Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything

Buy

Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book.

Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources.

Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - "chirps". Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership.

This must change. The architecture of the Internet of Things must evolve now by incorporating simpler protocols toward at the edges of the network, or remain forever inefficient. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored.

What you’ll learn

  • Discusses the difference between the "normal" Internet and the Internet of Things.
  • Describes a new architecture and its components in the "chirp" context.
  • Explains the shortcomings of IP for IoT.
  • Describes the anatomy of the IoT.
  • Describes how to build a suitable network to maximize the amazing potential of the IoT.

Who this book is for

Thought leaders, executives, architectural, standards and development leaders in the evolving IoT industry. Corporations and organizations whose commercial products could be adapted simply to be functioning devices on the IOT while saving billions of dollars in unnecessary costs or proprietary designs. Those who wish to capitalize on technology change and those interested in the Internet, its capabilities and the need to improve it.

(HTML tags aren't allowed.)

Professional Web 2.0 Programming (Wrox Professional Guides)
Professional Web 2.0 Programming (Wrox Professional Guides)
Web 2.0 architecture opens up an incredible number of options for flexible web design, creative reuse, and easier updates. Along with covering the key languages and techniques of Web 2.0, this unique book introduces you to all of the technologies that make up Web 2.0 at a professional level. Throughout the chapters, you'll find code for several...
WebSphere Application Server Administration Using Jython
WebSphere Application Server Administration Using Jython
Save Time and Money: Streamline WebSphere Application Server Management with Jython Scripting!

 

Utilizing Jython scripting, you can dramatically reduce the effort, resources, and expense associated with managing WebSphere Application Server. WebSphere...

Hacking Google Maps and Google Earth (ExtremeTech)
Hacking Google Maps and Google Earth (ExtremeTech)
Going somewhere? Or just getting back?

 

Great vacation photos—too bad you can't remember where you took them. And wouldn't it have been terrific to find a pizza joint when you bumped into your college buddy in that little ski town? Well, by making Google Maps and Google Earth do your bidding, you can find out not only where...


Linux Server Security: Hack and Defend
Linux Server Security: Hack and Defend

Learn how to attack and defend the world’s most popular web server platform

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server...

The Physics of Dilute Magnetic Alloys
The Physics of Dilute Magnetic Alloys

Available for the first time in English, this classic text by Jun Kondo describes the Kondo effect thoroughly and intuitively. Its clear and concise treatment makes this book of interest to graduate students and researchers in condensed matter physics. The first half of the book describes the rudiments of the theory of metals at a level that...

Strategic Planning for Information Systems
Strategic Planning for Information Systems
Since the second edition of this book appeared in 1996, we have seen
Information Technology (IT) become an increasingly integral component
of everyone’s working life and personal environment. IT is now
ubiquitous and enables a degree of connectivity that was difficult to
envisage even 10 years ago. The technology has
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy