A Review On Fax System Devices Information Technology Essay

Published: November 30, 2015 Words: 4325

This assignment allows us to demonstrate an understanding of installing networks for computing and telephony on a single site. You will plan the implementation of networks to meet the needs of a new hotel that will cater for the business market. For the assignment requirements;

In Task 1, Investigate telephone / fax system available in your country for a hotel such as BusExpress. Pay particular attention to:

Provide a recommendation for which system to purchase including reasons for this recommendation.

In Task 3, Investigate the methods by which users could gain access to the network. Pay particular attention to:

The requirement that free Wi-Fi access is only for customers paying for accommodation and / or accommodation.

The need for access to expire once the customer no longer has conference facilities or accommodation.

Controlling access to print facilities.

Provide a brief user guide explaining how a customer may log on to the network and what the can and can't do whilst connected to the wireless network.

In Task 4, Investigate the security issues relating to the wireless network including:

Access to e-mail

Using the wireless network for the transmission of sensitive business information

Provide a recommendation as to the security measures that should be implemented to reduce and remove threats to the system.

Task 1

Task 1

Task 1

This hotel is a new hotel in a small city that aims primarily to provide accommodation for business travelers. This hotel will provide accommodation for up t 50 paying guests and also have conference rooms, one holding up to 30 people the other up to 15 people.

The main equipment that would be installed.

There are two system of telephone that would be installed in this BusExpress hotel are Private Branch Exchanges (PBXs) and Key Telephone System (KTS).

The main equipment that would be installed in PBXs

Centralized processor

Telephone instruments

Public exchange line

Switchboard

The main equipment that would be installed in KTs

Public exchange line

Telephone instruments

The features available with each system.

KTS and PBX system features are to allow extension users to dial other extensions. And it is dial the external lines. It is to transfer a call to another extension. And it is receives the external calls. It is also to make an enquiry call to another extension.

KTS and PBX advanced user features are Call barring, using call baring it is possible to limit the destinations to which calls may be dialed directly from an individual extension line. The usual limitations are that it cans local calls only and it is also local calls plus national and local plus national plus international.

Another function is Hunt groups- One number selects a group of lines. This is where a group of extension lines can be accessed through a special hunt group number. So, instead of having to dial again if the first extension tried is busy, the system will automatically hunt over all extension lines and select the first free one.

Another function is Pick-up group is a feature used in telephone system that allows one to answer someone else's telephone call within the same pick-up group by dialing a special code. It is possible to answer the calls of any extension by dialing a code, followed by the number of the ringing extension.

Automatic Call Back is an extension user receives either no reply, or busy, when calling other extensions, or one other extension within the company, the user can book a call to that extension. After booking the call, the caller replaces the receiver and when the required extension becomes free, or the user make a call upon returning to the office, the system automatically calls the original caller back.

Another function is Last Number Re-Dial is similar to saved number dialed, but it only applies to the last number dialed.

Another modern Key Telephone feature is Conference call- is a telephone call in which the calling party whishes to have more than one extension and an outside caller. The procedure can be repeated until a maximum of six parties are connected. This feature should be placed in each department reception within the hospital.

A call transfer is a feature that enables a user to relocate an existing call to another telephone by using the transfer button and dialing the required location. The above features are possible and reasonable to install in the hotel telephone system.

The cost of equipment and installation

Equipment

Cost

PBXs

Cost

Quantity

Total Cost

Centralized processor

$ 1,000

2

$ 2,000

Telephone instruments

$ 100

30

$ 300

Public exchange line

$ 1,800

1

$ 1,800

Switchboard

$ 500

1

$ 500

Total

$ 4,600

KTs

Per Cost

Quantity

Total Cost

Public exchange line

$ 1,800

30

$ 54,000

Telephone instruments

$ 500

30

$15,000

Total

$ 69,000

The cost of operating the system

30 users System

System & Installation (PBX)

$ 4,600

System & Installation (KTS)

$ 69,000

Monthly Costs

Per month

Per Year

Telephone Lines (PBX)

$ 60

$ 6,200

Telephone Lines (KTS)

$ 600

$ 27,200

Recommendation -PBX use Centralized processor, Telephone instruments, Public exchange line and Switchboard. And then it can connect all telephone instruments with one exchange line by using centralized processor. And PBX also use to connect with many extensions by using switchboard and central processor. So it is lower cost than KTS. KTS has no security because it can hear if someone talking. If you don't want to hear you need to connect 30 telephone exchange lines for 30 users. The cost of main equipment that would be installed in PBX is $ 4,600 and the cost of main equipment that would be installed in KTS is $ 69,000. So, PBX is lower cost than KTS. And PBX is more reliable than KTS. The cost of operating system in PBX is more costly than KTS. But normal monthly costs or per month or per year costs of PBX is lower than KTS because the cost of operating system in PBX is $ 60 per month and $ 6,200 per year but the cost of operating system in KTS is $ 600 per month and $ 27,200 per year. These all are for 30 users. If 50 users used it will more costly. For the above reasons, the telephone system for a hotel of BusExpress is "PBX". PBX is more suitable and it is more reliable and more security than KTS.

Task 2

Task 2

Task 2

The wireless network equipment available in your country for single-site organization such as the hotel and there is a need to connect to printers in the Communications Suite.

The main equipment that would be installed.

WIFI / WLAN

A WLAN requires two main equipments. They are AP - wireless access point and WA - wireless adapter.

Access Points

Wireless Adapters

The features available with each system.

In Wi-Fi or WLAN describe wireless networking products and services.

In ADSL is one of the ADSL is one of the number of technologies that enables higher bandwidth over standard copper telephone lines.

ADSL can achieve data rates of 640 kbps in the uplink and 9 Mbps in the downlink direction, with a range of 6 km from the phone exchange.

The cost of equipment and installation.

Equipment

Cost

Minimum

Medium

Maximum

Access Point

$ 5,000

$ 7,000

$ 9,000

Wireless Access point

$ 3,000

$ 5,000

$ 6,000

The cost of operating the system.

30 users System

System & Installation

$ 650,000

Monthly Costs

Per month

Per Year

Maintenance

$ 600

$ 7,500

Total annual costs

Per month

Per Year

First Year

$ 73,600

Subsequent Years

$ 930

$ 11,100

Issues relating to signal strength.

"In most environments today, you will see ISDN in one of two roles: as a backup link for a router in case the router's primary link (usually Frame Relay) goes down, or as a data communications link for the home/office user who cannot get cable or asymmetric digital subscriber line (ADSL) services.

The 826 model is an ISDN router very similar to the 802 model, but with the addition of features for slightly larger offices (such as small branches), including a faster processor and QoS support. The 827 model is nearly identical to the 826, except instead of ISDN, it includes an ADSL port. Finally, the 827-4V model includes all of the features of the standard 827, but adds four POTS telephone ports and corresponding PBX and voice features to allow Voice over IP (VoIP) for up to four simultaneous connections through a single DSL line."

Issues relating to bandwidth.

802.11 - the original wireless LAN specification that incorporates 1 or 2 Mbps data rates using FHSS or DSS signaling techniques in the 2.4 GHz frequency range.

802.11a - upgraded 802.11 specification that provides 54 Mbps data rates in the 5 GHz frequency range.

802.11g - a newly completed wireless specification that delivers theoretical data transfer rates of 54 Mbps in the 2.4 GHz band.

802.11x - a group of pending 802.11 WLAN updates being developed to support the general 802.11 specification. They include Quality of Service (802.11e), Access Point Interoperability (802.11f), Interference (802.11h) and Security (802.11i).

802.11n - the full standard is expected in 2009 and will provide data rates of 600 Mbps utilizing multiple input, multiple output (MIMO) transmission technology, with planned networks utilizing both the 2.4 GHz and 5 GHz bands.

Recommendation - the Wireless LANs (WLANs) or Wireless Fidelity (WiFi) systems is the most popular wireless connectivity. Wi-Fi with IEEE 802.11 range of wireless networking standards is suitable for this BusExpress Hotel.

Task 3

Task 3

Task 3

The requirement that free Wi-Fi access is only for customer paying for accommodation and / or conference facilities.

The requirement that free Wi-Fi access is only for customer paying for accommodation and / or conference facilities. It can give user name and password for each customer to use free Wi-Fi. And it can also define IP address for each customer or each computer to use free Wi-Fi.

