Moore's Law vs. Nelson's Law in IoT

Verified

Added on  2020/03/02

|10
|1795
|375
AI Summary
The assignment explores the contrasting perspectives of Moore's Law and Nelson's Law on technological advancement within the context of the Internet of Things. It delves into how Moore's Law, which focuses on computing power doubling every 18 months, has been more widely accepted than Nelson's Law, which predicts a constant growth rate in internet bandwidth. The assignment further analyzes the implications of Nelson's Law for the future of IoT, particularly its potential to facilitate the creation of vast data streams from sensors embedded in various environments.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INTERNET OF THINGS
Internet of Things
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
INTERNET OF THINGS
Table of Contents
Answer 1:.........................................................................................................................................3
Example 1:...................................................................................................................................3
Example 2:...................................................................................................................................3
Specifications of Cables..............................................................................................................3
Categories of Cables....................................................................................................................4
Answer 3:.........................................................................................................................................5
Summarized Table of Advantages, Disadvantages and Application of IoT................................5
Answer 4:.........................................................................................................................................6
Security Issues.............................................................................................................................6
Privacy Issues..............................................................................................................................7
Answer 5:.........................................................................................................................................7
Blocking mode:............................................................................................................................7
Publish/Subscribe Paradigm:.......................................................................................................7
Command/Response Paradigm:...................................................................................................8
Answer 6:.........................................................................................................................................9
Nielson’s Law..............................................................................................................................9
Implication of Nelson’s law in IoT..............................................................................................9
References:....................................................................................................................................10
Document Page
2
INTERNET OF THINGS
Answer 1:
The real problem that is mainly faced with an interface is basically it is an interface. In
doing any daily task with the interface gets into the way it would be all together a very bad
option. The main focus should be on the task and not on the interface which is related to the task.
The main aspect that should be followed practically is that the mere job is not basically done on
the job or it can be stated that the effort in doing a job is not on the interface it should be putting
effort on a job. When a job is directly related to a interface the main design aspect is related to
the inherent inhuman, unnatural which directly gives a diminishing return. The better aspect in
such a scenario is not putting any emphasis on the interface and full emphasis should be towards
the job which is to be performed.
Example 1:
In refrigerators the user interface is implemented to control the overall temperature. This
is mainly achieved by the use of a remote control which has a user interface attached to it. The
remote can directly control or modify the temperature of the refrigerator and open or close the
door. An extra benefit is the child clock system which helps it to protect from childer in
accessing it (Takai et al., 2013). If we eliminate the user interface system by implementing
sensor the door of the refrigerator can open automatically which would directly reduce the work
load.
Example 2:
User interface in the merchant pay role by using of a remote application (Fisher, 2013)
the implementation of the no user interface would directly reduce the steps involved in any
process and which would be highly beneficial for the user.
Document Page
3
INTERNET OF THINGS
Specifications of Cables
Cable types Bandwidth Distance Interference
rating
Cost Security
Twisted Pair
Cable
1MHz 100m Limited to
distance with
regards to
susceptible to
interference
Cost is much
less than other
Security aspect
is less
Coaxial Cable 1GHz 500m Interference
compared to
others are least
susceptible
Comparing to
others it has
medium cost
Breaching is
easy as it has
less security
involved in the
technology
(Winzer 2014).
Fibre Optic
Cable
75 THz 10km (Single-
mode)
2Km
(multimode)
EMI is least
susceptible
Cost is on the
higher side
Security is high
Answer 3:
Summarized Table of Advantages, Disadvantages and Application of IoT
IoT Devices Advantages Disadvantages Application
Sensors * affect by calamities like
atmospheric and, snow.
*can be used in different
environmental condition
*signals received are
very much difficult to
reflect which is mainly
from curves or thin and
soft objects.
* Alarm system is
smart.
*washing machine can
be considered smart
*Smart lightning.
RFID * 100% code data security is
assured which cannot be duplicated
* Available in large number of
sizes, types and materials.
*cost is more than
barcode
* Less reliability due to
complexity in
understanding.
* applied to baggage
and apparel and
pharmaceutical tracking
(Gubbi et al., 2013).
*It has also application
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
INTERNET OF THINGS
*Longer than the
Barcode labels.
.
in museum, school and
universities.
Video
Tracking
* communication with regards to
devices.
*Automation and control.
*Collects information.
*with video tracking monitoring is
a added advantage (Singh, Tripathi
and jara, 2014).
* livelihood quality are improved.
*There is not any
compatibility of
international standard
for the monitoring
equipments.
*complex system is
more which can
increase the risk related
to failure.
.
*Human-computer
interaction.
*Augmentation of
reality.
*Medical imaging.
*Video communication.
Answer 4:
Security Issues
The main aspect related to the security issue is the denial of service attack (DOS) ,
because of this they’re very many websites which can be termed as popular were not able to be
accessed. The list was so large that it made a huge wave in the technology the list included
Amazon, Netflix and many others. The attack was launched by a malware activity which can be
termed as Mirai. The result of the attack was that it launched a scour piece of activity which
include the internet of thing devices and then enlisted those devices which included them to the
target machine of the activity. (Suo et al., 2012).
Document Page
5
INTERNET OF THINGS
Privacy Issues
Much important information which can be termed as personal information where hacked
by the hackers in orders to get their personal benefit and it lead to a huge problem in different
sphere. The technology directly implemented and it can be related to any banking sector. The
banking sector can be considered as the most sensitive aspect of information where all the details
of any particular personal can be received quite easily by the practice of hacking (Borgohian,
Kumar and Sanyal, 2015).
Answer 5:
Blocking mode:
In this mode the end point which is considered as the main aspect with regards to the
request which is originally originated from the side of the opearator will have to wait in queue in
order to get response of the request it had made or originated. This implementation is mainly
done after the end point request operation has completed its final processing, this may directky
involve the waiting time from the view of the originators. In this case asynchronous message
would not be received by the originator which merely means that the emphasis would be put on
the originators side will have to pay a specific role in order to creating a exhnaging scenario with
emphasis on the originator and the receiver.
Publish/Subscribe Paradigm:
It is also referred as pub/sub which enables the communication with respect to the
unidirectional with emphasis on two or more subscribers from the part of the publisher. After the
subscriber declares the interest with emphasis on the indicated category, it then inserts the
message to the interested subscriber.
Document Page
6
INTERNET OF THINGS
Figure: Publish-Subscribe Paradigm
Command/Response Paradigm:
Figure: Command/Response paradigm
Answer 6:
Nielson’s Law
Nielson’s law Statement: the law states the growth would increase upto 50% 1983 and
2016. The statement of Nielson law is “A high-end user’s collection speed grows by 50% per
year”.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
INTERNET OF THINGS
Neilson’s law and Moore’s law were quite common but due to the factor of
implementation the law which was stated by Moore were accepted more than the law which is
stated by Nelson . Moore stated that “computer double in capabilities every 18 months”, which is
related with 60% of annual growth.
Implication of Nelson’s law in IoT
In around 2024 it is merly expected that the technology which involves sensor technology
will eventually break through the concept of “trillion sensor” which would be beneficial in the
near future which would be beneficial with the creating of data stream virtually from every
surrounding surface. Microchip will be directly implemented in the body sensor or in the skin
sensor. (Bonomi et al., 2017).
Document Page
8
INTERNET OF THINGS
References:
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of Internet
of Things. arXiv preprint arXiv:1501.02211.
Fisher, M. (2013). U.S. Patent No. 8,352,323. Washington, DC: U.S. Patent and Trademark
Office.
Ha, S. K., Kim, G. S., Choi, S. M., Kim, S. K., Kim, J. G., Park, M., ... & Sim, K. (2013). PHILS
based protection system design for an HTS power cable installed in a grid.
, 339-340.
Lee, W., Cheon, M., Hyun, C. H., & Park, M. (2013). Development of building fire safety
system with automatic security firm monitoring capability. Fire safety journal, 58, 65-73.
Nielsen, J. (2014). Nielsen’s Law of Internet Bandwidth, 1998.
Singh, D., Tripathi, G., & Jara, A. J. (2014, March). A survey of Internet-of-Things: Future
vision, architecture, challenges and services. In Internet of things (WF-IoT), 2014 IEEE
world forum on (pp. 287-292). IEEE.
Sommer, J., & Franz, W. (2012). A Component-based Simulation Model and its Implementation
of a Switched Ethernet Network.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review.
In Computer Science and Electronics Engineering (ICCSEE), 2012 international
conference on (Vol. 3, pp. 648-651). IEEE.
Document Page
9
INTERNET OF THINGS
Takai, I., Ito, S., Yasutomi, K., Kagawa, K., Andoh, M., & Kawahito, S. (2013). LED and
CMOS image sensor based optical wireless communication system for automotive
applications. IEEE Photonics Journal, 5(5), 6801418-6801418.
Tozlu, S., Senel, M., Mao, W., & Keshavarzian, A. (2012). Wi-Fi enabled sensors for internet of
things: A practical approach. IEEE Communications Magazine, 50(6).
Winzer, P. J. (2014). Spatial multiplexing in fiber optics: The 10x scaling of metro/core
capacities. Bell Labs Technical Journal, 19, 22-30.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]