0% found this document useful (0 votes)
242 views16 pages

Assignment - 1 Ece 523 (Introduction To Iot)

Uploaded by

2022928499
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
242 views16 pages

Assignment - 1 Ece 523 (Introduction To Iot)

Uploaded by

2022928499
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

CONFIDENTIAL NOV 2023/ECE523

UNIVERSITI TEKNOLOGI MARA


ASSIGNMENT 1

COURSE : INTRODUCTION TO INTERNET OF THINGS AND


DATA ANALYTICS
COURSE CODE : ECE523
DEADLINE : 24 November 2023

INSTRUCTIONS TO CANDIDATES

FILL IN THE FOLLOWING PARTICULARS

STUDENT NAME : MUHAMAD NORHAFIZI BIN ABDUL HALIM

STUDENT ID : 2022928499

GROUP : CEEE2234A

LECTURER : TS. DR. EZMIN BINTI ABDULLAH

Program Code EE241/CEEE241


Cognitive
Question CO PO Marks
Level
Q1 C4 CO1 PO2 /6
Q2(a) C4 CO1 PO2 /2
Q2(b) C4 CO2 PO2 /5
Q3(a) C4 CO1 PO2 /2
Q3(a) C4 CO2 PO2 /5

TOTAL
/20

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Question 1: Packet Tracer 4.2.2.4 – Explore the Smart Home


Topology

Objectives

● Explore the Smart Home

● Analyze the Usage of Fog Computing in the Smart Home

Background / Scenario
In this activity, you will explore the smart home example. Depending on the application, some data is best processed close
to the source. The smart home example takes advantage of fog computing to monitor and act upon the levels of smoke
detected in the home.

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Part 1: Explore the Smart Home

Step 1: Understanding the devices that comprise the smart home.


Commonly ISPs deliver data and video over a single coaxial cable. Starting from the attic, a coaxial splitter is used to
separate the video signal from the data signal.
a. Two coaxial cables leave the coaxial splitter in the topology shown. Which devices does the coaxial cable connect to?
- TV and cable modem.
b. The cable modem is the interface between the ISP’s network and the home’s network. To which devices does the
cable modem connect to?
- Coaxial splitter and Home Gateaway.
The Home Gateway acts a concentrator and router to all internal home devices. It also provides a web-based interface
that allows users to monitor and control various smart home devices. Notice that the home devices can connect to the
Home Gateway through either a wireless and/or wired connection.
Note: Packet Tracer uses dashed beams to represent wireless connections but it can make it hard to read when too many
devices are present. To turn it on, go to Options > Preferences > Hide Tab > uncheck Hide Wireless/Cellular Connection.
c. List all home devices connected to the Home Gateway
- Coaxial splitter0, cable modem0, smart solar panel, smart window, smart lamp, smart phone, tablet, smoke detector,
thermometer, TV, smart alarm, smart coffee maker, smart door, heating unit, cooling unit, smart water meter , smart
sprinkler, MCU, smart garage door, smoke sensor and smoke detector.

(1.5 Marks)

Step 2: Interacting With the Smart Home


The devices in the smart home can be monitored and controlled remotely through any computer in the home. Because all
smart devices connect to the Home Gateway which hosts a web-based interface, tablets, smartphones, laptops or desktop
computers can be used to interact with the smart devices.
a. Click the Tablet. (The tablet is located on the bed in the master bedroom).
b. Navigate to Desktop > Web Browser.
c. In the address bar, type in 192.168.25.1 and press Enter. This is the IP address of the Home Gateway.
d. Use admin/admin as username and password to log into the Home Gateway.
e. What is displayed?

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

f. The smart door is currently unlocked (represented by a green light on its door knob) but it can be locked remotely. Click
the smart door in the browser to expand the option.
g. Click Lock to lock the door.
h. Was the door locked? How do you know?
- Yes. Because the light at the doorknob is turned red which it representing the door have been locked. Also, the smart
door section within the web browser features the lock button.

i. Click Unlock to unlock the door.


j. Click the smoke detector in the browser to expand the section. What is the smoke level reading provided by the smoke
detector?
- 0. The detector does not detect smoke at this time.
k. Can the smoke detector be controlled?
- No. It can only be monitored.
Smart devices can also be controlled directly, representing physical interaction.
l. Within the Logical work area of Packet Tracer, hold down the ALT key and click the Smart Coffee Maker to turn it on or
off.

(2 Marks)

Part 2: Fog Computing in the Smart Home


The MCU added to the smart home is used to monitor the smoke levels read by the smoke sensor and decide if the house
should be ventilated. If the carbon monoxide levels raises above 10.3 units, the MCU is programmed to automatically open
the window, front door, garage door and start the fan in high speed. This action is only reverted (close doors and windows
and stop the fan) when the carbon monoxide levels drop below 1 unit.

Step 1: Run the Classic Car


The owner keeps a classic car in the garage and needs to be run occasionally. The classic car generates carbon monoxide
which raises the levels within the premises.
a. Click the Tablet located on the bed in the master bedroom.
b. Navigate to Desktop > Web Browser.
c. In the address bar, type in 192.168.25.1. This is the IP address of the Home Gateway.
d. Use admin/admin as username and password to log into the Home Gateway.
e. Click on the Smoke Detector within the smart home; leave this window visible so you can monitor the smoke levels.
f. Start the car engine by holding the Alt key and clicking the classic car.
What happens to the air inside the house with the car running inside the garage?
- The smoke detector indicates elevated levels of dangerous gases since the doors and window are closed. When the levels
exceed the certain level, the MCU will react by opens the garage doors, front door, and window. Then, it also turns on the
ceiling fan at its highest speed.
What happens to air inside the house after the MCU opens the doors and window, and start the fan?
- The smoke level will drop near to 0, but does not reach 0.

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Does the MCU close the doors and window, and stop the fan?
- No. Because the car is still running and smoke can be detected by smoke detector.
g. While still monitoring the levels, stop the classic car’s engine by holding the Alt key and clicking the classic car.
What happens to air quality inside the house after the engine is stopped?
- The CO and CO2 levels drop to 0.
What happens to the doors, window and fan?
- The MCU will decide to close the garage door, front door, and window since it was safe because the air quality is become
normal. The MCU also will turns off the fan.

(2.5 Marks)

Part 3: Reflection
This example shows that the decision between cloud and fog processing depends on the application.
In the smart home example, fog computing was the best option. In the smart home example, the data generated by the smoke
sensors were processed and used to make decisions regarding the house’s air quality. In this scenario, there was no need to
send out sensor data to the cloud for processing. Cloud processing would slow down the response time, potentially putting
lives in danger. Another possible problem relates to the Internet link; if the connection to the Internet was lost, the entire
system would fail, putting lives at risk.

Packet Tracer 4.2.2.5 – Build a Connected Factory Solution


Topology

Objectives
● Explore the Connected Factory

● Build a Connected Factory Solution of Personal Importance to You

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Background / Scenario
In this activity, you will explore the connected factory example. You will then build your own model of a connected
factory that incorporates an area of personal interest to you.

Part 1: Explore the Connected Factory


Step 1: Review the Glazing Company Overview page.
a. Click any PC in the Warehouse and open the Web Browser from the Desktop tab.
b. Type webserver into the URL box and press Go.

Step 2: Review the company description information.

a. Once the information has been reviewed, close the PC.

Step 3: Run the Classic Car


The owner keeps a classic car (the old car in PT) in the warehouse that needs to be run occasionally.
a. Start the engine by holding the Alt key and clicking the classic car.
How does the warehouse react to having the car running inside of it?
- CO and CO2 sensors detect elevated levels of hazardous gases and report an SBC or MCU. The controller tells
the windows to open and the fans to turn on.
b. Stop the engine.

Step 4: Review the Connected Factory Network Settings.


a. Click the Factory building to see its layout.
b. Find the F-IT-Laptop and open the Text Editor inside the Desktop tab.
c. Use the File button to find and open the IP-Network.txt file.
d. Review all the network information about the connections.
e. Close the Text Editor.

Step 5: Use browser to monitor factory sensor settings.


a. Open the web browser on the F-IT-Laptop using the Desktop tab.
b. Type factory in the URL box and press Go.
c. Use the following table to log into the each area to control the sensors located there.
© Hak Cipta Universiti Teknologi MARACONFIDENTIAL
CONFIDENTIAL NOV 2023/ECE523

Area Username Password


Assembly Assembly Assembly
Preparation Prep Prep
Power Station PS PS
d. Review the listed items you can control remotely or with conditions.
Assembly:

Preparation:

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Power station:

(2 Marks)

Part 2: Build a Connected Factory Solution of Personal Importance to You


Build a connected factory solution of personal importance to you and add it to the Connected Factory.

For my personal importance things that I will add to the connected factory is ceiling fan in the office because the
environment in the office is quite hot without it. To add the ceiling fan, firstly, I will need to add an access point to the
room by connected it with IE-2000 F-SW-2 and make an adjustment for the configuration in the setting. The purpose to
adjust the configuration is to make the fan connected wirelessly and can be controlled using devices. For my configuration
for access point is SSID I put Factory-Office. Then, for authentication I use WPA2-PSK and PSK pass Phrase is factoryOffice.
As for IP configuration I choose DHCP and automatic configuration for IPv6 Configuration.

(5 Marks)

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Packet Tracer 4.2.3.3 – Securing Cloud Services in the IoT

Topology

Objectives
Deploy Basic Security Measures for IoT Systems with Cloud Services.

Background / Scenario
ABC Company is developing IoT systems in their main warehouse. The objective is to deploy some physical
security devices around the warehouse so that, when the warehouse is closed, these devices will monitor the
doors and windows. When an intruder is detected, the lights are turned on and web cameras will start recording.
The security is an important aspect in addition to the function of IoT systems with cloud services.
In this Packet Tracer activity you will complete configuration tasks:

● Register four IoT devices in the ABC Company warehouse: a motion detector, a directed light, a webcam,
and a trip sensor. Add conditions in the registration server so that when either the motioin detector or the
trip sensor is activated, the directed light and webcam will turn on.

● Configure the warehouse router to require strong authentication for console and remote access.

● Configure ACLs to restrict network traffic between the registration server and the ABC Company
warehouse.

● Configure the web server in the cloud service provider network to ensure that data communication is
secure.

Required Resources

● Packet Tracer 7.1 or newer.

Step 1 – Register IoT Devices to the Registration Server


● Add a user to the registration server www.registrar1.pka with a strong password:

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

1. Use a PC in the WH office. Under Desktop tab, open Web Browser, type www.registrar1.pka and
select Go. The Registration Server Login window displays.
2. Click Sign up now and create your own account with a strong password (ensure a password is at
least 8 characters long with combination of capital characters, lower case characters, and numbers).
3. What is your username and password?
Username: Hafizi
Password: Hafizi

● Register IoT devices to the registration server:


1. Within the warehouse, click on Motion Detector. Under the Config tab, select Remote Server in the
IoT Server section. Enter www.registrar1.pka as the server address and click Connect. Enter the
username/password you just created.
2. Does Motion Detector appear in the registration server? - Yes

3. Repeat steps 1 and 2 to register the Light, Webcam, and Trip Sensor.

(1 Mark)

Step 2 – Add Conditions in the Registration Server


You will add conditions in the registration server so that when either the Motion Detector or Trip Sensor is
activated, the directed light and the webcam are turned on.

● Log in to the registration server using the username/password you created.


Do you see four IoT devices listed? - Yes.

● Click Conditions and add following three conditions:


1. Name it LightsOn1, if MD status On is true, then set Directed Light status to On AND set CAM status
On to true.
2. Name it LightsOn2, if TS status On is true, then set Directed Light status to On AND set CAM status
On to true.
3. Name it LightsOff, if both MD status On is false AND TS status On is false, then set Directed Light
status to Off AND set CAM status On to false.

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

4. Test the conditions.


Hold the ALT key and move the mouse over Motion Detector. Are Directed Light and Webcam turned
on?
- Yes.

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Move the mouse away and wait for a few seconds. Are Directed Light and Webcam turned off?
- Yes.

(0.5 Mark)

Step 3 – Configure Strong Authentication to Network Devices


● You will configure strong authentication for a wireless connection on the WH gateway device:
1. Within the warehouse, click on the WH Gateway device. Under the Config tab, Wireless option, set
the SSID to WhGateway1, set Authentication to WPA2-PSK with Pass Phrase as IoTWh001. Leave
Encryption Type as AES.
2. Click on the Laptop. Under the Config tab, Wireless0 option, set the SSID to WhGateway1, set
Authentication to WPA2-PSK with Pass Phrase as IoTWh001. Leave Encryption Type as AES.
Does the laptop connect to WH Gateway successfully?
- Yes.

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

● On the warehouse router, configure a banner to display a warning message for unlawful access. Although
a banner message is not a security measure by itself, it may function as a deterrence to intruders. Set an
encrypted password to enter the Exec mode. Set up a local user account for the console line and remote
access.
1. Click the Warehouse 2911 router, then click the CLI tab and enter these commands:
Warehouse> enable
Warehouse# config terminal
Warehouse(config)# banner login %Login with valid password%
Warehouse(config)# banner motd %Authorized Access Only! Unauthorized access is subject
to Federal Prosecution.%
Warehouse(config)#

2. Set a secure Exec mode password:


Warehouse(config)# enable secret AbcWh001
Warehouse(config)# exit

3. Set a local username for the console line and VTY lines access:
Warehouse# configure terminal
Warehouse(config)# username WhAdmin secret AbcLine001
Warehouse(config)# line console 0
Warehouse(config-line)# login local
Warehouse(config-line)# exit
Warehouse(config)# line vty 0 4
Warehouse(config-line)# login local
Warehouse(config-line)# end
Warehouse#

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

(0.5 Mark)

Step 4 – Configure Access Lists to Restrict Traffic between ABC Company IoT
devices and the Cloud Service Provider Network
● On the warehouse router, configure and apply access list 10 to allow traffic from only the DNS server and
the registration server to enter the ABC Company warehouse IoT devices network:
Warehouse# configure terminal
Warehouse(config)# access-list 10 permit host 172.18.1.5
Warehouse(config)# access-list 10 permit host 209.165.201.5
Warehouse(config)# interface g0/2
Warehouse(config-if)# ip access-group 10 out
Warehouse(config-if)# end
Warehouse#

● On the Cloud Service Provider router, configure and apply an access list 110 to allow traffic from only the
ABC Company warehouse IoT devices network to access the registration server:
CSP# configure terminal
CSP(config)# access-list 110 permit ip host 209.165.200.226 host 209.165.201.5
CSP(config)# access-list 110 deny ip any host 209.165.201.5
CSP(config)# access-list 110 permit ip any any
CSP(config)# interface g0/0
CSP(config-if)# ip access-group 110 out
CSP(config-if)# end
CSP#

In the ACL 110, why is the warehouse router interface IP address selected as the source in the ACL 110?
- Because this IP address is used in NAT as the inside global IP address.
(1 Mark)

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Step 5 – Configure Secure Web Communication to the Web Server in the


Cloud Service Provider Network
● The ABC Company uses the web server in the cloud service provider for part of its operation. Configure
the web server in the cloud service provider network to be accessed only via HTTPS:
1. Click CSP Svr, then click the Services tab.
2. Click HTTP on the left pane. Make certain that HTTP is off and HTTPS is on.

Step 6 – Test
● From the laptop in the warehouse network, access the registration server. Trigger either the motion
detector or trip sensor, and observe the action of the directed light and webcam

● From PC1 or PC2, open the web browser. Can it access the registration server? - No.

● From PC1 or PC2, open the web browser. Can it access the web server 209.165.201.3 via HTTP? - No.

● From PC1 or PC2, open the web browser. Can it access the web server 209.165.201.3 via HTTPS? – Yes

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL


CONFIDENTIAL NOV 2023/ECE523

Reflection
What security measures are implemented?
- Hardening of network devices, secure wireless access and ACLs.
What other security measures should be considered when deploying IoT solutions with cloud computing?
 User awareness: Conduct regular security training for employees to enhance security awareness.
 Device Updates: Manufacturers should release frequent small patches instead of substantial updates.
 Built-in Security Patches: Manufacturers should prioritize security software updates.
 Monitor Data Flow: Use cloud-based solutions to enhance security at the edge.
 Secure Passwords: Use strong passwords for both IoT devices and linked cloud services.
 Application Security Best Practices: Employ code or application security best practices.

(4 Marks)

© Hak Cipta Universiti Teknologi MARACONFIDENTIAL

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy