Internet of Things
Námskeið
-
T-732-ISIT Introduction to Embedded Systems and the Internet of Things
Lýsing:
Internet of Things: Technologies and Applications for a New Age of Intelligence outlines the background and overall vision for the Internet of Things (IoT) and Cyber-Physical Systems (CPS), as well as associated emerging technologies. Key technologies are described including device communication and interactions, connectivity of devices to cloud-based infrastructures, distributed and edge computing, data collection, and methods to derive information and knowledge from connected devices and systems using artificial intelligence and machine learning.
Also included are system architectures and ways to integrate these with enterprise architectures, and considerations on potential business impacts and regulatory requirements. New to this edition: • Updated material on current market situation and outlook. • A description of the latest developments of standards, alliances, and consortia. More specifically the creation of the Industrial Internet Consortium (IIC) and its architecture and reference documents, the creation of the Reference Architectural Model for Industrie 4.
0 (RAMI 4. 0), the exponential growth of the number of working groups in the Internet Engineering Task Force (IETF), the transformation of the Open Mobile Alliance (OMA) to OMA SpecWorks and the introduction of OMA LightweightM2M device management and service enablement protocol, the initial steps in the specification of the architecture of Web of Things (WoT) by World Wide Consortium (W3C), the GS1 architecture and standards, the transformation of ETSI-M2M to oneM2M, and a few key facts about the Open Connectivity Forum (OCF), IEEE, IEC/ISO, AIOTI, and NIST CPS.
• The emergence of new technologies such as distributed ledgers, distributed cloud and edge computing, and the use of machine learning and artificial intelligence for IoT. • A chapter on security, outlining the basic principles for secure IoT installations. • New use case description material on Logistics, Autonomous Vehicles, and Systems of CPS Standards organizations covered: IEEE, 3GPP, IETF, IEC/ISO, Industrial Internet Consortium (IIC), ITU-T, GS1, Open Geospatial Consortium (OGC), Open Mobile Alliance (OMA, e.
g. LightweightM2M), Object Management Group (OMG, e. g. Business Process Modelling Notation (BPMN)), oneM2M, Open Connectivity Forum (OCF), W3C Key technologies for IoT covered: Embedded systems hardware and software, devices and gateways, capillary networks, local and wide area networking, IoT data management and data warehousing, data analytics and big data, complex event processing and stream analytics, control systems, machine learning and artificial intelligence, distributed cloud and edge computing, and business process and enterprise integration In-depth security solutions for IoT systems Technical explanations combined with design features of IoT and use cases, which help the development of real-world solutions Detailed descriptions of the architectures and technologies that form the basis of IoT Clear examples of IoT use cases from real-world implementations such as Smart Grid, Smart Buildings, Smart Cities, Logistics and Participatory Sensing, Industrial Automation, and Systems of CPS Market perspectives, IoT evolution, and future outlook.
Annað
- Höfundar: Vlasios Tsiatsis, Stamatis Karnouskos, Jan Holler, David Boyle, Catherine Mulligan
- Útgáfa:2
- Útgáfudagur: 2018-11-16
- Engar takmarkanir á útprentun
- Engar takmarkanir afritun
- Format:Page Fidelity
- ISBN 13: 9780128144367
- Print ISBN: 9780128144350
- ISBN 10: 012814436X
Efnisyfirlit
- Internet of Things
- Copyright
- Contents
- About the Authors
- Foreword to the First Edition by Zach Shelby
- Foreword to the First Edition by Geoff Mulligan
- Foreword to the Second Edition by Geoff Mulligan
- Preface
- Introduction
- Structure of the Book
- Part 1: The Evolving IoT Landscape
- Chapter 1: Why the Internet of Things?
- Chapter 2: Origins and IoT Landscape
- Chapter 3: IoT - A Business Perspective
- Chapter 4: An Architecture Perspective
- Part 2: IoT Technologies and Architectures
- Chapter 5: Technology Fundamentals
- Chapter 6: Security
- Chapter 7: Architecture and State-of-the-Art
- Chapter 8: Architecture Reference Model
- Chapter 9: Designing the Internet of Things for the Real-World
- Part 3: IoT Use Cases
- Chapter 10: Asset Management
- Chapter 11: Industrial Automation
- Chapter 12: Smart Grid
- Chapter 13: Commercial Building Automation
- Chapter 14: Smart Cities
- Chapter 15: Participatory Sensing
- Chapter 16: Autonomous Vehicles and Systems of Cyber-Physical Systems
- Chapter 17: Logistics
- Chapter 18: Conclusions and Looking Ahead
- Appendix A: ETSI M2M
- 1 Why the Internet of Things?
- 2 Origins and IoT Landscape
- 2.1 Introduction
- 2.2 Evolving to an Internet of Things
- 2.2.1 A brief background
- 2.2.2 A simple enterprise IoT solution overview
- 2.2.3 The Internet of Things ahead
- 2.3 IoT in a Global Context
- 2.3.1 Game changers
- 2.3.2 General technology and scientific trends
- 2.3.3 Trends in information and communications technologies
- 2.3.4 Expected capabilities
- 2.3.5 Implications for IoT
- 2.3.6 Barriers and concerns
- 2.4 A Use Case Example
- 2.5 A Shift in Mindset
- 3 IoT - A Business Perspective
- 3.1 Introduction
- 3.1.1 Information marketplaces
- 3.2 Definitions
- 3.2.1 Global value chains
- 3.2.2 Ecosystems vs. value chains
- 3.2.3 Industrial structure
- 3.3 Value Chains Overview
- 3.4 IoT Value Chain Example
- 3.5 An Emerging Industrial Structure for IoT
- 3.5.1 The Information-Driven Global Value Chain
- 3.5.1.1 Inputs to the information-driven global commodity chain
- 3.5.1.2 Production processes of the information-driven global value chain
- 3.5.1 The Information-Driven Global Value Chain
- 3.1 Introduction
- 3.6 The International-Driven Global Value Chain and Global Information Monopolies
- 3.7 Business Model Innovation in IoT
- 3.7.1 Current examples
- 3.7.2 Business to Business models
- 3.7.3 Data analytics business models
- 3.7.4 New data marketplaces models
- 3.7.5 SLA security integration
- 3.8 Conclusions
- 4.1 Building an Architecture
- 4.2 Requirements and Main Design Principles
- 4.3 An IoT Architecture Outline
- 4.4 Standards Considerations
- 5 Technology Fundamentals
- 5.1 Devices and Gateways
- 5.1.1 Introduction
- 5.1.1.1 Device types
- 5.1.1.2 Deployment scenarios for devices
- 5.1.2 Basic devices
- 5.1.3 Gateways
- 5.1.3.1 Data Management
- 5.1.3.2 Local applications
- 5.1.3.3 Device Management
- 5.1.4 Advanced devices
- 5.1.5 Summary and vision
- 5.1.1 Introduction
- 5.2 Local and Wide Area Networking
- 5.2.1 The need for networking
- 5.2.2 Wide Area Networking
- 5.2.2.1 3rd Generation Partnership Project technologies and Machine Type Communications
- 5.2.3 Low-Power Wide Area Networks
- 5.2.3.1 3GPP Licensed Spectrum LPWA Technologies
- 5.2.3.2 Proprietary LPWA technologies
- 5.2.3.3 LPWA standards landscape
- 5.2.4 Local Area Networking
- 5.2.4.1 Deployment considerations
- 5.2.4.2 Key technologies
- 5.1 Devices and Gateways
- 5.3 Machine Intelligence
- 5.3.1 The role of Machine Intelligence in IoT
- 5.3.2 Machine Intelligence overview
- 5.3.3 Considerations when using MI for IoT data
- 5.3.4 A framework of MI for IoT
- 5.3.5 Industrial Internet Analytics Framework
- 5.3.6 Conclusions
- 5.4 Distributed Cloud and Edge Computing
- 5.4.1 A new software delivery model
- 5.4.2 Cloud fundamentals
- 5.4.3 Computing at the edge
- 5.4.4 Considerations and conclusions
- 5.5 Data Management
- 5.5.1 Introduction
- 5.5.2 Managing IoT data flow
- 5.5.2.1 Data generation
- 5.5.2.2 Data acquisition
- 5.5.2.3 Data validation
- 5.5.2.4 Data storage
- 5.5.2.5 Data processing
- 5.5.2.6 Data remanence
- 5.5.2.7 Data analysis
- 5.5.3 IoT data considerations
- 5.5.4 Conclusions
- 5.6 Business Processes in IoT
- 5.6.1 Introduction
- 5.6.2 IoT integration with enterprise systems
- 5.6.3 Distributed business processes in IoT
- 5.6.4 Considerations
- 5.6.5 Conclusions
- 5.7 Distributed Ledgers and Applications
- 5.7.1 DLT, IoT, and Data Ownership
- 6.1 Introduction
- 6.2 Basic Principles
- 6.2.1 Encryption
- 6.2.1.1 Ciphers
- 6.2.1.2 Symmetric ciphers
- 6.2.1.3 Asymmetric ciphers
- 6.2.2 Authentication
- 6.2.2.1 Symmetric authentication
- 6.2.2.2 Asymmetric authentication
- 6.2.2.3 Application of authentication
- 6.2.1 Encryption
- 6.3.1 Denial of Service (DoS) Attacks
- 6.3.2 Sybil attacks
- 6.3.3 Privacy attacks
- 6.3.4 "Hole" attacks
- 6.3.5 Physical attacks
- 6.4.1 Application layer and physical attacks
- 6.4.2 Transport layer
- 6.4.3 Network layer
- 6.4.4 Data Link/Medium Access Control layer
- 6.4.5 Physical layer
- 6.5.1 IETF
- 6.5.2 3GPP and low-power Wide Area Networks
- 6.6.1 Safety in industrial automation and robotics
- 6.6.2 Safety in automotive systems
- 6.6.3 Safety in Smart Cities
- 7.1 Introduction
- 7.2 ITU-T
- 7.3 IETF
- 7.3.1 Introduction
- 7.3.2 IETF IoT-related Working Groups
- 7.3.3 IETF fragments of an architecture
- 7.4 OMA
- 7.5 IoT-A and IIRA
- 7.6 RAMI 4.0
- 7.7 W3C
- 7.8 OGC
- 7.9 GS1 Architecture and Technologies
- 7.9.1 GS1 Identify
- 7.9.2 GS1 Capture
- 7.9.3 GS1 Share
- 7.9.4 EPCIS architecture and technologies
- 7.10 Other Relevant State-of-the-Art
- 7.10.1 oneM2M
- 7.10.2 OCF
- 7.10.3 IEEE
- 7.10.4 IEC/ISO: ISO/IEC JTC 1/WG 10/SC 41
- 7.10.5 AIOTI
- 7.10.6 NIST CPS
- 7.11 Conclusions
- 8.1 Introduction
- 8.2 Reference Model and Architecture
- 8.3 IoT Reference Model
- 8.3.1 IoT Domain Model
- 8.3.1.1 Model notation and semantics
- 8.3.1.2 Main concepts
- 8.3.1.3 Further considerations
- 8.3.2 Information model
- 8.3.3 Functional model
- 8.3.3.1 Device Functional Group
- 8.3.3.2 Communication Functional Group
- 8.3.3.3 IoT Service Functional Group
- 8.3.3.4 Virtual Entity Functional Group
- 8.3.3.5 IoT Service Organization Functional Group
- 8.3.3.6 IoT Process Management Functional Group
- 8.3.3.7 Management Functional Group
- 8.3.3.8 Security Functional Group
- 8.3.3.9 Application Functional Group
- 8.3.3.10 Modular IoT functions
- 8.3.4 Communication model
- 8.3.5 Safety, privacy, trust, security model
- 8.3.5.1 Safety
- 8.3.5.2 Privacy
- 8.3.5.3 Trust
- 8.3.5.4 Security
- 8.3.1 IoT Domain Model
- 8.5.1 Device and Application Functional Group
- 8.5.2 Communication Functional Group
- 8.5.3 IoT Service Functional Group
- 8.5.4 Virtual Entity Functional Group
- 8.5.5 IoT Process Management Functional Group
- 8.5.6 Service Organization Functional Group
- 8.5.7 Security Functional Group
- 8.5.8 Management Functional Group
- 8.6.1 Information description
- 8.6.2 Information flow and lifecycle
- 8.6.3 Information handling
- 8.9.1 Industrial Internet Reference Architecture
- 8.9.1.1 IIRA Usage Viewpoint
- 8.9.1.2 IIRA Functional Viewpoint
- 8.9.1.3 IIRA Implementation viewpoint
- 9.1 Introduction
- 9.2 Technical Design Constraints - Hardware Is Popular Again
- 9.2.1 Devices and networks
- 9.2.1.1 Functional requirements
- 9.2.1.2 Sensing and communications field
- 9.2.1.3 Programming and embedded intelligence
- 9.2.1.4 Power
- 9.2.1.5 Gateway
- 9.2.1.6 Nonfunctional requirements
- 9.2.1.7 Financial cost
- 9.2.1 Devices and networks
- 10 Asset Management
- 10.1 Introduction
- 10.2 Expected Benefits
- 10.3 e-Maintenance in the IoT Era
- 10.4 Hazardous Goods Management in the IoT Era
- 10.5 Conclusions
- 11 Industrial Automation
- 11.1 SOA-Based Device Integration
- 11.2 SOCRADES: Realizing the Enterprise Integrated Web of Things
- 11.3 IMC-AESOP: From the Web of Things to the Cloud of Things
- 11.4 Conclusions
- 12 Smart Grid
- 12.1 Introduction
- 12.2 Smart Metering
- 12.3 Smart House
- 12.4 Smart Grid City
- 12.5 Conclusions
- 13 Commercial Building Automation
- 13.1 Introduction
- 13.2 Case Study: Phase One - Commercial Building Automation Today
- 13.2.1 Background
- 13.2.2 Technology overview
- 13.2.3 Value chain
- 13.3 Case Study: Phase Two - Commercial Building Automation in the Future
- 13.3.1 Evolution of commercial building automation
- 13.3.2 Background
- 13.3.3 Technology overview
- 13.3.4 Evolved value chain for commercial building automation
- 14.1 Introduction - What Is a Smart City?
- 14.2 Smart Cities - A Technical Perspective
- 14.3 IoT Data Supply Chains
- 14.4 IoT Data and Context Management in Smart Cities
- 14.5 ETSI ISC Context Information Management
- 14.6 Smart Cities - A Reference Architecture
- 14.7 Smart Cities - Smart Parking
- 15.1 Introduction
- 15.2 Roles, Actors, Engagement
- 15.2.1 Collective design and investigation
- 15.2.2 Public contribution
- 15.2.3 Personal use and reflection
- 15.3 Participatory Sensing Process
- 15.4 Technology Overview
- 15.5 An Early Scenario
- 15.6 Recent Trends
- 15.6.1 Citizen journalism
- 15.6.2 Passive participation
- 15.6.3 Social Sensing
- 15.7 A Modern Example
- 15.8 Conclusions
- 16.1 Introduction
- 16.2 Autonomous Cars
- 16.2.1 A very brief history of autonomous cars
- 16.2.2 Enabling technologies
- 16.2.3 Regulation, governance, and ethics
- 16.2.4 Other autonomous passenger vehicles
- 16.3 Other Autonomous Systems
- 16.3.1 Autonomous rail
- 16.3.2 Unmanned aerial systems
- 16.3.3 Unmanned Autonomous Underwater Vehicles and Systems
- 16.4 Intelligent Infrastructure
- 16.5 Convergence and Systems of Cyber-Physical Systems
- 16.6 Cyber-Physical Systems Challenges and Opportunities
- 17.1 Introduction
- 17.2 Roles and Actors
- 17.3 Technology Overview
- 17.3.1 Identification of the Things
- 17.3.2 Main technologies
- 17.4 Example Scenario - Food Transport
- 17.5 Conclusions
- A.1 Introduction
- A.1.1 ETSI M2M high-level architecture
- A.1.2 ETSI M2M Service Capabilities
- A.1.3 ETSI M2M interfaces
- A.1.4 ETSI M2M resource management
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 17290
- Útgáfuár : 2018
- Leyfi : 380