Assignment - 1 Ece 523 (Introduction To Iot)
Assignment - 1 Ece 523 (Introduction To Iot)
INSTRUCTIONS TO CANDIDATES
STUDENT ID : 2022928499
GROUP : CEEE2234A
TOTAL
/20
Objectives
Background / Scenario
In this activity, you will explore the smart home example. Depending on the application, some data is best processed close
to the source. The smart home example takes advantage of fog computing to monitor and act upon the levels of smoke
detected in the home.
(1.5 Marks)
f. The smart door is currently unlocked (represented by a green light on its door knob) but it can be locked remotely. Click
the smart door in the browser to expand the option.
g. Click Lock to lock the door.
h. Was the door locked? How do you know?
- Yes. Because the light at the doorknob is turned red which it representing the door have been locked. Also, the smart
door section within the web browser features the lock button.
(2 Marks)
Does the MCU close the doors and window, and stop the fan?
- No. Because the car is still running and smoke can be detected by smoke detector.
g. While still monitoring the levels, stop the classic car’s engine by holding the Alt key and clicking the classic car.
What happens to air quality inside the house after the engine is stopped?
- The CO and CO2 levels drop to 0.
What happens to the doors, window and fan?
- The MCU will decide to close the garage door, front door, and window since it was safe because the air quality is become
normal. The MCU also will turns off the fan.
(2.5 Marks)
Part 3: Reflection
This example shows that the decision between cloud and fog processing depends on the application.
In the smart home example, fog computing was the best option. In the smart home example, the data generated by the smoke
sensors were processed and used to make decisions regarding the house’s air quality. In this scenario, there was no need to
send out sensor data to the cloud for processing. Cloud processing would slow down the response time, potentially putting
lives in danger. Another possible problem relates to the Internet link; if the connection to the Internet was lost, the entire
system would fail, putting lives at risk.
Objectives
● Explore the Connected Factory
Background / Scenario
In this activity, you will explore the connected factory example. You will then build your own model of a connected
factory that incorporates an area of personal interest to you.
Preparation:
Power station:
(2 Marks)
For my personal importance things that I will add to the connected factory is ceiling fan in the office because the
environment in the office is quite hot without it. To add the ceiling fan, firstly, I will need to add an access point to the
room by connected it with IE-2000 F-SW-2 and make an adjustment for the configuration in the setting. The purpose to
adjust the configuration is to make the fan connected wirelessly and can be controlled using devices. For my configuration
for access point is SSID I put Factory-Office. Then, for authentication I use WPA2-PSK and PSK pass Phrase is factoryOffice.
As for IP configuration I choose DHCP and automatic configuration for IPv6 Configuration.
(5 Marks)
Topology
Objectives
Deploy Basic Security Measures for IoT Systems with Cloud Services.
Background / Scenario
ABC Company is developing IoT systems in their main warehouse. The objective is to deploy some physical
security devices around the warehouse so that, when the warehouse is closed, these devices will monitor the
doors and windows. When an intruder is detected, the lights are turned on and web cameras will start recording.
The security is an important aspect in addition to the function of IoT systems with cloud services.
In this Packet Tracer activity you will complete configuration tasks:
● Register four IoT devices in the ABC Company warehouse: a motion detector, a directed light, a webcam,
and a trip sensor. Add conditions in the registration server so that when either the motioin detector or the
trip sensor is activated, the directed light and webcam will turn on.
● Configure the warehouse router to require strong authentication for console and remote access.
● Configure ACLs to restrict network traffic between the registration server and the ABC Company
warehouse.
● Configure the web server in the cloud service provider network to ensure that data communication is
secure.
Required Resources
1. Use a PC in the WH office. Under Desktop tab, open Web Browser, type www.registrar1.pka and
select Go. The Registration Server Login window displays.
2. Click Sign up now and create your own account with a strong password (ensure a password is at
least 8 characters long with combination of capital characters, lower case characters, and numbers).
3. What is your username and password?
Username: Hafizi
Password: Hafizi
3. Repeat steps 1 and 2 to register the Light, Webcam, and Trip Sensor.
(1 Mark)
Move the mouse away and wait for a few seconds. Are Directed Light and Webcam turned off?
- Yes.
(0.5 Mark)
● On the warehouse router, configure a banner to display a warning message for unlawful access. Although
a banner message is not a security measure by itself, it may function as a deterrence to intruders. Set an
encrypted password to enter the Exec mode. Set up a local user account for the console line and remote
access.
1. Click the Warehouse 2911 router, then click the CLI tab and enter these commands:
Warehouse> enable
Warehouse# config terminal
Warehouse(config)# banner login %Login with valid password%
Warehouse(config)# banner motd %Authorized Access Only! Unauthorized access is subject
to Federal Prosecution.%
Warehouse(config)#
3. Set a local username for the console line and VTY lines access:
Warehouse# configure terminal
Warehouse(config)# username WhAdmin secret AbcLine001
Warehouse(config)# line console 0
Warehouse(config-line)# login local
Warehouse(config-line)# exit
Warehouse(config)# line vty 0 4
Warehouse(config-line)# login local
Warehouse(config-line)# end
Warehouse#
(0.5 Mark)
Step 4 – Configure Access Lists to Restrict Traffic between ABC Company IoT
devices and the Cloud Service Provider Network
● On the warehouse router, configure and apply access list 10 to allow traffic from only the DNS server and
the registration server to enter the ABC Company warehouse IoT devices network:
Warehouse# configure terminal
Warehouse(config)# access-list 10 permit host 172.18.1.5
Warehouse(config)# access-list 10 permit host 209.165.201.5
Warehouse(config)# interface g0/2
Warehouse(config-if)# ip access-group 10 out
Warehouse(config-if)# end
Warehouse#
● On the Cloud Service Provider router, configure and apply an access list 110 to allow traffic from only the
ABC Company warehouse IoT devices network to access the registration server:
CSP# configure terminal
CSP(config)# access-list 110 permit ip host 209.165.200.226 host 209.165.201.5
CSP(config)# access-list 110 deny ip any host 209.165.201.5
CSP(config)# access-list 110 permit ip any any
CSP(config)# interface g0/0
CSP(config-if)# ip access-group 110 out
CSP(config-if)# end
CSP#
In the ACL 110, why is the warehouse router interface IP address selected as the source in the ACL 110?
- Because this IP address is used in NAT as the inside global IP address.
(1 Mark)
Step 6 – Test
● From the laptop in the warehouse network, access the registration server. Trigger either the motion
detector or trip sensor, and observe the action of the directed light and webcam
● From PC1 or PC2, open the web browser. Can it access the registration server? - No.
● From PC1 or PC2, open the web browser. Can it access the web server 209.165.201.3 via HTTP? - No.
● From PC1 or PC2, open the web browser. Can it access the web server 209.165.201.3 via HTTPS? – Yes
Reflection
What security measures are implemented?
- Hardening of network devices, secure wireless access and ACLs.
What other security measures should be considered when deploying IoT solutions with cloud computing?
User awareness: Conduct regular security training for employees to enhance security awareness.
Device Updates: Manufacturers should release frequent small patches instead of substantial updates.
Built-in Security Patches: Manufacturers should prioritize security software updates.
Monitor Data Flow: Use cloud-based solutions to enhance security at the edge.
Secure Passwords: Use strong passwords for both IoT devices and linked cloud services.
Application Security Best Practices: Employ code or application security best practices.
(4 Marks)