Abstract
A kind of deeper and decisive connectivity is the most indispensable requirement for the projected and promised IoT era. To start with, every common and casual thing in our midst gets systematically digitized. There are several peculiar advantages being accrued out of the digitization process as well as any digitized entities/smart objects/sentient materials. The digitization technologies, if appropriately leveraged, can make ordinary objects in our daily environments into extraordinary articles. Digitized elements are self-, surroundings-, and situation-aware individually as well as collectively. Not only the physical assets but also all kinds of mechanical, electrical, electronics, and IT devices in our places are accordingly instrumented and interconnected. They are interconnected to purposefully and precisely communicate, collaborate, corroborate, and correlate to be innately cognitive in their operations, offerings, and outputs. Further on, everyday electronics, instruments, machines, equipment, wares, utensils, robots, and other fixed, portable, wearable, hearable, implantable, mobile, and nomadic devices in our personal, professional, and social environments are seamlessly integrated. This integration is made feasible with the help of cloud-hosted (traditional IT servers and private, public, and hybrid clouds) cyber applications, services, and data sources in order to be empowered adequately to join in the mainstream computing. Even fog or edge computing is beginning to blossom so that localized and user-centric devices are capable of forming ad hoc clouds of devices. The main objective of fog computing is to set a stimulating foundation for producing next-generation, real-time, insights-filled, context-aware, event-driven, and people-centric applications. Thus, clearly we are heading toward the tightly interconnected world. This chapter is specially crafted for conveying all about the emerging network topologies and communication technologies; key limitations of these technologies have also been discussed. In addition, the chapter provides details on how the inherent issues can be tackled so that the expressed liabilities, vulnerabilities, threats, drawbacks, and loopholes can be surmounted toward secure, safe, and smart IoT era.
References
Chaouchi H (2013) The internet of things: connecting objects. Wiley, Hoboken
Zhu L, Zhang Z, Xu C (2017) Secure and privacy-preserving data communication in internet of things. Springer, Singapore
Holler J, Tsiatsis V, Mulligan C, Avesand S, Karnouskos S, Boyle D (2014) From machine-to-machine to the internet of things: introduction to a new age of intelligence. Academic, Oxford
Zhao B, Kubiatowicz J, Joseph A, Tapestry AD (2001) An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, Computer Science Division, U. C. Berkeley, April 2001
Liang W, Cheng L, Tang M (2016) Identity recognition using biological electroencephalogram sensors. http://www.hindawi.com/journals/js/. Hindawi Limited, Accessed 12 Feb 2017
Lin L, Yue X (2017) Sensors, http://www.mdpi.com/journal/sensors. Accessed 20 Feb 2017
Condie TE, Kamvar SD, Garcia-Molina H (2004) Adaptive peer-to-peer topologies, Stanford University, Stanford, CA 94306, 2004
Stoica I, Morris R, Karger D, Kaashoek MF, Chord HB, (2001) A scalable peer-to-peer lookup service for Internet applications. Technical Report TR-819, MIT, March 2001
Perino D, Varvello M (2011) A reality check for content-centric networking, bell labs, alcatel-lucent, Villarceaux, France, Bell Labs, Alcatel-Lucent, Holmdel, USA, 2011
Carofiglio G, Gallo M, Muscariello L, Perino D (2011) Modeling data transfer in content-centric networking, Bell Labs, Alcatel-Lucent, France, Orange Labs, France Telecom, France, 2011
Named data networking (2016) http://www.named-data.net/. Accessed 20 Dec 2016
RPMA Technology. (2017) www.ingenu.com. Accessed 5 Jan 2017
Kristofer S. Pister J, Doherty L (2008) TSMP: Time Synchronized Mesh Protocol, Proceedings of the IASTED International Symposium on Distributed Sensor Networks (DSN08), Orlando, Florida, USA, 2008
Bor M, Roedig U, Voigt T, Alonso JM, (2016) Do LoRa Low-power wide-area networks scale?, MSWiM ‘16, ACM, 13–17 November 2016
Akyildiz IF, Jornet JM (2010) The internet of nano-things georgia institute of technology, IEEE wireless communications, December 2010
XMPP Internet of Things (2016) http://www.xmpp-iot.org/. Accessed 7 Dec 2016
Singh M, Rajan MA, Shivraj VL, Balamuralidhar P (2015) Secure MQTT for Internet of Things (IoT), Fifth international conference on communication systems and network technologies, Gwalior, 2015, pp 746–751
Kuzlu M, Pipattanasomporn M, Rahman S (2015) Review of communication technologies for smart homes/building applications, IEEE innovative smart grid technologies – Asia (ISGT ASIA), 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Beaulah Soundarabai, P., Chelliah, P.R. (2017). Networking Topologies and Communication Technologies for the IoT Era. In: Mahmood, Z. (eds) Connected Environments for the Internet of Things. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-70102-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-70102-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70101-1
Online ISBN: 978-3-319-70102-8
eBook Packages: Computer ScienceComputer Science (R0)