larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things

eBook (Watermarked)

  • Your Price: $42.39
  • List Price: $52.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

  • Description
  • Sample Content
  • Updates
  • Copyright 2017
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 576
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-430710-0
  • ISBN-13: 978-0-13-430710-7

Today, billions of devices are Internet-connected, IoT standards and protocols are stabilizing, and technical professionals must increasingly solve real problems with IoT technologies. Now, five leading Cisco IoT experts present the first comprehensive, practical reference for making IoT work. IoT Fundamentals brings together knowledge previously available only in white papers, standards documents, and other hard-to-find sources—or nowhere at all.

The authors begin with a high-level overview of IoT and introduce key concepts needed to successfully design IoT solutions. Next, they walk through each key technology, protocol, and technical building block that combine into complete IoT solutions.

Building on these essentials, they present several detailed use cases, including manufacturing, energy, utilities, smart+connected cities, transportation, mining, and public safety. Whatever your role or existing infrastructure, you’ll gain deep insight what IoT applications can do, and what it takes to deliver them.

  • Fully covers the principles and components of next-generation wireless networks built with Cisco IOT solutions such as IEEE 802.11 (Wi-Fi), IEEE 802.15.4-2015 (Mesh), and LoRaWAN
  • Brings together real-world tips, insights, and best practices for designing and implementing next-generation wireless networks
  • Presents start-to-finish configuration examples for common deployment scenarios
  • Reflects the extensive first-hand experience of Cisco experts

Sample Pages

Download the sample pages (includes Chapter 8 and index)

Table of Contents

    Foreword xxvi
    Introduction xxviii
Part I Introduction to IoT 1
Chapter 1 What Is IoT? 3
    Genesis of IoT 4
    IoT and Digitization 6
    IoT Impact 7
        Connected Roadways 8
        Connected Factory 12
        Smart Connected Buildings 15
        Smart Creatures 19
    Convergence of IT and OT 21
    IoT Challenges 23
    Summary 24
    References 24
Chapter 2 IoT Network Architecture and Design 27
    Drivers Behind New Network Architectures 28
        Scale 30
        Security 31
        Constrained Devices and Networks 32
        Data 32
        Legacy Device Support 32
    Comparing IoT Architectures 33
        The oneM2M IoT Standardized Architecture 33
        The IoT World Forum (IoTWF) Standardized Architecture 35
        Additional IoT Reference Models 39
    A Simplified IoT Architecture 40
    The Core IoT Functional Stack 43
        Layer 1: Things: Sensors and Actuators Layer 44
        Layer 2: Communications Network Layer 46
        Layer 3: Applications and Analytics Layer 59
    IoT Data Management and Compute Stack 63
        Fog Computing 65
        Edge Computing 68
        The Hierarchy of Edge, Fog, and Cloud 68
    Summary 70
    References 71
Part II Engineering IoT Networks 73
Chapter 3 Smart Objects: The “Things” in IoT 75
    Sensors, Actuators, and Smart Objects 76
        Sensors 76
        Actuators 81
        Micro-Electro-Mechanical Systems (MEMS) 83
        Smart Objects 84
    Sensor Networks 87
        Wireless Sensor Networks (WSNs) 88
        Communication Protocols for Wireless Sensor Networks 92
    Summary 93
Chapter 4 Connecting Smart Objects 95
    Communications Criteria 96
        Range 96
        Frequency Bands 98
        Power Consumption 101
        Topology 102
        Constrained Devices 103
        Constrained-Node Networks 104
    IoT Access Technologies 107
        IEEE 802.15.4 108
        IEEE 802.15.4g and 802.15.4e 118
        IEEE 1901.2a 124
        IEEE 802.11ah 130
        LoRaWAN 134
        NB-IoT and Other LTE Variations 142
    Summary 146
Chapter 5 IP as the IoT Network Layer 149
    The Business Case for IP 150
        The Key Advantages of Internet Protocol 150
        Adoption or Adaptation of the Internet Protocol 152
    The Need for Optimization 154
        Constrained Nodes 155
        Constrained Networks 156
        IP Versions 157
    Optimizing IP for IoT 159
        From 6LoWPAN to 6Lo 159
        Header Compression 161
        Fragmentation 162
        Mesh Addressing 163
        6TiSCH 165
        RPL 167
        Authentication and Encryption on Constrained Nodes 173
    Profiles and Compliances 174
        Internet Protocol for Smart Objects (IPSO) Alliance 174
        Wi-SUN Alliance 174
        Thread 174
        IPv6 Ready Logo 175
    Summary 175
Chapter 6 Application Protocols for IoT 177
    The Transport Layer 178
    IoT Application Transport Methods 180
        Application Layer Protocol Not Present 180
        SCADA 182
        Generic Web-Based Protocols 189
        IoT Application Layer Protocols 191   
    Summary 204
Chapter 7 Data and Analytics for IoT 205
    An Introduction to Data Analytics for IoT 206
        Structured Versus Unstructured Data 207
        Data in Motion Versus Data at Rest 209
        IoT Data Analytics Overview 209
        IoT Data Analytics Challenges 211
    Machine Learning 212
        Machine Learning Overview 212
        Machine Learning and Getting Intelligence from Big Data 218
        Predictive Analytics 220
        Big Data Analytics Tools and Technology 220
        Massively Parallel Processing Databases 222
        NoSQL Databases 223
        Hadoop 224
        The Hadoop Ecosystem 227
        Edge Streaming Analytics 230
        Comparing Big Data and Edge Analytics 231
        Edge Analytics Core Functions 232
        Distributed Analytics Systems 235
        Network Analytics 236
        Flexible NetFlow Architecture 238
    Summary 242
    References 243
Chapter 8 Securing IoT 245
    A Brief History of OT Security 246
    Common Challenges in OT Security 249
        Erosion of Network Architecture 249
        Pervasive Legacy Systems 250
        Insecure Operational Protocols 250
        Other Protocols 253
        Device Insecurity 254
        Dependence on External Vendors 255
        Security Knowledge 256
    How IT and OT Security Practices and Systems Vary 256
        The Purdue Model for Control Hierarchy 257
        OT Network Characteristics Impacting Security 259
        Security Priorities: Integrity, Availability, and Confidentiality 261
        Security Focus 261
    Formal Risk Analysis Structures: OCTAVE and FAIR 262
        OCTAVE 262
        FAIR 265
    The Phased Application of Security in an Operational Environment 266
        Secured Network Infrastructure and Assets 266
        Deploying Dedicated Security Appliances 269
        Higher-Order Policy Convergence and Network Monitoring 272
    Summary 274
Part III IoT in Industry 275
Chapter 9 Manufacturing 277
    An Introduction to Connected Manufacturing 278
        An IoT Strategy for Connected Manufacturing 279
        Business Improvements Driven Through IoT 281
    An Architecture for the Connected Factory 282
        Industrial Automation and Control Systems Reference Model 282
        The CPwE Reference Model 284
        CPwE Resilient Network Design 286
        CPwE Wireless 289
    Industrial Automation Control Protocols 293
        EtherNet/IP and CIP 293
        PROFINET 294
        The PROFINET Architecture 296
        Media Redundancy Protocol (MRP) 297
        Modbus/TCP 298
    Connected Factory Security 299
        A Holistic Approach to Industrial Security 299
    Edge Computing in the Connected Factory 304
        Connected Machines and Edge Computing 304
    Summary 307
    References 307
Chapter 10 Oil and Gas 309
    An Introduction to the Oil and Gas Industry 310
        Defining Oil and Gas 310
        The Oil and Gas Value Chain 313
        Current Trends in the Oil and Gas Industry 314
    Industry Key Challenges as Digitization Drivers 316
        IoT and the Oil and Gas Industry 319
    Improving Operational Efficiency 321
        The Purdue Model for Control Hierarchy in Oil and Gas Networks 321
        Oil and Gas Use Cases for IoT 323
    IoT Architectures for Oil and Gas 326
        Control Room Networks for Oil and Gas 327
        Wired Networks for Oil and Gas 328
        Wireless Networks for Oil and Gas 328
        Wireless Use Cases in the Oil and Gas Industry 332
        The Risk Control Framework for Cybersecurity in IoT 335
        Securing the Oil and Gas PCN: Background 337
        Securing the Oil and Gas PCN: Use Cases and Requirements 338
        Data Analytics for Predictive Asset Monitoring 341
    Summary 342
    References 343
Chapter 11 Utilities 345
    An Introduction to the Power Utility Industry 347
        The IT/OT Divide in Utilities 348
    The GridBlocks Reference Model 350
        GridBlocks: An 11-Tiered Reference Architecture 352
    The Primary Substation GridBlock and Substation Automation 356
        SCADA 357
        IEC 61850: The Modernization of Substation Communication
        Standards 358
        Network Resiliency Protocols in the Substation 362
    System Control GridBlock: The Substation WAN 364
        Defining Teleprotection 364
        Designing a WAN for Teleprotection 367
    The Field Area Network (FAN) GridBlock 369
        Advanced Metering Infrastructure 371
        Other Use Cases 373
        Securing the Smart Grid 377
        NERC CIP 378
    Smart Grid Security Considerations 380
    The Future of the Smart Grid 381
    Summary 382
    References 383
Chapter 12 Smart and Connected Cities 385
    An IoT Strategy for Smarter Cities 386
        Vertical IoT Needs for Smarter Cities 386
        Global vs. Siloed Strategies 389
    Smart City IoT Architecture 390
        Street Layer 391
        City Layer 394
        Data Center Layer 395
        Services Layer 397
        On-Premises vs. Cloud 398
    Smart City Security Architecture 398
    Smart City Use-Case Examples 401
        Connected Street Lighting 401
        Connected Environment 409
    Summary 411
    References 412
Chapter 13 Transportation 413
    Transportation and Transports 413
    Transportation Challenges 415
        Roadways 415
        Mass Transit 416
        Rail 417
        Challenges for Transportation Operators and Users 418
    IoT Use Cases for Transportation 420
        Connected Cars 421
        Connected Fleets 422
        Infrastructure and Mass Transit 422
    An IoT Architecture for Transportation 427
        IoT Technologies for Roadways 427
        Connected Roadways Network Architecture 434
        Extending the Roadways IoT Architecture to Bus Mass Transit 440
        Extending Bus IoT Architecture to Railways 442
    Summary 447
    References 448
Chapter 14 Mining 449
    Mining Today and Its Challenges 451
        Scale 451
        Safety 455
        Environment 455
        Security 456
        Volatile Markets 456
    Challenges for IoT in Modern Mining 456
        The OT Roles in Mining 456
        Connectivity 457
    An IoT Strategy for Mining 459
        Improved Safety and Location Services 459
        Location Services 461
        Improved Efficiencies 464
        Improved Collaboration 465
        IoT Security for Mining 466
    An Architecture for IoT in Mining 467
        IEEE 802.11 as the IoT Access Layer 468
        802.11 Outdoor Wireless Mesh 468
        4G/LTE 474
        Wireless in Underground Mining 475
        Industrial Wireless 476
        Isolated vs. Connected Mine Networks 476
        Core Network Connectivity 478
        Network Design Consideration for Mining Applications 479
        Data Processing 480
    Summary 481
Chapter 15 Public Safety 483
    Overview of Public Safety 484
        Public Safety Objects and Exchanges 484
        Public and Private Partnership for Public Safety IoT 486
        Public Safety Adoption of Technology and the IoT 488
    An IoT Blueprint for Public Safety 489
        Mission Continuum 489
        Mission Fabric 490
        Inter-agency Collaboration 491
    Emergency Response IoT Architecture 493
        Mobile Command Center 494
        Mobile Vehicles: Land, Air, and Sea 501
    IoT Public Safety Information Processing 506
    School Bus Safety 508
        Bus Location and Student Onboarding/Offboarding 508
        Driver Behavior Reporting 510
        Diagnostic Reporting 511
        Video Surveillance 511
        Student Wi-Fi 513
        Push-to-Talk Communication 513
        School Bus Safety Network Architecture 513
    Summary 514
    Reference 515
9781587144561, TOC, 5/16/2017

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020