Wednesday, May 6, 2020
Internet of things & Computer Networks-Free-Samples for Students
Questions: 1.What does the statement "the best interface for a system is no User Interface"? 2.Compare the bandwidth, distance, interference rating, cost and security of a) twisted pair cable, b) coaxial cable and 3) fibre optic cable. 3.Compare the three technologies by addressing the advantages, disadvantages, key requirements for the things. 4.Discuss the issues associated with security and privacy in the context of the Internet of Things. 5.How much of its time budget can be saved by redesigning the application to use the publish/subscribe communication model in lieu of the command/response approach? 6.Describe Nielson's Law. How does it relate to Moore's Law? What are the implications for the Internet of Thing? Answers: 1.The best or most efficient interface for a system is no or negligible user interface because, with the involvement of UI, people are faced with counterintuitive interaction procedures that are tailored to the necessity of a computer. Therefore, people are compelled to navigate variable and complex databases to obtain even the simple information. For example, making payment for food using Smartphone app, a user has to undergo a multiple steps such as taking his phone out, unlocking the screen, entering the password, and logging into the bank app and undergo a number of steps to make the payment finally. However, with the elimination of the involvement of interface, the user can peacefully eat his food without worrying about the UI and can pursue his/ her natural course of action. Another example can be, use of a Smartphone UI to unlock a car, which also includes a number of steps such as unlocking the phone entering the password, signing onto the app and so on instead of just simply walking to the car and unlocking the door, which is much more simple and easier. Therefore, it can be concluded that the best interface of a system is no interface (Choi Lee, 2012). 2.The comparison among the bandwidth, distance, interface rating, cost and security are elaborated in the following table (No, 2016)- Bandwidth Distance Interface rating Cost Security Twisted pair Types 16-100 MHz (Acatauassu et al.,.2013) Short distance Low noise cancelation high Secure Coaxial cable 4000 Hz Medium distance Higher compared to twisted cable medium Secure Fibre optic 500 MHz considerable large distance Highest interface rating low Less secure Types of twisted pair cable Unshielded Twisted Pair (UTP) Cable Shielded Twisted Pair (STP) Cable LAN Cable Types of Coaxial cable RG-6/UQ RG-8/U RG 7 Types fibre optic Ethernet cabling Interconnecting cabling Networking cabling 3. Sensors RFID Video tracking Advantages 1) Capable of quickly gathering and recording the data 2) can displays graphs and details of data in real time 1) Radio Frequency identification number can wireless scan a tag to collect information (Ajami Carter, 2013) 2) Offers very high speeds as it can scan tags in milliseconds 3) Cost is generally low 1) Offers real time monitoring of data 2) helps in keeping track of people or objects 3) Modern video tracking enables video analysis as well Disadvantages 1) Distance limitation 2) slow response (Ripka Tipek, 2013) 1) Expensive in comparison of bar-coding system 2) Needs extensive training for use 1) Expensive system 2) depends on area of application Key requirements 1) microcontroller 2) transceiver 3) external memory 4) power source 1) Antenna 2) Transceiver 3) Transponder 1) Video camera 2) transceiver 3) external memory Application 1) In speed sensing 2) In temperature sensing 1) to tag items in stores 2) in animal identification by implanting RFID track 1) In stores to keep track of customers 2) roads to keep track of vehicles and so on 4.Issues that creep in with security and privacy of internet of things are as follows- 1) The system is very vulnerable to hacking and therefore has privacy issues 2) The distributed interconnected devices in IOT are capable of obtaining personal data and can be a problem in case details regarding money transfer (Sicari et al., 2015). 3) The security is weak as a large number of devices are connected together. 5.The application triggers a request every 1s (given) The round-trip propagation delay between the application and the sensor is 12ms (given) On average the sensor consumes 3ms to process each request (given). The application consumes 2ms to send or receive any message (given) Hence, the total time used by the application is 1+ 12 + 3 + 2 ms = 18 ms. Therefore, if the application blocks all the requests the application would be saving 18 ms for the system. Thus, the designed application would be more efficient than the current model. 6.Nielsens law states that users bandwidth grown 50% per year. Therefore, the high end of user connection speed also grown by 50% per year. Nielsens law is similar to Moores law. Moores law states that computers can double its capability in every 18 months, which corresponds to a growth of 60% annually. The data is similar to Nielsens but 10 % less (Cavin, Lugli Zhirnov, 2012). Implication of internet of things is that IOT deals with connection of devices that works together. According to Nielsen and Moores law, the performance of these devices increases by 50% a year. References Acatauassu, D., Ho?st, S., Lu, C., Berg, M., Klautau, A., Borjesson, P. O. (2013, December). Simple and causal twisted-pair channel models for G. fast systems. In Global Communications Conference (GLOBECOM), 2013 IEEE (pp. 2834-2839). IEEE. Ajami, S., Carter, M. W. (2013). The advantages and disadvantages of Radio Frequency Identification (RFID) in Health-care Centers; approach in Emergency Room (ER) Cavin, R. K., Lugli, P., Zhirnov, V. V. (2012). Science and engineering beyond Moore's law. Proceedings of the IEEE, 100(Special Centennial Issue), 1720-1749. Choi, J. H., Lee, H. J. (2012). Facets of simplicity for the smartphone interface: A structural model. International Journal of Human-Computer Studies, 70(2), 129-142. No, R. (2016). Introduction. In Essentials of Modern Optical Fiber Communication (pp. 1-2). Springer Berlin Heidelberg. Ripka, P., Tipek, A. (Eds.). (2013). Modern sensors handbook. John Wiley Sons. Sicari, S., Rizzardi, A., Grieco, L. A., Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.