University IoT Report: Analysis of the Internet of Things Landscape
VerifiedAdded on 2020/02/24
|9
|1605
|116
Report
AI Summary
This report provides an overview of the Internet of Things (IoT), examining its various aspects. It begins by discussing the shift from Graphical User Interfaces (GUI) to Voice User Interfaces (VUI) and provides real-world examples like keyless car entry and simplified payment systems. The report then co...

Running head: INTERNET OF THINGS
Internet of Things
Name of the Student
Name of the University
Author’s notes
Internet of Things
Name of the Student
Name of the University
Author’s notes
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
INTERNET OF THINGS
Table of Contents
Answer 1..............................................................................................................................2
Answer 2..............................................................................................................................2
Answer 3..............................................................................................................................4
Answer 4..............................................................................................................................5
Answer 5..............................................................................................................................5
Answer 6..............................................................................................................................6
References............................................................................................................................8
INTERNET OF THINGS
Table of Contents
Answer 1..............................................................................................................................2
Answer 2..............................................................................................................................2
Answer 3..............................................................................................................................4
Answer 4..............................................................................................................................5
Answer 5..............................................................................................................................5
Answer 6..............................................................................................................................6
References............................................................................................................................8

2
INTERNET OF THINGS
Answer 1
This generation is getting obsessed with the use of mobile phones. But recent studies
have shown that the GUI (Graphical User Interface) is shifting to the VUI (Voice User
Interface). This has taken place because people like to interact in a natural way rather than
through any user interface. People like to use their own sensors while interacting with the other
people (Singh, Tripathi & Jara, 2014). Voice is the initial step towards that direction. People
would be more comfortable if they had to use no interface rather than any user interface. Two
examples where it can be applied are as follows:
Cars can be unlocked without using keys. There are several steps that need to be done in
order to open the door of a car. The no user interface will enable the people to just walk up to the
door and request the door to open. This will save time and be extremely user friendly. Mercedes-
Benz has solved this issue in 1991 and has gone keyless.
The payment procedure in a shop can be simplified by no user interface. By eliminating
the payment procedure customers can enter the shop buy the products and simply leave the shop.
The Pay with Square app allows the customers to naturally follow a procedure without dealing
with any user interface.
Answer 2
The following table shows the comparison between twisted pair, coaxial and optical fiber
cable.
Twisted Pair Cable Coaxial Cable Optical Fiber
It has low bandwidth. It has moderate bandwidth. It has extremely high bandwidth.
INTERNET OF THINGS
Answer 1
This generation is getting obsessed with the use of mobile phones. But recent studies
have shown that the GUI (Graphical User Interface) is shifting to the VUI (Voice User
Interface). This has taken place because people like to interact in a natural way rather than
through any user interface. People like to use their own sensors while interacting with the other
people (Singh, Tripathi & Jara, 2014). Voice is the initial step towards that direction. People
would be more comfortable if they had to use no interface rather than any user interface. Two
examples where it can be applied are as follows:
Cars can be unlocked without using keys. There are several steps that need to be done in
order to open the door of a car. The no user interface will enable the people to just walk up to the
door and request the door to open. This will save time and be extremely user friendly. Mercedes-
Benz has solved this issue in 1991 and has gone keyless.
The payment procedure in a shop can be simplified by no user interface. By eliminating
the payment procedure customers can enter the shop buy the products and simply leave the shop.
The Pay with Square app allows the customers to naturally follow a procedure without dealing
with any user interface.
Answer 2
The following table shows the comparison between twisted pair, coaxial and optical fiber
cable.
Twisted Pair Cable Coaxial Cable Optical Fiber
It has low bandwidth. It has moderate bandwidth. It has extremely high bandwidth.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
INTERNET OF THINGS
Cost of this cable is the lowest. It is moderately costly. It is very expensive.
Its security level is low. It has medium security. It gives high security level.
Their immunity towards
interference is low. It has high
noise interference.
