توضیحاتی در مورد کتاب Connecting the Internet of Things: IoT Connectivity Standards and Solutions
نام کتاب : Connecting the Internet of Things: IoT Connectivity Standards and Solutions
عنوان ترجمه شده به فارسی : اتصال به اینترنت اشیا: استانداردها و راه حل های اتصال اینترنت اشیا
سری :
نویسندگان : Anil Kumar, Jafer Hussain, Anthony Chun
ناشر : Apress
سال نشر :
تعداد صفحات : 403
ISBN (شابک) : 9781484288962 , 1484288963
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 5 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Table of Contents\nAbout the Authors\nIntroduction\nChapter 1: IoT Connectivity Considerations\n IoT at a Glance\n Wired or Wireless?\n Which Wireless Technology?\n Considerations for Choosing Wireless Technologies for IoT\n Spectrum\n Range and Capacity\n Network Topology\n Quality of Service\n Network Management\n Security\n Connectivity Standards\n Summary\n Problem Set\nChapter 2: Back to Wireless Basics\n Chapter Overview\n Introduction\n The Ideal Wireless World vs. Reality\n Challenges of Wireless Connectivity\n Connectivity Basics\n Wired Connectivity\n Wireless Connectivity\n What Is a Radio?\n The Bigger Picture: Wireless Protocol Stack\n OSI Model: Basis for Defining a Protocol\n Why Is It Called the Internet of Things?\n The Physical Layer: Wireless Challenges\n Frequency Band Considerations\n 2.4GHz ISM Band\n Just Enough Information Theory\n Just Enough Communications Theory\n Signal-to-Noise Ratio (SNR)\n Bit Error Rate and Packet Error Rate\n Radio Impairments\n What Factors Determine How Far We Can Send Our Wireless Data?\n RF Environment Examples\n Attenuation due to Free Space Loss\n Attenuation due to Absorption by the Atmosphere\n Attenuation due to Obstacles\n Noise\n Internal Noise Sources\n External Noise Sources\n Characterizing Noise\n Example: Digital Communications System with Noise\n Interference\n Co-Channel Interference\n Adjacent Channel Interference (ACI)\n Jamming\n Fading and Multipath\n Techniques for Improving the Radio\n Mitigating Noise\n Mitigating Multipath\n Interference Mitigation\n Link Budget\n Example: Bluetooth Link Calculation\n BLE Transmission over an Open Field with Range of 50 Meters\n Open Field with Distance of 1000 Meters Between TX and RX\n How About Using LoRA?\n Why Not Increase the Transmit Power?\n Why Not Increase the Antenna Gain?\n Antenna Example for a Use Case\n What Factors Affect How Fast We Can Send Data?\n Channel Capacity\n Network Architecture Considerations\n How Many Users/Devices Can I Connect to a Wireless Network?\n Multiple Access Techniques\n Selection of Network Architectures and Topologies\n Point-to-Point\n Mesh Network\n Star Network\n Duplexing\n Data Link Layer\n Logical Link Control (LLC)\n Media Access Control (MAC)\n Protocol and Network Complexity\n Scheduling Transmissions\n Wireless Standards\n Fragmentation of Wireless Standards\n Classification of standards\n Wireless Standard Bodies\n Chapter Summary\n Key Terminology for Chapter 2\n Key Constants\n Chapter Problems\n References for Chapter 2\nChapter 3: Wi-Fi\n Chapter Overview\n What Do We Mean by Wi-Fi?\n Why Wi-Fi for IoT?\n Wi-Fi IoT Use Cases\n Wi-Fi Standards Bodies\n Wi-Fi Generations\n History of Wi-Fi: Aloha Network\n Wi-Fi Standards of Interest\n 802.11bgn\n 802.11ac or Wi-Fi 5\n 802.11ax or Wi-Fi 6 (2019)\n Wi-Fi 6E (2020)\n Wi-Fi 6E Release 2 (2022)\n Wi-Fi 7 (802.11be)\n Impact of Wi-Fi 6 Chip Shortages in 2021–2022\n Determining Which Wi-Fi Standards Are Supported by a Module\n Wi-Fi System Architecture\n Wi-Fi Stack\n Wi-Fi Software Stack\n Wi-Fi Module\n Wi-Fi Driver\n mac80211\n cfg80211\n nl80211\n iw\n wpa_supplicant\n hostapd\n Virtualization: Connecting Containers to Wi-Fi\n Wi-Fi Range\n Wi-Fi Mesh\n Wi-Fi Authentication\n Wi-Fi Security\n Best Effort Wi-Fi\n Bandwidth Allocation\n Quality of Service Improvements\n Key Wi-Fi Features\n Wi-Fi Roaming\n How It Works\n Soft Access Point or Wi-Fi Hot Spots\n Enabling Soft AP\n Applications of Soft AP for IoT\n Wi-Fi Provisioning for IoT Devices\n Wi-Fi Protected Setup (WPS) Push Button Method\n Access Point Mode\n Wi-Fi Certified Easy Connect\n Out of Band Methods\n Proprietary Methods\n Wi-Fi Direct\n Applications\n How It Works\n Miracast\n Location Using Wi-Fi: 802.11mc Fine Time Measurement\n How Is It Done?\n 802.11p DSRC\n Wi-Fi Sensing\n Technology\n Applications of Wi-Fi Sensing\n Wi-Fi Reliability and Latency\n Putting Together an IoT Solution with Wi-Fi\n The Future of Wi-Fi\n Summary\n Problem Set\nChapter 4: Bluetooth\n Introduction\n Bluetooth Technology\n Brief History\n Bluetooth SIG\n Bluetooth Markets\n Bluetooth Applications\n Bluetooth Classic\n Bluetooth Low Energy (LE)\n Comparison of Bluetooth Classic and Bluetooth LE\n Bluetooth Network Topologies\n Point-to-Point\n Broadcast\n Mesh Networking\n Mesh Security\n Comparison of Bluetooth Topologies\n Bluetooth LE Stack\n Bluetooth LE PHY\n Bluetooth 5.0\n Bluetooth 5.1\n Bluetooth 5.2\n Bluetooth Profiles\n Bluetooth Classic Profiles\n Advanced Audio Distribution Profile (A2DP)\n Audio/Video Remote Control Profile (AVRCP)\n Hands-Free Profile (HFP)\n Headset Profile (HSP)\n File Transfer Protocol (FTP)\n Human Interface Device Protocol (HID)\n Bluetooth Classic Protocols\n Bluetooth LE Profiles\n Example: Smart Home Sensor Use Case\n Example: Retail Proximity Use Case\n Example: Covid-19 Contact Tracing Use Case\n Bluetooth Applications and Product Categories\n Bluetooth Direction Finding\n Proximity Detection vs. Direction Finding\n Angle of Arrival (AoA)\n Angle of Departure (AoD)\n Real-Time Location Services (RTLS)\n Angle of Arrival (AoA) vs. Angle of Departure (AoD)\n Bluetooth Beacons\n Bluetooth Security\n Confidentiality\n Authentication\n Integrity\n Authorization\n Privacy\n Security Attacks\n Bluetooth LE Security\n Security Levels and Modes\n Security Manager\n Bluetooth Pairing and Bonding\n Pairing Methods\n Bluetooth LE Legacy Pairing\n Bluetooth LE Secure Connections\n Summary of LE Secure Connections Pairing\n Association Models\n Difference Between LE Legacy Pairing and LE Secure Connections\n Security Keys and Security Capabilities\n Encrypted Connections\n Device Authentication\n Authentication of Data\n Privacy and Device Tracking Protection\n Attribute Permissions\n The White List\n Isochronous Channels\n Security and Implementation Issues\n Specification Compliance\n Technical Quality Issues\n Bluetooth Qualification\n Bluetooth Qualification Process\n Completing the Bluetooth Qualification Process\n Qualification Process with No Required Testing\n Qualification Process with Required Testing\n Bluetooth Certification Labs\n Bluetooth Solutions\n Selection Criteria\n Single Mode Bluetooth Solutions\n Dual Mode Bluetooth Solutions\n Multi-radio Solutions\n Bluetooth Solution Vendors\n Bluetooth Range\n Improving Bluetooth LE Power Consumption\n Getting Started with Bluetooth\n Bluetooth Markets\n Chapter Questions\n References for Chapter 4\nChapter 5: Low Power Wide Area Networks (LPWAN)\n Chapter Overview\n LPWAN Use Cases\n LPWAN Systems in 2022\n Open Standard or Proprietary\n Spectrum Selection\n Public or Private Network\n System Design Tradeoffs\n Ecosystem Viability\n Key LPWAN System Parameters\n LoRaWAN\n LoRaWAN: History\n LoRaWAN: Technical Summary\n LoRaWAN: Key Ecosystem Partners and Deployments\n LoRaWAN: Assessment\n SigFox\n Sigfox: History\n Sigfox: Overview\n Sigfox: Technical Summary\n Sigfox: Key Ecosystem Partners and Deployments\n Sigfox: Assessment\n RPMA (Ingenu)\n RPMA: History\n RPMA: Technical Summary\n RPMA: Key Ecosystem Partners and Deployments\n RPMA: Assessment\n NB-Fi\n NB-Fi: History\n NB-Fi: Technical Summary\n NB-Fi: Key Ecosystem Partners and Deployments\n NB-Fi: Assessment\n NB-IoT\n NB-IoT: History\n NB-IoT: Technical Summary\n NB-IoT: Key Ecosystem Partners and Deployments\n NB-IoT: Assessment\n LTE-M\n LTE-M: History\n LTE-M: Technical Summary\n LTE-M: Key Ecosystem Partners and Deployments\n LTE-M: Assessment\n LPWAN Selection Process\n Summary\n Problem Set\nChapter 6: Building Your IoT Solution\n Chapter Overview\n Product Requirements\n Designing Your Solution\n Wireless Selection\n Coexistence\n Hardware Design\n Antenna Selection and Placement\n Operating System\n Wireless Drivers\n RF Tools\n Application Software\n Connecting to the Cloud\n Prototyping\n Validation\n Quality and Reliability\n Certification\n Scaling Your Solution\n Deployment of the Product\n Customer Support\n Case Studies\n Case Study 1: Digital Signage at a Retail Store\n Case Study 2: Forest Monitoring System for One Trillion Trees\n Summary\n Problem Set\nChapter 7: Conclusion\n Chapter Overview\n Recap\n Future of IoT Connectivity\n Next Steps\nIndex