Course Outline
Module-1 Introduction, Basics and Case Studies from Power Utility Companies
- Fundamentals of all technology stacks in IIoT
- IoT adaptation rate in Power Utility Market & how they are aligning their future business model and operation around IoT
- Broad Scale Application Area
- Smart Meter, Smart Car, Smart Grid- brief definition, adoption and challenges
- Business Rule generation for IoT
- 3 layered architecture of Big Data –Physical (Sensors), Communication and Data Intelligence
- Evolving standards and platform players like Azure, AWS and Google-brief introductions. What they offer and what they don’t
Module- 2 : Sensors, Hardware & Sensor Networks
- Basic function and architecture of a sensor –Sensor body, sensor mechanism, sensor calibration, sensor maintenance, cost and pricing structure, legacy and modern sensor network- All basics about the sensors
- Development of sensor electronics- IoT vs legacy and open source vs traditional PCB design style
- Development of Sensor communication protocols –history to modern days. Legacy protocols like Modbus, relay, HART to modern day Zigbee, Zwave, X10,Bluetooth, ANT, 6LoPAN, WiFi-x, NB-IoT, SignalFx, LORA
- Powering options for sensors-Battery, solar, Mobile and PoE
- Energy harvesting solutions for wearables
- SoC( Sensors on Chips) and MEMS based sensors
- Sampling rate matching with application – why it matters in business?
- What is a sensor network? What is Ad-hoc network ?
- Wireless vs. Wireline network
- Autopairing and reconnection
- Which applications to use and where
- Mathematical exercise to find out which network to pick up and where
Module-3: Key Security and Risk Concerns in IoT
- Firmware Patching risk- the soft belly of IoT
- Detailed review of security of IoT communication protocols- Transport layers ( NB-IoT, 4G, 5G, LORA, Zigbee etc. ) and Application Layers – MQTT, Web Socket etc.
- Vulnerability of API end points -list of all possible API in IoT architecture
- Vulnerability of Gate way devices and Services
- Vulnerability of connected sensors -Gateway communication
- Vulnerability of Gateway- Server communication
- Vulnerability of Cloud Database services in IoT
- Vulnerability of Application Layers
- Vulnerability of Gateway management service- Local and Cloud based
- Risk of log management in edge and non-edge architecture
Module 4: Machine learning, AI , Analytics for intelligent IoT
- What is return of investment on Intelligent IoT?
- In Utility- Power Quality, Energy management, Other analytic as service (AAS)
- Introduction to Analytic Stacks in IoT- Feature extraction, Signal Processing, Machine learning
- Introduction to digital signal processing
- Fundamentals of analytics stacks in IoT applications
- Learning classification techniques
- Bayesian Prediction-preparing training file
- Support Vector Machine
- Image and video analytic for IoT
- Fraud and alert analytic through IoT
- Real Time Analytic/Stream Analytic
- Scalability issues of IoT and machine learning
- FOG computing
- Edge architecture
Module 5: Smart Metering- Standards, Security and Future
- Smart Metering,
- Open Smart Grid Protocols (OSGP)
- ANSI C 2.18 Protocols
- NIST Standard for HAN ( Home Area Network)
- Home Plug Powerline Alliance
- Security Standard for Smart Meter- IEC 62056
- Security vulnerability of smart metering- case studies
Module 6: Cloud Platform for IoT / Iaas/Paas/Saas for IoT
- Iaas : Infrastructure as a service-evolving models
- Mechanism of security breach in IOT layer for Iaas
- Middleware for Iaas business implementation in healthcare, homeautomation and farming
- Iaas case study for vehicular information for Auto-insurance and Agriculture
- Paas: Platform as a service in IoT. Case studies of some of the IoT middleware
- Saas : Software/System as service for IoT business models
- Updates and patches via web-OTA mechanism
- Microsoft IoT Central as an example of PaaS platform
- Google IoT, AWS IoT PaaS platform
Module 7: Future of Smart Grid and Smart Metering
- EV charging as a service
- EV as a Mobile battery and charger wallet
- Large Battery storage – Hydro Battery, Lithium Battery and other initiative
- Charging and storage as service
- Grid as a service for P2P energy trading
- Use of distributed ledger technology in P2P energy trading- Blockchain, HyperLedger and DAG
- IOTA/TIANGLE in P2P charging
- IOTA/TANGLE in smart energy and smart contract
Module 8: A few common IoT systems for Utility monetization
- Home automation
- Smart Parking
- Energy optimization
- Automotive-OBD /Iaas/Paas for Insurance and Car parking
- Mobile parking ticketing system
- Indoor location tracking
- Smart lighting for smart city
- Smart Waste Disposal system
- Smart pollution control in city
Module 9 : Mobile IoT Modem, 4G, 5G, NB-IOT
- 4G IoT standards for IoT : LTE-M applications, NB-IoT, UNB standard for 3GPP, 4G , LTE CAT-1 IoT
- 5G IoT standard for IoT : LPWA, eMTC , IMT 2020 5G
- Detailed architecture of IoT Mobile Modem
- Security Vulnerability of 4G/5G and Radio Networks
- IoT gateways -architecture, classification and security issues
Module 10 : Managed IoT Service : IoT management layers
- Sensor onboarding
- Sensor mapping
- Digital Twin
- Asset management
- Managing third party device and gateways
- Managing sensor connectivity, gateway connectivity
- Managing device and gateway health
- Managing sensor calibration and QC
- Managing OTA/Patching on bulk scale
- Managing Firmware, Middleware and analytic builds in distributed system
- Security and risk management
- API management
- Log management
Module 11 : Managing Critical Assets
- Review of existing Fiber Optical Network, SCADA, PLC for Power Plants, Sub-station and critical transformers.
- SHM (Structural Health Monitoring) of DAM system -ICOLD standard for Dam monitoring
- Upgrading from SCADA to local cloud based system ( not public cloud)
- SCADA/PLC to intelligent local cloud for more efficient management of Critical Assets
- Strategy for new policy for adopting smart devices
Requirements
- Should have basic knowledge of business operation, devices, electronics systems and data systems
- Must have basic understanding of software and systems
Basic understanding of Statistics (in Excel levels)
Target Audience
- Decision makers/strategist/Policy makers
- Engineering Leaders, Lead developers, Security Experts
Breakdown of the Module ( Each module 2 hours, customers can ask for any number of modules): Total 22 hours, 3 days