{"id":1791,"date":"2018-03-16T16:32:17","date_gmt":"2018-03-16T15:32:17","guid":{"rendered":"http:\/\/herlaar.net\/b3it\/?page_id=1791"},"modified":"2026-03-10T21:16:21","modified_gmt":"2026-03-10T20:16:21","slug":"iot-literature-and-support","status":"publish","type":"page","link":"https:\/\/herlaar.net\/b3it\/iot-literature-and-support\/","title":{"rendered":"Literature and support"},"content":{"rendered":"<h4>Literature<\/h4>\n<p>Literature in support of the second assignment is linked to from the text of the assignment whenever deemed relevant.<\/p>\n<p>There are a number of useful resources concerning the Internet of Things that we would like to point out specifically, as these are also required reading for the second exam of the Interaction technology course.<\/p>\n<p><strong>Lectures<\/strong><\/p>\n<p>The second assignment is supported by a number of lectures on the Internet of Things and the assignment itself. These lectures are listed in the schedule that&#8217;s available in the Brightspace course environment. The slides are available in Brightspace as well.<\/p>\n<p>Furthermore, there are lectures on HCI related topics (such as gestures) and evaluation that are relevant to the second assignment as well. These are taken care of by Simone Ooms and can again be found in the schedule in Brightspace.<\/p>\n<p><strong>Internet of Things protocols<\/strong><\/p>\n<p>Adafruit, the author of some of the libraries that you are using in the second assignment, has compiled two comprehensive pages on transports and above transports protocols, giving some background information on many of the protocols that were covered in the IoT lectures:<\/p>\n<ul>\n<li>Episode 1: <a href=\"https:\/\/learn.adafruit.com\/alltheiot-transports?view=all\" target=\"_blank\" rel=\"noopener noreferrer\">Transports<\/a><\/li>\n<li>Episode 2: <a href=\"https:\/\/learn.adafruit.com\/alltheiot-protocols?view=all\" target=\"_blank\" rel=\"noopener noreferrer\">Above transports protocols<\/a><\/li>\n<\/ul>\n<p><strong>MQTT essentials and security fundamentals<\/strong><\/p>\n<p>HiveMQ, the company behind the HiveMQ MQTT broker, offers a blog series covering core features and concepts in the MQTT protocol, as well as MQTT security fundamentals.<\/p>\n<p>You should read the following 12 parts of the MQTT essentials series to get a good understanding of MQTT:<\/p>\n<ul>\n<li class=\"media-heading\">Part 1: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-1-introducing-mqtt\" target=\"_blank\" rel=\"noopener noreferrer\">Introducing MQTT<\/a><\/li>\n<li class=\"media-heading\">Part 2: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part2-publish-subscribe\" target=\"_blank\" rel=\"noopener noreferrer\">Publish &amp; Subscribe<\/a><\/li>\n<li class=\"media-heading\">Part 3: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-3-client-broker-connection-establishment\" target=\"_blank\" rel=\"noopener noreferrer\">Client, Broker and Connection Establishment<\/a><\/li>\n<li class=\"media-heading\">Part 4: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-4-mqtt-publish-subscribe-unsubscribe\" target=\"_blank\" rel=\"noopener noreferrer\">MQTT Publish, Subscribe &amp; Unsubscribe<\/a><\/li>\n<li class=\"media-heading\">Part 5: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-5-mqtt-topics-best-practices\" target=\"_blank\" rel=\"noopener noreferrer\">MQTT Topics &amp; Best Practices<\/a><\/li>\n<li class=\"media-heading\">Part 6: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-6-mqtt-quality-of-service-levels\" target=\"_blank\" rel=\"noopener noreferrer\">Quality of Service 0, 1 &amp; 2<\/a><\/li>\n<li class=\"media-heading\">Part 7: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-7-persistent-session-queuing-messages\" target=\"_blank\" rel=\"noopener noreferrer\">Persistent Session and Queuing Messages<\/a><\/li>\n<li class=\"media-heading\">Part 8: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-8-retained-messages\" target=\"_blank\" rel=\"noopener noreferrer\">Retained Messages<\/a><\/li>\n<li class=\"media-heading\">Part 9: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-9-last-will-and-testament\" target=\"_blank\" rel=\"noopener noreferrer\">Last Will and Testament<\/a><\/li>\n<li class=\"media-heading\">Part 10: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-part-10-alive-client-take-over\" target=\"_blank\" rel=\"noopener noreferrer\">Keep Alive and Client Take-Over<\/a><\/li>\n<li>Part 11: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-special-mqtt-over-websockets\" target=\"_blank\" rel=\"noopener noreferrer\">MQTT over WebSockets<\/a><\/li>\n<li class=\"media-heading\">Part 12: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-essentials-wrap-up\" target=\"_blank\" rel=\"noopener noreferrer\">Wrap-Up<\/a><\/li>\n<\/ul>\n<p>Furthermore, you should read the following 6 parts of the MQTT security fundamentals series:<\/p>\n<ul>\n<li class=\"media-heading\">Part 1: <a href=\"https:\/\/www.hivemq.com\/blog\/introducing-the-mqtt-security-fundamentals\" target=\"_blank\" rel=\"noopener noreferrer\">Introducing the MQTT Security Fundamentals<\/a><\/li>\n<li class=\"media-heading\">Part 2: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-security-fundamentals-authentication-username-password\" target=\"_blank\" rel=\"noopener noreferrer\">Authentication with Username and Password<\/a><\/li>\n<li class=\"media-heading\">Part 3: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-security-fundamentals-advanced-authentication-mechanisms\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Authentication Mechanisms<\/a><\/li>\n<li class=\"media-heading\">Part 4: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-security-fundamentals-authorization\/\" target=\"_blank\" rel=\"noopener noreferrer\">Authorization<\/a><\/li>\n<li class=\"media-heading\">Part 5: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-security-fundamentals-tls-ssl\" target=\"_blank\" rel=\"noopener noreferrer\">TLS \/ SSL<\/a><\/li>\n<li>Part 8: <a href=\"https:\/\/www.hivemq.com\/blog\/mqtt-security-fundamentals-payload-encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\">MQTT Payload Encryption<\/a><\/li>\n<\/ul>\n<h4>Support<\/h4>\n<p>During the first few weeks of the assignment, there are a number of AMUX soldering sessions during which you should solder your AMUX board (and some headers as well). Attending one of these soldering workshops requires a reservation.<\/p>\n<p>Up till the deadline, you can get assistance with the hardware and software of your system, either on-line or on-campus. On-campus practical assistance takes place in the Job Shop, generally on Mondays and Wednesdays. Details about getting assistance as well as the schedule are available in Brightspace.<\/p>\n<p>If you have questions concerning HCI-related matters (such as gestures) and how to evaluate your system, as part of the assignment, the teaching assistants will be able to help you out. You may also contact Simone Ooms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Literature Literature in support of the second assignment is linked to from the text of the assignment whenever deemed relevant. There are a number of useful resources concerning the Internet of Things that we would like to point out specifically, as these are also required reading for the second exam of the Interaction technology course. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1791","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herlaar.net\/b3it\/wp-json\/wp\/v2\/pages\/1791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herlaar.net\/b3it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herlaar.net\/b3it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herlaar.net\/b3it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/herlaar.net\/b3it\/wp-json\/wp\/v2\/comments?post=1791"}],"version-history":[{"count":33,"href":"https:\/\/herlaar.net\/b3it\/wp-json\/wp\/v2\/pages\/1791\/revisions"}],"predecessor-version":[{"id":2920,"href":"https:\/\/herlaar.net\/b3it\/wp-json\/wp\/v2\/pages\/1791\/revisions\/2920"}],"wp:attachment":[{"href":"https:\/\/herlaar.net\/b3it\/wp-json\/wp\/v2\/media?parent=1791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}