E-Book, Englisch, 632 Seiten
Lea IoT and Edge Computing for Architects
2. Auflage 2020
ISBN: 978-1-83921-887-3
Verlag: De Gruyter
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Implementing edge and IoT systems from sensors to clouds with communication systems, analytics, and security
E-Book, Englisch, 632 Seiten
ISBN: 978-1-83921-887-3
Verlag: De Gruyter
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices.
IoT and Edge Computing for Architects, 2E encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP.
With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Table of Contents - IoT and Edge Computing Definition and Use Cases
- IoT Architecture and Core IoT Modules
- Sensors, Endpoints, and Power Systems
- Communications and Information Theory
- Non-IP Based WPAN
- IP-Based WPAN and WLAN
- Long Range Communication Systems and Protocols (WAN)
- Edge Computing
- Edge Routing and Networking
- Edge to Cloud Protocols
- Cloud and Fog Topologies
- Data Analytics and Machine Learning in the Cloud and Edge
- IoT and Edge Security
- Consortiums and Communities
Preface
Edge computing and the Internet of Things (IoT) has migrated from hype to the mainstream. Organizations and industries require data to be gathered from objects and value and insight to be extracted from the information. Meanwhile, we are moving more processing and capabilities from data centers closer to data generation sources. A well-architected system requires multiple domains of expertise, from sensor physics and energy considerations to cloud-based data analytics strengths. We address the entire topology of IoT and edge computing in this book. Here, you will learn how interconnected each component is as a system. This covers telecommunications and radio signaling, embedded systems, long-range communication, network protocols, edge and cloud frameworks, holistic security, and cloud machine learning.
Who this book is for
This book is intended for architects, system engineers, academics, program managers, students, and engineering directors intent on understanding the nuances of a well-designed IoT and edge system. Individuals may have strengths in one area, but each element in IoT impacts others. We also focus on real-world commercial and industrial use cases and technologies that have been deployed with success.
What this book covers
, . We begin this book with an overall understanding of the IoT and edge market and separate hype from reality. We define IoT and edge computing and then uncover various use cases for enterprise, commercial, and industrial IoT solutions. We end the chapter with a case study to provide a full system architectural understanding and breakdown of a typical IoT system, from hardware to software to cloud.
, . This chapter provides a high-level view and the breadth of the components and interconnects required to build an IoT or edge system. It will illustrate how the various components are interconnected and what roles they play. Additionally, this chapter will uncover how IoT deployments should be modeled from a value and monetization point of view.
, . Data begins its journey in IoT and edge computing at the sensors and physical devices. Here, we teach the various types of sensors and the physics that govern their abilities. We will show how sensors capture data and images and how they are powered when constant power sources are not available.
, . To understand many of the constraints and capabilities of wireless communication, we begin with the theory of communication and wireless radio signaling. We explore concepts such as path loss, RF interference, the Shannon-Hartley theorem, and bit-rate limits. We also look at RF spectrum governance and distribution.
, . Personal area networks include devices and systems that are near-range and have short distances between transmitters and receivers. This chapter goes into the breadth and depth of various protocols such as Bluetooth 5.1, Bluetooth beaconing, direction-finding technologies, and Bluetooth 5.0 mesh networking. We also explore other 802.15.4 protocols such as Zigbee and end with a treatment of Z-Wave.
, . This chapter explores the use of TCP/IP-based communication for near-range and long-range communication. We explore architectures such as 6LoWPAN, Thread, and various 802.11 Wi-Fi protocols such as 802.11ac, 802.11p, and 802.11ah.
, . Long-range communication is a prerequisite for moving data from the remote edge to where data centers, customers, and consumers are located. This chapter presents a thorough knowledge of long-range protocols, including the 4G LTE cellular and the new 5G cellular standards. We also explore alternative long-rang technologies such as CBRS, LoRa, Sigfox, and Multefire. We dive deep into how the technologies work and the features they offer in building a system.
, . This chapter analyzes the hardware and software components needed to build edge-level computing infrastructures. This includes a deep understanding of hardware resources: processor architecture, memory, storage, physical enclosures, environmental hardening, and interconnects. It also examines software frameworks, operating systems, and middleware. Additionally, we study the use of virtualization and containers for edge management (including examples of Microsoft Azure IoT Edge).
, . A common use of an edge system is to provide gateway, routing, and network security functions. This chapter teaches the methods of PAN-to-WAN bridging, cellular gateway functions, routing and traffic shaping, as well as security aspects such as software-defined networking and VPNs.
, . This chapter explores the various methods and features of edge to cloud protocols over wide area networks such as MQTT 5, CoAP, AMQP, and HTTP as standard methods for data transport.
, . There are many ways to architect and partition a problem between cloud systems and edge systems. This chapter presents the reader with various edge frameworks such as EdgeX and OpenFog, as well as lambda architectures, to build a more robust system.
, . This chapter provides the architect with an understanding of how to extract meaningful data from sensors and IoT systems. Data without understanding is useless. Here, we explore edge and cloud-based analytics using rules engines, statistical analysis, and various artificial intelligence and machine learning techniques. We explore where the correct analytics apply to the problem and dive deep into the mechanics of these tools.
, . Security is paramount to a robust enterprise and industrial IoT and edge solution. We examine security from a holistic point of view in this chapter. We look at physical, network, and data security from sensor to cloud.
, . Industry consortiums and professional societies provide many of the standards and guidelines that are necessary to bridge IoT and edge systems together. This chapter captures many relevant industry groups to consider following and joining when designing a system. We also present a list of recommended and commercially deployed sensor, hardware, and software systems that have proven to meet the requirements of commercial, enterprise, and industrial IoT.
To get the most out of this book
This book includes various degrees of technical depth and breadth. While you may have significant experience in one or more areas, perhaps you have gaps in others. Don't be discouraged. The book attempts to provide overviews of technologies as well as go technically deep in areas that may be relevant.
We carefully selected areas to go significantly deep in. These areas are aspects of IoT and edge systems that have been problematic and prone to design challenges that necessitate a good deal of depth and understanding.
While it is fine to read the book from cover to cover, you can skip between various chapters. There is little dependency on order.
Understand that the book moves from sensors to near-range communication to long-range communication. It then migrates to edge and cloud systems. We attempt to emulate how data moves along the path from sensor to cloud.
Download the color images
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://static.packt-cdn.com/downloads/9781839214806_ColorImages.pdf.
Conventions used
There are a number of text conventions used throughout this book.
: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. For example: "Simply sending a request to will disclose a list of known resources on the device."
A block of code is set as follows:
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
Any command-line input or output is written as follows: