0% found this document useful (0 votes)
114 views29 pages

CS432 - Research Assignment - 2023 v1

This document outlines an assignment for students to complete a literature review on a topic related to networks and data communications. It provides 20 contemporary issues that could be reviewed and lists relevant IEEE publications for each topic. The deliverables include an abstract, introduction, main content organized into subtopics, conclusion and recommendations, and references. Guidelines are provided on how to perform the literature review, including reading the source material, identifying the research question, searching related literature, evaluating sources, summarizing and comparing studies, identifying areas for future research, and writing the review while citing sources. Students will work in groups of 2-3 people maximum on the assignments. The report will be graded using a rubric that evaluates the organization, content, writing skills
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views29 pages

CS432 - Research Assignment - 2023 v1

This document outlines an assignment for students to complete a literature review on a topic related to networks and data communications. It provides 20 contemporary issues that could be reviewed and lists relevant IEEE publications for each topic. The deliverables include an abstract, introduction, main content organized into subtopics, conclusion and recommendations, and references. Guidelines are provided on how to perform the literature review, including reading the source material, identifying the research question, searching related literature, evaluating sources, summarizing and comparing studies, identifying areas for future research, and writing the review while citing sources. Students will work in groups of 2-3 people maximum on the assignments. The report will be graded using a rubric that evaluates the organization, content, writing skills
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

CS 432: Networks and Data Communications

Technology Research Assignment


Date: April 20, 2022

PART A: LITERATURE REVIEW ASSIGNMENT


TASK

This will be based on selected topics in Networks and Data Communications. The essence of this
assignment is to enable students to explore relevant contemporary networking issues on their own,
which otherwise would not have been covered due to time and other constraints. It also inculcates
the attitude of researching technology issues in students and prepares them to meet real-life
situations which may require them to learn about totally new and emerging technologies and make
presentations on them and use them in live networks. All presentation slides from the class (various
teams) will be shared with the class to be used as a learning resource.
20 contemporary issues in data communications and networks

1. Cybersecurity threats and vulnerabilities


2. Privacy concerns and data protection laws
3. Internet of Things (IoT) security challenges
4. Cloud computing and network virtualization
5. 5G and the future of wireless networks
6. Network neutrality and internet governance
7. Internet censorship and freedom of speech
8. Big data and data analytics
9. Artificial intelligence (AI) and machine learning (ML) in networking
10. Blockchain technology and distributed ledgers
11. Quantum computing and its impact on network security
12. Network congestion and quality of service (QoS)
13. Network scalability and management
14. Network latency and packet loss
15. Software-defined networking (SDN) and network function virtualization (NFV)
16. Network automation and orchestration
17. Wireless spectrum allocation and management
18. Network automation and orchestration
19. Internet Protocol (IP) addresses exhaustion and IPv6 adoption
20. Network interoperability and standards.

Here are some IEEE publications related to the 20 contemporary issues in data communications and
networks:
1. Cybersecurity threats and vulnerabilities - IEEE Security & Privacy
2. Privacy concerns and data protection laws - IEEE Security & Privacy
3. Internet of Things (IoT) security challenges - IEEE Internet of Things Journal
4. Cloud computing and network virtualization - IEEE Cloud Computing
5. 5G and the future of wireless networks - IEEE Communications Magazine
6. Network neutrality and internet governance - IEEE Communications Magazine
7. Internet censorship and freedom of speech - IEEE Internet Computing
8. Big data and data analytics - IEEE Transactions on Big Data
9. Artificial intelligence (AI) and machine learning (ML) in networking - IEEE Transactions
on Network Science and Engineering
10. Blockchain technology and distributed ledgers - IEEE Transactions on Dependable and
Secure Computing
11. Quantum computing and its impact on network security - IEEE Transactions on Quantum
Engineering
12. Network congestion and quality of service (QoS) - IEEE Transactions on Network and
Service Management
13. Network scalability and management - IEEE Transactions on Network and Service
Management
14. Network latency and packet loss - IEEE/ACM Transactions on Networking
15. Software-defined networking (SDN) and network function virtualization (NFV) - IEEE
Transactions on Network and Service Management
16. Network automation and orchestration - IEEE Transactions on Network and Service
Management
17. Wireless spectrum allocation and management - IEEE Transactions on Wireless
Communications
18. Network automation and orchestration - IEEE Transactions on Network and Service
Management
19. Internet Protocol (IP) address exhaustion and IPv6 adoption - IEEE Communications
Magazine
20. Network interoperability and standards - IEEE Communications Magazine

Note that there are many other IEEE publications related to these issues, and this is just a selection
of examples.

Sure, here are two IEEE publications for each of the 20 contemporary issues in data
communications and networks:

1. Cybersecurity threats and vulnerabilities

 IEEE Security & Privacy


 IEEE Transactions on Dependable and Secure Computing

2. Privacy concerns and data protection laws


 IEEE Security & Privacy
 IEEE Transactions on Information Forensics and Security

3. Internet of Things (IoT) security challenges

 IEEE Internet of Things Journal


 IEEE Transactions on Information Forensics and Security

4. Cloud computing and network virtualization

 IEEE Cloud Computing


 IEEE Transactions on Cloud Computing

5. 5G and the future of wireless networks

 IEEE Communications Magazine


 IEEE Transactions on Wireless Communications

6. Network neutrality and internet governance

 IEEE Communications Magazine


 IEEE Transactions on Network and Service Management

7. Internet censorship and freedom of speech - IEEE Internet Computing

 IEEE Internet Computing


 IEEE Transactions on Information Forensics and Security

8. Big data and data analytics

 IEEE Transactions on Big Data


 IEEE Transactions on Knowledge and Data Engineering

9. Artificial intelligence (AI) and machine learning (ML) in networking

 IEEE Transactions on Network Science and Engineering


 IEEE Transactions on Cognitive Communications and Networking

10. Blockchain technology and distributed ledgers

 IEEE Transactions on Dependable and Secure Computing


 IEEE Transactions on Services Computing

11. Quantum computing and its impact on network security

 IEEE Transactions on Quantum Engineering


 IEEE Journal on Selected Areas in Communications

12. Network congestion and quality of service (QoS)

 IEEE Transactions on Network and Service Management


 IEEE Journal on Selected Areas in Communications

13. Network scalability and management

 IEEE Transactions on Network and Service Management


 IEEE Journal on Selected Areas in Communications

14. Network latency and packet loss

 IEEE/ACM Transactions on Networking


 IEEE Transactions on Network and Service Management

15. Software-defined networking (SDN) and network function virtualization (NFV)

 IEEE Transactions on Network and Service Management


 IEEE Network Magazine

16. Network automation and orchestration

 IEEE Transactions on Network and Service Management


 IEEE Network Magazine

17. Wireless spectrum allocation and management

 IEEE Transactions on Wireless Communications


 IEEE Communications Magazine

18. Internet Protocol (IP) address exhaustion and IPv6 adoption

 IEEE Communications Magazine


 IEEE Transactions on Network and Service Management

19. Network interoperability and standards

 IEEE Communications Magazine


 IEEE Transactions on Network and Service Management

20. Network function virtualization (NFV)

 IEEE Transactions on Network and Service Management


 IEEE Communications Magazine
Note that these publications may cover multiple topics, but they are particularly relevant to the
specific issues listed above.

DELIVERABLES

 Abstract [4]
 Introduction [5]
 The main content and organization: This may be organized into appropriate subtopics.
[21]

Performing a literature review of a journal article involves critically analyzing and summarizing the
existing research on a specific topic. Here are some steps to follow:

1. Read the article thoroughly: Start by reading the journal article carefully, and making notes
on the key points, arguments, and findings presented.
2. Identify the research question or topic: Determine the main research question or topic that
the article addresses. This will help you focus your literature review and identify relevant
studies.
3. Conduct a search for related literature: Use databases such as Google Scholar, JSTOR, or
PubMed to search for related literature on the topic. Look for studies that support or
contradict the claims made in the article you are reviewing.
4. Evaluate the sources: Read through the studies you have found and evaluate their quality
and relevance. Check that they are recent, peer-reviewed, and published in reputable
journals.
5. Summarize the literature: Organize the literature you have found into categories or themes,
summarizing the main findings and arguments of each study. Be sure to include both
supporting and opposing viewpoints.
6. Compare and contrast the studies: Analyze the similarities and differences between the
studies you have reviewed, noting any gaps or inconsistencies in the research.
7. Identify areas for future research: Based on your analysis of the literature, identify areas for
future research and suggest how the article you are reviewing can contribute to this research.
8. Write the literature review: Finally, write your literature review, organizing your summary
and analysis of the literature into a clear and concise narrative that supports your argument
and research question.

Remember to cite all sources properly and adhere to any formatting or citation requirements
specified by your instructor or the journal you are submitting to.

 Conclusion and Recommendations: [5]


 Overall writing showing clarity, conciseness, concreteness, coherence, and context,
coupled with correct referencing, will be rewarded. [5]
 References
 You are required to work in groups of a maximum of 3 students (max), 2 students per group are
required, but if a student cannot get a partner for this project, he/she will be asked to join
another group.

GRADING CRITERIA

HOLISTIC RUBRIC FOR TECHNICAL REPORT ASSESSMENT

Here's a grading rubric for a literature review report:

1. Organization (20%)

 The report has a clear structure, with an introduction, body, and conclusion
 The report is well-organized, with ideas presented in a logical and coherent manner
 The report has clear and concise headings and subheadings that help guide the reader

2. Research (30%)

 The report demonstrates a thorough understanding of the research topic


 The report includes a comprehensive and diverse range of sources, with a mix of primary
and secondary sources
 The report is up-to-date, with recent research included

3. Analysis (30%)

 The report provides a critical analysis of the literature, with key themes, similarities, and
differences identified and discussed
 The report demonstrates the ability to synthesize and integrate information from different
sources
 The report offers a clear and well-supported argument, with evidence drawn from the
literature

4. Writing and Presentation (20%)

 The report is well-written, with clear and concise sentences and appropriate grammar and
spelling
 The report is visually appealing, with appropriate headings, formatting, and referencing
 The report adheres to any formatting or citation requirements specified by the instructor or
the target journal

The grading rubric can be customized to suit the specific requirements of the literature review
assignment and can be adjusted to include additional criteria or to assign different weights to each
category based on the instructor's preferences.
GROUP PROJECT PRESENTATION EVALUATION RUBRIC:
Criteria Excellent (5) Very Good (4) Good (3) Fair (2) Unsatisfactory (1)
The content is clear, The content is mostly The content is
The content is
thorough, and accurate, clear and accurate, confusing or The content is unclear,
generally clear and
and demonstrates a with some minor gaps inaccurate, and shows a inaccurate, or completely
accurate, but lacks
deep understanding of or oversights. All limited understanding irrelevant to the topic.
Content depth or has significant
the topic. All group group members of the topic. Some No group members
gaps. Some group
members contribute contribute to the group members contribute or the group is
members contribute
equally to the presentation, but some contribute very little or incomplete
more than others
presentation more than others not at all
The presentation is
The presentation is The presentation is
generally well- The presentation is
well-organized and somewhat The presentation is
organized, but may poorly organized, with
easy to follow, with a disorganized, with completely disorganized
lack a clear structure or little coherence or
clear introduction, unclear transitions or or lacks any discernible
flow in some areas. All logical structure. Some
body, and conclusion. confusing structure. structure. No group
Organization group members group members are not
All group members Some group members members are engaged in
participate in the engaged in the
participate in the are not fully engaged in the organization and
organization and organization and
organization and the organization and delivery of the
delivery of the delivery of the
delivery of the delivery of the presentation
presentation, but some presentation
presentation presentation
more than others
The group is generally
The group is confident, The group is hesitant or The group is very
confident and The group is completely
engaging, and speaks monotone at times, nervous, difficult to
engaging, but may lack unprepared, speaks
clearly and audibly, with some difficulty hear or understand, or
some clarity or use inaudibly, or shows
using appropriate body being heard or uses distracting or
distracting body complete disinterest in
Delivery language and eye maintaining audience inappropriate body
language. All group the presentation. No
contact. All group attention. Some group language. Some group
members participate in group members are
members participate in members are not fully members are not
the delivery of the engaged in the delivery
the delivery of the engaged in the delivery engaged in the delivery
presentation, but some of the presentation
presentation of the presentation of the presentation
more than others
Visual Aids The visual aids are The visual aids are The visual aids are The visual aids are No visual aids are used,
well-designed, generally appropriate, confusing or irrelevant, completely irrelevant, or they are completely
appropriate, and but may lack clarity or or detract from the confusing, or detract unusable or
effectively support the be somewhat content of the significantly from the inappropriate. No group
content of the distracting. All group presentation. Some content of the members participate in
presentation. All group members participate in group members are not presentation. Some the creation or use of
Criteria Excellent (5) Very Good (4) Good (3) Fair (2) Unsatisfactory (1)
group members are not
members participate in the creation and use of fully engaged in the
engaged in the creation
the creation and use of the visual aids, but creation and use of the visual aids
and use of the visual
the visual aids some more than others visual aids
aids
The group has some
The group works The group works well
The group works difficulty working The group is completely
together seamlessly, together, with each
together, but some together, with some unable to work together,
with each member member contributing to
members may members not with members not
contributing equally to the project and
contribute less than contributing or contributing or
Collaboration the project and presentation. The
others or have some communicating communicating, or
presentation. The group group communicates
communication or effectively, or experiencing significant
communicates well and effectively and
conflict-resolution experiencing conflict conflict that is not
resolves conflicts resolves conflicts with
issues that is not resolved resolved at all
effectively minimal issues
effectively
The presentation is
The presentation is The presentation is
The presentation is The presentation is completely
outstanding in all generally good, but
very good overall, but below average, with unsatisfactory in all
Overall aspects, and may have significant
may have some minor significant flaws or aspects, and
Impression demonstrates a high areas for improvement
flaws or areas for weaknesses that detract demonstrates a lack of
level of preparation and or lack a polished
improvement from its effectiveness preparation or
professionalism finish
professionalism
Guidelines on Giving Effective Presentations
A good technical presentation has the following properties:
 Good organization
o At the most basic level, you need an introduction, the body, and a conclusion
 Appropriate technical content, delivered at the appropriate depth and in a clear and
concise manner
o When you are delivering a talk to a technical audience (like to our class) the
audience wants and needs to know the technical details of your work in order to
fully understand and assess your work.  This is the “meat” of your presentation —
don’t leave it out! Make it absolutely clear what work is your own, and what you
are leveraging from others (e.g. libraries you are using)
o Obviously, you need to take into consideration the time available in deciding the
appropriate depth
o The fact that you are providing technical details does not mean you should lose
the audience in jargon.  Think about how to present the work for the audience to
understand.  The next point can be helpful in this regard.
 Useful and high quality visual aids
o Your slides should well organized, attractive, and make appropriate use of images,
figures, and text.  Convey the most important information and avoid excessive
text.
o Use appropriate visual aids to help convey technical details: images, graphs,
diagrams, charts, images, even animations. The use of videos is also sometimes
helpful.
o Avoid visual distractions: animated text and special effects are usually distracting
and unnecessary
o Ensure consistency in your slides: titles, font sizes, etc.  Ensure that any items in a
bulleted list are grammatically consistent and also use consistent punctuation.
E.g. You can have a list of nouns, a list of adjectives, a list of verbs, a list of
phrases, or a list of sentences.  You should not have a list in which some items are
nouns and other are sentences, or in which some items end with a period (full-
stop) and others don’t. 
o Number your slides to make it easy for a member of the audience to refer to a
specific slide when asking a question.
 Well-rehearsed but natural delivery
o Think ahead of time about who is presenting what, what you want to say on each
slide and how you want to say it, and practice!
o Do not read from your phone!
o Although your presentation should be well-rehearsed, you should deliver it in as
natural a manner as possible, well-paced, with appropriate pauses in speech, not
memorized and recited.
o Practice and ensure that you can give the presentation in the alloted time without
rushing but still conveying all the information you need to convey.

10
Grading Scale:

Grade Score Grade Point Description

A+ 85-100 4.00 Excellent

A 80-84 4.00 Excellent

B+ 75-79 3.50 Very Good

B 70-74 3.00 Very Good

C+ 65-69 2.50 Good

C 60-64 2.00 Satisfactory

D+ 55-59 1.50 Pass

D 50-54 1.00 Pass

E Below 50 0.00 Fail

I --- --- Incomplete

Explanation of Grading Criteria:

1. The thoroughness of research and analysis: The project should demonstrate a


comprehensive understanding of the topic through thorough research and analysis of
relevant data and sources.
2. A clear understanding of the topic and focus of the project: The project should have a
clear and concise understanding of the topic and focus.
3. Quality and relevance of information presented: The project should present high-quality,
relevant information that supports the topic and purpose of the project.
4. Originality and creativity: The project should demonstrate originality and creativity in the
topic and information presentation approach.
5. Coherence and structure of the project: The project should have a logical and coherent
structure that effectively communicates the purpose and content of the project.
6. Clarity and precision of writing: The project should be well-written with clear and precise
language that effectively communicates the content of the project.
7. Effectiveness of visual aids (if any): The project should effectively utilize visual aids,
such as charts, graphs, or diagrams, to support the content of the project.
8. Delivery and communication skills: The project should be effectively presented, with
clear and articulate delivery, and demonstrate effective communication skills.

11
9. Thoroughness of research and analysis: The project should demonstrate a comprehensive
understanding of the topic through thorough research and analysis of relevant data and
sources.
10. Clear understanding of topic and focus of project: The project should have a clear and
concise understanding of the topic and focus of the project.
11. Quality and relevance of information presented: The project should present high-quality,
relevant information that supports the topic and purpose of the project.
12. Originality and creativity: The project should demonstrate originality and creativity in the
approach to the topic and in the presentation of information.
13. Coherence and structure of the project: The project should have a logical and coherent
structure that effectively communicates the purpose and content of the project.
14. Clarity and precision of writing: The project should be well-written with clear and precise
language that effectively communicates the content of the project.
15. Effectiveness of visual aids (if any): The project should effectively utilize visual aids,
such as charts, graphs, or diagrams, to support the content of the project.
16. Delivery and communication skills: The project should be effectively presented, with
clear and articulate delivery, and demonstrate effective communication skills.

Note that the grading rubric can be modified to fit the specific requirements and expectations of
the project and the instructor.

12
Part B: WIRESHARK

Wireshark NAT trace for Examinations

Open the NAT_home_side file and answer the following questions. You might find it useful
to use a Wireshark filter so that only frames containing HTTP messages are displayed from
the trace file.
1. What is the IP address of the client?
2. The client actually communicates with several different Google servers in order to
implement “safe browsing.” (See extra credit section at the end of this lab). The main
Google server that will serve up the main Google web page has IP address
64.233.169.104. In order to display only those frames containing HTTP messages
that are sent to/from this Google, server, enter the expression “http && ip.addr ==
64.233.169.104” (without quotes) into the Filter: field in Wireshark .
3. Consider now the HTTP GET sent from the client to the Google server (whose IP
address is IP address 64.233.169.104) at time 7.102967. What are the source and
destination IP addresses and TCP source and destination ports on the IP datagram
carrying this HTTP GET?
4. At what time is the corresponding 200 OK HTTP message received from the Google
server? What are the source and destination IP addresses and TCP source and
destination ports on the IP datagram carrying this HTTP 200 OK message?
5. Recall that before a GET command can be sent to an HTTP server, TCP must first set
up a connection using the three-way SYN/ACK handshake. At what time is the client-
13
to-server TCP SYN segment sent that sets up the connection used by the GET sent at
time 7.102967? What are the source and destination IP addresses and source and
destination ports for the TCP SYN segment? What are the source and destination IP
addresses and source and destination ports of the ACK sent in response to the SYN.
At what time is this ACK received at the client? . (Note: to find these segments you
will need to clear the Filter expression you entered above in step 2. If you enter the
filter “tcp”, only TCP segments will be displayed by Wireshark).

In the following we’ll focus on the two HTTP messages (GET and 200 OK) and the TCP SYN
and ACK segments identified above. Our goal below will be to locate these two HTTP
messages and two TCP segments in the trace file (NAT_ISP_side) captured on the link
between the router and the ISP. Because these captured frames will have already been
forwarded through the NAT router, some of the IP address and port numbers will have been
changed as a result of NAT translation.

Open the NAT_ISP_side. Note that the time stamps in this file and in NAT_home_side are not
synchronized since the packet captures at the two locations shown in Figure 1 were not
started simultaneously. (Indeed, you should discover that the timestamps of a packet
captured at the ISP link is actually less that the timestamp of the packet captured at the
client PC).
6. In the NAT_ISP_side trace file, find the HTTP GET message was sent from the client
to the Google server at time 7.102967 (where t=7.102967 is time at which this was
sent as recorded in the NAT_home_side trace file). At what time does this message
appear in the NAT_ISP_side trace file? What are the source and destination IP
addresses and TCP source and destination ports on the IP datagram carrying this
HTTP GET (as recording in the NAT_ISP_side trace file)? Which of these fields are the
same, and which are different, than in your answer to question 3 above?
7. Are any fields in the HTTP GET message changed? Which of the following fields in
the IP datagram carrying the HTTP GET are changed: Version, Header Length, Flags,
Checksum. If any of these fields have changed, give a reason (in one sentence)
stating why this field needed to change.
8. In the NAT_ISP_side trace file, at what time is the first 200 OK HTTP message
received from the Google server? What are the source and destination IP addresses
and TCP source and destination ports on the IP datagram carrying this HTTP 200 OK
message? Which of these fields are the same, and which are different than your
answer to question 4 above?
9. In the NAT_ISP_side trace file, at what time were the client-to-server TCP SYN
segment and the server-to-client TCP ACK segment corresponding to the segments
in question 5 above captured? What are the source and destination IP addresses
and source and destination ports for these two segments? Which of these fields are
the same, and which are different than your answer to question 5 above?

Figure 4.22 in the text shows the NAT translation table in the NAT router.

14
10. Using your answers to 1-8 above, fill in the NAT translation table entries for HTTP
connection considered in questions 1-8 above. Answer:

NAT translation table


WAN side LAN side

Extra Credit: The trace files investigated above have additional connections to Google
servers above and beyond the HTTP GET, 200OK request/response studied above. For
example, in the NAT_home_side trace file, consider the client-to-server GET at time
1.573215, and the GET at time 7.573305. Research the use of these two HTTP messages
and write a half page explanation of the purpose of each of these messages.

15
PART C: CISCO PACKET TRACER PROJECT

Project Title: Smart Home Automation System


Project Description:

In this project, we will simulate a smart home automation system using Cisco Packet Tracer. The
system will consist of various IoT devices such as smart bulbs, smart switches, and a smart
thermostat. The devices will be connected to a local Wi-Fi network and controlled by a
smartphone app.

