Welcome to Central Library, SUST

IoT fundamentals : (Record no. 84545)

MARC details
000 -LEADER
fixed length control field 13885nam a22003497a 4500
001 - CONTROL NUMBER
control field sulb0078045
003 - CONTROL NUMBER IDENTIFIER
control field BD-SySUS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230323093521.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230323t20172017ii a b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789386873743
040 ## - CATALOGING SOURCE
Original cataloging agency BTCTA
Language of cataloging eng
Transcribing agency BTCTA
Description conventions rda
Modifying agency YDXCP
-- OCLCQ
-- SINLB
-- OCLCO
-- BDX
-- OCLCF
-- UCX
-- UPM
-- ZYU
-- DLC
-- BD-SySUS
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.678
Edition number 23
Item number HAI
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hanes, David,
Relator term author.
9 (RLIN) 60951
245 10 - TITLE STATEMENT
Title IoT fundamentals :
Remainder of title networking technologies, protocols, and use cases for the Internet of things /
Statement of responsibility, etc. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture India :
Name of producer, publisher, distributor, manufacturer Pearson,
Date of production, publication, distribution, manufacture, or copyright notice [2017]
300 ## - PHYSICAL DESCRIPTION
Extent xxxi, 543 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Cisco Press fundamentals series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: pt. I Introduction to IoT -- ch. 1 What Is IoT? -- Genesis of IoT -- IoT and Digitization -- IoT Impact -- Connected Roadways -- Connected Factory -- Smart Connected Buildings -- Smart Creatures -- Convergence of IT and OT -- IoT Challenges -- Summary -- References -- ch. 2 IoT Network Architecture and Design -- Drivers Behind New Network Architectures -- Scale -- Security -- Constrained Devices and Networks -- Data -- Legacy Device Support -- Comparing IoT Architectures -- The oneM2M IoT Standardized Architecture -- The IoT World Forum (IoTWF) Standardized Architecture -- Layer 1 Physical Devices and Controllers Layer -- Layer 2 Connectivity Layer -- Layer 3 Edge Computing Layer -- Upper Layers: Layers 4 -- 7 -- IT and OT Responsibilities in the IoT Reference Model -- Additional IoT Reference Models -- A Simplified IoT Architecture -- The Core IoT Functional Stack -- Layer 1 Things: Sensors and Actuators Layer -- Layer 2 Communications Network Layer -- Access Network Sublayer -- Gateways and Backhaul Sublayer -- Network Transport Sublayer -- IoT Network Management Sublayer -- Layer 3 Applications and Analytics Layer -- Analytics Versus Control Applications -- Data Versus Network Analytics -- Data Analytics Versus Business Benefits -- Smart Services -- IoT Data Management and Compute Stack -- Fog Computing -- Edge Computing -- The Hierarchy of Edge, Fog, and Cloud -- Summary -- References -- pt. II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. III IoT in Industry -- ch. 9 Manufacturing -- An Introduction to Connected Manufacturing -- An IoT Strategy for Connected Manufacturing -- Business Improvements Driven Through IoT -- An Architecture for the Connected Factory -- Industrial Automation and Control Systems Reference Model -- The CPwE Reference Model -- CPwE Resilient Network Design -- Resilient Ethernet Protocol (REP) -- Business Value of Resiliency in Converged Networks -- CPwE Wireless -- CPwE Wireless Network Architecture -- Real-Time Location System (RTLS) -- Industrial Automation Control Protocols -- EtherNet/IP and CIP -- PROFINET -- The PROFINET Architecture -- Media Redundancy Protocol (MRP) -- Modbus/TCP -- Connected Factory Security -- A Holistic Approach to Industrial Security -- Network Address Translation in the Factory -- The Industrial DMZ -- Factory Security Identity Services -- Edge Computing in the Connected Factory -- Connected Machines and Edge Computing -- Summary -- References -- ch. 10 Oil and Gas -- An Introduction to the Oil and Gas Industry -- Defining Oil and Gas -- The Oil and Gas Value Chain -- Current Trends in the Oil and Gas Industry -- Industry Key Challenges as Digitization Drivers -- IoT and the Oil and Gas Industry -- Improving Operational Efficiency -- The Purdue Model for Control Hierarchy in Oil and Gas Networks -- Oil and Gas Use Cases for IoT -- The Connected Pipeline -- The Connected Refinery -- IoT Architectures for Oil and Gas -- Control Room Networks for Oil and Gas -- Wired Networks for Oil and Gas -- Wireless Networks for Oil and Gas -- Wireless Use Cases in the Oil and Gas Industry -- Mobile Process Control Network Operator -- Plant Turnaround -- The Risk Control Framework for Cybersecurity in IoT -- Securing the Oil and Gas PCN: Background -- Securing the Oil and Gas PCN: Use Cases and Requirements -- Real-Time Asset Inventory -- Remote Access Control -- Patch Management -- Antivirus (AV) Management -- Security Intelligence and Anomaly Detection -- Data Analytics for Predictive Asset Monitoring -- Summary -- References -- ch. 11 Utilities -- An Introduction to the Power Utility Industry -- The IT/OT Divide in Utilities -- The GridBlocks Reference Model -- GridBlocks: An 11-Tiered Reference Architecture -- The Primary Substation GridBlock and Substation Automation -- SCADA -- IEC 61850: The Modernization of Substation Communication Standards -- IEC 61850 Station Bus -- IEC 61850 Process Bus -- Migration to IEC 61850 -- Network Resiliency Protocols in the Substation -- Parallel Redundancy Protocol -- High-Availability Seamless Redundancy -- System Control GridBlock: The Substation WAN -- Defining Teleprotection -- Distance Protection -- Current Differential (87L) Protection -- Designing a WAN for Teleprotection -- The Field Area Network (FAN) GridBlock -- Advanced Metering Infrastructure -- Other Use Cases -- Demand Response -- Distribution Automation -- Securing the Smart Grid -- NERCCIP -- Smart Grid Security Considerations -- The Future of the Smart Grid -- Summary -- References -- ch. 12 Smart and Connected Cities -- An IoT Strategy for Smarter Cities -- Vertical IoT Needs for Smarter Cities -- Global vs. Siloed Strategies -- Smart City IoT Architecture -- Street Layer -- City Layer -- Data Center Layer -- Services Layer -- On-Premises vs. Cloud -- Smart City Security Architecture -- Smart City Use-Case Examples -- Connected Street Lighting -- Connected Street Lighting Solution -- Street Lighting Architecture -- Smart Parking -- Smart Parking Use Cases -- Smart Parking Architecture -- Smart Traffic Control -- Smart Traffic Control Architecture -- Smart Traffic Applications -- Connected Environment -- The Need for a Connected Environment -- Connected Environment Architecture -- Summary -- References
Formatted contents note Note continued: ch. 13 Transportation -- Transportation and Transports -- Transportation Challenges -- Roadways -- Mass Transit -- Rail -- Challenges for Transportation Operators and Users -- IoT Use Cases for Transportation -- Connected Cars -- Connected Fleets -- Infrastructure and Mass Transit -- An IoT Architecture for Transportation -- IoT Technologies for Roadways -- Bluetooth -- Cellular/LTE -- An Introduction to DSRC and WAVE -- DSRC/WAVE Protocol and Architecture -- Connected Roadways Network Architecture -- Connected Fleet Architecture -- Connected Roadways Security -- Extending the Roadways IoT Architecture to Bus Mass Transit -- Mass Transit Security -- Extending Bus IoT Architecture to Railways -- Connected Stations -- Connected Train Security -- Summary -- References -- ch. 14 Mining -- Mining Today and Its Challenges -- Scale -- Safety -- Environment -- Security -- Volatile Markets -- Challenges for IoT in Modern Mining -- The OT Roles in Mining -- Connectivity -- An IoT Strategy for Mining -- Improved Safety and Location Services -- Driver Safety -- Weather and Lightning -- Slope Monitoring -- Location Services -- Hazardous Gas Detection -- Environmental Monitoring -- Improved Efficiencies -- Improved Collaboration -- IoT Security for Mining -- An Architecture for IoT in Mining -- IEEE 802.11 as the IoT Access Layer -- 802.11 Outdoor Wireless Mesh -- 802.11 Wireless Mesh Backhaul Considerations -- Wi-Fi Clients -- Antenna Considerations for Wireless Mesh -- 4G/LTE -- Wireless in Underground Mining -- Industrial Wireless -- Isolated vs. Connected Mine Networks -- Core Network Connectivity -- Network Design Consideration for Mining Applications -- Data Processing -- Summary -- ch. 15 Public Safety -- Overview of Public Safety -- Public Safety Objects and Exchanges -- Public and Private Partnership for Public Safety IoT -- Public Safety Adoption of Technology and the IoT -- An IoT Blueprint for Public Safety -- Mission Continuum -- Mission Fabric -- Inter-agency Collaboration -- Emergency Response IoT Architecture -- Mobile Command Center -- Network and Security Services -- Compute and Applications Services -- Mobile Vehicles: Land, Air, and Sea -- Network and Security Services -- Compute and Applications Services -- IoT Public Safety Information Processing -- School Bus Safety -- Bus Location and Student Onboarding/Offboarding -- Driver Behavior Reporting -- Diagnostic Reporting -- Video Surveillance -- Student Wi-Fi -- Push-to-Talk Communication -- School Bus Safety Network Architecture -- Summary -- Reference.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet of things.
9 (RLIN) 60952
Topical term or geographic name as entry element Internet of things.
Source of heading or term fast
Authority record control number (OCoLC)fst01894151
9 (RLIN) 60953
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Salgueiro, Gonzalo,
Relator term author.
9 (RLIN) 60954
Personal name Grossetete, Patrick,
Relator term author.
9 (RLIN) 60955
Personal name Barton, Robert,
Relator term author.
9 (RLIN) 60956
Personal name Henry, Jerome,
Relator term author.
9 (RLIN) 60957
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Cisco Press fundamentals series.
9 (RLIN) 60958
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Central Library, SUST Central Library, SUST General Stacks 23/03/2023   004.678 HAI 0078045 23/03/2023 1 23/03/2023 Books
    Dewey Decimal Classification     Central Library, SUST Central Library, SUST General Stacks 23/03/2023   004.678 HAI 0078044 23/03/2023 2 23/03/2023 Books