Knowledge (XXG)

Visitor Based Network

Source 📝

37:
Virtually any Internet-based Ethernet LAN can become a visitor-based network by adding a device generally termed a "VBN gateway". The function of a VBN Gateway is to provide a necessary layer of management between public users and the Internet router to enable a plug and play connection for visitors.
68:
In the simplest form a VBN gateway is a hardware device with a minimum of two network connections. One network connection is considered the subscriber network, and the other the uplink to the Internet. The majority of VBN gateways on the market today all use Ethernet interfaces for their connection,
28:
access. A visitor-based network is most commonly established in hotels, airports, convention centers, universities, and business offices. It gives the on-the-go user a quick and painless way to temporarily connect a device to networks and broadband Internet connections. A visitor-based network
85:
A transparent VBN's purpose is to provide network services to users to reduce support and/or IT infrastructure costs. Generally these networks are not concerned with security but rather fast and easy access. Metro Wi-Fi networks, or free to use Hotspots are examples of this type of VBN.
114:
An authenticate for use VBN is most commonly found in business environments. In these cases the VBN gateway requires users to authenticate to the gateway in order to be allowed access to network services. Commonly this authentication is achieved via integration to
38:
Typical VBN Gateway provide services and support for billing and management application integrations, such as PMS systems (in hotels), credit-card billing interfaces, or Radius/LDAP servers for central authentication models.
49:) connection is required between the user and the VBN gateway. Aside from the layer 2 (or bridged) network requirement, there are really no other restrictions for using a VBN gateway to enable a network. As such, 41:
A common criteria for VBN gateways is they allow users to connect and access the available network services with little or no configuration on their local machines (specifically modification to their
143:
is used for a variety of functions including, billing or authentication and acceptance of terms and conditions. Once the user successfully meets the criteria in the
29:
usually includes hardware (such as VBN gateways, hubs, switches, and/or routers), telecommunications (an Internet connection), and service (subscriber support).
131:
While manufacturers offer many different configurations for VBN gateways, a set of common features exist. Even the most basic VBN gateways provide
94:
A billing-based VBN is one where users are required to pay to obtain network services. Traditionally these types of VBNs are found in hotel or
58: 77:
Generally speaking there are three models of operation for a VBN: Transparent, Pay For Use, and Authenticate For Use.
103: 163: 98:
networks. Payment services are provided in a variety of methods, most commonly with a credit card
180: 99: 21: 95: 144: 140: 139:
to allow users to connect to the network with no IP address configuration required. A
174: 123:
servers or by implementing access-codes which a user would be required to enter.
65:
are all acceptable mediums for distributing networks to use with VBN Gateways.
42: 136: 46: 50: 25: 147:, the VBN gateway then allows the user's traffic to be routed through. 54: 116: 69:
but as stated above, any layer 2 connection is acceptable for this.
132: 120: 62: 45:). In order to accomplish this a layer 2 (See: 24:intended for mobile users in need of temporary 102:in hot spot environments or integration to a 8: 155: 7: 164:Visitor Based Networking Definition 162:Definition partially sourced from: 47:OSI model#Layer 2: Data link layer 14: 1: 18:Visitor-based network (VBN) 197: 104:property management system 106:in hotel environments. 33:What is a VBN Gateway? 127:How does a VBN work? 110:Authentication VBN 188: 166: 160: 100:Merchant account 22:computer network 196: 195: 191: 190: 189: 187: 186: 185: 171: 170: 169: 161: 157: 153: 129: 96:Hotspot (Wi-Fi) 81:Transparent VBN 75: 35: 12: 11: 5: 194: 192: 184: 183: 173: 172: 168: 167: 154: 152: 149: 145:captive portal 141:captive portal 128: 125: 74: 71: 34: 31: 13: 10: 9: 6: 4: 3: 2: 193: 182: 179: 178: 176: 165: 159: 156: 150: 148: 146: 142: 138: 134: 126: 124: 122: 118: 112: 111: 107: 105: 101: 97: 92: 91: 87: 83: 82: 78: 73:Types of VBNs 72: 70: 66: 64: 60: 56: 52: 48: 44: 39: 32: 30: 27: 23: 19: 158: 130: 113: 109: 108: 93: 89: 88: 84: 80: 79: 76: 67: 40: 36: 17: 15: 90:Billing VBN 151:References 43:IP address 137:Proxy ARP 181:Networks 175:Category 51:Ethernet 26:Internet 55:802.11x 117:RADIUS 61:, and 20:is a 135:and 133:DHCP 121:LDAP 63:xDSL 59:CMTS 119:or 177:: 57:, 53:, 16:A

Index

computer network
Internet
IP address
OSI model#Layer 2: Data link layer
Ethernet
802.11x
CMTS
xDSL
Hotspot (Wi-Fi)
Merchant account
property management system
RADIUS
LDAP
DHCP
Proxy ARP
captive portal
captive portal
Visitor Based Networking Definition
Category
Networks

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.