6CS026 Systems Architecture and Internet of Things

Assignment Help Computer Engineering
Reference no: EM132415691

6CS026 - Systems Architecture and Internet of Things - University of Wolverhampton

Assignment - Development of protocols, which operate at different levels within the Internet of Things

The IoT Project will contain an account of work you have done around one of two tasks. Each is concerned with the development of protocols, which operate at different levels within the Internet of Things. Whichever task you work on, your work will have taken part in two stages.

Stage One:
Working as a group with others working on the same protocol, you will define the specifics of the protocol concerned (state diagrams, tokens, etc.) and produce a specification as a group. Each individual member of the group will submit the common document in their own portfolio, along with a short narrative detailing their part of the development.

Stage Two:
Working individually, you will develop code to implement a part of the agreed protocol (for instance, the protocol component for a single actor) to run on the NodeMCU hardware or internet connected computers, as appropriate. If successful, the different implementations from different members of the group should work together.

The two protocols to be developed are based on two research papers. Successful implementations will be included as part of a further research paper, and the authors of those implementations will be credited as a joint author of the paper.

The protocols to be developed are:

1. The ‘Level Directed Graph' sensor network building protocol, as outlined in attached research paper 1.
2. A protocol for Rights Management in the Internet of things, as outlined in attached research paper 2.

Assignment Tasks

For the IoT project, the main submission is a single individual report consisting of five parts as follows:

Part One

The protocol specification, that you developed with your group. This should include:

1. A brief introduction, which will specify the purpose of the protocol, and the lower level protocols (for example, UDP or HTTP) on which it depends and any reference documents.
2. A list of the actors in the protocol.
3. A definition of all dialogues within the protocol, including for each a textual description and a state diagram.
4. A specification of all symbols and tokens used within the protocol.

The size of the document for part one will be no larger than required to define the protocol. It will be written in a technical report style.

The group may submit a draft of Part One in week 7 of the module for formative feedback.

Part Two
A reflective narrative, detailing your own part in the development of the protocol. This is a personal statement and would usually be written in the first person. It should be no longer than 500 words.

Part Three
This will be an individual report, detailing the design and implementation of the code for what you have written to implement the part of the protocol that you were working on. It should be no longer than 1000 words.

Part Four
For part four of the IoT project, you should submit the code that you have written.

Part Five
This is a group report about the testing of the protocol code produced by members of the group. It should be no longer than 1000 words.

Learning Outcomes

LO1 - Design, implement and test secure embedded systems including secure communications. It is expected that evidence for attainment of this learning outcome will be found in parts one (design), three, four (implement) and five (test).

LO2 - Evaluate and select routing protocols for practical tasks. It is expected that evidence for attainment of this learning outcome will be found in part one.

LO3 - Demonstrate an understanding of complex control systems, such as those required in industrial robotics. It is expected that evidence for the attainment of this learning outcome will be found in parts three and four, showing that the design and implementation of the code is likely to perform sufficiently well and predictably for use by control systems.

LO4 - Apply control and communication systems to Internet of Things and Cyber-physical Systems

Attachment:- Systems Architecture and Internet of Things.rar

Reference no: EM132415691

Questions Cloud

Causes and effects of a possible recession : Please discuss with the causes and effects of a possible recession in the next few years and suggest steps that will enable an economic recovery.
How do healthcare marketers consider external stakeholders : How do healthcare marketers consider external stakeholders (legislators, public health officials, etc.) in their marketing efforts?
What is soft balancing : What is soft balancing? Critics argue that soft balancing, as a foreign policy strategy, is ineffective. what are your thoughts?
What are two important court cases : What are two important court cases that relate to the Fourth Amendment? How are those cases related to the fourth amendment?
6CS026 Systems Architecture and Internet of Things : 6CS026 Systems Architecture and Internet of Things Assignment Help and Solution, University of Wolverhampton - Assessment Writing Service
Create international monetary regime : Toward the end of World War II, allied states gathered in Bretton Woods to create international monetary regime.
What is international law : International law is often criticized as ineffective because of the difficulty associated with enforcement. What is international law?
What is counterinsurgency : What is counterinsurgency? What are the main goals, strategies, and tactics of counterinsurgency?
What is enterprise risk management : What is Enterprise Risk Management? What are the key factors that contribute to an effective risk management program?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd