University IoT Assignment: Technologies, Security and Paradigms
VerifiedAdded on 2020/03/07
|14
|2152
|394
Homework Assignment
AI Summary
This assignment on the Internet of Things (IoT) explores various facets of the technology. It begins by discussing the 'No User Interface' (NO UI) approach and its advantages, illustrated with examples like voice command systems. The assignment then compares different cable types (twisted pair, coaxial, and fiber optic) based on bandwidth, distance, interference, cost, and security. It also provides a detailed comparison of IoT sensors, RFID, and video tracking, outlining their advantages, disadvantages, and applications. The document further addresses security and privacy risks associated with IoT implementation, and analyzes different communication paradigms such as blocking mode, publish/subscribe, and command/response. Finally, it touches upon Nielsen's Law of Internet Bandwidth and Moore's Law, and discusses the future trends in sensor technology.

Running head: INTERNET OF THINGS
Internet of Things
Name of the Student:
Name of the University:
Author Note:
Internet of Things
Name of the Student:
Name of the University:
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1INTERNET OF THINGS
Table of Contents
Answer 1..........................................................................................................................................2
Answer 2..........................................................................................................................................4
Answer 3..........................................................................................................................................6
Answer 4..........................................................................................................................................8
Answer 5..........................................................................................................................................8
Answer 6:.......................................................................................................................................10
References......................................................................................................................................11
Table of Contents
Answer 1..........................................................................................................................................2
Answer 2..........................................................................................................................................4
Answer 3..........................................................................................................................................6
Answer 4..........................................................................................................................................8
Answer 5..........................................................................................................................................8
Answer 6:.......................................................................................................................................10
References......................................................................................................................................11

2INTERNET OF THINGS
Answer 1
The statement – the best interface for a system is no User Interface, signifies the fact that
most user interface complicates activities rather than simplifying it. Therefore, it is better to
avoid using user interface and adopt a NO UI approach to every system.
The NO UI approach can be applied to systems that use voice or other sensors to perform
their functions. A system with voice command facilities does not require any user interface let
alone a complex one. The systems that operate on other sensor-based commands like motion
sensor, gesture sensor, light sensor, acceleration sensor, gravity sensor and such, functions much
more efficiently than the standard tap and swipe options in a visual user interface (Johnson,
2013).
The adoption of NO UI approach is best suited for the disabled or handicapped people,
especially the people who have vision impairment or are blind. In the case of such people visual
user interface is not a viable option for operating a system. A blind individual can use either
voice commands or gestures as a command to operate a system. The examples provided below
will support the fact (Johnson, 2013).
The voice command software or Cortana implemented into the Windows Operating
System by Microsoft Corporation is an appropriate example of a NO UI system (Barga, Fontama
& Tok, 2015). A blind person can use Cortana for any information using the voice command and
the software provides the search result verbally. Hence, the requirement for a visual UI is
obliterated.
Answer 1
The statement – the best interface for a system is no User Interface, signifies the fact that
most user interface complicates activities rather than simplifying it. Therefore, it is better to
avoid using user interface and adopt a NO UI approach to every system.
The NO UI approach can be applied to systems that use voice or other sensors to perform
their functions. A system with voice command facilities does not require any user interface let
alone a complex one. The systems that operate on other sensor-based commands like motion
sensor, gesture sensor, light sensor, acceleration sensor, gravity sensor and such, functions much
more efficiently than the standard tap and swipe options in a visual user interface (Johnson,
2013).
The adoption of NO UI approach is best suited for the disabled or handicapped people,
especially the people who have vision impairment or are blind. In the case of such people visual
user interface is not a viable option for operating a system. A blind individual can use either
voice commands or gestures as a command to operate a system. The examples provided below
will support the fact (Johnson, 2013).
The voice command software or Cortana implemented into the Windows Operating
System by Microsoft Corporation is an appropriate example of a NO UI system (Barga, Fontama
& Tok, 2015). A blind person can use Cortana for any information using the voice command and
the software provides the search result verbally. Hence, the requirement for a visual UI is
obliterated.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3INTERNET OF THINGS
The Google Now app launched by Google for smart phones also serves the same purpose
as Cortana. The user of Google Now provides voice command for its query and the app provides
the solution verbally, thereby removing the necessity for a visual interface (Paparo & Martin-
Delgado, 2012).
The Google Now app launched by Google for smart phones also serves the same purpose
as Cortana. The user of Google Now provides voice command for its query and the app provides
the solution verbally, thereby removing the necessity for a visual interface (Paparo & Martin-
Delgado, 2012).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4INTERNET OF THINGS
Answer 2
The table below shows the comparison between twisted pair, coaxial and fibre optic cable
in terms of their bandwidth, distance, interference rating, cost and security.
Twisted Pair Cable Coaxial Cable Fibre Optic Cable
Bandwidth 100 – 1000 MHz About 0.004 MHz About 20 GHZ (20K
MHz)
Distance 300 ft 1500ft 6000ft
Interference Rating High Medium Low
Cost Cheapest Medium Moderate Expensive Expensive
Security Security is Low Moderate level of
Security
Security is Very High
Table 1: Comparison between Twisted Pair, Coaxial and Fibre Optic Cable
(Source: Comer, 2015)
Three types of twisted pair cables are as given below:
CAT – 5e 100 MHz UTP is used for 100 Mbps through 1 Gbps Ethernet 1 – 100 m LAN
applications.
CAT – 6 250 MHz UTP cable provides support to 10 Gbps short length applications from 35 –
55 m, which is dependent on crosstalk environment.
CAT – 7 600 MHz is an individually STP cabling that is used for 10 Gbps 100 m Ethernet LAN
applications with better control performance in crosstalk than the CAT – 6a type (Wessemann et
al., 2015).
Three types of coaxial cable are as given below:
Answer 2
The table below shows the comparison between twisted pair, coaxial and fibre optic cable
in terms of their bandwidth, distance, interference rating, cost and security.
Twisted Pair Cable Coaxial Cable Fibre Optic Cable
Bandwidth 100 – 1000 MHz About 0.004 MHz About 20 GHZ (20K
MHz)
Distance 300 ft 1500ft 6000ft
Interference Rating High Medium Low
Cost Cheapest Medium Moderate Expensive Expensive
Security Security is Low Moderate level of
Security
Security is Very High
Table 1: Comparison between Twisted Pair, Coaxial and Fibre Optic Cable
(Source: Comer, 2015)
Three types of twisted pair cables are as given below:
CAT – 5e 100 MHz UTP is used for 100 Mbps through 1 Gbps Ethernet 1 – 100 m LAN
applications.
CAT – 6 250 MHz UTP cable provides support to 10 Gbps short length applications from 35 –
55 m, which is dependent on crosstalk environment.
CAT – 7 600 MHz is an individually STP cabling that is used for 10 Gbps 100 m Ethernet LAN
applications with better control performance in crosstalk than the CAT – 6a type (Wessemann et
al., 2015).
Three types of coaxial cable are as given below:

5INTERNET OF THINGS
RG – 6/UQ is a quad shield variant of RG – 6 that has four layers of shielding. It has an
impedance of 75 ohms.
RG – 7 has low data loss at high frequency for cables used in television, satellite and modems. It
has an impedance of 75 ohms.
RG – 8/U is used in amateur radio. The Thicknet is similar (10BASE5). It has an impedance of
50 ohms (Nordebo et al., 2013).
Three types of Fibre Optic Cables are as follows:
Multimode cable is made of a large diameter core and has multiple pathways of light medium. It
is available commonly in two core sizes: 50 micron and 62.5 micron. It is used in general
information and voice fibre applications such as attaching segments to a network that is already
in use, and in applications that are not large like alarm systems. Multimode cable cores of both
the sizes use LED or laser light medium.
Single-mode cable is made of a glass core of size 8 – 10 micron, which is small compared to the
multimode cable core. It has a single pathway of light. It provides 50 times more range than the
multimode. It is used in applications that uses bandwidth of high range and in strong network
connections that is distributed over a wide range of area.
Laser - optimised 10 Gb cable is a variant of multimode fibre optic cable that has marked fibre
optic cable of refractive index profile in each assembly. It is used in premise networking
applications that include long distances (Agrawal, 2012).
RG – 6/UQ is a quad shield variant of RG – 6 that has four layers of shielding. It has an
impedance of 75 ohms.
RG – 7 has low data loss at high frequency for cables used in television, satellite and modems. It
has an impedance of 75 ohms.
RG – 8/U is used in amateur radio. The Thicknet is similar (10BASE5). It has an impedance of
50 ohms (Nordebo et al., 2013).
Three types of Fibre Optic Cables are as follows:
Multimode cable is made of a large diameter core and has multiple pathways of light medium. It
is available commonly in two core sizes: 50 micron and 62.5 micron. It is used in general
information and voice fibre applications such as attaching segments to a network that is already
in use, and in applications that are not large like alarm systems. Multimode cable cores of both
the sizes use LED or laser light medium.
Single-mode cable is made of a glass core of size 8 – 10 micron, which is small compared to the
multimode cable core. It has a single pathway of light. It provides 50 times more range than the
multimode. It is used in applications that uses bandwidth of high range and in strong network
connections that is distributed over a wide range of area.
Laser - optimised 10 Gb cable is a variant of multimode fibre optic cable that has marked fibre
optic cable of refractive index profile in each assembly. It is used in premise networking
applications that include long distances (Agrawal, 2012).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6INTERNET OF THINGS
Answer 3
The table provided below compares IoT sensors, RFID and Video Tracking in terms of
their advantages and disadvantages (Xia et al., 2012).
Advantages Disadvantages Key Requirements
Temperature Sensors
(NTC Thermistor)
Sensitive
Accurate
Cost is Low
Flexible
Package
Rugged
Surface Mount
Hermetic Seal
Self heating
Non - linear
Moisture
Failures
It is used in simple
thermostat devices to
highly sensitive
semiconductors that can
control crucial
processes.
Proximity Sensors Accurate
Have high
switching rate
Is operational
in harsh
environmental
conditions
Can detect only
metallic target
Limited
operation range
Used in retail industries
by retailers to track
nearby customers to
send offers to mobile
phones.
Pressure Sensors High output
signal level
Low cost
Robust
technology
Can be
adapted to
many
applications
High hysteresis
Sensitive to
vibrations
Moving contact
: wear, contact
resistance
Used in touch-screen
devices, instruments
used in bio-medical
field, devices used in
automotive and
manufacturing industry
Optical Sensors Immune to
EMI
Highly
sensitive
Wider
Dynamic
Range
Passive
Small in size
and light
weight
Immune to
high
temperatures
and
Interference
from multiple
effects
Absorption
Loss
Scattering Loss
Coupler Loss
Insertion Loss
Reflection Loss
Impurity Loss
Can be used in energy,
health care, IoT
platforms, aerospace
and chemical platforms.
Answer 3
The table provided below compares IoT sensors, RFID and Video Tracking in terms of
their advantages and disadvantages (Xia et al., 2012).
Advantages Disadvantages Key Requirements
Temperature Sensors
(NTC Thermistor)
Sensitive
Accurate
Cost is Low
Flexible
Package
Rugged
Surface Mount
Hermetic Seal
Self heating
Non - linear
Moisture
Failures
It is used in simple
thermostat devices to
highly sensitive
semiconductors that can
control crucial
processes.
Proximity Sensors Accurate
Have high
switching rate
Is operational
in harsh
environmental
conditions
Can detect only
metallic target
Limited
operation range
Used in retail industries
by retailers to track
nearby customers to
send offers to mobile
phones.
Pressure Sensors High output
signal level
Low cost
Robust
technology
Can be
adapted to
many
applications
High hysteresis
Sensitive to
vibrations
Moving contact
: wear, contact
resistance
Used in touch-screen
devices, instruments
used in bio-medical
field, devices used in
automotive and
manufacturing industry
Optical Sensors Immune to
EMI
Highly
sensitive
Wider
Dynamic
Range
Passive
Small in size
and light
weight
Immune to
high
temperatures
and
Interference
from multiple
effects
Absorption
Loss
Scattering Loss
Coupler Loss
Insertion Loss
Reflection Loss
Impurity Loss
Can be used in energy,
health care, IoT
platforms, aerospace
and chemical platforms.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7INTERNET OF THINGS
chemically
reactive
environments
Can monitor a
wide range of
physical and
chemical
parameters
Provides total
electrical
insulation
from high
electrostatic
potential
RFID RFID reader
and tag does
not require
LOS for the
operation of
the system
Can store
information
Provides
location to the
Reader along
with its ID
Tags are used
for tracking
luggage as
well as
monitor health
history of
hospital
patients
Versatile
technology
Tags can be
both read only
and read/write
Costly
Insecure
privacy
Programming
requires a lot of
time
External EMI
limits the RFID
remote reading
Limited range
of 3 meters
Used in educational
institutions, businesses
and such for security,
attendance and tracking
purpose.
Video Tracking Provide visual
evidence to
crimes
Monitor
Scenarios and
Activities
Maintain
Privacy Issue
Costly
Can be easily
tampered
Video tracking can be
implemented in
domestic as well as
business purposes for
surveillance and
security.
chemically
reactive
environments
Can monitor a
wide range of
physical and
chemical
parameters
Provides total
electrical
insulation
from high
electrostatic
potential
RFID RFID reader
and tag does
not require
LOS for the
operation of
the system
Can store
information
Provides
location to the
Reader along
with its ID
Tags are used
for tracking
luggage as
well as
monitor health
history of
hospital
patients
Versatile
technology
Tags can be
both read only
and read/write
Costly
Insecure
privacy
Programming
requires a lot of
time
External EMI
limits the RFID
remote reading
Limited range
of 3 meters
Used in educational
institutions, businesses
and such for security,
attendance and tracking
purpose.
Video Tracking Provide visual
evidence to
crimes
Monitor
Scenarios and
Activities
Maintain
Privacy Issue
Costly
Can be easily
tampered
Video tracking can be
implemented in
domestic as well as
business purposes for
surveillance and
security.

8INTERNET OF THINGS
Records
Table 2: Advantages, Disadvantages and Uses of sensors, RFID and Video Tracking
(Source: Xia et al., 2012 )
Records
Table 2: Advantages, Disadvantages and Uses of sensors, RFID and Video Tracking
(Source: Xia et al., 2012 )
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9INTERNET OF THINGS
Answer 4
The security risks associated with IoT implementation that can be exploited to affect
consumers are:
By enabling unauthorised access and illegal use of personal data
Allowing attacks on other systems
Creating safety risks.
Apart from the security risks mentioned above there are certain privacy risks that are
identified with IoT implementation. It involves direct acquiring of important personal
information such as location of a user, account numbers, health information and such (Kumar &
Patel, 2014).
Answer 5
Blocking Mode:
In blocking mode, the end point originates from the operating request that will have to
wait to get a response of its request after endpoint of the requested operation has finished which
involves long or may be indefinite waiting time from the source. This is a synchronous case so
the asynchronous message will not be received by the source that means the source will have to
initiate both the information exchange between the destination and source.
Publish/Subscribe Paradigm:
It enables communication of unidirectional to more than one subscriber from a publisher.
There after the subscriber declares this interest in the category or class of the data to the
Answer 4
The security risks associated with IoT implementation that can be exploited to affect
consumers are:
By enabling unauthorised access and illegal use of personal data
Allowing attacks on other systems
Creating safety risks.
Apart from the security risks mentioned above there are certain privacy risks that are
identified with IoT implementation. It involves direct acquiring of important personal
information such as location of a user, account numbers, health information and such (Kumar &
Patel, 2014).
Answer 5
Blocking Mode:
In blocking mode, the end point originates from the operating request that will have to
wait to get a response of its request after endpoint of the requested operation has finished which
involves long or may be indefinite waiting time from the source. This is a synchronous case so
the asynchronous message will not be received by the source that means the source will have to
initiate both the information exchange between the destination and source.
Publish/Subscribe Paradigm:
It enables communication of unidirectional to more than one subscriber from a publisher.
There after the subscriber declares this interest in the category or class of the data to the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10INTERNET OF THINGS
publisher. After that when publisher has availability of new data it then pushes that message to
the interested subscribers.
Figure 1: Publish/Subscribe Paradigm
(Source: Fotiu, Trossen & Polyzos, 2012) )
Command/Response Paradigm:
Due to the overhead of the unneeded messages travelling in the reverse direction,
Response/Command response becomes suboptimal.
Figure 2: Command/Response Paradigm
(Source: Levchuk & Pattipati, 2013)
publisher. After that when publisher has availability of new data it then pushes that message to
the interested subscribers.
Figure 1: Publish/Subscribe Paradigm
(Source: Fotiu, Trossen & Polyzos, 2012) )
Command/Response Paradigm:
Due to the overhead of the unneeded messages travelling in the reverse direction,
Response/Command response becomes suboptimal.
Figure 2: Command/Response Paradigm
(Source: Levchuk & Pattipati, 2013)

11INTERNET OF THINGS
Total time saving will be 6ms in the propagation delay between the application and
sensor + 1ms in receiving that message. Total time saving is 7ms.
Answer 6:
Nielsen had stated in his Law of Internet Bandwidth that a high – end internet user’s
connection speed increments by 5o percent per year.
Moore stated in his law that the quantity of transistors per square inch on integrated
circuits (IC) is doubling each year starting from the year of invention.
The prediction of Nielsen’s law is 10 percent less than Moore’s law for computer speed.
Both the laws are made on the computing device and its network.
In around 2024 it is being expected that sensor technology will break through the “trillion
sensor” which will help in creating data streams virtually from every surrounding surfaces.
Sensors will be soon embedded inside cars, houses and even in clothing. Microchips will be
trending including skin sensors or body sensors (Zhao et al., 2013).
Total time saving will be 6ms in the propagation delay between the application and
sensor + 1ms in receiving that message. Total time saving is 7ms.
Answer 6:
Nielsen had stated in his Law of Internet Bandwidth that a high – end internet user’s
connection speed increments by 5o percent per year.
Moore stated in his law that the quantity of transistors per square inch on integrated
circuits (IC) is doubling each year starting from the year of invention.
The prediction of Nielsen’s law is 10 percent less than Moore’s law for computer speed.
Both the laws are made on the computing device and its network.
In around 2024 it is being expected that sensor technology will break through the “trillion
sensor” which will help in creating data streams virtually from every surrounding surfaces.
Sensors will be soon embedded inside cars, houses and even in clothing. Microchips will be
trending including skin sensors or body sensors (Zhao et al., 2013).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

12INTERNET OF THINGS
References
Agrawal, G. P. (2012). Fiber-optic communication systems (Vol. 222). John Wiley & Sons.
Barga, R., Fontama, V., & Tok, W. H. (2015). Cortana analytics. In Predictive Analytics with
Microsoft Azure Machine Learning (pp. 279-283). Apress.
Comer, D. (2015). Computer networks and internets. Pearson.
Fotiou, N., Trossen, D., & Polyzos, G. C. (2012). Illustrating a publish-subscribe internet
architecture. Telecommunication Systems, 1-13.
Johnson, J. (2013). Designing with the mind in mind: simple guide to understanding user
interface design guidelines. Elsevier.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues.
International Journal of Computer Applications, 90(11).
Levchuk, G., & Pattipati, K. (2013). Design of distributed command and control for
collaborative situation assessment. Proceedings of ICCRTS.
Nordebo, S., Nilsson, B., Gustafsson, S., Biro, T., Cinar, G., Gustafsson, M., ... & Sjöberg, M.
(2013). Low-frequency dispersion characteristics of a multilayered coaxial cable. Journal
of Engineering Mathematics, 83(1), 169-184.
Paparo, G. D., & Martin-Delgado, M. A. (2012). Google in a quantum network. Scientific
reports, 2, 444.
References
Agrawal, G. P. (2012). Fiber-optic communication systems (Vol. 222). John Wiley & Sons.
Barga, R., Fontama, V., & Tok, W. H. (2015). Cortana analytics. In Predictive Analytics with
Microsoft Azure Machine Learning (pp. 279-283). Apress.
Comer, D. (2015). Computer networks and internets. Pearson.
Fotiou, N., Trossen, D., & Polyzos, G. C. (2012). Illustrating a publish-subscribe internet
architecture. Telecommunication Systems, 1-13.
Johnson, J. (2013). Designing with the mind in mind: simple guide to understanding user
interface design guidelines. Elsevier.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues.
International Journal of Computer Applications, 90(11).
Levchuk, G., & Pattipati, K. (2013). Design of distributed command and control for
collaborative situation assessment. Proceedings of ICCRTS.
Nordebo, S., Nilsson, B., Gustafsson, S., Biro, T., Cinar, G., Gustafsson, M., ... & Sjöberg, M.
(2013). Low-frequency dispersion characteristics of a multilayered coaxial cable. Journal
of Engineering Mathematics, 83(1), 169-184.
Paparo, G. D., & Martin-Delgado, M. A. (2012). Google in a quantum network. Scientific
reports, 2, 444.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13INTERNET OF THINGS
Wesemann, D., Dünnermann, J., Schaller, M., Banick, N., & Witte, S. (2015, May). Less wires
—A novel approach on combined power and ethernet transmission on a single,
unshielded twisted pair cable. In Factory Communication Systems (WFCS), 2015 IEEE
World Conference on (pp. 1-4). IEEE.
Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of
Communication Systems, 25(9), 1101.
Zhao, R., Fischer, W., Aker, E., & Rigby, P. (2013). White Paper: Broadband Access
Technologies. A White Paper by the Deployment & Operations Committee.
Wesemann, D., Dünnermann, J., Schaller, M., Banick, N., & Witte, S. (2015, May). Less wires
—A novel approach on combined power and ethernet transmission on a single,
unshielded twisted pair cable. In Factory Communication Systems (WFCS), 2015 IEEE
World Conference on (pp. 1-4). IEEE.
Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of
Communication Systems, 25(9), 1101.
Zhao, R., Fischer, W., Aker, E., & Rigby, P. (2013). White Paper: Broadband Access
Technologies. A White Paper by the Deployment & Operations Committee.
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.