دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [Third ed.] نویسندگان: Ammar Rayes, Samer Salam سری: ISBN (شابک) : 9783030901585, 3030901580 ناشر: سال نشر: 2022 تعداد صفحات: [471] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 13 Mb
در صورت تبدیل فایل کتاب Internet of things from hype to reality : the road to digitization به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب اینترنت اشیا از هیاهو تا واقعیت: راه دیجیتالی شدن نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب درسی اصلاح شده مطالب به روز شده ای را در مورد محتوای اصلی خود ارائه می دهد: یک معماری اینترنت اشیاء سرتاسری که از دستگاه ها، شبکه، محاسبات، ذخیره سازی، پلت فرم، برنامه ها به همراه اجزای مدیریتی و امنیتی تشکیل شده است. همانند نسخه دوم، به شش بخش اصلی سازماندهی شده است: یک مدل مرجع IoT. محاسبات مه و درایورها؛ مدیریت اینترنت اشیا و برنامه های کاربردی؛ خدمات هوشمند در اینترنت اشیا؛ استانداردهای اینترنت اشیا؛ و مطالعات موردی از ویژگیهای این نسخه میتوان به بازنگری پروتکلهای اینترنت اشیا (فصل 5) اشاره کرد تا شامل درمان گسترده شبکههای کم مصرف از جمله پروتکل باند باریک اینترنت اشیا (NB-IoT)، پلتفرمهای بهروز شده اینترنت اشیا و قابلیتها (فصل 7) شود تا شامل مقایسه تجاری شود. پلتفرم های موجود (مانند پلتفرم AWS IoT، Google Cloud IoT Platform، Microsoft Azure IoT Platform، و PTC ThinkWorx)، امنیت به روز شده (فصل 8) شامل رویکردهایی برای ایمن سازی دستگاه های اینترنت اشیا با نمونه هایی از دستگاه های اینترنت اشیا مورد استفاده در حملات امنیتی و راه حل های مرتبط از جمله MUD و DICE، و در نهایت ضمیمه B جدید که شامل شش پروژه اینترنت اشیا با جزئیات برای دانش آموزان است.
This revised textbook presents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. As with the second edition, it is organized into six main parts: an IoT reference model; fog computing and the drivers; IoT management and applications; smart services in IoT; IoT standards; and case studies. This edition’s features include overhaul of the IoT Protocols (Chapter 5) to include an expanded treatment of low-power wide area networks including narrow band IoT (NB-IoT) protocol, updated IoT platforms and capabilities (Chapter 7) to include comparison of commercially available platforms (e.g. AWS IoT Platform, Google Cloud IoT Platform, Microsoft Azure IoT Platform, and PTC ThinkWorx), updated security (Chapter 8) to include approaches for securing IoT devices with examples of IoT devices used in security attacks and associated solutions including MUD and DICE, and finally new Appendix B to include six IoT project detailed for students.
Foreword I Foreword II Preface Acknowledgments Disclaimer Contents About the Authors Chapter 1: Internet of Things (IoT) Overview 1.1 What Is the Internet of Things (IoT)? 1.1.1 Background and More Complete IoT Definition 1.1.2 How to Monitor and Control Things from Anywhere in the World? 1.1.3 Why Do We Want to Monitor and Control Things? 1.1.4 Who Will Monitor and Control? 1.1.5 How Is Security Guaranteed? 1.2 IoT Reference Framework 1.3 Why Now? The 12 Factors for a Perfect Storm 1.3.1 Convergence of IT and OT 1.3.2 The Astonishing Introduction of Creative Internet-Based Businesses 1.3.2.1 Uber 1.3.2.2 Airbnb 1.3.2.3 Square 1.3.2.4 Amazon 1.3.2.5 Tesla 1.3.2.6 Self-Driving Cars 1.3.3 Mobile Device Explosion 1.3.4 Social Network Explosion 1.3.5 Analytics at the Edge 1.3.6 Cloud Computing and Virtualization 1.3.7 Technology Explosion 1.3.8 Digital Convergence/Transformation 1.3.9 Enhanced User Interfaces 1.3.10 Fast Rate of IoT Technology Adoption (Five Times More than Electricity and Telephony) 1.3.11 The Rise of Security Requirements 1.3.12 The Nonstop Moore’s Law 1.4 History of the Internet 1.5 Summary References Chapter 2: The Internet in IoT 2.1 The Open System Interconnection Model 2.2 End-to-End View of the OSI Model 2.3 Transmission Control Protocol/Internet Protocol (TCP/IP) 2.3.1 TCP/IP Layer 4: Application Layer 2.3.2 TCP/IP Layer 3: Transport Layer 2.3.3 TCP/IP Layer 2: Internet Layer 2.3.3.1 Router Main Components 2.3.4 TCP/IP Layer 1: Network Access Layer 2.4 IoT Network Level: Key Performance Characteristics 2.4.1 End-to-End Delay 2.4.2 Packet Loss 2.4.3 Throughput 2.5 Internet Protocol Suite 2.5.1 IoT Network Level: Addressing 2.5.1.1 IP Version 4 IPv4 Subnet Mask IPv4 Classes 2.5.1.2 IP Version 6 2.5.2 IPv6 Address Notation 2.5.3 IoT Network Level: Routing 2.5.3.1 Interior Routing Protocols 2.5.3.2 Exterior Routing Protocols 2.6 Summary References Chapter 3: The Things in IoT: Sensors and Actuators 3.1 Introduction 3.2 IoT Sensors 3.2.1 Definition 3.2.2 Why Sensors 3.2.3 Sensor Types 3.2.4 Sensor Characteristics 3.3 RFID 3.3.1 RFID Main Usage and Applications 3.4 Video Tracking 3.4.1 Video Tracking Applications 3.4.2 Video Tracking Algorithms 3.5 IoT Actuators 3.5.1 Definition 3.5.2 Why Actuators? 3.5.3 Actuator Types 3.5.4 Controlling IoT Devices 3.6 How Things Are Identified in IoT? 3.7 Summary References Chapter 4: IoT Requirements for Networking Protocols 4.1 Support for Constrained Devices 4.2 Massive Scalability 4.2.1 Device Addressing 4.2.2 Credentials Management 4.2.3 Control Plane 4.2.4 Wireless Spectrum 4.3 Determinism 4.4 Security and Privacy 4.5 Application Interoperability 4.5.1 Abstractions and Standard APIs 4.5.2 Semantic Interoperability 4.6 Summary References Chapter 5: IoT Protocol Stack: A Layered View 5.1 Link Layer 5.1.1 Challenges 5.1.2 Industry Progress 5.1.2.1 IEEE 802.15.4 5.1.2.2 IEEE 802.15.4e TSCH 5.1.2.3 LPWAN LoRaWAN Network Architecture Device Class Capabilities Scalability Energy Efficiency Security Regional Variations Challenges NB-IoT Network Architecture Device Categories Scalability Energy Efficiency Security Comparison of LoRaWAN and NB-IoT 5.1.2.4 IEEE 802.11ah Short MAC Header Large Number of Stations Speeding Frame Exchanges Relay Target Wake Time Grouping Traffic Indication Map (TIM) and Paging Mechanism Restricted Access Windows 5.1.2.5 Comparison of Wireless Link Layer Protocols 5.1.2.6 Time-Sensitive Networking IEEE 802.1Qca IEEE 802.1Qbv IEEE 802.1CB 5.2 Internet Layer 5.2.1 Challenges 5.2.2 Industry Progress 5.2.2.1 6LowPAN 5.2.2.2 RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks 5.2.2.3 6TiSCH Network Formation Network Maintenance Topology and Schedule Mapping Resource Management Flow Control Determinism Scheduling Mechanisms Secure Communication 5.3 Application Protocols Layer 5.3.1 Data Serialization Formats 5.3.2 Communication Paradigms 5.3.2.1 Request/Response Versus Publish/Subscribe 5.3.2.2 Blocking Versus Non-blocking 5.3.3 QoS 5.3.3.1 Resource Utilization Resource Limits Policy Time Filter Policy 5.3.3.2 Data Timeliness Deadline Policy Latency Budget Policy 5.3.3.3 Data Availability Durability Policy Life Span Policy History Policy 5.3.3.4 Data Delivery Reliability Policy Transport Priority 5.3.4 RESTful Constraints 5.3.5 Survey of IoT Application Protocols 5.3.5.1 CoAP 5.3.5.2 XMPP 5.3.5.3 MQTT 5.3.5.4 AMQP 5.3.5.5 SIP 5.3.5.6 IEEE 1888 5.3.5.7 DDS RTPS 5.4 Application Services Layer 5.4.1 Motivation 5.4.2 Industry Progress 5.4.2.1 ETSI M2M 5.4.2.2 oneM2M 5.4.3 Technology Gaps 5.5 Summary References Chapter 6: Fog Computing 6.1 Defining Fog Computing 6.2 Drivers for Fog 6.2.1 Data Deluge 6.2.2 Rapid Mobility 6.2.3 Reliable Control 6.2.4 Data Management and Analytics 6.3 Characteristics of Fog 6.4 Enabling Technologies and Prerequisites 6.4.1 Virtualization Technologies 6.4.1.1 Containers and Virtual Machines 6.4.1.2 Docker 6.4.1.3 Application Mobility 6.4.2 Network Support for Mobility 6.4.2.1 EVPN Updating the Identity to Location Address Mappings Default IP Gateway Problem 6.4.2.2 LISP Updating the Identity to Location Address Mappings Default IP Gateway Problem 6.4.3 Fog Orchestration 6.4.3.1 Topology 6.4.3.2 Things Connectivity 6.4.3.3 Network Performance Guarantees 6.4.4 Data Management 6.4.4.1 Data in Motion 6.4.4.2 Search Technologies and Engines 6.4.5 More Gaps Ahead 6.5 Summary References Chapter 7: IoT Services Platform: Functions and Requirements 7.1 IoT Services Platform Functions 7.2 IoT Platform Manager 7.3 Discovery: Entities, Services, and Location 7.3.1 Registration 7.3.2 Discovery 7.4 Communication Manager 7.5 Data Management and Repository 7.6 Element Manager (Managing IoT Devices and Network Elements) 7.6.1 Configuration (and Provisioning) Management 7.6.2 Fault Management 7.6.3 Performance Management 7.6.4 Important Performance Measures for IoT Devices (E.g., Sensors) 7.6.5 Security Management 7.7 Firmware Manager 7.8 Topology Manager 7.9 Group Manager 7.10 Billing and Accounting 7.11 Subscription and Notification Manager 7.12 API Manager 7.13 Commercially Available IoT Platforms 7.14 Putting All Together 7.15 Summary References Chapter 8: Internet of Things Security and Privacy 8.1 Introduction 8.2 IoT Security Challenges 8.3 IoT Security Requirements 8.4 IoT Three-Domain Architecture 8.5 Cloud Domain Attacks and Countermeasures 8.6 Fog Domain Attacks and Countermeasures 8.7 Sensing Domain Attacks and Countermeasures 8.8 Securing IoT Devices 8.8.1 IoT Devices Gone Rogue 8.8.1.1 Botnets 8.8.1.2 Webcams 8.8.1.3 Casino Fish Tank 8.8.1.4 Cardiac Devices 8.8.1.5 Vehicles 8.8.2 MUD 8.8.3 DICE 8.9 Summary and Future Directions References Chapter 9: IoT Vertical Markets and Connected Ecosystems 9.1 IoT Verticals 9.1.1 IoT Agriculture and Farming 9.1.2 IoT Energy Solutions 9.1.3 IoT Oil and Gas Solutions 9.1.3.1 Oil and Gas Exercise 9.1.4 IoT Smart Building Solutions 9.1.5 IoT Finance 9.1.6 IoT Healthcare 9.1.7 IoT Industrial 9.1.8 IoT Retail 9.1.9 IoT Transportation 9.2 IoT Service Model: Anything as a Service 9.2.1 Thrust as a Service 9.2.2 Imaging as a Service 9.2.3 Farming as a Service 9.2.4 IT as a Service 9.3 Enabling “Anything as a Service” 9.3.1 Example: IoT IT Services 9.4 Connected Ecosystems 9.4.1 IoT Services Terminologies 9.4.2 IoT Connected Ecosystems Models 9.4.3 IoT Connected Ecosystems Models Key Capabilities 9.5 Summary References Chapter 10: The Blockchain in IoT 10.1 Introduction 10.2 What Is the Blockchain? 10.2.1 Bitcoin and Blockchain 10.2.2 Evolution of Blockchain 10.2.3 Defining Blockchain 10.3 How Blockchains Work 10.3.1 Anatomy of the Blockchain 10.3.2 Understanding a Block’s Hash 10.3.3 Lifecycle of a Transaction 10.4 Features of Blockchain 10.4.1 Consensus Algorithms in IoT 10.4.2 Cryptography 10.4.3 Decentralized 10.4.4 Transparency and Trust 10.4.5 Permissioned, Permissionless, and Consortium 10.4.6 Smart Contracts 10.4.7 Advantages and Disadvantages 10.5 Blockchain Applications in IoT 10.5.1 M2M Transactions 10.5.2 Energy Management 10.5.3 Supply Chain Management 10.5.4 Healthcare 10.5.5 Retail 10.5.6 Automotive and Transportation 10.5.7 Smart City 10.5.8 Identity, Authentication, and Access Management 10.5.9 Other Blockchain IoT Applications 10.6 Blockchain Security in IoT 10.6.1 Trust Between Nodes 10.6.2 Malicious Activity and Cryptographic Principles 10.6.3 IoT Security and Blockchain Advantages 10.7 Summary References Chapter 11: Industry Organizations and Standards Landscape 11.1 Overview 11.2 IEEE (Institute of Electrical and Electronics Engineers) 11.2.1 IEEE 1451 Series 11.2.2 IEEE 1547 Series 11.2.3 IEEE 1609 Series 11.2.4 IEEE 1888 Series 11.2.5 IEEE 1900 Series 11.2.6 IEEE 2030 Series 11.2.7 IEEE 2040 Series 11.2.8 IEEE 11073 Series 11.2.9 IEEE 2413 Series 11.3 IETF 11.3.1 ROLL 11.3.2 Core 11.3.3 6LowPAN 11.3.4 6TisCH 11.3.5 ACE 11.4 ITU 11.5 IPSO Alliance 11.6 OCF 11.7 IIC 11.8 ETSI 11.9 oneM2M 11.10 AllSeen Alliance 11.11 Thread Group 11.12 ZigBee Alliance 11.13 TIA 11.14 Z-Wave Alliance 11.15 OASIS 11.16 LoRa Alliance 11.17 Gaps and Standards Progress Scorecard 11.18 Summary References Chapter 12: The Role of Open Source in IoT 12.1 The Open Source Movement 12.2 Why Open Source? 12.2.1 Drivers for Open Source Consumers 12.2.2 Drivers for Open Source Contributors 12.3 Open Source vs. Standards 12.4 Open Source Partnering with Standards 12.5 A Tour of Open-Source Activities in IoT 12.5.1 IoT Devices 12.5.1.1 Hardware Arduino GizmoSphere Tinkerforge BeagleBoard 12.5.1.2 Operating Systems Contiki Raspbian RIOT 12.5.2 IoT Services Platform 12.5.2.1 Eclipse IoT Project 12.5.2.2 Kinoma 12.5.2.3 OneM2M the Linux Foundation and Eclipse 12.5.2.4 Open Interconnect Consortium (OIC) 12.5.2.5 IT6.eu, OpenIoT, and IoTSyS 12.5.2.6 DeviceHive 12.5.2.7 IoT Toolkit 12.6 Conclusions References Appendix A References Appendix B: IoT Projects for Engineering Students Typical Elements of IoT Projects Examples of IoT Projects References Appendix C: IoT Project 1—Parking Availability App Using IoT Introduction Problem Statement/Project Architecture Method(s) System Design 1.1.1 Sensor Layer (Physical Devices) Network Layer Data Processing and Application Layer Deployment Evaluation Methodology/Results Conclusion and Future Work References Appendix D: IoT Project 2—Sensor Activated Lights with Cloud Data Introduction Problem Statement and Architecture Equipment and System Design Hardware Used Software Used Circuit Methodology Evaluation Future Work Conclusion References Appendix Appendix E: Warehouse Inventory Management System Introduction Problems in the Existing Tracking and Monitoring Systems Solutions to the Limitations of Existing Tracking Systems Project Architecture Method(s)/System Design Shipment Beacon Warehouse Tracker Project Implementation 1.1.1 BLE Advertisement and BME280 Sensor Interfacing BLE Advertisement on Mobile App Raspberry Pi and Microsoft Azure IoT Hub Connection Configuration of Raspberry Pi for connection with Azure IoT Hub Real-Time Sensor Data Transfer Configuration of Raspberry Pi for Environmental Data Transmission to Azure Hub System Integration Testing and Verification 1.1.2 Real-Time Environmental Sensor Testing Real-Time Azure IoT Hub Integration Testing Evaluation Methodology and Results 1.1.3 Real-Time Sensor Evaluation Bluetooth Low Energy Range Evaluation Testing Summary, Conclusions, and Recommendations References Appendix F: IoT Fumigation Robot Introduction: Written by Nicholas K Methodology: Written by Nicholas K Objectives Challenges Problem Formulation and Design Implementation Chassis Design: Written by Nicholas K Mock Fumigation Apparatus Design: Written by Nicholas K Hardware Design: Written by Jesus D Software Design: Written by Jesus D Testing and Verification: Written by Jesus D Conclusion: Written by Nicholas K References Appendix A: Source Code Appendix B: Relay Test Code Index