Industrial IoT Course Overview and Details
Industrial IoT Course Overview and Details
This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
Industrial Internet of
Things
Department: Electronics and Instrumentation Engineering
Date: 18.01.2023
1. Contents
2 Course Objectives
3 Pre Requisites
4 Syllabus
5 Course Outcomes
9 Lecture Notes
10 Assignments
12 Part B Questions
16 Assessment Schedule
Unit Contents
INTRODUCTION TO INDUSTRY 4.0 12
III Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP) - (TLS, DTLS) –
Session Layer-HTTP, CoAP, XMPP, AMQP, MQTT. Service Layer -
oneM2M, ETSI M2M, OMA, BBF – Security in IoT Protocols – MAC
802.15.4, 6LoWPAN, RPL, Application Layer.
INDUSTRIAL IoT 12
CO
Course Outcomes
Number
Understand IoT value chain structure (device, data cloud),
C609.1 application areas and technologies involved.
P P P P P P P P P P P P PS PS PS
CO O O O O O O O O O O O O O O O
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
C609.
3 2 - - - - - 2 1 2 - 3 3 1 -
1
C609.
3 3 3 2 - - - 2 2 2 - 3 3 3 2
2
C609.
3 3 3 2 - - - 2 2 2 - 3 3 3 2
3
C609.
3 2 - - - - - 2 1 2 - 3 3 2 2
4
C609.
3 2 2 - - - - 2 1 2 - 3 3 2 2
5
C609.
3 2 2 - - - - 2 1 2 - 3 3 2 2
6
7. Lecture Plan
Actual
S. No of Proposed Pertaini Taxono Mode of
Topics Lecture
No.: Period date ng CO my level Delivery
Date
PPT +
Sensing & Online
1 1 C609.1 K2
actuation White
Board
PPT +
Communication Online
2 4 C609.1 K2
Protocols: White
Board
PPT +
Networking Online
3 3 C609.1 K2
Protocols: White
Board
Globalization and PPT +
Emerging Issues, Online
4 1 C609.1 K2
The Fourth White
Revolution Board
PPT +
LEAN Production Online
5 1 C609.1 K2
Systems White
Board
Smart and PPT +
Connected Online
6 1 C609.1 K2
Business White
Perspective Board
PPT +
Online
7 Smart Factories 1 C609.1 K2
White
Board
8. Activity based learning
Aim: The Think Tank activity motivates the students developing a list of
advantages and disadvantages of various types of communication
protocols in industries, helping them to analyze the selection of protocol
for particular applications
.Time : 20 – 30 minutes
Size : 4 in a Group Activity
The students are divided into groups and problem statements are given
in terms of different types of industry . The group of students should
summarize the characteristics, uses and selection of communication
protocol for particular application.
9. Lecture Notes
Transducer:
Converts a signal from one physical form to another physical form
Physical form: thermal, electric, mechanical, magnetic, chemical, and optical
Energy converter
Example:
Microphone : Converts sound to electrical signal
Speaker : Converts electrical signal to sound
Antenna : Converts electromagnetic energy into electricity and vice
versa
Strain gauge : Converts strain to electrical
Definition of Sensor:
The characteristic of any device or material to detect the presence of a particular
physical quantity
Classification of Actuators
Electric Linear Actuator
• Powered by electrical signal
• Mechanical device containing linear guides, motors, and drive mechanisms
• Converts electrical energy into linear displacement
• Used in automation applications including electrical bell, opening and closing
dampers, locking doors, and braking machine motions.
COMMUNICATION PROTOCOLS
The following communication protocols are important for IoT:
1. IEEE 802.15.4
2. Zigbee
3. 6LoWPAN
4. Wireless HART
5. Z-Wave
6. ISA 100
7. Bluetooth
8. NFC
9. RFID
IEEE 802.15.4
• This standard provides a framework meant for lower layers (MAC and PHY) for a
wireless personal area network (WPAN).
• PHY defines frequency band, transmission power, and modulation scheme of the
link.
• MAC defines issues such as medium access and flow control (frames).
• This standard is used for low power, low cost (manufacturing and operation), and
low speed communication between neighboring devices (< ~75m).
Features of IEEE 802.15.4
• This standard utilizes DSSS (direct sequence spread spectrum) coding scheme to
transmit information.
• DSSS uses phase shift keying modulation to encode information.
a) BPSK - 868/915 MHz, data transmission rate 20/40 kbps respectively.
b) OQPSK - 2.4 GHz, data transmission rate 250 kbps.
• DSSS scheme makes the standard highly tolerant to noise and interference and
thereby improving link reliability.
• The preferable nature of transmission is line of sight (LOS).
• The standard range of transmission - 10 to 75m.
• The transmission of data uses CSMA-CA (carrier sense multiple access with
collision avoidance) scheme.
• Transmissions occur in infrequent short packets for duty cycle (<1 %), thus
reducing consumption of power.
• Star network topology and peer-to-peer network topology is included.
Zigbee
• Provides a framework for medium-range communication in IoT connectivity.
• Defines PHY (Physical) and MAC (Media Access Control) layers enabling
interoperability between multiple devices at low-data rates.
• Operates at 3 frequencies –
a) 868 MHz (1 channel using data transmission rate up to 20 kbps)
b) 902-928MHz (10 channels using data transmission rate of 40 kbps)
c) 2.4 GHz (16 channels using data transmission rate of 250 kbps).
Features of Zigbee
• The lower frequency bands use BPSK.
• For the 2.4 GHz band, OQPSK is used.
• The data transfer takes place in 128 bytes packet size.
• The maximum allowed payload is 104 bytes.
• The nature of transmission is line of sight (LOS).
• Standard range of transmission – upto 70m.
• Relaying of packets allow transmission over greater distances.
• Provides low power consumption (around 1mW per Zigbee module) and better
efficiency due to
a) adaptable duty cycle
b) low data rates (20 - 250 kbit/s)
c) low coverage radio (10 -100 m)
• Networking topologies include star, peer-to-peer, or cluster- tree (hybrid), mesh
being the popular.
• The Zigbee protocol defines three types of nodes:
a) Coordinators - Initializing, maintaining and controlling the network. There is one
and only one per network.
b) Routers - Connected to the coordinator or other routers. Have zero or more
children nodes. Contribute in multi hop routing.
c) End devices - Do not contribute in routing.
• Star topology has no router, one coordinator, and zero or more end devices.
• In mesh and tree topologies, one coordinator maintains several routers and end
devices.
• Each cluster in a cluster-tree network involves a coordinator through several leaf
nodes.
• Coordinators are linked to parent coordinator that initiates the entire network.
• ZigBee standard comes in two variants:
a) ZigBee
b) ZigBee Pro - offers scalability, security, and improved performance utilizing many-
to-one routing scheme.
6LoWPAN
• 6LoWPAN is IPv6 over Low-Power Wireless Personal Area Networks.
• It optimizes IPv6 packet transmission in low power and lossy network (LLN) such
as IEEE 802.15.4.
• Operates at 2 frequencies:
a) 2400–2483.5 MHz (worldwide)
b) 902–929 MHz (North America)
• It uses 802.15.4 standard in unslotted CSMA/CA mode.
Features of 6LoWPAN
• 6LowPAN converts the data format to be fit with the IEEE 802.15.4 lower layer
system.
• IPv6 involves MTU (maximum transmission unit) of 1280 bytes in length, while
the IEEE 802.15.4 packet size is 127 bytes.
• Hence a supplementary adaptation layer is introduced between MAC and network
layer that provides:
a) Packet fragmentation & packet reassembly
b) Compression of header
c) Routing of data link layer.
• Fragmentation is required to fit the intact IPv6 packet into a distinct IEEE
802.15.4 frame (> ~106 bytes).
• The fragmentation header allows 2048 bytes packet size with fragmentation.
• Using fragmentation and reassembly, 128-byte IPv6 frames are transmitted over
IEEE 802.15.4 radio channel into several smaller segments.
• Every fragment includes a header..
• Header compression reduces the transmission overhead and allows efficient
transmission of payload.
• IPv6 addresses are compressed in 6LoWPAN:
a) 8-byte UDP header
b) 40-byte IPv6 header
• Stateless auto configuration allows any device to create the IPv6 address
automatically devoid of external dealing using a DHCP server.
• Data link layer routing is classified into two schemes:
a) mesh-under - utilizes link layer address to forward data packets.
b) route-over - utilizes network layer IP address.
• Provides link layer security (AES-128) from IEEE 802.15.4 such as authentication
of link and encryption.
Wireless HART
• Wireless HART is based on HART (Highway Addressable Remote Transducer).
• It is the first international industrial wireless standard (IEC 62591), based upon
the standard IEEE 802.15.4.
• Functions in the 2.4GHz ISM band using data rate of up to 250 kb/s.
• 11 to 26 channels are supported, with a gap of 5MHz between two adjacent
channels.
• The same channel can’t be used consecutively.
Features of Wireless HART
• Exploits IEEE 802.15.4 accustomed DSSS coding scheme.
• A Wireless HART node follows channel hopping every time it sends a packet.
• Modulation technique used is offset quadrature phase shift keying (OQPSK).
• Transmission Power is around 10dBm (adjustable in discrete steps).
• Maximum payload allowed is 127 bytes.
• It employs TDMA (time division multiple access) that allots distinct time slot of
10ms for each transmission.
• TDMA technology is used to provide collision free and deterministic
communications.
• A sequence of 100 consecutive time slots per second is grouped into a super
frame.
• Slot sizes and the super frame length are fixed.
• The devices support multiple super frames with differing numbers of timeslots.
• At least one super frame is always enabled while additional super frames are
enabled and disabled according to the demand of bandwidth.
• For any message, communication occurs in the allotted timeslot and frequency
channel.
• Supports both star and mesh topologies.
Z-Wave
• Z-wave is a low power radio communication technology primarily used for home
automation and security systems.
• It was designed as a simpler and cheaper alternative to Zigbee for small to
medium range connectivity.
• It operates on the unlicensed part of the industrial, scientific and medical (ISM)
band: 908.42 MHz in the US & 868.42 MHz in Europe, avoiding any interference
with the 2.4Ghz band(Wi-Fi, Bluetooth and others).
• Z-wave uses a Mesh Network Topology to communicate among the devices,
supporting up to 232 nodes in a network.
Features of Z-Wave
• A Z-wave network has 2 device categories: Controller and Slave
• The Controller is a central entity which sets up the Z-wave network and manages
other slave devices in the network.
• Each logical Z-wave network has 1 Home (Network) ID and multiple unique Node
IDs for the devices in the network.
• The Network ID is of length 4 Bytes and Node ID is of length 1 Byte.
• The nodes can communicate only within their home network
• It offers a data rate of up to 100kbps and an average communication range of 30
meters.
• It uses source routed network mesh topology using 1 primary controller.
• Z-wave considers only static devices in the network due to its source routed
network topology.
• The devices communicate with one another only when they are in range.
• Messages are routed through different nodes in case of any obstruction due to
interior layout and other household appliances.
• These obstructions are called radio dead-spots and can be bypassed using a
process called Healing.
Applications:
• Primarily used in Home/Office Automation
• Systems for Smart Energy Management
• System for Smart Security and Surveillance
• Appliances automation and control
ISA 100.11a
• ISA 100.11a is a Standard for wireless network technology developed by the
International Society of Automation(ISA).
• The primary focus of the technology is the implementation of automation in the
industrial environment.
• The protocol stack of ISA 100.11a is in compliance with IoT.
• It is based on the IEEE 802.15.4 protocol along with other wireless networks.
Features of ISA 100.11a
• It supports multiple devices working on different protocols to interact in a single
network, simultaneously.
• It is an open standard which enables interoperability and communication between
different devices.
• It uses the IPv6 based technology and adds the associated benefits such as
increased address space and security.
• 128 bits AES encryption security.
• Hence, it offers essential scalability and reliability for industrial network.
• It supports 2 network topologies for operation: 1)Star and 2)Mesh.
• Uses TDMA/CSMA schemes for resource sharing, collision avoidance.
Applications
• It is primarily used for automation in large scale complex [Link] Wireless
monitoring of the industrial network and devices.
• Process monitoring and control automation in the industrial environment with
large and complex setups.
Bluetooth
• A short range wireless communication technology.
• Its is aimed at replacing the cables with wireless medium to communicate
between portable devices.
• It is based on Ad-hoc technology, also known as Ad-hoc Piconets.
• Network can be established between 2 to 8 Bluetooth devices.
Features of Bluetooth:
• It is a low cost wireless communication technology.
• Low power consumption.
• Bluetooth technology uses the unlicensed industrial, scientific and medical (ISM)
band at 2.4 to 2.485 GHZ.
• Supports 1Mbps and 3Mbps data rate for version 1.2 and 2.0, respectively.
• The operating range: 1 meter for Class 3 radios, 10 meters for Class 2 radios,
and 100 meters for Class 1 radios.
Applications:
• Bluetooth is suitable for a network of devices with smaller radius.
• Connectivity with desktop and laptop peripherals
• Wireless connectivity between mobile phones and other portable devices.
• Multimedia transfer between devices
• Automobiles use Bluetooth for connecting with multimedia and navigation
devices.
• GPS devices are connected with the end user.
RFID
• RFID stands for “radio-frequency identification” .
• An RFID system consists of RFID tag, RFID reader and RFID software
• RFID tag stores digitally encoded data, which is read by a RFID reader
• RFID tag data can be read outside the line-of-sight, as compared to traditional
barcodes and QR codes.
Features of RFID
• RFID tag consists of an integrated circuit and an antenna, covered with a
protective material.
• Tags can be classified as passive or active.
• Active tags use their own power supply for operation and data transfer.
• Passive tags have to be powered by a reader inductively in order
to transmit data.
Application:
• Store product tracking.
• Asset and baggage tracking.
• Supply chain management.
• Livestock tracking and management.
• Automobile tracking.
• Authentication and access control
NFC
• Near field communication, or NFC, has been derived from radio-frequency
identification (RFID).
• NFC works within close proximity without any physical contact between the
devices unlike RFID which has a longer range of communication.
• A NFC device can be any of the two types: 1) Active and 2) Passive.
• An Active type of device can both read and transmit data.
• A Passive device can only transmit data but cannot read from other NFC devices.
Features of NFC
• NFC operates at 13.56 MHz frequency.
• The communication range of NFC devices is less then 10 centimeters.
• Data rate supported are 106, 212 or 424 Kbps (kilobits per second).
• Two communication modes are supported between two devices: Active-Active or
Active-Passive mode.
Applications:
• Banking and payments using NFC enabled smartphones, transaction cards.
• Tracking goods.
• Data Communication between smart phones.
• Security and authentication using NFC enabled ID cards.
• Low-power home automation systems
IOT NETWORKING
Characteristics of IoT devices
• Low processing power
• Small in size
• Energy constraints
Networks of IoT devices
• Low throughput
• High packet loss
• Tiny (useful) payload size
• Frequent topology change
Resource utilization
• Requires control on the storage and bandwidth for data reception and
transmission.
• QoS policies for resource utilization:
Resource limit policy
• Controls the amount of message buffering
• Useful for memory constrained IoT devices
Time filter policy
• Controls the data sampling rate (interarrival time) to avoid buffer overflow
• Controls network bandwidth, memory, and processing power
Data timeliness
• Measure of the freshness of particular information at the receiver end
• Important in case of healthcare, industrial and military applications
• Data timeliness policies for IoT network include
Deadline policy
• Provides maximum interarrival time of data
• Drops the stale data; notify the missed deadline to the application end
Latency budget policy
• Latency budget is the maximum time difference between the data transmission
and reception from source end to the receiver end.
• Provides priority to applications having higher urgency.
Data Availability
• Measure of the amount of valid data provided by the sender/producer to
receiver/consumer
• QoS policies for data availability in IoT network include
Durability policy
• Controls the degree of data persistence transmitted by the sender
• Data persistence
Lifespan policy
• Controls the duration for which transmitted data is valid
History policy
• Controls the number of previous data instances available for the receiver.
Data Delivery
• Measure of successful reception of reliable data from sender to receiver
• QoS policies for data delivery include
Reliability policy
• Controls the reliability level associated with the data distribution
Transport priority
• Allows transmission of data according to its priority level
MQTT
• Message Queue Telemetry Transport
• Introduced by IBM and standardized by Organization for the Advancement of
Structured Information Standards (OASIS) in 2013
• Works on Publish/Subscribe framework on top of TCP/IP architecture
Advantages
• Reliable, Lightweight, and cost-effective protocol
MQTT QoS
• QoS of MQTT protocol is maintained for two transactions
a) First transaction: Publishing client MQTT Server
b) Second transaction: MQTT Server Subscribing Client
• Client on each transaction sets the QoS level
a) For the first transaction, publishing client sets the QoS level
b) For second transaction, client subscriber sets the QoS level
Supports 3-level of QoS
QoS 0:
• Also known as “at most once” delivery
• Best effort and unacknowledged data service
• Publisher transmits the message one time to server and server transmits it once
to subscriber
• No retry is performed
QoS 1:
• Also known as “at least once” delivery
• Message delivery between the publisher, server and then between server and
subscribers occurs at least once.
• Retry is performed until acknowledgement of message is received
QoS 2:
• Also known as “exactly once” delivery
• This QoS level is used when neither packet loss or duplication of message is
allowed
• Retry is performed until the message is delivered exactly once
CoAP
• Constrained Application Protocol
• CoAP was designed by IETF Constrained RESTful Environment (CoRE) working
group to enable application with lightweight RESTful (HTTP) interface
• Works on Request/Response framework based on the UDP architecture, including
Datagram Transport Layer Security (DTLS) secure transport protocol.
• CoAP defines four types of messages
a) CON: Conformable
b) NON: Non-conformable
c) RST: Reset
d) ACK: Acknowledgement
• For conformable type message, the recipient must explicitly either acknowledge
or reject the message.
• In case of non-conformable type message, the recipient sends reset message if it
can’t process the message.
• Utilizes GET, PUT, OBSERVE, PUSH, and DELETE messages requests to retrieve,
create, initiate, update, and delete subscription respectively.
• Supports caching capabilities to improve the response time and reduce bandwidth
consumption.
• Uses IP multicast to support data requests sent to a group of devices.
• Specialized for machine-to-machine (M2M) communication.
XMPP
• Extensible Messaging and Presence Protocol
• Supports Publish/Subscribe messaging framework on top of TCP protocol
• The communication protocol is based on Extensive Markup Language (XML).
• Uses Datagram Transport Layer Security (DTLS) secure transport protocol
• XMPP model is decentralized, no central server is required.
Advantages of XMPP
• Interoperability: Supports interoperability between heterogeneous networks
• Extensibility: Supports privacy lists, multi-user chat, and publish/subscribe chat
status notifications
• Flexibility: Supports customized markup language defined by different
organizations according to their needs.
AMQP
• Advance Message Queuing Protocol
• Optimized for financial applications
• Binary message-oriented protocol on top of TCP
• Supports Publish/Subscribe framework for both
a) Point-to-point (P2P)
b) Multipoint communication
• Uses token-based mechanism for flow control
✓ Ensures no buffer overflow at the receiving end
• Message delivery guarantee services:
✓ At least once: Guarantees message delivery but may do so multiple times
✓ At most once: Each message is delivered once or never
✓ Exactly once: No message drop and delivered once one
IEEE 1888
• Energy-efficient network control protocol
• Defines a generalized data exchange protocol between network components over
the IPv4/v6-based network.
• Universal Resource Identifiers (URIs) based data identification
• Applications: Environmental monitoring, energy saving, and central management
systems.
DDS RTPS
• Distributed Data Service Real Time Publish and Subscribe
• Supports Publish/Subscribe framework and on top of UDP transport layer
protocol.
• Data-centric and binary protocol
• Data is termed as “topics”.
• The users/listeners may subscribe to their particular topic of interest
• A single topic may have multiple speakers of different priorities
• Supports enlisted QoS for data distribution
a) Data persistence
b) Delivery deadline
c) Reliability
d) Data freshness
• Applications: Military, Industrial, and healthcare monitoring
• The First Industrial Revolution was marked by a transition from hand production
• methods to machines through the use of steam power and water power.
• The implementation of new technologies took a long time, so the period which
this
• refers to it is between 1760 and 1820, or 1840 in Europe and the United States.
• Its effects had consequences on textile manufacturing, which was first to adopt
such changes, as well as iron industry, agriculture, and mining although it also
had societal effects with an ever stronger middle class.
Megatrends
• All recent technologies and development that leverage the pervasive potential of
digitization and information technologies
Autonomous Vehicle
Driver-less vehicles
• Trucks
• Drones
• Aircrafts
• Boats
3D Printers
• Manifesting physical objects based on digital specifications
• Application
a) Wind Turbines
b) Medical Implants
Advanced Robotics
• Conventional application of robots: automotive
• Recently, robotics are used from precision agriculture to nursing
New Materials
• Lighter, stronger, recyclable and adaptive
• Example: Thermoset plastics, Graphene
Digital
• Internet of Things (IoT)
• Application of IoT in Industry
a) RFID
b) Tracking of package delivery
c) Complex supply chain
d) Monitoring systems
• Bitcoin (digital currency) and Blockchain (securing bank/government transactions)
• Uber model for transportation (car pooling etc.)
