Get in Touch

Course Outline

Module 1: Introduction, Basics and Case Studies from Power Utility Companies

  • Fundamentals of all technology stacks in IIoT.
  • IoT adaptation rate in the Power Utility Market and how companies are aligning their future business models and operations around IoT.
  • Broad Scale Application Areas.
  • Smart Meter, Smart Car, Smart Grid: Brief definitions, adoption trends, and challenges.
  • Business rule generation for IoT.
  • 3-layered architecture of Big Data: Physical (Sensors), Communication, and Data Intelligence.
  • Evolving standards and platform players like Azure, AWS, and Google: Brief introductions, offerings, and limitations.

Module 2: Sensors, Hardware and Sensor Networks

  • Basic function and architecture of a sensor: Sensor body, mechanism, calibration, maintenance, cost and pricing structures, and legacy vs. modern sensor networks.
  • Development of sensor electronics: IoT vs. legacy, and open source vs. traditional PCB design styles.
  • Development of Sensor communication protocols: From legacy protocols (Modbus, relay, HART) to modern ones (Zigbee, Zwave, X10, Bluetooth, ANT, 6LoPAN, WiFi-x, NB-IoT, SignalFx, LORA).
  • Powering options for sensors: Battery, solar, mobile, and PoE.
  • Energy harvesting solutions for wearables.
  • SoC (Sensors on Chips) and MEMS based sensors.
  • Matching sampling rate with application requirements: Why it matters for business.
  • Defining sensor networks and ad-hoc networks.
  • Wireless vs. Wireline networks.
  • Autopairing and reconnection mechanisms.
  • Application selection: Which technologies to use and where.
  • Mathematical exercises to determine the appropriate network selection and deployment location.

Module 3: Key Security and Risk Concerns in IoT

  • Firmware Patching risks: The vulnerability of IoT.
  • Detailed review of security in IoT communication protocols: Transport layers (NB-IoT, 4G, 5G, LORA, Zigbee, etc.) and Application Layers (MQTT, Web Socket, etc.).
  • Vulnerability of API endpoints: A list of all possible APIs in IoT architecture.
  • Vulnerability of gateway devices and services.
  • Vulnerability of connected sensors and gateway communication.
  • Vulnerability of gateway-to-server communication.
  • Vulnerability of cloud database services in IoT.
  • Vulnerability of application layers.
  • Vulnerability of gateway management services: Local and cloud-based.
  • Risks associated with log management in edge and non-edge architectures.

Module 4: Machine learning, AI, Analytics for intelligent IoT

  • Return on Investment (ROI) for Intelligent IoT.
  • Utility applications: Power Quality, Energy management, and Other Analytics as a Service (AAS).
  • Introduction to Analytics Stacks in IoT: Feature extraction, Signal Processing, Machine Learning.
  • Introduction to Digital Signal Processing.
  • Fundamentals of analytics stacks in IoT applications.
  • Learning classification techniques.
  • Bayesian Prediction: Preparing training files.
  • Support Vector Machine.
  • Image and video analytics for IoT.
  • Fraud and alert analytics through IoT.
  • Real-time Analytics / Stream Analytics.
  • Scalability issues in IoT and machine learning.
  • FOG computing.
  • Edge architecture.

Module 5: Smart Metering - Standards, Security and Future

  • Smart Metering.
  • Open Smart Grid Protocols (OSGP).
  • ANSI C 2.18 Protocols.
  • NIST Standard for HAN (Home Area Network).
  • Home Plug Powerline Alliance.
  • Security Standard for Smart Meter (IEC 62056).
  • Security vulnerabilities of smart metering: Case studies.

Module 6: Cloud Platform for IoT / IaaS / PaaS / SaaS for IoT

  • IaaS: Infrastructure as a service - evolving models.
  • Mechanisms of security breaches in the IoT layer for IaaS.
  • Middleware for IaaS business implementation in healthcare, home automation, and farming.
  • IaaS case study for vehicular information in auto-insurance and agriculture.
  • PaaS: Platform as a service in IoT. Case studies of some IoT middleware.
  • SaaS: Software/System as a service for IoT business models.
  • Updates and patches via web-OTA mechanisms.
  • Microsoft IoT Central as an example of a PaaS platform.
  • Google IoT and AWS IoT PaaS platforms.

Module 7: Future of Smart Grid and Smart Metering

  • EV charging as a service.
  • EV as a mobile battery and charger wallet.
  • Large Battery storage: Hydro Battery, Lithium Battery, and other initiatives.
  • Charging and storage as a service.
  • Grid as a service for P2P energy trading.
  • Use of distributed ledger technology in P2P energy trading: Blockchain, Hyperledger, and DAG.
  • IOTA/Tangle in P2P charging.
  • IOTA/Tangle in smart energy and smart contracts.

Module 8: A few common IoT systems for Utility monetization

  • Home automation.
  • Smart Parking.
  • Energy optimization.
  • Automotive-OBD / IaaS / PaaS for Insurance and Car parking.
  • Mobile parking ticketing system.
  • Indoor location tracking.
  • Smart lighting for smart cities.
  • Smart Waste Disposal systems.
  • Smart pollution control in cities.

Module 9: Mobile IoT Modem, 4G, 5G, NB-IOT

  • 4G IoT standards for IoT: LTE-M applications, NB-IoT, UNB standard for 3GPP, 4G, LTE CAT-1 IoT.
  • 5G IoT standard for IoT: LPWA, eMTC, IMT 2020 5G.
  • Detailed architecture of IoT Mobile Modems.
  • Security vulnerabilities of 4G/5G and radio networks.
  • IoT gateways: Architecture, classification, and security issues.

Module 10: Managed IoT Service: IoT management layers

  • Sensor onboarding.
  • Sensor mapping.
  • Digital Twin.
  • Asset management.
  • Managing third-party devices and gateways.
  • Managing sensor and gateway connectivity.
  • Managing device and gateway health.
  • Managing sensor calibration and QC.
  • Managing OTA/Patching on a large scale.
  • Managing Firmware, Middleware, and analytics builds in distributed systems.
  • Security and risk management.
  • API management.
  • Log management.

Module 11: Managing Critical Assets

  • Review of existing Fiber Optical Networks, SCADA, and PLC for Power Plants, Sub-stations, and critical transformers.
  • SHM (Structural Health Monitoring) of Dam systems: ICOLD standard for Dam monitoring.
  • Upgrading from SCADA to local cloud-based systems (not public cloud).
  • Transitioning SCADA/PLC to intelligent local cloud for more efficient management of Critical Assets.
  • Strategy for new policies regarding the adoption of smart devices.

Requirements

  • Basic knowledge of business operations, devices, electronics systems, and data systems.
  • Basic understanding of software and systems.

Basic understanding of Statistics (at an Excel proficiency level).

Target Audience

  1. Decision-makers, strategists, and policy makers.
  • Engineering Leaders, Lead developers, and Security Experts.

Breakdown of the Module (Each module is 2 hours; customers can request any number of modules): Total 22 hours, 3 days.

 22 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories