100% found this document useful (1 vote)
8 views

Enabling the Internet of Things: Fundamentals, Design and Applications Muhammad Azhar Iqbal - Quickly download the ebook in PDF format for unlimited reading

The document is an overview of the book 'Enabling the Internet of Things: Fundamentals, Design, and Applications' by Muhammad Azhar Iqbal and others, published by Wiley in 2021. It includes links to download the book and related resources, as well as a detailed table of contents covering various aspects of IoT, including fundamentals, building blocks, sensing principles, and IoT gateways. Additionally, it emphasizes the importance of IoT architecture and protocols in the development of IoT systems.

Uploaded by

buqjadlems
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
8 views

Enabling the Internet of Things: Fundamentals, Design and Applications Muhammad Azhar Iqbal - Quickly download the ebook in PDF format for unlimited reading

The document is an overview of the book 'Enabling the Internet of Things: Fundamentals, Design, and Applications' by Muhammad Azhar Iqbal and others, published by Wiley in 2021. It includes links to download the book and related resources, as well as a detailed table of contents covering various aspects of IoT, including fundamentals, building blocks, sensing principles, and IoT gateways. Additionally, it emphasizes the importance of IoT architecture and protocols in the development of IoT systems.

Uploaded by

buqjadlems
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

Visit ebookmass.

com to download the full version and


explore more ebook or textbook

Enabling the Internet of Things: Fundamentals,


Design and Applications Muhammad Azhar Iqbal

_____ Click the link below to download _____


https://ebookmass.com/product/enabling-the-internet-of-
things-fundamentals-design-and-applications-muhammad-azhar-
iqbal/

Explore and download more ebook or textbook at ebookmass.com


Here are some recommended products that we believe you will be
interested in. You can click the link to download.

Internet of Things. Systems Design. Lab Book Charith


Perera

https://ebookmass.com/product/internet-of-things-systems-design-lab-
book-charith-perera/

Internet of Multimedia Things (IoMT): Techniques and


Applications Shailendra Shukla

https://ebookmass.com/product/internet-of-multimedia-things-iomt-
techniques-and-applications-shailendra-shukla/

Chemistry of Nanomaterials: Fundamentals and Applications


1st Edition Tahir Iqbal Awan

https://ebookmass.com/product/chemistry-of-nanomaterials-fundamentals-
and-applications-1st-edition-tahir-iqbal-awan/

The Internet of Things John Davies

https://ebookmass.com/product/the-internet-of-things-john-davies/
Chemical, Gas, and Biosensors for Internet of Things and
Related Applications Kohji Mitsubayashi

https://ebookmass.com/product/chemical-gas-and-biosensors-for-
internet-of-things-and-related-applications-kohji-mitsubayashi/

Machine Learning and the Internet of Things in Education:


Models and Applications John Bush Idoko

https://ebookmass.com/product/machine-learning-and-the-internet-of-
things-in-education-models-and-applications-john-bush-idoko/

Internet Of Things 1st Edition Raj Kamal

https://ebookmass.com/product/internet-of-things-1st-edition-raj-
kamal/

MicroPython for the Internet of Things (2nd Edition)


Charles Bell

https://ebookmass.com/product/micropython-for-the-internet-of-
things-2nd-edition-charles-bell/

Connecting the Internet of Things - IoT Connectivity


Standards and Solutions Anil Kumar

https://ebookmass.com/product/connecting-the-internet-of-things-iot-
connectivity-standards-and-solutions-anil-kumar/
Enabling the Internet of Things:
Fundamentals, Design, and Applications
Enabling the Internet of Things:
Fundamentals, Design, and Applications

Muhammad Azhar Iqbal


Southwest Jiaotong University, China

Sajjad Hussain
University of Glasgow, UK

Huanlai Xing
Southwest Jiaotong University, China

Muhammad Ali Imran


University of Glasgow, UK


This edition first published 2021
© 2021 John Wiley & Sons Ltd
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to
obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
The right of Muhammad Azhar Iqbal, Sajjad Hussain, Huanlai Xing, and Muhammad Ali Imran to be identified as the authors
of this work has been asserted in accordance with law.
Registered Offices
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
Editorial Office
The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
For details of our global editorial offices, customer services, and more information about Wiley products visit us at
www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by print‐on‐demand. Some content that appears in
standard print versions of this book may not be available in other formats.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or
warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties,
including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may
be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that
an organization, website, or product is referred to in this work as a citation and/or potential source of further information does
not mean that the publisher and authors endorse the information or services the organization, website, or product may provide
or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering
professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a
specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared
between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or
any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress Cataloging‐in‐Publication Data


Names: Iqbal, Muhammad Azhar, author. | Hussain, Sajjad,
author. | Huanlai, Xing, author. | Imran, Muhammad Ali, author.
Title: Enabling the internet of things : fundamentals, design, and
applications / Muhammad Azhar Iqbal, Sajjad Hussain, Huanlai Xing,
Muhammad Ali Imran.
Description: First edition. | Hoboken, NJ : Wiley, 2021. | Series: Wiley ‐
IEEE | Includes bibliographical references and index.
Identifiers: LCCN 2020040726 (print) | LCCN 2020040727 (ebook) | ISBN
9781119701255 (cloth) | ISBN 9781119701477 (adobe pdf) | ISBN
9781119701484 (epub)
Subjects: LCSH: Internet of things.
Classification: LCC TK5105.8857 .I77 2021 (print) | LCC TK5105.8857
(ebook) | DDC 004.67/8‐‐dc23
LC record available at https://lccn.loc.gov/2020040726
LC ebook record available at https://lccn.loc.gov/2020040727

Cover Design: Wiley


Cover Image: © ivanastar/Getty Images

Set in 9.5/12.5pt STIXTwoText by SPi Global, Chennai, India

10 9 8 7 6 5 4 3 2 1
v

­Contents

About the Authors xiii


Preface xv
Acknowledgments xix

1 Internet of Things (IoT) Fundamentals 1


1.1 Introduction 1
1.2 Evolution of IoT Concept 2
1.3 ­IoT Vision 3
1.4 ­IoT Definition 5
1.5 ­IoT Basic Characteristics 6
1.6 ­IoT Distinction 7
1.6.1 IoT Versus Embedded Systems 7
1.6.2 IoT Versus M2M 7
1.6.3 IoT Versus CPS 7
1.6.4 IoT Versus WSN 8
1.6.5 IoT Versus WoT 8
1.7 ­IoT General Enablers 9
1.7.1 Identification and Sensing Technologies 10
1.7.2 Wireless Communication and Networking 11
1.7.3 Aggregation Standardization 14
1.7.4 Augmented Intelligence 14
1.7.5 Augmented Behavior 15
1.8 ­IoT Architectures 16
1.8.1 Three-layer IoT Architecture 17
1.8.1.1 Perception Layer 17
1.8.1.2 Network Layer 18
1.8.1.3 Application Layer 18
1.8.2 Five-Layer IoT Architecture 19
1.8.2.1 Object (Perception) Layer 19
1.8.2.2 Object Abstraction (Network) Layer 19
1.8.2.3 Service Management (Middleware) Layer 19
1.8.2.4 Application Layer 19
vi Contents

1.8.2.5 Business Layer 19


1.8.3 Six-layer Architecture 20
1.8.3.1 Focus Layer 21
1.8.3.2 Cognizance Layer 21
1.8.3.3 Transmission Layer 21
1.8.3.4 Application Layer 21
1.8.3.5 Infrastructure Layer 21
1.8.3.6 Competence Business Layer 21
1.8.4 Seven-layer Architecture 21
1.8.4.1 Layer 1: Things Layer 21
1.8.4.2 Layer 2: Connectivity 21
1.8.4.3 Layer 3: Edge/Fog Computing 22
1.8.4.4 Layer 4: Data Accumulation 23
1.8.4.5 Layer 5: Data Abstraction Layer 23
1.8.4.6 Level 6: Application Layer 23
1.8.4.7 Layer 7: Collaboration and Processes 23
1.9 ­Advantages and Disadvantages of IoT 23
Review Questions 23
­References 25

2 IoT Building Blocks – Hardware and Software 29


2.1 ­IoT Building Blocks 29
2.2 ­The Smart Things 29
2.2.1 Smart Thing Sensor 30
2.2.2 Smart Thing Communicator 31
2.2.3 Smart Thing Actuator 31
2.2.4 Smart Thing Controller 32
2.2.4.1 Microcontroller (MCU) 32
2.2.4.2 Development Boards 32
2.2.4.3 Packet Tracer and MCUs 33
2.2.5 Smart Thing Capabilities 36
2.3 ­The IoT Gateway 38
2.4 ­Network Infrastructure 39
2.5 ­IoT Cloud 39
2.5.1 Virtual Resource Pool 39
2.5.2 Application Server 39
2.5.3 Database Servers 40
2.5.4 Load-balancing Servers 41
2.6 ­IoT Analytics 41
2.6.1 IoT Analytics – Tools and Techniques 42
2.6.2 IoT Analytics Life Cycle 43
2.7 ­IoT Applications 43
Review Questions 43
­References 45
Contents vii

3 Sensing Principles and Wireless Sensor Network 49


3.1 ­Sensor Fundamentals 49
3.2 ­Sensor Classification 51
3.2.1 Simple (Direct) Sensor Versus Complex Sensor 51
3.2.2 Active Sensors Versus Passive Sensors 51
3.2.3 Contact Sensors Versus Noncontact Sensors 52
3.2.4 Absolute Sensors and Relative Sensors 52
3.2.5 Digital Sensors Versus Analog Sensors (Based on Output) 52
3.2.6 Scalar Sensor Versus Vector Sensors (Based on Data Types) 52
3.3 ­Anatomy of Sensors 52
3.4 ­Physical Principles of Sensing 53
3.4.1 Capacitance 53
3.4.1.1 Examples of Capacitive Sensors 55
3.4.2 Magnetism and Induction 57
3.4.2.1 Magnetic Sensing Examples 59
3.4.3 Electric Resistance and Resistivity 60
3.4.3.1 Resistive Sensor Applications 61
3.4.4 Piezoelectric Effect 61
3.5 ­Use of Basic Sensing Principles in RFID Technology 61
3.6 ­Actuators 62
3.7 ­Wireless Sensor Networks (WSNs) 63
3.7.1 WSN Architecture 63
3.7.2 Types of WSNs 64
3.7.3 General Characteristics of WSNs 64
3.7.4 Protocol Stack of WSNs 65
3.7.4.1 Physical Layer 65
3.7.4.2 Data Link Layer (DLL) 66
3.7.4.3 Network Layer 68
3.7.4.4 Transport Layer 68
3.7.4.5 Application Layer 69
3.7.4.6 Cross-layer WSN Protocols 69
3.7.5 WSN Operating Systems 69
3.7.5.1 WSN OS Design Issues 71
Review Questions 72
­References 72

4 IoT Gateway 75
4.1 ­The IoT Gateway 75
4.2 ­Sensing Domain and IoT Gateways 77
4.3 ­The Architecture of IoT Gateway 79
4.3.1 Hardware Layer of IoT Gateway 79
4.3.2 OS Layer of IoT Gateway 80
4.3.3 Hardware Abstraction Layer 80
4.3.4 Data Forwarding Layer 80
viii Contents

4.3.5 Service Abstraction Layer 81


4.3.6 Manageability Layer 81
4.3.7 Security Layer 81
4.3.8 Application Layer 81
4.4 ­Selection of IoT Gateway 81
4.4.1 Nature of IoT System Architecture 81
4.4.2 Multiple Network Connectivity Support 82
4.4.3 Data Storage Capacity 82
4.4.4 Development Environment 82
4.4.5 Robust Security Mechanism 82
4.4.6 External Hardware Watchdog Timer 83
4.4.7 Time Synchronization 83
4.4.8 Firmware Update 83
4.4.9 LED Indication and Remote Reboot 83
4.4.10 Support for Legacy Equipment 83
4.4.11 Standard Protocol Support 83
4.4.12 Gateway Certification 83
4.4.13 Control of Low Power Footprint 84
4.4.14 Support for Edge Computing 84
4.5 ­IoT Gateways and Edge Computing 84
4.5.1 Benefits of Edge Computing 84
4.5.2 Use Cases of Edge Computing 85
4.5.2.1 Smart Home 85
4.5.2.2 Cooperative Safety Smart Vehicles 86
4.5.2.3 Provisioning of Infotainment Services for Smart Vehicles 86
4.5.2.4 Online Shopping Service 86
4.5.2.5 Healthcare and Collaborative Edge 86
4.5.2.6 Video Monitoring and Analysis 87
4.5.2.7 Smart City 87
4.5.2.8 Security Surveillance 87
4.5.2.9 Retail Advertising 87
4.5.3 Challenges of Edge Computing-based IoT Systems 87
4.5.3.1 System Integration 88
4.5.3.2 Resource Management 88
4.5.3.3 Security and Privacy 88
4.5.3.4 Heterogenous Communication 88
4.5.3.5 Data Analysis Support for Smart Systems 88
4.6 ­IoT Gateway Providers 89
Review Questions 89
­References 90

5 IoT Protocol Stack 93


5.1 ­IoT Protocol Stack 93
5.2 ­IoT Protocols 95
Contents ix

5.2.1
Infrastructure Protocols 95
5.2.1.1
EPCglobal 95
5.2.1.2
Z-wave 96
5.2.1.3
Long-term Evolution – Advanced (LTE-A) 97
5.2.1.4
Bluetooth Low Energy (BLE) 97
5.2.1.5
IEEE 802.15.4 97
5.2.1.6
IEEE 802.11ah 98
5.2.1.7
ZigBee 100
6LoWPAN 102
5.2.1.8
Routing Protocol for Low-Power and Lossy Networks (RPL) 102
5.2.1.9
Service Discovery Protocols 104
5.2.2
Multicast Domain Name System (mDNS) 104
5.2.2.1
DNS Service Discovery (DNS-SD) 104
5.2.2.2
Application Layer Protocols 105
5.2.3
Data Distribution Service (DDS) 105
5.2.3.1
Message Queue Telemetry Transport (MQTT) 105
5.2.3.2
Constrained Application Protocol (CoAP) 111
5.2.3.3
Advanced Message Queuing Protocol (AMQP) 116
5.2.3.4
eXtensible Messaging and Presence Protocol (XMPP) 119
5.2.3.5
Review Questions 123
­References 124

6 IoT Cloud and Fog Computing 127


6.1 ­IoT Cloud 127
6.1.1 Cloud Computing for IoT 129
6.1.2 IoT Cloud Architecture 129
6.1.2.1 Virtual Resource Pool 130
6.1.2.2 Application Server 130
6.1.2.3 Database Servers 131
6.1.2.4 Load-balancing Servers 131
6.1.3 Application Domains of IoT Cloud Platforms 134
6.2 ­Fog Computing for IoT 135
6.2.1 Difference from Related Computing Paradigms 136
6.2.1.1 Edge Computing 136
6.2.1.2 Mobile Edge Computing (MEC) 136
6.2.2 Architecture of Fog Computing 137
6.2.2.1 Physical and Virtualization Layer 137
6.2.2.2 Monitoring Layer 137
6.2.2.3 Preprocessing Layer 137
6.2.2.4 Temporary Storage Layer 137
6.2.2.5 Security Layer 137
6.2.2.6 Transport Layer 139
6.2.3 Fog Deployment Models 139
6.2.4 Fog Service Models 140
x Contents

6.3 ­Case Study – Vehicles with Fog Computing 140


6.3.1 VANETs and Fog Computing 140
6.3.2 Dynamic Traffic Light Signal Management 141
6.3.3 Parking System 142
6.3.4 Content Distribution 143
6.3.5 Decision Support System 143
Review Questions 143
­References 144

7 IoT Applications 147


7.1 ­Application Domains of IoT 147
7.2 ­IoT and Smart Home 147
7.2.1 IoT-based Smart Home Framework 148
7.3 ­IoT and Healthcare 150
7.4 ­IoT and Smart Mobility 153
7.4.1 Car Parking System 156
7.5 ­IoT and Agriculture 159
7.5.1 Major Instances of Crop Growth and IoT 159
7.5.2 IoT Architecture of Smart Agriculture 160
7.6 ­Smart Grid 162
7.7 ­IoT-based Smart Cities 164
7.8 ­IoT and Smart Education 167
7.9 ­Industrial IoT 168
Review Questions 168
­References 170

8 IoT Security 173


8.1 ­IoT Systems and Security Constraints 173
8.1.1 IoT Security Constraints Based on Hardware Limitations 175
8.1.2 IoT Security Constraints Based on Software Limitations 176
8.1.3 IoT Security Constraints Based on Communication Limitations 176
8.2 ­IoT Security Requirements 176
8.2.1 Information-level Security Requirements 176
8.2.2 Access-level Security Requirements 177
8.2.3 Functional Security Requirements 177
8.3 ­Security Challenges 177
8.4 ­Taxonomy of IoT Security Threats/Attacks 178
8.4.1 IoT Security Attacks Based on Device Category 178
8.4.2 Attacks Based on Access Level 178
8.4.3 Attacks Based on Attacker’s Location 178
8.4.4 Attacks Based on Attack Strategy 178
8.4.5 Attacks Based on Information Damage Level 180
8.4.6 Host-based IoT Attacks 180
8.4.7 Protocol-based Attacks 180
Contents xi

8.5 ­IoT Architecture and IoT Security 180


8.5.1 Perception Layer Security 180
8.5.2 Network Layer Security 183
8.5.3 IoT Application Layer Security 185
8.5.3.1 Security Threats at Support Layer of IoT Applications 185
8.5.3.2 Security Threats at Service Layer of IoT Applications 185
8.6 ­Multilayer Security Attacks 186
8.7 ­IoT Application Scenarios and IoT Security 186
8.7.1 Smart Home Security 186
8.7.2 Smart Healthcare Security 187
8.7.3 Smart Vehicle Security 189
8.7.4 Smart City Security/Privacy Concerns 190
Review Questions 190
References 192

9 Social IoT 195


9.1 ­Smart Things to Social Things 195
9.2 ­The Epitome of SIoT 196
9.3 ­Smart Thing Relationships in SIoT 197
9.4 ­SIoT Architecture 198
9.4.1 SIoT Server 198
9.4.1.1 The Network Layer of SIoT Server 199
9.4.1.2 The Application Layer of SIoT Server 199
9.4.1.3 The Interface Sublayer 200
9.4.2 The SIoT Gateway and Social Things 200
9.5 ­Features of SIoT System 200
9.6 ­Social Internet of Vehicles (SIoV) – An Example Use Case of SIoT 201
9.6.1 Reference Architecture of VANETs 201
9.6.2 Reference Architecture of IoV 203
9.6.2.1 Differences in Communication Standards 203
9.6.3 Reference Architecture of SIoV 205
9.6.3.1 Vehicle-Object Perception Layer (VOPL) 205
9.6.3.2 The IoV Gateway Layer 208
9.6.3.3 The Fog Layer 209
9.6.3.4 The Vehicular Cloud Layer 209
9.7 ­SIoV Application Services 209
Review Questions 210
­References 210

10 Packet Tracer and IoT 213


10.1 ­IoT and Packet Tracer 213
10.2 ­Packet Tracer Programming Environment 214
10.3 ­Visual (Blockly) Programming Language 216
10.3.1 Hello World Program 217
Visit https://ebookmass.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
xii Contents

10.4 ­Simple Smart Light Project 219


10.4.1 Adding Devices to Workspace 222
10.4.2 Connecting Devices 224
10.4.3 Using Program Blocks and Pin Access 227
­References 234

11 IoT Projects in Packet Tracer 235


11.1 ­IoT Projects in Packet Tracer 235
11.2 ­Smart Things Directly Connected with Gateways 235
11.3 ­Smart Things and Sensors Directly Connected with MCUs (Without
Gateways) 237
11.3.1 Adding Devices to Workspace 240
11.3.2 Connecting Devices Together 241
11.3.3 Blockly Programming for Smart Room 242
Review Questions 255

Index 259
xiii

About the Authors

Muhammad Azhar Iqbal received his MS degree in Computer


Software Engineering from the National University of Sciences
and Technology, Pakistan, in 2007 and completed his PhD in
Communication and Information Systems from Huazhong
University of Science and Technology, China, in 2012. Currently,
he is working as Lecturer in School of Information Science and
Technology at Southwest Jiaotong University, China. Previously,
he has served as Associate Professor in Computer Science
department at Capital University of Science and Technology,
Pakistan. He has experience of teaching various basic and
advanced courses related to the domain of computing and
mobile/wireless communication and networks. His research interests include wireless ad
hoc networks, Internet of Things (IoT), and large-scale simulation modeling and analysis
of computer networks in Cloud.

Sajjad Hussain is a Senior Lecturer in Electronics and


Electrical Engineering at the University of Glasgow, UK. He has
served previously at Electrical Engineering Department, Capital
University of Science and Technology (CUST), Islamabad,
Pakistan as Associate Professor. Sajjad Hussain did his masters
in Wireless Communications in 2006 from Supelec, Gif-sur-
Yvette and PhD in Signal Processing and Communications in
2009 from University of Rennes 1, Rennes, France. His research
interests include 5G self-organizing networks, industrial wire-
less sensor networks and machine learning for wireless com-
munications. Sajjad Hussain is a senior member IEEE and
fellow Higher Education Academy.
xiv About the Authors

Huanlai Xing, received his B.Eng. degree in communica-


tions engineering from Southwest Jiaotong University,
Chengdu, China, in 2006; his M.Eng. degree in electromag-
netic fields and wavelength technology from Beijing University
of Posts and Telecommunications, Beijing, China, in 2009; and
his PhD degree in computer science from University of
Nottingham, Nottingham, UK, in 2013. He is an Associate
Professor with School of Information Science and Technology,
Southwest Jiaotong University. His research interests include
edge and cloud computing, network function virtualization,
software defined networking, and evolutionary computation.

Muhammad Ali Imran Fellow IET, Senior Member


IEEE, Senior Fellow HEA is Dean University of
Glasgow UESTC and a Professor of Wireless
Communication Systems with research interests in
self organised networks, wireless networked control
systems and the wireless sensor systems. He heads
the Communications, Sensing and Imaging CSI
research group at University of Glasgow and is the
Director of Glasgow-UESTC Centre for Educational
Development and Innovation. He is an Affiliate
Professor at the University of Oklahoma, USA and a
visiting Professor at 5G Innovation Centre, University of Surrey, UK. He has over 20
years of combined academic and industry experience with several leading roles in
multi-million pounds funded projects. He has filed 15 patents; has authored/co-
authored over 400 journal and conference publications; has edited 7 books and authored
more than 30 book chapters; has successfully supervised over 40 postgraduate students
at Doctoral level. He has been a consultant to international projects and local compa-
nies in the area of self-organised networks.
xv

­Preface

Objectives

The emerging paradigm of Internet‐of‐Things (IoT) plays a consequential role to improve


almost all aspects of human life, i.e. domestic automation, transportation, education,
health, agriculture, industry, etc. The simple conception of IoT as a network of identifiable
connected smart things is fundamentally based on the integration of various diversified
technologies including pervasive computing, sensor technology, embedded system, com-
munication technologies, sensor networking, Internet protocols, etc. for the provisioning
of intelligent computing services. In our experience we have noticed that although the
simple idea of IoT is easy to comprehend, at the undergraduate level, students are unable
to describe the importance and placement of IoT components in an IoT system. This book
tries to provide the basic, precise, and accurate demonstration of IoT building blocks as
well as their role in various IoT systems. The objective of this book is to provide a good
starting point for undergraduate students who have basic prior knowledge of Internet
architecture. At an abstract level, this book is an effort to partially fill the gap associated
with the understanding of IoT concepts through the designing of the IoT system prototypes
in Packet Tracer. We believe that after implementing IoT system prototypes in Packet
Tracer, students will find it easier to grasp complete details of IoT systems.

Key Feature

Concerning the building of IoT foundations, this book can be used as a textbook at the
undergraduate level. The key feature of this book is that it targets core aspects of IoT and
provides its readership a better perspective both in terms of basic understanding of IoT
technologies as well as the designing of IoT systems in Packet Tracer. To the best of our
knowledge, this book can be considered as the first attempt to design simple IoT systems
using Blockly programming language.
xvi ­Prefac

Audience

This book is suitable for undergraduate students enrolled in the IoT course. This book
assumes that the reader has a good understanding of Computer Networks and basic pro-
gramming concepts. Students are comprehensively facilitated in this book to explain IoT
essentials besides the guidance of designing IoT systems in Packet Tracer.

Approach

At the end of each chapter, review questions in the form of case studies have been asked to
explore students’ clarity about IoT concepts discussed in that particular chapter. In this
book, the design and implementation of IoT systems at an abstract level are presented in
Blockly language.

Organization of the Book

To address the issues related to the understanding of IoT fundamentals at the undergradu-
ate level, this book is structured as follows:
Chapter 1 is exclusively written to introduce the evolution, vision, definition, characteris-
tics, enablers, architectures of the IoT paradigm, and its distinction from other related
technologies. This chapter builds the foundation for the understanding of IoT systems
and is considered a prerequisite for the following chapters.
The primary focus of Chapter 2 is to establish an understanding of the IoT building blocks
along with the necessary details related to various IoT hardware and software technolo-
gies. Besides, this chapter also provides a concise design and implementation perspective
of IoT systems in Packet Tracer.
The contents of Chapter 3 are oriented along the lines of sensing principles and under-
standing of various aspects related to the design and implementation of wireless sensors
and sensor networks. The layer‐level functionality of wireless sensor networks in this
chapter explains the effective communication requirements of sensors in IoT systems.
Chapter 4 describes the basics of IoT gateways in terms of its architecture and functionali-
ties. In addition, this chapter also elaborates how IoT gateways having advanced features
of data filtering and analytics support Edge computing and how Edge computing‐based
solutions provide benefits to specific IoT‐based real‐life applications.
Chapter 5 discusses the mapping of IoT protocols to layered IoT architecture and provides
in‐depth details of various infrastructure, service discovery, and application layer proto-
cols of IoT protocol stack in terms of their functionality and usage in a real‐life scenario.
Chapter 6 focuses on the description and explanation of components and employment of
Cloud and Fog architectures in different IoT systems.
Chapter 7 introduces real‐life application domains (i.e. domestic automation, smart trans-
portation, smart agriculture and farming, smart manufacturing and industry
­Prefac xvii

automation, energy conservation, etc.) where the IoT technologies play a vital role to
improve the standard of human life through the automation of these systems.
In Chapter 8, the classification of IoT attacks, as well as constraints and requirements of
IoT systems, are discussed. Moreover, the discussion about security threats at each layer
of IoT architecture is also the part of this chapter.
Chapter 9 illustrates the nature of social relationships between IoT devices, explains the
functionality of the components of social IoT architecture, and provides an understand-
ing of the applicability of social aspects of smart devices in IoT applications.
Chapters 10 and 11 are devoted to the design and implementation details of IoT projects in
Packet Tracer exploiting constructs of Blockly programming language.
xix

Acknowledgments

We want to appreciate the efforts of the reviewing team at Wiley publishers for providing
us the feedback and opportunity to publish this book. We would like to acknowledge the
cooperation extended by our colleagues at Southwest Jiaotong University, China and the
University of Glasgow, United Kingdom. We would also like to thank our students Sana
Aurengzeb and Muhammad Talha (at Capital University of Science and Technology,
Pakistan) for providing their support for the implementation of IoT system prototypes in
Packet Tracer, which are part of Chapters 10 and 11 of this book. Finally, we want to
acknowledge the most important contribution of our families for showing patience and
understanding for the time we spent away from them while writing this book.
1

Internet of Things (IoT) Fundamentals

LEARNING OBJECTIVES
After studying this chapter, students will be able to:
• describe the evolution of the IoT concept.
• state the vision and definition of IoT.
• explain the basic characteristics of IoT.
• distinguish the IoT from other related technologies.
• elaborate the IoT enablers.
• explain the IoT architectures.
• articulate the pros and cons of IoT.
• apply the IoT architecture concepts for specific IoT applications.
• understand the implementation aspect of IoT architecture.

1.1 ­Introduction

In our daily lives, the augmented practice of Information and Communication Technologies
(ICT) plays a paramount role in the development of emerging information societies. In
developed countries, ICT is being employed to develop various innovative applications and
services to address the challenges of sustainable societies, thus improving the quality of
human lives. In the modern era, a plethora of things are being connected to each other
using underlying network technologies with an aim to promote the paradigm of the
Internet of Things (IoT). IoT is a network of uniquely identifiable connected things (also
known as devices, objects, and items) offering intelligent computing services [1]. Things in
IoT are also known as Smart Things that provide feasibility in performing the execution of
daily life operations in a rational way. Moreover, IoT also positively assists the communica-
tion process among human beings. IoT comprises diversified technologies including perva-
sive computing, sensor technology, embedded system, communication technologies,
sensor networking, Internet protocols, etc. which eventually underpin the economic
growth of modern societies. The fundamental notion behind IoT is the provision of seam-
less ubiquitous connectivity among things and human beings. The basic idea of IoT

Enabling the Internet of Things: Fundamentals, Design, and Applications, First Edition.
Muhammad Azhar Iqbal, Sajjad Hussain, Huanlai Xing, and Muhammad Ali Imran.
© 2021 John Wiley & Sons Ltd. Published 2021 by John Wiley & Sons Ltd.
2 1 Internet of Things (IoT) Fundamentals

Any Thing
i ce

An
ev

y
D

W
y Co
An

he
g n
tin ne

re
pu ct
ivi
m
Co ty

Any Network
Internet

Any Time
of
Things
e
nc

Co
ge
er

lle
nv

ct
io
Co

n
s An
es yC
sin u on
yB tex
An t

Figure 1.1 The concept of As and Cs in the IoT.

can be conceived as a representation of various As and Cs, as shown in Figure 1.1 [2]. In
Figure 1.1, the As reflect the concept of ubiquity or globalization (i.e. any device, anywhere,
anytime, any network etc.) and the Cs mirror the main characteristics of IoT (i.e. connec-
tivity, computing, convergence, etc.). IoT, in essence, can be seen as an addition of the third
dimension named “Thing” to the plane of ICT world, which is fundamentally based on two
dimensions of Place and Time as shown in Figure 1.2. This “anything” dimension ulti-
mately boosts the ubiquity by enabling new forms of communication of humans and things
and between things themselves [3].

1.2 ­Evolution of IoT Concept

The concept of ubiquitous computing through smart devices dates back to the early 1980s
when a Coke machine at Carnegie Mellon University was connected to the Internet and
able to report its inventory of cold drinks [4, 5]. Similarly, Mark Weiser in 1991 [6] provided
the contemporary vision of IoT through the terminologies of ubiquitous computing and
pervasive computing. Raji in 1994 elaborated the concept of home appliance automation to
entire factories [7]. In 1999, Bill Joy presented six web frameworks wherein device‐to‐device
communication could be formed [8]. Neil Gershenfeld in 1999 used a similar notion in his
popular book When Things Start to Think [9]. In the same year, the term “Internet of
Things” was promoted by Kevin Ashton during his work on Radio Frequency Identification
(RFID) infrastructure at the Auto‐ID Center of Massachusetts Institute of Technology
(MIT) [10]. In 2002, Kevin was quoted in Forbes Magazine with his saying “We need an
Internet for things, a standardized way for computers to understand the real world” [11].
The article was entitled as The Internet of Things, which was the first‐ever official docu-
ment with the use of this term in a literal sense.
The evolution of IoT with reference to the technological progress in Internet concep-
tion is shown in Figure 1.3. The typical Internet introduced in the early 1990s was
only concerned with the generation of static and dynamic contents on the World
Wide Web (WWW). Later on, large‐scale production and enterprise‐level business
1.3 ­IoT Vision 3

Any Thing
Connection

– Day
– Human to Human – Night
– Things to Things – 24/7
– Human to Things
– Things to Human Any Time
Connection

– Outdoor
– Indoor
– On Move
Any Place
Connection

Figure 1.2 Thing as a new dimension to endorse IoT. Source: Peña-López [3].

Pre-Internet Internet of Contents Internet of Services Internet of People IoT

M2M
Telephone WWW Web 2.0 Social Web WSN
SMS WoT

Figure 1.3 Technological progression in IoT.

collaborations initiated the creation of web services which laid the foundation of Web
2.0. Nevertheless, with the proliferation of affordable smartphones and tablets, social
network apps become dominant on the Internet. In current situation, advancements in
embedded system, Machine‐to‐Machine (M2M) communication, Cyber Physical Systems
(CPS), Wireless Sensor Network (WSN), and Web of Things (WoT) technology enabled
the communication of things over the Internet. The overall technological progression
related to IoT is shown in Figure 1.3.

1.3 ­IoT Vision

The conventional WWW offers the convenience of information searching, e‐mail conversa-
tion, and social networking. The emerging trend of IoT comes up with a vision of expand-
ing these abilities through interactions with a wide spectrum of electronic appliances. In
general, the IoT vision can be seen in terms of things centric and Internet centric. The
things‐centric vision encompasses the advancements of all technologies related to
the notion of “Smart Things.” On the other hand, the Internet‐centric vision involves the
advancement of network technologies to establish the connection of interactive smart
things with the storage, integration, and management of generated data. Based on these
Visit https://ebookmass.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
Other documents randomly have
different content
The Project Gutenberg eBook of The Young

Man and Journalism


This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

Title: The Young Man and Journalism

Author: Chester Sanders Lord

Release date: January 23, 2018 [eBook #56419]

Language: English

Credits: Produced by Chris Curnow and the Online Distributed


Proofreading Team at http://www.pgdp.net (This file
was
produced from images generously made available by
The
Internet Archive)

*** START OF THE PROJECT GUTENBERG EBOOK THE YOUNG MAN


AND JOURNALISM ***
V O C A T I O N A L S E R I E S

EDITED BY
E. HERSHEY SNEATH, Ph.D., LL.D., Yale University

THE YOUNG MAN AND


JOURNALISM
VOCATIONAL
SERIES
Edited by
E. HERSHEY
SNEATH
Ph.D., LL.D., Yale
University

The Young Man and


the Law. Simeon
E. Baldwin.

The Young Man and


Teaching. Henry
Parks Wright.

The Young Man and


Civil Engineering.
George Fillmore
Swain.

The Young Man and


Journalism.
Chester S. Lord.
THE YOUNG MAN AND
JOURNALISM
BY

CHESTER S. LORD, M.A., LL.D.


For forty-one years a member of the staff of the New York Sun
and for thirty-three years (1880–1913) its managing editor

New York
THE MACMILLAN COMPANY
1922
All rights reserved
PRINTED IN THE UNITED STATES OF AMERICA

Copyright, 1922,
By THE MACMILLAN COMPANY.

Set up and printed. Published November, 1922.

Press of
J. J. Little & Ives Company
New York, U. S. A.
EDITOR’S PROSPECTUS

One of the most important decisions a young man is called upon


to make relates to the determination of his life-work. It is fraught
with serious consequence for him. It involves the possibilities of
success and failure. The social order is such that he can best realize
his ends by the pursuit of a vocation. It unifies his purposes and
endeavors—making them count for most in the struggle for
existence and for material welfare. It furnishes steady employment
at a definite task as against changeable effort and an unstable task.
This makes for superior skill and greater efficiency which result in a
larger gain to himself and in a more genuine contribution to the
economic world.

But a man’s vocation relates to a much wider sphere than the


economic. It is intimately associated with the totality of his interests.
It is in a very real sense the center of most of his relations in life. His
intellectual interests are seriously dependent upon his vocational
career. Not only does the attainment of skill and efficiency call for
the acquisition of knowledge and development of judgment, but the
leisure that is so essential to the pursuit of those intellectual ends
which are a necessary part of his general culture is, in turn,
dependent, to a considerable extent, upon the skill and efficiency
that he acquires in his vocation.

Nor are his social interests less dependent upon his life-work. Men
pursuing the same calling constitute in a peculiar sense a great
fraternity or brotherhood bound together by common interests and
aims. These condition much of his social development. His wider
social relationships also are dependent, in a large measure, on the
success that he attains in his chosen field of labor.
Even his moral and spiritual interests are vitally centered in his
vocation. The development of will, the steadying of purpose, the
unfolding of ideals, the cultivation of vocational virtues, such as
industry, fidelity, order, honesty, prudence, thrift, patience,
persistence, courage, self-reliance, etc.—all of this makes
tremendously for his moral and spiritual development. The
vocationless man, no matter to what class he belongs, suffers a
great moral and spiritual disadvantage. His life lacks idealization and
is therefore wanting in unity and high moralization. His changeable
task, with its changeable efforts, does not afford so good an
opportunity for the development of the economic and social virtues
as that afforded the man who pursues a definite life-work. It lacks
also that discipline—not only mental, but moral—which the
attainment of vocational skill and efficiency involves.

But notwithstanding the important issues involved in a man’s


vocational career, little has been done in a practical or systematic
way to help our college young men to a wise decision in the
determination of their life-work. Commendable efforts are being put
forth in our public schools in this direction, but very little, indeed,
has been done in this respect in the sphere of higher education. To
any one familiar with the struggles of the average college student in
his efforts to settle this weighty question for himself, the perplexities,
embarrassment, and apparent helplessness are pathetic. This is due
largely to his ignorance of the nature of the professions and other
vocations which appeal most strongly to the college man.
Consequently, he does not know how to estimate his fitness for
them. He cannot advise to any extent with his father, because he
represents only one vocation. Neither can he advise advantageously
with his instructor for he, too, is familiar with the nature of only one
profession.

For this reason, a series of books, dealing with the leading


vocations, and prepared by men of large ability and experience,
capable of giving wise counsel, is a desideratum. Such men are
competent to explain the nature and divisions of the particular
vocations which they represent, the personal and educational
qualifications necessary for a successful pursuit of the same, the
advantages and disadvantages, the difficulties and temptations, the
opportunities and ideals; thus, in an adequate way, enabling the
student to estimate his own fitness for them. They are also able to
make valuable suggestions relating to the man’s work after he enters
upon his vocation.

Fortunately, in the present Series, the Editor has been able to


secure the services of some of the most eminent experts in the
country to prepare the respective volumes—men of large knowledge
and experience, who have attained wide recognition and genuine
success in their “callings.” It is a pleasure to be able to place at the
command of the many thousands of students in our American
colleges the wise counsel of such experienced and distinguished
men.

The “Vocational Series” will consist of twelve books written by


representatives of different vocations, as follow:

1. The Young Man and the Law


Hon. Simeon E. Baldwin, LL.D., Professor of Law, Emeritus, Yale
University, ex-Governor and ex-Chief Justice of Connecticut

2. The Young Man and the Ministry


Rev. Charles R. Brown, D.D., LL.D., Dean of the Divinity School,
Yale University

3. The Young Man and Teaching


Professor Henry Parks Wright, Ph.D., LL.D., Professor Emeritus
and formerly Dean of Yale College

4. The Young Man and Medicine


Lewellys F. Barker, M.D., LL.D., Professor of Medicine and Chief
Physician, Johns Hopkins University

5. The Young Man and Journalism


Chester Sanders Lord, M.A., LL.D., formerly Managing Editor,
New York Sun

6. The Young Man and Banking


Hon. Frank A. Vanderlip, M.A., LL.D., formerly President of the
City National Bank, New York

7. The Young Man and Business

8. The Young Man and Mechanical Engineering


Lester P. Breckenridge, M.A., Eng.D., Professor of Mechanical
Engineering, Sheffield Scientific School, Yale University

9. The Young Man and Electrical Engineering


Charles F. Scott, Sc.D., Eng.D., Professor of Electrical
Engineering, Sheffield Scientific School, Yale University

10. The Young Man and Civil Engineering


George F. Swain, LL.D., Professor of Civil Engineering, Harvard
University

11. The Young Man and Farming


L. H. Bailey, M.S., LL.D., formerly Director of College of
Agriculture, Cornell University, and Editor of Cyclopedia of
American Horticulture, Rural Science Series, Garden Craft
Series, Rural Text-Book Series, Cyclopedia of Agriculture, etc.

12. The Young Man and Government Service

Hon. William Howard Taft, D.C.L., LL.D., ex-President of the


United States, and Chief Justice of the United States Supreme
Court
E. Hershey Sneath.
BY WAY OF EXPLANATION

The sole object of the following chapters is to tell a young man


what is likely to happen to him if he goes into the newspaper
business.

Many young men think of entering journalism, but journalism is to


them a maze of mystery. What does it offer as a profession or a
vocation? they ask. What is the nature of the business? What are its
rewards? Naturally enough they continue to wonder what kind of
preparatory study is desirable. How does a young man make a
beginning and how does the beginner make progress? What are the
recognized standards of newspaper success? How is news collected
and prepared for the public? How is a newspaper conducted? What
are the duties of each member of a big newspaper staff? What goes
on in a newspaper office, anyway?

The book was begun with the intention of answering some of


these queries, but it gradually drifted into talk about various phases
and features of the business. The original intention has not been lost
sight of, however. The purpose is to indicate what journalism offers
to a young man as a means of livelihood. It seeks neither to glorify
nor to disparage the newspaper.

The book is elementary: not intended or expected to interest or


inform newspaper editors of experience.

C. S. L.

Brooklyn, New York,


Nineteen hundred and twenty two.
CONTENTS
CHAPTER PAGE
I. Beginning in Newspaper Work—The Reporter’s First 1
Experiences—His Progress—Unpleasant Tasks
II. The Collection of News and Its Preparation for Print 29
III. Newspaper Composition—The Art of Writing in Simple yet 51
Entertaining Fashion
IV. The Fascination of Writing for the Editorial Page 74
V. What to Print—The Problem of How to Interest and 87
Inform the Reader
VI. The Pleasing Experiences of the Foreign Correspondent 106
VII. The Technical Press 115
VIII. The Village Newspaper’s Important Place in American 125
Journalism
IX. The Daily Newspaper in the Small City 138
X. The Rewards of Journalism—They Are Found Chiefly in 144
Congenial Employment
XI. Newspaper Influence—Ways of Persuading the Public— 159
Community Service and Service to the Government
XII. The Study of a Specialty—Great Advantage Follows the 179
Mastery of Two or Three Subjects
XIII. The Activities and Patriotic Service of Newspapers in Times 185
of War

XIV. Newspaper History—The Modern Newspaper 197


THE YOUNG MAN AND JOURNALISM
CHAPTER I

BEGINNING IN NEWSPAPER WORK—THE REPORTER’S FIRST


EXPERIENCES—UNPLEASANT TASKS

The beginner in newspaper work usually starts as a reporter of the


simplest and most unimportant kind of routine news. The city editor
tells him what to do and how to do it. The start is made easy for
him. The prevailing supposition that reporters go out into the streets
and hunt for news is far from fact. They do so in the small cities but
not for big newspapers.

Newsgathering has become vastly systematized. Nineteen


twentieths of the news comes through established channels of
information and this explains why nearly all newspapers have the
same facts. The sources of information are known in all newspaper
offices. If a man falls dead in the street, or a fire starts in an
important building, or an automobile crushes a child, or anything
unusual happens in any street, it is known to every city editor within
a few minutes; for a policeman reports it to police headquarters
immediately, and reporters grab it. Similarly, shipping news is sent to
the ship-news office; cases of sudden or unexplained death must be
made public by official physicians; public parades and
demonstrations are anticipated through the permit bureau, and so
on. All day and all night this kind of news pours in to the city editor.
With almost instant judgment he decides on its news value, discards
it or hustles a reporter for the details. The new man gets the least
important of this kind of work.

The city editor keeps a future book—like milady’s engagement


calendar—in which under proper date he records the events to be of
that day: business meetings, conventions, adjourned cases, public
dinners, everything and anything requiring the presence of a
reporter. It is one of the important factors of the newsgetting
system. Its proper keeping involves constant drudgery and
painstaking care in the reading of newspapers for announcements or
for clews to anything that is to happen. He reads, for instance, that
an important business meeting has appointed a special committee to
report at the next meeting; but no date of the next meeting is given.
So he asks the new reporter, maybe, to ascertain and record it in the
future book. The new man does many such errands, verifies many
statements of fact, chases down many rumors.

In the great blizzard of March, 1888, when all transportation lines


in New York City were abandoned came the story that several
funeral processions were snowed under in Greenwood cemetery. A
new reporter was sent. He toiled through storm and snow waist
deep to the burial place and back, a task requiring something like six
hours to accomplish, and ended the day’s experience by thawing out
his frozen feet in a bucket of water. And what he wrote was: “The
rumor that three funeral processions were snowed under in
Greenwood cemetery was found on investigation to be untrue.”

The city editor has many sources of information similar to those


just mentioned. In the big cities he is responsible for getting the
news of the urban district, a task that involves almost every kind of
newsgetting. This is especially true of New York City, for taken all in
all nearly everything happens in New York that can happen
anywhere. It is of metropolitan reporting that we are speaking just
now.

The new reporter is asked to make news reports of the simplest of


happenings. The narration of ordinary events is the easiest of all
newspaper writing. Any intelligent high school boy can catch the
knack of it and many a bright newspaper office boy has gone on to
better things by absorbing that knack. It is easy to acquire because
it may be largely imitative—that is, almost all routine news reports
are written in the same groove of construction and in very much the
same language, year in and year out, for news topics constantly
repeat themselves.

By routine reports are meant accounts of public meetings,


conventions, legislative proceedings, trials in the courts, market
reports, accidents, fires, suicides and petty crimes. These things are
of the utmost importance to the newspapers. They constitute a large
proportion of the news of the day. They are the very life of the news
columns as presenting a record of the day’s events. They are easy to
write because they are written in the same manner day after day for
they are constantly recurring. The puzzled young writer cannot go
far astray if he turns back in the newspaper files to a similar meeting
or accident or event and imitates that report. But let him be warned
that if he continues to work in that way he becomes a routine writer,
a hack reporter, and his advancement ceases.

It is in this deadly dull routine writing of routine news that we


have our poorest and most slovenly newspaper results. The
indifferent work done in this direction is more conspicuous in the
London newspapers than in our own for there news reports have
been reduced almost to formula.

We have said that the dates of fixed events to come are


accumulated in the future book—meetings of all sorts, lectures,
balls, sporting contests, celebrations, ceremonials, excursions and
the like, of which the number and the variety are innumerable. To
each of these a reporter is sent. Usually he is told before he starts
about how long an article is expected of him. But he is charged to
note especially anything unusual, odd, strange, or queer that may
happen or be said. And always he must report to the desk, before he
begins to write, for instructions as to the exact length of his article.
Often two or three reporters are sent to a big meeting, one to write
the introduction, another the first half of the speaking and a third
the remaining part of the proceedings. This is to save time; and
often the first half has been written and is in type before the last
man has quit the meeting. Likewise in cases of big disasters, big
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookmass.com

You might also like