Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Preface
Who this book is for What this book covers To get the most out of this book
Download the color images Conventions used
Get in touch
Reviews
The IoT Story
History of the IoT IoT potential
Industrial and manufacturing
Industrial and manufacturing IoT use cases and impact
Consumer
Consumer IoT use cases
Retail, financial, and marketing
Retail IoT use cases
Healthcare
Healthcare IoT use cases
Transportation and logistics
Transportation and logistics  IoT use cases
Agricultural and environmental
Agricultural and environmental  IoT use cases
Energy
Energy IoT use cases
Smart city
Smart city IoT use cases
Government and military
Government and military IoT use cases
Summary
IoT Architecture and Core IoT Modules
IoT ecosystem
IoT versus machine to machine The value of a network and Metcalfe's and Beckstrom's law IoT architecture Role of an architect
Part 1 – Sensing and power Part 2 – Data communication Part 3 – Internet routing and protocols Part 4 – Fog and edge compute, analytics, and machine learning Part 5 – Threat and security in IoT Summary
Sensors, Endpoints, and Power Systems
Sensing devices
Thermocouples and temperature sensing
Thermocouples Resistance Temperature Detectors Thermistors Temperature sensor summary
Hall effect sensors and current sensors Photoelectric sensors PIR sensors LiDAR and active sensing systems MEMS sensors
MEMS accelerometers and gyroscopes MEMS microphones MEMS pressure sensors
Smart IoT endpoints
Vision system
Sensor fusion Input devices
Output devices
Functional examples (putting it all together)
Functional example – TI SensorTag CC2650 Sensor to controller
Energy sources and power management
Power management Energy harvesting
Solar harvesting Piezo-mechanical harvesting RF energy harvesting Thermal harvesting
Energy storage
Energy and power models Batteries Supercapacitors Radioactive power sources Energy storage summary and other forms of power
Summary
Communications and Information Theory
Communication theory
RF energy and theoretical range RF interference
Information theory
Bitrate limits and the Shannon-Hartley theorem Bit error rate Narrowband versus wideband communication
The radio spectrum
Governing structure
Summary
Non-IP Based WPAN
Wireless personal area network standards
802.15 standards Bluetooth
Bluetooth history Bluetooth 5 communication process and topologies Bluetooth 5 stack Bluetooth 5 PHY and interference  Bluetooth packet structure BR/EDR operation BLE operation Bluetooth profiles BR/EDR security BLE security Beaconing Bluetooth 5 range and speed enhancement Bluetooth  mesh introduction Bluetooth mesh topology Bluetooth mesh addressing modes Bluetooth  mesh provisioning
IEEE 802.15.4
IEEE 802.15.4 architecture IEEE 802.15.4 topology IEEE 802.15.4 address modes and packet structure IEEE 802.15.4 start-up sequence IEEE 802.15.4 security
Zigbee
Zigbee history Zigbee overview Zigbee PHY and MAC (and difference from IEEE 802.15.4) Zigbee protocol stack Zigbee addressing and packet structure Zigbee mesh routing Zigbee association Zigbee security
Z-Wave
Z-Wave overview Z-Wave protocol stack Z-Wave addressing Z-Wave topology and routing
Summary
IP-Based WPAN and WLAN
Internet protocol and transmission control protocol
IP role in IoT
WPAN with IP – 6LoWPAN
6LoWPAN topology 6LoWPAN protocol stack Mesh addressing and routing Header compression and fragmentation Neighbor discovery 6LoWPAN security
WPAN with IP – Thread
Thread architecture and topology Thread protocol stack Thread routing Thread addressing Neighbor discovery
IEEE 802.11 protocols and WLAN
IEEE 802.11 suite of protocols and comparison IEEE 802.11 architecture IEEE 802.11 spectrum allocation IEEE 802.11 modulation and encoding techniques IEEE 802.11 MIMO IEEE 802.11 packet structure IEEE 802.11 operation IEEE 802.11 security IEEE 802.11ac IEEE 802.11p vehicle-to-vehicle IEEE 802.11ah
Summary
Long-Range Communication Systems and Protocols (WAN)
Cellular connectivity
Governance models and standards Cellular access technologies 3GPP user equipment categories 4G-LTE spectrum allocation and bands 4G-LTE topology and architecture 4G-LTE E-UTRAN protocol stack 4G-LTE geographical areas, dataflow, and handover procedures 4G-LTE packet structure Cat 0, Cat 1, Cat M1, and NB-IoT
LTE Cat-0 LTE Cat-1 LTE Cat-M1 (eMTC) LTE Cat-NB
5G
LoRa and LoRaWAN
LoRa physical layer LoRaWAN MAC layer LoRaWAN topology LoRaWAN summary
Sigfox
Sigfox physical layer Sigfox MAC layer Sigfox protocol stack Sigfox topology
Summary
Routers and Gateways
Routing functions
Gateway functions Routing Failover and out-of-band management VLAN VPN Traffic shaping and QoS Security functions Metrics and analytics Edge processing
Software-Defined Networking
SDN architecture Traditional internetworking  SDN benefits
Summary
IoT Edge to Cloud Protocols
Protocols MQTT
MQTT publish-subscribe MQTT architecture details MQTT packet structure MQTT communication formats MQTT working example
MQTT-SN
MQTT-SN architecture and topology Transparent and aggregating gateways Gateway advertisement and discovery Differences between MQTT and MQTT-SN
Constrained Application Protocol
CoAP architecture details CoAP Messaging Formats CoAP usage example
Other protocols
STOMP AMQP
Protocol summary and comparison Summary
Cloud and Fog Topologies
Cloud services model
NaaS SaaS PaaS IaaS
Public, private, and hybrid cloud
Private cloud Public cloud Hybrid cloud
The OpenStack cloud architecture
Keystone – identity and service management Glance – image service Nova compute Swift – Object Storage Neutron – Networking services Cinder – Block Storage Horizon Heat – orchestration (optional) Ceilometer – telemetry (optional)
Constraints of cloud architectures for IoT
Latency effect
Fog computing
The Hadoop philosophy for Fog computing Fog Computing versus Edge Computing versus cloud computing OpenFog Reference Architecture
Application services Application support Node management and software backplane Hardware virtualization OpenFog node security Network Accelerators Compute Storage Hardware platform infrastructure Protocol abstraction Sensors, actuators, and control systems
Amazon Greengrass and Lambda Fog Topologies
Summary
Data Analytics and Machine Learning in the Cloud and in the Fog
Basic data analytics in IoT
Top-level cloud pipeline Rules engines Ingestion – streaming, processing, and data lakes Complex event processing Lambda architecture Sector use cases
Machine learning in IoT
Machine learning models Classification Regression Random forest Bayesian models Convolutional Neural Networks
First layer and filters Max pooling and subsampling Hidden layers and formal description on forwarding propagation CNN examples CNN training and backpropagation
RNN Training and inference for IoT IoT data analytics and machine learning comparison and assessment
Summary
IoT Security
Cyber security vernacular
Attack and threat terms Defense terms
Anatomy of IoT cyber attacks
Mirai Stuxnet Chain Reaction
Physical and hardware security
Root of Trust Key management and trusted platform modules Processor and memory space Storage security Physical security
Cryptography
Symmetric cryptography Asymmetric cryptography Cryptographic hash (authentication and signing) Public Key Infrastructure  Network stack – Transport Layer Security
Software defined perimeter
Software-Defined Perimeter architecture
Blockchains and cryptocurrencies in IoT
Bitcoin (blockchain-based) IOTA (directed acyclical graph-based)
Government regulations and intervention
US Congressional Bill –Internet of Things (IoT) Cybersecurity Improvement Act of 2017 Other governmental bodies
IoT security best practices
Holistic security Security checklist
Summary
Consortiums and Communities
PAN consortia
Bluetooth SIG Thread Group Zigbee Alliance Miscellaneous
Protocol consortia
Open Connectivity Foundation and Allseen Alliance OASIS Object Management Group IPSO Alliance Miscellaneous
WAN consortia
Weightless LoRa Alliance Internet Engineering Task Force Wi-Fi Alliance
Fog and edge consortia
OpenFog EdgeX Foundry
Umbrella organizations
Industrial Internet Consortium IEEE IoT Miscellaneous
US government IoT and security entities Summary
Other Books You May Enjoy
Leave a review - let other readers know what you think
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion