Cyberlog-corp
Pour une Bretagne libre...

Home > Recherche et développement > Réseaux Wifi > Presentation of the Cyberlog hotspots network

Presentation of the Cyberlog hotspots network

Tuesday 1 November 2011, by bc

All the versions of this article: [English] [français]

General presentation

- This project results from the growing need for companies, associations and private individuals to have a high-speed Internet connection, and for the itinerants and short or medium term residents who seek a flexible and mobile solution of connection to the Internet.
The principle is based on wifi hotspots inserted on the existing computer networks, associated with a server of authentification.
The outsourcing of this service allows a single authentification by login/password of the user. The mutualisation of the computer networks reduces the number of relays wifi necessary to cover a geographical zone while allowing the zones today not served to have access to the Internet.

- Our hotspots network functions without interruption since 2006. It is completely automated and robust as it did not undergo any breakdown since its beginning. Our hotspots network can extend to a group of partners, thus offering to the users of the service a single login/password for their accesses to Internet.

- This document presents the various applications of our network, the types of access, the advantages for our partners and the environment, the modes of crediting the clients’ accounts, conformity with law, the installation, the instructions and the technical sheet of our devices as well as an example of convention for using a Cyberlog hotspot.

- Cyberlog reserves the right to modify its general terms of use of the wifi hotspots of its network per notification by e-mail or on the Web site of Cyberlog (http://cyberlog-corp.com).

Examples of application of the Cyberlog hotspots network

N.B. In all these examples, the shelterers of our hotspots and the users must accept the conditions of use of the Cyberlog network which appears at the end of this document.

Equipment of a town with a Cyberlog hotspots network
- the towns can offer their residents and visitors a permanent and distributed service of access to the Internet.
- the users have access to the Internet on the whole communal territory, and on the Cyberlog network.

Equipment of a campus with the same system of authentification in wifi
- the establishments can offer their collaborators and students a permanent and distributed service of access to the Internet on the campus, thus bringing to them comfort in their work or studies. The outsourcing of the authentification of access to the network makes it possible to create a total network on the campus with a single login/password for each user on the whole network.
- the users have access to the Internet on the whole of the campus, and the Cyberlog network.

Equipment of a joint ownership with a wifi network
- joint ownerships can offer to their residents and to visitors a permanent and geographically distributed access to the Internet.
- for the users, they have access to Internet in a flexible way without commitment of duration nor installation of a broadband connexion.

Temporary network wifi for exhibitions, concerts or social events
- This offer meets the need for wifi networks with single identification on exhibitions, concerts or social events. The wifi hotspots are deployed on a site of fair exposure, exhibition, seminar or another demonstration. They are inserted on the computer networks and are associated with an authentification server.
- This offer addresses to the administrators of short time events that must offer to the partcipants a flexible service of access to the Internet and fast installation.

Wifi hotspots for shops, companies, cybercafés, camp-site, tourist office, job centers
- The companies or activities which propose an Internet access to their customer can easily join our network by inserting a Cyberlog hotspot in their network and become partner. They can then receive the payments of the customers to credit their accounts. The advantage for networks of tourist office or hotels is that same account of a customer is valid on all hotspots of the yberlog network.

Integration in citizens wifi networks
- The citizens wifi networks consist in sharing their access to the Internet with the members of these associations. This service is already integrated in our network since our partners have a free access on all the Cyberlog network.

Recycling a wrt54gl device in a Cyberlog hotspot
- We propose owners of wrt54gl device, to recycle their them in a Cyberlog hotspot. This can be done remotely, on request, and accepting the general terms of use of the Cyberlog network. This supposes to replace the firmware by a version of openwrt, then to configure the device according to our instructions.

Collaboration with the access providers to the Internet (ISP)
- Our application works on any Linux system. It can adapt to different Internet boxes. We are opened to any collaboration with an ISP eager to integrate our network in its offer.

Opening to the international
- We seek partnership and representatives in other countries. Our interface is already multilingual and can evolve quickly towards other languages.

Types of display

The display automatically adjusts depending on the devices that connect to terminals
(computer, tablet, ipad, mobile phone, Iphone).
These are detected when they are connected and the display is based on their screen size.

Standard display
Mobile display

Types of access

Free access
- The access to all hotspots of the Cyberlog network is free for the partners who have a Cyberlog hotspot in service. This kind of functionning corresponds to that of the citizens wifi networks.

