ELEC4740 Internet of Things And Information Technology
Questions:
Task
Q1) What does the statement "the best interface for a system is no User Interface"? When might this apply and provide two examples.
Q2) Compare the bandwidth, distance, interference rating, cost and security of a) twisted pair cable, b) coaxial cable and 3) fibre optic cable. Use current data, give specific details for at least 3 types of cable within each category, these should have different specifications, rather than simply different brands of the same type.
Q3) The three common ways to obtain information from IoT devices are sensors, RFID and Video tracking. Compare the three technologies by addressing the advantages, disadvantages, key requirements for the things. Provide two applications of each (these applications should NOT be sourced from the textbook). You may use a table to present the material if you wish.
Q4) Discuss the issues associated with security and privacy in the context of the Internet of Things.
Q5) An IoT water level monitoring application requires updates from a sensor periodically, using the command/response paradigm. The application triggers a request every 1 s. The round-trip propagation delay between the application and the sensor is 12 ms. On average the sensor consumes 3 ms to process each request. The application consumes 2 ms to send or receive any message. If the application blocks on every request to the sensor, how much of its time budget can be saved by redesigning the application to use the publish/subscribe communication model in lieu of the command/response approach?
Q6) Describe Nielson's Law. How does it relate to Moore's Law? What are the implications for the Internet of Thing?Answers:
Question 1:
The current era of globalization and technological advancement has necessitated several creative minds using technology to solve problems rather than just developing user interfaces. The reason why best interface is identified as no interface is because interfaces create major barriers. The elimination of interfaces is identified as a principle for embracing the natural processes (Doody, 2011). This was significantly addressed to reframe the constraints in its design from resolving its iPhone app as per the natural course of actions. For this purpose, Mercedes considered the creation of a wonderfully elegant and incredibly intuitive entry of the car. The car is able to sense the key if it is close-by and the door will open in the absence of any additional work as a good thinking of technology design. In the absence of interface, big companies like Google are establishing better competitive edge as they establish direct platforms for the users or the customers (Atzori et al., 2010). The absence of interface also helps in simplifying the overall procedures followed by organizations in management and monitoring.
Question 2:
Twisted Pair Cable
Bandwidth
At level 1 and level 2 of twisted pair cable, the bandwidth is 0.4 MHz and 4 MHz, respectively.
Distance
Given the uniform interfering source throughout the distance covered in a single twist, there will be a common mode for the induced noise.
Interference Rating
Two conductors are twisted together in one circuit to cancel out any electromagnetic interference through the consideration of external sources and crosstalk among connected pairs (Aggarwal et al., 2013).
Cost
There is preferable use of twisted pair cable in networks of data for medium and short connections due to the considerably low costs in comparison with coaxial cable and optical fiber.
Security
Twisted pair cable is specifically used for video applications with improved bandwidth aligned with the baseband of signals in television (Aggarwal et al., 2013).
Coaxial Cable
Bandwidth
The bandwidth of a single coaxial cable is 6MHz.
Distance
Different signals reduce the scope of electromagnetic radiation for maintaining more distance among exchanges.
Interference Rating
There are various external factors that interfere with the connection of coaxial cable.
Cost
The cost of coaxial cable is higher than that of twisted pair cable but lower than that of fibre optic cable (Atzori et al., 2010).
Security
Security can be improved in this cable by limiting the deployment of amplifiers and higher bandwidth.
Fibre Optic Cable
Bandwidth
The minimum bandwidth of fibre optic cable is 500 MHz.
Distance
Fibre optic cable of minimum bandwidth can carry signal of 500 MHz for a distance of 1 km.
Interference Rating
There is most preference for fibre optic cable due to its higher bandwidth, increased immunity from electromagnetic interference and long distance (Doody, 2011).
Cost
There is more cost effectiveness involved in fibre optic cable in comparison with copper cables.
Security
Due to no electromagnetic radiation and difficulty in tapping without signal disruption, the cable is significant in environments of high security.
Question 3:
Factors of Comparison |
Sensors |
RFID |
Video Tracking |
Advantages |
These allow the extension of system from basic functions to the ones receiving and acting upon data in the environment. These are considerably cheap if there is use of their wired versions (Stankovic, 2014). |
RFID has the ability of scanning tag if it is within the range of frequency without any limitations on line-of-sight. There is also ability of scanning several items simultaneously with every tag containing maximum information (Roman et al., 2011). |
This allows the location of multiple moving objects by a camera. This provides techniques of object recognition to track a possible issue in logistics. |
Disadvantages |
Careful decision making is required by the users as they will be monitored all the time creating distrust in technology (Roman et al., 2011). |
The set-up and maintenance of RFID is comparatively expensive in comparison with optical scanning. There can also be barriers in the RFID scanning (Botta et al., 2016). |
It is an extremely time consuming process as it consists of large amount of data. |
Key Requirements |
Installation of additional wiring Cross-layer designing |
Fulfillment of privacy statutes as per restricted activities Authority of the devices |
Analysis of sequential video frames from algorithm Consideration of target localization and representation algorithms |
Applications |
1. Applications in parameters to monitor the environment 2. Deployment in cities for monitoring the level of dangerous gases |
1. Scanning tags optimally to avoid manual operations 2. Cashless payments possible in cases of theme parks, venues and festivals. |
1. Surveillance and security 2. Video compression and communication |
Question 4:
The issue of security and privacy in IoT is a major concern to specialists of information technology. As a result of increased connectivity, there is establishment of data as per a connected object. As data is created, it is also collected while recognizing valuable data. Followed by the full implementation of IoT, the volume and variety of available potentially private or personal information to other users is huge. As a result, significant risks are posed to users with hackers trying to seek and use the confidential information (Roman et al., 2013). Some specific issues are related to interoperability and standardization.
Question 5:
There can be savings in time budget by the addition of methods or command over the main protocol or with specific additions in accordance with the overall implementation. Acting as a significant application for indicating middleware urgency for the communication of data, there can be a non-zero saving of time budget for the optimization of operations internally.
Question 6:
In terms of broadband connectivity, Nielsen’s law tends to be lagging the concepts of Moore’s law to process computer for specifically surprising causes. According to the Nielsen’s law, there are three main reasons due to which bandwidth of maximum internet users is increasing at a slow rate in comparison with the performance of computer processing. These reasons are: 1) conservative nature of telecoms companies, 2) reluctance of users for investing more on bandwidth, and 3) increasingly broad base of user (Sundmaeker et al., 2010). Similar to Moore’s law, this law acts as a measure with respect to competitive capabilities. The design gap is specifically acknowledged as it exists in all of the transistors available across competitive process nodes while addressing availability of maximum speeds for high end users.
References
Aggarwal, C. C., Ashish, N., & Sheth, A. (2013). The internet of things: A survey from the data-centric perspective. In Managing and mining sensor data (pp. 383-428). Springer US.
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Doody, P. (2011). Internet of things strategic research roadmap. Internet of Things-Global Technological and Societal Trends, 1, 9-52.
Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 44(9), 51-58.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3-9.
Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision, 3(3), 34-36.
Buy ELEC4740 Internet of Things And Information Technology Answers Online
Talk to our expert to get the help with ELEC4740 Internet of Things And Information Technology Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.