Sunday, May 3, 2020

Internet Of Things Perspectives Challenges -Myassignmenthelp.Com

Question: Discuss About The Internet Of Things Perspectives Challenges? Anawer: Introducation In this present age, the Internet has acquired the state of ubiquitous by touching every corner of the world. It has been affecting the life of human in many unimaginable ways. The journey never seems to end. People have already entered an era which is more pervasively connected with a wide variety of electronic appliances that are connected to the web. People are supposedly entering the Internet of Things. This specific term has been denoting in different ways by different authors. Internet of things can be considered as the interaction between the digital and physical worlds. The digital world happens to have interaction with the physical world by using a great variety of actuators and sensors (Ansari, et al., 2015). Smart Television: Smart television, also happen to be called as the connected television, it has many new and innovative features such as the interactive web 2.0 and the integrated internet technology. The smart Television is very different form the conventional televisions in many innovative ways such as the new smart television facilitates the connection to the internet, media sections that are interactive on online platforms, access to home network to the user along with extra contents, media that is streaming on-demand (Bi, Da Xu Wang, 2014). Such devices are also integrated with the device with external connectivity such as the gaming consoles, set up boxes, smart phones, digital players of media, and many more. The smart TV facilitates the users regarding playing various videos and games on the platform, watching live photos and shows and also facilitates the required facilities for storage. Usage: The requirement of the smart TV is getting higher in the digital marketing because of its unique features. There is no requirement of making any compromise regarding anything with the smart TV. This is because it is highly efficient in regards to the storage and downloads. It happens to work in a similar way to a computer and speeds up the process of the transfer of the files (Borgia, 2014). Control: There is an ever increasing demand of the smart TV just like the smart phones as the former has the touch screen. However, when the height of the televisions is greater, it is very difficult for touching the screen. Thus, the manufacturers are making use of the new and innovative methods such as the Nintendo Wifi-moto and operating it in a better way. Connectivity: This TV is very well connected with the technologies of social networking and other connections associated with internet. Through the assistance of interaction and connection of internet among the users, it is very easy and convenient to watch the televisions without any interruption. Security: The smart TV is very prone to the attacks as malicious attackers can very conveniently hack the codes of the TV. The unauthorized activities like malicious access will happen to cause disturbance in the data and will lead to breaking of the privacy. Privacy: it is very difficult and hectic to maintain the privacy of the smart TV as the access can be hacked by external individual. The possibility of losing data is also increasing day by day due to the increase in the attack of viruses (Borgia, 2014). Thermostat: It is considered as one of the crucial components of Internet of Things which are utilized in sensing the system temperature so as to regulate the temperature. Such devices are utilized in the units which are meant for cooling and heating in different applications. Usage: These devices are used in the accounting of the control of air and maintenance of the ambient temperatures. These are used for the operation in various temperatures mostly in sensors such that are bimetallic and thermistor (Botta, et al., 2014). Control: The sensors that are used in the control of the device happen to control the entire component. Conventional sensors have been altered as they consumed more energy and money. Connectivity: such devices have internet connection for controlling the temperature in suitable way. Security: There are less chances of the device to be hacked as the sensor is very efficient in regulating the device. Privacy: Most of the times, homes and offices observe the wrong readings of the temperatures in the thermostat. It needs to be installed in the place where cooling and heating can be regulated rather than placing it outside the room or on the wall (Yan, Zhang Vasilakos, 2014). Smart Lighting: The lighting has been devised simply for the reduction of the electricity cost and increase in the efficiency of energy. The lights might include the features of efficiency along with the automated control which is based on different factors like the availability (Botta, et al., 2016). Usage: The smart lightings are used for the minimization of utilization of energy and saving the light by facilitating a good regulation over the heating and cooling effects. It allows more convenience and comfort. The smart lights utilize the natural light right from the solar energy so as to reduce the efforts of the human. Control: The replacement of the battery, sensory, charging devices and various other devises require proper installation in order to ensure effective functioning of the smart lights. Connectivity: The smart lighting utilizes the connection of internet for reducing the adjustments of the features such as brightness and lighting. Security: The prototype of the smart lighting requires to be checked in every fortnight otherwise it leads to bad functioning (Fletcher, 2015). Privacy: The device will have proper functioning if the state of function is properly maintained. Smart Watch: These devices are very different form the conventional watch and facilitate the best of the features over keeping a check on the time. These watches are similar to the mini computers which are capable of doing the game playing functions, running of the applications, calculations and many things (FORWARD, 2014). Usage: These watches include the schedules, digital maps along with personal organizer and many other facilities. They are very efficient for the use of communication due to the application of the sensors. Control: There are very few buttons for regulating the device. With the sensation of touch and connection to the Bluetooth and other technologies, they are operational. Connectivity: These are connected to the Internet. Such devices are operational in a better way with the higher speed of Internet (Holler, et al., 2014). Security: Not much of technology is devised for the security concerns of the watch. Privacy: The probability of losing the information from the smart watch is very high. These happen to have less relevance in comparison to various other devices considered under Internet of Things. Smart Oven Because of the new and innovative technology and tools, the technology and features of the ovens are also altering and users are deriving great deal of satisfaction. The settings for convection in the oven facilitate the user to increase the speed of the cooking process by 40 percent. Usage: The devices are utilized for the purpose of baking, toasting and many other cooking reasons. Every aspect and feature present in the oven automatically adjusts with each other so as to maintain the devices standard (Jing, et al., 2014). Control: The control of the oven completely lies in the different elements that are present in the oven along with the available internet connection. Connectivity: These ovens are connected with the Internet technology and are controlled both by remote and touch. As these ovens are connected with the internet connection, these are capable of displaying the entire cooking process which includes the left over cooking time and temperature (Kovatsch, Lanter Shelby, 2014). Security: there are many possibilities of losing the control form the temperature in the case where the elements are not adjusted in a proper way. Privacy: Innovative and advanced technology assists in the maintenance of the cooking temperature along with providing of hygienic conditions and foods that are healthy. Smart Wi-Fi coffee maker: The smart coffee maker enables the users to have proper control over the preparation time of the coffee along with the assistance of the Smart phones that they are using. The device assists in preparation of the coffee even prior to the facilitation of the instructions form the consumer. Usage: This device helps in preparing coffee within very less time which can be done even without the instruction. This device is very helpful as it has many added features (Kumar, 2015). Control: These devices are operated with the assistance of the smart phones. Connectivity: Along with the help of the speed of the internet connection, such devices are well operated. Security: the system of security is very relevant and high. Privacy: The privacy is regulated until the smart phone is taken over any other individual. The complete device is regulated with the smart phone. Smart lock: These locks are the electronic locks which are designed for performing the unlocking and locking operations of the doors in your homes. On receiving the signal form the user which matches the security system protocols, the door happens to open. Usage: These devices are used in the maintenance of the security system in the doors. These locks are very efficient for managing the crucial events happening in your home. Along with the cryptographic keys, the process of execution occurs in the doors (Sheng, et al., 2013). Control: the control of the devices happens with a key and lock. The lock is the physical lock while the keys are in the smart phones of the users. Connectivity: The devices are in connection to the internet connection that is high in speed. The complete process of locking and unlocking of the doors depends on the speed of the internet connection. Security: Such devices are very much secured in comparison to other locking and unlocking devices as there are many systems and protocols in the back end of the system (Sicari, et al., 2015). Privacy: The customers privacy is maintained to a high level, however, once the access is given to any outsider through the smart phone, it is very easy to have a breach in the code and break into the house. Smart parking: One of the most striking solutions that the internet of things has done to the parking of the vehicles in the public and crowded places is by introducing smart parking systems. It is very easy to check for a parking space with the help of internet connection instead of waiting in the long queue (Atzori, Iera Morabito, 2014). Usage: The system is very much used in the metropolitan cities where the system of parking is very badly managed due to high population. Control: The empty place can be checked with the assistance of the smart phone. Connectivity: The smart phones are made to have internet connection which gives the desired outcomes regarding the search of the parking in desired time. Security: The method of smart parking assists in reducing the chaos during parking and facilitates maximum security to the customers by providing with the information of the valid and empty place for parking (Want, Schilit Jenson, 2015). Privacy: One can park the vehicles in a safe way in the crowded parking lot. Potential Solution: IoT provides solution to Home by linking up the physical devices to the internet which seems to be difficult to handle. But the best thing is that there are best possible way to handle the complicated IoT systems. There are many communication procedures that helps to handle all the IoT devices at the same time. For example now days there are so many open source languages are available through which its easy to build software for these devices and those software are compatible with each other. If it is compatible then one would easily handle many IoT devices at the same time. IoT Architectures are based on standard procedure and easily accessible. So IoT devices are easily accessible and handle in a Smart Home. Conclusion In another way, Internet of things can be defined as a paradigm in which networking and computing capabilities are observed to be embedded in any sort of conceivable object. People utilize such capabilities for making queries into the objects state and changing the state if there are any possibilities. Internet of thing refer to a very new and innovative world in which almost everything appliances and device that we use are in connection to a network. Many people can also utilize them for collaborate in order to obtain the complicated tasks which need high degree of intelligence. References Ansari, A. N., Sedky, M., Sharma, N., Tyagi, A. (2015, January). An Internet of things approach for motion detection using Raspberry Pi. InIntelligent Computing and Internet of Things (ICIT), 2014 International Conference on(pp. 131-134). IEEE. Atzori, L., Iera, A., management, G. (2014). From" smart objects" to" social objects": The next evolutionary step of the internet of things.IEEE Communications Magazine,52(1), 97-105. Bi, Z., Da Xu, L., Wang, C. (2014). Internet of things for enterprise systems of modern manufacturing.IEEE Transactions on industrial informatics,10(2), 1537-1546. Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues.Computer Communications,54, 1-31. Botta, A., De Donato, W., Persico, V., Pescap, A. (2014, August). On the integration of cloud computing and internet of things. InFuture Internet of Things and Cloud (FiCloud), 2014 International Conference on(pp. 23-30). IEEE. Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Fletcher, D. (2015). Internet of Things. InEvolution of Cyber Technologies and Operations to 2035(pp. 19-32). Springer International Publishing. FORWARD, W. (2014). Internet of Things. Holler, J., Tsiatsis, V., Mulligan, C., Avesand, S., Karnouskos, S., Boyle, D. (2014).From Machine-to-machine to the Internet of Things: Introduction to a New Age of Intelligence. Academic Press. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the internet of things: psychology and challenges.Wireless Networks,20(8), 2481-2501. Kovatsch, M., Lanter, M., Shelby, Z. (2014, October). Californium: Scalable cloud services for the internet of things with coap. InInternet of Things (IOT), 2014 International Conference on the(pp. 1-6). IEEE. Kumar, A. (2015). Internet of Things. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., Leung, K. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities.IEEE Wireless Communications,20(6), 91-98. Sicari, S., Rizzardi, A., Grieco, L. A., Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead.Computer Networks,76, 146-164. Want, R., Schilit, B. N., Jenson, S. (2015). Enabling the internet of things.Computer,48(1), 28-35. Yan, Z., Zhang, P., Vasilakos, A. V. (2014). A survey on trust management for Internet of Things.Journal of network and computer applications,42, 120-134.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.