SlideShare a Scribd company logo
1/20/2020 Hotel Network
Scenario
Implementation
by using Cisco
Packet Tracer
Group 1:
AHMAD TALHA#1,AQSA FAYYAZ#04,HAMZA FAZAL#07,AWAIS NADEEM#08(F)
Table of Contents
Table of Figures: ..................................................................................................................................... 1
1. Introduction of Hotel Network Scenario (HNS)....................................................................................... 2
2. TECHNOLOGY TO BE USED.................................................................................................................... 3
3. BASICARCHITECTURE........................................................................................................................... 3
.................................................................................................................................................................. 3
4. WORKING OF HNS................................................................................................................................ 3
5. REQUIREMENTS................................................................................................................................... 4
5.1 User Interface:................................................................................................................................. 4
5.2 Interface Formats:............................................................................................................................ 5
5.3 System Interface: ............................................................................................................................. 5
5.4 Recommended H/w :........................................................................................................................ 5
5.5 Software Interfaces.......................................................................................................................... 5
5.6 Communication Interfaces................................................................................................................ 5
5.7 Ground Floor:................................................................................................................................... 6
5.8 Second Floor.................................................................................................................................... 7
5.9 3rd
Floor:.......................................................................................................................................... 8
5.10 Rooftop : ......................................................................................................................................... 9
6. IP DESCRIPTION OF HNS ..................................................................................................................... 10
7. PRODUCT FEATURES .......................................................................................................................... 12
8. SCOPE OF HNS (Hotel Network scenario)................................................................................................. 12
9. RESULTS OF HNS................................................................................................................................ 12
Table of Figures:
Figure 1: Basic Architecture......................................................................................................................... 3
Figure 2: Working ....................................................................................................................................... 4
Figure 3: Main project ................................................................................................................................. 4
Figure 4: Ground floor Topology.................................................................................................................. 6
Figure 5:Ground floor Legend...................................................................................................................... 7
Figure 6: Second floor topology ................................................................................................................... 7
Figure 7: Second floor Legend ..................................................................................................................... 8
Figure 8: 3rd
Floor Topology ........................................................................................................................ 9
Figure 9:3rd
Floor Legend ............................................................................................................................ 9
Figure 10:Rooftoop Topology ...................................................................................................................... 9
Figure 11:Rooftoop Legend ....................................................................................................................... 10
Figure 12: IP Address accessing for PC-0 ................................................................................................... 11
Figure 13: Configuration of a switch........................................................................................................... 11
Figure 14: Configuration of a router ........................................................................................................... 12
Figure 15: The complete diagram of Hotel Network Scenario created in Packet Tracer environment .............. 13
Figure 16Configration of rooftoop router .................................................................................................... 14
Figure 17:Configuration of Wireless Routers:.............................................................................................. 14
Figure 18:Configuration of IP Phones:........................................................................................................ 15
Hotel Network Scenario Implementation by
using Cisco Packet Tracer
Ahmad Talha1, Aqsa Fayyaz4, Hamza Fazal7, Awais Nadeem08(F)
BS (Computer Science)
Islamia University of Bahawalpur, sub-campus Bahawalnagar
Abstract: Computer network has become the most significant issue in our day-to-day life. Networking
companies depend on the proper functioning and analysis of their networks for Front Office Department
Housekeeping Department, Food and Beverage Service Department. Food Production or Kitchen
Department, Reception area etc. Mainly interfacing with the network is induced by one of the other
user/users to share some data with them. Therefore, this paper is about communication among users
present at remote sites, sharing this same network HNS. HNS stands for the Hotel Network Scenario.
Therefore, in this work the network is designed using Cisco Packet Tracer. The paper describes how the
tool can be used to develop a simulation model of the AAHA Hotel of Bahawalnagar. The study provides
into various concepts such as topology design, IP address configuration and how to send information in
the form of packets in a single network and the use of virtual Local Area Network (VLANs) to separate
the traffic generated by a different department.
Keyword: HNS, CCNA, CISCO, IP, ROUTER, LAN.
1. Introduction of Hotel Network Scenario (HNS)
Computer network borne out of the need to use personal computers for sharing information within an
organization in the form of messages, sharing files, resources and so forth. Whether the organization is
located in a small area like as in one building or spread over a large area, the need for networking the
computers cannot be over emphasized. A Hotel area network is an essential part of Hotel system. A Hotel
network has several uses such as, result publishing, resource sharing, file sharing, communication, etc.
The Hotel Area Network design is about designing a topology of a network that is a LAN (Local Area
Network) for a Hotel in which various computers of different departments and buildings are Setup so
that they can interact and communicate with each other by interchanging data. To design a network for
a Hotel, which connects various departments and buildings to each other’s, it puts forward
communication among them. One of the purpose of networking is to reduce isolated users. The systems
should be capable of communicating with others and should provide the desired information. A
simulation tool offers a way to predict the impact on the network of a hardware upgrade, a change in
topology. Therefore, in this dissertation, a HNS network is designed using Cisco Packet Tracer. Cisco
Packet Tracer (CPT) is multi- tasking network simulation software that can be used to perform and
analyze various network activities such as the implementation of different topologies, selection of
optimum path based on various routers, analysis of different network configurations. This Hotel Area
Network Scenario is about designing a topology of a network that is Local Area Network (LAN) for a
Hotel area in which different department has some computers in different buildings set up their network
so that they can interact and communicate with each other by interchanging data.
2. TECHNOLOGY TO BE USED
CCNA: Cisco Systems develop Cisco Certified Network Associate .CCNA is a well-liked
certification in computer networking that. CCNA is discovered by the Cisco, to identify basic
capability in installation and maintenance of medium-sized networks.
The technology is used for connecting various devices like routers, switches and different end devices
to communicate with each other and interchanging data. To construct a methodical and reliable
network, is scalable too. Portability is one of the characteristics of this work application of the HNS.
3. BASIC ARCHITECTURE
Figure 1: Basic Architecture
The basic architecture of HNS generally make use of various types of computers, router, servers,
switches, LAN connections, personal PC’s and Laptops.
4. WORKING OF HNS
This Hotel Network Scenario is to provide a well-connected, secure, reliable, dependable
communication among different departments. Several departments can simply split the required data
without any problem and can exchange their data without going physically to them thus conserving time
and energy. This job with respect to the Hotel’s Networking Scenario is to provide a systematic, secure,
valid, dependable communication among different departments. The work is done keeping in mind the
complexity and cost factor.
Figure 2: Working
Major components and their communication
Figure 3: Main project
5. REQUIREMENTS
The following division talk about the requirements interconnected to the interfaces for using
communication by taking many data. These data combine client, software interfaces and other
hardware that privilege the system to take its loads
5.1 User Interface:
The requirements represent in this module describes the HNS interface. The requirements are picked
up to the main characteristics provided by the system. The necessities always maintain the activities
interconnected with the subheading characteristics.
5.2 Interface Formats:
1. This screen is displayed the virtual topology designed for the university.
2. The network simulation, i.e. Cisco Packet Tracer (CPT) is simple, easy for
implementation and straightforward.
3. It cultivates visual graphical user interface.
4. It will display twelve switches, different VLANs and one router interconnected with each
other.
5. The Command Line Interface (CLI) use for configuration.
6. The CPT allows the user to run the project on run time mode or simulation.
7. When the administrator clicks on any device, then the graphical user interface is openfor
the particular device.
5.3 System Interface:
. In this HNS, giving data to end device, a Graphical User Interface is needed and appear a login form
to the authorized user. We can reset the password by the help of network administration. Whereas
unauthorized user prohibits accessing the network
5.4 Recommended H/w :
CPU: Intel Pentium III 1.0 GHz
Display resolution: 1024 x 768
Storage: 300 MB free disk space
RAM: > 512 MB
Run the module i.e. for a live project (a network), the hardware requirements are:
14 Switches (Cisco 2950 switch)
1 Router (Cisco 12811
router) IP Phones,
Wireless Router
Computer Systems
(Generic) 1 Computer
system for server Cross
over cable
Straight through cable
5.5Software Interfaces
The requirements required in the HNS are as follows:
Operating System: - Microsoft
Windows10 Adobe Flash Player.
Cisco Packet Tracer
5.6Communication Interfaces
ď‚· The execution of the system will be in the existing network.
ď‚· The system is mainly based on a client-server application where the server providing data to
access all the services.
5.7 Ground Floor:
1 router (2811) , 4 switches (2950-24), 2 wireless routers(WRT300N) ,2 pc,2 printer,3 ip phones,6
cctv cameras.
Figure 4: Ground floor Topology
Figure 5:Ground floor Legend
5.8 Second Floor
1 router,3 switches,2 wireless routers,3 CCTV,IP-phones.
Figure 6: Second floor topology
Figure 7: Second floor Legend
5.9 3rd Floor:
1 router,3 switches,2 wireless routers,3 CCTV,IP-phones.
Figure 8: 3rd Floor Topology
Figure 9:3rd Floor Legend
5.10 Rooftop :
1 router, 4 server,4 switch,2 IP phones ,1 wireless router,1pc, 1printer
Figure 10:Rooftoop Topology
Figure 11:Rooftoop Legend
6. IP DESCRIPTION OF HNS
An IP address is a numerical tag assigned to each device (e.g., computer, printer, etc.) taking part in
a computer network that uses the Internet Protocol for any communication. It is a 32-bit number. One
is IPv4 and the other is IPv6. IPv4 is of 32 bit and is represented as X.X.X.X i.e. each octet is parted
by a dot. For e.g.: 191.157.2.2 .In this project IPv4 is used. The assignment of IP address is reliant
upon the number of hosts existing in the network.
Depending on the number of hosts present in the Hotel; for this network the IP to be used is a class B
IP addresses i.e.
172.16.0.0 with a subnet mask of 255.255.0.0. And this IP is then distributed among different LANs
and ports for communication.
Table 1: : ListofIP Address ofPCs and Switches
PC IP ADDRESS SWITCH IP ADDRESS
PC-0 192.168.1.8 SWITCH-0 192.168.1.1
PC-1 192.168.1.10 SWITCH-1 192.168.1.6
PC-2 192.168.1.15 SWITCH-2 192.168.1.3
PC-3 192.168.1.11 SWITCH-3 192.168.1.9
PC-4 192.168.2.15 SWITCH-4 192.168.2.2
PC-5 192.168.2.10 SWITCH-5 192.168.2.3
PC-6 192.168.2.9 SWITCH-6 192.168.2.4
PC-7 192.168.2.6 SWITCH-7 192.168.2.5
PC-8 192.168.1.7 SWITCH-8 192.168.1.20
PC-9 192.168.1.14 SWITCH-9 192.168.1.25
PC-10 192.1682.14 SWITCH-10 192.168.2.18
PC-11 192.168.2.7 SWITCH-11 192.168.2.28
PC-12 192.168.1.19 SWITCH-13 192.168.1.51
PC-13 192.168.1.18 SWITCH-14 192.168.1.50
PC-14 192.168.1.23
PC-15 192.168.1.22
Figure 12: IP Address accessing for PC-0
Command line interface (CLI) for Switch
Figure 13: Configuration of a switch
Command Line Interface (CLI)forRouter:
Figure 14: Configuration of a router
7. PRODUCT FEATURES
1. This network is based on client-server architecture.
2. Tree topology is used here.
3. 4 client routers are present for the four levels of Hotel and they are associated to a server.
4. All the departments are categorized into various LANs, which are connected to the 4 routers
based on the sequence in which they are accommodated on the stoery.
5. Likewise, various departments limited into LANs and share router corresponding to their levels.
6. A request is made by any system of any department and it is forwarded to client switch, which
furthermore transmits it to the router and then to server.
7. Port-securities are there that are executed on various ports of the switches and gives reliability.
8. The data is then transferred to its connected router.
9. Router serves as DHCP server for assigning IPs to the host computers and also generally
routes the data to the desired destination.
10. All appliances are under the reliability of their respective passwords known to the network
executive only.
11. User can change the password any time they want to.
8. SCOPE OF HNS (Hotel Network scenario)
This project is give us an efficient methodology connected among all computers that are used in a
respective Hotel. Apart from interconnection, the project economical is made the topology by
keeping in mind about the cost. The most important points is authentication and security to prevent
the unauthorized access.
9. RESULTS OF HNS
Figure 15: The complete diagram of Hotel Network Scenario created in Packet Tracer environment
Figure 16Configration of rooftoop router
Figure 17:Configuration of Wireless Routers:
Figure 18:Configuration of IP Phones:
10. CONCLUSION
To Design the network outlook for the community Hotel network scenario produces the substructure
for all other exposure in the service framework such as security of the network, wireless area network,
mobility as well as putting the justification to provide safety and security, operational efficiencies,
virtual environments, and secure rooms. This paper describes the network design scenario approved
by Cisco, as well as where we can apply these scenario within the various locations of a community
Hotel network. Finally, key network foundation services such as switching, routing, multicast, and
high availability are given for the full Hotel network scenario.
Hotel network scenario implementation by using cisco packet tracer
Hotel network scenario implementation by using cisco packet tracer
Hotel network scenario implementation by using cisco packet tracer

More Related Content

What's hot

Ethernet
EthernetEthernet
Ethernet
sijil chacko
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Nitin16498
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
Vivek Kumar Sinha
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Analog and Digital Transmission
Analog and Digital TransmissionAnalog and Digital Transmission
Analog and Digital Transmission
Anushiya Ram
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
Basil John
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesManusha Dilan
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
Dhivya T
 
Basics of Network Traffic Management
Basics of Network Traffic ManagementBasics of Network Traffic Management
Basics of Network Traffic Management
Puneet Bawa
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
Anjan Mahanta
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
AMOGHA A K
 

What's hot (20)

Ethernet
EthernetEthernet
Ethernet
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Analog and Digital Transmission
Analog and Digital TransmissionAnalog and Digital Transmission
Analog and Digital Transmission
 
Subnetting
SubnettingSubnetting
Subnetting
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
Basics of Network Traffic Management
Basics of Network Traffic ManagementBasics of Network Traffic Management
Basics of Network Traffic Management
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
 

Similar to Hotel network scenario implementation by using cisco packet tracer

5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
DESMOND YUEN
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networks
ijtsrd
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
ijasuc
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
ijasuc
 
En35793797
En35793797En35793797
En35793797
IJERA Editor
 
FCN
FCNFCN
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
dohertyjoetta
 
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo
 
Micro Server Design - Open Compute Project
Micro Server Design - Open Compute ProjectMicro Server Design - Open Compute Project
Micro Server Design - Open Compute Project
Hitesh Jani
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
ijasuc
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium Enterprise
Thamalsha Wijayarathna
 
Computer network
Computer networkComputer network
Computer network
sana zaib
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
Mundrah case study
Mundrah case studyMundrah case study
Mundrah case study
Sanam khan
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
IJECEIAES
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
Hansa Edirisinghe
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
qhawengcongo
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
qhawengcongo
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 

Similar to Hotel network scenario implementation by using cisco packet tracer (20)

5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networks
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
En35793797
En35793797En35793797
En35793797
 
FCN
FCNFCN
FCN
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
 
Micro Server Design - Open Compute Project
Micro Server Design - Open Compute ProjectMicro Server Design - Open Compute Project
Micro Server Design - Open Compute Project
 
Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...Design and implementation of intelligent community system based on thin clien...
Design and implementation of intelligent community system based on thin clien...
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium Enterprise
 
Computer network
Computer networkComputer network
Computer network
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Mundrah case study
Mundrah case studyMundrah case study
Mundrah case study
 
Tiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of ComputingTiarrah Computing: The Next Generation of Computing
Tiarrah Computing: The Next Generation of Computing
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Hotel network scenario implementation by using cisco packet tracer

  • 1. 1/20/2020 Hotel Network Scenario Implementation by using Cisco Packet Tracer Group 1: AHMAD TALHA#1,AQSA FAYYAZ#04,HAMZA FAZAL#07,AWAIS NADEEM#08(F)
  • 2. Table of Contents Table of Figures: ..................................................................................................................................... 1 1. Introduction of Hotel Network Scenario (HNS)....................................................................................... 2 2. TECHNOLOGY TO BE USED.................................................................................................................... 3 3. BASICARCHITECTURE........................................................................................................................... 3 .................................................................................................................................................................. 3 4. WORKING OF HNS................................................................................................................................ 3 5. REQUIREMENTS................................................................................................................................... 4 5.1 User Interface:................................................................................................................................. 4 5.2 Interface Formats:............................................................................................................................ 5 5.3 System Interface: ............................................................................................................................. 5 5.4 Recommended H/w :........................................................................................................................ 5 5.5 Software Interfaces.......................................................................................................................... 5 5.6 Communication Interfaces................................................................................................................ 5 5.7 Ground Floor:................................................................................................................................... 6 5.8 Second Floor.................................................................................................................................... 7 5.9 3rd Floor:.......................................................................................................................................... 8 5.10 Rooftop : ......................................................................................................................................... 9 6. IP DESCRIPTION OF HNS ..................................................................................................................... 10 7. PRODUCT FEATURES .......................................................................................................................... 12 8. SCOPE OF HNS (Hotel Network scenario)................................................................................................. 12 9. RESULTS OF HNS................................................................................................................................ 12 Table of Figures: Figure 1: Basic Architecture......................................................................................................................... 3 Figure 2: Working ....................................................................................................................................... 4 Figure 3: Main project ................................................................................................................................. 4 Figure 4: Ground floor Topology.................................................................................................................. 6 Figure 5:Ground floor Legend...................................................................................................................... 7 Figure 6: Second floor topology ................................................................................................................... 7 Figure 7: Second floor Legend ..................................................................................................................... 8 Figure 8: 3rd Floor Topology ........................................................................................................................ 9 Figure 9:3rd Floor Legend ............................................................................................................................ 9 Figure 10:Rooftoop Topology ...................................................................................................................... 9 Figure 11:Rooftoop Legend ....................................................................................................................... 10 Figure 12: IP Address accessing for PC-0 ................................................................................................... 11 Figure 13: Configuration of a switch........................................................................................................... 11 Figure 14: Configuration of a router ........................................................................................................... 12 Figure 15: The complete diagram of Hotel Network Scenario created in Packet Tracer environment .............. 13 Figure 16Configration of rooftoop router .................................................................................................... 14 Figure 17:Configuration of Wireless Routers:.............................................................................................. 14 Figure 18:Configuration of IP Phones:........................................................................................................ 15
  • 3. Hotel Network Scenario Implementation by using Cisco Packet Tracer Ahmad Talha1, Aqsa Fayyaz4, Hamza Fazal7, Awais Nadeem08(F) BS (Computer Science) Islamia University of Bahawalpur, sub-campus Bahawalnagar Abstract: Computer network has become the most significant issue in our day-to-day life. Networking companies depend on the proper functioning and analysis of their networks for Front Office Department Housekeeping Department, Food and Beverage Service Department. Food Production or Kitchen Department, Reception area etc. Mainly interfacing with the network is induced by one of the other user/users to share some data with them. Therefore, this paper is about communication among users present at remote sites, sharing this same network HNS. HNS stands for the Hotel Network Scenario. Therefore, in this work the network is designed using Cisco Packet Tracer. The paper describes how the tool can be used to develop a simulation model of the AAHA Hotel of Bahawalnagar. The study provides into various concepts such as topology design, IP address configuration and how to send information in the form of packets in a single network and the use of virtual Local Area Network (VLANs) to separate the traffic generated by a different department. Keyword: HNS, CCNA, CISCO, IP, ROUTER, LAN. 1. Introduction of Hotel Network Scenario (HNS) Computer network borne out of the need to use personal computers for sharing information within an organization in the form of messages, sharing files, resources and so forth. Whether the organization is located in a small area like as in one building or spread over a large area, the need for networking the computers cannot be over emphasized. A Hotel area network is an essential part of Hotel system. A Hotel network has several uses such as, result publishing, resource sharing, file sharing, communication, etc. The Hotel Area Network design is about designing a topology of a network that is a LAN (Local Area Network) for a Hotel in which various computers of different departments and buildings are Setup so that they can interact and communicate with each other by interchanging data. To design a network for a Hotel, which connects various departments and buildings to each other’s, it puts forward communication among them. One of the purpose of networking is to reduce isolated users. The systems should be capable of communicating with others and should provide the desired information. A simulation tool offers a way to predict the impact on the network of a hardware upgrade, a change in topology. Therefore, in this dissertation, a HNS network is designed using Cisco Packet Tracer. Cisco Packet Tracer (CPT) is multi- tasking network simulation software that can be used to perform and analyze various network activities such as the implementation of different topologies, selection of optimum path based on various routers, analysis of different network configurations. This Hotel Area Network Scenario is about designing a topology of a network that is Local Area Network (LAN) for a Hotel area in which different department has some computers in different buildings set up their network so that they can interact and communicate with each other by interchanging data.
  • 4. 2. TECHNOLOGY TO BE USED CCNA: Cisco Systems develop Cisco Certified Network Associate .CCNA is a well-liked certification in computer networking that. CCNA is discovered by the Cisco, to identify basic capability in installation and maintenance of medium-sized networks. The technology is used for connecting various devices like routers, switches and different end devices to communicate with each other and interchanging data. To construct a methodical and reliable network, is scalable too. Portability is one of the characteristics of this work application of the HNS. 3. BASIC ARCHITECTURE Figure 1: Basic Architecture The basic architecture of HNS generally make use of various types of computers, router, servers, switches, LAN connections, personal PC’s and Laptops. 4. WORKING OF HNS This Hotel Network Scenario is to provide a well-connected, secure, reliable, dependable communication among different departments. Several departments can simply split the required data without any problem and can exchange their data without going physically to them thus conserving time and energy. This job with respect to the Hotel’s Networking Scenario is to provide a systematic, secure, valid, dependable communication among different departments. The work is done keeping in mind the complexity and cost factor.
  • 5. Figure 2: Working Major components and their communication Figure 3: Main project 5. REQUIREMENTS The following division talk about the requirements interconnected to the interfaces for using communication by taking many data. These data combine client, software interfaces and other hardware that privilege the system to take its loads 5.1 User Interface: The requirements represent in this module describes the HNS interface. The requirements are picked up to the main characteristics provided by the system. The necessities always maintain the activities interconnected with the subheading characteristics.
