Understanding IoT and Network Bandwidth

Verified

Added on  2020/03/07

|9
|1872
|168
AI Summary
This assignment delves into the concept of Nielson's Law, which states that user bandwidth increases by an average of 50% annually. It examines how this law contrasts with Moore's Law and its profound implications for the Internet of Things (IoT). The assignment discusses the projected growth of sensor technology, leading to a surge in data streams from embedded devices in various aspects of life, including transportation, homes, and personal wearables.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INTERNET OF THINGS
INTERNET OF THINGS
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2INTERNET OF THINGS
Table of Contents
Question 1........................................................................................................................................3
Question 2........................................................................................................................................3
Question 3:.......................................................................................................................................4
Question 4........................................................................................................................................6
Question 5........................................................................................................................................6
Question 6........................................................................................................................................8
Reference.........................................................................................................................................9
Document Page
3INTERNET OF THINGS
Question 1
The statement “The best interface for a system is no user interface” merely means
eliminating the user interface during the implementation of any technology in order to eliminate
various process during the interfacing of the user with respect to the technology (Cui, 2016). As
a result of which it would give more time for the user as there would not be much steps in order
to operate the technology in the phase of user interface. It can be explained with the help of two
examples.
Example 1:
In cars user interface technology is implemented to open the gate by using an application
operated by mobile phone. It takes several steps before opening gate as the user will have to take
out his phone and unlock the phone then dig into the icons of many applications, search for the
particular application then he or she can open the gate (Mulani & Pingle, 2016).
Example 2:
User Interface in the merchant pay system by using phone application (Fisher, 2013). If
we implement no user interface system it will eliminate all the steps including entering password
to phone and app and all that are explained in example 1 and allow user to sit, order and leave as
this system will pay the restaurant bill automatically.
Question 2
Specifications of Cables
Cable types Bandwidth Distance Interference
rating
Cost Security
Twisted Pair
Cable
1MHz 100m Susceptible to
interference
but limited to
a distance
Cheapest than
others
Poor Security
Coaxial Cable 1GHz 500m Least
susceptible to
interference
than others
Medium cost
compared to
others
Moderate
security but
can be
breached
(Winzer
2014).
Fibre Optic 75 THz 10km (Single- Not Expensive Highly
Document Page
4INTERNET OF THINGS
Cable mode)
2Km
(multimode)
susceptible to
EMI
than others secured
Categories of Cables
Twisted Pair Cable:
1. Unprotected Twisted-Pair (UTP)
Type 1: Used in low speed data cable and telephone lines.
Type 2: These can support 4 mps implementation (Lee et al., 2013).
Type3: These cables support maximum 16 mps but commonly used in 10 mps (Li & Da Xu,
2017).
2. Shielded Twisted Pair (STP)
Type 1: Features 22-AWG two pairs.
Type 2: Inherit type 1 with 4 telephone pairs (Sommer and Franz, 2012).
Type 3: Features two pairs of shielded 26-AWG (McKernan, 2016).
3. Co-Axial cable:
Type 1: 50-Ohm RG-7 or RG-11, applicable with thick Ethernet.
Type 2: 50-Ohm RG-58, applicable with thin Ethernet (Ha et al., 2013).
Type 3: 75-Ohm RG-59, applicable with cable television.
Question 3:
Summarized Table of Advantages, Disadvantages and Application of IoT
IoT
Devices
Advantages Disadvantages Application
Sensors *It is not affected by
atmospheric dust, rain, snow.
*It can also work in adverse
conditions if proper power
*It seems difficult to
receive signal
reflected from curved,
small, thin and soft
*Smart sleep system.
*Smart washing
machine.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5INTERNET OF THINGS
supply is given.
*In comparison with inductive or
capacitive proximity sensors it
has more sensing distance.
objects. *Smart lightning.
*Weather monitoring.
*Blood Pressure
monitoring (Tozlu et
al., 2012).
Smart internet mirror.
RFID * Tag code data is 100% secure
and cannot be duplicated.
* Availability of large number
of sizes, different types and
different materials.
* Physical contact is not needed
between the communication
devices and data carrier. Tags
can be used many times.
* The rate of error is extremely
low.
* Portable data base and long
read range.
*These are more
expensive than
Barcode system.
*Harder to understand
results in less
reliability.
*Longer than the
Barcode labels.
*Specific applications
for tagging, does not
fits to all.
*Many Tags can
respond in the mean
time.
* In product tracking
high frequency RFID
tags are used such as,
pallet tracking,
jewellery tracking,
airline baggage and
apparel and
pharmaceutical
tracking (Gubbi et al.,
2013).
*Implantable RFID
are used in animal
identification.
* Replacement of
library barcodes with
RFID Tags.
*It has also
application in
museum, school and
universities.
Video
Tracking
*Communication between
devices.
*Automation and control.
*Collects information.
*Monitoring is another
advantage of video tracking
(Singh, Tripathi and jara, 2014).
*There is not any
compatibility of
international standard
for the monitoring
equipments.
*More complex
system which can
increase the risk of
failures.
*Human-computer
interaction.
*Augmentation of
reality.
*Medical imaging.
*Video
communication.
Document Page
6INTERNET OF THINGS
*Better quality of livelihood. *Privacy and security
both will be exposed.
Question 4
In general the security and the protection of data are considered complimentary
requirement when it is related to Internet of Things services. Putting emphasis on information
security, it is regarded as preserving the confidentiality, availability and integrity (Kranz, 2016).
The security plays a vital role in every aspect putting limelight on both the aspects for the
organization itself and the benefits of the citizens. The most important challenge is to ensure the
availability and continuity prospective with the provision of the services which are served by the
Internet of Things, with it the main aspect of avoiding the potential failure which are associated
with interruptions and operational failure.
The more the individual re involved with the process of the Internet of Things
application, the more the privacy aspect role comes into play. Concerning on the identification of
data protection, privacy and the security risk, this mainly depends upon the context. It should be
considered that the personal data of the person is not only the concern with the security but also
the data which is related to person whose social identity such as name and address is not known
should also be the concern factor.
Question 5
Blocking Mode:
In blocking mode, the endpoint originated from the operating request will have to wait to
get a response of its request after endpoint of the requested operation has finished which involves
long or may be unknown waiting times from the side of originator (Wollschlaeger, Sauter &
Jasperneite, 2017). This is a synchronous case so the asynchronous message will not be received
by the originator that means Originator will have to initiate both the information exchange
between the receiver and the originator.
Publish/Subscribe Paradigm:
It is also referred as pub/sub which enables communication of unidirectional to more than
one subscriber from a publisher. There after the subscriber declares this interest in the category
or class of the data to the publisher (Bui, 2016). After that when publisher has availability of new
data it then pushes that message to the interested subscribers.
Document Page
7INTERNET OF THINGS
Publish
Publish
Subscribe
End Point BEnd Point A
New Data
Figure 1: Publish – Subscribe Paradigm
(Source: By Author)
Command/Response Paradigm:
Due to the overhead of the unneeded messages travelling in the reverse direction,
Response/Command response becomes suboptimal.
New Data

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8INTERNET OF THINGS
Endpoint A Endpoint B
1. Request
3. Response
Processing
Figure 2: Command/Response paradigm
(Source: By Author)
Question 6
Nielson’s Law: User Bandwidth increases up to 60% every year which is less than
Moore’s Law related to speed of computer. This new law fits data from the time period of 1983
to 2016 (Kumar et al., 2017). Nielson’s Law which is related to internet bandwidth states that, a
high end user’s connection speed grows by average 50% every year.
Nielson’s law is very similar to Moore’s law but more established than that. Moore stated
that “computer double in capabilities every 18 months”, which is related with 60% of annual
growth (Kumar et al., 2017).
Implication of Nelson’s law in IoT
In around 2024 it is being expected that sensor technology will break through the “trillion
sensor” which will help in creating data streams virtually from every surrounding surfaces.
Sensors will be soon embedded inside cars, houses and even in clothing. Microchips will be
trending including skin sensors or body sensors (Bonomi et al., 2017).
Document Page
9INTERNET OF THINGS
Reference
Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2017, August). Fog computing and its role in
the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile
cloud computing (pp. 13-16). ACM.
Bui, N. (2016). Internet of Things.
Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-
68). Palgrave Macmillan, London.
Kranz, M. (2016). Building the Internet of Things: Implement New Business Models, Disrupt
Competitors, Transform Your Industry. John Wiley & Sons.
Kumar, M., Bhaskar, M. S., Padmanaban, S., Siano, P., Blaabjerg, F., & Leonowicz, Z. (2017,
June). Electric field analysis of extra high voltage (EHV) underground cables using finite
element method. In Environment and Electrical Engineering and 2017 IEEE Industrial
and Commercial Power Systems Europe (EEEIC/I&CPS Europe), 2017 IEEE
International Conference on (pp. 1-4). IEEE.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
McKernan, K. J. (2016). The chloroplast genome hidden in plain sight, open access publishing
and anti-fragile distributed data sources. Mitochondrial DNA Part A, 27(6), 4518-4519.
Mulani, T. T., & Pingle, S. V. (2016). Internet of things. International Research Journal of
Multidisciplinary Studies, 2(3).
Wollschlaeger, M., Sauter, T., & Jasperneite, J. (2017). The future of industrial communication:
Automation networks in the era of the internet of things and industry 4.0. IEEE Industrial
Electronics Magazine, 11(1), 17-27.
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]