Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
IoT and Edge Computing Definition and Use Cases
History of the IoT
IoT potential
Definition of the Internet of Things
Industry and manufacturing
Industrial and manufacturing IoT use cases
Consumer
Consumer IoT use cases
Retail, finance, and marketing
Retail, finance, and marketing IoT use cases
Healthcare
Healthcare IoT use cases
Transportation and logistics
Transportation and logistics IoT use cases
Agricultural and environment
Agricultural and environmental IoT use cases
Energy
Energy IoT use cases
Smart city
Smart city IoT use cases
Military and government
Government and military IoT use cases
Example use case and deployment
Case study – Telemedicine palliative care
Requirements
Implementation
Use case retrospective
Summary
IoT Architecture and Core IoT Modules
A connected ecosystem
IoT versus machine-to-machine versus SCADA
The value of a network and Metcalfe's and Beckstrom's laws
IoT and edge architecture
Role of an architect
Part 1 – Sensing and power
Part 2 – Data communication
Part 3 – Edge computing
Part 4 – Compute, analytics, and machine learning
Part 5 – Threat and security in IoT
Summary
Sensors, Endpoints, and Power Systems
Sensing devices
Thermocouples and temperature sensing
Thermocouples
Resistance temperature detectors
Thermistors
Temperature sensor summary
Hall effect sensors and current sensors
Photoelectric sensors
PIR sensors
LiDAR and active sensing systems
MEMS sensors
MEMS accelerometers and gyroscopes
MEMS microphones
MEMS pressure sensors
High performance IoT endpoints
Vision systems
Sensor fusion
Output devices
Functional examples (putting it all together)
Functional example – TI SensorTag CC2650
Sensor to controller
Energy sources and power management
Power management
Energy harvesting
Solar harvesting
Piezo-mechanical harvesting
RF energy harvesting
Thermal harvesting
Energy storage
Energy and power models
Batteries
Supercapacitors
Radioactive power sources
Energy storage summary and other forms of power
Summary
Communications and Information Theory
Communication theory
RF energy and theoretical range
RF interference
Information theory
Bitrate limits and the Shannon-Hartley theorem
Bit error rate
Narrowband versus wideband communication
The radio spectrum
Governing structure
Summary
Non-IP Based WPAN
802.15 standards
Bluetooth
Bluetooth history
Bluetooth 5 communication process and topologies
Bluetooth 5 stack
Bluetooth stack elements
Bluetooth 5 PHY and interference
BR/EDR operation
BLE roles
BLE operation
Bluetooth profiles
BR/EDR security
BLE security
Beaconing
Bluetooth 5 range and speed enhancement
Bluetooth mesh
Bluetooth mesh
Bluetooth mesh topology
Bluetooth mesh addressing modes
Bluetooth mesh provisioning
Bluetooth 5.1 technology
Bluetooth 5.1 direction finding
Bluetooth 5.1 GATT caching
Bluetooth 5.1 randomized advertising channel indexing
Bluetooth 5.1 periodic advertising sync transfer
Bluetooth 5.1 minor enhancements
IEEE 802.15.4
IEEE 802.15.4 architecture
IEEE 802.15.4 topology
IEEE 802.15.4 address modes and packet structure
IEEE 802.15.4 start-up sequence
IEEE 802.15.4 security
Zigbee
Zigbee history
Zigbee overview
Zigbee PHY and MAC (and difference from IEEE 802.15.4)
Zigbee protocol stack
Zigbee addressing and packet structure
Zigbee mesh routing
Zigbee association
Zigbee security
Z-Wave
Z-Wave overview
Z-Wave protocol stack
Z-Wave addressing
Z-Wave topology and routing
Summary
IP-Based WPAN and WLAN
TCP/IP
WPAN with IP – 6LoWPAN
IEEE 802.11 protocols and WLAN
IEEE 802.11 suite of protocols and comparison
IEEE 802.11 architecture
IEEE 802.11 spectrum allocation
IEEE 802.11 modulation and encoding techniques
IEEE 802.11 MIMO
IEEE 802.11 packet structure
IEEE 802.11 operation
IEEE 802.11 security
IEEE 802.11ac
IEEE 802.11p vehicle-to-vehicle
IEEE 802.11ah
6LoWPAN topologies
6LoWPAN protocol stack
Mesh addressing and routing
Header compression and fragmentation
Neighbor discovery
6LoWPAN security
WPAN with IP – Thread
Thread architecture and topology
The Thread protocol stack
Thread routing
Thread addressing
Neighbor discovery
Summary
Long-Range Communication Systems and Protocols (WAN)
Cellular connectivity
Governance models and standards
Cellular access technologies
3GPP user equipment categories
4G LTE spectrum allocation and bands
4G LTE topology and architecture
4G LTE E-UTRAN protocol stack
4G LTE geographical areas, dataflow, and handover procedures
4G LTE packet structure
Cat-0, Cat-1, Cat-M1, and NB-IoT
LTE Cat-0
LTE Cat-1
LTE Cat-M1 (eMTC)
LTE Cat-NB
Multefire, CBRS, and shared spectrum cellular
5G
5G frequency distribution
5G RAN architecture
5G Core architecture
5G security and registration
Ultra-Reliable Low-Latency Communications (URLCC)
Fine-grain time-division duplexing (TDD) and low-latency HARQ
Network slicing
5G energy considerations
LoRa and LoRaWAN
LoRa physical layer
LoRaWAN MAC layer
LoRaWAN topology
LoRaWAN summary
Sigfox
Sigfox physical layer
Sigfox MAC layer
Sigfox protocol stack
Sigfox topology
Summary
Edge Computing
Edge purpose and definition
Edge use cases
