Extending the Hotzone Network Connecting The World.

Slides:



Advertisements
Similar presentations
Enabling the Next Wave of Connectivity ™ Pronto OSS Release 4.0 PRODUCT OPERATIONS Pronto UniFi OSS Release R4.0 January 2006.
Advertisements

Technical Overview July, 2004.
PPPoE Last Update Copyright Kenneth M. Chipps Ph.D. 1.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Nomadix Billing Features
Network Layer and Transport Layer.
History DHCP was first defined as a standards track protocol in RFC 1531 in October 1993, as an extension to the Bootstrap Protocol (BOOTP). The motivation.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Exploring the multi- router SOHO network draft-baker-fun-multi-router Fred Baker.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
Networking Components
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Networking Components Chad Benedict – LTEC
1 Enabling Secure Internet Access with ISA Server.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
DHCP Server © N. Ganesan, Ph.D.. Reference DHCP Server Issues or leases dynamic IP addresses to clients in a network The lease can be subject to various.
Networking Components
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing And Switching.
Terralite Solutions.  TCP/IP setting for communications  Subscription  Unicast  Multicast  UDP  Communications troubleshooting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Home Networking. Objectives Understand the basics Network Addressing Learn the basic hardware needed to form a home network Learn basic Firewall functionality.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Altai Certification Training Backend Network Planning
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Networks QUME 185 Introduction to Computer Applications.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
SYSTEM ADMINISTRATION Chapter 8 Internet Protocol (IP) Addressing.
© 1998 R. Gemmell IETF WG Presentation1 Robert Gemmell ROAMOPS Working Group.
Network Protocols A network protocol defines the structure of messages sent over the network We will only talk about the Internet Network protocols need.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
All Rights Reserved © Alcatel-Lucent 2006, ##### NZNOG 2007 Control Planes and RADIUS Bitses Alastair Johnson Senior IP Technologist, Alcatel-Lucent
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Postpaid Monthly Invoices (for MAC Authenticated Clients)
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
Presented by Rebecca Meinhold But How Does the Internet Work?
Vlan 34 Solution 1: [1] change vlan 33 attached to SG500 to new vlan (vlan 34) [2] SG500 as DHCP server for vlan 34 [3] DHCP ACL.
VirtuCo :: Authentication and Billing ::. VirtuCo v©v© Authentication schemes –Public key –Username and password –Combination –Additional possibilities.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
Linux Operations and Administration Chapter Eight Network Communications.
1 Extreme Networking at Home Jari Arkko, Ericsson.
Stateless 1:N IVI and Stateless 1:N double IVI X. Li, C. Bao, H. Zhang November 12, 2009.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
1 The Hotspot Menu. 2 The Hotspot Menu Hotspot The GD eSeries Hotspot application is a captive portal solution that can be run over a wireless (or wired)
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Source NAT Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
The lastest version of Hotspot, our software- only solution for deploying paid and free WiFi access, is already proving the value of the real- world expertise.
YOU NEED A WINDOWS PC COMPUTERS AND OUR INTERNET CAFE SOFTWARE. INSTALL SERVER PART OF THE SOFTWARE ON YOUR MAIN COMPUTER, AND CLIENT PART ON ALL OTHER.
Windows Vista Configuration MCTS : Advanced Networking.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Enabling Secure Internet Access with TMG
Switch Setup Connectivity to Other locations Via MPLS/LL etc
Virtual LANs.
How Data Flows through the Internet
Net 431: ADVANCED COMPUTER NETWORKS
Presentation transcript:

Extending the Hotzone Network Connecting The World

2 Network Expansion As the Hotzone expands the need for new services and new applications becomes inherent. Very often the network operator wants to utilise unused bandwidth by selling it in the same manner as Hotspot’s are today. They Want to find instant access methods such as: –Voucher –Credit Card –SMS –IPASS and GRIC type client solutions. –Possibly even PW/UN To do this the operator will need a provisioning system and possibly a billing system. Depending on the manufacturer quiet often the provisioning system is responsible for accepting or denying clients with his credentials access to the network including those who are in another realm and keeping track of used time data etc. Normally billing systems interact with the provisioning system and interrupt the data to provide and invoice which can be sent to the customer.

3 Provisioning systems To add a provisioning system to your Hotzone there are a few points that need to be taken into account to ensure interoperability between the AS.NET Hotzone and the system. –The ControlNET server needs to be the DHCP Server for the network. –Normally there is an authentication gateway placed on each network, many gateways authenticate by MAC address, this will not work on a ControlNET network as in a routed Network the MAC address seen will be that of the last router in this case the ControlNET server. Therefore a gateway that support IP level authentication is needed. –Often provisioning systems are priced on a concurrent user basis, as a level of authentication is already processed by the ControlNET server you may not need PW/UN authentication for all users, a good way to decrease cost is to implement a source IP based router between the ControlNET server and gateway, this will then forward guest traffic to the GW and know traffic to the internet. Remember the ControlNET server can isolate users into subnets enabling guests to be assigned one subnet.

4 Interaction with billing systems The interaction with a billing system varies by vendor but will be somewhat similar for the purpose of this example we will refer to Service factory Orbyte a system tested by Airspan. As mentioned earlier the provisoning system gathers data on users habits and use in CDR format, CDR’s are exported in one of three formats; token-separated, fixed- length, or Basic Encoding Rules (BER). Export and transfer of CDRs is done periodically to a billing system. CDR Example (Token-separated “;”) n; ; ;00:02:2d:23:a9:51;stockholm1;

5 Example CDR Creating Accounting Information Example CDR Creating Accounting Information Client Session Session Information Checks what OSCs are in the system CDRs via (FTP or SCP) Accounting data Verifies that all OSCs have sent accounting data and generates CDRs