Task 2 - IT Project Proposal - Revised
Task 2 - IT Project Proposal - Revised
Task: IT Proposal
Oyeyemi Olasehinde
Proposal Overview...........................................................................................................................1
Problem Summary........................................................................................................................1
IT Solution...................................................................................................................................2
Implementation Plan....................................................................................................................3
Project Rationale..............................................................................................................................7
Project Environment........................................................................................................................9
Methodology..................................................................................................................................11
Outcome.........................................................................................................................................19
References......................................................................................................................................21
1
Proposal Overview
Problem Summary
Hotels have become an existential form of service that anyone and travelling is likely to
search for in either the country or location they are visiting. Be it for social, business, or
intellectual reasons, hotels have become a place where many people rest even while working.
One of the biggest contributing factors to this is the availability of connectivity. Since a lot of
clients who use hotel services highly depend on this, it can be a crippling factor for the business
if there are no connection means. Most visitors often stay in hotels for days, sometimes even up
to a month as they engage in the business that led them to the place. A recent study showed that
90% of business travelers said that they would not return to a hotel that did not have strong
internet network, and most of them claimed that this is the most important requirement for any
The Riverview Hotel in Virginia serves as an example in demonstrating how clients can
get overly inconvenienced and dissatisfied with the services and utilities offered by the hotels if
connectivity is not among them. The hotel has been infamously mentioned by clients who’ve
used their services before for lacking connectivity to the outside world. Furthermore, the lack of
a suitable connectivity has made security in the premises a constant issue. Lack of adequate
surveillance devices such as cameras and motion sensors makes it difficult for the hotel staff to
adequately monitor the activities around the area. The lack of internet also inhibits other security
measures such as biometric recognition, which will improve security and privacy for the
customers who visit the hotel. All these factors, if improved, will increase customer satisfaction
in Riverview hotel which translates to increased loyalty and service production. For travelers,
having a reliable place to stay during their visit is very important and when a hotel shows
2
reliability, then attendance spikes (Karaman & Sayin, 2017). Riverview hotel can achieve this by
adding a strong wireless connection with reliable bandwidth within the premises to ensure that
customers and hotel staff have easy time. When the management has stepped up and put in place
measures to ensure that there is connectivity in their hotel, it will encourage more clients to use
their facilities.
IT Solution
Due to the lack of a wireless connection, the Riverview hotel will need to install a
wireless network system with a strong bandwidth that will serve both as a security measure, and
a marketing upgrade for the hotel. The hotel will also need to install strong and reliable Wi-Fi,
enabling clients to properly tend to their business activities and work-related tasks. Furthermore,
it will require further upgrading to its security system through the installation of security cameras
and biometric recognition software which will increase constant surveillance within the
premises.
Firstly, this solution will help the hotel improve its security systems which increases trust
among its customers. According to American Protection Group (2021), the quality of a hotel's
guest experience is crucial to its reputation, and providing adequate security services is essential
to making visitors feel safe and secure. Additionally, it shields property owners from the
expenses and harm that may result from illegal conduct like stealing. When travelers feel secure,
Secondly, business travelers have the advantage of conducting meetings, and other
activities from a far-off place as a result of strong connectivity. This ensures that their business is
not disrupted when they are away, increasing credibility for Riverview hotel.
3
Implementation Plan
To stick with the agenda, there has to be proper protocols and procedures in place to
ensure the solution is satisfactory. To begin with, on the installation of security cameras, the
hired company will look at the entire perimeter of the hotel and the entire structure of the
building. This will enable them to lay out a floor plan guiding them in determining the blind
spots within the area, that could serve as potential risk factors for their clients. Surveyors will
also be included to determine the area to be covered by surveillance cameras, which will provide
Installation of cameras will strategically be set on every corner of the lobby floor, keen to
potential blind spots such as corners leading to the hotel elevators, lobby bathrooms, and also at
the entrance, exit and emergency exit doors of the building (American Protection Group, 2021).
