Nt1310 Unit 3 Data Computing

Great Essays
c. Data computing
The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices. As the number of IoT devices in the future increases there will be an overwhelming amount of data that needs to be processed, analyzed and transferred back to the end device. For this a robust architecture is needed that is capable of processing high amount of data in real time in a very fast and orderly process.
The storage of such huge data also must be taken into consideration. This is because there should be a centralized data management system. If the data is not stored appropriately, then the information that is repetitive in nature will be processed again and again. This will result in high processing time of data that could have been stored for future use. Thus, a robust infrastructure is needed that will be able to not only store high volumes of data but also be able process that data in very quick time frame.
The large amount of data generated by the IoT devices also brings about the issue of security. As the volume of information
…show more content…
For the successful implementation and for having better network performance, millimeter wave antennas, small cells, device to device communication along with mobile cloud computing for data analysis could be used in a 5G network. Hence, it is important to design a network that supports the integration of different technologies for providing high data traffic and better QoS [13]. These technologies are standalone technologies because of which a platform should be designed that brings these technologies together for the 5G network

Related Documents

  • Improved Essays

    Nt1310 Unit 4 Case Study

    • 424 Words
    • 2 Pages

    Utilizing the information from the table above the mean, median and standard deviation will be calculated. The mean equals the average of the sample by adding all the values of the samples and then dividing by the total number of items. The mean for the samples collected is 14.87 ounces which rounded up 14.9 ounces.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The design idea we had was modified several times. Initially the fingers that were constructed for the hand seemed to work and look fine in our Solidworks assembly. We did not want the fingers to be too large as the girl were were designing the hand for is only seven years old. However, after printing them, we quickly realized that they were far too small to be able to exert the force to grasp a water bottle. Furthermore, because they were so small, it was difficult for the 3D printer to print out the finger because the walls were so thin.…

    • 1064 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    Suited for small operations that don’t require large amounts of storage space. Also suited for operations that are critical requiring high availability and no downtime. 1. Improved…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 693 Words
    • 3 Pages

    1. The advantage of using a very large memory cell size is that the computer can store larger values in its memory cells. The disadvantage is that there would be fewer cells available. 2. This question asks how many bits are needed in the MAR with the following numbers a. 1 million bytes = 20 bits b. 10 million bytes = 24 bits c. 100 million bytes = 27 bits d. 1 billion bytes = 30 bits 3.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3 Case Study

    • 283 Words
    • 2 Pages

    The kernel is not a fast food venor in this case but the system in which the operating system of the computer (such as Mac, Windows, Linux etc…) communicates with the cpu. What this bug has caused is a massive breach in the way this communication is happening because it has halted the communication from being coded allowing hackers to come in and destroy peoples systems. There should be a full investigation on Intel and any of the other affected chip makers and to prevent this from happening with any other chipsets in the future there needs to be government inspectors in this industry. I hope to learn why Intel/ARM chipset makers did not notice this bug and why they didn’t notify the public of this when they 1st discovered it. I also hope to…

    • 283 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Hi Maribel, I have been in communication with the Prelude TS in regards if this can be accomplished and if so, can we mimic what is being done in ecw to stay compliant. Here is the response from the TS: My recommendation was to build it as a document table that way we can mimic Ecw, while staying compliant. Ideally the end result should looks like this:…

    • 67 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Application Support Application Support is type of software that runs on the computer. These are things like internet browsers, Games, Email programs etc. Each of these Applications has a different purpose. Such as Word processors are used for essays and research. Whereas games are simply used for enjoyment.…

    • 218 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 1 Evaluation

    • 473 Words
    • 2 Pages

    When I started to film my advert, the location where I was filming was only open for 2 hours which didn’t give me a lot of time, so I made the decision to film everything inside the building because I could do all of the shots that were outside the following day, doing this gave me more time to spend on the shots inside. The one problem I ran into whilst shooting was that the camera wasn’t charged so I had to spend 20 minutes charging the camera, instead of doing nothing for that time I decided to go over with the actors what scenes we’d be doing and went through the shots we’d be doing. Next time before I film, I will check the camera to see if it has any charge. When it came to filming, everything went really smoothly, because of the practice…

    • 473 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Movistar Mexico Case

    • 498 Words
    • 2 Pages

    The recommendations for Telefonica Movistar Mexico and regarding the information, the company is composed not only of the internal employees, they are composed of other teams and providers, all the employees have goals to achieve but as normal employee you need the be support for your providers or partners, so is important to include the external people in the evaluations to review that the evaluation is 360 grades in spiral. Movistar can request this new evaluation in the success factor module to measure them and complete the scene. In other aspects, the “go-to-market strategy” will be good during 2011 to 2014 because Movistar became the first in launching new technology and offers to customers, but sometimes you need to aggressive in the…

    • 498 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Likely implications: Amnesty international have certain likely implications that can occur via the use of this IoT framework. The major issue is security, with the amount of internet-connected devices are lacking in rudimentary cyber security procedures that it's likely to hack them in as little as three minutes, allowing cyber attackers to steal data (Palmer, 2016). This is a huge issue for any company as well as Amnesty International. This is because they carry so much data form their donors which contain personal information including credit card details as well as home addresses. This personal information needs to be protected so that a cyber attacker cannot hack them and get a hold of this information.…

    • 217 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    The Eco Smart Can Analysis

    • 1677 Words
    • 7 Pages

    It provides the ability to transfer data over the internet. My project, “The Eco-Smart Can”, aims at using the same concept of the IoT and connecting a built device using an open-source computer and software to send data from a traditional trash container to maintenance facility office. The objective of this project is to create a device that will shoot sonar waves to know the level of the trash in a container. It will also measure temperatures inside the container, because high temperatures can cause bacteria or germ to reproduce faster. Data collected from the sensors will be sent over a cellular network General Packet Radio Service (GPRS) or Internet (through Wi-Fi) for analysis and displayed on Ubidots which is a cloud web platform to display collected data see Fig.…

    • 1677 Words
    • 7 Pages
    Great Essays
  • Great Essays

    This is the reason of heightened security concerns with this future technology. With an infinite number of devices connected and sensitive information stored ‘in the cloud’, any hacker entering the network could control it and inflict economic and physical damage Therefore this is a huge safety issue. These harmful computer programs could even trigger weapons of mass destruction(WMD’s) without anyone being able to ascertain the culprit. Another risk associated with this disruptive technology is Privacy as a breach could expose huge amount of Personally identifiable information(PII). After businesses, governments are expected to be the second largest adopter of IoT…

    • 1227 Words
    • 5 Pages
    Great Essays
  • Great Essays

    ABSTRACT: In cloud computing, load balancing is one of the key issues. Load is a measure of the amount of work that a computation system performs which can be classified as CPU load, memory capacity and network load. Load balancing is the process of apportioning the load among various nodes of a distributed system to improve both resource utilization and job response time. Load balancing ensures that every node in the network does approximately equal amount of work (as per their capacity) at any instant of time.…

    • 1320 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Importance Of Iot

    • 1071 Words
    • 5 Pages

    IoT or internet of things can be considered as the new backbone of the society, which is related to information. IoT is a well-known term which is related to the interconnectivity between the two or more devices (the devices are physical devices such as buildings, smart devices, actuators, sensors, and software). It can be basically anything and everything which can be digitally connected with each other so that they can start the process of sharing data with each other. The process of sharing of data also consists of collection of data through different mediums. There has been a tremendous growth of wireless technology in every sector starting from industry, businesses and even home.…

    • 1071 Words
    • 5 Pages
    Improved Essays