IoE - Unit 2 Notes
IoE - Unit 2 Notes
Syllabus:
Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel.
Every device is connected to another via dedicated channels. These channels are known as
links. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
Protocols), DHCP (Dynamic Host Configuration Protocol), etc.
Mesh Topology
• Suppose, the N number of devices are connected with each other in a mesh topology,
the total number of ports that are required by each device is N-1. In Figure 1, there are
5 devices connected to each other, hence the total number of ports required by each
device is 4. The total number of ports required = N * (N-1).
• Suppose, N number of devices are connected with each other in a mesh topology, then
the total number of dedicated links required to connect them is N C 2 i.e. N(N-1)/2. In
Figure 1, there are 5 devices connected to each other, hence the total number of links
required is 5*4/2 = 10.
Advantages of Mesh Topology
• Communication is very fast between the nodes.
• Mesh Topology is robust.
• The fault is diagnosed easily. Data is reliable because data is transferred among the
devices through dedicated channels or links.
• Provides security and privacy.
Disadvantages of Mesh Topology
• Installation and configuration are difficult.
• The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
• The cost of maintenance is high.
A common example of mesh topology is the internet backbone, where various internet
service providers are connected to each other via dedicated channels. This topology is also
used in military communication systems and aircraft navigation systems.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is
the central node and all other nodes are connected to the central node. The hub can be
passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time
the hub can be intelligent known as an active hub. Active hubs have repeaters in them.
Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many
popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense
Multiple Access), etc.
Star Topology
various MAC (Media Access Control) protocols are followed by LAN ethernet connections
like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Bus Topology
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent
data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring
Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.
Ring Topology
Tree Topology
In tree topology, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub to the
secondary and then to the devices or from bottom to top i.e. devices to the secondary hub
and then to the central hub. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
Hybrid Topology
The above figure shows the structure of the Hybrid topology. As seen it contains a
combination of all different types of networks.
Advantages of Hybrid Topology
• This topology is very flexible .
• The size of the network can be easily expanded by adding new devices.
Disadvantages of Hybrid Topology
• It is challenging to design the architecture of the Hybrid Network.
• Hubs used in this topology are very expensive.
• The infrastructure cost is very high as a hybrid network requires a lot of cabling and
network devices .
A common example of a hybrid topology is a university campus network. The network may
have a backbone of a star topology, with each building connected to the backbone through
a switch or router. Within each building, there may be a bus or ring topology connecting
the different rooms and offices. The wireless access points also create a mesh topology for
wireless devices. This hybrid topology allows for efficient communication between
different buildings while providing flexibility and redundancy within each building.
Why is Network Topology Important?
Network Topology is important because it defines how devices are connected and how they
communicate in the network. Here are some points that defines why network topology is
important.
• Network Performance: Upon choosing the appropriate topology as per requirement,
it helps in running the network easily and hence increases network performance.
• Network Reliability: Some topologies like Star, Mesh are reliable as if one connection
fails, they provide an alternative for that connection, hence it works as a backup.
• Network Expansion: Chosing correct topology helps in easier expansion of Network
as it helps in adding more devices to the network without disrupting the actual
network.
• Network Security: Network Topology helps in understanding how devices are
connected and hence provides a better security to the network.
• Security: BLE includes 128bit AES encryption, providing a secure communication channel
for sensitive data.
• Power Consumption: BLE is highly power efficient, designed to conserve battery life and
suitable for wearables and sensors that send data intermittently.
• Use Cases: Primarily used in wearables, healthcare (fitness trackers, heart monitors), smart
home sensors, and asset tracking.
2. WiFi
• Overview: WiFi is one of the most widely used communication protocols, known for its high
data throughput and wellestablished infrastructure. WiFi is based on IEEE 802.11 standards,
with variants that support different ranges and data rates.
• Data Rate: WiFi offers high data rates, typically ranging from hundreds of Mbps to several
Gbps, depending on the standard (e.g., 802.11n, 802.11ac, 802.11ax).
• Range: WiFi has a typical range of up to 50 meters indoors, depending on interference and
barriers, and up to 100 meters outdoors.
• Topology: WiFi typically follows a star topology, where all devices connect to a central
router. With mesh WiFi setups, it’s possible to create larger, connected networks with
extended range.
• Security: WiFi offers robust security features such as WPA2 and WPA3 encryption,
providing high levels of protection for connected devices.
• Power Consumption: WiFi generally consumes more power than other IoT protocols,
making it less ideal for batterypowered devices.
• Use Cases: Highdata applications such as video streaming, large data transfer, or situations
where an established WiFi network is available, as in smart home hubs, cameras, and
appliances.
• Data Rate: NFC offers low data rates, typically ranging from 106 kbps to 424 kbps, which is
sufficient for small data exchanges like payment information or authentication tokens.
• Range: NFC operates at very short ranges, usually up to 10 cm, making it ideal for secure,
close-contact transactions and interactions.
• Topology: NFC generally operates in a point-to-point topology, where two NFC-enabled
devices communicate directly without needing a central router or intermediary.
• Security: NFC offers good security, largely due to its short range. It also supports encryption
and secure channels, making it suitable for sensitive applications like payment and access
control.
• Power Consumption: NFC is designed for low power consumption, and it can even operate
in passive mode, where one device powers the communication for both devices. This makes
it ideal for battery-powered devices and situations where power conservation is critical.
• Use Cases: NFC is commonly used for contactless payments, access control (e.g., keycards),
quick device pairing (like Bluetooth speakers), and data sharing between devices in close
proximity.
B. Network Layer:
1. Zigbee
• Overview: Zigbee is a low power, wireless mesh networking protocol standardized by the
IEEE (802.15.4) and commonly used in home automation, smart metering, and industrial
settings. It supports short range communication, typically up to 100 meters, with a focus on
low energy consumption and device to device communication.
• Data Rate: Zigbee offers relatively low data rates, typically around 250 Kbps, which is
suitable for transmitting small packets of data in IoT networks.
• Range: Zigbee devices generally operate within a range of 10–100 meters indoors,
depending on interference and obstructions. Using a mesh network, it extends the range by
allowing data to hop between devices.
• Topology: Zigbee networks can form star, tree, or mesh topologies. The mesh architecture
is a key feature that allows Zigbee networks to be highly scalable.
• Security: Zigbee uses 128bit AES encryption, providing a secure layer for communication.
• Power Consumption: Zigbee is designed for low power, enabling long battery life for
devices.
• Use Cases: Ideal for smart home applications, such as lighting, security, and environmental
sensors, due to its short range, mesh networking, and low power usage.
2. ZWave
• Overview: ZWave is another popular wireless communication protocol designed for home
automation. Originally developed by Zensys and later managed by the ZWave Alliance,
ZWave operates in the subGHz frequency range, which helps avoid interference from WiFi
and Bluetooth.
• Data Rate: ZWave has a lower data rate than Zigbee, around 100 Kbps, suitable for IoT
devices that require minimal bandwidth.
• Range: ZWave has a typical indoor range of around 30 meters, but like Zigbee, it can extend
range through mesh networking, where each device acts as a node.
• Topology: ZWave supports a mesh network, which enables more reliable and extensive
coverage in home automation.
• Security: ZWave includes AES128 encryption to secure communications within the
network.
• Power Consumption: ZWave is optimized for low power, allowing it to work well with
battery operated devices.
• Use Cases: Home automation (lighting, locks, thermostats), with a focus on seamless device
to device communication and broad compatibility between ZWave certified products.
• Range: LoRaWAN offers an extensive range of up to 1520 kilometers in rural areas and
several kilometers in urban environments.
• Topology: LoRaWAN operates in a starofstars topology, with end devices connecting to a
central gateway that relays data to a network server.
• Security: LoRaWAN includes AES128 encryption at both the network and application layers,
ensuring secure transmission of data.
• Power Consumption: LoRaWAN is optimized for low power consumption, making it
suitable for battery operated devices with long lifespans.
• Use Cases: Ideal for applications in smart agriculture, asset tracking, environmental
monitoring, and remote infrastructure management, where wide coverage and low data
rates are required.
Drawback of IPv4
• Limited Address Space: IPv4 has a limited number of addresses, which is not enough
for the growing number of devices connecting to the internet.
• Complex Configuration: IPv4 often requires manual configuration or DHCP to assign
addresses, which can be time-consuming and prone to errors.
• Less Efficient Routing: The IPv4 header is more complex, which can slow down data
processing and routing.
• Security Issues: IPv4 does not have built-in security features, making it more vulnerable
to attacks unless extra security measures are added.
• Limited Support for Quality of Service (QoS) : IPv4 has limited capabilities for
prioritizing certain types of data, which can affect the performance of real-time
applications like video streaming and VoIP.
• Fragmentation: IPv4 allows routers to fragment packets, which can lead to inefficiencies
and increased chances of data being lost or corrupted.
• Broadcasting Overhead: IPv4 uses broadcasting to communicate with multiple devices
on a network, which can create unnecessary network traffic and reduce performance.
What is IPv6?
• IPv6 is based on IPv4 and stands for Internet Protocol version 6.
• It was first introduced in December 1995 by Internet Engineering Task Force.
• IP version 6 is the new version of Internet Protocol, which is way better than IP
version 4 in terms of complexity and efficiency.
• IPv6 is written as a group of 8 hexadecimal numbers separated by colon (:). It can be
written as 128 bits of 0s and 1s.
IPv6 Address Format
IPv6 Address Format is a 128-bit IP Address, which is written in a group of 8 hexadecimal
numbers separated by colon (:).
IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It Supports Manual and DHCP address It supports Auto and renumbering address
configuration configuration
In IPv4 end to end, connection integrity is
In IPv6 end-to-end, connection integrity is Achievable
Unachievable
The address space of IPv6 is quite large it can produce
It can generate 4.29×10 9 address space
3.4×10 38 address space
The Security feature is dependent on the IPSEC is an inbuilt security feature in the IPv6
application protocol
Address representation of IPv4 is in
Address representation of IPv6 is in hexadecimal
decimal
Fragmentation performed by Sender and In IPv6 fragmentation is performed only by the
forwarding routers sender
In IPv4 Packet flow identification is not In IPv6 packet flow identification are Available and
available uses the flow label field in the header
In IPv4 checksum field is available In IPv6 checksum field is not available
It has a broadcast Message Transmission In IPv6 multicast and anycast message transmission
Scheme scheme is available
In IPv4 Encryption and Authentication
In IPv6 Encryption and Authentication are provided
facility not provided
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are IPv6 consists of 8 fields, which are separated by a
separated by addresses dot (.) colon (:)
IPv4’s IP addresses are divided into five
different classes. Class A , Class B, Class C, IPv6 does not have any classes of the IP address.
Class D , Class E.
IPv4 supports VLSM( Variable Length subnet
IPv6 does not support VLSM.
mask ).
Example of IPv6:
Example of IPv4: 66.94.29.13
2001:0000:3238:DFE1:0063:0000:0000:FEFB
C. Transport Layer:
D. Application Layer:
• Power Consumption: HTTP is relatively power-intensive due to its use of TCP and
verbose headers, making it less ideal for low-power IoT devices, especially those
running on batteries.
• Use Cases: HTTP is widely used for IoT devices that communicate with web-based
servers or APIs, ideal for scenarios where periodic data updates are needed, such as
in smart home applications, remote monitoring, and data logging.
• This table encapsulates each protocol's unique attributes, helping determine which
technology aligns with specific IoT needs based on coverage, data rate, and power
requirements.
Power
Protocol Range Data Rate Topology Primary Use Cases
Consumption
Wearables, health
Up to 100 monitoring, asset
BLE Up to 2 Mbps Low Star
meters tracking, short-range
data exchange
Up to 50
Smart home hubs, video
meters indoors; 100 Mbps to
WiFi High Star, Mesh streaming, data-
100 meters several Gbps
intensive applications
outdoors
Contactless payments,
Point-to- access control, data
NFC Up to 10 cm ~424 Kbps Very Low
Point transfer between nearby
devices
Up to 100 Home automation,
Zigbee meters 20 to 250 Kbps Low Mesh sensor networks, smart
(indoors) lighting
Smart home devices,
Up to 30
Z-Wave 9.6 to 100 Kbps Low Mesh security systems, energy
meters indoors
monitoring
Long-range sensing,
Up to 15 km
agriculture,
LoRaWAN (urban), 5 km 0.3 to 50 Kbps Very Low Star
environmental
(rural)
monitoring
Smart meters,
environmental
Up to 35 km Low to
NB-IoT Up to 250 Kbps Star monitoring, asset
(urban) Moderate
tracking, low-bandwidth
IoT
Variable, Internet communication,
Based on
IPv4 & depending on Point-to- device addressing,
network Moderate
IPv6 protocol and Point enabling internet-based
infrastructure
network IoT
Variable, Point-to- Real-time data
Network-
UDP depending on Low Point, streaming, sensor data,
dependent
network Multicast monitoring applications
Variable, File transfer, secure data
Network- Point-to-
TCP depending on Moderate exchange, applications
dependent Point
network requiring data integrity
Variable, Web-based IoT services,
Network-
HTTP depending on High Client-Server device control, cloud
dependent
network communication
Resource-constrained
Client-
Network- Low, typically devices, smart city
CoAP Very Low Server,
dependent up to a few Kbps applications, low-power
Multicast
sensor networks
Role of 5G in IoT
5G, or the fifth generation wireless technology, plays a transformative role in advancing the
Internet of Things (IoT). The combination of 5G and IoT offers the potential to drive
innovation across various industries due to its speed, low latency, massive connectivity, and
efficiency.
For many IoT applications this will be a critical enabling technology but the bulk of
IoT will continue to be well served by 4G and connectivity such as LTE-M, NB-IoT and Low
Power Wide Area (LPWA) networks.
• For example, global standardization and coverage mean products and services can be
scaled globally. Building on the scale of the mobile industry and billions of connected
mobiles enables cost efficiency, reliability, security, and continuous development of
devices, network technologies and service provider capabilities.
2. UltraLow Latency
• Explanation: 5G networks are designed to deliver latency as low as 1 millisecond, far
lower than 4G's average of 3050 milliseconds. Latency is the delay between sending
and receiving data, and minimizing it is crucial for realtime applications.
• Impact on IoT: This low latency is particularly beneficial for applications like
autonomous driving, remote surgery, and industrial robotics, where even slight
delays can result in critical failures. IoT devices in these areas can operate in realtime,
providing instant feedback and response.
in smart cities, 5G can support IoT devices like traffic sensors, smart lighting,
surveillance cameras, and public transport systems without network congestion.
6. Security Enhancements
• Explanation: 5G introduces improved security protocols, such as better encryption,
network authentication, and identity protection, which are essential for protecting
data transmitted by IoT devices.
• Impact on IoT: With billions of connected devices, security is a critical concern in IoT.
5G's security features help protect sensitive data in sectors like healthcare, finance,
• It is often referred to as the "sensing" layer because it enables the system to "sense"
or gather data on environmental conditions, such as temperature, humidity, pressure,
light levels, motion, etc.
Devices/Technologies:
• Sensors: Temperature sensors, humidity sensors, pressure sensors, motion detectors,
etc.
• Actuators: Devices like motors, relays, and servos that interact with the physical
environment (e.g., adjusting the thermostat or turning on lights).
• RFID tags, Cameras, GPS modules, etc.
Role:
• The perception layer is responsible for data collection and conversion.
• This data is typically analog in nature and needs to be converted into digital signals.
• The layer plays an essential role in initiating the data lifecycle in IoT systems.
• Without this layer, the system would not be able to gather real-time data to respond
to the environment.
b. Network Layer (Transmission Layer)
Function:
• The network layer is responsible for transmitting the data collected by the perception
layer to a more central processing unit or server for further analysis.
• This layer deals with the data routing, addressing, and forwarding protocols needed
to ensure that data reaches its destination efficiently and securely.
Devices/Technologies:
Gateways: These act as intermediaries between the perception layer devices (sensors) and
the network. Gateways convert the data from one protocol to another and may add security
or data processing functions.
Routers, Switches: These are devices that help manage the traffic flow of data within a
network, ensuring that packets of data are sent to the correct destination.
Communication Protocols: Common communication technologies include Wi-Fi, Bluetooth,
Zigbee, NB-IoT, LoRaWAN, and cellular networks (e.g., 4G/5G), among others.
Role:
• The network layer handles the data transmission aspect of IoT systems.
• It ensures that the data collected by the sensors reaches the cloud or servers where it
can be processed or stored.
• It also manages addressing, error correction, and the overall optimization of data
routes in large-scale networks.
c. Application Layer
Function:
• The application layer is the topmost layer of the three-layer model and deals with the
processing of data for specific applications.
• This layer ensures that the data collected from the sensors is meaningful, actionable,
and presented to the end-users in a useful format.
• It processes and analyzes the data, triggering actions based on predefined rules or
algorithms.
Devices/Technologies:
Web and Mobile Applications: IoT systems often provide user interfaces through web or
mobile apps to allow users to interact with the IoT devices and systems.
Cloud Platforms: These provide the infrastructure for data storage, processing, and analytics.
Examples include AWS IoT, Microsoft Azure IoT, and Google Cloud IoT.
Analytics Tools: Data analytics platforms and machine learning algorithms that process the
data to provide insights, forecasts, or control actions.
Role:
This layer delivers the real value of IoT systems to the end-users. It processes the raw data
coming from sensors and converts it into actionable insights. In industrial IoT (IIoT) systems,
this could involve predictive maintenance, optimization of operations, or monitoring system
health.
2. Five-Layer Architecture
• While the three-layer architecture provides a simple model, the five-layer
architecture is a more comprehensive framework, especially designed to address the
complexity and scalability of large IoT systems.
• The five-layer model introduces additional layers that provide more granular control
over the entire IoT system, particularly in terms of data processing, edge computing,
and business logic integration.
a. Perception Layer
Function:
• Similar to the three-layer model, the perception layer in the five-layer architecture is
still responsible for data acquisition from the physical world.
• This layer comprises various sensors and actuators that detect environmental
parameters and convert physical data into digital signals.
Devices/Technologies:
• Sensors: Environmental sensors, wearables, temperature sensors, humidity sensors,
pressure sensors, etc.
• Actuators: Used for controlling devices like motors or switches based on data inputs.
• RFID/NFC Tags: For asset tracking and identification.
Role:The role of the perception layer remains the same: sensing and collecting real-world
data to feed the system. However, in the five-layer model, this layer may interact with the
next layer (Edge Layer) to perform preliminary data processing.
• It ensures that only the most relevant or actionable data is sent to the cloud for
further analysis.
• This reduces bandwidth usage and enhances the overall efficiency of the IoT system.
d. Application Layer
Function:
• The application layer in the five-layer architecture still processes data and provides
end-users with meaningful insights.
• This layer serves as the interface for the end-user, where applications are developed
to provide value based on the processed data.
Devices/Technologies:
• Web/Mobile Applications: User interfaces that allow interaction with IoT systems.
• Cloud Services: IoT platforms for data storage, analysis, and real-time processing.
• Big Data and Analytics Platforms: For handling large volumes of data and performing
advanced analytics.
Role:
• This layer provides actionable information and enables decision-making based on
data insights.
• It is highly specific to the use case, whether it's smart homes, healthcare, industrial
applications, or agriculture.
• It also allows users to configure devices, monitor status, and control IoT systems.
e. Business Layer
Function:
• The business layer is the top-most layer in the five-layer architecture and is
responsible for managing the entire IoT system from a business perspective.
• This includes setting the rules and policies for data usage, analyzing data to derive
business value, and making decisions about how the IoT system supports
organizational goals.
Devices/Technologies:
• Enterprise Resource Planning (ERP) systems.
Data collection and conversion from Same as 3-layer model, with potential
Role
analog to digital signals. edge processing.
- Responsible for data transmission
- Same function as the 3-layer model.
between devices and higher layers.
2. Network Layer
- Manages data routing and - Includes additional edge devices and
addressing. gateways for data aggregation.
Gateways, Routers, Switches, Edge
Devices/Technologies Gateways, Routers, Switches
devices (e.g., Edge Servers)
Transmits data to central cloud or Transmits data while offloading some
Role
server. processing to edge devices.
- Provides meaningful data insights
- Same function as the 3-layer model.
for end-users.
3. Application Layer - Processes data for specific
- Delivers actionable insights and
applications like smart homes,
interfaces for user interaction.
industrial IoT.
Security is a critical concern for IoT, and several standards ensure data integrity,
confidentiality, and device authentication.
DTLS (Datagram Transport Layer Security):
• Function: Provides encryption and security for UDP-based communications, ensuring
data privacy and integrity.
• Use Cases: CoAP, IoT networks with constrained devices.
Power
Topolog Primary Use
Technology Range Data Rate Consumptio Security
y Cases
n
10–100 meters Very low, Home AES-128
(depends on designed for Mesh, star, automation, encryption,
Zigbee 250 kbps
environmental low-power tree smart lighting, secure key
factors) devices industrial IoT establishment
Home
Low, ideal for
30–100 meters automation,
battery- AES-128
Z-Wave (depends on 100 kbps Mesh smart locks,
powered encryption
environment) security
devices
systems
Very low,
Smart
2–15 km designed for
0.3 kbps to agriculture, AES-128
LoRaWAN (urban to rural long-range, Star
27 kbps smart cities, encryption
areas) low-power
industrial IoT
devices
25.5 kbps Smart
Low, designed Cellular LTE security
Long-range (uplink) metering, asset
Narrowband for battery- (based on standards,
(up to several and 250 tracking,
IoT (NB-IoT) operated LTE end-to-end
kilometers) kbps environmental
devices network) encryption
(downlink) monitoring
Varies Supports General
Dependent on
based on various networking,
underlying Depends on the IPSec (IPv6),
IPv4 & IPv6 network topologies data
communicatio network used firewall, VPN
(Ethernet, (star, communicatio
n technology
Wi-Fi, LTE) mesh, bus) n
Variable
Peer-to- Real-time No built-in
Depends on (depends Low, as it is a
peer, applications, security, relies
UDP the underlying on connectionless
broadcast, streaming, on application-
network application protocol
multicast gaming level security
)
High (up to
Moderate (due Point-to- Reliable TLS/SSL for
Depends on Gbps range,
to connection point, communicatio secure
TCP the underlying depending
setup and client- n (file transfer, communicatio
network on
maintenance) server web services) n
network)
Depends on Variable, Web-based IoT
Moderate to Client- HTTPS
HTTP the underlying usually applications,
high server (SSL/TLS)
network moderate RESTful APIs
Client-
Depends on Low server,
Very low, Low-power
the underlying (designed publish- DTLS
optimized for IoT devices,
CoAP network (low- for subscribe (Datagram
low-power smart homes,
power constrained (with TLS)
devices smart cities
networks) devices) observe
pattern)
Knowledge
of Bluetooth AES-128
Wearabl protocol encrypti
Platforms
es, stack, BLE modules on,
like
50 m healthca pairing, like ESP32, pairing
BLE 1 Point- Android,
– 100 re device Nordic mechanis
(Bluet Mbps to- iOS,
m Low monitori discovery, chips, or ms,
ooth –2 Point / Raspberry
(Vari ng, home and smartphones bonding
LE) Mbps Star Pi, Arduino
es) automati connection with BLE for
with BLE
on, asset setup. support secure
libraries
tracking Configure communi
advertising cation.
intervals.
Configuring
Smart SSID, WPA2/
homes, password, WPA3
Platforms
100 video DHCP/stati Wi-Fi encrypti
Up to Star like AWS
Mbps streamin c IP, and modules like on,
100 (Route IoT, Google
– 10 g, large security ESP32, SSL/TLS
Wi-Fi m High r- Cloud IoT,
Gbps data protocols routers, for
(outd Central Raspberry
(vari transfer, like smartphones, secure
oor) ized) Pi with Wi-
es) cloud- WPA2/WPA and laptops. internet
Fi support
connecte 3. Setup communi
d devices routers/acc cation.
ess points.
Encrypti
on for
Contactl Configuring
secure
ess tag
424 NFC-enabled Android, transacti
Up to Point- payment reading/wr
Kbps Very devices like iOS ons,
NFC 10 to- s, access iting, device
– 848 Low smartphone support, secure
cm Point control, pairing, and
Kbps s, NFC tags NFC SDKs element
asset communicati
s for data
tracking on range.
protectio
n.
Configuring
AES-128
Home network
encrypti
automati formation,
Xbee, TI Platforms on,
Mesh on, device
Zigbee like secure
10 m (Devic industria pairing
250 chipsets, Zigbee2MQ device
Zigbee – 100 Low e-to- l control, (coordinator
Kbps Zigbee TT, Xbee pairing,
m Device smart , router, end
coordinator API, Home network
) cities, device), and
s/routers Assistant security
remote mesh
configura
sensors network
tions.
setup.
Similar to AES-128
Home
Zigbee, encrypti
Mesh automati OpenHAB,
100 configuring Z-Wave on, S2
30 m (Devic on, Home
Z- Kbps device modules, Security
– 100 Low e-to- security Assistant,
Wave – 200 inclusion, controllers, for
m Device systems, Z-Wave
Kbps network Z-Wave hubs secure
) lighting SDK
security communi
control
modes. cation.
Configuring
AES-128
Smart LoRaWAN
encrypti
agricultu gateways,
on,
re, joining LoRaWAN The Things
2 km Star network
0.3 environ devices to modules, Network,
– 15 (Gatew keys for
LoRa Kbps Very mental the network, gateways, ChirpStack
km ays secure
WAN – 27 Low monitori and LoRa- for network
(vari and device
Kbps ng, asset managing enabled manageme
es) Nodes) onboardi
tracking, device-to- devices nt
ng and
smart cloud
communi
cities communica
cation.
tion.
Knowledge Security
Real-
of socket at the
time
programmi applicati
applicati IoT devices Python,
ng, on layer
Long ons (e.g., with UDP C/C++,
High Point- managing using
range video/au support, Node.js for
UDP (Vari Low to- connectionl DTLS,
(inter dio ESP8266, UDP
es) Point ess TLS for
net) streamin Raspberry communica
communica encrypte
g, IoT Pi tion
tion, and d
sensor
packet communi
data)
handling. cation.
Reliable
SSL/TLS
data
encryptio
transmis Configuring
Raspberry n for
sion for connection Node-RED,
Long Pi, ESP32, secure
High Moderat Point- IoT establishme ThingSpea
range Arduino for communi
TCP (Vari e to to- devices nt, session k, IoT
(inter TCP cation,
es) High Point (e.g., manageme cloud
net) communicati certificat
remote nt, flow platforms
on e-based
monitori control.
authenti
ng, cloud
cation.
services)
Knowledge
Web-
of RESTful
based Flask, HTTPS
APIs,
Mode IoT Devices with Django, with
managing
Long rate Client- applicati HTTP client AWS IoT, SSL/TLS
HTTP
range to Server ons, support (e.g., ThingSpea certificat
HTTP High requests/re
(inter High (Web- RESTful ESP32, k support es for
sponses,
net) (vari based) APIs, Raspberry for HTTP secure
and web
es) cloud Pi) communica communi
server
commun tion cation.
configurati
ication
on.
IoT
sensor
data Knowledge
exchang of CoAP
e, stack, CoAP
DTLS for
Long Client- constrai message libcoap protocols
Low security
range Server ned types, and library, CoAP support
CoAP (vari Low of CoAP
(inter (Web- environ observe clients, CoAP CoAP.NET
es) communi
net) based) ments, patterns for servers library for
cation.
low- resource- integration
bandwid constrained
th devices.
applicati
ons
Applications
Steps involved in configuring LoRaWAN for a smart agriculture application.
• Configure Gateway Range and Power Output: Optimize gateway settings to maximize
range while maintaining efficient power usage and minimizing interference with
other devices.
4. Connect to a LoRaWAN Network Server
• Select a Network Server Provider: Choose between public (e.g., The Things Network,
AWS IoT) or private LoRaWAN networks depending on data security needs and
availability.
• Device and Application Settings: Register devices, applications, and gateways on the
network server to facilitate data routing from devices to application servers.
• Enable Downlink Communication: For some applications, configure downlink
communication to allow commands from the server to the device, if needed, such as
for turning devices on or off.
5. Optimize Power and Communication Settings
• Use Adaptive Data Rate (ADR): Enable ADR on end devices to automatically adjust
data rate, airtime, and power based on network conditions. Lower data rates will
enable long-range communication with less power.
• Set Sleep Mode for Low-Power Devices: Use sleep mode on devices between
transmission intervals to conserve battery.
• Reduce Transmission Frequency: Send data less frequently (e.g., every 15 or 30
minutes) to reduce power usage while ensuring that monitoring needs are met.
• Adjust Duty Cycle for Regional Compliance: Ensure devices comply with regional duty
cycle regulations, which control how often devices can transmit to minimize
interference.
6. Establish and Test Application Layer
• Connect to Application Server: Set up a dashboard or application that processes,
visualizes, and stores the data from the network server.
• Set Up Alerts and Automations: Configure alerts based on sensor readings, such as
notifications when moisture levels are low, or automate irrigation systems based on
sensor data.
• Conduct Field Testing: Perform field tests to verify the communication range, data
accuracy, and device functionality across the coverage area.
Outline the basic steps for configuring a WiFi network for a smart home IoT system.
What considerations should be made regarding network security?
• Confirm that each device is connected, accessible through the smart home app or
interface, and that data transfer is smooth.
Step-5 Set Up Remote Access (Optional)
• If remote access is needed, enable secure remote access features through the router
settings, ideally using a Virtual Private Network (VPN) for added security.
Step-6 Organize IoT Devices into VLANs (Optional)
• For additional security, some routers allow creating Virtual LANs (VLANs). Placing
IoT devices on a separate VLAN isolates them from other devices on the network,
reducing the risk of cross-device contamination.
• Turn off unused features, such as Universal Plug and Play (UPnP), WPS (WiFi
Protected Setup), and remote management, which can introduce security risks.
Use Multi-Factor Authentication (MFA)
• If available, enable MFA on your WiFi network and the smart home control
application to add an extra layer of security.
Monitor Network Traffic
• Use network monitoring tools or the router’s management interface to detect unusual
activity or unauthorized devices.
Limit Access to Trusted Devices
• Enable MAC address filtering if your router supports it. By only allowing specific MAC
addresses to connect, you can restrict network access to known, trusted devices.
Steps for setting up and optimizing an NB-IoT network for a smart parking system, along
with key factors related to signal coverage and power consumption.
Step Description Key Considerations
1. Choose NB-IoT- Select parking sensors that support NB-IoT, and Ensure that the sensors can handle the
Compatible Parking check compatibility with local telecom environmental conditions (e.g., heat, cold,
Sensors and Modules infrastructure. moisture) of the parking area.
2. Deploy NB-IoT If using dedicated gateways, place them
Decide whether to use dedicated NB-IoT
Gateways or Use strategically for optimal coverage. Otherwise,
gateways or rely on the existing cellular
Cellular ensure the cellular network has adequate signal
network infrastructure for data communication.
Infrastructure strength across the parking area.
Program the sensors to send data at intervals
3. Configure Sensors Set up sensors to enter low-power mode during
instead of continuous transmission to conserve
for Power Efficiency inactive hours or when no vehicles are present.
battery life.
4. Set Up Device Register each sensor on the network and Use secure encryption methods (e.g., device
Registration and configure unique identifiers for data tracking authentication and data encryption) to protect data
Security and security. integrity and privacy.
Determine and configure optimal data
5. Optimize Data Balance the need for real-time updates with power
transmission intervals based on system
Transmission efficiency; less frequent data transmission saves
requirements (e.g., every 15 minutes or only on
Intervals power.
status change).
Address dead zones or low-signal areas by
6. Establish Signal Conduct field tests to assess signal strength and
adjusting gateway placement or adding additional
Coverage Testing coverage throughout the parking area.
gateways if necessary.
7. Integrate Data with Connect the NB-IoT network to a central Ensure that the platform can process data in real
Parking Management management system or cloud platform to time and provide accessible insights, such as
Platform aggregate and analyze data. available spots and occupancy trends.
8. Implement Schedule periodic battery replacements or
Regularly monitor network performance and
Monitoring and recharges based on consumption data to maintain
sensor health to ensure reliable operation.
Maintenance uptime.
Question Bank
1. Assess the scalability of traditional network architectures when applied to IoE environments.
Suggest architectural modifications or innovations that could better support IoE’s demands
for largescale connectivity, data processing, and real time decision making.
2. Discuss the issue of interoperability within IoE ecosystems, focusing on how diverse
communication protocols and data standards can impact device compatibility. Develop a
roadmap for achieving interoperability that could accommodate multiple industries and
applications.
3. What are the main characteristics of Zigbee and ZWave protocols, and how do they differ in
terms of range and power consumption? Provide examples of IoT applications where each
protocol is commonly used.
4. Explain the advantages of using Bluetooth Low Energy (BLE) in IoT applications. What type
of devices or environments benefit most from BLE?
5. Describe LoRaWAN and its significance in IoT networks. What are some key use cases where
LoRaWAN is preferred over other communication technologies?
6. Compare WiFi and BLE for IoT applications based on range, power consumption, and data
speed. Which protocol would be more suitable for a home automation system, and why?
7. Explain the differences between LoRaWAN and NBIoT in terms of range and power
consumption. Which one is more appropriate for rural IoT applications, and why?
8. Compare and contrast Zigbee, ZWave, and Bluetooth Low Energy (BLE) in terms of range,
power consumption, and data transfer rate. For which types of IoT applications would each
be most suitable?
9. Analyze WiFi’s role in IoT communications compared to lowpower widearea networks
(LPWAN) like LoRaWAN and NBIoT. When would WiFi be a better choice over LPWANs for
IoT solutions?
10. Describe how 5G technology is poised to transform IoT communication. In what ways does
5G enhance IoT applications compared to previous generations of mobile networks?
11. Discuss how 5G can enhance IoT applications. What makes 5G a suitable option for
supporting large numbers of IoT devices in smart cities?
12. Compare the role of 5G in IoT with that of NBIoT. Under what circumstances would NBIoT be
preferable to 5G, and vice versa?
13. Analyze the primary types of IoT network architectures (e.g., star, mesh, and cellular
architectures). Discuss the strengths and weaknesses of each type and identify scenarios
where one might be more effective than others.
14. Discuss the importance of standardization in IoT communication technologies. What are
some of the key challenges faced in establishing universal standards, and how do they impact
the interoperability of IoT devices?
15. What is the difference between mesh and star network architectures in IoT? Give examples
of scenarios where each architecture would be advantageous.
16. Explain why standardization is important in IoT communication protocols. How does
standardization impact interoperability and device compatibility?
17. Conduct a comparative analysis of Zigbee, ZWave, and BLE. Focus on parameters such as
security, ease of integration, and compatibility with other IoT systems. What tradeoffs must
be considered when selecting among these technologies?
18. Evaluate the scalability and interoperability of WiFi, LoRaWAN, and 5G in supporting IoT
devices in smart industrial applications. Which technology would you recommend as the
primary communication method, and why?
19. Describe the steps involved in configuring LoRaWAN for a smart agriculture application.
20. Outline the basic steps for configuring a WiFi network for a smart home IoT system. What
considerations should be made regarding network security?
21. How would you set up and optimize an NBIoT network for a smart parking system? Discuss
factors related to signal coverage and power consumption that should be considered during
setup?
22. Outline the process of setting up a Bluetooth Low Energy (BLE) network for a healthcare
facility’s wearable devices. Discuss how BLE configurations impact power usage, data
security, and patient safety in the IoT system.