Design of captive portal LAN with redundancy connections
DOI:
10.47709/cnahpc.v3i1.998Keywords:
Captive portal, authentication, redundancy, Spanning tree protocol, loopsDimension Badge Record
Abstract
Captive portal networks are in great demand because users have privileged authentication in the form of usernames and passwords to enter the LAN network without having to share with other users. However, the captive portal network is difficult to implement redundant connection because it must be in the form of a ring topology and the application of a bridge network. Captive portal is a web page for the authentication process to enter the network where the authentication back end can use radius, kerberos, ldap with the AAA framework. Meanwhile, fault tolerance is a redundant connection mechanism as an alternative path provider if the main path is broken. Here there is a tiered mechanism so that fault tolerance can be implemented into the captive portal network. This study describes the process of designing a captive portal network starting from analyzing, conceptualizing and finally designing the network itself. The final result of this research is 2 pieces of redundancy connection network design to the captive portal framework.
Downloads
Abstract viewed = 610 times
References
Andrew S. Tanenbaum, David J. Wetherall. 2012. Computer Networks 5th Ed. 5th Ed. Pearson.
Behrouz A. Forouzan. 2012. Data Communications and Networking: Forouzan, Behrouz A.: 8601400052488: Amazon.Com: Books. 5th Ed. McGraw-Hill Education.
Budiansyah, Arie, and M. Iqbal. 2019. “A Testing Packet Delay Variation and Packet Loss Problem on Local Area Network Based on ITU-T Standard.” in IOP Conference Series: Materials Science and Engineering. Vol. 506. Institute of Physics Publishing.
Cisco Networking Academy. 2020. Introduction to Networks Companion Guide (CCNAv7): 9780136633662: Computer Science Books @ Amazon.Com. Cisco Press.
Hasanul Fahmi. 2018. “Analisa Pengukuran Delay, Jitter, Packet Lost Dan Throughput Untuk Mendapatkan Kualitas Peforma Radio Streaming Yang Baik Pada Radio Simfoni Fm Malang.” Jurnal Teknologi Informasi Dan Komunikasi 7(2):98–105.
Internet Engineering Task Force (IETF). 2019. “Dynamic Authorization Proxying in the Remote Authentication Dial-In User Service (RADIUS) Protocol Rfc 8559.” Ietf.Org. Retrieved June 21, 2021 (https://datatracker.ietf.org/doc/html/rfc8559).
Internet Engineering Task Force (IETF). 2020. “Captive Portal Architecture Rfc 8952.” Retrieved June 20, 2021 (https://datatracker.ietf.org/doc/html/rfc8952).
James D. McCabe. 2007. Network Analysis, Architecture, and Design: A Volume in The Morgan Kaufmann Series in Networking. 3rd Ed. Morgan Kaufmann.
Jonathan Hassell. 2002. RADIUS [Book]. O’Reilly Media, Inc.
Marques, Nuno, André Zúquete, and João Paulo Barraca. 2019. “Integration of the Captive Portal Paradigm with the 802.1X Architecture.” Arxiv.Org.
McMillan, Troy. 2015. Cisco Networking Essentials: McMillan, Troy: 9781119092155: Amazon.Com: Books. Vol. II. 2nd edition. Sybex.
Rich Seifert, James Edwards. 2008. The All-New Switch Book: The Complete Guide to LAN Switching Technology, 2nd Edition | Wiley. 2nd Ed. Wiley.
William J. Barksdale. 1982. “Practical Computer Data Communications: Overview of Data Communications.” Pp. 7–22 in. South TEC AssociatesHuntsvilleUSA: Electronic Conventions Inc.
Xia, Haidong, and José Brustoloni. 2004. “Detecting and Blocking Unauthorized Access in Wi-Fi Networks.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3042:795–806.
Downloads
ARTICLE Published HISTORY
How to Cite
Issue
Section
License
Copyright (c) 2020 Arie Budiansyah, Dirja Nur Ilham, Rudi Arif Candra
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.