Intrusion detection system | Good Grade Guarantee!
intrusion detection systemanswers for the whole assessmentFigure 1 depicts an intrusion detection system composed of a motion sensor, MCU controller, an alarm, a webcam, and an RGB LED light. When a movement is detected, the alarm goes off; the camera switches on; and the light goes red, green, and amber successively.
Build in Packet tracer the system in Fig. 1-a. You must submit the pkt file together with your coursework. (7%)Demonstrate the behaviour of the system using simulation screenshots. (3%)Exercise 2: Smart home (15%)Learning outcomes assessed: LO1 & LO4
Consider the IoT system in Fig. 2. It allows a user to control the IoT devices in their home and their office using a PC at the office or remotely via a smartphone. The IoT devices include a webcam, a motion sensor, a coffee machine and 2 lamps (light). These devices are registered with an IoT server located the cloud. The system enables to monitor and control the IoT devices from a smartphone via a 3G cellular network. Indeed, each of these IoT devices can be turned on/off from a smartphone. In addition, the IoT server is configured so that the webcam and lamp automatically turn on when the motion sensor detects a movement in the home.
Fig. 2: Smart home
Create the IoT system shown in Fig. 2 in Packet Tracer. You must submit the pkt file together with your coursework. (10%)Show by simulation that the user can control the IoT devices from a smartphone and the office PC. (3%)Show by simulation that the webcam and the lamp turn on when the motion sensor detects a movement. (2%)Exercise 3: Data Analytics and Visualisation (30%)Learning outcomes assessed: LO2 & LO3
Trend Analytics and content analytics are 2 types of data analytics. Compare their analytics capabilities based on a critical review of the literature, with clear references. (10%) 300 words excluding references.Give critical review of common data visualisation techniques for IoT systems. (10%) 300 words excluding references.Consider a popular football stadium that hosts a derby match for local rivals. It is important that fans are kept safe and the match ends with minimal disruption. The stadium management uses video cameras to capture audio, images, and images in strategic places inside and outside the stadium. The aim is to use the resulting data to identify in a timely fashion, incidents that may lead to disruptions – fights, abuse, or stampedes and notify the stewards.What analytics capabilities are needed to realize the solution? (4%)What analytics type should be implemented? (3%)What combination of tools can be used to implement the solution? (3%)Learning outcomes assessed: LO1, LO2, LO3 & LO4
Propose your own IoT system for a specific application. This must not be a close version of any of the systems described in this coursework. Give a detailed description of the functionalities of your system. (3%)Give a detailed critical literature review of existing related systems with clear references, and demonstrate the novelty of your proposed system. (5%) 600 words excluding references.Identify and justify the technologies needed for the implementation of the proposed IoT system. (2%)Implement your system in Packet Tracer. You must submit the pkt file together with your coursework. (5%)Give the simulation in Packet Tracer (screenshots) of the main functionalities of your system. (2%)Identify and justify the data analytics and visualisation techniques that apply to your proposed system. (3%)Exercise 5: Modelling and Analysis (20%)Learning outcomes assessed: LO1 & LO4
A Simple Infostation-based Communication SystemAn infostation system is an infrastructural system concept that provides many-time, many-where wireless data services. This case study is a simple context-aware infostation-based system, which allows users to exchange text messages using mobile devices such as laptops, smart phones or tablet computers. Typically, an infostation system comprises one central infostation centre (ISC) and many wireless access points, called infostations (ISs), deployed at key positions to maximise coverage. The ISs are physically connected to the ISC via network cables.
In this example we consider a university that has 2 campuses A and B. Each campus has its own infostation system (with one ISC and many ISs). The ISCs of the 2 campuses are physically connected by cables to a network hub to enable users located at different campuses to exchange messages, as depicted in Fig. 3.
An infostation is aware of any mobile device within its range and is able to interact with the device, e.g. by exchanging messages. A user within the range of an infostation can send or receive text messages using a mobile device. For the sake of simplicity, we assume that a text message has the following format: (sender, recipient, message). E.g. send(bob, alice, hello) means bob is the sender, alice the recipient and hello the message.
Once an infostation receives a text message, it checks if the recipient is within range in which case it forwards the message to the recipient. If the recipient is not within the range of that infostation, the infostation forwards the message to the infostation centre it is connected to.
An infostation centre is aware of all the infostations connected to it and subsequently of all the devices within the ranges of these infostations. However, an infostation centre has direct communications only with the infostations and the network hub connected to it. When an infostation centre receives a text message from an infostation, it looks for the infostation where the recipient is located and forwards the message to this infostation. The infostation where the recipient is located then forwards the request to the recipient mobile device. If the recipient is not found in one campus, the message is forwarded via the network hub to the infostation centres of the other campus for delivery.
When the network hub receives a message from one ISC, it sends the message to the other ISC.
What to DoYou are required to model the Simple Infostation-based Communication System in the Calculus of Context-aware Ambients (CCA) and to analyse this model using the CCA simulator ccaPL. We assume there are four ISs and one ISC in each campus, named as in Fig. 3 (IS1a, IS1b, …) and two user mobile devices (Bob’s and Alice’s). Each of these entities and the network hub can be modelled as an ambient in CCA. We say that a user’s mobile device is in the rangeof an infostation IS if the ambient modelling that mobile device is a child ambient of the ambient representing the infostation IS.
Answer the questions 1) to 8).
ModellingGive a ccaPL specification of the ambient modelling the infostation IS1a. (2%)Give a ccaPL specification of the ambient modelling the infostation IS2a. (1%)Give a ccaPL specification of the ambient modelling the infostation centre ISC1. (2%)Give a ccaPL specification of the ambient modelling the infostation centre ISC2. (1%)Give a ccaPL specification of the ambient modelling the network hub. (2%)AnalysisAssume Bob is initially in the range of the infostation IS1a in the Campus A. He then moves from IS1a to IS1d, sends a hello message to Alice, and finally moves to IS1c. In the meantime, Alice is in the range of the infostation IS2b in the Campus B, but on the move to IS2c and then to IS2a. She will receive Bob’s message at some point during this journey. For simplicity, it is assumed that a single ambient called bob represents Bob and his mobile device. Similarly, Alice and her mobile device are modelled as a single ambient alice.
Give the specification of the ambient representing Bob’s mobile device. (3%)Give the specification of the ambient representing Alice’s mobile device. (3%)Give the simulation results of the system for the scenario described above. These results must include: (i) the listing of the execution output; (ii) the corresponding communication graph; (iii) the corresponding behaviour graph; and (iv) a clear explanation of the execution output. (4×1.5% = 6%)d
QUALITY: 100% ORIGINAL – NO PLAGIARISM.
- **REMEMBER TO PRECISE PAGE NUMBER**
- Hit The Order Button To Order A **Custom Paper**