This document describes the implementation of a hotel network scenario using Cisco Packet Tracer. It includes:
1) The basic architecture of the hotel network including routers, switches, wireless routers, IP phones, and computers across multiple floors.
2) The requirements for the network including hardware, software, interfaces, and the topology of each floor with assigned IP addresses.
3) The configuration of network devices like routers, switches, and IP phones to set up the hotel network in Cisco Packet Tracer.
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
Network Traffic Management also allows for the identification of network-intensive operations that can be incorporated into network planning and growth strategies. Network Traffic Management is used alongside other optimisation techniques like Application Traffic Management as part of an overall Application Delivery Network solution.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
RANDOM ACCESS PROTOCOL IN COMMUNICATION AMOGHA A K
Â
In random access ,each station has right to send the data. However , if more than one station tries to send ,collision will occur .To avoid this collision , protocols came into existence.
In random access method , no stations are superior & none is assigned the control over the other .
When a station has a data to send , it uses a procedure defined by a protocol whether to send or not .
According to a new Gartner report1, “Around 10% of enterprise-generated data is created and processed outside a traditional centralized data center or cloud. By 2022, Gartner predicts this
figure will reach 75%”. In addition to hosting new 5G era services, the other major network operator driver for edge compute and edge clouds is deploying virtualized network infrastructure, replacing many dedicated hardware-based elements with virtual network functions (VNFs) running on general purpose edge compute. Even portions of access networks are being virtualized, and many of these functions need to be deployed close to end users. The combination of these infrastructure and applications drivers is a major reason that so much of 5G era network transformation resolves around edge cloud distribution.
Experimental Based Learning and Modeling of Computer Networksijtsrd
Â
Computer network experts are in great demand these days. This study aims to examine the effectiveness of using Cisco Packet Tracer as a simulation tool. This development reflected significant importance for higher education institutions. It ensures that all students have ample networking assistances. The computer network needs consideration of theory and practice. Hence, Cisco packet tracer software is recommended to solve this difficulty. In this paper, design and simulation of a computer network with Cisco network packet tracer simulation software is illustrated. This software would normally not work deprived of a variety of configurations. So, essential steps and configurations of software are explained in this paper which is useful in network design. Extensive simulation results validate this model. Prof. Jayesh Rane | Prof. Sarang Kulkarni "Experimental Based Learning and Modeling of Computer Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30595.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30595/experimental-based-learning-and-modeling-of-computer-networks/prof-jayesh-rane
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
Network Traffic Management also allows for the identification of network-intensive operations that can be incorporated into network planning and growth strategies. Network Traffic Management is used alongside other optimisation techniques like Application Traffic Management as part of an overall Application Delivery Network solution.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
RANDOM ACCESS PROTOCOL IN COMMUNICATION AMOGHA A K
Â
In random access ,each station has right to send the data. However , if more than one station tries to send ,collision will occur .To avoid this collision , protocols came into existence.
In random access method , no stations are superior & none is assigned the control over the other .
When a station has a data to send , it uses a procedure defined by a protocol whether to send or not .
According to a new Gartner report1, “Around 10% of enterprise-generated data is created and processed outside a traditional centralized data center or cloud. By 2022, Gartner predicts this
figure will reach 75%”. In addition to hosting new 5G era services, the other major network operator driver for edge compute and edge clouds is deploying virtualized network infrastructure, replacing many dedicated hardware-based elements with virtual network functions (VNFs) running on general purpose edge compute. Even portions of access networks are being virtualized, and many of these functions need to be deployed close to end users. The combination of these infrastructure and applications drivers is a major reason that so much of 5G era network transformation resolves around edge cloud distribution.
Experimental Based Learning and Modeling of Computer Networksijtsrd
Â
Computer network experts are in great demand these days. This study aims to examine the effectiveness of using Cisco Packet Tracer as a simulation tool. This development reflected significant importance for higher education institutions. It ensures that all students have ample networking assistances. The computer network needs consideration of theory and practice. Hence, Cisco packet tracer software is recommended to solve this difficulty. In this paper, design and simulation of a computer network with Cisco network packet tracer simulation software is illustrated. This software would normally not work deprived of a variety of configurations. So, essential steps and configurations of software are explained in this paper which is useful in network design. Extensive simulation results validate this model. Prof. Jayesh Rane | Prof. Sarang Kulkarni "Experimental Based Learning and Modeling of Computer Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30595.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30595/experimental-based-learning-and-modeling-of-computer-networks/prof-jayesh-rane
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
Â
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
Â
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.Â
Introduction
      Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.Â
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.Â
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
Micro Server Design - Open Compute ProjectHitesh Jani
Â
The Micro Server is a cluster of Low Power, High Density Servers which can be applied in growing workloads such as Distributed Computing, Cloud Computing, Internet of Things (IoT) and Big Data.
Design and implementation of intelligent community system based on thin clien...ijasuc
Â
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
The given case study describes about the current scenario of Mundrah. It is one of the popular retirement destinations in the West Australian region due to its coastal lifestyle. Being a favoured city in the region, the population stats have reported to be doubled in the past 15years. Due to this surge in population, a great strain has put on the current Council services and infrastructure of the city. The key buildings across the like Mandurah Head Office, Mandurah Aquatic and Recreation Centre, Mandurah Library, Falcon Library, Mandurah Museum, Mandurah Seniors and Community Centre, and Mandurah Waste Management Centre are not well structured when it comes to IT network implementation. Thus, as a network infrastructure consultant to the city, it is aimed to analyse the current network issues and provide optimal solutions that will make the entire network infrastructure well-connected, advance, and secured.
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
Â
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
The International Journal of Engineering and Science (The IJES)theijes
Â
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Similar to Hotel network scenario implementation by using cisco packet tracer (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Â
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Â
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Â
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Â
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Â
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Â
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview​
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
2. Table of Contents
Table of Figures: ..................................................................................................................................... 1
1. Introduction of Hotel Network Scenario (HNS)....................................................................................... 2
2. TECHNOLOGY TO BE USED.................................................................................................................... 3
3. BASICARCHITECTURE........................................................................................................................... 3
.................................................................................................................................................................. 3
4. WORKING OF HNS................................................................................................................................ 3
5. REQUIREMENTS................................................................................................................................... 4
5.1 User Interface:................................................................................................................................. 4
5.2 Interface Formats:............................................................................................................................ 5
5.3 System Interface: ............................................................................................................................. 5
5.4 Recommended H/w :........................................................................................................................ 5
5.5 Software Interfaces.......................................................................................................................... 5
5.6 Communication Interfaces................................................................................................................ 5
5.7 Ground Floor:................................................................................................................................... 6
5.8 Second Floor.................................................................................................................................... 7
5.9 3rd
Floor:.......................................................................................................................................... 8
5.10 Rooftop : ......................................................................................................................................... 9
6. IP DESCRIPTION OF HNS ..................................................................................................................... 10
7. PRODUCT FEATURES .......................................................................................................................... 12
8. SCOPE OF HNS (Hotel Network scenario)................................................................................................. 12
9. RESULTS OF HNS................................................................................................................................ 12
Table of Figures:
Figure 1: Basic Architecture......................................................................................................................... 3
Figure 2: Working ....................................................................................................................................... 4
Figure 3: Main project ................................................................................................................................. 4
Figure 4: Ground floor Topology.................................................................................................................. 6
Figure 5:Ground floor Legend...................................................................................................................... 7
Figure 6: Second floor topology ................................................................................................................... 7
Figure 7: Second floor Legend ..................................................................................................................... 8
Figure 8: 3rd
Floor Topology ........................................................................................................................ 9
Figure 9:3rd
Floor Legend ............................................................................................................................ 9
Figure 10:Rooftoop Topology ...................................................................................................................... 9
Figure 11:Rooftoop Legend ....................................................................................................................... 10
Figure 12: IP Address accessing for PC-0 ................................................................................................... 11
Figure 13: Configuration of a switch........................................................................................................... 11
Figure 14: Configuration of a router ........................................................................................................... 12
Figure 15: The complete diagram of Hotel Network Scenario created in Packet Tracer environment .............. 13
Figure 16Configration of rooftoop router .................................................................................................... 14
Figure 17:Configuration of Wireless Routers:.............................................................................................. 14
Figure 18:Configuration of IP Phones:........................................................................................................ 15
3. Hotel Network Scenario Implementation by
using Cisco Packet Tracer
Ahmad Talha1, Aqsa Fayyaz4, Hamza Fazal7, Awais Nadeem08(F)
BS (Computer Science)
Islamia University of Bahawalpur, sub-campus Bahawalnagar
Abstract: Computer network has become the most significant issue in our day-to-day life. Networking
companies depend on the proper functioning and analysis of their networks for Front Office Department
Housekeeping Department, Food and Beverage Service Department. Food Production or Kitchen
Department, Reception area etc. Mainly interfacing with the network is induced by one of the other
user/users to share some data with them. Therefore, this paper is about communication among users
present at remote sites, sharing this same network HNS. HNS stands for the Hotel Network Scenario.
Therefore, in this work the network is designed using Cisco Packet Tracer. The paper describes how the
tool can be used to develop a simulation model of the AAHA Hotel of Bahawalnagar. The study provides
into various concepts such as topology design, IP address configuration and how to send information in
the form of packets in a single network and the use of virtual Local Area Network (VLANs) to separate
the traffic generated by a different department.
Keyword: HNS, CCNA, CISCO, IP, ROUTER, LAN.
1. Introduction of Hotel Network Scenario (HNS)
Computer network borne out of the need to use personal computers for sharing information within an
organization in the form of messages, sharing files, resources and so forth. Whether the organization is
located in a small area like as in one building or spread over a large area, the need for networking the
computers cannot be over emphasized. A Hotel area network is an essential part of Hotel system. A Hotel
network has several uses such as, result publishing, resource sharing, file sharing, communication, etc.
The Hotel Area Network design is about designing a topology of a network that is a LAN (Local Area
Network) for a Hotel in which various computers of different departments and buildings are Setup so
that they can interact and communicate with each other by interchanging data. To design a network for
a Hotel, which connects various departments and buildings to each other’s, it puts forward
communication among them. One of the purpose of networking is to reduce isolated users. The systems
should be capable of communicating with others and should provide the desired information. A
simulation tool offers a way to predict the impact on the network of a hardware upgrade, a change in
topology. Therefore, in this dissertation, a HNS network is designed using Cisco Packet Tracer. Cisco
Packet Tracer (CPT) is multi- tasking network simulation software that can be used to perform and
analyze various network activities such as the implementation of different topologies, selection of
optimum path based on various routers, analysis of different network configurations. This Hotel Area
Network Scenario is about designing a topology of a network that is Local Area Network (LAN) for a
Hotel area in which different department has some computers in different buildings set up their network
so that they can interact and communicate with each other by interchanging data.
4. 2. TECHNOLOGY TO BE USED
CCNA: Cisco Systems develop Cisco Certified Network Associate .CCNA is a well-liked
certification in computer networking that. CCNA is discovered by the Cisco, to identify basic
capability in installation and maintenance of medium-sized networks.
The technology is used for connecting various devices like routers, switches and different end devices
to communicate with each other and interchanging data. To construct a methodical and reliable
network, is scalable too. Portability is one of the characteristics of this work application of the HNS.
3. BASIC ARCHITECTURE
Figure 1: Basic Architecture
The basic architecture of HNS generally make use of various types of computers, router, servers,
switches, LAN connections, personal PC’s and Laptops.
4. WORKING OF HNS
This Hotel Network Scenario is to provide a well-connected, secure, reliable, dependable
communication among different departments. Several departments can simply split the required data
without any problem and can exchange their data without going physically to them thus conserving time
and energy. This job with respect to the Hotel’s Networking Scenario is to provide a systematic, secure,
valid, dependable communication among different departments. The work is done keeping in mind the
complexity and cost factor.
5. Figure 2: Working
Major components and their communication
Figure 3: Main project
5. REQUIREMENTS
The following division talk about the requirements interconnected to the interfaces for using
communication by taking many data. These data combine client, software interfaces and other
hardware that privilege the system to take its loads
5.1 User Interface:
The requirements represent in this module describes the HNS interface. The requirements are picked
up to the main characteristics provided by the system. The necessities always maintain the activities
interconnected with the subheading characteristics.
6. 5.2 Interface Formats:
1. This screen is displayed the virtual topology designed for the university.
2. The network simulation, i.e. Cisco Packet Tracer (CPT) is simple, easy for
implementation and straightforward.
3. It cultivates visual graphical user interface.
4. It will display twelve switches, different VLANs and one router interconnected with each
other.
5. The Command Line Interface (CLI) use for configuration.
6. The CPT allows the user to run the project on run time mode or simulation.
7. When the administrator clicks on any device, then the graphical user interface is openfor
the particular device.
5.3 System Interface:
. In this HNS, giving data to end device, a Graphical User Interface is needed and appear a login form
to the authorized user. We can reset the password by the help of network administration. Whereas
unauthorized user prohibits accessing the network
5.4 Recommended H/w :
CPU: Intel Pentium III 1.0 GHz
Display resolution: 1024 x 768
Storage: 300 MB free disk space
RAM: > 512 MB
Run the module i.e. for a live project (a network), the hardware requirements are:
14 Switches (Cisco 2950 switch)
1 Router (Cisco 12811
router) IP Phones,
Wireless Router
Computer Systems
(Generic) 1 Computer
system for server Cross
over cable
Straight through cable
5.5Software Interfaces
The requirements required in the HNS are as follows:
Operating System: - Microsoft
Windows10 Adobe Flash Player.
Cisco Packet Tracer
5.6Communication Interfaces
ď‚· The execution of the system will be in the existing network.
7. ď‚· The system is mainly based on a client-server application where the server providing data to
access all the services.
5.7 Ground Floor:
1 router (2811) , 4 switches (2950-24), 2 wireless routers(WRT300N) ,2 pc,2 printer,3 ip phones,6
cctv cameras.
Figure 4: Ground floor Topology
8. Figure 5:Ground floor Legend
5.8 Second Floor
1 router,3 switches,2 wireless routers,3 CCTV,IP-phones.
Figure 6: Second floor topology
11. Figure 11:Rooftoop Legend
6. IP DESCRIPTION OF HNS
An IP address is a numerical tag assigned to each device (e.g., computer, printer, etc.) taking part in
a computer network that uses the Internet Protocol for any communication. It is a 32-bit number. One
is IPv4 and the other is IPv6. IPv4 is of 32 bit and is represented as X.X.X.X i.e. each octet is parted
by a dot. For e.g.: 191.157.2.2 .In this project IPv4 is used. The assignment of IP address is reliant
upon the number of hosts existing in the network.
Depending on the number of hosts present in the Hotel; for this network the IP to be used is a class B
IP addresses i.e.
172.16.0.0 with a subnet mask of 255.255.0.0. And this IP is then distributed among different LANs
and ports for communication.
Table 1: : ListofIP Address ofPCs and Switches
PC IP ADDRESS SWITCH IP ADDRESS
PC-0 192.168.1.8 SWITCH-0 192.168.1.1
PC-1 192.168.1.10 SWITCH-1 192.168.1.6
PC-2 192.168.1.15 SWITCH-2 192.168.1.3
PC-3 192.168.1.11 SWITCH-3 192.168.1.9
PC-4 192.168.2.15 SWITCH-4 192.168.2.2
PC-5 192.168.2.10 SWITCH-5 192.168.2.3
PC-6 192.168.2.9 SWITCH-6 192.168.2.4
12. PC-7 192.168.2.6 SWITCH-7 192.168.2.5
PC-8 192.168.1.7 SWITCH-8 192.168.1.20
PC-9 192.168.1.14 SWITCH-9 192.168.1.25
PC-10 192.1682.14 SWITCH-10 192.168.2.18
PC-11 192.168.2.7 SWITCH-11 192.168.2.28
PC-12 192.168.1.19 SWITCH-13 192.168.1.51
PC-13 192.168.1.18 SWITCH-14 192.168.1.50
PC-14 192.168.1.23
PC-15 192.168.1.22
Figure 12: IP Address accessing for PC-0
Command line interface (CLI) for Switch
Figure 13: Configuration of a switch
13. Command Line Interface (CLI)forRouter:
Figure 14: Configuration of a router
7. PRODUCT FEATURES
1. This network is based on client-server architecture.
2. Tree topology is used here.
3. 4 client routers are present for the four levels of Hotel and they are associated to a server.
4. All the departments are categorized into various LANs, which are connected to the 4 routers
based on the sequence in which they are accommodated on the stoery.
5. Likewise, various departments limited into LANs and share router corresponding to their levels.
6. A request is made by any system of any department and it is forwarded to client switch, which
furthermore transmits it to the router and then to server.
7. Port-securities are there that are executed on various ports of the switches and gives reliability.
8. The data is then transferred to its connected router.
9. Router serves as DHCP server for assigning IPs to the host computers and also generally
routes the data to the desired destination.
10. All appliances are under the reliability of their respective passwords known to the network
executive only.
11. User can change the password any time they want to.
8. SCOPE OF HNS (Hotel Network scenario)
This project is give us an efficient methodology connected among all computers that are used in a
respective Hotel. Apart from interconnection, the project economical is made the topology by
keeping in mind about the cost. The most important points is authentication and security to prevent
the unauthorized access.
9. RESULTS OF HNS
14. Figure 15: The complete diagram of Hotel Network Scenario created in Packet Tracer environment
16. Figure 18:Configuration of IP Phones:
10. CONCLUSION
To Design the network outlook for the community Hotel network scenario produces the substructure
for all other exposure in the service framework such as security of the network, wireless area network,
mobility as well as putting the justification to provide safety and security, operational efficiencies,
virtual environments, and secure rooms. This paper describes the network design scenario approved
by Cisco, as well as where we can apply these scenario within the various locations of a community
Hotel network. Finally, key network foundation services such as switching, routing, multicast, and
high availability are given for the full Hotel network scenario.