Thursday, December 5, 2019

Deployment and Operations Committee †Free Samples to Students

Question: Discuss about the Deployment and Operations Committee. Answer: Introduction: The best interface for a system is no user interface, this theory has been a recent craze among the software or application developers. This concept circumvents the fact that the utility of an application can be improved even without the implementation of an interface. There are numerous examples that prove the validity of the statement mentioned above. One of the examples is as provided below (Johnson, 2013). In recent years, several car companies have developed applications for smart phones that facilitate the consumers of their car to unlock the doors of the cars remotely (Barga, Fontama Tok, 2015). The unlocking procedure follows the following steps: The following procedure lets the driver to open the car door and enter the car using a Smartphone latest application that involves 13 steps to complete. The application compels the driver to use the phone. The driver even must take the pain to learn a new interface and all its functionalities (Paparo Martin-Delgado, 2012). Moreover, the experience is designed around the flow of the computer, instead of the flow of a person. However, it can be arranged that eliminating the UI from the above-mentioned process reduce the complete procedure to only three steps: The simplicity can be achieved by many processes, which is possible without the involvement of any user interface. Sophisticated technologies like motion sensors, proximity sensors and biometric plates can be used for achieving this objective. Proximity sensor integrated to the locking mechanism of a car can detect the presence of the registered driver within a specified range around the car and unlock the door automatically. The door lock of the car can also be equipped with biometric sensors that only open when the registered fingerprint of the driver is placed on it (Paparo Martin-Delgado, 2012). The process shown in Figure 2 reduces the complexity of the steps in Figure 1 yet improves the experience of the driver. All of this is achieved without the use of any UI. Therefore, the validity of the statement is thus proved by the example. Applications without UI have a variety of utility in todays world ranging from domestic to organisation. One of the remarkable utility of such application can be found for the daily works of the visually disabled people. These types of applications help the blind people to perform various digital functions through gesture and voice processes like making calls, composing and sending mails, receiving or reading mails, listening to music, browsing the web and such (Paparo Martin-Delgado, 2012). To accomplish an application without UI, it is required to integrate an application with sophisticated Artificial Intelligence (AI).Recent examples of AI integrated smart applications are Magic, Operator, M by Facebook, Cortana by Microsoft and Google Now or Google Assistant by Google. These applications provide almost unlimited option to perform digital functions without involving any UI (Paparo Martin-Delgado, 2012). The specifications of three types of twisted pair cables are as given below: CAT 5e 100 MHz UTP is used for 100 Mbps through 1Gbps Ethernet 1 100 m LAN applications. CAT 6 250 MHz UTP cable supports 10 Gbps short length applications from 35 55 m, which depends on crosstalk environment. CAT 7 600 MHz is an individually STP cabling used for 10 Gbps 100 m Ethernet LAN applications with better control performance in crosstalk than the CAT 6a type (Wessemann et al., 2015). The specifications of three types of coaxial cables are as given below: RG 6/UQ is a quad shield variant of RG 6 that has four layers of shielding. It has an impedance of 75 ohms. RG 7 loses less data at higher frequency for cables used in television, satellite and modems. It has an impedance of 75 ohms. RG 8/U is used in amateur radio. The Thicknet is similar (10BASE5). It has an impedance of 50 ohms (Nordebo et al., 2013). The specifications of three types of fibre optic cables are as given below: The composition of a multimode fibre optic cable consists of a core of large diameter. It has multiple pathways of light medium. It is generally available in two core sizes that is, 50 and 62.5 microns respectively. It is used in general information and applications related to voice fibre such as attaching segments to a network whose utility is in existence, and in applications that are small developments like alarm systems. LED or laser light medium is used by multimode cable core of both size (Agrawal, 2012). The core of a single mode cable is made of glass and its size ranges between 8 10 microns. The size of the core is small compared to that found in the multimode cable. It has a mono light pathway. The range of a single mode fibre optic cable is 50 times more than the multimode cable. It is generally applied in applications that requires high bandwidth range for its operation and in strong network connections that is spread over a wide range of area (Agrawal, 2012). Laser optimised 10 Gb fibre optic cable is a multimode cable variant that has marked fibre optic cable of refractive index profile in each assembly. Its utility is in premise networking applications that include large bandwidth (Agrawal, 2012). The following table shows the comparison between Video Tracking, Sensors used in Internet of Things (IoT) and RFID in relevance to their respective advantages and disadvantages (Xia et al., 2012). Advantages Disadvantages Uses Video Tracking Technology Helps to maintain visual records Aids in providing video evidence against criminal activities Easy to compromise High expenditure in installing Causes privacy issues for general people Video Tracking finds its utility in domestic as well as organisations for the purpose of security. Temperature Sensors It is very sensitive Cost of installation is less It can be surface mounted Accuracy is high Heats up on its own automatically Fails to detect moisture The utility of a temperature sensor is generally found in thermostat devices or semiconductors of high sensitivity. Pressure Sensors Requires less cost to implement Has the capability to adapt to various applications Has high output of signal level Uses robust technology The sensor is highly sensitive to vibrations Moving objects are difficult to detect These sensors are generally used in devices that uses a touch enabled screen Proximity Sensors Has the ability to remain functional in adverse weather conditions Have high accuracy rate Switching rate is high Has limited range of operation Is limited to detect targets of metallic composition The retail industry uses these sensors to track the customers in a chosen proximity and transmit offers in mobile phones. Optical Sensors Has immunity towards electromagnetic interference or noise Has a wider coverage area Very portable to carry and use Has immunity towards heat and chemical reaction Has high sensitivity Provides complete electrical resistance from high voltage electrical sources Sustains loss due to coupler Suffers loss due to scattering and absorption Suffers Impurity, Insertion and Reflection loss Receives interference due to multiple effects Is utilised in IoT technologies, aerospace, healthcare, chemical and energy platforms RFID Is capable of storing information A consumer can be tracked with the RFID tag integrated with the purchased device Versatile technology RFID implementation is very expensive Development of the program requires sufficient time External electromagnetic interference affects the scanning range of an RFID reader Has a very limited range of 3 meters Causes privacy issues Has a vast utility in retail and other organisational sectors as well as in educational institutions Table 2: Advantages, Disadvantages and Uses of Video Tracking Technology, Sensors of IoT and RFID Technology (Source: (Xia et al., 2012)) The various threats to security in association with the implementation of Internet of Things Technology that can be violated to harm consumers are as follows: Creating safety issues Enabling unauthorised access and use of personal data of consumer Allowing to carry out attacks on other systems Nevertheless, other security issues can be addressed in relevance to the implementation of IoT technologies such as direct gathering of important personal data such as bank account details, location, health information and other such information regarding a user (Kumar Patel, 2014). This paradigm enables a unidirectional communication from a single publisher to multiple subscribers. A subscriber expresses its interest towards a specific category or class of data to the publisher, which the publisher acknowledges and transmits the same to the interested subscriber whenever available. According to Nielsen who formulated the Law of Internet Bandwidth, the internet connection speed of a heavy user of internet increases by fifty percent per annum (Zhao et al., 2013). Moore analysed the statistics of growth of transistors in his time and postulated that the quantity of transistors per square inch on integrated circuits will double per annum starting from the year of its invention (Zhao et al., 2013). Both the laws of Nielsen and Moore postulated laws related to technologies that have Internet of Things Platform (Zhao et al., 2013). References Agrawal, G. P. (2012). Fiber-optic communication systems (Vol. 222). John Wiley Sons. Barga, R., Fontama, V., Tok, W. H. (2015). Cortana analytics. In Predictive Analytics with Microsoft Azure Machine Learning (pp. 279-283). Apress. Comer, D. (2015). Computer networks and internets. Pearson. Fotiou, N., Trossen, D., Polyzos, G. C. (2012). Illustrating a publish-subscribe internet architecture. Telecommunication Systems, 1-13. Johnson, J. (2013). Designing with the mind in mind: simple guide to understanding user interface design guidelines. Elsevier. Kumar, J. S., Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11). Levchuk, G., Pattipati, K. (2013). Design of distributed command and control for collaborative situation assessment. Proceedings of ICCRTS. Nordebo, S., Nilsson, B., Gustafsson, S., Biro, T., Cinar, G., Gustafsson, M., ... Sjberg, M. (2013). Low-frequency dispersion characteristics of a multilayered coaxial cable. Journal of Engineering Mathematics, 83(1), 169-184. Paparo, G. D., Martin-Delgado, M. A. (2012). Google in a quantum network. Scientific reports, 2, 444. Wesemann, D., Dnnermann, J., Schaller, M., Banick, N., Witte, S. (2015, May). Less wiresA novel approach on combined power and ethernet transmission on a single, unshielded twisted pair cable. In Factory Communication Systems (WFCS), 2015 IEEE World Conference on (pp. 1-4). IEEE. Xia, F., Yang, L. T., Wang, L., Vinel, A. (2012). Internet of things. International Journal of Communication Systems, 25(9), 1101. Zhao, R., Fischer, W., Aker, E., Rigby, P. (2013). White Paper: Broadband Access Technologies. A White Paper by the Deployment Operations Committee.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.