ENGIN 112 Homework 12 Please submit your answers on Gradescope via the course page on Canvas You can write your answers electronically or by hand and submit a scan or photo Question 1 This question asks about protocols in embedded computer systems similar to how protocols are used in computer networks Look up the datasheet for a Texas Instruments AM2612 Microcontroller https www ti com lit ds symlink am2612 pdf Identify the communication components of the microcontroller and list three protocols used on these interfaces Note The datasheet of a microcontroller is a very long document To answer this question you only need to look at the General Connectivity section of page 1 The communication components listed are UART Universal Asynchronous Receiver Transmitter SPI Serial Peripheral Interface and I2C Inter integrated Circuit The protocols supported by each interface are RS 232 UART SPI Protocols and I2C Protocols Question 2 Assume you and a friend are standing on opposite sides of a football field in pitch black darkness You want to send 8 bits of information to your friend using a flashlight that you can turn on and off You may assume that both you and your friend have a flashlight What protocol would you design together with your friend before going to the dark football field so that you can correctly send the 8 bits of information Be specific about your protocol s timing encoding interpretation etc To send 8 bits of information using flashlights in pitch black darkness my friend and I would establish a protocol in advance The protocol begins with a synchronization signal three rapid flashes where each flash is ON for 1 second and OFF for 1 second This signals the start of the communication Each bit of information is represented by the flashlight s state A flashlight ON for 2 seconds represents a 1 and a flashlight OFF for 2 seconds represents a 0 To distinguish between consecutive bits there is a 4 second OFF period after each bit The bits are transmitted sequentially starting with the most significant bit MSB and ending with the least significant bit LSB Once all 8 bits are transmitted the receiver sends back an acknowledgment signal by turning their flashlight ON for 5 seconds If the sender does not receive this acknowledgment they will retransmit the sequence Question 3 Consider an exchange between a customer and a merchant via the Internet consisting of the following six steps available backpacks backpack 40 large backpack 50 Step 1 The customer queries the merchant about product availability e g list all Step 2 The merchant sends lists of products e g small backpack 30 medium Step 3 The customer chooses a product e g want to buy medium backpack Step 4 The merchant requests payment e g provide payment for 40 Step 5 The customer sends credit card information e g charge to Visa 1234 exp Step 6 The merchant confirms the order e g order ABC123 complete 12 29 For each step consider the following five security properties confidentiality integrity authentication non repudiation and availability Create a table with steps rows and security properties columns and indicate if that security property for that step is necessary yes if necessary no if not essential or if optional Try to limit yourself to requiring the minimum number of security properties in each step Step Integrity Authentication Non repudiation Availability Confidentiality No Yes No No Yes No No No 1 Customer queries merchant about product availability 2 Merchant sends a list of products 3 Customer chooses a product 4 Merchant requests payment 5 Customer sends credit card information 6 Merchant confirms the order Yes No Yes Yes Yes Yes No No No Yes Yes Yes Yes No Yes Yes Yes Yes Yes Yes Yes Yes Question 4 Consider the following website that provides information about data breaches and their impact on Massachusetts residents https www mass gov lists data breach reports a What do you observe about the number of breaches and the number of affected residents over time As the number of breaches increases the number of affected residents increases over time because more people become connected to the internet and the IOT b Open one of the recent annual reports and provide four examples of what pieces of information seem of particular concern to track the impacts of data breaches The name of the reporting organization the type of reporting organization retail government etc the number of residents affected and the type of data that was breached seem to be of particular concern Go to the following website by the U S Federal Trade Commission https www consumer hc gov articles protect your personal information and data c List the three suggestions that you think are most important for keeping your personal information secure I think the most important things one should do to keep personal information secure are to use strong unique passwords and enable multi factor authentication keep software updated to protect against vulnerabilities and monitor accounts regularly for unauthorized activity Question 5 The entire Internet is estimated to transfer around 12 Zettabytes of traffic per year Based on this assumption answer the following questions For your answers please distinguish carefully between bytes and bits e g 1 MB 1 Megabyte 1Mb 1 Megabit 1 byte 8 bits a How much data traffic is transferred in the entire Internet in one second Traffic per second 12x10 21 31536000 380517503805175 06 or 380 52 terabytes b Assuming a 10 USB memory stick can hold 128 Gigabytes of data how many memory sticks would be necessary to store 1 second of all Internet traffic 1GB 10 9 bytes 1 USB stick 128x10 9 380517503805175 06 128x10 9 2973 sticks c Assume there are 18 billion IoT devices connected to the Internet that are always on and send equal amounts of traffic This assumption is not accurate but simplifies the assignment How much traffic is sent by each device monthly if their total traffic makes up 10 of the entire Internet traffic IoT traffic per second 0 10 380517503805175 06 38051750380517 51 Trafic per device per second 38051750380517 51 18x10 9 Monthly Traffic 2 1139861322509727e 21 2592000 5 48 GB per device per month Question 6 Describe one Internet of Things system or cyber physical system which is characterized by sensing computation and physical response For this system state how it is used and list its sensing computation and actuation operation s For example Internet enabled home thermostat Sensing temperature in the home
View Full Document