Internet of Things: Applications and Challenges
VerifiedAdded on 2020/02/24
|6
|1117
|228
AI Summary
This assignment delves into the multifaceted realm of the Internet of Things (IoT). It examines various IoT applications across diverse sectors. The text highlights the critical challenges associated with IoT, focusing on privacy concerns, security vulnerabilities, and the impact of Nielson's Law on bandwidth requirements. Additionally, it analyzes potential risks such as bodily harm and property damage arising from faulty IoT systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INTERNET OF THINGS 1
Internet of things
Name
Institution
Professor
Course
Date
Internet of things
Name
Institution
Professor
Course
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNET OF THINGS 2
Q1
“The best interface for a system is no User Interface” has been used categorically to
imply that, what application Interface refers to as best may not be the best interface when it
comes to systems user application interface. Users of the system are quite different from machine
and requires to have very attractive and accommodating interface (Krishna, 2015). Requirements
of User Interface should be met according to users need such as navigation and easy to operate.
With no User Interface, what is left is for machine to help human being do the business activities
instead of Users adopting the need to operate applications. It is applicable in cases where
machine is self-directing on what should be done instead of users interacting with it. The
examples on this case are; eliminating UI that car owners use to open their cars and applications
that users use to order online.
Q2
Twisted pair cable has the following specifications on bandwidth; CAT 4=20 MHZ, CAT
5=100MHZ and CAT 6= 250MHZ. The maximum length of performance that twisted cable can
take is 100M. The interference rate of CAT 4 = 20Mbps, CAT 5= 100Mbps (2 pair) and CAT 6=
10,000Mbps. The bulk price of UTP cable 5 pairs which double shielded and AWG stranded is
$237.62 in a ready market. On security matters, UPT does not permit crosstalk between wires
and is prone to radio frequency. Coaxial cable bandwidth are; Wireless G (802.11g) = 54Mbps,
WAN-10 Base-T= 10Mbps and cable broadband= 52Mbps (KOEGEL, YU, & LUA, 2009). The
maximum distance of a coaxial cable is 380M. The interference rate of a coaxial cable increases
with length. The cost is dependent on the type of cable. RG6 which is of Standard Shield type
ranges from $50-$200 for 30,000 miles. It is believed to be more secure than twisted cable. The
bandwidth of a fibre optic cable is 1Gbps, its operating distance is between 850nm and 1300 nm.
Q1
“The best interface for a system is no User Interface” has been used categorically to
imply that, what application Interface refers to as best may not be the best interface when it
comes to systems user application interface. Users of the system are quite different from machine
and requires to have very attractive and accommodating interface (Krishna, 2015). Requirements
of User Interface should be met according to users need such as navigation and easy to operate.
With no User Interface, what is left is for machine to help human being do the business activities
instead of Users adopting the need to operate applications. It is applicable in cases where
machine is self-directing on what should be done instead of users interacting with it. The
examples on this case are; eliminating UI that car owners use to open their cars and applications
that users use to order online.
Q2
Twisted pair cable has the following specifications on bandwidth; CAT 4=20 MHZ, CAT
5=100MHZ and CAT 6= 250MHZ. The maximum length of performance that twisted cable can
take is 100M. The interference rate of CAT 4 = 20Mbps, CAT 5= 100Mbps (2 pair) and CAT 6=
10,000Mbps. The bulk price of UTP cable 5 pairs which double shielded and AWG stranded is
$237.62 in a ready market. On security matters, UPT does not permit crosstalk between wires
and is prone to radio frequency. Coaxial cable bandwidth are; Wireless G (802.11g) = 54Mbps,
WAN-10 Base-T= 10Mbps and cable broadband= 52Mbps (KOEGEL, YU, & LUA, 2009). The
maximum distance of a coaxial cable is 380M. The interference rate of a coaxial cable increases
with length. The cost is dependent on the type of cable. RG6 which is of Standard Shield type
ranges from $50-$200 for 30,000 miles. It is believed to be more secure than twisted cable. The
bandwidth of a fibre optic cable is 1Gbps, its operating distance is between 850nm and 1300 nm.
INTERNET OF THINGS 3
The cost are as follows; 288 Count Fiber Cost = 5,000 ft at $5.87 per foot; 144 Count Fiber =
5000 ft at $2.98 per foot; 24 Count Fiber = 70,000 ft at $0.68 per foot. In security terms, it is the
best in data protection.
Q3
Category Sensors RFID Video Tracking
Advantages Help in solving security
problem while
protecting valuables
Control activities by
providing accurate data
(Meyer, Ruppen &
Magerkurth, 2013)
It can store more
information than
barcode
Versatile in
nature
Able to read and
write, unlike
barcode
Increases
security in stores
Helps in
preventing
shoplifting
It provides
efficient
management by
surveillance
Disadvantages Easily manipulated
Break down
Costly due to
use of batteries
Remote reading
is interfered
with by
electromagnetic
It requires
expert to fix and
analyze
Requirements Range
Bandwidth
Tags production
Software
Cameras
Computer
The cost are as follows; 288 Count Fiber Cost = 5,000 ft at $5.87 per foot; 144 Count Fiber =
5000 ft at $2.98 per foot; 24 Count Fiber = 70,000 ft at $0.68 per foot. In security terms, it is the
best in data protection.
Q3
Category Sensors RFID Video Tracking
Advantages Help in solving security
problem while
protecting valuables
Control activities by
providing accurate data
(Meyer, Ruppen &
Magerkurth, 2013)
It can store more
information than
barcode
Versatile in
nature
Able to read and
write, unlike
barcode
Increases
security in stores
Helps in
preventing
shoplifting
It provides
efficient
management by
surveillance
Disadvantages Easily manipulated
Break down
Costly due to
use of batteries
Remote reading
is interfered
with by
electromagnetic
It requires
expert to fix and
analyze
Requirements Range
Bandwidth
Tags production
Software
Cameras
Computer
INTERNET OF THINGS 4
accuracy
resolution
Blank RFID DSP board
Application Cash points
Traffic lights control
Inventory
tracking,
Race timing
Supermarkets
Banks
City centers
Q4
The following are issues which are associated with Internet of Things (IoT) in today’s
technological market. According to Rayes & Salam (2016), privacy has been challenging
because a lot of information is being stored online and various people are trying to access it for
their own benefits. Many organizations have their systems compromised with intent of acquiring
sensitive data. Additionally, with growing technology, it has been very difficult to secure
hardware, software and other operational platforms being used in IoT. Similarly, it may result to
Bodily harm and property damage. Such cases occur where IoT is being used to control sensitive
devices such as blood sugar level applications connected to patient. When it fails, it may result to
death or body harm.
Q5
Delay= 12ms
Process/ request= 3ms
Send/receive message =2ms
2/3*12=8ms
accuracy
resolution
Blank RFID DSP board
Application Cash points
Traffic lights control
Inventory
tracking,
Race timing
Supermarkets
Banks
City centers
Q4
The following are issues which are associated with Internet of Things (IoT) in today’s
technological market. According to Rayes & Salam (2016), privacy has been challenging
because a lot of information is being stored online and various people are trying to access it for
their own benefits. Many organizations have their systems compromised with intent of acquiring
sensitive data. Additionally, with growing technology, it has been very difficult to secure
hardware, software and other operational platforms being used in IoT. Similarly, it may result to
Bodily harm and property damage. Such cases occur where IoT is being used to control sensitive
devices such as blood sugar level applications connected to patient. When it fails, it may result to
death or body harm.
Q5
Delay= 12ms
Process/ request= 3ms
Send/receive message =2ms
2/3*12=8ms
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNET OF THINGS 5
Q6
Nielson's Law involves internet bandwidth and states that, high end user connection is
expected to grow at a rate of 50% in a given year (Pecur, 2013). There are specific reasons as to
why bandwidth increases exponentially; it has been noticed that, Telecom companies more
conservative in their investments. Next, users are reluctant in spending a lot of their money on
bandwidth. Finally, the number of users are growing more than expected. There is direct
correlation between Nielson's Law and Moore’s Law in that, the latter is based on Moore’s Law.
It states that computer processing power is likely to increase twice within a period of 18 months.
When plotted in a graph, they exhibit exponential straight line (Cohen, Alikani, Bisignano,
2012). Some of the implications associated with IoT are; connected world before 2020,
interconnection of devices, homes and intelligent cities and required data security and privacy.
References
Cohen, J., Alikani, M., & Bisignano, A. (2012). Past performance of assisted reproduction
technologies as a model to predict future progress: a proposed addendum to Moore’s
law. Reproductive biomedicine online, 25(6), 585-590.
Koegel, B. J. F., Yu, H. H., & Lua, E. K. (2009). P2P networking and applications. Amsterdam:
Elsevier/Morgan Kaufmann
Q6
Nielson's Law involves internet bandwidth and states that, high end user connection is
expected to grow at a rate of 50% in a given year (Pecur, 2013). There are specific reasons as to
why bandwidth increases exponentially; it has been noticed that, Telecom companies more
conservative in their investments. Next, users are reluctant in spending a lot of their money on
bandwidth. Finally, the number of users are growing more than expected. There is direct
correlation between Nielson's Law and Moore’s Law in that, the latter is based on Moore’s Law.
It states that computer processing power is likely to increase twice within a period of 18 months.
When plotted in a graph, they exhibit exponential straight line (Cohen, Alikani, Bisignano,
2012). Some of the implications associated with IoT are; connected world before 2020,
interconnection of devices, homes and intelligent cities and required data security and privacy.
References
Cohen, J., Alikani, M., & Bisignano, A. (2012). Past performance of assisted reproduction
technologies as a model to predict future progress: a proposed addendum to Moore’s
law. Reproductive biomedicine online, 25(6), 585-590.
Koegel, B. J. F., Yu, H. H., & Lua, E. K. (2009). P2P networking and applications. Amsterdam:
Elsevier/Morgan Kaufmann
INTERNET OF THINGS 6
Krishna, G. (2015). The best interface is no interface: The simple path to brilliant technology.
San Francisco, Calif: Pearson Education, New Riders.
Meyer, S., Ruppen, A., & Magerkurth, C. (2013). Internet of things-aware process
modeling: integrating IoT devices as business process resources. In International
Conference on Advanced Information Systems Engineering (pp. 84-98). Berlin: Springer,
Heidelberg.
Pecur, D. (2013, June). Techno-economic analysis of long tailed hybrid fixed-wireless access. In
Telecommunications (ConTEL), 2013 12th International Conference on (pp. 191-198).
IEEE.
Rayes, A., & Salam, S. (2016). Internet of Things -- from hype to reality: The road to
digitization.
Krishna, G. (2015). The best interface is no interface: The simple path to brilliant technology.
San Francisco, Calif: Pearson Education, New Riders.
Meyer, S., Ruppen, A., & Magerkurth, C. (2013). Internet of things-aware process
modeling: integrating IoT devices as business process resources. In International
Conference on Advanced Information Systems Engineering (pp. 84-98). Berlin: Springer,
Heidelberg.
Pecur, D. (2013, June). Techno-economic analysis of long tailed hybrid fixed-wireless access. In
Telecommunications (ConTEL), 2013 12th International Conference on (pp. 191-198).
IEEE.
Rayes, A., & Salam, S. (2016). Internet of Things -- from hype to reality: The road to
digitization.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.