Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] scalability of AAA scope of WLAN as architectural component Scott, Bruce 2nd secondary users security alerts as architectural component as reason for guest network deployment authentication 2nd EAP client security encryption Griffith University case study hashing IDSs Lifespan case study manufacturing industry case study mobile devices network admission control security management security models encryption and authentication with overlay security solutions machine-based authentication native authentication only native encryption and authentication native encryption only no authentication, encryption, or hashing user-based authentication security policies, defining security settings management centralized self-service model manual client configuration profiles standardization third-party wireless software selecting discount rate inhouse versus outsourced deployment self-actualization self-healing WLANs self-throttling throughput strategy service and support Cisco four-tier support model cost of session layer signal strength requirements, assessing signal strength, Griffith University education case study single points of failure, effect on scalability site surveys Griffith University case study Lifespan healthcare case study "Smart Zones," Griffith University education case study sniffing SNMP (Simple Network Management Protocol) soft benefits software, third-party solutions lifecycle planning phase architecture scalability defining high-level program plan documenting project stakeholders identifying users impact on application portfolio security strategy preparation phase environmental factors funding identifying scope of deployment infrastructure requirements 2nd SOX (Sarbanes-Oxley Act) SSIDs (Service Set Identifiers) on guest networks SSO (single sign-on) stakeholders standard business applications standard user class standardization standards coexistence IEEE 802.11a IEEE 802.11b IEEE 802.11g pre-ratification star topology storage assets strategic value of wireless networking subscription-funded deployment strategies sunk costs supplementary services video voice syslog |