Home Page Icon
Home Page
Table of Contents for
Cover Page
Close
Cover Page
by Rob Barton, Gonzalo Salgueiro, David Hanes
IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things
About This E-Book
Title Page
Copyright Page
About the Authors
Chapter Contributors
About the Technical Reviewers
Dedications
Acknowledgments
Contents at a Glance
Contents
Reader Services
Icons Used in This Book
Command Syntax Conventions
Foreword
Introduction
Who Should Read This Book?
How This Book Is Organized
Part I: Introduction to IoT
Chapter 1. What Is IoT?
Genesis of IoT
IoT and Digitization
IoT Impact
Connected Roadways
Connected Factory
Smart Connected Buildings
Smart Creatures
Convergence of IT and OT
IoT Challenges
Summary
References
Chapter 2. IoT Network Architecture and Design
Drivers Behind New Network Architectures
Scale
Security
Constrained Devices and Networks
Data
Legacy Device Support
Comparing IoT Architectures
The oneM2M IoT Standardized Architecture
The IoT World Forum (IoTWF) Standardized Architecture
Additional IoT Reference Models
A Simplified IoT Architecture
The Core IoT Functional Stack
Layer 1: Things: Sensors and Actuators Layer
Layer 2: Communications Network Layer
Layer 3: Applications and Analytics Layer
IoT Data Management and Compute Stack
Fog Computing
Edge Computing
The Hierarchy of Edge, Fog, and Cloud
Summary
References
Part II: Engineering IoT Networks
Chapter 3. Smart Objects: The “Things” in IoT
Sensors, Actuators, and Smart Objects
Sensors
Actuators
Micro-Electro-Mechanical Systems (MEMS)
Smart Objects
Sensor Networks
Wireless Sensor Networks (WSNs)
Communication Protocols for Wireless Sensor Networks
Summary
Chapter 4. Connecting Smart Objects
Communications Criteria
Range
Frequency Bands
Power Consumption
Topology
Constrained Devices
Constrained-Node Networks
IoT Access Technologies
IEEE 802.15.4
IEEE 802.15.4g and 802.15.4e
IEEE 1901.2a
IEEE 802.11ah
LoRaWAN
NB-IoT and Other LTE Variations
Summary
Chapter 5. IP as the IoT Network Layer
The Business Case for IP
The Key Advantages of Internet Protocol
Adoption or Adaptation of the Internet Protocol
The Need for Optimization
Constrained Nodes
Constrained Networks
IP Versions
Optimizing IP for IoT
From 6LoWPAN to 6Lo
Header Compression
Fragmentation
Mesh Addressing
6TiSCH
RPL
Authentication and Encryption on Constrained Nodes
Profiles and Compliances
Internet Protocol for Smart Objects (IPSO) Alliance
Wi-SUN Alliance
Thread
IPv6 Ready Logo
Summary
Chapter 6. Application Protocols for IoT
The Transport Layer
IoT Application Transport Methods
Application Layer Protocol Not Present
SCADA
Generic Web-Based Protocols
IoT Application Layer Protocols
Summary
Chapter 7. Data and Analytics for IoT
An Introduction to Data Analytics for IoT
Structured Versus Unstructured Data
Data in Motion Versus Data at Rest
IoT Data Analytics Overview
IoT Data Analytics Challenges
Machine Learning
Machine Learning Overview
Machine Learning and Getting Intelligence from Big Data
Predictive Analytics
Big Data Analytics Tools and Technology
Massively Parallel Processing Databases
NoSQL Databases
Hadoop
The Hadoop Ecosystem
Edge Streaming Analytics
Comparing Big Data and Edge Analytics
Edge Analytics Core Functions
Distributed Analytics Systems
Network Analytics
Flexible NetFlow Architecture
Summary
References
Chapter 8. Securing IoT
A Brief History of OT Security
Common Challenges in OT Security
Erosion of Network Architecture
Pervasive Legacy Systems
Insecure Operational Protocols
Other Protocols
Device Insecurity
Dependence on External Vendors
Security Knowledge
How IT and OT Security Practices and Systems Vary
The Purdue Model for Control Hierarchy
OT Network Characteristics Impacting Security
Security Priorities: Integrity, Availability, and Confidentiality
Security Focus
Formal Risk Analysis Structures: OCTAVE and FAIR
OCTAVE
FAIR
The Phased Application of Security in an Operational Environment
Secured Network Infrastructure and Assets
Deploying Dedicated Security Appliances
Higher-Order Policy Convergence and Network Monitoring
Summary
Part III: IoT in Industry
Chapter 9. Manufacturing
An Introduction to Connected Manufacturing
An IoT Strategy for Connected Manufacturing
Business Improvements Driven Through IoT
An Architecture for the Connected Factory
Industrial Automation and Control Systems Reference Model
The CPwE Reference Model
CPwE Resilient Network Design
CPwE Wireless
Industrial Automation Control Protocols
EtherNet/IP and CIP
PROFINET
The PROFINET Architecture
Media Redundancy Protocol (MRP)
Modbus/TCP
Connected Factory Security
A Holistic Approach to Industrial Security
Edge Computing in the Connected Factory
Connected Machines and Edge Computing
Summary
References
Chapter 10. Oil and Gas
An Introduction to the Oil and Gas Industry
Defining Oil and Gas
The Oil and Gas Value Chain
Current Trends in the Oil and Gas Industry
Industry Key Challenges as Digitization Drivers
IoT and the Oil and Gas Industry
Improving Operational Efficiency
The Purdue Model for Control Hierarchy in Oil and Gas Networks
Oil and Gas Use Cases for IoT
IoT Architectures for Oil and Gas
Control Room Networks for Oil and Gas
Wired Networks for Oil and Gas
Wireless Networks for Oil and Gas
Wireless Use Cases in the Oil and Gas Industry
The Risk Control Framework for Cybersecurity in IoT
Securing the Oil and Gas PCN: Background
Securing the Oil and Gas PCN: Use Cases and Requirements
Data Analytics for Predictive Asset Monitoring
Summary
References
Chapter 11. Utilities
An Introduction to the Power Utility Industry
The IT/OT Divide in Utilities
The GridBlocks Reference Model
GridBlocks: An 11-Tiered Reference Architecture
The Primary Substation GridBlock and Substation Automation
SCADA
IEC 61850: The Modernization of Substation Communication Standards
Network Resiliency Protocols in the Substation
System Control GridBlock: The Substation WAN
Defining Teleprotection
Designing a WAN for Teleprotection
The Field Area Network (FAN) GridBlock
Advanced Metering Infrastructure
Other Use Cases
Securing the Smart Grid
NERC CIP
Smart Grid Security Considerations
The Future of the Smart Grid
Summary
References
Chapter 12. Smart and Connected Cities
An IoT Strategy for Smarter Cities
Vertical IoT Needs for Smarter Cities
Global vs. Siloed Strategies
Smart City IoT Architecture
Street Layer
City Layer
Data Center Layer
Services Layer
On-Premises vs. Cloud
Smart City Security Architecture
Smart City Use-Case Examples
Connected Street Lighting
Smart Traffic Control
Connected Environment
Summary
References
Chapter 13. Transportation
Transportation and Transports
Transportation Challenges
Roadways
Mass Transit
Rail
Challenges for Transportation Operators and Users
IoT Use Cases for Transportation
Connected Cars
Connected Fleets
Infrastructure and Mass Transit
An IoT Architecture for Transportation
IoT Technologies for Roadways
Connected Roadways Network Architecture
Extending the Roadways IoT Architecture to Bus Mass Transit
Extending Bus IoT Architecture to Railways
Summary
References
Chapter 14. Mining
Mining Today and Its Challenges
Scale
Safety
Environment
Security
Volatile Markets
Challenges for IoT in Modern Mining
The OT Roles in Mining
Connectivity
An IoT Strategy for Mining
Improved Safety and Location Services
Location Services
Improved Efficiencies
Improved Collaboration
IoT Security for Mining
An Architecture for IoT in Mining
IEEE 802.11 as the IoT Access Layer
802.11 Outdoor Wireless Mesh
4G/LTE
Wireless in Underground Mining
Industrial Wireless
Isolated vs. Connected Mine Networks
Core Network Connectivity
Network Design Consideration for Mining Applications
Data Processing
Summary
Chapter 15. Public Safety
Overview of Public Safety
Public Safety Objects and Exchanges
Public and Private Partnership for Public Safety IoT
Public Safety Adoption of Technology and the IoT
An IoT Blueprint for Public Safety
Mission Continuum
Mission Fabric
Inter-agency Collaboration
Emergency Response IoT Architecture
Mobile Command Center
Mobile Vehicles: Land, Air, and Sea
IoT Public Safety Information Processing
School Bus Safety
Bus Location and Student Onboarding/Offboarding
Driver Behavior Reporting
Diagnostic Reporting
Video Surveillance
Student Wi-Fi
Push-to-Talk Communication
School Bus Safety Network Architecture
Summary
Reference
Index
Code Snippets
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
About This E-Book
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset