StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Website and Computer Network for the Family Hotel - Article Example

Cite this document
Summary
The author of the "Website and Computer Network for the Family Hotel" paper determines the best network and website the family should adopt. The author also determines the cost to be incurred by this process and recommends how best to go through the process. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful

Extract of sample "Website and Computer Network for the Family Hotel"

Hotel Website and Computer Network (Your Name) Date of Submission Word Count: 2950 Abstract The compilation of this report involved a thorough research to gather all the relevant support to guide this discussion. A primary research from electronics shops was done to determine the cost of hardware and software to be used in setting of the hotel computer network and website. A secondary research was further done to gather more information that was used in compiling the literature review. The literature review discussed in depth about computer network and website in general. Then it focused on wireless network and how a commercial website operates. The information of the literature review helped in recommending the best way forward for the hotel to set up its network and website. The recommendation done was on how to set up of a hotel website and LAN network for the hotel. The report also recommended installation of programs that will protect the access of the hotel network by hackers. The report also advocated for hiring of more staffs that are computer literate to help in the management of the hotel website and network system. Other staffs will be assisting the hotel visitors to use the computer in the lounge. www.windowsnetworking.com/ - 38k Introduction Computer network is a group of computers that are connected either through a wired or wireless media. The network allows all the computers in the network to communicate. These computers are configured with IP addresses to allow them communicate with each other. There are many benefits of computer networking: The following are the benefits of computer networking. Computer networking enables those computers in the network to share resources such as printers, files, games and other resources. This is very important because it helps an organizations to minimize its cost of operation for instances when they is sharing of a printer in an organization. On the other side, computer network are faced with a major challenge of data security. There has been an increase of data insecurity in computer networks. Data insecurity involves access of a network by unauthorized users that implant virus in the network or change the content of the files in an organizations network. Therefore to curb this problem computer network are installed with various programs that helps to detect or prevent hackers accessing the networks. Computer network can be of many forms: Computer networks can be classified according to the media used for connection, in this case we can classify a computer network as either wired or wireless. Computer network are also categories according to the geographical area covered by the computer network. Through this processes of grouping, computer network can be grouped as Local Area Network (LAN), Metropolitan Area Network (MAN) or Wide Area network (WAN). Computer networks are still classified according to their topology. In this case computer network are grouped as Star, Bus, Ring or mesh network. www.windowsnetworking.com/ - 38k Computer network are further categorized according to the communication protocols they use. For example computers network can use Internet Protocol (IP) or Open System Interconnection (IOS). A Website is a program that organizes electronics files in an orderly manner to allow the end user to view their contents in form of web pages, once requested. Website has become a major means of advertisements for many organizations. Website can either be designed as a home website, an organizational website or a commercial website. Problem Statement The family hotel requires a hotel website and a hotel computer network. Therefore the family has a challenge to determine the right network and website to use for its hotel. The family also wants to know the amount of money will cost this process. Thus the compilation of this report is aimed at addressing these issues. Aims and Objectives The aim of this report is to determine the best network and website that the family should adapt. The report will also determine the cost to be incurred by this process and recommend how best to go through the process. The objectives for this report are: 1. To identify the best website and network for the family lounge. 2. To establish the cost for setting of a hotel website and network. 3. To recommend the best security measures to be employed for the hotel network to allow security of the network. Hypothesis 1. The pre-eminent network and website to be used by the lounge are LAN and commercial website. 2. The cost that will be incurred by this process is around USD 25000. 3. The best security measures to be installed in the hotel network are data encryption software and hacker monitoring systems. Literature Review To inform about this research and its findings a literature review was carried out. The literature review discusses in depth the various types of computer networks and website available. It further discussed different measures are used to ensure safety of computer networks in general. Then this discussion moved from generalization and focused on how wireless network operates and how their safety can be achieved and especially the safety of a home network. Computer network A computer network is a group of computers that uses a physical medium such as a wire or a wireless medium such as electromagnetic waves for their connection. A computer network enables communication of all the computers in the network. In a computer network, there are two kinds of computers: These are the server and the client. The server is the computer that manages all the computer communications in the network. This computer is usually a more powerful computer than the others. This is because it contains more programs than the other computers. The other types of computer in a computer network are referred as clients. Computer network can be classified according to various groups. The grouping can be done according to the following criteria: (Steve 1998) Scale In this case computer networks are classified according to the area they cover. In this grouping computer networks are categorized in three classes. These are: Local Area Network (LAN), this is a network that covers a small geographical area. This kind of network can either be found in a home network or an office. In this network, the networking of the computers enables its users to share printers or files in offices. At homes, the computer networking can allow people to share computer games. Computer networks can also be classified as Metropolitan Area Network (MAN). This network covers a bigger geographical area than LAN. This network comprise of a number of LAN networks joined together. This is the type of network that is found in campuses or in military stations. Companies that have more than one branch in various towns use this type of computer networking to enable their communication. Computer network that covers a large geographical area such as between two or more counties or continents are referred as Wide Area Network. (WAN). This type of network use transmission facilities such as telephone lines to enable their communications. They usually function using the three physical layers of OSI, which are the physical layer, the data-link layer and the network layer. (Steve 1998) Protocol used for communication Computers network can also be grouped according to the type of communication protocols used. In this process of classification we can group the networks as either Internet Protocol (IP) or Open System Interconnection. (OSI) The IP model is a four layers model that is mostly used in most networks. The OSI is an old seven-layer model that is not often used nowadays in most networks. (Steve 1998) Method of connection Computers in this classification are grouped according to the type of technology used to connective the network devices. The network can be grouped as wireless or wired. In a wired network Ethernet cables are used to connect the computer devices to enable communication of the computer in the network. In a wireless network connection of the network devices is done by the use of radio frequencies. (Steve 1998) Network Functions Computer networks in this category are classified as client, pear-pear or server. The classification in this process is based on the function of the computers in the network. Topology Computers are classified according to their logical relationship. In this case, the networks are classified as Bus, Ring, Star and Mesh network. (Steve 1998) Network Security The security of a network is the ability of the network to safe guards its network from unauthorized access. There are many methods that are employed in the network to guarantee network safety. These include: Use of password and user Name The devices used for networking have web pages that provide a place where a person put their password and user name to be allowed an access. Therefore the passwords and user names used should be chosen carefully to avoid hackers’ attack. The passwords used should contain more than six characters and changed regularly after a period of about two weeks to enhance the security of the network. (Steve 1998) Encryption For safety of the network, networks should be installed with encryption software that will enable encryption of sensitive files. The encryption program installed should be common in all the network components. The encryption of files makes it difficult for people to know the content of these encrypted files in case they come across them. This is because this program scrambles messages sent and the only people that area allowed access to this kind of information are those that have the right program to decode these messages. (Steve 1998) Hacker Monitoring System The network should be installed with hacker monitoring system. This software monitors the network and detects when unauthorized users access the network. This is very important as it enables the system administrator to log out the intruder and then to employ the right measures to strengthen the security of the network. (Steve 1998) Network Hardware Ethernet card This is a computer hardware that allows physical access to a computer network. It uses MAC addressing to offer a low-level addressing in the group of computers in network. These devices are normally found in all the computers in the network. It allows the network users communicate either through a wired or a wireless network. (Ronald1998) Hub A hub has multiple ports. When a packet arrives at the port it is copied to all the other ports. This process does not alter the destination addresses of the packet. (Ronald1998) Bridges A network bridge connects parts of the network at the data link layer of the OSI model. These devices serve the same purposes with the hubs. When a packet arrives at the bridge, the bridge learns the MAC addresses of the packet and copies the packet only to the specific port that allows the packet access its destination. (Ronald1998) Switch A switch operates similarly to a hub. Their difference is that a switch is more intelligent than a hub. This is because it operates at one or more of OSI layers. (Ronald1998) Modem This is a device that provides compatibility of the medium used for transmission and the computer network. This is because a modern modulate and demodulates information when it’s being transmitted and received respectively. (Ronald1998) Websites A website is allocation of electronic files that reside on a web server. These file offer an opportunity for the user to view the contents of the websites once requested. The websites can either be designed for an organization, a home website or for commercial purposes. Websites have become a major form of advertisement for many companies. These advertisements can range from enhancing and creation of awareness for firms’ products to advertisements for jobs vacancies. (Gerard 1997) Methodology Primary research Primary data is original data collected meant for a specific project. To enable this discussion a research of the prices of the various devices used in networking was carried out from various electronics shops. Secondary Research Secondary research is defined by Hood, S. [Ed.] (1999)), as “data used for a research project that were originally collected for other purpose.” Secondary research acts as a benchmark for the primary research and gives a good direction for the researcher to undertake in carrying out research work. Reliable secondary data that helped in guiding this discussion was obtained from the Internet, books and Journals. (Hood 1999) Presentation and Analysis The family hotel has 100 visitors’ rooms. The family hotel is located in Chicago city and it offers accommodation to different people that have come to visit the city. These people include the American residents from other towns and foreign visitors who have visited the country. Therefore the provision of Internet services by the hotel will boost its services greatly. The hotel hence will need to buy the various hardware and software needed to set up the hotel website and network. The table below show the hardware and software needed to establish these two facilities in the hotel. Table of the cost of networking hardware Device Unit Cost (USD) Quantity Total Cost Computers (PIV) Processor >2GH, RAM 128MHZ, Hard disk 20GB Computers (PIII) Processor>730MHZ, RAM 128MHZ, Hard disk 5GB 1000 700 1 19 1000 13300 Ethernet Card 25 10 250 16-port Switch 100 1 100 Ethernet Cables O.5 100 50 Networking service 1000 ISP Connection 1000 Website Designing 2000 Total cost =18700 After purchasing these components the hotel will be configured with a Local Area Network to enable communication of all the computers in the lounge. The best topology for this wireless network will be star topology because it does not have many failures. The hotel will still require a configuration of a Metropolitan Area Network to allow communication of the hotel LAN with the computer that will be located in the family house which is about ten kilometres from away room from the hotel. This process will be facilitated by the use of the IP because they are the best transmission protocols. This process will cost the family about 20,000 USD. The amount is a bit higher than the amount reflected in the table above due to extra expenses of purchasing the software to be used in the network. The website that will be designed to promote the family hotel will use the wireless Internet in the hotel to connect to the WAN. Through this process the hotel will have an opportunity to promote its services world wide. The website will be designed in a manner to allow on-line booking. Because of the risks that are associated with computer networks and especially wireless network, the hotel network will be installed with security programs to ensure its safety from hackers. These programs include computer monitoring soft that will be monitoring the hotel network if it’s being accessed by unauthorized users. The hotel network will also require to be installed with encryption programs to enhance the security of the network and especially due to the need to establish a very secure on-line booking process for the hotel visitors. Therefore with about 20,000 the family will able to set up the website and a computer network for their hotel. This amount of money is a bit higher than the one reflected on the table above due to the extra money that will be used to purchase software to set the hotel network and website. These programs include the operating system and the programs to be installed for security purposes of the hotel wireless network. Conclusion The plan for the family to set up a computer network and website for their hotel is a great idea. This is because these facilities will highly promote the services of the hotel. The guest will get a chance to book on-line and also to learn more of the hotel from the website before booking. This will be very important because it will enable the visitors to be aware of what to expect from the hotel before booking. In this way it will avoid them being frustrated in case they had over-expectation due to the hotel reputation. The computer network should be well connected to allow a good communication. The network should be installed with security systems to prevent being accessed by unauthorized users. These security programs can be hacker-monitoring system that helps to detect when unauthorized users are accessing the network. With this knowledge the system administrator can take the right measures such as log out the unauthorized user and improve the security system of the hotel network to guarantee maximum security. The family network can also be installed with encryption programs. This will be a very effective security measure for the hotel network, as it will ensure maximum security for the network from hackers and especially during on-line booking. This is because if the hackers intercept on-line booking of the visitors it can be very dangerous to the hotel as the visitors can develop a negative attitude for the hotel which can negatively affect the good reputation of the family hotel. The computer in the lounge and in the family house should be fitted with facilities that enhance communication. These features include skype programs that support both voice and video services. (Mary 1996 Appendix The family should employ some staff to assist the guest use the computer in the lounge. This will be important to prevent the visitors being frustrated in case they get problems using the computer in the lounge. This is because not all the hotel visitors will be computer literate and conversant on how to navigate through the hotel website. Therefore the support from the hotel attendant is very important. The system administrator should also ensure that the computers in the network are installed with anti-virus software to prevent them being attacked by virus which can be very dangerous. This is because they can delete very important files in the system or crash the whole system. (Gerard 1997) References Gerard T. (1997): The advancement of the Software models, Prentice Hall New Jersey Hood S. (1999) The Effective Research Methodologies Chicago University Press: Chicago Ronald J (1998) Microcomputer Network Prentice-Hall Publishing Press: New York. Mary Shaw, (1996): The Software Architecture: Prentice Hall: New Jersey. Steve McConnell, (1998): Software Development, Microsoft Press: New York www.windowsnetworking.com/ - 38k Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(A Family-run Hotel Wants To Connect To The Internet, n.d.)
A Family-run Hotel Wants To Connect To The Internet. https://studentshare.org/logic-programming/2042772-a-family-run-hotel-wants-to-connect-to-the-internet
(A Family-Run Hotel Wants To Connect To The Internet)
A Family-Run Hotel Wants To Connect To The Internet. https://studentshare.org/logic-programming/2042772-a-family-run-hotel-wants-to-connect-to-the-internet.
“A Family-Run Hotel Wants To Connect To The Internet”. https://studentshare.org/logic-programming/2042772-a-family-run-hotel-wants-to-connect-to-the-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF Website and Computer Network for the Family Hotel

Wi-Fi Implementation in Hospitality Industries

For this very reason, it is observed that to provide faster access, at times the hotel/ restaurant owner prefers compromising the security aspect.... Once the global tourist agrees to radiate his/ her identity to the hotel and requests for communication from the hotel end, the hotel can track his location and send him a pickup car, etc.... For the hospitality industry, It is relatively easy to install a Wi-Fi network as compared to a wired LAN as it requires minimum cabling....
9 Pages (2250 words) Assignment

Evaluation of External Information Communication Technologies

The hotel chains are going to draw their stress on online business promotion.... Thus the need to reduce this complexity and to have a flow of information and other facilities, the use of computer technology has been proved to be a major milestone in this industry.... computer technology now a day is termed Information Technology (IT)....
6 Pages (1500 words) Essay

Critical evaluation of Intercontinental hotel network

By critically evaluating the hotel's network infrastructure, this project will suggest ways in which the system can be improved, such as better network type and design, network security, bandwidth, Aspects to be considered will include hardware and software, in addition to strategies and policies.... A findings chapter will be included which will talk about shortfalls of the existing system in the hotel.... his project will be based on a critical evaluation of the Intercontinental hotel Network....
48 Pages (12000 words) Essay

E-Business: System Design, Process Design, and Network Topology

The basic design of the hotel website and other services which must be catered are to be mapped within a Use Case diagram for a better understanding of the problem and the structure of the design.... Network topologyThe very organization of the hotel into departments and their location are the prime factors for designing the network topology and the technologies to be used for efficient communication and sharing of information (Physinfo, 2006).... The "E-Business: System Design, Process Design, and network Topology" paper argues that LAN technology follows a star topology with hubs....
2 Pages (500 words) Essay

IT in hotels travel lodge

In this essay describe the impact of IT on the hotel business.... Also, it covers such questions as benefits for hotel industries from social media, cyber security, e-Commerce, ... n addition, it analyzes Jurys Inn hotel chain in the UK, which is known for its best value for money.... Since a large number of customers make online payments, the official website of the company needs to be highly protected from phishing attacks....
11 Pages (2750 words) Essay

Hospitality and Tourism Facilities Management Computers in Hotels

While most hotels do have a website and find the internet a useful channel of distribution, very few utilize the computer technology in enhancing the efficiency of its operations with a view to delivering superior customer value.... The process of delivering customer value in a hotel setting involves three parties – the employees, the managers, and the customers.... A computer system – made up of hardware and software, has four distinct characteristics that make them useful – speed, accuracy, discipline, and capacity (O'Connor, 2004)....
12 Pages (3000 words) Essay

Using The Internet In Hospitality And Tourism Industry

The paper "Using The Internet In Hospitality And Tourism Industry" discusses the features of the hotel websites development.... Thus hotel websites have to be designed in order to handle this hyper-interactive user.... Thus hotel websites can no longer be static brochures with stale and boring context.... he Holiday Inn hotel is a subsidiary of the IHG group of companies.... Holiday Inn hotels need to develop a website which highlights its core competencies, tackles competition from market rivals....
25 Pages (6250 words) Research Paper

Hospitality Information Technology in InterContinental Hotels Group

This report takes InterContinental Hotels Group (IHG) as a case study to evaluate the strength and weaknesses of a website in the hospitality industry.... The paper looks at IHGs website functionality and how much it succeeds at enhancing the reputation of the organization.... trengths of IHG's WebsiteThe website is designed in a manner that allows for clear navigation.... By its design, users can easily and smoothly navigate the website via quick links that have been simply created....
11 Pages (2750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us