IoT NETWORKING CONSIDERATIONS AND CHALLENGES
IoT connectivity challenges, such as scalability and compatibility, complicate deployments, so IT admins must plan for the infrastructure needed to support IoT initiatives. In this digital world where technology has changed everything. Technology has made many impossible things possible. Touch of technology has turned the world into a magic world and the Internet of Things (IoT) is nothing but one of the greatest gifts of advanced technology which is one of the most demanding and popular technologies in the current situation. It has transformed the world to a new level.
This Internet of Things (IoT) technology has a great hand in making everything connected and automatic. Connection, Communication, and Automation have changed human life by making it more comfortable. Application area of IoT covers most the parts starting from personal life to professional life, business to the defense sector, education to the medical sector, agriculture to the airline, etc. But nowadays also IoT is facing a lot of challenges may be technical, implementation, management, security, etc and among them, Connectivity is one of the important challenges in the Internet of things.
In IoT, digital devices are connected and communicate with each other through the internet, and in small networks and for a couple of devices connectivity is seamless. But when IoT is deployed on a global scale and several devices and sensors connect and communicate then connectivity issues arise. And also the internet is not just only a network it includes heterogeneous networks having cell towers, slow connectivity, fast connectivity, proxy servers, firewalls, and different companies with different standards and technologies all things that can disrupt connectivity. Connectivity is treated as one of the important components of IoT as data transportation depends upon good connectivity. So now let's analyze factors for which challenges arise in connectivity in IoT technology.
When you consider which networking technologies to adopt within your IoT application, be mindful of the following constraints:
- Range
- Bandwidth
- Power usage
- Intermittent connectivity
- Interoperability
- Security
Range
PAN(PersonalAreaNetwork)
LAN(local area network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
Bandwidth
Bandwidth is the amount of data that can be transmitted per unit of time. It limits the rate at which data can be collected from IoT devices and transmitted upstream. Bandwidth is affected by many factors, which include:
The volume of data each device gathers and transmits
The number of devices deployed
Whether data is being sent as a constant stream or in intermittent bursts, and if any peak periods are notable
The packet size of the networking protocol should match up with the volume of data typically transmitted. It is inefficient to send packets padded with empty data. In contrast, there are overheads in splitting larger chunks of data up across too many small packets. Data transmission rates are not always symmetrical (that is, upload rates might be slower than download rates). So, if there is two-way communication between devices, data transmission needs to be factored in. Wireless and cellular networks traditionally have low bandwidth, so consider whether wireless technology is the right choice for high-volume applications.
Consider whether all raw data must be transmitted. A possible solution is to capture fewer data by sampling less frequently. Thus, you’ll capture fewer variables and may filter data from the device to drop insignificant data. If you aggregate the data before you transmit it, you reduce the volume of data transmitted. But this process affects flexibility and granularity in the upstream analysis. Aggregation and bursting are not always suitable for time-sensitive or latency-sensitive data. All of these techniques increase the data processing and storage requirements for the IoT device.
Power usage
Transmitting data from a device consumes power. Transmitting data over long ranges requires more power than over a short range. You must consider the power source – such as a battery, solar cell, or capacitor – of a device and its total lifecycle. A long and enduring lifecycle will not only provide greater reliability but reduce operating costs.
Steps may be taken to help achieve longer power supply lifecycles. For example, to prolong the battery life, you can put the device into sleep mode whenever it is idle. Another best practice is to model the energy consumption of the device under different loads and different network conditions to ensure that the device’s power supply and storage capacity matches the power that is required to transmit the necessary data by using the networking technologies that you adopted.
Intermittent connectivity
IoT devices aren’t always connected. In some cases, devices are designed to connect periodically. However, sometimes an unreliable network might cause devices to drop off due to connectivity issues. Sometimes the quality of service issues, such as dealing with interference or channel contention on a wireless network using a shared spectrum. Designs should incorporate intermittent connectivity and seek any available solutions to provide uninterrupted service, should that be a critical factor for IoT landscape design.
Interoperability
Devices work with other devices, equipment, systems, and technology; they are interoperable. With so many different devices connecting to the IoT, interoperability can be a challenge. Adopting standard protocols has been a traditional approach to maintaining interoperability on the Internet. Standards are agreed upon by industry participants and avoid multiple different designs and directions. With proper standards and participants who agree to them, incompatibility issues, hence interoperability issues may be avoided.
However, for the IoT, standardization processes sometimes struggle to keep up with innovation and change. They are written and released based on upcoming versions of standards that are still subject to change. Consider the ecosystem around the technologies: Are they widely adopted? Are they open versus proprietary? How many implementations are available? Using these questions to plan your IoT networks help plan better interoperability for a more robust IoT network.
Security
Security is a priority. The selection of networking technologies that implement end-to-end security, including authentication, encryption, and open port protection is crucial. IEEE 802.15.4 includes a security model that provides security features that include access control, message integrity, message confidentiality, and replay protection, which are implemented by technologies based on this standard such as ZigBee.
Consider the following factors in shaping a secure and safe IoT network: Authentication Adopt secure protocols to support authentication for devices, gateways, users, services, and applications. Consider using adopting the X.509 standard for device authentication. Encryption If you are using wifi, use Wireless Protected Access 2 (WPA2) for wireless network encryption. You may also adopt a Private Pre-Shared Key (PPSK) approach.
To ensure privacy and data integrity for communication between applications, be sure to adopt TLS or Datagram Transport-Layer Security (DTLS), which is based on TLS, but adapted for unreliable connections that run over UDP. TLS encrypts application data and ensures its integrity. Port protection ensures that only the ports required for communication with the gateway or upstream applications or services remain open to external connections. All other ports should be disabled or protected by firewalls. Device ports might be exposed when exploiting Universal Plug and Play (UPnP) vulnerabilities. Thus, UPnP should be disabled on the router
Recommended Articles
NETWORK ACCESS AND PHYSICAL LAYER IOT NETWORK TECHNOLOGIES
IoT NETWORKING CONSIDERATIONS AND CHALLENGES
Soil Nutrient Depletion and Imbalances
Fundamentals of Internet of Things IoT
INTERNET OR WEB AND NETWORKING BASICS OSI MODEL
Describe the role of credit in rural development.
Problems on Final Accounts of Charitable Trust
Machine To Machine Communication M2M
What are the essential ingredients of empowerment? Explain the role of the panchayats as an agent of political empowerment.
Architecture of IoT Internet of Things