| | Copyright |
| | About the Authors |
| | About the Technical Reviewers |
| | Acknowledgments |
| | Icons Used in This Book |
| | Command Syntax Conventions |
| | Introduction |
| | Chapter 1. Introduction to Wireless LAN Technologies |
| | | Value of Mobility |
| | | OSI Layers and WLANs |
| | | A Brief History of WLANs |
| | | How Wireless Networks Function |
| | | Summary |
| | | Endnotes |
| | Chapter 2. Business Considerations |
| | | Aligning Technology Solutions with Business Considerations |
| | | Economic Considerations |
| | | The Role of Infrastructure |
| | | Measuring the Business Value of Deploying Wireless |
| | | Summary |
| | Chapter 3. Preparation and Planning |
| | | Solutions Lifecycle |
| | | Preparation |
| | | Planning |
| | | Summary |
| | Chapter 4. Supplementary and Complementary Services |
| | | Voice |
| | | Video |
| | | Guest Networking |
| | | WLAN Location Services |
| | | Summary |
| | | Additional Resources |
| | Chapter 5. Guidelines for A Successful Architecture and Design |
| | | Architectural Considerations |
| | | Design Considerations |
| | | Environmental Considerations |
| | | Summary |
| | Chapter 6. Wireless LAN Deployment Considerations |
| | | In-House Deployment Versus Outsourced Deployment |
| | | Architectural Milestones |
| | | Deployment Dependencies |
| | | Management |
| | | Support |
| | | Deploying the WLAN |
| | | WLAN Controller Configuration |
| | | WLAN Controller Installation |
| | | Deployment Checklist |
| | | Summary |
| | Chapter 7. Security and Wireless LANs |
| | | Wireless Security in Your Enterprise |
| | | WLAN Security Threats |
| | | Wireless Security Mitigation Techniques |
| | | Building a Secure WLAN |
| | | Summary |
| | Chapter 8. Management Strategies for Wireless LANs |
| | | Solutions Lifecycle |
| | | Management Strategies |
| | | FCAPS |
| | | Comparing Centralized and Distributed Management |
| | | WLAN Management |
| | | Challenges Unique to WLAN Management |
| | | Security Settings Management |
| | | WLAN Reporting and Alerting |
| | | Management Tools |
| | | Summary |
| | Chapter 9. Enterprise Case Study |
| | | Business Model |
| | | Technology Considerations |
| | | Enhanced Services |
| | | Security |
| | | Deployment and Implementation |
| | | Ongoing Project Management and Process |
| | | Business Benefits of the Solution |
| | | What the Future Holds |
| | | Summary |
| | | Endnotes |
| | Chapter 10. Healthcare Case Study |
| | | Business Model |
| | | Technology Considerations |
| | | Project Management and Process |
| | | What the Future Holds |
| | | Summary |
| | Chapter 11. Manufacturing Case Study |
| | | Business Model |
| | | Technology Considerations |
| | | Deployment |
| | | What the Future Holds |
| | | Summary |
| | Chapter 12. Education Case Study |
| | | Business Model |
| | | Architectural Principles |
| | | Network Management |
| | | Service and Support |
| | | Client Management |
| | | Security and Rogue AP Detection |
| | | Deployment and Implementation |
| | | Ongoing Project Management and Process |
| | | Challenges |
| | | Lessons Learned and Recommendations |
| | | Measuring the Benefits |
| | | What the Future Holds |
| | | Summary |
| | Appendix A. Wireless LAN Standards Reference |
| | Appendix B. Wireless LAN Security References |
| | | Cisco Resources |
| | | WEP |
| | | WPA |
| | | WPA2 |
| | | 802.1x |
| | | EAP Types |
| | | Vulnerabilities |
| | Appendix C. Example Project Plan for an Enterprise-Class WLAN Deployment |
| | | Company Background |
| | | The Project Plan |
| | | Summary |
| | Glossary |
| | | Numbers |
| | | A |
| | | B |
| | | C |
| | | D |
| | | E |
| | | F |
| | | G |
| | | H |
| | | I |
| | | K |
| | | L |
| | | M |
| | | O |
| | | P |
| | | Q |
| | | R |
| | | S |
| | | T |
| | | U |
| | | V |
| | | W |
| | Index |