WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”

Slides:



Advertisements
Similar presentations
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
TPS Reports Presents… A Wireless Report Joy Gibbons Julia Grant Kelsie Kirkpatrick Kevin Moore Byron Williams Image from:
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
WLAN What is WLAN? Physical vs. Wireless LAN
Fundamental of wireless network.  Heinrich Hertz discovered and first produced radio waves in 1888 and by 1894 the modern way to send a message over.
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Wireless Networking.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
LESSON Networking Fundamentals Understand Wireless Networking.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
UNDER THE GUIDANCE OF MR. S.K. DANI (SDE) SUBMITTED BY:
Wireless Networking.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Thornbury U3A Computer Group Wireless Networking (Part 1) September 2006 Mike Farquhar.
Wireless Networks Tamus, Zoltán Ádám
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Lecture 11 Wireless security
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
A PRESENTATION ON “Wireless Networks”
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Wireless Ethernet Technologies. Wireless Ethernet Technology Industry technologies & market trends Choosing the right radio technology for the job Why.
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Chapter 10.  Upon completion of this chapter, you should be able to:  Understand.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Personal Communication Services & WiFi
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Presented by: Jeffrey D. Bombell, American Computer Technologies
Wireless Networking Chapter 23.
Presentation transcript:

WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”

2 Data Flow Options Radius Web Server Processor 1 Processor 2 Hot Spot TablePay SSL Server GPRS CarsidePay DeliveryPay WiFi GPRS: terminals / site WiFi: > 4 terminals / site

3 WiFi vs GPRS GPRS Advantages Deployment is easier (Load and go) Mobile (Good for delivery and greater than 100 Feet) Works in sites without Broadband Cost effective for small (less than 4) terminal deployments GPRS Disadvantages Subject to coverage by a third party Slower. 72Kbps vs 11Mbps Network can be affected by volume through out the day or special events Expensive to add terminals above 4 No ability to add Hot Spot or addition terminals like the Vx570 Can not troubleshoot. Works or it doesn’t WiFi Advantages Not restricted to the number of terminals You can manipulate the RF spectrum Faster/more secure Can be monitored remotely Can provide fault isolation and troubleshooting Can add additional services like Hot Spot, Vx570s counter tops etc Network can be adjusted remotely WiFi disadvantages Requires Broadband access Higher upfront cost to install Subject to outside interference (bluetooth/ microwaves) or requires site survey adding to upfront cost Limited to range of the AP ( feet) Deployment requires each terminal to be configured to that network

4 Terminal Configuration  The terminal must have the following field populated: SSID or Network Name –This is the name of the radio. –We will use VERIFONE (all caps) (Case sensitive) WPA-PSK encryption –Encryption level of the terminal. Can be WEP or WPA, though WPA is recommended. –Creates a virtual connection between the Access Point and the terminal WPA-PSK Key –Plain text key. Example 123F567KL091 (all caps) (Case sensitive) –Best practice is key should be at least 12 characters –Key can not be seen in terminal. (displays *********). If in doubt, you must re-enter the key information

5 Authentication and Association  Authentication First Step in connecting –Verifies you have permission to talk –All clients authenticate to the AP  Association Client becomes a member of the infrastructure Unauthenticated and unassociated –Initial state. Unit completely disconnected Authenticated and Unassociated –Client connected to AP, but is not allowed to send data –Can happen in certain roaming situations Authenticated and associated –Client working correctly

6 What’s WiFi  WiFi or Wireless Fidelity is a LAN technology that uses radio waves instead of cabling to connect a remote device to a Local Area Network.  There are a number of Wireless standards: a, 5Ghz band with speeds up to 54Mbps b, 2.4GHz band with speeds up to 11Mbps g, 2.4GHz band with speeds up to 54Mbps , 2.45GHz I.e. Bluetooth

b  11Mbps Data transfer g will step down to 11Mbps and all devices will step at that rate.  2.4 GHz Range 11 Channels from 2.412GHz to GHz divided into 5MHz channels g is backwards compatible with b Direct Sequence spread spectrum (DSSS) uses a 25MHz to utilize its hop sequence.  Security SSID broadcast off –Hides the Network Name WEP. Wired Equivalent Privacy. –64 Bit key uses 10 hexadecimal characters –128 bit key uses 26 hexadecimal characters –Shared Key mode only WPA WiFi Protected Access –More robust than WEP –Prevents static key use with session keys and new algorithms MAC Filtering –Enter the MAC address to prevent non provisioned equipment off your network

8 Channel Allocation in b GHz Channel GHz Channel GHz Channel 11 Ch 1 Ch2 Ch3 Ch4 Ch5 Ch6 Ch7 Ch8 Ch9 Ch10 Ch GHz Channel GHz Channel GHz Channel 11 25MHz Frequency Power DSSS uses a 25Mhz band for it’s “hop sequence” Only 3 “clean” channels is WiFi

9  b operates in the public 2.4GHz range. Other devices use that range. Cordless phones operate at 900MHz, 2.4Ghz, and 5.8Ghz ranges Microwaves operate at 2.4GHz Some other wireless communication operate at 2.4GHz\ –Bluetooth operates at 2.45GHz or between channel 8&9 Interference 2.4GHz Phone Bluetooth Device Pizza Oven Column

10 WiFi Protected Access (WPA)  WPA (Interim security solution) WPA (Radius Server) –Client is authenticated against a pre configured database WPA-PSK –Pre-shared key authentication –A key is put in each device and seeded through the network –Plain text 8 character minimum