The Business Case for Enterprise-Class Wireless LANs

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W]

scalability of AAA

scope of WLAN as architectural component

Scott, Bruce 2nd

secondary users

security

     alerts

     as architectural component

     as reason for guest network deployment

     authentication 2nd

         EAP

     client security

     encryption

     Griffith University case study

     hashing

     IDSs

     Lifespan case study

     manufacturing industry case study

     mobile devices

     network admission control

security management

security models

     encryption and authentication with overlay security solutions

     machine-based authentication

     native authentication only

     native encryption and authentication

     native encryption only

     no authentication, encryption, or hashing

     user-based authentication

security policies, defining

security settings management

     centralized self-service model

     manual client configuration

     profiles

     standardization

     third-party wireless software

selecting

     discount rate

     inhouse versus outsourced deployment

self-actualization

self-healing WLANs

self-throttling throughput strategy

service and support

     Cisco four-tier support model

     cost of

session layer

signal strength requirements, assessing

signal strength, Griffith University education case study

single points of failure, effect on scalability

site surveys

     Griffith University case study

     Lifespan healthcare case study

"Smart Zones,"

     Griffith University education case study

sniffing

SNMP (Simple Network Management Protocol)

soft benefits

software, third-party

solutions lifecycle

     planning phase

         architecture scalability

         defining high-level program plan

         documenting project stakeholders

         identifying users

         impact on application portfolio

         security strategy

     preparation phase

         environmental factors

         funding

         identifying scope of deployment

         infrastructure requirements 2nd

SOX (Sarbanes-Oxley Act)

SSIDs (Service Set Identifiers)

     on guest networks

SSO (single sign-on)

stakeholders

standard business applications

standard user class

standardization

standards

     coexistence

     IEEE 802.11a

     IEEE 802.11b

     IEEE 802.11g

         pre-ratification

star topology

storage assets

strategic value of wireless networking

subscription-funded deployment strategies

sunk costs

supplementary services

     video

     voice

syslog

Категории