Assignment 1: Safeguarding Shadows: The IMU-Light Sensor Adventure
Once upon a time in a Durgapur city, there was a remarkable technology that played a vital role in people's lives. It was a combination of two incredible sensors: the IMU (Inertial Measurement Unit) and the Light Sensor.
The IMU sensor was like a secret detective. It could identify different activities with ease. When someone was standing still, it knew. When someone was sitting comfortably, it sensed that too. But its most crucial job was to detect emergencies, like when someone fell down unexpectedly. It was a guardian angel in disguise, sending alerts to keep people safe.
On the other side of town, the Light Sensor was quietly at work. It was a beacon of hope for women's safety. By measuring the darkness on the streets, it could determine areas that needed better lighting. It helped create well-lit pathways, ensuring that women could walk safely at any hour.
One day, a young woman named Maya was walking home late at night. Thanks to the Light Sensor, the path was well-lit, and she felt secure. Suddenly, the IMU sensor in her phone alerted her to a possible threat nearby. She quickly took a safer route and avoided danger.
Together, the IMU and Light Sensor were superheroes in the world of technology, safeguarding lives and brightening the path towards a safer and more secure future for everyone.
Compose your report using Overleaf, adhering to the Springer format guidelines
Problem: Install a mobile app on your smartphone designed for data collection utilizing both the IMU (Inertial Measurement Unit) and Light Sensor functionalities. Proceed to conduct a series of activities, comprising (a) standing, (b) sitting, and (c) jumping, and scrutinize whether these activities exhibit discernible patterns or distinctive signatures.
Furthermore, embark on an analysis to detect any areas with inadequate lighting during your nighttime journey from college to your hostel. Compose your report following the format guidelines provided by Springer and use Overleaf for document preparation.
Data Aquisition: https://play.google.com/store/apps/details?id=com.chrystianvieyra.physicstoolboxsuite&hl=en&gl=US
Deadline: 17.09.2023
Assignment 2: Is the air in your city safe to breathe?
Pollution has become a major issue in India, leading to dirty air, contaminated rivers, and cities shrouded in thick, polluted fog. Over time, this pollution has caused numerous health and environmental problems, especially for future generations who face breathing difficulties, water scarcity, and a planet in distress. If you believe your city is pollution-free, think again. The Health Effects Institute's State of Global Air Initiative has identified the top 10 most polluted cities in the world:
1. Delhi, India
2. Kolkata, India
3. Kano, Nigeria
4. Lima, Peru
5. Dhaka, Bangladesh
6. Jakarta, Indonesia
7. Lagos, Nigeria
8. Karachi, Pakistan
9. Beijing, China
10. Accra, Ghana
However, this list doesn't mean other cities have breathable air. With pollution harming animals, plants, and humans and contaminating natural resources, it's crucial for humanity to take strong steps towards environmental protection. People are now demanding changes to ensure clean air, water, and a healthier Earth for future generations.
Title: Investigation of Air Quality Index (AQI) and its Relationship with Humidity and Temperature in Various Vicinities near the National Institute of Technology, Durgapur.
The assignment's focus lies on assessing air quality through sensors measuring dust particles, NO2, CO, humidity, and temperature. Our aim is to determine the Air Quality Index (AQI) in different locations adjacent to the National Institute of Technology (NIT), Durgapur, which includes:
(a) A Classroom with Air Conditioning (AC).
(b) A Non-AC Classroom.
(c) Your Hostel Room.
(d) In the proximity of the Main Gate at NIT Durgapur.
Furthermore, we will explore potential correlations between AQI and humidity, as well as temperature.
Deadline: 29th September 2023
Assignment 3: Data Transmission Under the Microscope: Wireshark's Watchful Eye
1. Install Wireshark on your computer: Begin by downloading and installing Wireshark, a network protocol analyzer, to monitor and capture network traffic.
2. Run a simple TCP Client and Server code: Create and execute a basic TCP client-server code to establish a connection between two devices, allowing data exchange.
3. Examine how data packets traverse the five communication layers: Utilize Wireshark to analyze the journey of data packets through the five TCP/IP layers, including physical, data link, network, transport, and application layers.
4. Observe the three-way handshake process, data transmission, and acknowledgment procedures: Investigate the TCP three-way handshake, which involves SYN, SYN-ACK, and ACK packets. Monitor the transmission of data packets and the acknowledgment process that ensures reliable data delivery.
5. Execute a basic UDP server code: Develop and run a simple UDP (User Datagram Protocol) server code to facilitate communication via a connectionless protocol.
6. Investigate how UDP packets travel through the TCP/IP protocol stack: Use Wireshark to track the path of UDP packets as they navigate through the layers of the TCP/IP protocol stack, which includes the network and transport layers.
7. Analyze the use of the DHCP protocol for handling UDP packets: Explore the role of the DHCP (Dynamic Host Configuration Protocol) in assigning IP addresses and other network configuration parameters to devices, which often involves the use of UDP packets for communication.
By following these steps and leveraging Wireshark's capabilities, you can gain valuable insights into network communication, protocols, and packet behavior.
Assignment 4: Exploring QUIC: Network Packet Exploration
In the rapidly evolving realm of the internet, where speed and efficiency are paramount, a transformative hero emerged known as QUIC (Quick UDP Internet Connections). This is the compelling saga of QUIC's history and its profound impact on our online world.
QUIC's inception dates back to the early 2010s when Google's visionary engineers identified a pressing need for a protocol that could accelerate web browsing without compromising security. Traditional protocols, such as TCP, often grappled with latency issues, impeding the seamless flow of data. Google embarked on a mission to craft a protocol that would revolutionize our online connectivity.
Built upon the solid foundation of the User Datagram Protocol (UDP), renowned for its speed and efficiency, QUIC set out to streamline connection setup. Unlike TCP, which demanded multiple round-trip exchanges to establish a connection, QUIC introduced a sleek three-way handshake process, drastically reducing latency. Yet, QUIC's brilliance extended further. It introduced multiplexing, enabling multiple data streams to flow concurrently over a single connection. This translated to quicker loading times for web pages brimming with resources like images, stylesheets, and scripts.
What truly set QUIC apart was its adaptability. Dynamic congestion control algorithms were incorporated, dynamically adjusting data transmission rates, ensuring peak performance even in demanding network scenarios. This real-time adaptability made QUIC the favored choice of speed enthusiasts. As time progressed, QUIC transcended Google's confines and was embraced by the wider internet community. It earned recognition in the standardization process under the Internet Engineering Task Force (IETF). Eventually, it became the cornerstone of HTTP/3, the latest iteration of the Hypertext Transfer Protocol (HTTP) that drives web communication.
In the ever-expanding digital landscape, QUIC was more than just a protocol; it symbolized innovation and adaptability. It exemplified the relentless pursuit of excellence, showcasing that even the most fundamental aspects of the internet could be reimagined to meet the demands of the digital era.
Today, QUIC stands as a beacon of hope for a swifter, more efficient online universe. It continues to evolve, offering users and businesses the assurance of an internet experience that not only emphasizes speed but also prioritizes security and reliability. In the ongoing narrative of technological advancement, QUIC remains an influential force, shaping how we traverse the digital frontier.
Create and execute a basic QUIC client-server code to establish a connection between two devices, allowing data exchange. Utilize Wireshark to analyze the journey of data packets through the five TCP/IP layers, including physical, data link, network, transport, and application layers.