Introduction to the Internet of Everything Preview
4.2 (5 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
39 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Introduction to the Internet of Everything Preview to your Wishlist.

Add to Wishlist

Introduction to the Internet of Everything Preview

Internet and its evolution to the interconnection of people, processes, data, and things
4.2 (5 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
39 students enrolled
Created by Open Labs
Last updated 12/2014
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • 4 Articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Describe the Internet and its evolution to the Internet of Everything
  • Explain the four pillars of IoE and how its innovations can transform businesses
  • Explain the interconnection of people, process, data, and things that forms the Internet of Everything
  • Configure non-IP-enabled and IP-enabled devices to communicate in the Internet of Things
  • Explain the steps to evaluate and implement an IoE solution
  • Explain security concerns that must be considered when implementing IoE solutions
  • Explain the concept of prototyping and why this is critical in the IoE market
View Curriculum
Requirements
  • Should have basic knowledge of business operation, devices, electronics systems and data systems
  • Must have basic understanding of software and systems
  • Basic understanding of Statistics ( in Excel levels)
Description

Welcome to the Introduction to the Internet of Everything course. The Internet of Everything (IoE) is the networked connection of people, process, data and things. As more people, data and things come online, we develop processes to harness the vast amounts information being generated by all these connected people and things.

The goal of this course is to introduce you to fundamental concepts and technologies that enable the IoE.

These online course materials will assist you in developing the skills necessary to do the following:

  • Explain the impact of the Internet of Everything.
  • Explain the interactions between people, process, data, and things that form the Internet of Everything.
  • Configure networked devices and applications to support a given IoE implementation.
  • Explain the benefits and challenges of the IoE.
  • Explain modeling and prototyping in the IoE.

To check your understanding of the concepts explained in this course, there is a brief quiz at the end of each chapter.

Who is the target audience?
  • Everyone interested in the convergence between an organization’s operational technology (OT) and information technology (IT) systems, and the business processes for evaluating a problem and implementing an IoE solution.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
22 Lectures
01:04:23
+
What is the IoE
4 Lectures 06:28

The IoE incorporates four pillars to make networked connections more relevant and valuable than ever before:

  • People
  • Process
  • Data
  • Things.

The interactions between the elements in the four pillars create a wealth of new information. The pillars interact in a way that establishes three main connections in the IoE environment:

  • people communicate with people (P2P),
  • machines communicate with people (M2P)
  • machines communicate with machines (M2M).
Preview 01:02

To be IoE-ready means to be characterized by three critical attributes:

  • Hyper-Awareness
  • Ability to Predict
  • Agility

Combining these three attributes allows organizations to better create, communicate, and deliver their offerings.

To join the IoE economy, and maximize the value of their IoE implementation, organizations must consider:

  • Investing in a high-quality technology infrastructure and tools
  • Adopting and following inclusive practices
  • Developing effective information-management practices
Preview 02:47

Advances in technology are enabling us to consolidate different kinds of networks onto one platform referred to as the “converged network.” Unlike dedicated networks, converged networks are capable of delivering voice, video streams, text, and graphics between many different types of devices over the same communication channel and network structure. This network infrastructure uses a common set of rules, agreements, and implementation standards.

Preview 02:33

Key Concepts

Key Concepts
00:06

What is the IoE
5 questions
+
Pillars of the IoE
5 Lectures 16:03

The IoE will include all types of objects, including objects and devices that are not traditionally connected. These objects contain embedded technology to interact with internal servers and the external environment. These objects are network-capable, and can communicate across a secure, reliable and available network platform.

Sensors can be programmed to take measurements, translate that data into signals, and then send that data to a main device called the controller. The controller is responsible for collecting data from sensors and providing an Internet connection. Controllers may have the ability to make immediate decisions or they may send data to a more powerful computer for analysis.

Preview 02:02

There are three primary types of data storage:

  • Local Data
  • Centralized Data
  • Distributed Data

There are four distinct categories of services:

  • Software as a Service
  • Platform as a Service
  • Infrastructure as a Service
  • IT as a Service

There are four types of Cloud deployment models:

  • Private
  • Public
  • Community
  • Hybrid
Data as a Pillar
09:52

it is judgement from people that turns data into insights, and insights into IoE value. It facilitates feedback that allows people to make informed decisions that bridge the differences between actual outputs and desired outputs. This is known as a feedback loop. A feedback loop can provide real-time information based on current behavior, and then deliver actionable information to modify that behavior.

People as a Pillar
02:15

Processes are facilitating interactions between people, things, and data. Today, the IoE brings them all together by combining machine-to-machine (M2M), machine-to-people (M2P), and people-to-people (P2P) connections.

Process as a Pillar
01:51

Key Concepts

Key Concepts
00:03

Pillars of the IoE
5 questions
+
Connecting the Unconnected
6 Lectures 13:55

Many things are currently connected using a loose collection of independent, use-specific networks. These disparate networks will converge to share the same infrastructure that includes comprehensive security, analytics, and management capabilities. As the components are connected to a converged network using IoT technologies, they become even more powerful as the full breadth of the IoE is able to take advantage and help people improve their quality of life.

Preview 01:48

Networking protocol suites describe processes, such as:

  • The format or structure of the message
  • The method by which networking devices share information about pathways with other networks
  • How and when error and system messages are passed between devices
  • The setup and termination of data transfer sessions

Protocol suites can be implemented in hardware or software, or a combination of both. Each layer is responsible for part of the processing to prepare data for transmission across the network.

Networking Protocol Suite
03:00

Fog computing creates a distributed computing infrastructure closer to the network edge that carries out easier tasks that require a quick response. It reduces the data burden on networks. It enhances resiliency by allowing IoT devices to operate when network connections are lost. It also enhances security by keeping sensitive data from being transported beyond the edge where it is needed.

Fog Computing
02:14

Scenario of a winery:

The winery owner wants to monitor the vineyard to determine the best time to harvest grapes. Sensors can be used to collect information on the physical aspects of the vineyard. This information is forwarded to the controller. The controller forwards a more complete picture of the information to a network server or across the Internet to a Cloud-based service. Information gathered by the sensor nodes and controller can be further analyzed and accessible via mobile and remote devices.

Example Scenario
02:50

Infrastructure devices provide a variety of services including:

  • Wireless and wired connectivity
  • Quality of service queuing (for example, voice data before video data)
  • High availability
  • Secure transfer
Infrastructure Devices
04:00

Key Concepts

Key Concepts
00:03

Connecting the Unconnected
5 questions
+
Transitioning to the IoE
6 Lectures 23:12

IoE is creating demand for a broad spectrum of IT jobs. These jobs reflect skills spanning multiple disciplines that include computer science, computer engineering and software engineering in the following areas:

  • Collaboration
  • Enterprise networks
  • Data center and virtualization

Preview 01:05

With IoE solutions, organizations can implement a simple, smart, and secure approach that allows organizations to:

  • Simplify the Infrastructure (Simple)
  • Create Intelligence and Agility (Smart)
  • Deliver End-to-End Security (Secure)

To implement IoE solutions, organizations must examine and account for three distinct connection types: M2M, M2P, and P2P.

IoE Solutions
04:31

To implement new IoE solutions without disrupting current operations, one of the first steps business managers must take is to understand their current processes. They must identify:

  • Who their suppliers and customers are
  • What customer needs are
  • What the schedule and process steps are for creating and delivering an offering

In addition to understanding business processes, organizations that are implementing an IoE solution must consider the existing IT and OT network infrastructures and operations.

IoE Project
05:58

There are three strategies to leverage the benefits of the IoE while managing risk:

  • Adaptable and Real Time Security
  • Secure and Dynamic Connections
  • Protecting Customer and Brand Trust

Within the IoE, security must be pervasive. The approach to security must be:

  • Consistent, automated, and extend to secured boundaries across organizations
  • Dynamic, to better recognize security threats through real-time predictive analytics
  • Intelligent, providing visibility across all connections, and elements of the infrastructure
  • Scalable, to meet the needs of a growing organization
  • Agile, able to react in real-time
  • Comprehensive, end-to-end solution

The security principles are:

  • Access Control
  • Context-aware policies
  • Context-aware inspection and security enforcement
  • Network and global intelligence
IoE Security
06:56

When designing an IoE solution, it is important to create a model before creating a prototype. Modeling an IoE solution begins by understanding the potential M2M, M2P, and P2P interactions. Some of the following types of analytics are used to help shape how a business functions:

  • Descriptive
  • Predictive
  • Prescriptive

Prototyping is the next step in modeling.

IoE Modeling & Prototyping
04:19

Key Concepts

Key Concepts
00:23

Transitioning to the IoE
5 questions
+
Conclusion
1 Lecture 04:04
Conclusion
04:04
About the Instructor
Open Labs
4.2 Average rating
5 Reviews
39 Students
1 Course
Technology Training

OpenLabs is a leading provider of technology training solutions for professionals globally. We offer a personalized, interactive and engaging learning experience for professionals across sectors to help them clear the certification exams of their choice quickly and easily.

We have a unique perspective on the information technology disciplines that allows us a broad foundation from which to build educational programs and research initiatives that explore the many applications of the computing discipline — from systems to software engineering and human aspects of computing.

We live and work in the world of technology and want to share the depth and breadth of our experience with the community.


Achieve your goals with training from experts and innovators in business and technology