IoT2 Introduction Airport management is mandated in handling baggage of the passengers. The current system is said to have many issues with baggage, they are lots of complaints due to the increasing loss of baggage. To sort out this problem, this paper will propose an IoT sensor system. First, the paper will give a detailed design of the IoT system. Second, the paper will give a clear description of all the security aspects of the IoT system and protection mechanism. Lastly, the paper will simulate the scenario An outline of the IoT system Internet of Things (IoT) is a system which has brought up a lot of benefits. The system has employed the use of sensors which in turn has greatly improved speed and quality of the production process. To be able to monitor the movement of a baggage, the IoT needs to be integrated with the cloud platform so as to send a short message to the owner of baggage about the movement of their baggage. IoT system lets people to attain a deeper automation, integration, and analysis within the system. The system utilizes emerging and existing technology for robotics, sensing, and networking. Some of the key features of IoT include connectivity, active management, small device use, and artificial intelligence. With IoT, an organization is able to increase efficiency other advantages are improved customer engagement, reduced waste, and enhanced data collection(Benabdellah, 2017). A design of the IoT system Hardware platform To start with IoT hardware has four building blocks which as shown by figure one below
IoT3 Figure 1:Hardware building blocks(Welton, 2017) The first building block which is thing is a set of an asset which that one desire to control. The thing building block is integrated with a smart device. The second building block is the data acquisition module, this focuses on converting the physical signal into digital signals which can then be handled by the computer. This is the hardware part of the IoT system which include all the sensors which are mandated in acquiring the real-world signals like motion and vibration. For this IoT, monitoring system include 3 sensors. In addition to this, some of the considerations to make when coming up with this type of IoT monitoring system are the signals that one need to measure, the number of sensors, how fast one ought to measure the real-world signals, and the accuracy one need in the measurement(Gilchrist, 2016). Third hardware building block as shown by figure one is the data processing module, this is the CPU part which processes the data. It also performs native analytics. It also stores data and at the same time performs any other computing operations. When coming up with IoT monitoring system it is very important to consider the processing power and the amount of local data storage. The last module is the communication module. This is the last device hardware module which enables communication with a cloud platform. This module includes ports like a serial (232/485), USB, Modbus. It also include radio technology for all wireless communications like WiFi, ZigBee, and LoRA. For this case, the Airport ought to have 802.15.4 mote modules. This is a hardware platform which will provide a broad portfolio for wireless modules. The reason as to why the gadget is best suited for this case is that it provides a portfolio for all the wireless modules which enable the organization to
IoT4 meet the needs of the organization. The sensor board ought to be of Ds1000 which offers both direct sensing connectivity and all the IoT sensor capabilities. In addition, the organization ought to go for 802.15.14 network infrastructure of type SG1100 which is able to provide gateway services and is able to deal with the deployment of wireless sensor networks. The processor for this case ought to be Intel X86; this type of processor is able to handle all the IoT monitoring system commands(Yarali, 2016). Operating system IoT operating system ought to perform better within constraints of IoT devices which includes size, power, the processing capacity, and memory. There are various IoT OS which includes, Ubuntu Core, Fuchsia OS, Linux based OS, and RIOT. Ubuntu core is a transactional version which made specifically for IoT devices. Fuchsia OS; this type of IoT OS which is Google based. On the other hand, RIOT is one of the open source OS which is specialized for all IoT devices. For this case, this paper will go for Fuchsia type of operating System which is a cross-device open source OS. It is an OS from Google which is able to run IoT equipment. The OS also has the ability to run across the various platforms meaning that it cannot only run only on smartphones but it can also run on tablets, digital monitors, Airport controls, desktops, and notebooks. One of the major reason this paper has gone for Fuchsia OS is that it is integrated with Google assistant and the Google cloud environment(Kurose & Ross, 2017). Sensors and actuators When making a decision on the types of sensors; one of the major considerations is the sensor signal conditioning. It is either the sensor signal conditioning is integrated with micro-controllers or with the sensor module package. Another consideration to make is power management. So as to select the best component four major specifications that this scenario ought to consider which the needed intelligence is that is required by the sensor node; this ought to dictate either to use a 32 or 16 bit type of processor but for this as indicated earlier a 32-bit processor is to be used. The second specification is the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IoT5 communication technologies. Third, the sampling rate which is required for the sensor signal conditioning and the power source. To accommodate the requirements of the airport management system, they ought to go for the DS1000 type of sensor with CMXX00 series which have 51 pins connector. This type of sensor has very low power consumption rate, low response time, and broad measuring range. Other specifications of this type of sensor is that it is resistive-based technology(Watts, 2015) Physical channel For this case, this paper will go for the ZigBee protocol. ZigBee communication protocol is best suited for this case. This type of protocol which is specifically created for the wireless sensor network. The protocol includes both software and hardware which is highly reliable, low, power, data rate, and cost. In addition the protocol is scalable. The reason as to why this paper goes for ZigBee protocol is that it is inexpensive and has the capability pf processing and collecting physical environmental information. It also has the capability of communicating with the neigbouri9ng sensors. The airport management can also use it as an air conditioning detection system(Blanc & Cotton, 2014). The reason as to why this paper goes for ZigBee is that it offers Bluetooth services of upto 2.4 GHZ with a data rate of 1Mbps. In addition it has a power consumption rate of 40 to 100MW. ZigBee also ranges from 30 to 75 meters which is a good range for this case. Logical channel This project will go for hypertext transfer Protocol; this a type of protocol which allows fetching of resources like HTML documents. It also permits users of WWW to exchange data and information which is found on the internet. The Hyper Text Transfer Protocol uses port 443 so as to transfer information. One of the reasons this paper has opted for HTTP is because it is simple as it is able to encapsulate HTTP messages into frames. The protocol is designed to be simple and it easily understood by users. Second, the protocol is extensible; i.e. it is very easy to extend HTTP protocol. Third, HTTP protocol is stateless and session less; i.e. it allows the use of stateful sessions(Matthews, 2007)
IoT6 Network topology When choosing the best network topology few consideration has to be met first. First, is latency; this is the time taken for a certain packet of data or information to move from one sensor node via an organization network to a gateway node. Generally, this consideration imitates the speed of the organization network. They say that the faster the organization network then the lower the latency. On the other hand throughput, this is the amount of information or data which can pass via network in one second. Third, consideration is the fault resiliency, this is that degree to which a network will recover in case it is interrupted. Scalability is the total number of organization devices or gadgets which can be included in the organization network. For this case, this paper will go for mesh network topology. This is a type of topology which consists of 3 types of nodes which are simple sensor nodes, router nodes, and a gateway node. Router nodes which are used for routing, the gateway node are provided so as that data can reach to the outside world. One of the reasons as to why the organization goes for this type of topology is that the sensor nodes able to capture and at the same time disseminate their own information or data. In addition, mesh type of topology is able to serve as relays for the other nodes. Also it have that capability of collaborating with the neighboring nodes so as to propagating data via a network(Kurose & Ross, 2017). Second, mesh topology is positioned such that each and every node which is within the transmission range for all the router nodes. In addition, data packets pass via multiple routers and sensors so as to reach to the gateway noide. In addition, mesh type of topology is able to cover broad range; it is able to scale up thousands of nodes and at the same time provide a high density of coverage. Other advantages related to mesh type of topology is that data can be transmitted over various devices simultaneously and at the same time the to0pology can withstand high traffic. Also, if one of the component or device fails or cannot withstand high traffic, there is always an alternative component. Lastly, modification and expansion can be done without having to disrupt other services.
IoT7 Maintenance This paper will propose a predictive type of maintenance. This is a type of maintenance which is used to determine the conditions of all the in-service equipment so as to predict when a maintenance ought to be performed. One of the reasons this project goes for this type of maintenance is that it allows convenient scheduling of corrective maintenance. It also prevents what one would refer to as unexpected equipment failures(Huang, 2015). Data storage For this scenario, this paper will go for cloud type of data storage. This is because data cloud is ubiquitous and elastic. In addition, cloud has analytical tools which can help in discovering some of the secrets which are hidden in a broad pool of data. In addition, cloud data storage can be designed such that the IoT system is able to perform real-time analytics. Data Access There two types of data access which are random access and sequential type of data access. For this scenario, this paper will go for a random type of data access. Random data access is also referred to as direct access. With this type of data access, the IoT system has the ability to access an arbitrary data element, no matter the number of data elements which may be set; The IoT system has the ability to access any data set in constant time. Cost To come with this IoT monitoring system more weight has been put on hardware. The maximum cost for this system is $20,000. The cost is like that of an environmental monitoring system. The hardware takes 75 percent of the cost while the software part takes 25 percent of the cost(Amazon, 2016). The security aspect of the IoT system IoT system makes use of lots of security aspects. To start with all the security aspects, rely heavily on the encryption. Example, this IoT system should make use of the many layers of defense, an
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IoT8 example is segregating devices onto separate networks. Another aspect of IoT system security is device authorization and authentication. All the devices ought to establish their own identity before accessing upstream apps and services. Third, it is important to manage device updates which include security patches. All the devices must be up to date. The fourth aspect is that the system must ensure data integrity and privacy. Lastly, the IoT system must detect weaknesses and security breaches(Gilchrist, 2016). Figure 2: Fine details of IoT system(Venkataramani, et al., 2017)
IoT9 Simulation codes of the scenario Simulating connected baggage { var path = Baggage({start:' Airportarrival',end:'customerpick',accuracy:5}); return JSON.stringify(path); } Simulating found baggage { var found = Baggage ( { start: ‘customerbaggage’, end ‘givecustomer’, accuracy: 4}); return JSON.stringify(Baggage); Conclusion From this paper, it is evident that IoT system will sort the problem in the airport. In addition, the system enhances connectivity of baggage after they arrive at the airport at any-place or any-time that they are required. The proposed IoT system has the ability to transfer data over the organization network without the requirement of human to computer or what one may refer to as human-computer interaction. References
IoT10 Amazon, 2016.AMAZON.[Online] Available at:https://www.amazon.com [Accessed 5th November 2018]. Benabdellah, 2017. Internet of things security.Wireless Technologies, Embedded and Intelligent Systems,I(1), pp. 1-6. Blanc, R. P. & Cotton, I. W., 2014.Computer networking by Robert P Blanc.s.l.:s.n. Gilchrist, A., 2016.IoT security issues by Alasdair Gilchrist.3rd ed. New York: Boston Press. Gilchrist, A., 2016. Internet of things security analysis.Internet Technology and Applications (iTAP,2(1), pp. 1-4. Huang, Z., 2015.Progression and Edge Intelligence Framework for IoT Systems.2nd ed. Chicago: John & Wiley Sons Press. Kurose, J. F. & Ross, K. W., 2017. Networking.Computer security,II(2), pp. 27-78. Matthews, J., 2007.Computer networking : Internet protocols in action.1st ed. New York: Springer . Venkataramani, G. P. et al., 2017.Smart secure systems - IoT and analytics perspective : second International Conference on Intelligent Information Technologies, ICIIT 2017, Chennai, India, December 20-22, 2017, proceedings.3rd ed. Singapore : Springer. Watts, S., 2015.The Internet of Things (IoT) : applications, technology,... by Silvia Watts.1st ed. Chicago: Springer.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IoT11 Welton, T., 2017.Internet of Things : Characteristics of IoT Systems by Travis Welton.1st ed. London: New Hampshire Press. Yarali, A., 2016.IoT.4th ed. New York: Nova Science Publishers.