Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Internet Technologies and Education

Dsicuss about the Survey On Enabling Technologies Protocols.

IoT involves interconnection between computers through the internet which is used in each object in order to send or receive data. Here, there are discussions on what the internet technologies are used for and the factors that influence the relationship between internet use and the socialization.

More information people look for is available on the internet. It offers a wide range of benefits to many in the society. The Internet has many publications being put up on a daily basis, which contain information on the different subject area. Students worldwide use it as one of their primary sources for information in learning. Unlike encyclopedias or traditional libraries, an extreme and the sudden lack of centralized information or data is found on the internet (Da, He and Li, 2014). The more significant aspect of the internet change is the exponential growth which enables it in easing and transforming people’s lives or increasing their knowledge. Nowadays the wants and requirements of society take a lot of our time hence having a feeling that the time is not enough to undertake our daily activities. Coming up of the internet led to saving time from many activities which took longer to finish.

The internet technologies such as email and search engines are mostly used in academic institutions for communication and information gathering. The Internet is very rich in educational information and is widely accessible to students in the academic institution. The fact that one can access this information using computers or smartphones makes it cheaper compared to buying volumes of books for academic purposes. A decade ago, (Zanella, Bui, Gastellani, Vangelista and Zorzi, 2014) found that the use of the outdated internet will make reference librarians irrelevant being the only information providers since the information which used to be provided in reference desk had been moved to a home page of the internet. Since the internet has been widespread to everything related to man, information can be found and also its research work needed to complete a project. Accessing information from internet tends to be quick compared to reading a whole book.

The study addresses different forms of the internet technologies in use today by the university students.

Internet Chat Services: If you ask a university student his/her favorite way of communicating he/she will say that it’s instant messaging which is their best choice. Ease or continuous entry in the internet chat gives out tremendous ways to youth interactions, allowing the connection among themselves and also to different people all over the world. The Instant messaging services allow communication between people from any country in the world (Conti, Dehghantanha, Franke and Watson, 2018). Certainly, chatting and more specifically chat forums/groups are changing the socialization world for the youth through affecting the way they communicate, start or maintain their communication or get social support. So it is important to acquire knowledge for the significant benefits or risks of youth chat use or come up with strategies to provide secure or positive practice which are needed by the teens.

Chat Services and Social Networking

Internet Social Networking Services: Refers to the access of the authorized websites or applications to reach other users and get other people with the same motives as to yours. The service of the social network contains a representation of every user (profile), their social links or several other services. The commonly used services of social networking include Facebook, LinkedIn, Twitter and Myspace. Students use these internet services to update their friends as well as be kept updated about their friend's lives. Facebook has the largest number of users with 1.11 billion active users as of March 2013 while Twitter, on the other hand, has over 600 million users (Da, He and Li, 2014). But as with other technological developments, online social networking sites have proven problematic for college management. Uploading of funny pictures using those services has led to the true world of college law activities to the students’ effective world which is very conducive.

Internet Email Services: In accordance to the information of PewInternet and ALP, 89% of university students have access to e-mail, and 75% have access to Instant Messaging, hence allowing them to exchange a lot of communication through a specific peer group. More than 50% of youth have many e-mail address and screen name that they use by sending secret messages to their friends or take place anonymously to the online forums like the chat rooms, (Al-Fuqaha, Guizani, Mohammadi, Aledhari and Ayyash, 2015).  Email is widely used in the academic information between students and their lectures. Due to its ability to have large attachments embedded, it is popular with lectures in distributing coursework notes to students and receiving soft copies of assignments from students leading to cost savings on money that would have been spent printing the material. Thus, this makes it one of the primary mediums of communication in institutions of higher learning.

The internet has over the years had many uses. The need for the internet as a guidance tool in colleges has greatly gone high. The growth for the websites of academic course websites which has a large number of learning materials embedded to them has increased (Zanella, Bui, Gstellani, Vangelista and Zorzi, 2014). The use of internet in learning institutions has greatly increased. A lot of universities, including the big learning institutions, are using improved technologies together with their older teaching frameworks. It is important to access Web pages with courses from the different areas taught in the universities and also colleges giving course notes or similar resources as addition to courses which are offered in classrooms. The internet transfers information between the teacher and the student. But uploading of the academic materials in the Web will not make students to use those materials to improve their learning and course understanding.

Email Services and Academic Communication

The theories that were researched on were Grohol Model and Dystopian and Utopian.

Dystopian and Utopian View of Internet Usage: The classification of technological belief and misery are widespread according to the exposure and forecast around the internet. When majority bubble over the increase for the internet, showing the thorough increase of freedom in the strange free will cyberspace, critics are also there but in more little numbers, who oppose the unfairness for the entire populations through the best technology of fraud and inspection (Chu, 2017). Many people would accept that the merging of computing with telecommunications gives the beginning of a fresh information change. The increase of information technologies together with information networks has been high, with similar large literature that explains more possibilities brought about. Networks with high speed can connect a lot of systems, giving communication links which nobody knew a possible decade ago, so more visions on how the technology will change entire society are available.

Grohol Model of Internet Addiction: The internet has to be created as an outcome and consequence to the global change of people’s society and the natural aspiration to the world by advancement, which is unpreventable. Term addiction mostly refers to several human activities (Qiu, Qiao and Wu, 2018). In case of addiction is described through the time used in the activities, it can be concluded that current human being, can be attached to the internet technologies hence making them waste their time on the internet. People do develop problems from spending lots of time on the computer, and he relates to the idea that people engage in it since they try to avoid dealing with problems in their lives; similar to one who goes out for a drink to forget his/her problem. This is referred to as the stage of enchantment or obsession.  The second phase is disillusionment the person becomes uninterested in the activity they often do.

It is irrefutable that coming of the Internet of Things is research filed that support a lot of exciting solutions to most problems faced in countless domains. The primary purpose of this paper is to address the various encounters regarding safety and privacy which are being experienced in the current setting as a result of the emergence of the Internet of Things (IoT).  

The universe has presently come into an extraordinary time whereby organizations products and services, as well as electronic devices such as sensors, are linked devices. As a result, these devices can interact with each other with no any human interaction. A good example is the smart sensors being utilized in the traffic and road control structure assemble information regarding the traffic condition and roads and the weather condition among many others (Conti, Dehghantanha, Franke, & Watson, 2018). In another view, the potential significance of IoT is virtually limitless, and the current IoT-built applications are making changes in the manner in which people work and live by saving time, resulting in novel opportunities for development, the formation of knowledge as well as innovation. Accordingly, successful IoT Applications are allowing both public and private companies to regulate their resources, design of new business models and business performance optimization (Chu, 2017). Nonetheless, the researcher is still experiencing numerous challenges in this era in filed like how to save energy with the use of strong and dependable smart electronic sensors infrastructure; establishing innocuous and secure communications using dissimilar elements at the network edge only to mention a few.

Utopian and Dystopian Views of Internet Usage

To attain this goal, how to counteract the challenges in all domains of IoT, the research is supposed to realize IoT at the scale projected above needs critical research along different directions. In this part challenges as well as needed research is pointed out in the following areas: architecture and dependencies, massive scale and security.

Architecture and dependencies: Since uncountable objects are connected to the internet, it is important to have sufficient architecture which allows easy connectivity, useful applications, communications and control (Chu, 2017). The challenge here is how these items will communicate in and across the application. Research suggests that to make this concept possible the IoT should emulate the smartphone idea whereby to devise a strategy that will allow applications to be executed and made available from an app store.

Massive scale: With the present increase in the number of smart devices deployment it means that in the long run trillions of objects will be over the Internet. The challenge will be on how to authenticate access, name, and use, protect, maintain and support the gigantic scale of things. Subsequently, because most of the things on the Internet will need some source of energy, will energy scavenging and huge low power circuits disregard the necessity for batteries?   

Security: The crucial problem is the pervasiveness in the present day Internet. Security attacks have problematic for the IoT due to the little ability of the devices in use, the openness of the applications, physical accessibility to sensors and the facts that a majority of these devices will interact wirelessly (Al-Fuqaha, Guizani, Mohammadi, Aledhari, & Ayyash, 2015). Furthermore, the security difficult is intensified due to the fleeting as well as permanent failures which have common. Thus, due to the common recurrent failures, they can be exploited by hackers.

The use of IoT is expansively appreciated in the present world thus its wide use by individuals across the globe. However, the Internet of Things faces some challenges in terms privacy and security making it suffer numerous challenges of a data breach.

To achieve realistic application needs which stem from durable and unattended operations, IoT applications should be in a position to keep on operating satisfactorily in the presence of and to effectively recover from security attacks. The systems are also supposed to adapt to unanticipated once the system is deployed. 

Conclusion

In conclusion, the aim future is to ensure that IoT becomes a utility with a rising sophistication in communications, the creation of knowledge from huge volumes of data, sensing, and actuation.

References

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.

Chu, N. N. (2017). Surprising Prevalence of Electroencephalogram Brain-Computer Interface to the Internet of Things [Future Directions]. IEEE Consumer Electronics Magazine, 6(2), 31-39.

Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities.

Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4), 2233-2243.

Gündo?an, C., Kietzmann, P., Schmidt, T. C., & Wählisch, M. (2018). Hopp: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things. arXiv preprint arXiv:1801.03890.

Qiu, T., Qiao, R., & Wu, D. O. (2018). ABS: An event-aware backpressure scheduling scheme for the emergency Internet of Things. IEEE Transactions on Mobile Computing, 17(1), 72-84.

Wang, Y. P. E., Lin, X., Adhikary, A., Grovlen, A., Sui, Y., Blankenship, Y., & Razaghi, H. S. (2017). A primer on the 3GPP narrowband Internet of Things. IEEE Communications Magazine, 55(3), 117-123.

Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 22-32.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). IoT In Academia: A Study On Internet Technologies And Socialization Essay.. Retrieved from https://myassignmenthelp.com/free-samples/survey-on-enabling-technologies-protocols.

"IoT In Academia: A Study On Internet Technologies And Socialization Essay.." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/survey-on-enabling-technologies-protocols.

My Assignment Help (2019) IoT In Academia: A Study On Internet Technologies And Socialization Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/survey-on-enabling-technologies-protocols
[Accessed 18 December 2024].

My Assignment Help. 'IoT In Academia: A Study On Internet Technologies And Socialization Essay.' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/survey-on-enabling-technologies-protocols> accessed 18 December 2024.

My Assignment Help. IoT In Academia: A Study On Internet Technologies And Socialization Essay. [Internet]. My Assignment Help. 2019 [cited 18 December 2024]. Available from: https://myassignmenthelp.com/free-samples/survey-on-enabling-technologies-protocols.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close