To bridge data from sensors to the internet, two technologies are needed: gateway routers and supporting IP-based protocols designed for efficiency. This section explores the role of router technologies at the edge for bridging sensors on a PAN network to the internet. The role of the router is especially important in securing, managing, and steering data. Edge routers orchestrate and monitor underlying mesh networks and balance and level data quality. The privatization and security of data is also critical. The chapter will explore the router role in creating virtual private networks, virtual LANs, and software-defined wide-area networks. There literally may be thousands of nodes serviced by a single edge router, and in a sense, it serves as an extension to the cloud, as we will see in the Chapter 10, Cloud and Fog Topologies...
-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Internet of Things for Architects
By :

Internet of Things for Architects
By:
Overview of this book
The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices.
This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP.
With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains.
Table of Contents (15 chapters)
Preface
IoT Architecture and Core IoT Modules
Sensors, Endpoints, and Power Systems
Communications and Information Theory
Non-IP Based WPAN
IP-Based WPAN and WLAN
Long-Range Communication Systems and Protocols (WAN)
Routers and Gateways
IoT Edge to Cloud Protocols
Cloud and Fog Topologies
Data Analytics and Machine Learning in the Cloud and in the Fog
IoT Security
Consortiums and Communities
Other Books You May Enjoy
Customer Reviews