Hotel Management System Case Study

Great Essays
AN OVERVIEW OF TELEMATICS

1.1 INTRODUCTION

Telematics established in 1987 and later acquired by Bahri & Mazroei is a provider of Converged Building Systems, which covers ICT Systems (Information and Communication Technology) like Structured Cabling, Data Networks, Telephoning, etc. and ELV (Extra Low Voltage) Systems like Security, Fire, BMS, Guest Room Management Systems and Car Park etc.

Telematics has “ISO 9001:2008; ISO 14001:2004 and OHSAS 18001:2007 certification” and it’s arena includes Airports, Health Care ,Hotel & Leisure, Oil & Gas , Offices & Commercial Establishments, Exhibition Halls, Banks & Financial Institutions, Convention Centers, Shopping Malls ,Residential Buildings – Single & Multi-site Complexes and so on.

Telematics
…show more content…
The system shall not be based on a single centralized room-control unit: each device shall be able to perform the required functions directly (each component has resident intelligence enabling direct dialogue with all the devices in the network) in order to prevent the global shutdown of the room in case of damage of single unit.

It has components like o Lighting Control i.e. supervisor panels, electronic switches, scenarios (manually activated with pushbutton or automatically activated by card insertion into the card-holder), supervision software o Room Temperature Controller i.e. Thermostat commands which includes Temperature Control, Fan Speed with, System ON / OFF. o Blinds and Curtains
…show more content…
 Network device monitoring - monitoring each of the device to determine the health of network components and the extent to which their performance matches capacity plans and intra-enterprise service-level agreements (SLAs).
 Network performance analysis – keeping a track of performance indicators like bandwidth utilization, latency, packet loss, availability and uptime of routers, switches and other Simple Network Management Protocol (SNMP) -enabled devices.
 Intelligent notifications - alerts that can be configure so that there is a response to a specific network scenarios through a page, e-mail, call or text in a network administrator.

2.4 PROTOCOLS AND STANDARDS
A network protocol is a set of formats and conventions for data transmission or in other words a standardized set of rules and conventions which all devices have to comply to be able to connect with a network.
Network protocols include Transfer Control Protocol / Internet Protocol (TCP/IP), Internetwork Packet exchange /Sequenced exchange (Novelle IPX/SPX), and IBM System Network Architecture (SNA).In the internet the most widely used protocol is TCP/IP stack which has become a

Related Documents

  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Itc431 Unit 1 Assignment

    • 1697 Words
    • 7 Pages

    Assignment 2 ITC431 - Networks and Communications Sidharth Arangadan House Jayarajan 11538368 1 1. Define and explain the following terminologies:  Computer networks: A computer network is a group of computer systems or other hardware computing devices which are linked together through a channel called communication channel to establishing communication between wide number of users and also for resource sharing between them.  Personal area networks (PANs): A personal area system - PAN - is a machine system sorted out around a distinctive individual.…

    • 1697 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Nt1310 Unit 9

    • 1390 Words
    • 6 Pages

    UML 91.561 Computer & Network Security I HomeWork 1 Name – Nrupen Abnave Student ID -01382247 1.1 (a) Describe the major structure of a TCP packet and explain the main functions of the TCP headers. - TCP is a transport layer protocol and is connection oriented. Its reliable connection, has error checking and flow control.…

    • 1390 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Decent Essays

    NT1330 Unit 1 Essay

    • 486 Words
    • 2 Pages

    So the previous section was discussing the findability Layer which enables humans and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows clients to provide their user names and passwords in order to make HTTP request on a server and it is followed with SSL/TLS in order to make sure that the user names and…

    • 486 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Unit 1 P1 Research Paper

    • 744 Words
    • 3 Pages

    Task 1 ( P1) Explain how networks communicate. Wired: Used to transfer information over networks some include twisted pair cables, coaxial cables and telephone lines. Wireless: Are used when it is impossible or difficult to install wires or cables it is sends communication signal via microwaves, satellite, infrared signals and so on. Physical Layouts: Ring:…

    • 744 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    There are 7 different types of networks that you could work with, such as A LAN network (Local Area Network) or WAN network (Wide area network) those are the two most commonly used networks. The other included seven types are; • LAN (Local area network) this network is one that operates over and is limited to a relatively small area such as a school or office building. • WAN (Wide area network)…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Name Muhammad Shahzad (73537) Who are Agero constituents? Broadly speaking Agero has four different types of constituents which are mentioned below • Drivers • Service provider • OEM • Insurance Companies…

    • 1277 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Discipline Investigation: Network System Analyst Introduction Information system is the most popular technology in the past two decades, but I have decided to get into the field is not because of the popularity. I have chosen network analyst as my future path because my mom used to restrict my internet usage. The reason sounds unique but that is why I initiate my interest on this “forbidden thing”. However, I never learn anything about it until I took a class in my high school, call Network Administration. The teacher has explored a new world in the class, and I have realized that my interest can be my future career choice.…

    • 1954 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    1-What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements? keeping a track of round trip response time, regular checkups of major routers, firewalls and switches, identifying sources and destinations of network traffic, analyzing its direction and balancing the data travel between source and destination are the some important factors. Documentation should be done for Data stores and traffic flows, the number of stations, average time a station is idle between sending frames and the time required to transmit a message once the medium access is granted, along with traffic behavior are essential factors to determine whether the existing internetwork is in good shape to support new enhancements. 2-When considering protocol…

    • 670 Words
    • 3 Pages
    Improved Essays