ISBN-13: 9781119847298 / Angielski / Twarda / 2022 / 300 str.
ISBN-13: 9781119847298 / Angielski / Twarda / 2022 / 300 str.
About the Author xviiPreface xix1 Data Communications and Networks 11.1 Introduction 11.2 OSI Model 31.2.1 Layer 1 - Physical Layer 51.2.2 Layer 2 - Data Link Layer 51.2.2.1 Addressing 51.2.2.2 Framing 51.2.2.3 Error Control 61.2.2.4 Flow Control 61.2.2.5 Access Control 71.2.3 Layer 3 - Network Layer 71.2.4 Layer 4 - Transport Layer 71.2.4.1 Port Addressing 81.2.4.2 End-to-end Error Control 81.2.4.3 End-to-end Flow Control 81.2.4.4 Connection Control 81.2.4.5 Congestion Control 81.2.5 Layer 5 - Session Layer 91.2.6 Layer 6 - Presentation Layer 91.2.7 Layer 7 - Application Layer 91.3 Header Encapsulation 91.4 Layer 2 - Ethernet 101.4.1 Framing 111.4.2 Addressing 111.4.3 Error Control 111.4.4 Flow Control 121.4.5 Access Control 121.5 Layer 3 - IP 121.5.1 IPV4 and IPV6 headers 151.5.2 Improving IPV4 Address Assignments 171.6 Layer 4 - TCP and UDP 191.6.1 TCP Header 201.6.2 TCP Functionalities 221.6.2.1 Process-to-process Communication 221.6.2.2 Connection Control 221.6.2.3 Flow Control 221.6.2.4 Error Control 231.6.2.5 Congestion Control 241.6.3 UDP 241.7 TCP/IP Networking Model 251.8 Internetworking Devices 251.8.1 VLAN 271.8.2 Quality of Service (QoS) 281.9 Summary 29References 30Exercises 30Advanced Exercises 322 Introduction to IoT 352.1 Introduction 352.2 IoT Traffic Model 362.3 IoT Connectivity 372.4 IoT Verticals, Use Cases, and Applications 392.5 IoT Value Chain 412.6 Examples of IoT Use Cases and Applications 422.6.1 IoT-based Structural Health Monitoring System 422.6.2 IoT-based Electric Meter 442.6.3 IoT-basedWaste Management System 442.6.4 IoT-based Earthquake Detection 452.6.5 IoT-based Car Software Update 452.6.6 IoT-based Mountain Climbing Information System 462.6.7 IoT-based Agriculture - Pest Management 462.6.8 IoT-basedWearable in Sports 472.6.9 IoT-based Healthcare System 472.6.10 IoT-based Augmented Reality (AR) System 482.6.11 IoT-based Food Supply Chain 492.6.12 Smart Grid System 492.7 IoT Project Implementation 512.8 IoT Standards 522.9 Summary 52References 53Exercises 53Advanced Exercises 543 IoT Architecture 573.1 Introduction 573.2 Factors Affecting an IoT Architectural Model 583.3 IoT Architectural Model 593.4 IoT WF Architectural Model 593.5 Data Center and Cloud 633.6 Computing (Cloud, Fog, and Edge) 663.6.1 Cloud Computing 663.6.2 Fog Computing 673.6.3 Edge Computing 683.7 Summary 69References 69Exercises 69Advanced Exercises 704 IoT Sensors 734.1 Introduction 734.2 Sensor and Its Performance Metrics 744.2.1 Static Performance Metrics 744.2.2 Dynamic Performance Metrics 764.2.3 Sensor Selection 774.3 Smart Sensors 804.4 MEMS 814.5 Sensor Fusion 834.5.1 Improving the Quality and Accuracy of a Sensor 834.5.2 Improving the Reliability of a Sensor 834.5.3 Improving the Capability of a Sensor 844.5.4 Measuring a Different Physical Quantity 844.6 Self-calibration 844.7 Sensors of the Future 854.8 Summary 85References 86Exercises 86Advanced Exercises 875 IoT Wired Connectivity 895.1 Introduction 895.2 Ethernet 905.2.1 Power over Ethernet (PoE) 915.3 Ethernet TSN 925.3.1 Challenges of Connectivity for Industrial IoT 925.3.2 Ethernet TSN Features and Key Technologies 935.3.2.1 Time Synchronization 935.3.2.2 Bandwidth and QoS Reservation 945.3.2.3 Redundant Transmission 945.3.2.4 Traffic Shaping and Scheduling 945.3.2.5 Latency Minimization 955.3.3 A Simple Example 965.3.4 Ethernet TSN Substandards 975.4 Power Line Communications (PLCs) 985.4.1 PLC for Smart Grid 1005.5 Summary 103References 103Exercises 104Advanced Exercises 1056 Unlicensed-band Wireless IoT 1076.1 Introduction 1076.2 Zigbee Wireless Network 1086.3 BLE Wireless Network 1116.3.1 Bluetooth 5 1146.3.2 Bluetooth Mesh 1156.4 WiFiWireless Network 1156.4.1 WiFi 6 1166.4.2 WiFi HaLow 1176.5 LoRaWAN Wireless Wide Area Network 1186.6 Summary 121References 121Exercises 122Advanced Exercises 1247 Cellular IoT Technologies 1257.1 Introduction 1257.2 EC-GSM-IoT 1257.3 LTE-based Cellular IoT Technologies 1277.3.1 LTE-M 1277.3.1.1 Channel Bandwidth 1277.3.1.2 Duplexing 1287.3.1.3 Data Rate and Latency 1297.3.1.4 Power Class 1317.3.1.5 Coverage 1327.3.1.6 Mobility 1337.3.2 NB-IoT 1337.3.2.1 Channel Bandwidth and Duplexing 1347.3.2.2 Data Rate and Latency 1347.3.2.3 Power Classes 1357.3.2.4 Coverage 1357.3.2.5 Mobility 1357.4 Practical Use Cases 1357.5 CIoT Frequency Bands 1377.6 Certification 1407.7 CIoT Modules 1417.8 AT Commands 1437.9 Summary 144References 145Exercises 146Advanced Exercises 1478 CIoT Features 1518.1 Low-power Consumption Schemes 1538.1.1 Introduction 1538.1.2 Power Saving Techniques in 3GPP Release 13 1538.1.3 Power Saving Techniques in 3GPP Release 14 1588.1.4 Power Saving Techniques in 3GPP Release 15 1588.1.4.1 Wake Up Signal 1588.1.5 Power Consumption for Various Use Cases 1598.1.6 Summary 162References 163Exercises 163Advanced Exercises 1648.2 Uplink Access 1678.2.1 Introduction 1678.2.2 Random Access Process 1688.2.2.1 Random Access Dependency to the Coverage Level 1708.2.2.2 Access Barring (AB) 1708.2.2.3 Preamble Formats 1718.2.3 RA Advancements 1728.2.3.1 Early Data Transmission 1738.2.3.2 Preconfigured Uplink Resources 1738.2.4 Summary 174References 175Exercises 175Advanced Exercises 1768.3 Positioning 1778.3.1 Introduction 1778.3.2 LTE Positioning 1788.3.2.1 CID 1798.3.2.2 ECID 1798.3.2.3 Observed Time Difference of Arrival (OTDOA) 1808.3.2.3.1 Basic OTDOA Navigation Equations 1818.3.2.3.2 Positioning Reference Signals (PRSs) 1828.3.3 Positioning Architecture for LTE-IoT 1838.3.4 RSTD Measurement Performance 1848.3.5 PRS Signals 1858.3.5.1 LTE PRS Signals 1858.3.5.2 LTE-M PRS Signals 1868.3.5.3 NB-IoT PRS Signals 1868.3.6 RSTD Error Sources 1878.3.7 Summary 188References 188Exercises 189Advanced Exercises 1898.4 Mobility 1918.4.1 Introduction 1918.4.2 Mobility 1928.4.2.1 Cell Selection 1928.4.2.2 Cell Reselection 1928.4.2.3 Signal Measurements Used for Mobility 1938.4.2.4 Idle Mode Versus Connected Mode Mobility 1948.4.2.5 Mobility Architecture 1958.4.2.6 Intra-Frequency vs. Inter-Frequency Mobility 1968.4.2.7 General Idea about TAU Strategies 1978.4.2.8 General Idea about Paging Strategies 1988.4.2.9 TAU and Paging Optimization 1988.4.2.10 Doppler Effect 1988.4.3 NB-IoT Mobility 1998.4.4 LTE-M Mobility 1998.4.5 Summary 199References 200Exercises 201Advanced Exercises 2029 IoT Data Communication Protocols 2039.1 Introduction 2039.2 HyperText Transfer Protocol (HTTP) 2049.3 Message Queue Telemetry Transport (MQTT) Protocol 2069.3.1 MQTT Connections 2089.3.2 Security of MQTT Protocol 2099.3.3 MQTT Last Value Queue (LVQ) 2109.3.4 MQTT LastWill and Testament (LWT) 2119.4 Constrained Application Protocol (CoAP) 2119.4.1 CoAP Messages 2129.4.2 CoAP Observers 2139.5 Other IoT Protocols 2139.6 Summary 214References 215Exercises 215Advanced Exercises 21710 IoT in 5G Era 21910.1 Introduction 21910.2 5G Vision 22010.3 5G's Main Application Areas 22210.4 5G Implementations and Features 22310.4.1 Standalone and non-standalone 5G Network 22310.4.2 5G Network Slicing 22310.4.3 Private 5G Network 22510.4.4 Network Exposure 22610.4.5 Fixed Wireless Access 22610.5 Summary 227References 228Exercises 228Advanced Exercises 22911 IoT and Analytics 23111.1 Introduction 23111.2 Data Pipeline 23311.3 AI 23311.4 Machine Learning 23411.5 Supervised Machine Learning Techniques 23611.5.1 Classification 23611.5.1.1 Decision Tree 23611.5.1.2 Random Forest 24111.5.1.3 K Nearest Neighbor (KNN) 24311.5.1.4 Support Vector Machine (SVM) 24411.5.2 Regression 24611.6 Unsupervised Machine Learning Techniques 25111.6.1 Clustering 25111.6.1.1 K-Means 25111.7 Deep Learning Techniques 25311.7.1 Recurrent Neural Networks (RNN) 25711.7.2 Convolutional Neural Network (CNN) 25811.8 Summary 260References 261Exercises 261Advanced Exercises 26312 IoT Security and Privacy 26712.1 Introduction 26712.2 IoT Threats 26712.2.1 Confidentiality 26812.2.2 Integrity 26812.2.3 Authentication 26812.2.4 Non-Repudiation 26912.2.5 Availability 26912.3 IoT Vulnerabilities 26912.3.1 Insufficient Authentication 26912.3.2 Insecure Ports and Interfaces 27012.3.3 Lack of a Secure Update Mechanism 27012.3.4 Insufficient Encryption 27012.3.5 Insecure Network Connectivity 27012.3.6 Insecure Mobile Connection 27112.3.7 Not Utilizing Whitelist 27112.3.8 Insecure IoT Device Chip Manufacturing 27112.3.9 Configuration Issues 27112.3.10 Privacy Issues 27212.4 IoT Threat Modeling and Risk 27212.4.1 Threat Modeling for Smart Gas Station 27212.4.1.1 Identifying the Assets 27312.4.1.2 Identifying the Message Flow 27312.4.1.3 Identifying the Threat Types 27412.4.1.4 Rating Threats and Risk Calculations 27512.5 IoT Security Regulations 27612.6 IoT Privacy Concerns and Regulations 27712.7 IoT Security and Privacy Examples 27912.7.1 Threat Against Availability - Mirai Bonnet 27912.7.2 Threat Against Integrity - LockState 27912.7.3 Threat Against Software Update - Jeep 27912.7.4 Threat Against Confidentiality - TRENDnetWebcam 28012.7.5 Threat Against Availability and Integrity - St. Jude Medical's Implantable Cardiac Devices 28012.7.6 Threat Against Availability - Cyberattack on the Ukrainian Smart Grid 28012.7.7 Privacy Concern - DJI 28012.8 Threat Protection Methods 28112.8.1 Confidentiality Protection 28112.8.1.1 Methods Based on Symmetric Key 28112.8.1.2 Methods Based on Asymmetric Key 28512.8.2 Integrity Protection 28612.8.3 Authentication Protection 28712.8.4 Non-Repudiation Protection 28812.9 IoT and Blockchain 28912.9.1 Blockchain Technology 29012.9.2 A Practical Example of IoT and Blockchain for Smart Grid 29212.10 Summary 293References 294Exercises 29413 IoT Solution Developments 29913.1 Introduction 29913.2 IoT Solution Development Methodology 30013.3 Further Details on IoT Solution Development 30213.3.1 Business Case Document 30213.3.2 Implementation Strategy 30213.3.3 Detailed Design 30313.3.4 Building, Configuration, and Testing (BCT) 30413.3.5 Pilot Implementation 30613.3.6 Regulation Acceptance 30713.3.7 Deployment 30713.3.8 Sustainment 30713.3.9 Continuous Improvements 30713.4 Change Management 30713.5 Summary 308Reference 309Exercises 309Advanced Exercises 310Practical Assignments 313Assignment #1: Connecting an IoT Device to the Cloud 313Assignment #2: Building a Battery-Powered Vision-Based System 314Assignment #3: Configuring an LTE-M module using AT Commands 315Assignment #4: Connecting an IoT Device to an MQTT Broker 316Assignment #5: Connecting an IoT Device to an IoT Gateway Using BLE 318Assignment #6: Building an IoT-Based Home Automation System 319Assignment #7: Designing a Smart Toy System 320Assignment #8: Controlling a Smart Tank System Using LoRaWAN Technology 321Assignment #9: Building IoT Systems Using Cisco Packet Tracer 323Assignment #10: Building a Digital Twin in the Cloud 325References 327Appendix A Internet Protocol Security (IPSec) 329Appendix B Transport Layer Security (TLS) 333Appendix C Satellite IoT 337Solutions 339Chapter 1 339Chapter 2 343Chapter 3 346Chapter 4 348Chapter 5 352Chapter 6 355Chapter 7 357Chapter 8 361Chapter 9 367Chapter 10 370Chapter 11 371Chapter 12 376Chapter 13 381Abbreviations 385Index 395
Dr. F. John Dian, PhD, is a faculty in the Department of Electrical and Computer Engineering at the British Columbia Institute of Technology in Vancouver, Canada. He received his Ph.D. degree from Concordia University, Canada, in Electrical and Computer Engineering. Dr. Dian has extensive experience in designing and implementing telecommunication systems and IoT networks. He holds a certificate in business analytics from Harvard Business School, USA, and co-chairs the center of excellence in analytics at BCIT. He has received numerous awards for his outstanding teaching and research, and has been an invited speaker at many forums and conferences. Dr. Dian is a senior member of the Institute of Electrical and Electronics Engineers (IEEE) and an active member of the Association of Professional Engineers and Geoscientists of British Columbia (APEGBC). He is the author of several books such as IoT Use Cases and Technologies, Cellular IoT for Practitioners, and Physical System Modelling Using MATLAB(r).
1997-2024 DolnySlask.com Agencja Internetowa