Professional Documents
Culture Documents
Notes:
• This course is heavily based on the Cisco Networking
Academy course: IoT Fundamentals: Connecting Things
version 2.01. It is recommended to enroll in this course
to gain full access to online materials.
• Parts of this content is copyrighted by Cisco.
• Main changes from original course:
• Removed the business canvas model
• Added a project instead of the hackathon.
Session 5
Fog Networks and Cloud Computing
Session Outline
Image by Wilgengebroed on Flickr - Cropped and sign removed from Internet of things signed by the author.jpg, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=32745645
4G
802.11g
802.11a
3G
802.11b VSAT
Medium BW
2G
ZigBee/
Bluetooth BLE
802.15.4
WBAN
Low BW 802.15.6 WPAN LPWAN
802.15.3
RFID/NFC
1990s 2010s
(2G) (4G)
Activities
• https://www.youtube.com/watch?v=3C02F-YRsgY
5.6 Summary
• Personal information related to health, location, wealth, personal
preferences and behaviors is passing through the IoT devices in increasing
volumes. This increase in volume elevates the relevance of increasing the
attention on data privacy and data protection.
• New wireless technologies and protocols, such as ZigBee, Bluetooth,
4G/5G, and LoRaWAN, have been developed to accommodate the
diversity of IoT devices. Wireless technology is selected based on the
range of coverage, bandwidth requirements, power consumption, and
deployment location.
• Wireless security considerations include: selecting a secure protocol,
protection for management frames, identification of frequency jamming,
detecting rogue access points, and using security at the application layer.
• Cloud computing is a service that offers off-premise, on-demand access
to a shared pool of configurable computing resources. Cloud computing
offers services such as IaaS, PaaS, mPaaS and SaaS.
eAcademy.ps Internet of Things 48
Software is Everywhere
References
Thank you