Connect and activate the devices with username and password

Assignment Help Computer Engineering
Reference no: EM132218531

Task

Case Study: You have just joined Ingenious Design and Solutions as an IoT Network Design Engineer. Your first project is to setup an IoT Smart Office. Ingenious Design and Solutions has 2 offices. The main office is located in Sydney and the other at Bathurst. As a part of the project you are expected to create a smart office in Sydney with the criteria and devices given below.

The Main Smart Office at Sydney includes, but is not limited to the following smart devices all connected to the office wireless router:

Ceiling Fan
Windows (3 Numbers )
Front Door
Motion Detector
Lawn Sprinkler System
Smoke Detector
Temperature Monitor
Wind Speed Detector

The above smart devices are in the main office at Sydney. All the devices are connected through the office wireless router to the modem which in turn is connected to the Internet via the ISP Satras to the Remote Sever through the company's cloud cluster run by Sky servers. All the devices are registered on to the Remote Server. These devices should be controlled locally by a Tablet which is also connected to the wireless network.

Ensure that you add all necessary screenshots and embed your packet tracer file with the documentation to be presented to the manager for project approval.

Tasks:

Build and configure a smart office. (Refer to the file in the Student Resources Folder ITC560_Assignment_2_Help_file).

Save the file as StudentID_Firstname_ITC560.pkt (using your own student ID and first name).

All screenshots for each step with a brief explanation must be included in the document. Once the Assignment is complete, the student must embed the packet tracer file in the word document as StudentID_Firstname_ITC560.pkt and display as an icon. The word document with all screenshots and packet tracer file should be submitted.

Sydney Smart Office Design:

1. Add, connect, enable and configure the registration server, tablet and wireless router as shown in Figure 1 below.

2 a. Add, configure the smart devices mentioned in the case study and name these as given in Figure 1 below. Note that these devices should be wirelessly connected to a wireless router and should be encrypted using AES by using WPA-PSK (the pass phrase must only be your student ID).

2 b. Connect and activate the devices with username and password (use your for both Student ID). This is to ensure a unique login to the smart network. This is one of the most important requirements of the client.

3. Set up all the smart device attributes through the tablet web browser for the devices to work as shown in Figure 1 below.

Figure 1: Sydney Smart Office

4.Show the protocols that are used in transmitting a simple PDU from the tablet to the remote server (by going to the simulation mode) and record all the protocols that are used for transmission of the simple PDU when the packet is:

in progress; and
successfully delivered.
Control Sydney office Smart IoT Devices from Bathurst Office:

Figure 2: Control Smart Devices in Sydney Office from Bathurst Office

5. Add a new branch office at Bathurst. Either, use the same tablet you used for control in the Sydney office or use your smart phone and connect to the Remote Server you have set up earlier. You can use any connecting and intermediary devices of your choice.

6.Log on to the web browser on your tablet/smart phone and manage the devices as given below. Using the same tablet or new smart phone:

Turn off the Sprinkler

Turn off the ceiling fan

Lock the door

Close Window1 and Window2 when the carbon monoxide or carbon dioxide levels outside go high

Unlock Window3 when the CO2 level inside the office increases

Turn on the smoke alarm

Turn on the motion detector

Turn on the wind detector

This assessment task will assess the following learning outcome/s:

be able to explain and demonstrate various components of Internet of Things (IoT).

be able to analyse the role and importance of IoT in the modern world.

be able to investigate and propose various requirements of IoT for real world applications.

Reference no: EM132218531

Questions Cloud

How to develop financial statements : How to develop financial statements? How to develop a Balance Sheet, Profit and Loss Statement and Cash Flow Statement
Find the effective rate of the compound interest : Find the effective rate of the compound interest rate or investment. (Round your answer to two decimal places.)
Create an erd that represents the entities and attributes : Create an ERD that represents the entities, attributes, the relationships between entities, and the cardinality and optionality.
Describe the role arp cache plays in establishing address : Describe the role ARP Cache plays in establishing Address Resolution Protocol (ARP)?
Connect and activate the devices with username and password : Connect and activate the devices with username and password (use your for both Student ID). This is to ensure a unique login to the smart network.
Briefly describe the osi reference model : Briefly describe the OSI reference model and the TCP/IP networking model, use diagrams to show the relation between both these models.
Perform a cookie stealing attack : COIT20262 : For this question you must use virtnet (as used in the workshops) to perform a cookie stealing attack.
Design a basic test plan and then write the expected : Check your parameters and any functions you declared, insert const wherever appropriate to protect your code from future abuse.
Write a function matched that takes as input a string s : Write a function matched(s) that takes as input a string s and checks if the brackets "(" and ")" in s are matched.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd