Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

IoT Fundamentals

Networking Technologies, Protocols, and Use Cases for the Internet of Things
 Electronic book text
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780134307060
Veröffentl:
2017
Einband:
Electronic book text
Seiten:
576
Autor:
Hanes David
Serie:
Fundamentals (Cisco)
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

Today, billions of devices are Internet-connected, IoT standards and protocols are stabilizing, and technical professionals must increasingly solve real problems with IoT technologies. Now, five leading Cisco IoT experts present the first comprehensive, practical reference for making IoT work. IoT Fundamentals brings together knowledge previously available only in white papers, standards documents, and other hard-to-find sources-or nowhere at all.
Foreword xxviIntroduction xxviiiPart I Introduction to IoT 1Chapter 1 What Is IoT? 3Genesis of IoT 4IoT and Digitization 6IoT Impact 7Connected Roadways 8Connected Factory 12Smart Connected Buildings 15Smart Creatures 19Convergence of IT and OT 21IoT Challenges 23Summary 24References 24Chapter 2 IoT Network Architecture and Design 27Drivers Behind New Network Architectures 28Scale 30Security 31Constrained Devices and Networks 32Data 32Legacy Device Support 32Comparing IoT Architectures 33The oneM2M IoT Standardized Architecture 33The IoT World Forum (IoTWF) Standardized Architecture 35Additional IoT Reference Models 39A Simplified IoT Architecture 40The Core IoT Functional Stack 43Layer 1: Things: Sensors and Actuators Layer 44Layer 2: Communications Network Layer 46Layer 3: Applications and Analytics Layer 59IoT Data Management and Compute Stack 63Fog Computing 65Edge Computing 68The Hierarchy of Edge, Fog, and Cloud 68Summary 70References 71Part II Engineering IoT Networks 73Chapter 3 Smart Objects: The "Things" in IoT 75Sensors, Actuators, and Smart Objects 76Sensors 76Actuators 81Micro-Electro-Mechanical Systems (MEMS) 83Smart Objects 84Sensor Networks 87Wireless Sensor Networks (WSNs) 88Communication Protocols for Wireless Sensor Networks 92Summary 93Chapter 4 Connecting Smart Objects 95Communications Criteria 96Range 96Frequency Bands 98Power Consumption 101Topology 102Constrained Devices 103Constrained-Node Networks 104IoT Access Technologies 107IEEE 802.15.4 108IEEE 802.15.4g and 802.15.4e 118IEEE 1901.2a 124IEEE 802.11ah 130LoRaWAN 134NB-IoT and Other LTE Variations 142Summary 146Chapter 5 IP as the IoT Network Layer 149The Business Case for IP 150The Key Advantages of Internet Protocol 150Adoption or Adaptation of the Internet Protocol 152The Need for Optimization 154Constrained Nodes 155Constrained Networks 156IP Versions 157Optimizing IP for IoT 159From 6LoWPAN to 6Lo 159Header Compression 161Fragmentation 162Mesh Addressing 1636TiSCH 165RPL 167Authentication and Encryption on Constrained Nodes 173Profiles and Compliances 174Internet Protocol for Smart Objects (IPSO) Alliance 174Wi-SUN Alliance 174Thread 174IPv6 Ready Logo 175Summary 175Chapter 6 Application Protocols for IoT 177The Transport Layer 178IoT Application Transport Methods 180Application Layer Protocol Not Present 180SCADA 182Generic Web-Based Protocols 189IoT Application Layer Protocols 191Summary 204Chapter 7 Data and Analytics for IoT 205An Introduction to Data Analytics for IoT 206Structured Versus Unstructured Data 207Data in Motion Versus Data at Rest 209IoT Data Analytics Overview 209IoT Data Analytics Challenges 211Machine Learning 212Machine Learning Overview 212Machine Learning and Getting Intelligence from Big Data 218Predictive Analytics 220Big Data Analytics Tools and Technology 220Massively Parallel Processing Databases 222NoSQL Databases 223Hadoop 224The Hadoop Ecosystem 227Edge Streaming Analytics 230Comparing Big Data and Edge Analytics 231Edge Analytics Core Functions 232Distributed Analytics Systems 235Network Analytics 236Flexible NetFlow Architecture 238Summary 242References 243Chapter 8 Securing IoT 245A Brief History of OT Security 246Common Challenges in OT Security 249Erosion of Network Architecture 249Pervasive Legacy Systems 250Insecure Operational Protocols 250Other Protocols 253Device Insecurity 254Dependence on External Vendors 255Security Knowledge 256How IT and OT Security Practices and Systems Vary 256The Purdue Model for Control Hierarchy 257OT Network Characteristics Impacting Security 259Security Priorities: Integrity, Availability, and Confidentiality 261Security Focus 261Formal Risk Analysis Structures: OCTAVE and FAIR 262OCTAVE 262FAIR 265The Phased Application of Security in an Operational Environment 266Secured Network Infrastructure and Assets 266Deploying Dedicated Security Appliances 269Higher-Order Policy Convergence and Network Monitoring 272Summary 274Part III IoT in Industry 275Chapter 9 Manufacturing 277An Introduction to Connected Manufacturing 278An IoT Strategy for Connected Manufacturing 279Business Improvements Driven Through IoT 281An Architecture for the Connected Factory 282Industrial Automation and Control Systems Reference Model 282The CPwE Reference Model 284CPwE Resilient Network Design 286CPwE Wireless 289Industrial Automation Control Protocols 293EtherNet/IP and CIP 293PROFINET 294The PROFINET Architecture 296Media Redundancy Protocol (MRP) 297Modbus/TCP 298Connected Factory Security 299A Holistic Approach to Industrial Security 299Edge Computing in the Connected Factory 304Connected Machines and Edge Computing 304Summary 307References 307Chapter 10 Oil and Gas 309An Introduction to the Oil and Gas Industry 310Defining Oil and Gas 310The Oil and Gas Value Chain 313Current Trends in the Oil and Gas Industry 314Industry Key Challenges as Digitization Drivers 316IoT and the Oil and Gas Industry 319Improving Operational Efficiency 321The Purdue Model for Control Hierarchy in Oil and Gas Networks 321Oil and Gas Use Cases for IoT 323IoT Architectures for Oil and Gas 326Control Room Networks for Oil and Gas 327Wired Networks for Oil and Gas 328Wireless Networks for Oil and Gas 328Wireless Use Cases in the Oil and Gas Industry 332The Risk Control Framework for Cybersecurity in IoT 335Securing the Oil and Gas PCN: Background 337Securing the Oil and Gas PCN: Use Cases and Requirements 338Data Analytics for Predictive Asset Monitoring 341Summary 342References 343Chapter 11 Utilities 345An Introduction to the Power Utility Industry 347The IT/OT Divide in Utilities 348The GridBlocks Reference Model 350GridBlocks: An 11-Tiered Reference Architecture 352The Primary Substation GridBlock and Substation Automation 356SCADA 357IEC 61850: The Modernization of Substation CommunicationStandards 358Network Resiliency Protocols in the Substation 362System Control GridBlock: The Substation WAN 364Defining Teleprotection 364Designing a WAN for Teleprotection 367The Field Area Network (FAN) GridBlock 369Advanced Metering Infrastructure 371Other Use Cases 373Securing the Smart Grid 377NERC CIP 378Smart Grid Security Considerations 380The Future of the Smart Grid 381Summary 382References 383Chapter 12 Smart and Connected Cities 385An IoT Strategy for Smarter Cities 386Vertical IoT Needs for Smarter Cities 386Global vs. Siloed Strategies 389Smart City IoT Architecture 390Street Layer 391City Layer 394Data Center Layer 395Services Layer 397On-Premises vs. Cloud 398Smart City Security Architecture 398Smart City Use-Case Examples 401Connected Street Lighting 401Connected Environment 409Summary 411References 412Chapter 13 Transportation 413Transportation and Transports 413Transportation Challenges 415Roadways 415Mass Transit 416Rail 417Challenges for Transportation Operators and Users 418IoT Use Cases for Transportation 420Connected Cars 421Connected Fleets 422Infrastructure and Mass Transit 422An IoT Architecture for Transportation 427IoT Technologies for Roadways 427Connected Roadways Network Architecture 434Extending the Roadways IoT Architecture to Bus Mass Transit 440Extending Bus IoT Architecture to Railways 442Summary 447References 448Chapter 14 Mining 449Mining Today and Its Challenges 451Scale 451Safety 455Environment 455Security 456Volatile Markets 456Challenges for IoT in Modern Mining 456The OT Roles in Mining 456Connectivity 457An IoT Strategy for Mining 459Improved Safety and Location Services 459Location Services 461Improved Efficiencies 464Improved Collaboration 465IoT Security for Mining 466An Architecture for IoT in Mining 467IEEE 802.11 as the IoT Access Layer 468802.11 Outdoor Wireless Mesh 4684G/LTE 474Wireless in Underground Mining 475Industrial Wireless 476Isolated vs. Connected Mine Networks 476Core Network Connectivity 478Network Design Consideration for Mining Applications 479Data Processing 480Summary 481Chapter 15 Public Safety 483Overview of Public Safety 484Public Safety Objects and Exchanges 484Public and Private Partnership for Public Safety IoT 486Public Safety Adoption of Technology and the IoT 488An IoT Blueprint for Public Safety 489Mission Continuum 489Mission Fabric 490Inter-agency Collaboration 491Emergency Response IoT Architecture 493Mobile Command Center 494Mobile Vehicles: Land, Air, and Sea 501IoT Public Safety Information Processing 506School Bus Safety 508Bus Location and Student Onboarding/Offboarding 508Driver Behavior Reporting 510Diagnostic Reporting 511Video Surveillance 511Student Wi-Fi 513Push-to-Talk Communication 513School Bus Safety Network Architecture 513Summary 514Reference 5159781587144561, TOC, 5/16/2017

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga