University IoT Assignment: Technologies, Security, and Laws
VerifiedAdded on 2020/02/24
|13
|2179
|35
Homework Assignment
AI Summary
This assignment delves into various aspects of the Internet of Things (IoT). It begins by discussing the concept of a 'no user interface' and its implications. The solution then provides detailed specifications of different cable types, including twisted pair, coaxial, and fiber optic cables, along with their bandwidth, distance, and security features. A summarized table outlines the advantages, disadvantages, and applications of IoT devices such as sensors, RFID, and video tracking. The assignment also explores data security in IoT, addressing security breaches and the roles of companies like Gemalto and Microsoft. Furthermore, it explains blocking mode, publish/subscribe paradigm, and command/response paradigm. Finally, it examines Nielson's Law and its implications for IoT, including the expected growth of sensor technology and its impact on data streams.

Running head: INTERNET OF THINGS
INTERNET OF THINGS
Name of the Student
Name of the University
Author Note
INTERNET OF THINGS
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

2INTERNET OF THINGS
Table of Contents
Question 1........................................................................................................................................3
Question 2........................................................................................................................................3
Question 3:.......................................................................................................................................4
Question 4........................................................................................................................................6
Question 5........................................................................................................................................6
Question 6........................................................................................................................................8
Reference.........................................................................................................................................9
Table of Contents
Question 1........................................................................................................................................3
Question 2........................................................................................................................................3
Question 3:.......................................................................................................................................4
Question 4........................................................................................................................................6
Question 5........................................................................................................................................6
Question 6........................................................................................................................................8
Reference.........................................................................................................................................9

3INTERNET OF THINGS
Question 1
“The best interface for a system is no user interface” this statement can be related with
emphasis on mainly eliminating the interface which is related to the user and for the prospective
of the user. This can be mainly done by eliminating the user interface during the implementation
of any technological aspect. The security plays a vital role in every aspect putting limelight on
both the aspects for the organization itself and the benefits of the citizens. The most important
challenge is to ensure the availability and continuity prospective with the provision of the
services which are served by the Internet of Things
The result of such approach can be that it can be used to eliminate the various processes
during the interfacing schedule (Tozlu et al., 2012). The no user interface can be directly
beneficial to the user as there would be fewer steps involved in the process and moreover fewer
steps would decrease the time related aspect. The explanation of the concept can be justified
using two examples
Example 1:
Controlling of the air condition in a particular room by means of any device apart from
the air conditioner remote for example android set. This would involve many steps as the user
has to download the application which can give him or her access to the processing unit of the air
conditioner then it has to be seen that the access is granted or not then only the actual motive can
be fulfilled(Wollschlaeger, Sauter & Jasperneite, 2017).
Example 2:
Question 1
“The best interface for a system is no user interface” this statement can be related with
emphasis on mainly eliminating the interface which is related to the user and for the prospective
of the user. This can be mainly done by eliminating the user interface during the implementation
of any technological aspect. The security plays a vital role in every aspect putting limelight on
both the aspects for the organization itself and the benefits of the citizens. The most important
challenge is to ensure the availability and continuity prospective with the provision of the
services which are served by the Internet of Things
The result of such approach can be that it can be used to eliminate the various processes
during the interfacing schedule (Tozlu et al., 2012). The no user interface can be directly
beneficial to the user as there would be fewer steps involved in the process and moreover fewer
steps would decrease the time related aspect. The explanation of the concept can be justified
using two examples
Example 1:
Controlling of the air condition in a particular room by means of any device apart from
the air conditioner remote for example android set. This would involve many steps as the user
has to download the application which can give him or her access to the processing unit of the air
conditioner then it has to be seen that the access is granted or not then only the actual motive can
be fulfilled(Wollschlaeger, Sauter & Jasperneite, 2017).
Example 2:

4INTERNET OF THINGS
Bluetooth device in order to access the audio output of any device, if the implementation
of the no user interface was implied on it would directly reduce the time of the user. The main
aspect that can be eliminated is the device compatibility aspect which lies between the two
interacting devices.
Question 2
Specifications of Cables
Cable types Bandwidth Distance Interference
rating
Cost Security
Twisted Pair
Cable
1MHz 100m Distance is
limited in order
of
susceptibility
to interface
Cheapest Security is
poor
Coaxial Cable 1GHz 500m Least
susceptible as
compared to
others
As compared
to other cost id
medium
Breaching of
security can be
done due to
moderate
security
(Winzer 2014).
Fibre Optic
Cable
75 THz 10km (Single-
mode)
2Km
(multimode)
Not susceptible
to EMI
Expensive than
others
Highly secured
Categories of Cables
Twisted Pair Cable:
1. Unprotected Twisted-Pair (UTP)
Bluetooth device in order to access the audio output of any device, if the implementation
of the no user interface was implied on it would directly reduce the time of the user. The main
aspect that can be eliminated is the device compatibility aspect which lies between the two
interacting devices.
Question 2
Specifications of Cables
Cable types Bandwidth Distance Interference
rating
Cost Security
Twisted Pair
Cable
1MHz 100m Distance is
limited in order
of
susceptibility
to interface
Cheapest Security is
poor
Coaxial Cable 1GHz 500m Least
susceptible as
compared to
others
As compared
to other cost id
medium
Breaching of
security can be
done due to
moderate
security
(Winzer 2014).
Fibre Optic
Cable
75 THz 10km (Single-
mode)
2Km
(multimode)
Not susceptible
to EMI
Expensive than
others
Highly secured
Categories of Cables
Twisted Pair Cable:
1. Unprotected Twisted-Pair (UTP)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

5INTERNET OF THINGS
Type 1: Used in low speed data cable and telephone lines.
Type 2: These can support 4 mps implementation (Lee et al., 2013).
Type3: These cables support maximum 16 mps but commonly used in 10 mps (Li & Da Xu,
2017).
2. Shielded Twisted Pair (STP)
Type 1: Features 22-AWG two pairs.
Type 2: Inherit type 1 with 4 telephone pairs (Sommer and Franz, 2012).
Type 3: Features two pairs of shielded 26-AWG (McKernan, 2016).
3. Co-Axial cable:
Type 1: 50-Ohm RG-7 or RG-11, applicable with thick Ethernet.
Type 2: 50-Ohm RG-58, applicable with thin Ethernet (Ha et al., 2013).
Type 3: 75-Ohm RG-59, applicable with cable television.
Question 3:
Summarized Table of Advantages, Disadvantages and Application of IoT
IoT Devices Advantages Disadvantages Application
Sensors * Atmospheric dust, rain, snow is
not affected.
*It can also work in adverse
conditions if proper power supply is
given.
* reflected from curved,
small, thin and soft
objects it may be
difficult to receive
signal
*sleep system is smart.
*Smart washing
machine.
*Smart lightning.
Type 1: Used in low speed data cable and telephone lines.
Type 2: These can support 4 mps implementation (Lee et al., 2013).
Type3: These cables support maximum 16 mps but commonly used in 10 mps (Li & Da Xu,
2017).
2. Shielded Twisted Pair (STP)
Type 1: Features 22-AWG two pairs.
Type 2: Inherit type 1 with 4 telephone pairs (Sommer and Franz, 2012).
Type 3: Features two pairs of shielded 26-AWG (McKernan, 2016).
3. Co-Axial cable:
Type 1: 50-Ohm RG-7 or RG-11, applicable with thick Ethernet.
Type 2: 50-Ohm RG-58, applicable with thin Ethernet (Ha et al., 2013).
Type 3: 75-Ohm RG-59, applicable with cable television.
Question 3:
Summarized Table of Advantages, Disadvantages and Application of IoT
IoT Devices Advantages Disadvantages Application
Sensors * Atmospheric dust, rain, snow is
not affected.
*It can also work in adverse
conditions if proper power supply is
given.
* reflected from curved,
small, thin and soft
objects it may be
difficult to receive
signal
*sleep system is smart.
*Smart washing
machine.
*Smart lightning.

6INTERNET OF THINGS
*In comparison with inductive or
capacitive proximity sensors it has
more sensing distance.
*Weather monitoring.
*Blood Pressure
monitoring (Tozlu et al.,
2012).
Smart internet mirror.
RFID * 100% secure and cannot be
duplicated with the data code.
* Availability of large number of
sizes, different types and different
materials.
* Physical contact is not needed
between the communication devices
and data carrier. Tags can be used
many times.
* The rate of error is extremely low.
* Portable data base and long read
range.
*as compared to
Barcode system they are
expensive
* In less reliability
understanding is hard.
*Longer than the
Barcode labels.
*Specific applications
for tagging, does not fits
to all.
*Many Tags can
respond in the mean
time.
*Implantable RFID are
used in animal
identification (Gubbi et
al., 2013).
* Replacement of
library barcodes with
RFID Tags.
*It has also application
in museum, school and
universities.
Video
Tracking
* Devices communication.
* control and automation.
*Collects information.
*Monitoring is another advantage
of video tracking (Singh, Tripathi
and jara, 2014).
*Better quality of livelihood.
*compatibility us not
any international
standard with respect to
equipment monitoring
*More complex system
which can increase the
risk of failures.
*Privacy and security
both will be exposed.
*Human-computer
interaction.
*Augmentation of
reality.
*Medical imaging.
*Video communication.
Question 4
In general the security and the protection of data are considered complimentary
requirement when it is related to Internet of Things services. Security can be related to anything
that involves various aspect of putting the data in a secured environment. There can be many
*In comparison with inductive or
capacitive proximity sensors it has
more sensing distance.
*Weather monitoring.
*Blood Pressure
monitoring (Tozlu et al.,
2012).
Smart internet mirror.
RFID * 100% secure and cannot be
duplicated with the data code.
* Availability of large number of
sizes, different types and different
materials.
* Physical contact is not needed
between the communication devices
and data carrier. Tags can be used
many times.
* The rate of error is extremely low.
* Portable data base and long read
range.
*as compared to
Barcode system they are
expensive
* In less reliability
understanding is hard.
*Longer than the
Barcode labels.
*Specific applications
for tagging, does not fits
to all.
*Many Tags can
respond in the mean
time.
*Implantable RFID are
used in animal
identification (Gubbi et
al., 2013).
* Replacement of
library barcodes with
RFID Tags.
*It has also application
in museum, school and
universities.
Video
Tracking
* Devices communication.
* control and automation.
*Collects information.
*Monitoring is another advantage
of video tracking (Singh, Tripathi
and jara, 2014).
*Better quality of livelihood.
*compatibility us not
any international
standard with respect to
equipment monitoring
*More complex system
which can increase the
risk of failures.
*Privacy and security
both will be exposed.
*Human-computer
interaction.
*Augmentation of
reality.
*Medical imaging.
*Video communication.
Question 4
In general the security and the protection of data are considered complimentary
requirement when it is related to Internet of Things services. Security can be related to anything
that involves various aspect of putting the data in a secured environment. There can be many

7INTERNET OF THINGS
justifications and security aspects that can be involved in the security of the data in an internet of
things (IoT) service. When it comes to data one of the basic aspects that comes into play is
keeping the data secured from a variety of security breaches which are into active part now.
Putting emphasis on information security, it is regarded as preserving the confidentiality,
availability and integrity (Kranz, 2016). The security plays a vital role in every aspect putting
limelight on both the aspects for the organization itself and the benefits of the citizens. The most
important challenge is to ensure the availability and continuity prospective with the provision of
the services which are served by the Internet of Things, with it the main aspect of avoiding the
potential failure which are associated with interruptions and operational failure.
Internet of things (IoT) opens new possibilities to Hackers:
Now security organizations and firms are join hand in order to gain the security aspect
which is related to the internet of things. Gemalto a digital security agency will be providing its
mobile payement experience in order to secure the overall concept of the internet of thing (IoT).
The technological giant Microsoft is also entering into the scene in order to lend their expertise
in the field of security the aspect. The company has already secured the windows 10 with the
Bitlocker encryption and secure boot technology in order to safe guard the system. Bitlocker can
be used in order to code entire disk volume which is mainly a encryption algorithm
(Wollschlaeger, Sauter & Jasperneite, 2017). This would be very much beneficial with regards to
the data and the security of the data. On the other hand secure boot is mainly a security standard
of development which is developed by the personal computer industry, this would be beneficial
in making the personal computer or the laptop more safe by the use of only trusted software and
its features. The main advantage of the implementation is that it can be used in preventing
hijacking.
justifications and security aspects that can be involved in the security of the data in an internet of
things (IoT) service. When it comes to data one of the basic aspects that comes into play is
keeping the data secured from a variety of security breaches which are into active part now.
Putting emphasis on information security, it is regarded as preserving the confidentiality,
availability and integrity (Kranz, 2016). The security plays a vital role in every aspect putting
limelight on both the aspects for the organization itself and the benefits of the citizens. The most
important challenge is to ensure the availability and continuity prospective with the provision of
the services which are served by the Internet of Things, with it the main aspect of avoiding the
potential failure which are associated with interruptions and operational failure.
Internet of things (IoT) opens new possibilities to Hackers:
Now security organizations and firms are join hand in order to gain the security aspect
which is related to the internet of things. Gemalto a digital security agency will be providing its
mobile payement experience in order to secure the overall concept of the internet of thing (IoT).
The technological giant Microsoft is also entering into the scene in order to lend their expertise
in the field of security the aspect. The company has already secured the windows 10 with the
Bitlocker encryption and secure boot technology in order to safe guard the system. Bitlocker can
be used in order to code entire disk volume which is mainly a encryption algorithm
(Wollschlaeger, Sauter & Jasperneite, 2017). This would be very much beneficial with regards to
the data and the security of the data. On the other hand secure boot is mainly a security standard
of development which is developed by the personal computer industry, this would be beneficial
in making the personal computer or the laptop more safe by the use of only trusted software and
its features. The main advantage of the implementation is that it can be used in preventing
hijacking.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8INTERNET OF THINGS
Question 5
Blocking Mode:
It can be referred to as the operation request that is mainly generated at the point which is
considered to be the end point which is done to get the respond of the request which is made
after the initialization of the end point and its completion which manlu involve the aspect which
is long or may be termed as the point of waiting with emphasis on the originator (Wollschlaeger,
Sauter & Jasperneite, 2017) asynchronous massage would be received by the originator since it
is a synchronous. This can merely mean that the originator have to initiate both the information
exchange which is between the originator and the receiver.
Publish/Subscribe Paradigm:
It is also referred to as a pub/sub which enables the communication in order of
unidirectional between the publishers with regards to the one subscriber. After the subscriber
declares his interest in this category or class of category it would be forwarded (Bui, 2016). After
which the publisher is available for the new data it then pushes the intended message to the
subscriber interest.
Question 5
Blocking Mode:
It can be referred to as the operation request that is mainly generated at the point which is
considered to be the end point which is done to get the respond of the request which is made
after the initialization of the end point and its completion which manlu involve the aspect which
is long or may be termed as the point of waiting with emphasis on the originator (Wollschlaeger,
Sauter & Jasperneite, 2017) asynchronous massage would be received by the originator since it
is a synchronous. This can merely mean that the originator have to initiate both the information
exchange which is between the originator and the receiver.
Publish/Subscribe Paradigm:
It is also referred to as a pub/sub which enables the communication in order of
unidirectional between the publishers with regards to the one subscriber. After the subscriber
declares his interest in this category or class of category it would be forwarded (Bui, 2016). After
which the publisher is available for the new data it then pushes the intended message to the
subscriber interest.

9INTERNET OF THINGS
Publish
Publish
Subscribe
End Point BEnd Point A
New Data
Figure 1: Publish – Subscribe Paradigm
(Source: By Author)
Command/Response Paradigm:
It can be stated from the above diagram that due to the effect of overhead in the unneeded
message travelling in the direction which is reverse Response / Command becomes sunpotimal
in nature.
New Data
Publish
Publish
Subscribe
End Point BEnd Point A
New Data
Figure 1: Publish – Subscribe Paradigm
(Source: By Author)
Command/Response Paradigm:
It can be stated from the above diagram that due to the effect of overhead in the unneeded
message travelling in the direction which is reverse Response / Command becomes sunpotimal
in nature.
New Data

10INTERNET OF THINGS
Endpoint A Endpoint B
1. Request
3. Response
Processing
Figure 2: Command/Response paradigm
(Source: By Author)
Question 6
Nielson’s Law: User Bandwidth increases up to 60% every year which is less than
Moore’s Law related to speed of computer. This new law fits data from the time period of 1983
to 2016 (Kumar et al., 2017). Nielson’s Law which is related to internet bandwidth states that, a
high end user’s connection speed grows by average 50% every year (Wollschlaeger, Sauter &
Jasperneite, 2017).
Implication of Nelson’s law in IoT
Endpoint A Endpoint B
1. Request
3. Response
Processing
Figure 2: Command/Response paradigm
(Source: By Author)
Question 6
Nielson’s Law: User Bandwidth increases up to 60% every year which is less than
Moore’s Law related to speed of computer. This new law fits data from the time period of 1983
to 2016 (Kumar et al., 2017). Nielson’s Law which is related to internet bandwidth states that, a
high end user’s connection speed grows by average 50% every year (Wollschlaeger, Sauter &
Jasperneite, 2017).
Implication of Nelson’s law in IoT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

11INTERNET OF THINGS
In around 2024 it can be expected that with the implementation of the sensor technology
it will break through the “trillion sensor” by which the creating of data stream with every
surround surface can be achieved. Sensors will be very much soon embedded in various fields
such as houses, cars and even in the clothing. Microchip will be a part of the trending approach
with its direct implementation in body or skin sensor (Bonomi et al., 2017).
In around 2024 it can be expected that with the implementation of the sensor technology
it will break through the “trillion sensor” by which the creating of data stream with every
surround surface can be achieved. Sensors will be very much soon embedded in various fields
such as houses, cars and even in the clothing. Microchip will be a part of the trending approach
with its direct implementation in body or skin sensor (Bonomi et al., 2017).

12INTERNET OF THINGS
Reference
Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2017, August). Fog computing and its role in
the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile
cloud computing (pp. 13-16). ACM.
Bui, N. (2016). Internet of Things.
Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-
68). Palgrave Macmillan, London.
Kranz, M. (2016). Building the Internet of Things: Implement New Business Models, Disrupt
Competitors, Transform Your Industry. John Wiley & Sons.
Kumar, M., Bhaskar, M. S., Padmanaban, S., Siano, P., Blaabjerg, F., & Leonowicz, Z. (2017,
June). Electric field analysis of extra high voltage (EHV) underground cables using finite
element method. In Environment and Electrical Engineering and 2017 IEEE Industrial
and Commercial Power Systems Europe (EEEIC/I&CPS Europe), 2017 IEEE
International Conference on (pp. 1-4). IEEE.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
McKernan, K. J. (2016). The chloroplast genome hidden in plain sight, open access publishing
and anti-fragile distributed data sources. Mitochondrial DNA Part A, 27(6), 4518-4519.
Mulani, T. T., & Pingle, S. V. (2016). Internet of things. International Research Journal of
Multidisciplinary Studies, 2(3).
Reference
Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2017, August). Fog computing and its role in
the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile
cloud computing (pp. 13-16). ACM.
Bui, N. (2016). Internet of Things.
Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-
68). Palgrave Macmillan, London.
Kranz, M. (2016). Building the Internet of Things: Implement New Business Models, Disrupt
Competitors, Transform Your Industry. John Wiley & Sons.
Kumar, M., Bhaskar, M. S., Padmanaban, S., Siano, P., Blaabjerg, F., & Leonowicz, Z. (2017,
June). Electric field analysis of extra high voltage (EHV) underground cables using finite
element method. In Environment and Electrical Engineering and 2017 IEEE Industrial
and Commercial Power Systems Europe (EEEIC/I&CPS Europe), 2017 IEEE
International Conference on (pp. 1-4). IEEE.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
McKernan, K. J. (2016). The chloroplast genome hidden in plain sight, open access publishing
and anti-fragile distributed data sources. Mitochondrial DNA Part A, 27(6), 4518-4519.
Mulani, T. T., & Pingle, S. V. (2016). Internet of things. International Research Journal of
Multidisciplinary Studies, 2(3).

13INTERNET OF THINGS
Wollschlaeger, M., Sauter, T., & Jasperneite, J. (2017). The future of industrial communication:
Automation networks in the era of the internet of things and industry 4.0. IEEE Industrial
Electronics Magazine, 11(1), 17-27.
Wollschlaeger, M., Sauter, T., & Jasperneite, J. (2017). The future of industrial communication:
Automation networks in the era of the internet of things and industry 4.0. IEEE Industrial
Electronics Magazine, 11(1), 17-27.
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.