ExperTeach Networking Logo

Technology of the IoT

Protocols and Technologies

ExperTeach Networking Logo

The Internet of Things (IoT) uses the protocols of the IP world to make new applications available and network a multitude of end devices. The classic network technologies and protocols constitute a basis for this task, at best. For the large-scale networking in IoT, new solutions are required. This training imparts both the technological basics for the networking of end devices with IPv4 and IPv6, as well as the special requirements of the IoT. Practice-related exercises in a test network permit a better insight into typical protocols and their implementation.

Course Contents

  • Internet of Things—A Definition
  • Application Areas for IoT
  • Communication Models
  • Networking Technologies (Ethernet, Wireless, Mobile Communications)
  • The Internet Protocol (IPv4 and IPv6)
  • IP Applications for the Internet of Things (HTTP, CoAP, MQTT, etc.)
  • End Devices for IoT
  • Communication Relations and Scalability
  • QoS and Real-Time Capability
  • New Protocols in IoT (6LoWPAN …)
  • Security and Network Management
  • Troubleshooting in Distributed Environments
  • The Connection to the Data Center and Business Applications

Print E-Book PDF Symbol You will receive the comprehensive documentation package of the ExperTeach Networking series – printed documentation, e-book, and personalized PDF! As online participant, you will receive the e-book and the personalized PDF.

Target Group

The training addresses technically-oriented employees in network planning and operation who are expected to understand basic protocol processes and applications for the networking of the Internet of Things. The course contents will be deepened by hands-on exercises in a test network.

Knowledge Prerequisites

Basic IT know-how is mandatory for a successful participation in the course.

1 Definition and Motivation
1.1 What is IoT?
1.2 Application Areas of IoT
1.3 New Access Technologies in IoT?
1.4 IoT Reference Model
1.5 Layer Models for IoT—Example
1.6 Agents and Standards in IoT
2 Transmission and Switching (OSI 1-2)
2.1 Different Technologies—An Overview
2.1.1 Low-Rate WPAN— Standard IEEE 802.15.4
2.1.2 Low-Rate WPAN—Devices and Topologies
2.1.3 IEEE 802.15.4—Architecture
2.1.4 IEEE 802.15.4—Modulation and Spreading
2.1.5 IEEE 802.15.4 on Mac Layer (1)—CSMA/CA
2.1.6 IEEE 802.15.4 on MAC Layer (2)
2.2 Ethernet
2.3 Wireless LAN
2.4 Bluetooth (IEEE 802.15.1)
2.5 LoRaWAN
2.5.1 LoRa Modulation
2.5.2 LoRaWAN—Star Topology
2.5.3 LoRaWAN—Security
2.6 Thread
2.6.1 Thread: Topology and Application
2.6.2 Thread: Security by Commissioning
2.7 Sigfox
2.8 NB-IoT Overview
3 The Network Layer: IP and Routing in IoT
3.1 Why IP in IoT?
3.2 Real-time Capability and QoS
3.3 IPv6—Demands Made on the New IP
3.3.1 The Header Format in IPv6
3.3.2 Extensions with the Next Header
3.3.3 IPv6 Addresses
3.3.4 Global Unicast Addresses
3.4 Address Assignment under IPv6
3.5 IPv6 over IEEE 802.15.4 (RFC 4944)
3.5.1 6LoWPAN (RFC 4944) Overview
3.5.2 6LoWPAN Dispatch Byte
3.5.3 6LoWPAN Header Overview
3.5.4 Mesh Type and Mesh Addressing Header
3.5.5 Fragmentation Type and Header
3.5.6 Addressing with 6LoWPAN
3.5.7 Header Compression in 6LoWPAN
3.6 Routing in LoWPANs
3.6.1 RPL Routing Protocol
3.6.2 RPL Topologies
3.6.3 DODAG Setup
3.6.4 Mesh-Under vs. Route-Over
3.7 IPv6 over Bluetooth Low Energy (BLE)
3.8 ZigBee and IPv6
3.9 Thread
4 Protocols of the Application Layer
4.1 Which Transport Protocol?
4.1.1 UDP—Connectionless and Unacknowledged
4.1.2 TCP—Connection-oriented and Acknowledged
4.2 Data Transport without a Special Application Protocol
4.3 MQTT
4.3.1 The Protocol
4.3.2 MQTT Servers/Brokers and Clients
4.3.3 Subscriptions, Topics, Topic Filter, Session
4.3.4 Data Format in MQTT Packets
4.3.5 Flags in the TCP Header
4.3.6 Variable Header CONNECT Message (1)
4.3.7 CONNACK (Acknowledge Connection Request)
4.3.8 MQTT Message Types: CONNECT, CONNACK
4.3.9 CONNACK—Return Codes
4.3.10 MQTT PUBLISH Fixed Header
4.3.11 MQTT PUBLISH Variable Header
4.3.12 MQTT Message Types PUBLISH, PUBACK, PUBREC, PUBREL, and PUBCOMP
4.3.13 MQTT SUBSCRIBE
4.3.14 MQTT Message Types SUBSCRIBE, SUBACK, UNSUBSCRIBE, UNSUBACK
4.3.15 MQTT Message Types PINGREQ, PINGRESP, DISCONNECT
4.3.16 QoS in MQTT
4.3.17 Retained Messages
4.3.18 Last Will Messages
4.4 Constraint Application Protocol (CoAP)
4.4.1 CoAP—HTTP
4.4.2 CoAP Message Format
4.4.3 CoAP Message Exchange
4.4.4 CoAP Request/Response Model
4.4.5 CoAP—Handling Message Loss
4.4.6 CoAP—Proxy and Caching
4.4.7 CoAP Methods
4.4.8 CoAP Methods (Continued)
5 IoT Platforms and Connection to the Cloud and Data Center
5.1 IoT Models
5.2 IoT Platforms—Basic Functions
5.3 Cisco IoT Reference Model
5.4 Connection of “Things” to the Cloud
5.4.1 Fog/Edge Computing
5.5 Interfaces of IoT Platforms
5.6 IoT Network Management
6 Security and Troubleshooting in IoT
6.1 The Threat Situation
6.1.1 Protection Objectives: Security, Privacy, Safety
6.1.2 Security also beyond the Carpet: from IT to OT
6.1.3 Privacy and Data Protection
6.1.4 New Aims of Attacks
6.1.5 Typology of the Attackers
6.1.6 Aims of Attackers
6.2 Typical Attacks
6.2.1 Security by Design
6.2.2 Security by Means of Documentation and Support
6.2.3 RIPE and ATLAS Network
6.2.4 OWASP—IoT Project
6.2.5 Embedded Security Approach
6.3 Classic Security Approaches
6.4 Security Check List IoT
6.5 Troubleshooting and Systematic Error Search
6.5.1 Baselining
A List of Abbreviations

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

The Internet of Things (IoT) uses the protocols of the IP world to make new applications available and network a multitude of end devices. The classic network technologies and protocols constitute a basis for this task, at best. For the large-scale networking in IoT, new solutions are required. This training imparts both the technological basics for the networking of end devices with IPv4 and IPv6, as well as the special requirements of the IoT. Practice-related exercises in a test network permit a better insight into typical protocols and their implementation.

Course Contents

  • Internet of Things—A Definition
  • Application Areas for IoT
  • Communication Models
  • Networking Technologies (Ethernet, Wireless, Mobile Communications)
  • The Internet Protocol (IPv4 and IPv6)
  • IP Applications for the Internet of Things (HTTP, CoAP, MQTT, etc.)
  • End Devices for IoT
  • Communication Relations and Scalability
  • QoS and Real-Time Capability
  • New Protocols in IoT (6LoWPAN …)
  • Security and Network Management
  • Troubleshooting in Distributed Environments
  • The Connection to the Data Center and Business Applications

Print E-Book PDF Symbol You will receive the comprehensive documentation package of the ExperTeach Networking series – printed documentation, e-book, and personalized PDF! As online participant, you will receive the e-book and the personalized PDF.

Target Group

The training addresses technically-oriented employees in network planning and operation who are expected to understand basic protocol processes and applications for the networking of the Internet of Things. The course contents will be deepened by hands-on exercises in a test network.

Knowledge Prerequisites

Basic IT know-how is mandatory for a successful participation in the course.

1 Definition and Motivation
1.1 What is IoT?
1.2 Application Areas of IoT
1.3 New Access Technologies in IoT?
1.4 IoT Reference Model
1.5 Layer Models for IoT—Example
1.6 Agents and Standards in IoT
2 Transmission and Switching (OSI 1-2)
2.1 Different Technologies—An Overview
2.1.1 Low-Rate WPAN— Standard IEEE 802.15.4
2.1.2 Low-Rate WPAN—Devices and Topologies
2.1.3 IEEE 802.15.4—Architecture
2.1.4 IEEE 802.15.4—Modulation and Spreading
2.1.5 IEEE 802.15.4 on Mac Layer (1)—CSMA/CA
2.1.6 IEEE 802.15.4 on MAC Layer (2)
2.2 Ethernet
2.3 Wireless LAN
2.4 Bluetooth (IEEE 802.15.1)
2.5 LoRaWAN
2.5.1 LoRa Modulation
2.5.2 LoRaWAN—Star Topology
2.5.3 LoRaWAN—Security
2.6 Thread
2.6.1 Thread: Topology and Application
2.6.2 Thread: Security by Commissioning
2.7 Sigfox
2.8 NB-IoT Overview
3 The Network Layer: IP and Routing in IoT
3.1 Why IP in IoT?
3.2 Real-time Capability and QoS
3.3 IPv6—Demands Made on the New IP
3.3.1 The Header Format in IPv6
3.3.2 Extensions with the Next Header
3.3.3 IPv6 Addresses
3.3.4 Global Unicast Addresses
3.4 Address Assignment under IPv6
3.5 IPv6 over IEEE 802.15.4 (RFC 4944)
3.5.1 6LoWPAN (RFC 4944) Overview
3.5.2 6LoWPAN Dispatch Byte
3.5.3 6LoWPAN Header Overview
3.5.4 Mesh Type and Mesh Addressing Header
3.5.5 Fragmentation Type and Header
3.5.6 Addressing with 6LoWPAN
3.5.7 Header Compression in 6LoWPAN
3.6 Routing in LoWPANs
3.6.1 RPL Routing Protocol
3.6.2 RPL Topologies
3.6.3 DODAG Setup
3.6.4 Mesh-Under vs. Route-Over
3.7 IPv6 over Bluetooth Low Energy (BLE)
3.8 ZigBee and IPv6
3.9 Thread
4 Protocols of the Application Layer
4.1 Which Transport Protocol?
4.1.1 UDP—Connectionless and Unacknowledged
4.1.2 TCP—Connection-oriented and Acknowledged
4.2 Data Transport without a Special Application Protocol
4.3 MQTT
4.3.1 The Protocol
4.3.2 MQTT Servers/Brokers and Clients
4.3.3 Subscriptions, Topics, Topic Filter, Session
4.3.4 Data Format in MQTT Packets
4.3.5 Flags in the TCP Header
4.3.6 Variable Header CONNECT Message (1)
4.3.7 CONNACK (Acknowledge Connection Request)
4.3.8 MQTT Message Types: CONNECT, CONNACK
4.3.9 CONNACK—Return Codes
4.3.10 MQTT PUBLISH Fixed Header
4.3.11 MQTT PUBLISH Variable Header
4.3.12 MQTT Message Types PUBLISH, PUBACK, PUBREC, PUBREL, and PUBCOMP
4.3.13 MQTT SUBSCRIBE
4.3.14 MQTT Message Types SUBSCRIBE, SUBACK, UNSUBSCRIBE, UNSUBACK
4.3.15 MQTT Message Types PINGREQ, PINGRESP, DISCONNECT
4.3.16 QoS in MQTT
4.3.17 Retained Messages
4.3.18 Last Will Messages
4.4 Constraint Application Protocol (CoAP)
4.4.1 CoAP—HTTP
4.4.2 CoAP Message Format
4.4.3 CoAP Message Exchange
4.4.4 CoAP Request/Response Model
4.4.5 CoAP—Handling Message Loss
4.4.6 CoAP—Proxy and Caching
4.4.7 CoAP Methods
4.4.8 CoAP Methods (Continued)
5 IoT Platforms and Connection to the Cloud and Data Center
5.1 IoT Models
5.2 IoT Platforms—Basic Functions
5.3 Cisco IoT Reference Model
5.4 Connection of “Things” to the Cloud
5.4.1 Fog/Edge Computing
5.5 Interfaces of IoT Platforms
5.6 IoT Network Management
6 Security and Troubleshooting in IoT
6.1 The Threat Situation
6.1.1 Protection Objectives: Security, Privacy, Safety
6.1.2 Security also beyond the Carpet: from IT to OT
6.1.3 Privacy and Data Protection
6.1.4 New Aims of Attacks
6.1.5 Typology of the Attackers
6.1.6 Aims of Attackers
6.2 Typical Attacks
6.2.1 Security by Design
6.2.2 Security by Means of Documentation and Support
6.2.3 RIPE and ATLAS Network
6.2.4 OWASP—IoT Project
6.2.5 Embedded Security Approach
6.3 Classic Security Approaches
6.4 Security Check List IoT
6.5 Troubleshooting and Systematic Error Search
6.5.1 Baselining
A List of Abbreviations

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.