Internet Technologies: UI, Cables, IoT Security, Paradigms, and Laws
VerifiedAdded on 2020/02/24
|12
|2318
|98
Report
AI Summary
This report provides a comprehensive overview of various internet technologies. It begins by discussing the concept of user interfaces (UI) and the trend towards applications without UIs, providing examples like car unlocking mechanisms and applications for visually impaired individuals. The report then compares different types of cables, including twisted pair, coaxial, and fiber optic cables, analyzing their bandwidth, distance capabilities, interference ratings, cost, and security. Furthermore, it examines the Internet of Things (IoT), comparing video tracking, temperature sensors, pressure sensors, proximity sensors, optical sensors, and RFID technologies in terms of their advantages, disadvantages, and uses. The report also addresses security threats associated with IoT implementation, such as unauthorized access and data breaches. Finally, it explores publish/subscribe and command/response paradigms, and discusses Nielsen's Law of Internet Bandwidth and Moore's Law in the context of technological advancements.

Running head: INTERNET TECHNOLOGIES
Internet Technologies
Student Id:
Name of Student:
Name of University:
Author Note:
Internet Technologies
Student Id:
Name of Student:
Name of University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1INTERNET TECHNOLOGIES
Table of Contents
Answer Number 1......................................................................................................................2
Answer Number 2......................................................................................................................4
Answer Number 3......................................................................................................................6
Answer Number 4......................................................................................................................7
Answer Number 5......................................................................................................................8
Answer Number 6......................................................................................................................9
References................................................................................................................................10
Student Name:
Table of Contents
Answer Number 1......................................................................................................................2
Answer Number 2......................................................................................................................4
Answer Number 3......................................................................................................................6
Answer Number 4......................................................................................................................7
Answer Number 5......................................................................................................................8
Answer Number 6......................................................................................................................9
References................................................................................................................................10
Student Name:

2INTERNET TECHNOLOGIES
Answer Number 1
The best interface for a system is no user interface, this theory has been a recent craze
among the software or application developers. This concept circumvents the fact that the
utility of an application can be improved even without the implementation of an interface.
There are numerous examples that prove the validity of the statement mentioned above. One
of the examples is as provided below (Johnson, 2013).
In recent years, several car companies have developed applications for smart phones
that facilitate the consumers of their car to unlock the doors of the cars remotely (Barga,
Fontama & Tok, 2015). The unlocking procedure follows the following steps:
Figure 1: Steps of a Car Unlocking Mechanism by using UI
(Source: Barga, Fontama & Tok, 2015)
The following procedure lets the driver to open the car door and enter the car using a
Smartphone latest application that involves 13 steps to complete. The application compels the
Student Name:
Answer Number 1
The best interface for a system is no user interface, this theory has been a recent craze
among the software or application developers. This concept circumvents the fact that the
utility of an application can be improved even without the implementation of an interface.
There are numerous examples that prove the validity of the statement mentioned above. One
of the examples is as provided below (Johnson, 2013).
In recent years, several car companies have developed applications for smart phones
that facilitate the consumers of their car to unlock the doors of the cars remotely (Barga,
Fontama & Tok, 2015). The unlocking procedure follows the following steps:
Figure 1: Steps of a Car Unlocking Mechanism by using UI
(Source: Barga, Fontama & Tok, 2015)
The following procedure lets the driver to open the car door and enter the car using a
Smartphone latest application that involves 13 steps to complete. The application compels the
Student Name:

3INTERNET TECHNOLOGIES
driver to use the phone. The driver even must take the pain to learn a new interface and all its
functionalities (Paparo & Martin-Delgado, 2012). Moreover, the experience is designed
around the flow of the computer, instead of the flow of a person. However, it can be arranged
that eliminating the UI from the above-mentioned process reduce the complete procedure to
only three steps:
Figure 2: Car Door Unlocking Mechanism without using UI
(Source: Paparo & Martin-Delgado, 2012)
The simplicity can be achieved by many processes, which is possible without the
involvement of any user interface. Sophisticated technologies like motion sensors, proximity
sensors and biometric plates can be used for achieving this objective. Proximity sensor
integrated to the locking mechanism of a car can detect the presence of the registered driver
within a specified range around the car and unlock the door automatically. The door lock of
the car can also be equipped with biometric sensors that only open when the registered
fingerprint of the driver is placed on it (Paparo & Martin-Delgado, 2012).
The process shown in Figure 2 reduces the complexity of the steps in Figure 1 yet
improves the experience of the driver. All of this is achieved without the use of any UI.
Therefore, the validity of the statement is thus proved by the example. Applications without
UI have a variety of utility in today’s world ranging from domestic to organisation. One of
the remarkable utility of such application can be found for the daily works of the visually
disabled people. These types of applications help the blind people to perform various digital
functions through gesture and voice processes like making calls, composing and sending
Student Name:
driver to use the phone. The driver even must take the pain to learn a new interface and all its
functionalities (Paparo & Martin-Delgado, 2012). Moreover, the experience is designed
around the flow of the computer, instead of the flow of a person. However, it can be arranged
that eliminating the UI from the above-mentioned process reduce the complete procedure to
only three steps:
Figure 2: Car Door Unlocking Mechanism without using UI
(Source: Paparo & Martin-Delgado, 2012)
The simplicity can be achieved by many processes, which is possible without the
involvement of any user interface. Sophisticated technologies like motion sensors, proximity
sensors and biometric plates can be used for achieving this objective. Proximity sensor
integrated to the locking mechanism of a car can detect the presence of the registered driver
within a specified range around the car and unlock the door automatically. The door lock of
the car can also be equipped with biometric sensors that only open when the registered
fingerprint of the driver is placed on it (Paparo & Martin-Delgado, 2012).
The process shown in Figure 2 reduces the complexity of the steps in Figure 1 yet
improves the experience of the driver. All of this is achieved without the use of any UI.
Therefore, the validity of the statement is thus proved by the example. Applications without
UI have a variety of utility in today’s world ranging from domestic to organisation. One of
the remarkable utility of such application can be found for the daily works of the visually
disabled people. These types of applications help the blind people to perform various digital
functions through gesture and voice processes like making calls, composing and sending
Student Name:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4INTERNET TECHNOLOGIES
mails, receiving or reading mails, listening to music, browsing the web and such (Paparo &
Martin-Delgado, 2012). To accomplish an application without UI, it is required to integrate
an application with sophisticated Artificial Intelligence (AI).Recent examples of AI
integrated smart applications are Magic, Operator, M by Facebook, Cortana by Microsoft and
Google Now or Google Assistant by Google. These applications provide almost unlimited
option to perform digital functions without involving any UI (Paparo & Martin-Delgado,
2012).
Answer Number 2
The table provided below compares twisted pair cable, coaxial cable and fibre optic
cable in relation to their bandwidth, distance, interference rating, cost and security.
Table 1: Comparison between Twisted Pair, Coaxial and Fibre Optic Cable
(Source: Comer, 2015)
The specifications of three types of twisted pair cables are as given below:
CAT – 5e 100 MHz UTP is used for 100 Mbps through 1Gbps Ethernet 1 – 100 m
LAN applications.
CAT – 6 250 MHz UTP cable supports 10 Gbps short length applications from 35 –
55 m, which depends on crosstalk environment.
Student Name:
mails, receiving or reading mails, listening to music, browsing the web and such (Paparo &
Martin-Delgado, 2012). To accomplish an application without UI, it is required to integrate
an application with sophisticated Artificial Intelligence (AI).Recent examples of AI
integrated smart applications are Magic, Operator, M by Facebook, Cortana by Microsoft and
Google Now or Google Assistant by Google. These applications provide almost unlimited
option to perform digital functions without involving any UI (Paparo & Martin-Delgado,
2012).
Answer Number 2
The table provided below compares twisted pair cable, coaxial cable and fibre optic
cable in relation to their bandwidth, distance, interference rating, cost and security.
Table 1: Comparison between Twisted Pair, Coaxial and Fibre Optic Cable
(Source: Comer, 2015)
The specifications of three types of twisted pair cables are as given below:
CAT – 5e 100 MHz UTP is used for 100 Mbps through 1Gbps Ethernet 1 – 100 m
LAN applications.
CAT – 6 250 MHz UTP cable supports 10 Gbps short length applications from 35 –
55 m, which depends on crosstalk environment.
Student Name:

5INTERNET TECHNOLOGIES
CAT – 7 600 MHz is an individually STP cabling used for 10 Gbps 100 m Ethernet
LAN applications with better control performance in crosstalk than the CAT – 6a type
(Wessemann et al., 2015).
The specifications of three types of coaxial cables are as given below:
RG – 6/UQ is a quad shield variant of RG – 6 that has four layers of shielding. It has
an impedance of 75 ohms.
RG – 7 loses less data at higher frequency for cables used in television, satellite and
modems. It has an impedance of 75 ohms.
RG – 8/U is used in amateur radio. The Thicknet is similar (10BASE5). It has an
impedance of 50 ohms (Nordebo et al., 2013).
The specifications of three types of fibre optic cables are as given below:
The composition of a multimode fibre optic cable consists of a core of large diameter.
It has multiple pathways of light medium. It is generally available in two core sizes that is, 50
and 62.5 microns respectively. It is used in general information and applications related to
voice fibre such as attaching segments to a network whose utility is in existence, and in
applications that are small developments like alarm systems. LED or laser light medium is
used by multimode cable core of both size (Agrawal, 2012).
The core of a single mode cable is made of glass and its size ranges between 8 – 10
microns. The size of the core is small compared to that found in the multimode cable. It has a
mono light pathway. The range of a single mode fibre optic cable is 50 times more than the
multimode cable. It is generally applied in applications that requires high bandwidth range for
Student Name:
CAT – 7 600 MHz is an individually STP cabling used for 10 Gbps 100 m Ethernet
LAN applications with better control performance in crosstalk than the CAT – 6a type
(Wessemann et al., 2015).
The specifications of three types of coaxial cables are as given below:
RG – 6/UQ is a quad shield variant of RG – 6 that has four layers of shielding. It has
an impedance of 75 ohms.
RG – 7 loses less data at higher frequency for cables used in television, satellite and
modems. It has an impedance of 75 ohms.
RG – 8/U is used in amateur radio. The Thicknet is similar (10BASE5). It has an
impedance of 50 ohms (Nordebo et al., 2013).
The specifications of three types of fibre optic cables are as given below:
The composition of a multimode fibre optic cable consists of a core of large diameter.
It has multiple pathways of light medium. It is generally available in two core sizes that is, 50
and 62.5 microns respectively. It is used in general information and applications related to
voice fibre such as attaching segments to a network whose utility is in existence, and in
applications that are small developments like alarm systems. LED or laser light medium is
used by multimode cable core of both size (Agrawal, 2012).
The core of a single mode cable is made of glass and its size ranges between 8 – 10
microns. The size of the core is small compared to that found in the multimode cable. It has a
mono light pathway. The range of a single mode fibre optic cable is 50 times more than the
multimode cable. It is generally applied in applications that requires high bandwidth range for
Student Name:

6INTERNET TECHNOLOGIES
its operation and in strong network connections that is spread over a wide range of area
(Agrawal, 2012).
Laser – optimised 10 Gb fibre optic cable is a multimode cable variant that has
marked fibre optic cable of refractive index profile in each assembly. Its utility is in premise
networking applications that include large bandwidth (Agrawal, 2012).
Answer Number 3
The following table shows the comparison between Video Tracking, Sensors used in
Internet of Things (IoT) and RFID in relevance to their respective advantages and
disadvantages (Xia et al., 2012).
Advantages Disadvantages Uses
Video Tracking
Technology
Helps to maintain
visual records
Aids in providing
video evidence
against criminal
activities
Easy to compromise
High expenditure in
installing
Causes privacy
issues for general
people
Video Tracking finds its
utility in domestic as
well as organisations for
the purpose of security.
Temperature Sensors It is very
sensitive
Cost of
installation is less
It can be surface
mounted
Accuracy is high
Heats up on its own
automatically
Fails to detect
moisture
The utility of a
temperature sensor is
generally found in
thermostat devices or
semiconductors of high
sensitivity.
Pressure Sensors Requires less cost
to implement
Has the capability
to adapt to
various
applications
Has high output
of signal level
Uses robust
technology
The sensor is highly
sensitive to
vibrations
Moving objects are
difficult to detect
These sensors are
generally used in
devices that uses a touch
enabled screen
Proximity Sensors Has the ability to
remain functional
in adverse
weather
conditions
Has limited range of
operation
Is limited to detect
targets of metallic
composition
The retail industry uses
these sensors to track the
customers in a chosen
proximity and transmit
offers in mobile phones.
Student Name:
its operation and in strong network connections that is spread over a wide range of area
(Agrawal, 2012).
Laser – optimised 10 Gb fibre optic cable is a multimode cable variant that has
marked fibre optic cable of refractive index profile in each assembly. Its utility is in premise
networking applications that include large bandwidth (Agrawal, 2012).
Answer Number 3
The following table shows the comparison between Video Tracking, Sensors used in
Internet of Things (IoT) and RFID in relevance to their respective advantages and
disadvantages (Xia et al., 2012).
Advantages Disadvantages Uses
Video Tracking
Technology
Helps to maintain
visual records
Aids in providing
video evidence
against criminal
activities
Easy to compromise
High expenditure in
installing
Causes privacy
issues for general
people
Video Tracking finds its
utility in domestic as
well as organisations for
the purpose of security.
Temperature Sensors It is very
sensitive
Cost of
installation is less
It can be surface
mounted
Accuracy is high
Heats up on its own
automatically
Fails to detect
moisture
The utility of a
temperature sensor is
generally found in
thermostat devices or
semiconductors of high
sensitivity.
Pressure Sensors Requires less cost
to implement
Has the capability
to adapt to
various
applications
Has high output
of signal level
Uses robust
technology
The sensor is highly
sensitive to
vibrations
Moving objects are
difficult to detect
These sensors are
generally used in
devices that uses a touch
enabled screen
Proximity Sensors Has the ability to
remain functional
in adverse
weather
conditions
Has limited range of
operation
Is limited to detect
targets of metallic
composition
The retail industry uses
these sensors to track the
customers in a chosen
proximity and transmit
offers in mobile phones.
Student Name:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7INTERNET TECHNOLOGIES
Have high
accuracy rate
Switching rate is
high
Optical Sensors Has immunity
towards
electromagnetic
interference or
noise
Has a wider
coverage area
Very portable to
carry and use
Has immunity
towards heat and
chemical reaction
Has high
sensitivity
Provides
complete
electrical
resistance from
high voltage
electrical sources
Sustains loss due to
coupler
Suffers loss due to
scattering and
absorption
Suffers Impurity,
Insertion and
Reflection loss
Receives
interference due to
multiple effects
Is utilised in IoT
technologies, aerospace,
healthcare, chemical and
energy platforms
RFID Is capable of
storing
information
A consumer can
be tracked with
the RFID tag
integrated with
the purchased
device
Versatile
technology
RFID
implementation is
very expensive
Development of the
program requires
sufficient time
External
electromagnetic
interference affects
the scanning range
of an RFID reader
Has a very limited
range of 3 meters
Causes privacy
issues
Has a vast utility in
retail and other
organisational sectors as
well as in educational
institutions
Table 2: Advantages, Disadvantages and Uses of Video Tracking Technology, Sensors of
IoT and RFID Technology
(Source: (Xia et al., 2012))
Student Name:
Have high
accuracy rate
Switching rate is
high
Optical Sensors Has immunity
towards
electromagnetic
interference or
noise
Has a wider
coverage area
Very portable to
carry and use
Has immunity
towards heat and
chemical reaction
Has high
sensitivity
Provides
complete
electrical
resistance from
high voltage
electrical sources
Sustains loss due to
coupler
Suffers loss due to
scattering and
absorption
Suffers Impurity,
Insertion and
Reflection loss
Receives
interference due to
multiple effects
Is utilised in IoT
technologies, aerospace,
healthcare, chemical and
energy platforms
RFID Is capable of
storing
information
A consumer can
be tracked with
the RFID tag
integrated with
the purchased
device
Versatile
technology
RFID
implementation is
very expensive
Development of the
program requires
sufficient time
External
electromagnetic
interference affects
the scanning range
of an RFID reader
Has a very limited
range of 3 meters
Causes privacy
issues
Has a vast utility in
retail and other
organisational sectors as
well as in educational
institutions
Table 2: Advantages, Disadvantages and Uses of Video Tracking Technology, Sensors of
IoT and RFID Technology
(Source: (Xia et al., 2012))
Student Name:

8INTERNET TECHNOLOGIES
Answer Number 4
The various threats to security in association with the implementation of Internet of
Things Technology that can be violated to harm consumers are as follows:
Creating safety issues
Enabling unauthorised access and use of personal data of consumer
Allowing to carry out attacks on other systems
Nevertheless, other security issues can be addressed in relevance to the
implementation of IoT technologies such as direct gathering of important personal data such
as bank account details, location, health information and other such information regarding a
user (Kumar & Patel, 2014).
Answer Number 5
Publish/Subscribe Paradigm:
This paradigm enables a unidirectional communication from a single publisher to
multiple subscribers. A subscriber expresses its interest towards a specific category or class
of data to the publisher, which the publisher acknowledges and transmits the same to the
interested subscriber whenever available.
Figure 1: Publish/Subscribe Paradigm
Student Name:
Answer Number 4
The various threats to security in association with the implementation of Internet of
Things Technology that can be violated to harm consumers are as follows:
Creating safety issues
Enabling unauthorised access and use of personal data of consumer
Allowing to carry out attacks on other systems
Nevertheless, other security issues can be addressed in relevance to the
implementation of IoT technologies such as direct gathering of important personal data such
as bank account details, location, health information and other such information regarding a
user (Kumar & Patel, 2014).
Answer Number 5
Publish/Subscribe Paradigm:
This paradigm enables a unidirectional communication from a single publisher to
multiple subscribers. A subscriber expresses its interest towards a specific category or class
of data to the publisher, which the publisher acknowledges and transmits the same to the
interested subscriber whenever available.
Figure 1: Publish/Subscribe Paradigm
Student Name:

9INTERNET TECHNOLOGIES
(Source: Fotiu, Trossen & Polyzos, 2012)
Command/Response Paradigm
The Command/Response paradigm becomes suboptimal due to the excess of
unnecessary messages propagating in the reverse direction.
Figure 2: Command/Response Paradigm
(Source: Levchuk & Pattipati, 2013)
The total time saved will be 6ms in the delay of propagation between the application
and sensor + 1ms in receiving that message. Therefore, total time saved is 7ms.
Answer Number 6
According to Nielsen who formulated the Law of Internet Bandwidth, the internet
connection speed of a heavy user of internet increases by fifty percent per annum (Zhao et al.,
2013).
Moore analysed the statistics of growth of transistors in his time and postulated that
the quantity of transistors per square inch on integrated circuits will double per annum
starting from the year of its invention (Zhao et al., 2013).
Both the laws of Nielsen and Moore postulated laws related to technologies that have
Internet of Things Platform (Zhao et al., 2013).
Student Name:
(Source: Fotiu, Trossen & Polyzos, 2012)
Command/Response Paradigm
The Command/Response paradigm becomes suboptimal due to the excess of
unnecessary messages propagating in the reverse direction.
Figure 2: Command/Response Paradigm
(Source: Levchuk & Pattipati, 2013)
The total time saved will be 6ms in the delay of propagation between the application
and sensor + 1ms in receiving that message. Therefore, total time saved is 7ms.
Answer Number 6
According to Nielsen who formulated the Law of Internet Bandwidth, the internet
connection speed of a heavy user of internet increases by fifty percent per annum (Zhao et al.,
2013).
Moore analysed the statistics of growth of transistors in his time and postulated that
the quantity of transistors per square inch on integrated circuits will double per annum
starting from the year of its invention (Zhao et al., 2013).
Both the laws of Nielsen and Moore postulated laws related to technologies that have
Internet of Things Platform (Zhao et al., 2013).
Student Name:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10INTERNET TECHNOLOGIES
References
Agrawal, G. P. (2012). Fiber-optic communication systems (Vol. 222). John Wiley & Sons.
Barga, R., Fontama, V., & Tok, W. H. (2015). Cortana analytics. In Predictive Analytics with
Microsoft Azure Machine Learning (pp. 279-283). Apress.
Comer, D. (2015). Computer networks and internets. Pearson.
Fotiou, N., Trossen, D., & Polyzos, G. C. (2012). Illustrating a publish-subscribe internet
architecture. Telecommunication Systems, 1-13.
Johnson, J. (2013). Designing with the mind in mind: simple guide to understanding user
interface design guidelines. Elsevier.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
Levchuk, G., & Pattipati, K. (2013). Design of distributed command and control for
collaborative situation assessment. Proceedings of ICCRTS.
Nordebo, S., Nilsson, B., Gustafsson, S., Biro, T., Cinar, G., Gustafsson, M., ... & Sjöberg,
M. (2013). Low-frequency dispersion characteristics of a multilayered coaxial cable.
Journal of Engineering Mathematics, 83(1), 169-184.
Paparo, G. D., & Martin-Delgado, M. A. (2012). Google in a quantum network. Scientific
reports, 2, 444.
Wesemann, D., Dünnermann, J., Schaller, M., Banick, N., & Witte, S. (2015, May). Less
wires—A novel approach on combined power and ethernet transmission on a single,
unshielded twisted pair cable. In Factory Communication Systems (WFCS), 2015
IEEE World Conference on (pp. 1-4). IEEE.
Student Name:
References
Agrawal, G. P. (2012). Fiber-optic communication systems (Vol. 222). John Wiley & Sons.
Barga, R., Fontama, V., & Tok, W. H. (2015). Cortana analytics. In Predictive Analytics with
Microsoft Azure Machine Learning (pp. 279-283). Apress.
Comer, D. (2015). Computer networks and internets. Pearson.
Fotiou, N., Trossen, D., & Polyzos, G. C. (2012). Illustrating a publish-subscribe internet
architecture. Telecommunication Systems, 1-13.
Johnson, J. (2013). Designing with the mind in mind: simple guide to understanding user
interface design guidelines. Elsevier.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
Levchuk, G., & Pattipati, K. (2013). Design of distributed command and control for
collaborative situation assessment. Proceedings of ICCRTS.
Nordebo, S., Nilsson, B., Gustafsson, S., Biro, T., Cinar, G., Gustafsson, M., ... & Sjöberg,
M. (2013). Low-frequency dispersion characteristics of a multilayered coaxial cable.
Journal of Engineering Mathematics, 83(1), 169-184.
Paparo, G. D., & Martin-Delgado, M. A. (2012). Google in a quantum network. Scientific
reports, 2, 444.
Wesemann, D., Dünnermann, J., Schaller, M., Banick, N., & Witte, S. (2015, May). Less
wires—A novel approach on combined power and ethernet transmission on a single,
unshielded twisted pair cable. In Factory Communication Systems (WFCS), 2015
IEEE World Conference on (pp. 1-4). IEEE.
Student Name:

11INTERNET TECHNOLOGIES
Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of
Communication Systems, 25(9), 1101.
Zhao, R., Fischer, W., Aker, E., & Rigby, P. (2013). White Paper: Broadband Access
Technologies. A White Paper by the Deployment & Operations Committee.
Student Name:
Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of
Communication Systems, 25(9), 1101.
Zhao, R., Fischer, W., Aker, E., & Rigby, P. (2013). White Paper: Broadband Access
Technologies. A White Paper by the Deployment & Operations Committee.
Student Name:
1 out of 12

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.