ExperTeach Networking Logo

IoT Technology

Protocols and Technologies

ExperTeach Networking Logo

The Internet of Things (IoT) uses the protocols of the IP world to provide new applications and network a large number of end devices. Traditional network technologies and protocols are at best a starting point for this. New solutions are required for large-scale networking in the IoT. This training course teaches both the technical basics of networking end devices with IPv4 and IPv6 and the special requirements of the IoT. Practical exercises on a test network provide a better insight into the typical protocols and their implementation.

Course Contents

  • Internet of Things—A Definition
  • Application Areas for IoT
  • Communication Models
  • Networking Technologies (Ethernet, Wireless, Mobile Communications)
  • The Internet Protocol (IPv4 and IPv6)
  • IP Applications for the Internet of Things (HTTP, CoAP, MQTT, etc.)
  • End Devices for IoT
  • Communication Relations and Scalability
  • QoS and Real-Time Capability
  • New Protocols in IoT (6LoWPAN …)
  • Security and Network Management
  • Troubleshooting in Distributed Environments
  • The Connection to the Data Center and Business Applications

The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.

Premium Course Documents

In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.

  • High-quality color prints of the ExperTeach documentation
  • Exclusive folder in an elegant design
  • Document pouch in backpack shape
  • Elegant LAMY ballpoint pen
  • Practical notepad
Premium Print
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation).

Request in-house training now

Target Group

This training course is aimed at technical employees in network planning and operations who need to understand and implement basic protocol sequences and applications for networking the Internet of Things. The course content is deepened through exercises on a test network.

Knowledge Prerequisites

Basic IT knowledge is required for successful participation.

1 Definition and Motivation
1.1 What is IoT?
1.2 Application Areas of IoT
1.3 New technologies in IoT?
1.4 IoT Reference Model
1.5 Layer Models for IoT—Example
1.6 Agents and Standards in IoT
   
2 Transmission and Switching (OSI 1-2)
2.1 Different Technologies—An Overview
2.1.1 ...Low-Rate WPAN— Standard IEEE 802.15.4
2.1.2 Low-Rate WPAN—Devices and Topologies
2.1.3 IEEE 802.15.4—Architecture
2.1.4 IEEE 802.15.4—Modulation and Spreading
2.1.5 IEEE 802.15.4 on Mac Layer (1)—CSMA/CA
2.1.6 IEEE 802.15.4 on MAC Layer (2)
2.2 Ethernet
2.3 Wireless LAN
2.4 Bluetooth (IEEE 802.15.1)
2.5 LoRaWAN
2.5.1 LoRa Modulation
2.5.2 LoRaWAN—Star Topology
2.5.3 LoRaWAN—Security
2.6 Thread
2.6.1 Thread: Topology and Application
2.6.2 Thread: Security by Commissioning
2.7 Sigfox
2.8 NB-IoT Overview
   
3 The Network Layer: IP and Routing in IoT
3.1 Why IP in IoT?
3.2 Real-time Capability and QoS
3.3 IPv6—Demands Made on the New IP
3.3.1 The Header Format in IPv6
3.3.2 Extensions with the Next Header
3.3.3 IPv6 Addresses
3.3.4 Global Unicast Addresses
3.4 Address Assignment under IPv6
3.5 IPv6 over IEEE 802.15.4 (RFC 4944)
3.5.1 6LoWPAN (RFC 4944) Overview
3.5.2 6LoWPAN Dispatch Byte
3.5.3 6LoWPAN Header Overview
3.5.4 Mesh Type and Mesh Addressing Header
3.5.5 Fragmentation Type and Header
3.5.6 Addressing with 6LoWPAN
3.5.7 Header Compression in 6LoWPAN
3.6 Routing in LoWPANs
3.6.1 RPL Routing Protocol
3.6.2 RPL Topologies
3.6.3 DODAG Setup
3.6.4 Mesh-Under vs. Route-Over
3.7 IPv6 over Bluetooth Low Energy (BLE)
3.8 ZigBee and IPv6
3.9 Thread
   
4 Protocols of the Application Layer
4.1 Which Transport Protocol?
4.1.1 UDP—Connectionless and Unacknowledged
4.1.2 TCP—Connection-oriented and Acknowledged
4.2 Data Transport without a Special Application Protocol
4.3 MQTT
4.3.1 The Protocol
4.3.2 MQTT Server/Broker and Clients
4.3.3 Subscriptions, Topics, Topic Filter, Session
4.3.4 Data Formats in MQTT Packets
4.3.5 Flags in the Fixed Header
4.3.6 Variable Header CONNECT Message (1)
4.3.7 CONNACK (Acknowledge connection request)
4.3.8 MQTT Message Types: CONNECT, CONNACK
4.3.9 CONNACK—Return Codes
4.3.10 MQTT PUBLISH Fixed Header
4.3.11 MQTT PUBLISH Variable Header
4.3.12 MQTT Message Types PUBLISH, PUBACK, PUBREC, PUBREL, and PUBCOMP
4.3.13 MQTT SUBSCRIBE
4.3.14 MQTT Message Types SUBSCRIBE, SUBACK, UNSUBSCRIBE, UNSUBACK
4.3.15 MQTT Message Types PINGREQ, PINGRESP, DISCONNECT
4.3.16 QoS in MQTT
4.3.17 Retained Messages
4.3.18 Last Will Messages
4.4 Constraint Application Protocol (CoAP)
4.4.1 CoAP—HTTP
4.4.2 CoAP Message Format
4.4.3 CoAP Message Exchange
4.4.4 CoAP Request/Response Model
4.4.5 CoAP—Handling Message Loss
4.4.6 CoAP—Proxy and Caching
4.4.7 CoAP Methods
4.4.8 CoAP Methods (Continued)
   
5 IoT Platforms and Connection to the Cloud and Data Center
5.1 IoT Models
5.2 IoT Platforms—Basic Functions
5.3 Cisco IoT Reference Model
5.4 Connection of “Things” to the Cloud
5.4.1 Fog/Edge Computing
5.5 Interfaces of IoT Platforms
5.6 IoT Network Management
   
6 Security and Troubleshooting in IoT
6.1 The Threat Situation
6.1.1 Protection Objectives: Security, Privacy, Safety
6.1.2 Security also beyond the Carpet: from IT to OT
6.1.3 Privacy and Data Protection
6.1.4 New Aims of Attacks
6.1.5 Typology of the Attackers
6.1.6 Aims of Attackers
6.2 Typical Attacks
6.2.1 Security by Design
6.2.2 Security by Means of Documentation and Support
6.2.3 RIPE and ATLAS Network
6.2.4 OWASP—IoT Project
6.2.5 Embedded Security Approach
6.3 Classic Security Approaches
6.4 Security Check List IoT
6.5 Troubleshooting and Systematic Error Search
6.5.1 Baselining
   
A List of Abbreviations

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

The Internet of Things (IoT) uses the protocols of the IP world to provide new applications and network a large number of end devices. Traditional network technologies and protocols are at best a starting point for this. New solutions are required for large-scale networking in the IoT. This training course teaches both the technical basics of networking end devices with IPv4 and IPv6 and the special requirements of the IoT. Practical exercises on a test network provide a better insight into the typical protocols and their implementation.

Course Contents

  • Internet of Things—A Definition
  • Application Areas for IoT
  • Communication Models
  • Networking Technologies (Ethernet, Wireless, Mobile Communications)
  • The Internet Protocol (IPv4 and IPv6)
  • IP Applications for the Internet of Things (HTTP, CoAP, MQTT, etc.)
  • End Devices for IoT
  • Communication Relations and Scalability
  • QoS and Real-Time Capability
  • New Protocols in IoT (6LoWPAN …)
  • Security and Network Management
  • Troubleshooting in Distributed Environments
  • The Connection to the Data Center and Business Applications

The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.

Premium Course Documents

In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.

  • High-quality color prints of the ExperTeach documentation
  • Exclusive folder in an elegant design
  • Document pouch in backpack shape
  • Elegant LAMY ballpoint pen
  • Practical notepad
Premium Print
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation).

Request in-house training now

Target Group

This training course is aimed at technical employees in network planning and operations who need to understand and implement basic protocol sequences and applications for networking the Internet of Things. The course content is deepened through exercises on a test network.

Knowledge Prerequisites

Basic IT knowledge is required for successful participation.

1 Definition and Motivation
1.1 What is IoT?
1.2 Application Areas of IoT
1.3 New technologies in IoT?
1.4 IoT Reference Model
1.5 Layer Models for IoT—Example
1.6 Agents and Standards in IoT
   
2 Transmission and Switching (OSI 1-2)
2.1 Different Technologies—An Overview
2.1.1 ...Low-Rate WPAN— Standard IEEE 802.15.4
2.1.2 Low-Rate WPAN—Devices and Topologies
2.1.3 IEEE 802.15.4—Architecture
2.1.4 IEEE 802.15.4—Modulation and Spreading
2.1.5 IEEE 802.15.4 on Mac Layer (1)—CSMA/CA
2.1.6 IEEE 802.15.4 on MAC Layer (2)
2.2 Ethernet
2.3 Wireless LAN
2.4 Bluetooth (IEEE 802.15.1)
2.5 LoRaWAN
2.5.1 LoRa Modulation
2.5.2 LoRaWAN—Star Topology
2.5.3 LoRaWAN—Security
2.6 Thread
2.6.1 Thread: Topology and Application
2.6.2 Thread: Security by Commissioning
2.7 Sigfox
2.8 NB-IoT Overview
   
3 The Network Layer: IP and Routing in IoT
3.1 Why IP in IoT?
3.2 Real-time Capability and QoS
3.3 IPv6—Demands Made on the New IP
3.3.1 The Header Format in IPv6
3.3.2 Extensions with the Next Header
3.3.3 IPv6 Addresses
3.3.4 Global Unicast Addresses
3.4 Address Assignment under IPv6
3.5 IPv6 over IEEE 802.15.4 (RFC 4944)
3.5.1 6LoWPAN (RFC 4944) Overview
3.5.2 6LoWPAN Dispatch Byte
3.5.3 6LoWPAN Header Overview
3.5.4 Mesh Type and Mesh Addressing Header
3.5.5 Fragmentation Type and Header
3.5.6 Addressing with 6LoWPAN
3.5.7 Header Compression in 6LoWPAN
3.6 Routing in LoWPANs
3.6.1 RPL Routing Protocol
3.6.2 RPL Topologies
3.6.3 DODAG Setup
3.6.4 Mesh-Under vs. Route-Over
3.7 IPv6 over Bluetooth Low Energy (BLE)
3.8 ZigBee and IPv6
3.9 Thread
   
4 Protocols of the Application Layer
4.1 Which Transport Protocol?
4.1.1 UDP—Connectionless and Unacknowledged
4.1.2 TCP—Connection-oriented and Acknowledged
4.2 Data Transport without a Special Application Protocol
4.3 MQTT
4.3.1 The Protocol
4.3.2 MQTT Server/Broker and Clients
4.3.3 Subscriptions, Topics, Topic Filter, Session
4.3.4 Data Formats in MQTT Packets
4.3.5 Flags in the Fixed Header
4.3.6 Variable Header CONNECT Message (1)
4.3.7 CONNACK (Acknowledge connection request)
4.3.8 MQTT Message Types: CONNECT, CONNACK
4.3.9 CONNACK—Return Codes
4.3.10 MQTT PUBLISH Fixed Header
4.3.11 MQTT PUBLISH Variable Header
4.3.12 MQTT Message Types PUBLISH, PUBACK, PUBREC, PUBREL, and PUBCOMP
4.3.13 MQTT SUBSCRIBE
4.3.14 MQTT Message Types SUBSCRIBE, SUBACK, UNSUBSCRIBE, UNSUBACK
4.3.15 MQTT Message Types PINGREQ, PINGRESP, DISCONNECT
4.3.16 QoS in MQTT
4.3.17 Retained Messages
4.3.18 Last Will Messages
4.4 Constraint Application Protocol (CoAP)
4.4.1 CoAP—HTTP
4.4.2 CoAP Message Format
4.4.3 CoAP Message Exchange
4.4.4 CoAP Request/Response Model
4.4.5 CoAP—Handling Message Loss
4.4.6 CoAP—Proxy and Caching
4.4.7 CoAP Methods
4.4.8 CoAP Methods (Continued)
   
5 IoT Platforms and Connection to the Cloud and Data Center
5.1 IoT Models
5.2 IoT Platforms—Basic Functions
5.3 Cisco IoT Reference Model
5.4 Connection of “Things” to the Cloud
5.4.1 Fog/Edge Computing
5.5 Interfaces of IoT Platforms
5.6 IoT Network Management
   
6 Security and Troubleshooting in IoT
6.1 The Threat Situation
6.1.1 Protection Objectives: Security, Privacy, Safety
6.1.2 Security also beyond the Carpet: from IT to OT
6.1.3 Privacy and Data Protection
6.1.4 New Aims of Attacks
6.1.5 Typology of the Attackers
6.1.6 Aims of Attackers
6.2 Typical Attacks
6.2.1 Security by Design
6.2.2 Security by Means of Documentation and Support
6.2.3 RIPE and ATLAS Network
6.2.4 OWASP—IoT Project
6.2.5 Embedded Security Approach
6.3 Classic Security Approaches
6.4 Security Check List IoT
6.5 Troubleshooting and Systematic Error Search
6.5.1 Baselining
   
A List of Abbreviations

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.