Course overview

How to Design IoT & Smart Infrastructure

52 modules
210 lessons
—
Part 1

Course Setup and the Incremental Ladder

  1. Course Setup and the Incremental LadderSign in

  2. Why Sensors to CitiesSign in

  3. How to Use This CourseSign in

  4. The Incremental Ladder (Step 0 to Step 6)Sign in

  5. The Course LensesSign in

  6. Diagram Legend and Notation TypesSign in

Part 2

What Is IoT and Smart Infrastructure?

  1. What Is IoT and Smart Infrastructure?Sign in

  2. From "Device with Wi-Fi" to InfrastructureSign in

  3. Consumer vs Industrial vs Smart CitySign in

  4. Systems-of-Systems ThinkingSign in

Part 3

Sensing, Actuation, and Feedback Loops

  1. Sensing, Actuation, and Feedback LoopsSign in

  2. Measure-Decide-Act: the Minimal Control LoopSign in

  3. Physical to Digital: signals, samples, and eventsSign in

  4. Open-Loop vs Closed-Loop ControlSign in

Part 4

Constraints in IoT Systems

  1. Constraints in IoT SystemsSign in

  2. Power, Bandwidth, Compute, Cost: Constraints as Architecture InputsSign in

  3. Harsh Environments: When the World Is Part of the SystemSign in

  4. Longevity and Obsolescence: Designing for 10+ Years of ChangeSign in

Part 5

Reference Layers in IoT Architecture

  1. Reference Layers in IoT ArchitectureSign in

  2. Layered Model: Device, Connectivity, Edge/Gateway, Cloud Platform, ApplicationSign in

  3. Control Planes vs Data Planes: Separating Configuration/Identity from Telemetry/CommandsSign in

  4. Responsibilities and SLIs: Where You Measure Health and Who Owns Which BoundarySign in

Part 6

Diagramming IoT and Smart City Systems

  1. Diagramming IoT and Smart City SystemsSign in

  2. Device Stack Diagrams: MCU, Sensors, Radios, Power, and Firmware BoundariesSign in

  3. Edge-Gateway-Cloud Topologies: Making Data and Control Paths ExplicitSign in

  4. City-Scale Maps and Overlays: Domains, Zones, Tenants, and Failure DomainsSign in

Part 7

Step 0 Sensors: Types and Characteristics

  1. Step 0 Sensors: Types and CharacteristicsSign in

  2. Sensor Families: Environmental, Motion, Position, Meters, and What Each Implies About Sampling and TrustSign in

  3. Range, Resolution, Accuracy, Drift: How Sensors Fail and How You Detect Quiet DegradationSign in

  4. Noise and Sampling Strategy: When Measurement Becomes a Data-Quality Problem at the SourceSign in

Part 8

Step 0 Actuators and Mechanisms

  1. Step 0 Actuators and MechanismsSign in

  2. Actuator Types: Relays, Motors, Valves, Lighting, Locks as "Outputs with Consequences"Sign in

  3. Power Budgets and Duty Cycles: Thermal and Electrical Constraints as System LimitsSign in

  4. Fail-Safe Positions and Mechanics: Designing Safe Behavior When Control Is LostSign in

Part 9

Step 0 Low-Power Embedded Devices

  1. Step 0 Low-Power Embedded DevicesSign in

  2. MCU vs MPU vs SoC: Capability Envelopes and What They Buy You in Software StructureSign in

  3. Sleep/Wake and Duty Cycling: Energy as the Primary Scheduling ConstraintSign in

  4. Local Storage and Memory Limits: Buffering, Loss, and ExplainabilitySign in

Part 10

Step 0 Local Buses and Short-Range Links

  1. Step 0 Local Buses and Short-Range LinksSign in

  2. I2C, SPI, UART, and GPIO Concepts as a Local Reliability BoundarySign in

  3. Polling and Bus Topologies as Failure Propagation DesignSign in

  4. First Integration Failure Modes as Systems BugsSign in

Part 11

Step 0 Connectivity Protocols: First Look

  1. Step 0 Connectivity Protocols: First LookSign in

  2. Wi-Fi, BLE, LPWAN-ish, Cellular, and Ethernet - Choosing Transport by ConstraintSign in

  3. Range, Bandwidth, Power, and Cost Trade SpaceSign in

  4. Matching Connectivity to Use Case - Telemetry-Only vs Command-and-ControlSign in

Part 12

Step 0 Single Device, Single Link Architectures

  1. Step 0 Single Device, Single Link ArchitecturesSign in

  2. The Minimal "Thing" - Sensor + Controller + Link + Simple BackendSign in

  3. First Telemetry Loop - Sense -> Send -> Log, and What "Loss" MeansSign in

  4. Why This Breaks at Scale - The Missing Concerns That Force Step 1 and BeyondSign in

Part 13

Step 1 Device Identity and Addressing

  1. Step 1 Device Identity and AddressingSign in

  2. Hardware Identifiers - Serials, MACs, and Why They Are Not Enough on Their OwnSign in

  3. Logical IDs and Namespaces - Stable Identities Across Networks, Vendors, and ReplacementsSign in

  4. Identity vs Addressing - Separating Who a Device Is from Where It Currently IsSign in

Part 14

Step 1 Provisioning and Onboarding

  1. Step 1 Provisioning and OnboardingSign in

  2. Manufacturing vs Field Provisioning - Different Trust Assumptions and Different WorkflowsSign in

  3. Keys, Certs, Secure Elements (Conceptual) - Bootstrapping Secure Comms Without Leaking SecretsSign in

  4. Commissioning UX - Installer Tools, QR Flows, and How Operational Mistakes Become Security IncidentsSign in

Part 15

Step 1 Lifecycle States and Transitions

  1. Step 1 Lifecycle States and TransitionsSign in

  2. Fleet State Machines - Staging, Active, Suspended, and Decommissioned as Explicit System RealitySign in

  3. Faulted and Quarantined Modes - Containment as a First-Class Design GoalSign in

  4. Maintenance States - Designing Transitions That Do Not Strand Devices or DataSign in

Part 16

Step 1 Device Registry and Digital Twins (Conceptual)

  1. Step 1 Device Registry and Digital Twins (Conceptual)Sign in

  2. Registry as System of Record - Why "Inventory" Is a Core Platform ServiceSign in

  3. Digital Twin Basics - Configuration, Status, and Telemetry as a Unified RepresentationSign in

  4. Assets vs Devices vs Locations - Modeling the World You Operate, Not Just the Hardware You ShipSign in

Part 17

Step 1 Configuration and Policy Management

  1. Step 1 Configuration and Policy ManagementSign in

  2. Per-Device vs Group Policy - Scaling Intent Without Losing Exceptions and OverridesSign in

  3. Rollouts and Safety - Staged Configuration Changes and Blast-Radius ControlSign in

  4. Misconfiguration Recovery - Detecting, Rolling Back, and Preventing RepeatsSign in

Part 18

Step 1 Inventory, Ownership, and Metadata

  1. Step 1 Inventory, Ownership, and MetadataSign in

  2. Ownership and Zones - Mapping Devices to Customers, Districts, and AgenciesSign in

  3. Metadata and Tagging - Capabilities, Firmware Versions, and Status as Queryable Control SurfacesSign in

  4. Governance of Visibility and Control - Who Can See and Operate What, and Why It Must Be AuditableSign in

Part 19

Step 2 Edge, Gateway, and Cloud Roles

  1. Step 2 Edge, Gateway, and Cloud RolesSign in

  2. Responsibility Boundaries - Device vs Gateway vs Cloud Services, and What Each Must Remain Correct Under FailureSign in

  3. Thin vs Smart Devices - Capability Distribution as a Lifecycle and Security DecisionSign in

  4. Gateways as Translators - Aggregation, Buffering, and Protocol Translation as System StabilizersSign in

Part 20

Step 2 Partitioning Logic: What Runs Where

  1. Step 2 Partitioning Logic: What Runs WhereSign in

  2. Filtering and Aggregation at the Edge - Reducing Bandwidth and Improving Resilience with Local DecisionsSign in

  3. Local vs Cloud Control - Latency and Reliability Requirements that Force Control PlacementSign in

  4. Cost and Operability - Where Complexity Lives and Who Must Debug It at 3 a.m.Sign in

Part 21

Step 2 Handling Intermittent Connectivity

  1. Step 2 Handling Intermittent ConnectivitySign in

  2. Store-and-Forward - Buffering Semantics and Durability ExpectationsSign in

  3. Degraded Modes - What a Device or Gateway Does When It Cannot Reach the CloudSign in

  4. Reconciliation After Reconnect - Deduplication, Ordering, and Eventual Truth for Telemetry and CommandsSign in

Part 22

Step 2 Edge Application Models

  1. Step 2 Edge Application ModelsSign in

  2. Gateway App Models Conceptually - Containers or Processes as Deployable Edge WorkloadsSign in

  3. Secure Deployment and Updates - Pushing Code to the Edge Without Creating a New Attack SurfaceSign in

  4. Sandboxing and Resource Limits - Preventing One Workload from Destabilizing the Whole SiteSign in

Part 23

Step 2 Cloud Services for IoT

  1. Step 2 Cloud Services for IoTSign in

  2. Core Platform Services - Messaging, Registry, and Device Management Roles (Conceptual)Sign in

  3. Processing and Analytics Stack - Turning Device Data into Usable System OutputsSign in

  4. Enterprise Integration Boundaries - APIs and Interoperability with Systems of RecordSign in

Part 24

Step 2 Edge–Cloud Architecture Patterns

  1. Step 2 Edge–Cloud Architecture PatternsSign in

  2. Canonical Telemetry Path - Sensor -> Gateway -> Event Hub -> Processing -> StorageSign in

  3. Local Clusters with Shared Gateways - Site-Level Isolation and Failure ContainmentSign in

  4. Multi-Tier Edge Hierarchies - Field -> Regional -> Cloud Patterns for Geography and ResilienceSign in

Part 25

Step 3 Ingestion Pipelines for IoT Data

  1. Step 3 Ingestion Pipelines for IoT DataSign in

  2. Protocol Families Conceptually - MQTT-ish, HTTP-ish, Streaming Ingestion and Their SemanticsSign in

  3. Ingestion Endpoints and Gateways - Control Load and Validate EarlySign in

  4. Backpressure and Admission Control - When "Accept Everything" Triggers City-Scale OutagesSign in

Part 26

Step 3 Data Models for Telemetry and Events

  1. Step 3 Data Models for Telemetry and EventsSign in

  2. Metrics vs Events vs Logs from Devices - Choosing Representations That Fit Queries and DecisionsSign in

  3. Common Schema Skeleton - Timestamp, Device ID, Measurements, Tags as Stable MinimalismSign in

  4. Heterogeneous Devices - Schemas That Tolerate Missing Sensors and Evolving CapabilitiesSign in

Part 27

Step 3 Normalization and Enrichment

  1. Step 3 Normalization and EnrichmentSign in

  2. Unit Normalization and Calibration - Turning Raw Readings into Comparable SignalsSign in

  3. Context Enrichment - Location, Asset, Topology, and Why "Where" Is Often the Primary IndexSign in

  4. Validation and Filtering - Rejecting Bad Data Without Masking Real IncidentsSign in

Part 28

Step 3 Storage for IoT and Smart Infrastructure

  1. Step 3 Storage for IoT and Smart InfrastructureSign in

  2. Storage Families Conceptually - Time-Series, Lakes, Operational DBs, and How Workloads DifferSign in

  3. Hot vs Cold Data - Retention, Aggregation, and Cost BoundariesSign in

  4. Indexing by Time, Device, and Geography - Designing for the Queries Operations Teams Actually RunSign in

Part 29

Step 3 Streaming and Batch for IoT

  1. Step 3 Streaming and Batch for IoTSign in

  2. Real-Time Monitoring vs Batch Analytics - Freshness Versus Completeness as a Trade-OffSign in

  3. Streaming Pipelines Integration - Connecting to Broader Event and Stream ArchitecturesSign in

  4. Reprocessing and Backfills - Changing Logic Without Losing Auditability of Past OutputsSign in

Part 30

Step 3 Data Access Patterns and APIs

  1. Step 3 Data Access Patterns and APIsSign in

  2. Dashboards and Apps - Serving Humans and Systems With Different Latency and Correctness NeedsSign in

  3. Query Dimensions - Location, Asset, Time Range, and Event Type as Core Access KeysSign in

  4. Multi-Tenant Data Access Control - Enforcing Visibility Boundaries Without Fragmenting the PlatformSign in

Part 31

Step 4 Downlink Command Channels

  1. Step 4 Downlink Command ChannelsSign in

  2. Reliable vs Best-Effort Commands - Choosing Semantics That Match Actuator ConsequencesSign in

  3. Queues, ACKs, Retries - Delivery Mechanics and the New Failure Modes They IntroduceSign in

  4. Idempotency and Sequencing - Preventing Duplicate Actions and Conflicting CommandsSign in

Part 32

Step 4 Configuration, Firmware, and Policy Updates

  1. Step 4 Configuration, Firmware, and Policy UpdatesSign in

  2. OTA Update Patterns Conceptually - The Architecture of Changing Devices in the FieldSign in

  3. Canary and Rollback - Minimizing Blast Radius Across Thousands of DevicesSign in

  4. Update Safety Constraints - Power Loss, Intermittent Links, and Bricking PreventionSign in

Part 33

Step 4 Rules Engines and Automation Workflows

  1. Step 4 Rules Engines and Automation WorkflowsSign in

  2. ECA Rules - Event-Condition-Action as a Compositional Automation PrimitiveSign in

  3. Schedules and Calendar Behaviors - Time as a Policy Input and a Source of SurprisesSign in

  4. Cross-System Workflows - Coordinating Devices, Data, and External Services Without Runaway LoopsSign in

Part 34

Step 4 Closed-Loop Control in IoT

  1. Step 4 Closed-Loop Control in IoTSign in

  2. Sensor Feedback to Actuation - Closing the Loop and Naming Control BoundariesSign in

  3. Latency and Jitter - When Network Variability Breaks Control StabilitySign in

  4. Keeping Control Local - Deciding When Loops Must Stay On-Device or at the EdgeSign in

Part 35

Step 4 Human-in-the-Loop Operations

  1. Step 4 Human-in-the-Loop OperationsSign in

  2. Operator Overrides - Designing Safe Manual Control and Reconciliation with AutomationSign in

  3. Alerts and Escalation - Turning Telemetry into Accountable ActionSign in

  4. SCADA/BMS-like Integration Concepts - Interfacing with Existing Operational Systems and PracticesSign in

Part 36

Step 4 Orchestrating Fleets and Zones

  1. Step 4 Orchestrating Fleets and ZonesSign in

  2. Policy by Group - Buildings, Districts, and Domains as Orchestration UnitsSign in

  3. Coordinated Behaviors - Demand Response and Other Multi-Device Programs as Distributed Control ProblemsSign in

  4. Priority and Conflict Resolution - What Happens When Rules Disagree and Humans InterveneSign in

Part 37

Step 5 Threat Models for IoT and Smart Cities

  1. Step 5 Threat Models for IoT and Smart CitiesSign in

  2. Device, Network, and Cloud Threats - Mapping Attack Paths Across LayersSign in

  3. Safety vs Security vs Privacy - Different Harms, Different Mitigations, Shared BoundariesSign in

  4. Impact Analysis - What "Outage" Means When Systems Affect Public ServicesSign in

Part 38

Step 5 Device and Firmware Security

  1. Step 5 Device and Firmware SecuritySign in

  2. Secure Boot Conceptually - Establishing Trust from Power-On to RuntimeSign in

  3. Hardening and Minimizing Attack Surface - Making Compromise Harder and Less ValuableSign in

  4. Signed Updates - Preserving Integrity Across Long-Lived Devices and Changing ToolchainsSign in

Part 39

Step 5 Network and Cloud Security for IoT

  1. Step 5 Network and Cloud Security for IoTSign in

  2. Mutual Authentication - Establishing Device-Gateway-Cloud Trust Without Shared FantasySign in

  3. Segmentation - OT vs IT Boundaries and the Real Problem of Lateral MovementSign in

  4. Zero-Trust-Inspired Patterns - Identity-Based Policy Enforcement for Device TrafficSign in

Part 40

Step 5 Safety and Fail-Safe Design

  1. Step 5 Safety and Fail-Safe DesignSign in

  2. Safe States - Actuator Behavior Under Loss of Control, Corruption, or UncertaintySign in

  3. Redundancy and Fallback - Designing for Partial Functionality Rather Than Total CollapseSign in

  4. Degradation Strategy - Graceful Degradation as a Platform Promise with Measurable OutcomesSign in

Part 41

Step 5 Monitoring, Alarming, and Incident Response

  1. Step 5 Monitoring, Alarming, and Incident ResponseSign in

  2. Security Monitoring for IoT - Detecting Anomalies Across Fleets and ZonesSign in

  3. Containment Actions - Isolate Devices, Block Commands, Freeze Automation, and Communicate ImpactSign in

  4. Post-Incident Remediation - Fleet-Wide Fixes, Policy Changes, and Preventing RecurrenceSign in

Part 42

Step 5 Governance, Compliance, and Civic Responsibility

  1. Step 5 Governance, Compliance, and Civic ResponsibilitySign in

  2. Data Privacy and Retention - Policies That Survive Vendor Change and Organizational TurnoverSign in

  3. Public Trust and Transparency - Accountability as an Operational RequirementSign in

  4. Interoperability and Standards - Avoiding Lock-In and Enabling Multi-Vendor EcosystemsSign in

Part 43

Step 6 City-Scale Reference Domains

  1. Step 6 City-Scale Reference DomainsSign in

  2. Mobility and Traffic - Sensing and Actuation Under Safety and Latency ConstraintsSign in

  3. Energy and Utilities - Reliability, Metering Integrity, and Cross-Domain CoordinationSign in

  4. Environment and Public Safety - Monitoring, Alerts, and the Boundary Between Observation and InterventionSign in

Part 44

Step 6 Smart City Platforms and Data Hubs

  1. Step 6 Smart City Platforms and Data HubsSign in

  2. Central vs Domain Platforms - Governance Trade-offs Between Uniformity and SpecializationSign in

  3. APIs for Civic Apps and Partners - Designing Data Access Without Losing Privacy and ControlSign in

  4. Cross-Agency Data Sharing - Boundaries, Contracts, and Operational CoordinationSign in

Part 45

Step 6 Multi-Stakeholder Governance and Ownership

  1. Step 6 Multi-Stakeholder Governance and OwnershipSign in

  2. Stakeholder Map - City, Utilities, Operators, Vendors, Citizens as Competing ObjectivesSign in

  3. Responsibility Boundaries - Who Owns Outages, Data Quality, and Safety OutcomesSign in

  4. SLAs, Contracts, Accountability - Treating Governance as Part of System ArchitectureSign in

Part 46

Step 6 Operations, Maintenance, and Field Workflows

  1. Step 6 Operations, Maintenance, and Field WorkflowsSign in

  2. Work Orders and Truck Rolls - Field Operations as the Real Last Mile of ReliabilitySign in

  3. Asset and Lifecycle Management at Scale - Replacements, Upgrades, and Decommissioning as RoutineSign in

  4. Predictive Maintenance Inputs - Using Telemetry to Schedule Work Without Over-Trusting ModelsSign in

Part 47

Step 6 Scaling from Pilot to City-Wide

  1. Step 6 Scaling from Pilot to City-WideSign in

  2. Pilot vs Production - What Changes When the System Becomes CriticalSign in

  3. Rollouts by District and Domain - Controlling Blast Radius and Learning Rate SimultaneouslySign in

  4. Brownfield Integration - Coexistence with Legacy Systems and Partial ModernizationSign in

Part 48

Step 6 Resilience, Disaster Scenarios, and Continuity

  1. Step 6 Resilience, Disaster Scenarios, and ContinuitySign in

  2. Designing for Outages: power loss, network loss, and degraded operations as expected statesSign in

  3. Local autonomy vs central coordination: emergency postures and control placementSign in

  4. Testing and drills: validating resilience as an operational discipline, not a documentSign in

Part 49

Step 6 Case-Style Reference Architectures

  1. Step 6 Case-Style Reference ArchitecturesSign in

  2. Smart Building Campus - Site Gateways, Automation, and Tenancy BoundariesSign in

  3. Traffic Corridor and Mobility Hub - Latency, Safety, and Operational Monitoring PatternsSign in

  4. Smart Grid Neighborhood - Reliability, Security, and Multi-Stakeholder Control SurfacesSign in

Part 50

IoT Architecture Patterns

  1. IoT Architecture PatternsSign in

  2. Telemetry-Only vs Command-and-Control vs Control-Loop Systems: escalating responsibility and riskSign in

  3. Device-Gateway-Cloud vs Direct-to-Cloud: topology choices and failure containmentSign in

  4. Narrowband Low-Power vs High-Bandwidth Systems: designing for constraints versus designing for richnessSign in

Part 51

Operational and Organizational Patterns

  1. Operational and Organizational PatternsSign in

  2. Team Models: platform vs domain teams vs vendor partnerships and how boundaries affect reliabilitySign in

  3. Funding and Business Models: incentives that shape platform longevity and maintenanceSign in

  4. Platform as Product for Civic Tech: roadmaps, onboarding, and measurable value deliverySign in

Part 52

Design Checklists for IoT and Smart Infrastructure

  1. Design Checklists for IoT and Smart InfrastructureSign in

  2. Device and Hardware Checklist: sensing, actuation, power, and field constraintsSign in

  3. Connectivity, Edge, Cloud Checklist: identity, buffering, partitioning, and operabilitySign in

  4. Data, Automation, Safety, Governance Checklist: making outcomes safe, auditable, and sustainableSign in