M



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W]

MAC sublayer
machine-based authentication
malicious hackers, profile of
man-in-the-middle attacks
management strategies
     for clients
     for infrastructure
     in-house management
     outsourced management
     user expectations of WLAN video
management tools
     third-party WLAN management tools
     vendor-specific WLAN management tools
manual site surveys
manufacturing industry
    case study
         business model 2nd
         coverage
         guest access
         rogue AP detection
         security concerns
         throughput
         VoIP
         WLAN deployment
     deploying WLAN location services
     Value Chain framework, identifying key application areas
Maslow, Abraham
measuring benefits of WLAN deployment on university setting
medical industry, interference standards
Meetinghouse Data Communications
mesh topology
Microsoft Excel, calculating NPV
minimizing AP signal strength
mitigating security threats
     with authentication 2nd
         802.11i standard
         802.1x
         WPA
     with encryption
     with hashing, TKIP
mobile devices, securing
mobile endpoints
     intermittent connectivity
mobile user class
mobility
     as benefit of WLANs
     value of 2nd
modulation
monetized productivity benefit per WLAN, calculating
multipath
multiple access WLAN technologies
multiplex technologies, DSSS
     OFDM




The Business Case for Enterprise-Class Wireless Lans
The Business Case for Enterprise-Class Wireless LANs
ISBN: 1587201259
EAN: 2147483647
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net