Presentation is loading. Please wait.

Presentation is loading. Please wait.

WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”

Similar presentations


Presentation on theme: "WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”"— Presentation transcript:

1 WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”

2 2 Data Flow Options Radius Web Server Processor 1 Processor 2 Hot Spot TablePay SSL Server GPRS CarsidePay DeliveryPay WiFi GPRS: terminals / site WiFi: > 4 terminals / site

3 3 WiFi vs GPRS GPRS Advantages Deployment is easier (Load and go) Mobile (Good for delivery and greater than 100 Feet) Works in sites without Broadband Cost effective for small (less than 4) terminal deployments GPRS Disadvantages Subject to coverage by a third party Slower. 72Kbps vs 11Mbps Network can be affected by volume through out the day or special events Expensive to add terminals above 4 No ability to add Hot Spot or addition terminals like the Vx570 Can not troubleshoot. Works or it doesn’t WiFi Advantages Not restricted to the number of terminals You can manipulate the RF spectrum Faster/more secure Can be monitored remotely Can provide fault isolation and troubleshooting Can add additional services like Hot Spot, Vx570s counter tops etc Network can be adjusted remotely WiFi disadvantages Requires Broadband access Higher upfront cost to install Subject to outside interference (bluetooth/ microwaves) or requires site survey adding to upfront cost Limited to range of the AP ( feet) Deployment requires each terminal to be configured to that network

4 4 Terminal Configuration  The terminal must have the following field populated: SSID or Network Name –This is the name of the radio. –We will use VERIFONE (all caps) (Case sensitive) WPA-PSK encryption –Encryption level of the terminal. Can be WEP or WPA, though WPA is recommended. –Creates a virtual connection between the Access Point and the terminal WPA-PSK Key –Plain text key. Example 123F567KL091 (all caps) (Case sensitive) –Best practice is key should be at least 12 characters –Key can not be seen in terminal. (displays *********). If in doubt, you must re-enter the key information

5 5 Authentication and Association  Authentication First Step in connecting –Verifies you have permission to talk –All clients authenticate to the AP  Association Client becomes a member of the infrastructure Unauthenticated and unassociated –Initial state. Unit completely disconnected Authenticated and Unassociated –Client connected to AP, but is not allowed to send data –Can happen in certain roaming situations Authenticated and associated –Client working correctly

6 6 What’s WiFi  WiFi or Wireless Fidelity is a LAN technology that uses radio waves instead of cabling to connect a remote device to a Local Area Network.  There are a number of Wireless standards: a, 5Ghz band with speeds up to 54Mbps b, 2.4GHz band with speeds up to 11Mbps g, 2.4GHz band with speeds up to 54Mbps , 2.45GHz I.e. Bluetooth

7 b  11Mbps Data transfer g will step down to 11Mbps and all devices will step at that rate.  2.4 GHz Range 11 Channels from 2.412GHz to GHz divided into 5MHz channels g is backwards compatible with b Direct Sequence spread spectrum (DSSS) uses a 25MHz to utilize its hop sequence.  Security SSID broadcast off –Hides the Network Name WEP. Wired Equivalent Privacy. –64 Bit key uses 10 hexadecimal characters –128 bit key uses 26 hexadecimal characters –Shared Key mode only WPA WiFi Protected Access –More robust than WEP –Prevents static key use with session keys and new algorithms MAC Filtering –Enter the MAC address to prevent non provisioned equipment off your network

8 8 Channel Allocation in b GHz Channel GHz Channel GHz Channel 11 Ch 1 Ch2 Ch3 Ch4 Ch5 Ch6 Ch7 Ch8 Ch9 Ch10 Ch GHz Channel GHz Channel GHz Channel 11 25MHz Frequency Power DSSS uses a 25Mhz band for it’s “hop sequence” Only 3 “clean” channels is WiFi

9 9  b operates in the public 2.4GHz range. Other devices use that range. Cordless phones operate at 900MHz, 2.4Ghz, and 5.8Ghz ranges Microwaves operate at 2.4GHz Some other wireless communication operate at 2.4GHz\ –Bluetooth operates at 2.45GHz or between channel 8&9 Interference 2.4GHz Phone Bluetooth Device Pizza Oven Column

10 10 WiFi Protected Access (WPA)  WPA (Interim security solution) WPA (Radius Server) –Client is authenticated against a pre configured database WPA-PSK –Pre-shared key authentication –A key is put in each device and seeded through the network –Plain text 8 character minimum


Download ppt "WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”"

Similar presentations


Ads by Google