Internet of things for architects architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security

Learn to design, implement and secure your IoT infrastructure About This Book Build a complete IoT system that is the best fit for your organization Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack Understand the theory, concepts, and implementation of each...

Descripción completa

Detalles Bibliográficos
Otros Autores: Lea, Perry, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing 2018.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631364906719
Tabla de Contenidos:
  • Cover
  • Copyright and Credits
  • Packt Upsell
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: The IoT Story
  • History of the IoT
  • IoT potential
  • Industrial and manufacturing
  • Industrial and manufacturing IoT use cases and impact
  • Consumer
  • Consumer IoT use cases
  • Retail, financial, and marketing
  • Retail IoT use cases
  • Healthcare
  • Healthcare IoT use cases
  • Transportation and logistics
  • Transportation and logistics  IoT use cases
  • Agricultural and environmental
  • Agricultural and environmental  IoT use cases
  • Energy
  • Energy IoT use cases
  • Smart city
  • Smart city IoT use cases
  • Government and military
  • Government and military IoT use cases
  • Summary
  • Chapter 2: IoT Architecture and Core IoT Modules
  • IoT ecosystem
  • IoT versus machine to machine
  • The value of a network and Metcalfe's and Beckstrom's law
  • IoT architecture
  • Role of an architect
  • Part 1 - Sensing and power
  • Part 2 - Data communication
  • Part 3 - Internet routing and protocols
  • Part 4 - Fog and edge compute, analytics, and machine learning
  • Part 5 - Threat and security in IoT
  • Summary
  • Chapter 3: Sensors, Endpoints, and Power Systems
  • Sensing devices
  • Thermocouples and temperature sensing
  • Thermocouples
  • Resistance Temperature Detectors
  • Thermistors
  • Temperature sensor summary
  • Hall effect sensors and current sensors
  • Photoelectric sensors
  • PIR sensors
  • LiDAR and active sensing systems
  • MEMS sensors
  • MEMS accelerometers and gyroscopes
  • MEMS microphones
  • MEMS pressure sensors
  • Smart IoT endpoints
  • Vision system
  • Sensor fusion
  • Input devices
  • Output devices
  • Functional examples (putting it all together)
  • Functional example - TI SensorTag CC2650
  • Sensor to controller
  • Energy sources and power management
  • Power management
  • Energy harvesting
  • Solar harvesting.
  • Piezo-mechanical harvesting
  • RF energy harvesting
  • Thermal harvesting
  • Energy storage
  • Energy and power models
  • Batteries
  • Supercapacitors
  • Radioactive power sources
  • Energy storage summary and other forms of power
  • Summary
  • Chapter 4: Communications and Information Theory
  • Communication theory
  • RF energy and theoretical range
  • RF interference
  • Information theory
  • Bitrate limits and the Shannon-Hartley theorem
  • Bit error rate
  • Narrowband versus wideband communication
  • The radio spectrum
  • Governing structure
  • Summary
  • Chapter 5: Non-IP Based WPAN
  • Wireless personal area network standards
  • 802.15 standards
  • Bluetooth
  • Bluetooth history
  • Bluetooth 5 communication process and topologies
  • Bluetooth 5 stack
  • Bluetooth 5 PHY and interference
  • Bluetooth packet structure
  • BR/EDR operation
  • BLE operation
  • Bluetooth profiles
  • BR/EDR security
  • BLE security
  • Beaconing
  • Bluetooth 5 range and speed enhancement
  • Bluetooth  mesh introduction
  • Bluetooth mesh topology
  • Bluetooth mesh addressing modes
  • Bluetooth  mesh provisioning
  • IEEE 802.15.4
  • IEEE 802.15.4 architecture
  • IEEE 802.15.4 topology
  • IEEE 802.15.4 address modes and packet structure
  • IEEE 802.15.4 start-up sequence
  • IEEE 802.15.4 security
  • Zigbee
  • Zigbee history
  • Zigbee overview
  • Zigbee PHY and MAC (and difference from IEEE 802.15.4)
  • Zigbee protocol stack
  • Zigbee addressing and packet structure
  • Zigbee mesh routing
  • Zigbee association
  • Zigbee security
  • Z-Wave
  • Z-Wave overview
  • Z-Wave protocol stack
  • Z-Wave addressing
  • Z-Wave topology and routing
  • Summary
  • Chapter 6: IP-Based WPAN and WLAN
  • Internet protocol and transmission control protocol
  • IP role in IoT
  • WPAN with IP - 6LoWPAN
  • 6LoWPAN topology
  • 6LoWPAN protocol stack
  • Mesh addressing and routing.
  • Header compression and fragmentation
  • Neighbor discovery
  • 6LoWPAN security
  • WPAN with IP - Thread
  • Thread architecture and topology
  • Thread protocol stack
  • Thread routing
  • Thread addressing
  • Neighbor discovery
  • IEEE 802.11 protocols and WLAN
  • IEEE 802.11 suite of protocols and comparison
  • IEEE 802.11 architecture
  • IEEE 802.11 spectrum allocation
  • IEEE 802.11 modulation and encoding techniques
  • IEEE 802.11 MIMO
  • IEEE 802.11 packet structure
  • IEEE 802.11 operation
  • IEEE 802.11 security
  • IEEE 802.11ac
  • IEEE 802.11p vehicle-to-vehicle
  • IEEE 802.11ah
  • Summary
  • Chapter 7: Long-Range Communication Systems and Protocols (WAN)
  • Cellular connectivity
  • Governance models and standards
  • Cellular access technologies
  • 3GPP user equipment categories
  • 4G-LTE spectrum allocation and bands
  • 4G-LTE topology and architecture
  • 4G-LTE E-UTRAN protocol stack
  • 4G-LTE geographical areas, dataflow, and handover procedures
  • 4G-LTE packet structure
  • Cat 0, Cat 1, Cat M1, and NB-IoT
  • LTE Cat-0
  • LTE Cat-1
  • LTE Cat-M1 (eMTC)
  • LTE Cat-NB
  • 5G
  • LoRa and LoRaWAN
  • LoRa physical layer
  • LoRaWAN MAC layer
  • LoRaWAN topology
  • LoRaWAN summary
  • Sigfox
  • Sigfox physical layer
  • Sigfox MAC layer
  • Sigfox protocol stack
  • Sigfox topology
  • Summary
  • Chapter 8: Routers and Gateways
  • Routing functions
  • Gateway functions
  • Routing
  • Failover and out-of-band management
  • VLAN
  • VPN
  • Traffic shaping and QoS
  • Security functions
  • Metrics and analytics
  • Edge processing
  • Software-Defined Networking
  • SDN architecture
  • Traditional internetworking
  • SDN benefits
  • Summary
  • Chapter 9: IoT Edge to Cloud Protocols
  • Protocols
  • MQTT
  • MQTT publish-subscribe
  • MQTT architecture details
  • MQTT packet structure
  • MQTT communication formats
  • MQTT working example
  • MQTT-SN.
  • MQTT-SN architecture and topology
  • Transparent and aggregating gateways
  • Gateway advertisement and discovery
  • Differences between MQTT and MQTT-SN
  • Constrained Application Protocol
  • CoAP architecture details
  • CoAP Messaging Formats
  • CoAP usage example
  • Other protocols
  • STOMP
  • AMQP
  • Protocol summary and comparison
  • Summary
  • Chapter 10: Cloud and Fog Topologies
  • Cloud services model
  • NaaS
  • SaaS
  • PaaS
  • IaaS
  • Public, private, and hybrid cloud
  • Private cloud
  • Public cloud
  • Hybrid cloud
  • The OpenStack cloud architecture
  • Keystone - identity and service management
  • Glance - image service
  • Nova compute
  • Swift - Object Storage
  • Neutron - Networking services
  • Cinder - Block Storage
  • Horizon
  • Heat - orchestration (optional)
  • Ceilometer - telemetry (optional)
  • Constraints of cloud architectures for IoT
  • Latency effect
  • Fog computing
  • The Hadoop philosophy for Fog computing
  • Fog Computing versus Edge Computing versus cloud computing
  • OpenFog Reference Architecture
  • Application services
  • Application support
  • Node management and software backplane
  • Hardware virtualization
  • OpenFog node security
  • Network
  • Accelerators
  • Compute
  • Storage
  • Hardware platform infrastructure
  • Protocol abstraction
  • Sensors, actuators, and control systems
  • Amazon Greengrass and Lambda
  • Fog Topologies
  • Summary
  • Chapter 11: Data Analytics and Machine Learning in the Cloud and in the Fog
  • Basic data analytics in IoT
  • Top-level cloud pipeline
  • Rules engines
  • Ingestion - streaming, processing, and data lakes
  • Complex event processing
  • Lambda architecture
  • Sector use cases
  • Machine learning in IoT
  • Machine learning models
  • Classification
  • Regression
  • Random forest
  • Bayesian models
  • Convolutional Neural Networks
  • First layer and filters.
  • Max pooling and subsampling
  • Hidden layers and formal description on forwarding propagation
  • CNN examples
  • CNN training and backpropagation
  • RNN
  • Training and inference for IoT
  • IoT data analytics and machine learning comparison and assessment
  • Summary
  • Chapter 12: IoT Security
  • Cyber security vernacular
  • Attack and threat terms
  • Defense terms
  • Anatomy of IoT cyber attacks
  • Mirai
  • Stuxnet
  • Chain Reaction
  • Physical and hardware security
  • Root of Trust
  • Key management and trusted platform modules
  • Processor and memory space
  • Storage security
  • Physical security
  • Cryptography
  • Symmetric cryptography
  • Asymmetric cryptography
  • Cryptographic hash (authentication and signing)
  • Public Key Infrastructure
  • Network stack - Transport Layer Security
  • Software defined perimeter
  • Software-Defined Perimeter architecture
  • Blockchains and cryptocurrencies in IoT
  • Bitcoin (blockchain-based)
  • IOTA (directed acyclical graph-based)
  • Government regulations and intervention
  • US Congressional Bill -Internet of Things (IoT) Cybersecurity Improvement Act of 2017
  • Other governmental bodies
  • IoT security best practices
  • Holistic security
  • Security checklist
  • Summary
  • Chapter 13: Consortiums and Communities
  • PAN consortia
  • Bluetooth SIG
  • Thread Group
  • Zigbee Alliance
  • Miscellaneous
  • Protocol consortia
  • Open Connectivity Foundation and Allseen Alliance
  • OASIS
  • Object Management Group
  • IPSO Alliance
  • Miscellaneous
  • WAN consortia
  • Weightless
  • LoRa Alliance
  • Internet Engineering Task Force
  • Wi-Fi Alliance
  • Fog and edge consortia
  • OpenFog
  • EdgeX Foundry
  • Umbrella organizations
  • Industrial Internet Consortium
  • IEEE IoT
  • Miscellaneous
  • US government IoT and security entities
  • Summary
  • Other Books You May Enjoy.
  • Leave a review - let other readers know what you think.