Comparison Of Computing Devices, Moore’s Law, Specialist Processors, Operating Systems, Wireless Networking, IoT, And Programming Languages

Smartphone vs. PC

The Internet of Things (IoT) could be defined as the integrated system of computing devices, digital machines that would be provided with unique identifiers that would have the capability of transferring data over a network. The IoT technology has a huge level of importance in the recent world as this technology often helps in better form of services based on data over a network (Gubbi et al., 2013, p. 1645-1660).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The use of IoT have made a profound impact in the development process of smart cities, forecasting of future activities. IoT also plays a major role in the fields of education, healthcare, security and finance. The ecosystem of IoT would comprise of smart devices that embeds processors, sensors and hardware meant for communication. These devices are also able to communicate with other smart devices and thus work on the instructions gathered from other devices. These devices perform most of the work without the intervention of humans.  

The IoT framework offers a wide range of beneficial services to the organizations. They also enable the organizations to help in monitoring the entire processes of the business, enhance the productivity of the employees, enhance the decision making processes and thus generate much more revenue for the business. The IoT technology helps in encouraging the companies to rethink the way of the underlying processes within the business, markets and industries (Yang, 2014, p. 247-261).

The IoT technology also connects millions of devices to the internet platform and thus involves billions of points of data that would be needed to keep secured. Hence, there are a huge number of concerns regarding the security and privacy of the devices, which should be resolved in order to provide a healthy environment of work.

The definition of Butler Lampson’s third age of computing deals with the use of computer embodiment. This would employ the utilization of computers based on the use of computers for the interaction with the people in various forms of new and smart ways (Hey, Hey & Pápay, 2014).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

One of the example based on Butler Lampson’s third age of computing would include the advent of autonomous cars. It is a form of vehicle that would be capable of sensing the current environments and thus would be able to navigate through the roads without the help of humans. The autonomous cars provides the combination of several forms of techniques that includes radar technology, GPS, computer vision and odometers. The impact of self-driven or autonomous cars would be able to save thousands of lives. These vehicles have the ability to process different forms of complex sensor based data in an instant manner (Gerla et al., 2014, p. 241-246).

Moore’s Law and its potential end

In some form of embodiments, the different ideal methods of the use within the self-driven vehicle (SDV) would comprise of identification, response to identify the need and thus respond to the queries. The embodiments include the varied needs based on the interaction of humans and the types of human interactions. Another method within the autonomous vehicles would include the process of identification of a vehicle. Some of the embodiments based on present invention would include a computer program for driving a self-driven vehicle. The processors would receive the readings from the sensor based on the equipment within the SDV (Widdershoven, Meynen & Denys, 2015, p. 16-18). The equipment would detect an equipment state and thus respond to the needs of the device. Based on the embodiments, an SDV would comprise an inbuilt processor, a non-transitory medium of computer readable storage and a maintenance sensor.    

The comparison is based on a personal computer (PC) and smartphones.

Elements

Smartphone

Computer (PC)

Power

These devices mainly run on batteries. Hence these devices make use of power in an efficient manner. A small performance battery would not be able to provide high form of constant power unlike a desktop computer (Salehan & Negahban, 2013, p. 2632-2639).

The CPU would consume huge form of electricity whenever there would be a high level of performance. The TDP of a high performance computer could have a range from 100 to 600 watts.  

Cost

The cost of a smartphone is usually less than that of a PC. This is also due to the reason of low level of functionalities and costs of processors. These devices do not require such high level of performance as a PC and hence the costs are minimal.

The costs of PCs could range from low to high ranges. This would mainly depend on the ability of performance, storage capacity and also the integrated costs of various peripherals such as keyboard, mouse, printers and various other accessories.

Storage

Most of the smartphones are generally supplemented with 8 GB of RAM and 64 GB of inbuilt storage capacity. They would be offered with a low capacity of storage and their integrated components would not be modified as a computer.

The hard drive of a computer are mostly consisted of one terabyte (TB) of memory. These may also increase with the increase of prices. A basic computer also consists of 250 GB of hard drive space. An external hard disk could be added with laptops, desktops or other netbook computers (Abolfazli et al., 2014, p. 337-368).

Operating System

The operating systems (iOS, Windows, Android) have a specialization for certain set of test cases and a set of devices. They would not permit complete access to the hardware of the mobile system. The OS takes the advantages of the modern chipsets.

They possess full featured form of operating systems. They are designed for the performance based on fast CPUs, high RAM performance and large amount of disk space.

The law proposed by Gordon Moore is based on a computing term that had originated in 1970. This law is the simplified version of the form of law that would be able to state the speeds of the processor or the overall power of processing for computers would be able to double in every two years. He also predicted that the trend would continue in the future.  Within a few years, the technical companies would strive harder to bring newer form of advanced computers (Chien & Karamcheti, 2013, p. 48-53).

The recent era of technologies have brought innumerable innovations within the silicon chip technologies. The next form of technology based on silicon processes would turn out to be extremely advanced based on the day-to-day operations. There are strict form of impending challenges and this has raised a concern that the prediction based on Moore’s Law would come to an end.  

The prime implication of the end of Moore’s law is based within the performance of larger forms of computations that might require a greater form of material based resources such as networks, computers, data centres and chips (Waldrop, 2016, p. 144). The use of high-end technology in the future would play a major role in eradicating the current limitations within the technical aspects.

The major form of ramifications that would occur if Moore’s Law would come to an end is that several companies and businesses would highly suffer highly. The companies who are highly dependent on technology would be affected.

Elements

Android OS

Windows OS

Company

The OS is owned by Google and is based on open source.

The OS is owned by Microsoft.

License

This is an open source platform that are bundled with registered drivers and applications (Zhang,  Musa & Le, 2013, p. 25-30)

The OS is proprietary and commercial based software

Programming Languages

The OS is based on C, JAVA, C++ and Kotlin

The OS is programmed in C#, F#, C++, VB.NET and J Script

Market Share

Android has 86.15 of the share within the current market.

Windows owns 13.7% of the world market.

OS Family

Android belongs to the Linux family (Kaur & Sharma, 2014, p. 1-5)

Windows belongs to Microsoft Windows

Supported CPU Architecture

Android supports Arm, MIPS, x86 and the 64-bit variants

Windows only possesses ARM architecture

Specialist Processors

 Comparison of Android and Windows OS:

The development of open source operating systems could be defined as the process by which the open-source software or any other forms of similar softwares would be made to be available on the public platform. There are various forms of software products that are available with their source code under the effect of open source license in order to study, change and thus improve the design. Different examples of software products based on open source license are Google Chromium, Mozilla Firefox, Android and VLC media player (Pereira et al., 2018, p. 963).  

There are various types of open source projects that exist within the current technological market. Examples of some of the projects based on open source platform are Linux kernel, the LibreOffice, the Firefox Web Browser and various other forms of office based suite tools. Another type of open source project are Distributions. These are defined as the collection of software, which would be published from the similar source of platform that would serve for a common purpose. Hence, the most projecting example of “distribution” is an operating system. There are various forms of distributions based on Linux. Other forms of distributions include ActivePerl, which is based on the Perl programming language that are designed to support various forms of operating systems (Stefik & Siebert, 2013, p. 19). The Cygwin distributions based on open source programs mainly run on Microsoft Windows operating system. There are other forms of open source projects that would include the BSD derivatives. These projects help in the maintenance of the source code, the core components and the kernel and thus help in the development of the entire operating system comprising of a single team. The projects based on operating system development help in the integration of the tools within the other distribution based systems.

The development of open source could be divided into several stages. The different stages within the open source platform development could be summarized as:

  1. An individual who would be able to sense the need for the making of the project would declare the intent and urgency of developing of the project within the public platform.
  2. The developer of the platform would be working on a limited but the codebase should be functional. The developer would release the project within the reach of public as the primary version of an open source program.
  3. After the process of development of the platform, the underlying source code would be released and made available to the public.
  4. The fully and well established platform of the open source could be branched and employed by an outside party.   

Comparison of two new form of wireless networking technologies:

Attribute

Cloud Computing

Fog Computing

Utilization

It could be defined as the utilization of various services that includes storage, servers, applications based on software development and databases (Domanal & Reddy, 2014)

This form of computing makes the utilization of the resources of local computer rather the access to remote based computer resources.

Capacity

This form of computing does not provides reduction of data during the sending and the transformation of data.

This computing technique helps in the reduction of amount of data that would be sent to a cloud based computer.

Bandwidth

This computing helps in the conservation of less bandwidth compared to fog computing.

Fog computing conserves more bandwidth.

Security

The security of cloud computing is quite high but less when compared to fog computing technologies

Fog computing provides much more secure form of computing resources and services (Stojmenovic & Wen, 2014).

Responsiveness

The response time of cloud computing resources is low.

The response time of the system resources is high as compared to fog computing

Speed of Accessibility

The speed of access to resources within the cloud computing domain depends on the VM connectivity.

The speed of computing within this form of computing is very much high as compared to cloud computing (Mahmud, Kotagiri & Buyya, 2018).

Integration of Data

Several different types of resources could be integrated within the cloud based domain (Hashem et al., 2015).

Multiple sources and data and various devices could also be connected to the fog computing domain.

The comparison of fibre optic and different forms of wireless technologies within the context of National Broadband Network (NBN) based in Australia are:

Fibre Technologies – It is also known as the Fixed Line Connection. The Fibre NBN connection primarily makes extensive use of the technology based on fibre optic cable. This cable is designed of glass and thus makes use of light in order to transmit the data (Beltrán, 2014, p. 715-729). The speeds of data transfer would be much faster than the traditional copper network.

Comparison of Operating Systems

The connection of Fibre NBN would provide the ability for the transmission of data over very long distances that would be significantly less due to the loss of quality over the copper wire. This connection would also be resistant to ground and noise currents, which have the capability to interrupt signals (Wilken et al., 2013, p. 136). The Fibre NBN is also capable of supporting higher form of bandwidth. This would mean that several users could be online at the same moment and they would be able to avail data at extremely higher speeds, have a shorter time of upload and have a smoother online experience.

Fixed Wireless – The NBN form of wireless connection would be able to transmit dta with the help of radio signals instead the use of cables. This form of wireless connection offers plans up to the standard set speeds. This form of transmission communicate over the air with the help of specific equipment of NBN that would be provided within or outside homes (Alizadeh, 2013, p. 29).  

References

Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337-368.

Alizadeh, T. (2013, November). Towards the socio-economic patterns of the national broadband network rollout in Australia. In State of Australian Cities Conference, Sydney (Vol. 26, p. 29).

Beltrán, F. (2014). Fibre-to-the-home, high-speed and national broadband plans: Tales from Down Under. Telecommunications Policy, 38(8-9), 715-729.

Chien, A. A., & Karamcheti, V. (2013). Moore’s law: The first ending and a new beginning. Computer, 46(12), 48-53.

Domanal, S. G., & Reddy, G. R. M. (2014, January). Optimal load balancing in cloud computing by efficient utilization of virtual machines. In Communication Systems and Networks (COMSNETS), 2014 Sixth International Conference on (pp. 1-4). IEEE.

Gerla, M., Lee, E. K., Pau, G., & Lee, U. (2014, March). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 241-246). IEEE.

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.

Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.

Hey, T., Hey, A. J., & Pápay, G. (2014). The computing universe: a journey through a revolution. Cambridge University Press.

Kaur, P., & Sharma, S. (2014, March). Google Android a mobile platform: A review. In Engineering and Computational Sciences (RAECS), 2014 Recent Advances in (pp. 1-5). IEEE.

Mahmud, R., Kotagiri, R., & Buyya, R. (2018). Fog computing: A taxonomy, survey and future directions. In Internet of everything (pp. 103-130). Springer, Singapore.

Pereira, F., Lou, B., Pritchett, B., Ritter, S., Gershman, S., Kanwisher, N., … & Sudarsky, S. (2018). open-source software. Nature, 9, 963.

Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile phones become addictive. Computers in Human Behavior, 29(6), 2632-2639.

Stefik, A., & Siebert, S. (2013). An empirical investigation into programming language syntax. ACM Transactions on Computing Education (TOCE), 13(4), 19.

Stojmenovic, I., & Wen, S. (2014, September). The fog computing paradigm: Scenarios and security issues. In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on (pp. 1-8). IEEE.

Waldrop, M. M. (2016). The chips are down for Moore’s law. Nature News, 530(7589), 144.

Widdershoven, G. A., Meynen, G., & Denys, D. (2015). Autonomy in predictive brain implants: The importance of embodiment and dialogue. AJOB Neuroscience, 6(4), 16-18.

Wilken, R., Nansen, B., Arnold, M., Kennedy, J., & Gibbs, M. (2013). National, local and household media ecologies: The case of Australia’s National Broadband Network. Communication, Politics & Culture, 46(2), 136.

Yang, S. H. (2014). Internet of things. In Wireless Sensor Networks (pp. 247-261). Springer, London.

Zhang, J., Musa, A., & Le, W. (2013, May). A comparison of energy bugs for smartphone platforms. In Engineering of Mobile-Enabled Systems (MOBS), 2013 1st International Workshop on the (pp. 25-30). IEEE.