ITC560 Tutorial W01 Solutions PDF

Title ITC560 Tutorial W01 Solutions
Course Internet of Things
Institution Charles Sturt University
Pages 4
File Size 108.9 KB
File Type PDF
Total Downloads 38
Total Views 132

Summary

Tutorial...


Description

ITC560 202060 Topic 01 Chapter 01 Exercises: Questions 1-6, 8-15, 17 1.1. What is the simple definition of IoT? What is the "more complete definition"? What is the main difference? A simple definition: IoT is connecting things with each other with the use of an internet connectivity while using sensors to collect data from those connected things, identifying data sources and analysing the data through software to enable them to be used for future purposes. Complete Definition: Using various standards and processes to connect things over the internet and allowing to exchange data between the connected things and guaranteeing interoperability. Simple Definition: The IoT is the network of things, with clear element identification, embedded with software intelligence, sensors, and ubiquitous connectivity to the Internet More Complete: Includes standards and processes allowing things to be connected over the Internet to exchange data using industry standards that guarantee interoperability and enabling useful and mostly automated processes. Difference: Includes standards and people 1.2. IoT components were listed for the simple definition to include: the intersection of the Internet, Things and Data. Process & standards were added to the complete definition. Why are Process and Standards important?

Improves interoperability between systems and vendors. Enables automated processes which help scalability of IoT systems 1.3. What are the four main components that empower the IoT? List the main function of each component. 1) Sensors: Collect data 2) Identifiers: Id data sources (sensors, devices) 3) Software: Analyse data 4) Internet Connectivity: Communicate and notify 1.4. What is loT's promise? What is loT's Ultimate Goal? Promise to control and monitor "things" from anywhere in the world. Ultimate goal is to create a better environment for humanity, where objects around us know what we like, what we want, what we need and act accordingly without explicit instructions. 1.6. What is Moore's Law? When was first observed? Why is relevant to IoT? The observation that the number of transistors in a dense integrated circuit doubles approximately every two years. Gordon Moore (co-founder of Fairchild Semiconductor and Intel) described a doubling every 12 months in the number of components per integrated circuit in a 1965 paper and projected this rate of growth would continue for at least another decade. In 1975 he revised the forecast to doubling every two years. Intel executive David House stated that chip performance would double every 18 months (being a combination of the effect of more transistors and the transistors being faster). This is an exponential growth scenario. IoT is also expected to grow exponentially. The cost comes down and compute power goes up, all helping to enable the growth of the IoT 1.8. What are the top three challenges for IoT? Why are those challenges also considered as opportunities? 1) Security - physical, data etc (software and hardware security equipment an opportunity)

2) Increase in connected devices - networking challenges (CDO - Chief Digital Officer - new positions to drive IoT systems in organisations) 3) Standards and Interoperability - open standards encourage interoperability 1.9. What is BYOD? Why is it considered a security threat for enterprise networks? Bring Your Own Device: Sensitive data can be taken out of corporate network (loss or selling device, accidental transfer of data, employee takes device if leaves company). Transfer of computer viruses from less secure devices (device not controlled/patched by company).

1.10. How do companies deal with BYOD today? List an example of a BYOD system. Many companies ban or don't support BYOD. Two sets of firewalls, one facing inwards for corporate devices, another facing outwards (or limited internal access) for BYOD. By joining the CSU wireless network, you give permission for CSU to erase your phone (presumably if it is lost). Software systems include PacketWorks: http://packetworks.net/blog/it-strategy-lower-security-risk-of-bring-your-own-device SecurEdge Networks: http://www.securedgenetworks.com/enhanced-learning-with-byod-solutionsfor-school-wireless-networks

Cisco BYOD Solution: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BY OD_Design_Guide/BYOD_Solution_Overview.html

1.11. Why is Operation Technology (OT) under pressure to integrate with Information Technology (IT)? Many OT devices for monitoring or adjustment were not computerised and those with compute resources generally used closed, proprietary protocols and programmable logic controllers. The systems involved often relied on "air gapping" for security ie no external network. Internet of Things is a growing part of automation, communications and networking in industrial environments. Wireless sensor and actuator networks are being integrated into industrial environments, eg for water treatment, electric power and factories. IT/OT convergence enables remote and more direct control and more complete monitoring, with easier analysis of data from these complex systems. 1.13. What is KISS? What are the top five principles for a KISS user experience? Originally "Keep It Simple Stupid". Less 'offensive' versions include "Keep it Simple, Silly", "Keep It Short and Simple", "Keep It Simple and Straightforward" and "Keep It Small and Simple". All mean the same thing. KISS: most systems work best if they are kept simple rather than made complicated; therefore, simplicity should be a key goal in design and unnecessary complexity should be avoided 1) Simple and Easy: best UX system doesn't need a UI, avoid unnecessary complexity, reduce user workload 2) Contextual: users should be aware of where they are in the system 3) Human: UI should provide human interactions above machine interactions 4) Engagement: UI should fully engage users, deliver value 5) Beauty and Delight: UX should be enjoyable, the user should want to use it 1.15. What are the four key differences between Analytics 1.0, 2.0, and 3.0? 1) A1 structured data only; A2/3 can also handle unstructured data 2) A1/2 located in centralised data centres; A3 located at edge as well

3) A1 calculations take days/hours; A2 take hours/minutes; A3 seconds/microseconds 4) A1 reasonably small data sets; A2/3 handle "Big Data" 1.17. What are the top three benefits of cloud computing? What do they mean? 1) Allow enterprises to self-provision their own services 2) Can start small and scale up when necessary, with minimal expertise or preplanning (can also quickly downscale if demand drops) 3) Only pay for resources that are used

9.1. What are the top ten IoT verticals as defined by oneM2M and ETSI standard bodies? Agricultural & Farming, Energy, Enterprise, Finance, Healthcare, Industrial, Public Services, Residential, Retail, and Transportation 9.2. This chapter stated that the real impact of IoT will only occur when data from the silos is combined to create completely new types of applications. What does this mean? Why is it important? Real impact of IoT will only occur when data from silos combined to create completely new types of applications. This means that an IoT application should be able to manage IoT elements from many verticals with common parameters, open data models and APIs. This is important so that data from IoT elements, combined with new knowledge emerging in area of "Big Data", will create the framework for many new types of applications. This progress will drive growth of IoT. 9.3. What are the top two challenges to the farming industry? Why does IoT address these challenges? Water shortages and reduction in farmland. May be addressed by using IoT sensor-based agriculture solutions to monitor soil moisture, crop growth, livestock feed levels and irrigation equipment. 9.4. Some companies identified the six pillars for IoT to include Connectivity, Fog Computing, Security, Data Analytics, Management and Automation and Application Engagement Platform. What is meant by each area? Why is each of these areas essential? 1) Network Connectivity: Includes purpose-built routing, switching, wireless products available in ruggedised and non-ruggedised form factors 2) Fog Computing: 'Fog' is a distributed computing infrastructure for IoT, which extends computing capability (and data analytics applications) to network 'edge'. It enables customers to analyse and manage data locally, and to derive immediate insights from connections 3) Security: Unifies cyber and physical security to deliver operational benefits and increase protection of both physical and digital assets 4) Data Analytics: Provides optimised infrastructure to implement analytics and harness actionable data 5) Management and Automation: IoT System provides enhanced security, control and support for multiple siloed functions to deliver easy-to-use systems for managing an increasing volume of endpoints and applications, field operators need an easy-to-use management system 6) Application Enablement Platform: Offers a set of APIs for industries and cities, ecosystem partners and third-party vendors to design, develop and deploy their own applications on foundation of IoT System capabilities 9.6. Three main use cases were listed for IoT Agriculture and Farming. List another use case.

Control of growing conditions of offspring in animal farms to ensure survival and health 9.7. What is the definition of a connected home? Provide an example. Connected home is defined as any home with at least one connected device (eg connected appliance, home security system, door, motion sensors)

9.11. Experts believe that the lack of IoT standards and communication protocols is putting development in risk especially in Healthcare and Financial applications. Why is that? Scalable, multi-vendors solutions cannot be utilised without Standards and common communication protocols. Clear and proven standards (e.g. around security) are also essential for user (e.g. customers, healthcare workers) acceptance. 9.12. Define the top requirements and framework to introduce "Heat as a Service" under smart building? Two possibilities for "Heat as a Service" include: Power company owns entire heating requirements including heaters, pipes and provide heating service. Power company provides IoT enabled portable heaters in smart building. Customers/residents can enter their credit card information and start using it 9.16. Describe the operational model of IT as a service (ITaaS)? Which organisation is delivering the service? Which organisation is receiving the service? How is the service delivered? In IT as a Service, the IT service provider (may be external or internal) delivers an IT solution for the business. The recipients of ITaaS can be an organisation such as Line of Business within an enterprise or a Small and Medium Business company. ITaaS solution is typically delivered as a managed service...


Similar Free PDFs