S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W]

scalability of AAA
scope of WLAN as architectural component
Scott, Bruce 2nd
secondary users
security
     alerts
     as architectural component
     as reason for guest network deployment
     authentication 2nd
         EAP
     client security
     encryption
     Griffith University case study
     hashing
     IDSs
     Lifespan case study
     manufacturing industry case study
     mobile devices
     network admission control
security management
security models
     encryption and authentication with overlay security solutions
     machine-based authentication
     native authentication only
     native encryption and authentication
     native encryption only
     no authentication, encryption, or hashing
     user-based authentication
security policies, defining
security settings management
     centralized self-service model
     manual client configuration
     profiles
     standardization
     third-party wireless software
selecting
     discount rate
     inhouse versus outsourced deployment
self-actualization
self-healing WLANs
self-throttling throughput strategy
service and support
     Cisco four-tier support model
     cost of
session layer
signal strength requirements, assessing
signal strength, Griffith University education case study
single points of failure, effect on scalability
site surveys
     Griffith University case study
     Lifespan healthcare case study
"Smart Zones,"
     Griffith University education case study
sniffing
SNMP (Simple Network Management Protocol)
soft benefits
software, third-party
solutions lifecycle
     planning phase
         architecture scalability
         defining high-level program plan
         documenting project stakeholders
         identifying users
         impact on application portfolio
         security strategy
     preparation phase
         environmental factors
         funding
         identifying scope of deployment
         infrastructure requirements 2nd
SOX (Sarbanes-Oxley Act)
SSIDs (Service Set Identifiers)
     on guest networks
SSO (single sign-on)
stakeholders
standard business applications
standard user class
standardization
standards
     coexistence
     IEEE 802.11a
     IEEE 802.11b
     IEEE 802.11g
         pre-ratification
star topology
storage assets
strategic value of wireless networking
subscription-funded deployment strategies
sunk costs
supplementary services
     video
     voice
syslog




The Business Case for Enterprise-Class Wireless Lans
The Business Case for Enterprise-Class Wireless LANs
ISBN: 1587201259
EAN: 2147483647
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net