1.User experience (UX) or human-to-machine cooperation is exceptionally critical for the achievement of IoT. The main focus of IoT UX rule is meeting the fundamental requirements for the utilization of an item or an administration without disturbance or trouble. Overengineering or including excessively insight into items can blowback and be counterproductive. UIs that are frustrating to utilize and ease back to separate significant data can prompt client abandonment. Eg: A toaster exists to make toast. In any case, if we overengineer with a lot of data, switches and alternatives, we make building items that are annoying to the point that our clients won't have any desire to utilize them. Usability is considered as the best prerequisite for any electronic framework. Eg: Apple's iPhone versus rival devices with a similar usefulness. Clients will pay more for simple to utilize devices, and sensors are no exemptions. Consequently, the best UI is "no UI" when sensors are required to work without anyone else's input once they are associated. (Rayes, A. & Salam, S., 2017).
2.Twisting Pair Cable - Twisted pair cable can be used for communications in telephone as well as in Ethernet networks. A couple of wires frames a circuit that can transmit information. The sets are twisted to give the protection against crosstalk, the commotion produced by adjoining sets. When there is flow of current in the wire, a small magnetic field is created in the wire. When two wires are put very close to each other, their attractive fields are the correct inverse of each other. Hence, these magnetic field cancel each other. Utilizing cancelation together with twisting wires, link designers can successfully give self-protecting to wire pairs inside the network system. The speed and throughput of twisted pair cables ranges from 10 – 1000 Mbps. The distance between node and hub can be approximately 100 meters to 328 feet. Exposed cabling can be dangerous, so it is covered with protected material. The protected cable would be resistant to any electrical attractive obstruction created from the power link situated in a similar pathway. Being nominal cost, it is being used to great extent.
Eg: Common types of Unshielded Twist Pair (UTP) are:
Category1 – It is used for telephone communication but not good for transmitting data.
Category2 – It is used to transmit data with a speed of 4Mbps.
Category3 – It is used in 10BASE –T networks. Its bandwidth is 10Mbps. (Cisco Systems, Inc., 2003).
Coaxial Cable - Coaxial cable seems to be like the link used to deliver the TV signals. A strong center copper wire keeps running down the center of the link. Around that strong center copper wire is a layer of protection, and covering that protection is metal thwart, which shields against electromagnetic interference. A last layer of protection covers the plaited wire. The transmission capacity for coaxial cable is 10 Mbps. The most extreme length of cable is 2 feet or less. Its price range from $30 to $50 for 300 meters.
Hard Line Coaxial cable – It is used for high signal strength applications having radio transmitters. It is mainly preferred for heavy signal transmission due to its thickness.
RG-6 Coaxial Cables – It is used for high definition signals like cable TV or any other signal. (Thomas, J., 2017).
Thick coaxial cables - Thick coaxial link is also known as thicknet. 10Base5 alludes to the details for thick coaxial link that delivers Ethernet signals. The 5 alludes to the greatest fragment length being 500 meters. Thick coaxial link has an additional shielded plastic cover that helps keep dampness far from the inside conductor. This settles on thick coaxial an incredible decision when running longer lengths in a linear bus network. One weakness of thick coaxial is that it doesn't twist effortlessly and is hard to install. (Dr. Winkelman, R., 2013).
Fiber Optic Cable - Fiber optic cable deliver communication signals utilizing pulses of light produced by small lasers or light-emanating diodes (LEDs). Fiber links evaluated at 10 Gbps, 40 Gbps and even 100 Gbps are standard. Fiber is less vulnerable to impedance. A customary system link requires exceptional protecting to protect it from electromagnetic obstruction. While this protecting causes, it is not adequate to counteract impedance when many links are hung together in closeness to each other. It cost $6 per feet. (Mitchell, B., 2017).
Single Fiber Optic Cable - Single Mode link is a single stand (most applications utilize 2 fibers) of glass fiber with a distance across of 8.3 to 10 microns that has one method of transmission. Single Modem fiber is utilized as a part of numerous applications where information is sent at multi-frequency (WDM Wave-Division-Multiplexing) so just a single link is required. Single-mode fiber gives a higher distance than multimode, yet it additionally costs more.
Multi-Mode Cable - Multi-Mode link has small diameter with a typical diameter in the 50-to-100 micron for the light carry component (in the US the most widely recognized size is 62.5um). Multimode fiber gives you high transfer speed of 10 to 100MBS - Gigabit to 275m to 2km over medium distance. Light waves are scattered into various ways, or modes, as they go through the link normally 850 or 1300nm. Multimode fiber diameter across are 50, 62.5, and 100 micrometers. (MacChesney, J., n.d).
Step Index - They are generally cheap as well as they have the greatest scope of center diameter across: fundamentally from 50 ?m up to 2 mm. The material might be plastic, fluid or glass. (Ovejabiennera, 2009).
The three common ways to obtain information from IoT devices are sensors, RFID and Video tracking. Compare the three technologies by addressing the advantages, disadvantages, key requirements for the things. Provide two applications of each.
· It provides more accurate reading.
· These devices constantly monitor the details available.
· These devices do not require humans for its operation.
· Sensors immediately respond to the information.
· RFID tag ought not be in LOS to influence the framework to work.
· As compared to barcodes, labels can store more data. In addition it takes after reader's commands.
· It gives area to the peruser with the ID.
· RFID labels are utilized for tracking baggage and in addition for checking wellbeing history of patients.
· RFID innovation is flexible in nature and henceforth small as well as bigger RFID gadgets are accessible according to application.
· Its execution does not rely upon nature of the protest recognition process.
· The principle idea of this tracker incorporates estimation, multi-highlights comparability measures and direction sifting.
· It helps to detect the crime.
· In case of any fault in the device, they provide wrong result.
· Eg: In reverse parking of car, when sensor become dirty, they don’t find any type of obstacle.
· Their operating range is very limited. (ICT Lounge, n.d).
· Dynamic RFID is exorbitant because of utilization of batteries.
· The main concern is privacy with the utilization of RFID on items as it can be effortlessly captured.
· RFID gadgets should be modified which requires enough time.
· Use of RFID innovation at inventory and for other such applications prompt loss of occupations for incompetent worker. (RF Wireless tutorials, n.d).
· The main issue is privacy.
· The tracking system are expensive.
· These devices are vulnerable.
· An essential detecting component;
· Excitation control;
· Intensification (variable gain);
· Analog filtering;
· Information transformation;
· Computerized data handling;
· Computerized data communication; and
· Power supply. (National academy of science, 2017).
Application high frequency
· Recording (Library archives, n.d).
· IR Sensors are used in TV remotes.
· Passive Infrared sensors are used automatic doors.
· Hospitals use RFID to track their patients.
· It can be used in reducing medicinal error for patients.
· Traffic monitoring
· Retail security for the staff
· Industrial monitoring
Discuss the issues associated with security and privacy in the context of the Internet of Things.
Security Risks – 1. It enables unauthorized access and abuse of individual data;
(2) It encourages assaults on different frameworks; and
(3) It creates threat to the individual safety.
Privacy Concerns - Some of the privacy risks include the immediate collection of sensitive individual data, for example, exact geolocation, financial accounting data, or wellbeing data – hazards as of now introduced by customary Internet and versatile business. Others emerge from the accumulation of individual data, propensities, areas, and physical conditions over time, which may permit an element that has not gathered sensitive data to derive it. (FTC staff report, 2015).
An IoT water level monitoring application requires updates from a sensor periodically, using the command/response paradigm. The application triggers a request every 1 s. The round-trip propagation delay between the application and the sensor is 12 ms. On average the sensor consumes 3 ms to process each request. The application consumes 2 ms to send or receive any message. If the application blocks on every request to the sensor, how much of its time budget can be saved by redesigning the application to use the publish/subscribe communication model in lieu of the command/response approach?
If the application blocks on every request to the sensor, the time budget which can be saved by redesigning the application can be 17ms for each request.
Describe Nielson's Law. How does it relate to Moore's Law? What are the implications for the Internet of Thing?
It states that the high end user connection speed increases with 50% each year. The dots in the graph demonstrate the different speeds with which we have associated with the internet, from an early acoustic 300 bps modem in 1984 to an ISDN line. It is astonishing how intently the exact information fits the exponential development curve for the half annualized development expressed by Nielsen's law. Nielsen's law is like the more established Moore's law. By looking at the two laws represents that transmission capacity develops slower than system power. Moore's law says that systems are double in abilities like 18 months, which compares to around 60% yearly development
Implications - Transfer speed is one of the two most critical components in processing, since computational rates are more than for non-designing undertakings. Website composition needs to take into account the majority. No one but once in a while a site can be effective in the event that it is gone for the most developed 10% of clients. (Nielson, J., 1998).
Advantages of RFID | Disadvantages of RFID. RF Wireless tutorials (n.d). Retrieved from -
CCNA: Network Media Types. Cisco Systems, Inc. (2003). Retrieved from -
Dr. Winkelman, R. (2013). Chapter - 4 Cabling. Florida Center for Instructional Technology. Retrieved from -
Internet of things - privacy & security in a connected world. FTC staff report (2015). Retrieved from -
Introduction to sensors. National academy of science (2017). Retrieved from -
MacChesney, J. (n.d). The basics of fiber optic cable. Retrieved from -
Mitchell, B. (2017). What Is a Fiber Optic Cable? Retrieved from -
Nielson, J. (1998). Nielsen's Law of Internet Bandwidth. Retrieved from -
Operational requirements for CCTV systems. Library archives (n.d). Retrieved from -
Ovejabiennera (2009). Types of optical fibres. Retrieved from -
Rayes, A. & Salam, S. (2017). Internet of Things From Hype to Reality: The Road to Digitization. Supringer International Publishing AG - 2017.
Sensors. ICT Lounge (n.d). Retrieved from -
Thomas, J. (2017). Coaxial cables, Twisted Pair STP and UTP cables, Twisted Pair Cable Categories (CAT). Retrieved from -