Sie sind auf Seite 1von 46

PROJECT REPORT

ON

To build and implement a flexible and cost effective IOE based smart
home monitoring & controlling system using Cisco packet tracer
Submitted in partial fulfilment for the award of degree

Of

Bachelor of technology (hons.)

ELECTRONICS AND COMMUNICATION ENGINEERING

Of

NATIONAL INSTITUTE OF TECHNOLOGY

JAMSHEDPUR

By

RAVI KUMAR CHOUDHARY (2014UGEC065)

RAVI RANJAN (2014UGEC066)

RAVI KUMAR (2014UGEC093)


Under guidance of

Prof. DILIP KUMAR

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

NATIONAL INSTITUTE OF TECHNOLOGY

JAMSHEDPUR-831014

2018

i
NATIONAL INSTITUTE OF TECHNOLOGY
JAMSHEDPUR-831014

(DEEMED UNIVERSITY)

CERTIFICATE
This is to certify that the dissertation entitled “TO BUILD AND IMPLEMENT A
FLEXIBLE AND COST EFFECTIVE IOE/IOT BASED SMART HOME MONITORING &
CONTROLLING SYSTEM USING CISCO PACKET TRACER SIMULATOR” is carried out by

RAVI KUMAR CHOUDHARY (2014UGEC065)

RAVI RANJAN (2014UGEC066)

RAVI KUMAR (2014UGEC093)


B.tech(Hons.) students of N.I.T. Jamshedpur under my supervision and guidance. This
dissertation has been submitted in partial fulfilment of the award of degree of B.tech
(Hons.) at N.I.T. Jamshedpur.

No part of this project has been submitted for the award of any previous degree to
the best of my knowledge.

________________ ____________________
Prof. DILIP KUMAR Mrs. RASHMI SINHA
supervisor HOD
Dept. Of Electronics & communication Dept. Of Electronics &communication
Engg. N.I.T. Jamshedpur-831014 Engg. N.I.T. Jamshedpur-831014

ii
ACKNOWLEDGEMENT

First we would like to thank NIT JAMSHEDPUR for giving me an


opportunity to perform this project. I surely have learnt a lot of from here.
We encouraged brilliant practical learning which is impossible to achieve
through books. I hope for everything which we have learnt here will be
helpful in future.

With a great pleasure we would like to express my deep sense of gratitude


to PROF.DILIP KUMAR, Associate professor (ECE Dept.) for his
immense support and guidance. I would like to thank him for having
immense patience while teaching us about our project and spanning his
precious time for me.

We would also like to thank other faculties for providing us a great


opportunity to work on such an important project.

iii
May 2018

NATIONAL INSTITUTE OF TECHNOLOGY JAMSHEDPUR

JAMSHEDPUR-831014

Declaration

we hereby declare that work reported to this dissertation is


original and has been carried out by us independently in the
department of Electronics and Communication Engineering,
Natioanl Institute of Technology Jamshedpur under the
supervision of prof Dilip kumar. we also declare that work has
not formed the basis for the award of any other degree
Diploma or similar title of any university or institution.

________________ _________________ ___ ___________


Ravi kumar choudhary Ravi ranjan Ravi kumar
(2014UGEC065) (2014UGEC066) (2014UGEC093)

iv
Abstract:-

Smart home is a house that uses currently released IOE technology


to automate different activities of home. IOE devices connected to
the internet, to allow the distant monitoring and controlling of
different home appliances such as lighting, heating, cooling and
alarming. In this paper, I implemented smart home using new
released Cisco packet tracer simulation software, since different IOE
device used for home automation is included in this new version
simulator. The previous software has only networking device, but in
new released simulator IOE device is included those are sensor,
board, IOE device and Programming Languages with classically
networking device. To design smart home I used different device used
for home security, safety and home environment prosperity. The
fulfillment of this concept requires research in the areas of low-power
integrated circuits, embedded systems design, network protocols,
data analytics, artificial intelligence, and control theory, among
others. There has been much advancement in these areas, and the
realization of IoT is becoming increasingly probable. In this paper,
we discuss new perspectives in systems design under IoT, covering
the following key topics: IoT enablers, existing and novel IoT
applications, and current challenges in IoT. We first discuss the core
technology enablers that have brought us this far in IoT, focusing on
the hardware and networking advancements in recent years. Next, we
discuss some novel IoT applications that leverage on the technology
that is currently available. Finally, we explore some of the potential
challenges ahead in IoT. Our discussion seeks to define the IoT
foundation that can be built upon for future research in this domain.

v
CONTENTS

Title Page i
Certificate by the Supervisor ii
Acknowledgement iii
Declaration iv

Abstract v
Contents vi
Chapter 1 Introduction and Literature Review 1

1.1 introduction 1
1.2 what is IOT 2
1.3How does it works 3
1.4 Architechture of IOT 3
1.5 enabling technology for IOT 9
1.6 IOT solutions 12
1.7 IOT adoption barrier 16
1.8 Motivation 18
1.9 Literature survey 18