  • 6. 5.2 Interface Formats: 1. This screen is displayed the virtual topology designed for the university. 2. The network simulation, i.e. Cisco Packet Tracer (CPT) is simple, easy for implementation and straightforward. 3. It cultivates visual graphical user interface. 4. It will display twelve switches, different VLANs and one router interconnected with each other. 5. The Command Line Interface (CLI) use for configuration. 6. The CPT allows the user to run the project on run time mode or simulation. 7. When the administrator clicks on any device, then the graphical user interface is openfor the particular device. 5.3 System Interface: . In this HNS, giving data to end device, a Graphical User Interface is needed and appear a login form to the authorized user. We can reset the password by the help of network administration. Whereas unauthorized user prohibits accessing the network 5.4 Recommended H/w : CPU: Intel Pentium III 1.0 GHz Display resolution: 1024 x 768 Storage: 300 MB free disk space RAM: > 512 MB Run the module i.e. for a live project (a network), the hardware requirements are: 14 Switches (Cisco 2950 switch) 1 Router (Cisco 12811 router) IP Phones, Wireless Router Computer Systems (Generic) 1 Computer system for server Cross over cable Straight through cable 5.5Software Interfaces The requirements required in the HNS are as follows: Operating System: - Microsoft Windows10 Adobe Flash Player. Cisco Packet Tracer 5.6Communication Interfaces ď‚· The execution of the system will be in the existing network.
  • 7. ď‚· The system is mainly based on a client-server application where the server providing data to access all the services. 5.7 Ground Floor: 1 router (2811) , 4 switches (2950-24), 2 wireless routers(WRT300N) ,2 pc,2 printer,3 ip phones,6 cctv cameras. Figure 4: Ground floor Topology
  • 8. Figure 5:Ground floor Legend 5.8 Second Floor 1 router,3 switches,2 wireless routers,3 CCTV,IP-phones. Figure 6: Second floor topology
  • 9. Figure 7: Second floor Legend 5.9 3rd Floor: 1 router,3 switches,2 wireless routers,3 CCTV,IP-phones.
  • 10. Figure 8: 3rd Floor Topology Figure 9:3rd Floor Legend 5.10 Rooftop : 1 router, 4 server,4 switch,2 IP phones ,1 wireless router,1pc, 1printer Figure 10:Rooftoop Topology
  • 11. Figure 11:Rooftoop Legend 6. IP DESCRIPTION OF HNS An IP address is a numerical tag assigned to each device (e.g., computer, printer, etc.) taking part in a computer network that uses the Internet Protocol for any communication. It is a 32-bit number. One is IPv4 and the other is IPv6. IPv4 is of 32 bit and is represented as X.X.X.X i.e. each octet is parted by a dot. For e.g.: 191.157.2.2 .In this project IPv4 is used. The assignment of IP address is reliant upon the number of hosts existing in the network. Depending on the number of hosts present in the Hotel; for this network the IP to be used is a class B IP addresses i.e. 172.16.0.0 with a subnet mask of 255.255.0.0. And this IP is then distributed among different LANs and ports for communication. Table 1: : ListofIP Address ofPCs and Switches PC IP ADDRESS SWITCH IP ADDRESS PC-0 192.168.1.8 SWITCH-0 192.168.1.1 PC-1 192.168.1.10 SWITCH-1 192.168.1.6 PC-2 192.168.1.15 SWITCH-2 192.168.1.3 PC-3 192.168.1.11 SWITCH-3 192.168.1.9 PC-4 192.168.2.15 SWITCH-4 192.168.2.2 PC-5 192.168.2.10 SWITCH-5 192.168.2.3 PC-6 192.168.2.9 SWITCH-6 192.168.2.4
  • 12. PC-7 192.168.2.6 SWITCH-7 192.168.2.5 PC-8 192.168.1.7 SWITCH-8 192.168.1.20 PC-9 192.168.1.14 SWITCH-9 192.168.1.25 PC-10 192.1682.14 SWITCH-10 192.168.2.18 PC-11 192.168.2.7 SWITCH-11 192.168.2.28 PC-12 192.168.1.19 SWITCH-13 192.168.1.51 PC-13 192.168.1.18 SWITCH-14 192.168.1.50 PC-14 192.168.1.23 PC-15 192.168.1.22 Figure 12: IP Address accessing for PC-0 Command line interface (CLI) for Switch Figure 13: Configuration of a switch
  • 13. Command Line Interface (CLI)forRouter: Figure 14: Configuration of a router 7. PRODUCT FEATURES 1. This network is based on client-server architecture. 2. Tree topology is used here. 3. 4 client routers are present for the four levels of Hotel and they are associated to a server. 4. All the departments are categorized into various LANs, which are connected to the 4 routers based on the sequence in which they are accommodated on the stoery. 5. Likewise, various departments limited into LANs and share router corresponding to their levels. 6. A request is made by any system of any department and it is forwarded to client switch, which furthermore transmits it to the router and then to server. 7. Port-securities are there that are executed on various ports of the switches and gives reliability. 8. The data is then transferred to its connected router. 9. Router serves as DHCP server for assigning IPs to the host computers and also generally routes the data to the desired destination. 10. All appliances are under the reliability of their respective passwords known to the network executive only. 11. User can change the password any time they want to. 8. SCOPE OF HNS (Hotel Network scenario) This project is give us an efficient methodology connected among all computers that are used in a respective Hotel. Apart from interconnection, the project economical is made the topology by keeping in mind about the cost. The most important points is authentication and security to prevent the unauthorized access. 9. RESULTS OF HNS
  • 14. Figure 15: The complete diagram of Hotel Network Scenario created in Packet Tracer environment
  • 15. Figure 16Configration of rooftoop router Figure 17:Configuration of Wireless Routers:
  • 16. Figure 18:Configuration of IP Phones: 10. CONCLUSION To Design the network outlook for the community Hotel network scenario produces the substructure for all other exposure in the service framework such as security of the network, wireless area network, mobility as well as putting the justification to provide safety and security, operational efficiencies, virtual environments, and secure rooms. This paper describes the network design scenario approved by Cisco, as well as where we can apply these scenario within the various locations of a community Hotel network. Finally, key network foundation services such as switching, routing, multicast, and high availability are given for the full Hotel network scenario.