Networking Project Print Out
Networking Project Print Out
Networking Project Print Out
Department of BIS
Executive Hotel Networking Project
Page - 1 - of 24
AU Networking project
TABLE OF CONTENTS
1.0 Introduction 4
1.1 Back ground of the company 4
1.3 Statement of the problem 4
1.4 Objective of the study 4
1.3.1 General objective 5
1.3.2 Specific objective 5
1.4 Significance of the study 5
1.5 Scope and Limitation 6
2.0 Methodology of the Study 6
3.0 Review of Related Studies 7
3.1 Definition of networking 7
3.2 Networking Configuration 7
3.3 Networking topology 10
3.4 Network Cabling 13
4.0 Analysis Interpretation 18
4.1 Material used or hardware and software inventory 19
4.2 Building structure 20
4.3 type of network configuration 20
4.4 number of users 20
5.0 New Networking design recommended 20
5.1Decision of bandwidth and class of network 21
5.2 Design issues that must be considered 24
6.0 Conclusion and justification 24
Page - 2 - of 24
AU Networking project
ACKNOWLEDGMENT
First and for most we would like to say thanks the almighty God for his charity, kindness,
help and for givens. Next we would like to express our gratitude to our adviser Mr.
WENDAFERAW for his guidance for the successful accomplishment of the paper. We also like
to extend our deep heart appreciation to our family and our friends for their support in terms of
idea and money. Our special thanks to ADAMA UNIVESITY Library for letting us to take
different reference books.
Finally, we would like to appreciate all who helped as in various ways including the
manager of EXECUTIVE HOTEL Mr. KETEMA and Server Administrator of the hotel MR.
YENEBEB MEZGEBU for their cooperation in undertaking this paper.
Page - 3 - of 24
AU Networking project
1. Introduction
In our country there are a lot of hotels for giving service and fulfill the customers need,
hall reservation and bed room reservation system are the most need for the people. As we
observe most hotels are interested on having smooth service, easy, time saving, working styles.
1.1 Background
We obvious Ethiopia have different culture, religion, celebrations and natural resource.
By this and different reasons many tourists, local peoples and diasporas came and visit the
country. Instead of this tourists are went to stay temporarily they need stay on clearly and safely
place which is hotels to achieve their need. So that one of the hotels which is found in the
Eastern part of Ethiopia in Oromia region Adama city the hotel name is Executive hotel.
Executive Hotel was established in May 1st 2009.During that time the hotel gives many
service to the customers. As we try to mention some of the service are bedroom service. It
includes bathrooms, breakfast, free internet, telephone and TV depending on the interests of the
customers. When customers need halls they can get service by renting for the purpose of there
need like meeting conference, arranging wedding ceremony, birthday party. Also these places
are expressive part of the hotel. The hotel includes free transport; service and restaurant. Unless
the hotel try to improve the problem or impact from time to time. In the early years of
foundations most of the services were not modernized. But after few years the hotels rebuild its
services regarding or depending on the interests of the customers. For the future owners are
designed to rebuild their service in modernized or completed to compute with other Hotel.
The accommodation is 80 bed rooms and The Hotel conference halls are well furnished
and equipped with conference facilities, sound system, LCD project, flipchart fixed and internet
service.
Page - 4 - of 24
AU Networking project
The term networking deals with in the way computers are linked together to share data and
peripherals, such as hard disks and printers. The ability to share information efficiently is what
gives computer networking its power and its appeal.
Cost Effective
Convenient
Reliable
Efficient
Improves Productivity
Systematic Backup
Centralized Information
Improved Security
Page - 5 - of 24
AU Networking project
2 Methodologies
The research has been done under different research methodology. The methodology have enabled
meet the desired objectives of the study. Through these metrologies, the entire activity of the research
work has been carried out and good results have been obtained. The results obtained are used to provide
relevant comments and suggestions for the research findings. One of the methods applied to make this
research is, survey research method. Through this method, the stores, the production sections as well as
the entire compound of the company have been visited. This direct observation helped to get various
information’s to make the research activity complete as much as possible. Secondary systematic gathering
of data has been done by applying personal contact with concerned individuals in the firm. Interviews
have been conducted. Questionnaires have also been disseminated which focused on the objective of the
study.
Moreover, information from some publications have been gathered, samples of various notes used by
the organization have been collected and finally, some secondary information sources has been used to
crosscheck the reliability of the already gathered information and enriching the research work.
We are, in large part, collections of our experiences and the information given to us. When
we want to expand our knowledge, we broaden our experience and gather more information.
Page - 6 - of 24
AU Networking project
When we define a network in these terms, we are taking into account the size and geographic area
of the network. How the computers in the network are configured and how they share information
determine whether the network is peer-to-peer or server based—another important network classification.
In general, all networks have certain components, functions, and features in common, these
include:
Peer-to-peer networks
Server-based networks
The distinction between peer-to-peer and server-based networks is important because each type
has different capabilities. The type of network you choose to implement will depend on factors
such as the:
Page - 7 - of 24
AU Networking project
Peer-to-Peer Networks
In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among
the computers. All the computers are equal and therefore are known as peers. Each computer
functions as both a client and a server, and there is no administrator responsible for the entire
network. The user at each computer determines what data on that computer is shared on the
network.
Size
Peer-to-peer networks are also called workgroups. The term "workgroup" implies a small group
of people. There are typically 10 or fewer computers in a peer-to-peer network.
Cost
Peer-to-peer networks are relatively simple. Because each computer functions as a client and a
server, there is no need for a powerful central server or for the other components required for a
high-capacity network. Peer-to-peer networks can be less expensive than server-based networks.
Operating Systems
In a peer-to-peer network, the networking software does not require the same standard of
performance and level of security as the networking software designed for dedicated servers.
Page - 8 - of 24
AU Networking project
Dedicated servers function only as servers and not as clients or workstations. They are discussed
in more detail later in this lesson.
Server-Based Networks
Server-based network
Page - 9 - of 24
AU Networking project
The term topology, or more specifically, network topology, refers to the arrangement or
physical layout of computers, cables, and other components on the network. "Topology" is the
standard term that most network professionals use when they refer to the network's basic design.
In addition to the term "topology," you will find several other terms that are used to define a
network's design:
Physical layout
Design
Diagram
Map
Standard Topologies
Bus
Star
Ring
Mesh
Bus
The bus topology is often referred to as a "linear bus" because the computers are connected in a
straight line. This is the simplest and most common method of networking computers.
Page - 10 - of 24
AU Networking project
Star
In the star topology, cable segments from each computer are connected to a centralized
component called a hub. The figure shows four computers and a hub connected in a star
topology. Signals are transmitted from the sending computer through the hub to all computers on
the network. This topology originated in the early days of computing when computers were
connected to a centralized mainframe computer.
Page - 11 - of 24
AU Networking project
Ring
The ring topology connects computers on a single circle of cable. Unlike the bus topology, there
are no terminated ends. The signals travel around the loop in one direction and pass through each
computer, which can act as a repeater to boost the signal and send it on to the next computer.
Mesh
A mesh topology network offers superior redundancy and reliability. In a mesh topology, each
computer is connected to every other computer by separate cabling. This configuration provides
redundant paths throughout the network so that if one cable fails, another will take over the
traffic. While ease of troubleshooting and increased reliability is definite pluses, these networks
are expensive to install because they use a lot of cabling. Often, a mesh topology will be used
in conjunction with other topologies to form a hybrid topology.
Mesh topology, all computers are connected to each other by separate cables
Page - 12 - of 24
AU Networking project
Media is inexpensive and easy to work with. Problems are difficult to isolate.
Building on our understanding of the different network topologies that connect computers, we
focus next on the cables that connect them. In this lesson, we examine the construction, features,
and operation of each type of cable, and the advantages and disadvantages of each.
Page - 13 - of 24
AU Networking project
Cable types can be confusing. Belden, a leading cable manufacturer, publishes a catalog
that lists more than 2200 types of cabling. Fortunately, only three major groups of cabling
connect the majority of networks:
Coaxial cable
Twisted-pair (unshielded and shielded) cable
Fiber-optic cable
Coaxial Cable
Coaxial cable consists of a core of copper wire surrounded by insulation, a braided metal
shielding, and an outer cover. The term shielding refers to the woven or stranded metal mesh (or
other material) that surrounds some types of cabling. Shielding protects transmitted data by
absorbing stray electronic signals, called noise, so that they do not get onto the cable and distort
the data. Cable that contains one layer of foil insulation and one layer of braided metal shielding
is referred to as dual shielded. For environments that are subject to higher interference, quad
shielding is available. Quad shielding consists of two layers of foil insulation and two layers of
braided metal shielding.
Thin (thin net) cable: - Thin net cable is a flexible coaxial cable about 0.64 centimeters (0.25
inches) thick. Because this type of coaxial cable is flexible and easy to work with, it can be used
in almost any type of network installation.
Page - 14 - of 24
AU Networking project
Thick (thick net) cable: - Thick net cable is a relatively rigid coaxial cable about 1.27
centimeters (0.5 inches) in diameter. Figure 2.5 shows the difference between thin net and thick
net cable. Thick net cable is sometimes referred to as Standard Ethernet because it was the first
type of cable used with the popular network architecture Ethernet. Thick net cable's copper core
is thicker than a thin net cable core.
Twisted-Pair Cable
In its simplest form, twisted-pair cable consists of two insulated strands of copper wire twisted
around each other. Figure 2.12 shows the two types of twisted-pair cable: unshielded twisted-
pair (UTP) and shielded twisted-pair (STP) cable.
UTP, using the 10BaseT specification, is the most popular type of twisted-pair cable and is fast
becoming the most popular LAN cabling. The maximum cable length segment is 100 meters,
about 328 feet.
Fiber-Optic Cable
In fiber-optic cable, optical fibers carry digital data signals in the form of modulated
pulses of light. This is a relatively safe way to send data because, unlike copper-based cables that
carry data in the form of electronic signals, no electrical impulses are carried over the fiber-optic
cable. This means that fiber optic cable cannot be tapped, and its data cannot be stolen.
Fiber-optic cable is good for very high-speed, high-capacity data transmission because of
the purity of the signal and lack of signal attenuation.
Page - 15 - of 24
AU Networking project
Baseband Transmission
Baseband systems use digital signaling over a single channel. Signals flow in the form of
discrete pulses of electricity or light. Figure 2.19 shows a baseband transmission with a
bidirectional digital wave. With baseband transmission, the entire communication channel
capacity is used to transmit a single data signal. The digital signal uses the complete bandwidth
of the cable, which constitutes a single channel. The term bandwidth refers to the data transfer
capacity, or speed of transmission, of a digital communications system as measured in bits per
second (bps).
Broadband Transmission
Broadband systems, use analog signaling and a range of frequencies. With analog
transmission, the signals are continuous and no discrete. Signals flow across the physical
medium in the form of electromagnetic or optical waves. With broadband transmission, signal
flow is unidirectional.
Page - 16 - of 24
AU Networking project
Page - 17 - of 24
AU Networking project
4. Analysis
In the hotel it has internet café, conference hell, bedroom other work station for example
administration, finance, reception and other department. This hotel are connected all the entire
topology by hybrid topology it is star and bus topology this give the hotel to connect all the
workstation this rooms are connected by many hub/switch to connect with the server, they are
configured through client/server configurations that the clients network recourses and server as
to provide network recourse that controlled and ensuring security across the network for the
internet access all of the above work stations uses gateway router from ETC the speed is 2GB.
The existing system used by hotel is sever base system when we say server based we
mean the majority of networks use at least one server. A server is a specially designated
computer, sometimes of a higher specification, that acts as the controlling machine for the
network. Also the hotel uses broadband transmission this transmission allows the hotel faster
communications among all the uses. The hotel uses cross over cabling system. The cable used by
the hotel is UTP Unshielded Twisted-Pair cable by RJ45 connector.