Chapter 2 Theoretical Study of proposed 21


security system

Chapter 3 Implementation of security system on 29


cisco packet tracer

Chapter 4 Results and Discussions 34


Chapter 5 Conclusions and Future Scope of Study 38
References
Appendix A
Appendix B
Appendix C

vi
vii
Chapter-1

1.1 Introduction :-
Smart home is a living home that include smartobject to improve home activities
in advance, that can be automating activities of home without users involvement
such monitoring home environment condition by various sensor (Temperature,
Humidity, smoke, wind, sound) then ventilate the environment based on sensor
information. Smart home can provide different function rather than providing
safety that is security by providing more automate security using different alarm
system such siren sound, LCD display and sending email to legitimate user if
security issue is detected by sensor. Home automation states managing and
controlling home objects by using micro-controller or computer technology.
Automation is popular because it provides ease, efficiency and secure
environment. In this paper all smart appliance is registered to home gateway and
controlled by legitimate person. Smart Home reduces user's involvement in
monitoring home settings and controlling home appliances by including different
sensor in home automation. This paper presents if smoke is detected the fire
sprinkler automatically on to ventilate the environment and window is open.
While the term “Internet of Things” (IoT) was first announced, the primary
question might be what is considered as “Things”. Till current years, groups of
scholars and organizations tried to make clear the definition of Io T. Haller et al.
proposed a definition of IoT with “A world where physical objects are seamlessly
integrated into the information network, and where the physical objects can
become active participants in business process.”IOT is an abbreviation of
Internet of Things which refers to uniquely identifiable objects (things) and their
virtual representations in an Internet-like structure. Internet of Things (IoT) is
currently released technology to automate communication by connecting
different objects around us as part of internet. IoT objects integrated with
networking technology to control from remote and local. This paper deals about
implementing smart home using new released Cisco packet tracer because this
feature include different sensor ,actuator and different smart device used for
home automation . Some of the devices are smart window, smart light, smart
door, smart fan with different detector and sensor. To implement smart home I
used new released Cisco packet tracer simulation software to design and
configure IOE device with classically networking device.

1
Fig:-drawing representing the internet of things

1.2 What is the Internet of Things?

Fig:- IoT conception - connect one device to another


2
In a nutshell, the Internet of Things is the concept of connecting any device (so
long as it has an on/off switch) to the Internet and to other connected devices.
The IoT is a giant network of connected things and people – all of which collect
and share data about the way they are used and about the environment around
them.

That includes an extraordinary number of objects of all shapes and sizes –


from smart microwaves, which automatically cook your food for the right length
of time, to self-driving cars, whose complex sensors detect objects in their path, to
wearable fitness devices that measure your heart rate and the number of steps
you’ve taken that day, then use that information to suggest exercise plans
tailored to you. There are even connected footballs that can track how far and
fast they are thrown and record those statistics via an app for future training
purposes.

1.3 How does it work?


Devices and objects with built in sensors are connected to an Internet of Things
platform, which integrates data from the different devices and applies analytics
to share the most valuable information with applications built to address specific
needs.

These powerful IoT platforms can pinpoint exactly what information is useful
and what can safely be ignored. This information can be used to detect patterns,
make recommendations, and detect possible problems before they occur.

For example, if I own a car manufacturing business, I might want to know which
optional components (leather seats or alloy wheels, for example) are the most
popular. Using Internet of Things technology,

I can:

 Use sensors to detect which areas in a showroom are the most popular,
and where customers linger longest;

 Drill down into the available sales data to identify which components are
selling fastest;

 Automatically align sales data with supply, so that popular items don’t go
out of stock.

The information picked up by connected devices enables me to make smart


decisions about which components to stock up on, based on real-time
information, which helps me save time and money.

3
With the insight provided by advanced analytics comes the power to make
processes more efficient. Smart objects and systems mean you can automate
certain tasks, particularly when these are repetitive, mundane, time-consuming
or even dangerous. Let’s look at some examples to see what this looks like in real
life.

1.4. Architecture of IoT


There is no single consensus on architecture for IoT, which is agreed universally.
Different architectures have been proposed by different researchers.

1.4.1. Three- and Five-Layer Architectures


The most basic architecture is a three-layer architecture as shown in Figure. It
was introduced in the early stages of research in this area. It has three layers,
namely, the perception, network, and application layers.

(i)The perception layer is the physical layer, which has sensors for sensing and
gathering information about the environment. It senses some physical
parameters or identifies other smart objects in the environment.

(ii)The network layer is responsible for connecting to other smart things,


network devices, and servers. Its features are also used for transmitting and
processing sensor data.

(iii)The application layer is responsible for delivering application specific services


to the user. It defines various applications in which the Internet of Things can be
deployed, for example, smart homes, smart cities, and smart health

The three-layer architecture defines the main idea of the Internet of Things, but
it is not sufficient for research on IoT because research often focuses on finer
aspects of the Internet of Things. That is why, we have many more layered
architectures proposed in the literature. One is the five-layer architecture, which
additionally includes the processing and business layers. The five layers are
perception, transport, processing, application, and business layers . The role of
the perception and application layers is the same as the architecture with three
layers. We outline the function of the remaining three layers.

(i)The transport layer transfers the sensor data from the perception layer to the
processing layer and vice versa through networks such as wireless, 3G, LAN,
Bluetooth, RFID, and NFC.

(ii)The processing layer is also known as the middleware layer. It stores,


analyzes, and processes huge amounts of data that comes from the transport
layer. It can manage and provide a diverse set of services to the lower layers. It
employs many technologies such as databases, cloud computing, and big data
processing modules.

4
(iii)The business layer manages the whole IoT system, including applications,
business and profit models, and users’ privacy. The business layer is out of the
scope of this paper. Hence, we do not discuss it further.

Another architecture proposed by Ning and Wang is inspired by the layers of


processing in the human brain. It is inspired by the intelligence and ability of
human beings to think, feel, remember, make decisions, and react to the physical
environment. It is constituted of three parts. First is the human brain, which is
analogous to the processing and data management unit or the data center.
Second is the spinal cord, which is analogous to the distributed network of data
processing nodes and smart gateways. Third is the network of nerves, which
corresponds to the networking components and sensors.

Fig:-architecture of IOT(A:three layers)(B:five layers)

5
1.4.2. Cloud and Fog Based Architectures
Let us now discuss two kinds of systems architectures: cloud and fog computing.
Note that this classification is different from the classification in
Section 1.4.1which was done on the basis of protocols.

In particular, we have been slightly vague about the nature of data generated by
IoT devices, and the nature of data processing. In some system architectures the
data processing is done in a large centralized fashion by cloud computers. Such a
cloud centric architecture keeps the cloud at the center, applications above it,
and the network of smart things below it. Cloud computing is given primacy
because it provides great flexibility and scalability. It offers services such as the
core infrastructure, platform, software, and storage. Developers can provide
their storage tools, software tools, data mining, and machine learning tools, and
visualization tools through the cloud.

Lately, there is a move towards another system architecture, namely, fog


computing, where the sensors and network gateways do a part of the data
processing and analytics. A fog architecture presents a layered approach as
shown in , which inserts monitoring, pre processing, storage, and security layers
between the physical and transport layers. The monitoring layer monitors power,
resources, responses, and services. The pre processing layer performs filtering,
processing, and analytics of sensor data. The temporary storage layer provides
storage functionalities such as data replication, distribution, and storage. Finally,
the security layer performs encryption/decryption and ensures data integrity and
privacy. Monitoring and pre processing are done on before sending data to the
the edge of the network before sending data to the cloud.

6
Fig:-fog architecture of a smart IOT gateway

Often the terms “fog computing” and “edge computing” are used
interchangeably. The latter term predates the former and is construed to be more
generic. Fog computing originally termed by Cisco refers to smart gateways and
smart sensors, whereas edge computing is slightly more penetrative in nature.
This paradigm envisions adding smart data preprocessing capabilities to physical
devices such as motors, pumps, or lights. The aim is to do as much of
preprocessing of data as possible in these devices, which are termed to be at
the edge of the network. In terms of the system architecture, the architectural
diagram is not appreciably different from Figure. As a result, we do not describe
edge computing separately.

Finally, the distinction between protocol architectures and system architectures


is not very crisp. Often the protocols and the system are codesigned. We shall use
the generic 5-layer IoT protocol stack (architectural diagram presented in
Figure ) for both the fog and cloud architectures.

1.4.3. Social IoT

7
Let us now discuss a new paradigm: social IoT (SIoT). Here, we consider social
relationships between objects the same way as humans form social relationships .
Here are the three main facets of an SIoT system:

(i)The SIoT is navigable. We can start with one device and navigate through all
the devices that are connected to it. It is easy to discover new devices and services
using such a social network of IoT devices.

(ii)A need of trustworthiness (strength of the relationship) is present between


devices (similar to friends on Facebook).

(iii)We can use models similar to studying human social networks to also study
the social networks of IoT devices.

1.4.3.1. Basic Components


In a typical social IoT setting, we treat the devices and services as bots where
they can set up relationships between them and modify them over time. This will
allow us to seamlessly let the devices cooperate among each other and achieve a
complex task.

To make such a model work, we need to have many interoperating components.


Let us look at some of the major components in such a system.

(1) ID: we need a unique method of object identification. An ID can be assigned


to an object based on traditional parameters such as the MAC ID, IPv6 ID, a
universal product code, or some other custom method.

(2) Metainformation: along with an ID, we need some metainformation about the
device that describes its form and operation. This is required to establish
appropriate relationships with the device and also appropriately place it in the
universe of IoT devices.

(3) Security controls: this is similar to “friend list” settings on Facebook. An


owner of a device might place restrictions on the kinds of devices that can
connect to it. These are typically referred to as owner controls.

(4) Service discovery: such kind of a system is like a service cloud, where we need
to have dedicated directories that store details of devices providing certain kinds
of services. It becomes very important to keep these directories up to date such
that devices can learn about other devices.

(5) Relationship management: this module manages relationships with other


devices. It also stores the types of devices that a given device should try to
connect with based on the type of services provided. For example, it makes sense
for a light controller to make a relationship with a light sensor.

8
(6) Service composition: this module takes the social IoT model to a new level.
The ultimate goal of having such a system is to provide better integrated services
to users. For example, if a person has a power sensor with her air conditioner
and this device establishes a relationship with an analytics engine, then it is
possible for the ensemble to yield a lot of data about the usage patterns of the air
conditioner. If the social model is more expansive, and there are many more
devices, then it is possible to compare the data with the usage patterns of other
users and come up with even more meaningful data. For example, users can be
told that they are the largest energy consumers in their community or among
their Facebook friends.

1.4.3.2. Representative Architecture


Most architectures proposed for the SIoT have a server side architecture as well.
The server connects to all the interconnected components, aggregates (composes)
the services, and acts as a single point of service for users.

The server side architecture typically has three layers. The first is the base layer
that contains a database that stores details of all the devices, their attributes,
metainformation, and their relationships. The second layer (Component layer)
contains code to interact with the devices, query their status, and use a subset of
them to effect a service. The topmost layer is the application layer, which
provides services to the users.

On the device (object) side, we broadly have two layers. The first is
the object layer, which allows a device to connect to other devices, talk to them
(via standardized protocols), and exchange information. The object layer passes
information to the social layer. The social layer manages the execution of users’
applications, executes queries, and interacts with the application layer on the
server

9
Fig:- Technology roadmap: Internet of things.

1.5 Enabling technologies for IoT


There are many technologies that enable IoT. Crucial to the field is the network
used to communicate between devices of an IoT installation, a role that several
wireless or wired technologies may fulfill:

1.5.1-Addressability
The original idea of the Auto-ID Center is based on RFID-tags and unique
identification through the Electronic Product Code, however, this has evolved
into objects having an IP address or URI. An alternative view, from the world of
the Semantic Web focuses instead on making all things (not just those electronic,
smart, or RFID-enabled) addressable by the existing naming protocols, such
as URI. The objects themselves do not converse, but they may now be referred to
by other agents, such as powerful centralized servers acting for their human
owners. Integration with the Internet implies that devices will use an IP
address as a unique identifier. Due to the limited address space of IPv4 (which
allows for 4.3 billion unique addresses), objects in the IoT will have to use the
next generation of the Internet protocol (IPv6) to scale to the extremely large
address space required. Internet-of-things devices additionally will benefit from
the stateless address auto-configuration present in IPv6,as it reduces the
configuration overhead on the hosts, and the IETF 6LoWPAN header
compression. To a large extent, the future of the Internet of things will not be
possible without the support of IPv6; and consequently, the global adoption of

10
IPv6 in the coming years will be critical for the successful development of the IoT
in the future.

1.5.2 Short-range wireless


 Bluetooth mesh networking – Specification providing a mesh networking
variant to Bluetooth low energy (BLE) with increased number of nodes
and standardized application layer (Models).

 Light-Fidelity (Li-Fi) – Wireless communication technology similar to the


Wi-Fi standard, but using visible light communication for increased
bandwidth.

 Near-field communication (NFC) – Communication protocols enabling


two electronic devices to communicate within a 4 cm range.

 QR codes and barcodes – Machine-readable optical tags that store


information about the item to which they are attached.

 Radio-frequency identification (RFID) – Technology using


electromagnetic fields to read data stored in tags embedded in other items.

 Thread – Network protocol based on the IEEE 802.15.4 standard, similar


to ZigBee, providing IPv6 addressing.

 Transport Layer Security – Network security protocol.

 Wi-Fi – Widely used technology for local area networking based on


the IEEE 802.11 standard, where devices may communicate through a
shared access point.

 Wi-Fi Direct– Variant of the Wi-Fi standard for peer-to-peer


communication, eliminating the need for an access point.

 Z-Wave – Communication protocol providing short-range, low-latency


data transfer at rates and power consumption lower than Wi-Fi. Used
primarily for home automation.

 ZigBee – Communication protocols for personal area networking based


on the IEEE 802.15.4 standard, providing low power consumption, low
data rate, low cost, and high throughput.

1.5.3-Medium-range wireless

11
 HaLow – Variant of the Wi-Fi standard providing extended range for
low-power communication at a lower data rate.

 LTE-Advanced – High-speed communication specification for mobile


networks. Provides enhancements to the LTE standard with extended
coverage, higher throughput, and lower latency.

1.5.4-Long-range wireless
 Low-power wide-area networking (LPWAN) – Wireless networks
designed to allow long-range communication at a low data rate, reducing
power and cost for transmission. Available LPWAN technologies and
protocols: LoRaWan, Sigfox, NB-IoT, Weightless.

 Very small aperture terminal (VSAT) – Satellite communication


technology using small disk
antennas for narrowband and broadband data.

 Long-range Wi-Fi connectivity

1.5.5-Wired
 Ethernet – General purpose networking standard using twisted
pair and fiber optic links in conjunction with hubs or switches.

 Multimedia over Coax Alliance (MoCA) – Specification enabling whole-


home distribution of high definition video and content over
existing coaxial cabling.

 Power-line communication (PLC) – Communication technology using


electrical wiring to carry power and data. Specifications such
as HomePlug or G.hn utilize PLC for networking IoT devices.

1.6 IoT solutions:-


12
1.6.1- IoT in your home & business center

Fig- Home Kit platform to control your house

Imagine you wake up at 7am every day to go to work. Your alarm clock does the
job of waking you just fine. That is, until something goes wrong. Your train’s
cancelled and you have to drive to work instead. The only problem is that it takes
longer to drive, and you would have needed to get up at 6.45am to avoid being
late. Oh, and it’s pouring with rain, so you’ll need to drive slower than usual. A
connected or IoT-enabled alarm clock would reset itself based on all these
factors, to ensure you got to work on time. It could recognize that your usual
train is cancelled, calculate the driving distance and travel time for your
alternative route to work, check the weather and factor in slower travelling speed
because of heavy rain, and calculate when it needs to wake you up so you’re not
late. If it’s super-smart, if might even sync with your IoT-enabled coffee maker,
to ensure your morning caffeine’s ready to go when you get up.

13
1.6.2- IoT in transport

Fig- Transporting infrastracture with IoT

Having been woken by your smart alarm, you’re now driving to work. On comes
the engine light. You’d rather not head straight to the garage, but what if it’s
something urgent? In a connected car, the sensor that triggered the check engine
light would communicate with others in the car. A component called the
diagnostic bus collects data from these sensors and passes it to a gateway in the
car, which sends the most relevant information to the manufacturer’s platform.
The manufacturer can use data from the car to offer you an appointment to get
the part fixed, send you directions to the nearest dealer, and make sure the
correct replacement part is ordered so it’s ready for you when you show up

Anyone with a smart phone, connected thermostat or internet-enabled home


entertainment system can see how the Internet of Things is part of our daily life.
But besides remotely turning on the heating via an app, where else can we see
IoT technology at work? In industry ? Manufacturing ? The office ? Here are
some quick case studies to show the range of IoT.

14
1.6.3-Health
Due to smart gadgets, IoT in healthcare can completely monitor your whole
body. The software will record your every action and it will be able to calculate
the probability of disease before the first symptoms appear.

Today Apple Watch, Fitbit, Jawbone, and their wearables have already occupied
this niche and are engaged in IoT development for healthcare devices. And it is
just the tip of the iceberg.

 Medtronic company manufactures subcutaneous implants for diabetics. It


constantly monitors glucose levels in the blood;

Fig:- Medtronic app to control glucose level


 Philips has developed a pillbox that is open when it is time to take a pill. It
sends a notification to the doctor or family member (or both of them) if
the patient failed to take a pill on time;

 In addition, Philips has also made its contribution to the Internet of


Things healthcare field - the company has created video sensors for
monitoring premature babies in intensive care units. Sensors control the
state of skin, breath and body temperature. Staff always gets a notification
if there are any changes

15
1.6.4-IoT in part lifecycle, tracking and maintenance
Whether as a cog in a machine or a component of an end product, individual
objects (or parts) can provide critical information as to the state of the product
they form. Connected sensors and sophisticated analytics within individual
components could track part provenance right from the manufacturing process
to the end of their useful life – sharing data on how the component should be
maintained and how it has responded to frequent use.

1.6.5-IoT in the supply chain


Keeping track of and predicting product demand can be tricky and mistakes
have a cost implication – either through over-supply (and therefore wastage), or
under-supply (and the attendant missed sales opportunities.) IoT technology
could track the location of individual components, and broadcast supply and
demand on a shared blockchain. Data as to demand request, supply volumes, or
part expiration dates could be instantly accessed and analysed to identify where
production needs to be stepped up.

1.6.6-IoT for regulatory compliance


IoT technology could help regulatory agencies share usage and maintenance
information on particular products, and make compliance documents instantly
available to manufacturers and individuals who need them.

1.6.7-Building management
Connected sensors build up a wealth of useful data as to the function of
particular systems within a building. Lights, for instance, or air conditioning, or
security alarms. This data forms a log of how the building is accessed and used,
which can be shared with its owner, tenants and building management teams.

1.6.8-Energy consumption
For those who want to offset their carbon footprint on the carbon credit
exchange, IoT provides a way of accurately tracking and trading carbon credits
and energy consumption.

1.6.9-Shipping logistics industry


In the shipping industry, keeping track of cargo is key. IoT-enabled sensors can
detect and share the location of cargo, the temperature within containment units
and track whether it reaches its destination on time and intact. Shipping
documents such as bills of loading and customs forms can also be easily shared
electronically between the freight companies, customs officials, and the person
who sent or received the package.

16
1.7 IoT adoption barriers:-

1.7.1 -Lack of interoperability and unclear value propositions

Despite a shared belief in the potential of IoT, industry leaders and consumers
are facing barriers to adopt IoT technology more widely. Mike Farley argued
in Forbes that many IoT solutions either lack interoperability or a clear use case
for end-users.Within an IoT-enabled environment, there may be technical
incompatibilities related to IoT standards and interfaces. This is due to IoT data
generated in multiple sources that needs to be integrated into analytical and
decision-making systems for further analysis.

“Instead of convincing consumers that they need complex systems to serve needs
they don’t have, we should fix real problems people struggle with every day.”

Many gadgets in the consumer IoT space have appealed to early adopters, yet
failed to demonstrate relevance to ordinary people’s lives.

“In order to boost sales and drive demand beyond the early adopter set, we need
to stop making toys no one cares about and instead work on building simple
solutions to real, everyday problems for real people.”

A recent study by Ericsson regarding the adoption of IoT among Danish


companies, has suggested that many are struggling “to pinpoint exactly where
the value of IoT lies for them”. A company must identify where the value of IoT

17
lies in order to capture it, otherwise non-action is the consequence. This indicates
that a major roadblock to IoT adoption is not technical but analytical in nature.

1.7.2 Privacy and security concerns


According to a recent study by Noura Aleisa and Karen Renaud at the University
of Glasgow, "the Internet of things' potential for major privacy invasion is a
concern"with much of research "disproportionally focused on the security
concerns of IoT."Among the "proposed solutions in terms of the techniques they
deployed and the extent to which they satisfied core privacy principles", only
very few turned out to be fully satisfactory. Louis Basenese, investment director
at Wall Street Daily, has criticized the industry's lack of attention to security
issues:

"Despite high-profile and alarming hacks, device manufacturers remain


undeterred, focusing on profitability over security. Consumers need to have
ultimate control over collected data, including the option to delete it if they
choose...Without privacy assurances, wide-scale consumer adoption simply won't
happen."

In a post-Snowden world of global surveillance disclosures, consumers take a


more active interest in protecting their privacy and demand IoT devices to be
screened for potential security vulnerabilities and privacy violations before
purchasing them. According to the 2016 Accenture Digital Consumer Survey, in
which 28000 consumers in 28 countries were polled on their use of consumer
technology, security “has moved from being a nagging problem to a top barrier
as consumers are now choosing to abandon IoT devices and services over security
concerns.” The survey revealed that “out of the consumers aware
of hacker attacks and owning or planning to own IoT devices in the next five
years, 18 percent decided to terminate the use of the services and related services
until they get safety guarantees.” This suggests that consumers increasingly
perceive privacy risks and security concerns to outweigh the value
propositions of IoT devices and opt to postpone planned purchases or service
subscriptions.

1.7.3 Traditional governance structures


A study issued by Ericsson regarding the adoption of Internet of things among
Danish companies identified a "clash between IoT and companies'
traditional governance structures, as IoT still presents both uncertainties and a
lack of historical precedence." Among the respondents interviewed, 60 percent
stated that they "do not believe they have the organizational capabilities, and
three of four do not believe they have the processes needed, to capture the IoT
opportunity."This has led to a need to understand organizational culture in
order to facilitate organizational design processes and to test new innovation

18
management practices. A lack of digital leadership in the age of digital
transformation has also stifled innovation and IoT adoption to a degree that
many companies, in the face of uncertainty, "were waiting for the market
dynamics to play out", or further action in regards to IoT "was pending
competitor moves, customer pull, or regulatory requirements." Some of these
companies risk being 'kodaked' – "Kodak was a market leader until digital
disruption eclipsed film photography with digital photos"– failing to "see the
disruptive forces affecting their industry"and "to truly embrace the new business
models the disruptive change opens up."Scott Anthony has written in Harvard
Business Review that Kodak "created a digital camera, invested in the
technology, and even understood that photos would be shared online" but
ultimately failed to realize that "online photo sharing was the new business, not
just a way to expand the printing business."

1.7.4 Lack of solid business models


Studies on IoT literature and projects show a disproportionately strong
prominence of technology in the IoT projects, which are often driven by
technological interventions rather than business model innovation

1.8 Motivation:-
Currently Cisco released new version of packet tracer that include IOE device
with classically networking device. Boards is also added to this version those are
microcontrollers (MCU-PT), single boarded computers (SBC-PT)that provide
programming environment to control connected object.

Benefits of new released Packet Tracer are:-


1. Offers a realistic simulation and visualization of IOT device.
2. Permits users to design, build, configure smart
home, smart city by providing different smart object used for them.
3. Provide board to control smart object.
4. Allows students to explore concepts IOE.

19
1.9 Literature survey:-
We went through various IEEE standard papers where we found a paper
regarding smart home monitor and control.
Industrialization has been going on for a long time so security monitor, control
and automation in industries and home has attracted the interest of research
community during the last decade.
Every year some new thesis comes in this area.
The main idea was taken from IEEE standard paper. Further reference were
taken from reference 2, 3, 4
Later we went through another IEEE standard paper published on 5 feb 2015-
The Internet of Things: An overview and new perspectives in systems design.

20
Chapter-2

Detail study of hardwares used in proposed sysytem

proposed security system architecture:-

Fig-proposed system

21
Sensors and components:-

No Devices Function
01 Router(1941) Used to interconnect home to cellular network.
02 Cable modem Used to connect home to the internet
03 Home gateway Used to register smart object and give IP
address to smart object
04 IOE Server To control smart thing registered on it
and provide difference server
functionalities
05 Central Used to connect cellular system to the
office server router
06 MCU Used to interconnect different smart thing
07 pc Connect to home getaway to access
smart object
08 Fan Used to ventilate the home environment
based on some condition
09 Webcam For live visuals

10 siren Provide sound for some event in the home

11 light Provide light

12 Motion Connect to home getaway and provide


detector Detection of motion
13 Smart door Connect to home getaway and provide
Function based event
14 Cell tower Provide cellular system coverage for home user
to control the home appliance form remote
15 Smartphone Used to control the home from outside

16 Co detector Used to detect CO.


17 Co2 detector Used to detect CO2.

18 Water level monitor Used to detect water level of home


environment
19 Smoke sensor Used to sense the smoke level

20 Home speaker Used to simulate the sound sensor


Affects Sound Volume at 65 dB.
21 Temperature sensor Used to sense the temperature of the home.

22 Ceiling sprinkle Used to ventilate home environment Affects


Water Level at a rate of 0.1 cm per second.
23 Old car Used to simulate different scenario in
home design since it affect, co, co2 and
smoke level.
Affects Carbon Monoxide at a rate of 1%per
22
hour.
Affects Carbon Dioxide at a rate of 2%
per hour.
Affects Smoke at a rate of 3% per hour
24 AC Used to cool the home Affects Humidity at a
rate of -2% per hour.
25 Smart window Used to control the window remotely Affects
Argon, Carbon Monoxide, Carbon Dioxide,
Hydrogen, Helium, Methane, Nitrogen, O2,
Ozone, Propane,
and Smoke. When the door is opened, those
gases will decrease to a maximum of 1% in
total change
26 Smart light To provide light
27

1. HOME GATEWAY:-
Home Gateway have 4 Ethernet ports in addition to a wireless access point
configured with the "Home Gateway" SSID. To secure wireless connection WEP
/ WPA-PSK / WPA2enterprise can be configured on home gateway. The figure 2
shows seven internet of Things device connected to a Home Gateway by using
Ethernet cable and wireless. To connect the Home Gateway to the Internet its
Internet WAN Ethernet port available on home getaway. The IoE device can be
remotely managed through a web interface hosted by the Home Gateway. The
Home Gateway internal (LAN) IP address is 192.168.25.1 but it can also be
accessed through its Internet facing IP address

23
Fig. home gateway Ethernet and internet port.

24
Fig. Home gateway with seven smartthings connected to Home
Gateway

The above figure shows the smart object is connected to the home Gateway using
Ethernet cable and wireless medium to manage smart device local and remotely.
Home gateway also works as DHCP server by assigning IP address to each smart
device that connected to it.

2. smart phone:-
Through this device we can control and monitor the smart devices of the home
remotely by logging into IOE server. We can set the algorithm or conditions in
the IOE server through smart phone. Smartphone is connected through cell
tower.

25
26
Fig.-monitoring /status of IOE devices on smart phone

27
3. IOE server:- This server provide IOT services to the users present at remote.
All the IoT devices are registered and connected to the the IoT server. to get the
service and to control the devices, user need to login the IOT server by entering
username and password. Ip address (10.0.0.253) and its URL(www.ioe.org) of
IOT server is entered in the DNS server(having ip address 10.0.0.254) of
network.

Fig.-front view + configuration of IOE server

28
Chapter-3

IMPLEMENTATION OF PROPOSED SYSTEM ON CISCO


PACKET TRACER:-

1.-get all the required devices and make the connection according to
given figure.
2.-configure the ISP router by using following code .
a>>Assigning hostname and Ip address for ISP router
Router>
Router>enable
Router#conf terminal
Router(config)#hostname ISP
ISP(config)#intgigabitEthernet 0/2
ISP(config-if)#ip address 10.10.220.1
255.255.255.0
ISP(config-if)#no shutdown
ISP(config)#intgigabitEthernet 0/0
ISP(config-if)#ip address 209.165.200.225
255.255.255.224
ISP(config-if)#no shutdown
ISP(config)#intgigabitEthernet 0/1
ISP(config-if)#ip address 209.165.201.225
255.255.255.224
ISP(config-if)#no shutdown

b>>Configurating DHCP server for cell and IOEdevices

ISP(config)#ipdhcp excluded-address
209.165.201.225 209.165.201.230
ISP(config)#ipdhcp pool cell
ISP(dhcp-config)#network 209.165.201.225
255.255.255.224
ISP(dhcp-config)#default-router 209.165.201.225
ISP(dhcp-config)#dns-server 10.10.220.10
ISP(config)#ipdhcp excluded-address
209.165.200.225 209.165.200.230
ISP(config)#ipdhcp pool ioe
ISP(dhcp-config)#network 209.165.200.224255.255.255.224
ISP(dhcp-config)#default-router 209.165.200.225
ISP(dhcp-config)#dns-server 10.10.220.10

29
3.-connect all IOT devices one by one to the home gateway through wire or
wirelessly.

