Home > Store

IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things

Register your product to gain access to bonus material or receive a coupon.

IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things

Best Value Purchase

Book + eBook Bundle

  • Your Price: $59.39
  • List Price: $98.98
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

More Purchase Options

Book

  • Your Price: $43.99
  • List Price: $54.99
  • Usually ships in 24 hours.

eBook (Watermarked)

  • Your Price: $35.19
  • List Price: $43.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Cisco Networking Academy Instructors: Please note this book is not related to the Cisco Networking Academy course called IoT Fundamentals.

Description

  • Copyright 2017
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 576
  • Edition: 1st
  • Book
  • ISBN-10: 1-58714-456-5
  • ISBN-13: 978-1-58714-456-1

Today, billions of devices are Internet-connected, IoT standards and protocols are stabilizing, and technical professionals must increasingly solve real problems with IoT technologies. Now, five leading Cisco IoT experts present the first comprehensive, practical reference for making IoT work. IoT Fundamentals brings together knowledge previously available only in white papers, standards documents, and other hard-to-find sources—or nowhere at all.

The authors begin with a high-level overview of IoT and introduce key concepts needed to successfully design IoT solutions. Next, they walk through each key technology, protocol, and technical building block that combine into complete IoT solutions.

Building on these essentials, they present several detailed use cases, including manufacturing, energy, utilities, smart+connected cities, transportation, mining, and public safety. Whatever your role or existing infrastructure, you’ll gain deep insight what IoT applications can do, and what it takes to deliver them.

  • Fully covers the principles and components of next-generation wireless networks built with Cisco IOT solutions such as IEEE 802.11 (Wi-Fi), IEEE 802.15.4-2015 (Mesh), and LoRaWAN
  • Brings together real-world tips, insights, and best practices for designing and implementing next-generation wireless networks
  • Presents start-to-finish configuration examples for common deployment scenarios
  • Reflects the extensive first-hand experience of Cisco experts

Sample Content

Sample Pages

Download the sample pages (includes Chapter 8 and index)

Table of Contents

Foreword xxvi
Introduction xxviii
Part I Introduction to IoT 1
Chapter 1 What Is IoT? 3
Genesis of IoT 4
IoT and Digitization 6
IoT Impact 7
Connected Roadways 8
Connected Factory 12
Smart Connected Buildings 15
Smart Creatures 19
Convergence of IT and OT 21
IoT Challenges 23
Summary 24
References 24
Chapter 2 IoT Network Architecture and Design 27
Drivers Behind New Network Architectures 28
Scale 30
Security 31
Constrained Devices and Networks 32
Data 32
Legacy Device Support 32
Comparing IoT Architectures 33
The oneM2M IoT Standardized Architecture 33
The IoT World Forum (IoTWF) Standardized Architecture 35
Additional IoT Reference Models 39
A Simplified IoT Architecture 40
The Core IoT Functional Stack 43
Layer 1: Things: Sensors and Actuators Layer 44
Layer 2: Communications Network Layer 46
Layer 3: Applications and Analytics Layer 59
IoT Data Management and Compute Stack 63
Fog Computing 65
Edge Computing 68
The Hierarchy of Edge, Fog, and Cloud 68
Summary 70
References 71
Part II Engineering IoT Networks 73
Chapter 3 Smart Objects: The “Things” in IoT 75
Sensors, Actuators, and Smart Objects 76
Sensors 76
Actuators 81
Micro-Electro-Mechanical Systems (MEMS) 83
Smart Objects 84
Sensor Networks 87
Wireless Sensor Networks (WSNs) 88
Communication Protocols for Wireless Sensor Networks 92
Summary 93
Chapter 4 Connecting Smart Objects 95
Communications Criteria 96
Range 96
Frequency Bands 98
Power Consumption 101
Topology 102
Constrained Devices 103
Constrained-Node Networks 104
IoT Access Technologies 107
IEEE 802.15.4 108
IEEE 802.15.4g and 802.15.4e 118
IEEE 1901.2a 124
IEEE 802.11ah 130
LoRaWAN 134
NB-IoT and Other LTE Variations 142
Summary 146
Chapter 5 IP as the IoT Network Layer 149
The Business Case for IP 150
The Key Advantages of Internet Protocol 150
Adoption or Adaptation of the Internet Protocol 152
The Need for Optimization 154
Constrained Nodes 155
Constrained Networks 156
IP Versions 157
Optimizing IP for IoT 159
From 6LoWPAN to 6Lo 159
Header Compression 161
Fragmentation 162
Mesh Addressing 163
6TiSCH 165
RPL 167
Authentication and Encryption on Constrained Nodes 173
Profiles and Compliances 174
Internet Protocol for Smart Objects (IPSO) Alliance 174
Wi-SUN Alliance 174
Thread 174
IPv6 Ready Logo 175
Summary 175
Chapter 6 Application Protocols for IoT 177
The Transport Layer 178
IoT Application Transport Methods 180
Application Layer Protocol Not Present 180
SCADA 182
Generic Web-Based Protocols 189
IoT Application Layer Protocols 191
Summary 204
Chapter 7 Data and Analytics for IoT 205
An Introduction to Data Analytics for IoT 206
Structured Versus Unstructured Data 207
Data in Motion Versus Data at Rest 209
IoT Data Analytics Overview 209
IoT Data Analytics Challenges 211
Machine Learning 212
Machine Learning Overview 212
Machine Learning and Getting Intelligence from Big Data 218
Predictive Analytics 220
Big Data Analytics Tools and Technology 220
Massively Parallel Processing Databases 222
NoSQL Databases 223
Hadoop 224
The Hadoop Ecosystem 227
Edge Streaming Analytics 230
Comparing Big Data and Edge Analytics 231
Edge Analytics Core Functions 232
Distributed Analytics Systems 235
Network Analytics 236
Flexible NetFlow Architecture 238
Summary 242
References 243
Chapter 8 Securing IoT 245
A Brief History of OT Security 246
Common Challenges in OT Security 249
Erosion of Network Architecture 249
Pervasive Legacy Systems 250
Insecure Operational Protocols 250
Other Protocols 253
Device Insecurity 254
Dependence on External Vendors 255
Security Knowledge 256
How IT and OT Security Practices and Systems Vary 256
The Purdue Model for Control Hierarchy 257
OT Network Characteristics Impacting Security 259
Security Priorities: Integrity, Availability, and Confidentiality 261
Security Focus 261
Formal Risk Analysis Structures: OCTAVE and FAIR 262
OCTAVE 262
FAIR 265
The Phased Application of Security in an Operational Environment 266
Secured Network Infrastructure and Assets 266
Deploying Dedicated Security Appliances 269
Higher-Order Policy Convergence and Network Monitoring 272
Summary 274
Part III IoT in Industry 275
Chapter 9 Manufacturing 277
An Introduction to Connected Manufacturing 278
An IoT Strategy for Connected Manufacturing 279
Business Improvements Driven Through IoT 281
An Architecture for the Connected Factory 282
Industrial Automation and Control Systems Reference Model 282
The CPwE Reference Model 284
CPwE Resilient Network Design 286
CPwE Wireless 289
Industrial Automation Control Protocols 293
EtherNet/IP and CIP 293
PROFINET 294
The PROFINET Architecture 296
Media Redundancy Protocol (MRP) 297
Modbus/TCP 298
Connected Factory Security 299
A Holistic Approach to Industrial Security 299
Edge Computing in the Connected Factory 304
Connected Machines and Edge Computing 304
Summary 307
References 307
Chapter 10 Oil and Gas 309
An Introduction to the Oil and Gas Industry 310
Defining Oil and Gas 310
The Oil and Gas Value Chain 313
Current Trends in the Oil and Gas Industry 314
Industry Key Challenges as Digitization Drivers 316
IoT and the Oil and Gas Industry 319
Improving Operational Efficiency 321
The Purdue Model for Control Hierarchy in Oil and Gas Networks 321
Oil and Gas Use Cases for IoT 323
IoT Architectures for Oil and Gas 326
Control Room Networks for Oil and Gas 327
Wired Networks for Oil and Gas 328
Wireless Networks for Oil and Gas 328
Wireless Use Cases in the Oil and Gas Industry 332
The Risk Control Framework for Cybersecurity in IoT 335
Securing the Oil and Gas PCN: Background 337
Securing the Oil and Gas PCN: Use Cases and Requirements 338
Data Analytics for Predictive Asset Monitoring 341
Summary 342
References 343
Chapter 11 Utilities 345
An Introduction to the Power Utility Industry 347
The IT/OT Divide in Utilities 348
The GridBlocks Reference Model 350
GridBlocks: An 11-Tiered Reference Architecture 352
The Primary Substation GridBlock and Substation Automation 356
SCADA 357
IEC 61850: The Modernization of Substation Communication
Standards 358
Network Resiliency Protocols in the Substation 362
System Control GridBlock: The Substation WAN 364
Defining Teleprotection 364
Designing a WAN for Teleprotection 367
The Field Area Network (FAN) GridBlock 369
Advanced Metering Infrastructure 371
Other Use Cases 373
Securing the Smart Grid 377
NERC CIP 378
Smart Grid Security Considerations 380
The Future of the Smart Grid 381
Summary 382
References 383
Chapter 12 Smart and Connected Cities 385
An IoT Strategy for Smarter Cities 386
Vertical IoT Needs for Smarter Cities 386
Global vs. Siloed Strategies 389
Smart City IoT Architecture 390
Street Layer 391
City Layer 394
Data Center Layer 395
Services Layer 397
On-Premises vs. Cloud 398
Smart City Security Architecture 398
Smart City Use-Case Examples 401
Connected Street Lighting 401
Connected Environment 409
Summary 411
References 412
Chapter 13 Transportation 413
Transportation and Transports 413
Transportation Challenges 415
Roadways 415
Mass Transit 416
Rail 417
Challenges for Transportation Operators and Users 418
IoT Use Cases for Transportation 420
Connected Cars 421
Connected Fleets 422
Infrastructure and Mass Transit 422
An IoT Architecture for Transportation 427
IoT Technologies for Roadways 427
Connected Roadways Network Architecture 434
Extending the Roadways IoT Architecture to Bus Mass Transit 440
Extending Bus IoT Architecture to Railways 442
Summary 447
References 448
Chapter 14 Mining 449
Mining Today and Its Challenges 451
Scale 451
Safety 455
Environment 455
Security 456
Volatile Markets 456
Challenges for IoT in Modern Mining 456
The OT Roles in Mining 456
Connectivity 457
An IoT Strategy for Mining 459
Improved Safety and Location Services 459
Location Services 461
Improved Efficiencies 464
Improved Collaboration 465
IoT Security for Mining 466
An Architecture for IoT in Mining 467
IEEE 802.11 as the IoT Access Layer 468
802.11 Outdoor Wireless Mesh 468
4G/LTE 474
Wireless in Underground Mining 475
Industrial Wireless 476
Isolated vs. Connected Mine Networks 476
Core Network Connectivity 478
Network Design Consideration for Mining Applications 479
Data Processing 480
Summary 481
Chapter 15 Public Safety 483
Overview of Public Safety 484
Public Safety Objects and Exchanges 484
Public and Private Partnership for Public Safety IoT 486
Public Safety Adoption of Technology and the IoT 488
An IoT Blueprint for Public Safety 489
Mission Continuum 489
Mission Fabric 490
Inter-agency Collaboration 491
Emergency Response IoT Architecture 493
Mobile Command Center 494
Mobile Vehicles: Land, Air, and Sea 501
IoT Public Safety Information Processing 506
School Bus Safety 508
Bus Location and Student Onboarding/Offboarding 508
Driver Behavior Reporting 510
Diagnostic Reporting 511
Video Surveillance 511
Student Wi-Fi 513
Push-to-Talk Communication 513
School Bus Safety Network Architecture 513
Summary 514
Reference 515
9781587144561, TOC, 5/16/2017

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020