You are on page 1of 11

BAHRIA UNIVERSITY

KARACHI CAMPUS

COURSE: CEN-222 DATA COMMUNICATION AND


NETWORKING
TERM: FALL 2021-22, CLASS: BCE- 5A

FINAL REPORT

PROJECT TITLE
HOTEL NETWORK
Submitted By:

WANIA TARIQ (02-132192-012)


RABISHA NASIM (02-132192-029)
ZOYA AAMIR (02-132192-024)

Submitted To:
Dr. Shoaib Mughal / Engr. Zohaib Rehman
Table of Contents

Introduction 3
Theory Discussion 4

Methodology 5

Software used 6

Network Diagram 7

Limitations 8

Final Results 9

Practical Applications 10
References 11

2
INTRODUCTION

It is critical for every computing system that renders support to a number of processes that there
must exist a mechanism to allocate resources of the concerned processes along with the policies
that govern access on the basis of the rights provided to one of the processes when discussing the
resource allocation. Therefore, it is overtly evident that in a conventional timesharing operating
system.

The wireless technology has ostensibly grasped the attention of the market and now Wireless LANs
can be seen everywhere whether at the office, at home, in the hotel, in the coffee shop or at the
airport. The hotel networking system will help us to connect multiple devices on a single IP.

3
THEORY DISCUSSION

A local area network (LAN) is a computer network that interconnects computers within a limited
area such as a residence, school, laboratory, university campus or office building.[1] By contrast,
a wide area network (WAN) not only covers a larger geographic distance, but also generally
involves leased telecommunication circuits.

Ethernet and Wi-Fi are the two most common technologies in use for local area networks.
Historical network technologies include ARCNET, Token Ring, and AppleTalkSub-net, Subnet
Masks and IP configuration concepts are used in this project.

4
METHODOLOGY
The network consist of 6 LAN networks namely, office areas, security and a server room area.
They are further connected with switches which are expanded all over the organization to
provide a stable connection to the users. Wireless device and guest phone are also attached
to a specific switch. The switches are then connected to the PCs or laptops. 3 router are used
to connect all the network into one.

A hotel management server must have separate setup for the use of hotel management staff which
should not be accessible by the guests. There should be secured wireless access in the lobby and
rooms. Each LAN consist of a number of devices that have assigned IP addresses.

For the separate network setting, a VLAN based infrastructure is proposed to segregate the guest
and management networks. The guests must be disallowed to have the accessibility of Hotel
management application server through the configuration of An Access control lists.

Wireless network traffic flows through the air interface which is in an open medium which is
overtly considered insecure. Therefore, the network administrator must be aware of the types of
security related threats and must opt for some of the solutions available to mitigate those risks.

5
SOFTWARE USED
Cisco Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that
allows users to create network topologies and imitate modern computer networks. The
software allows users to simulate the configuration of Cisco routers and switches using a
simulated command line interface. Packet Tracer makes use of a drag and drop user interface,
allowing users to add and remove simulated network devices as they see fit. The software is
mainly focused towards Certified Cisco Network Associate Academy students as an
educational tool for helping them learn fundamental CCNA concepts.

6
NETWORK DIAGRAM

7
LIMITATIONS OF THE PROJECT

The limitations of this network are as follows:


 Cannot be used over wide area network
 Limited sub-netting
 Limited IP configuration.

8
FINAL RESULTS
This network will allow multiple users to connect their devices using a hotel internet. Tan efficient and
convenient way to handle a large number of devices to connect them through a single IP address.
VLAN that is a secure application-based system which can be used to protect a specific service
through unauthorized attempts to obtain the right to use without making the considerable
modifications to the hosts and merely necessary adjustments to the presently implemented
standard components of a LAN.

9
PRACTICAL APPLICATIONS

This network simulates the actual Local Area Network (LAN) to be used inside the hotel. The
following applications are as follows:

 Offers an effective, interactive environment.


 Provides secure and private domains.
 Help to manage a large number of devices through a single network.

1
0
REFERENCES

[1] https://www.youtube.com/watch?v=mRyVd0lM5E4
[2] https://www.uniassignment.com/essay-samples/information-technology/design-project-for-a-5-
star-hotel-information-technology-essay.php

1
1

You might also like