Analysis of IoT Technologies, Security, and Design Principles
VerifiedAdded on 2020/03/04
|10
|2449
|36
Homework Assignment
AI Summary
This assignment delves into various aspects of the Internet of Things (IoT). It begins by exploring the concept of "No User Interface" design, contrasting Voice User Interfaces (VUIs) with Graphical User Interfaces (GUIs), and examining the principles behind designing systems without a traditional user interface. The assignment then compares different communication cables (twisted pair, coaxial, and fiber optic) based on bandwidth, security, and cost. Furthermore, it analyzes different technologies such as Radio Frequency Identification (RFID), sensors, and video tracking, outlining their advantages, disadvantages, key requirements, and applications. The assignment also discusses the importance of implementing realistic security measures in IoT products, including risk assessment, data minimization, employee training, and lifecycle monitoring. It covers potential privacy and security risks, such as unauthorized access and misuse of personal information. The assignment then explains different communication paradigms in IoT, including blocking mode, publish/subscribe, and command/response. Finally, it examines Jacob Nielsen's 10 usability heuristics and Moore's Law, discussing their impact on user interface design and technological advancements, respectively.

iNTERNET OF THINGS
NAME:
COURSE:
DATE:
AUGUST 22, 2017
NAME:
COURSE:
DATE:
AUGUST 22, 2017
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
Question 1...................................................................................................................................2
Question 2...................................................................................................................................3
Question 3...................................................................................................................................4
Question 4...................................................................................................................................8
Question 5...................................................................................................................................9
Question 6...................................................................................................................................9
References.................................................................................................................................11
Question 1...................................................................................................................................2
Question 2...................................................................................................................................3
Question 3...................................................................................................................................4
Question 4...................................................................................................................................8
Question 5...................................................................................................................................9
Question 6...................................................................................................................................9
References.................................................................................................................................11

Question 1
Embracing of no user interface have been the case in the modern world where people or users
considers the systems with the best interface are those that uses no user interface. The
statement above has been advanced in that voice user interface (VUIs) is best as the system
interface compared to graphical user interface (GUI). Interacting with each other is very
different from the way we interact with graphic interfaces. The idea here is embracing the No
user interface as described by((josh.ai, 2016)where he talks of thinking of how to design
without any thought of user interface in mind.
There are some principles meant for designing No user interface for embracing typical
process: The example of Locking and unlocking a car. The guidelines is one have to walk the
where the ca is then retrieve the car keys from the pocket, then push the unlock button and
lastly you open the car. The step two and three in opening the car lock can be put together
using a digital interface as follows.
From the figure below you realize that the app from the phone that is used in controlling the
locks is digital interface but sometimes it may break or go obsolete or sometimes one may
forget a phone. This leads to us coming up with solution whereby we conclude by saying that
Embracing of no user interface have been the case in the modern world where people or users
considers the systems with the best interface are those that uses no user interface. The
statement above has been advanced in that voice user interface (VUIs) is best as the system
interface compared to graphical user interface (GUI). Interacting with each other is very
different from the way we interact with graphic interfaces. The idea here is embracing the No
user interface as described by((josh.ai, 2016)where he talks of thinking of how to design
without any thought of user interface in mind.
There are some principles meant for designing No user interface for embracing typical
process: The example of Locking and unlocking a car. The guidelines is one have to walk the
where the ca is then retrieve the car keys from the pocket, then push the unlock button and
lastly you open the car. The step two and three in opening the car lock can be put together
using a digital interface as follows.
From the figure below you realize that the app from the phone that is used in controlling the
locks is digital interface but sometimes it may break or go obsolete or sometimes one may
forget a phone. This leads to us coming up with solution whereby we conclude by saying that

the best interface is the no user interface and if there is then it should not be complicated than
when there is no user interface.
Question 2
TWISTED PAIR CABLE COAXIAL CABLE FIBRE OPTIC CABLE
It provides the least
bandwidth of about 1.5mb/s
for a distance of 2.5 km for
about 24 voice channels
compared with fibre optic
Coaxial cable are meant for
transmitting signals
especially for cctv cameras
especially for receiving
audios and videos and also
in sending signals to tvs .
It provides more bandwidth than
either of the two that is up to
10Gbps and even beyond.It can
transmit to almost 200km with a
bandwidth of 2.5Gbps for over
32,000.The attenuation of fiber
doesn’t change as bandwidth
increases or decreases.
It is less secure as it can be
tapped without the breakage
of the whole system. It is the
poorest in security while
sending large amount of data
like audio and videos.
Considering it less
attenuation loss of about 3%
it is more secure than
twisted pair especially when
sending Large data files
Fibre is the most secure as it is
made out of glass and the only
way to break it is by breaking it
and which will go make the
whole system go down. The
attenuation of fiber doesn’t
change as bandwidth increases or
decreases.
It is the cheapest and mostly
used in small organizations
as its installation
It is more expensive
compared than coaxial cable
since of the content of
It is less expensive but the cost of
electronics that it requires during
installation make it the most
when there is no user interface.
Question 2
TWISTED PAIR CABLE COAXIAL CABLE FIBRE OPTIC CABLE
It provides the least
bandwidth of about 1.5mb/s
for a distance of 2.5 km for
about 24 voice channels
compared with fibre optic
Coaxial cable are meant for
transmitting signals
especially for cctv cameras
especially for receiving
audios and videos and also
in sending signals to tvs .
It provides more bandwidth than
either of the two that is up to
10Gbps and even beyond.It can
transmit to almost 200km with a
bandwidth of 2.5Gbps for over
32,000.The attenuation of fiber
doesn’t change as bandwidth
increases or decreases.
It is less secure as it can be
tapped without the breakage
of the whole system. It is the
poorest in security while
sending large amount of data
like audio and videos.
Considering it less
attenuation loss of about 3%
it is more secure than
twisted pair especially when
sending Large data files
Fibre is the most secure as it is
made out of glass and the only
way to break it is by breaking it
and which will go make the
whole system go down. The
attenuation of fiber doesn’t
change as bandwidth increases or
decreases.
It is the cheapest and mostly
used in small organizations
as its installation
It is more expensive
compared than coaxial cable
since of the content of
It is less expensive but the cost of
electronics that it requires during
installation make it the most
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

equipment’s are cheap and it
is easy to maintain.
coaxial copper cable and due
to highly coating hence
making it more expensive.
expensive compared to the
others.
It covers a distance of up to
2.5 km
It can cover a distance of up
to 100m
It can cover a distance of up to
200 km
The interference rating is
very high as traffic is normal
and because tapping the
network is easy hence
increasing the rate of
interference.
The interference rating is not
as high for twisted cable
since it might be hand to tap.
Very rare case of interference but
when they occur they are vital as
they break the whole system.
Question 3
TASKS RADIO
FREQUENCY
IDENTIFICATION
SENSORS VIDEO TRACKING
ADVANTAGES -A Unique Easy way
of in identifying is
easy when
implementing with
RFID
-there is
simultaneously
reading of tags
- combination of RFID
-The Limit Switch
sensors have High
Current Capability and
have a cost which is
Low.
-photoelectric sensors
sense all kinds of
materials and have a
long life with a very
- Comprehensive data be
tracked and all footage
with seconds can be
followed
-It intensified in the
manner that it can give all
the required information as
far as it was tracked and
is easy to maintain.
coaxial copper cable and due
to highly coating hence
making it more expensive.
expensive compared to the
others.
It covers a distance of up to
2.5 km
It can cover a distance of up
to 100m
It can cover a distance of up to
200 km
The interference rating is
very high as traffic is normal
and because tapping the
network is easy hence
increasing the rate of
interference.
The interference rating is not
as high for twisted cable
since it might be hand to tap.
Very rare case of interference but
when they occur they are vital as
they break the whole system.
Question 3
TASKS RADIO
FREQUENCY
IDENTIFICATION
SENSORS VIDEO TRACKING
ADVANTAGES -A Unique Easy way
of in identifying is
easy when
implementing with
RFID
-there is
simultaneously
reading of tags
- combination of RFID
-The Limit Switch
sensors have High
Current Capability and
have a cost which is
Low.
-photoelectric sensors
sense all kinds of
materials and have a
long life with a very
- Comprehensive data be
tracked and all footage
with seconds can be
followed
-It intensified in the
manner that it can give all
the required information as
far as it was tracked and

tags with sensors
-tags used ion RFID
their sensitivity is less
in adverse conditions
-storage of very large
amounts by rfid tags
as an additional
specification to
identifier that is
unique
-it’s can identify most
items generally as well
as individually.
fast response time(A.
Dunkels, 2007).
-sensors such as
inductive sensors are
resistant to
environments that are
very harsh
recorded.
-It is not easy to
manipulate it like in other
cases with photos.
-It gives assurelity that
there is enough security as
everything can be tracked
eg Video track for trucks
that goes for long journeys.
DISADVANTAGES -manufacture of tags is
not yet 100% error
free.
-tags may be damaged
also during their usage
which may lead to a
read failure and which
may not be detected.
-it may be affected by
viruses such as
slammer virus that
-sensors requires the
physical contact with
the intruder.
-Sometimes slow
response are
experienced in limit
switch sensors
-the range of
sensitivity is affected
by some colours and
the target reflections
-Itrequires a lot of storage
as it is huge in amount of
what to be stored.
-it is expensive to install
them in different gadgets
-It need some expertise to
people who are skilled the
video tracking knowledge.
-tags used ion RFID
their sensitivity is less
in adverse conditions
-storage of very large
amounts by rfid tags
as an additional
specification to
identifier that is
unique
-it’s can identify most
items generally as well
as individually.
fast response time(A.
Dunkels, 2007).
-sensors such as
inductive sensors are
resistant to
environments that are
very harsh
recorded.
-It is not easy to
manipulate it like in other
cases with photos.
-It gives assurelity that
there is enough security as
everything can be tracked
eg Video track for trucks
that goes for long journeys.
DISADVANTAGES -manufacture of tags is
not yet 100% error
free.
-tags may be damaged
also during their usage
which may lead to a
read failure and which
may not be detected.
-it may be affected by
viruses such as
slammer virus that
-sensors requires the
physical contact with
the intruder.
-Sometimes slow
response are
experienced in limit
switch sensors
-the range of
sensitivity is affected
by some colours and
the target reflections
-Itrequires a lot of storage
as it is huge in amount of
what to be stored.
-it is expensive to install
them in different gadgets
-It need some expertise to
people who are skilled the
video tracking knowledge.

attack the sql systems.
-Rapid growth of
technology hence
making application of
it obsolete with a very
short time hence
becoming outdated for
a short time due to
updates.
-sometimes the
distance may affect
sensing
-ultrasonic sensors is
very sensitive to
changes in
temperature.
KEY
REQUIREMENTS
-Power
-Automatic
identification
-Unique identity
-reliability
requirements
-automated driving
-strictest safety
requirements
-
-public or the private
access
-work flow should be
customizable
-ease of use and
capabilities of multi user.
-
APPLICATION -It is used for
identifying instances
where a db. is
maintained in the
background to provide
or receive information
needed. It is applied
Applied in
1.Basic End of travel
sensing
2.material handling
and parts detection
3.Level sensing
It is applied in.
-Tracking cargo trucks that
go for long distances.
-for surveilling of animal
in game reserves.
-For tracking events in
games as the happen like
-Rapid growth of
technology hence
making application of
it obsolete with a very
short time hence
becoming outdated for
a short time due to
updates.
-sometimes the
distance may affect
sensing
-ultrasonic sensors is
very sensitive to
changes in
temperature.
KEY
REQUIREMENTS
-Power
-Automatic
identification
-Unique identity
-reliability
requirements
-automated driving
-strictest safety
requirements
-
-public or the private
access
-work flow should be
customizable
-ease of use and
capabilities of multi user.
-
APPLICATION -It is used for
identifying instances
where a db. is
maintained in the
background to provide
or receive information
needed. It is applied
Applied in
1.Basic End of travel
sensing
2.material handling
and parts detection
3.Level sensing
It is applied in.
-Tracking cargo trucks that
go for long distances.
-for surveilling of animal
in game reserves.
-For tracking events in
games as the happen like
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

by organization that
provides logistics
solution are such us
UPS, FedEx and
USPS
-It is applied in port as
technology meant for
automatic collection of
data
-Other application of
RFID in
manufacturing and
distribution where in
picking and system for
sorting in the
warehouse.
-manufacturing
control, customer
service management,
inspection and
compliance validation
and logistics.
football matches.
provides logistics
solution are such us
UPS, FedEx and
USPS
-It is applied in port as
technology meant for
automatic collection of
data
-Other application of
RFID in
manufacturing and
distribution where in
picking and system for
sorting in the
warehouse.
-manufacturing
control, customer
service management,
inspection and
compliance validation
and logistics.
football matches.

Question 4.
An agreement has been put in place that companies that manufactures the IOT products
should be implemented with a realistic security(K. Ashton, 2009). This sensible security
highly depends on the number of factors, how data is sensitive and the cost of alleviating
vulnerability of the security. As part in producing and manufacturing this IOT the company
should implement design process for security as follows. (1.) The firm should conduct an
assessment for security risk. (2.) Retaining and minimizing the data gathered. Secondly the
company should offer training to its employee in making this sensible and reasonable
security.The company should be monitoring the IOT all through their life cycle and hence
identifying the patches that may make the IOT products vulnerable(IoT Definitions, 2016).
Some of the IoT devices may presents potential privacy and security risks that could be
implemented and bring harm to the consumers. Some of the risk of security that can bring
harm are (1) enablement of access that is not authorized (2) personal information misuse. (3)
facilitation of been attacked by other systems (4.) Safety risks for security must be created.
Privacy risks flowing must be identified in the IoT as they act as an addition to risks of
security. The risks involved in privacy maybe direct collection of personal information that is
sensitive, account numbers in finance, commerce through the mobile etc. Some of the privacy
and security risks are perceived that they may not be realized, may also undermine the
confidence of the consumer that necessitate the technologies to meet the objectives. “As one
participant stated, “promoting privacy and data protection principles remains paramount to
ensure societalacceptance of IoT services.”
Question 5
Blocking Mode: It has been identified that in blocking mode, end point generated from the
operating request of mechanism. Therefore, the response generated based in the request which
An agreement has been put in place that companies that manufactures the IOT products
should be implemented with a realistic security(K. Ashton, 2009). This sensible security
highly depends on the number of factors, how data is sensitive and the cost of alleviating
vulnerability of the security. As part in producing and manufacturing this IOT the company
should implement design process for security as follows. (1.) The firm should conduct an
assessment for security risk. (2.) Retaining and minimizing the data gathered. Secondly the
company should offer training to its employee in making this sensible and reasonable
security.The company should be monitoring the IOT all through their life cycle and hence
identifying the patches that may make the IOT products vulnerable(IoT Definitions, 2016).
Some of the IoT devices may presents potential privacy and security risks that could be
implemented and bring harm to the consumers. Some of the risk of security that can bring
harm are (1) enablement of access that is not authorized (2) personal information misuse. (3)
facilitation of been attacked by other systems (4.) Safety risks for security must be created.
Privacy risks flowing must be identified in the IoT as they act as an addition to risks of
security. The risks involved in privacy maybe direct collection of personal information that is
sensitive, account numbers in finance, commerce through the mobile etc. Some of the privacy
and security risks are perceived that they may not be realized, may also undermine the
confidence of the consumer that necessitate the technologies to meet the objectives. “As one
participant stated, “promoting privacy and data protection principles remains paramount to
ensure societalacceptance of IoT services.”
Question 5
Blocking Mode: It has been identified that in blocking mode, end point generated from the
operating request of mechanism. Therefore, the response generated based in the request which

is after endpoint. It is also involved long time and sometimes the response is getting let or
taking time gor originating from the operating sources. This is called synchronous case.
However, in this mode of operation, asynchronous message can not be generated or received
by any end point. This process also does not support any information exchange procedure
between the two sources.
Subscribe/Publish paradigm: Fotiu, Trossen and Polyzos, (2012) opined that
publish/subscribe paradigm is the method of information exchange where it enable the all
channels of communication including unidirectional to more subscriber from a publisher.
Here, the subscriber declare the category interest or the data class for any communication to
publisher. Therefore, when the publisher has ability to generate new message or data,
subscriber pushes that message to the subscriber that interested (Levchuk & Pattipati, 2013).
Command or Response Paradigm: It is to be noted that, for overhead of the un-necessary
messages, the response travelling to the reverse direction. Hence, the response become
suboptimal for response/command. Therefore, according to the case study the total time
saving will be 7ms (1ms in receiving message + 6ms in propagation delay between the sensor
and application)
Question 6
Jacob Nielsen law is explained as principles referred to as the “10 usability heuristics for user
interface design” which were released by early 1994.The principles that brings in the law are
as follows(FTW, 2013): (1) The user should be informed by the system to what is going on by
the system giving time appropriate feedback with a given time that is realistic. (2)The system
should be compatible with the user language and there should be some matching on the real
world and the system itself that is in use. (3) it should allow one to redo and undo.
taking time gor originating from the operating sources. This is called synchronous case.
However, in this mode of operation, asynchronous message can not be generated or received
by any end point. This process also does not support any information exchange procedure
between the two sources.
Subscribe/Publish paradigm: Fotiu, Trossen and Polyzos, (2012) opined that
publish/subscribe paradigm is the method of information exchange where it enable the all
channels of communication including unidirectional to more subscriber from a publisher.
Here, the subscriber declare the category interest or the data class for any communication to
publisher. Therefore, when the publisher has ability to generate new message or data,
subscriber pushes that message to the subscriber that interested (Levchuk & Pattipati, 2013).
Command or Response Paradigm: It is to be noted that, for overhead of the un-necessary
messages, the response travelling to the reverse direction. Hence, the response become
suboptimal for response/command. Therefore, according to the case study the total time
saving will be 7ms (1ms in receiving message + 6ms in propagation delay between the sensor
and application)
Question 6
Jacob Nielsen law is explained as principles referred to as the “10 usability heuristics for user
interface design” which were released by early 1994.The principles that brings in the law are
as follows(FTW, 2013): (1) The user should be informed by the system to what is going on by
the system giving time appropriate feedback with a given time that is realistic. (2)The system
should be compatible with the user language and there should be some matching on the real
world and the system itself that is in use. (3) it should allow one to redo and undo.
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.