The Internet of Things (IoT) begins with sources of data or devices that perform an action. These we call endpoints, and they are the things associated with the internet. When one discusses IoT, in general, the actual sources of data are often overlooked. These sources are sensors outputting a stream of time-correlated data that must be transmitted securely, possibly analyzed, and possibly stored. The value of IoT is in the data in aggregate. Therefore, the data a sensor provides is crucial. However, for an architect, it is critical to understand the data as well as how the data is interpreted. Besides understanding what data is collected and how it is acquired, in a massive IoT deployment, it is useful to know what can be sensed, and what the constraints are for various sensors. For example, a system must account for lost devices and erroneous data. An architect must understand the reasons why data may not be reliable from sensors, and how...
Internet of Things for Architects
By :
Internet of Things for Architects
By:
Overview of this book
The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices.
This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP.
With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains.
Table of Contents (18 chapters)
Title Page
Packt Upsell
Contributors
Preface
IoT Architecture and Core IoT Modules
Sensors, Endpoints, and Power Systems
Communications and Information Theory
Non-IP Based WPAN
IP-Based WPAN and WLAN
Long-Range Communication Systems and Protocols (WAN)
Routers and Gateways
IoT Edge to Cloud Protocols
Cloud and Fog Topologies
Data Analytics and Machine Learning in the Cloud and in the Fog
IoT Security
Consortiums and Communities
Other Books You May Enjoy
Customer Reviews