Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] AAA (authentication, authorization, and accounting) access access layer (hierarchical networks) access points versus access layer access technologies accounting management ACS (Cisco Secure Access Control Servers) ACU (Aironet Client Utility) ad-hoc WLAN networks AES (Advanced Encryption Standard) aggregate annualized monetary benefit, calculating alerts analytical processes AP (access points) client-to-AP ratio 2nd configuring Griffith University case study 2nd directional antennas installing Layer 2 address spoofing, preventing management policy, implementing outdoor coverage physical security rogue 2nd detecting 2nd responding to securing 2nd signal strength minimizing SSID testing application layer application matrices architectural guidelines checklist defining scope of WLAN deployment timeframe infrastructure requirements Lifespan case study operational support structure, establishing requirements, assessing 802.11 standards, assessing client-to-AP ratio global naming standards radio cell architecture roaming signal strength topology security posture 2nd target audience of WLAN understanding goal of WLAN ASD (application specific devices) assessing WLAN architecture requirements 802.11 standards client-to-AP ratio global naming standards radio cell architecture roaming signal strength topology asset tags 2nd battery life assets, TCO per-user Value Chain framework attenuation authentication 2nd 802.11i 802.1x EAP machine-based mitigating security threats 2nd user-based WPA automatic site surveys autonomous AP architecture availability of AAA average monthly benefit per user, calculating |