Book Image

Hands-On Industrial Internet of Things

By : Giacomo Veneri, Antonio Capasso
Book Image

Hands-On Industrial Internet of Things

By: Giacomo Veneri, Antonio Capasso

Overview of this book

We live in an era where advanced automation is used to achieve accurate results. To set up an automation environment, you need to first configure a network that can be accessed anywhere and by any device. This book is a practical guide that helps you discover the technologies and use cases for Industrial Internet of Things (IIOT). Hands-On Industrial Internet of Things takes you through the implementation of industrial processes and specialized control devices and protocols. You’ll study the process of identifying and connecting to different industrial data sources gathered from different sensors. Furthermore, you’ll be able to connect these sensors to cloud network, such as AWS IoT, Azure IoT, Google IoT, and OEM IoT platforms, and extract data from the cloud to your devices. As you progress through the chapters, you’ll gain hands-on experience in using open source Node-Red, Kafka, Cassandra, and Python. You will also learn how to develop streaming and batch-based Machine Learning algorithms. By the end of this book, you will have mastered the features of Industry 4.0 and be able to build stronger, faster, and more reliable IoT infrastructure in your Industry.
Table of Contents (18 chapters)

The I-IoT data flow

In this section, we will introduce the whole flow of industrial data from the sensors to when they are processed in the cloud. We will look closer at data acquisition, data sources, the related protocols and the edge device to push the data into the cloud in Chapters 3, Industrial Data Flow and Devices and Chapter 4, Implementing the Industrial IoT Data Flow. We will then look at an overview of cloud architecture and the main components for the I-IoT in Chapter 7, Developing Industrial IoT and Architecture, and beyond.

Here, when explaining the I-IoT data flow, we have not mentioned cybersecurity. This is not because the topic is not pertinent or relevant. On the contrary, cyber-security is always a hot topic, especially in an industry in which availability and reliability of equipment is a must, and confidentiality and intellectual properties are increasingly...