Skip to content

Latest commit

 

History

History
104 lines (90 loc) · 4.88 KB

PE205-Internet-of-Things.org

File metadata and controls

104 lines (90 loc) · 4.88 KB

<<<PE205>>> INTERNET OF THINGS

CO PO MAPPING

PO1PO2PO3PO4PO5PO6PO7PO8PO9PO10PO11PO12PSO1PSO2PSO3
K3K4K5K5K6-------K5K3K6
CO1K232
CO2K2322
CO3K23223
CO4K232223
CO5K332223
Score1510849
Course Mapping32223

{{{credits}}}

LTPC
3003

COURSE OBJECTIVES

  • To understand the fundamentals and architecture of Internet of Things
  • To learn about the sensors and different layer protocols
  • To learn the best practices in security and data analytics in IoT infrastructure
  • To study the concept of Internet of Things in the real world applications.

{{{unit}}}

UNIT IINTRODUCTION TO IoT9

Genesis – Impact and Challenges of IoT – IoT Network Architecture and Design: Need for new architectures – Basic IoT Architecture – foneM2M and IoT world forum architectures – Core IoT functional stack – IoT data management and compute stack.

{{{unit}}}

UNIT IIENGINEERING IoT NETWORKS9

Sensing Devices: Sensors – Actuators – MEMS – Smart objects – Sensor networks – Connecting smart objects; IoT Access Technologies: IEEE 802.15.4 – IEEE 802.15.4g and 802.15.4e – IEEE 1901.2a – IEEE 802.11ah – LoRaWAN – NB-IoT and other LTE variations.

{{{unit}}}

UNIT IIIIoT NETWORK AND APPLICATION LAYER PROTOCOLS9

IP as IoT network layer – Adoption or adaption of IP – Need for optimization – Optimizing IP for IoT – Profiles and Compliances; IoT Application Transport Methods: Non-Application Layer – SCADA – Web Based Protocols – IoT Application Layer Protocols : CoAP and MQTT.

{{{unit}}}

UNIT IVDATA ANALYTICS FOR IoT9

Introduction – Machine Learning – Big Data Analytics Tools and Technologies – Edge Streaming Analytics – Network Analytics.

{{{unit}}}

UNIT VIoT SECURITY AND CASE STUDY9

Cyber Security Vernacular – Anatomy of IoT Cyber Attacks – Physical and Hardware Security – IoT Security and Best Practices; Case Study: Smart and connected cities.

\hfill Total Periods: 45

COURSE OUTCOMES

After completion of this course, students should be able to:

  • Explain the basics and different architectures of IoT (K2)
  • Discuss various sensors and access protocols for IoT (K2)
  • Select different transport and application layer protocols based on application’s requirements (K2)
  • Discuss various machine learning and data analytics techniques for IoT applications (K2)
  • Use security aspects in designing real time IoT applications (K3).

TEXT BOOKS

  1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry, “IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things”, Cisco Press, Pearson, 2019.
  2. Perry Lea, “Internet of Things for Architects”, Packt Publishing, O’Reilly, January 2018.

REFERENCES

  1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things: A hands-on Approach”, Universities Press, 2015.
  2. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), “Architecting the Internet of Things”, Springer, 2011.
  3. Honbo Zhou, “The Internet of Things in the Cloud: A Middleware Perspective”, CRC Press, 2012.
  4. Jan Holler, Vlasios Tsiatsis , Catherine Mulligan, Stamatis , Karnouskos, Stefan Avesand, David Boyle, “From Machine-to-Machine to the Internet of Things – Introduction to a New Age of Intelligence”, Elsevier, 2014.
  5. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things – Key applications and Protocols”, Wiley, 2012.