<p><b>Learn to design, implement, and secure your IoT infrastructure. Revised and expanded for edge computing.</b></p> <h4>Key Features</h4> <ul><li>Build a complete IoT system that's the best fit for your organization </li> <li>Learn about different concepts, tech, and trade-offs in the IoT archite
Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security
โ Scribed by Perry Lea
- Publisher
- Packt Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 515
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Learn to design, implement and secure your IoT infrastructure
Key Features
โข Build a complete IoT system that is the best fit for your organization
โข Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack
โข Understand the theory, concepts, and implementation of each element that comprises IoT designโfrom sensors to the cloud
โข Implement best practices to ensure the reliability, scalability, robust communication systems, security, and data analysis in your IoT infrastructure
Book Description
The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices.
This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetoothยฎ 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, SigFox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP.
With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains.
What you will learn
โข Understand the role and scope of architecting a successful IoT deployment, from sensors to the cloud
โข Scan the landscape of IoT technologies that span everything from sensors to the cloud and everything in between
โข See the trade-offs in choices of protocols and communications in IoT deployments
โข Build a repertoire of skills and the vernacular necessary to work in the IoT space
โข Broaden your skills in multiple engineering domains necessary for the IoT architect
Who This Book Is For
This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, various technologies, and tradeoffs and develop a 50,000-foot view of IoT architecture.
โฆ Subjects
Cloud Computing; Machine Learning; Analytics; Computer Vision; Security; Internet of Things; Blockchain; Reliability; Scalability; Wide Area Networks; MQTT; Bluetooth; Sensors; Power Supplies; Fog Computing; Power Management; Smart Cities; Routers; ZigBee; LiDAR Sensor; Architecture; Z-wave; Batteries; Solar Cells; Thermistors; Thermocouples; Sensor Networks; Cellular Communications; Temperature Sensors; Constrained Application Protocol; Sigfox
๐ SIMILAR VOLUMES
<div><p>Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reactive than proactive. This leads to unnecessarily complicated systems that are hard to implemen
<div><p>Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reactive than proactive. This leads to unnecessarily complicated systems that are hard to implemen
<div><p>Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reactive than proactive. This leads to unnecessarily complicated systems that are hard to implemen
Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reactive than proactive. This leads to unnecessarily complicated systems that are hard to implement and ev