gogo
Amazon cover image
Image from Amazon.com

IoT fundamentals : networking technologies, protocols, and use cases for the Internet of things / David Hanes, Robert Barton, Jerome Henry

By: Contributor(s): Material type: TextTextSeries: Cisco Press fundamentals seriesPublisher: Indianapolis, Indiana, USA : Cisco Press, [2017]Copyright date: ©2017Description: xxxi, 543 pages : illustrations ; 24 cmISBN:
  • 9781587144561
  • 1587144565
Subject(s): DDC classification:
  • 004.678 23
LOC classification:
  • TK5105.8857 .H365 2017
Contents:
Machine generated contents note: pt. I Introduction to IoT -- ch. 1 What Is IoT? -- Genesis of IoT -- IoT and Digitization -- IoT Impact -- Connected Roadways -- Connected Factory -- Smart Connected Buildings -- Smart Creatures -- Convergence of IT and OT -- IoT Challenges -- Summary -- References -- ch. 2 IoT Network Architecture and Design -- Drivers Behind New Network Architectures -- Scale -- Security -- Constrained Devices and Networks -- Data -- Legacy Device Support -- Comparing IoT Architectures -- The oneM2M IoT Standardized Architecture -- The IoT World Forum (IoTWF) Standardized Architecture -- Layer 1 Physical Devices and Controllers Layer -- Layer 2 Connectivity Layer -- Layer 3 Edge Computing Layer -- Upper Layers: Layers 4 -- 7 -- IT and OT Responsibilities in the IoT Reference Model -- Additional IoT Reference Models -- A Simplified IoT Architecture -- The Core IoT Functional Stack -- Layer 1 Things: Sensors and Actuators Layer -- Layer 2 Communications Network Layer -- Access Network Sublayer -- Gateways and Backhaul Sublayer -- Network Transport Sublayer -- IoT Network Management Sublayer -- Layer 3 Applications and Analytics Layer -- Analytics Versus Control Applications -- Data Versus Network Analytics -- Data Analytics Versus Business Benefits -- Smart Services -- IoT Data Management and Compute Stack -- Fog Computing -- Edge Computing -- The Hierarchy of Edge, Fog, and Cloud -- Summary -- References -- pt. II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. III IoT in Industry -- ch. 9 Manufacturing -- An Introduction to Connected Manufacturing -- An IoT Strategy for Connected Manufacturing -- Business Improvements Driven Through IoT -- An Architecture for the Connected Factory -- Industrial Automation and Control Systems Reference Model -- The CPwE Reference Model -- CPwE Resilient Network Design -- Resilient Ethernet Protocol (REP) -- Business Value of Resiliency in Converged Networks -- CPwE Wireless -- CPwE Wireless Network Architecture -- Real-Time Location System (RTLS) -- Industrial Automation Control Protocols -- EtherNet/IP and CIP -- PROFINET -- The PROFINET Architecture -- Media Redundancy Protocol (MRP) -- Modbus/TCP -- Connected Factory Security -- A Holistic Approach to Industrial Security -- Network Address Translation in the Factory -- The Industrial DMZ -- Factory Security Identity Services -- Edge Computing in the Connected Factory -- Connected Machines and Edge Computing -- Summary -- References -- ch. 10 Oil and Gas -- An Introduction to the Oil and Gas Industry -- Defining Oil and Gas -- The Oil and Gas Value Chain -- Current Trends in the Oil and Gas Industry -- Industry Key Challenges as Digitization Drivers -- IoT and the Oil and Gas Industry -- Improving Operational Efficiency -- The Purdue Model for Control Hierarchy in Oil and Gas Networks -- Oil and Gas Use Cases for IoT -- The Connected Pipeline -- The Connected Refinery -- IoT Architectures for Oil and Gas -- Control Room Networks for Oil and Gas -- Wired Networks for Oil and Gas -- Wireless Networks for Oil and Gas -- Wireless Use Cases in the Oil and Gas Industry -- Mobile Process Control Network Operator -- Plant Turnaround -- The Risk Control Framework for Cybersecurity in IoT -- Securing the Oil and Gas PCN: Background -- Securing the Oil and Gas PCN: Use Cases and Requirements -- Real-Time Asset Inventory -- Remote Access Control -- Patch Management -- Antivirus (AV) Management -- Security Intelligence and Anomaly Detection -- Data Analytics for Predictive Asset Monitoring -- Summary -- References -- ch. 11 Utilities -- An Introduction to the Power Utility Industry -- The IT/OT Divide in Utilities -- The GridBlocks Reference Model -- GridBlocks: An 11-Tiered Reference Architecture -- The Primary Substation GridBlock and Substation Automation -- SCADA -- IEC 61850: The Modernization of Substation Communication Standards -- IEC 61850 Station Bus -- IEC 61850 Process Bus -- Migration to IEC 61850 -- Network Resiliency Protocols in the Substation -- Parallel Redundancy Protocol -- High-Availability Seamless Redundancy -- System Control GridBlock: The Substation WAN -- Defining Teleprotection -- Distance Protection -- Current Differential (87L) Protection -- Designing a WAN for Teleprotection -- The Field Area Network (FAN) GridBlock -- Advanced Metering Infrastructure -- Other Use Cases -- Demand Response -- Distribution Automation -- Securing the Smart Grid -- NERCCIP -- Smart Grid Security Considerations -- The Future of the Smart Grid -- Summary -- References -- ch. 12 Smart and Connected Cities -- An IoT Strategy for Smarter Cities -- Vertical IoT Needs for Smarter Cities -- Global vs. Siloed Strategies -- Smart City IoT Architecture -- Street Layer -- City Layer -- Data Center Layer -- Services Layer -- On-Premises vs. Cloud -- Smart City Security Architecture -- Smart City Use-Case Examples -- Connected Street Lighting -- Connected Street Lighting Solution -- Street Lighting Architecture -- Smart Parking -- Smart Parking Use Cases -- Smart Parking Architecture -- Smart Traffic Control -- Smart Traffic Control Architecture -- Smart Traffic Applications -- Connected Environment -- The Need for a Connected Environment -- Connected Environment Architecture -- Summary -- References
Note continued: ch. 13 Transportation -- Transportation and Transports -- Transportation Challenges -- Roadways -- Mass Transit -- Rail -- Challenges for Transportation Operators and Users -- IoT Use Cases for Transportation -- Connected Cars -- Connected Fleets -- Infrastructure and Mass Transit -- An IoT Architecture for Transportation -- IoT Technologies for Roadways -- Bluetooth -- Cellular/LTE -- An Introduction to DSRC and WAVE -- DSRC/WAVE Protocol and Architecture -- Connected Roadways Network Architecture -- Connected Fleet Architecture -- Connected Roadways Security -- Extending the Roadways IoT Architecture to Bus Mass Transit -- Mass Transit Security -- Extending Bus IoT Architecture to Railways -- Connected Stations -- Connected Train Security -- Summary -- References -- ch. 14 Mining -- Mining Today and Its Challenges -- Scale -- Safety -- Environment -- Security -- Volatile Markets -- Challenges for IoT in Modern Mining -- The OT Roles in Mining -- Connectivity -- An IoT Strategy for Mining -- Improved Safety and Location Services -- Driver Safety -- Weather and Lightning -- Slope Monitoring -- Location Services -- Hazardous Gas Detection -- Environmental Monitoring -- Improved Efficiencies -- Improved Collaboration -- IoT Security for Mining -- An Architecture for IoT in Mining -- IEEE 802.11 as the IoT Access Layer -- 802.11 Outdoor Wireless Mesh -- 802.11 Wireless Mesh Backhaul Considerations -- Wi-Fi Clients -- Antenna Considerations for Wireless Mesh -- 4G/LTE -- Wireless in Underground Mining -- Industrial Wireless -- Isolated vs. Connected Mine Networks -- Core Network Connectivity -- Network Design Consideration for Mining Applications -- Data Processing -- Summary -- ch. 15 Public Safety -- Overview of Public Safety -- Public Safety Objects and Exchanges -- Public and Private Partnership for Public Safety IoT -- Public Safety Adoption of Technology and the IoT -- An IoT Blueprint for Public Safety -- Mission Continuum -- Mission Fabric -- Inter-agency Collaboration -- Emergency Response IoT Architecture -- Mobile Command Center -- Network and Security Services -- Compute and Applications Services -- Mobile Vehicles: Land, Air, and Sea -- Network and Security Services -- Compute and Applications Services -- IoT Public Safety Information Processing -- School Bus Safety -- Bus Location and Student Onboarding/Offboarding -- Driver Behavior Reporting -- Diagnostic Reporting -- Video Surveillance -- Student Wi-Fi -- Push-to-Talk Communication -- School Bus Safety Network Architecture -- Summary -- Reference.
Holdings
Item type Current library Call number Status Date due Barcode
General Lending Wexford Campus Library Wexford General Lending 004.678 (Browse shelf(Opens below)) Available 84640

CW048

Includes bibliographical references and index.

Machine generated contents note: pt. I Introduction to IoT -- ch. 1 What Is IoT? -- Genesis of IoT -- IoT and Digitization -- IoT Impact -- Connected Roadways -- Connected Factory -- Smart Connected Buildings -- Smart Creatures -- Convergence of IT and OT -- IoT Challenges -- Summary -- References -- ch. 2 IoT Network Architecture and Design -- Drivers Behind New Network Architectures -- Scale -- Security -- Constrained Devices and Networks -- Data -- Legacy Device Support -- Comparing IoT Architectures -- The oneM2M IoT Standardized Architecture -- The IoT World Forum (IoTWF) Standardized Architecture -- Layer 1 Physical Devices and Controllers Layer -- Layer 2 Connectivity Layer -- Layer 3 Edge Computing Layer -- Upper Layers: Layers 4 -- 7 -- IT and OT Responsibilities in the IoT Reference Model -- Additional IoT Reference Models -- A Simplified IoT Architecture -- The Core IoT Functional Stack -- Layer 1 Things: Sensors and Actuators Layer -- Layer 2 Communications Network Layer -- Access Network Sublayer -- Gateways and Backhaul Sublayer -- Network Transport Sublayer -- IoT Network Management Sublayer -- Layer 3 Applications and Analytics Layer -- Analytics Versus Control Applications -- Data Versus Network Analytics -- Data Analytics Versus Business Benefits -- Smart Services -- IoT Data Management and Compute Stack -- Fog Computing -- Edge Computing -- The Hierarchy of Edge, Fog, and Cloud -- Summary -- References -- pt. II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. III IoT in Industry -- ch. 9 Manufacturing -- An Introduction to Connected Manufacturing -- An IoT Strategy for Connected Manufacturing -- Business Improvements Driven Through IoT -- An Architecture for the Connected Factory -- Industrial Automation and Control Systems Reference Model -- The CPwE Reference Model -- CPwE Resilient Network Design -- Resilient Ethernet Protocol (REP) -- Business Value of Resiliency in Converged Networks -- CPwE Wireless -- CPwE Wireless Network Architecture -- Real-Time Location System (RTLS) -- Industrial Automation Control Protocols -- EtherNet/IP and CIP -- PROFINET -- The PROFINET Architecture -- Media Redundancy Protocol (MRP) -- Modbus/TCP -- Connected Factory Security -- A Holistic Approach to Industrial Security -- Network Address Translation in the Factory -- The Industrial DMZ -- Factory Security Identity Services -- Edge Computing in the Connected Factory -- Connected Machines and Edge Computing -- Summary -- References -- ch. 10 Oil and Gas -- An Introduction to the Oil and Gas Industry -- Defining Oil and Gas -- The Oil and Gas Value Chain -- Current Trends in the Oil and Gas Industry -- Industry Key Challenges as Digitization Drivers -- IoT and the Oil and Gas Industry -- Improving Operational Efficiency -- The Purdue Model for Control Hierarchy in Oil and Gas Networks -- Oil and Gas Use Cases for IoT -- The Connected Pipeline -- The Connected Refinery -- IoT Architectures for Oil and Gas -- Control Room Networks for Oil and Gas -- Wired Networks for Oil and Gas -- Wireless Networks for Oil and Gas -- Wireless Use Cases in the Oil and Gas Industry -- Mobile Process Control Network Operator -- Plant Turnaround -- The Risk Control Framework for Cybersecurity in IoT -- Securing the Oil and Gas PCN: Background -- Securing the Oil and Gas PCN: Use Cases and Requirements -- Real-Time Asset Inventory -- Remote Access Control -- Patch Management -- Antivirus (AV) Management -- Security Intelligence and Anomaly Detection -- Data Analytics for Predictive Asset Monitoring -- Summary -- References -- ch. 11 Utilities -- An Introduction to the Power Utility Industry -- The IT/OT Divide in Utilities -- The GridBlocks Reference Model -- GridBlocks: An 11-Tiered Reference Architecture -- The Primary Substation GridBlock and Substation Automation -- SCADA -- IEC 61850: The Modernization of Substation Communication Standards -- IEC 61850 Station Bus -- IEC 61850 Process Bus -- Migration to IEC 61850 -- Network Resiliency Protocols in the Substation -- Parallel Redundancy Protocol -- High-Availability Seamless Redundancy -- System Control GridBlock: The Substation WAN -- Defining Teleprotection -- Distance Protection -- Current Differential (87L) Protection -- Designing a WAN for Teleprotection -- The Field Area Network (FAN) GridBlock -- Advanced Metering Infrastructure -- Other Use Cases -- Demand Response -- Distribution Automation -- Securing the Smart Grid -- NERCCIP -- Smart Grid Security Considerations -- The Future of the Smart Grid -- Summary -- References -- ch. 12 Smart and Connected Cities -- An IoT Strategy for Smarter Cities -- Vertical IoT Needs for Smarter Cities -- Global vs. Siloed Strategies -- Smart City IoT Architecture -- Street Layer -- City Layer -- Data Center Layer -- Services Layer -- On-Premises vs. Cloud -- Smart City Security Architecture -- Smart City Use-Case Examples -- Connected Street Lighting -- Connected Street Lighting Solution -- Street Lighting Architecture -- Smart Parking -- Smart Parking Use Cases -- Smart Parking Architecture -- Smart Traffic Control -- Smart Traffic Control Architecture -- Smart Traffic Applications -- Connected Environment -- The Need for a Connected Environment -- Connected Environment Architecture -- Summary -- References

Note continued: ch. 13 Transportation -- Transportation and Transports -- Transportation Challenges -- Roadways -- Mass Transit -- Rail -- Challenges for Transportation Operators and Users -- IoT Use Cases for Transportation -- Connected Cars -- Connected Fleets -- Infrastructure and Mass Transit -- An IoT Architecture for Transportation -- IoT Technologies for Roadways -- Bluetooth -- Cellular/LTE -- An Introduction to DSRC and WAVE -- DSRC/WAVE Protocol and Architecture -- Connected Roadways Network Architecture -- Connected Fleet Architecture -- Connected Roadways Security -- Extending the Roadways IoT Architecture to Bus Mass Transit -- Mass Transit Security -- Extending Bus IoT Architecture to Railways -- Connected Stations -- Connected Train Security -- Summary -- References -- ch. 14 Mining -- Mining Today and Its Challenges -- Scale -- Safety -- Environment -- Security -- Volatile Markets -- Challenges for IoT in Modern Mining -- The OT Roles in Mining -- Connectivity -- An IoT Strategy for Mining -- Improved Safety and Location Services -- Driver Safety -- Weather and Lightning -- Slope Monitoring -- Location Services -- Hazardous Gas Detection -- Environmental Monitoring -- Improved Efficiencies -- Improved Collaboration -- IoT Security for Mining -- An Architecture for IoT in Mining -- IEEE 802.11 as the IoT Access Layer -- 802.11 Outdoor Wireless Mesh -- 802.11 Wireless Mesh Backhaul Considerations -- Wi-Fi Clients -- Antenna Considerations for Wireless Mesh -- 4G/LTE -- Wireless in Underground Mining -- Industrial Wireless -- Isolated vs. Connected Mine Networks -- Core Network Connectivity -- Network Design Consideration for Mining Applications -- Data Processing -- Summary -- ch. 15 Public Safety -- Overview of Public Safety -- Public Safety Objects and Exchanges -- Public and Private Partnership for Public Safety IoT -- Public Safety Adoption of Technology and the IoT -- An IoT Blueprint for Public Safety -- Mission Continuum -- Mission Fabric -- Inter-agency Collaboration -- Emergency Response IoT Architecture -- Mobile Command Center -- Network and Security Services -- Compute and Applications Services -- Mobile Vehicles: Land, Air, and Sea -- Network and Security Services -- Compute and Applications Services -- IoT Public Safety Information Processing -- School Bus Safety -- Bus Location and Student Onboarding/Offboarding -- Driver Behavior Reporting -- Diagnostic Reporting -- Video Surveillance -- Student Wi-Fi -- Push-to-Talk Communication -- School Bus Safety Network Architecture -- Summary -- Reference.

Powered by Koha