Networking Project Print Out

Embed Size (px)

Citation preview

  • 8/6/2019 Networking Project Print Out

    1/24

    AU Networking project

    Page - 1 - of24

    Department of BIS

    Executive Hotel Networking Project

    Prepared By ID. No

    1. ABEL BELETE 02024213

    2. ESRAEL ABATHUN 02024583

    3.EYERUSALEM TEREFE 02024596

    4. EYERUSALAM H/MARIAM 02025789

    Submitted to: WENDAFERAW

    Submission Date: JUNE/2011

  • 8/6/2019 Networking Project Print Out

    2/24

    AU Networking project

    Page - 2 - of24

    TABLE OF CONTENTS

    1.0 Introduction 4

    1.1 Back ground of the company 41.3 Statement of the problem 4

    1.4 Objective of the study 4

    1.3.1 General objective 5

    1.3.2 Specific objective 5

    1.4 Significance of the study 5

    1.5 Scope and Limitation 6

    2.0 Methodology of the Study 6

    3.0 Review of Related Studies 7

    3.1 Definition of networking 7

    3.2 Networking Configuration 7

    3.3 Networking topology 10

    3.4 Network Cabling 134.0Analysis Interpretation 18

    4.1Material used or hardware and software inventory 19

    4.2Building structure 204.3type of network configuration 204.4number of users 20

    5.0 New Networking design recommended 205.1Decision of bandwidth and class of network 21

    5.2 Design issues that must be considered 24

    6.0 Conclusion and justification 24

  • 8/6/2019 Networking Project Print Out

    3/24

    AU Networking project

    Page - 3 - of24

    ACKNOWLEDGMENT

    First and for most we would like to say thanks the almighty God for his charity, kindness,help and for givens. Next we would like to express our gratitude to our adviser Mr.

    WENDAFERAW for his guidance for the successful accomplishment of the paper. We also liketo extend our deep heart appreciation to our family and our friends for their support in terms of

    idea and money. Our special thanks to ADAMA UNIVESITY Library for letting us to take

    different reference books.

    Finally, we would like to appreciate all who helped as in various ways including the

    manager ofEXECUTIVE HOTEL Mr. KETEMA and Server Administrator of the hotel MR.

    YENEBEB MEZGEBU for their cooperation in undertaking this paper.

  • 8/6/2019 Networking Project Print Out

    4/24

    AU Networking project

    Page - 4 - of24

    1. Introduction

    In our country there are a lot of hotels for giving service and fulfill the customers need,

    hall reservation and bed room reservation system are the most need for the people. As we

    observe most hotels are interested on having smooth service, easy, time saving, working styles.

    1.1 Background

    We obvious Ethiopia have different culture, religion, celebrations and natural resource.

    By this and different reasons many tourists, local peoples and diasporas came and visit the

    country. Instead of this tourists are went to stay temporarily they need stay on clearly and safely

    place which is hotels to achieve their need. So that one of the hotels which is found in the

    Eastern part of Ethiopia in Oromia region Adama city the hotel name is Executive hotel.

    Executive Hotel was established in May 1st 2009.During that time the hotel gives many

    service to the customers. As we try to mention some of the service are bedroom service. Itincludes bathrooms, breakfast, free internet, telephone and TV depending on the interests of the

    customers. When customers need halls they can get service by renting for the purpose of there

    need like meeting conference, arranging wedding ceremony, birthday party. Also these places

    are expressive part of the hotel. The hotel includes free transport; service and restaurant. Unless

    the hotel try to improve the problem or impact from time to time. In the early years of

    foundations most of the services were not modernized. But after few years the hotels rebuild its

    services regarding or depending on the interests of the customers. For the future owners are

    designed to rebuild their service in modernized or completed to compute with other Hotel.

    The accommodation is 80 bed rooms and The Hotel conference halls are well furnishedand equipped with conference facilities, sound system, LCD project, flipchart fixed and internet

    service.

    1.2 statement of the problem

    In the existing system the network configuration to the system is more complexes and it

    is not fully implemented in the building for customers and employee. Which means every

    customer will have a limited internet and communication with server in order to meet his

    satisfaction. There is no wireless access in the hotel to help the customer to choose his/her needs

    in faster ways. As we all know and practically as we have seen it, it is big in size. It is obviousthat it need high level of security. As we have understood from the manager, they are willing to

    invest to secure there networking system. Because it is sensitive that many hackers and robbers

    are would like to attack it because of many transactions are made by online in the hotel.

  • 8/6/2019 Networking Project Print Out

    5/24

    AU Networking project

    Page - 5 - of24

    1.3 Objective of the project

    1.3.1General objective

    The term networking deals with in the way computers are linked together to share data and

    peripherals, such as hard disks and printers. The ability to share information efficiently is what

    gives computer networking its power and its appeal.

    1.3.2 Specific objective

    Creating network in a given organization could give the following advantages

    Cost Effective

    Convenient

    Reliable

    Efficient Improves Productivity

    Systematic Backup

    Centralized Information

    Improved Security

    1.4 significance of the study

    After the completion of this project the organization will have faster and user

    friendly networking environment. This leads the organization to have many customers

    due to the new networking configuration. The employee of the organization will be

    encouraging cause of minimizing load and faster internet. The organization will be

    profitable by the configuration of topology and it will attract more customers.

    The users of this network are:-

    Customer s of Executive hotel

    Employees of Executive hotel like

    Manager

    Receptions

    finance

  • 8/6/2019 Networking Project Print Out

    6/24

    AU Networking project

    Page - 6 - of24

    1.5 scope and Limitation

    The entire activity of the research work has got some sort of limitations. To mention some of

    them, the fact that some concerned individuals were not available to held interviews and provide

    information at the time of demand because of being busy of their routine task as well as repeated

    meetings. Hesitation to give all the needed informations Farness of the location of the company hadnegative influence to make frequent visit to the company as the required level. Duet to time constraints

    was also among the limitations.

    Furthermore, the research work does not include all sections/departments of the organization.

    The scope of research work has been limited to few sections of the firm which have direct relations with

    the inventory area. The study has also been limited in investigation the internal control of inventory only

    on a particular enterprise.

    2 Methodologies

    The research has been done under different research methodology. The methodology have enabledmeet the desired objectives of the study. Through these metrologies, the entire activity of the research

    work has been carried out and good results have been obtained. The results obtained are used to provide

    relevant comments and suggestions for the research findings. One of the methods applied to make this

    research is, survey research method. Through this method, the stores, the production sections as well as

    the entire compound of the company have been visited. This direct observation helped to get various

    informations to make the research activity complete as much as possible. Secondary systematic gathering

    of data has been done by applying personal contact with concerned individuals in the firm. Interviews

    have been conducted. Questionnaires have also been disseminated which focused on the objective of the

    study.

    Moreover, information from some publications have been gathered, samples of various notes used by

    the organization have been collected and finally, some secondary information sources has been used tocrosscheck the reliability of the already gathered information and enriching the research work.

    We are, in large part, collections of our experiences and the information given to us. When

    we want to expand our knowledge, we broaden our experience and gather more information.

    For the completion of this project we use several methods

    For requirement collection we use interview and observation

    We have passed through many reference books.

  • 8/6/2019 Networking Project Print Out

    7/24

    AU Networking project

    Page - 7 - of24

    3 REVIEW OF RELATED LITERATURE

    3.1 Definition of Networking

    A computer network is a collection of computers and other devices that communicate to

    share data, hardware, and software. The key word in the definition is "share." Sharing is thepurpose of computer networking. The ability to share information efficiently is what gives

    computer networking its power and its appeal.

    3.2 Network Configuration

    When we define a network in these terms, we are taking into account the size and geographic area

    of the network. How the computers in the network are configured and how they share information

    determine whether the network is peer-to-peer or server basedanother important network classification.

    In general, all networks have certain components, functions, and features in common, these

    include:

    ServersComputers that provide shared resources to network users.

    ClientsComputers that access shared network resources provided by a server.

    Mediathe wires that make the physical connections.

    Shared dataFiles provided to clients by servers across the network.

    Shared printers and other peripheralsAdditional resources provided by servers.

    Resourcesany service or device, such as files, printers, or other items, made available

    for use by members of the network.

    Networks are divided into two broad categories:-

    Peer-to-peer networks

    Server-based networks

    The distinction between peer-to-peer and server-based networks is important because each type

    has different capabilities. The type of network you choose to implement will depend on factorssuch as the:

    Size of the organization.

    Level of security required.

    Type of business.

    Level of administrative support available. Amount of network traffic.

    Needs of the network users.

    Network budget.

  • 8/6/2019 Networking Project Print Out

    8/24

    AU Networking project

    Page - 8 - of24

    Peer-to-Peer Networks

    In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among

    the computers. All the computers are equal and therefore are known as peers. Each computer

    functions as both a client and a server, and there is no administrator responsible for the entire

    network. The user at each computer determines what data on that computer is shared on thenetwork.

    Peer-to-peer network computers act as both clients and servers

    Size

    Peer-to-peer networks are also called workgroups. The term "workgroup" implies a small group

    of people. There are typically 10 or fewer computers in a peer-to-peer network.

    Cost

    Peer-to-peer networks are relatively simple. Because each computer functions as a client and aserver, there is no need for a powerful central server or for the other components required for a

    high-capacity network. Peer-to-peer networks can be less expensive than server-based networks.

    Operating Systems

    In a peer-to-peer network, the networking software does not require the same standard ofperformance and level of security as the networking software designed for dedicated servers.

  • 8/6/2019 Networking Project Print Out

    9/24

    AU Networking project

    Page - 9 - of24

    Dedicated servers function only as servers and not as clients or workstations. They are discussed

    in more detail later in this lesson.

    Peer-to-peer networking is built into many operating systems. In those cases,

    no additional software is required to set up a peer-to-peer network.

    Server-Based Networks

    In an environment with more than 10 users, a peer-to-peer networkwith computers

    acting as both servers and clientswill probably not be adequate. Therefore, most networkshave dedicated servers. A dedicatedserver is one that functions only as a server and is not used

    as a client or workstation. Servers are described as "dedicated" because they are not themselves

    clients, and because they are optimized to service requests from network clients quickly and to

    ensure the security of files and directories.

    Server-based network

  • 8/6/2019 Networking Project Print Out

    10/24

    AU Networking project

    Page - 10 - of24

    The table shows Comparison of Network Types

    Consideration Peer-to-Peer Network Server-Based Network

    Size Good for 10 or fewer

    computers

    Limited only by server and

    network hardware

    Security Security established by theuser of each computer

    Extensive and consistentresource and user security

    Administration Individual users responsible

    for their own administration;

    no full-time administrator

    necessary

    Centrally located for network

    control; requires at least one

    knowledgeable administrator

    3.3 Network Topology

    The term topology, or more specifically, network topology, refers to the arrangement orphysical layout of computers, cables, and other components on the network. "Topology" is thestandard term that most network professionals use when they refer to the network's basic design.

    In addition to the term "topology," you will find several other terms that are used to define a

    network's design:

    Physical layout Design

    Diagram

    Map

    Standard Topologies

    All network designs stem from four basic topologies:

    Bus

    Star

    Ring

    Mesh

    Bus

    The bus topology is often referred to as a "linear bus" because the computers are connected in astraight line. This is the simplest and most common method of networking computers.

  • 8/6/2019 Networking Project Print Out

    11/24

    AU Networking project

    Page - 11 - of24

    Bus topology network

    Star

    In the star topology, cable segments from each computer are connected to a centralized

    component called a hub. The figure shows four computers and a hub connected in a star

    topology. Signals are transmitted from the sending computer through the hub to all computers onthe network. This topology originated in the early days of computing when computers were

    connected to a centralized mainframe computer.

    Simple star network

  • 8/6/2019 Networking Project Print Out

    12/24

    AU Networking project

    Page - 12 - of24

    Ring

    The ring topology connects computers on a single circle of cable. Unlike the bus topology, there

    are no terminated ends. The signals travel around the loop in one direction and pass through each

    computer, which can act as a repeater to boost the signal and send it on to the next computer.

    Simple ring network showing logical ring

    Mesh

    A mesh topology network offers superior redundancy and reliability. In a mesh topology, each

    computer is connected to every other computer by separate cabling. This configuration providesredundant paths throughout the network so that if one cable fails, another will take over the

    traffic. While ease of troubleshooting and increased reliability is definite pluses, these networksare expensive to install because they use a lot of cabling. Often, a mesh topology will be used

    in conjunction with other topologies to form a hybrid topology.

    Mesh topology, all computers are connected to each other by separate cables

  • 8/6/2019 Networking Project Print Out

    13/24

    AU Networking project

    Page - 13 - of24

    The table shows Topology Advantages and Disadvantages

    Topology Advantages Disadvantages

    Bus Use of cable is economical.

    Media is inexpensive and easy to work with.

    System is simple and reliable.

    Bus is easy to extend.

    Network can slow down in heavy

    traffic.

    Problems are difficult to isolate.

    Cable break can affect many

    users.

    Ring System provides equal access for all

    computers.

    Performance is even despite many users.

    Failure of one computer can

    impact the rest of the network.

    Problems are hard to isolate.

    Network reconfiguration disrupts

    operation.

    Star Modifying system and adding new

    computers is easy.

    Centralized monitoring and management arepossible.

    Failure of one computer does not affect the

    rest of the network.

    If the centralized point fails, the

    network fails.

    Mesh System provides increased redundancy andreliability as well as ease of troubleshooting.

    System is expensive to installbecause it uses a lot of cabling.

    3.4 Network Cabling

    Building on our understanding of the different network topologies that connect computers, we

    focus next on the cables that connect them. In this lesson, we examine the construction, features,

    and operation of each type of cable, and the advantages and disadvantages of each.

  • 8/6/2019 Networking Project Print Out

    14/24

    AU Networking project

    Page - 14 - of24

    Cable types can be confusing. Belden, a leading cable manufacturer, publishes a catalog

    that lists more than 2200 types of cabling. Fortunately, only three major groups of cabling

    connect the majority of networks:

    Coaxial cable

    Twisted-pair (unshielded and shielded) cable Fiber-optic cable

    Coaxial Cable

    Coaxial cable consists of a core of copper wire surrounded by insulation, a braided metal

    shielding, and an outer cover. The term shielding refers to the woven or stranded metal mesh (or

    other material) that surrounds some types of cabling. Shielding protects transmitted data byabsorbing stray electronic signals, called noise, so that they do not get onto the cable and distort

    the data. Cable that contains one layer of foil insulation and one layer of braided metal shielding

    is referred to as dual shielded. For environments that are subject to higher interference, quad

    shielding is available. Quad shielding consists of two layers of foil insulation and two layers ofbraided metal shielding.

    Types of Coaxial Cable

    There are two types of coaxial cable:

    Thin (thin net) cable: - Thin netcable is a flexible coaxial cable about 0.64 centimeters (0.25

    inches) thick. Because this type of coaxial cable is flexible and easy to work with, it can be used

    in almost any type of network installation.

  • 8/6/2019 Networking Project Print Out

    15/24

    AU Networking project

    Page - 15 - of24

    Thick (thick net) cable: - Thick netcable is a relatively rigid coaxial cable about 1.27

    centimeters (0.5 inches) in diameter. Figure 2.5 shows the difference between thin net and thick

    net cable. Thick net cable is sometimes referred to as Standard Ethernet because it was the first

    type of cable used with the popular network architecture Ethernet. Thick net cable's copper core

    is thicker than a thin net cable core.

    Twisted-Pair Cable

    In its simplest form, twisted-pair cable consists of two insulated strands of copper wire twisted

    around each other. Figure 2.12 shows the two types of twisted-pair cable: unshielded twisted-

    pair(UTP) and shielded twisted-pair(STP) cable.

    Unshielded twisted-pair and shielded twisted-pair cables

    Unshielded Twisted-Pair (UTP) Cable

    UTP, using the 10BaseT specification, is the most popular type of twisted-pair cable and is fastbecoming the most popular LAN cabling. The maximum cable length segment is 100 meters,about 328 feet.

    Fiber-Optic Cable

    Infiber-optic cable, optical fibers carry digital data signals in the form of modulated

    pulses of light. This is a relatively safe way to send data because, unlike copper-based cables that

    carry data in the form of electronic signals, no electrical impulses are carried over the fiber-optic

    cable. This means that fiber optic cable cannot be tapped, and its data cannot be stolen.

    Fiber-optic cable is good for very high-speed, high-capacity data transmission because ofthe purity of the signal and lack of signal attenuation.

  • 8/6/2019 Networking Project Print Out

    16/24

    AU Networking project

    Page - 16 - of24

    Baseband Transmission

    Baseband systems use digital signaling over a single channel. Signals flow in the form ofdiscrete pulses of electricity or light. Figure 2.19 shows a baseband transmission with a

    bidirectional digital wave. With baseband transmission, the entire communication channelcapacity is used to transmit a single data signal. The digital signal uses the complete bandwidth

    of the cable, which constitutes a single channel. The term bandwidth refers to the data transfer

    capacity, or speed of transmission, of a digital communications system as measured in bits persecond (bps).

    Broadband Transmission

    Broadband systems, use analog signaling and a range of frequencies. With analogtransmission, the signals are continuous and no discrete. Signals flow across the physical

    medium in the form of electromagnetic or optical waves. With broadband transmission, signalflow is unidirectional.

  • 8/6/2019 Networking Project Print Out

    17/24

    AU Networking project

    Page - 17 - of24

    This Table shows Cable types

    Characteristics Thinnet coaxial

    (10Base2) Cable

    Thicknet coaxial

    (10Base5) Cable

    Twisted-pair

    (10BaseT) Cable

    Fiber-optic

    Cable

    Cable cost More than UTP More than thinnet UTP: Least

    expensive

    STP: More thanthinnet

    More than thinnet,

    but less than

    thicknet

    Usable cable

    length

    185 meters (about

    607 feet)

    500 meters (about

    1640 feet)

    UTP and STP:

    100 meters (about

    328 feet)

    2 kilometers

    (6562 feet)

    Transmission

    rates

    4-100 Mbps 4-100 Mbps UTP: 4-100

    Mbps

    STP: 16-500Mbps

    100 Mbps or more

    ( > 1Gbps)

    Flexibility Fairly flexible Less flexible than

    thinnet

    UTP: Most

    flexible

    STP: Less

    flexible than UTP

    Less flexible than

    thicknet

    Ease of

    installation

    Easy to install Moderately easyto install

    UTP: Very easy;often preinstalled

    STP: Moderately

    easy

    Difficult to install

    Susceptibility tointerference

    Good resistance tointerference

    Good resistance tointerference

    UTP: Verysusceptible

    STP: Good

    resistance

    Not susceptible tointerference

    Special features Electronic support

    components areless expensive

    than twisted-pair

    cable

    Electronic support

    components areless expensive

    than twisted-pair

    cable

    UTP: Same as

    telephone wire;often preinstalled

    in buildings

    STP: Supports

    higher

    transmission rates

    than UTP

    Supports voice,

    data, and video

    Preferred uses Medium to large

    sites with highsecurity needs

    Linking thinnet

    networks

    UTP: smaller

    sites on budget.STP: Token Ring

    in any size

    Any size

    installationrequiring speed

    and high data

    security and

    integrity

  • 8/6/2019 Networking Project Print Out

    18/24

    AU Networking project

    Page - 18 - of24

    4. Analysis

    In the hotel it has internet caf, conference hell, bedroom other work station for example

    administration, finance, reception and other department. This hotel are connected all the entiretopology by hybrid topology it is star and bus topology this give the hotel to connect all the

    workstation this rooms are connected by many hub/switch to connect with the server, they are

    configured through client/server configurations that the clients network recourses and server as

    to provide network recourse that controlled and ensuring security across the network for the

    internet access all of the above work stations uses gateway router from ETC the speed is 2GB.

    The existing system used by hotel is sever base system when we say server based we

    mean the majority of networks use at least one server. A server is a specially designated

    computer, sometimes of a higher specification, that acts as the controlling machine for the

    network. Also the hotel uses broadband transmission this transmission allows the hotel fastercommunications among all the uses. The hotel uses cross over cabling system. The cable used by

    the hotel is UTPUnshielded Twisted-Pair cable by RJ45 connector.

    Advantages of a Server-Based Network:

    More scalable than peer-to-peer networks There is a central management point for sharing resources More easily administered due to the central management point

  • 8/6/2019 Networking Project Print Out

    19/24

    AU Networking project

    Page - 19 - of24

    More secure than peer-to-peer networks Data can be backed up from one centrallocation

    High Performance Reduces the costs associated with the day-to-day operation of the network

    A server connect to

    Cisco catalyst 10/100/1000Base-T 26 port switch A router of Cisco uBR 900 series 48 port pitch panel

    4.1 materials used or hardware and software inventory

    Computer Vender(brand

    name)

    Processor

    version

    OS load NIC

    speed

    RAM

    capacity

    Hard

    disk

    capacity

    Quantity

    Computer DesktopDELL

    2.2 Windowsxp2006

    128mb/s 512Mb 40Gb 15

    2.4 Windows

    xp2006

    128mb/s 1Gb 80Gb 40

    Laptop

    Toshiba

    Core i3 Windows

    7

    128mb/s 3Gb 320Gb 5

    Server DELL Pentium IIIXeon

    Windows

    server

    2003

    128mb/s 4Gb 500Gb 1

    Switch/HUB

    128mb/s 8

    Router Cisco uBR900 series

    Cisco IOS

    Software128mb/s 1

    Printer hp 128mb/s 128Mb 10

    fax

    machine

    hp 128mb/s 4

    Patch panel 128mb/s 2

  • 8/6/2019 Networking Project Print Out

    20/24

    AU Networking project

    Page - 20 - of24

    4.2 Building structure

    Adama executive hotel is eight story building which are divided into main sectaries they

    are reception, lounge bar, restaurant, business center, conference hell, bad rooms, gems andparking area. The bed room stretcher is like this

    4.3 Type of network configuration

    In Adama executive hotel the network configuration is configured through client/serverconfigurations that the clients network recourses and server as to provide network recourse that

    controlled and ensuring security across the network. Because of the Size of the organization,

    Level of security required Type of business and Amount of network traffic it is more favorable(approval) for the hotel. Needs of the network users

    4.4 Number of users

    In this hotel we have 96 network available nodes from these nodes 16 nodes for

    administrator office, 20 nodes for internet caf, 10 nodes for conference hell and 50 nodes for

    bed rooms. In general all users communicate by using the server by LAN.

    5. New Networking Design recommended

    This research work points out that the networking(configurations, topology, cable type)

    mechanism which are used by the company are very satisfactory .However there are certain

  • 8/6/2019 Networking Project Print Out

    21/24

    AU Networking project

    Page - 21 - of24

    networking mechanism which are not given consideration .therefore , the following

    recommendations are suggested to make the entire networking activities safer and reliable.

    It would be better if special security measures are taken to keep safe customers

    and employees.

    is be batter fully implemented in the building It would be better additional server, faster cable for networking. It is good if

    additional machinery is bought for implementing better techniques of networking.

    it would be better to have wireless internet access in the hotel

    In this organization the configuration in this time is good but there are some problems

    depend on the building stretcher there should be a consideration on the availability of network in

    the hotel the network is not available where ever u are in the building there is a lack of services

    in the internet services but they should consider wireless media in the building it is moreavailable than cabling all the building.

    The performance of the network is good but if the hotel bay new additional server it is good

    for security because there are many customer and employee in the hotel. for that matter if weseparate the lode of one server and installed additional server to our network it is more fastermore secure our network in the hotel.

    5.1 Decision on bandwidth and classes of the network

    Bandwidth is the transmission capacity of a communications channel. The bandwidth of

    analog signal is measured in Hertz.The bandwidth of digital signals is usually measured in bits

    per second (BPS).

    The hotel use BROADBAND TRANSMISSION:-

    1. It divides the available bandwidth into multiple channels.2. Since there are many channels available for transmission, more than one device

    can transmit at a time; therefore, simultaneous transmissions can occur without

    collisions.3. Broadband transmission can transfer large quantities of information at a time.4. It is not limited to handling only digital transmission but also can support analog

    traffic, making it capable of handling traditional voice and video signalssimultaneously with data.

    The hotel use this broadband transmission by the speed of 2GB it is faster than it never

    be for so this gives for the hotel more attractions to customers and employees.

    Class of the network IP addressing supports five different address classes: A, B, C, D, and E. Only classes A, B, and C are available for commercial use. Class D & E IP addresses are used for experimental purposes and are not assigned to

    networks.

    Each of the address Classes has a different subnet mask.

  • 8/6/2019 Networking Project Print Out

    22/24

    AU Networking project

    Page - 22 - of24

    The hotel use class c IP address in this hotel there is many computers but all of them are not

    connected to server but the connected ones are used by this class ofnetwork standard the nodeswhich are available to service is 96 node when we divide by their building structure

    For eg:-

    1. administration building support 16 hosts

    2. the internet caf support 20 hosts3. the conference hell support 10 hosts4. the Bed room support 50 hosts

    1. The hotel class c network of 192.168.0.0/24

    Total number of subnet0 0000000 because 4 network we take 2 bite from the host

    1 1000000:- 22

    =4subnet26 =64host

    subnet mask :- 255.255.255.192

    IP address of subnet

    o administrator 192.168.0.0/26 63o internet caf 192.168.0.64/26 127o conference hell 192.168.0.128/26 190o bed room 192.168.0.191/26 255

    Because of many wastage of IP address we use VARIABLE LENGTH SUBNET MASKS(VLSM)

    Subnet has the same number of available host addresses. We may need this in some

    Cases, but, in most cases, having the same subnet mask for all subnets ends up wasting addressspace.Variable Length Subnet Masks (VLSM) allows you to use different masks for eachsubnet, thereby using address space efficiently. As follows:-

    VLSMSubnet mask administrator 255.255.255.224 11111000 25 = 32hosts internet caf 255.255.255.224 11111000 25 = 32hosts conference hell 255.255.255.240 11110000 24 = 16hosts bed room 255.255.255.192 11111100 26 =64hosts

    IP address

    o administrator 192.168.0.0/27 31o internet caf 192.168.0.32/27 63o conference hell 192.168.0.64/28 79o

    bed room 192.168.0.80/26 143

  • 8/6/2019 Networking Project Print Out

    23/24

    AU Networking project

    Page - 23 - of24

    Available IP addressBuilding of hotel Available IP address available

    host

    Require Wastage

    Administration 192.168.0.1/27 31 30 16 14

    internet caf 192.168.0.33/27 62 30 20 10

    conference hull 192.168.0.65/28 78 14 10 4

    bed room 192.168.0.81/26 142 62 50 12

    NOTE: - The wastage in the above table is not a large wastage of IP address in the hotel

    because this IP use for further expansion and for reserved in the hotel to give satisfaction for

    customer and employee of hotel that is why it is not a wastage.

  • 8/6/2019 Networking Project Print Out

    24/24

    AU Networking project

    Page 24 of 24

    5.2Design issues that must be considered

    In this organizing they should consider many things they should see for example the

    availability of the network should be configured that by wireless network and by using different

    topology in the hotel the topology should have a hybrid network it should be bus and stare

    topology and there should to have more server for eg 2 server is good for the hotel, because of

    many users in the building and they all need more faster, secure environment in their network.

    Security in this term is more important in this day because when we have a wireless network in

    this building we need more expert, software and hardware.

    In now days in our country Ethiopian telecommunication (ETC) they are giving a good

    internet access in the country they are giving faster speed internet service by this consideration

    the hotel should have fast internet access it need 2Gb internet speed because if they have money

    customer and also if they have video conference in the hotel it is more use to hotel.

    In this hotel all the cable type should be more like this on the bus topology they should

    use more likefiber optics because the size of installation requiring speed and high data security andintegrity in this topology and by connecting to switch/hub this give stare topology this topology should

    use Thin net coaxial (10Base2) Cable because the cable length is 185 meter, Easy to install for the user

    and employee of the hotel.

    6. Conclusion and Justification

    The following conclusions are drowning from the analysis and interpretation part of paper.

    The entire activities which are undergoing by the Executive Hotel to the networking environment

    are shown in the above. Classifying the network under different sections will make the

    controlling activities easily manageable. Keeping records and documents follow up and physical

    check up has given the good quality.

    The company uses to have successful networking topology. If frequently takes analysis of in

    network. The network section well situated in the way that the topology is integrated could be

    easier. The fact that each devise in the network section responsible for the various activateswhich they carried out has given the company to have good networking system. On the other

    hand, despite the good topology systems, there is little weakness on the network control.