Chapter 18. Wireless Architecture and Design
WLAN Security—. This section presents an overview of the various methods for protecting a WLAN. These methods can be used to authenticate potential wireless clients and users, as well as to secure the data passing over the wireless medium.
Wireless Client Operation—. This section explains the Cisco Compatible Extensions program and how it is used to find wireless hardware with compatible feature sets.
AP Association and Roaming—. This section covers the process that wireless clients and access points use to form associations or logical connections. As wireless clients become mobile, their ...