The most prevalent communication form is cellular radio and specifically cellular data. While mobile communication devices, had existed for many years before cellular technology, they had limited coverage, shared frequency space, and were essentially two-way radios. Bell Labs built some trial mobile phone technologies in the 1940s (Mobile Telephone Service) and 1950s (Improved Mobile Telephone Service) but had very limited success. There were also no uniform standards for mobile telephony at the time. It wasn't until the cellular concept was devised by Douglas H. Ring and Rae Young in 1947 and then built by Richard H. Frenkiel, Joel S. Engel, and Philip T. Porter at Bell Labs in the 1960s that larger and robust mobile deployments could be realized. The handoff between cells was conceived and built by Amos E. Joel Jr. also of Bell Labs, which allowed for handoff when moving cellular devices. All these technologies combined to form the first cellular telephone system...
Internet of Things for Architects
By :
Internet of Things for Architects
By:
Overview of this book
The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices.
This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP.
With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains.
Table of Contents (18 chapters)
Title Page
Packt Upsell
Contributors
Preface
IoT Architecture and Core IoT Modules
Sensors, Endpoints, and Power Systems
Communications and Information Theory
Non-IP Based WPAN
IP-Based WPAN and WLAN
Long-Range Communication Systems and Protocols (WAN)
Routers and Gateways
IoT Edge to Cloud Protocols
Cloud and Fog Topologies
Data Analytics and Machine Learning in the Cloud and in the Fog
IoT Security
Consortiums and Communities
Other Books You May Enjoy
Customer Reviews