The need for access to expire once the customer no longer has conference facilities or accommodation.

The need for access to expire once the customer no longer has conference facilities or accommodation. One is defined by 10 hours per use for each customer in a day. If 10 hours passed in a day, customers cannot use that Wi-Fi to access. And the second is defined by according to the customer's request. If customers request for 1 hours, we can log automatically when the limited hours is finished.

Controlling access to print facilities.

Controlling access to print facilities is that if customer wants to print their files or programs or etc, they must request to server or reception of the BusExpress hotel. So, staff in the BusExpress hotel will request the file or program of the customer wants to print. When the customer gives their file or program, staff will printed their required file or programs.

Recommendation

There are two kinds of wireless network types. They are the following:

Infrastructure

Ad-Hoc

From my point of view must mention the following:

Before carry out any kind of installation, make sure you have the latest information and drivers from the hardware vendor.

each computer should be on the same floor

the distance between each computer should be below 100 meters

Using the same vendor for the network card and access point will have its advantages and disadvantages (compare and contrast the options available to you when it comes to purchasing the hardware).

Task 4

Task 4

Access to e-mail

Rules on E-mail Usage

E- Mail is a business communication tool. Users are obliged to use this tool in a responsible, effective and lawful manner.

We must not send or forward emails containing offensive, defamatory, remark obscene or racist, and not send or forward chain mail, and not forward a message or copy a message or attachment belonging to another user without acquiring permission from the originator first, and not forge or attempt to forge email messages, or disguise or attempt to disguise your identity if sending email, and finally not knowingly send or forward attachment that contains virus.

We can protect that virus by using firewall

We can protect that virus by using other antivirus software such as Avira Antivir or Kaspersky antivirus software or Norton antivirus software or etc.

If we use other antivirus software, we should normally update. If not, this antivirus software cannot actually protect from the dangerous of virus.

Using the wireless network for the transmission of sensitive business information

Wireless network is a way of link all the computers at together and let them share the internet connection without need to trail wires all over the place. Wireless Networking is known as "Wi-Fi" networks.

It has security, set a password protect for the wireless network that only the computers on network know. The stops other computers from connect to the network and get access. There are two types of security for wireless networks. They are "Wi-Fi Protected Access (WPA)" and "Wired Equipment Privacy (WEP)".

Recommendation

We would recommend that you choose wireless equipment that can use WPA. The great thing about most wireless routers is that they come with a built in firewall that adds an extra layer of protection to all your computers. We wouldn't suggest you remove firewall software from your computers. This extra level of security is always worth having. If you don't password protect your network you may find that people with computers close to your house can connect to your broadband connection wirelessly. This can lead to you paying for bandwidth that they use, or even to the more serious issue of them downloading illegal content that could be associated with your connection! All this is easily solved by simply implementing the security we described.

Task 5

Task 5

Task 1

This hotel is a new hotel in a small city that aims primarily to provide accommodation for business travelers. This hotel will provide accommodation for up t 50 paying guests and also have conference rooms, one holding up to 30 people the other up to 15 people.

The main equipment that would be installed.

There are two system of telephone that would be installed in this BusExpress hotel are Private Branch Exchanges (PBXs) and Key Telephone System (KTS).

The main equipment that would be installed in PBXs

Centralized processor

Telephone instruments

Public exchange line

Switchboard

The main equipment that would be installed in KTs

Public exchange line

Telephone instruments

The features available with each system.

KTS and PBX system features are to allow extension users to dial other extensions. And it is dial the external lines. It is to transfer a call to another extension. And it is receives the external calls. It is also to make an enquiry call to another extension.

KTS and PBX advanced user features are Call barring, using call baring it is possible to limit the destinations to which calls may be dialed directly from an individual extension line. The usual limitations are that it cans local calls only and it is also local calls plus national and local plus national plus international.

Another function is Hunt groups- One number selects a group of lines. This is where a group of extension lines can be accessed through a special hunt group number. So, instead of having to dial again if the first extension tried is busy, the system will automatically hunt over all extension lines and select the first free one.

Another function is Pick-up group is a feature used in telephone system that allows one to answer someone else's telephone call within the same pick-up group by dialing a special code. It is possible to answer the calls of any extension by dialing a code, followed by the number of the ringing extension.

Automatic Call Back is an extension user receives either no reply, or busy, when calling other extensions, or one other extension within the company, the user can book a call to that extension. After booking the call, the caller replaces the receiver and when the required extension becomes free, or the user make a call upon returning to the office, the system automatically calls the original caller back.

Another function is Last Number Re-Dial is similar to saved number dialed, but it only applies to the last number dialed.

Another modern Key Telephone feature is Conference call- is a telephone call in which the calling party whishes to have more than one extension and an outside caller. The procedure can be repeated until a maximum of six parties are connected. This feature should be placed in each department reception within the hospital.

A call transfer is a feature that enables a user to relocate an existing call to another telephone by using the transfer button and dialing the required location. The above features are possible and reasonable to install in the hotel telephone system.

The cost of equipment and installation

Equipment

Cost

PBXs

Cost

Quantity

Total Cost

Centralized processor

$ 1,000

2

$ 2,000

Telephone instruments

$ 100

30

$ 300

Public exchange line

$ 1,800

1

$ 1,800

Switchboard

$ 500

1

$ 500

Total

$ 4,600

KTs

Per Cost

Quantity

Total Cost

Public exchange line

$ 1,800

30

$ 54,000

Telephone instruments

$ 500

30

$15,000

Total

$ 69,000

The cost of operating the system

30 users System

System & Installation (PBX)

$ 4,600

System & Installation (KTS)

$ 69,000

Monthly Costs

Per month

Per Year

Telephone Lines (PBX)

$ 60

$ 6,200

Telephone Lines (KTS)

$ 600

$ 27,200

Recommendation -PBX use Centralized processor, Telephone instruments, Public exchange line and Switchboard. And then it can connect all telephone instruments with one exchange line by using centralized processor. And PBX also use to connect with many extensions by using switchboard and central processor. So it is lower cost than KTS. KTS has no security because it can hear if someone talking. If you don't want to hear you need to connect 30 telephone exchange lines for 30 users. The cost of main equipment that would be installed in PBX is $ 4,600 and the cost of main equipment that would be installed in KTS is $ 69,000. So, PBX is lower cost than KTS. And PBX is more reliable than KTS. The cost of operating system in PBX is more costly than KTS. But normal monthly costs or per month or per year costs of PBX is lower than KTS because the cost of operating system in PBX is $ 60 per month and $ 6,200 per year but the cost of operating system in KTS is $ 600 per month and $ 27,200 per year. These all are for 30 users. If 50 users used it will more costly. For the above reasons, the telephone system for a hotel of BusExpress is "PBX". PBX is more suitable and it is more reliable and more security than KTS.

Task 2

The wireless network equipment available in your country for single-site organization such as the hotel and there is a need to connect to printers in the Communications Suite.

The main equipment that would be installed.

WIFI / WLAN

A WLAN requires two main equipments. They are AP - wireless access point and WA - wireless adapter.

Access Points

Wireless Adapters

The features available with each system.

In Wi-Fi or WLAN describe wireless networking products and services.

In ADSL is one of the ADSL is one of the number of technologies that enables higher bandwidth over standard copper telephone lines.

ADSL can achieve data rates of 640 kbps in the uplink and 9 Mbps in the downlink direction, with a range of 6 km from the phone exchange.

The cost of equipment and installation.

Equipment

Cost

Minimum

Medium

Maximum

Access Point

$ 5,000

$ 7,000

$ 9,000

Wireless Access point

$ 3,000

$ 5,000

$ 6,000

The cost of operating the system.

30 users System

System & Installation

$ 650,000

Monthly Costs

Per month

Per Year

Maintenance

$ 600

$ 7,500

Total annual costs

Per month

Per Year

First Year

$ 73,600

Subsequent Years

$ 930

$ 11,100

Issues relating to bandwidth.

802.11 - the original wireless LAN specification that incorporates 1 or 2 Mbps data rates using FHSS or DSS signaling techniques in the 2.4 GHz frequency range.

802.11a - upgraded 802.11 specification that provides 54 Mbps data rates in the 5 GHz frequency range.

802.11g - a newly completed wireless specification that delivers theoretical data transfer rates of 54 Mbps in the 2.4 GHz band.

802.11x - a group of pending 802.11 WLAN updates being developed to support the general 802.11 specification. They include Quality of Service (802.11e), Access Point Interoperability (802.11f), Interference (802.11h) and Security (802.11i).

802.11n - the full standard is expected in 2009 and will provide data rates of 600 Mbps utilizing multiple input, multiple output (MIMO) transmission technology, with planned networks utilizing both the 2.4 GHz and 5 GHz bands.

Recommendation - the Wireless LANs (WLANs) or Wireless Fidelity (WiFi) systems is the most popular wireless connectivity. Wi-Fi with IEEE 802.11 range of wireless networking standards is suitable for this BusExpress Hotel.

Task 3

The requirement that free Wi-Fi access is only for customer paying for accommodation and / or conference facilities.

The requirement that free Wi-Fi access is only for customer paying for accommodation and / or conference facilities. It can give user name and password for each customer to use free Wi-Fi. And it can also define IP address for each customer or each computer to use free Wi-Fi.

The need for access to expire once the customer no longer has conference facilities or accommodation.

The need for access to expire once the customer no longer has conference facilities or accommodation. One is defined by 10 hours per use for each customer in a day. If 10 hours passed in a day, customers cannot use that Wi-Fi to access. And the second is defined by according to the customer's request. If customers request for 1 hours, we can log automatically when the limited hours is finished.

Controlling access to print facilities.

Controlling access to print facilities is that if customer wants to print their files or programs or etc, they must request to server or reception of the BusExpress hotel. So, staff in the BusExpress hotel will request the file or program of the customer wants to print. When the customer gives their file or program, staff will printed their required file or programs.

Recommendation

There are two types of wireless network types. They are the following:

Infrastructure - "Also referred to as a "hosted" or "managed" wireless network - it consists of one or more access points (know as gateways or wireless routers) being connected to an existed network. This will allow wireless devices to make use of resources on the network such as printers and the Internet."

Ad-Hoc - "Also referred to as an "unmanaged" or "peer to peer" wireless network - it consists of each device connecting directly to each other. This will allow someone sitting outside in the garden with a laptop to communicate with his desktop computer in the house and access the Internet, for example."

From my point of view you must mention the following:

Before carry out any kind of installation, make sure you have the latest information and drivers from the hardware vendor.

each computer should be on the same floor

the distance between each computer should be below 100 meters

Using the same vendor for the network card and access point will have its advantages and disadvantages (compare and contrast the options available to you when it comes to purchasing the hardware).

Having said this, it is possible for these conditions to be stretched and the network still to work well, but this depends on the environment and is different for each situation.

For this type of installation I will assume that is already have a wired network set up and that the wireless network will be implemented so that wireless devices such as laptop can join the existing network.

Firstly, plug the access point in the power outlet and existing Ethernet jack on the network. And then configure the AP - access point to been seen by the existing network - `this will differ depending on the brand of the access point`. And then configure the customer computers with the appropriate network settings that required being able to communicate with the access point.

Task 4

Access to e-mail

E- Mail is a business communication tool. Users are obliged to use this tool in a responsible, effective and lawful manner.

We must not send or forward emails containing offensive, defamatory, remark obscene or racist, and not send or forward chain mail, and not forward a message or copy a message or attachment belonging to another user without acquiring permission from the originator first, and not forge or attempt to forge email messages, or disguise or attempt to disguise your identity if sending email, and finally not knowingly send or forward attachment that contains virus.

We can protect that virus by using firewall

We can protect that virus by using other antivirus software such as Avira Antivir or Kaspersky antivirus software or Norton antivirus software or etc.

If we use other antivirus software, we should normally update. If not, this antivirus software cannot actually protect from the dangerous of virus.

Using the wireless network for the transmission of sensitive business information

Wireless network is a way of link all the computers at together and let them share the internet connection without need to trail wires all over the place. Wireless Networking is known as "Wi-Fi" networks.

It has security, set a password protect for the wireless network that only the computers on network know. The stops other computers from connect to the network and get access. There are two types of security for wireless networks. They are "Wi-Fi Protected Access (WPA)" and "Wired Equipment Privacy (WEP)".

Reference;