Comprehensive Analysis of the Internet of Things: Assignment Solution
VerifiedAdded on 2020/02/24
|9
|1911
|96
Homework Assignment
AI Summary
This assignment solution delves into the multifaceted world of the Internet of Things (IoT). It begins by examining the concept of a 'no user interface' and its implications, followed by an in-depth comparison of various cable types, including twisted pair, coaxial, and fiber optic cables, detailing their merits and demerits. The solution then categorizes and analyzes different types of sensors, such as ultrasonic, limit switch, capacitive, inductive, photoelectric, and RFID, along with video tracking technologies, highlighting their respective advantages and disadvantages, and applications. Furthermore, the assignment addresses critical privacy issues in IoT, such as data security, public profiles, and the potential for hacking. It also includes calculations related to time changes and discusses Nielson's law in the context of broadband connectivity and Moore's law. The solution concludes with a comprehensive list of references supporting the analysis.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: INTERNET OF THINGS 1
Internet of Things
Name:
Course:
Institution Affiliation:
Internet of Things
Name:
Course:
Institution Affiliation:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

INTERNET OF THINGS 2
Question 1
The statement the best interface for a system is the no user interface means that computers have
become a threat human beings as they are currently performing tasks that used to be done by
humans. It complicates human lives instead of making them better (Hecht, 2015). For instance,
lays out how we came about this application obsessed point and how we could change things and
ensure that no individual is using the best tool for a job. It could either be or not an app such as
those employed in smartphones like Android. Most organizations together with the app designers
are trying to change and use the screens and apps thinking they are making the task suitable, but
they are achieving the opposite. The statement can also be linked to an incident where companies
are trying to change them to be conversant with their ecosystem (Tyson, 2004). This interface
mostly favors a company's partakers but not their experience. In no user interface, user
experience does not significantly matter as it is an option when individuals are solving problems.
People are supposed to be focused more on things that are more alluring apart from the apps
(Borgia, 2014). The app that there is an application that can perform all tasks has worsened the
user design. People should embrace the actual situation and not that which performs functions on
the screen.
Question 2
Twisted pair cable
It is made up of one or more pairs of electrical son arranged in a spiral. They transmit both
analog and digital data. They are made up of two copper wires about 1 mm thick. The wires are
twisted to minimize interference from the environment around. The cables have magnetic
interference when the two wires are laid parallel. It is one of the cheapest hence highly
Question 1
The statement the best interface for a system is the no user interface means that computers have
become a threat human beings as they are currently performing tasks that used to be done by
humans. It complicates human lives instead of making them better (Hecht, 2015). For instance,
lays out how we came about this application obsessed point and how we could change things and
ensure that no individual is using the best tool for a job. It could either be or not an app such as
those employed in smartphones like Android. Most organizations together with the app designers
are trying to change and use the screens and apps thinking they are making the task suitable, but
they are achieving the opposite. The statement can also be linked to an incident where companies
are trying to change them to be conversant with their ecosystem (Tyson, 2004). This interface
mostly favors a company's partakers but not their experience. In no user interface, user
experience does not significantly matter as it is an option when individuals are solving problems.
People are supposed to be focused more on things that are more alluring apart from the apps
(Borgia, 2014). The app that there is an application that can perform all tasks has worsened the
user design. People should embrace the actual situation and not that which performs functions on
the screen.
Question 2
Twisted pair cable
It is made up of one or more pairs of electrical son arranged in a spiral. They transmit both
analog and digital data. They are made up of two copper wires about 1 mm thick. The wires are
twisted to minimize interference from the environment around. The cables have magnetic
interference when the two wires are laid parallel. It is one of the cheapest hence highly

INTERNET OF THINGS 3
demanded. For long distance connections, they vary from a range of 5 to 15 cm and thickness of
0.4 mm to 0.9 mm. in this situation, the transmission of a signal is about 5 to 6 km. There are two
distinctions of twisted pair cables; shielded twisted pair and unleashed twisted pair.
The shielded twisted pair is made of copper wires covered with foil or in a braided mesh and a
PVC cover as the outside cover. Braided mesh protects electromagnetic penetration as the foil
prevents the magnetic fields.
The unleashed consist of color copper wires without any foil or braid for insulation against
electromagnetic. The wires within each cable are different.
UTP cables are further subdivided into categories according to their purpose and transfer rates.
Category 5e Data 1 Gbps
Category 6 Data 1/10 Gbps
Category 4 Data 16 Mbps
Category 5 Data 100 Mbps
Category 2 Data 4 Mbps
Category 3 Data 10 Mbps
UTP Category Purpose Transfer Rate
Category 1 Voice Only
Coaxial cable
It is similar to the twisted pair made of two conductors but designed differently to allow it to
function better and over high range frequencies. A good example is the TV antennae. They have
a metal foil and braided cable to guard against electromagnetic interference. There are two types
of coaxial cables that are, thin net and thicket (Borgia, 2014).
demanded. For long distance connections, they vary from a range of 5 to 15 cm and thickness of
0.4 mm to 0.9 mm. in this situation, the transmission of a signal is about 5 to 6 km. There are two
distinctions of twisted pair cables; shielded twisted pair and unleashed twisted pair.
The shielded twisted pair is made of copper wires covered with foil or in a braided mesh and a
PVC cover as the outside cover. Braided mesh protects electromagnetic penetration as the foil
prevents the magnetic fields.
The unleashed consist of color copper wires without any foil or braid for insulation against
electromagnetic. The wires within each cable are different.
UTP cables are further subdivided into categories according to their purpose and transfer rates.
Category 5e Data 1 Gbps
Category 6 Data 1/10 Gbps
Category 4 Data 16 Mbps
Category 5 Data 100 Mbps
Category 2 Data 4 Mbps
Category 3 Data 10 Mbps
UTP Category Purpose Transfer Rate
Category 1 Voice Only
Coaxial cable
It is similar to the twisted pair made of two conductors but designed differently to allow it to
function better and over high range frequencies. A good example is the TV antennae. They have
a metal foil and braided cable to guard against electromagnetic interference. There are two types
of coaxial cables that are, thin net and thicket (Borgia, 2014).

INTERNET OF THINGS 4
The small net is about ¼ inch thick and is mostly used for short distance transfers. They directly
link to a workstation network adapter card using a British naval connector. It moves data to a
distance of about 185 meters.
The coaxial is around ½ inch thick and can transfer data over longer distances than the thin net.it
is commonly used as a support point to connect smaller thin net based networks and transfers
data to a maximum distance of 500 meters (Kopetz, 2011).
The bandwidth of a coaxial cable is 10 Mbps. On the aspect of coaxial cable basing the on
interference, is that they are resistant to the effect of attenuation up to a specific length of up to
100 meters. Regarding the cost, it is more expensive than the twisted cable and less than the
optical cable. They are more secure than twisted cables and less secure than optic fiber cables.
Fibre optical cable
It carries digital data by use of optical fiber signal. They transfer data in modulated pulses of
light. It is made up of cylinder glass known as the core rounded by a concentric layer of glass
referred to as the cladding. An optic comprises of two cables one for transferring and another for
receiving data. The core uses a high optical quality transparent plastic and coating made of gel
which reflects signals back to the fiber hence the low signal loss. There are two types of fibers;
single and multi-mode fiber. The single mode fiber uses a single ray of the light in carrying a
transmission over a long range (Kopetz, 2011). Multimode fiber uses some light rays at the same
time with each ray running to the most reflective angle to hold transmission over short ranges.
Multi-Mode fiber optic can deliver data up to 1 Gbps. It functions on the wavelengths of between
85p nm and 1300 p nm.
The small net is about ¼ inch thick and is mostly used for short distance transfers. They directly
link to a workstation network adapter card using a British naval connector. It moves data to a
distance of about 185 meters.
The coaxial is around ½ inch thick and can transfer data over longer distances than the thin net.it
is commonly used as a support point to connect smaller thin net based networks and transfers
data to a maximum distance of 500 meters (Kopetz, 2011).
The bandwidth of a coaxial cable is 10 Mbps. On the aspect of coaxial cable basing the on
interference, is that they are resistant to the effect of attenuation up to a specific length of up to
100 meters. Regarding the cost, it is more expensive than the twisted cable and less than the
optical cable. They are more secure than twisted cables and less secure than optic fiber cables.
Fibre optical cable
It carries digital data by use of optical fiber signal. They transfer data in modulated pulses of
light. It is made up of cylinder glass known as the core rounded by a concentric layer of glass
referred to as the cladding. An optic comprises of two cables one for transferring and another for
receiving data. The core uses a high optical quality transparent plastic and coating made of gel
which reflects signals back to the fiber hence the low signal loss. There are two types of fibers;
single and multi-mode fiber. The single mode fiber uses a single ray of the light in carrying a
transmission over a long range (Kopetz, 2011). Multimode fiber uses some light rays at the same
time with each ray running to the most reflective angle to hold transmission over short ranges.
Multi-Mode fiber optic can deliver data up to 1 Gbps. It functions on the wavelengths of between
85p nm and 1300 p nm.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

INTERNET OF THINGS 5
Fibre optic cables have a bandwidth of 100 m or less; the bandwidth is not limited. It is most
expensive compared to twisted and coaxial. Its interference level is much lower than the others
and is also most secure.
Question 3
Sensors
They are subdivided in the following type;
Type of sensor Merits Demerits Application
Ultrasonic
sensors
They detect
(sense) all
materials
It has low
resolution
Used in doors
for security
Curb collision
Limit switch
Sensors
They are cheap
They have high
current
capability
Must physical
contact with
the target
They respond
slowly
They are used
in basic end of
travel sensing
Capacitive
sensors
They are able to
detect non-
metallic targets
They detect via
some containers
They sense
highly to
environmental
changes
Used for level
sensing
Fibre optic cables have a bandwidth of 100 m or less; the bandwidth is not limited. It is most
expensive compared to twisted and coaxial. Its interference level is much lower than the others
and is also most secure.
Question 3
Sensors
They are subdivided in the following type;
Type of sensor Merits Demerits Application
Ultrasonic
sensors
They detect
(sense) all
materials
It has low
resolution
Used in doors
for security
Curb collision
Limit switch
Sensors
They are cheap
They have high
current
capability
Must physical
contact with
the target
They respond
slowly
They are used
in basic end of
travel sensing
Capacitive
sensors
They are able to
detect non-
metallic targets
They detect via
some containers
They sense
highly to
environmental
changes
Used for level
sensing

INTERNET OF THINGS 6
Inductive sensor Simple to install
Easy to predict
They only
sense metallic
targets
Used in
industries and
machines
Photo electric
sensor
They have a
long life
They sense over
long distances
They are fast in
responding.
Sensing range
is affected by
reflectivity
and color of
the target
Lens are
contaminable
Used in
packaging
Handling
material
Detecting parts
RFID
Advantage
They can hold more data than barcodes
Used for monitoring the health records for patients
Used for security and attendance reasons
Disadvantages
Coverage is limited to 3 meters
Programming the RFID is time-consuming
External electromagnetic interference can block remote reading
Inductive sensor Simple to install
Easy to predict
They only
sense metallic
targets
Used in
industries and
machines
Photo electric
sensor
They have a
long life
They sense over
long distances
They are fast in
responding.
Sensing range
is affected by
reflectivity
and color of
the target
Lens are
contaminable
Used in
packaging
Handling
material
Detecting parts
RFID
Advantage
They can hold more data than barcodes
Used for monitoring the health records for patients
Used for security and attendance reasons
Disadvantages
Coverage is limited to 3 meters
Programming the RFID is time-consuming
External electromagnetic interference can block remote reading

INTERNET OF THINGS 7
Technology brings about loss of jobs to the unskilled labor
Applications
Used in the tracking of language and monitoring of health history of patients by hospitals
(Weber, 2010).
Video tracking
Advantages
There is shorter matching time which is as a result of good detection rate especially in the
target detection
It addresses on object tracking as well appearance change
Disadvantages
There are various hardware and programs needed to obtain and process the data
The capture system may have specific requisitions for space to which it is being operated.
Question 4
The privacy issues in IoT are that there too much data to secure. The amount of information that
the IoT devices can generate is staggering (Kumar, & Patel, 2014). Another issue is that of the
unwanted public profile; the company can use the collected data that consumers give willingly,
analyze it and make decisions based on it (Wang & Zhang, 2012). There is also the issue of
hackers who can hack the systems and access the collected data.
The security issue is based on public perception. The problem of hacking is a primary concern as
researchers have been able to hack into real market devices with much energy and time
Technology brings about loss of jobs to the unskilled labor
Applications
Used in the tracking of language and monitoring of health history of patients by hospitals
(Weber, 2010).
Video tracking
Advantages
There is shorter matching time which is as a result of good detection rate especially in the
target detection
It addresses on object tracking as well appearance change
Disadvantages
There are various hardware and programs needed to obtain and process the data
The capture system may have specific requisitions for space to which it is being operated.
Question 4
The privacy issues in IoT are that there too much data to secure. The amount of information that
the IoT devices can generate is staggering (Kumar, & Patel, 2014). Another issue is that of the
unwanted public profile; the company can use the collected data that consumers give willingly,
analyze it and make decisions based on it (Wang & Zhang, 2012). There is also the issue of
hackers who can hack the systems and access the collected data.
The security issue is based on public perception. The problem of hacking is a primary concern as
researchers have been able to hack into real market devices with much energy and time
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

INTERNET OF THINGS 8
(Dabbagh & Rayes, 2017). Another issue is the actual security aspect. Securing the IoT devices
carries more weight than securing the actual devices (Yang, 2014).
Question 5
Total time taken is 2+12+3= 17ms
Changes after 1 s
Therefore; 60ms is equivalent to 1 sec
17ms will equal how many seconds
17/60=0.28
Thus 1-0.28=0.72 s
Time saved 0.72s
Question 6
The Nielson's law states that the high-end user's connection speed can grow up by 50% per year.
This law of the broadband connectivity carries with it Moore's law of computer processing for
some strange reasons (Stankovic, 2014). Nielson's observations were based on Moore's law that
often mentioned view to which computers can be double every 18 months.
His law relates to Moore's law in that the comment states that computers double every 18 months
which corresponds to 60% per year. Moore's law for the network speed, the bandwidth grows
slower than the computer's power because internet bandwidth is more of business realities than
technological limits (Tan & Wang, 2010). The implication of IoT is that there is a huge spread of
(Dabbagh & Rayes, 2017). Another issue is the actual security aspect. Securing the IoT devices
carries more weight than securing the actual devices (Yang, 2014).
Question 5
Total time taken is 2+12+3= 17ms
Changes after 1 s
Therefore; 60ms is equivalent to 1 sec
17ms will equal how many seconds
17/60=0.28
Thus 1-0.28=0.72 s
Time saved 0.72s
Question 6
The Nielson's law states that the high-end user's connection speed can grow up by 50% per year.
This law of the broadband connectivity carries with it Moore's law of computer processing for
some strange reasons (Stankovic, 2014). Nielson's observations were based on Moore's law that
often mentioned view to which computers can be double every 18 months.
His law relates to Moore's law in that the comment states that computers double every 18 months
which corresponds to 60% per year. Moore's law for the network speed, the bandwidth grows
slower than the computer's power because internet bandwidth is more of business realities than
technological limits (Tan & Wang, 2010). The implication of IoT is that there is a huge spread of

INTERNET OF THINGS 9
the adaptation of IoT devices and other product that will utilize the same broadband connection
and the technology will be availed for Nielson's law.
References
Borgia, E. (2014). The Internet of Things vision: Key features, applications and open
issues. Computer Communications, 54, 1-31.
Dabbagh, M., & Rayes, A. (2017). Internet of Things Security and Privacy. In Internet of Things
From Hype to Reality (pp. 195-223). Springer International Publishing.
Hecht, J. (2015). Understanding fiber optics. Jeff Hecht.
Kopetz, H. (2011). Internet of things. In Real-time systems (pp. 307-323). Springer US.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things
Journal, 1(1), 3-9.
Tan, L., & Wang, N. (2010, August). Future internet: The internet of things. In Advanced
Computer Theory and Engineering (ICACTE), 2010 3rd International Conference
on (Vol. 5, pp. V5-376). IEEE.
Tyson, J. (2004). How internet infrastructure works. Retrieved December, 3, 2004.
Wang, Y., & Zhang, X. (2012). Internet of things.
Weber, R. H., & Weber, R. (2010). Internet of things (Vol. 12). New York, NY, USA:: Springer.
the adaptation of IoT devices and other product that will utilize the same broadband connection
and the technology will be availed for Nielson's law.
References
Borgia, E. (2014). The Internet of Things vision: Key features, applications and open
issues. Computer Communications, 54, 1-31.
Dabbagh, M., & Rayes, A. (2017). Internet of Things Security and Privacy. In Internet of Things
From Hype to Reality (pp. 195-223). Springer International Publishing.
Hecht, J. (2015). Understanding fiber optics. Jeff Hecht.
Kopetz, H. (2011). Internet of things. In Real-time systems (pp. 307-323). Springer US.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things
Journal, 1(1), 3-9.
Tan, L., & Wang, N. (2010, August). Future internet: The internet of things. In Advanced
Computer Theory and Engineering (ICACTE), 2010 3rd International Conference
on (Vol. 5, pp. V5-376). IEEE.
Tyson, J. (2004). How internet infrastructure works. Retrieved December, 3, 2004.
Wang, Y., & Zhang, X. (2012). Internet of things.
Weber, R. H., & Weber, R. (2010). Internet of things (Vol. 12). New York, NY, USA:: Springer.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.