Internet of Things Applications and Devices
VerifiedAdded on  2020/03/28
|13
|2773
|102
AI Summary
This assignment focuses on the Internet of Things (IoT), examining its diverse applications and the range of devices that comprise it. It details the functions of specific IoT devices like smart televisions, lighting systems, thermostats, security systems, and more. Manufacturers and cost information are also provided for each device category, offering a comprehensive overview of the current IoT landscape.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: INTERNET OF THINGS
INTERNET OF THINGS
Name of the Student
Name of the University
INTERNET OF THINGS
Name of the Student
Name of the University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INTERNET OF THINGS
Table of Contents
Introduction..........................................................................................................................2
1. Issue in smart homes........................................................................................................2
2. Home networking............................................................................................................3
3. Description of Devices....................................................................................................4
Conclusion...........................................................................................................................9
References..........................................................................................................................10
Table of Contents
Introduction..........................................................................................................................2
1. Issue in smart homes........................................................................................................2
2. Home networking............................................................................................................3
3. Description of Devices....................................................................................................4
Conclusion...........................................................................................................................9
References..........................................................................................................................10
2INTERNET OF THINGS
Introduction
The idea of Internet of Things is mostly interfacing a gadget with the element of on and
off switch with the web innovation. This may incorporate anything from espresso producer to
mobile phones to clothes washer and so on the web of things has created with the meeting of the
remote innovation, small scale administrations and smaller scale electromechanical system
(Bonomi et al., 2017). The primary effect which is accomplished from the of the storehouse
dividers between the Information Technology (IT) and the Operational Technology (OT) with a
specific end goal to actualize change drive permitting unstructured information which is machine
created to be broke down for the understanding.
This report puts coordinate accentuation on the idea of the web of things with case of few
IoT gadgets and devices. Giving spotlight on the usage, connectivity and control related issue
with the gadgets.
1. Issue in smart homes
Technologies that are related to the smart homes are all over us that many available
options that have been given from a variety of users. There are some issues which could be
related to the area of concern.
ï‚· Hacking: The programmers can access the savvy home simply like they can include in
some other innovation.
ï‚· Technology is moody: Like some other innovation, associated home innovation can now
and again be particularly surly or have their mentality.
Introduction
The idea of Internet of Things is mostly interfacing a gadget with the element of on and
off switch with the web innovation. This may incorporate anything from espresso producer to
mobile phones to clothes washer and so on the web of things has created with the meeting of the
remote innovation, small scale administrations and smaller scale electromechanical system
(Bonomi et al., 2017). The primary effect which is accomplished from the of the storehouse
dividers between the Information Technology (IT) and the Operational Technology (OT) with a
specific end goal to actualize change drive permitting unstructured information which is machine
created to be broke down for the understanding.
This report puts coordinate accentuation on the idea of the web of things with case of few
IoT gadgets and devices. Giving spotlight on the usage, connectivity and control related issue
with the gadgets.
1. Issue in smart homes
Technologies that are related to the smart homes are all over us that many available
options that have been given from a variety of users. There are some issues which could be
related to the area of concern.
ï‚· Hacking: The programmers can access the savvy home simply like they can include in
some other innovation.
ï‚· Technology is moody: Like some other innovation, associated home innovation can now
and again be particularly surly or have their mentality.
3INTERNET OF THINGS
ï‚· Concern with the price: The principle issue is the cost related issue; it can turn out to be
especially costly from the perspective of the client.
2. Home networking
Step 1: Device
There should be one of the following devices in the home networking system:
ï‚· A modem
ï‚· A router (wired or wireless)
ï‚· A network switch (Li & Da Xu, 2017)
Step 2: IP addresses
Every device in the network has unique IP address. Especially all the home network IP address
starts with mostly 192.168., this mainly signifies classes that are private C addressed (Sommer
and Franz, 2012). Most of the routers automatically assign IP addresses to each of the computer
through the basic processes in Dynamic host configuration protocol (DHCP).
Step 3: DNS server
In addition to the IP addresses that are available in the computer, the DNS (Domain Name
System) servers are also available. The main role of the server is to translate the name of the
domain that are suppose to put in the browser in the IP address and tells the IP address to be used
to the computer directly.
ï‚· Concern with the price: The principle issue is the cost related issue; it can turn out to be
especially costly from the perspective of the client.
2. Home networking
Step 1: Device
There should be one of the following devices in the home networking system:
ï‚· A modem
ï‚· A router (wired or wireless)
ï‚· A network switch (Li & Da Xu, 2017)
Step 2: IP addresses
Every device in the network has unique IP address. Especially all the home network IP address
starts with mostly 192.168., this mainly signifies classes that are private C addressed (Sommer
and Franz, 2012). Most of the routers automatically assign IP addresses to each of the computer
through the basic processes in Dynamic host configuration protocol (DHCP).
Step 3: DNS server
In addition to the IP addresses that are available in the computer, the DNS (Domain Name
System) servers are also available. The main role of the server is to translate the name of the
domain that are suppose to put in the browser in the IP address and tells the IP address to be used
to the computer directly.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4INTERNET OF THINGS
SERVER
CABLE
SERVER
HOMEROUTER
LINKS
CLOUD
Figure no 1: DIGITAL DIAGRAM OF THE CONCEPT OF IoT
(SOURCE: BY AUTHOR)
3. Description of Devices
Smart Television The principle viewpoint which can be utilized to portray the smart
television is that it makes the idea especially less demanding as far as
dealing with the distinctive phenomena of the concept.
Usage The principle viewpoint which can be utilized to portray the keen TV is that
is makes the idea especially less demanding as far as dealing with the
distinctive marvels of the idea
Control The control of the smart television can be merely done with the use of a
remote or a smart device such as a smart phone
Connectivity The network can be accomplished with the utilization of Ethernet purpose
SERVER
CABLE
SERVER
HOMEROUTER
LINKS
CLOUD
Figure no 1: DIGITAL DIAGRAM OF THE CONCEPT OF IoT
(SOURCE: BY AUTHOR)
3. Description of Devices
Smart Television The principle viewpoint which can be utilized to portray the smart
television is that it makes the idea especially less demanding as far as
dealing with the distinctive phenomena of the concept.
Usage The principle viewpoint which can be utilized to portray the keen TV is that
is makes the idea especially less demanding as far as dealing with the
distinctive marvels of the idea
Control The control of the smart television can be merely done with the use of a
remote or a smart device such as a smart phone
Connectivity The network can be accomplished with the utilization of Ethernet purpose
5INTERNET OF THINGS
of association or a remote association. the remote association is gainful
because they free the client from the part of spatial limitations which can
regularly be connected with association which are kept up by means of the
Ethernet links
Security The security viewpoint is improved with the execution of security code so
as to get the entrance of the innovation. This implies anyone who needs to
get to the innovation can't do as such without the security code
Privacy The privacy aspect with smart television is that no one other than the
intended user can get access to the technology by the implementation of the
security code (Kumar et al., 2017)
Smart lightning The smart lightning idea for the most part points of interest with the use
of sensor gadgets keeping in mind the end goal to working the lightning in
homes. This can be accomplished simply with the usage of utilizing an
advanced cell or different gadgets related for the most part to accomplish
control over the lightning.
Usage Usage: The usage prospective is controlling the lightning at homes in a
systematic manner in order to reduce the manner to reduce the human
interference related to the system
Control The control of the overall implantation is mainly done using a device
which can be a smart phone or a remote control
Connectivity The availability is principally accomplished between the two gadgets in
on the off chance that the lightning framework and the remote or the
gadget which would be utilized to control the general working of the
of association or a remote association. the remote association is gainful
because they free the client from the part of spatial limitations which can
regularly be connected with association which are kept up by means of the
Ethernet links
Security The security viewpoint is improved with the execution of security code so
as to get the entrance of the innovation. This implies anyone who needs to
get to the innovation can't do as such without the security code
Privacy The privacy aspect with smart television is that no one other than the
intended user can get access to the technology by the implementation of the
security code (Kumar et al., 2017)
Smart lightning The smart lightning idea for the most part points of interest with the use
of sensor gadgets keeping in mind the end goal to working the lightning in
homes. This can be accomplished simply with the usage of utilizing an
advanced cell or different gadgets related for the most part to accomplish
control over the lightning.
Usage Usage: The usage prospective is controlling the lightning at homes in a
systematic manner in order to reduce the manner to reduce the human
interference related to the system
Control The control of the overall implantation is mainly done using a device
which can be a smart phone or a remote control
Connectivity The availability is principally accomplished between the two gadgets in
on the off chance that the lightning framework and the remote or the
gadget which would be utilized to control the general working of the
6INTERNET OF THINGS
helping
Security The security aspect that can be involved in the smart lightning is mainly
related to the device which is used to gain control over the lightning
schedule. In smart phones pre-defined security code can be given which
can be added to the security of the overall concept
Privacy The privacy aspect lies that the lightening system can be merely used or
operated by the devices which is connected to the device (Wollschlaeger,
Sauter&Jasperneite, 2017)
Nest intelligent thermostat The nest intelligent thermostat is mainly a temperature control device
which helps in manipulating the room temperature with the help of a
device which is used for controlling the features
Usage The nest intelligent thermostat is mainly a mere combination of sensors
and algorithms; this helps in overall sensing of what is happening around
Control the control some portion of the net intelligent thermostat can be controlled
just with the assistance of a gadget which incorporate the operation of
sensors engaged with the idea. The sensors in the indoor regulator have a
150-degree sensor which is engaged with following the home's cooling
and the warming strives versa
Connectivity The connectivity aspect is that, it involves mainly two devices one is the
sensor of the thermostat and the other being the sensor the remote control
which is used in controlling the thermostat
Security The security is emphasis on the control over the device so that any device
does not achieve access to the sensors to the thermostat indirectly
helping
Security The security aspect that can be involved in the smart lightning is mainly
related to the device which is used to gain control over the lightning
schedule. In smart phones pre-defined security code can be given which
can be added to the security of the overall concept
Privacy The privacy aspect lies that the lightening system can be merely used or
operated by the devices which is connected to the device (Wollschlaeger,
Sauter&Jasperneite, 2017)
Nest intelligent thermostat The nest intelligent thermostat is mainly a temperature control device
which helps in manipulating the room temperature with the help of a
device which is used for controlling the features
Usage The nest intelligent thermostat is mainly a mere combination of sensors
and algorithms; this helps in overall sensing of what is happening around
Control the control some portion of the net intelligent thermostat can be controlled
just with the assistance of a gadget which incorporate the operation of
sensors engaged with the idea. The sensors in the indoor regulator have a
150-degree sensor which is engaged with following the home's cooling
and the warming strives versa
Connectivity The connectivity aspect is that, it involves mainly two devices one is the
sensor of the thermostat and the other being the sensor the remote control
which is used in controlling the thermostat
Security The security is emphasis on the control over the device so that any device
does not achieve access to the sensors to the thermostat indirectly
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7INTERNET OF THINGS
controlling the temperature of the room
Privacy The privacy is that to achieve the connectivity part both the sensors
should be involved in the process. a connectivity must create between the
thermostat and the controlling device to control the temperature of the
room (McKernan, 2016)
WeMo switch smart plug The WeMo switch mart plug is mainly used in order to control any
electronic device which is being used at home
Usage The concept of the usage is to gain access over any electronic device at
home. This is mainly a wireless connection oriented service
Control The control feature is that the device whose control is to be gained is
plugged into an output and the device which is to be used to control the
device has to be plugged in
Connectivity The main part of the connectivity in WeMo switch smart plug is that both
the devices; one which is being control and the other which is being used
to control must be plugged into an outlet
Security The security is that anybody cannot gain access to the device. On the
other and until and unless both the devices are plugged in access is not
created and controlling cannot be done(Li & Da Xu, 2017)
Privacy The privacy aspect is that being a wireless connection the communicating
devices have to gain access permission before being used
Hug white bulb The tint white globule is considered as on of the most recent
controlling the temperature of the room
Privacy The privacy is that to achieve the connectivity part both the sensors
should be involved in the process. a connectivity must create between the
thermostat and the controlling device to control the temperature of the
room (McKernan, 2016)
WeMo switch smart plug The WeMo switch mart plug is mainly used in order to control any
electronic device which is being used at home
Usage The concept of the usage is to gain access over any electronic device at
home. This is mainly a wireless connection oriented service
Control The control feature is that the device whose control is to be gained is
plugged into an output and the device which is to be used to control the
device has to be plugged in
Connectivity The main part of the connectivity in WeMo switch smart plug is that both
the devices; one which is being control and the other which is being used
to control must be plugged into an outlet
Security The security is that anybody cannot gain access to the device. On the
other and until and unless both the devices are plugged in access is not
created and controlling cannot be done(Li & Da Xu, 2017)
Privacy The privacy aspect is that being a wireless connection the communicating
devices have to gain access permission before being used
Hug white bulb The tint white globule is considered as on of the most recent
8INTERNET OF THINGS
developments with regards to the lightning at homes. The idea changed
the lightening aspect at homes and how they can be communicated
Usage The use is predominantly worried about controlling the power of light and
how they show up in a Room forthcoming which includes circulating idea
of picking up the control over it
Control The control perspective is just accomplished with a sensor included
gadget which can be utilized as a part of an association between the
working gadgets
Connectivity The availability is pick up by a remote sensor and the sensors which are in
the lightning framework
Security The security perspective is giving a mean of bolt and a key element which
avert approved client to get entrance over the framework
Privacy The protection viewpoint can likewise be identified with the bolt and key
and segregation of the user being engaged with the operation of the
lightening (Wollschlaeger, Sauter&Jasperneite, 2017
August smart lock The idea driving the august shrewd bolt is the locking and the opening of
the entryways at homes which is done only by a client who approaches it
Usage The use of the secure is just creating an additional future other than the
ordinary locks which are accessible for the security at homes
Control The control is accomplished to the previously mentioned innovation by
methods for a savvy gadget for instance an advanced mobile phone
Connectivity The network can be accomplished by methods for remote innovation for
developments with regards to the lightning at homes. The idea changed
the lightening aspect at homes and how they can be communicated
Usage The use is predominantly worried about controlling the power of light and
how they show up in a Room forthcoming which includes circulating idea
of picking up the control over it
Control The control perspective is just accomplished with a sensor included
gadget which can be utilized as a part of an association between the
working gadgets
Connectivity The availability is pick up by a remote sensor and the sensors which are in
the lightning framework
Security The security perspective is giving a mean of bolt and a key element which
avert approved client to get entrance over the framework
Privacy The protection viewpoint can likewise be identified with the bolt and key
and segregation of the user being engaged with the operation of the
lightening (Wollschlaeger, Sauter&Jasperneite, 2017
August smart lock The idea driving the august shrewd bolt is the locking and the opening of
the entryways at homes which is done only by a client who approaches it
Usage The use of the secure is just creating an additional future other than the
ordinary locks which are accessible for the security at homes
Control The control is accomplished to the previously mentioned innovation by
methods for a savvy gadget for instance an advanced mobile phone
Connectivity The network can be accomplished by methods for remote innovation for
9INTERNET OF THINGS
instance a portion of the innovation include Bluetooth ideas into it
Security The security perspective is identified with who can get to it. The client
who is the approved client can just obtain entrance over the framework
Privacy The protection viewpoint can be straightforwardly identified with the
highlights which is accessible in an advanced mobile phone or a gadget,
for example, a security bolt code (Gubbi et al., 2013)
Canary smart security
system
Canary smart security gadget is a framework which is utilized to control
the general parts of the home gadgets independently
Usage The utilization which is identified with the idea is that one savvy gadget
can access more than one gadget to accomplish control over the gadget
Control The control should be possible with the assistance of an advanced mobile
phone or a smart gadget
Connectivity The availability is for the most part remote which can be produced by
methods for an insignificant Bluetooth and now and again an application
Security The security perspective is identified with who can get to it. The client
who is the approved client can just obtain entrance over the framework
Privacy The protection viewpoint can be specifically identified with the highlights
which is accessible in a PDA or a gadget, for example, a security bolt
code (Singh, Tripathi and jara, 2014)
instance a portion of the innovation include Bluetooth ideas into it
Security The security perspective is identified with who can get to it. The client
who is the approved client can just obtain entrance over the framework
Privacy The protection viewpoint can be straightforwardly identified with the
highlights which is accessible in an advanced mobile phone or a gadget,
for example, a security bolt code (Gubbi et al., 2013)
Canary smart security
system
Canary smart security gadget is a framework which is utilized to control
the general parts of the home gadgets independently
Usage The utilization which is identified with the idea is that one savvy gadget
can access more than one gadget to accomplish control over the gadget
Control The control should be possible with the assistance of an advanced mobile
phone or a smart gadget
Connectivity The availability is for the most part remote which can be produced by
methods for an insignificant Bluetooth and now and again an application
Security The security perspective is identified with who can get to it. The client
who is the approved client can just obtain entrance over the framework
Privacy The protection viewpoint can be specifically identified with the highlights
which is accessible in a PDA or a gadget, for example, a security bolt
code (Singh, Tripathi and jara, 2014)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10INTERNET OF THINGS
Car key zone The idea driving the innovation is picking up the entrance to the auto with
the assistance of a smart gadget
Usage The use is chiefly identified with the locking and opening the auto
entryways or all together words getting entrance over the entire auto
Control The control of the innovation is finished with the assistance of a gadget
occasionally an advanced mobile phone even
Connectivity The availability is such a usage is remote including even Bluetooth or
sensors engaged with it
Security The security viewpoint straightforwardly lie on the clients perspective on
who needs to obtain entrance and any unapproved client don't access the
auto
Privacy The security viewpoint specifically infers in producing the availability for
the entrance. Private bolt keys and security codes can improve the
protection issue (Tozlu et al., 2012)
Pet net smart per feeder The pet Net is a brilliant pet feeder which is thought to be a standout
amongst the most accommodating advancements when identified with the
proprietors of the mutts
Usage The utilization is worried about topping off the framework with the
sustenance of the pet. Then again, a clock is kept up which guarantees that
the nourishment is dispatched at the opportune time
Control The control of the framework is in construct which include an attempt
which keeps the sustenances and a clock for opportune dispatch of the
nourishment, the clock and the nourishment are auto0linked and
Car key zone The idea driving the innovation is picking up the entrance to the auto with
the assistance of a smart gadget
Usage The use is chiefly identified with the locking and opening the auto
entryways or all together words getting entrance over the entire auto
Control The control of the innovation is finished with the assistance of a gadget
occasionally an advanced mobile phone even
Connectivity The availability is such a usage is remote including even Bluetooth or
sensors engaged with it
Security The security viewpoint straightforwardly lie on the clients perspective on
who needs to obtain entrance and any unapproved client don't access the
auto
Privacy The security viewpoint specifically infers in producing the availability for
the entrance. Private bolt keys and security codes can improve the
protection issue (Tozlu et al., 2012)
Pet net smart per feeder The pet Net is a brilliant pet feeder which is thought to be a standout
amongst the most accommodating advancements when identified with the
proprietors of the mutts
Usage The utilization is worried about topping off the framework with the
sustenance of the pet. Then again, a clock is kept up which guarantees that
the nourishment is dispatched at the opportune time
Control The control of the framework is in construct which include an attempt
which keeps the sustenances and a clock for opportune dispatch of the
nourishment, the clock and the nourishment are auto0linked and
11INTERNET OF THINGS
synchronized
Connectivity The network is accomplished with the assistance of sensors which are
included. The correspondence between the plate and the clock is the most
imperative point here.
