Internet of Things: User Interfaces, Technologies, and Laws

Verified

Added on  2020/03/01

|6
|1065
|94
Homework Assignment
AI Summary
This document presents solutions to an Internet of Things (IoT) assignment, addressing several key aspects of the field. The first question explores the concept of No UI design, arguing for its advantages over traditional user interfaces. The second question compares twisted pair, coaxial, and fiber optic cables, detailing their bandwidth, interference, cost, and security characteristics. The third question contrasts sensors, RFID, and video tracking, highlighting their respective advantages, disadvantages, and applications. The fourth question discusses the impact of IoT on data security and user privacy, emphasizing the vulnerabilities associated with connecting numerous devices to a network. The fifth question provides a calculation to assess the efficiency of an application, estimating the time savings achieved by blocking requests. Finally, the sixth question explains and compares Nielsen's Law of Internet Bandwidth and Moore's Law. The assignment includes references to relevant research papers and publications.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INTERNET OF THINGS
Internet of Things
Name of the student:
Name of the University:
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
INTERNET OF THINGS
Answer to question 1
The user interfaces might be very useful for the user to interact with the systems. But the
real problems with the user interfaces are that they get in the way of the user actually interacting
with the systems (Page, 2014). It gives a felling to the users that they are using a virtual system
and they are not actually interacting with the systems. The No UI design aims to provide the
systems that the users can interact with without any digital interfaces. This can help the designers
to design the systems that are smarter and more useful for the people. Hence the no User
Interface systems are the best interfaces.
Answer to question 2
The provided table provides the comparison in between the twisted pair cable, coaxial
cable and the Fibre optic cable (Hecht, 2015).
Twisted pair cable Coaxial cable Fibre optic cable
Bandwidth Twisted pair cable has
Low bandwidth.
Coaxial cable has
Moderate bandwidth.
Fibre optic cable has
very high bandwidth.
Interference Rating They encounter the
highest level of
interferences.
The interference rating
is medium.
Lowest interference.
Cost Cheapest medium. Coaxial cables have
medium costs.
Fibre optic cables have
very high cost.
Security Low security Medium Security High level of security is
provided by this
medium.
Document Page
2
INTERNET OF THINGS
Answer to question 3
The comparison for the Sensors, RFID and Video Tracking is provided in the table below
(Yang et al., 2014):
Sensors RFID Video Tracking
Advantages Enables data logging.
Helps in detecting
changes
Anti-theft
Allows combine
function
Helps in locating a
moving object.
Helps in human
machine interaction
Disadvantages They creak down very
easily
They are very
expensive.
Undeniable
They are insignificant at
various points.
It cannot track the
objects if the
background is same.
Application They are a very
important feature in the
smart city
implementation.
The RFID are used for
tagging the products
Object detection is one
of the main applications
of video tracking.
Answer to question 4
The internet of things is the best development in the field of networking in the past few
years. The technology provides various type of facility for the system they are implemented in.
The system provides various type of advantages but there can be various type of disadvantages
Document Page
3
INTERNET OF THINGS
for the people regarding the security of their data and also regarding the privacy of the
information of the users (Wortmannn & Fluchter, 2015). The internet of things allows the users
to connect various types of devices that belong to the users to the network and allows them to go
online. This allows them to be online 24 /7 and this allows the users to get connected to the web
from anyplace at anytime. But this makes the users vulnerable to the various type of intrusions
and theft of their data. This is a huge concern for them as a huge part of their personal
information is being uploaded online. Hence they become vulnerable to the data theft and data
loss. This also makes the data of the organization which are confidential vulnerable to the
hackers and the mal practitioners.
Answer to question 5
The provided information to us:
The application triggers a request every 1 s.
The round-trip propagation delay between the application and the sensor is 12 ms.
On average the sensor consumes 3 ms to process each request.
The application consumes 2 ms to send or receive any message
Hence, the total time used by the application is 1+ 12 + 3 + 2 ms = 18 ms.
Hence if the application blocks all the requests the application would be saving 18 ms for
the system. The designed application would be much more efficient than the present model.
Answer to question 6
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
INTERNET OF THINGS
Nielson’s Law of Internet Bandwidth states that, “A high-end user's connection
speed grows by 50% per year”. This law is based on the data is received from the analysis tahat
is done in the period in between 1983 to 2016.
Moore’s Law states that, “number of transistors per square inch on integrated circuits had
doubled every year since their invention”. This has also been noticed that this process is going to
continue as the time passes and this value is going to grow exponentially. Now, Nielsen’s Law is
Moore’s law applied to Network bandwidth (Gaizi, Abdi & Abbou, 2016). This means that high-
end internet connections that are growing at a rate of 50% per year. Hence, the Moore’s Law is
considered to be obsolete and the Nielson’s law is followed at this present moment of time.
Document Page
5
INTERNET OF THINGS
References
Gaizi, K., Abdi, F., & Abbou, F. M. (2016, June). Realistic dynamic traffic generation for WDM Optical
Networks. In Signals and Systems Conference (ISSC), 2016 27th Irish (pp. 1-4). IEEE.
Hecht, J. (2015). Understanding fiber optics. Jeff Hecht.
Page, T. (2014). Skeuomorphism or flat design: future directions in mobile device User Interface
(UI) design education. International Journal of Mobile Learning and Organisation, 8(2),
130-142.
Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems
Engineering, 57(3), 221-224.
Yang, L., Chen, Y., Li, X. Y., Xiao, C., Li, M., & Liu, Y. (2014, September). Tagoram: Real-time
tracking of mobile RFID tags to high precision using COTS devices. In Proceedings of the 20th
annual international conference on Mobile computing and networking (pp. 237-248). ACM.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]