Book Image

Hands-On Industrial Internet of Things

By : Giacomo Veneri, Antonio Capasso
Book Image

Hands-On Industrial Internet of Things

By: Giacomo Veneri, Antonio Capasso

Overview of this book

We live in an era where advanced automation is used to achieve accurate results. To set up an automation environment, you need to first configure a network that can be accessed anywhere and by any device. This book is a practical guide that helps you discover the technologies and use cases for Industrial Internet of Things (IIOT). Hands-On Industrial Internet of Things takes you through the implementation of industrial processes and specialized control devices and protocols. You’ll study the process of identifying and connecting to different industrial data sources gathered from different sensors. Furthermore, you’ll be able to connect these sensors to cloud network, such as AWS IoT, Azure IoT, Google IoT, and OEM IoT platforms, and extract data from the cloud to your devices. As you progress through the chapters, you’ll gain hands-on experience in using open source Node-Red, Kafka, Cassandra, and Python. You will also learn how to develop streaming and batch-based Machine Learning algorithms. By the end of this book, you will have mastered the features of Industry 4.0 and be able to build stronger, faster, and more reliable IoT infrastructure in your Industry.
Table of Contents (18 chapters)

Questions

  1. What are the three main elements that make up a DiD strategy?
    1. People, technology, and operating methods
    2. Firewall, antivirus, and people
    3. Patching, physical barrier, and people
  2. Which is the main feature that differentiates a stateful firewall?
    1. Packet filtering
    2. TCP session modelling
    3. Packet inspection at the application layer
  1. What is the main advantage of a DMZ?
    1. Segregation of the control network
    2. Being able to create and deploy devices that act as dual-homes in a specific network
    3. Monitoring traffic crossing networks
  1. What is the main advantage of a VLAN?
    1. Segregating the control network
    2. Building up a DMZ
    3. Building logical networks that share the same physical infrastructure
  1. What is the main security constraint of the edge in an OPC DCOM deployment setup?
    1. Allowing DCOM traffic to cross the firewall
    2. Using a DPI firewall for filtering OPC packets
    3. Building...