Many of us are away from our homes throughout the day, whether for work or running errands.
Some of us usually spend a day out or even leave our house unaccounted for a few days, leaving
our electronic appliances without monitoring or control. And due to human errors, we sometimes
leave devices plugged into the power sockets, and some devices need to work automatically
depending on the environment. All devices need individual attention from time to time to
operate. If some devices are not operated properly could consume electricity causing higher bills
or damage/ harm the room environment. So, I propose to design an internet-based home
automation system that will enable us to manage our appliances from anywhere around the world
remotely.

Project Steps:

Step 1: Set up the network Create a network topology in Packet Tracer consisting of a Wi-Fi
router, several IoT devices (smart bulbs, switches, and a thermostat), and a smartphone.

Step 2: Configure the network Configure the Wi-Fi router with an SSID and password.
Configure the IoT devices to connect to the Wi-Fi network. Configure the smartphone with the
app to control the IoT devices.

Step 3: Set up the smart bulbs and switches Configure the smart bulbs and switches to respond to
commands from the smartphone app. Configure the switches to turn the bulbs on and off.
Configure the bulbs to change colors and brightness levels.

Step 4: Set up the smart thermostat Configure the smart thermostat to respond to temperature
changes in the room. Configure the thermostat to adjust the temperature automatically based on
pre-set preferences.

Step 5: Test the system Test the system by controlling the IoT devices from the smartphone app.
Test the smart thermostat by changing the temperature and observing its response.

Step 6: Add additional features Add additional features to the system, such as voice control or
scheduling of the IoT devices.

Platform/Environment and Software/Hardware Requirements

16
Home Automation is a wireless home automation system that is supposed to be implemented in
existing home environments without any changes in the infrastructure. Home Automation lets
the user control the home from his or her computer and assignations that should happen
depending on time or other sensor readings such as light, temperature, or sound from any device
in the Home Automation network.

Concepts of Data Communications and Networks covered in the project include the
following:

1) ISP setting
2) Configuring servers for a remote device like a laptop
3) Connecting all home devices
4) Home gateway with multiple smart things connected
5) IoE server that provides IoT functionalities
6) IoT Functionalities to use as much as required

Functional Features

Home automation can help us:-


a) by remotely monitoring and controlling our appliances.
b) by improving home safety
c) by alerting any emergency
d) by saving and utilizing proper electricity according to the requirement.

Conclusion

Earlier home automation was powered using a supply and an Arduino chip, various sensors and
relay modules by creating an autonomous circuit that changes the environment. Arduino is an
open-source platform used for building electronics projects. Unlike most previous programmable
circuit boards, the Arduino does not need a separate piece of hardware (called a programmer) in
order to load new code onto the board.
With this project, we have successfully simulated a smart home automation system using
Cisco Packet Tracer. This system can be used to automate various tasks and improve the
efficiency and comfort of a home.

SAMPLE PROJECT FOR YOUR INSPIRATION

Sensors and components:-

No Devices Function
01 Router Used to interconnect home to cellular network.
02 Cable modem Used to connect home to the internet

17
03 Home gateway Used to register smart object and give IP address to
smart object
04 IOE Server To control smart things registered on it and
provide different server functionalities
05 Central Used to connect the cellular system to the router
office server
06 Smart door Connect to home getaway and provide Function
based event
07 Cell tower Provide cellular system coverage for a home user to
control the home appliance from a remote location
08 Smartphone Used to control the home from outside
09 Temperature Used to sense the temperature of the home.
Monitor
10 Smart window Used to control the window remotely Affects. When
the door is opened, those gases will decrease to a
maximum of 1% in total change
11 Solar Panel To generate electricity from sunlight in the daytime
and consume it at night.
12 Power Meter Read the power being transmitted on a line

13 Battery Send power to other devices

14 Motor A device that is powered by electricity to spin


motor shaft.
15 Heating element Increases the temperature by using power from
battery

HOME GATEWAY:-

18
Home Gateway have 4 Ethernet ports in addition to a wireless access point
configured with the "Home Gateway" SSID (see fig 2).To secure wireless
connection WEP / WPA-PSK / WPA2
enterprise can be configured on the home gateway. Figure 2 shows seven internet
of Things device connected to a Home Gateway by using Ethernet cable and
wireless. To connect the Home Gateway to the Internet its Internet WAN Ethernet
port available on home getaway. The IoE device can be remotely managed through
a web interface hosted by the Home Gateway. The Home Gateway internal (LAN)
IP address is 192.168.25.1, but it can also be accessed through its Internet-facing IP
address.

19
The above figure shows the smart object is connected to the home Gateway
using an Ethernet cable and wireless medium to manage the smart device
local and remotely. Home gateway also works as a DHCP server by
assigning IP addresses to each smart device that is connected to it.

Smart phone:-
Through this device, we can control and monitor the smart devices of the
home remotely by logging into the IOE server. We can set the algorithm or
conditions in the IOE server through the smartphone. The smartphone is
connected through a cell tower.

20
21
MECHANISM AND WORKING:

ISP Router Configuration


Router>
Router>enable
Router#conf terminal
Router(config)#hostname ISP
ISP(config)#intgigabitEthernet 0/2
ISP(config-if)#ip address 10.10.220.1 255.255.255.0
ISP(config-if)#no shutdown
ISP(config)#intgigabitEthernet 0/0
ISP(config-if)#ip address 209.165.200.225 255.255.255.224
ISP(config-if)#no shutdown
ISP(config)#intgigabitEthernet 0/1
ISP(config-if)#ip address 209.165.201.225 255.255.255.224
ISP(config-if)#no shutdown

Configurating dhcp server for cell and IOE device


ISP(config)#ipdhcp excluded-address 209.165.201.225 209.165.201.230
ISP(config)#ipdhcp pool cell
ISP(dhcp-config)#network 209.165.201.225 255.255.255.224
ISP(dhcp-config)#default-router 209.165.201.225
ISP(dhcp-config)#dns-server 10.10.220.10
ISP(config)#ipdhcp excluded-address 209.165.200.225 209.165.200.230
ISP(config)#ipdhcp pool ioe
ISP(dhcp-config)#network 209.165.200.224 255.255.255.224
ISP(dhcp-config)#default-router 209.165.200.225
ISP(dhcp-config)#dns-server 10.10.220.10
22
Register all IOT devices in IOT server:

click on the IOT devices->click on the config.->enter IOT server IP address,


username, password.

23
Enable DNS services like HTTP, DNS etc.
click on the DNS server->click on the sevice->enable different services like
HTTP, DNS etc.

24
Assign IP addresses to DNS and IOE server
statically

Now control and monitor the IOE devices after logging into the IOE server
from a smartphone or PC.

FUNCTIONALITIES:
Explain the deliverables of the project considering DCN concepts and theories.
25
Concepts of Data Communications and Networks covered in the project
 ISP setting
 Configuring servers for a remote device like a laptop
 Connecting all home devices
 Home gateway with multiple smart things connected
 IOE server that provides IOT functionalities
 IOT Functionalities
Output:

26
27
28
Cisco packet tracer also includes a microcontroller, which can communicate
between devices. We can use Python or Javascript language to program the
microcontroller. This way, if a microcontroller is used in the IOE system, it
will be faster and more reliable.

DELIVERABLES

a) For this project section, you will receive credit based on the number of
components included in your smart home automation systems and
configured correctly based on the sample project given above.
b) All groups must maintain a unique design for the smart homes with all the
IoT devices properly configured.
c) Grading criteria will be based on the evaluation criteria in the first section.

29

You might also like