The Internet of things(Wifi, BT, LoRa, Cellular, etc.)
Internet of Things (IoT)
- IoT refers to the network of physical devices embedded with sensors, software, and connectivity that enables them to collect and exchange data
- These devices range from simple sensors to complex industrial equipment, all connected to the internet or local networks
- Key characteristic: devices can communicate without human intervention, enabling automation and remote monitoring
IoT Device Categories
- Consumer IoT: Smart home devices, wearables, connected appliances
- Industrial IoT (IIoT): Manufacturing sensors, predictive maintenance systems, supply chain tracking
- Smart City IoT: Traffic management, environmental monitoring, public safety systems
- Healthcare IoT: Patient monitoring devices, medical equipment, fitness trackers
Network Architecture Considerations
Connectivity Options
| Technology |
Range |
Power Usage |
Bandwidth |
Use Case |
| WiFi |
100m |
High |
High |
Smart home devices |
| Bluetooth/BLE |
10-100m |
Low |
Low-Medium |
Wearables, sensors |
| Zigbee |
10-100m |
Very Low |
Low |
Home automation |
| LoRaWAN |
2-15km |
Very Low |
Very Low |
Remote sensors |
| Cellular (4G/5G) |
Wide area |
Medium-High |
High |
Mobile devices |
| Ethernet |
Wired |
N/A |
Very High |
Industrial equipment |
Network Topologies
- Star Topology: Devices connect directly to central hub (common in WiFi deployments)
- Mesh Topology: Devices relay data through other devices (Zigbee networks)
- Hybrid: Combination of topologies for redundancy and coverage
IoT Protocols and Standards
Application Layer Protocols
- MQTT (Message Queuing Telemetry Transport): Lightweight publish-subscribe protocol for low-bandwidth scenarios
- CoAP (Constrained Application Protocol): RESTful protocol designed for constrained devices and networks
- HTTP/HTTPS: Traditional web protocols, heavier but widely supported
Network Layer Considerations
- IPv6 adoption: Critical for IoT scale (IPv4 exhaustion with billions of devices)
- 6LoWPAN: IPv6 over Low-Power Wireless Personal Area Networks
- NAT challenges: Many IoT devices behind NAT require special configuration for external access
Security Challenges
Common Vulnerabilities
- Default credentials: Many devices ship with weak or default passwords
- Firmware updates: Inconsistent or non-existent update mechanisms
- Encryption gaps: Some devices transmit data in plaintext
- Physical access: Devices often deployed in unsecured locations
Security Best Practices
- Network segmentation: Isolate IoT devices on separate VLANs or subnets
- Certificate-based authentication: Use PKI instead of passwords where possible
- Regular security audits: Monitor device behavior and network traffic
- Firmware management: Establish procedures for regular updates
Network Design Implications
Bandwidth Planning
- Most IoT devices generate small, frequent data transmissions
- Aggregate bandwidth can be significant with large deployments
- Consider burst traffic during synchronized updates or events
Quality of Service (QoS)
- Critical IoT traffic: Medical devices, safety systems require guaranteed delivery
- Best-effort traffic: Environmental sensors, non-critical monitoring
- Latency requirements: Real-time control systems vs. periodic reporting
Scalability Considerations
- DHCP scope sizing: Plan for device growth and IP address allocation
- DNS considerations: Device naming conventions and resolution
- Network monitoring: Tools must handle high device counts and diverse protocols
Vocabulary
- Edge Computing: Processing data closer to IoT devices rather than in centralized cloud
- Digital Twin: Virtual representation of physical IoT device or system
- M2M (Machine-to-Machine): Direct communication between devices without human intervention
- Fog Computing: Distributed computing layer between edge devices and cloud
- Device Provisioning: Process of securely onboarding new IoT devices to network
Notes
- Plan for scale early: IoT deployments often grow rapidly beyond initial estimates
- Monitor device behavior: Unusual traffic patterns may indicate compromised devices or misconfigurations
- Consider power constraints when designing wireless IoT networks - battery life directly impacts maintenance costs
- Documentation is critical: With hundreds or thousands of devices, proper asset management becomes essential
- Many IoT devices have limited processing power - complex security measures may not be feasible on all devices
- Vendor lock-in risks: Evaluate long-term support and interoperability before large deployments
- Use network access control (NAC) to automatically provision and secure IoT devices as they join the network