دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Veena S. Chakravarthi
سری:
ISBN (شابک) : 3030792714, 9783030792718
ناشر: Springer
سال نشر: 2021
تعداد صفحات: 303
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 11 مگابایت
در صورت تبدیل فایل کتاب Internet of Things and M2M Communication Technologies: Architecture and Practical Design Approach to IoT in Industry 4.0 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب اینترنت اشیا و فناوریهای ارتباطی M2M: معماری و رویکرد طراحی عملی به اینترنت اشیا در صنعت 4.0 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Foreword Foreword Preface Contents Abbreviations About the Author Chapter 1: Internet of Things: An Introduction 1.1 Industry 4.0 1.2 A Brief History of Industrial Revolutions 1.3 Technology Enablers 1.4 Internet of Things 1.5 IoT Concept 1.6 Characteristics of Internet of Things 1.7 Industrial Internet of Things 1.8 Scope of Internet of Things (IoT) Technology 1.9 IoT Technologies 1.9.1 Sensor Technology 1.9.2 Actuator Technology 1.9.3 Signal and Data Processing 1.9.4 User Interface and Machine Learning 1.9.5 Artificial Intelligence (AI) 1.9.6 Machine to Machine (M2M) Communication Technology 1.9.7 Internet Technology 1.9.8 Embedded System/PCB/System Design 1.9.9 Integrated Development Environment for System Software Development 1.10 Architectural Framework of IoT 1.11 IoT and Open Systems Interconnection (OSI) 1.12 M2M Communication Technologies 1.12.1 In-Vehicle Telemetry Services 1.12.2 Smart Meters 1.12.3 Smart Asset Tracking Services 1.12.4 Supply Chain Management (SCM) Solutions 1.12.5 Wearable Technologies References Chapter 2: Internet of Things (IoT) Design Methodology 2.1 Architecture Framework of the IoT System Solution 2.2 Three-Layer Architecture 2.2.1 Thing or Device Layer 2.2.2 Network Layer 2.2.3 Application Layer 2.3 Five-Layer Architecture 2.3.1 IoT Network Management Layer 2.3.2 IoT Data Processing Layer 2.4 Fog-Based IoT Architecture 2.5 Edge Computing Architecture 2.6 Hybrid Cloud-Fog-Edge Architecture 2.7 IoT Design Flow 2.7.1 Requirement Study 2.7.2 Deriving Specifications 2.7.3 Identifying IoT Architecture 2.7.4 Identify Layer Functions and Interfaces 2.7.5 Identify Sensor Needs 2.7.6 Identify Processor Needs 2.7.7 Classify Processor Needs 2.7.8 Proof-of-Concept Development 2.7.9 Validation of PoC 2.7.10 Derive IoT Product Requirement 2.7.11 Derive IoT Design Requirement 2.7.12 Product Design 2.7.13 Product Validation 2.7.14 Integration to Cloud Gateway 2.7.15 IoT System Validation 2.8 Choice of Technologies 2.8.1 Hardware Development Platforms 2.8.2 Embedded Software Development: IDE 2.8.3 Custom Hardware Development 2.8.4 Product Design 2.9 Standard Compliance 2.10 Regulatory Requirements 2.11 IoT Device Development Platforms 2.12 IoT Device Data Management Platforms 2.13 Product-Hardware-Software Partitioning 2.14 IoT Software Development 2.15 Communication Technologies References Chapter 3: Industrial IoT (IIoT) Design Methodology 3.1 Introduction to Industrial IoT 3.2 Challenges of Industrial IoT 3.2.1 Heterogeneous Process Flows and Machineries 3.2.2 Process Security 3.2.3 IIoT-Based Automation 3.2.4 Oil and Gas Automation 3.3 Automation Framework Using IIoT System Solution 3.3.1 PLCs/RTUs with IIoT Devices 3.3.2 Single-Board Computers (SBC) 3.3.3 Data Servers 3.3.4 Human Machine Interface (HMI) and Supervisory System 3.3.5 SCADA Software 3.4 Technologies in IIoT Solution 3.4.1 Sensor and Actuator Technology 3.4.2 Distributed Ledger Technologies (DLTs) 3.4.3 User Interface (UI) and Machine Learning (ML) 3.4.4 Artificial Intelligence 3.4.4.1 High-Performance Computing 3.4.4.2 Embedded Systems 3.4.4.3 Application Software Development 3.5 IIoT Development Platforms 3.5.1 Commercial IoT Platforms 3.6 IIoT Subsystems 3.7 Communication Technologies References Chapter 4: IoT Product Design: A Case Study Introduction to Design Case 4.1 Design Case Study: Smart Environment Monitoring 4.2 A Case Study: Product Requirements 4.3 Proof of Concept 4.3.1 IoT Device 4.3.2 IoT Device Firmware 4.3.2.1 Firmware Code 4.3.2.2 Prototype Design 4.3.2.3 Cloud Storage and Analytics Setup 4.3.2.4 Registration to ThingSpeak Cloud 4.3.2.5 ThingSpeak Cloud Server Access 4.3.2.6 Product Design 4.3.2.7 Product Validation and Testing Functionality Test Compatibility Test Stress and Scalability Test Data Integrity Test Security Test Performance Test 4.3.2.8 Safety and Environment Tests IoT Testing on the Internet 4.4 IoT Device Using VLSI System on Chip (SoC) References Chapter 5: Sensors, Actuators, and Hardware Accelerators 5.1 Introduction to Sensors and Actuators 5.1.1 Sensor 5.1.2 Classification of Sensors 5.1.2.1 Flow Sensors 5.1.2.2 Force Sensors 5.1.2.3 Humidity Sensors 5.1.2.4 Pressure Sensors 5.1.2.5 Photo Optic Sensors 5.1.2.6 Water Level Sensors 5.1.2.7 Ultrasonic Sensors 5.1.3 Actuators 5.2 Signal Conditioning of Sensor Output 5.3 Electrical Isolation 5.3.1 Amplification 5.3.2 Filtering 5.3.2.1 Power Consumption of IoT 5.3.2.2 Storage in IoT Devices 5.4 Hardware Accelerators References Chapter 6: Capturing Modules 6.1 Introduction 6.1.1 Cameras 6.1.1.1 CCD Cameras 6.1.1.2 CMOS Cameras 6.2 Smartphone Camera Modules 6.2.1 Specifications of Camera Modules 6.2.1.1 Videos 6.2.2 Commercial Image Processing Modules 6.2.2.1 STMicroelectronics VG*640: 1.3 Megapixel High-Dynamic-Range Image Sensor 6.2.2.2 Raspberry Pi Camera Module V2(SKU) 6.2.3 Camera Modules for Arduino References Chapter 7: IoT Software Design Methodologies 7.1 Introduction to IoT Software 7.2 Selection of Hardware 7.3 Operating System or Bare Metal Architecture 7.3.1 IoT Software Footprint 7.3.2 Communication Device 7.3.3 Power Management 7.3.4 Firmware Upgrade 7.3.5 IoT Security 7.4 IoT Embedded System Software 7.4.1 Embedded Software Development Platforms 7.4.1.1 Arduino IDE 7.4.1.2 Simulator 7.4.2 Embedded Program for an Application 7.4.2.1 Device Boot Loader 7.4.2.2 Operating Systems 7.4.2.3 Hardware Configurations and Initializations Setup Signal Processing Algorithms Computation Functions Interface Module Configurations Communication Functions Communication Functions 7.5 Embedded Software Architecture Guidelines 7.5.1 Embedding the Software onto Hardware 7.5.2 RTOS and Mbed OS 7.6 Most Used IDEs 7.7 Software Development for Communication 7.8 Cloud Computing 7.8.1 Expandable Storage 7.8.2 Device Connectivity to Cloud Service 7.8.3 User Access Management 7.8.4 Data Analytics 7.8.4.1 Data Reporting and Visualization 7.8.4.2 Cloud Application Program Development 7.8.5 Access to Cloud Servers 7.9 Edge Development Platforms 7.9.1 Protocols Supported Depending on Connectivity Technology Chosen 7.9.2 Access to Cloud Services 7.9.3 IoT Mobile Application Development Platforms References Chapter 8: IoT Security 8.1 Need for IoT Security 8.2 Security, Privacy and Interoperability Challenges in IoT Systems 8.2.1 Challenges of Privacy 8.2.2 Challenges of Security 8.2.3 Challenges of Interoperability 8.3 Terminology 8.4 Vulnerabilities in IoT Network 8.5 Cryptographic Algorithms for IoT Security 8.6 IoT Security Platforms 8.7 Layer-Wise Security of IP Stack for IoT 8.7.1 Transport Layer Security (TLS) 8.7.2 IPsec for IoT 8.7.3 Cryptography Keys 8.8 IoT Security Tomography and Layered Attacker Model 8.8.1 Layer 1: Physical or Device Layer 8.8.2 Layer 2: Network Layer Attack 8.8.3 Layer 3: Application Layer Attack 8.9 Best Practices in Monitoring IoT Security References Chapter 9: IoT Application Technologies for Constrained Devices 9.1 Introduction to IoT Application Layer and External Interface 9.1.1 CoAP Application Protocol 9.1.2 Message Queueing Telemetry Transfer (MQTT) Application Protocol 9.2 Extensible Messaging and Presence Protocol (XMPP) 9.2.1 WebSocket 9.2.2 Simple Object Access Protocol (SOAP) 9.3 Representational State Transfer (REST) 9.3.1 RESTful and HTTP APIs 9.3.1.1 Application Development Platforms References Chapter 10: M2M Communication and Technologies 10.1 M2M Communication 10.1.1 Cellular Technology 10.1.2 Satellite Communication 10.1.3 Short-Range Technologies 10.1.4 LPWAN Technology 10.1.5 GPS/GNSS and Positioning Technology 10.2 Standards and Protocols 10.3 Applications Using M2M Communication References Chapter 11: M2M Communication Protocols 11.1 Internet Protocol Stack and M2M Communication 11.2 Internet Protocol (IP) Stack 11.2.1 Version 11.2.2 Length 11.2.3 Type of Service 11.2.4 Identity, Flags, and Fragment Offset 11.2.5 Time 11.2.6 Source IP Address and Destination IP Address 11.3 IPv6 and IoT 11.3.1 User Datagram Protocol (UDP) 11.3.2 Transmission Control Protocol (TCP) 11.3.3 TCP Segment Format 11.3.3.1 Source Port and Destination Port 11.3.3.2 Code 11.3.3.3 Options 11.3.3.4 Offset 11.3.3.5 Urgent Pointer 11.3.4 Reliable Transmission in TCP Link 11.3.5 Transactional Transmission Control Protocol (T/TCP) 11.3.6 Internet Protocol (IPv4 and IPv6) 11.4 Application Protocols 11.4.1 HTTP Application Protocol 11.4.1.1 The Client 11.4.1.2 Uniform Resource Identifier (URI) Uniform Resource Locator (URL) Uniform Resource Name (URN) Uniform Resource Citation (URC) 11.4.2 Hypertext Markup Language 11.5 Constrained Application Protocols (CoAP) 11.5.1 CoAP Protocol Stack 11.5.2 CoAP Data Format 11.6 MQTT Application Protocol 11.6.1 Retained Messages 11.6.2 Durable and Non-durable Sessions 11.6.3 Will Message 11.6.4 Protocol Stack 11.6.5 MQTT Tools 11.6.5.1 Command Line Tools Command Line Tools Browser Tools: Chrome Android Tools: Smartphone and Tablet 11.7 Notes on Standard Defining Bodies References Chapter 12: M2M Communication in Constrained Devices 12.1 Constrained Network and Constrained Devices 12.2 Internet Access 12.3 M2M Gateway Device 12.4 Network Domain 12.4.1 Access Network 12.4.2 Core Network 12.4.2.1 M2M Service Capabilities 12.4.2.2 M2M Applications 12.4.2.3 Network Management Functions 12.4.2.4 M2M Management Functions 12.5 Personal Area Network (PAN) 12.6 Constrained Device and Its Architecture 12.7 Wireless Sensor Network (WSN) 12.7.1 Smart Utility Network (SUN) 12.7.2 Rail Communications and Control (RCC) 12.7.3 Television White Space (TVWS) 12.7.4 Radio Frequency Identification (RFID) 12.7.5 Low-Energy, Critical Infrastructure Monitoring (LECIM) 12.7.6 Medical Body Area Network (MBAN) Services 12.8 Multi-PHY Management (MPM) of the SUN WPAN 12.9 Network Architecture of WPAN 12.10 Routing Protocols for Sensor Networks 12.11 Constrained Application Protocol (CoRE) 12.11.1 6LoWPAN 12.11.2 Working Group 6Lo 12.11.3 Bluetooth Low Energy (BT-LE) 12.11.4 DECT Ultra Low Energy 12.11.5 Z-Wave IETF 12.11.6 Power Line Communication (PLC) 12.11.7 G3-PLC 12.11.8 Near-Field Communications (NFC) 12.11.9 BACNET Master-Slave/Token-Passing (MS/TP) 12.11.10 802.15.4e Time Slotted Channel Hopping (TSCH): The IEEE 802.15.4e 12.11.10.1 IEEE 802.11ah 12.11.10.2 Low-Power Wide-Area Network (LPWAN) 12.11.10.2.1 LoRaWAN 12.11.10.2.2 Cellular LTE 12.11.10.2.3 Sigfox 12.11.11 Industrial Automation and the Internet References Chapter 13: IoT Database Management and Analytics 13.1 IoT Database Analysis Framework 13.2 Big Data Life Cycle 13.2.1 Data Generation 13.2.2 Data Acquisition 13.2.3 Data Validation 13.2.4 Storage Operations 13.2.5 Querying 13.2.6 Production 13.2.7 Collection 13.2.8 Aggregation/Compression 13.2.9 Delivery 13.2.10 Pre-processing 13.2.11 Stored Data Update-Archiving 13.2.12 Processing/Analysis 13.3 IoT Data Framework 13.4 Data Framework for WPAN 13.5 Industrial Data Life Cycle 13.6 Industrial Data Management System (IDMS) Framework 13.6.1 Physical Layer 13.6.2 Communication Layer 13.6.3 Middleware Layer 13.6.3.1 Resource Management 13.6.3.2 Event Management 13.6.3.3 Data Management 13.6.3.4 Database Layer 13.6.3.4.1 Database Management System 13.6.3.4.2 ACID Rules of DDBMS 13.6.3.4.3 Distributed Database (DDB) 13.6.3.4.4 Consistency, Availability, and Partition (CAP) Tolerance 13.6.3.4.5 Consistency, Availability, and Partition (CAP) Tolerance Theorem 13.6.3.4.6 Query Processing [1] 13.6.3.4.7 Relational Algebra Projection Selection Union Intersection Minus Join Branch 13.6.4 Application and Management Layer 13.7 IoT Data Analytics 13.8 IoT Data Analytic Methods 13.8.1 Data Cleansing Techniques 13.9 Analysis of Data 13.9.1 Predictive Analysis of the Data 13.9.2 Data Visualization References Chapter 14: Design for Manufacturing and Business Models 14.1 Introduction to Design for Manufacturing (DFM) 14.1.1 Economies of Scale 14.1.2 Design for Manufacturing (DFM) 14.1.2.1 Design 14.1.2.2 Process 14.1.2.3 Material 14.1.2.4 Environment/Testing 14.1.2.5 Regulatory Requirements 14.2 Factors Affecting DFM 14.2.1 Part Count 14.2.2 Standard Parts and Materials 14.2.3 Modularity 14.2.4 Design for Assembly 14.2.5 Aesthetics and Surface Finish 14.3 Product Documentation and Media Materials 14.4 Business Model and Business Model Canvas 14.4.1 Value Proposition 14.4.2 Customer Segment 14.4.3 Channels 14.4.4 Customer Relationship 14.4.5 Revenue Streams 14.4.6 Key Resources 14.4.7 Key Partners 14.4.8 Key Activities 14.4.9 Cost 14.5 IoT System Development 14.6 Business Models for IoT Solutions 14.6.1 Subscription Services Around IoT 14.6.2 Outcome-Based Models 14.6.3 Asset Sharing Models 14.6.4 Things as a Service 14.7 Commercialization 14.7.1 Manufacturing Capability (Not Applicable for IoT Services) 14.7.2 Marketing Channels 14.7.3 Sales and Customer Support 14.7.4 Cost of the Product/Services 14.7.5 Promotional Campaigns 14.7.6 New Product Development Type of Business Models 14.8 Business Model Innovation Chapter 15: Question Bank and Reference Design Material 15.1 Part 1 15.1.1 Chapter 1 15.1.2 Chapter 2 15.1.3 Chapter 3 15.1.4 Chapter 4 15.1.5 Chapter 5 15.1.6 Chapter 6 15.1.7 Chapter 7 15.1.8 Chapter 8 15.1.9 Chapter 9 15.1.10 Chapter 10 15.1.11 Chapter 11 15.1.12 Chapter 12 15.1.13 Chapter 13 15.1.14 Chapter 14 15.2 Part 2 15.2.1 Prerequisites 15.2.2 Experiment 1 15.2.3 Experiment 2 15.2.4 Experiment 3 15.2.5 Experiment 4 15.2.6 Experiment 5 15.2.7 Experiment 6 15.2.8 Experiment 7 (Fig. 15.3) 15.2.9 Experiment 8 15.3 Part III 15.3.1 Approach Note to Develop IoMT- and IoS-Based Solution for Health Monitoring Eco Solution 15.3.2 Taxonomy of IoMT Healthcare Ecosystem 15.3.3 Health Applications 15.3.3.1 Teleclinic 15.3.3.2 Smart Pharmacy 15.3.3.3 Hospital Management 15.3.4 Security 15.3.4.1 Architecture 15.3.4.2 Technologies 15.3.4.3 Device Technologies 15.3.4.4 Smart Applications 15.3.4.5 Security 15.4 Conclusion Index