万本电子书0元读

万本电子书0元读

顶部广告

Internet of Things for Architects电子书

售       价:¥

117人正在读 | 0人评论 6.2

作       者:Perry Lea

出  版  社:Packt Publishing

出版时间:2018-01-22

字       数:67.7万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:此类商品不支持退换货,不支持下载打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Learn to design, implement and secure your IoT infrastructure About This Book ? Build a complete IoT system that is the best fit for your organization ? Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack ? Understand the theory, concepts, and implementation of each element that comprises IoT design—from sensors to the cloud ? Implement best practices to ensure the reliability, scalability, robust communication systems, security, and data analysis in your IoT infrastructure Who This Book Is For This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, various technologies, and tradeoffs and develop a 50,000-foot view of IoT architecture. What You Will Learn ? Understand the role and scope of architecting a successful IoT deployment, from sensors to the cloud ? Scan the landscape of IoT technologies that span everything from sensors to the cloud and everything in between ? See the trade-offs in choices of protocols and communications in IoT deployments ? Build a repertoire of skills and the vernacular necessary to work in the IoT space ? Broaden your skills in multiple engineering domains necessary for the IoT architect In Detail The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices. This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth? 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, SigFox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains. Style and approach This hands-on guide combines theory and application to the Internet of Things. This book covers the entire architectural stack of components and engineering domains from sensors to power analysis, communication systems, information theory, networking and routing, data security, protocols, software stacks, cloud mechanics, and data analytics with deep learning.
目录展开

Title Page

Copyright and Credits

Internet of Things for Architects

Packt Upsell

Why subscribe?

PacktPub.com

Contributors

About the author

About the reviewer

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Get in touch

Reviews

The IoT Story

History of the IoT

IoT potential

Industrial and manufacturing

Industrial and manufacturing IoT use cases and impact

Consumer

Consumer IoT use cases

Retail, financial, and marketing

Retail IoT use cases

Healthcare

Healthcare IoT use cases

Transportation and logistics

Transportation and logistics IoT use cases

Agricultural and environmental

Agricultural and environmental IoT use cases

Energy

Energy IoT use cases

Smart city

Smart city IoT use cases

Government and military

Government and military IoT use cases

Summary

IoT Architecture and Core IoT Modules

IoT ecosystem

IoT versus machine to machine

The value of a network and Metcalfe's and Beckstrom's law

IoT architecture

Role of an architect

Part 1 – Sensing and power

Part 2 – Data communication

Part 3 – Internet routing and protocols

Part 4 – Fog and edge compute, analytics, and machine learning

Part 5 – Threat and security in IoT

Summary

Sensors, Endpoints, and Power Systems

Sensing devices

Thermocouples and temperature sensing

Thermocouples

Resistance Temperature Detectors

Thermistors

Temperature sensor summary

Hall effect sensors and current sensors

Photoelectric sensors

PIR sensors

LiDAR and active sensing systems

MEMS sensors

MEMS accelerometers and gyroscopes

MEMS microphones

MEMS pressure sensors

Smart IoT endpoints

Vision system

Sensor fusion

Input devices

Output devices

Functional examples (putting it all together)

Functional example – TI SensorTag CC2650

Sensor to controller

Energy sources and power management

Power management

Energy harvesting

Solar harvesting

Piezo-mechanical harvesting

RF energy harvesting

Thermal harvesting

Energy storage

Energy and power models

Batteries

Supercapacitors

Radioactive power sources

Energy storage summary and other forms of power

Summary

Communications and Information Theory

Communication theory

RF energy and theoretical range

RF interference

Information theory

Bitrate limits and the Shannon-Hartley theorem

Bit error rate

Narrowband versus wideband communication

The radio spectrum

Governing structure

Summary

Non-IP Based WPAN

Wireless personal area network standards

802.15 standards

Bluetooth

Bluetooth history

Bluetooth 5 communication process and topologies

Bluetooth 5 stack

Bluetooth 5 PHY and interference

Bluetooth packet structure

BR/EDR operation

BLE operation

Bluetooth profiles

BR/EDR security

BLE security

Beaconing

Bluetooth 5 range and speed enhancement

Bluetooth mesh introduction

Bluetooth mesh topology

Bluetooth mesh addressing modes

Bluetooth mesh provisioning

IEEE 802.15.4

IEEE 802.15.4 architecture

IEEE 802.15.4 topology

IEEE 802.15.4 address modes and packet structure

IEEE 802.15.4 start-up sequence

IEEE 802.15.4 security

Zigbee

Zigbee history

Zigbee overview

Zigbee PHY and MAC (and difference from IEEE 802.15.4)

Zigbee protocol stack

Zigbee addressing and packet structure

Zigbee mesh routing

Zigbee association

Zigbee security

Z-Wave

Z-Wave overview

Z-Wave protocol stack

Z-Wave addressing

Z-Wave topology and routing

Summary

IP-Based WPAN and WLAN

Internet protocol and transmission control protocol

IP role in IoT

WPAN with IP – 6LoWPAN

6LoWPAN topology

6LoWPAN protocol stack

Mesh addressing and routing

Header compression and fragmentation

Neighbor discovery

6LoWPAN security

WPAN with IP – Thread

Thread architecture and topology

Thread protocol stack

Thread routing

Thread addressing

Neighbor discovery

IEEE 802.11 protocols and WLAN

IEEE 802.11 suite of protocols and comparison

IEEE 802.11 architecture

IEEE 802.11 spectrum allocation

IEEE 802.11 modulation and encoding techniques

IEEE 802.11 MIMO

IEEE 802.11 packet structure

IEEE 802.11 operation

IEEE 802.11 security

IEEE 802.11ac

IEEE 802.11p vehicle-to-vehicle

IEEE 802.11ah

Summary

Long-Range Communication Systems and Protocols (WAN)

Cellular connectivity

Governance models and standards

Cellular access technologies

3GPP user equipment categories

4G-LTE spectrum allocation and bands

4G-LTE topology and architecture

4G-LTE E-UTRAN protocol stack

4G-LTE geographical areas, dataflow, and handover procedures

4G-LTE packet structure

Cat 0, Cat 1, Cat M1, and NB-IoT

LTE Cat-0

LTE Cat-1

LTE Cat-M1 (eMTC)

LTE Cat-NB

5G

LoRa and LoRaWAN

LoRa physical layer

LoRaWAN MAC layer

LoRaWAN topology

LoRaWAN summary

Sigfox

Sigfox physical layer

Sigfox MAC layer

Sigfox protocol stack

Sigfox topology

Summary

Routers and Gateways

Routing functions

Gateway functions

Routing

Failover and out-of-band management

VLAN

VPN

Traffic shaping and QoS

Security functions

Metrics and analytics

Edge processing

Software-Defined Networking

SDN architecture

Traditional internetworking

SDN benefits

Summary

IoT Edge to Cloud Protocols

Protocols

MQTT

MQTT publish-subscribe

MQTT architecture details

MQTT packet structure

MQTT communication formats

MQTT working example

MQTT-SN

MQTT-SN architecture and topology

Transparent and aggregating gateways

Gateway advertisement and discovery

Differences between MQTT and MQTT-SN

Constrained Application Protocol

CoAP architecture details

CoAP Messaging Formats

CoAP usage example

Other protocols

STOMP

AMQP

Protocol summary and comparison

Summary

Cloud and Fog Topologies

Cloud services model

NaaS

SaaS

PaaS

IaaS

Public, private, and hybrid cloud

Private cloud

Public cloud

Hybrid cloud

The OpenStack cloud architecture

Keystone – identity and service management

Glance – image service

Nova compute

Swift – Object Storage

Neutron – Networking services

Cinder – Block Storage

Horizon

Heat – orchestration (optional)

Ceilometer – telemetry (optional)

Constraints of cloud architectures for IoT

Latency effect

Fog computing

The Hadoop philosophy for Fog computing

Fog Computing versus Edge Computing versus cloud computing

OpenFog Reference Architecture

Application services

Application support

Node management and software backplane

Hardware virtualization

OpenFog node security

Network

Accelerators

Compute

Storage

Hardware platform infrastructure

Protocol abstraction

Sensors, actuators, and control systems

Amazon Greengrass and Lambda

Fog Topologies

Summary

Data Analytics and Machine Learning in the Cloud and in the Fog

Basic data analytics in IoT

Top-level cloud pipeline

Rules engines

Ingestion – streaming, processing, and data lakes

Complex event processing

Lambda architecture

Sector use cases

Machine learning in IoT

Machine learning models

Classification

Regression

Random forest

Bayesian models

Convolutional Neural Networks

First layer and filters

Max pooling and subsampling

Hidden layers and formal description on forwarding propagation

CNN examples

CNN training and backpropagation

RNN

Training and inference for IoT

IoT data analytics and machine learning comparison and assessment

Summary

IoT Security

Cyber security vernacular

Attack and threat terms

Defense terms

Anatomy of IoT cyber attacks

Mirai

Stuxnet

Chain Reaction

Physical and hardware security

Root of Trust

Key management and trusted platform modules

Processor and memory space

Storage security

Physical security

Cryptography

Symmetric cryptography

Asymmetric cryptography

Cryptographic hash (authentication and signing)

Public Key Infrastructure

Network stack – Transport Layer Security

Software defined perimeter

Software-Defined Perimeter architecture

Blockchains and cryptocurrencies in IoT

Bitcoin (blockchain-based)

IOTA (directed acyclical graph-based)

Government regulations and intervention

US Congressional Bill –Internet of Things (IoT) Cybersecurity Improvement Act of 2017

Other governmental bodies

IoT security best practices

Holistic security

Security checklist

Summary

Consortiums and Communities

PAN consortia

Bluetooth SIG

Thread Group

Zigbee Alliance

Miscellaneous

Protocol consortia

Open Connectivity Foundation and Allseen Alliance

OASIS

Object Management Group

IPSO Alliance

Miscellaneous

WAN consortia

Weightless

LoRa Alliance

Internet Engineering Task Force

Wi-Fi Alliance

Fog and edge consortia

OpenFog

EdgeX Foundry

Umbrella organizations

Industrial Internet Consortium

IEEE IoT

Miscellaneous

US government IoT and security entities

Summary

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部