Biological
• Genetic sequencing
• DNA writing
• Recommender system (IBM Watson)
• Cell Modification
• Genetic Engineering (CRISPER)
Tipping Points
• Tipping points represent the radical changes in that are required in near future
• Probable tipping points in 2025
a) Clothes connected to the internet
b) Unlimited and free storage
c) 1 trillion sensors connected to the internet
d) Robotic pharmacist, etc.
Monitor Control
Resource: Resource:
• Sensors. • Custom software.
• External data sources. Effects:
Effects : • Controlling the products.
• Health monitoring of products.
• Personalization .
• Generating alerts.
• Taking action against the odds.
Optimization Control
Resource: Resource:
• Optimization algorithms. • Monitor, control, and optimization
capabilities.
Effects:
• Software algorithms.
• Enhances the performance.
Effect:
• Enables remote services.
• Autonomous performance of
• Assists in repairing the product.
products.
Why smart business model?
• Make the current process less costly.
• Make the process efficient.
• Meet the expected revenue.
Key attributes of smart business model
• Value proposition.
• Revenue streams.
• Technologies.
Value creation in smart business model
Physical Layer:
• Responsible for collecting and acquiring data from object or environment.
• Equipped with micro-controllers and sensors.
Connectivity Layer:
• Connects smart devices, servers.
• Equipped with different communication technology including IP networks, ZigBee,
NFC, Bluetooth etc.
Digital Layer:
• Stores the data.
• Analyzes the data.
• Processes the data
Smart machines
• Communicate with other machines.
• Communicate with other smart devices.
• Communicate with humans.
Smart devices
Connected with smart devices including
• Field devices.
• Mobile devices.
• Operating devices.
Smart Manufacturing Process
• Dynamic.
• Automation.
• Real-time.
• Efficient.
Smart Engineering
• Smart design of product.
• Smart development of product.
• Smart planning.
Information Technology
• Smart software application.
• Monitoring.
• Control.
• Smart management process.
Course
Q. K
Questions Outcom
No.: Level
es
What is a Transducer?
Example:
• Compression of header
Course
Q. K
Questions Outcom
No.: Level
es
Radio Link Control (RLC): Used to format and transport data between
the Device and eNodeB base station, transfer upper layer Protocol
Data Units (PDUs), error correction, concatenation, segmentation,
and reassembly of Service Data Unit (SDUs).
16. Assessment Schedule
17. Prescribed Text Books & Reference Books
TEXT BOOKS:
1. Arshdeep Bahga, Vijay Madisetti, ―Internet of Things – A hands-on
approach‖, Universities Press, 2015
2. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds),
―Architecting the Internet of Things‖, Springer, 2011.
3. Olivier Hersent, David Boswarthick, Omar Elloumi, ―The Internet of
Things – Key applications and Protocols‖, Wiley, 2012
REFERENCES:
1. Honbo Zhou, ―The Internet of Things in the Cloud: A Middleware
Perspective‖, CRC Press, 2012.
2. Jan Ho¨ ller, Vlasios Tsiatsis , Catherine Mulligan, Stamatis ,
Karnouskos, Stefan Avesand. David Boyle, "From Machine-to-
Machine to the Internet of Things - Introduction to a New Age of
Intelligence", Elsevier, 2014.
3. “Industry 4.0: The Industrial Internet of Things”, by Alasdair
Gilchrist (Apress)
4. “Industrial Internet of Things: Cyber manufacturing Systems” by
Sabina Jeschke, Christian Brecher, Houbing Song, Danda B. Rawat
(Springer)
5. Peter Waher, “Learning Internet of Things”, PACKT publishing,
BIRMINGHAM – MUMBAI.
6. NPTEL Video Lecture Notes on “Introduction to Industry 4.0 and
Industrial Internet of Things” by Prof. Sudip Misra, IIT Kharagpur.
[Link]
18. Mini Project Suggestions
[Link]
Thank you
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.