100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Essay

Unit 19 Internet of Things Assignment 2 (all criteria are met)

Beoordeling
2,0
(1)
Verkocht
3
Pagina's
17
Cijfer
A
Geüpload op
06-07-2022
Geschreven in
2021/2022

B.P3 Produce an IoT system or device design to solve a problem, including the architecture, standards, communication requirements and security. B.P4 Review the IoT system or device design with others to identify and inform improvements. C.P5 Develop a prototype IoT system or device with partial functionality to solve a problem. C.P6 Review the extent to which the IoT system or device meets the client’s requirements. B.M2 Justify design decisions, showing how the system or device design will result in an effective IoT system or service solution. C.M3 Develop a functional prototype IoT system or device to solve a problem as intended and that meets the client’s requirements. B/C. D2 Evaluate an optimised IoT system or device design to solve a problem against the client’s requirements and using feedback from others. B/C. D3 Optimise the prototype IoT system or device to solve a problem as intended and that meets the client’s requirements, demonstrating individual responsibility and effective self-management.

Meer zien Lees minder
Instelling
Vak










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Study Level
Publisher
Subject
Course

Documentinformatie

Geüpload op
6 juli 2022
Aantal pagina's
17
Geschreven in
2021/2022
Type
Essay
Docent(en)
Onbekend
Cijfer
A

Onderwerpen

Voorbeeld van de inhoud

U19 Assignment 2 – Internet of Things

Table of Contents
Introduction............................................................................................................................1
Problem..................................................................................................................................1
Design.....................................................................................................................................2
Architecture............................................................................................................................3
Standards................................................................................................................................7
Communication Requirements.................................................................................................7
Security.................................................................................................................................10
Feedback...............................................................................................................................11
Improvement Optimisation...................................................................................................13
Implementation Future Review.............................................................................................14
Obviously following the design development of the IoT device, and as previously stated, we
are currently unable to put this IoT device into full fruition. However, following the design,
and all its improvements we can take this design and look to deploy it into its industry........14
Justification + Evaluation Review...........................................................................................15
References.............................................................................................................................17

Introduction
Following the initial research, I undertook researching into the internet of things
sector, and analysing the different sectors this technology is deployed into, I have
further been requested to analyse this sector into more detail and come up with an
IoT solution that can be deployed within the company.
I have decided to take this position on board, and hope to provide a scalable,
suitable IoT device that can tackle the current issues within the security sector that
the company are facing.
Moreover, through providing this solution, it will hopefully aid the company in the
future deployments of their products for their consumers.


Problem
Using this initial research of the home sector and transportation sector, I have
decided to opt for a home sector oriented IoT device. Although I did find the
transportation sector to have more variety and excitement in the area of IoT, I

, believe that the home sector could do with some adjustments and innovation in the
development of their IoT devices.
So, in turn of this, I will be designing and looking to implement an IoT device that
can actively monitor a situation, whilst being biometrically robust in protecting any
outside interference such as potential thieves or those looking to vandalise
property. This will solve the problem that many encounter when trying to protect
their valuables in this high crime rate world we currently live in.
This device is likely to come in the form of a biometric lock, that can be remotely
operated and serves its main purposes through the application that will be
developed, allowing individuals to actively monitor a situation taking place. This
device is also likely to pinpoint GPS locations, so an individual can have these
devices in multiple locations, even in some moving vehicles or devices, and still
actively monitor the location of their device.


Design
To provide a decent baseline in which we can build our IoT device off, I will be
designing an IoT device that can be deployed into the intended sector. Through
implementing a design phase in which we must follow, it will allow us to visualise
the final product that will be released to the public, whilst also gaining feedback off
these designs to inform improvements we can make in the development of this IoT
device’s design.
‘Airtag’ to provide NFC communication The central company database that will
to the smart lock, provided as a backup The consumer side of the smart lock store
is the the
application in which
data learned over time from
option to the application. we provide to access and control thethe smart locklocking
smart from asystem
remoteand look to
standpoint. This application allows this exactly
inform to happen and
improvements is
through its
Provides the core centre for energy to installable from the application store,machine
so therelearning
are no extra
techniques.
the smart lock and allows the smart steps needed to install this application.
lock to make use of its functionality. Raspberry PI board that will compute
Alternate measure is to connect to The application allows for multiple smart
next locks
to all to
theappear withincollected
information
main source of power in the event of a the interface and allows the individual to manually
from the smartcontrol the camera,
locks in-built
power cut or natural disaster. status of these locks through an easyand
slider mechanism,
then release thisanddata to the
these smart locks can simultaneouslydatabase
be activated at one
for the relevant machine
Siren that alerts emergency services if location and deactivated at another. learning to take place and ultimately
the in-built timer goes over three boost improvements to these devices
minutes, also sets of flashing lights to As the security company are likely tooverwanttime.
to implement a
try and stray the intruder away from solution that can have multiple use cases, I have also decided to
the smart lock. implement a functional button
To allow that allows
this device to bean individual
useful to
in deployment in multiple
simultaneously lock or unlock
scenarios, the to
I had entire smart locking
implement system This was to
a microphone.
Actuation wheel to access the The original door hinge
as one in the caseallow
of emergency or accidentally not locking
for the ability of two-way communication between
facility after valid method of that is used forthese
activation
devices whentheintended.
device owner and whoever is using the IoT device at
entry is recognised, is turned like of the door manually but the given time. This really increases the chance that this
an ordinary locking system. This won’t be operation under IoT device can be deployed on a larger, more international
removes the need for a huge the new smart lock. scale within the company, as it changes generally what a
transition over to this IoT device. smart lock is capable of.

, I personally believe to have produced a design that successfully meets the clients’
requirements listed in the brief originally handed to me. This device solves the
serious issue that current companies have with security, and the simple
misplacement of a traditional key, can lead to an entire company’s security to be
jeopardized.
Moreover, we have not only provided a solution to the current issue that many
major companies are facing, but also provided a simple, intuitive application that
these companies can use to simple control these IoT devices, even from a remote
location.
Finally, to entangle this whole IoT solution together, the smart lock will be written
in C++. This is down to the fact that this programming language is readable by the
Raspberry PI board and that this language can communicate components of the IoT
device to the main board in an efficient manner. In addition to this, this language is
extremely powerful and can also communicate the data processed by the Raspberry
PI through the internet connection provided by the host and send the necessary
data off to the database situated in the company where needed machine learning
can take place.


Architecture
In essence, the architecture is the other factors of an IoT device that make it into
the device it is to function in the way that it can. Examples of these types of
architectural differences are sensors, cloud services, layers and many more.
€15,80
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
2 jaar geleden

2,0

1 beoordelingen

5
0
4
0
3
0
2
1
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
jhanleyyap Gloucestershire College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
13
Lid sinds
4 jaar
Aantal volgers
10
Documenten
6
Laatst verkocht
4 weken geleden

3,7

3 beoordelingen

5
1
4
1
3
0
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen