Электронная книга: Olivier Hersent «The Internet of Things. Key Applications and Protocols»

The Internet of Things. Key Applications and Protocols

An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protocols and solve the challenge of massive scalability of machine-to-machine communication for mission-critical applications, based on the next generation machine-to-machine ETSI M2M architecture. The authors demonstrate, using the example of the smartgrid use case, how the next generation utilities, by interconnecting and activating our physical environment, will be able to deliver more energy (notably for electric vehicles) with less impact on our natural resources. Key Features: Offers a comprehensive overview of major existing M2M and AMI protocols Covers the system aspects of large scale M2M and smart grid applications Focuses on system level architecture, interworking, and nationwide use cases Explores recent emerging technologies: 6LowPAN, ZigBee SE 2.0 and ETSI M2M, and for existing technologies covers recent developments related to interworking Relates ZigBee to the issue of smartgrid, in the more general context of carrier grade M2M applications Illustrates the benefits of the smartgrid concept based on real examples, including business cases This book will be a valuable guide for project managers working on smartgrid, M2M, telecommunications and utility projects, system engineers and developers, networking companies, and home automation companies. It will also be of use to senior academic researchers, students, and policy makers and regulators.

Издательство: "John Wiley&Sons Limited"

ISBN: 9781119958345

электронная книга

Купить за 9112.14 руб и скачать на Litres

Другие книги автора:

КнигаОписаниеГодЦенаТип книги
IP Telephony. Deploying VoIP Protocols and IMS InfrastructureAll you need to know about deploying VoIP protocols in one comprehensive and highly practical reference– Now updated with coverage on SIP and the IMS infrastructure This book provides a comprehensive… — John Wiley&Sons Limited, электронная книга Подробнее...9209.59электронная книга
M2M Communications. A Systems ApproachA comprehensive introduction to M2M Standards and systems architecture, from concept to implementation Focusing on the latest technological developments, M2M Communications: A Systems Approach is an… — John Wiley&Sons Limited, электронная книга Подробнее...8725.33электронная книга

См. также в других словарях:

  • History of the Internet — Main article: Internet The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point to point communication between mainframe computers and terminals, expanded to point to point connections… …   Wikipedia

  • Internet — This article is about the public worldwide computer network system. For other uses, see Internet (disambiguation). Tree of routing paths through a portion of the Internet as visualized by the …   Wikipedia

  • Internet Messaging Platforms — One of few key internet infrastructure elements is the modern messaging platform. What used to be only referred to as email and IM has evolved into a complex multi media email, instant messaging, and related fixed and mobile messaging… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Business and Industry Review — ▪ 1999 Introduction Overview        Annual Average Rates of Growth of Manufacturing Output, 1980 97, Table Pattern of Output, 1994 97, Table Index Numbers of Production, Employment, and Productivity in Manufacturing Industries, Table (For Annual… …   Universalium

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Law, Crime, and Law Enforcement — ▪ 2006 Introduction Trials of former heads of state, U.S. Supreme Court rulings on eminent domain and the death penalty, and high profile cases against former executives of large corporations were leading legal and criminal issues in 2005.… …   Universalium

  • Media and Publishing — ▪ 2007 Introduction The Frankfurt Book Fair enjoyed a record number of exhibitors, and the distribution of free newspapers surged. TV broadcasters experimented with ways of engaging their audience via the Internet; mobile TV grew; magazine… …   Universalium

  • Health and Disease — ▪ 2009 Introduction Food and Drug Safety.       In 2008 the contamination of infant formula and related dairy products with melamine in China led to widespread health problems in children, including urinary problems and possible renal tube… …   Universalium

  • Интернет вещей — Коллаж об «интернете вещей» в быту Интернет вещей (англ. Internet of Things, IoT)  концепция …   Википедия

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»