Page - 18 - of 24
AU Networking project
More secure than peer-to-peer networks Data can be backed up from one central
location
High Performance
Reduces the costs associated with the day-to-day operation of the network
A server connect to
Cisco catalyst 10/100/1000Base-T 26 port switch
A router of Cisco uBR 900 series
48 port pitch panel
fax hp 128mb/s 4
machine
Patch panel 128mb/s 2
Page - 19 - of 24
AU Networking project
Adama executive hotel is eight story building which are divided into main sectaries they
are reception, lounge bar, restaurant, business center, conference hell, bad rooms, gems and
parking area. The bed room stretcher is like this
In this hotel we have 96 network available nodes from these nodes 16 nodes for
administrator office, 20 nodes for internet café, 10 nodes for conference hell and 50 nodes for
bed rooms. In general all users communicate by using the server by LAN.
Page - 20 - of 24
AU Networking project
networking mechanism which are not given consideration .therefore , the following
recommendations are suggested to make the entire networking activities safer and reliable.
It would be better if special security measures are taken to keep safe customers
and employees.
is be batter fully implemented in the building
It would be better additional server, faster cable for networking. It is good if
additional machinery is bought for implementing better techniques of networking.
it would be better to have wireless internet access in the hotel
In this organization the configuration in this time is good but there are some problems
depend on the building stretcher there should be a consideration on the availability of network in
the hotel the network is not available where ever u are in the building there is a lack of services
in the internet services but they should consider wireless media in the building it is more
available than cabling all the building.
The performance of the network is good but if the hotel bay new additional server it is good
for security because there are many customer and employee in the hotel. for that matter if we
separate the lode of one server and installed additional server to our network it is more faster
more secure our network in the hotel.
5.1 Decision on bandwidth and classes of the network
Page - 21 - of 24
AU Networking project
The hotel use class c IP address in this hotel there is many computers but all of them are not
connected to server but the connected one’s are used by this class of network standard the nodes
which are available to service is 96 node when we divide by their building structure
For eg:-
1. administration building support 16 hosts
2. the internet café support 20 hosts
3. the conference hell support 10 hosts
4. the Bed room support 50 hosts
1. The hotel class c network of 192.168.0.0/24
Total number of subnet
0 0000000 because 4 network we take 2 bite from the host
1 1000000:- 22 =4subnet
26 =64host
subnet mask :- 255.255.255.192
IP address of subnet
o administrator 192.168.0.0/26 63
o internet café 192.168.0.64/26 127
o conference hell 192.168.0.128/26 190
o bed room 192.168.0.191/26 255
Because of many wastage of IP address we use VARIABLE LENGTH SUBNET MASKS
(VLSM)
Subnet has the same number of available host addresses. We may need this in some
Cases, but, in most cases, having the same subnet mask for all subnets ends up wasting address
space. Variable Length Subnet Masks (VLSM) allows you to use different masks for each
subnet, thereby using address space efficiently. As follows:-
VLSM
Subnet mask
administrator 255.255.255.224 11111000 25 = 32hosts
internet café 255.255.255.224 11111000 25 = 32hosts
conference hell 255.255.255.240 11110000 24 = 16hosts
bed room 255.255.255.192 11111100 26 =64hosts
IP address
o administrator 192.168.0.0/27 31
o internet café 192.168.0.32/27 63
o conference hell 192.168.0.64/28 79
o bed room 192.168.0.80/26 143
Page - 22 - of 24
AU Networking project
Available IP address
Building of hotel Available IP address available Require Wastage
host
Administration 192.168.0.1/27 31 30 16 14
NOTE: - The wastage in the above table is not a large wastage of IP address in the hotel
because this IP use for further expansion and for reserved in the hotel to give satisfaction for
customer and employee of hotel that is why it is not a wastage.
Page - 23 - of 24
AU Networking project
In now days in our country Ethiopian telecommunication (ETC) they are giving a good
internet access in the country they are giving faster speed internet service by this consideration
the hotel should have fast internet access it need 2Gb internet speed because if they have money
customer and also if they have video conference in the hotel it is more use to hotel.
In this hotel all the cable type should be more like this on the bus topology they should
use more like fiber optics because the size of installation requiring speed and high data security and
integrity in this topology and by connecting to switch/hub this give stare topology this topology should
use Thin net coaxial (10Base2) Cable because the cable length is 185 meter, Easy to install for the user
and employee of the hotel.
Page - 24 - of 24