Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Mobile Access for a large Holiday Resort Complex

1. The Scenario

You have been asked to make a feasibility study and an initial design to enable the large Holiday Resort Complex located on the small island in the Indian Ocean to use mobile technologies to improve resort’s effectiveness and provide electronic services for the guests.
Island and resort are exclusively owned by a shipping company - Island Cruise. Each Saturday the Island Cruise ship – Odysseus – calls at an island bringing guests to stay at a resort and weekly supplies from the mainland.

Complex consists of the storehouse to provide the complex and an administrative building – both of which are sited some distance from the main complex.  The main complex consists of three bars, two swimming pools, two restaurants, a small gymnasium, a health and beauty centre and small shop catering for the guests. Guests are accommodated in three hundred and fifty detached chalets dispersed over the island.

The resort’s management have recognized various key areas where they will like to see benefits from the proposed system.

• Baggage processing of guest’s luggage (ship/chalet - chalet/ship).

• Check in times (at present large numbers of guests disembark at the same time, causing long delays at check in to the resort).

• Automated tally system of guest’s consumables such as drinks, meals, snacks etc. (at present guests sign for their consumables using a paper chit system).

There are four categories of user: -

• Resort guests

• Resort managers – like  staffing, facilities, entrainment, resources etc.

• Resort staff – like the staff required to cater for the guests needs such as bar staff, chefs, waiters, porters, chamber maids etc

• Administrative staff that look after accounts, stock, billing etc.

All categories of user should be able to access email and Internet services.

Suitable levels of security should be provided.

2. Coursework stages

Stage 1 Cost-Benefits Analysis

• Identify the several costs associated with deployment, operation and maintenance of a mobile-access system.

• Identify benefits to a variety of categories of user, arising from the addition of a mobile-access facility.

Stage 2 Technical Requirements

• Identify technical requirements of the system. This must relate to the usage requirements of the various types of user, and number of users in each category.

For ex, what is the total bandwidth requirement? What level of security is needed? How many concurrent users required to be expected? What proportion of the complex needs coverage? etc.

• Discuss any conflicts which arise between the several technical requirements.

Stage 3 Design

• Produce a cellular design map showing geographical aspects of the cellular network, including cell size, cell overlap and coverage.

• Produce a topological design, showing how the wireless part of the network would be integrated into the wired backbone network.

Stage 4 Devices

• What devices would be needed to construct the network?

• What devices would users connect to the network?

• What are the technical capabilities and limitations of users’ devices, and how do these issues affect the design requirements?

Note. You are not expected to actually implement the system.

Stage 5 Critical Evaluation

You must summarise the outcome of your coursework, concentrating on:

• Conclusions which can be drawn from the work you have performed.

• A critical evaluation of the design process and the final design, like discussion about the design and development processes and how the product and process quality were ensured at each stage. Make clear what you will do differently if you were to repeat thecoursework again.

• A reflection of your learning experience. You must be specific and not just say ‘I learned a lot about this or that …’ but say exactly what you did learn. Include other points such as time management issues and technical issues. .

3. Deliverables

The focus of this exercise should be on the specific issues arising from the provision of mobile access, including communications systems hardware and software requirements.

Cost/Benefits Analysis

Technical Requirements

Design

Devices

Critical Evaluation

Your report should be structured as follows:

• You must include the whole of this coursework specification

• Title page

• Contents page

• List of illustrations or diagrams

• Abstract

• A statement of assumptions

• Body of report.

• Appendices (Including program code)

• Reference List, Citations and Additional References (Harvard System)

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91518

Have any Question? 


Related Questions in Computer Network & Security

Provide at least three methods or tools used to attack web

Provide at least three methods or tools used to attack web servers as well as provide how each of these three methods can be protected against. Directions: Your completed assignment should be at least 2 FULL double-space ...

Assignment overviewpurpose of the assessmentthe purpose of

Assignment Overview Purpose of the assessment: The purpose of this assignment is to develop skills to identify appropriate network security tools for various operating systems. Students will also have opportunity to expl ...

We consider the alphabet a 01234 and the space of messages

We consider the alphabet A= {0,1,2,3,4} and the space of messages consists of all 1-symbol words, so it is M ={0,1,2,3,4}. The encryption is done using the shift cipher, so it is given by the equation X = x+k (mod 5) app ...

Your report should detail the following section and points

Your report should detail the following section and points below commensurate with the marks allocated and be addressed primarily to the management of CCA Pty Ltd who are not security or IT experts. Some issues may requi ...

The project requires a significant amount of work on

The project requires a significant amount of work on research, design and implementation. It is advised that you should start the project as soon as possible. A Simple File Transfer Protocol Design and implement a simple ...

Questionin this module we have a couple of learning

Question: In this module we have a couple of learning objectives. We want to understand better the role of the IT manager in the strategic management process as well as the skills needed to manage expectations for IT str ...

You need to paraphrase the filesnbsp1 You need to paraphrase the files.  1. Introduction

You need to paraphrase the files.  1. Introduction Organizations can utilize internet as well as intranet framework for providing an information network. Educational institutions may use internet in order to share inform ...

Assignmentinstructionsutilizing your comprehensive security

Assignment: Instructions: Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization. Upload the assignment in Micros ...

Assignment xyz company troubleshooting and maintenance

Assignment: XYZ Company Troubleshooting and Maintenance Plan In XYZ Company is heavily invested in e-Commerce with all retail locations' Point of Sale systems connected so that it maintains a dynamic inventory and automa ...

I encourage you to use latex but even if you dont please

I encourage you to use Latex, but even if you don't, please type your answers or hand write nicely. Explain your argument in a brief and precise way. 1. In a symmetric cryptosystem, Alice and Bob both know the e-key and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate