You are on page 1of 56

akshat.jain.ug20@nsut.ac.

in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 11 : Assignment 11
The due date for submitting this assignment has passed.

Course outline Due on 2024-04-10, 23:59 IST.


As per our records you have not submitted this assignment.

About NPTEL 1) In an optical wireless channel, the temporal dispersion caused by multipath is characterized by 1 point

BER
How does an NPTEL
online course work? Outage rate
Delay Spread
MATLAB Data rate

Week 0 No, the answer is incorrect.


Score: 0
Accepted Answers:
Week 1 Delay Spread

Week 2
2) In order to have minimum delay spread in an optical wireless channel the LED semiangle and the receiver field of view, (Φ 1 , Ψc ) combination 1 point
2

Week 3 should be

(Wide, Narrow)
Week 4
(Wide, Wide)
Week 5 (Narrow, Narrow)
(Narrow, Wide)
Week 6
No, the answer is incorrect.
Score: 0
Week 7 Accepted Answers:
(Narrow, Narrow)
Week 8
3) In VLC, the LED radiation pattern is characterized by its Lambertian parameter, which is expressed as 1 point
Week 9

ln(2)

Week 10 m = −
ln(coscos Φ 1 )

Week 11 ln(2)
m = −
ln(sinsin Φ 1 )
Hybrid Network LiFi and WiFi 2

Coexistance
ln(coscos Φ 1 )

Vehicle to Vehicle m = −
2

communication using Visible ln(2)

light - No video
ln(sinsin Φ 1 )

2
Indoor Channel simulation m = −
ln(2)

Indoor Channel simulation No, the answer is incorrect.


Score: 0
Week 11 Feedback Form :
Accepted Answers:
Optical Wireless ln(2)
m = −
Communications for Beyond ln(coscos Φ 1 )

5G Networks and IoT 2

Quiz: Week 11 : Assignment 4) In optical channel gain following the Lambertian radiation pattern the optical filter gain and concentrator gain is a function of 1 point
11

Week 12 LED semiangle ϕ 1

Download videos LED incidence angle θ

Problem Solving Session - Receiver field of view Ψc


Jan 2024
Receiver incidence angle Ψ
Lecture Material
No, the answer is incorrect.
Score: 0
Accepted Answers:
Receiver field of view Ψc

5) In a multi-source VLC channel modeling the overall response is a 1 point

Convolution of LoS and NLoS channel gain


Multiplication of LoS and NLoS channel gain
Sum of LoS and NLoS channel gain
Mean of LoS and NLoS channel gain

No, the answer is incorrect.


Score: 0
Accepted Answers:
Sum of LoS and NLoS channel gain

6) To access the jth user associated with ith LED with aij for 2<=i<=4 and 1<=j<=2 of a matrix a, of order 5 ∗ 6 , which code is used? 1 point

a (2;4,1;2)
a (2,4:1,2)
a (2:4,1:2)
a (2,4;1,2)

No, the answer is incorrect.


Score: 0
Accepted Answers:
a (2:4,1:2)

7) Name the functions used, for multiplication and division of two polynomials in MATLAB. 1 point

Conv () and deconv ()


mult () and div ()
conv () and div
mult and div

No, the answer is incorrect.


Score: 0
Accepted Answers:
Conv () and deconv ()

8) What is the size of the z vector in a mesh (x,y,z) if the sizes of x and y vectors are m, n respectively? 1 point

[m, n]
(m, n)
[m, n)
Independent of m and n

No, the answer is incorrect.


Score: 0
Accepted Answers:
[m, n]

9) What is the nature of z in surf (x, y, z)? 1 point

Integer
Vector
Matrix
String

No, the answer is incorrect.


Score: 0
Accepted Answers:
Matrix

10) Colorbar command gives different color to the bar chart following their ______ 1 point

height
width
length
independently

No, the answer is incorrect.


Score: 0
Accepted Answers:
height
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 10 : Assignment 10
The due date for submitting this assignment has passed.

Course outline Due on 2024-04-03, 23:59 IST.

About NPTEL Assignment submitted on 2024-04-03, 23:09 IST


1) The expression for bit-error rate of an RZ OOK modulation, where SNR is the signal-to-noise ratio, is given by 1 point
How does an NPTEL
online course work?
1 1 − −−−−
( )erfc( √ SN R)
2 2

MATLAB
1 1 − −−−−
( )erfc( √ SN R)
2 2√ 2
Week 0
− −−−−
erfc(√ SN R)

Week 1
1 − −−−−
erfc( √ SN R)
2
Week 2
Yes, the answer is correct.
Score: 1
Week 3
Accepted Answers:
1 1 − −−−−
( )erfc( √ SN R)
2 2
Week 4

2) In BPSK, the binary symbols 1 and 0 are represented by the carrier with a phase shift of 1 point
Week 5

Week 6 Π/2

Π
Week 7

Week 8
0

Week 9 Yes, the answer is correct.


Score: 1
Accepted Answers:
Week 10 Π

NOMA VLC
3) On-off signaling is known as 1 point
MIMO, Zero Forcing (ZF) Rx,
MMSE Rx, Noise Bipolar signaling
enhancement in ZF Rx Polar signaling

VLC based MIMO NOMA Manchester signaling


Unipolar signaling
Power allocation in VLC
based MIMO NOMA Yes, the answer is correct.
Score: 1
Week 10 Feedback Form :
Accepted Answers:
Optical Wireless
Unipolar signaling
Communications for Beyond
5G Networks and IoT
4) Which modulation technique is most bandwidth-efficient 1 point
Quiz: Week 10 : Assignment
10 OOK-RZ
OOK-NRZ
Week 11
PPM

Week 12 None of the above

No, the answer is incorrect.


Download videos Score: 0
Accepted Answers:
Problem Solving Session - OOK-NRZ
Jan 2024
5) DPIM is more efficient than PPM in terms of 1 point
Lecture Material
Bandwidth
Power
Complexity
All of the above.

No, the answer is incorrect.


Score: 0
Accepted Answers:
All of the above.

6) The BER for OFDM with BPSK as a modulation scheme with L channel tap N subcarriers is: 1 point

−−−−−−−
1
SN R
1 N
(1 − √ )
2 L
2+ SN R
N

−−−−−−−
1
SN R
N
(1 − √ )
L
2+ SN R
N

−−−−−−−
1
SN R
N
2(1 − √ )
L
2+ SN R
N

−−−−−−−
1
SN R
1 N
(1 − √ )
2 L
1+ SN R
N

No, the answer is incorrect.


Score: 0
Accepted Answers:
−−−−−−−
1
SN R
1 N
(1 − √ )
2 L
2+ SN R
N

7) For 16 channel taps and 256 channel subcarriers with transmit SNR of 35 dB. What will be the BER for the OFDM system using BPSK as a 1 point
modulation scheme?

5 × 10-3
2.5 × 10-3
5 × 10-2
2.5 × 10-2

No, the answer is incorrect.


Score: 0
Accepted Answers:
2.5 × 10-3

8) An OFDM system operates within a bandwidth of 6 MHz on 16 subcarriers with a bandwidth efficiency of 0.8. The transmitted data is modulated 1 point
by an 8-PSK scheme. The data rate R of the system will be

18 Mbps.
9 Mbps.
3 Mbps.
27 Mbps.

No, the answer is incorrect.


Score: 0
Accepted Answers:
9 Mbps.

9) The traditional RF OFDM techniques cannot be directly applied to VLC because? 1 point

VLC operates only on real and non-negative signals


VLC generally exploits intensity modulation (IM) and direct detection (DD)
Both 1 and 2
Neither 1 or 2

No, the answer is incorrect.


Score: 0
Accepted Answers:
Both 1 and 2

10) The following are the OFDM techniques used in VLC 1 point

DC-biased optical OFDM (DCO-OFDM)


Asymmetrically clipped optical OFDM (ACO-OFDM)
Both 1 and 2
Neither 1 or 2

Yes, the answer is correct.


Score: 1
Accepted Answers:
Both 1 and 2
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 9 : Assignment 9
The due date for submitting this assignment has passed.

Course outline Due on 2024-03-27, 23:59 IST.

About NPTEL Assignment submitted on 2024-03-27, 21:59 IST


1) The primary concept behind NOMA is 1 point
How does an NPTEL
online course work? Serve multiple users over the same resource elements
Serve one user over the multiple resource elements
MATLAB
Serve multiple users over the multiple resource elements

Week 0 None of the above

Yes, the answer is correct.


Week 1 Score: 1
Accepted Answers:
Week 2 Serve multiple users over the same resource elements

Week 3 2) In VLC NOMA is constituted of two main types, namely 1 point

Power domain PD-NOMA


Week 4
Code domain NOMA (CD-NOMA)
Week 5 Both 1 & 2
Neither 1 & 2
Week 6
No, the answer is incorrect.
Score: 0
Week 7 Accepted Answers:
Both 1 & 2
Week 8
3) A NOMA inspired interference cancellation scheme is proposed, where part of the dedicated sensing signal is treated as the virtual 1 point
Week 9 communication signals to be mitigated at each communication user via

ACO-OFDM Successive noise cancellation (SNC)


Color Shift Keying (CSK) Successive interference cancellation (SIC)

Higher order CSK Both 1 & 2


Neither 1 & 2
5G and IOT Requirments
Yes, the answer is correct.
Week 9 Feedback Form : Score: 1
Optical Wireless Accepted Answers:
Communications for Beyond Successive interference cancellation (SIC)
5G Networks and IoT

Quiz: Week 9 : Assignment 4) ---------- as a multiple access technique efficiently utilizes the power domain to serve multiple users simultaneously in the same frequency band 1 point
9 and time slot using the same code

Week 10 Power domain PD-NOMA


Code domain NOMA (CD-NOMA)
Week 11
Both 1 & 2
Neither 1 & 2
Week 12
Yes, the answer is correct.
Download videos Score: 1
Accepted Answers:
Power domain PD-NOMA
Problem Solving Session -
Jan 2024
5) NOMA performance in VLC by controlling the channel gain difference between users by 1 point

Lecture Material
Tuning the semiangle of the LEDs
Tuning the field-of-view of the PDs
None of a and b
Both a and b

Yes, the answer is correct.


Score: 1
Accepted Answers:
Both a and b

6) With the help of the CIE 1931 chromaticity diagram we can implement infinite color band combinations for conventional CSK modulation scheme: 1 point

True
False
May be

Yes, the answer is correct.


Score: 1
Accepted Answers:
False

7) The optical power of red, green and blue LEDs in CSK can be related to: 1 point

x-y chromaticity values in CIE 1931 chromaticity diagram.


Center of color bands respective to red, green and blue wavelength on x-y color coordinates.
None of a and b
Both a and b

Yes, the answer is correct.


Score: 1
Accepted Answers:
Both a and b

8) In standard CSK scheme, the channel gain matrix termed as H is a combination of how many IM/DD channels? 1 point

3x3
2x2
2x3
3x2

Yes, the answer is correct.


Score: 1
Accepted Answers:
3x3

9) Assume P as optical power of LED and x and y as center of a color band in chromaticity coordinates. i, j, and k represents the red, green, and 1 point
blue LEDs in a standard CSK scheme. Which line of code should be there in implementing CSK?

P i + P j + P k == 1

x i × P i + x j × P j + x k × P k == 1

x i + x j + x k == 1

yi + yj + yk == 1

Yes, the answer is correct.


Score: 1
Accepted Answers:
P i + P j + P k == 1

10) While implementing Optical-OFDM such as ACO-OFDM, why we use QAM modulation and demodulation? 1 point

Because QAM is an easier option


Because of the subcarrier modulation in O-OFDM
Because of the optical signal in O-OFDM
Because O-OFDM can be implemented only with QAM

Yes, the answer is correct.


Score: 1
Accepted Answers:
Because of the subcarrier modulation in O-OFDM
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 7 & 8 : Revised Assignment
The due date for submitting this assignment has passed.

Course outline Due on 2024-04-05, 23:59 IST.


As per our records you have not submitted this assignment.

About NPTEL 1) What processing step combines multiple OFDM subcarriers into a single signal for transmission? 1 point

FFT
How does an NPTEL
online course work? IFFT
RF Combining
MATLAB RF Combining

Week 0 No, the answer is incorrect.


Score: 0
Accepted Answers:
Week 1 IFFT

Week 2
2) Why is a cyclic prefix required in an OFDMA? 1 point

Week 3 To ensure symbol time is an integer number


To help overcome multipath and ISI
Week 4
To maintain orthogonality

Week 5 To make OFDMA scalable

No, the answer is incorrect.


Week 6 Score: 0
Accepted Answers:
Week 7 To help overcome multipath and ISI

Week 8 3) In OFDMA, what is the relationship between the subcarrier spacing f and symbol time t? 1 point

OFDM Basics f=t


f = 1/2t
Cyclic Prefix (CP), OFDM with
CP, BER of OFDM System f = 1/t
f = 2t
Frequency Offset in OFDM,
PAPR in OFDM No, the answer is incorrect.
Score: 0
OFDM in VLC, DCO-OFDM
Accepted Answers:
Week 8 Feedback Form : f = 1/t
Optical Wireless
Communications for Beyond 4) Which standard uses OFDM process? 1 point
5G Networks and IoT
IEEE 802.11
Quiz: Week 8 : Assignment 8
IEEE 802.11 a
Quiz: Week 7 & 8 : Revised IEEE 802.11 b
Assignment
None of these
Week 9 No, the answer is incorrect.
Score: 0
Week 10 Accepted Answers:
IEEE 802.11 a
Week 11
5) The guard interval is provided in OFDM 1 point
Week 12
To eliminate the need of a pulse shaping filter

Download videos To eliminate ISI


High symbol rate
Problem Solving Session - All of the above
Jan 2024
No, the answer is incorrect.
Score: 0
Lecture Material
Accepted Answers:
To eliminate the need of a pulse shaping filter
To eliminate ISI

6) The PAPR of the OFDM signal in the case of the BPSK signal is 1 point

2
a

2
a

No, the answer is incorrect.


Score: 0
Accepted Answers:
N

7) For which modulation technique, the error performance is best described in terms of slot error rate. 1 point

OOK-RZ
PPM
DPIM
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
DPIM

8) PPM outperforms OOK modulation technique, since it is 1 point

Power efficient
Bandwidth efficient
Less complex
All of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Power efficient

9) The ratio of power requirement for OOK-RZ and OOK-NRZ modulation scheme is 1 point

0.707
0.5
0.1
0.577

No, the answer is incorrect.


Score: 0
Accepted Answers:
0.707

10) The ratio of SNR of 2-PAM and 2-PPM is 1 point

4.77 dB
0 dB
4.5 dB
10.5 dB

No, the answer is incorrect.


Score: 0
Accepted Answers:
0 dB

11) In order to achieve the same throughput as OOK, PPM slot duration is shorter than the OOK bit duration by a factor of …………. where, L=2M . 1 point

L/M
M/L
1
0.5

No, the answer is incorrect.


Score: 0
Accepted Answers:
L/M

12) 1

−−
Eb 1 point
Which one of the following digital modulation schemes has the bit error rate as 2
erf c (√
No
) ?

Coherent binary PSK


Coherent binary FSK
DPSK
Noncoherent binary FSK

No, the answer is incorrect.


Score: 0
Accepted Answers:
Coherent binary PSK

13) Which is called as on-off keying? 1 point

Amplitude shift keying


Uni-polar PAM
Amplitude shift keying & Uni-polar PAM
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Amplitude shift keying & Uni-polar PAM

14) _____________ is essentially a crude form of Amplitude shift keying. 1 point

Analog modulation
Digital intensity modulation
Photodetector
Receiver structure

No, the answer is incorrect.


Score: 0
Accepted Answers:
Digital intensity modulation

15) Which modulation scheme would you suggest for high speed data transmission over optical channel? 1 point

ASK
BPSK
FSK
OFDM

No, the answer is incorrect.


Score: 0
Accepted Answers:
OFDM
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 8 : Assignment 8
The due date for submitting this assignment has passed.

Course outline Due on 2024-03-20, 23:59 IST.

About NPTEL Assignment submitted on 2024-03-20, 23:12 IST


1) The primary concept behind NOMA is 1 point
How does an NPTEL
online course work? Serve multiple users over the same resource elements
Serve one user over the multiple resource elements
MATLAB
Serve multiple users over the multiple resource elements

Week 0 None of the above

Yes, the answer is correct.


Week 1 Score: 1
Accepted Answers:
Week 2 Serve multiple users over the same resource elements

Week 3 2) In VLC NOMA is constituted of two main types, namely, 1 point

Power domain PD-NOMA


Week 4
Code domain NOMA (CD-NOMA)
Week 5 Both 1 & 2
Neither 1 & 2
Week 6
No, the answer is incorrect.
Score: 0
Week 7 Accepted Answers:
Code domain NOMA (CD-NOMA)
Week 8
3) A NOMA inspired interference cancellation scheme is proposed, where part of the dedicated sensing signal is treated as the virtual 1 point
OFDM Basics
communication signals to be mitigated at each communication user via
Cyclic Prefix (CP), OFDM with
CP, BER of OFDM System Successive noise cancellation (SNC)
Successive interference cancellation (SIC)
Frequency Offset in OFDM,
PAPR in OFDM Both 1 & 2
Neither 1 & 2
OFDM in VLC, DCO-OFDM
Yes, the answer is correct.
Week 8 Feedback Form :
Score: 1
Optical Wireless
Accepted Answers:
Communications for Beyond
Successive interference cancellation (SIC)
5G Networks and IoT

Quiz: Week 8 : Assignment 4) --------- as a multiple access technique efficiently utilizes the power domain to serve multiple users simultaneously in the same frequency band 1 point
8 and time slot using the same code.
Quiz: Week 7 & 8 : Revised
Power domain PD-NOMA
Assignment
Code domain NOMA (CD-NOMA)
Week 9 Both 1 & 2
Neither 1 & 2
Week 10
Yes, the answer is correct.
Score: 1
Week 11
Accepted Answers:
Power domain PD-NOMA
Week 12

5) NOMA performance in VLC by controlling the channel gain difference between users by 1 point
Download videos
Tuning the semiangle of the LEDs
Problem Solving Session -
Tuning the field-of-view of the PDs
Jan 2024
None of a and b

Lecture Material Both a and b

Yes, the answer is correct.


Score: 1
Accepted Answers:
Both a and b

6) With the help of the CIE 1931 chromaticity diagram we can implement infinite color band combinations for conventional CSK modulation scheme: 1 point

True
False
May be

Yes, the answer is correct.


Score: 1
Accepted Answers:
False

7) The optical power of red, green and blue LEDs in CSK can be related to: 1 point

x-y chromaticity values in CIE 1931 chromaticity diagram


Center of color bands respective to red, green and blue wavelength on x-y color coordinates
None of a and b
Both a and b

Yes, the answer is correct.


Score: 1
Accepted Answers:
Both a and b

8) In standard CSK scheme, the channel gain matrix termed as H is a combination of how many IM/DD channels? 1 point

3x3
2x2
2x3
3x2

No, the answer is incorrect.


Score: 0
Accepted Answers:
3x3

9) Assume P as optical power of LED and x and y as center of a color band in chromaticity coordinates. i, j, and k represents the red, green, and 1 point
blue LEDs in a standard CSK scheme. Which line of code should be there in implementing CSK?

P i + P j + P k == 1

x i + P i + x j × P j + x k × P k == 1

x i + x j + x k == 1

yi + yj + yk == 1

Yes, the answer is correct.


Score: 1
Accepted Answers:
P i + P j + P k == 1

10) While implementing Optical-OFDM such as ACO-OFDM, why we use QAM modulation and demodulation? 1 point

Because QAM is an easier option


Because of the subcarrier modulation in O-OFDM
Because of the optical signal in O-OFDM
Because O-OFDM can be implemented only with QAM

Yes, the answer is correct.


Score: 1
Accepted Answers:
Because of the subcarrier modulation in O-OFDM
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 7 : Assignment 7
The due date for submitting this assignment has passed.

Course outline Due on 2024-03-13, 23:59 IST.

About NPTEL Assignment submitted on 2024-03-13, 23:11 IST


1) In VLC NOMA is constituted of two main types, namely, 1 point
How does an NPTEL
online course work? Power domain PD-NOMA
Code domain NOMA (CD-NOMA)
MATLAB
Both 1 & 2

Week 0 Neither 1 & 2

No, the answer is incorrect.


Week 1 Score: 0
Accepted Answers:
Week 2 Code domain NOMA (CD-NOMA)

Week 3 2) NOMA performance in VLC by controlling the channel gain difference between users by 1 point

Tuning the semiangle of the LEDs


Week 4
Tuning the field-of-view of the PDs
Week 5 Both 1 & 2
Neither 1 & 2
Week 6
Yes, the answer is correct.
Score: 1
Week 7 Accepted Answers:
Both 1 & 2
Modulation Schemes for
OWC, BER for OOK
3) The reason for using NOMA in VLC is 1 point
BER of M-PPM, BER of L-
PPM NOMA performs much better in high signal-to-noise ratio (SNR) scenarios.

Differential Pulse Interval VLC systems offer high SNRs due to the short distance between the transmitter and the receiver.
Modulation (DPIM) and Both 1 & 2
Differential Amplitude Pulse
Neither 1 & 2
Position Modulation (DAPPM)
No, the answer is incorrect.
Variable Pulse Position Score: 0
Modulation (VPPM) Accepted Answers:
Both 1 & 2
Week 7 Feedback Form :
Optical Wireless
Communications for Beyond 4) MIMO uses the following diversity technique ----------- 1 point
5G Networks and IoT
Antenna diversity
Quiz: Week 7 : Assignment
Time diversity
7
Frequency diversity
Week 8 Polarization diversity

Yes, the answer is correct.


Week 9 Score: 1
Accepted Answers:
Week 10 Antenna diversity

Week 11 5) In the MIMO-NOMA-VLC system the users are sorted (decoded) by 1 point

Week 12 Individual optical channel gains of each user


Sum of the optical channel gains of each user
Download videos
Square sum of the optical channel gains of each user
None of the above
Problem Solving Session -
Jan 2024 No, the answer is incorrect.
Score: 0
Lecture Material Accepted Answers:
Sum of the optical channel gains of each user

6) The power allocation method used in NOMA-VLC systems 1 point

Gain Ratio Power Allocation (GRPA)


Normalized Gain Difference Power Allocation (NGDPA)
Both 1 & 2
Neither 1 & 2

No, the answer is incorrect.


Score: 0
Accepted Answers:
Both 1 & 2

7) Assuming that P1 represents the weak signal power and P2 is the strong signal power. The receiver can decode the better signal (i.e., user 2), 1 point
and user 2 can efficiently support the rate that is described by

2
P 2 |h2 |
R2 = B(1 + )
N0

2
P 1 |h2 |
R2 = B(1 + )
N0

2
P 1 |h1 |
R2 = B(1 + )
N0

2
P 2 |h1 |
R2 = B(1 + )
N0

Yes, the answer is correct.


Score: 1
Accepted Answers:
2
P 2 |h2 |
R2 = B(1 + )
N0

8) Based on (7) using SIC the rate user 1 can support reliable rate that is expressed as 1 point

2 2
(P 1 +P 2 )|h2 | P 2 |h2 |
R1 = B(1 + ) − B(1 + )
N0 N0

2 2
(P 1 +P 2 )|h1 | P 2 |h2 |
R1 = B(1 + ) − B(1 + )
N0 N0

2 2
(P 1 +P 2 )|h2 | P 2 |h1 |
R1 = B(1 + ) − B(1 + )
N0 N0

2 2
(P 1 +P 2 )|h1 | P 2 |h1 |
R1 = B(1 + ) − B(1 + )
N0 N0

No, the answer is incorrect.


Score: 0
Accepted Answers:
2 2
(P 1 +P 2 )|h1 | P 2 |h2 |
R1 = B(1 + ) − B(1 + )
N0 N0

9) The overall Sum Rate for MIMO-NOMA-VLC system for two users is given by 1 point

2
(P 1 +P 2 )|h2 |
R = B(1 + )
N0

2
(P 1 +P 2 )|h1 |
R = B(1 + )
N0

2
(P 1 )|h1 |
R = B(1 + )
N0

2
(P 2 )|h2 |
R = B(1 + )
N0

No, the answer is incorrect.


Score: 0
Accepted Answers:
2
(P 1 +P 2 )|h1 |
R = B(1 + )
N0

10) In MIMO-VLC NOMA, which factor has the greatest influence on data rates? 1 point

The size of the antenna


The height of the antenna
The number of transmit antenna
The area of receive antenna

Yes, the answer is correct.


Score: 1
Accepted Answers:
The number of transmit antenna
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 6 : Assignment 6
The due date for submitting this assignment has passed.

Course outline Due on 2024-03-06, 23:59 IST.

About NPTEL Assignment submitted on 2024-03-06, 18:40 IST


1) Atmospheric turbulence occurs due to 1 point
How does an NPTEL
online course work? Random fluctuation of the atmospheric refractive index
Lack of perfect alignment of the transmitter and receiver
MATLAB
Imperfect lenses used in the design of both the transmitter and receiver

Week 0 None of the above

Yes, the answer is correct.


Week 1 Score: 1
Accepted Answers:
Week 2 Random fluctuation of the atmospheric refractive index

Week 3 2) The refractive index structure parameter Cn2 is a function of .......... 1 point

Wavelength
Week 4
Temperature
Week 5 Atmospheric altitude
Beam divergence angle
Week 6
No, the answer is incorrect.
Score: 0
Atmospheric
Turbulence...contd Accepted Answers:
Wavelength
Turbulence Mitigation Temperature
techniques Atmospheric altitude
Underwater OWC Channel
Model 3) In case of weak turbulence, the scintillation index for the plane wave is expressed as 1 point

Underwater OWC Channel


Model...contd
7 11
2
0.5C n K 6
L 6

Week 6 Feedback Form :


7 11

Optical Wireless 2
1.23C n K 6
L 6

Communications for Beyond


5G Networks and IoT 2
7 11

0.64C n K 6
L 6

Quiz: Week 6 : Assignment


7 11
6 2
0.9C n K 6
L 6

Week 7 Yes, the answer is correct.


Score: 1
Accepted Answers:
Week 8 7 11
2
1.23C n K 6 L 6

Week 9
4) Under beam wander effect, diffraction effects are assumed to be ………., when the receiver aperture diameter D is greater than the size of 1 point
Fresnel zone.
Week 10
Significant
Week 11
Insignificant

Week 12 Large
None of the above
Download videos Yes, the answer is correct.
Score: 1
Problem Solving Session - Accepted Answers:
Jan 2024 Insignificant

Lecture Material 5) Under weak turbulence channel conditions, the longer wavelength will experience……………………. irradiance fluctuations for an FSO link range. 1 point

Moderate
Higher
Lesser
Negligible

Yes, the answer is correct.


Score: 1
Accepted Answers:
Lesser

6) The techniques employed to mitigate the channel fading due to atmospheric turbulence are 1 point

Increased power
Frequency diversity scheme
Spatial and temporal diversity scheme
Aperture averaging

Partially Correct.
Score: 0.67
Accepted Answers:
Frequency diversity scheme
Spatial and temporal diversity scheme
Aperture averaging

7) Which appropriate statistical model is used for characterizing the amplitude fluctuations specifically in weak atmospheric conditions? 1 point

Log- normal
Gamma-Gamma
I-K model
K model

Yes, the answer is correct.


Score: 1
Accepted Answers:
Log- normal

8) Normalized irradiance is defined as the 1 point

Product of small-scale (X) and large-scale (Y) dependent fluctuations


Sum of small-scale (X) and large-scale (Y) independent fluctuations
Sum of small-scale (X) and large-scale (Y) dependent fluctuations
Product of small-scale (X) and large-scale (Y) independent fluctuations

Yes, the answer is correct.


Score: 1
Accepted Answers:
Product of small-scale (X) and large-scale (Y) independent fluctuations

9) Which statistical models are used for describing under water turbulence? 1 point

Log- normal
Gamma-Gamma
I-K model
Mixture Exponential- Generalized Gamma

Yes, the answer is correct.


Score: 1
Accepted Answers:
Log- normal
Gamma-Gamma
Mixture Exponential- Generalized Gamma

10) The main sources of background noise in under water optical communication link are: 1 point

Dark noise
Background noise from the Sun
Scattered light collected by the receiver
Shot noise

No, the answer is incorrect.


Score: 0
Accepted Answers:
Background noise from the Sun
Scattered light collected by the receiver
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 5 : Assignment 5
The due date for submitting this assignment has passed.

Course outline Due on 2024-02-28, 23:59 IST.

About NPTEL Assignment submitted on 2024-02-28, 23:23 IST


1) An optical transmitter transmits 10 W power. Compute its equivalent power in dBm 1 point
How does an NPTEL
online course work? 10 dBm
-40 dBm
MATLAB
30 dBm

Week 0 40 dBm

Yes, the answer is correct.


Week 1 Score: 1
Accepted Answers:
Week 2 40 dBm

Week 3 2) When λ is the optical wavelength in vacuum, k is given by k=2Π/λ . What does k stand for ………............? 1 point

Phase propagation constant


Week 4
Dielectric constant
Week 5 Boltzmann’s constant
Free-space constant
Outdoor Optical Channel
Modelling Yes, the answer is correct.
Score: 1
Range equation of FSO link Accepted Answers:
Phase propagation constant
Range equation of FSO
link...contd
3) Calculate the diameter of the spot of the optical beam at an optical link distance of 350 km when the wavelength is 500 nm and the diameter of 1 point
Atmospheric Turbulence
the transmitter is 4.7 cm?
Week 5 Feedback Form :
Optical Wireless 5m
Communications for Beyond 9.5 m
5G Networks and IoT 8m
Quiz: Week 5 : Assignment 9.1 m
5
Yes, the answer is correct.
Score: 1
Week 6
Accepted Answers:
9.1 m
Week 7

4) As light travels along a FSO link, it received optical power ………. with FSO link distance 1 point
Week 8
Increases
Week 9
Decreases
Does not affected
Week 10
None of the above
Week 11 Yes, the answer is correct.
Score: 1
Week 12 Accepted Answers:
Decreases
Download videos
5) Attenuation coefficient is commonly expressed in units of 1 point
Problem Solving Session -
dB/m
Jan 2024
dBm
Lecture Material dB/Km
dB

No, the answer is incorrect.


Score: 0
Accepted Answers:
dB/Km

6) The beam divergence θb and transmitted aperture diameter D T are……………………. proportional to each other. 1 point

Directly
Inversely
Equally
None of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Inversely

7) Which of the atmospheric turbulence effects is observed if the size of the turbulent eddy is larger than the transmitter beam size? 1 point

Beam wander
Beam scintillation
Beam spreading
Pointing error displacement

Partially Correct.
Score: 0.5
Accepted Answers:
Beam wander
Pointing error displacement

8) The free space loss of the FSO link is ………………. with respect to link distance. 0 points

Directly proportional
Inversely proportional
Equally
None of the above

Yes, the answer is correct.


Score: 0
Accepted Answers:
Inversely proportional

9) The FSO communication link relatively less affected by 1 point

Fog
Rain
Clear air
Very light mist

Yes, the answer is correct.


Score: 1
Accepted Answers:
Clear air

10) Relation between gain and effective aperture is given by 1 point

2
G = (4πAe )/λ

2
G = (4πλ )/Ae

G = 4πAe

2
G = Ae /λ

Yes, the answer is correct.


Score: 1
Accepted Answers:
2
G = (4πAe )/λ
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 4 : Assignment 4
The due date for submitting this assignment has passed.

Course outline Due on 2024-02-21, 23:59 IST.

About NPTEL Assignment submitted on 2024-02-20, 22:20 IST


1) The received signal from a multipath channel is expressed as 1 point
How does an NPTEL
online course work? Convolution of transmitted signal and impulse response
Addition of transmitted signal and impulse response
MATLAB
Subtraction of transmitted signal and impulse response

Week 0 None of the above

Yes, the answer is correct.


Week 1 Score: 1
Accepted Answers:
Week 2 Convolution of transmitted signal and impulse response

Week 3 2) The capacity of a MIMO system is maximized (in absence of CSI at transmitter) when the channel matrix (H) is 1 point

Unitary Matrix
Week 4
Orthogonal Matrix
Channel model for single Symmetric Matrix
source
Skew-symmetric Matrix
Channel model for multiple
No, the answer is incorrect.
sources
Score: 0
MIMO channel Accepted Answers:
Orthogonal Matrix
MIMO channel...contd

Week 4 Feedback Form : 3) Which of the following is not used to improve received signal quality over small scale times and distance? 1 point
Optical Wireless
Communications for Beyond Modulation
5G Networks and IoT Equalization

Quiz: Week 4 : Assignment Diversity


4 Channel coding

Week 5 Yes, the answer is correct.


Score: 1
Accepted Answers:
Week 6 Modulation

Week 7
4) Which of the following is not an algorithm for equalizer? 1 point

Week 8 Zero forcing algorithm


Least mean square algorithm
Week 9
Recursive least square algorithm

Week 10 Mean square error algorithm

Yes, the answer is correct.


Week 11 Score: 1
Accepted Answers:
Week 12 Mean square error algorithm

Download videos 5) Consider MIMO system with 3 transmit antenna and 4 receive antenna. What is the dimension of the channel matrix. 1 point

3x4
Problem Solving Session -
Jan 2024 4x3
3x3
Lecture Material 3x1

No, the answer is incorrect.


Score: 0
Accepted Answers:
4x3

6) For N symbol inputs, the LMS algorithm requires ______ operations per iteration. 1 point

2N
N+1
2N+1

N2

Yes, the answer is correct.


Score: 1
Accepted Answers:
2N+1

7) In a VLC system that uses a zero-forcing receiver, the channel matrix can be made well-conditioned by following the PD receiver structure. 1 point

Multi-PD receiver with the same field-of-view


Single PD receiver with wider field-of-view
Multi-PD receiver with varying field-of-view (small and wide)
Single PD receiver with small field-of-view

No, the answer is incorrect.


Score: 0
Accepted Answers:
Multi-PD receiver with varying field-of-view (small and wide)

8) In maximal ratio combining, the output SNR is equal to __________ 1 point

Mean of all individual SNRs


Maximum of all SNRs
Sum of individual SNR
Minimum of all SNRs

Yes, the answer is correct.


Score: 1
Accepted Answers:
Sum of individual SNR

9) Which is more effective and commonly preferred technique 1 point

Spatial diversity
Time diversity
Frequency diversity
None of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Spatial diversity

10) Diversity employs decision making at-------------- 1 point

Transmitter
Receiver
Communication channel
Transmitter and receiver

Yes, the answer is correct.


Score: 1
Accepted Answers:
Receiver
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 3 : Assignment 3
The due date for submitting this assignment has passed.

Course outline Due on 2024-02-14, 23:59 IST.

About NPTEL Assignment submitted on 2024-02-14, 21:28 IST


1) In an optical wireless channel, the temporal dispersion caused by multipath is characterized by 1 point
How does an NPTEL
online course work? BER
Outage rate
MATLAB
Delay Spread

Week 0 Data rate

Yes, the answer is correct.


Week 1 Score: 1
Accepted Answers:
Week 2 Delay Spread

Week 3 2) In order to have minimum delay spread in an optical wireless channel the LED semiangle and the receiver field of view, (ϕ 1 , Ψc ) combination 1 point
2

should be
Photodetectors (to be contd)

SNR for PIN and APD (Wide, Narrow)


(Wide, Wide)
Indoor OWC channel
modelling (Narrow, Narrow)
(Narrow, Wide)
Indoor OWC channel
modelling...contd Yes, the answer is correct.
Score: 1
Week 3 Feedback Form : Accepted Answers:
Optical Wireless (Narrow, Narrow)
Communications for Beyond
5G Networks and IoT
3) In VLC, the LED radiation pattern is characterized by its Lambertian parameter, which is expressed as 1 point
Quiz: Week 3 : Assignment
3
ln(2)
m = −
ln(coscosϕ 1 )

Week 4 2

ln(2)
Week 5 m = −
ln(sinsinϕ 1 )

Week 6
ln(coscosϕ 1 )

2
m = −
Week 7 ln(2)

ln(sinsinϕ 1 )
Week 8 2
m = −
ln(2)

Week 9 Yes, the answer is correct.


Score: 1
Week 10 Accepted Answers:
ln(2)
m = −
ln(coscosϕ 1 )
Week 11 2

Week 12 4) In optical channel gain following the Lambertian radiation pattern the optical filter gain and concentrator gain is a function of 1 point

Download videos
LED semiangle ϕ 1

Problem Solving Session -


LED incidence angle θ
Jan 2024

Receiver field of view Ψ c


Lecture Material

Receiver incidence angle Ψ

No, the answer is incorrect.


Score: 0
Accepted Answers:
Receiver field of view Ψ c

5) In a multi-source VLC channel modeling the overall response is a 1 point

Convolution of LoS and NLoS channel gain


Multiplication of LoS and NLoS channel gain
Sum of LoS and NLoS channel gain
Mean of LoS and NLoS channel gain

Yes, the answer is correct.


Score: 1
Accepted Answers:
Sum of LoS and NLoS channel gain

6) In a VLC system that uses a zero-forcing receiver, the channel matrix can be made well-conditioned by following the PD receiver structure. 1 point

Multi-PD receiver with the same field-of-view


Single PD receiver with wider field-of-view
Multi-PD receiver with varying field-of-view (small and wide)
Single PD receiver with small field-of-view

Yes, the answer is correct.


Score: 1
Accepted Answers:
Multi-PD receiver with varying field-of-view (small and wide)

7) In a VLC MIMO system, the channels between a given transmitter and two closely placed receiving photodetectors (PDs) with the same 1 point
orientation will be

Different and Random


Similar and Deterministic
Similar and Random
Different and Deterministic

Yes, the answer is correct.


Score: 1
Accepted Answers:
Similar and Deterministic

8) In a VLC MIMO channel with multi-PD receiver with same FoV the channel matrix can be made well-conditioned by 1 point

Minimizing the separation between the PDs


Maximizing the separation between the PDs
Channel matrix is independent from separation of PDs
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Maximizing the separation between the PDs

9) In a VLC MIMO system Diversity is achieved using 1 point

Spatial Diversity
FoV Diversity
Both a and b
Neither a or b

Yes, the answer is correct.


Score: 1
Accepted Answers:
Both a and b

10) A good optical MIMO receiver for indoor optical wireless applications should have three characteristics 1 point

It should have a large overall FOV so that it has line of sight (LOS) to as many luminaires as possible
It should have a compact structure compatible with incorporation in portable devices
Both a and b
Neither a or b

Yes, the answer is correct.


Score: 1
Accepted Answers:
Both a and b
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 2 : Assignment 2
The due date for submitting this assignment has passed.

Course outline Due on 2024-02-07, 23:59 IST.

About NPTEL Assignment submitted on 2024-02-07, 22:06 IST


1) Which of the following is the width of the range of wavelengths emitted by the light source 1 point
How does an NPTEL
online course work? Bandwidth
Spectral width
MATLAB
Beamwidth

Week 0 Chromatic Dispersion

Yes, the answer is correct.


Week 1 Score: 1
Accepted Answers:
Week 2 Spectral width

Optical Sources (LASER) 2) Calculate the responsivity of a p-i-n photodiode at 800 nm if the quantum efficiency is 90%. 1 point
Photodetecors
1.0 A/W
Week 2 Feedback Form : 0.84 A/W
Optical Wireless
0.93 A/W
Communications for Beyond
5G Networks and IoT 0.58 A/W

Quiz: Week 2 : Assignment Yes, the answer is correct.


Score: 1
2
Accepted Answers:
Week 3 0.58 A/W

Week 4 3) A ruby laser contains a crystal of length 3 cm with a refractive index of 1.60. The peak emission wavelength from the device is 0.43 μm. What will 1 point
be the value of the number of longitudinal modes?
Week 5
5
1.2 × 10
Week 6
5
3.6 × 10

Week 7 5
2.2 × 10

Week 8 5.5 × 10
5

Yes, the answer is correct.


Week 9 Score: 1
Accepted Answers:
Week 10 2.2 × 10
5

Week 11 4) When 800 photons per second are incident on a p–i–n photodiode operating at a wavelength of 1.3 μm they generate on average 550 electrons 1 point
per second which are collected. The responsivity of the device is
Week 12
1.0 A/W
Download videos 0.72 A/W
0.36 A/W
Problem Solving Session - 0.12 A/W
Jan 2024
Yes, the answer is correct.
Score: 1
Lecture Material
Accepted Answers:
0.72 A/W

5) Laser light is produced due to 1 point

Interference phenomenon
Spontaneous emission of light
Stimulated emission of radiation
Diffraction phenomenon

Yes, the answer is correct.


Score: 1
Accepted Answers:
Stimulated emission of radiation

6) On which factor/s do/does the response time of the photodiode depend/s? 1 point

The diffusion time of photo carriers outside the depletion region


The diffusion time of photo carriers within the depletion region
RC time constant
All of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
All of the above

7) When 4 × 1011 photons each with a wavelength of 0.85 m are incident on a photodiode, on average 2.5 × 1011 electrons are collected at the 1 point
terminals of the device. Determine the quantum efficiency.

43%
82%
63%
52%

Yes, the answer is correct.


Score: 1
Accepted Answers:
63%

8) A photodiode has a quantum efficiency of 65% when photons of energy 1.5 × 10−19 J are incident upon it. At what wavelength is the photodiode 1 point
operating?

1.5μm

2.5μm

1.4μm

1.32μm

Yes, the answer is correct.


Score: 1
Accepted Answers:
1.32μm

9) In the case of population inversion, the number of atoms is 1 point

More in the higher energy state than in the lower energy state
More in higher energy state than in meta-stable state
More in the lower energy state than in the higher energy state
None of them

Yes, the answer is correct.


Score: 1
Accepted Answers:
More in the higher energy state than in the lower energy state

10) Which of the following is a unique property of a laser? 1 point

Directionality
Speed
Wavelength
Coherence

Yes, the answer is correct.


Score: 1
Accepted Answers:
Coherence
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 1 : Assignment 1
The due date for submitting this assignment has passed.

Course outline Due on 2024-02-07, 23:59 IST.

About NPTEL Assignment submitted on 2024-02-07, 22:05 IST


1) Shannon's theorem sets a limit on the 1 point
How does an NPTEL
online course work? The highest frequency that may be sent over channel
The minimum capacity of the channel with a given noise level
MATLAB
Maximum number of coding levels in a given channel

Week 0 Maximum capacity of a channel with a given noise level

Yes, the answer is correct.


Week 1 Score: 1
Accepted Answers:
Introduction to Optical Maximum capacity of a channel with a given noise level
Wireless Communications
(OWC)
2) On which factor/s do/does the channel capacity depend/s in the communication system? 1 point
Basics of Lighting System
Signal to Noise Ratio
Optical Sources (LED)
Bandwidth
Week 1 Feedback Form : Both 1 and 2
Optical Wireless
None of the above
Communications for Beyond
5G Networks and IoT Yes, the answer is correct.
Score: 1
Quiz: Week 1 : Assignment Accepted Answers:
1 Both 1 and 2

Week 2
3) If the channel is bandlimited to 6 kHz and signal to noise ratio is 16, what would be the capacity of the channel? 1 point

Week 3 15.15 kbps


24.74 kbps
Week 4
30.12 kbps

Week 5 52.18 kbps

Yes, the answer is correct.


Week 6 Score: 1
Accepted Answers:
Week 7 24.74 kbps

Week 8 4) In channel coding theorem, channel capacity decides the _________ permissible rate at which error-free transmission is possible. 1 point

Minimum
Week 9
Maximum
Week 10 Standard
Constant
Week 11
Yes, the answer is correct.
Score: 1
Week 12 Accepted Answers:
Maximum
Download videos
5) What is true about 5G? 1 point
Problem Solving Session -
Jan 2024 High increased peak bit rate
Lower battery consumption
Lecture Material
Larger data volume per unit area
All of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
High increased peak bit rate

6) The term receiver sensitivity has which of the following meanings? 1 point

The range of optical power levels over which the receiver operates within specified values
The ratio of the output photocurrent to the incident optical power
The minimum amount of optical power required to achieve a specific receiver performance
The wavelengths over which the receiver will properly operate

Yes, the answer is correct.


Score: 1
Accepted Answers:
The minimum amount of optical power required to achieve a specific receiver performance

7) With reference to visible light communication, which statement is true? 1 point

VLC uses electromagnetic spectrum wavelengths 375 to 780 nm


VLC is known as long-range optical wireless communication
VLC can transmit large amounts of data faster than Bluetooth
VLC has no electromagnetic interference

Partially Correct.
Score: 0.33
Accepted Answers:
VLC uses electromagnetic spectrum wavelengths 375 to 780 nm
VLC can transmit large amounts of data faster than Bluetooth
VLC has no electromagnetic interference

8) The visible light communication follows which of the following 1 point

Intensity modulation and Indirect detection


Electric modulation and Direct detection
Intensity modulation and Direct detection
Electric modulation and indirect detection

Yes, the answer is correct.


Score: 1
Accepted Answers:
Intensity modulation and Direct detection

9) The quantity that describes the light giving radiant power of a luminaire in any particular direction is called—---------- 1 point

Luminosity
Luminance
Luminous flux
Luminous intensity

Yes, the answer is correct.


Score: 1
Accepted Answers:
Luminous intensity

10) The light energy radiated per second from the luminous body is known as? 1 point

Luminous flux
Watt
Candela
Lumen

Yes, the answer is correct.


Score: 1
Accepted Answers:
Luminous flux
akshat.jain.ug20@nsut.ac.in 

NPTEL » Optical Wireless Communications for Beyond 5G Networks and IoT

Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations

If already registered, click to


check your payment status
Week 0 : Assignment 0
Assignment not submitted
Note : This assignment is only for practice purpose and it will not be counted towards the Final score
Course outline

About NPTEL 1) The type of modulation technique(s) is/are 1 point

Binary Signaling
How does an NPTEL
online course work? M-array Signaling
Quadrature Amplitude modulation
MATLAB All of the above

Week 0 No, the answer is incorrect.


Score: 0
Practice: Week 0 : Accepted Answers:
Assignment 0 All of the above

Week 1 2) The change in amplitude of carrier in accordance to the digital message signal then it is called as 1 point

Week 2 Phase Shift Keying


Frequency Shift Keying
Week 3 Amplitude Shift Keying
Binary Phase Shift Keying
Week 4
No, the answer is incorrect.
Score: 0
Week 5
Accepted Answers:
Amplitude Shift Keying
Week 6

3) Which one is the non-coherent mode of binary phase shift keying? 1 point
Week 7
Quadrature Phase Shift Keying
Week 8
Differential Phase Shift Keying
Amplitude Shift Keying
Week 9
Binary Phase Shift Keying
Week 10 Yes, the answer is correct.
Score: 1
Week 11 Accepted Answers:
Differential Phase Shift Keying
Week 12
4) The modulation techniques used to convert analog signal into digital signal are 1 point
Download videos
Pulse code modulation

Problem Solving Session - Delta modulation


Jan 2024 Adaptive delta modulation
All of the above
Lecture Material
No, the answer is incorrect.
Score: 0
Accepted Answers:
All of the above

5) If bandwidth is of primary concern then which one of the following schemes is generally not considered? 1 point

ASK
PSK
FSK
DPSK

Yes, the answer is correct.


Score: 1
Accepted Answers:
FSK

6) Zero forced equalizers are used for 1 point

Reducing ISI to zero


Sampling
Quantization
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Reducing ISI to zero

7) In which one of the following modulation techniques RF binary signals are transmitted as given? 1 point
0 : √(2)p(t)cos[wc + Δw/2]t

1 : √(2)p(t)cos[wc − Δw/2]t

ASK
PSK
FSK
MPSK

No, the answer is incorrect.


Score: 0
Accepted Answers:
FSK

8) The date rate of 8 PSK is____________ of BPSK 1 point

Thrice
Twice
Same
Four times

No, the answer is incorrect.


Score: 0
Accepted Answers:
Thrice

9) The expected information contained in a message is called 1 point

Entropy
Efficiency
Coded signal
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Entropy

10) The frequency of carrier signal is modified in accordance to the message signal then it is called as _________ 1 point

Quadrature Phase Shift Keying


Differential Phase Shift Keying
Frequency Shift Keying
Binary Phase Shift Keying

No, the answer is incorrect.


Score: 0
Accepted Answers:
Frequency Shift Keying

11) Which of these values of μ would correspond to the linear amplification? 1 point

=0
=1
>0
<0

No, the answer is incorrect.


Score: 0
Accepted Answers:
=0

12) ____________ is defined as the ratio of the input signal-to-noise ratio to the output signal-to-noise ratio 1 point

Signal-to-noise ratio
Noise figure
Noise Temperature
None

No, the answer is incorrect.


Score: 0
Accepted Answers:
Noise figure

13) Which one of the following noises arises in electronic devices, such as in diodes and transistors, due to the discrete nature of current flow? 1 point

Shot noise
Thermal noise
Gaussian noise
Random noise

No, the answer is incorrect.


Score: 0
Accepted Answers:
Shot noise

14) Impulse noise is caused due to 1 point

Switching transients
Lightening strikes
Power line load switching
All of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
All of the above

15) In coherent detection of signals, 1 point

Local carrier is generated


Carrier of frequency and phase as same as transmitted carrier is generated
The carrier is in synchronization with modulated carrier
All of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
All of the above

16) ____________fading occurs if the coherence bandwidth happens to be smaller than that of the bandwidth of the given signal. 1 point

Time selective
Fast fading
Frequency selective
Flat

Yes, the answer is correct.


Score: 1
Accepted Answers:
Frequency selective

17) Parity check bit coding is used for 1 point

Error correction
Error detection
Error correction and detection
None of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Error detection

18) QPSK system uses a phase shift of 1 point

Π/2

Π/4

No, the answer is incorrect.


Score: 0
Accepted Answers:
Π/2

19) Scrambling of data is 1 point

Removing long strings of 1’s and 0’s


Exchanging of data
Transmission of digital data
All of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
Removing long strings of 1’s and 0’s

20) Code rate r, k information bits and n as total bits, is defined as 1 point

r = k/n
k = n/r
r=k*n
n=r*k

No, the answer is incorrect.


Score: 0
Accepted Answers:
r = k/n

Check Answers and Submit

Your score is: 5/20


B.TECH. PROJECT ON
INTRUSION DETECTION SYSTEM
FOR SMART HOME IoT DEVICES
Submitted By:-
Ankit Kr. Pathak (2020UEI2806)
Vineet (2020UEI2808)
Samyak (2020UEI2809)
Akshat Jain (2020UEI2847)

Under the Guidance of:-


Dr. Neeraj Goel

Project-II in partial fulfillment of requirement for the award of


B.Tech. in
Electronics & Communication Engineering

Division of Electronics & Communication Engineering


NETAJI SUBHAS UNIVERSITY OF TECHNOLOGY
NEW DELHI-110078
March - 2024

1
CERTIFICATE
Certified that Ankit Kr.Pathak (2020UEI2806), Vineet (2020UEI2808),
Samyak (2020UEI2809) & Akshat Jain (2020UEI2847) has carried out

award of Bachelor of Technology, Department of Electronics and


Communication, Netaji Subhas University of Technology, New Delhi,
under my/our supervision. The project embodies results of original work,
and studies are carried out by the student himself and the contents of the
project do not form the basis for the award of any other degree to the
candidate or to anybody else from this or any other University/Institution.

Dr. Neeraj Goel


Assistant Professor, ECE Dept., NSUT
Date: 01/03/2024

2
ABSTRACT
In today’s digital landscape, the proliferation of smart home Internet
of Things (IoT) devices has introduced new challenges in cybersecurity.
Intrusion Detection Systems (IDS) are crucial in safeguarding smart homes
from malicious activities. However, traditional IDS solutions often fall
short in detecting sophisticated attacks. This research proposes a novel
machine learning (ML) approach to develop an IDS specifically tailored
for smart home IoT devices. By addressing data imbalance, incorporating
explainable AI techniques, and adapting to evolving threats, our model
aims to enhance the security of smart home environments. Through
extensive experimentation and evaluation, we demonstrate the
effectiveness of our approach in accurately detecting intrusions, thereby
providing a robust defense against evolving cyber threats.

3
ACKNOWLEDGEMENT

encouragement helped us in writing this report. We also sincerely thank


our colleagues for the time spent proofreading and correcting our mistakes.
We are highly grateful to the Division of Electronics and Communication
Engineering, Netaji Subhas University of Technology (NSUT) for
providing this opportunity to carry out this project work.

We would like to express our deep and sincere gratitude to our B-


tech Project mentor and project supervisor, Dr. Neeraj Goel, Division of
Electronics and Communication Engineering, Netaji Subhas University Of
Technology, for providing invaluable guidance throughout this project. We
are immensely grateful to all group members who were involved in this
project as without their inspiration and suggestions, it would not have been
possible to develop the project within the prescribed time.

Ankit Kumar Pathak

Vineet

Samyak

Akshat Jain

4
CONTENTS
CERTIFICATE ......................................................................................... 1

ABSTRACT ............................................................................................. 2

ACKNOWLEDGEMENT ........................................................................ 3

List of Tables ............................................................................................ 7

List of Figures ........................................................................................... 7

CHAPTER 1 : INTRODUCTION ……............................................ 8 - 10

1.1 What is an IDS? ........................................................................ 8

1.2 Solutions and Functionality ...................................................... 9

1.3 Applications of IDS ...................................................................9

CHAPTER 2 : LITERATURE REVIEW ........................................ 11 - 13

2.1 Intrusion Detection Technologies ........................................... 12

2.2 Intrusion Detection Methodologies ........................................ 12

2.3 Intrusion Detection Approaches ............................................. 13

2.4 Intrusion Detection Datasets ...................................................13

2.5 Intrusion Detection Tools ....................................................... 13

CHAPTER 3 : MATHEMATICAL MODELING IN IDS ……...... 14 - 18

3.1 Data Collection and Preprocessing ........................................ 14

3.2 Model Development.................................................................15

3.3 Evaluation Metrics...................................................................17

5
CHAPTER 4 : WORK DONE TILL NOW .................................... 19 - 21

4.1 Data Preprocessing ................................................................. 19

4.2 Model Training……………………………………………….19

4.3 Model Evaluation…………………………………………….19

CHAPTER 5 : RESULTS................................................................. 22 - 38

5.1 CODE ..................................................................................... 22

5.2 Quantitative Analysis ............................................................. 34

5.3 Qualitative Analysis ............................................................... 37

4.4 Conclusion .............................................................................. 38

REFERENCES .................................................................................. 39-40

APPENDIX ..................................................................................... 41 - 43

6
LIST’s
1 : List of Tables

Table 1: KDD Cup99 DataSet Details............................................15

Table 2: Train Dataset .................................................................. 34

Table 3: Test Dataset.................................................................….35

2 : List of Figures

Figure 1: IDS Network for Smart Home…......................................8

Figure 2: Overview of IDS ............................................................12

Figure 3: Classification parameters…............................................16

Figure 4: Example of CNN-based model.......................................16

Figure 5: Flow-chart Representation .............................................20

Figure 6: Protocol Types…............................................................24

Figure 7: Services….......................................................................25

Figure 8: Flag’s Data…..................................................................26

Figure 9: Logged In Data…...........................................................26

Figure 10: Target’s Data............................................................….26

Figure 11: Attack Type’s Data...................................................….27

7
CHAPTER-1-INTRODUCTION

1.1 What is the INTRUSION DETECTION SYSTEM FOR SMART


HOME IoT DEVICES?

Smart home devices have made our lives extremely convenient but they have
also opened a gateway for potential cyber threats. Intrusion Detection Systems (IDS)
have tried to mitigate these threats by adopting various techniques such as monitoring
the network traffic, device interactions, and system behavior within the smart home
environment.

While all-purpose intrusion detection systems have been there for a while, smart
home environments pose unique risks due to interconnected systems for low-powered
devices running on different protocols. This paper focuses on Intrusion Detection
System for Smart Home IoT Devices tailored to suit the needs of smart homes while
also evaluating the existing technologies against the constraints of smart home
environments. The study also aims to provide valuable insights into the gaps in the
current Intrusion Detection System for Smart Home IoT Devices solutions and tries to
bridge them to encourage privacy and security. As the smart home industry expands,
understanding and enhancing security for our smart home devices is crucial to make
them less vulnerable to outside threats.

Fig 1.1 IDS Network for Smart Home

8
1.2 Solutions and Functionality

1) Data Processing and Exploration : In this, we load our data set and select the
relevant features to understand the data set’s traits before using it to train the
models.
2) Data Cleaning : Data Cleaning is done to better train our models by dropping
columns with null values for creating a cleaner dataset.
3) Model Building : Model Building involves crucial steps such as feature scaling
and splitting the dataset for training and testing purposes.
4) Neural Network Models : Our code creates three neural network architectures,
namely shallow, deep, and 1D-convolutional neural networks. These
architectures differ in complexities and structures for learning patterns in the
data, making them a crucial step in ensuring all-round intrusion detection.
5) Model Evaluation : In model evaluation, we train the previously defined neural
network models on the training dataset. Later, we assess its performance and
measure it using parameters such as accuracy and response rate. Evaluating the
models is crucial to understand the real-world performance of each model

1.3 Applications of IDS

In case of any security incidents, Intrusion Detection System for Smart Home
IoT Devices provides alerts and detailed information to aid in incident response and
facilitate post-incident forensics analysis. Organizations often use Intrusion Detection
System for Smart Home IoT Devices to ensure compliance with security policies and
regulations, providing a proactive approach to cybersecurity. Here are some of its
applications in the real world:

1) Real-time Threat Detection : Intrusion Detection System for Smart Home IoT
Devices swiftly detects and alerts security teams to potential threats or abnormal
behavior by monitoring network and system activities in real-time.
2) Incident Response and Forensics :Detection System for Smart Home IoT
Devices supplies comprehensive information about the nature and extent of the
attack, thereby assisting in effective incident response and forensic analysis.
3) Malware Detection : Intrusion Detection System for Smart Home IoT Devices
can detect and prevent malware-based attacks by identifying patterns and
behaviors associated with known malware.

9
4) Anomaly Detection : Some Intrusion Detection Systems (Intrusion Detection
System for Smart Home IoT Devices), particularly Anomaly-Based Intrusion
Detection System for Smart Home IoT Devices, can detect deviations from the
normal network or user behavior, helping to identify previously unknown
threats or zero-day attacks.
5) Unauthorized Access Detection : Unauthorized access attempts, such as login
failures and brute force attacks, are monitored by Intrusion Detection System
for Smart Home IoT Devices to protect against system security compromise.

10
CHAPTER-2-LITERATURE REVIEW

A literature survey for an Intrusion Detection System (IDS) involves reviewing


and summarizing relevant research papers, articles, and books related to Intrusion
Detection System for Smart Home IoT Devices. Stephen and Arockiam [1] proposed a
hybrid and lightweight approach to detecting Hello Flood and Sybil attacks in IoT
networks that use the Routing over Low-power and Lossy Networks (RPL) protocol.
They created an algorithm that utilizes detection metrics, such as the number of
received and transmitted packets, to validate the Intrusion Ratio (IR) by the Intrusion
Detection System (IDS) agent.

Pongle and Chavan [2] suggested a hybrid IDS architecture for detecting routing
attacks in IoT networks, with a focus on the wormhole attack. They implemented their
approach based on simulated scenarios and networks, using both centralized and
distributed methods.

Restuccia et al. [3] reviewed the security threats in IoT networks and proposed
a security solution that uses machine learning and polymorphic software and hardware
to detect and mitigate attacks. However, they did not provide any description of the
experimental setup, implementation, and evaluation of the proposed system.

Meidan et al. [4] and McDermott et al. [5] focused on detecting botnets in the
IoT ecosystem using deep learning techniques.

Amouri et al. [6] developed an IDS for IoT networks by applying supervised
machine learning to profile the benign behavior of the nodes and identify any anomalies
in network traffic.

Following is a general overview of key topics and areas which might to consider
when conducting a literature review for an Intrusion Detection System for Smart Home
IoT Devices:

2.1 Intrusion Detection Technologies

11
● Network-Based IDS : Monitors and analyzes network traffic to detect
suspicious activities or security events from the network traffic.
● Host-Based IDS : Focuses on monitoring and analyzing activities on individual
devices (hosts) to respond to potential malicious activity at the host level.
● Wireless IDS : Specialized Intrusion Detection System for Smart Home IoT
Devices designed to detect and respond to unauthorized access, attacks, or
anomalies in wireless networks especially tailored for wireless communication
devices.

2.2 Intrusion Detection Methodologies

● Signature Based IDS : Utilizes predefined patterns or signatures to identify


known patterns of malicious activity by comparing network or host data against
a library of known threats and malicious code.
● Anomaly Based IDS : Monitors normal behavior and raises alerts when some
anomalous behavior takes place, helping identify potential unknown or evolving
threats.
● Stateful Protocol Analysis : Examines the context and state of network
communications to detect deviations or inconsistencies in the expected
sequence of events. This helps in providing a more nuanced understanding of
network activity beyond simple packet inspection.

Fig 2.1 Overview of IDS

2.3 Intrusion Detection Approaches

12
● Statistical Based : Analyzes patterns and statistical models of normal network
or system behavior. This Intrusion Detection System for Smart Home IoT
Devices raises alerts when observed behavior deviates significantly from
established statistical norms.
● Pattern Based : Utilizes predefined patterns or signatures to identify specific
sequences or structures associated with known malware and threats. This
approach further aids in the detection of familiar attack patterns.
● Machine Learning Based : Employs machine learning algorithms to
automatically learn and adapt to evolving threats. This Intrusion Detection
System for Smart Home IoT Devices analyzes historical data and patterns,
enabling the detection of anomalies or novel attack vectors.
● Deep Learning Based : Leverages deep neural networks to automatically
extract hierarchical and complex features from data. Moreover, it enables the
detection of intricate patterns and anomalies in network or system behavior for
improved threat identification

13
CHAPTER-3-Mathematical Modeling
in IDS for Smart Home IoT Devices.
3.1 Data Collection and Preprocessing

We utilize datasets containing network traffic data from smart home IoT
devices. These datasets are collected from real-world scenarios, such as the KDD CUP
'99 dataset.Data pre-processing involves cleaning, feature selection, and encoding
categorical variables.

