1. Trang chủ
  2. » Công Nghệ Thông Tin

Cisco press the business case for enterprise class wireless LANs may 2006 ISBN 1587201259

664 77 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

The Business Case for Enterprise-Class Wireless Lans By H David Castaneda, Oisin Mac Alasdair, Christopher A L Vinckier Publisher: Cisco Press Pub Date: May 16, 2006 Print ISBN-10: 1-58720-125-9 Print ISBN-13: 978-1-58720-125-7 Pages: 456 Table of Contents | Index A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLANfrom security and architecture to deployment and application Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN This volume is in the Network Business Series offered by Cisco Press® Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies The Business Case for Enterprise-Class Wireless Lans By H David Castaneda, Oisin Mac Alasdair, Christopher A L Vinckier Publisher: Cisco Press Pub Date: May 16, 2006 Print ISBN-10: 1-58720-125-9 Print ISBN-13: 978-1-58720-125-7 Pages: 456 Table of Contents | Index Copyright About the Authors About the Technical Reviewers Acknowledgments Icons Used in This Book Command Syntax Conventions Introduction Chapter 1 Introduction to Wireless LAN Technologies Value of Mobility OSI Layers and WLANs A Brief History of WLANs How Wireless Networks Function Summary Endnotes Chapter 2 Business Considerations Aligning Technology Solutions with Business Considerations Economic Considerations The Role of Infrastructure Measuring the Business Value of Deploying Wireless Summary Chapter 3 Preparation and Planning Solutions Lifecycle Preparation Planning Summary Chapter 4 Supplementary and Complementary Services Voice Video Guest Networking WLAN Location Services Summary Additional Resources Chapter 5 Guidelines for A Successful Architecture and Design Architectural Considerations Design Considerations Environmental Considerations Summary Chapter 6 Wireless LAN Deployment Considerations In-House Deployment Versus Outsourced Deployment Architectural Milestones Deployment Dependencies Management Support Deploying the WLAN WLAN Controller Configuration WLAN Controller Installation Deployment Checklist Summary Chapter 7 Security and Wireless LANs Wireless Security in Your Enterprise WLAN Security Threats Wireless Security Mitigation Techniques Building a Secure WLAN Summary Chapter 8 Management Strategies for Wireless LANs Solutions Lifecycle Management Strategies FCAPS Comparing Centralized and Distributed Management WLAN Management Challenges Unique to WLAN Management Security Settings Management WLAN Reporting and Alerting Management Tools Summary Chapter 9 Enterprise Case Study Business Model Technology Considerations Enhanced Services Security Deployment and Implementation Ongoing Project Management and Process Business Benefits of the Solution What the Future Holds Summary Endnotes Chapter 10 Healthcare Case Study Business Model Technology Considerations Project Management and Process What the Future Holds Summary Chapter 11 Manufacturing Case Study Business Model Technology Considerations Deployment What the Future Holds Summary Chapter 12 Education Case Study Business Model Architectural Principles Network Management Service and Support Client Management Security and Rogue AP Detection Deployment and Implementation Ongoing Project Management and Process Challenges Lessons Learned and Recommendations Measuring the Benefits What the Future Holds Summary Appendix A Wireless LAN Standards Reference Appendix B Wireless LAN Security References Cisco Resources WEP WPA WPA2 802.1x EAP Types Vulnerabilities Appendix C Example Project Plan for an Enterprise-Class WLAN Deployment Company Background The Project Plan Summary Glossary Numbers A B C D E F G H I K L M O P Q R S T U V W Index Copyright The Business Case for Enterprise-Class Wireless LANs H David Castaneda, Oisin Mac Alasdair, Christopher A L Vinckier Copyright® 2006 Cisco Systems, Inc Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing May 2006 Library of Congress Cataloging-in-Publication Number: 2004104127 Warning and Disclaimer This book is designed to provide information about wireless LANs Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information is provided on an "as is" basis The authors, Cisco Press, and Cisco Systems, Inc., shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it The opinions expressed in this book belong to the authors and are not necessarily those of Cisco Systems, Inc Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community Readers' feedback is a natural continuation of this process If you have any comments regarding how we could improve the quality of this book or otherwise alter it to better suit your needs, you can contact us through e-mail at feedback@ciscopress.com Please make sure to include the book title and ISBN in your message We greatly appreciate your assistance Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Cisco Press or Cisco Systems, Inc cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark Publisher Paul Boger Cisco Representative Anthony Wolfenden Cisco Press Program Manager Jeff Brady Executive Editor Mary Beth Ray Production Manager Patrick Kanouse Development Editor Dayna Isley Senior Project Editor San Dee Phillips Copy Editor Ben Lawson Publishing Technical Editors John Elliott, Fred Niehaus, Jack Unger Editorial Assistant Raina Han Book and Cover Designer Louisa Adair Composition Mark Shirar Indexer Tim Wright Proofreader Karen A Gill Dedications We dedicate this book to our parents, spouses, and children Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] patient tracking and telemetry, Lifespan healthcare case study "pay as you go" deployment strategy payback period calculating PCAOB (Public Company Accounting Oversight Board) peer layers per-user TCO performance management performing site surveys for Lifespan healthcare WLAN phases of deployment, Griffith University case study physical layer physical locations physical security of office space placement of WLANs planning phase of solutions lifecycle architecture scalability defining high-level program plan design considerations documenting project stakeholders environmental considerations governmental regulations identifying users impact on application portfolio security strategy PMBOK (Project Management Body of Knowledge) PoE (Power over Ethernet) Porter, Michael E Post Implementation Review post-installation acceptance test PPDIOO solutions lifecycle 2nd planning phase architectural considerations 2nd 3rd defining high-level program plan design considerations documenting project stakeholders environmental considerations governmental regulations identifying users impact on application portfolio security strategy preparation phase environmental factors funding strategies identifying scope of deployment infrastructure requirements 2nd pre-deployment tasks preparation phase of solutions lifecycle environmental factors funding strategies identifying scope of deployment infrastructure requirements connectivity console access power presentation layer preventing Layer 2 address spoofing primary users probabilistic nature of WLANs product demonstrations, accessing through guest networks production services, launching productivity average monthly benefit per user, calculating daily organizational productivity, calculating impact of WLANs monetized productivity benefit per WLAN, calculating office employee benefits, calculating total productivity benefit of WLANs, calculating traveling employee benefits, calculating profiles project board project management, Griffith University case study project plan, developing Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] radio cell architecture Griffith University case study radio side protection radio-based rogue AP detection RADIUS accounting real-time video streaming applications regulatory agencies regulatory requirements restrictions on enterprise WLANs remote access, defining home wireless networking policies 2nd Renaud, David requirements for guest networking 2nd resource requirements, estimating responding to rogue APs RF devices, regulations RF environment RF fingerprinting RF management RF Prediction RF triangulation RFID (Radio Frequency Identification) Lifespan healthcare case study Rijmen, Vincent Rijndael ring topology risks, identifying road warriors roaming 2nd fast Layer 2 roaming roaming user class rogue APs 2nd 3rd detecting 2nd on manufacturing company enterprise WLAN responding to ROI (return on investment) 2nd 3rd Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] scalability of AAA scope of WLAN as architectural component Scott, Bruce 2nd secondary users security alerts as architectural component as reason for guest network deployment authentication 2nd EAP client security encryption Griffith University case study hashing IDSs Lifespan case study manufacturing industry case study mobile devices network admission control security management security models encryption and authentication with overlay security solutions machine-based authentication native authentication only native encryption and authentication native encryption only no authentication, encryption, or hashing user-based authentication security policies, defining security settings management centralized self-service model manual client configuration profiles standardization third-party wireless software selecting discount rate inhouse versus outsourced deployment self-actualization self-healing WLANs self-throttling throughput strategy service and support Cisco four-tier support model cost of session layer signal strength requirements, assessing signal strength, Griffith University education case study single points of failure, effect on scalability site surveys Griffith University case study Lifespan healthcare case study "Smart Zones," Griffith University education case study sniffing SNMP (Simple Network Management Protocol) soft benefits software, third-party solutions lifecycle planning phase architecture scalability defining high-level program plan documenting project stakeholders identifying users impact on application portfolio security strategy preparation phase environmental factors funding identifying scope of deployment infrastructure requirements 2nd SOX (Sarbanes-Oxley Act) SSIDs (Service Set Identifiers) on guest networks SSO (single sign-on) stakeholders standard business applications standard user class standardization standards coexistence IEEE 802.11a IEEE 802.11b IEEE 802.11g pre-ratification star topology storage assets strategic value of wireless networking subscription-funded deployment strategies sunk costs supplementary services video voice syslog Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] target audience of WLAN as architectural component TCO (total cost of ownership) per user Value Chain framework identifying key application areas identifying secondary application areas TDMA (Time Division Multiple Access) technical support tertiary institutions testing APs third-party tools wireless client software WLAN management tools threats to security interception mitigating with authentication 2nd with encryption with hashing rogue APs three-tiered service and support system, Griffith University case study throughput, self-throttling strategy tiered support structure 2nd time division duplexing TKIP (Temporal Key Integrity Protocol) top-down approach to facilitating value creation process 2nd topological considerations for WLAN deployment topologies, Griffith University education case study total productivity benefit of WLANs, calculating tracking and telemetry, Lifespan healthcare case study traffic, sniffing transactional processes transmit channels transport and shipping companies, deploying WLAN location services transport assets transport layer traveling employee productivity benefits, calculating trend reporting 2nd trusted WLANs 2nd types of WLAN users Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] unaware employees as security threat unfriendly rogues UNII (Unlicensed National Information Infrastructure) band unique challenges to WLAN management dynamic nature of transport medium intermittent connectivity of mobile endpoints mobile nature of wireless endpoints untrusted wireless networks 2nd user-based authentication Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] Value Chain framework identifying key application areas identifying secondary application areas value creation process, facilitating with top-down approach 2nd vendor-specific WLAN management tools video technologies broadcasting distribution mechanism implementing on-demand real-time streaming applications user expectations, managing visualization tools voice technologies WLAN voice, implementing VoIP, implementing on manufacturing company enterprise WLAN Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] WACC (Weighted Average Cost of Capital) war driving WECA (Wireless Ethernet Compatibility Alliance) WEP (Wired Equivalent Privacy) WIDS (wireless intrusion detection system) wired networks wireless equipment, Griffith University case study wireless guest networking wireless voice services WLAN location services 2nd asset tags components of deploying inventory taking methods of calculating location privacy issues rationale for WLANs complementary services history of standards, Griffith University education case study topology, Lifespan case study video, managing user expectations voice devices voice implementation WLSE (Cisco Wireless LAN Solution Engine) 2nd WMM (WiFi Multimedia) standard 2nd workgroup switches working groups (IEEE) WPA (Wi-Fi Protected Access) ... Oisin has been responsible for the Cisco enterprise wireless strategy and architecture for the past six years He continues to define Cisco IT's wireless direction and represents Cisco IT's strategy and vision for wireless technologies to customers, the. .. the value proposition, cost justification, and alignment of security, design, and operational components within the business Written in an approachable style, The Business Case for Enterprise- Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and... and secure fashion in your organization, it will quickly become clear that these domains are inherently strewn with barriers The Business Case for Enterprise- Class Wireless LANs takes a business approach to wireless networking This goal is achieved

Ngày đăng: 26/03/2019, 17:07

Xem thêm:

TỪ KHÓA LIÊN QUAN