Interference immunity is high.
Noise interference is low.
It has got the highest immunity
towards interference. They are
unaffected by any noise.
The distance or frequency range
is 0 to 3.5 kHz.
The distance or frequency range
is 0 to 500 MHz.
The distance or frequency range
is 180 to 370 THz.
Table 1: Comparison between Twisted Pair, Coaxial and Optical Fiber Cable
(Source: Boyer & Heffron, 2015)
Three types of Twisted Pair Cables are:
FTP: This is a twisted pair cable with a foil shield. This is similar to common unshielded
twisted pair cable. These are used for 10GBaseT applications.
S/UTP: This is unscreened twisted pair cable with a braid screen. This can also be called
as STP in an occasional manner.
SF/UTP: This is also called unscreened twisted pair with foil shield and braid screen. It is
very effective in case of EMI protection.
Three types of Coaxial Cables are:
RG-6/UQ: Its impedance is 75 ohms. It has four layers for the shielding reason.
RG-7: It has 75 ohms impedance and it has low loss at the level of frequency which is
very high.
INTERNET OF THINGS
Cost of this cable is the lowest. It is moderately costly. It is very expensive.
Its security level is low. It has medium security. It gives high security level.
Their immunity towards
interference is low. It has high
noise interference.
Interference immunity is high.
Noise interference is low.
It has got the highest immunity
towards interference. They are
unaffected by any noise.
The distance or frequency range
is 0 to 3.5 kHz.
The distance or frequency range
is 0 to 500 MHz.
The distance or frequency range
is 180 to 370 THz.
Table 1: Comparison between Twisted Pair, Coaxial and Optical Fiber Cable
(Source: Boyer & Heffron, 2015)
Three types of Twisted Pair Cables are:
FTP: This is a twisted pair cable with a foil shield. This is similar to common unshielded
twisted pair cable. These are used for 10GBaseT applications.
S/UTP: This is unscreened twisted pair cable with a braid screen. This can also be called
as STP in an occasional manner.
SF/UTP: This is also called unscreened twisted pair with foil shield and braid screen. It is
very effective in case of EMI protection.
Three types of Coaxial Cables are:
RG-6/UQ: Its impedance is 75 ohms. It has four layers for the shielding reason.
RG-7: It has 75 ohms impedance and it has low loss at the level of frequency which is
very high.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
INTERNET OF THINGS
RG-8/U: Its impedance is 50 ohms. It is similar to thicknet that is 10BASE5.
Three types of Optical Fibers are:
Single Mode Cable: It has single stand of that has diameter of 8.3 to 10 microns. It has a
single transmission mode (Winzer, 2014).
Multi Mode Cable: It has bigger diameter of 50 to 100 microns and higher bandwidth and
speed.
Plastic Optic Fiber: It is made of polymer. It has a refractive index of 1.46 approximately.
Answer 3
The table given below compares RFID, Sensors and Video Tracking.
RFID Sensors Video Tracking
Advantages: It can identify the
tags on an individual as well as
general basis.
It has high current capacity and
low cost.
Data can be tracked in a
comprehensive way.
Disadvantages: Tags are not
always error free.
There is possibility of slow
response (Tozlu et al., 2012).
It is expensive and requires
expertise knowledge.
Key Requirement: Unique
identification
Reliability The accessibility is private or
public.
Application: Retail shops and
logistics.
Travel sensing and handling
materials.
Cargo tracking and surveillance.
Table 2: Comparison between RFID, Sensors and Video Tracking
(Source: Takai et al., 2013)
INTERNET OF THINGS
RG-8/U: Its impedance is 50 ohms. It is similar to thicknet that is 10BASE5.
Three types of Optical Fibers are:
Single Mode Cable: It has single stand of that has diameter of 8.3 to 10 microns. It has a
single transmission mode (Winzer, 2014).
Multi Mode Cable: It has bigger diameter of 50 to 100 microns and higher bandwidth and
speed.
Plastic Optic Fiber: It is made of polymer. It has a refractive index of 1.46 approximately.
Answer 3
The table given below compares RFID, Sensors and Video Tracking.
RFID Sensors Video Tracking
Advantages: It can identify the
tags on an individual as well as
general basis.
It has high current capacity and
low cost.
Data can be tracked in a
comprehensive way.
Disadvantages: Tags are not
always error free.
There is possibility of slow
response (Tozlu et al., 2012).
It is expensive and requires
expertise knowledge.
Key Requirement: Unique
identification
Reliability The accessibility is private or
public.
Application: Retail shops and
logistics.
Travel sensing and handling
materials.
Cargo tracking and surveillance.
Table 2: Comparison between RFID, Sensors and Video Tracking
(Source: Takai et al., 2013)

5
INTERNET OF THINGS
Answer 4
Internet of Things plays a major role in the daily life of the people. There are several
security and privacy issues related to IoT. Personal information can get hacked and lost.
Unauthorized access to sensitive data can create huge chaos in the life of people. Internet is
vulnerable to many types of attacks (Borgohain, Kumar & Sanyal, 2015). There can be malware
and spyware attacks also. Information can be manipulated or deleted deliberately by the attacker.
There can be financial loss also due to hacking issue (Suo et al., 2012). Several steps and security
measure must be taken to protect the people from any type of security attacks.
Answer 5
Information given in the question is:
In every 1s there is an application trigger.
There is 12 ms delay in round trip propagation between the sensor and application.
3 ms time is consumed on an average for processing each request.
It takes around 2 ms to receive and send messages.
Therefore, total time consumed by the application is 1+12+3+2 ms= 18 ms
It can be concluded that it would save 18 ms for the system if the application blocks all
requests. The application that would be designed is considered to be more efficient than the
existing model.
INTERNET OF THINGS
Answer 4
Internet of Things plays a major role in the daily life of the people. There are several
security and privacy issues related to IoT. Personal information can get hacked and lost.
Unauthorized access to sensitive data can create huge chaos in the life of people. Internet is
vulnerable to many types of attacks (Borgohain, Kumar & Sanyal, 2015). There can be malware
and spyware attacks also. Information can be manipulated or deleted deliberately by the attacker.
There can be financial loss also due to hacking issue (Suo et al., 2012). Several steps and security
measure must be taken to protect the people from any type of security attacks.
Answer 5
Information given in the question is:
In every 1s there is an application trigger.
There is 12 ms delay in round trip propagation between the sensor and application.
3 ms time is consumed on an average for processing each request.
It takes around 2 ms to receive and send messages.
Therefore, total time consumed by the application is 1+12+3+2 ms= 18 ms
It can be concluded that it would save 18 ms for the system if the application blocks all
requests. The application that would be designed is considered to be more efficient than the
existing model.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
INTERNET OF THINGS
Answer 6
Nielsen’s law states that the connection speed of the high end user keeps growing by 50%
every year (Nielsen, 2014). The graph given below clearly shows how the speed has increased
from the year 1984 to 2014. The straight line in the graph shows that the growth is exponential in
nature.
Figure 1: Nielsen’s Law
(Source: Nielsen, 2014)
There is a similarity between Nielsen’s law and Moore’s law. When these two laws are
compared it can be seen that the growth of bandwidth is much slower as compared to the power
of computer. According to Moore’s law, the capabilities of the computers are get doubled in
every 1.5 years. The table below shows both the law:
INTERNET OF THINGS
Answer 6
Nielsen’s law states that the connection speed of the high end user keeps growing by 50%
every year (Nielsen, 2014). The graph given below clearly shows how the speed has increased
from the year 1984 to 2014. The straight line in the graph shows that the growth is exponential in
nature.
Figure 1: Nielsen’s Law
(Source: Nielsen, 2014)
There is a similarity between Nielsen’s law and Moore’s law. When these two laws are
compared it can be seen that the growth of bandwidth is much slower as compared to the power
of computer. According to Moore’s law, the capabilities of the computers are get doubled in
every 1.5 years. The table below shows both the law:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
INTERNET OF THINGS
Law Annualized Growth Rate
Nielsen’s law Bandwidth of the internet: 50 %
Moore’s law Power of computer: 60%
Table 3: Nielsen and Moore’s Law
(Source: Nielsen, 2014)
Bandwidth is the most important element in the technological generation today. Most
users want to save bandwidth and gives preference to moderate bandwidth rather than highest
speed option. High end users can access at a very high speed. Web designs must focus on
optimal usage over available speeds.
INTERNET OF THINGS
Law Annualized Growth Rate
Nielsen’s law Bandwidth of the internet: 50 %
Moore’s law Power of computer: 60%
Table 3: Nielsen and Moore’s Law
(Source: Nielsen, 2014)
Bandwidth is the most important element in the technological generation today. Most
users want to save bandwidth and gives preference to moderate bandwidth rather than highest
speed option. High end users can access at a very high speed. Web designs must focus on
optimal usage over available speeds.

8
INTERNET OF THINGS
References
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of Internet
of Things. arXiv preprint arXiv:1501.02211.
Boyer, R. J., & Heffron, J. F. (2015). U.S. Patent Application No. 14/775,870.
Nielsen, J. (2014). Nielsen’s Law of Internet Bandwidth, 1998.
Singh, D., Tripathi, G., & Jara, A. J. (2014, March). A survey of Internet-of-Things: Future
vision, architecture, challenges and services. In Internet of things (WF-IoT), 2014 IEEE
world forum on (pp. 287-292). IEEE.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review.
In Computer Science and Electronics Engineering (ICCSEE), 2012 international
conference on (Vol. 3, pp. 648-651). IEEE.
Takai, I., Ito, S., Yasutomi, K., Kagawa, K., Andoh, M., & Kawahito, S. (2013). LED and
CMOS image sensor based optical wireless communication system for automotive
applications. IEEE Photonics Journal, 5(5), 6801418-6801418.
Tozlu, S., Senel, M., Mao, W., & Keshavarzian, A. (2012). Wi-Fi enabled sensors for internet of
things: A practical approach. IEEE Communications Magazine, 50(6).
Winzer, P. J. (2014). Spatial multiplexing in fiber optics: The 10x scaling of metro/core
capacities. Bell Labs Technical Journal, 19, 22-30.
INTERNET OF THINGS
References
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of Internet
of Things. arXiv preprint arXiv:1501.02211.
Boyer, R. J., & Heffron, J. F. (2015). U.S. Patent Application No. 14/775,870.
Nielsen, J. (2014). Nielsen’s Law of Internet Bandwidth, 1998.
Singh, D., Tripathi, G., & Jara, A. J. (2014, March). A survey of Internet-of-Things: Future
vision, architecture, challenges and services. In Internet of things (WF-IoT), 2014 IEEE
world forum on (pp. 287-292). IEEE.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review.
In Computer Science and Electronics Engineering (ICCSEE), 2012 international
conference on (Vol. 3, pp. 648-651). IEEE.
Takai, I., Ito, S., Yasutomi, K., Kagawa, K., Andoh, M., & Kawahito, S. (2013). LED and
CMOS image sensor based optical wireless communication system for automotive
applications. IEEE Photonics Journal, 5(5), 6801418-6801418.
Tozlu, S., Senel, M., Mao, W., & Keshavarzian, A. (2012). Wi-Fi enabled sensors for internet of
things: A practical approach. IEEE Communications Magazine, 50(6).
Winzer, P. J. (2014). Spatial multiplexing in fiber optics: The 10x scaling of metro/core
capacities. Bell Labs Technical Journal, 19, 22-30.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.