Hotel Management System Case Study

Great Essays
AN OVERVIEW OF TELEMATICS

1.1 INTRODUCTION

Telematics established in 1987 and later acquired by Bahri & Mazroei is a provider of Converged Building Systems, which covers ICT Systems (Information and Communication Technology) like Structured Cabling, Data Networks, Telephoning, etc. and ELV (Extra Low Voltage) Systems like Security, Fire, BMS, Guest Room Management Systems and Car Park etc.

Telematics has “ISO 9001:2008; ISO 14001:2004 and OHSAS 18001:2007 certification” and it’s arena includes Airports, Health Care ,Hotel & Leisure, Oil & Gas , Offices & Commercial Establishments, Exhibition Halls, Banks & Financial Institutions, Convention Centers, Shopping Malls ,Residential Buildings – Single & Multi-site Complexes and so on.

Telematics
…show more content…
The system shall not be based on a single centralized room-control unit: each device shall be able to perform the required functions directly (each component has resident intelligence enabling direct dialogue with all the devices in the network) in order to prevent the global shutdown of the room in case of damage of single unit.

It has components like o Lighting Control i.e. supervisor panels, electronic switches, scenarios (manually activated with pushbutton or automatically activated by card insertion into the card-holder), supervision software o Room Temperature Controller i.e. Thermostat commands which includes Temperature Control, Fan Speed with, System ON / OFF. o Blinds and Curtains
…show more content…
 Network device monitoring - monitoring each of the device to determine the health of network components and the extent to which their performance matches capacity plans and intra-enterprise service-level agreements (SLAs).
 Network performance analysis – keeping a track of performance indicators like bandwidth utilization, latency, packet loss, availability and uptime of routers, switches and other Simple Network Management Protocol (SNMP) -enabled devices.
 Intelligent notifications - alerts that can be configure so that there is a response to a specific network scenarios through a page, e-mail, call or text in a network administrator.

2.4 PROTOCOLS AND STANDARDS
A network protocol is a set of formats and conventions for data transmission or in other words a standardized set of rules and conventions which all devices have to comply to be able to connect with a network.
Network protocols include Transfer Control Protocol / Internet Protocol (TCP/IP), Internetwork Packet exchange /Sequenced exchange (Novelle IPX/SPX), and IBM System Network Architecture (SNA).In the internet the most widely used protocol is TCP/IP stack which has become a

Related Documents

  • Superior Essays

    There should be some type of software management system that addresses inventory management, discovery management, patch management, helpdesk management, log management, and security management. This software is able to effectively manage access of who, what, where, and when on the network as well as provide support to users and provide security updates regularly (Johnson,…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Nt1310 Unit 7

    • 1416 Words
    • 6 Pages

    The three functions of the network software are: To make sure that the information is addressed properly. To organise information into packets (a series of messages that a file is broken down into) on the sending workstation and putting the packets back to make a file on the receiving workstation. To check that each packet reaches the designated workstation. 4. What are the…

    • 1416 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Non-standard access may be granted in exceptional circumstances that shall be subjected to special authorization and controlled and applied only for a limited time. Business Owners shall conduct review at regular intervals to review user access rights with allocated by system managers. User Access Control For access to ABC systems that contain personal user data, All Users shall sign the confidentiality agreement to abide by the Data Protection Policy before they are registered All Users shall have their personal User ID and password pair for the system. User ID and password shall not be shared. Group ID should only be used with approval from Director of Information Technology Whenever Generic ID is re-assigned, the password shall be changed There shall be a formal user registration and de-registration procedure in place for granting and revoking access to all information systems and services.…

    • 1402 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    1. (5 points) Compare and contrast the three types of addresses used in a network. Application layer – A port is assigned to an application for direct routing of incoming and or outgoing data. Network layer – IP addresses are assigned to each individual computer. The IP addresses can change and are often assigned by the DHCP server.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    b) On request, DHCP server allocates an IP address to machine. Here, machine is acting as DHCP client. c) Once the machine gets IP address, then machine responds back to server that it has verified and accepted the IP address. d) Then DHCP server updates network server with IP address and required configurations for machine. e) Finally, DHCP server sends acknowledgement to client that it has given IP address for certain amount of time.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Plastic curtains and complete equipment’s in vehicle should not be tampered. 19. Switching off cooling unit while product inside is prohibited. As well without products should turn the cooling unit. 20.…

    • 732 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Interface Management securely opens and managed enterprise data and applications that are need to fill a request. It offers a range of functionalities, such as; transforming data to fill the request, filtering data to collect the right information, combining different sets of data stored in different enterprise systems, transporting the data by translating the protocols between the request and the database, controlling traffic amongst multiple request from multiple users, and overall routing the requests to the right areas of the enterprise system to develop a response that can be sent back to the client. Development Management engages, educates, and empowers internal and external developers. It has functionalities that suit the developer needs by providing an onboarding training process, a plan management system, collaborating amongst developers, a consistently updated API discover, and Analytics for testing future APIs. Operations management is the manage lifecycle and performance operations functionalities.…

    • 1025 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    4.3 Service Groups and Discovery Services: A service group can be defined as a collection of entries where each entry represents a grid service implementing the ServieGroupEntry interface. Each and every service will need some means for discovering services with particular properties. The ServiceGroup interface also extends the Grid service interface and there is a ServiceGroupEntry in each service of the group. There is ServiceLocator in each if these entries which contain the information related to referred-to service and also information about that service. 4.4 Choreography, Orchestration and Workflow: OGSA provides a rich set of behaviours along with associated operations and attributes for business process management.…

    • 1367 Words
    • 6 Pages
    Great Essays
  • Brilliant Essays

    Enron Leadership Analysis

    • 4743 Words
    • 19 Pages

    (1999) ‘Come, Join our family’: Discipline and integration in corporate organizational culture, Human Relations, 52, p.p 155-178 Nogler, G.E (2008) Going Concern Modification, CPA Firm Size, and the Enron Effect, Managerial Auditing Journal, Vol.23 (1), pp. 51-67. Cited in Journal of Management Research, Gyan Chandra, August 2003, Vol.3, Number 2, pp104-107 Pettigrew, A. (1990) Is corporate culture mageable? In D. Wilson, and R. Rosenfeld (Eds.…

    • 4743 Words
    • 19 Pages
    Brilliant Essays
  • Improved Essays

    Firearms are usually not carried by hotel guards although they still have access to it when required. Thirdly, they are responsible for maintaining and monitoring anything electronic surveillance equipment related, such as alarm systems, etc. It is typical for this department to purchase this as part of their job. Usually, one or more guards are stationed in an office for this role. They usually watch the activity that is caught on camera that are shown on television or monitors.…

    • 969 Words
    • 4 Pages
    Improved Essays