1.2.1.1 Packet Tracer Explore The Smart Home
1.2.1.1 Packet Tracer Explore The Smart Home
Topology
Objectives
• Explore the Smart Home
• Analyze the Usage of Fog Computing in the Smart Home
2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Packet Tracer – Explore the Smart Home
Background / Scenario
In this activity, you will explore the smart home example. Depending on the application, some data is best
processed close to the source. The smart home example takes advantage of fog computing to monitor and
act upon the levels of smoke detected in the home.
2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Packet Tracer – Explore the Smart Home
2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Packet Tracer – Explore the Smart Home
g. While still monitoring the levels, stop the classic car’s engine by holding the Alt key and clicking the
classic car.
What happens to air quality inside the house after the engine is stopped?
____________________________________________________________________________________
____________________________________________________________________________________
What happens to the doors, window and fan?
____________________________________________________________________________________
____________________________________________________________________________________
Reflection
1. What are the potential impacts if a hacker gained access to this system?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. In your opinion, what is the most likely way that a hacker could get into the system?
_______________________________________________________________________________________
_______________________________________________________________________________________
3. How could the system be made more secure?
_______________________________________________________________________________________
_______________________________________________________________________________________
Summary
The IoT Smart Home application shows the power of the IoT as a consumer technology. Home automation
has provided many safety and convenience features to the home. However, it has also brought risks.
Because the home gateway is exposed to the Internet, hackers could take advantage of weak passwords to
take over control of the system. This could actually expose the family to danger rather than keeping it safe.
2019 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com