Sunday, December 8, 2019

Internet of Things-From Hype to Reality-Free-Samples for Students

Questions: 1.What does the statement "the best interface for a system is no User Interface"? When might this apply and provide two examples. 2.Compare the bandwidth, distance, interference rating, cost and security of a) twisted pair cable, b) coaxial cable and 3) fibre optic cable. e. 3.The three common ways to obtain information from IoT devices are sensors, RFID and Video tracking. Compare the three technologies by addressing the advantages, disadvantages, key requirements for the things. 4.Discuss the issues associated with security and privacy in the context of the Internet of Things. 5.An IoT water level monitoring application requires updates from a sensor periodically, using the command/response paradigm. 6.Describe Nielson's Law. How does it relate to Moore's Law? What are the implications for the Internet of Thing? Answers: 1.The best interface for a system is no User Interface has been used categorically to imply that, what application Interface refers to as best may not be the best interface when it comes to systems user application interface. Users of the system are quite different from machine and requires to have very attractive and accommodating interface (Krishna, 2015). Requirements of User Interface should be met according to users need such as navigation and easy to operate. With no User Interface, what is left is for machine to help human being do the business activities instead of Users adopting the need to operate applications. It is applicable in cases where machine is self-directing on what should be done instead of users interacting with it. The examples on this case are; eliminating UI that car owners use to open their cars and applications that users use to order online. 2.Twisted pair cable has the following specifications on bandwidth; CAT 4=20 MHZ, CAT 5=100MHZ and CAT 6= 250MHZ. The maximum length of performance that twisted cable can take is 100M. The interference rate of CAT 4 = 20Mbps, CAT 5= 100Mbps (2 pair) and CAT 6= 10,000Mbps. The bulk price of UTP cable 5 pairs which double shielded and AWG stranded is $237.62 in a ready market. On security matters, UPT does not permit crosstalk between wires and is prone to radio frequency. Coaxial cable bandwidth are; Wireless G (802.11g) = 54Mbps, WAN-10 Base-T= 10Mbps and cable broadband= 52Mbps (KOEGEL, YU, LUA, 2009). The maximum distance of a coaxial cable is 380M. The interference rate of a coaxial cable increases with length. The cost is dependent on the type of cable. RG6 which is of Standard Shield type ranges from $50-$200 for 30,000 miles. It is believed to be more secure than twisted cable. The bandwidth of a fibre optic cable is 1Gbps, its operating distance is between 850nm and 1300 nm. The cost are as follows; 288 Count Fiber Cost = 5,000 ft at $5.87 per foot; 144 Count Fiber = 5000 ft at $2.98 per foot; 24 Count Fiber = 70,000 ft at $0.68 per foot. In security terms, it is the best in data protection. 3. Category Sensors RFID Video Tracking Advantages Help in solving security problem while protecting valuables Control activities by providing accurate data (Meyer, Ruppen Magerkurth, 2013) It can store more information than barcode Versatile in nature Able to read and write, unlike barcode Increases security in stores Helps in preventing shoplifting It provides efficient management by surveillance Disadvantages Easily manipulated Break down Costly due to use of batteries Remote reading is interfered with by electromagnetic It requires expert to fix and analyze Requirements Range Bandwidth accuracy resolution Tags production Software Blank RFID Cameras Computer DSP board Application Cash points Traffic lights control Inventory tracking, Race timing Supermarkets Banks City centers 4.The following are issues which are associated with Internet of Things (IoT) in todays technological market. According to Rayes Salam (2016), privacy has been challenging because a lot of information is being stored online and various people are trying to access it for their own benefits. Many organizations have their systems compromised with intent of acquiring sensitive data. Additionally, with growing technology, it has been very difficult to secure hardware, software and other operational platforms being used in IoT. Similarly, it may result to Bodily harm and property damage. Such cases occur where IoT is being used to control sensitive devices such as blood sugar level applications connected to patient. When it fails, it may result to death or body harm. 5.Delay= 12ms Process/ request= 3ms Send/receive message =2ms 2/3*12=8ms 6.Nielson's Law involves internet bandwidth and states that, high end user connection is expected to grow at a rate of 50% in a given year (Pecur, 2013). There are specific reasons as to why bandwidth increases exponentially; it has been noticed that, Telecom companies more conservative in their investments. Next, users are reluctant in spending a lot of their money on bandwidth. Finally, the number of users are growing more than expected. There is direct correlation between Nielson's Law and Moores Law in that, the latter is based on Moores Law. It states that computer processing power is likely to increase twice within a period of 18 months. When plotted in a graph, they exhibit exponential straight line (Cohen, Alikani, Bisignano, 2012). Some of the implications associated with IoT are; connected world before 2020, interconnection of devices, homes and intelligent cities and required data security and privacy. References Cohen, J., Alikani, M., Bisignano, A. (2012). Past performance of assisted reproduction technologies as a model to predict future progress: a proposed addendum to Moores law. Reproductive biomedicine online, 25(6), 585-590. Koegel, B. J. F., Yu, H. H., Lua, E. K. (2009). P2P networking and applications. Amsterdam: Elsevier/Morgan Kaufmann Krishna, G. (2015). The best interface is no interface: The simple path to brilliant technology.San Francisco, Calif: Pearson Education, New Riders. Meyer, S., Ruppen, A., Magerkurth, C. (2013). Internet of things-aware process modeling: integrating IoT devices as business process resources. In International Conference on Advanced Information Systems Engineering (pp. 84-98). Berlin: Springer, Heidelberg. Pecur, D. (2013, June). Techno-economic analysis of long tailed hybrid fixed-wireless access. In Telecommunications (ConTEL), 2013 12th International Conference on (pp. 191-198). IEEE. Rayes, A., Salam, S. (2016). Internet of Things -- from hype to reality: The road to digitization

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.