Furthermore, through reconnaissance of the building, they will need to install security cameras in
the parking areas, marking key areas such as the entrance and exit points. In addition, if the
parking area is underground, cameras will be needed along each parking row, strategically
placed at both ends and the center allowing for more coverage of the area. The security cameras
placed at the center of the parking row will have to be in a pair to allow for full coverage leaving
no chance of the creation of a blind spot for any potential criminal or prohibited activity on the
hotel grounds. At both ends of the parking row, the cameras set to monitor the area would have
to have a rotation function allowing for 180 degrees of coverage on both ends. This will also be
repeated on the other remaining rows of the parking lot concerning its size to maximize
coverage.
The hired company would also need to install security monitors that give a clear visual of
the placed cameras allowing continuous 24/7 coverage while also installing servers which store
the data (cover footage). It will also install backup servers, that will act as the secondary storage
4
units, independent from the previously installed servers which can run both locally and through
the internet.
For the installation of Wi-Fi, the hired company would choose to use the Captive Portal
system. This means that access points would be strategically located within the hotel premises
allowing full coverage of the Wi-Fi signal, promoting accessibility to the clients boarding the
facility. This can be achieved by connecting a 6 -cable to a gateway which would take the user to
the logging page which they can only access by using the login details provided by the hotel
management. The Wi-Fi will also be useful in setting up biometric recognition in every room
which is registered to the customer during their stay. Biometric recognition will also be set in
staff areas that will have authentication for the relevant members only. The company can also
install physical biometrics that recognize fingerprints by using built in sensors powered by neural
networks (Jirik, 2021). The fingerprint is recorded upon admission of the customer, then deleted
specialists and experts which continuously improve security systems and modernize hospitality
beginning with the Internet of Things also known as (IoT). In the article written by Amer and
Alqhtani (2019) on IoT Applications in Smart Hotels, more devices are being connected to the
internet allowing them to sense the environment, share information and execute requests. Amer
and Alqhtani (2019) illustrate how advantageous the connection of devices in hotels to the
internet has become. They describe smart cities as growing cities, which have adopted the use of
technological devices and the internet for their day-to-day activities, managing the complexities
and challenges by providing better services for their occupants. However, they do mention how
5
one of its loopholes, was increasingly discouraging clients from preferring to use the IoT-based
devices due to the exposure of their private information and sense of freedom inside their hotel
rooms.
The major characteristic of a smart city is the use of components like smartphones,
sensors and networks to connect its occupants, providing them with better use of public
resources, increasing their efficiency, and reducing operational expenses for public
administrations such as smart transport, smart energy, smart health, crime prevention and
ambient-assisted living among others (Fayoum University & Sharqa University, 2019, 9). With
competition between hotels intensifying with every upgrade, it was stated that smart hotels
needed to find solutions on how to maintain both comfortability and a sense of security in their
clientele and most importantly, ease their transition to the adoption of exhausting the smart hotel
utilities. The goal was to ensure that there was an improvement in the smart hotel algorithm used,
which would ensure the private information security of the clients using this service. A system
was created in that when it was activated, it would first authenticate the guest using it, retrieving
their IDs and information about the IoT system by use of their individual smartphone (Fayoum
University & Sharqa University, 2019, 10). In correspondence, a smart agent acting on behalf of
the guest will run on the guest’s smartphone and negotiate with the smart agents representing the
IoT devices to adapt them to the preferences and rules of the guest.
Another article by Mohammed Zeyad, Susmita Ghosh, and Masum Ahmed on the
described how a touch-sensitive locker, which is a security-based system, is able to notify the
property owner of any impending intruders, either on or in their property household. The article
starts by giving a brief description of how an intruder, with the faintest touch, can trigger the
6
touch-sensitive locker, to send an instant SMS to the property owner who then activates an alarm
by sending a specific message through SMS to the locker, should the intruder be of any type of
threat (Zeyad et al., 2019, 1923). This is possible through the GSM system which stands for
Global System for Mobile communication. This component is responsible for instantly notifying
the owner of the property of any impending threats to his property, particularly intruders. The
article further dissects the security system by stating some of its components which are the
microcontroller, the buck converter and the GSM. It states that these features are chosen as the
serial port, and six software selectable power-saving modes. The Global System for Mobile
connecting it with a microcontroller on a breadboard in a small-sized box to form the device. The
buck converter is an omnipresent DC-DC converter that effectively changes from a high to a low
voltage proficiently. Other components include capacitors, resistors, buck converters, crystal
oscillators, adapters and transistors among others all work collectively to bring this system to life
Another useful article is Designing Your IT Network by Jennifer Patterson (2001). The
article talks about how to create an IT network in detail. The first section of the work briefly
speaks about the audience and how crucial it is to speak with those who will be using the
network directly after briefly describing what networks accomplish. “By removing items that
would not be useful for individuals using the created network, we can make sure that it is
promoted to people who can use it and truly save money,” (Patterson, 2001). The selection of
hardware, including PCs or Macs, clients, full computers, cost vs. speed comparisons, and
7
network objectives, are covered in the section (Patterson, 2001). The connection's objective is
required to have sufficient bandwidth to prevent flicker and to offer the best connection possible
for a variety of uses, taking into account the connection software as well as the type of wire.
One of the most helpful sections of this post offers some questions and beginning points
for the project, taking into account the current setup and the upgrade’s intended purpose. This
allows us to choose the components and elements of the network, while taking into account both
the positive, any potential drawbacks. The final step in making sure the network update is a total
success for all of the users who are engaged on all levels will be budget, usage, and proper
support.
My final reviewed work is Internet 2: Project Plans Major Upgrades for its Network
Backbone by Carlson (2001). The network upgrade project described in this article includes
improvements to the backbone's functionality and a new internet protocol that can support more
users. Being that the project has been thoroughly thought through and everything has been
determined, including expenses, capacities, protocols, upgrading existing capacity, and providing
2001). It talks about the intention to increase the thirty percent usable capacity in order to
support more users and devices. The fact that it is now permitted in so many institutions,
including colleges, libraries, and schools, confirms that the implementation plan was extensive
enough to address a variety of needs. This network update is more extensive and includes both
The works mentioned above, strongly relate to my project development. The use of
devices like smartphones, sensors, and networks to link residents in order to give them better
8
access to public resources, boosting their productivity and lowering operational costs for public
administrations is the key feature of a smart city (Amer & Alqhatani, 2019). Moreover, a strong
internet network is necessary to transform an area into a technical, fast moving and developing
place. Services such as IoT are important because they improve a facility or an organization
exponentially. Smart hotels are the growing trend currently, and Riverview can join the
bandwagon by installing a strong Wi-Fi and proper security. Riverview hotel requires a wireless
The project by Zeyad et al. (2019) is also applicable in this project as the GSM
technology can be used in Riverview’s security systems. The Global System for Mobile
breadboard in a small-sized box to form the security device. This suggests that the GSM device
has low costs which is very important for a business such as Riverview Hotel. One of the
project’s objectives is to improve the hotel’s security system, and the GSM technology can be
considered in this case. Its low-cost nature is also very important to the hotel management who
intend to reduce costs as much as possible, while at the same time get a quality system in their
premises.
The reviewed work by Patterson (2001) was significant to my study since it contained
details about networks that were directly relevant to my hotel project. It provided detailed
instructions on how to choose the appropriate course of action in various circumstances. With the
aid of knowledge, I was able to develop a more thorough implementation strategy for the users,
hardware selection, connection comparison, pertinent inquiries, and various school possibilities
(Patterson, 2001).
9
modifications that have been made to networks used in large institutions such as hotels. This
assists to put my issue in perspective because it allows us to view the overall strategy for
updating the network and its components on a bigger scale. The article under discussion
demonstrates many possibilities for increasing the network's backbone capacity and options to
accommodate additional users, which has a direct bearing on the contents of the project I have
Project Rationale
This project has become one of the major needs of businesses, especially in the current
COVID-19 situation. The recent pandemic has led to serious lockdowns which have caused
businesses to shut down due to lack of necessary resources to keep running during an economic
crisis. One of the suitable reasons for this project, is the need to enable a continued flow of
businesses even during a lockdown. According to Abed (2021), during the Covid-19 crisis,
technology adoption is essential for business sustainability, particularly for small enterprises.
The pandemic caused many small businesses to either close down or get high losses because of
the inability to handle such an economic crisis. However, technology allows business people to
work remotely and achieve the same business objectives they would have achieved if they
worked physically in their business premises. The Covid-19 lockdowns have shown to be the
ideal opportunity for businesses to become more adaptable and flexible in various situations.
Businesses been compelled to create various techniques for delivering goods and services in
response to their business requirements (Chetty et al., 2020). Since enterprises can use new
technologies to market their goods and services through online digital channels, the Covid-19
lockdowns should not prevent them from growing their sales (Doyle & Conboy, 2020). For a
10
hotel like Riverview, having reliable network coverage will ensure that business travelers will
not have to break the cycle of their work and can keep making sales even when in lockdown or
Another reason for carrying out this project is to improve the security system of
Riverview hotel through technology. Having strong security within a hotel increases trust by
travelers who would feel comfortable during their stay. Most customers would be relaxed
knowing that their belongings are safe and they can move in and out of the hotel without
worrying for anything being stolen or misplaced. Furthermore, the security system will ensure
that illegal activities does not take place within the hotel premises, keeping the business safe and
preferable to stay in. the project will spearhead the installation of surveillance cameras which
will keep an eye on all activities taking place and ensure that there is no form of crime being
conducted within the hotel. Riverview hotel also aims to assure its customers that they can
conduct their businesses safely and peacefully, without fear of disturbance. Having biometric
scanning will ensure that customers have the privacy they deserve during their stay and they
would only allow the hotel staff, offering food upon request, or asking to clean their rooms.
for the growth of River view hotel. The management at Riverview plan to improve the facility to
include a salon and spa, and to increase the starts from three to five. To manage this growth,
wireless connection can serve as a starting point in the strategy. As more customers are expected
once Wi-Fi is enabled in the hotel, the management plans to create more space and develop an
aesthetic feel of the place, improving its marketing and preparing for the growing client base. All
the factors are critical reasons for the IT solution that is intended for Riverview hotel. Other
11
hotels may see how beneficial the strategy has been to Riverview and imitate it, ensuring a move
Project Environment
The current state of the hotel is what we’d hope it would be, but we are still looking to
expand more, especially on the facilities. We have grown to be part of the ecosystem that
delivers what the client needs and how to deliver that promise. We are an ever-growing business
that has come far in ensuring we attract clients from different aspects of life and demography.
We have adequate and spacious rooms for our customers. Still, we are also looking to expand on
other required amenities like a small cafeteria for breakfast, lunch and dinner, a conference room
for meetings to be held by officials, and a gym area for the ones who want to get into shape.
However, amongst all the facilities and services that we have and do not have, we lack
the availability of wireless networks. Wireless networks have the capability to supply guests with
extra amenities as well as allow for excellent productivity, and we saw this fit to be in our next
project. Our hotel is increasing with guests, which will be a great addition to our business as it
will provide them with great expectations and make them want to come for more. Technology
has dynamically changed how organizations and corporations function. As technology advances
over time, many businesses are trying to keep up with the pace and find new ways to compete.
The hotel industry is one of them and it has not been left behind, either. This is crucial to our
The hotel is currently using a manual system that records information about guests, daily
sales and organizing financial transactions. When recording guest information, we get
information like names, contact numbers, emails, profile type, unique preferences and how long
they opt to stay in the hotel. Collecting customer information is vital because it allows us to meet
12
we would also know what kind of services the customer wants or will expect. This is where a
wireless network comes in. However, our manual system for record-keeping has its drawbacks. It
is easy to switch details and end up with inconsistent data accidentally. This will make
information have many errors and become unusable for reporting or searching for trends.
Adding a wireless network to our hotel will be advantageous to our business. With the
wireless network, we will be able to store our data in the cloud rather than having a manual
record system which is tedious and time-consuming. With the necessary equipment, information
will be impervious to data loss, insecurity or duplication during data entry. When using a manual
system, it is tiresome to always go through large amounts of files when looking for specific
information. However, in the modern way, searching for information is with just a single click.
Having a wireless network can grant easy access to a website. A website defines the very essence
of a business, whereby it has its importance in revealing what a company is all about. Thus,
adding a website will benefit both our hotel and our staff. Depending on the internet,
communication and market growth will be more prevalent for our business (Millar et al., 2007).
In this case, we will rely on the internet to strengthen both our business, and for communication.
As more guests get well acquainted with our hotel, they will indeed give out the good word to
In addition to adding a wireless network, the website will be able to provide information
about amenities, the location, pricing, other services and possibly other nearby attractions. We
will also encourage guests to book rooms from the website, book conference halls, check out our
upcoming promotions and offers and rate our services. In order to meet the requirements of the
13
guests as well as get competitive with our rivals, our hotel must tailor the services to the guests'
Adding a wireless system to our hotel will come with various benefits. Guests can
potentially check and send emails, do their online work, communicate with friends and family,
while using the internet from anywhere on the property. This will also make the guests stay
As technology has advanced, many people have grown accustomed to it. People use the
internet for various purposes, either in their business or personal lives. The most common
activities that people do online are online shopping, online banking, electronic payments, social
media and online investing. Through the internet, guests are able to pay for our services via
Methodology
A system is an orderly grouping of interdependent elements combined to achieve a
desirable plan or specific objective. The project methodology used will be the Waterfall model. It
is a sequential development process that moves from one phase to the next, with each phase
completely wrapping up before the next one begins. This model comes with an advantage. It
carefully plans the structure and architecture of the system in detail, which is crucial when
dealing with large systems (Petersen et al., 2009). The Waterfall model was the first process to
In the Waterfall model, the project methodology will follow these steps:
Requirements specification: In this phase, the customer’s needs are identified and
documented. This is where customer requirements are met at the beginning of the project. In this
case, some requirements should be adhered to in order to set up a wireless network. These
14
include a Wi-Fi router, some cables, cameras for surveillance, and also the ISP to provide the
internet solution. A network switch will also be needed to supply the internet to various parts of
the premises. The server will also provide adequate storage capacity for systems.
Feasibility Study: The main aim of this phase is to decide whether it would be
technically feasible to develop or erect the system. It involves deciding the various strategies that
would make the system possible to run. This is where the location of the Wi-Fi network will be
decided. The site has to be clear of any obstructions like tall trees or other possible obstacles.
Also, the location has to be easily accessible for the engineers to install the main access point
from which they will run cables to the building. Once this is done, it will later be modified into a
Design and Implementation: This phase is responsible for the actual development of the
system and how to document and create it. It is the most important one because, for most
systems, it tends to be the most protracted and expensive part of the development process. This is
where the engineers install the wireless networks with their equipment by deploying the router to
act as the wireless access point, installing a server rack that supplies the network to all other
rooms or areas, and also cables for connecting. Surveillance cameras will also be installed in
various places around the premises to avoid any blind spots. There is also a fee for a one-time
installation and a monthly payment from there. The verification process is where the client
checks the installation done to make sure the connection is working well and it adheres to the
Testing: This phase tests the system integration depending on the quality, and functional
aspects. To fully deploy the system, the engineers need to perform testing and identify defects in
the system. The wireless networks installed will be tested to ensure it covers the necessary
15
coverage area that will be set, and also to ensure the cameras are in the right place for the
capturing of footage. The servers will also be tested, especially the hard drives, to confirm that
neither is corrupted or missing. These servers will provide enough storage for CCTV footage and
other information.
Deployment phase: The team readies all the installed equipment, and the release
documentation is finalized, for example, installation instructions and user guides for the system.
Moreover, instructions on how to enable or disable features of the system to tailor it to the
customer’s needs will also be indicated for the client. In this case, the engineers will prepare the
final documentation after ensuring all equipment is in place, including the routers, cables, server
rack and cameras. Necessary precautions should also fall into place to avoid any mishaps along
the way.
Maintenance: After the product has been handed to the client, it has to be maintained
thoroughly. The customer will be bound to come across issues along the way. Thus, they will
report the problems to the company that supplied the system. During this time, there might be a
few encounters like slow connection, internet temporarily disconnected or if maintenance of that
whole area needs to be done. The engineering team applies these fixes till the customer is
satisfied.
project objectives
1 Set up a fully 1.a. Determine which type of 1.a.i. Research on the reliable
16
1.b. Figuring out which location will 1.b.i. Survey the area on where
functional networking
1.c. Gather up the necessary 1.c.i. Use a central node to set
system
hardware to use in the installation. up the first installation.
in the premises.
the premises.
2 Testing out new 2.a. Incorporating a firewall, virtual 2.a.i. Adding a firewall that
hardware software private networks and other will block out any suspicious
security.
unwanted program.
2.c. Doing hardware check-ups and 2.c.i. Ensure each router and
penetration test.
3 Evaluation and 3.a. Conducting final check-ups. 3.a.i. Testing every software
system.
conducting interviews.
issues.
that the network system is implemented. The first goal is to set up a fully functional system. By
doing this, we came up with three objectives. The first one is determining the type of network
topology that will be required. We decided to go with the Star Topology because all devices in
this network are connected to a single hub through the cables. The hub is the central node;
therefore, all other nodes(computers) are connected to the a central one. The second objective is
to determine where the central hub will be placed. The server room was an ideal place to set it
up, and the IT manager will be in-charge of the operation. From there, we prepared the necessary
The third objective is to gather the necessary hardware for the installation by erecting the
central hub in the server room and connecting all the cables. Then we set up various switches and
connect them with the cables to run through the different rooms. The switches will act as the sub-
nodes that will connect a couple of computers in some rooms simultaneously. Then finally, we
will set up the routers to supply wireless network on the premises. Furthermore, the surveillance
cameras will be installed around the premises to capture live footage; to improve the security of
our business. We also configured the routers to have limited coverage, to only allow the people
Our second goal is to test out the new software and hardware. To start with, we add a
firewall that will act as a barrier against any malicious programs or attackers in the network. It
will also scan the system for any suspicious activity. A firewall uses packet filters to filter out
programs that match unidentified threats from the others. A VPN is also needed to provide an
encrypted server and hide our IP address from outside sources. This is crucial for the security of
our network system as it protects our identity and safeguards our data. We will also test the
firewall to see if it is functioning. Next will be to add some third-party programs designed for
productivity in the office. The programs will be installed on other computers in the other offices.
conduct hardware check-ups, and testing for problems or weak spots by ensuring every router
and switch is up-to-date with the latest firmware. Having out-of-date firmware will cause severe
issues in the future so, it is important that the devices are running on the latest firmware update.
A firewall penetration test is also necessary to test the strength of the firewall just in case we go
into any trouble along the way, and lastly, to ensure all cameras are online.
20
After every hardware is in place and software installed, we invite the staff for a brief
introduction to the newly added network system. The IT staff will have to undergo training on
how to utilize the system. This can take a few weeks, depending on how quickly they learn. After
training, we would also need to get feedback from the staff to know their outcome towards the
system and their expectations. We would prepare questionnaires for each of them to fill out and
set up interviews individually. The staff, especially the IT personnel, will have gotten used to the
system after a few months, so we will also encourage them to report any feedback or issue. This
take one month. The implementation phase will take the longest time, to ensure that all the
intended equipment is set in place and the wireless network is set up so that it works efficiently
and in all areas. The project is broken down into achievable milestones, each given its own
timeline, where it is expected to be achieved by the set time. The next step cannot be taken until
the one being currently worked on is finished. Therefore, it is important that each step or
milestone be given ample time to execute and achieve. This will allow a smooth process that will
ensure all details of the project are considered. It is important to note that the timeline is
estimated and may be changed depending on the process and activities being done. The table
Outcome
For this project to be successful, certain measurable objectives must be met. A reliable
network that is faster and more dependable than the general systems is the primary result of this
project. This can be determined by comparing the current network's bandwidth speed to the
previous bandwidth speed using a bandwidth measuring system. A 60% increase in bandwidth
will be seen as a success to the project. The network is expected to be used for many functions
such as security and biometric surveillance, as well as providing unlimited internet to the clients
in the hotel. To gauge the speed and evaluate it against the prior one, a network speed test will
also be carried out. After the renovations, a 40% increase in network speed is the main objective
of the project, to ensure that the quality of the wireless network is recommendable.
Another outcome from this project is customer satisfaction relating to Riverview hotel.
Customer satisfaction in this case is measured using the number of repeat visits in the hotel and
22
the recommendations, as well as reviews made on the hotel website. Having high reviews means
that customers found their stay pleasant which is directly assumed to be due to the installation of
wireless network. This is possible because the wireless network and security systems put in place
will be the only treatment done in the hotel, and therefore, if there is increase in customer
satisfaction it is directly attributed to the new development. Another expected outcome of the
project is to increase in sales or customer base for the hotel, measured by the number of new
References
Abed, S. S. (2021). A literature review exploring the role of technology in business survival
Amer, M., & Alqhtani, A. (2019). IoT applications in smart hotels. Semantic Scholars.
https://www.semanticscholar.org/paper/IoT-Applications-in-Smart-Hotels-Amer-
Alqhtani/aa322178e1796c7704e0d414505f88cad1fb8a94
is-hotel-security-important/
Carlson, S. (2001, October 12). Internet2 project plans major upgrades for its network backbone.
Chetty, R., Friedman, J. N., Hendren, N., & Stepner, M. (2020). Real-time economics: A new
Doyle, R., & Conboy, K. (2020). The role of IS in the covid-19 pandemic: A liquid-modern
Fayoum University & Sharqa University. (2019). IoT Applications in Smart Hotels.
Jirik, P. (2021, September 9). 5 Popular Types of Biometric Authentication: Pros and Cons.
Phonexia. https://www.phonexia.com/blog/5-popular-types-of-biometric-authentication-
pros-and-cons/#:~:text=Biometrics%20is%20the%20analysis%20of,palm%20or
%20finger%20vein%20patterns.
24
Karaman, A., & Sayin, K. (2017). The Importance of Internet Usage in Hotel Businesses: A
Karaman, A., & Sayin, K. (2017). The Importance of Internet Usage in Hotel Businesses: A
Study on Small Hotels. Journal of Internet Applications and Management, 8(1), 65-74.
Millar, M., Schrier, T. R., & Kim, E. K. (2007). Wi-Fi availability and accessibility as stated on
hotel websites.
Millar, M., Schrier, T. R., & Kim, E. K. (2007). Wi-Fi availability and accessibility as stated on
hotel websites.
Why hotel Wi-Fi availability is key to guest satisfaction. (n.d.) [Blog]. Social Hospitality.
https://socialhospitality.com/2014/08/hotel-wifi/
Zeyad, M., Ghosh, S., & Ahmed, M. (2019, December). design prototype of a smart household
Journal of Power Electronics and Drive System (IJPEDS), 10(4), 1923 - 1931.
https://doi.org/10.11591/ijpeds.v10.i4