis Table 

Strengths:

 

o        The IPv6 protocol has a significantly larger address space (Kunc et al., 2012). As such, it allows unlimited growth of the number of internet users, a key factor in the continued economic growth of an organization.

o        The IPv6 protocol improves routing effectiveness by decreasing the size of routing tables through the hierarchical arrangement of address space (Kunc et al., 2012). As a result, the period of functioning of the system equipment increases.

o        The IPv6 protocols improve the effectiveness of the functioning of multimedia applications by providing a direct connection between optional nodes (Kunc et al., 2012). There is also enhanced security due to improved quality of services and mobility of system nodes.

 

 

Opportunities:

 

o        The IPv6 protocols offer the possibility of developing improved applications that may improve the operations of ShareStream’s information systems, thus delivering economic value.

o        The IPv6 protocols provide an opportunity to surrender some of the operations to the network layer, thus lowering information systems services costs (Kunc et al., 2012). For instance, privacy, integrity, and authentication of data could be achieved by AH and ESP protocols under IPv6.

o        The IPv6 protocols support the mobility of nodes, offering an opportunity for ShareStream to accelerate the fusion of services (Kunc et al., 2012). As such, employees could run business services from anywhere while accessing business-level features.

Weaknesses:

 

o        The IPv6 protocols are not directly compatible with the IPv4 protocols (Kunc et al., 2012). Thus, there is a need to ensure the compatibility of all the hardware and software with this new version of internet protocols, which may cost the organization.

o        The sensibility of replacing IPv4 protocols with IPv6 protocols has raised doubt among some internet users (Kunc et al., 2012). Some users prefer IPv4 protocols since it has proven to be quite adjustable. It may take some effort to convince such users of the usefulness of IPv6 protocols over IPv4 protocols.

 

Threats:

 

o        There is a threat of incompatibility and a lack of support for IPv6 protocols for individual functionalities (Kunc et al., 2012). As such, there is a likelihood that the deployment of protocols could present challenges.

o        Deployment of IPv6 protocols may take longer, be costlier, and increase the security risk of the existing information systems due to lack of experience and insufficient enlightenment of the users (Kunc et al., 2012). Additionally, the staff may be an obstacle in implementing the IPv6 protocols due to a lack of education.

 

 

The Internet of Things (IoT) technology collects, analyzes, and uses data to derive a useful business output. While some organizations see the value of this technology and have already implemented it in their operations, others are skeptical about the technology’s security concerns. A SWOT analysis could justify the implementation of the Internet of Things technology while pointing out areas that the business should be keen on.

IoT SWOT Analysis Table 

Strengths:

 

v    IoT technology is useful in streamlining business operations by intelligently prioritizing important operations while halting others (Frue, 2019). As such, most efforts will be directed to the most critical tasks in optimizing business operations.

v    IoT technology sav

Our Advantages

Quality Work

Unlimited Revisions

Affordable Pricing

24/7 Support

Fast Delivery

Order Now

Custom Written Papers at a bargain