Comprehensive Analysis of Internet of Things (IoT) Report
VerifiedAdded on  2020/03/02
|9
|2670
|202
Report
AI Summary
This comprehensive report delves into the multifaceted world of the Internet of Things (IoT). It begins by examining the concept of a 'no user interface' system and its implications, followed by a comparison of various communication mediums, including twisted pair cables, coaxial cables, and optical fiber cables, highlighting their bandwidth, distance, cost, and security aspects. The report then explores the advantages and disadvantages of IoT devices, with a specific focus on sensors and RFID technology, detailing their merits, demerits, and applications across various industries. Furthermore, the report addresses critical security and privacy issues within the IoT landscape, emphasizing the importance of safeguarding data and user information. It includes an analysis of the Nielson's Law and its relation to Moore's law. The report concludes by providing references to support the information presented.

Running Head: INTERNET OF THINGS (IoT)
Internet of things (IoT).
Name
Institution
Course
Date
Internet of things (IoT).
Name
Institution
Course
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

INTERNET OF THINGS (IoT) 2
The best interface for a system is no User Interface
An interface can either be s user interface containing all set of dials, operating system
commands, knobs, graphical display formats and other devices availed by a computer program to
enable the user to communicate and make use of the computer or the program (Tan & Wang,
2010).
The statement "the best interface for a system is no User Interface" Means that no user interface
is the best interface compared to all other interfaces as it makes it possible for computers and
programs operate and perform tasks without necessarily need for human operation (Stankovic,
2014). The no user interface system was designed by Golden Krishna in a way that it makes
computers work for human instead of us working for them and also provide solutions to
individuals and adapt the best suit to each person and their needs. The no interface use was
developed following three principles which are; eliminating interfaces to embrace natural
processes, leverage computer rather than catering to them and developing a system that adapts
for individuals.
No interface can be applied in communication domain where people can exchange SMS which
has become one of the most used applications in the world (Ni, et.al 2004). The no user interface
has also been employed in the movie industries where robots are being used to take parts and
perform tasks used to be carried out by a human. For instance, in communication, many people
exchange information through applications such as what sap and we Chat apps. It has become a
central part of human life in modern world (Bandyopadhyay & Sen, 2011). The introduction of
artificial intelligence in the movie industry has made things movies become interesting. Many
recent films have been acted by robots given human characters and resemblance. Robots passing
the turning test have brought about huge implications on people as it shows that artificial
intelligence has reached human level.
Compare the bandwidth, distance, interference rating, cost and security
Twisted pair cable
It is the simplest transmission medium consisting of one or more pairs of electrical son arranged
in a spiral (Gama, et.al, 2012). This type of support cable is fit for transmitting in both analog
and digital systems. It is suitable for transmitting information in a distance of about 100 meters.
It consists of two copper wires that are about 1 mm thick. The wires are twisted to reduce
The best interface for a system is no User Interface
An interface can either be s user interface containing all set of dials, operating system
commands, knobs, graphical display formats and other devices availed by a computer program to
enable the user to communicate and make use of the computer or the program (Tan & Wang,
2010).
The statement "the best interface for a system is no User Interface" Means that no user interface
is the best interface compared to all other interfaces as it makes it possible for computers and
programs operate and perform tasks without necessarily need for human operation (Stankovic,
2014). The no user interface system was designed by Golden Krishna in a way that it makes
computers work for human instead of us working for them and also provide solutions to
individuals and adapt the best suit to each person and their needs. The no interface use was
developed following three principles which are; eliminating interfaces to embrace natural
processes, leverage computer rather than catering to them and developing a system that adapts
for individuals.
No interface can be applied in communication domain where people can exchange SMS which
has become one of the most used applications in the world (Ni, et.al 2004). The no user interface
has also been employed in the movie industries where robots are being used to take parts and
perform tasks used to be carried out by a human. For instance, in communication, many people
exchange information through applications such as what sap and we Chat apps. It has become a
central part of human life in modern world (Bandyopadhyay & Sen, 2011). The introduction of
artificial intelligence in the movie industry has made things movies become interesting. Many
recent films have been acted by robots given human characters and resemblance. Robots passing
the turning test have brought about huge implications on people as it shows that artificial
intelligence has reached human level.
Compare the bandwidth, distance, interference rating, cost and security
Twisted pair cable
It is the simplest transmission medium consisting of one or more pairs of electrical son arranged
in a spiral (Gama, et.al, 2012). This type of support cable is fit for transmitting in both analog
and digital systems. It is suitable for transmitting information in a distance of about 100 meters.
It consists of two copper wires that are about 1 mm thick. The wires are twisted to reduce

INTERNET OF THINGS (IoT) 3
electrical interference from similar pairs in the surrounding environment(Atzori, et.al, 2010). The
cables exhibit electromagnetic interference when the two wires are parallel to each other.
Unleashed Twisted Pair (UTP)
They consist of color-coded copper wires that do not have any foil or braid as an insulator to
guard interference. The wire pairs within each cable are in varying amounts per foot to produce
cancellation.
Shielded Twisted Pair (STP)
They are made up of copper wires that are twisted together and covered with a foil or in a
braided mesh as well as the outer PVC cover. The braided mesh or prevents guard penetration of
electromagnetic noise and do away with cross talk (Larsson, et.al, 2014). The covering must be
grounded to prevent the foil from becoming a magnetic field.
Properties of twisted pair
Bandwidth- the productive capacity of twisted pair cable rely on several factors such as
conductor gauge, length of the circuit and the space between amplifiers. A high band frequency
may cause interference (Tyson, 2004).
Distance- the distance between twisted pairs is limited. As the distance between the network
elements increases, signal loss increases and quality becomes small at a particular frequency.
Security- twisted pair cables are the highly insecure medium of transmission. Placing physical
taps on a UTP is easy (Wang, et.al, 2014). Also, the energy radiated is easily intercepted through
use of inductive coils without the need for placement of a physical tap.
Cost – the acquiring process, deployment and rearrangement costs for UTP are too small, at least
in the wires applications. The costs are however high in high-capacity, and long distance
applications due to needs for dull, conduit placement and splicing of many large pair cables.
Interference rating- twisted pairs are highly susceptible to dangers of foreign intervention.
Coaxial cable
Coaxial cable is ubiquitous and significantly used currently. For instance, the television wire is a
coaxial cable. It has a solid-copper wire running down at the middle of the cable and a solid
copper wire as an insulator covered by a metal foil and a braided cable (Hecht, 2015). The foil
shields it against electromagnetic interference. The cable is finally covered by another layer that
includes the braided cable.
electrical interference from similar pairs in the surrounding environment(Atzori, et.al, 2010). The
cables exhibit electromagnetic interference when the two wires are parallel to each other.
Unleashed Twisted Pair (UTP)
They consist of color-coded copper wires that do not have any foil or braid as an insulator to
guard interference. The wire pairs within each cable are in varying amounts per foot to produce
cancellation.
Shielded Twisted Pair (STP)
They are made up of copper wires that are twisted together and covered with a foil or in a
braided mesh as well as the outer PVC cover. The braided mesh or prevents guard penetration of
electromagnetic noise and do away with cross talk (Larsson, et.al, 2014). The covering must be
grounded to prevent the foil from becoming a magnetic field.
Properties of twisted pair
Bandwidth- the productive capacity of twisted pair cable rely on several factors such as
conductor gauge, length of the circuit and the space between amplifiers. A high band frequency
may cause interference (Tyson, 2004).
Distance- the distance between twisted pairs is limited. As the distance between the network
elements increases, signal loss increases and quality becomes small at a particular frequency.
Security- twisted pair cables are the highly insecure medium of transmission. Placing physical
taps on a UTP is easy (Wang, et.al, 2014). Also, the energy radiated is easily intercepted through
use of inductive coils without the need for placement of a physical tap.
Cost – the acquiring process, deployment and rearrangement costs for UTP are too small, at least
in the wires applications. The costs are however high in high-capacity, and long distance
applications due to needs for dull, conduit placement and splicing of many large pair cables.
Interference rating- twisted pairs are highly susceptible to dangers of foreign intervention.
Coaxial cable
Coaxial cable is ubiquitous and significantly used currently. For instance, the television wire is a
coaxial cable. It has a solid-copper wire running down at the middle of the cable and a solid
copper wire as an insulator covered by a metal foil and a braided cable (Hecht, 2015). The foil
shields it against electromagnetic interference. The cable is finally covered by another layer that
includes the braided cable.

INTERNET OF THINGS (IoT) 4
Thinnet coaxial cable
It is a coaxial cable which is around ¼ inch thick used for short distance. It connects directly to a
work station network adapter card by use of a British naval connector (Hecht, 2015). It transfers'
information to a maximum distance of 185 meters.
Thicket coaxial cable
It is about ½ inch thick and supports the transfer of data over a longer distance than the thin net.
It can transfer data to a maximum of 500 meters and is mostly used as a backbone to connect
smaller thin net based networks (Hecht, 2015).
A coaxial cable has a bandwidth of 10 Mbps (Megabits per second)
Optical fiber cable
Optical fiber cables carry digital data by the use of optical fiber signal. Data is transferred in the
form of modulated pulses of light. It is made up of a fragile cylinder glass, referred to as the core
covered by a concentric layer of glass, called the cladding (Borgia, 2014). A fiber contains two
cables, one for transmitting and another for receiving data. The core can be made using an
optical quality transparent plastic and the cladding of gel which is capable of reflecting signals
back to the fiber hence reducing the loss of signal.
Single mode Fiber (SMF)
It uses a single ray to carry a transmission for extended distances.
Multi-Mode Fiber (MMF)
Multimode fiber uses several rays of light at the same time with every running at its particular
reflection angle to transmit data over short distances. The fiber does not conduct electromagnets,
and thus it is safe in such environments (Borgia, 2014).
An optical fiber cable can transmit data at a bandwidth over 500 MHz/km, has less data
interference as every cable is independent in its work. Signal losses are limited over 500 m.
They, however, have high costs to implement as there is a need for electrical power for
transmission to occur and or aluminum.
Advantages and Disadvantages of IoT devices
Sensors
Sensors are devices used to provide information when an object is present or not. They include
inductive, captive, limit switches, ultrasonic sensors and photoelectric. They are packaged
according to their configurations to meet the requirements present in industrial and commercial
Thinnet coaxial cable
It is a coaxial cable which is around ¼ inch thick used for short distance. It connects directly to a
work station network adapter card by use of a British naval connector (Hecht, 2015). It transfers'
information to a maximum distance of 185 meters.
Thicket coaxial cable
It is about ½ inch thick and supports the transfer of data over a longer distance than the thin net.
It can transfer data to a maximum of 500 meters and is mostly used as a backbone to connect
smaller thin net based networks (Hecht, 2015).
A coaxial cable has a bandwidth of 10 Mbps (Megabits per second)
Optical fiber cable
Optical fiber cables carry digital data by the use of optical fiber signal. Data is transferred in the
form of modulated pulses of light. It is made up of a fragile cylinder glass, referred to as the core
covered by a concentric layer of glass, called the cladding (Borgia, 2014). A fiber contains two
cables, one for transmitting and another for receiving data. The core can be made using an
optical quality transparent plastic and the cladding of gel which is capable of reflecting signals
back to the fiber hence reducing the loss of signal.
Single mode Fiber (SMF)
It uses a single ray to carry a transmission for extended distances.
Multi-Mode Fiber (MMF)
Multimode fiber uses several rays of light at the same time with every running at its particular
reflection angle to transmit data over short distances. The fiber does not conduct electromagnets,
and thus it is safe in such environments (Borgia, 2014).
An optical fiber cable can transmit data at a bandwidth over 500 MHz/km, has less data
interference as every cable is independent in its work. Signal losses are limited over 500 m.
They, however, have high costs to implement as there is a need for electrical power for
transmission to occur and or aluminum.
Advantages and Disadvantages of IoT devices
Sensors
Sensors are devices used to provide information when an object is present or not. They include
inductive, captive, limit switches, ultrasonic sensors and photoelectric. They are packaged
according to their configurations to meet the requirements present in industrial and commercial
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

INTERNET OF THINGS (IoT) 5
applications. Sensors are of different types with each having its strengths and weaknesses as
enumerated below.
Types of sensor (Merits, Demerits and Applications)
Ultrasonic sensors
They detect (sense) all materials
It has low resolution
It is sensitive to temperature fluctuations
Used in doors for security
Curb collision
Control of levels
Limit switch Sensors
They are cheap
They have high current capability
They are common to cheap technology sensing
Must make physical contact with the target
They respond slowly
Used in interlocking
They are used in primary end of travel sensing
Capacitive sensors
They can detect non-metallic targets
They detect via some containers
They sense profoundly to environmental changes
Used for level sensing
Inductive sensor
They resist harsh environmental conditions
They are long lasting
Simple to install
Easy to predict
They have distance drawbacks
applications. Sensors are of different types with each having its strengths and weaknesses as
enumerated below.
Types of sensor (Merits, Demerits and Applications)
Ultrasonic sensors
They detect (sense) all materials
It has low resolution
It is sensitive to temperature fluctuations
Used in doors for security
Curb collision
Control of levels
Limit switch Sensors
They are cheap
They have high current capability
They are common to cheap technology sensing
Must make physical contact with the target
They respond slowly
Used in interlocking
They are used in primary end of travel sensing
Capacitive sensors
They can detect non-metallic targets
They detect via some containers
They sense profoundly to environmental changes
Used for level sensing
Inductive sensor
They resist harsh environmental conditions
They are long lasting
Simple to install
Easy to predict
They have distance drawbacks

INTERNET OF THINGS (IoT) 6
Employed in industries and machines
They only sense metallic targets
Photo electric sensor
They have a long life
They detect over long distances
They are fast in responding
They recognize all types of materials
There sensing range is affected by reflectivity and color of the target
Their lens are contaminable
Used in packaging
Handling material
Detecting parts
RFID (Radio Frequency Identification)
The RFID was developed to replace the barcode for technology and has become well known due
to its many applications. Its main components are RFID reader and RFID tag (Hank, 2013). The
user gets information from the passive tag through transmitting a signal.
Advantages of RFID
RFID can store more information as compared to barcodes and it follows the commands of the
reader.
RFID tags are used for monitoring the health records of patients in hospitals and tracking of
luggage.
It gives the location of the reader together with its identification.
The tags can be read only and also read or write as opposed to barcodes.
RFID is used for security and attendance reasons in institutions as well as office establishments.
Advantages of RFID
RFID coverage is limited within 3 meters.
The technology has brought about the loss of jobs for unskilled laborers.
Active RFIDs are expensive as they need to use a battery.
Programming RFID is time-consuming
External electromagnetic interference can hinder the RFID remote reading.
Issues of security and privacy in IoT
Employed in industries and machines
They only sense metallic targets
Photo electric sensor
They have a long life
They detect over long distances
They are fast in responding
They recognize all types of materials
There sensing range is affected by reflectivity and color of the target
Their lens are contaminable
Used in packaging
Handling material
Detecting parts
RFID (Radio Frequency Identification)
The RFID was developed to replace the barcode for technology and has become well known due
to its many applications. Its main components are RFID reader and RFID tag (Hank, 2013). The
user gets information from the passive tag through transmitting a signal.
Advantages of RFID
RFID can store more information as compared to barcodes and it follows the commands of the
reader.
RFID tags are used for monitoring the health records of patients in hospitals and tracking of
luggage.
It gives the location of the reader together with its identification.
The tags can be read only and also read or write as opposed to barcodes.
RFID is used for security and attendance reasons in institutions as well as office establishments.
Advantages of RFID
RFID coverage is limited within 3 meters.
The technology has brought about the loss of jobs for unskilled laborers.
Active RFIDs are expensive as they need to use a battery.
Programming RFID is time-consuming
External electromagnetic interference can hinder the RFID remote reading.
Issues of security and privacy in IoT

INTERNET OF THINGS (IoT) 7
Security
IoT security is a serious concern to information technology professionals. New technologies
exhibit challenges in growing as organizations rival for the available market share to get their
standards upheld. In the period of the old replacement of IoT, thus securing the machines, apps
and the platforms that make it possible for IoT to thrive (Want, et.al, 2015). This kind of
situation is highly witnessed in the mobile device apps development. Simultaneously, IoT
platforms are often the same in their designs, making it possible for hackers to exploit common
vulnerabilities of one standard IoT device platform in different levels of devices. Also, after
threats have been pinpointed, less costly devices can make it hard for IoT processes from giving
security patches.
Privacy issues
Since people will have their daily activities and conducts recorded, measured and analyzed, they
are a high need for the developers and policy makers to alerting users and individuals who gather
their information, how it is stored and used and to whom it is availed and for what purposes. The
privacy principles outline that the users should be in a position to control their data as well as
they can choose smart surroundings with no possible negative implications (Roman, et.al, 2011).
Information collected by use of sensors within objects that are linked to each other can result in
huge amount of data that can be merged, analyzed and an action taken with all potential
accountability, transparency, security or meaningful intentions.
IoT water level monitoring application
The time budget saved by redesigning the application to use the publish/subscribe
communication model is 12/3+2 = 6ms
Nielson's Law
The Nielson's law states that a high-end user's connection speed grows by 50% per year. The
reason for this growth is as a result business realities experience from technological limitations.
The average increase is constituted by the facts that: telecoms companies are conservative, the
user's reluctance in spending much money on bandwidth and the increasing baser of the user
base (Gubbi, et.al, 2013).
This law is related to Moore's law in that they are both measures of leading edge capabilities.
The Moore's law acknowledges that a design gap exists and cannot use all available transistors
Security
IoT security is a serious concern to information technology professionals. New technologies
exhibit challenges in growing as organizations rival for the available market share to get their
standards upheld. In the period of the old replacement of IoT, thus securing the machines, apps
and the platforms that make it possible for IoT to thrive (Want, et.al, 2015). This kind of
situation is highly witnessed in the mobile device apps development. Simultaneously, IoT
platforms are often the same in their designs, making it possible for hackers to exploit common
vulnerabilities of one standard IoT device platform in different levels of devices. Also, after
threats have been pinpointed, less costly devices can make it hard for IoT processes from giving
security patches.
Privacy issues
Since people will have their daily activities and conducts recorded, measured and analyzed, they
are a high need for the developers and policy makers to alerting users and individuals who gather
their information, how it is stored and used and to whom it is availed and for what purposes. The
privacy principles outline that the users should be in a position to control their data as well as
they can choose smart surroundings with no possible negative implications (Roman, et.al, 2011).
Information collected by use of sensors within objects that are linked to each other can result in
huge amount of data that can be merged, analyzed and an action taken with all potential
accountability, transparency, security or meaningful intentions.
IoT water level monitoring application
The time budget saved by redesigning the application to use the publish/subscribe
communication model is 12/3+2 = 6ms
Nielson's Law
The Nielson's law states that a high-end user's connection speed grows by 50% per year. The
reason for this growth is as a result business realities experience from technological limitations.
The average increase is constituted by the facts that: telecoms companies are conservative, the
user's reluctance in spending much money on bandwidth and the increasing baser of the user
base (Gubbi, et.al, 2013).
This law is related to Moore's law in that they are both measures of leading edge capabilities.
The Moore's law acknowledges that a design gap exists and cannot use all available transistors
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

INTERNET OF THINGS (IoT) 8
immediately. The Nielson's law focuses on the fast speeds present for high-end users of the
internet.
immediately. The Nielson's law focuses on the fast speeds present for high-end users of the
internet.

INTERNET OF THINGS (IoT) 9
References.
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer
networks, 54(15), 2787-2805.
Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in
technology and standardization. Wireless Personal Communications, 58(1), 49-69.
Bi, Z., Da Xu, L., & Wang, C. (2014). Internet of things for enterprise systems of modern
manufacturing. IEEE Transactions on industrial informatics, 10(2), 1537-1546.
Borgia, E. (2014). The Internet of Things vision: Key features, applications and open
issues. Computer Communications, 54, 1-31.
Gama, K., Touseau, L., & Donsez, D. (2012). Combining heterogeneous service technologies for
building an Internet of Things middleware. Computer Communications, 35(4), 405-417.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
1645-1660.
Hank, P., Müller, S., Vermesan, O., & Van Den Keybus, J. (2013, March). Automotive ethernet:
in-vehicle networking and smart mobility. In Proceedings of the Conference on Design,
Automation and Test in Europe (pp. 1735-1739). EDA Consortium.
Hecht, J. (2015). Understanding fiber optics. Jeff Hecht.
Larsson, E. G., Edfors, O., Tufvesson, F., & Marzetta, T. L. (2014). Massive MIMO for next
generation wireless systems. IEEE Communications Magazine, 52(2), 186-195.
Ni, L. M., Liu, Y., Lau, Y. C., & Patil, A. P. (2004). LANDMARC: indoor location sensing
using active RFID. Wireless networks, 10(6), 701-710.
Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 44(9), 51-
58.
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things
Journal, 1(1), 3-9.
Tan, L., & Wang, N. (2010, August). Future internet: The internet of things. In Advanced
Computer Theory and Engineering (ICACTE), 2010 3rd International Conference
on (Vol. 5, pp. V5-376). IEEE.
Tyson, J. (2004). How internet infrastructure works. Retrieved December, 3, 2004.
Want, R., Schilit, B. N., & Jenson, S. (2015). Enabling the internet of things. Computer, 48(1),
28-35.
References.
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer
networks, 54(15), 2787-2805.
Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in
technology and standardization. Wireless Personal Communications, 58(1), 49-69.
Bi, Z., Da Xu, L., & Wang, C. (2014). Internet of things for enterprise systems of modern
manufacturing. IEEE Transactions on industrial informatics, 10(2), 1537-1546.
Borgia, E. (2014). The Internet of Things vision: Key features, applications and open
issues. Computer Communications, 54, 1-31.
Gama, K., Touseau, L., & Donsez, D. (2012). Combining heterogeneous service technologies for
building an Internet of Things middleware. Computer Communications, 35(4), 405-417.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
1645-1660.
Hank, P., Müller, S., Vermesan, O., & Van Den Keybus, J. (2013, March). Automotive ethernet:
in-vehicle networking and smart mobility. In Proceedings of the Conference on Design,
Automation and Test in Europe (pp. 1735-1739). EDA Consortium.
Hecht, J. (2015). Understanding fiber optics. Jeff Hecht.
Larsson, E. G., Edfors, O., Tufvesson, F., & Marzetta, T. L. (2014). Massive MIMO for next
generation wireless systems. IEEE Communications Magazine, 52(2), 186-195.
Ni, L. M., Liu, Y., Lau, Y. C., & Patil, A. P. (2004). LANDMARC: indoor location sensing
using active RFID. Wireless networks, 10(6), 701-710.
Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 44(9), 51-
58.
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things
Journal, 1(1), 3-9.
Tan, L., & Wang, N. (2010, August). Future internet: The internet of things. In Advanced
Computer Theory and Engineering (ICACTE), 2010 3rd International Conference
on (Vol. 5, pp. V5-376). IEEE.
Tyson, J. (2004). How internet infrastructure works. Retrieved December, 3, 2004.
Want, R., Schilit, B. N., & Jenson, S. (2015). Enabling the internet of things. Computer, 48(1),
28-35.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.