售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Title Page
Copyright and Credits
Internet of Things for Architects
Packt Upsell
Why subscribe?
PacktPub.com
Contributors
About the author
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
The IoT Story
History of the IoT
IoT potential
Industrial and manufacturing
Industrial and manufacturing IoT use cases and impact
Consumer
Consumer IoT use cases
Retail, financial, and marketing
Retail IoT use cases
Healthcare
Healthcare IoT use cases
Transportation and logistics
Transportation and logistics IoT use cases
Agricultural and environmental
Agricultural and environmental IoT use cases
Energy
Energy IoT use cases
Smart city
Smart city IoT use cases
Government and military
Government and military IoT use cases
Summary
IoT Architecture and Core IoT Modules
IoT ecosystem
IoT versus machine to machine
The value of a network and Metcalfe's and Beckstrom's law
IoT architecture
Role of an architect
Part 1 – Sensing and power
Part 2 – Data communication
Part 3 – Internet routing and protocols
Part 4 – Fog and edge compute, analytics, and machine learning
Part 5 – Threat and security in IoT
Summary
Sensors, Endpoints, and Power Systems
Sensing devices
Thermocouples and temperature sensing
Thermocouples
Resistance Temperature Detectors
Thermistors
Temperature sensor summary
Hall effect sensors and current sensors
Photoelectric sensors
PIR sensors
LiDAR and active sensing systems
MEMS sensors
MEMS accelerometers and gyroscopes
MEMS microphones
MEMS pressure sensors
Smart IoT endpoints
Vision system
Sensor fusion
Input devices
Output devices
Functional examples (putting it all together)
Functional example – TI SensorTag CC2650
Sensor to controller
Energy sources and power management
Power management
Energy harvesting
Solar harvesting
Piezo-mechanical harvesting
RF energy harvesting
Thermal harvesting
Energy storage
Energy and power models
Batteries
Supercapacitors
Radioactive power sources
Energy storage summary and other forms of power
Summary
Communications and Information Theory
Communication theory
RF energy and theoretical range
RF interference
Information theory
Bitrate limits and the Shannon-Hartley theorem
Bit error rate
Narrowband versus wideband communication
The radio spectrum
Governing structure
Summary
Non-IP Based WPAN
Wireless personal area network standards
802.15 standards
Bluetooth
Bluetooth history
Bluetooth 5 communication process and topologies
Bluetooth 5 stack
Bluetooth 5 PHY and interference
Bluetooth packet structure
BR/EDR operation
BLE operation
Bluetooth profiles
BR/EDR security
BLE security
Beaconing
Bluetooth 5 range and speed enhancement
Bluetooth mesh introduction
Bluetooth mesh topology
Bluetooth mesh addressing modes
Bluetooth mesh provisioning
IEEE 802.15.4
IEEE 802.15.4 architecture
IEEE 802.15.4 topology
IEEE 802.15.4 address modes and packet structure
IEEE 802.15.4 start-up sequence
IEEE 802.15.4 security
Zigbee
Zigbee history
Zigbee overview
Zigbee PHY and MAC (and difference from IEEE 802.15.4)
Zigbee protocol stack
Zigbee addressing and packet structure
Zigbee mesh routing
Zigbee association
Zigbee security
Z-Wave
Z-Wave overview
Z-Wave protocol stack
Z-Wave addressing
Z-Wave topology and routing
Summary
IP-Based WPAN and WLAN
Internet protocol and transmission control protocol
IP role in IoT
WPAN with IP – 6LoWPAN
6LoWPAN topology
6LoWPAN protocol stack
Mesh addressing and routing
Header compression and fragmentation
Neighbor discovery
6LoWPAN security
WPAN with IP – Thread
Thread architecture and topology
Thread protocol stack
Thread routing
Thread addressing
Neighbor discovery
IEEE 802.11 protocols and WLAN
IEEE 802.11 suite of protocols and comparison
IEEE 802.11 architecture
IEEE 802.11 spectrum allocation
IEEE 802.11 modulation and encoding techniques
IEEE 802.11 MIMO
IEEE 802.11 packet structure
IEEE 802.11 operation
IEEE 802.11 security
IEEE 802.11ac
IEEE 802.11p vehicle-to-vehicle
IEEE 802.11ah
Summary
Long-Range Communication Systems and Protocols (WAN)
Cellular connectivity
Governance models and standards
Cellular access technologies
3GPP user equipment categories
4G-LTE spectrum allocation and bands
4G-LTE topology and architecture
4G-LTE E-UTRAN protocol stack
4G-LTE geographical areas, dataflow, and handover procedures
4G-LTE packet structure
Cat 0, Cat 1, Cat M1, and NB-IoT
LTE Cat-0
LTE Cat-1
LTE Cat-M1 (eMTC)
LTE Cat-NB
5G
LoRa and LoRaWAN
LoRa physical layer
LoRaWAN MAC layer
LoRaWAN topology
LoRaWAN summary
Sigfox
Sigfox physical layer
Sigfox MAC layer
Sigfox protocol stack
Sigfox topology
Summary
Routers and Gateways
Routing functions
Gateway functions
Routing
Failover and out-of-band management
VLAN
VPN
Traffic shaping and QoS
Security functions
Metrics and analytics
Edge processing
Software-Defined Networking
SDN architecture
Traditional internetworking
SDN benefits
Summary
IoT Edge to Cloud Protocols
Protocols
MQTT
MQTT publish-subscribe
MQTT architecture details
MQTT packet structure
MQTT communication formats
MQTT working example
MQTT-SN
MQTT-SN architecture and topology
Transparent and aggregating gateways
Gateway advertisement and discovery
Differences between MQTT and MQTT-SN
Constrained Application Protocol
CoAP architecture details
CoAP Messaging Formats
CoAP usage example
Other protocols
STOMP
AMQP
Protocol summary and comparison
Summary
Cloud and Fog Topologies
Cloud services model
NaaS
SaaS
PaaS
IaaS
Public, private, and hybrid cloud
Private cloud
Public cloud
Hybrid cloud
The OpenStack cloud architecture
Keystone – identity and service management
Glance – image service
Nova compute
Swift – Object Storage
Neutron – Networking services
Cinder – Block Storage
Horizon
Heat – orchestration (optional)
Ceilometer – telemetry (optional)
Constraints of cloud architectures for IoT
Latency effect
Fog computing
The Hadoop philosophy for Fog computing
Fog Computing versus Edge Computing versus cloud computing
OpenFog Reference Architecture
Application services
Application support
Node management and software backplane
Hardware virtualization
OpenFog node security
Network
Accelerators
Compute
Storage
Hardware platform infrastructure
Protocol abstraction
Sensors, actuators, and control systems
Amazon Greengrass and Lambda
Fog Topologies
Summary
Data Analytics and Machine Learning in the Cloud and in the Fog
Basic data analytics in IoT
Top-level cloud pipeline
Rules engines
Ingestion – streaming, processing, and data lakes
Complex event processing
Lambda architecture
Sector use cases
Machine learning in IoT
Machine learning models
Classification
Regression
Random forest
Bayesian models
Convolutional Neural Networks
First layer and filters
Max pooling and subsampling
Hidden layers and formal description on forwarding propagation
CNN examples
CNN training and backpropagation
RNN
Training and inference for IoT
IoT data analytics and machine learning comparison and assessment
Summary
IoT Security
Cyber security vernacular
Attack and threat terms
Defense terms
Anatomy of IoT cyber attacks
Mirai
Stuxnet
Chain Reaction
Physical and hardware security
Root of Trust
Key management and trusted platform modules
Processor and memory space
Storage security
Physical security
Cryptography
Symmetric cryptography
Asymmetric cryptography
Cryptographic hash (authentication and signing)
Public Key Infrastructure
Network stack – Transport Layer Security
Software defined perimeter
Software-Defined Perimeter architecture
Blockchains and cryptocurrencies in IoT
Bitcoin (blockchain-based)
IOTA (directed acyclical graph-based)
Government regulations and intervention
US Congressional Bill –Internet of Things (IoT) Cybersecurity Improvement Act of 2017
Other governmental bodies
IoT security best practices
Holistic security
Security checklist
Summary
Consortiums and Communities
PAN consortia
Bluetooth SIG
Thread Group
Zigbee Alliance
Miscellaneous
Protocol consortia
Open Connectivity Foundation and Allseen Alliance
OASIS
Object Management Group
IPSO Alliance
Miscellaneous
WAN consortia
Weightless
LoRa Alliance
Internet Engineering Task Force
Wi-Fi Alliance
Fog and edge consortia
OpenFog
EdgeX Foundry
Umbrella organizations
Industrial Internet Consortium
IEEE IoT
Miscellaneous
US government IoT and security entities
Summary
Other Books You May Enjoy
Leave a review - let other readers know what you think
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