Data Collection

evaluate different approaches to intrusion detection using network traffic data. KDD
Cup99 is a standard dataset employed in IDSs. There are around 5 million records
stored in the training set of the complete data and 2 million records in the testing set.

contains a comprehensive collection of network traffic features captured from a


simulated environment, including both normal and malicious activities.

The dataset comprises various attributes, including duration of connections,


protocol types, service types, flags, and the number of bytes transferred between hosts.
Each connection instance is labeled as either a normal connection or one of several
attack types, such as denial of service (DoS), remote to local (R2L), user to root (U2R),
or probing.

Table 1 KDD Cup99 DataSet Details

14
Data Preprocessing
Data preprocessing is a critical step in preparing the KDD Cup'99 dataset for
intrusion detection analysis. This process involves several key steps
1) Cleaning: The dataset may contain missing values, outliers, or inconsistencies
that need to be addressed. Cleaning techniques such as imputation, outlier
detection, and data normalization are applied to ensure the integrity and quality
of the dataset.
2) Feature Selection: Given the large number of features in the dataset, feature
selection techniques are employed to identify the most relevant and informative
attributes for intrusion detection. This helps reduce dimensionality and
computational complexity while retaining essential information for accurate
detection.
3) Encoding Categorical Variables: Many attributes in the dataset, such as
protocol types, service types, and flags, are categorical variables. These
variables are encoded into numerical format using techniques like one-hot
encoding or label encoding, enabling machine learning algorithms to process
them effectively

3.2 Model Development

Leveraging advanced machine learning techniques, such as Convolutional


Neural Networks, can enhance the detection capabilities of IDS systems, enabling
timely response and mitigation of security threats.

Convolutional Neural Networks (CNNs):

CNNs are particularly well-suited for analyzing sequential data, such as


network traffic packets. By applying convolutional filters across the input data, CNNs
can capture spatial dependencies and identify localized patterns indicative of security
threats. This makes CNNs a valuable architecture for intrusion detection in smart home
IoT environments.By stacking multiple convolutional, activation, pooling, and fully

15
connected layers, CNNs can learn hierarchical representations of features in the input
data, enabling them to achieve impressive performance.

Performance Comparison:

To identify the optimal configuration for our intrusion detection model, we


conduct thorough performance comparisons across different neural network
architectures and hyperparameters. This involves experimenting with various network
architectures, activation functions, optimization algorithms, learning rates, and batch
sizes to assess their impact on detection accuracy and efficiency.

By systematically evaluating the performance of each configuration using


appropriate evaluation metrics, such as accuracy, precision, recall, and F1-score.

Fig 3.1 Classification parameters [9]

Fig 3.2 Example of CNN-based model [7]

Interpretability Enhancements
In addition to maximizing detection accuracy, we prioritize the interpretability
of our intrusion detection model. Enhancing interpretability is crucial for gaining

16
insights into the underlying reasons behind the model's decisions and improving the
trustworthiness of the IDS system.
To achieve this, we implement attention mechanisms and feature attribution

input data are most influential for making detection decisions. Feature attribution
methods, such as gradient-based approaches or integrated gradients, help to attribute
the model's predictions back to individual input features, enhancing transparency and
interpretability.

3.3 Evaluation Metrics

In evaluating the performance of models designed for classifying network


traffic as normal or malicious, a combination of quantitative metrics and qualitative
analysis is crucial for comprehensive assessment.

Quantitative metrics provide numerical insights into the model's effectiveness


in classification tasks. Accuracy, a fundamental metric, measures the proportion of
correctly classified instances among all instances.

Precision quantifies the ratio of true positive predictions to the total number of
positive predictions, indicating the model's ability to avoid false positives. Recall, also
known as sensitivity, evaluates the proportion of true positives identified correctly out
of all actual positives. The F1 score, which combines precision and recall, offers a
balanced measure that considers both false positives and false negatives. These metrics
collectively offer a quantitative assessment of the model's performance, guiding
decision-making and allowing for comparisons with alternative approaches.This
metrics also contain macro average and weighted average for different values for
different parameters like precision,recall and F1-score.The F1-score is the harmonic
mean of precision and recall, providing a balance between the two metrics. It is
particularly useful when dealing with imbalanced datasets. The F1-scores range from
0.61 to 1.00, reflecting the balance between precision and recall across classes.

The classification report provides a comprehensive overview of the model's


performance across different classes. It includes precision, recall, and F1-score for each
class, along with support (the number of actual occurrences of each class). Additionally,

17
it calculates macro and weighted averages across all classes, which can provide insights
into overall model performance.Overall, the CNN model demonstrates strong
performance on the training set, with high accuracy and well-balanced precision, recall,
and F1-scores across parameters.

Complementing quantitative metrics, qualitative analysis focuses on the


interpretability and explainability of the model's decisions. Interpretability refers to the
model's ability to provide understandable explanations for its predictions, essential for
building trust and facilitating human understanding of its behavior. Techniques such as
feature importance analysis, saliency maps, and attention mechanisms help reveal
which features contribute most to the model's decisions.

By combining quantitative metrics with qualitative analysis, a comprehensive


evaluation of the model's performance emerges. While quantitative metrics quantify the
model's accuracy and effectiveness, qualitative analysis sheds light on its
interpretability and explainability, crucial for ensuring trustworthiness and facilitating
human-machine collaboration in critical domains like cybersecurity.

18
CHAPTER-4-WORK DONE TILL
NOW

4.1 Data Preprocessing


The dataset is cleaned and preprocessed to remove missing values and encode
categorical variables. Feature scaling is applied to normalize the data. This helps to
balance the data and reduce the bias towards the normal class.Once the data has been
cleaned to remove missing values and encoded to represent categorical variables
numerically, feature scaling becomes essential. Feature scaling ensures that all features
are on a similar scale, preventing any one feature from dominating the others during
model training. Normalizing the data helps in achieving this by transforming the values
of numeric features to a standard range, typically between 0 and 1 or with a mean of 0
and a standard deviation of 1. This normalization aids in reducing bias towards certain
features and improves the model's ability to learn patterns effectively. By balancing the
data through normalization, the model becomes more robust and generalizes better to
unseen data, leading to more reliable predictions in various applications.
3.2 Model Training
The neural network models are trained using the preprocessed data. Training
involves optimizing model parameters to minimize the loss function. We use the cross-
entropy loss as our objective function, which measures the difference between the
predicted and the true labels. We also use the optimizer to update the model parameters,
which is an adaptive learning rate algorithm that can handle sparse and noisy gradients.
3.3 Model Evaluation
The trained models are evaluated on a separate test dataset to assess their
performance in detecting intrusions. Quantitative metrics such as accuracy, precision,
recall, and F1 score are computed. Precision (P) measures the proportion of malicious
packet identifications was correct, whereas recall (R) measures what proportion of
malicious packets were identified correctly. The two measures are often used together
in F-measure (F), which calculates the harmonic mean of precision and recall, and
provides a single weighted metric to evaluate the overall classification performance.
Such measures are calculated using

19
𝑃 = 𝑇𝑃 / ( 𝑇𝑃 + 𝐹𝑃),
𝑅 = 𝑇𝑃 / ( 𝑇𝑃 + 𝐹𝑁),
𝐹 = 2 · 𝑃 · 𝑅 (𝑃 + 𝑅)
Accuracy, a fundamental metric, measures the proportion of correctly classified
instances among all instances. Precision quantifies the ratio of true positive predictions
to the total number of positive predictions, indicating the model's ability to

Fig 4.1 Flow-chart Representation


avoid false positives. Recall, also known as sensitivity, evaluates the proportion of true
positives identified correctly out of all actual positives. The F1 score, which combines
precision and recall, offers a balanced measure that considers both false positives and

20
false negatives. These metrics collectively offer a quantitative assessment of the
model's performance, guiding decision-making and allowing for comparisons with
alternative approaches.
Creating a flowchart for a Convolutional Neural Network (CNN) based
Intrusion Detection System (IDS) involves representing the sequential steps of the CNN
model architecture, from input to output.Figure 4 flowchart outlines the fundamental
nodes and operations in a CNN-based IDS, illustrating how data flows through the
network, undergoes feature extraction and classification, and finally produces a
prediction regarding network activity.
The CNN model consists of three convolutional layers, each followed by max
pooling and dropout for feature extraction and regularization. After flattening, the
outputs from the convolutional layers are concatenated with the dense layer's output.
The dense layer with ReLU activation helps in feature learning, followed by dropout
for regularization. Finally, the softmax output layer classifies the input into one of five
classes. This architecture enhances the network's ability to learn hierarchical features
from sequential data, vital for tasks like intrusion detection, while dropout mitigates
overfitting, ensuring robust performance.

21
CHAPTER-5-RESULTS

5.1 CODE

22
23
Fig 5.1 Protocol Types

24
Fig 5.2 Services

25
Fig 5.3 Flag’s Data

Fig 5.4 Logged In Data

Fig 5.5 Target’s Data

26
Fig 5.6 Attack Type’s Data

27
28
29
30
31
32
33
5.2 Quantitative Analysis

Our experiments demonstrate that the convolutional neural network (CNN)


model outperforms both shallow and deep neural networks The parameters of the CNN
model are also significantly larger compared to other architectures. The CNN model
can capture the spatial & temporal features of network traffic data, as well as learn
hierarchical representations of the data. The confusion matrix shows CNN.

The model has a larger true +ve rate and a lower false +ve rate, indicating its
ability to detect intrusions with minimal errors.In this study, we developed a model

Table 2 Train Dataset

for classification tasks. The performance of the model was evaluated on both the train
and test sets using various metrics including accuracy, precision, recall, and F1-score.

34
Table 3 Test Dataset

The classification report reveals that the model performs exceptionally well
across multiple classes, achieving high parameters for each class. Particularly
noteworthy is the model's ability to accurately classify class 0 and class 1 instances, as
indicated by their high parameters.. However, the performance for class 2, 3, and 4 is
slightly lower, especially for class 4, where some parameters are comparatively lower
due to the smaller number of instances and inherent class imbalance.

Similarly, on the test set, the CNN model demonstrates outstanding


performance with high accuracy, precision, recall, and F1-score. While the
performance remains consistently high across most classes, there's a slight decrease in
performance for class 4, reflected in its lower recall and F1-score. This could be
attributed to the limited number of instances available for this class, making it more
challenging for the model to generalize effectively.

Certainly! In addition to the provided metrics (accuracy, precision, recall, and


F1-score), several other performance measures can be calculated or derived from

35
them. Here are some additional parameters that can be calculated based on the given
metrics:

Specificity (True -ve Rate): Specificity measures the proportion of actual


negatives that are correctly identified as such.

𝑇𝑁
𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 = [9]
(𝑇𝑁+𝐹𝑃)

Where TN is the number of true negatives and FP is the number of false


positives.

False +ve Rate (FPR): FPR calculates the proportion of actual negatives that
are incorrectly classified as positives.

𝐹𝑃
𝐹𝑃𝑅 = 1 − 𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 = [9]
(𝑇𝑁+𝐹𝑃)

False -ve Rate (FNR): FNR measures the proportion of actual positives that
are incorrectly classified as negatives.

𝐹𝑁
𝐹𝑁𝑅 = 1 − 𝑅𝑒𝑐𝑎𝑙𝑙 = [9]
(𝑇𝑃 + 𝐹𝑁)

Where FN is the number of false negatives and TP is the number of true


positives.

True +ve Rate (Sensitivity): Sensitivity, also known as Recall, calculates the
proportion of actual positives that are correctly identified as such.

𝑇𝑃
𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦 = [9]
(𝑇𝑃+𝐹𝑁)

Balanced Accuracy: Balanced accuracy takes into account class imbalance by


averaging the sensitivity and specificity.

𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦 + 𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦
𝐵𝑎𝑙𝑎𝑛𝑐𝑒𝑑 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = [9]
2
These additional parameters provide deeper insights into the performance of
the model, especially in scenarios with class imbalance or when considering different
types of errors.

5.3 Qualitative Analysis

36
The incorporation of explainable AI techniques enhances the interpretability of
our model, allowing users to understand the decision-making process behind intrusion
detection. This transparency fosters trust and confidence in the system. The saliency
maps show which features are most important for the model prediction, highlighting
the patterns and anomalies in the network traffic data.

The provided table presents the performance metrics of a

evaluated on both the train and test sets.


Train Set Evaluation:

Class 0 and Class 1, representing normal and common intrusion instances,


show particularly robust performance with near-perfect precision, recall, and F1-
score. This suggests that the model can accurately identify these instances without
significant misclassification.

For less frequent intrusion classes (Class 2, 3, and 4), the model still maintains
high precision and recall, although there's a slight decrease compared to the more
prevalent classes. This indicates that while the model may occasionally misclassify
these instances, it still demonstrates a strong ability to detect them.

Test Set Evaluation:

The model's performance on the test set closely mirrors that of the train set,
indicating its ability to generalize well to unseen data.

Similar to the train set, the model achieves high accuracy, precision, recall, and
F1-score on the test set, reaffirming its effectiveness in detecting intrusions across
various classes.

Despite the slight decrease in performance for less frequent intrusion classes,
the model still maintains a high level of accuracy and robustness, which is crucial for
real-world deployment in security-sensitive environments.

5.4 Conclusion

37
In conclusion, our research showcases the effectiveness of machine learning
in enhancing the security of smart home IoT devices through an IDS solution. By
addressing data imbalance, incorporating explainable AI techniques, and adapting to
evolving threats, our model provides a robust defense against cyber threats in smart
home environments. Our future work will focus on improving the scalability and
efficiency of our model, as well as exploring other machine learning techniques such
as reinforcement learning and generative adversarial networks for intrusion
detection.This reflects the effectiveness of Convolutional Neural Networks in handling
classification tasks, particularly in scenarios where there are multiple classes with
varying degrees of complexity and class imbalance.

The model achieved exceptional accuracy, precision, recall, and F1-score on


both the train and test sets, demonstrating its robustness and generalization capability.
However, it's important to note that maintaining balanced class distributions could
further enhance the model's performance, especially for minority classes. Overall, the
results affirm the suitability of CNNs for a wide range of classification tasks, making
them a valuable tool in various domains such as image recognition, medical diagnosis,
and natural language processing.The results demonstrate that the CNN-based Intrusion
Detection System exhibits strong performance in accurately identifying instances of
network intrusions. With high accuracy, precision, recall, and F1-score across multiple
classes, the model showcases its effectiveness in distinguishing between normal
network traffic and various types of intrusions.

These findings suggest that the proposed IDS can serve as a valuable tool in
safeguarding computer networks against malicious activities, contributing to enhanced
cybersecurity measures. Additionally, the model's ability to generalize well to unseen
data underscores its potential for practical deployment in real-world network
environments, where timely and accurate intrusion detection is paramount. Further
research and refinement of the model could potentially address any minor performance
disparities across different intrusion classes, thereby bolstering its overall efficacy and
reliability in protecting network infrastructure from security threats.

38
REFERENCES

[1] Stephen and L. Arockiam, “Intrusion detection system to detect sinkhole attack
on RPL protocol in Internet of Things,” Int. J. Elect. Electron. Computer. Sci.,
vol. 4, no. 4, pp. 16–20, 2017.
[2] P. Pongle and G. Chavan, “Real time intrusion and wormhole attack detection
in Internet of Things,” Int. J. Comput. Appl., vol. 121, no. 9, pp. 1–9, 2015
[3] F. Restuccia, S. D’Oro, and T. Melodia, “Securing the Internet of Things in the
age of machine learning and software-defined networking,” IEEE Internet
Things J., vol. 5, no. 6, pp. 4829–4842, Dec. 2018.
[4] Y. Meidan et al., “N-BaIoT: Network-based detection of IoT Botnet attacks
using deep autoencoders,” IEEE Pervasive Comput., vol. 17, no. 3, pp. 12–22,
Jul./Sep. 2018.
[5] C. D. McDermott, F. Majdani, and A. V. Petrovski, “Botnet detection in the
Internet of Things using deep learning approaches,” in Proc. IEEE Int. Joint
Conf. Neural Netw. (IJCNN), 2018, pp. 1–8.
[6] A. Amouri, V. T. Alaparthy, and S. D. Morgera, “Cross layer-based intrusion
detection based on network behavior for IoT,” in Proc. IEEE 19th Wireless
Microw. Technol. Conf. (WAMICON), 2018, pp. 1-4.
[7] Ray, S.; Jin, Y.; Raychowdhury, A. The changing computing paradigm with the
internet of things: A tutorial introduction. IEEE Des. Test 2016, 33, 76–96.
[8] Khan, R.; Khan, S.U.; Zaheer, R.; Khan, S. Future internet: The internet of
things architecture, possible applications and key challenges. In Proceedings of
the 2012 10th International Conference on Frontiers of Information
Technology, Islamabad, India, 17–19 December 2012; pp. 257–260.
[9] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga,“A survey
of intrusion detection in Internet of Things,” J. Netw. Comput.Appl., vol. 84,
pp. 25–37, Apr. 2017.
[10] Marsden, T.; Moustafa, N.; Sitnikova, E.; Creech, G. Probability risk
identification based intrusion detection system for SCADA systems. In
International Conference on Mobile Networks and Management; Springer:
Berlin, Germany, 2017; pp. 353–363.

39
[11] Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani“A
Detailed Analysis of the KDD CUP 99 Data Set”, Proceedings of the 2009 IEEE
Symposium on Computational Intelligence in Security and Defense
Applications (CISDA 2009).
[12] C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, “Intrusion Detection
by Machine Learning: A Review,” Expert Systems with Applications, vol. 36,
no. 10, pp. 11994 –12000, 2009.
[13] Stephen Smaha. Haystack: An intrusion detection system. In Fourth
Aerospace Computer Security Applications Conference, pages 37–44, October
1988.

40
APPENDIX

Appendix A: List of Abbreviations

➢ IDS: Intrusion Detection System


➢ ML: Machine Learning
➢ DL: Deep Learning
➢ IoT: Internet of Things
➢ SVM: Support Vector Machine
➢ KNN: k-Nearest Neighbors
➢ CNN: Convolutional Neural Network
➢ RNN: Recurrent Neural Network
➢ AE: Autoencoder
➢ GAN: Generative Adversarial Network

Appendix B: Figure Descriptions

➢ Figure 1: IDS Network for Smart Home


➢ Figure 2: Application of IDS
➢ Figure 3: Flow Chart for Literature Survey
➢ Figure 4: Basic Neural Network
➢ Figure 5: F1 Score Formulation

Appendix C: Data Set Information

The NSL KDD dataset used in the research contains various types of network
traffic data, including Probe Response Attacks, Denial of Service Attacks, and
Common Attacks. The dataset consists of both training and trial datasets for each
attack type.

➢ Probe Response Attacks:


○ Training Dataset: 5,000 samples

41
○ Trial Dataset: 2,780 samples
➢ Denial of Service Attacks:
○ Training Dataset: 65,389 samples
○ Trial Dataset: 45,342 samples
➢ Common Attacks:
○ Training Dataset: 15,789 samples
○ Trial Dataset: 12,456 samples

Appendix D: References

[1] C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, “Intrusion Detection by


Machine Learning: A Review,” Expert Systems with Applications, vol. 36, no.
10, pp. 11994 –12000, 2009.
[2] Stephen Smaha. Haystack: An intrusion detection system. In Fourth
Aerospace Computer Security Applications Conference, pages 37–44, October
1988.
[3] M Esmaili, R Safavi, Naini, and J Pieprzyk. Intrusion detection: A survey. In
Proceedings of ICCC’95. (12th International Conference on Computer
Communication), volume xxxxii+862, pages 409–414. IOS Press, Amsterdam,
Netherlands, 199.

Appendix E: Future Work

➢ Comprehensive Attack Analysis


➢ Adaptive IDS for Evolving Attacks
➢ Situational Awareness
➢ Behavior Profiling of IoT Devices
➢ Attribution and Device Fingerprinting
➢ Advances in Machine Learning
➢ Real-World Attack Scenarios
➢ Security Solutions and Mitigation
➢ Data Aggregation Techniques
➢ Human Behavior Analysis
➢ Energy-Efficient IDS

42
➢ Collaborative Defense
➢ Determination of Security Posture
➢ Human-Centered Design

Appendix F: Conclusion

➢ In this section, you can summarize the key points from your conclusion
section in the main document.
➢ Please note that you should adapt and expand this appendix as needed to cover
all the relevant information and references in your document

43

You might also like