Wednesday, May 6, 2020

Computer Networking and IOT-Free-Samples for Students- Myassignment

Questions: 1.Compare the bandwidth, distance, interference rating, cost and security of a) twisted pair cable, b) coaxial cable and 3) fibre optic cable. 2.Compare the three technologies by addressing the advantages, disadvantages, key requirements for the things 3.Discuss the issues associated with security and privacy in the context of the Internet of Things. 4.How much of its time budget can be saved by redesigning the application to use the publish/subscribe communication model in lieu of the command/response approach? 5.Describe Nielson's Law. How does it relate to Moore's Law? What are the implications for the Internet of Thing? Answers: 1.The network is interconnection of various components in an organization to allow communication, however there are various media devices that are used that facilitates transmission of signals from one device to another .Among the media used includes twisted pair cables, coaxial cables and the fiber optic cables which has different properties which are considered while the users need to setup the network (Adam,2015). Below is the comparison of the three network media in regard to their bandwidth ,coverage distance, interference rating ,cost and security as in the table below: Networking media Bandwidth Distance Interference rating Cost security Twisted pair cable 1000Mps Covers short distance of 100 meters without distortion. It has high susceptibility to interference and noises. It is cheapest between the three cables. Easily installed and in operation. Coaxial cable 100Mps Cover short distance ranging from 185 to 500 meters. No electromagnetic interferences since the cable is insulated using a metallic foils and wire braids It is expensive to transmit signals for long distance Easily installed and in operation. Fibre optic cable Can cover long distance like 10Kms and above without distortion There is no electromagnetic interferences since the signals are transmitted through single or many light rays. It is highly expensive to install and use. It is smallest and lightest of all but risky during installation process. 2. Sensors Types of Sensors Advantage Disadvantage Application types Limit Switch and Photoelectric Sensors High electric-Current abilities. Less Costly. Sense any material. It has long Life span. Longest Sensing Range It is very quick in responses. ? Requires Needs contacts that is physical and its rate of response is quite slow. The lenses are easily contaminated. Contamination Sense level is determined by colors. Interlock. There is End-of- Traveling Senses. Packaging Materials Handling Parts Detections The Use of RFID for Inventory Management Advantages Disadvantages Applications Do not need sights lines while scanning. It helps in optimization of the assets inventories and minimizes thefts and losses. It has barcodes that easily reference the databases. It is durable according to the type and model of RFIT. It highly improves inventories visibilities though updating in real time and scans very fast. RFIDs highly reduces labor cost. There is huge amount of cost in deploying it. It highly surfers from interference problem. They are expensive in upgrading and can lead to failure of that technology. It is challenging in management of the data using the RFID barcodes tags. The Tags in various industries in different countries are not compatible to each other. It is costly to install those RFIDs tags. Inventory management technology Inventory management equation (Wimer, 2016) Video tracking Advantages Disadvantages 1. controls Crimes 1. There is no Privacy 2. It helps in Monitoring any Scenario and Activity 2. It is costly in installation and maintenance. 3. It gathers Evidences. 3. They have high vulnerabilities. 4. Help in getting rightful decision. 4. Does not help in Stopping Theft 5. Used for record Maintenance. 3.Internet of Things Security and Privacy Issues The internet of things is associated with various issues in terms of security and privacy these issues includes the vulnerabilities to hack, trust considerations ,data protections as discussed below. i. Vulnerability to Hacking The internet of things devices are prone to hacking ,however in some cases some devices are vulnerable to hackers due to lack of effective encryptions and this allows unauthorized users to access the devices. ii.Trust Considerations The various companies in case of bombardment of data from any internet of things device can end up having their data compromised, however there is no effective way of identifying the compromise in the internet (Sudha ,2015). iii.Big Data Collection, Protection and Privacy The collection of data gathers important information but there lacks enough security to secure the data not to interfere with through hacking maliciously (Daniel , 2014). However the internet of things device can produce huge amount of data and therefore pausing more risks like: Stilling of data and identities. Devices Falsifying the data. Stealing of the IP addresses and network manipulations. 4.For round-trip. Application request time = 1s. Sensors Delays time = 12s . Sensors process time = 3ms Application response time= 2ms Total time=1s+12s+3ms+2ms=13.5s For publish communication model. Application request time = 1s. Sensors Delays time = 0s . Sensors process time = 3ms Application response time= 2ms Total time=1s+0s+3ms+2ms=1.5s Time saved = 13.5s-1.5s=12s 5.Nielsons law This is a law that was introduced by Jacob Nielsen back in 1998 ,which states that bandwidths that are available to high ends broadband connection grows at a rate of 50% yearly , that consequently leads to 57 times compound growth in capacities in every decade, however the models strength is determined after fifteen years (Valencia,2015). Relationship between Nielsons law and Moores law. Unlike the Nielsons law the Moores law its state that in every silicon chips will have doubled number of transistors after every two years ,however this leads to increase in the level of computers performances which has been applicable for more than fifty years which leads to improvement in terms of technological aspect despite the speed, sizes and costs. The Nielsons law implications As the computers gets old quickly the new computers becomes cheaper, however the growth in terms Nielsens law is slow compared to the Moores Law which makes the users experiences becomes the bandwidth-bound (Erik , 2014). References Daniel ,K. (2014). The Silent Intelligence: The Internet of Things Paperback. Washington, DC: Lightning Source Inc. Sudha ,J. (2015). IoT Disruptions: The Internet of Things - Innovations Jobs Kindle Edition. USA:Amazon Digital Services LLC. Wimer, H. (2016). Meta Products: Building the Internet of Things Paperback. Japan: BIS Publishers. Adam, G. (2015). Everyware: The Dawning Age of Ubiquitous Computing Paperback. Asia: New Riders.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.