The Business Case for Enterprise-Class Wireless LANs / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 95%)
Other sellers (Paperback)
  • All (7) from $1.99   
  • New (2) from $59.23   
  • Used (5) from $1.99   
Sort by
Page 1 of 1
Showing 1 – 1 of 2
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing 1 – 1 of 2
Sort by


A comprehensive guide to analyzing the business rationale for WLANs

  • Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership
  • Develop a robust execution plan to deploy and operate the WLAN
  • Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker’s perspective
  • Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access
  • Identify potential security threats and develop strategies to mitigate attacks
  • Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions
  • Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts

Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution.

The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN—from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business.

Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization’s WLAN.

This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today’s most important technologies and business strategies.

Read More Show Less

Product Details

  • ISBN-13: 9781587201257
  • Publisher: Cisco Press
  • Publication date: 6/2/2006
  • Series: Network Business
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 456
  • Product dimensions: 7.00 (w) x 9.00 (h) x 1.01 (d)

Meet the Author

H. David Castaneda is a senior technical member in the Cisco Systems® Advisory Services group, where he is responsible for consulting with customers for advanced technologies and providing knowledge and leadership for industry best practices. Prior to his current role, David was the architect and technical lead for Cisco® internal WLAN strategy and deployment.

Oisin Mac Alasdair is an IT program manager in the Cisco Systems Intelligent Network Solutions group. As part of the Cisco IT wireless architecture team, he held the position of global program manager for deployment of infrastructure and currently is the lead program manager.

Christopher A. L. Vinckier is an engagement manager in the Cisco Systems Advisory Services group. He focuses on helping customers solve the perennial problems of business technology alignment, adoption, and absorption. He has advised several of the largest Fortune 500 customers for Cisco on the strategic, operational, and financial benefits of IP-based infrastructure solutions.

Read More Show Less

Table of Contents

Part I_ The Fundamentals of Wireless LAN Strategic Planning

Chapter 1 Introduction to Wireless LAN Technologies

Value of Mobility

OSI Layers and WLANs

Layer 1: Physical Layer

Layer 2: Data Link Layer

Layer 3: Network Layer

Layer 4: Transport Layer

Layer 5: Session Layer

Layer 6: Presentation Layer

Layer 7: Application Layer

A Brief History of WLANs

How Wireless Networks Function

WLAN Modes

WLAN Technologies

WLAN Radio Communications

Different WLAN Standards



Chapter 2 Business Considerations

Aligning Technology Solutions with Business Considerations

Economic Considerations

Step 1: Understand Your Organizational Ecosystem

Step 2: Define the Problem That You Are Trying to Solve

Step 3: Break the Problem Down

Step 4: Define WLAN-Enabled Solution

The Role of Infrastructure

Pros and Cons of the Wired Versus Wireless World

Effect on Cost and Spending


Measuring the Business Value of Deploying Wireless

Total Cost of Ownership

Value of Ownership

Cost-Justification Analysis


Chapter 3 Preparation and Planning

Solutions Lifecycle


Breadth and Scope of Deployment

Deployment Funding Strategies


Project Stakeholders


Impact on Application Portfolio

Scalable Architecture

Security Strategy

Define High-Level Program Plan


Chapter 4 Supplementary and Complementary Services


WLAN Voice Devices

WLAN Voice Implementation Challenges


Types of Video Traffic

WLAN Video Implementation Challenges

Guest Networking

Business Rationale for Enabling Guest Networking

Components of Guest Networking

Guest Networking Implementation Considerations

WLAN Location Services

Business Rationale for WLAN Location Services

Components of WLAN Location Services

WLAN Location Services Implementation Considerations


Additional Resources

Part II Wireless LAN Architecture, Design, and Deploym

Chapter 5 Guidelines for a Successful Architecture and Design

Architectural Considerations

WLAN Expectations

Key Components for an Effective WLAN Architecture

Design Considerations

Client-to-AP Ratio


Environmental Considerations

Physical Attributes of the Surroundings

RF Environment

Local Governmental Regulations


Chapter 6 Wireless LAN Deployment Considerations

In-House Deployment Versus Outsourced Deployment

Internal Staff

Outsourced Resources

Architectural Milestones

Solutions Architecture

Security Posture

Deployment Dependencies

Change Management Process

Put the Supporting Infrastructure in Place

Provision AAA Capabilities

Define Security Standards and Policies

Put the Support Plan in Place

Put the Communication Plan in Place

Address Regulatory Issues


Managing the Infrastructure

Managing the Clients


Deploying the WLAN

Pre-Deployment Tasks

Managing the Deployment

WLAN Controller Configuration

WLAN Controller Installation

Deployment Checklist


Deployment Methodology and Project Planning





Chapter 7 Security and Wireless LANs

Wireless Security in Your Enterprise

Thinking Securely

Different Security Models

WLAN Security Threats


Rogue APs

Denial of Service Attack

Wireless Security Mitigation Techniques




EAP Types

Building a Secure WLAN

Trusted Versus Untrusted Wireless Networks

Define a Clear Security Posture

Define a Clear WLAN Security Policy

Secure Your APs


Physically Secure the Office Space

Communicate with Your Users

Secure Wireless at Home

Determine How to Support and Secure Mobile Devices

Determine How to Support and Secure Clients

Detect Rogue APs

Respond to Detected Rogue APs

Consider Using Intrusion Detection Systems


Chapter 8 Management Strategies for Wireless LANs

Solutions Lifecycle

Management Strategies

In-House WLAN Management

Outsource WLAN Management


Fault Management

Configuration Management

Accounting Management

Performance Management

Security Management

Where FCAPS Fails

Comparing Centralized and Distributed Management

WLAN Management

RF Management

Host Management

Client Management

Challenges Unique to WLAN Management

Dynamic Nature of the Transport Medium

Mobility of Endpoints

Intermittent Connectivity of Mobile Endpoints

Diverse Nature of Wireless Endpoints

Security Settings Management

Third-Party Wireless Software

Centralized Self-Service Model


Manual Process

WLAN Reporting and Alerting

Standard/Systematic Reports



Management Tools

Vendor-Specific WLAN Management Tools

Third-Party WLAN Management Tools

Common Network Management Platforms

Common Network Management Protocols

Internally Developed Tools


Part III Wireless LAN Deployment Case Stud

Chapter 9 Enterprise Case Study

Business Model

Defining the Business Case

The Strategic Value

Technology Considerations

Architecture Principles

Network Management

Client Management

Service and Support

Enhanced Services

Wireless Voice Services

Wireless Guest Networking


Deployment and Implementation

Site Survey


Access Point Configuration


Distribution of Wireless Network Cards and Instructions

Ongoing Project Management and Process

Business Benefits of the Solution

What the Future Holds

Modular Architecture: Centralized and Autonomous APs

Enhanced Security

Location-Based Services

Outdoor Wireless



Chapter 10Healthcare Case Study

Business Model

Defining the Business Case

The Strategic Value

Technology Considerations

Architectural Principles

WLAN Design

Network Management


Project Management and Process

Deployment and Implementation

Site Survey

What the Future Holds

Tracking and Telemetry

Radio Frequency Identification (RFID)


Chapter 11 Manufacturing Case Study

Business Model

Technology Considerations





What the Future Holds

Guest Access

Voice over IP

Rogue Access Point Detection


Chapter 12 Education Case Study

Business Model

Architectural Principles


802.11 Wireless Networking Standards

Access Point Settings

Signal Strength, Antennas, and Outdoor Coverage

Radio Cell Architecture

Global Naming Standards

Wireless Equipment

Network Management

Service and Support

Tier 1: Information Services

Tier 2: Element IT and Learning and Environment Department

Tier 3: Network and Communication Services

Client Management

Security and Rogue AP Detection

Deployment and Implementation

Deployment Phases

Site Survey


Access Point Configuration


Ongoing Project Management and Process


Lessons Learned and Recommendations

Sort Out Support Up Front

Build a Solid and Well-Tested Architecture

Understand Your Users

Establish a Web Portal

Integrate the Solution into Existing Business Processes

Measuring the Benefits

What the Future Holds


Part IV Appendi

Appendix A Wireless LAN Standards Reference

Appendix B Wireless LAN Security References

Appendix C Example Project Plan for an Enterprise-Class WLAN Deployment



Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)