Networking
Networking
Beverage Networking
Excellence
Reference Guide
Oracle Food and Beverage Networking Excellence Reference Guide
Copyright ©, 2023, Oracle and/or its affiliates. All rights reserved.
This software and related documentation are provided under a license agreement containing restrictions on use
and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license
agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit,
distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering,
disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you
find any errors, please report them to us in writing.
If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of
the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any
programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are
"commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific
supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs,
including any operating system, integrated software, any programs installed on the hardware, and/or
documentation, shall be subject to license terms and license restrictions applicable to the programs. No other
rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It
is not developed or intended for use in any inherently dangerous applications, including applications that may
create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be
responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use.
Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or
hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of
their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are
used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron,
the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices.
UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise
set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be
responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Preface v
iii
6 Network Infrastructure 6-1
Dynamic Host Configuration Protocol (DHCP) 6-2
Domain Name System (DNS) 6-3
Load Balancing 6-4
Spanning Tree Protocol 6-5
Security 6-5
7 Networks 7-1
Network Types 7-1
Cable Types 7-5
Specifications 7-10
Hardware 7-12
Installation 7-15
Wireless 7-16
8 Glossary 8-1
Symbols and Numbers 8-1
A 8-1
B 8-2
C 8-2
D 8-3
E 8-4
F 8-4
G 8-5
H 8-5
I 8-6
J 8-7
K 8-7
L 8-7
M 8-8
N 8-8
O 8-9
P 8-9
Q 8-10
R 8-10
S 8-11
T 8-12
U 8-13
V 8-13
W 8-14
X 8-14
iv
Preface
An effective network is critical for the success of any size Point of Sale site. Successful
communication between the data center containing the Simphony Servers, Point of Sale
client hardware, all networked devices, and shared services (e.g., the Check and Posting
Service – CAPS).
Purpose
Audience
Customer Support
Documentation
Date Description
v
Date Description
vi
Chapter 1
Introduction - Reliable Network Data Flow
1
Introduction - Reliable Network Data Flow
An effective network is critical for the success of any size Point of Sale site. Successful
communication between the data center containing the Simphony servers, Point of Sale
client hardware, all networked devices, and shared services (for example, the Check and
Posting Service (CAPS)).
Restaurants, casinos, hotels, stadiums, and cruise ships have different network
requirements: wired, wireless, hybrid, Simphony enterprise servers hosted on-site or in
the cloud. This document provides network installation guidance for an efficient and
effective site network.
This guide describes:
• Oracle networking expectations
• Special property considerations
• Power considerations
• Cloud connectivity
• Network infrastructure – relevant educational material
• Networks – relevant educational material
1-1
Chapter 2
Oracle Networking Expectations
2
Oracle Networking Expectations
This chapter describes Oracle MICROS networking infrastructure expectations, wired and
wireless, together for convenient reference.
2-1
Chapter 2
Oracle Networking Expectations
Security
Firewalls
Industry Standard Recommendations
1. Document your firewall rules.
Certificates
• Only use certificates offered from trusted Certificates of Authority.
• Do not use self-signed certificates.
• TLS 1.2 is a required minimum encryption standard in Oracle data centers.
• Oracle Food and Beverage recommends using TLS for on-premise installations.
2-2
Chapter 2
Oracle Networking Expectations
2. In the address bar, click the lock, and then click View Certificates:
3. Go to the Details tab and then scroll to the CRL Distribution Points field:
2-3
Chapter 2
Oracle Networking Expectations
Proxy
Simphony workstations and tablets are "proxy aware" and can be configured in the
Microsoft Windows operating system to use a proxy server when connecting to the cloud.
2-4
Chapter 2
Oracle Networking Expectations
Network Types
2-5
Chapter 2
Oracle Networking Expectations
• Do not place shared services on devices that lose network connectivity frequently, as
that negatively affects the POS client operations on other devices.
Cable Types
Twisted Pair
The following Oracle MICROS devices utilize twisted pair Ethernet cabling:
• Point of Sale workstations
• Kitchen Display Systems
• Receipt printers
• Kitchen order printers
Consider the following points:
• Interference from nearby electrical equipment.
• Shielded or unshielded Ethernet cabling.
• Distance of Ethernet cable runs.
Oracle MICROS expectations:
• Terminate Ethernet cable properly.
• Use Ethernet Category 6 Ethernet cable as the final network runs in a building.
• Keep Ethernet cable away from devices that create high levels of electrical
interference.
Fiber Optic
• Use fiber optic cable for long network runs that exceed the recommended distance
for Ethernet cable.
• Use fiber optic cable for network runs between buildings.
• Use fiber optic cable for network runs where electrical interference might be an issue.
2-6
Chapter 2
Oracle Networking Expectations
Specifications
The efficiency of a network can be affected by the speed of data throughput, maximum
distance between network devices, and time delay between data transfer.
Bandwidth
Consider the following example of the Simphony the Client Application Loader (CAL) on a
WAN:
When new client applications or support files are available, the CAL sends the new set of
files from the enterprise application server to the clients.
A standard Simphony version service host CAL package is usually about 50 megabytes
(MB) in size.
Based on that, a property with 100 workstation clients’ needs to download 5000 MB of
data through the Wide Area Network (WAN).
When the network bandwidth of a property cannot support simultaneous requests made
by numerous clients, properties might experience bandwidth bottlenecks.
To calculate the bandwidth by workstation:
• Number of workstations = W
• W x 0.02 Mbps = Total Workstation Bandwidth during normal operations.
• W x 2 Mbps = Total Workstation Bandwidth when performing a reload of a
workstation's database.
Distance
• Do not exceed the maximum distance allowed for your cabling.
• Calculate the last connection from wall jack to the device into the maximum distance.
Latency
It is recommended to install software in the cloud with the least amount of latency to the
site if possible.
2-7
Chapter 2
Oracle Networking Expectations
Hardware
Router
Router considerations:
• Install the router in a secure location such as a network closet.
• Label network ports and the cables connected to those network ports.
Switch
Switch considerations:
• Install the switch in a secure location such as a network closet.
• Label network ports and the cables connected to those network ports.
• Network Hubs are not recommended for Oracle MICROS installations.
• Unmanaged switches can be used for small Oracle MICROS installations.
• Unmanaged switches should be physically secured as port level security
management is not available in these types of switches.
• Managed switches are recommended for medium to large enterprise Oracle MICROS
hardware installations.
Powerline Extender
Powerline extenders are not recommended for Oracle MICROS installations.
Modem
Modem considerations:
• Install the modem in a secure location such as a network closet.
• Label all ports and the cables connected to those ports.
2-8
Chapter 2
Oracle Networking Expectations
Installation
Cabling
Recommended Ethernet Cabling for Oracle MICROS Installations:
Category 6 Ethernet cable (CAT 6)
Recommended Fiber Optic Cabling for Oracle MICROS Installations:
Fiber is recommended for distances greater than 100 meters or as a solution to ground
potential issues.
Recommended Coaxial Cabling for Oracle MICROS Installations:
RG-59 Coaxial cable
Recommended IDN Cabling for Oracle MICROS Installations:
For permanent installation between wall panels:
Category 6 Ethernet cable (CAT 6) shielded for installed wiring is preferred. (Category 3,
4, or 5 twisted pair cable can be used if already available.)
For wall or workstation to IDN printer:
• Oracle MICROS Part #300281-036-PT Shielded cable assembly for IDN printers: 3
feet, 6-pin to 6-pin for Oracle MICROS workstations
• Oracle MICROS Part #300281-120-PT Shielded cable assembly for IDN printers: 10
feet, 6-pin to 6-pin for Oracle MICROS workstations
• Oracle MICROS Part #300319-036-PT Shielded cable assembly for IDN printers: 3
feet, 8-pin to 6-pin for Oracle MICROS workstations
• Oracle MICROS Part #300319-120-PT Shielded cable assembly for IDN printers: 10
feet, 8-pin to 6-pin for Oracle MICROS workstations
2-9
Chapter 2
Oracle Networking Expectations
• Ensure all faceplates, modular connectors, patch panels and patch cords are the
same category as the selected cable. That is, when you pull Category 6 cable, make
sure all other components are rated for Category 6. If you are installing shielded
cable, all other components including the patch panel must provide a location to
terminate the ground wire.
Termination
Expected Ethernet Termination for Oracle MICROS Installations:
Several methods are available for terminating the horizontal cable runs. Oracle MICROS
recommends the 110 Connect system by AMP or other suppliers. This system uses the
reliable 110 style punch-down RJ45 modular jack and are available in both shielded and
not-shielded versions.
A second termination method is based on the 8-pin RJ45 modular "keystone" insulation
displacement connector, similar to those available for MICROS IDN devices. The cable is
attached to this connector by placing all conductors in the appropriate connector cap and
then forcing the connector cap into place.
In addition, there are two methods for terminating the cable at the faceplate connectors
using the ANSI/TIA/EIA-568-A or ANSI/TIA/EIA-568-B cabling standard.
ANSI/TIA/EIA-568-B.1-2001 specifies that horizontal cables are terminated using the
T568A pin/pair assignments, or optionally terminated with the T568B bin pairs to
accommodate certain cabling systems. Mixing T568A terminated horizontal cables with
T568B terminated patch cords (or the reverse) is not recommended.
NOTE:
Pins 1-2, 3-6, 4-5, and 7-8 are +/- signal pairs twisted with each other within
the cable. You must maintain these signal pairs at each end of the cable as
well as the patch cables.
2-10
Chapter 2
Oracle Networking Expectations
Wireless
Infrastructure
Expected Hardware Features:
WI-FI 3
IEEE 802.11g WI-FI 3. Supports 2.4 GHz and 5 GHz frequency bands.
WI-FI 4
IEEE 802.11n WI-FI 4
Configuration
5 GHz and 2.4 GHz
Can I broadcast POS SSID in 2.4 and 5 GHz band?
Broadcasting POS SSID in both bands may have a negative effect on the performance
because of band steering.
Band steering lets dual-band devices detect a higher radio frequency of 5 GHz band and
allows the device to automatically transmit on that band.
POS devices require a stable and constant connection to the wireless network; therefore,
any network connection interruptions result in poor service.
POS SSID should always be broadcasted in a single band.
Will my POS devices work well in the 2.4 GHz band?
POS devices connected to 2.4 GHz band may operate well in some conditions, providing
there are no external interferences present, access points are positioned in a correct
location with a clear path of broadcast, the Wi-Fi does not suffer bottlenecks, and the
SSID per AP ratio is low.
A single property with three access points spaced in the correct proximity with a low
number of client connections may offer good wireless coverage and performance.
The 2.4 GHz band can experience interference from different devices such as Bluetooth,
Mobile phones, and microwave ovens.
2-11
Chapter 2
Oracle Networking Expectations
• -30 dBm
Reliable network coverage offering good connection and uninterrupted data flow.
• -65 dBm
Good network coverage with the reliable data flow.
• -70 dBm
Minimum reliable distance and coverage. POS device may start experiencing
latency.
• -75 dBm
POS devices experience data flow problems, network timeouts and latency.
Check functions may no longer be possible.
• -30 dBm
Reliable network coverage offering good connection and uninterrupted data flow.
• -65 dBm
Reliable network coverage.
• -70 dBm
Good network coverage with the reliable data flow.
• -75 dBm
Minimum reliable distance and coverage. POS device may experience latency.
SSIDs
SSIDs are created in the wireless network infrastructure to segregate internal and
external client communication.
Some organizations may create many SSIDs in the wireless environment to fulfill
business needs and requirements.
2-12
Chapter 2
Oracle Networking Expectations
2-13
Chapter 2
Oracle Networking Expectations
IMPORTANT:
It may be necessary in some environments to create a dedicated POS Wi-Fi
network within the existing infrastructure by removing the broadcast of heavy
demanding SSIDs to lower the number of client connections.
Channels
2-14
Chapter 2
Oracle Networking Expectations
Roaming
Roaming occurs when a POS device moves between the access points. The event is
triggered by the signal strength level threshold.
When the signal from the access point the POS device is connected to drops below a
certain level, the POS device connects to the stronger access point in the area that
broadcasts the designated POS SSID.
During AP (Access Point) roaming, POS devices can experience a degree of network
connection disruption which can negatively impact the performance.
In some cases, the disruption can cause the POS devices to be unusable leading to
complete network connection failure.
Seamless roaming within the dedicated POS broadcasting access points and areas is
essential, ensuring good communication within the system.
Roaming should be tested in all locations that the POS devices operate and all access
points that the POS devices connect to.
IMPORTANT:
Perform roaming tests using a POS device and not a third-party device
because not all wireless hardware components respond identically. Tests
conducted using other Wi-Fi devices may produce different results because all
wireless devices respond differently in specific circumstances and conditions.
NOTE:
Ping command can be used to verify the number of lost pings.
2-15
Chapter 2
Oracle Networking Expectations
Encryption
2-16
Chapter 2
Oracle Networking Expectations
Checklist
Summary of Oracle networking expectations:
❑ DHCP: Reserved IPs
❑ DHCP: NTP filter out Workstations
❑ DHCP: Lease length sufficient length to avoid business hours
❑ DNS: Local if using names rather than IPs
❑ STP: Switches support Spanning Tree Protocol
❑ Firewall: Documented, change procedures, audits in place and followed
❑ IDS/IPS: ‘Allow’ rules for Simphony
❑ Certificates: Trusted, not self-signed, TLS 1.2
❑ CRL: Verify endpoint configuration
❑ Proxy: Configure proxy-aware workstations
❑ VLAN: Segment POS network
❑ WAN: Verify sufficient bandwidth, redundancy
❑ LAN: Verify sufficient bandwidth, redundancy, availability
❑ Cabling: Correct type for bandwidth needed distance used
❑ IDN: Cat 6 or better
❑ Bandwidth: Calculate bandwidth needs and verify against WAN or LAN
configuration
❑ Distance: Maximum distance not exceeded in cabling runs.
❑ Latency: Measure, confirm low latency to Oracle Cloud
❑ Physically Secure: Router, switch, networking equipment in secure, limited
access location
❑ Powerline extender: Do not use
❑ Termination: Proper cable termination. Replace if you suspect the cable
termination is old.
❑ Wi-Fi 5 or later
❑ Wi-Fi: 5 GHz and 2.5 GHz separated by use case
❑ SSID: Separate by use case
2-17
Chapter 2
Oracle Networking Expectations
❑ Wi-Fi ratios: APs per SSID, bandwidth per SSID, clients per SSID, SSIDs on
premises
❑ Wi-Fi: No channel overlap
❑ Wi-Fi: Roaming tested between all geographically neighboring APs.
❑ Wi-Fi Encryption: WPA2 only
❑ Power: All network hardware supplied by conditioned power and UPS protected.
See Power Considerations for more information.
❑ Special property considerations: Validate special property considerations for
casinos, cruise, hotels, resorts, and stadiums. See Special Property
Considerations for more information
2-18
Chapter 3
Special Property Considerations
3
Special Property Considerations
Some networking topics are specific to particular property types. The following table
provides a matrix of special property considerations and the property types where those
considerations apply.
QSR TSR QSR TSR
Casino Cruise Hotel Resort Stadium
(Chain) (Chain) (Single) (Single)
Multiple CAPS X X X
High WS Count X X X X X
Wi-Fi Dependent X X
Wi-Fi Hindered X
Subnet Spans X X X X X
Corporate Proxy X X X
Corporate WAN X X X
Internal VPNs X X
Incoming Interfaces X X X X
Outgoing Interfaces X X X X
3-1
Chapter 3
Special Property Considerations
3-2
Chapter 3
Special Property Considerations
DHCP
Through experience, we have found a number of these site types use dynamic IP ranging
for their workstations.
EMC configuration needs to match the DHCP configuration, either by name or fixed
DHCP lease IP configuration. Consider these points:
Simphony can work with DHCP clients. While this is technically not an issue, the broader
question of whether DHCP is suitable and scalable should be considered. Per the main
DHCP article, Oracle MICROS Simphony requires fixed IP leases and DNS resolution to
be implemented.
3-3
Chapter 3
Special Property Considerations
Outgoing Interfaces
Due to service type, these properties will likely have outgoing interfaces, such as Order
Confirmation Boards or PMS Sales IFC.
There are IP based outgoing channels of data from the system, additional to sales data
collection. Consider these points:
• Firewall configuration outbound
• Internet connection can become mission critical
JumpMind Replication
Due to regulatory requirements and physical location, these implementation types are
likely to require multiple DB instances, replicated through the JumpMind product
SymmetricDS.
The database and installation are customized to support the symmetric DS product.
While this is a separate product that requires a large amount of configuration and
maintenance, it has a large benefit in that when there is a low stability to the cloud
servers, a local instance of the cloud database is replicated. This can give the system the
advantages of being local from a connectivity point of view, without removing the control
of having a cloud-based instance that is administered by a central entity. Consider these
points:
• Both data centers need to be secured; ensure communication between the two is
clean and clear.
• There can be a much larger time delay between pressing save on the primary EMC,
and this being replicated to the secondary servers.
• Upgrades will need to be planned in tandem.
• There are likely to be constraints added with regards to data maintenance and data
access that would not normally exist.
• Whilst configuration can come from a central entity, reporting data is not returned to
them.
3-4
Chapter 3
Special Property Considerations
3-5
Chapter 3
Special Property Considerations
Multiple CAPS
When a physical deployment gets to a certain size, customers might want to break down
their installation to multiple logical properties within the EMC. This can assist with IT
configuration, reporting, or sizing of infrastructure. For this approach, each Simphony
property needs a separate CAPS machine.
Multiple CAPS machines impact the data flow from the property-level components to the
cloud and at the local level between nodes. Barring misconfiguration, Property 1’s
workstations should not reach out to Property 2’s workstations.
The workstation listing within the EMC should be configured in a way that ensures that IP
addresses are not duplicated across properties. This is a manual effort. Where possible,
using VLAN segments provides a secondary safeguard.
Multiple Subnets
Due to the building size or configuration, the IP ranges that the workstations reside on
are split into multiple separate subnets.
If correct routing is not implemented as subnets are traversed, Simphony on-premise
components will not communicate correctly. Consider these points:
Bi-direction subnet traffic needs to be open.
Wi-Fi-Dependent/Hindered/Restricted Property
Wi-Fi-Dependent Property
Businesses reliant on wireless technology are more likely to have a higher ratio of
wireless to wired devices, and they could be operationally more dependent on Wi-Fi for
all aspects of the business.
This property type could have the following impact:
• Could cause higher demand on the wireless bandwidth due to increased number of
operating wireless devices.
• Internal and external communication are reliant on wireless technology.
• A high number of concurrent client connections
Consider these points:
• Sufficient bandwidth allocation
• Latency
• Robust WLAN hardware and reliable wireless technology
3-6
Chapter 3
Special Property Considerations
3-7
Chapter 4
Power Considerations
4
Power Considerations
Power Requirements
AC Power
A correct installation of the AC power and grounding system is essential to minimize
voltage spikes and possible damage to the network system.
In cases where grounding is not possible, an additional power conditioner may be
required to meet safety requirements.
Additional information can be found in the Oracle MICROS Site Preparation Guide. The
guide provides detailed best practice information and covers all aspects of site
installation.
NOTE:
For more information on the power requirements please refer to chapter 23 of
the site preparation guide.
IMPORTANT:
By protecting a POE switch with battery backup and line conditioning, all
devices connected to that switch through POE benefit from that protection.
This is important for access point wireless infrastructure.
4-1
Chapter 4
Power Considerations
POE can reduce the need for installation of electrical cable and outlets for networked
devices in the point-of-sale environment.
These devices may benefit from POE:
• Network switches
• Wireless access points
• Credit card terminals
• CCTV devices
• RFID readers
• Smart devices
Power Conditioning
As all electrical installations experience power surges and voltage spikes, it may be
necessary to consider a power conditioning solution. A power conditioner is a device
designed to monitor and regulate power, delivering clean power to any electrical
equipment.
Power conditioning means protecting electronic and electrical devices from electrical
damage.
Several types of solutions and protective hardware can be implemented by the vendor,
but in all cases, it depends on the need and the size of the property.
Like all electrical devised POS systems, it is also prone to hardware failures when
operating in unprotected environments.
POS system hardware will benefit from the protected system, as it can prevent frequent
hardware failures that can lead to increased costs of repair.
Hardware failures caused by electrical spikes can negatively impact business operations
and can lead to financial losses; therefore, installation of protective hardware is
recommended.
All electronic and electrical network devices require power protection if the environment
they operate is prone to electrical spikes and surges.
Oracle point of sale systems require Oracle MICROS-approved power conditioning and
uninterruptible power supplies.
Oracle MICROS-approved power conditioners that protect the point of sale and network
devices must be able to isolate all negative electrical instances generated by any other
equipment.
A power conditioner has a low-impedance isolation transformer to protect the equipment
from common-mode voltage, which can cause everything from equipment lockups to data
losses.
See the Oracle MICROS Site Preparation Guide for more information on power
conditioners.
4-2
Chapter 4
Power Considerations
Surge Protectors
Surge protectors provide a degree of protection and can prevent protection from transient
power spikes; however, they cannot provide complete full protection.
For full protection, use a UPS or a power conditioner.
Surge protectors are not recommended for use with networking or point of sale
equipment.
4-3
Chapter 5
Cloud Connectivity
5
Cloud Connectivity
Connecting to the cloud refers to a connection between front-of-house applications to the
application server tier. This includes instances of Simphony installed on-premises, in a
data center, or an Oracle-hosted data center. Connection requirements from the client to
the server remain the same.
API Connectivity
An application program interface (API) is a set of routines, protocols, and tools for
building software applications. This allows software to interact with other software.
In Simphony, an API is leveraged to let external systems interact with the core system to
support operations such as:
• Importing into Simphony from an external system
• Remote orders from a mobile app
• Exporting employee data for a third-party payroll
Import/Export API
The Simphony import/export API allows automatic importing of objects like menu items
into Simphony. Objects can also be exported to external systems, such as an inventory
system.
Connectivity to the Simphony Import/Export API is done by allowing access to the
following URL example: (https://ServerName/ImportExportAPI/)
It is commonplace that working with 3rd party vendors, that they would be directed to the
API documentation so they can start building and connecting.
For more information, see the Simphony Import/Export API documentation at:
https://docs.oracle.com/en/industries/food-beverage/pos.html.
5-1
Chapter 5
Cloud Connectivity
You can use the SOAP APIs to modify and retrieve employee data through methods that:
• Retrieve employee details by name, external payroll ID, and payroll ID
• Retrieve portal user details Retrieve point-of-sale (POS) roles
• Create new employees and portal users
• Modify the information of existing employees and portal users
• Transfer employees from one home store to another
• Assign employees to an away store
• Terminate employees
• Place employees on leave of absence Rehire employees
• Change employee pay rates
• Create timecards for employees
• Retrieve employee timecard details
• Retrieve labor details for a location
• Retrieve location details
• Retrieve job code and job category details
• Assign magnetic card numbers for home stores
You can use the REST API to access Reporting and Analytics Advanced modules from
mobile devices and tablets through methods that:
• Retrieve all employee details for a location
• Retrieve details for one employee
• Retrieve all locations for an organization
• Retrieve information for one location
• Retrieve all timecard punches for a location
• Retrieve information for all versions of a REST API
• Retrieve information for a specific API version
• Authentication and Authorization
5-2
Chapter 5
Cloud Connectivity
Transaction Services
Transaction services let external systems connect to a transaction services client within
the property.
A transaction service client needs to be created in the EMC and attached to a workstation
record.
Firewall rules should allow and forward 8080 requests to the transaction services client to
consume transaction services utilizing the correct URL and TS Web Service.
An example of a URL for a transaction services client is:
http://WorkstationIPAddress:8080/EGateway/SimphonyPosApiWeb.asmx
Consult with your third-party vendor and provide them with a link to the Transaction
Services API documentation so they can start building and communicating with
transaction services.
5-3
Chapter 5
Cloud Connectivity
NOTE:
DBSync times can be adjusted to be more often or less often depending on
the needs of the customer.
5-4
Chapter 5
Cloud Connectivity
Oracle Cloud
Connection to Applications
Connectivity for the Simphony Application
Full communication to the assigned URL over port 443 is required for CAL authentication
and day-to-day database sync. Failure to allow access results in installation issues and
sales totals not sending from the Check and Posting Service to the cloud.
All workstations must have access to the certificate authority CRL list to ensure that CAL
authentication can happen. See the Security Guide for your Simphony version for more
information.
Simphony Cloud Services are available through the Oracle Cloud Infrastructure (OCI)
Load Balancer as a Service (LBaaS) technology based on TCP specifications. In some
scenarios - particularly for larger properties or enterprises (where a substantial number of
devices are connecting to the Simphony Cloud Service via a single NAT address) -
certain customer firewall devices can have default configurations that conflict with these
standards resulting in issues with specific Simphony workstation functionalities, such as
DB Download. Oracle recommends using the following configurations listed below when
available on the customer firewall device:
• TCP Time Wait Recycle – ENABLED
• TCP Time Wait – 60 seconds or greater
• TCP Sequence Randomization – DISABLED
5-5
Chapter 5
Cloud Connectivity
5-6
Chapter 5
Cloud Connectivity
5-7
Chapter 5
Cloud Connectivity
Web Services
5-8
Chapter 6
Network Infrastructure
6
Network Infrastructure
This chapter provides contextual information that supplements information in Oracle
Networking Expectations.
Network infrastructure refers to the resources network or internet connectivity,
management, business operations and communication possible. Components include
hardware and software systems that manage communication between users, services,
applications, and processes.
The primary components of a network can be broken down into three categories:
• Hardware: Cables, LAN cards, switches, routers, wireless routers, and more
• Software: Network security applications, firewalls, operating systems, network
management, network operations, and more
• Services: IP addressing, Load Balancing, Security protocols, wireless protocols, LAN
service protocols (such as VLAN, VPN, Spanning Tree Protocol), and more
For hardware, software, and services to function together in a seamless manner, there
are standardized processes, which enable any component in the network to operate no
matter the component developer. Hardware, applications, services, and protocols should
all work together. The Open Systems Interconnect (OSI) Model is the framework
developed by the International Organization for Standardization (ISO) to give every
network part a common reference point.
The OSI model is described as follows:
Layer 7 (Application; for example, SNMP, HTTP, FTP): Most of what the user interacts
with is at this layer. Web browsers and other internet-connected applications (like Skype
or Outlook) use Layer 7 application protocols.
Layer 6 (Presentation; for example, encryption, ASCII, PNG, MIDI): This layer converts
data to and from the Application layer. In other words, it translates application formatting
to network formatting and vice versa. This allows the different layers to understand each
other.
Layer 5 (Session; for example, Syn/Ack, NetBIOS): This layer establishes and terminates
connections between devices. It also determines which packets belong to which text and
image files.
Layer 4 (Transport; for example, TCP, UDP, port numbers): This layer coordinates data
transfer between system and hosts, including error-checking and data recovery.
Layer 3 (Network; for example, IP, Routers, Ethernet, Wi-Fi): This layer determines how
data is sent to the receiving device. It’s responsible for packet forwarding, routing, and
addressing.
Layer 2 (Data Link; for example, MAC, Switches, Fiber Optic): Translates binary (or BITs)
into signals and allows upper layers to access media.
Layer 1 (Physical; for example, cable, RJ45): Actual hardware sits at this layer. It
transmits signals over media.
6-1
Chapter 6
Network Infrastructure
6-2
Chapter 6
Network Infrastructure
Why would I want to use MAC Reservations, rather than just assigning IPs
manually?
DHCP as a protocol, can define a Proxy Auto Configuration (PAC) endpoint, as well as a
static IP Routes. In complex LAN configurations, as found in casinos, resorts, and
stadiums, this can be seen as a large plus.
Windows CAL (running on Microsoft Windows 7 or higher operating system) can use
PAC scripts.
Why would I not want to use DHCP?
When a client uses DHCP, primarily the IP Address is not fixed, and, depending on the
lease length, can change at varying points in the day. This can cause issues with Peer-
to-Peer communications. One way around this is using DNS Name resolution, however,
this then means every message sent to a workstation, requires a confirmation from the
DNS Server/Cache that the IP address has not changed, and is still valid. This can add
Lag.
6-3
Chapter 6
Network Infrastructure
Load Balancing
Load balancing refers to efficiently distributing incoming network traffic across a group of
backend servers, also known as a server farm or server pool.
Modern high-traffic websites must serve hundreds of thousands, if not millions, of
concurrent requests from users or clients and return the correct text, images, video, or
application data, all in a fast and reliable manner. To cost-effectively scale to meet these
high volumes, modern computing best practice generally requires adding more servers.
A load balancer acts as the “traffic cop” in front of your servers and routing client requests
across all servers capable of fulfilling those requests in a manner that maximizes speed
and capacity utilization and ensures that no one server is overworked, which could
degrade performance. If a single server goes down, the load balancer redirects traffic to
the remaining online servers. When a new server is added to the server group, the load
balancer automatically starts to send requests to it.
Load Balancing Algorithms
Different load balancing algorithms provide different benefits; the choice of load balancing
method depends on your needs:
• Round Robin: Requests are distributed across the group of servers sequentially.
• Least Connections: A new request is sent to the server with the fewest current
connections to clients. The relative computing capacity of each server is factored into
determining which one has the least connections.
• Least Time: Sends requests to the server selected by a formula that combines the
fastest response time and fewest active connections. Exclusive to NGINX Plus.
• Hash: Distributes requests based on a key you define, such as the client IP address
or the request URL. NGINX Plus can optionally apply a consistent hash to minimize
redistribution of loads if the set of upstream server’s change.
• IP Hash: The IP address of the client is used to determine which server receives the
request.
• Random with Two Choices: Picks two servers at random and sends the request to
the one that is selected by then applying the Least Connections algorithm (or for
NGINX plus the Least Time algorithm, if configured).
6-4
Chapter 6
Network Infrastructure
X-Forwarded- Headers
When using a load balancer, it is not the clients that are connecting to the application
servers, but the load balancer in the middle. The application servers lose the metadata as
to who is connecting to them and how. The X-Forwarded- HTTP Header set allows this
data to be added back in and consumed. This is important for some applications, and
useful for others. The following X-Forwarded- Headers are recommended to be
configured for all Oracle Food and Beverage web applications:
• X-Forwarded-For
• X-Forwarded-Scheme <<Scheme/Proto?>>
• X-Forwarded-Proto <<Scheme/Proto?>>
• X-Forwarded-Host
Security
Network security is any activity designed to protect the usability and integrity of your
network and data.
• It includes both hardware and software technologies
• It targets a variety of threats
• It stops them from entering or spreading on your network
• Effective network security manages access to the network
The following are some of the key threats that affect the site:
• Service disruption: Botnets, malware, adware, spyware, viruses, DoS attacks (buffer
overflows and endpoint exploitation), Layer-2 attacks, and DDoS on services and
infrastructure.
6-5
Chapter 6
Network Infrastructure
Firewalls
Firewalls prevent unauthorized access of a third-party in a private network. These are the
network security systems (hardware- and software-based) that monitor and control the
traffic flow between the Internet and the private network based on a set of user-defined
rules. Firewalls shield the computer network of an organization against unauthorized
incoming or outgoing access and renders the best network security.
There are three basic types of firewalls that are used by companies to protect their data
and devices to keep destructive elements out of network, viz. Packet Filters, Stateful
Inspection and Proxy Server Firewalls.
Packet Filters
Packet Filter Firewall controls the network access by analyzing the outgoing and
incoming packets. It lets a packet pass or block its way by comparing it with pre-
established criteria like allowed IP addresses, packet type, port number, etc. Packet
filtering is suitable for small networks, but it gets complex when implemented in larger
networks. These types of firewalls cannot prevent all types of attacks. They can neither
tackle the attacks that use application layers vulnerabilities, nor can they fight against
spoofing attacks.
6-6
Chapter 6
Network Infrastructure
Stateful Inspection
Stateful Packet Inspection (SPI), which is also sometimes called dynamic packet filtering,
is a powerful firewall architecture that examines traffic streams from end to end. These
smart and fast firewalls use an intelligent way to stop unauthorized traffic by analyzing
the packet headers and inspecting the state of the packets along with providing proxy
services. These firewalls work at the network layer in the OSI model and are more secure
than basic packet filtering firewalls.
Proxy Server Firewalls
Also called the application level gateways, Proxy Server Firewalls are the most secure
type of firewalls that effectively protect the network resources by filtering messages at the
application layer. Proxy firewalls mask your IP address and limit traffic types. They
provide a complete and protocol-aware security analysis for the protocols they support.
Proxy Servers offers the best Internet experience and results in the network performance
improvements.
No matter which firewall you select, ensure it is properly configured, as any loophole can
cause more damage than no firewall at all. Create a secure network and deploy a
suitable firewall to limit the access to your computer and network.
6-7
Chapter 6
Network Infrastructure
The purpose of the IPS is to catch dangerous packets and drop them before they reach
their target. It’s more passive than an IDS, simply requiring that the database gets
regularly updated with new threat data.
Point of emphasis: IDS and IPS are only as effective as their cyberattack databases.
Keep them updated and be prepared to make manual adjustments when a new attack
breaks out in the wild and/or the attack signature isn’t in the database.
IPS and IDS vs Firewalls
Not having an IPS system results in attacks going unnoticed. A firewall does the filtering,
blocking, and allowing of addresses, ports, service, but also allows some of these
through the network. However, this means that the access allowed is just let through, and
firewalls cannot tell whether that traffic is valid and normal. This is where the IPS and IDS
systems come into play.
So, where firewalls block and allow traffic through, IDS and IPS detect and look at that
traffic in close detail to see if it is an attack. IDS and IPS systems have sensors,
analyzers, and GUIs to do their specialized job.
IPS and IDS Systems
IPS and IDS systems are used for the following types of attacks:
• Policy Violations: Rules, protocols and packet designs that are violated. An example
would be an IP packet that are incorrect in length.
• Exploits: Attempts to exploit a vulnerability of a system, application, or protocol. An
example would be a buffer overflow attack.
• Reconnaissance: Is a detection method that is used to gain information about system
or network such as using port scanners to see what ports are open.
• DOS, DDOS: This is when an attack attempts to bring down your system by sending
a vast number of requests to it such as SYN flood attacks.
Certificates
A certificate is a digital file containing information issued by a trusted Certificate of
Authority (CA) that indicates the server or website endpoint communication is secured
using an encrypted connection.
Certificate Types
• Domain-Validated (DV): Checked against a domain registry to prove ownership of the
site but does not offer any identifying organizational information. The CA can typically
validate through email, DNS, or HTTP. Easy to validate and least secure because
very little information is required.
• Organization-validated (OV): Checked against a domain registry to prove ownership
of the site, as well as location, particular country, state, and city. The CA can typically
validate through email, DNS, or HTTP. Takes longer to validate and more secure
than domain-validated since more information is required.
• Extended Validation (EV): Checked against a domain registry to prove ownership of
the site, as well as location, particular country, state, and city. In addition, the
certificate authorities only grant these kinds of certificates after they have received
6-8
Chapter 6
Network Infrastructure
documents that prove two things: the company is legally registered and location of a
company and the consistency between those records. The CA can typically validate
through email, DNS, or HTTP. Takes the longest to validate and most secure.
Simphony architecture supports both the server side and client side of authentication.
Server authentication is accomplished via configuring the HTTPS connection by installing
a TLS 1.2-compliant certificate on the server issued by Certification Authority. Client-side
authentication is required for Simphony operations and cannot be disabled.
Simphony Workstation Authentication:
• Credentials are transmitted over an encrypted Transport Layer Security (TLS)
channel to the application server.
• After the application server validates the credentials, an authentication token is
issued that is returned to an encrypted channel back to the client.
• The token is stored by the client in an encrypted format inside its protected storage.
• All subsequent messages from the client to the server contain a security header that
is encrypted with the public half of the key contained within the authentication token.
• The server stores a private key for each authenticated client in the database and can
verify authenticity of an incoming request.
What is Transport Layer Security (TLS)?
TLS is a cryptographic protocol that provides end-to-end communications security over
networks and is widely used for internet communications and online transactions. It is an
Internet Engineering Task Force (IETF) standard intended to prevent eavesdropping,
tampering, and message forgery. Common applications that employ TLS include Web
browsers, instant messaging, e-mail, and voice over IP.
Many businesses use TLS to secure all communications between their Web servers and
browsers regardless of whether sensitive data is being transmitted.
TLS’s predecessor, Secure Socket Layer (SSL) was developed by Netscape in 1995.
SSL version 1.0 and 2.0 contained many security flaws that prompted a complete
redesign of the protocol. In 1996, Netscape released SSL version 3.0 which was the
basis for TLS1.0. In 1999, the PCI Council suggested the eventual deprecation of SSL as
TLS 1.0 was a significant upgrade to SSL 3.0.
TLS vs. SSL
TLS is more efficient and secure than SSL because it has stronger message
authentication, key-material generation, and other encryption algorithms. For example,
TLS supports pre-shared keys, secure remote passwords, elliptical-curve keys and
Kerberos whereas SSL does not. TLS and SSL are not interoperable, but TLS does offer
backward compatibility for older devices still using SSL.
The TLS protocol specification defines two layers. The TLS record protocol provides
connection security, and the TLS handshake protocol enables the client and server to
authenticate each other and to negotiate security keys before any data is transmitted.
The TLS handshake is a multi-step process. A basic TLS handshake involves the client
and server sending “hello” messages, and the exchange of keys, cipher message and a
finish message. The multi-step process is what makes TLS flexible enough to use in
different applications because the format and order of exchange can be modified.
6-9
Chapter 6
Network Infrastructure
CRL
Certificate Revocation List (CRL) is a mechanism for a certificate authority to revoke a
Signed Certificate if they find it has been issued in error or believe that the Private Key
could have been compromised.
When the CA responds to the CSR, and signs the certificate, a data "Field" is added to
the SSL Certificate that contains the CRL Distribution Endpoint(s).
At this endpoint, there is a new file published at an interval defined by the CA. As a
certificate is deemed to be revoked/invalid by the CA, they add the Certificate signature
to the CRL list on the publish date.
If the HTTPS Client finds the SSL certificate within the CRL list, it will be understood as
invalid and no longer trusted by the client.
Depending on the configuration of the Client, failure to reach the CRL endpoint can be
treated in the same way as finding the SSL Certificate on the CRL List. Although this is a
temporary false positive, it will prevent communication.
The CAL Client, Labor Management Driver and Gift and Loyalty drivers all treat a failure
to reach a CRL endpoint as an untrusted SSL Server
For Online Certificate Status Protocol (OSCP), rather than the SSL certificate advertising
where to download a list of "Invalid" certificates, an OCSP responder is advertised. When
the certificate hash is passed, a valid or invalid response is returned.
OCSP stapling is where the server asks the OCSP responder for a validation hash itself,
and for a set period of time, sends this to the client. This removes the need for the client
to download a potentially large CRL List.
Simphony does not support OCSP and OCSP stapling.
Proxy
A proxy server sits between client and external network server resources. The proxy
receives requests to resources from the client and forwards them to the appropriate
resource. This keeps the client protected from unwanted network traffic.
The most common types of proxy servers are SSL, FTP, HTTP, and anonymous.
SSL (Secure Socket Layer) Proxy Server: Intervenes in the connection between the
sender and the receiving resource to help prevent unwanted intrusion such as hacking of
personal or financial data transmitted over the internet.
FTP (File Transfer Protocol) Proxy Server: Used in different applications where data is
uploaded to a server. In advanced mode, FTP offers advanced security such as cache
function and encryption methods which make the transmission process more secure.
HTTP (Hypertext Transmission Protocol) Proxy Server: Provides for the caching of web
pages and files to allow faster access. HTTP can work with SSL to provide a more secure
connection denoted by HTTPS.
Anonymous Proxy Server: Provides privacy while browsing the Internet.
6-10
Chapter 6
Network Infrastructure
6-11
Chapter 7
Networks
7
Networks
This chapter provides contextual information that supplements information in Oracle
Networking Expectations.
A computer network is a group of computers that use a set of common communication
protocols over digital interconnections for sharing resources located on or provided by the
network nodes.
Simphony is installed in wired, wireless, and hybrid networks.
Wired Networks
Wired network design is a critical component of Point-of-Sale sites. Wired networks use
cables to connect other communication devices such as switches and routers to ensure
customer transactions move successfully from workstation to server and changes in the
database on the server are pushed down to the workstations.
A wired network provides the following benefits:
• Faster data speed
• Less interference
• Connect devices at longer distances
• Increased security
• More control over device connections
Network Types
A network consists to two or more computers connected to share resources.
7-1
Chapter 7
Networks
The WAN type selected should handle all bandwidth activities to the satisfaction of the
customer. The following table describes WAN connectivity options:
Available Options for WAN Connectivity
7-2
Chapter 7
Networks
7-3
Chapter 7
Networks
7-4
Chapter 7
Networks
Cable Types
Cables connect two or more computers or networking devices together to move data
through the network.
The following data cable types are found in a typical Oracle MICROS Simphony point of
sale installation and are discussed in this section:
• Twisted pair
• Fiber optic
• Coaxial
• Integrated Device Network (IDN)
Twisted Pair
In twisted pair cabling, two conductors are twisted together to provide shielding from
electromagnetic interference.
Types of Ethernet cable consists of Unshielded Twisted Pair - UTP and Shielded Twisted
Pair - STP. Ethernet cables are terminated with an RJ45 connector.
An Ethernet cable can be attached to a patch panel and to wall jacks.
All Oracle MICROS Workstations contain at least one 8-pin modular port designated for
communication with Ethernet networks.
An Ethernet cable can consist of a few solid copper cables. The copper in these cables is
of a thicker gauge and makes these types of Ethernet cables ideal for permanent
installation.
An Ethernet cable can consist of many strands of copper cables. The copper in these
cables is of a thinner gauge and makes these types of Ethernet cables flexible and ideal
for wall jack to workstation connections.
Unshielded Cable
Unshielded cables are manufactured without any additional insolation or protection from
electromagnetic interference.
Shielding materials such as meshes, or aluminum foil are not used in the production of
unshielded cables.
Unshielded cables can suffer from data flow disruption caused by all kinds of electrical
interference.
Unshielded network cables should never be installed next to any electrical source as the
magnetic field generated by the electrical installation may disrupt the data flow.
7-5
Chapter 7
Networks
Shielded Cable
Shielded cables are manufactured with the intention of reducing any external magnetic
interference. These Ethernet cables may come with a drain cable which provides a
mechanism for grounding the cable.
Sources of Interference
7-6
Chapter 7
Networks
Despite shielding, grounding, and bypassing, metallic cable can behave like antennas,
making them susceptible to RF noise. The greater the length of the cable, the greater the
possibility it will be subject to interference from nearby electrical equipment.
Metallic cables are subject to an effect that produces voltage potentials between the
cable and electrical ground. This can occur in large buildings or campus environments
where equipment is powered from multiple AC power panels that are not operating at the
same AC ground potential.
Fiber Optic
Fiber optic cables have conductors made of glass, rather than metal. A typical fiber cable
is composed of a glass core that carries the light signals. The core is encased in cladding
that keeps the light contained in the core.
No electrical impulses are carried over a fiber optic cable as in a metal cable. Instead, the
electrical impulses are converted to pulses of light that indicate whether a bit is 1 or a 0.
Signals on metal cables and the light in fiber optic cable travel at approximately the same
speed, but light meets less resistance as it travels along the cable. Therefore, light
signals go further with less attenuation. Fiber optic links on simple LANs can run without
a repeater to distances of more than 3.5 kilometers.
Fiber-based cabling systems are more reliable than metallic cabling systems because
they are immune to electrical noise generated by support equipment in the building.
Fiber is recommended for distances greater than 100 meters or as a solution to ground
potential issues. A number of cost-effective media converters conforming to this standard
are available. Many use fiber connectors that are easy to terminate.
NOTE:
Fiber optic cables can be used switch to switch. Fiber optic cables can be used
with fiber to Ethernet converters.
7-7
Chapter 7
Networks
Coaxial
Coaxial cable is a type of shielded cable. It consists of a single copper wire that is
surrounded by layers of insulation. Coaxial cable is commonly used by Cable TV and
Internet providers.
Common types of Coaxial Cable are RG-59 and RG-6. The RG-6 coaxial cable uses a
lower gauge of copper wire and has better insulation than the RG-59 coaxial cable.
Coaxial cables are terminated with a threaded F-type connector.
Quick Service Restaurants and Table Service Restaurants might get their Internet access
from a service provider that could terminate the restaurant's WAN access with a coaxial
connection.
Coaxial termination can be converted to Ethernet cables with a Cable Modem or MoCA
enabled Router.
Name Media
Coaxial RG-59
RG-6
NOTE:
Coaxial cables can be used with MoCA to Ethernet converters.
7-8
Chapter 7
Networks
A patch cable is then installed between the remaining 6-pin connector on local IDN
printer and the faceplate connector to convert the IDN transmit/receive pairs into
ANSI/TIA/EIA-568-A compatible transmit/receive pairs.
Install a pair of Category 6 or better shielded cables between the patch panel and the two
connectors on the wall plate near each printer location. The dual run to the faceplate is
required to obtain cable certification since a daisy chain configuration is not part of
Ethernet topology. Terminate the drain wire of each cable run at the patch panel.
To maintain the IDN daisy chain, install Category 6 or better patch cables at the patch
panel. At each remote printer location, install a pair of patch cables to maintain the daisy
chain at the printers. The last printer in the chain requires only one patch cable.
IDN cable runs are terminated at the workstation with a RJ45 connector and at the
network module or wall plate with a RJ12 connector.
All MICROS Workstations contain at least one 8-pin modular port designated for driving
IDN devices.
7-9
Chapter 7
Networks
Specifications
The efficiency of a network can be affected by the speed of data throughput, maximum
distance between network devices and time delay between data transfer.
These topics are discussed in this section:
• Bandwidth
• Distance
• Latency
Bandwidth
Bandwidth is the throughput capacity of a network medium or protocol.
Variations in the network signals can cause degradation on the network.
Sources of degradation can be cables that are too long or wrong cable type.
7-10
Chapter 7
Networks
Distance
Cabling distance is the specified maximum length a particular cable type can be run
without signal degradation.
Types of cable used in a LAN include Ethernet, coaxial and fiber optic.
Latency
Latency refers to a time delay; for example, the gap between the time a device requests
access to a network and the time it receives permission to transmit.
Latency is the measurement of time taken for network packages to traverse a network
and is a function of several factors, most notably distance from the data center, access
technology, last-mile bandwidth and network contention. It is the single biggest factor that
affects perceived application performance.
Latency can be tested from the proposed Simphony site by running a web-based speed
test or by running a Traceroute to the proposed Simphony datacenter. Both tests
measure network latency from the client network to the datacenter over the public
Internet.
These tests can verify that the Simphony location is using the most efficient path
available.
7-11
Chapter 7
Networks
Hardware
Network hardware connects multiple devices together to share common resources in a
local area or access them across the globe.
This section discusses the following topics:
• Router
• Gateway
• Switch
• Network Interface Card (NIC)
• Powerline Extender
• Modem
Router
A router is a networking device that functions as a gateway to forward data packets
between computer networks.
The router will be situated between the WAN and the LAN. It may be connected to a
modem, ONT or CSU/DSU on the WAN side and networking switches on the LAN side.
Points to consider:
• Routers may be supplied by the provider of the WAN network access.
• May want to upgrade the router to one with capabilities not offered by device
supplied by the provider of the WAN network access.
Gateway
Gateways provide connectivity between networks. The connectivity could be between the
WAN and the LAN. For this setup, the gateway functionality would be performed by a
router.
The connectivity could be between multiple LAN networks for between the LAN network
and the WAN network. Here the gateway functionality could be performed by a router,
switch or computer.
7-12
Chapter 7
Networks
Switch
Hubs are used for connecting multiple Ethernet segments together. Hubs extend the
distance of a network connection further than the limits of each length of Ethernet cable.
Hubs have fallen out of favor for networking because they relay all communication to all
of their network ports. Newer devices such as switches can manage the communication
so that it is only transmitted to the intended device on a specific port.
An unmanaged switch can manage the network communication so that it is only
transmitted to the intended device on a specific port. The purpose of a switch is to extend
the distance of a network connection further than the limits of each length of Ethernet
cable. The unmanaged switch is more efficient that the hub as it can "learn" the mac
addresses of connected devices and route messages only to the correct destination.
A managed switch gives the end user greater control over the LAN network and is
recommended for medium to large point of sale networks. Initially a managed switch will
function like an unmanaged switch but can be configured through an interface to do much
more. These switches provide the ability to control the flow and performance of the
communication on a network.
• -Virtual LAN - VLAN
• -Precise monitoring
• -Quality of Service - QOS
Smart switches are an evolving technology. This is like a cross-over from unmanaged
switch to be managed. They come with some manageable features, Quality of Service
(QoS) and security but considered a lite version compared to the full featured
manageable switches.
7-13
Chapter 7
Networks
The following diagrams show ports on the back of Oracle MICROS workstations:
Primary I/O Panel of the Oracle MICROS Workstation 625X/655X and 625E with a
single or dual Gigabit Ethernet port.
Primary I/O Panel of the Oracle MICROS Workstation 5A with a single 10/100/1000
Ethernet port.
Points to consider:
• Configuration settings for the network card
• Maximum speed of the network card
Powerline Extender
Powerline extenders are network adapters that use existing electrical cabling for the
transmission of network communication. A minimum of two powerline adapters are
required. While powerline adapters are affordable and effective for home use, they are
not recommended for use by point-of-sale networks.
Modem
A cable modem serves as a connection between a cable provider's WAN access and a
router for the LAN.
A DSL modem serves as a connection between a DSL/ADSL line WAN and a router for
the LAN.
A Channel Service Unit (CSU) or Data Service Unit (DSU) is a modem-like interface that
serves as a connection between a leased line WAN and a router for the LAN. It may also
be available as a module that can be inserted into a networking router.
Points to consider:
• Placement of the modem to avoid electrical interference.
• Cabling between modem and WAN.
7-14
Chapter 7
Networks
Installation
Network cables should be installed properly with the correct termination.
These topics are discussed in this section:
• Cabling
• Termination
Cabling
UTP Cable Installed in Metal Conduit
PVC Conduit
When cables are buried below the floor level, the use of PVC Conduit is permitted. When
using PVC conduit in concrete flooring, the following guidelines apply:
• Locate the PVC conduit at least six inches below the surface of the floor.
• Locate the PVC conduit at least six inches from other nearby conduits.
Cable Damage
Lightning
Lightning does not need to directly strike the cabling to cause damage or disruption to the
system. Nearby lightning strikes produce strong electromagnetic fields that can induce
voltages on the data transmission cables causing disruptions or damage. Use a
grounded ferrous metal conduit for areas subject to frequent thunderstorm activity. In
cases where shielded cables installations in geographical are used, reduce the effects of
lightning by placing the cable runs as close to ground level as possible.
7-15
Chapter 7
Networks
Electrical Motors
Motors of various sizes are found in a typical restaurant or hotel site. Use a grounded
ferrous metal conduit when running cabling at distances less than two feet from motors
that are 1/4 horsepower or smaller, or less than six feet from motors larger than 1/4
horsepower.
The probability of RFI varies in accordance with many factors, including transmitter
power, location, construction materials used in the building, and the physical placement
of the power and data transmission cables.
Wireless
Designing and verifying a solid wireless network is critical to reliable POS operations
which are susceptible to packet loss and latency. This section will provide details of site
considerations, site surveys, AP choice, SSID design, channel selection, roaming
consideration, Wi-Fi encryption, and testing and debugging strategies.
Site Considerations
A wireless site survey is a process that is part of the design and implementation of a
wireless network.
Results from a wireless site survey will determine the strategic position of the access
points, a delivery of the required Wi-Fi coverage, POS bandwidth requirements, roaming
and quality of service.
A wireless site survey is a necessary step in understanding the infrastructure of a
wireless network.
The purpose of any wireless site survey is to identify any Wi-Fi interfering obstacles that
could negatively impact the WLAN performance.
For more details, refer to chapter 4.
Failure to conduct a wireless site survey may result in poor network performance.
All site surveys are performed by the vendor with the intention of providing the best
possible outcome for the enterprise.
The vendor will take into consideration different factors when designing and implementing
a wireless network infrastructure which will be based on the survey results and the
business requirements.
There are several guidelines on how to conduct a wireless site survey, but every vendor
will use different techniques and types of software when conducting a survey.
An initial survey should be conducted in an empty environment as part of the evaluation
process and prior to any wireless hardware installation.
A wireless survey should then be repeated in real-life conditions when the interference
from the environment and the Wi-Fi demand is the highest.
7-16
Chapter 7
Networks
IMPORTANT:
All mobile and electronic devices connected to the wireless network will
influence the network performance so conducting performance tests during the
highest demand window is vital to truly evaluate the network limits and
performance.
The results of a survey conducted in an empty property cannot be used as a
performance benchmark and cannot be compared with the results of a survey
conducted in a busy environment.
NOTE:
Outdoor access points need to be able to reach a large area to be effective.
Some vendors offer specific access points that are built for use in outdoor
environments as these offer the best outdoor coverage for the business.
7-17
Chapter 7
Networks
Wi-Fi Interference
Wi-Fi interference is an unintended signal emitted from any source other than the WLAN
infrastructure.
Interference can impair the normal function of the WLAN and should always be identified
and mitigated.
Interference is a common phenomenon in a wireless network and in some cases, it
cannot be avoided.
Interference can reduce the network’s performance and availability as the wireless
signals can be intercepted or blocked by various factors or even preventing devices from
connecting to the wireless network efficiently.
Interference from Non-Wi-Fi Devices
Some non-network devices, such as microwave ovens, cordless phones, or wireless
CCTV installations can interfere with wireless channels. Most often, these devices will
use the 2.4 GHz frequency.
Co-Channel Interference
Interference represents the total amount of competing in-band signals that prevent the
access points from accepting the intended signal with clarity.
The extreme proximity of so many client devices on adjacent and non-adjacent channels
increases interference levels and therefore, impacting the performance across the
WLAN.
The correct design of a wireless network ensures that all connected devices have
sufficient uninterrupted communication while mitigating the potential for collisions and
limiting the impact of interference.
Internal Structures
The building materials of the structures where the access points operate can cause
varying degrees of wireless signal interference or blockage. Concrete, brick, and other
dense materials can block Wi-Fi signals. These obstacles should be taken into
consideration when installing access points.
Mitigating Interference
A detailed site survey should always be conducted to identify and mitigate any
interference and potential Wi-Fi signal issues.
POS devices require a good level of uninterrupted bandwidth and a clear path of
communication with the CAPS and an external environment.
Failure to recognise and resolve interference may lead to poor Wi-Fi connection and
unstable performance that can lead to financial loss and discrepancies.
An interference survey should include the POS SSID and all access points that the
devices connect to.
When testing the interference levels in the environment where the POS devices operate,
the tester should always use POS devices as a benchmark of any negative influences on
the performance.
Tests conducted using other Wi-Fi devices may produce different results as all wireless
devices respond differently in specific circumstances and conditions.
7-18
Chapter 7
Networks
The testing should be carried out in all locations where the POS devices operate such as:
• Kitchens
• Corridors
• Offices
• POS devices charging stations
Size and Scale
All venues regardless of their size may experience poor wireless performance if any of
the basic best practice conditions have not been followed.
Large venues may require the installation of several wireless controllers and hundreds of
access points where small venues may just be operating with two or three access points.
Regardless of the operational size and requirements, all infrastructures can experience
problems.
Wireless network performance can be compromised by intentional and unintentional
influences, and it is the responsibility of the provider and the vendor to ensure that all
negative aspects have been eliminated.
Smaller venues are susceptible to wireless coverage and neighboring wireless flooding.
Large venues and installations are more likely to experience the following problems. Pay
special attention to these areas when designing and verifying an installation:
• Channel overlapping
• Excessive number of access points
• High network demand
• Bandwidth sizing issues
• Network latency
• Client management issues
• DHCP issues
• DHCP lease
7-19
Chapter 7
Networks
Infrastructure
The communication from the controller to the access points can be disrupted by
electromagnetic fields, if the data cables are installed close to any devices that emit such
fields.
Shielded cabling is recommended as it can prevent any interference.
Unshielded network cables should never be installed next to any electrical source as the
magnetic field generated by the electrical installation may disrupt the data flow.
Interference noise can be introduced in cabling by the following sources:
• Fluorescent lighting
• Electric motors
• Transformers
• Electrical installations
Taking Measurements
The coverage area of the access points should be measured by checking the data rate or
the signal strength quality for all broadcasting access points at all distances and areas
instead of focusing only on the signal strength in the heat map open-plan view.
Understanding Wi-Fi Heat Maps
Open plan heat map refers to the entire area field view which will show the overall
Wi-Fi coverage however, this type of measuring function will not allow for monitoring of
an individual SSID MAC addresses "Media Access Control Address".
Recognizing SSIDs
Each access point (AP) will broadcast the SSID “Service Set Identifier” MAC address
which should not be confused with the access point hardware MAC address.
The Wi-Fi monitoring application cannot be used to monitor an individual access point but
all SSIDs that the (AP) broadcasts.
Access points can be configured to broadcast several individual SSIDs, these can include
open public networks, internal staff networks, and the dedicated POS network.
Grouping All SSIDs
Not all wireless networks are visible, so the analysis of visible and hidden SSIDs is
necessary to recognize and group all networks that are configured to broadcast by the
individual access point.
Grouping of all MAC addresses should be performed to estimate the correct number of
individual networks in a specific area as some neighboring broadcasting SSIDs can also
be visible in the designated areas.
7-20
Chapter 7
Networks
A wireless network map can be created using the analysis of the following:
• Hidden and visible MAC address in the 2.4 GHz and 5 GHz band
• Hidden and visible SSID channels in the 2.4 GHz and 5 GHz band
• Amplitude dBm of the hidden and visible SSIDs channels in the 2.4 GHz and 5
GHz band
Creating MAC Address Map
Creating a Wi-Fi map using the MAC addresses in the 2.4 GHz and the 5 GHz band
SSID MAC addresses can be grouped by identifying and comparing similarities between
them.
The example below shows similarities between the MAC addresses from four different
SSIDs that originate from a single access point.
2.4 GHz Band
SSID1 MAC Address 1C:59:9B:A6:74:01 Hidden SSID Channel 1
SSID2 MAC Address 1C:59:9B:A6:74:02 Visible SSID Channel 1
SSID3 MAC Address 1C:59:9B:A6:74:03 Hidden SSID Channel 1
SSID4 MAC Address 1C:59:9B:A6:74:04 Visible SSID Channel 1
5 GHz Band
SSID1 MAC Address 1C:59:9B:A6:74:20 Hidden SSID Channel 46
SSID2 MAC Address 1C:59:9B:A6:74:21 Visible SSID Channel 46
SSID3 MAC Address 1C:59:9B:A6:74:22 Hidden SSID Channel 46
SSID4 MAC Address 1C:59:9B:A6:74:23 Visible SSID Channel 46
Creating hidden and visible SSID channel saturation map in the 2.4 GHz and the 5
GHz band
The channel saturation factor should only be considered for changes if the dBm level is
similar in a specific area in which the testing is taking place.
The saturation level may change depending on the tester and the access point position
therefore, it cannot be assumed that all areas will suffer channel saturation when only
one specific area has been identified.
Channel saturation will vary in different areas, and it is dependent on three factors:
• Number of access points installed in the area
• Number of access points in the neighboring area
• Access points configured with static channels
The example below shows channel 1 saturation with varied amplitude dBm signal level
broadcast from several access points in the area.
The dBm level varies significantly between the SSIDs and this example does not
represent a problem for devices where the roaming threshold has been set correctly.
7-21
Chapter 7
Networks
POS devices operating in this area sample will connect to the strongest broadcasting
access point and only switch to another access point (AP) when a stronger signal is
detected by the device.
2.4 GHz Band
SSID1 MAC Address 1C:59:9B:A6:74:01 Hidden SSID Channel 1 dBm -30
SSID2 MAC Address 1B:01:00:C6:80:AB Visible SSID Channel 1 dBm -65
SSID3 MAC Address 1A:00:02:01:AA:03 Hidden SSID Channel 1 dBm -78
SSID4 MAC Address AA:60:9C:A1:04:C1 Visible SSID Channel 1 dBm -81
5 GHz Band
SSID1 MAC Address 1C:59:9B:A6:74:AA Hidden SSID Channel 46 dBm -30
SSID2 MAC Address 1B:01:00:C6:80:AB Visible SSID Channel 46 dBm -65
SSID3 MAC Address 1A:00:02:01:AA:AC Hidden SSID Channel 46 dBm -78
SSID4 MAC Address AA:60:9C:A1:04:A4 Visible SSID Channel 46 dBm -81
Creating hidden and visible SSID amplitude dBm map in the 2.4 and the 5 GHz
band
The example below demonstrates a channel overlapping broadcast by four individual
access points positioned in close proximity.
Typically, this type of configuration is a result of a poorly configured Wi-Fi network or
manual channel assignment.
Devices connected to these access points can experience interference, which can lead to
connection instability.
In this scenario, each access point should be given a unique channel depending on the
distance from another AP in the area.
2.4 GHz Band
SSID1 MAC Address 1C:59:9B:A6:74:01 Hidden SSID Channel 1 dBm -55
SSID2 MAC Address 1B:01:00:C6:80:AB Visible SSID Channel 1 dBm -58
SSID3 MAC Address 1A:00:02:01:AA:03 Hidden SSID Channel 1 dBm -52
SSID4 MAC Address AA:60:9C:A1:04:C1 Visible SSID Channel 1 dBm -54
5 GHz Band
SSID1 MAC Address 1C:59:9B:A6:74:AA Hidden SSID Channel 46 dBm -55
SSID2 MAC Address 1B:01:00:C6:80:AB Visible SSID Channel 46 dBm -58
SSID3 MAC Address 1A:00:02:01:AA:AC Hidden SSID Channel 46 dBm -52
SSID4 MAC Address AA:60:9C:A1:04:A4 Visible SSID Channel 46 dBm -54
7-22
Chapter 7
Networks
Debugging
When troubleshooting POS device performance issues, always collaborate with the Wi-Fi
provider, as only a small part of the entire infrastructure can be intercepted using external
tools.
Logs and reports obtained from the Wi-Fi provider always play a big part in
troubleshooting the problem because not all information can be captured when externally
observing the wireless network behavior.
The approach should be divided into the following sections:
• Entire Wireless Enterprise
Learn about the entire wireless network and do not focus only on the POS
network.
Obtain information from the wireless provider about the entire infrastructure.
• POS Network Focus
Segregate the POS network from the enterprise and test its position within the
infrastructure.
Perform tests from within the POS environment instead of focusing on the entire
network.
Test POS network performance using POS devices and follow the
communication path.
• POS Data Capture
Gain an understanding of the POS data traffic and follow its complete path.
Use appropriate tools to capture data and seek assistance from the wireless
provider when access to the internal network is limited.
• Monitoring
The monitoring tests should always be carried out during peak times when the
network demand is the highest.
Expand the monitoring field to all POS devices during the tests to capture more
data.
Do not use a single POS device for monitoring as the results may be skewed by
the POS device itself.
Do not use any other Wi-Fi capable hardware when testing the wireless
performance as not all devices respond identically.
7-23
Chapter 8
Glossary
8
Glossary
Symbols and Numbers
802.XX
IEEE Standard for port-based Network Access Control
A
AC power
AC stands for alternating current which means the current constantly changes direction
Access Point
A networking device that allows for multiple wireless devices to connect to a network
ADSL
Asymmetric Digital Subscriber Line
A type of broadband networking technology
AES
Advanced Encryption Standard
AP
Access Point
A networking device that allows for multiple wireless devices to connect to a network
Application layer
An application layer is an abstraction layer that specifies the shared communications
protocols and interface methods used by hosts in a communications network
API
Application programming interface
Asynchronous
Data transmitted intermittently or not at the same intervals
ATM
Asynchronous Transfer Mode
Authentication
A security measure designed to verify the identity of a transmission
8-1
Chapter 8
Glossary
B
Backbone
Core networking component that interconnects different computer networks
Band
Band is a specific range of frequencies in the radio frequency spectrum
Bandwidth
Bandwidth is the maximum rate of data transfer across a given path. Bandwidth may be
characterized as network bandwidth
Bps
Bits per second
Broadband
High-capacity bandwidth network transmission
Bus
A bus topology is a topology for a Local Area Network in which all nodes are connected
to a single cable
C
CA
Certificate authority
Cable Modem
A cable modem is a device that operates over coax cable
Cabling
The media used for transmission of data in computer networking
CAL
Client application loader
CAPS
Check and Posting Service
CAT 6
Category 6 Ethernet cable
CCTV
Closed circuit television
CCTV RF
• Closed circuit television Radio Frequency
Passive Infrared
• Microwave
• Dual Technology Motion Sensors
Channel
A Wi-Fi channel is a medium through which wireless networks can send and receive data
8-2
Chapter 8
Glossary
Cloud
On-demand availability of computer system resources
Coaxial cable
Coaxial cable is a type of shielded cable. It consists of a single copper wire that is
surrounded by layers of insulation. Coaxial cable is commonly used by Cable TV and
Internet providers
CRL
Certificate Revocation List Channel
CRL Endpoint
An extension which describe the endpoint to acquire the CRL, which is issued by the CA
that signed this certificate
CSIRT
Computer Security Incident Response Team
CSR
Certificate signing request
CSU
Channel Service Unit
D
DB
Database
DBSync
Database Synchronization
DHCP
Dynamic Host Configuration Protocol
DOS\DDOS
An attack attempts to bring down your system by sending a vast number of requests to it
such as SYN flood attacks
Downlink
Connection from data communications equipment towards data terminal equipment
DSL
Digital subscriber line
DSU
Data Service Unit
Dual-Band in Wireless
A device capable of operating and broadcasting in two different frequencies 2.4GHz and
5GHz
8-3
Chapter 8
Glossary
E
E-1
A leased-line connection (Europe) capable of carrying data at 2,048,000 bits-per-second
E-3
A leased-line connection (Europe) capable of carrying data at 34,386,000 bits-per-second
EMC
Enterprise Management Console
EMI
Electromagnetic magnetic interference
Encryption
The process of converting data into a cipher or code in order to prevent unauthorized use
Ethernet
A system that is used for connecting several computer systems to form a local area
network. Ethernet can use protocols to control the passing of information and to avoid
simultaneous transmission by two or more systems
F
Fast Ethernet
Fast Ethernet physical layers carry traffic at the nominal rate of 100 Mbit/s
FDDI
Fiber Distributed Data Interface
Fiber Optic
Refers to the medium and the technology associated with the transmissions of
information as light impulses
Firewall
A network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules
Flow Control
Flow control is the management of data flow between computers
FQDN
Fully qualified domain name
Frame Relay
Frame Relay is a packet switching technology that fragmented into transmission units
called frames and sent in high-speed bursts through a digital network
FTP
File transfer protocol
F-Type Connector
A connector for termination of coaxial cable
8-4
Chapter 8
Glossary
G
Gateway
A device used to connect two different networks
Gbps
Gigabits per second
Gigahertz
A measure of frequency equivalent to one thousand million (109) cycles per second
H
Hash
Distributes requests based on a key you define, such as the client IP address or the
request URL
Hop
A measure that is used to identify the number of routers that separate two hosts. If three
routers separate a source and destination, the hosts are four hops away from each other
Host
A network host is any device, or a computer connected to a computer network. A network
host provides services, information resources, and applications to users or other nodes
on the network
HTTP
Hypertext Transfer Protocol
Hub
Network hub, is a connection point for devices in a network
Hub and Spoke
Transport topology optimization in which traffic planners organize routes as a series of
"spokes" that connect outlying points to a central hub
Hybrid LAN topology
Hybrid topology is an interconnection of two or more basic network topologies
8-5
Chapter 8
Glossary
I
IDN
Integrated Device Network
IDS
Intrusion Detection Systems
IETF
Internet Engineering Task Force
IFC
Interface
IP Address
The location of a device on a TCP/IP network. The IP Address is either a number in
dotted decimal notation which looks something like (IPv4), or a 128-bit hexadecimal
string such as (IPv6)
IP Hash
IP hash of an IP address is an encrypted version of the IP address
IP Header
An IP header is header information at the beginning of an IP packet which contains
information about IP version, source IP address
IP Lease
A DHCP lease is a temporary assignment of an IP address to a device on the network
IPS
Intrusion Prevention Systems
IPv4
A version of the internet protocol that supports a 32-bit address space. IPv4 is sometimes
referred to simply as IP
IPv6
A version of the internet protocol that supports a 128-bit address space
ISDN
Integrated Services Digital Network
ISP
Internet service provider
8-6
Chapter 8
Glossary
J
Jitter
SymmetricDS by Jump Mind
Jump Mind is for Cruise market, allows for expected WAN outages for hours at a time
when out to sea
K
Kbps
Kilobits per second
KDS
Kitchen Display Systems
L
LAN
Local area network
LAN Topology
Topology refers to the shape of a local area network (LAN) or other communications
system
Layer
The network layer is a portion of online communications that allows for the connection
and transfer of data
Latency
Delays in processing network data
Leased Line
A leased line is a private telecommunications circuit between two or more locations
provided according to a commercial contract
Load Balancing
Load balancing refers to the process of distributing a set of tasks over a set of resources
8-7
Chapter 8
Glossary
M
MAC Address
A unique address that is assigned to a network interface. The MAC address is used for
communication on the physical network segment
Managed Switch
A managed switch allows user input configuration
Mbps
Megabytes per second
Mesh
A mesh network is a network topology in which the infrastructure nodes connect directly,
dynamically, and non-hierarchically to as many other nodes as possible
Mesh – Full
Full mesh topology occurs when every node has a circuit connecting it to every other
node in a network
Mesh – Partial
Partial mesh topology includes only some nodes with multiple connections
MoCA
Multimedia over Coax Alliance
Modem
Device used for communication between the digital data of a computer and the analogue
signal of a telephone line
N
NAT
Network Address Translation
The translation of an IP address used within one network to a different IP address known
within another network
NetBIOS
NetBIOS is an acronym for Network Basic Input - Output System
Netmask
A 32-bit (bit mask) that shows how an address is to be divided into network, subnet, and
host parts
Network Switch
A network switch is networking hardware that connects devices on a computer network
by using packet switching to receive and forward data to the destination device
Nginx
Web server that can be used as a reverse proxy, load balancer, mail proxy and HTTP
cache
8-8
Chapter 8
Glossary
NGINX Plus
NGINX Plus is a software load balancer, web server, and content cache built on top of
open source
NIC
Network Interface Card
Node
A node is either a redistribution point or a communication endpoint
NTP servers
The Network Time Protocol is a networking protocol for clock synchronization between
computer systems
O
OSCP
Online Certificate Status Protocol
OSI model
These firewalls work at the network layer in the OSI model and are more secure than
basic packet filtering firewalls
OSCP
Online Certificate Status Protocol
P
PAC scripts
A Proxy Auto-Configuration file is a JavaScript function that determines whether web
browser requests HTTP, HTTPS, and FTP go directly to the destination or are forwarded
to a web proxy server
Packet
A group of information that is transmitted as a unit over communication lines. Contains a
MAC header and a payload, and possibly also contain an IP header
Payload
The data that is carried in a packet. The payload does not include the header information
that is required to get the packet to its destination
PMC
Property Management Console
PMS
Property management system
POE
Power over Ethernet
P2P
Peer to Peer
8-9
Chapter 8
Glossary
Point to point
Point to Point topology is a topology that connects two nodes directly together
POS
Point of Sale
Power Conditioner
Device intended to monitor and improve the quality of the power
Powerline Extender
Powerline extenders are network adapters that use existing electrical cabling for the
transmission of network communication
Proxy Server
A proxy server acts as a gateway between you and the internet
PSK
Pre-shared key
Q
QoS
Quality of Service
QSR
Quick Service Restaurant
R
R&A
Report and Analytics
Redundancy
Network redundancy involves adding additional instances of network devices and lines of
communication to help ensure network availability
REST
Representational State Transfer
RFI
Radio Frequency Interference
RFID reader
Radio-frequency identification reader
Ring
A ring network is a network topology in which each node connects to exactly two other
nodes
RJ12
RJ12 is a 6P6C wiring standard
RJ45
RJ45 is a type of cable used for Ethernet networking
8-10
Chapter 8
Glossary
RJ-45 Connector
A connector for termination of Ethernet cable
Roaming
Roaming occurs when a device moves between the access points
Round Robin
Algorithm employed by process and network schedulers in computing
Router
A router is a networking device that functions as a gateway to forward data packets
between computer networks
S
SC Connector
A fiber-optic cable connector that uses a push-pull latching mechanism
SDH
Synchronous Digital Hierarchy is a standard technology for synchronous data
transmission on optical media
SD-WAN
Software-Defined WAN
Segment
A network segment is a portion of a computer network
Shielded
Shielded cables are manufactured with the intention of reducing any external magnetic
interference. These Ethernet cables may come with a drain cable which provides a
mechanism for grounding the cable
Smart Switch
Smart switches offer network performance improving features and greater control over
data transmission
SNMP
Simple Network Management Protocol
SOAP
Simple Object Access Protocol
SONET
Synchronous Optical Network
SPI
Stateful Packet Inspection
SSID
Service Set Identifier
SSL
Secure Socket Layer
SSL Server
Protocol for web browsers and servers that allows for the authentication
8-11
Chapter 8
Glossary
Star
A star network is an implementation of a spoke–hub distribution paradigm in computer
networks
STP
Spanning Tree Protocol
Subnet Mask
IP address provides two pieces of information for a host (computer): Network ID and
Host ID. The Subnet mask is used to distinguish theses portions so that at data packet is
routed to a specific host on the correct network
SymmetricDS
SymmetricDS is open-source software for database and file synchronization
T
T-1
A leased-line connection (North America) capable of carrying data at 1,544,000 bits-per-
second
T-3
A leased-line connection (North America) capable of carrying data at 44.736,000 bits-per-
second
TCP
Transmission Control Protocol
Termination
Cable Termination is a connection of the wire or fiber to a device
Throughput
Refers to the amount of material or items passing through a system or process
TKIP
Temporal Key Integrity Protocol
TLS
Transport Layer Security
Token Ring
Token Ring is a computer networking technology used to build local area networks
Topology
Layout or design of a computer network
Tree
A tree network, or star-bus network, is a hybrid network topology in which star networks
are interconnected via bus networks. Tree networks are hierarchical, and each node can
have an arbitrary number of child nodes
TSR
Table Service Restaurant
Twisted Pair
Type of wiring in which two conductors are twisted together to provide shielding from
electromagnetic interference
8-12
Chapter 8
Glossary
U
UDP
User Datagram Protocol
Unmanaged Switch
Network Switch that does not allow user configuration input
Uplink
A communications link to a satellite or a device
UPS
Uninterruptible Power Supply
Device used to supply backup power
URL
Uniform Resource Locator
V
VLAN
A virtual LAN is a broadcast domain that is partitioned and isolated in a computer network
at the data link
VOIP
Voice over IP
VPLS
Virtual Private LAN Service
VPN
Virtual Private Network
A single, secure, logical network that uses tunnels across a public network such as the
Internet
8-13
Chapter 8
Glossary
W
WAN
Wide Area Network
WAP
Wireless Application Protocol
WEP
Wired Equivalent Privacy
Wi-Fi
Wireless Fidelity
Windows CAL
Client Access License
WLAN
Wireless Local Area Network
WPA
Wi-Fi Protected Access
X
X-Forwarded Headers
X-Forwarded Headers is a standard header is used for identification of the originating IP
address of a client connecting to a web server through an HTTP proxy or a load balancer
X-Forwarded Host
X-Forwarded Proto is a standard header is used for identification of HTTP or HTTPS
protocol
X-Forwarded Proto
X-Forwarded Host is a standard header used for identification of original host requested
by the client in the Host HTTP request header
8-14