The Business Case for Enterprise-Class Wireless LANs

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W]

MAC sublayer

machine-based authentication

malicious hackers, profile of

man-in-the-middle attacks

management strategies

     for clients

     for infrastructure

     in-house management

     outsourced management

     user expectations of WLAN video

management tools

     third-party WLAN management tools

     vendor-specific WLAN management tools

manual site surveys

manufacturing industry

    case study

         business model 2nd

         coverage

         guest access

         rogue AP detection

         security concerns

         throughput

         VoIP

         WLAN deployment

     deploying WLAN location services

     Value Chain framework, identifying key application areas

Maslow, Abraham

measuring benefits of WLAN deployment on university setting

medical industry, interference standards

Meetinghouse Data Communications

mesh topology

Microsoft Excel, calculating NPV

minimizing AP signal strength

mitigating security threats

     with authentication 2nd

         802.11i standard

         802.1x

         WPA

     with encryption

     with hashing, TKIP

mobile devices, securing

mobile endpoints

     intermittent connectivity

mobile user class

mobility

     as benefit of WLANs

     value of 2nd

modulation

monetized productivity benefit per WLAN, calculating

multipath

multiple access WLAN technologies

multiplex technologies, DSSS

     OFDM

Категории