StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What Are the Different Networks Used in Hotels Contingent to the Location and Hotels Design - Essay Example

Cite this document
Summary
"What Are the Different Networks Used in Hotels Contingent to the Location and Hotel’s Design" paper addresses the challenges by analyzing the different kinds of networks, which can be used in hotels in contingent to the location and design of the hotel. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful

Extract of sample "What Are the Different Networks Used in Hotels Contingent to the Location and Hotels Design"

NETWORKS IN HOTELS by Student’s Name Code + Course Name Professor University City/State Date What are the different Networks used in Hotels contingent to the location and hotel’s design? Organizations such as schools, offices, and homes can employ networks in their daily operations. Networks enable members to link within several subdivisions in the offices or homes. There are several kinds of networks that can be used in the hotels, offices, or homes (Mansfield & Antonakos 2009, p. 43). Moreover, Mansfield and Antonakos assert that in the selection of the kind of network to be applied, the hotel’s or office’s design has to be considered as it enables the professionals to select the kind of network required in the hotels depending on its objectives and goals. Different telecommunication professionals when designing hotels normally ask the primary challenge under discussion. In this regard, this essay will address the challenges by analyzing the different kinds of networks, which can be used in hotels in contingent to the location and design of the hotel. Research suggests that most hotel designs support the LAN networks because the network can cover several rooms, which exist within the organization of the hotel with one point as the primary control center. Most IT technicians suggest that, in order to establish the kinds of network, which suits a given hotel, as well as its setting as well as the number of subdivisions within the hotels have to be recognized because this augments the network’s reliability in line with its goals. As proposed, the geographical setting of the hotel and the existing coverage portray a closed group, which is intact and relatively timid, and, therefore, easily reinforced by the LAN network system present in the organization. By considering these factors, the linkages in the different department within the hotel will be operational. Nevertheless, LAN networks do not necessarily require a server. This suggests that simple LANs can be established by using one or more switches. A switch can be linked to a cable modem, router, or ADSL modem. Sophisticated LANs are linked with their use of redundant associations with switches through the spanning tree code in order to avoid loops, and their ability to accomplish opposing traffic types through the quality of services protocol (Deering & Cheriton 1990, p. 89). Such a LAN could comprise several network tools like sensors, load balancers, switches, and firewalls. According to Duato, Yalamanchili, & Ni (2003, p. 9), the basic components of a LAN network comprise of every workstation of the LAN such as a microcomputer, a word processer, or barcode reader that operates as an independent equipment. In many cases, these compositions are commonly connected to a main controlling point, from where communication to other stations that are linked to the network occurs (Peng & Tsou 2003, p. 20). Even though every sub-station can act autonomously, they lack the capability of regulating the activities happening in other regions of the network. In order to avert collision or corruption of data in the process of communicating, different skills such as CSMA/CD (Career Sense Multiple Access/ Collision Detection) and Collision Avoidance/ Career Sense Multiple Access can be used in the management of data transmission (Deering & Cheriton 1990, p. 85). Several types of LAN networks can be used; for instance, research has shown that other types of networks apart from LAN can be applied in hotel networks. The peer-to-peer network can be applied in hotels. With this type of network, nothing like network and server hosts exhibiting specific roles exist (Peng & Tsou 2003, p. 29). Rather, the peer-peer network offers and consumes network services. Additionally, with this network, there can be hosts, which fulfill several differing roles. For instance, one personal computer can be connected to a printer, which is also shared within the network. A different computer with an installed hard drive can be shared with everybody so that all people can keep their files on that particular drive. In such a situation, there are hosts, which provide and use the network services. On principle, these two function as server and client concurrently. The main gain of a peer-to-peer network is its simplicity and ease of installation. The only requirement is sharing the resources over the network. The method is also very affordable because the network administrators will not need to obtain server software and hardware. However, this method also has some challenges such as the network being in scalable meaning that by expanding the network, more management problems will be experienced. This network lacks a centralized control. All LAN systems are advantageous because peripherals as printers can be shared among several different operators. The terminals are also cheaper compared to the stand-alone personal computers. Additionally, the system can allow different clients to share files within the hotel. By using this mechanism, communication across the network will be faster and cheaper (Peng & Tsou 2003, p. 33). As a business enterprise, operations in hotels can be time consuming and difficult at times, but through field trials and studies, the use of site VPN network has demonstrated a better means of interconnecting rooms, which lie within ideal networks with ease (Mansfield & Antonakos 2009, p. 112). According to Freeman (2005, p. 16), it is supposed that an effective means of connecting the main office to several other subdivisions cab be established within a hotel. The necessity of collaborating and connecting with employees, customers, suppliers, and partners is essential in expanding the network connectivity beyond the classic wired Local Area Networks. Such moves can necessitate including dialed-up remote access, wireless networks, and virtual private networks (VPNs). When dealing with secure network connectivity, the system administrators in a hotel setting have to consider factors such as secure manageable, and standard based security systems to ensure that the employees that work from different diverse settings get secure remote connectivity. Moreover, the management complexity is another issue. Most vendors provide dedicated product solutions that have little integration with several other infrastructure and products. Establishing clients with centralized policies and authentication can be difficult unless there are assimilated solutions. However, there are several challenges involved in securing network interconnectivity in any organization. For instance, the issue of security is crucial because while the LAN once established a de facto security limit, it is currently routine for hotels to establish parts of their internal networks to different business partners, other stakeholders, and suppliers (Peng & Tsou 2003, p. 46). Hotels sharing similar objectives and goals can encourage the sharing of information within sub divisions, as well as the main branch and this is considered as cost effective due to LAN sharing. Concurrently, the research also notes benefits within the linking of cables on a similar line, which also comes with other extra expenses as the more the subdivisions the more costly the cost of connecting the whole networks system. This research also addresses the security challenge on different networks because the use of virtual private network (VPN) inclines to provide the security required in most networks. In the process of connection, the VPN develops tunnels, which range from one side to the other via the Internet cable. This normally tends to shield any traffic moving through the tunnel hence sensitive data will be hidden from the reach of hackers. Peng & Tsou (2003, p. 39) contend that by using site-to-site VPN, there will be positive impacts for the organization of the hotel because it allows scalability, flexibility, easy accessibility, and higher performance within the sub-units involved. Moreover, experts purport that it is significant to consider that when all the conforming software’s are applied, then, the interconnection of the VPN within the LAN is regarded as liable and effective. In connecting these networks, there is a high need for the experts to install secure Network interconnectivity (Duato, Yalamanchili, & Ni 2003, p.16). By providing access to more networks, firms will require to augment their security levels in order to safeguard against unsanctioned access and consumption of the assets within. Some security challenges to put into consideration include security policies and procedures, which are suitable for protecting LAN data, may be inefficient especially when the network is left open for outsiders. Moreover, weak authentication applied on external networks can jeopardize the network points of entry and allow unapproved access. Without a proper encryption level, sensitive data conducted over the LAN or wireless networks can land in wrong hands. There is a great need for application-aware firewalls that are necessary for ensuring that traffic is moderated before being let onto the internal network because hackers have more cultured application-layer bouts (Duato, Yalamanchili, & Ni 2003, p. 28). Another challenge witnessed in these networks is the complexity in management. The expansion of network interconnectivity normally brings challenges of process management and other technology sets, which make it hard for administrators to offer a consistent and centralized approach to accessing the network. Some of the management challenges that are to be considered include steady control of network access. This normally requires managing and synchronizing across several network access points like dial-up access, Internet, leased lines, wireless LAN extranets, VPN etc. Some access policies used by different networks necessitate different limits of permission and access. Administrators should contemplate imposing policies based on location, identity, and time. Another managerial issue is the single authentication model. This method irrespective of the kind of access (VPN, dial-up, wireless, etc.) is greatly desired for easing the management. While undertaking this review, Deering & Cheriton (1990, p. 191), bring over some information both on the wide area network WAN and the local area network (LAN) in line with their functions within dissimilar firms. WANs usually use different and more costly networking devices than the LAN. The LAN network is regarded as a network system, which links facilities within one reachable area like desktop or other paraphernalia. Simultaneously, the wide area network mainly provides network- internet connectivity majorly over a distant used setting when linked to the LAN system (Freeman 2005, p. 112). Freeman further delves into the roles of MAN (metropolitan local area network), which links any two systems of computers located over a distant and wide geographical region. The MAN network is usually inadequate due to several factors like limits, which are manipulated and controlled using the prevailing government rules. This author continues saying that there is an example of a transfer protocol used by a common client server design. Additionally, the ring topology category of LAN tends to turn the network more sensitive as the only breakdown in the loop impacts into the disintegration of the whole network system (Deering & Cheriton 1990, p. 116). Lastly, the star network topology differs from thyme others because most home networks usually prefer due to its advantages because any challenges in its cable do not influence the complete network, but rather just one computer. In conclusion, this paper has examined the designs and strategies, which exist within a network firm like peer-to-peer network and others. It has been established that a LANs can ensure that connections are maintained with other LANs through leased services, leased lines, or through the Internet. Additionally, LANs may be categorized as a Wide area network or a metropolitan area network. Reference List Deering, S & Cheriton, R 1990. ‘Multicast routing in datagram internetworks and extended LANs.’ ACM Transactions on Computer Systems, Vol. 8, no. 2, pp. 85-110. radio-network-simulation.googlecode.com/svn/trunk/papers/Medium%20Access%20Control%20for%20LANs%20of%20Wireless%20Mobile%20Computing.pdf Duato, J., Yalamanchili, S., & Ni, L. M. (2003). Interconnection networks: An engineering approach. Morgan Kaufmann. 9-40 http://books.google.co.ke/books?hl=en&lr=&id=ZLoAAOMJ3egC&oi=fnd&pg=PP2&dq=basic+components+of+a+LAN+network+&ots=xgw_lMgeWk&sig=UNFIfyyP8kS5K3KQUweXBHP-b5g&redir_esc=y#v=onepage&q&f=false Freeman, R. L 2005, Fundamentals of telecommunications, 2nd ed., John Wiley & Sons, New York. http://books.google.co.ke/books?hl=en&lr=&id=6_yQ-dEGc5wC&oi=fnd&pg=PR7&dq=Freeman,+R.+L+2005,+Fundamentals+of+telecommunications&ots=99Q3uhBCAw&sig=LNKDBG5gRJhopCNtIm61cgKvExA&redir_esc=y#v=onepage&q=Freeman%2C%20R.%20L%202005%2C%20Fundamentals%20of%20telecommunications&f=false Mansfield, K. C & Antonakos, J. L 2009, Computer networking from LANs to WANs: Hardware, software and security, 1st ed., Cengage Learning, Boston 21, 37, 329 http://books.google.co.ke/books?hl=en&lr=&id=0VMEAAAAQBAJ&oi=fnd&pg=PR5&dq=Mansfield,+K.+C+%26+Antonakos,+J.+L+2009,+Computer+networking+from+LANs+to+WANs&ots=1zBBZyAwbI&sig=fdHHkdRCpOf3Zw2VFHL1mzURJVs&redir_esc=y#v=onepage&q&f=false Peng, Z & Tsou, M 2003, Internet GIS: distributed geographic information services for the internet and wireless networks. NY: John Wiley & Sons. http://books.google.co.ke/books?hl=en&lr=&id=sk5UHK-FJM8C&oi=fnd&pg=PR25&dq=Suitable+LAN+Networks+in+Hotels&ots=FwMyaoIQad&sig=z1QGsCiMMkLFvdOmGSKtBv6mPC8&redir_esc=y#v=onepage&q&f=false Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Networks in Hotels Essay Example | Topics and Well Written Essays - 1750 words, n.d.)
Networks in Hotels Essay Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/design-technology/2052239-networks
(Networks in Hotels Essay Example | Topics and Well Written Essays - 1750 Words)
Networks in Hotels Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/design-technology/2052239-networks.
“Networks in Hotels Essay Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/design-technology/2052239-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF What Are the Different Networks Used in Hotels Contingent to the Location and Hotels Design

Designing a Safety System against Terrorism in Hotels

Designing a Safety System against Terrorism in hotels Name: Institution: Abstract This paper evaluates the effects of terrorist attacks on tourism, particularly focusing on Singapore's hotel industry.... Terrorism is known to impact popular tourist destinations adversely and this impact is likely to be higher on hotels due to their elevated susceptibility.... Contents Abstract 2 Contents 3 Introduction 4 Terrorism and Its Motivations 4 hotels as Targets of Terrorism 6 Security Model 8 Proposed Safety System Diagram for hotels 10 Detection 10 Dejection 11 Protection 11 Deflection 11 Connect 11 Reflect 12 Conclusion 12 References 13 Introduction In the past several years, the hospitality industry and particularly hotels and other accommodation facilities have encountered numerous terrorist invasions....
9 Pages (2250 words) Assignment

UK Budget Hotels & Premier Travel Inn

In the year 2006 premier inn modified their general room design; however the rooms still have the same standard of facilities as in the past.... Budget hotels are hotels which are meant to provide conventional hotel services at low cost, they target in providing affordable services to customers.... The hotels offer services such as accommodation and breakfast for guest who book at the hotels.... hellip; has changed so that presently lots of these low cost hotels are nearly indistinguishable from a lots of their more upmarket and expensive counterparts....
13 Pages (3250 words) Case Study

Implementation of Performance Management in an Underdeveloped Country: Golden Tulip Hotel

This paper stresses that data on performance management can be used in the development of strategic plans that is aligned to an organization's goals and objectives, evaluating policy alternatives, and in the decision-making process.... It can also be used in projecting an organization's annual budget, identifying which approach and practices are best and would yield maximum results, establishing a clear and definite objective of an organization, and as evidence-based data for further development of an organization's performance....
31 Pages (7750 words) Essay

The Operations and Performance of the Hilton Hotel

The management aims at providing hotels that advance the experiences of their visitors, engage their workers and increase their operational efficiencies.... The manager considers the management of supplies to the hotels the most difficult challenge he encounters.... There are also many suppliers willing to provide their supplies to the hotels and this makes the approval of their tenders a tiresome activity.... The business owns over three thousand hotels in seventy-four countries that have a very good reputation for their services and products....
16 Pages (4000 words) Case Study

ICT in Tourism and Hospitality Sector

The Galle Fort Hotel is one of the best boutique hotels in the country.... The purpose of this essay is to evaluate the extents to which use of ICT has been embraced in the tourism and hospitality industries.... This essay will point out the major areas of ICT advancement by use of a case study of one of the companies operating in the said industry....
20 Pages (5000 words) Essay

Boutique Hotel Market - Mr and Mrs Smith Hotel

The risk in this is that leading-edge design is often a characteristic of this new and healthy hotel baby, but is not by any means the whole story.... Lumping 'design' and 'boutique' together misses the point.... This individuality - of guest, or proprietor, of the site, of staff, of hotel atmosphere - is reflected in the design, but it may well not be driven by design.... This paper "Boutique Hotel Market - Mr and Mrs Smith Hotel" focuses on the fruitful experience the author has had with Mr and Mrs Smith hotels....
48 Pages (12000 words) Case Study

An Insight to the Chained v. Independent Hotels

Independent hotels, views the outlook of the hotel industry thru the chained and independent hotels perspective.... nbsp;… Independent hotels are depicted thru experiences in the various regional environment, particularly, UK, China, US, Africa, India, and Taiwan A conclusion is derived that the sector who can survive the financial crisis is one that practices innovative strategy and offering cheaper Costs are the number one consideration in the light of a declining economy....
13 Pages (3250 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us