Course Outline
Module-1 Introduction, Basics and Case Studies from Power Utility Companies
- Fundamentals of all technology stacks in IIoT
- IoT adaptation rate in Power Utility Market & how they are aligning their future business model and operation around IoT
- Broad Scale Application Area
- Smart Meter, Smart Car, Smart Grid- brief definition, adoption and challenges
- Business Rule generation for IoT
- 3 layered architecture of Big Data –Physical (Sensors), Communication and Data Intelligence
- Evolving standards and platform players like Azure, AWS and Google-brief introductions. What they offer and what they don’t
Module- 2 : Sensors, Hardware & Sensor Networks
- Basic function and architecture of a sensor –Sensor body, sensor mechanism, sensor calibration, sensor maintenance, cost and pricing structure, legacy and modern sensor network- All basics about the sensors
- Development of sensor electronics- IoT vs legacy and open source vs traditional PCB design style
- Development of Sensor communication protocols –history to modern days. Legacy protocols like Modbus, relay, HART to modern day Zigbee, Zwave, X10,Bluetooth, ANT, 6LoPAN, WiFi-x, NB-IoT, SignalFx, LORA
- Powering options for sensors-Battery, solar, Mobile and PoE
- Energy harvesting solutions for wearables
- SoC( Sensors on Chips) and MEMS based sensors
- Sampling rate matching with application – why it matters in business?
- What is a sensor network? What is Ad-hoc network ?
- Wireless vs. Wireline network
- Autopairing and reconnection
- Which applications to use and where
- Mathematical exercise to find out which network to pick up and where
Module-3: Key Security and Risk Concerns in IoT
- Firmware Patching risk- the soft belly of IoT
- Detailed review of security of IoT communication protocols- Transport layers ( NB-IoT, 4G, 5G, LORA, Zigbee etc. ) and Application Layers – MQTT, Web Socket etc.
- Vulnerability of API end points -list of all possible API in IoT architecture
- Vulnerability of Gate way devices and Services
- Vulnerability of connected sensors -Gateway communication
- Vulnerability of Gateway- Server communication
- Vulnerability of Cloud Database services in IoT
- Vulnerability of Application Layers
- Vulnerability of Gateway management service- Local and Cloud based
- Risk of log management in edge and non-edge architecture
Module 4: Machine learning, AI , Analytics for intelligent IoT
- What is return of investment on Intelligent IoT?
- In Utility- Power Quality, Energy management, Other analytic as service (AAS)
- Introduction to Analytic Stacks in IoT- Feature extraction, Signal Processing, Machine learning
- Introduction to digital signal processing
- Fundamentals of analytics stacks in IoT applications
- Learning classification techniques
- Bayesian Prediction-preparing training file
- Support Vector Machine
- Image and video analytic for IoT
- Fraud and alert analytic through IoT
- Real Time Analytic/Stream Analytic
- Scalability issues of IoT and machine learning
- FOG computing
- Edge architecture
Module 5: Smart Metering- Standards, Security and Future
- Smart Metering,
- Open Smart Grid Protocols (OSGP)
- ANSI C 2.18 Protocols
- NIST Standard for HAN ( Home Area Network)
- Home Plug Powerline Alliance
- Security Standard for Smart Meter- IEC 62056
- Security vulnerability of smart metering- case studies
Module 6: Cloud Platform for IoT / Iaas/Paas/Saas for IoT
- Iaas : Infrastructure as a service-evolving models
- Mechanism of security breach in IOT layer for Iaas
- Middleware for Iaas business implementation in healthcare, homeautomation and farming
- Iaas case study for vehicular information for Auto-insurance and Agriculture
- Paas: Platform as a service in IoT. Case studies of some of the IoT middleware
- Saas : Software/System as service for IoT business models
- Updates and patches via web-OTA mechanism
- Microsoft IoT Central as an example of PaaS platform
- Google IoT, AWS IoT PaaS platform
Module 7: Future of Smart Grid and Smart Metering
- EV charging as a service
- EV as a Mobile battery and charger wallet
- Large Battery storage – Hydro Battery, Lithium Battery and other initiative
- Charging and storage as service
- Grid as a service for P2P energy trading
- Use of distributed ledger technology in P2P energy trading- Blockchain, HyperLedger and DAG
- IOTA/TIANGLE in P2P charging
- IOTA/TANGLE in smart energy and smart contract
Module 8: A few common IoT systems for Utility monetization
- Home automation
- Smart Parking
- Energy optimization
- Automotive-OBD /Iaas/Paas for Insurance and Car parking
- Mobile parking ticketing system
- Indoor location tracking
- Smart lighting for smart city
- Smart Waste Disposal system
- Smart pollution control in city
Module 9 : Mobile IoT Modem, 4G, 5G, NB-IOT
- 4G IoT standards for IoT : LTE-M applications, NB-IoT, UNB standard for 3GPP, 4G , LTE CAT-1 IoT
- 5G IoT standard for IoT : LPWA, eMTC , IMT 2020 5G
- Detailed architecture of IoT Mobile Modem
- Security Vulnerability of 4G/5G and Radio Networks
- IoT gateways -architecture, classification and security issues
Module 10 : Managed IoT Service : IoT management layers
- Sensor onboarding
- Sensor mapping
- Digital Twin
- Asset management
- Managing third party device and gateways
- Managing sensor connectivity, gateway connectivity
- Managing device and gateway health
- Managing sensor calibration and QC
- Managing OTA/Patching on bulk scale
- Managing Firmware, Middleware and analytic builds in distributed system
- Security and risk management
- API management
- Log management
Module 11 : Managing Critical Assets
- Review of existing Fiber Optical Network, SCADA, PLC for Power Plants, Sub-station and critical transformers.
- SHM (Structural Health Monitoring) of DAM system -ICOLD standard for Dam monitoring
- Upgrading from SCADA to local cloud based system ( not public cloud)
- SCADA/PLC to intelligent local cloud for more efficient management of Critical Assets
- Strategy for new policy for adopting smart devices
Requirements
- Should have basic knowledge of business operation, devices, electronics systems and data systems
- Must have basic understanding of software and systems
Basic understanding of Statistics (in Excel levels)
Target Audience
- Decision makers/strategist/Policy makers
- Engineering Leaders, Lead developers, Security Experts
Breakdown of the Module ( Each module 2 hours, customers can ask for any number of modules): Total 22 hours, 3 days
Testimonials (4)
The ability of the trainer to align the course with the requirements of the organization other than just providing the course for the sake of delivering it.
Masilonyane - Revenue Services Lesotho
Course - Big Data Business Intelligence for Govt. Agencies
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
The practical part, I was able to perform exercises and to test the Microsoft Azure features
Alex Bela - Continental Automotive Romania SRL
Course - Programming for IoT with Azure
Practical work