Normal view MARC view ISBD view

IoT fundamentals : networking technologies, protocols, and use cases for the Internet of things / David Hanes, CCIE No. 3491, Gonzalo Salgueiro, CCIE No. 4541, Patrick Grossetete, Robert Barton, CCIE No. 6660, CCDE No. 2013:6, Jerome Henry, CCIE, No. 24750

By: Hanes, David [author.].
Contributor(s): Salgueiro, Gonzalo [author.] | Grossetete, Patrick [author.] | Barton, Robert [author.] | Henry, Jerome [author.].
Series: Cisco Press fundamentals series: Publisher: Indianapolis, Indiana, USA : Cisco Press, ©2017Description: xxxi, 543 pages : illustrations ; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781587144561.Subject(s): Internet of things | Internet of thingsGenre/Form: Print books.
Contents:
Machine generated contents note: pt. I Introduction to IoT -- ch. 1 What Is IoT? -- Genesis of IoT -- IoT and Digitization -- IoT Impact -- Connected Roadways -- Connected Factory -- Smart Connected Buildings -- Smart Creatures -- Convergence of IT and OT -- IoT Challenges -- Summary -- References -- ch. 2 IoT Network Architecture and Design -- Drivers Behind New Network Architectures -- Scale -- Security -- Constrained Devices and Networks -- Data -- Legacy Device Support -- Comparing IoT Architectures -- The oneM2M IoT Standardized Architecture -- The IoT World Forum (IoTWF) Standardized Architecture -- Layer 1 Physical Devices and Controllers Layer -- Layer 2 Connectivity Layer -- Layer 3 Edge Computing Layer -- Upper Layers: Layers 4 -- 7 -- IT and OT Responsibilities in the IoT Reference Model -- Additional IoT Reference Models -- A Simplified IoT Architecture -- The Core IoT Functional Stack -- Layer 1 Things: Sensors and Actuators Layer -- Layer 2 Communications Network Layer -- Access Network Sublayer -- Gateways and Backhaul Sublayer -- Network Transport Sublayer -- IoT Network Management Sublayer -- Layer 3 Applications and Analytics Layer -- Analytics Versus Control Applications -- Data Versus Network Analytics -- Data Analytics Versus Business Benefits -- Smart Services -- IoT Data Management and Compute Stack -- Fog Computing -- Edge Computing -- The Hierarchy of Edge, Fog, and Cloud -- Summary -- References -- pt. II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. III IoT in Industry -- ch. 9 Manufacturing -- An Introduction to Connected Manufacturing -- An IoT Strategy for Connected Manufacturing -- Business Improvements Driven Through IoT -- An Architecture for the Connected Factory -- Industrial Automation and Control Systems Reference Model -- The CPwE Reference Model -- CPwE Resilient Network Design -- Resilient Ethernet Protocol (REP) -- Business Value of Resiliency in Converged Networks -- CPwE Wireless -- CPwE Wireless Network Architecture -- Real-Time Location System (RTLS) -- Industrial Automation Control Protocols -- EtherNet/IP and CIP -- PROFINET -- The PROFINET Architecture -- Media Redundancy Protocol (MRP) -- Modbus/TCP -- Connected Factory Security -- A Holistic Approach to Industrial Security -- Network Address Translation in the Factory -- The Industrial DMZ -- Factory Security Identity Services -- Edge Computing in the Connected Factory -- Connected Machines and Edge Computing -- Summary -- References -- ch. 10 Oil and Gas -- An Introduction to the Oil and Gas Industry -- Defining Oil and Gas -- The Oil and Gas Value Chain -- Current Trends in the Oil and Gas Industry -- Industry Key Challenges as Digitization Drivers -- IoT and the Oil and Gas Industry -- Improving Operational Efficiency -- The Purdue Model for Control Hierarchy in Oil and Gas Networks -- Oil and Gas Use Cases for IoT -- The Connected Pipeline -- The Connected Refinery -- IoT Architectures for Oil and Gas -- Control Room Networks for Oil and Gas -- Wired Networks for Oil and Gas -- Wireless Networks for Oil and Gas -- Wireless Use Cases in the Oil and Gas Industry -- Mobile Process Control Network Operator -- Plant Turnaround -- The Risk Control Framework for Cybersecurity in IoT -- Securing the Oil and Gas PCN: Background -- Securing the Oil and Gas PCN: Use Cases and Requirements -- Real-Time Asset Inventory -- Remote Access Control -- Patch Management -- Antivirus (AV) Management -- Security Intelligence and Anomaly Detection -- Data Analytics for Predictive Asset Monitoring -- Summary -- References -- ch. 11 Utilities -- An Introduction to the Power Utility Industry -- The IT/OT Divide in Utilities -- The GridBlocks Reference Model -- GridBlocks: An 11-Tiered Reference Architecture -- The Primary Substation GridBlock and Substation Automation -- SCADA -- IEC 61850: The Modernization of Substation Communication Standards -- IEC 61850 Station Bus -- IEC 61850 Process Bus -- Migration to IEC 61850 -- Network Resiliency Protocols in the Substation -- Parallel Redundancy Protocol -- High-Availability Seamless Redundancy -- System Control GridBlock: The Substation WAN -- Defining Teleprotection -- Distance Protection -- Current Differential (87L) Protection -- Designing a WAN for Teleprotection -- The Field Area Network (FAN) GridBlock -- Advanced Metering Infrastructure -- Other Use Cases -- Demand Response -- Distribution Automation -- Securing the Smart Grid -- NERCCIP -- Smart Grid Security Considerations -- The Future of the Smart Grid -- Summary -- References -- ch. 12 Smart and Connected Cities -- An IoT Strategy for Smarter Cities -- Vertical IoT Needs for Smarter Cities -- Global vs. Siloed Strategies -- Smart City IoT Architecture -- Street Layer -- City Layer -- Data Center Layer -- Services Layer -- On-Premises vs. Cloud -- Smart City Security Architecture -- Smart City Use-Case Examples -- Connected Street Lighting -- Connected Street Lighting Solution -- Street Lighting Architecture -- Smart Parking -- Smart Parking Use Cases -- Smart Parking Architecture -- Smart Traffic Control -- Smart Traffic Control Architecture -- Smart Traffic Applications -- Connected Environment -- The Need for a Connected Environment -- Connected Environment Architecture -- Summary -- References
Note continued: ch. 13 Transportation -- Transportation and Transports -- Transportation Challenges -- Roadways -- Mass Transit -- Rail -- Challenges for Transportation Operators and Users -- IoT Use Cases for Transportation -- Connected Cars -- Connected Fleets -- Infrastructure and Mass Transit -- An IoT Architecture for Transportation -- IoT Technologies for Roadways -- Bluetooth -- Cellular/LTE -- An Introduction to DSRC and WAVE -- DSRC/WAVE Protocol and Architecture -- Connected Roadways Network Architecture -- Connected Fleet Architecture -- Connected Roadways Security -- Extending the Roadways IoT Architecture to Bus Mass Transit -- Mass Transit Security -- Extending Bus IoT Architecture to Railways -- Connected Stations -- Connected Train Security -- Summary -- References -- ch. 14 Mining -- Mining Today and Its Challenges -- Scale -- Safety -- Environment -- Security -- Volatile Markets -- Challenges for IoT in Modern Mining -- The OT Roles in Mining -- Connectivity -- An IoT Strategy for Mining -- Improved Safety and Location Services -- Driver Safety -- Weather and Lightning -- Slope Monitoring -- Location Services -- Hazardous Gas Detection -- Environmental Monitoring -- Improved Efficiencies -- Improved Collaboration -- IoT Security for Mining -- An Architecture for IoT in Mining -- IEEE 802.11 as the IoT Access Layer -- 802.11 Outdoor Wireless Mesh -- 802.11 Wireless Mesh Backhaul Considerations -- Wi-Fi Clients -- Antenna Considerations for Wireless Mesh -- 4G/LTE -- Wireless in Underground Mining -- Industrial Wireless -- Isolated vs. Connected Mine Networks -- Core Network Connectivity -- Network Design Consideration for Mining Applications -- Data Processing -- Summary -- ch. 15 Public Safety -- Overview of Public Safety -- Public Safety Objects and Exchanges -- Public and Private Partnership for Public Safety IoT -- Public Safety Adoption of Technology and the IoT -- An IoT Blueprint for Public Safety -- Mission Continuum -- Mission Fabric -- Inter-agency Collaboration -- Emergency Response IoT Architecture -- Mobile Command Center -- Network and Security Services -- Compute and Applications Services -- Mobile Vehicles: Land, Air, and Sea -- Network and Security Services -- Compute and Applications Services -- IoT Public Safety Information Processing -- School Bus Safety -- Bus Location and Student Onboarding/Offboarding -- Driver Behavior Reporting -- Diagnostic Reporting -- Video Surveillance -- Student Wi-Fi -- Push-to-Talk Communication -- School Bus Safety Network Architecture -- Summary -- Reference.
    average rating: 0.0 (0 votes)

Includes bibliographical references and index.

Machine generated contents note: pt. I Introduction to IoT -- ch. 1 What Is IoT? -- Genesis of IoT -- IoT and Digitization -- IoT Impact -- Connected Roadways -- Connected Factory -- Smart Connected Buildings -- Smart Creatures -- Convergence of IT and OT -- IoT Challenges -- Summary -- References -- ch. 2 IoT Network Architecture and Design -- Drivers Behind New Network Architectures -- Scale -- Security -- Constrained Devices and Networks -- Data -- Legacy Device Support -- Comparing IoT Architectures -- The oneM2M IoT Standardized Architecture -- The IoT World Forum (IoTWF) Standardized Architecture -- Layer 1 Physical Devices and Controllers Layer -- Layer 2 Connectivity Layer -- Layer 3 Edge Computing Layer -- Upper Layers: Layers 4 -- 7 -- IT and OT Responsibilities in the IoT Reference Model -- Additional IoT Reference Models -- A Simplified IoT Architecture -- The Core IoT Functional Stack -- Layer 1 Things: Sensors and Actuators Layer -- Layer 2 Communications Network Layer -- Access Network Sublayer -- Gateways and Backhaul Sublayer -- Network Transport Sublayer -- IoT Network Management Sublayer -- Layer 3 Applications and Analytics Layer -- Analytics Versus Control Applications -- Data Versus Network Analytics -- Data Analytics Versus Business Benefits -- Smart Services -- IoT Data Management and Compute Stack -- Fog Computing -- Edge Computing -- The Hierarchy of Edge, Fog, and Cloud -- Summary -- References -- pt. II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. III IoT in Industry -- ch. 9 Manufacturing -- An Introduction to Connected Manufacturing -- An IoT Strategy for Connected Manufacturing -- Business Improvements Driven Through IoT -- An Architecture for the Connected Factory -- Industrial Automation and Control Systems Reference Model -- The CPwE Reference Model -- CPwE Resilient Network Design -- Resilient Ethernet Protocol (REP) -- Business Value of Resiliency in Converged Networks -- CPwE Wireless -- CPwE Wireless Network Architecture -- Real-Time Location System (RTLS) -- Industrial Automation Control Protocols -- EtherNet/IP and CIP -- PROFINET -- The PROFINET Architecture -- Media Redundancy Protocol (MRP) -- Modbus/TCP -- Connected Factory Security -- A Holistic Approach to Industrial Security -- Network Address Translation in the Factory -- The Industrial DMZ -- Factory Security Identity Services -- Edge Computing in the Connected Factory -- Connected Machines and Edge Computing -- Summary -- References -- ch. 10 Oil and Gas -- An Introduction to the Oil and Gas Industry -- Defining Oil and Gas -- The Oil and Gas Value Chain -- Current Trends in the Oil and Gas Industry -- Industry Key Challenges as Digitization Drivers -- IoT and the Oil and Gas Industry -- Improving Operational Efficiency -- The Purdue Model for Control Hierarchy in Oil and Gas Networks -- Oil and Gas Use Cases for IoT -- The Connected Pipeline -- The Connected Refinery -- IoT Architectures for Oil and Gas -- Control Room Networks for Oil and Gas -- Wired Networks for Oil and Gas -- Wireless Networks for Oil and Gas -- Wireless Use Cases in the Oil and Gas Industry -- Mobile Process Control Network Operator -- Plant Turnaround -- The Risk Control Framework for Cybersecurity in IoT -- Securing the Oil and Gas PCN: Background -- Securing the Oil and Gas PCN: Use Cases and Requirements -- Real-Time Asset Inventory -- Remote Access Control -- Patch Management -- Antivirus (AV) Management -- Security Intelligence and Anomaly Detection -- Data Analytics for Predictive Asset Monitoring -- Summary -- References -- ch. 11 Utilities -- An Introduction to the Power Utility Industry -- The IT/OT Divide in Utilities -- The GridBlocks Reference Model -- GridBlocks: An 11-Tiered Reference Architecture -- The Primary Substation GridBlock and Substation Automation -- SCADA -- IEC 61850: The Modernization of Substation Communication Standards -- IEC 61850 Station Bus -- IEC 61850 Process Bus -- Migration to IEC 61850 -- Network Resiliency Protocols in the Substation -- Parallel Redundancy Protocol -- High-Availability Seamless Redundancy -- System Control GridBlock: The Substation WAN -- Defining Teleprotection -- Distance Protection -- Current Differential (87L) Protection -- Designing a WAN for Teleprotection -- The Field Area Network (FAN) GridBlock -- Advanced Metering Infrastructure -- Other Use Cases -- Demand Response -- Distribution Automation -- Securing the Smart Grid -- NERCCIP -- Smart Grid Security Considerations -- The Future of the Smart Grid -- Summary -- References -- ch. 12 Smart and Connected Cities -- An IoT Strategy for Smarter Cities -- Vertical IoT Needs for Smarter Cities -- Global vs. Siloed Strategies -- Smart City IoT Architecture -- Street Layer -- City Layer -- Data Center Layer -- Services Layer -- On-Premises vs. Cloud -- Smart City Security Architecture -- Smart City Use-Case Examples -- Connected Street Lighting -- Connected Street Lighting Solution -- Street Lighting Architecture -- Smart Parking -- Smart Parking Use Cases -- Smart Parking Architecture -- Smart Traffic Control -- Smart Traffic Control Architecture -- Smart Traffic Applications -- Connected Environment -- The Need for a Connected Environment -- Connected Environment Architecture -- Summary -- References

Note continued: ch. 13 Transportation -- Transportation and Transports -- Transportation Challenges -- Roadways -- Mass Transit -- Rail -- Challenges for Transportation Operators and Users -- IoT Use Cases for Transportation -- Connected Cars -- Connected Fleets -- Infrastructure and Mass Transit -- An IoT Architecture for Transportation -- IoT Technologies for Roadways -- Bluetooth -- Cellular/LTE -- An Introduction to DSRC and WAVE -- DSRC/WAVE Protocol and Architecture -- Connected Roadways Network Architecture -- Connected Fleet Architecture -- Connected Roadways Security -- Extending the Roadways IoT Architecture to Bus Mass Transit -- Mass Transit Security -- Extending Bus IoT Architecture to Railways -- Connected Stations -- Connected Train Security -- Summary -- References -- ch. 14 Mining -- Mining Today and Its Challenges -- Scale -- Safety -- Environment -- Security -- Volatile Markets -- Challenges for IoT in Modern Mining -- The OT Roles in Mining -- Connectivity -- An IoT Strategy for Mining -- Improved Safety and Location Services -- Driver Safety -- Weather and Lightning -- Slope Monitoring -- Location Services -- Hazardous Gas Detection -- Environmental Monitoring -- Improved Efficiencies -- Improved Collaboration -- IoT Security for Mining -- An Architecture for IoT in Mining -- IEEE 802.11 as the IoT Access Layer -- 802.11 Outdoor Wireless Mesh -- 802.11 Wireless Mesh Backhaul Considerations -- Wi-Fi Clients -- Antenna Considerations for Wireless Mesh -- 4G/LTE -- Wireless in Underground Mining -- Industrial Wireless -- Isolated vs. Connected Mine Networks -- Core Network Connectivity -- Network Design Consideration for Mining Applications -- Data Processing -- Summary -- ch. 15 Public Safety -- Overview of Public Safety -- Public Safety Objects and Exchanges -- Public and Private Partnership for Public Safety IoT -- Public Safety Adoption of Technology and the IoT -- An IoT Blueprint for Public Safety -- Mission Continuum -- Mission Fabric -- Inter-agency Collaboration -- Emergency Response IoT Architecture -- Mobile Command Center -- Network and Security Services -- Compute and Applications Services -- Mobile Vehicles: Land, Air, and Sea -- Network and Security Services -- Compute and Applications Services -- IoT Public Safety Information Processing -- School Bus Safety -- Bus Location and Student Onboarding/Offboarding -- Driver Behavior Reporting -- Diagnostic Reporting -- Video Surveillance -- Student Wi-Fi -- Push-to-Talk Communication -- School Bus Safety Network Architecture -- Summary -- Reference.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu