Sunday, December 8, 2019

Research Directions Internet of Things †MyAssignmenthelp.com

Question: Discuss about the Research Directions for Internet of Things. Answer: Introduction: The statement the best interface for a system is the no user interface means that computers have become a threat human beings as they are currently performing tasks that used to be done by humans. It complicates human lives instead of making them better (Hecht, 2015). For instance, lays out how we came about this application obsessed point and how we could change things and ensure that no individual is using the best tool for a job. It could either be or not an app such as those employed in smartphones like Android. Most organizations together with the app designers are trying to change and use the screens and apps thinking they are making the task suitable, but they are achieving the opposite. The statement can also be linked to an incident where companies are trying to change them to be conversant with their ecosystem (Tyson, 2004). This interface mostly favors a company's partakers but not their experience. In no user interface, user experience does not significantly matter as it is an option when individuals are solving problems. People are supposed to be focused more on things that are more alluring apart from the apps (Borgia, 2014). The app that there is an application that can perform all tasks has worsened the user design. People should embrace the actual situation and not that which performs functions on the screen. It is made up of one or more pairs of electrical son arranged in a spiral. They transmit both analog and digital data. They are made up of two copper wires about 1 mm thick. The wires are twisted to minimize interference from the environment around. The cables have magnetic interference when the two wires are laid parallel. It is one of the cheapest hence highly demanded. For long distance connections, they vary from a range of 5 to 15 cm and thickness of 0.4 mm to 0.9 mm. in this situation, the transmission of a signal is about 5 to 6 km. There are two distinctions of twisted pair cables; shielded twisted pair and unleashed twisted pair. The shielded twisted pair is made of copper wires covered with foil or in a braided mesh and a PVC cover as the outside cover. Braided mesh protects electromagnetic penetration as the foil prevents the magnetic fields. The unleashed consist of color copper wires without any foil or braid for insulation against electromagnetic. The wires within each cable are different. UTP cables are further subdivided into categories according to their purpose and transfer rates. It is similar to the twisted pair made of two conductors but designed differently to allow it to function better and over high range frequencies. A good example is the TV antennae. They have a metal foil and braided cable to guard against electromagnetic interference. There are two types of coaxial cables that are, thin net and thicket (Borgia, 2014). The small net is about inch thick and is mostly used for short distance transfers. They directly link to a workstation network adapter card using a British naval connector. It moves data to a distance of about 185 meters. The coaxial is around inch thick and can transfer data over longer distances than the thin net.it is commonly used as a support point to connect smaller thin net based networks and transfers data to a maximum distance of 500 meters (Kopetz, 2011). The bandwidth of a coaxial cable is 10 Mbps. On the aspect of coaxial cable basing the on interference, is that they are resistant to the effect of attenuation up to a specific length of up to 100 meters. Regarding the cost, it is more expensive than the twisted cable and less than the optical cable. They are more secure than twisted cables and less secure than optic fiber cables. It carries digital data by use of optical fiber signal. They transfer data in modulated pulses of light. It is made up of cylinder glass known as the core rounded by a concentric layer of glass referred to as the cladding. An optic comprises of two cables one for transferring and another for receiving data. The core uses a high optical quality transparent plastic and coating made of gel which reflects signals back to the fiber hence the low signal loss. There are two types of fibers; single and multi-mode fiber. The single mode fiber uses a single ray of the light in carrying a transmission over a long range (Kopetz, 2011). Multimode fiber uses some light rays at the same time with each ray running to the most reflective angle to hold transmission over short ranges. Multi-Mode fiber optic can deliver data up to 1 Gbps. It functions on the wavelengths of between 85p nm and 1300 p nm. Fibre optic cables have a bandwidth of 100 m or less; the bandwidth is not limited. It is most expensive compared to twisted and coaxial. Its interference level is much lower than the others and is also most secure. They are subdivided in the following type; Type of sensor Merits Demerits Application Ultrasonic sensors They detect (sense) all materials It has low resolution Used in doors for security Curb collision Limit switch Sensors They are cheap They have high current capability Must physical contact with the target They respond slowly They are used in basic end of travel sensing Capacitive sensors They are able to detect non-metallic targets They detect via some containers They sense highly to environmental changes Used for level sensing Inductive sensor Simple to install Easy to predict They only sense metallic targets Used in industries and machines Photo electric sensor They have a long life They sense over long distances They are fast in responding. Sensing range is affected by reflectivity and color of the target Lens are contaminable Used in packaging Handling material Detecting parts RFID Advantage They can hold more data than barcodes Used for monitoring the health records for patients Used for security and attendance reasons Disadvantages Coverage is limited to 3 meters Programming the RFID is time-consuming External electromagnetic interference can block remote reading Technology brings about loss of jobs to the unskilled labor Applications Used in the tracking of language and monitoring of health history of patients by hospitals (Weber, 2010). Video tracking Advantages There is shorter matching time which is as a result of good detection rate especially in the target detection It addresses on object tracking as well appearance change Disadvantages There are various hardware and programs needed to obtain and process the data The capture system may have specific requisitions for space to which it is being operated. The privacy issues in IoT are that there too much data to secure. The amount of information that the IoT devices can generate is staggering (Kumar, Patel, 2014). Another issue is that of the unwanted public profile; the company can use the collected data that consumers give willingly, analyze it and make decisions based on it (Wang Zhang, 2012). There is also the issue of hackers who can hack the systems and access the collected data. The security issue is based on public perception. The problem of hacking is a primary concern as researchers have been able to hack into real market devices with much energy and time (Dabbagh Rayes, 2017). Another issue is the actual security aspect. Securing the IoT devices carries more weight than securing the actual devices (Yang, 2014). Total time taken is 2+12+3= 17ms Changes after 1 s Therefore; 60ms is equivalent to 1 sec 17ms will equal how many seconds 17/60=0.28 Thus 1-0.28=0.72 s Time saved 0.72s The Nielson's law states that the high-end user's connection speed can grow up by 50% per year. This law of the broadband connectivity carries with it Moore's law of computer processing for some strange reasons (Stankovic, 2014). Nielson's observations were based on Moore's law that often mentioned view to which computers can be double every 18 months. His law relates to Moore's law in that the comment states that computers double every 18 months which corresponds to 60% per year. Moore's law for the network speed, the bandwidth grows slower than the computer's power because internet bandwidth is more of business realities than technological limits (Tan Wang, 2010). The implication of IoT is that there is a huge spread of the adaptation of IoT devices and other product that will utilize the same broadband connection and the technology will be availed for Nielson's law. References Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues.Computer Communications,54, 1-31. Dabbagh, M., Rayes, A. (2017). Internet of Things Security and Privacy. InInternet of Things From Hype to Reality(pp. 195-223). Springer International Publishing. Hecht, J. (2015).Understanding fiber optics. Jeff Hecht. Kopetz, H. (2011). Internet of things. InReal-time systems(pp. 307-323). Springer US. Kumar, J. S., Patel, D. R. (2014). A survey on internet of things: Security and privacy issues.International Journal of Computer Applications,90(11). Stankovic, J. A. (2014). Research directions for the internet of things.IEEE Internet of ThingsJournal,1(1), 3-9. Tan, L., Wang, N. (2010, August). Future internet: The internet of things. InAdvanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on(Vol. 5, pp. V5-376). IEEE. Tyson, J. (2004). How internet infrastructure works.Retrieved December,3, 2004. Wang, Y., Zhang, X. (2012). Internet of things. Weber, R. H., Weber, R. (2010).Internet of things(Vol. 12). New York, NY, USA:: Springer. Yang, S. H. (2014). Internet of things. InWireless Sensor Networks(pp. 247-261). Springer London.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.