Steps->click on the IOT device->go to advanced setting->go to the I/O config.->


select PT-IOT-NM-1CFE(for wire connection)/PT-IOT-NM-1W(for wireless
connection)->go to config->select wireless(in wireless connection)-> enter passkey
of the wifi network.

Fig:-connection of devices through homegateway

30
4:-register all IOT devices in IOT server .

Steps:-click on the IOT devices->click on the config.->enter IOT server IP


address, username, password.

Fig:-registration of IOT devices in IOT server

5.-enable DNS services like HTTP, DNS etc.


Steps:-click on the DNS server->click on the sevice->enable different services like
HTTP, DNS etc.

Fig-enabling DNS service

31
6:-assign IP addresses to DNS and IOE server statically.

Fig:-assigning ip address to DNS server

Fig:-assigning IP address to IOT server

32
7:-now control and monitor the IOE devices after logging into the IOE server
from smart phone or PC.

Fig:-logging into the IOT server

Fig:-setting conditions to control the devices automatically.

33
Chapter-4

Result :-
1>

Fig : lawn sprinkler is on to watering the plant


The figure shows the lawn sprinkler is on, this can be based on the condition
made on home Gateway that is if water level is more than 10cm the lawn
sprinkler on else off.

2>

Fig : window and fan is open when co and co2 is detected to


Ventilate the place.

34
The figure shows the window and fan is opened when the carbon dioxide and
carbon monoxide is detected. To detect carbon dioxide and carbon monoxide I
used carbon dioxide and monoxide detector. To simulate the scenario old car is
used because old car is a lot of problem by increasing the co and co2.

3>

Fig : fire sprinkler and window is opened when smoke detected


The figure shows the fire sprinkler and window is opened this can be based on
the condition made on home Gateway that is if smoke level is more than 10 the
fire sprinkler and window is open to ventilate the place. To simulate the scenario
I used old car as old car increases the smoke level.

35
4>using motion detector:-

Using motion detector we can save home from thieves when motion detector
detect something moving, server will turn on the alarm, close the doors and
window, open the webcam and on the light. in this way you can identify the
person enter your home remotely.

36
5>temperature measurement:-

We can set the condition in such a way that when the temperature exceeds a
particular level, server will start the AC and close the windows

37
Chapter-5

5.1 Conclusion:-

In this paper, we implemented smart home using new released Cisco packet,
because this version included different IOE device used for home automation. we
used IOE server to register smart device on it. Whole process will run smoothly
when devices are connected to the home gateway and get uninterrupted power
supply. Once device is disconnected from the home gateway or disconnected from
power supply then it will not start work if we supply power .to make it work first
we will have to register the device to the IOE server manually.

5.2Future development:-
Cisco packet tracer also includes microcontroller, that can be used to make
communication between devices. We can use python or java script language to
program the microcontroller. in this way if a microcontroller is used in the IOE
system then work will be more faster and reliable.

Fig:- alarming the respective person when motion is detected

38
5.3 REFERENCE
[1] Chattoraj, Subhankar. "Smart Home Automation based ondifferent sensors
and Arduino as the mastercontroller." International Journal of Scientific
andResearch Publications5.10 (2015): 1-4.
[2] Soliman, Moataz, et al. "Smart home: Integrating internet
of things with web services and cloud computing." CloudComputing Technology
and Science (CloudCom), 2013 IEEE 5thInternational Conference on. Vol. 2.
IEEE, 2013.
[3] S. Haller S. Karnouskos and C. Schroth "The Internet of
Things in an Enterprise Context " in Future Internet-FIS2008 Lecture Notes in
Computer Science Vol. 5468 2009
pp 14-28.
[4] Jie, Yin, et al. "Smart home system based on iot
technologies." Computational and Information Sciences
(ICCIS), 2013 Fifth International Conference on. IEEE,
2013
[5] http://www.packettracernetwork.com/
[6] Qin, X. U. E. "Simulation Experimental Teaching of
Computer Network Based on Packet Tracer [J]." Research
and Exploration in Laboratory 2 (2010): 57-59.
[7] http://www.packettracernetwork.com/internet-ofthings/
pt7-iot-devicesconfiguration.htm
[8] Sun, Liangxu, et al. "Comparison between physical
devices and simulator software for Cisco network
technology teaching." Computer Science & Education
(ICCSE), 2013 8th International Conference on. IEEE,
2013.
[9] https://ieeexplore.ieee.org/document/7029576/ The Internet of Things: An
overview and new perspectives in systems design
[10] journal of electrical and computer engineering.
https://www.hindawi.com/journals/jece/2017/9324035/ Internet of Things:
Architectures, Protocols, and Applications
Pallavi Sethi and Smruti R. Sarangi
Department of Computer Science, IIT Delhi, New Delhi, India

39

Das könnte Ihnen auch gefallen