Standard access
- Paying according to the connexion time
After crediting his account, the user can connect himself to the Internet via a Cyberlog hotspot. Its account is then decreased according to the connexion time.
- Unlimited connexion
According to the subscription time: 3 days, 7 days, 15 days and 30 days.

Login and access code
- This configuration allows an access by code after being identified on the hotspot. This configuration is particularly adapted to joint ownerships, job centers or university campus, because the management of the access customers is largely facilitated while keeping a monitoring of the users. The access key can be modified periodically and distributed to the group associated to the hotspot.

Access code
- This configuration gives direct access by key without authentification. This mode is adapted to the temporary demonstrations, exhibitions and festivals because there is no need to create an account, the user is connected as a guest when he uses this key. The periodic modification of the access key makes it possible to protect the access on the hotspot.

Free access
- The terminals can be programmed to provide free access for a renewable period (eg 15 minutes / 2 days, 10 minutes / day ...). This feature is suitable for organizations that want to provide a free access to visitors. The user must have created an account to use this service. When it connects, the interface displays the gratuity time. Beyond this period, the user is disconnected if the account is not credited, or his account is debited with time additional connection.

Direct access to Web sites
- The hotspots are configurable to provide free access to certain sites defined by administrator. On the home page, then just click on one of the links that lead to websites. For this functionality, it is not necessary to be identified. This does not make any problem of traceability as the administrator chooses trusted sites (url).
- This feature is particularly suitable for tourist offices, local shops, which can open their website to tourists or clients that access to information from the Internet. These are updated
at the same time as the website, making it easier to update the Web and Wifi organization storefront.
- Each hotspot can be configured to access defined websites . This allows to display
geolocated information, depending on the location of the hotspot (museum, touristic spot, tourist office, marina, exhibition stand) and show content that is appropriate to the context.
- Examples of online services:

Cityhall Wiki
News
Associations
Photos sharing
Public transportation
Localization of bus stop
Company website
Company website

Advantages for partners

Free access
The partners who shelter an active hotspot have a free access on all hotspots of the Cyberlog network.

Cyberlog partners
They can be Cyberlog partners on request. When they connect on the hotspot or on the website of Cyberlog, they have a form on their page which makes it possible to credit the accounts of users.

They receive directly the money from the users to credit the accounts. They pay back a part of the money to Cyberlog, plus a subscription fee for the hotspots they manage.

Sharing the hotspot with access key
Cyberlog hotspots can be used with access key, which makes it possible to a partner to share his connection with a group of people who have the key. A field appears on the homepage of the terminal in order to enter the key, either directly, or after authentification, according to the selected option.

This simple method is adapted to temporary connections or for users groups. A contractual participation is requested from the person in charge of the hotspot according to the time of subscription.

Credit of users accounts

The users of the Cyberlog network can credit their account in two ways:

Credit by Paypal or credit card
On the homepage, or in customer space after authentification, a form appears:

By default the amount is of 10 Euro, to change the amount, just modify the value.
To launch the procedure of online payment, click on the image, the following page appears:

After realization of the payment, the Paypal window closes and your account is credited with the amount.

Credit by a Cyberlog partner:
The Cyberlog partners present the following poster.

The majority are also Cyberlog dealers. Just ask them to credit your account by giving your login and the amount to be credited. After regulation by any form of payment that they accept, your account is credited with the amount.

Environmental advantage

These hotspots make it possible to pool broadband connections, which involves a reduction of radiation of electromagnetic sources and thus a reduction in the nuisances for the individuals and animals. A file concerning the “Studies on the impact of the electromagnetic radiation on the environment” is available at the address: http://cyberlog-corp.com/spip/spip.php?article144
It shows that the wifi is much less harmful than the radio waves released by the cellphones or the microwaves. Our solution is thus based on a soft and powerful technology.

Conformity with the Internet laws (HADOPI, LOPPSI, ACTA)

We follow the evolution of Internet laws concerning fight against the illegal downloading, terrorism and the pedopornography. We published a study (http://cyberlog-corp.com/spip/IMG/pdf/Rapport_final.pdf) and an Internet survey on this subject (http://cyberlog-corp.com/limesurvey).

We endeavour to find a compromise between the legitimate fight against the excesses observed in the use of the Internet and the respect of freedoms. The measures of protection that we have put in place are likely to evolve according to the law.

Preventive technical measures
- Filtering of connections which can be used only for browsing (HTTP, https, ftp), sending and receiving of e-mails (pop3, smtp, IMAP), msn and ssh. The peer to peer accesses are blocked in order to prohibit the file-sharing in peer to peer.

Traceability of identity
- Connections are memorized on our server which records the login, start date and end of connection, and name of the hotspot.
- The users who want to credit their account can do it in two ways:

* credit card payment or paypal: in this case the holder of the bank account is memorized on the Paypal server in order to be able to identify it

* payment with the one of the people accredited by Cyberlog: for the moment, we do not ask for the identity of the customers, however if the law obliges us there, we will set up following measurement: at the time of the purchase of time of connection, the user must present identification papers and following information is recorded by the salesman: date from the transaction, amount, login, name, first name and addresse of the customer.

Installation

- Connect a network cable between the network socket “Internet” of the hotspot and your livebox or the switch/hub of your local area network. Connect the sector adapter on a socket and the power supply socket of the case.

- The device ignites. Expect 3 to 5 minutes that the hotspot is configured. Then the wifi hotspot is in function.
- To test, launch an Internet browser (firefox, opera, explorer) and call an Internet address (ex: http://google.fr). The following page appears:

Transformation of a wrt54gl into Cyberlog hotspot
If you have a Linksys wrt54gl, you can on request recycle it in Cyberlog hotspot after having accepted the conditions of use. You will have to replace the Linksys firmware by a version Linux openwrt. We will give you the procedure to be followed after acceptance of your request. Make your request with contact@cyberlog-corp.com or on the Web site http://cyberlog-corp.com, on the page “contact us”. You will be able to then obtain the statute of Cyberlog dealer and to receive the payments of the customers of the Cyberlog network. A part of the benefit will be paid to Cyberlog after reception of invoice.

Instructions

- The first time you must create a login/password while clicking on INSCRIPTION. Choose an identifier and a password which you confirm. Then type on the button INSCRIPTION to record your login/password
- you can take a 3 days, 7 days, 15 days or 30 days unlimited access by a click on your name of login or “Your customer space ” of the left menu. Your account must be beforehand credited with the amount by Paypal or with one of the Cyberlog dealers. Choose the duration of the subscription (1), then click on the button “subscription” (2), a window opens: confirm your request. If your account is credited, you can connect with unlimited access on the hotspots of the Cyberlog network until the end of the subscription. Return to the homepage while clicking on Homepage in the left menu.

- To connect, type your login /password then click on LOGIN. The following window appears:

- For surfing on the Internet, click on the red zone Internet. This zone becomes green and a new window opens on http://google.com. The window of login must remain open because it is used to inform the server of authentification that you are still connected. Leave this window of login openned, if not you will be disconnected after 10 minutes. You can surf on the Internet starting from the window of google.com.
N.B. On the terminals with access by code, it is enough for you to type the access code.
- the login window allows you to stop navigation on Internet by clicking on the green zone Internet which will become red then. You can disconnect yourselves while clicking on Déconnexion.

Technical data

- Our solution is based on standard wifi devices, auto—configurable and associated with a server of authentification. These devices are plug-and-play, i.e. that they fit directly on a network equipped with a DHCP server (Dynamic Host Configuration Protocol) providing them an IP address, the address of the gateway towards Internet and addresses DNS (Domain Name Server). A network including a correctly configured DHCP server integrates the device like a standard computer.
- Examples of materials on which our system is implemented, and association with video control.

- the hotspots can function without ssh connection nor VPN (Virtual Private Network), there are consequently no redirection of port or another intervention to be made on the gateway. It is possible to associate an encoding by key on wifi connections. The correct installation of a firewall is strongly encouraged, it is already present on the gateways of the establishments as well as a filter of URL (Uniform Resource Locator).
- the hotspot is made safe by a firewall. The users connected on the terminal cannot reach the local area network of the owner of brodband connexion (ADSL). At the time of connection, only services ssh, of navigation HTTP /https, the e-mail services(SNMP, pop3, IMAP) and msn/skype are authorized. The system was tested under Nessus (scanner network which detects security breaches).
- the hotspots can also function in repeater mode of another hotspots, without physical access to the network. This makes it possible to extend the range of the network to the not served zones. The omnidirectional or directional antennas with high gain make it possible to increase the served zone or to off-set the access point to a distance which can reach several kilometers.
- the maintenance of first level is facilitated since the terminal functions independently and autonomously. The device cannot thus cause technical failure on the network and it can be replaced by a simple standard exchange, inducing a profit in maintenance for the network administrator.

SPIP | | Site Map | Follow site activity RSS 2.0
Graphic design (c) freelayouts under License Creative Commons Attribution 2.5 License
{id_article}