Edge hardware architectures
Processors
Speed and power
Registers
Instruction set architectures (ISAs)
Endianness
Processor parallelism
Caches and memory hierarchy
Other processor characteristics
DRAM and volatile memory
Storage and non-volatile memory
Storage classes and interfaces
NAND flash memory design and considerations
Low-speed IO
High-speed IO
Hardware assist and coprocessing
Boot and security modules
Examples of edge hardware
Ingress protection
Operating systems
Operating system choice points
Typical boot process
Operating system tuning
Edge platforms
Virtualization
Containers
Container architecture
An Edge platform ‒ Microsoft Azure IoT Edge
Use cases for edge computing
Ambient computing
Synthetic sensing
Summary
Edge Routing and Networking
TCP/IP network functions at the edge
Routing functions
PAN-to-WAN bridging
Failover and out-of-band management
Edge-level network security
VLANs
VPN
Traffic shaping and QoS
Security functions
Metrics and analytics
Software-defined networking
SDN architecture
Traditional internetworking
SDN benefits
Summary
Edge to Cloud Protocols
Protocols
MQTT
MQTT publish-subscribe
MQTT architecture details
MQTT state transitions
MQTT packet structure
MQTT data types
MQTT communication formats
MQTT 3.1.1 working example
MQTT-SN
MQTT-SN architecture and topology
Transparent and aggregating gateways
Gateway advertisement and discovery
Differences between MQTT and MQTT-SN
Choosing a MQTT broker
Constrained Application Protocol
CoAP architecture details
CoAP messaging formats
CoAP usage example
Other protocols
STOMP
AMQP
Protocol summary and comparison
Summary
Cloud and Fog Topologies
Cloud services model
NaaS
SaaS
PaaS
IaaS
Public, private, and hybrid cloud
Private cloud
Public cloud
Hybrid cloud
The OpenStack cloud architecture
Keystone – identity and service management
Glance – image service
Nova compute
Swift – object storage
Neutron – networking services
Cinder – block storage
Horizon
Heat – orchestration (optional)
Ceilometer – telemetry (optional)
Constraints of cloud architectures for IoT
Latency effect
Fog computing
The Hadoop philosophy for fog computing
Comparing fog, edge, cloud, and mist computing
OpenFog reference architecture
Application services
Application support
Node management and software backplane
Hardware virtualization
OpenFog node security
Network
Accelerators
Compute
Storage
Hardware platform infrastructure
Protocol abstraction
Sensors, actuators, and control systems
EdgeX
EdgeX architecture
EdgeX projects and additional components
Amazon Greengrass and Lambda
Fog topologies
Summary
Data Analytics and Machine Learning in the Cloud and Edge
Basic data analytics in IoT
Top-level cloud pipeline
Rules engines
Ingestion – streaming, processing, and data lakes
Complex event processing
Lambda architecture
Sector use cases
Machine learning in IoT
A brief history of AI and machine learning milestones
Machine learning models
Classification
Regression
Random forest
Bayesian models
Convolutional neural networks
First layer and filters
Max pooling and subsampling
The fundamental deep learning model
CNN examples
Vernacular of CNNs
Forward propagation, CNN training, and backpropagation
Recurrent neural networks
Training and inference for IoT
IoT data analytics and machine learning comparison and assessment
Summary
IoT and Edge Security
Cybersecurity vernacular
Attack and threat terms
Defense terms
Anatomy of IoT cyber attacks
Mirai
Stuxnet
Chain Reaction
Physical and hardware security
RoT
Key management and trusted platform modules
Processor and memory space
Storage security
Physical security
Shell security
Cryptography
Symmetric cryptography
Asymmetric cryptography
Cryptographic hash (authentication and signing)
Public key infrastructure
Network stack – Transport Layer Security
Software-Defined Perimeter
SDP architecture
Blockchains and cryptocurrencies in IoT
Bitcoin (blockchain-based)
IOTA and directed acyclical graph-based (DAG) trust models
Government regulations and intervention
US Congressional Bill – Internet of Things (IoT) Cybersecurity Improvement Act of 2017
Other governmental bodies
IoT security best practices
Holistic security
Security checklist
Summary
Consortiums and Communities
PAN consortia
Bluetooth
Thread Group
Zigbee Alliance
Miscellaneous
Protocol consortia
Open Connectivity Foundation and Allseen Alliance
OASIS
Object Management Group
OMA Specworks
Miscellaneous
WAN consortia
Weightless SIG
LoRa Alliance
Internet Engineering Task Force (IETF)
Wi-Fi Alliance
Fog and edge consortia
OpenFog
Eclipse Foundation and EdgeX Foundry
Umbrella organizations
Industrial Internet Consortium
IEEE IoT
Miscellaneous
US government IoT and security entities
Industrial and Commercial IoT and Edge
Commercial and industrial sensor and MEMS manufacturers and vendors
Silicon, microprocessor, and component manufacturers
PAN communication companies
WAN technology companies
Edge computing and solutions companies
Operating system, middleware, and software companies
Cloud providers
Summary
Other Books You May Enjoy
Index
← Prev
Back
Next →
← Prev
Back
Next →