Provide a 15 pages analysis while answering the following question: Airport Terminal Hotspot Wireless Network. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. When designing a wireless point to point connectivity, the distance is always considered due to limitation of wireless technology. Cost is also a major factor when implementing and designing a wireless network. There are two methodologies that can be adopted for connecting all 10 sites to provide Internet connectivity.The first step is to deploy a local area network. A simple definition available on the business source database defines it as (Local area network. 2011) “A network that links nearby computers to one another. A local area network (LAN) is usually used to connect computers in the same room or on the same floor of a building, and often forms part of a much bigger corporate network” The second step will be to identify the requirements. This will include the network devices and functionality for fulfilling the requirements for the airport staff and passengers. The justification of the selected computing devices and network equipment is required. The third step includes network design. The design will clearly identify, floor connections, office connections, servers, workstations, printers, scanners, and cable types. The fourth step is to implement a wireless Wide Area Network (WWAN).For catering to the needs of Airport Terminal Hotspot Wireless Network, there is a requirement of secure and effective wireless network connectivity for all the required areas of the airport. Moreover, security is a primary concern, as data channels will be established in the environment. For addressing the security issue, Cisco provides rich features and adds an extra layer of security on the wireless networks. The embedded security technologies on a wireless architecture are now standardized, as they are available by default in all vendor manufactured wireless devices. Some of these technologies are WEP, WPA, etc. Moreover, after securing the data in transit by encryption, we have also proposed a wireless intrusion prevention system.