This assignment delves into Nielsen's Law, which posits an annualized growth of 50% in internet bandwidth. It examines the historical trajectory of bandwidth speed, compares Nielsen's Law to Moore's Law concerning computer power, and discusses the implications of bandwidth growth for web design and user experience.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INTERNET OF THINGS Internet of Things Name of the Student Name of the University Author’s notes
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 INTERNET OF THINGS Table of Contents Answer 1..............................................................................................................................2 Answer 2..............................................................................................................................2 Answer 3..............................................................................................................................4 Answer 4..............................................................................................................................5 Answer 5..............................................................................................................................5 Answer 6..............................................................................................................................6 References............................................................................................................................8
2 INTERNET OF THINGS Answer 1 This generation is getting obsessed with the use of mobile phones. But recent studies have shown that the GUI (Graphical User Interface) is shifting to the VUI (Voice User Interface). This has taken place because people like to interact in a natural way rather than through any user interface. People like to use their own sensors while interacting with the other people (Singh, Tripathi & Jara, 2014). Voice is the initial step towards that direction. People would be more comfortable if they had to use no interface rather than any user interface. Two examples where it can be applied are as follows: Cars can be unlocked without using keys. There are several steps that need to be done in order to open the door of a car. The no user interface will enable the people to just walk up to the door and request the door to open. This will save time and be extremely user friendly. Mercedes- Benz has solved this issue in 1991 and has gone keyless. The payment procedure in a shop can be simplified by no user interface. By eliminating the payment procedure customers can enter the shop buy the products and simply leave the shop. The Pay with Square app allows the customers to naturally follow a procedure without dealing with any user interface. Answer 2 The following table shows the comparison between twisted pair, coaxial and optical fiber cable. Twisted Pair CableCoaxial CableOptical Fiber It has low bandwidth.It has moderate bandwidth.It has extremely high bandwidth.
3 INTERNET OF THINGS Cost of this cable is the lowest.It is moderately costly.It is very expensive. Its security level is low.It has medium security.It gives high security level. Theirimmunitytowards interference is low. It has high noise interference. Interferenceimmunityishigh. Noise interference is low. It has got the highest immunity towardsinterference.Theyare unaffected by any noise. The distance or frequency range is 0 to 3.5 kHz. The distance or frequency range is 0 to 500 MHz. The distance or frequency range is 180 to 370 THz. Table 1: Comparison between Twisted Pair, Coaxial and Optical Fiber Cable (Source: Boyer & Heffron, 2015) Three types of Twisted Pair Cables are: FTP: This is a twisted pair cable with a foil shield. This is similar to common unshielded twisted pair cable. These are used for 10GBaseT applications. S/UTP: This is unscreened twisted pair cable with a braid screen. This can also be called as STP in an occasional manner. SF/UTP: This is also called unscreened twisted pair with foil shield and braid screen. It is very effective in case of EMI protection. Three types of Coaxial Cables are: RG-6/UQ: Its impedance is 75 ohms. It has four layers for the shielding reason. RG-7: It has 75 ohms impedance and it has low loss at the level of frequency which is very high.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 INTERNET OF THINGS RG-8/U: Its impedance is 50 ohms. It is similar to thicknet that is 10BASE5. Three types of Optical Fibers are: Single Mode Cable: It has single stand of that has diameter of 8.3 to 10 microns. It has a single transmission mode (Winzer, 2014). Multi Mode Cable: It has bigger diameter of 50 to 100 microns and higher bandwidth and speed. Plastic Optic Fiber: It is made of polymer. It has a refractive index of 1.46 approximately. Answer 3 The table given below compares RFID, Sensors and Video Tracking. RFIDSensorsVideo Tracking Advantages:It can identify the tags on an individual as well as general basis. It has high current capacity and low cost. Datacanbetrackedina comprehensive way. Disadvantages:Tagsarenot always error free. Thereispossibilityofslow response (Tozlu et al., 2012). Itisexpensiveandrequires expertise knowledge. KeyRequirement:Unique identification ReliabilityTheaccessibilityisprivateor public. Application:Retailshopsand logistics. Travelsensingandhandling materials. Cargo tracking and surveillance. Table 2: Comparison between RFID, Sensors and Video Tracking (Source: Takai et al., 2013)
5 INTERNET OF THINGS Answer 4 Internet of Things plays a major role in the daily life of the people. There are several security and privacy issues related to IoT. Personal information can get hacked and lost. Unauthorized access to sensitive data can create huge chaos in the life of people. Internet is vulnerable to many types of attacks (Borgohain, Kumar & Sanyal, 2015). There can be malware and spyware attacks also. Information can be manipulated or deleted deliberately by the attacker. There can be financial loss also due to hacking issue (Suo et al., 2012). Several steps and security measure must be taken to protect the people from any type of security attacks. Answer 5 Information given in the question is: In every 1s there is an application trigger. There is 12 ms delay in round trip propagation between the sensor and application. 3 ms time is consumed on an average for processing each request. It takes around 2 ms to receive and send messages. Therefore, total time consumed by the application is 1+12+3+2 ms= 18 ms It can be concluded that it would save 18 ms for the system if the application blocks all requests. The application that would be designed is considered to be more efficient than the existing model.
6 INTERNET OF THINGS Answer 6 Nielsen’s law states that the connection speed of the high end user keeps growing by 50% every year (Nielsen, 2014). The graph given below clearly shows how the speed has increased from the year 1984 to 2014. The straight line in the graph shows that the growth is exponential in nature. Figure 1: Nielsen’s Law (Source: Nielsen, 2014) There is a similarity between Nielsen’s law and Moore’s law. When these two laws are compared it can be seen that the growth of bandwidth is much slower as compared to the power of computer. According to Moore’s law, the capabilities of the computers are get doubled in every 1.5 years. The table below shows both the law:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 INTERNET OF THINGS LawAnnualized Growth Rate Nielsen’s lawBandwidth of the internet: 50 % Moore’s lawPower of computer: 60% Table 3: Nielsen and Moore’s Law (Source: Nielsen, 2014) Bandwidth is the most important element in the technological generation today. Most users want to save bandwidth and gives preference to moderate bandwidth rather than highest speed option. High end users can access at a very high speed. Web designs must focus on optimal usage over available speeds.
8 INTERNET OF THINGS References Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of Internet of Things.arXiv preprint arXiv:1501.02211. Boyer, R. J., & Heffron, J. F. (2015).U.S. Patent Application No. 14/775,870. Nielsen, J. (2014). Nielsen’s Law of Internet Bandwidth, 1998. Singh, D., Tripathi, G., & Jara, A. J. (2014, March). A survey of Internet-of-Things: Future vision, architecture, challenges and services. InInternet of things (WF-IoT), 2014 IEEE world forum on(pp. 287-292). IEEE. Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review. InComputerScienceandElectronicsEngineering(ICCSEE),2012international conference on(Vol. 3, pp. 648-651). IEEE. Takai, I., Ito, S., Yasutomi, K., Kagawa, K., Andoh, M., & Kawahito, S. (2013). LED and CMOS image sensor based optical wireless communication system for automotive applications.IEEE Photonics Journal,5(5), 6801418-6801418. Tozlu, S., Senel, M., Mao, W., & Keshavarzian, A. (2012). Wi-Fi enabled sensors for internet of things: A practical approach.IEEE Communications Magazine,50(6). Winzer, P. J. (2014). Spatial multiplexing in fiber optics: The 10x scaling of metro/core capacities.Bell Labs Technical Journal,19, 22-30.