Security The security issue for this situation does not assume a key part
considering only the best possible usefulness between the ins assemble
framework's
Privacy The security issue in this usage lies on who obtains entrance over the
framework in controlling the clock. So as to do as such mystery keys are
used(Sommer and Franz, 2012)
Conclusion
It can be finished up from the above report that the internet of things is assuming an
exceptionally fundamental part in each field of life. Sooner rather than later the web of things
can be incorporated into numerous circles and included preferred standpoint can be picked up
from the innovation.
synchronized
Connectivity The network is accomplished with the assistance of sensors which are
included. The correspondence between the plate and the clock is the most
imperative point here.
Security The security issue for this situation does not assume a key part
considering only the best possible usefulness between the ins assemble
framework's
Privacy The security issue in this usage lies on who obtains entrance over the
framework in controlling the clock. So as to do as such mystery keys are
used(Sommer and Franz, 2012)
Conclusion
It can be finished up from the above report that the internet of things is assuming an
exceptionally fundamental part in each field of life. Sooner rather than later the web of things
can be incorporated into numerous circles and included preferred standpoint can be picked up
from the innovation.
12INTERNET OF THINGS
References
Bonomi, F., Milito, R., Zhu, J., &Addepalli, S. (2017, August). Fog computing and its role in the
internet of things. In Proceedings of the first edition of the MCC workshop on Mobile
cloud computing (pp. 13-16). ACM.
Bui, N. (2016). Internet of Things.
Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-
68). Palgrave Macmillan, London.
Kranz, M. (2016). Building the Internet of Things: Implement New Business Models, Disrupt
Competitors, Transform Your Industry. John Wiley & Sons.
Kumar, M., Bhaskar, M. S., Padmanaban, S., Siano, P., Blaabjerg, F., &Leonowicz, Z. (2017,
June). Electric field analysis of extra high voltage (EHV) underground cables using finite
element method. In Environment and Electrical Engineering and 2017 IEEE Industrial
and Commercial Power Systems Europe (EEEIC/I&CPS Europe), 2017 IEEE
International Conference on (pp. 1-4). IEEE.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
McKernan, K. J. (2016). The chloroplast genome hidden in plain sight, open access publishing
and anti-fragile distributed data sources. Mitochondrial DNA Part A, 27(6), 4518-4519.
Mulani, T. T., &Pingle, S. V. (2016). Internet of things. International Research Journal of
Multidisciplinary Studies, 2(3).
References
Bonomi, F., Milito, R., Zhu, J., &Addepalli, S. (2017, August). Fog computing and its role in the
internet of things. In Proceedings of the first edition of the MCC workshop on Mobile
cloud computing (pp. 13-16). ACM.
Bui, N. (2016). Internet of Things.
Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-
68). Palgrave Macmillan, London.
Kranz, M. (2016). Building the Internet of Things: Implement New Business Models, Disrupt
Competitors, Transform Your Industry. John Wiley & Sons.
Kumar, M., Bhaskar, M. S., Padmanaban, S., Siano, P., Blaabjerg, F., &Leonowicz, Z. (2017,
June). Electric field analysis of extra high voltage (EHV) underground cables using finite
element method. In Environment and Electrical Engineering and 2017 IEEE Industrial
and Commercial Power Systems Europe (EEEIC/I&CPS Europe), 2017 IEEE
International Conference on (pp. 1-4). IEEE.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
McKernan, K. J. (2016). The chloroplast genome hidden in plain sight, open access publishing
and anti-fragile distributed data sources. Mitochondrial DNA Part A, 27(6), 4518-4519.
Mulani, T. T., &Pingle, S. V. (2016). Internet of things. International Research Journal of
Multidisciplinary Studies, 2(3).
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.