舉報(bào)

會(huì)員
Internet of Things for Architects
Thisbookisforarchitects,systemdesigners,technologists,andtechnologymanagerswhowanttounderstandtheIoTecosphere,varioustechnologies,andtradeoffsanddevelopa50,000-footviewofIoTarchitecture.
最新章節(jié)
- Leave a review - let other readers know what you think
- Other Books You May Enjoy
- Summary
- US government IoT and security entities
- Miscellaneous
- IEEE IoT
品牌:中圖公司
上架時(shí)間:2021-06-25 22:41:38
出版社:Packt Publishing
本書(shū)數(shù)字版權(quán)由中圖公司提供,并由其授權(quán)上海閱文信息技術(shù)有限公司制作發(fā)行
- Leave a review - let other readers know what you think 更新時(shí)間:2021-06-25 22:48:00
- Other Books You May Enjoy
- Summary
- US government IoT and security entities
- Miscellaneous
- IEEE IoT
- Industrial Internet Consortium
- Umbrella organizations
- EdgeX Foundry
- OpenFog
- Fog and edge consortia
- Wi-Fi Alliance
- Internet Engineering Task Force
- LoRa Alliance
- Weightless
- WAN consortia
- Miscellaneous
- IPSO Alliance
- Object Management Group
- OASIS
- Open Connectivity Foundation and Allseen Alliance
- Protocol consortia
- Miscellaneous
- Zigbee Alliance
- Thread Group
- Bluetooth SIG
- PAN consortia
- Consortiums and Communities
- Summary
- Security checklist
- Holistic security
- IoT security best practices
- Other governmental bodies
- US Congressional Bill –Internet of Things (IoT) Cybersecurity Improvement Act of 2017
- Government regulations and intervention
- IOTA (directed acyclical graph-based)
- Bitcoin (blockchain-based)
- Blockchains and cryptocurrencies in IoT
- Software-Defined Perimeter architecture
- Software defined perimeter
- Network stack – Transport Layer Security
- Public Key Infrastructure
- Cryptographic hash (authentication and signing)
- Asymmetric cryptography
- Symmetric cryptography
- Cryptography
- Physical security
- Storage security
- Processor and memory space
- Key management and trusted platform modules
- Root of Trust
- Physical and hardware security
- Chain Reaction
- Stuxnet
- Mirai
- Anatomy of IoT cyber attacks
- Defense terms
- Attack and threat terms
- Cyber security vernacular
- IoT Security
- Summary
- IoT data analytics and machine learning comparison and assessment
- Training and inference for IoT
- RNN
- CNN training and backpropagation
- CNN examples
- Hidden layers and formal description on forwarding propagation
- Max pooling and subsampling
- First layer and filters
- Convolutional Neural Networks
- Bayesian models
- Random forest
- Regression
- Classification
- Machine learning models
- Machine learning in IoT
- Sector use cases
- Lambda architecture
- Complex event processing
- Ingestion – streaming processing and data lakes
- Rules engines
- Top-level cloud pipeline
- Basic data analytics in IoT
- Data Analytics and Machine Learning in the Cloud and in the Fog
- Summary
- Fog Topologies
- Amazon Greengrass and Lambda
- Sensors actuators and control systems
- Protocol abstraction
- Hardware platform infrastructure
- Storage
- Compute
- Accelerators
- Network
- OpenFog node security
- Hardware virtualization
- Node management and software backplane
- Application support
- Application services
- OpenFog Reference Architecture
- Fog Computing versus Edge Computing versus cloud computing
- The Hadoop philosophy for Fog computing
- Fog computing
- Latency effect
- Constraints of cloud architectures for IoT
- Ceilometer – telemetry (optional)
- Heat – orchestration (optional)
- Horizon
- Cinder – Block Storage
- Neutron – Networking services
- Swift – Object Storage
- Nova compute
- Glance – image service
- Keystone – identity and service management
- The OpenStack cloud architecture
- Hybrid cloud
- Public cloud
- Private cloud
- Public private and hybrid cloud
- IaaS
- PaaS
- SaaS
- NaaS
- Cloud services model
- Cloud and Fog Topologies
- Summary
- Protocol summary and comparison
- AMQP
- STOMP
- Other protocols
- CoAP usage example
- CoAP Messaging Formats
- CoAP architecture details
- Constrained Application Protocol
- Differences between MQTT and MQTT-SN
- Gateway advertisement and discovery
- Transparent and aggregating gateways
- MQTT-SN architecture and topology
- MQTT-SN
- MQTT working example
- MQTT communication formats
- MQTT packet structure
- MQTT architecture details
- MQTT publish-subscribe
- MQTT
- Protocols
- IoT Edge to Cloud Protocols
- Summary
- SDN benefits
- Traditional internetworking
- SDN architecture
- Software-Defined Networking
- Edge processing
- Metrics and analytics
- Security functions
- Traffic shaping and QoS
- VPN
- VLAN
- Failover and out-of-band management
- Routing
- Gateway functions
- Routing functions
- Routers and Gateways
- Summary
- Sigfox topology
- Sigfox protocol stack
- Sigfox MAC layer
- Sigfox physical layer
- Sigfox
- LoRaWAN summary
- LoRaWAN topology
- LoRaWAN MAC layer
- LoRa physical layer
- LoRa and LoRaWAN
- 5G
- LTE Cat-NB
- LTE Cat-M1 (eMTC)
- LTE Cat-1
- LTE Cat-0
- Cat 0 Cat 1 Cat M1 and NB-IoT
- 4G-LTE packet structure
- 4G-LTE geographical areas dataflow and handover procedures
- 4G-LTE E-UTRAN protocol stack
- 4G-LTE topology and architecture
- 4G-LTE spectrum allocation and bands
- 3GPP user equipment categories
- Cellular access technologies
- Governance models and standards
- Cellular connectivity
- Long-Range Communication Systems and Protocols (WAN)
- Summary
- IEEE 802.11ah
- IEEE 802.11p vehicle-to-vehicle
- IEEE 802.11ac
- IEEE 802.11 security
- IEEE 802.11 operation
- IEEE 802.11 packet structure
- IEEE 802.11 MIMO
- IEEE 802.11 modulation and encoding techniques
- IEEE 802.11 spectrum allocation
- IEEE 802.11 architecture
- IEEE 802.11 suite of protocols and comparison
- IEEE 802.11 protocols and WLAN
- Neighbor discovery
- Thread addressing
- Thread routing
- Thread protocol stack
- Thread architecture and topology
- WPAN with IP – Thread
- 6LoWPAN security
- Neighbor discovery
- Header compression and fragmentation
- Mesh addressing and routing
- 6LoWPAN protocol stack
- 6LoWPAN topology
- WPAN with IP – 6LoWPAN
- IP role in IoT
- Internet protocol and transmission control protocol
- IP-Based WPAN and WLAN
- Summary
- Z-Wave topology and routing
- Z-Wave addressing
- Z-Wave protocol stack
- Z-Wave overview
- Z-Wave
- Zigbee security
- Zigbee association
- Zigbee mesh routing
- Zigbee addressing and packet structure
- Zigbee protocol stack
- Zigbee PHY and MAC (and difference from IEEE 802.15.4)
- Zigbee overview
- Zigbee history
- Zigbee
- IEEE 802.15.4 security
- IEEE 802.15.4 start-up sequence
- IEEE 802.15.4 address modes and packet structure
- IEEE 802.15.4 topology
- IEEE 802.15.4 architecture
- IEEE 802.15.4
- Bluetooth mesh provisioning
- Bluetooth mesh addressing modes
- Bluetooth mesh topology
- Bluetooth mesh introduction
- Bluetooth 5 range and speed enhancement
- Beaconing
- BLE security
- BR/EDR security
- Bluetooth profiles
- BLE operation
- BR/EDR operation
- Bluetooth packet structure
- Bluetooth 5 PHY and interference
- Bluetooth 5 stack
- Bluetooth 5 communication process and topologies
- Bluetooth history
- Bluetooth
- 802.15 standards
- Wireless personal area network standards
- Non-IP Based WPAN
- Summary
- Governing structure
- The radio spectrum
- Narrowband versus wideband communication
- Bit error rate
- Bitrate limits and the Shannon-Hartley theorem
- Information theory
- RF interference
- RF energy and theoretical range
- Communication theory
- Communications and Information Theory
- Summary
- Energy storage summary and other forms of power
- Radioactive power sources
- Supercapacitors
- Batteries
- Energy and power models
- Energy storage
- Thermal harvesting
- RF energy harvesting
- Piezo-mechanical harvesting
- Solar harvesting
- Energy harvesting
- Power management
- Energy sources and power management
- Sensor to controller
- Functional example – TI SensorTag CC2650
- Functional examples (putting it all together)
- Output devices
- Input devices
- Sensor fusion
- Vision system
- Smart IoT endpoints
- MEMS pressure sensors
- MEMS microphones
- MEMS accelerometers and gyroscopes
- MEMS sensors
- LiDAR and active sensing systems
- PIR sensors
- Photoelectric sensors
- Hall effect sensors and current sensors
- Temperature sensor summary
- Thermistors
- Resistance Temperature Detectors
- Thermocouples
- Thermocouples and temperature sensing
- Sensing devices
- Sensors Endpoints and Power Systems
- Summary
- Part 5 – Threat and security in IoT
- Part 4 – Fog and edge compute analytics and machine learning
- Part 3 – Internet routing and protocols
- Part 2 – Data communication
- Part 1 – Sensing and power
- Role of an architect
- IoT architecture
- The value of a network and Metcalfe's and Beckstrom's law
- IoT versus machine to machine
- IoT ecosystem
- IoT Architecture and Core IoT Modules
- Summary
- Government and military IoT use cases
- Government and military
- Smart city IoT use cases
- Smart city
- Energy IoT use cases
- Energy
- Agricultural and environmental IoT use cases
- Agricultural and environmental
- Transportation and logistics IoT use cases
- Transportation and logistics
- Healthcare IoT use cases
- Healthcare
- Retail IoT use cases
- Retail financial and marketing
- Consumer IoT use cases
- Consumer
- Industrial and manufacturing IoT use cases and impact
- Industrial and manufacturing
- IoT potential
- History of the IoT
- The IoT Story
- Reviews
- Get in touch
- Conventions used
- Download the color images
- To get the most out of this book
- What this book covers
- Who this book is for
- Preface
- Packt is searching for authors like you
- About the reviewer
- About the author
- Contributors
- PacktPub.com
- Why subscribe?
- Packt Upsell
- 版權(quán)信息
- 封面
- 封面
- 版權(quán)信息
- Packt Upsell
- Why subscribe?
- PacktPub.com
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the color images
- Conventions used
- Get in touch
- Reviews
- The IoT Story
- History of the IoT
- IoT potential
- Industrial and manufacturing
- Industrial and manufacturing IoT use cases and impact
- Consumer
- Consumer IoT use cases
- Retail financial and marketing
- Retail IoT use cases
- Healthcare
- Healthcare IoT use cases
- Transportation and logistics
- Transportation and logistics IoT use cases
- Agricultural and environmental
- Agricultural and environmental IoT use cases
- Energy
- Energy IoT use cases
- Smart city
- Smart city IoT use cases
- Government and military
- Government and military IoT use cases
- Summary
- IoT Architecture and Core IoT Modules
- IoT ecosystem
- IoT versus machine to machine
- The value of a network and Metcalfe's and Beckstrom's law
- IoT architecture
- Role of an architect
- Part 1 – Sensing and power
- Part 2 – Data communication
- Part 3 – Internet routing and protocols
- Part 4 – Fog and edge compute analytics and machine learning
- Part 5 – Threat and security in IoT
- Summary
- Sensors Endpoints and Power Systems
- Sensing devices
- Thermocouples and temperature sensing
- Thermocouples
- Resistance Temperature Detectors
- Thermistors
- Temperature sensor summary
- Hall effect sensors and current sensors
- Photoelectric sensors
- PIR sensors
- LiDAR and active sensing systems
- MEMS sensors
- MEMS accelerometers and gyroscopes
- MEMS microphones
- MEMS pressure sensors
- Smart IoT endpoints
- Vision system
- Sensor fusion
- Input devices
- Output devices
- Functional examples (putting it all together)
- Functional example – TI SensorTag CC2650
- Sensor to controller
- Energy sources and power management
- Power management
- Energy harvesting
- Solar harvesting
- Piezo-mechanical harvesting
- RF energy harvesting
- Thermal harvesting
- Energy storage
- Energy and power models
- Batteries
- Supercapacitors
- Radioactive power sources
- Energy storage summary and other forms of power
- Summary
- Communications and Information Theory
- Communication theory
- RF energy and theoretical range
- RF interference
- Information theory
- Bitrate limits and the Shannon-Hartley theorem
- Bit error rate
- Narrowband versus wideband communication
- The radio spectrum
- Governing structure
- Summary
- Non-IP Based WPAN
- Wireless personal area network standards
- 802.15 standards
- Bluetooth
- Bluetooth history
- Bluetooth 5 communication process and topologies
- Bluetooth 5 stack
- Bluetooth 5 PHY and interference
- Bluetooth packet structure
- BR/EDR operation
- BLE operation
- Bluetooth profiles
- BR/EDR security
- BLE security
- Beaconing
- Bluetooth 5 range and speed enhancement
- Bluetooth mesh introduction
- Bluetooth mesh topology
- Bluetooth mesh addressing modes
- Bluetooth mesh provisioning
- IEEE 802.15.4
- IEEE 802.15.4 architecture
- IEEE 802.15.4 topology
- IEEE 802.15.4 address modes and packet structure
- IEEE 802.15.4 start-up sequence
- IEEE 802.15.4 security
- Zigbee
- Zigbee history
- Zigbee overview
- Zigbee PHY and MAC (and difference from IEEE 802.15.4)
- Zigbee protocol stack
- Zigbee addressing and packet structure
- Zigbee mesh routing
- Zigbee association
- Zigbee security
- Z-Wave
- Z-Wave overview
- Z-Wave protocol stack
- Z-Wave addressing
- Z-Wave topology and routing
- Summary
- IP-Based WPAN and WLAN
- Internet protocol and transmission control protocol
- IP role in IoT
- WPAN with IP – 6LoWPAN
- 6LoWPAN topology
- 6LoWPAN protocol stack
- Mesh addressing and routing
- Header compression and fragmentation
- Neighbor discovery
- 6LoWPAN security
- WPAN with IP – Thread
- Thread architecture and topology
- Thread protocol stack
- Thread routing
- Thread addressing
- Neighbor discovery
- IEEE 802.11 protocols and WLAN
- IEEE 802.11 suite of protocols and comparison
- IEEE 802.11 architecture
- IEEE 802.11 spectrum allocation
- IEEE 802.11 modulation and encoding techniques
- IEEE 802.11 MIMO
- IEEE 802.11 packet structure
- IEEE 802.11 operation
- IEEE 802.11 security
- IEEE 802.11ac
- IEEE 802.11p vehicle-to-vehicle
- IEEE 802.11ah
- Summary
- Long-Range Communication Systems and Protocols (WAN)
- Cellular connectivity
- Governance models and standards
- Cellular access technologies
- 3GPP user equipment categories
- 4G-LTE spectrum allocation and bands
- 4G-LTE topology and architecture
- 4G-LTE E-UTRAN protocol stack
- 4G-LTE geographical areas dataflow and handover procedures
- 4G-LTE packet structure
- Cat 0 Cat 1 Cat M1 and NB-IoT
- LTE Cat-0
- LTE Cat-1
- LTE Cat-M1 (eMTC)
- LTE Cat-NB
- 5G
- LoRa and LoRaWAN
- LoRa physical layer
- LoRaWAN MAC layer
- LoRaWAN topology
- LoRaWAN summary
- Sigfox
- Sigfox physical layer
- Sigfox MAC layer
- Sigfox protocol stack
- Sigfox topology
- Summary
- Routers and Gateways
- Routing functions
- Gateway functions
- Routing
- Failover and out-of-band management
- VLAN
- VPN
- Traffic shaping and QoS
- Security functions
- Metrics and analytics
- Edge processing
- Software-Defined Networking
- SDN architecture
- Traditional internetworking
- SDN benefits
- Summary
- IoT Edge to Cloud Protocols
- Protocols
- MQTT
- MQTT publish-subscribe
- MQTT architecture details
- MQTT packet structure
- MQTT communication formats
- MQTT working example
- MQTT-SN
- MQTT-SN architecture and topology
- Transparent and aggregating gateways
- Gateway advertisement and discovery
- Differences between MQTT and MQTT-SN
- Constrained Application Protocol
- CoAP architecture details
- CoAP Messaging Formats
- CoAP usage example
- Other protocols
- STOMP
- AMQP
- Protocol summary and comparison
- Summary
- Cloud and Fog Topologies
- Cloud services model
- NaaS
- SaaS
- PaaS
- IaaS
- Public private and hybrid cloud
- Private cloud
- Public cloud
- Hybrid cloud
- The OpenStack cloud architecture
- Keystone – identity and service management
- Glance – image service
- Nova compute
- Swift – Object Storage
- Neutron – Networking services
- Cinder – Block Storage
- Horizon
- Heat – orchestration (optional)
- Ceilometer – telemetry (optional)
- Constraints of cloud architectures for IoT
- Latency effect
- Fog computing
- The Hadoop philosophy for Fog computing
- Fog Computing versus Edge Computing versus cloud computing
- OpenFog Reference Architecture
- Application services
- Application support
- Node management and software backplane
- Hardware virtualization
- OpenFog node security
- Network
- Accelerators
- Compute
- Storage
- Hardware platform infrastructure
- Protocol abstraction
- Sensors actuators and control systems
- Amazon Greengrass and Lambda
- Fog Topologies
- Summary
- Data Analytics and Machine Learning in the Cloud and in the Fog
- Basic data analytics in IoT
- Top-level cloud pipeline
- Rules engines
- Ingestion – streaming processing and data lakes
- Complex event processing
- Lambda architecture
- Sector use cases
- Machine learning in IoT
- Machine learning models
- Classification
- Regression
- Random forest
- Bayesian models
- Convolutional Neural Networks
- First layer and filters
- Max pooling and subsampling
- Hidden layers and formal description on forwarding propagation
- CNN examples
- CNN training and backpropagation
- RNN
- Training and inference for IoT
- IoT data analytics and machine learning comparison and assessment
- Summary
- IoT Security
- Cyber security vernacular
- Attack and threat terms
- Defense terms
- Anatomy of IoT cyber attacks
- Mirai
- Stuxnet
- Chain Reaction
- Physical and hardware security
- Root of Trust
- Key management and trusted platform modules
- Processor and memory space
- Storage security
- Physical security
- Cryptography
- Symmetric cryptography
- Asymmetric cryptography
- Cryptographic hash (authentication and signing)
- Public Key Infrastructure
- Network stack – Transport Layer Security
- Software defined perimeter
- Software-Defined Perimeter architecture
- Blockchains and cryptocurrencies in IoT
- Bitcoin (blockchain-based)
- IOTA (directed acyclical graph-based)
- Government regulations and intervention
- US Congressional Bill –Internet of Things (IoT) Cybersecurity Improvement Act of 2017
- Other governmental bodies
- IoT security best practices
- Holistic security
- Security checklist
- Summary
- Consortiums and Communities
- PAN consortia
- Bluetooth SIG
- Thread Group
- Zigbee Alliance
- Miscellaneous
- Protocol consortia
- Open Connectivity Foundation and Allseen Alliance
- OASIS
- Object Management Group
- IPSO Alliance
- Miscellaneous
- WAN consortia
- Weightless
- LoRa Alliance
- Internet Engineering Task Force
- Wi-Fi Alliance
- Fog and edge consortia
- OpenFog
- EdgeX Foundry
- Umbrella organizations
- Industrial Internet Consortium
- IEEE IoT
- Miscellaneous
- US government IoT and security entities
- Summary
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時(shí)間:2021-06-25 22:48:00