Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] target audience of WLAN as architectural component TCO (total cost of ownership) per user Value Chain framework identifying key application areas identifying secondary application areas TDMA (Time Division Multiple Access) technical support tertiary institutions testing APs third-party tools wireless client software WLAN management tools threats to security interception mitigating with authentication 2nd with encryption with hashing rogue APs three-tiered service and support system, Griffith University case study throughput, self-throttling strategy tiered support structure 2nd time division duplexing TKIP (Temporal Key Integrity Protocol) top-down approach to facilitating value creation process 2nd topological considerations for WLAN deployment topologies, Griffith University education case study total productivity benefit of WLANs, calculating tracking and telemetry, Lifespan healthcare case study traffic, sniffing transactional processes transmit channels transport and shipping companies, deploying WLAN location services transport assets transport layer traveling employee productivity benefits, calculating trend reporting 2nd trusted WLANs 2nd types of WLAN users |