ECE531 Internet Of Things

ECE531 Internet Of Things

Free Samples

ECE531 Internet Of Things

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

ECE531 Internet Of Things

0 Download6 Pages / 1,470 Words

Course Code: ECE531
University: The University Of New Mexico is not sponsored or endorsed by this college or university

Country: United States


Q1) What does the statement “the best interface for a system is no User Interface”?  When might this apply and provide two examples.
Q2) Compare the bandwidth, distance, interference rating, cost and security of a) twisted pair cable, b) coaxial cable and 3) fibre optic cable.  Use current data, give specific details for at least 3 types of cable within each category, these should have different specifications, rather than simply different brands of the same type.
Q3) The three common ways to obtain information from IoT devices are sensors, RFID and Video tracking.  Compare the three technologies by addressing the advantages, disadvantages, key requirements for the things.  Provide two applications of each (these applications should NOT be sourced from the textbook).  You may use a table to present the material if you wish.
Q4) Discuss the issues associated with security and privacy in the context of the Internet of Things.
Q5) An IoT water level monitoring application requires updates from a sensor periodically, using the command/response paradigm. The application triggers a request every 1 s. The round-trip propagation delay between the application and the sensor is 12 ms. On average the sensor consumes 3 ms to process each request. The application consumes 2 ms to send or receive any message. If the application blocks on every request to the sensor, how much of its time budget can be saved by redesigning the application to use the publish/subscribe communication model in lieu of the command/response approach?
Q6) Describe Nielson’s Law.  How does it relate to Moore’s Law?  What are the implications for the Internet of Thing?


Answer 1: 
The statement “the best interface for a system is no user interface” means eliminating the user interface system during slapping of application in any technology in order to eliminate various process during interfacing of user with that technology. It will help in buying more time for the user as there will be not much steps to operate a technology during user interface for that operation. It can be explained by the following examples:
Example 1: 
In cars user interface technology is implemented to open the gate by using an application operated by mobile phone. It takes several steps before opening gate as the user will have to take out his phone and unlock the phone then dig into the icons of many applications, search for the particular application then he or she can open the gate (Takai et al., 2013). If we eliminate the user interface system by implementing sensor for the car in the key then whenever user reaches near the car the gate will opened automatically.
Example 2:
User Interface in the merchant pay system by using phone application (Fisher, 2013). If we implement no user interface system it will eliminate all the steps including entering password to phone and app and all that are explained in example 1 and allow user to sit, order and leave as this system will pay the restaurant bill automatically.
Answer 2:
Specifications of Cables

Cable types



Interference rating



Twisted Pair Cable



Susceptible to interference but limited to a distance

Cheapest than others

Poor Security

Coaxial Cable



Least susceptible to interference than others

Medium cost compared to others

Moderate security but can be breached (Winzer 2014).

Fibre Optic Cable

75 THz

10km (Single-mode)
2Km (multimode)

Not susceptible to EMI

Expensive than others

Highly secured

Categories of Cables
Twisted Pair Cable:
1 Unprotected Twisted-Pair (UTP)
Type 1: Used in low speed data cable and telephone lines.
Type 2: These can support 4 mps implementation (Lee et al., 2013).
Type3: These cables support maximum 16 mps but commonly used in 10 mps.
2 Shielded Twisted Pair (STP)
Type 1: Features 22-AWG two pairs.
Type 2: Inherit type 1 with 4 telephone pairs (Sommer and Franz, 2012).
Type 3: Features two pairs of shielded 26-AWG.
Co-Axial cable:
Type 1: 50-Ohm RG-7 or RG-11, applicable with thick Ethernet.
Type 2: 50-Ohm RG-58, applicable with thin Ethernet (Ha et al., 2013).
Type 3: 75-Ohm RG-59, applicable with cable television.
Answer 3:
Summarized Table of Advantages, Disadvantages and Application of IoT

IoT Devices





*It is not affected by atmospheric dust, rain, snow.
*It can also work in adverse conditions if proper power supply is given.
*In comparison with inductive or capacitive proximity sensors it has more sensing distance.

*It seems difficult to receive signal reflected from curved, small, thin and soft objects.

*Smart sleep system.
*Smart washing machine.
*Smart lightning.
*Weather monitoring.
*Blood Pressure monitoring (Tozlu et al., 2012).
Smart internet mirror.


* Tag code data is 100% secure and cannot be duplicated.
 * Availability of large number of sizes, different types and different materials.
* Physical contact is not needed between the communication devices and data carrier. Tags can be used many times.
* The rate of error is extremely low.
* Portable data base and long read range.

*These are more expensive than Barcode system.
*Harder to understand results in less reliability.
*Longer than the Barcode labels.
*Specific applications for tagging, does not fits to all.
*Many Tags can respond in the mean time.

* In product tracking high frequency RFID tags are used such as, pallet tracking, jewellery tracking, airline baggage and apparel and pharmaceutical tracking (Gubbi et al., 2013).
*Implantable RFID are used in animal identification.
* Replacement of library barcodes with RFID Tags.
*It has also application in museum, school and universities.

Video Tracking

*Communication between devices.
*Automation and control.
*Collects information.
*Monitoring is another advantage of video tracking (Singh, Tripathi and jara, 2014).
*Better quality of livelihood.

*There is not any compatibility of international standard for the monitoring equipments.
*More complex system which can increase the risk of failures.
*Privacy and security both will be exposed.

*Human-computer interaction.
*Augmentation of reality.
*Medical imaging.
*Video communication.

Answer 4:
Security Issues
A variety of potential security issues that can harm consumers by the application of Internet of Things, some of them are firstly, an unauthorized individual can access to the personal information and misuse it for own benefits. Secondly, it can facilitate systems to attack other systems using it as a pathway (Suo et al., 2012). Thirdly, a safety risk of a personal also increases because of these security issues.
Privacy Issues
Direct involvement of sensitive personal information, such as bank account details, health information and precise geo-location are the privacy issues in the practice of Internet of Things (Borgohian, Kumar and Sanyal, 2015). Several privacy issues occur due to the expose of personal information like habits, physical condition and locations.
Answer 5:
Blocking mode:
In blocking mode process, the endpoint originated from the operating request will have to wait for a while to get a response of its request. After achieving this process, endpoint of the operation that is requested from the originator side will be finished which will consume time, from the side of originator. The water level measuring technique is a synchronous case this results that, the asynchronous message will not be received by the originator side; which implies that Originator will be responsible for initiating the information exchange between the receiver and the originator sides.
Publish/Subscribe Paradigm:
It is also referred as pub/sub which can be helpful in enabling the communication of unidirectional message to more and different subscribers from a publisher. After the enabling process, the subscriber side declares of its own interest on the requested message or data to the publisher side. After evaluating the availability of data in response to the message delivered by subscriber it then forces another message to the subscribers which are interested in that information.

Figure: Publish-Subscribe Paradigm
Command/Response Paradigm:
Because of the excess level of the message travelling which are not needed and are travelling in reverse direction, Response/Command response can be referred as suboptimal.

Figure: Command/Response paradigm
Total time saving will be 6ms in the propagation delay between the application and sensor + 1ms in receiving that message. Total time saving is 7ms.
Answer 6:
Nielson’s Law
Nielson’s law states that the growth of bandwidth of users is increasing by 50 % per year considering the data collected between 1983 and 2016. The statement of Nielson law is “A high-end user’s collection speed grows by 50% per year”. He has proposed a graph:
Figure: graph population v/s year (Nielsen, 2014)
Nielson’s law is very similar to Moore’s law but more established than that. Moore stated that “computer double in capabilities every 18 months”, which is related with 60% of annual growth.
Implication of Nelson’s law in IoT
It is being expected by various researchers that in around 2024 sensor technology will spread its wings through the “trillion sensor” and will be applicable in all almost all areas including surrounding surfaces, cars, and home and at every place where it can be expected. Sensors in microchip that can be implemented into the human body is being recommended by various scientists.
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of Internet of Things. arXiv preprint arXiv:1501.02211.
Fisher, M. (2013). U.S. Patent No. 8,352,323. Washington, DC: U.S. Patent and Trademark Office.
Ha, S. K., Kim, G. S., Choi, S. M., Kim, S. K., Kim, J. G., Park, M., … & Sim, K. (2013). PHILS based protection system design for an HTS power cable installed in a grid. 
Lee, W., Cheon, M., Hyun, C. H., & Park, M. (2013). Development of building fire safety system with automatic security firm monitoring capability. Fire safety journal, 58, 65-73.
Nielsen, J. (2014). Nielsen’s Law of Internet Bandwidth, 1998.
Singh, D., Tripathi, G., & Jara, A. J. (2014, March). A survey of Internet-of-Things: Future vision, architecture, challenges and services. In Internet of things (WF-IoT), 2014 IEEE world forum on (pp. 287-292). IEEE.
Sommer, J., & Franz, W. (2012). A Component-based Simulation Model and its Implementation of a Switched Ethernet Network.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), 2012 international conference on (Vol. 3, pp. 648-651). IEEE.
Takai, I., Ito, S., Yasutomi, K., Kagawa, K., Andoh, M., & Kawahito, S. (2013). LED and CMOS image sensor based optical wireless communication system for automotive applications. IEEE Photonics Journal, 5(5), 6801418-6801418.
Tozlu, S., Senel, M., Mao, W., & Keshavarzian, A. (2012). Wi-Fi enabled sensors for internet of things: A practical approach. IEEE Communications Magazine, 50(6).
Winzer, P. J. (2014). Spatial multiplexing in fiber optics: The 10x scaling of metro/core capacities. Bell Labs Technical Journal, 19, 22-30.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 6 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Internet Of Things. Retrieved from

“Internet Of Things.” My Assignment Help, 2021,

My Assignment Help (2021) Internet Of Things [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Internet Of Things’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Internet Of Things [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



At, we are committed to deliver quality assignment assistance in the fastest way possible. To make our service delivery fast, we have hired subject matter experts to work on different subject specific assignments. We have hired experts who owe in-depth knowledge in their respective subjects. As per their expertise, they provide geography assignment help, Physics assignment help, Strategic assignment help, history assignment help, art architecture assignment help and assistance with other subjects as well.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Our Essay Writing Service Features

Qualified Writers
Looming deadline? Get your paper done in 6 hours or less. Message via chat and we'll get onto it.
We care about the privacy of our clients and will never share your personal information with any third parties or persons.
Free Turnitin Report
A plagiarism report from Turnitin can be attached to your order to ensure your paper's originality.
Safe Payments
The further the deadline or the more pages you order, the lower the price! Affordability is in our DNA.
No Hidden Charges
We offer the lowest prices per page in the industry, with an average of $7 per page
24/7/365 Support
You can contact us any time of day and night with any questions; we'll always be happy to help you out.
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$3.99 Outline
$21.99 Unlimited Revisions
Get all these features for $65.77 FREE
Do My Paper

Frequently Asked Questions About Our Essay Writing Service

Academic Paper Writing Service

Our essay writers will gladly help you with:

Business Plan
Presentation or Speech
Admission Essay
Case Study
Reflective Writing
Annotated Bibliography
Creative Writing
Term Paper
Article Review
Critical Thinking / Review
Research Paper
Thesis / Dissertation
Book / Movie Review
Book Reviews
Literature Review
Research Proposal
Editing and proofreading
Find Your Writer

Latest Feedback From Our Customers

Customer ID:  # 678224
Research Paper
Highly knowledgeable expert, reasonable price. Great at explaining hard concerts!
Writer: Raymond B.
Customer ID: # 619634
Essay (any type)
Helped me with bear and bull markets right before my exam! Fast teacher. Would work with Grace again.
Writer: Lilian G.
Customer ID: # 519731
Research Paper
If you are scanning reviews trying to find a great tutoring service, then scan no more. This service elite!
Writer: Grace P.
Customer ID: #499222
Essay (any type)
This writer is great, finished very fast and the essay was perfect. Writer goes out of her way to meet your assignment needs!
Writer: Amanda B.
Place an Order

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:

Powered by

× WhatsApp Us