logo

Security and Privacy in the Internet of Things

   

Added on  2020-02-24

10 Pages2461 Words49 Views
 | 
 | 
 | 
Running head: INTERNET OF THINGSInternet of ThingsName of the Student:Student ID:Name of the University:Author’s note:
Security and Privacy in the Internet of Things_1

1INTERNET OF THINGSAnswer 1The explanation of the phrase “the best interface for a system is no user interface” is thatit eliminates the development of the user interface for executing the application function at anytechnology. It would eliminate the scope for requirement of an interface while processing thefunctions of the application by using the technology. The requirement of extra time for the userto operate in the system would be relinquished by using the no user interface system. Thenumber of steps required for the operation of the project would be decreased by using the nointerface system in the applications. The benefit of the phrase “the best interface for a system isno user interface” can be explained with the help of following examples,Example 1: The functions of the cars have been developed with the help of new userinterface for opening the gate of the car by using the wireless mobile network (Takai et al.,2013). The number of steps in the opening or closing of the door have been increased as the userfirst have to open the application in the mobile device, then go to the option of opening the cardoor from the mobile, and request for opening the gate of the car. The network connection wouldsend the request for opening the door to the server. The server would search for the appropriatenetwork of the car and it would forward the query to the network. The car would receive therequest and it would process for opening the door. It would be time consuming and the overalltime duration of the project would be very high. The need for the user interface could be reducedfor forming the minimum time duration requirement for the project. Example 2: The payment through gateway would be deployed for forming theimprovement of the operations and it had formed the effective role in the payment throughdevelopment process (Fisher, 2013). The payment gateway would comprise of making the
Security and Privacy in the Internet of Things_2

2INTERNET OF THINGSappropriate formation of the system development. However, the payment gateway wouldcomprise of a number of steps first signing in the platform application, requesting the paymentthrough the bank server, the bank would process the payment, and the payment would bereceived. All these processes are involved in the payment gateway platform and it would result informing the issue of exhaustion of resources. The removal of user interface would result informing the solution for exhaustion of resources and would increase the process of paymentsystem. Answer 2The specification of the cables and the categorization of the cables had been done in thefollowing tables,Cable TypesCoaxial CableTwisted Pair CableFiber Optic CableBandwidth1GHz1MHz75THzDistance500m100m10 Km when on Singlemode2Km when on Multi modeInterferenceratingHas the tendency of being least vulnerable to interference when compare to the other two types of cablesHas the tendency of being limited to distance and vulnerableto interference Has the tendency of not being vulnerable tothe interferenceCostMedium costing of the cable when compare to the other two types of cablesCheaper than the other two types of cablesHighest expensive when compare to the other two types of cablesSecurityAs opined by Winzer (2014),the security would be moderate when compare to the other two types of cablesVery Poor in compare to the other two types of cablesIt is the most secured type of cable that can be used for network connection
Security and Privacy in the Internet of Things_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents