EZCAPE
RETREAT
HOTEL
Presented by: GROUP 2
Bautista, Emannuelle T.
Cabrera, Ashlee D.
Cunanan, Kenji Martell M.
Frias, Elaiza
Pagaduan, Sharly Haze Angel
Sunga, Jayson
ABOUT US
The general objective of
Ezcape Retreat Hotel is a mid-
this study is to optimize
sized hospitality business with
the hotel management
more than 80 rooms and
system (HMS) at The
several facilities, aimed at
Ezcape Retreat Hotel by
both leisure and business
designing and
traveler. Ezcape Retreat
recommending a scalable
employs over 60 staff across
and secure network
various departments, to
topology that enhances
provide comfort and quality
operational efficiency,
services to guests.
data security, and system
performance.
LOGICAL NETWORK
DESIGN
The Ezcape Hotel has a smart and secure network system
designed to support its daily operations, staff, and guests across
different floors and departments.The network is divided into
different VLANs (Virtual LANs) to keep data safe and organized.
Devices are grouped by department and floor – like Reception,
HR, Finance, Admin, and Guest access. Each area has its own set
of PCs, printers, smartphones, tablets, and Wi-Fi access points.
Switches connect devices locally, while routers and a firewall
manage communication between different floors and
departments. Guests and reception have their own separate
network to protect the hotel’s internal systems.
LOGICAL NETWORK
DESIGN
PHYSICAL NETWORK
DESIGN
The network layout is organized to
accommodate each departments and floor
in an orderly and organized manner. All
required equipment including routers,
switches, access points, and end user
equipment like PCs, laptops, smartphones,
tablets, and printers are configured to
ensure connectivity is seamless and
effective.
PHYSICAL NETWORK
DESIGN
TO KEEP HOTEL
OPERATIONS SMOOTH
AND GUEST DATA SAFE,
THE NETWORK DESIGN
INCLUDES strong
security and smart
segmentation.
JUSTIFICATION OF CHOICES
Security
Since the hotel handles sensitive guest and business information, it’s
important to protect it. Firewalls and security systems are used to block
harmful traffic. Staff access is controlled so that only the right people
can see or use certain information. The use of VLANs also helped the
security by preventing unauthorized access between departments,
ensuring sensitive data are not accessible to other users.
Guest Network
A separate VLAN is made just for guests so
Segment:
they can use the internet, but they can’t see
or access the hotel’s private systems. This
keeps the hotel’s important data safe.
Firewalls and (IDS/IPS):
These will be placed at key network
boundaries to monitor and filter traffic
between trusted and untrusted zones.
Troubleshooting
and
Maintenance:
Since we assigned each
departments to its own VLAN, if
an issue arises in one VLAN,it
can be resolved without
affecting the other departments.
IP ADDRESS TABLE WITH
SUBNETTING
ROUTER CONFIGURATION
SWITCH CONFIGURATION
THANK YOU FOR LISTENING!