Monday, May 4, 2020

IOT for User Interface and Networking Cables-myassignmenthelp

Question: Discuss about theIOT for User Interface and Networking Cables. Answer: User Interface (UI) has become an integral element of the present day applications. However, it is stated that no UI is the best UI. The statement is apt as it is best to make use of the natural gestures and behavior of the user rather than sticking on the user interface that is implemented in the application. These gestures may include voice, smell, hand gestures etc. The business units and organizations are moving to the use of no UI in the applications in order to allow enhanced user experience (Josh, 2016). For instance, in case of an application that is designed to monitor, manage and execute the operations related to an automobile shall make use of no UI. In case of unlocking of the door of the automobile, presence of a UI may involve additional steps such as navigating through the phone, pressing of buttons etc. With no UI, the user will be able to unlock the door in lesser steps. The same applies in the case of ordering a food item in a caf. The presence of UI would require navigating through several screens and selection of multiple options which would be done in a two to three steps without UI (Cooper, 2012). Parameter Twisted Pair Cable Coaxial Cable Fibre Optic Cable Bandwidth Low bandwidth up to 3 MHz Moderate to high bandwidth up to 350 MHz High bandwidth up to 2 GHz Distance Ranges in the distance of two to ten kilometer Ranges in the distance of one to ten kilometer Ranges in the distance of ten to hundred kilometer (Cisco, 2003) Interference Rating Cost It is the cheapest medium that may be used in the communication and networking field (Beacon, 2017) It is moderately expensive as it costs more than the twisted pair cables but is cheaper than the fibre optic cables It is most expensive out of all the three. Security These are easy to tap as compared to the rest of the cables. Also, these cables may also transmit electricity which makes it easier to intercept the data These are moderately difficult to tap as compared to the rest of the cables. Also, these cables do may transmit electricity which makes it possible to intercept the data (Fiberopticshare, 2017) These are most difficult to tap as compared to the rest of the cables. Also, these cables do not transmit electricity which makes it difficult to intercept the data Type of IoT Devices Advantages of the IoT devices Disadvantages of the IoT devices Key Requirements of the IoT devices Examples and Applications Sensors Flexible and can adapt to changes Variable sizes of the sensors are available in market which can allow them to be installed in any application and service Might be required to be configured manually which may be time taking Operational and technical errors may occur which may lead to the deterioration of the services and the performance of the application Presence of technical framework Manufacturing unit Application gateway Smart parking systems Home automation systems RFID Versatile in nature Enhanced security Provides location as well as ID Costlier than the rest of the devices Needs to be programmed which may take more time for deployment and implementation (Rfwireless, 2017) Active and Passive tags shall be present and installed Program or a code to be implemented Tracking of the luggage Departmental stores Video Tracking Location based service Real-time applications Expensive in nature Difficult to implement Use and application of advanced tracking tools Application gateway to make the application available and accessible for the end-users Surveillance tools and applications Public transport vehicles There are a number of security and privacy issues that are associated with the Internet of Things (IoT). Some of these issues are as listed below. Information breaches and leakage may be caused in case of IoT applications due to the presence and involvement of a varied elements and devices. There may be an active attack of the malware which may lead to the negative impacts on the information properties such as integrity, confidentiality and availability. There are many availability attacks such as denial of service, distributed denial of service and flooding attacks that may take place. The performance of the IoT application may fall which in turn may lead to a complete breakdown as well (Lu, 2014). There are numerous devices that may be used in case of IoT applications. There are various issues that are associated with these devices as well as the devices may get lost or may be stolen. It would lead to the exposure of the information present within the device. There may be a number of network-based security issues that may be executed such as man in the middle attacks, eavesdropping attacks and several other forms of the attacks (Yousuf, 2015). In publish/subscribe communication model, only a set of messages are processed at a time. Hence in this case, the time budget will get reduced by the number as set by the sensor. Jacob Nielsen is a Danish web usability consultant. Nielsens law states that the connection speed of the high-end users may witness an average increase of up to 50% in a span on one year. Moores law was given by the co-founder of Intel, Gordon Moore. He observed that the number of transistors per square inch that were present on the integrated circuits doubled with each passing year. He stated that the same trend will be applicable in the future applications and connections as well. Nielsens law and Moores law have a close connection with each other. The growth rate that is specified in the Nielsens law is somewhat slower than the one that is stated in the Moores law. The user experience in both the cases remains dependant on the bandwidth (Nngroup, 2017). There are a number of Internet of Things (IoT) applications that have been developed that make use of a number of devices and connections. Nielsens law can be applied in case of the IoT applications as these applications have a larger dependency upon the networks. Also, the use of these IoT applications by the high-end users may lead to the enhancement of the connection speeds and the application performance. References Beacon. (2017). Fiber Optics vs. Coaxial Cables - The Beacon. The Beacon. Retrieved 22 August 2017, from https://fios.verizon.com/beacon/fiber-optics-vs-coaxial-cables/ Cisco, `. (2003). CCNA: Network Media Types Twisted-Pair Cable. Ciscopress.com. Retrieved 22 August 2017, from https://www.ciscopress.com/articles/article.asp?p=31276 Cooper. (2012). The best interface is no interface | Cooper. Cooper.com. Retrieved 22 August 2017, from https://www.cooper.com/journal/2012/08/the-best-interface-is-no-interface Fiberopticshare. (2017). Use Coaxial Cable, Twisted Pair Cable or Fiber Optic Cable?. Fiber Optic Network Products | FS.COM. Retrieved 22 August 2017, from https://www.fiberopticshare.com/use-coaxial-cable-twisted-pair-cable-or-fiber-optic-cable-for-lan.html Josh. (2016). No UI is the Best UI Josh Medium. Medium. Retrieved 22 August 2017, from https://medium.com/@joshdotai/no-ui-is-the-best-ui-cfeab4cae641 Lu, C. (2014). Overview of Security and Privacy Issues in the Internet of Things. Retrieved 22 August 2017, from https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf Nngroup. (2017). Nielsen's Law of Internet Bandwidth. Nngroup.com. Retrieved 22 August 2017, from https://www.nngroup.com/articles/law-of-bandwidth/ Rfwireless. (2017). Advantages of RFID | Disadvantages of RFID. Rfwireless-world.com. Retrieved 22 August 2017, from https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-RFID.html Yousuf, T. (2015). Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures. Retrieved 22 August 2017, from https://www.aloul.net/Papers/faloul_ijisr15.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.