Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Preface
Who this book is for What this book covers
To get the most out of this book Download the color images Conventions used
Get in touch
Reviews
IoT and Edge Computing Definition and Use Cases
History of the IoT IoT potential Definition of the Internet of Things
Industry and manufacturing
Industrial and manufacturing IoT use cases
Consumer
Consumer IoT use cases
Retail, finance, and marketing
Retail, finance, and marketing IoT use cases
Healthcare
Healthcare IoT use cases
Transportation and logistics
Transportation and logistics IoT use cases
Agricultural and environment
Agricultural and environmental IoT use cases
Energy
Energy IoT use cases
Smart city
Smart city IoT use cases
Military and government
Government and military IoT use cases
Example use case and deployment
Case study – Telemedicine palliative care
Requirements Implementation
Use case retrospective
Summary
IoT Architecture and Core IoT Modules
A connected ecosystem
IoT versus machine-to-machine versus SCADA The value of a network and Metcalfe's and Beckstrom's laws IoT and edge architecture Role of an architect
Part 1 – Sensing and power Part 2 – Data communication Part 3 – Edge computing Part 4 – Compute, analytics, and machine learning Part 5 – Threat and security in IoT Summary
Sensors, Endpoints, and Power Systems
Sensing devices
Thermocouples and temperature sensing
Thermocouples Resistance temperature detectors Thermistors Temperature sensor summary
Hall effect sensors and current sensors Photoelectric sensors PIR sensors LiDAR and active sensing systems MEMS sensors
MEMS accelerometers and gyroscopes MEMS microphones MEMS pressure sensors
High performance IoT endpoints
Vision systems Sensor fusion Output devices
Functional examples (putting it all together)
Functional example – TI SensorTag CC2650 Sensor to controller
Energy sources and power management
Power management Energy harvesting
Solar harvesting Piezo-mechanical harvesting RF energy harvesting Thermal harvesting
Energy storage
Energy and power models Batteries Supercapacitors Radioactive power sources Energy storage summary and other forms of power
Summary
Communications and Information Theory
Communication theory
RF energy and theoretical range RF interference
Information theory
Bitrate limits and the Shannon-Hartley theorem Bit error rate Narrowband versus wideband communication
The radio spectrum
Governing structure
Summary
Non-IP Based WPAN
802.15 standards Bluetooth
Bluetooth history Bluetooth 5 communication process and topologies Bluetooth 5 stack
Bluetooth stack elements Bluetooth 5 PHY and interference
BR/EDR operation BLE roles BLE operation Bluetooth profiles BR/EDR security
BLE security
Beaconing Bluetooth 5 range and speed enhancement Bluetooth mesh
Bluetooth mesh Bluetooth mesh topology Bluetooth mesh addressing modes Bluetooth mesh provisioning
Bluetooth 5.1 technology
Bluetooth 5.1 direction finding Bluetooth 5.1 GATT caching Bluetooth 5.1 randomized advertising channel indexing Bluetooth 5.1 periodic advertising sync transfer Bluetooth 5.1 minor enhancements
IEEE 802.15.4
IEEE 802.15.4 architecture IEEE 802.15.4 topology IEEE 802.15.4 address modes and packet structure IEEE 802.15.4 start-up sequence IEEE 802.15.4 security
Zigbee
Zigbee history Zigbee overview Zigbee PHY and MAC (and difference from IEEE 802.15.4) Zigbee protocol stack Zigbee addressing and packet structure Zigbee mesh routing
Zigbee association
Zigbee security
Z-Wave
Z-Wave overview Z-Wave protocol stack Z-Wave addressing Z-Wave topology and routing
Summary
IP-Based WPAN and WLAN
TCP/IP WPAN with IP – 6LoWPAN IEEE 802.11 protocols and WLAN
IEEE 802.11 suite of protocols and comparison IEEE 802.11 architecture IEEE 802.11 spectrum allocation IEEE 802.11 modulation and encoding techniques IEEE 802.11 MIMO IEEE 802.11 packet structure IEEE 802.11 operation IEEE 802.11 security IEEE 802.11ac IEEE 802.11p vehicle-to-vehicle IEEE 802.11ah 6LoWPAN topologies 6LoWPAN protocol stack Mesh addressing and routing Header compression and fragmentation Neighbor discovery 6LoWPAN security
WPAN with IP – Thread
Thread architecture and topology The Thread protocol stack Thread routing Thread addressing Neighbor discovery
Summary
Long-Range Communication Systems and Protocols (WAN)
Cellular connectivity
Governance models and standards Cellular access technologies 3GPP user equipment categories 4G LTE spectrum allocation and bands 4G LTE topology and architecture 4G LTE E-UTRAN protocol stack 4G LTE geographical areas, dataflow, and handover procedures 4G LTE packet structure Cat-0, Cat-1, Cat-M1, and NB-IoT
LTE Cat-0 LTE Cat-1 LTE Cat-M1 (eMTC) LTE Cat-NB
Multefire, CBRS, and shared spectrum cellular 5G
5G frequency distribution 5G RAN architecture 5G Core architecture 5G security and registration Ultra-Reliable Low-Latency Communications (URLCC) Fine-grain time-division duplexing (TDD) and low-latency HARQ Network slicing 5G energy considerations
LoRa and LoRaWAN
LoRa physical layer LoRaWAN MAC layer LoRaWAN topology LoRaWAN summary
Sigfox
Sigfox physical layer Sigfox MAC layer Sigfox protocol stack Sigfox topology
Summary
Edge Computing
Edge purpose and definition Edge use cases Edge hardware architectures
Processors
Speed and power Registers Instruction set architectures (ISAs) Endianness Processor parallelism Caches and memory hierarchy Other processor characteristics
DRAM and volatile memory Storage and non-volatile memory
Storage classes and interfaces NAND flash memory design and considerations
Low-speed IO High-speed IO Hardware assist and coprocessing Boot and security modules Examples of edge hardware Ingress protection
Operating systems
Operating system choice points Typical boot process Operating system tuning
Edge platforms
Virtualization Containers
Container architecture An Edge platform ‒ Microsoft Azure IoT Edge
Use cases for edge computing
Ambient computing Synthetic sensing
Summary
Edge Routing and Networking
TCP/IP network functions at the edge
Routing functions PAN-to-WAN bridging Failover and out-of-band management
Edge-level network security
VLANs VPN Traffic shaping and QoS Security functions Metrics and analytics
Software-defined networking
SDN architecture Traditional internetworking SDN benefits
Summary
Edge to Cloud Protocols
Protocols MQTT
MQTT publish-subscribe MQTT architecture details MQTT state transitions MQTT packet structure MQTT data types MQTT communication formats MQTT 3.1.1 working example
MQTT-SN
MQTT-SN architecture and topology Transparent and aggregating gateways Gateway advertisement and discovery Differences between MQTT and MQTT-SN Choosing a MQTT broker
Constrained Application Protocol
CoAP architecture details CoAP messaging formats CoAP usage example
Other protocols
STOMP AMQP
Protocol summary and comparison Summary
Cloud and Fog Topologies
Cloud services model
NaaS SaaS PaaS IaaS
Public, private, and hybrid cloud
Private cloud Public cloud Hybrid cloud
The OpenStack cloud architecture
Keystone – identity and service management Glance – image service Nova compute Swift – object storage Neutron – networking services Cinder – block storage Horizon Heat – orchestration (optional) Ceilometer – telemetry (optional)
Constraints of cloud architectures for IoT
Latency effect
Fog computing
The Hadoop philosophy for fog computing Comparing fog, edge, cloud, and mist computing OpenFog reference architecture
Application services Application support Node management and software backplane Hardware virtualization OpenFog node security Network Accelerators Compute Storage Hardware platform infrastructure Protocol abstraction Sensors, actuators, and control systems
EdgeX
EdgeX architecture EdgeX projects and additional components
Amazon Greengrass and Lambda Fog topologies
Summary
Data Analytics and Machine Learning in the Cloud and Edge
Basic data analytics in IoT
Top-level cloud pipeline Rules engines Ingestion – streaming, processing, and data lakes Complex event processing Lambda architecture Sector use cases
Machine learning in IoT
A brief history of AI and machine learning milestones Machine learning models Classification Regression Random forest Bayesian models Convolutional neural networks
First layer and filters Max pooling and subsampling The fundamental deep learning model CNN examples Vernacular of CNNs Forward propagation, CNN training, and backpropagation
Recurrent neural networks Training and inference for IoT
IoT data analytics and machine learning comparison and assessment Summary
IoT and Edge Security
Cybersecurity vernacular
Attack and threat terms Defense terms
Anatomy of IoT cyber attacks
Mirai Stuxnet Chain Reaction
Physical and hardware security
RoT Key management and trusted platform modules Processor and memory space Storage security Physical security
Shell security Cryptography
Symmetric cryptography Asymmetric cryptography Cryptographic hash (authentication and signing) Public key infrastructure Network stack – Transport Layer Security
Software-Defined Perimeter
SDP architecture
Blockchains and cryptocurrencies in IoT
Bitcoin (blockchain-based) IOTA and directed acyclical graph-based (DAG) trust models
Government regulations and intervention
US Congressional Bill – Internet of Things (IoT) Cybersecurity Improvement Act of 2017 Other governmental bodies
IoT security best practices
Holistic security Security checklist
Summary
Consortiums and Communities
PAN consortia
Bluetooth Thread Group Zigbee Alliance Miscellaneous
Protocol consortia
Open Connectivity Foundation and Allseen Alliance OASIS Object Management Group OMA Specworks Miscellaneous
WAN consortia
Weightless SIG LoRa Alliance Internet Engineering Task Force (IETF) Wi-Fi Alliance
Fog and edge consortia
OpenFog Eclipse Foundation and EdgeX Foundry
Umbrella organizations
Industrial Internet Consortium IEEE IoT Miscellaneous
US government IoT and security entities Industrial and Commercial IoT and Edge
Commercial and industrial sensor and MEMS manufacturers and vendors Silicon, microprocessor, and component manufacturers PAN communication companies WAN technology companies Edge computing and solutions companies Operating system, middleware, and software companies Cloud providers
Summary
Other Books You May Enjoy Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion