Transcription

International Journal of Latest Research in Engineering and Technology (IJLRET)ISSN: 2454-5031www.ijlret.com Volume 03 - Issue 03 March 2017 PP. 27-34Seamless Wireless Design With Single Service Set Identifier andSingle Sign On UsingKerio ControlSardjoeni Moedjiono1, Nada Maulana2, Aries Kusdaryono3Postgraduate Program, Budi Luhur University, Jakarta, IndonesiaAbstract: In the development of technologies that exist today and particular in the areas of networking,wireless technology began to be taken into account to develop the infrastructure in the industry, academia andthe public. In an enterprise, Wi-Fi transmitter or access point can be installed more than 10-15 AP in it. Thenumber of access points is proportional to the number of service set identification (SSID). The technologicaladvances of the routers and access points can be combined to build a wireless controller to resolve the problem.Wireless controller also serves to ease the process of access points, took over the facility Dynamic HostConfiguration Protocol (DHCP) and Security Password. By establishing a seamless wireless system with asingle SSID, it can produce a quality network that include user activity when roaming and allows networkadministrators to perform monitoring and maintenance.Keywords: Deadlock, Dynamic Host Configuration Protocol, Security Password, Service Set Identification,Wireless Controller1. INTRODUCTIONIn the development of technologies that exist today and in particular the areas of networking, wirelesstechnology began to be taken into account to develop the infrastructure in the industry, academia and the public.Wireless networking is considered to be more efficient in doing the installation because it requires a lot of wiresto form a local area network (LAN) in a particular place. An interesting finding was delivered in a survey is85% of the number of Internet users in Indonesia use mobile devices while surfing in cyberspace. The seconddevice is most often used are laptops, followed by PC / computer and the last tablet. While the majority ofInternet users in Indonesia are workers and self-employed. From the employment sector, the majority used theInternet in Indonesia on trade and services sector [1].By building a wireless network system is centralized, anadmin can also perform monitoring and maintenance easier. It can also extend the range of the wireless signalwith the seamless method, making it easier for the user to roaming without worrying disconnection whenperforming activities such as browsing or downloading.IJLRET2. RELATED WORKIn this section presented theories and literature used at the time of the study. These theories are takenfrom books and journal literature from the internet. Theories covered include the theory of the study of WLAN,Seamless Wireless, SSO, LDAP, Kerio Control, Firmware DD-WRT dan DHCP Forwarder.2.1 WLAN StandardsWLAN standard IEEE 802.11 refers to the first published in 1997. The IEEE (Institute of Electrical andElectronics Engineers) is an independent institution that focuses on the development and improvement oftechnological innovation for the good of man [2]. The development of the standard IEEE 802.11 WLAN wherethe development started in the standard-setting 802.11 in 1997 working at a frequency of 2.4 GHz and amaximum data rate of up to 2 Mbps, then in 1999 re-published standard IEEE 802.11b and 802.11a. Standard802.11b working in 2.4 GHz band with a data rate of up to 11 Mbps, but have drawbacks likes the effect ofinterference due to the use of equipment with the same frequency. The 802.11a standard uses the 5 GHzfrequency has a data rate of up to 54 Mbps, but has a weakness in the coverage area where its reach is lowerthan the 802.11b standard.In 2002, publishes IEEE 802.11g standard combines the advantages of 802.11a with802.11b. The 802.11g standard works at a frequency of 2.4 GHz and has a data rate of up to 54 Mbps withcoverage area closer to the range of 802.11b. The use of the same frequency between 802.11g with 802.11bmakes the two standards are compatible, if implemented in wireless communication devices. The nextdevelopment was marked by the publication WLAN 802.11n standard that combines 802.11b 802.11gtechnology. The technology used is known as MIMO (Multiple Input Multiple Output) which offers increasedthroughput, superior reliability, and increased client connected.IEEE 802.11a standard is a wireless WLANprotocol published in 1999. This standard work on the 5 GHz frequency band with a pattern of OFDM(Orthogonal Frequency Division Multiplexing) using 52 sub-carriers are modulated using techniques BPSKwww.ijlret.com27 Page

International Journal of Latest Research in Engineering and Technology (IJLRET)ISSN: 2454-5031www.ijlret.com Volume 03 - Issue 03 March 2017 PP. 27-34(Binary Phase Shift Keying), QPSK ( Quardrature Phase Shift Keying), 16-QAM (16-Quadrature AmplitudeModulation) or 64-QAM (64-Quadrature Amplitude Modulation). Data rate on IEEE 802.11a is 6 Mbps, 9Mbps, 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48 Mbps and up to 54 Mbps.2.2 WLAN Physical ArchitectureWLAN physical architecture consists of two categories: architecture IBSS (Independent Based ServiceSet) and Infrastructure Architecture.1.IBSS ArchitectureFigure1: IBSSArchitecture [3]Figure 1 shows the architecture configuration IBSS or ad-hoc WLAN configuration which is a peer-to-peer,where two or more devices can be connected via a wireless network without requiring an access point. In thisarchitecture, the device will configure itself on the same radio channel for communication to enable peer-to-peer[3].2.Infrastructure ArchitectureIJLRETFigure2: Infrastructure Architecture [3]In the architecture of the infrastructure there is an access point that works to serve the communication on thewireless network, where the access point is connected to a backbone DS (distribution system). BSS is anarchitectural configuration with an access point with a client that communicates in the coverage. A BSS has anID (identifier) that is unique and different from other BSS. The device you want to connect to a WLAN arerequired to have the same ID value in accordance with the BSS id. Configuring two or more BSS connected to abackbone are the same then will form a subnet is seen as an ESS.2.3 Failover/Load BalanceLoad Balance in computer networks is a technique for dividing the load into multiple paths or links.This is done if for heading a network there are multiple paths (links).The purpose of load balancing is that thereis no link to get a larger load than the other link. It is expected to share the burden in some of these links, it willbe to achieve a balance the use of these links. There are various load balancing implementations are oftenencountered in the field, which most often is the application load balancing on a local network that has two ormore internet connections. While Failover own technique is a technique that allows a link will replace anotherlink tasks in case of failure or dropping connections. Failover and Load Balance are two different techniques,load balancing is a technique to divide the load while the failover refers to a technique for making a backup link.But the application of load balancing, in general, will be accompanied by a failover [4].2.4 Seamless WirelessSeamless roaming can be interpreted as the process move between wireless networks forcommunication takes place when not distracted or without re-authentication. The process includes seamlessroaming services in the most seamless work by using Internet Protocol (IP) that is designed to provide mobilityat the network level connection. In other words, the network itself continues to hold the user's IP address and getaway from the connection to the other connection types, exchanged so smooth that there is no noticeable effectwww.ijlret.com28 Page

International Journal of Latest Research in Engineering and Technology (IJLRET)ISSN: 2454-5031www.ijlret.com Volume 03 - Issue 03 March 2017 PP. 27-34on the user side [5]. If there are some areas in a room covered by more than one access point, then the cellcoverage have to overlap. Each wireless station will automatically determine the best connection will arrest ofan Access point. Area coverage overlapping an important attribute of the WLAN setting because it enablesseamless roaming between overlapping cells.Figure 3: Seamless Roaming [6]Seamless wireless solutions proposed seek to improve the three main points, namely: scanningOptimizations, adding topology discovery and handover predicting.SyncScan algorithm [7] proposed to bebased on the data synchronization beacon access points that work in different channels. Thanks to the mobilestation (MS) realizes approximate arrival beacons on certain channels. MS can switch to the correct channelbefore the manual that came and accelerate how to search. The algorithm requires knowledge of theconfiguration of another access point, such as the current operating channel and transmit beacon interval.Additionally, access points should have access to perform synchronous timing source.Smooth HandoffAlgorithm [8] to modify the legacy of active scanning procedure. MS scan a number of channels and come backto the transmission line. This procedure is repeated until all channels are scanned. The scanning time is extendedbut most can resume transmitting MS during the process. The author states that scanning should begin at sometime before the MS is disconnected from the access point but does not present a practical methodology to startSmooth Handoff. Single channel scanning can take more than 50 milliseconds, so that even a single channelscan and return to the transmission line may not meet the requirements of multimedia services. Another group ofalgorithms proposed in the literature about the use of information access points in the vicinity, called neighbors.Neighbor Graph [9] is a directed graph with each end represents the path between the node mobility, namely theAP. For any given AP, neighbors represent a set of potential access points. Neighbors can be obtained from thecurrent access point or collected as a station across the network.NG and NGPruning algorithms [9] is the firstpublished algorithm that uses neighbor graph to improve the efficiency of handover. Neighbor graph constructedby each access point based on the 802.11 reassociation request frame received from the MS which contains anold BSSID of the access point. NGPruning algorithms scanning procedure is only for those channels that areknown to be used from the Neighbor graph. NGPruning algorithms eliminate overlapping access points from thescan list. Two access points overlap when the location when MS can communicate with them both with thequality of the received link. NGPruning algorithms cut all access points that are non-overlapping with affordableaccess point. Assuming that AP1 and AP2 are non-overlapping, if MS receives probe responses from AP1 thereis no reason to wait for the response investigation of AP2. Because the scan time may be reduced by skippingAP2 scanning.RSS-based Indoor Tracking System (RITS) [10] is another example of an algorithm thatfacilitates the delivery by using neighbor graph. MS gather information RSSID of beacon frames sent by accesspoints that operate on the same channel. In order to gather knowledge on access points that operate on adifferent channel MS also actively scan the selected channel. The authors state that a non-overlapping channel isselected for scanning, but it is not clear how the selection was made. Build a mobile station that storesRadioMAP RSSID and BSSID of the access point is scanned at a given moment. When the station intends toperform handover, it is listening for beacons on the current channel. If the station is able to determine thelocation based RSSID of the beacon, the station RadioMAP search for neighboring access points andperforming handover. If not, the station must perform additional scanning. Algorithm introduces additionalrequirements on the network topology. The access point should operate on overlapping channels that allow thedetection of the location but deteriorated transmission conditions.IJLRET2.5 Single Sign On (SSO)SSO is a technology that has the ability to enter the same id and password to log into multipleapplications within a company. Such as password authentication is the most secure mechanism, known as theSSO has now been reduced sign-on (RSO) since more than one type of authentication mechanisms used inaccordance with the firm's risk models. For very large networks and heterogeneous, where the user is promptedto enter information themselves on any application which you want to access needed SSO. SSO system does notwww.ijlret.com29 Page

International Journal of Latest Research in Engineering and Technology (IJLRET)ISSN: 2454-5031www.ijlret.com Volume 03 - Issue 03 March 2017 PP. 27-34require user interaction, to access all the services applications without having to log in and type in the passwordrepeatedly.SSO authentication of users clicking on all applications that have diauthorized to be accessed. Thiseliminates the authentication request again when users switch applications during a session applies [11]. SSOalso allows the authentication information and identifying a subject in order to avoid double login on the systemor group of systems reliable. SSO system can also centralize service of the relevant system parameters at thesame time and improve the overall usage. Service users may prefer the SSO system from the regular sign-onsystem.SSO system architecture has two main parts: the agent residing on the web server/application servicesand a dedicated SSO server that will be described as follows:1. Agent:each HTTP request that goes to a web server will be translated by the agent. In every web serverthere is one agent as a host of application services. This agent will interact on the SSO server on the others