<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Smart Home Network based on Cisco Equipment</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kateryna Kolbasova</string-name>
          <email>kn.kolbasova152@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Zhurakovskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vadym Poltorak</string-name>
          <email>andr.vadym.2012@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Nakonechnyi</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Kyrychok</string-name>
          <email>r.kyrychok@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,”
          <addr-line>37 Peremogy ave., Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>70</fpage>
      <lpage>80</lpage>
      <abstract>
        <p>This paper develops and implements a smart home concept using sensors and actuators that are connected to a gateway via Wi-Fi communication protocol. The 3G/4G client can control the home remotely using an account on the IoT server. The project is simulated using the Cisco Packet Tracer simulation tool. Networking and programming is a powerful foundation for this research as it provides the interface between sensors actuators and devices to be controlled. The proposed system can be applied in many areas, including home security, lighting control, flame detection, intelligent heating, motion sensor, door control, etc., to provide homeowner comfort, safety, energy efficiency (low operating costs), and convenience at any time.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Internet of Things</kwd>
        <kwd>network</kwd>
        <kwd>smart home</kwd>
        <kwd>automation</kwd>
        <kwd>Cisco Packet Tracer</kwd>
        <kwd>wireless connection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>A modern “smart house” is an advanced
automated living space. By this term, we
understand a system that not only reads data
from sensors but also transmits them. It is also
able to recognize specific situations occurring
in the room and react to them. One of the main
features of an intelligent building is the
unification of separate subsystems into one
controlled complex [1].</p>
      <p>
        Mobile or fixed communication technologies
are used to control modern intelligent home
systems. The control center can be connected to
the Internet and cloud service, which are
provided by providers of equipment or services
for “smart homes.” This simplifies the use of the
software and interaction with the Smart Home
system. All system parameters are managed
using a special application or a web interface,
where you can turn on or off the devices and set
their settings [
        <xref ref-type="bibr" rid="ref13">2</xref>
        ].
      </p>
      <p>The purpose of the study is to design a
network for an individual smart residential
building using equipment from Cisco Systems.
for
the
2. Statement of Research Problem
2.1. Selection of Network Equipment
In this case, standard equipment (hubs,
switches, routers, etc.) is enough to make a
physical connection. Interconnection can also
apply to remote networks. Then it is necessary
to connect these networks using a telephone
connection (modem) [3].</p>
      <sec id="sec-1-1">
        <title>2.1.1. Network Router</title>
        <p>
          A router is a network device that connects
different computer networks by routing
packets from one network to another. The
Cisco 2811 was chosen for the model—a 1U
router with 2 10/100Mbps ports, 4 HWIC slots,
and one slot NM, NME. Typically, this device
connects to two or more different networks.
When a data packet arrives at a router port, it
reads the address information in the packet to
determine which port to send the packet to [
          <xref ref-type="bibr" rid="ref2">4</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>2.1.2. Network Switch</title>
        <p>It is a tool that connects devices on a local
network. An Ethernet switch typically operates
at the link layer of the OSI model (Layer 2). It
controls the flow of data in a network by
checking the destination MAC address of an
incoming frame and forwarding the frame only
to the host for which the message was intended.
Each switch has a dynamic table (called a MAC
address table) that maps MAC addresses to
ports. Using this information, the switch can
determine which system is sitting on which port
and where to send the received frame [3].</p>
        <p>CiscoCatalyst 2960-24TT is used in this
work. The switch has 24 Fast Ethernet ports
(10/100) and 2 Gigabit Ethernet ports
(10/100/1000).</p>
      </sec>
      <sec id="sec-1-3">
        <title>2.1.3. Network Modem</title>
        <p>The modem is defined as an abbreviation for
modulator-demodulator, a modem is a
hardware device that allows a computer to
send and receive information over telephone
lines or coaxial cables [3].</p>
        <p>
          When sending a signal, the device converts
(“modulates”) the digital data into an analog
signal and transmits it over the phone line.
Similarly, when an analog signal is received,
the modem converts it back (“demodulates”)
to a digital signal [
          <xref ref-type="bibr" rid="ref3 ref4">5</xref>
          ].
        </p>
        <p>
          A cable modem is a common technology for
broadband connection to home networks [
          <xref ref-type="bibr" rid="ref5">6</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>2.1.4. Home Gateway</title>
        <p>The home gateway is used to assign IP
addresses to smart devices and to register
smart devices.</p>
        <p>
          This integrated Cisco router features a
Dynamic Host Configuration Protocol (DHCP)
server [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], Network Address Translation
(NAT) and Network Address Port Translation
(NAPT), and Stateful Packet Interfacing (SPI)
[
          <xref ref-type="bibr" rid="ref10">8</xref>
          ]. These features provide a single high-speed
public Internet connection and allow users to
share files and folders between devices on a
home network by connecting multiple wireless
devices in an active home to a wireless
residential gateway.
        </p>
        <p>
          Main features:
• Compliant with DOCSIS 3.0, 2.0, 1.1, and
1.0 standards for high performance and
reliability.
• Four 10/100/1000BASE-T Ethernet
ports for wired connectivity.
• High-performance broadband Internet
connection.
• One USB 2.0 Type 2 connection.
• Dual-band 802.11ac simultaneous
Wireless Access Point (WAP) with eight
Service Set Identifiers (SSIDs), backward
compatible with 802.11b/g/n [
          <xref ref-type="bibr" rid="ref12">9</xref>
          ].
• Including a push-button switch to
activate WPS for a simplified and highly
secure wireless network setup.
• Configurations with MoCA 2.0 are
available for home networks using
existing coaxial cables.
2.1.5. Server
A server is a device or software that receives
requests received over the network and
provides responses to them. A client is a device
that initiates a request and receives a response
from the server. In the modern Internet, the
term “server” refers to a computer system that
processes requests for web pages and sends
relevant information to the client [
          <xref ref-type="bibr" rid="ref16 ref21 ref26 ref44">10</xref>
          ].
        </p>
        <p>
          In this project, three servers are needed: the
first for DNS, the second for IoT, and the last
one for the 3G/4G provider [
          <xref ref-type="bibr" rid="ref17">11</xref>
          ].
2.1.6. Cloud
A cloud network or cloud-based network is
when some or all of an organization’s network
resources are hosted in the cloud. This can be a
public cloud or a private cloud. This abstract
“cloud” of computers provides vast distributed
storage and computing power that can be
accessed by any Internet-connected device
with a web browser [3].
        </p>
      </sec>
      <sec id="sec-1-5">
        <title>2.1.7. Cellular Tower</title>
        <p>A cell tower is a tall tower equipped with
electronics along with an antenna that
transmits data to cell phones. Cell towers are
clustered in geographic locations where
population density is high and there is likely to
be a large number of cell phone users. This
helps avoid saturation of available capacity,
which can lead to busy signals and unhappy
customers. Cell phones are designed to be
aware of the nearest tower. This is displayed to
the user in the form of signal strength, which
represents the strength of the connection
between the user’s location and the nearest
tower that provides the service.</p>
        <p>
          For this project, the 3G/4G client will be
connected to this cell tower; the tower itself
will be connected to the Internet through a
server.
RFID is an automatic identification technology
that uses radio waves to capture data from
tags. One of the main advantages of the RFID
system is that the tag does not have to be in the
line of sight for the reader to read the data
stored in it, and several tags can be read
simultaneously [
          <xref ref-type="bibr" rid="ref19 ref22">12, 13</xref>
          ].
2.2.
        </p>
      </sec>
      <sec id="sec-1-6">
        <title>Design Methodology</title>
        <p>The network topology used to realize a smart
home consists of four parts: a smart home, an
Internet cloud, an IoT server, and a 3G network
[14–16].</p>
        <p>In the first part, we have a home network
with various IoT devices connected to a home
gateway (a home Wi-Fi router in the topology).</p>
        <p>The second part of the network is the
Internet Cloud (WAN), which is connected to
the home Wi-Fi router via a cable modem to
provide Internet connectivity for IoT devices
[17].</p>
        <p>The third part is about the IoT (Internet of
Things) server, which registers all the devices
connected to it to provide more IoT features
[18].</p>
        <p>Then comes the last part of the “3G
Network” topology, the smartphone connects
to a cell tower to connect to the Internet for
remote device access [19].
2.3.</p>
      </sec>
      <sec id="sec-1-7">
        <title>Network Configuration</title>
        <p>We need to configure configurations for all
devices to ensure proper communication
between home devices and servers [20]. And
provide the customer with 3G/4G access to the
home.</p>
        <sec id="sec-1-7-1">
          <title>IoT cloud (WAN)</title>
          <p>To provide Internet access for all sections, a
cloud is required, which performs the
functions of cable forwarding, from the Coax8
port to the Ethernet6 port and from the Coax7
port to the Ethernet6 port. (Fig. 5) The WAN is
used to transmit data collected by smart
devices from the home to the IoT server for
storage. Smart devices receive an IP address
from a home gateway through the cloud [21].
An Internet Service Provider (ISP) router is
used to connect all network interfaces, and a
DHCP server is configured on it to dynamically
assign an IP address to each connected device,
whether it is a “smart” device or not, to
simulate a connection to the Internet [22].</p>
          <p>ISP router configuration is performed using
the Cisco Packet Tracer command-line
interface. Configuration consists of assigning a
hostname and setting an IP address.</p>
          <p>Assigning a hostname and IP address to the
ISP router:</p>
          <p>Router&gt;
Router&gt;enable
Router#conf terminal
Router(config)#hostname ISP</p>
          <p>ISP(config)#intgigabitEthernet0/2
ISP(config-if)#ip address 10.10.220.1
255.255.255.0 ISP(config-if)#no
shutdown</p>
          <p>ISP(config)#intgigabitEthernet0/0
ISP(config-if)#ip address
209.165.200.225 255.255.255.224
ISP(config-if)#no shutdown
ISP(config)#intgigabitEthernet0/1
ISP(config-if)#ip address
209.165.201.225 255.255.255.224</p>
          <p>ISP(config-if)#no shutdown</p>
          <p>Configuring DHCP Server for Cellular and
IOE Device:</p>
          <p>ISP(config)#ipdhcp
excludedaddress 209.165.201.225
209.165.201.230
SP(config)#ipdhcp pool cell
ISP(dhcp-config)#network
209.165.201.225 255.255.255.224
ISP(dhcp-config)#default-router
209.165.201.225
ISP(dhcp-config)#dns-server
10.10.220.10</p>
          <p>ISP(config)#ipdhcp
excludedaddress 209.165.200.225
209.165.200.230
ISP(config)#ipdhcp pool ioe
ISP(dhcp-config)#network
209.165.200.224 255.255.255.224
ISP(dhcp-config)#default-router
209.165.200.225
ISP(dhcp-config)#dns-server
10.10.220.10</p>
        </sec>
        <sec id="sec-1-7-2">
          <title>DNS server</title>
          <p>The DNS server is used to allow the user to
remotely access the Internet of Things server,
not by IP address [23], but by using the domain
name of the DNS server, i.e. “iot.org”, as shown
in Fig. 6. It is important to configure the DNS
server with a static IP address as shown in
Fig. 7.
An IoT server is used to remotely connect IoT
devices to it to access it through a web
interface using a computer or smartphone. In
general, all smart objects registered on the IoT
server can be remotely controlled through a
web interface hosted on the IoT server [24].</p>
          <p>The IoT server is configured with a static IP
address so that all smart devices can connect to
it using the same IP address. Fig. 8 shows the
IP address configuration using Static.</p>
          <p>Devices can be accessed using a username
and password already created on the IoT
server, so when registering devices, you must
specify the same username and password
along with the IP address of the IoT server.
The central office server is used to connect the
cell tower to the router of the provider and vice
versa to transfer information between them.
After configuring the DHCP server and DNS
server on the ISP router, the central office
server automatically receives all IP
information from the ISP [25], as shown in
Fig. 9.
Cell towers are used to provide cellular
coverage for a homeowner to access and
control a home appliance remotely.
A smartphone is used to remotely access the
smart object through a web interface using the
URL www.iot.org with an Internet connection
[26].</p>
          <p>To connect the smartphone to the 3G cell
tower, let’s set the correct APN (access point
name) “cell” in the smartphone, as shown in
Fig. 11.
The home gateway is used to assign IP
addresses to smart devices and to register
smart devices. The home gateway
automatically obtains an IP address from the
ISP router after establishing a connection to
the cloud WAN. In addition, all smart objects
connected to the home gateway automatically
obtain an IP address from the ISP router via the
cloud (WAN). A cable modem is used to
connect the home gateway to the cloud. Home
Gateway provides different programming
environments for devices: JavaScript, Python,
and Visual Basic.</p>
          <p>The home gateway has four Ethernet ports
and a wireless access point with the SSID of the
home gateway. We can configure WEP/WPA—
PSK/WPA2 protocols to authenticate the
wireless connection [27].</p>
          <p>To connect the devices to the home
gateway, you need to select wireless as the
devices will be connected using a wireless
connection, and then specify the SSID of the
home gateway in the devices [28].</p>
          <p>The home gateway has three interfaces: the
Internet, a local network, and a wireless
interface (Fig. 12).</p>
        </sec>
        <sec id="sec-1-7-3">
          <title>Wireless interface</title>
          <p>By default, IoT devices in Cisco Packet Tracer
have an Ethernet network adapter that needs a
cable to connect to the home gateway, so you
need to change the network adapter for all
devices to allow them to connect via the
wireless interface [29]. For this you need:
1. Open the extended list of device tabs
(Fig. 13).
2. Go to the “I/O Config” tab.
3. Any device can support two network
cards. For the network adapter, select
“PT-IOT-NM-1W” [30].</p>
        </sec>
        <sec id="sec-1-7-4">
          <title>Connecting devices to the Internet</title>
          <p>After entering “HomeGateway” in the SSID
field of the Wireless0 interface on the “Config”
tab, the interface is connected to the home
gateway (Fig. 14). The home gateway acts as a
DHCP server; thus, any device must have an IP
address in the range “192.168.3.2” to
“192.168.3.254” because “192.168.3.1” is the
gateway address.
Devices will automatically receive default
gateway and DNS server addresses. Finally, if
any device is connected to the home gateway
and receives an IP address, it will be connected
to the Internet.</p>
        </sec>
        <sec id="sec-1-7-5">
          <title>Registration server</title>
          <p>To register a device with a server, you need
the server address, username, and password.
All devices must use the same IoT credentials
[31], the same credentials were also used by the
homeowner to authenticate when connecting
through a browser to the IoT server [32].
As mentioned earlier, this home can be
controlled in two ways: from a laptop at home
for local monitoring or from a 3G/4G
smartphone away from home [33].</p>
        </sec>
      </sec>
      <sec id="sec-1-8">
        <title>Interaction Between Devices</title>
        <p>Doors: To control the security and lighting
system at the entrance using RFID, some
conditions must be set on the IoT server.
The system works according to the following
scenario [34]:
• Card authorization: Іf ID = 1001 then</p>
        <p>RFID is available, otherwise not available.
• Door opening: Іf RFID is available, the
door is unlocked and opened, otherwise
it is locked.
• Turning on the light: if the door is
opened, the light turns on.</p>
        <sec id="sec-1-8-1">
          <title>Climate control</title>
          <p>An air conditioner and a heater are used to
maintain a comfortable temperature in the
room. The temperature is controlled by the
thermostat (Fig. 17).
Climate control scenario:
• Cooling: Іf the thermostat registers a
temperature greater than or equal to 23
degrees, the air conditioner is turned on.</p>
          <p>Otherwise disabled.
• Heating: Іf the thermostat registers a
temperature less than or equal to 10
degrees, the heater is turned on.</p>
          <p>Otherwise disabled.
• At temperatures between the above,
both devices are turned off.</p>
        </sec>
        <sec id="sec-1-8-2">
          <title>The carbon monoxide control system in the room</title>
          <p>CO Alarm is used as an alarm and a sensor
at the same time, the alarm will turn on if the
carbon monoxide in the room exceeds 20%.
The CO alarm in the package tracking system is
programmed to activate by default when it
detects a carbon monoxide level of 20%. To
automate this part, you need to set the
following conditions on the IoT server
conditions tab:
• The first condition is to open the window
and start the fan in the Low state when
the CO level is between 20% and 25%.
• When the CO level exceeds 25%, a
second condition is set to switch the fan
to high and keep the window open.
• The third condition works when the CO
level is below 2%; he closes the window
and turns off the fan. If these conditions
are disabled, the window can be opened
manually.</p>
        </sec>
        <sec id="sec-1-8-3">
          <title>Self-watering in the garden</title>
          <p>Sprinklers and a humidity controller are
used for the automatic watering system
(Fig. 18).
A lawn sprinkler raises the water level every
time it is turned on. The water level monitor
receives the water level in the environment
and prints it. To automate this part, you should
add some conditions on the IoT server:
• The first condition turn off the sprinklers
if the level measured by the water level
monitor exceeds 55%.
• The second condition turn on the
sprinklers if the water level drops less
than 30%. Of course, the garden will not
be watered all day, for this condition you
can turn it off whenever you want. We
can do manual watering from the IoT
server account.</p>
        </sec>
        <sec id="sec-1-8-4">
          <title>Fire monitoring of the kitchen</title>
          <p>A siren, sprinkler, and fire monitor are used
for fire alarm and watering (Fig. 19).
The following conditions must be added:
• A condition to activate the sprinkler and
siren if the fire alarm detects a fire in the
kitchen.
• Condition for stopping the sprinkler and
siren if there is no fire in the kitchen.</p>
        </sec>
        <sec id="sec-1-8-5">
          <title>Monitoring of exhaust gases in the garage</title>
          <p>When starting the car in the garage, it is
necessary to control the content of exhaust
gases. A smoke detector is used for this.
(Fig. 20)
To automatically open the garage door, you
must add the following conditions:
• If the smoke detector detects a smoke
level greater than or equal to 0.17, then
the gate in the garage opens.
• If the smoke level is less than 0.05, the
door is closed.</p>
          <p>All scenarios are registered on the IoT
server conditions tab (Fig. 21).
Variables are adjustable parameters to
represent real-life conditions, such as the
amount of sunlight, temperature, carbon
dioxide and monoxide concentrations in the
air, water levels, and more. Cisco Packet Tracer
has over fifty different variables that can be
adjusted accordingly based on a 24-hour time
range. Fig. 22 below shows the amount of
sunlight and smoke throughout the day.
Variables are needed to influence sensor
behavior in IoT simulations. Variables are
detected by the sensor and, as a result, actions
are triggered. Regulated variables also helped
to quickly test IoT logic settings.</p>
          <p>The following variables were used in this
simulation:
• Carbon monoxide level to know the CO
level in the room so that the windows are
opened automatically. For this part, you
can also use an old car to generate CO in
the environment.
• The ambient temperature level was used
during a random time of day to activate
the room temperature sensor.
• Water level used by garden water lever
monitor to detect excess water level and
stop lawn sprinklers.
2.7.</p>
        </sec>
      </sec>
      <sec id="sec-1-9">
        <title>IoT Device Automation Testing</title>
        <sec id="sec-1-9-1">
          <title>Door</title>
          <p>For this part, the security of the door is checked
using two cards (My Card) and (Not My Card).
Three scenarios were created, which are
described below:</p>
          <p>Scenario 1: An authorized card (My Card) is
held close to the RFID reader to check what is
happening with the door. In this case, the door
is unlocked to allow the person to enter the
house, and then the door is closed again. When
the door is opened, the light inside turns on. So,
the first test is successful.</p>
          <p>Scenario 2: In this case, an unauthorized
card (by an unknown person) is presented to
the RFID reader to check what is happening to
the door. The door is still locked. Thus, the
second scenario is confirmed.</p>
          <p>Scenario 3: In this case, no card is near the
RFID reader. The RFID reader is in a “standby”
state and the door will not unlock. So, the third
door test was successful.</p>
        </sec>
        <sec id="sec-1-9-2">
          <title>Automatic CO monitoring</title>
          <p>There are two ways to control the CO level
in the environment: by changing its values in
the environment tab, like for sunlight, or by
using an old car (if it’s on, the CO level goes up).</p>
        </sec>
        <sec id="sec-1-9-3">
          <title>Indoor CO monitoring system:</title>
          <p>Scenario 1: An old car is inserted and turned
on (can be activated by ALT+click); thus
increasing the CO level. The IoT server can
monitor the CO level. When the CO level is
above 20% but below 25%, the window opens
and the fan runs at low speed.</p>
          <p>Scenario 2: The window and fan are not
enough to remove all the CO from the room
because the CO level is still rising, so they will
stay on until the machine is turned off. If the CO
level exceeds 25%, the fan starts to work faster.</p>
          <p>Scenario 2: The windows and fan will
remain on until the CO level drops below 2%,
then the window closes and the fan turns off.
So, this test is successfully verified.</p>
        </sec>
        <sec id="sec-1-9-4">
          <title>Automatic smoke monitoring in the garage</title>
          <p>Scenario 1: An old car is inserted and turned
on (can be activated by ALT+click); thus
increasing the smoke level. When the smoke
level exceeds 0.17, the garage door opens.</p>
          <p>Scenario 2: The gate will remain open until
the machine is turned off and the smoke level
drops to 0.05, then the gate closes. So, this test
is successfully verified.</p>
        </sec>
        <sec id="sec-1-9-5">
          <title>Automatic temperature control</title>
          <p>It consists of two systems: a room cooling
system and a room heating system. Yes, it is
necessary to set the appropriate values for the
ambient temperature. For the air conditioner,
the temperature should be set between 23°C
and 30°C.</p>
          <p>Whereas for the oven, the temperature
should be set in the range from 0°C to 10°C.</p>
        </sec>
        <sec id="sec-1-9-6">
          <title>Heating system</title>
          <p>First, the performance of the heater is
tested if the temperature is below 10°C; thus,
the time is adjusted around midnight. The
temperature monitor is used to display the
current temperature.</p>
          <p>When the temperature changes over time,
we observe the operation of the heater.
• The heater is set to start when the
temperature is below 10°C and
continues to heat until the temperature
reaches 11°C.
• Second, the heater is tested after
stopping heating and when the
temperature drops below 10°C again, the
heater starts heating.</p>
        </sec>
        <sec id="sec-1-9-7">
          <title>Cooling system</title>
          <p>Here, approximately the same test as with
the heater is repeated. It’s just that the time the
period changes to about noon:
• The air conditioner is set to start when
the temperature exceeds 23°C and
continue to cool until the temperature
drops below 22°C.
• When the air conditioner stops cooling,
it starts working again when the
temperature exceeds 23°C. The
temperature rise test was successful.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3. Conclusion References</title>
      <sec id="sec-2-1">
        <title>Fire control system</title>
        <p>Fire is not included in the environment
variables. Therefore, objects imitating fire are
needed.</p>
        <p>This object must have an “IR” property with
a value that can be considered a fire. See
addition.</p>
        <p>We will check the siren and sprinkler in the
event of a fire and the opposite case: when a
fire is detected in the kitchen, the siren turns
on and the sprinkler starts spraying water.
Otherwise, the siren and sprinkler are off. So,
the fire control system of the kitchen is
working.</p>
        <p>To conduct the study, the necessary devices
were selected based on the network topology
that was used to implement a smart home. The
implementation consists of four parts: a smart
home, an Internet cloud, an IoT server, and a
3G network.</p>
        <p>The configuration for all devices has been
configured. The Cisco Packet Tracer
environment helps ensure proper
communication between home devices and
servers and solves the issue of their
interaction.</p>
        <p>Based on the simulated scenarios, the
automated operation of the devices and their
management were configured. Cisco Packet
Tracer enables you to modify device
functionality by writing your code using
JavaScript, Python, and Visual. This allows you
to expand the capabilities of device
management.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>/3395359-ak-pravilno-vibrati-merezne-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tanenbaum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wetherall</surname>
          </string-name>
          . Computer
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Networks</surname>
          </string-name>
          , 5th
          <string-name>
            <surname>Edition</surname>
          </string-name>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Khouchane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rabouhi</surname>
          </string-name>
          , Study of the
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Alawi.</surname>
          </string-name>
          Wi-Fi Technology: Future
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>Comput. Sci. 2</source>
          (
          <issue>1</issue>
          ) (
          <year>2006</year>
          )
          <fpage>13</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Yaibuates</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chaisricharoen</surname>
          </string-name>
          , ICMP
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Method for</surname>
            <given-names>DHCP</given-names>
          </string-name>
          ,
          <source>4th Joint Int. Conf. Info.</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          (
          <year>2014</year>
          ). doi:
          <volume>10</volume>
          .1109/jictee.
          <year>2014</year>
          .68040
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rouse</surname>
          </string-name>
          ,
          <article-title>Internet of things (IoT)</article-title>
          , IOT
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Agenda</surname>
          </string-name>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Development and Operation</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <issue>Subsystem 2</issue>
          .
          <fpage>4</fpage>
          -
          <issue>2</issue>
          .5 GHz Range, Data-
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>Centric Business and Applications 48</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          (
          <year>2020</year>
          )
          <fpage>675</fpage>
          -
          <lpage>709</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zennaro</surname>
          </string-name>
          , Introduction to the Internet
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Elshafee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Hamed</surname>
          </string-name>
          . 2012 Design and
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Eng</surname>
          </string-name>
          . Technol.
          <volume>68</volume>
          (
          <year>2012</year>
          )
          <fpage>2177</fpage>
          -
          <lpage>2180</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Kosmatos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Tselikas</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Boucouvalas
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Adv</surname>
          </string-name>
          .
          <source>Internet Things</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ) (
          <year>2011</year>
          )
          <fpage>5</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <source>doi: 10</source>
          .4236/ait.
          <year>2011</year>
          .
          <volume>11002</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vladymyrenko</surname>
          </string-name>
          , et al.,
          <source>Analysis of</source>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>2019 IEEE International Scientific-</mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>Practical</given-names>
            <surname>Conference Problems of B. Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <source>Smart House Infocommunications, Science and Management System</source>
          ,
          <string-name>
            <surname>TCSET</surname>
          </string-name>
          <year>2022</year>
          :
          <article-title>Technology (</article-title>
          <year>2019</year>
          ). doi: Emerging Networking in
          <source>the Digital</source>
          <volume>10</volume>
          .1109/picst47496.
          <year>2019</year>
          .9061376 Transformation
          <string-name>
            <surname>Age</surname>
          </string-name>
          (
          <year>2023</year>
          )
          <fpage>268</fpage>
          -
          <lpage>283</lpage>
          . [14]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kuzminykh</surname>
          </string-name>
          , et al.,
          <source>Investigation of the doi:10</source>
          .1007/978-3-
          <fpage>031</fpage>
          -24963-1_
          <fpage>15</fpage>
          .
          <string-name>
            <surname>IoT Device Lifetime with Secure Data M. Soliman</surname>
          </string-name>
          , et al.
          <article-title>Smart Home: Transmission, Internet of Things, Smart Integrating Internet of Things with Web Spaces, and Next Generation Networks Services and Cloud Computing</article-title>
          ,
          <source>IEEE 5th and Systems</source>
          , vol.
          <volume>11660</volume>
          (
          <year>2019</year>
          )
          <fpage>16</fpage>
          -
          <lpage>27</lpage>
          . Int.
          <source>Conf. Cloud Comput. Technol. Sci. doi: 10</source>
          .1007/978-3-
          <fpage>030</fpage>
          -30859-
          <issue>9</issue>
          _
          <issue>2</issue>
          (
          <year>2013</year>
          ). doi:
          <volume>10</volume>
          .1109/CloudCom.
          <year>2013</year>
          .
          <volume>155</volume>
          . [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , et al.,
          <article-title>Method for Increasing Ukrinform, How to Choose the Right the Various Sources Data Consistency for Network Equipment (</article-title>
          <year>2022</year>
          ).
          <article-title>URL: https: IoT Sensors</article-title>
          , in: IEEE 9th International //www.ukrinform.ua/rubric-other
          <source>_news Conference on Problems of [1] [2] [3]</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Technology (PICST</surname>
          </string-name>
          ) (
          <year>2023</year>
          )
          <fpage>522</fpage>
          -
          <lpage>526</lpage>
          . Workshop on Cyber Hygiene, vol.
          <volume>2654</volume>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>doi:10.1109/PICST57299</source>
          .
          <year>2022</year>
          .
          <volume>10238518</volume>
          . (
          <year>2020</year>
          ). [16]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al., Bandwidth Research of [27]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <source>Modifications of</source>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <article-title>Wireless IoT Switches, in: IEEE 15th the Correlation Method of Face</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          (
          <year>2020</year>
          ).
          <source>doi: 10.1109/tcset49122.2020. Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>55</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <volume>2354922</volume>
          [28]
          <article-title>MQTT: The Standard for IoT Messaging</article-title>
          . [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rajabzadeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Manashty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Jahromi</surname>
          </string-name>
          , URL: https://mqtt.org
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <given-names>A Mobile</given-names>
            <surname>Application for Smart House</surname>
          </string-name>
          [29]
          <article-title>Radio-frequency identification</article-title>
          .
          <source>URL:</source>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <surname>Eng</surname>
          </string-name>
          . Technol.
          <volume>62</volume>
          (
          <year>2010</year>
          )
          <fpage>80</fpage>
          -
          <lpage>86</lpage>
          . frequency_identification [18]
          <string-name>
            <surname>Wonderbit</surname>
            , Internet of Things for [30]
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Saiko</surname>
          </string-name>
          , et al.,
          <source>A Method of Increasing</source>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <surname>Command</surname>
          </string-name>
          and Control.
          <source>the Reliability of Heterogeneous 5g/Iot</source>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <article-title>ur-work/ncia-iot-for-c2 Using the Terahertz Wave Range</article-title>
          , [
          <volume>19</volume>
          ]
          <string-name>
            <surname>Azure</surname>
          </string-name>
          ,
          <source>IoT Protocols and Connectivity. Information Technology and</source>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          URL: https://azure. microsoft.com/en- Implementation, vol.
          <volume>3384</volume>
          (
          <year>2022</year>
          )
          <fpage>120</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          us/solutions/iot/iot-technology-
          <volume>131</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          protocols [31]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Secured</surname>
            <given-names>Remote</given-names>
          </string-name>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Moshenchenko</surname>
          </string-name>
          , et. al.,
          <source>Optimization Update Protocol in IoT Data Exchange</source>
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <source>Cybersecurity Providing in Information Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <string-name>
            <surname>and Telecommunication Systems II</surname>
          </string-name>
          , (
          <year>2023</year>
          )
          <fpage>67</fpage>
          -
          <lpage>76</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          vol.
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>32</fpage>
          -
          <lpage>42</lpage>
          . [32]
          <string-name>
            <given-names>F.</given-names>
            <surname>Nataliia</surname>
          </string-name>
          , et al.,
          <source>Software System for [21] Constrained Application Protocol. URL: Processing and Visualization of Big Data</source>
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <article-title>ned_Application_Protocol for Engineering and Education (</article-title>
          <year>2022</year>
          ). [22]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <source>Calculation of 324-336</source>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <source>Quality Indicators of the Future 04812</source>
          <volume>-8</volume>
          _
          <fpage>28</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <given-names>Multiservice</given-names>
            <surname>Network</surname>
          </string-name>
          , Future Intent- [33]
          <string-name>
            <given-names>O.</given-names>
            <surname>Sihombing</surname>
          </string-name>
          , et al.,
          <source>Smart Home Design</source>
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <string-name>
            <given-names>Based</given-names>
            <surname>Networking</surname>
          </string-name>
          (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
          <lpage>209</lpage>
          . doi: for Electronic Devices Monitoring Based
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          10.1007/978-3-
          <fpage>030</fpage>
          -92435-5_
          <fpage>11</fpage>
          .
          <string-name>
            <surname>Wireless Gateway Network Using Cisco</surname>
            [23]
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Obushnyi</surname>
          </string-name>
          , et al.,
          <source>Autonomy of Packet Tracer, J. Physics Conf</source>
          . Series
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <string-name>
            <given-names>Economic</given-names>
            <surname>Agents in</surname>
          </string-name>
          Peer-to-
          <source>Peer</source>
          <volume>1007</volume>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , in: Cybersecurity Providing in
          <volume>6596</volume>
          /1007/1/012021.
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          <string-name>
            <surname>Information</surname>
            and Telecommunication [34]
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Mishra</surname>
          </string-name>
          , et al.,
          <source>Design and</source>
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>125</fpage>
          -
          <lpage>133</lpage>
          . Implementation of Smart Home Network [24]
          <string-name>
            <given-names>O.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <article-title>Methods of the using Cisco Packet Tracer</article-title>
          , ITM Web
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          <article-title>Research in the Networks with the IoT Commun</article-title>
          .
          <volume>44</volume>
          (
          <year>2022</year>
          ) doi: 10.1051/
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          <string-name>
            <given-names>Concept</given-names>
            <surname>Support</surname>
          </string-name>
          , in: Cybersecurity itmconf/20224401008.
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          <source>Telecommunication Systems</source>
          , vol.
          <volume>2923</volume>
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          (
          <year>2021</year>
          )
          <fpage>277</fpage>
          -
          <lpage>282</lpage>
          . [25]
          <string-name>
            <surname>H.-C. Chao</surname>
          </string-name>
          , et al.,
          <source>The Network Topology</source>
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          <string-name>
            <given-names>Based</given-names>
            <surname>Domain Name Service</surname>
          </string-name>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          528-
          <fpage>533</fpage>
          . doi:
          <volume>10</volume>
          .1109/ICPPW.
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          800111. [26]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <source>Comparative</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>