CWISA Journey – Module 2 Summary
The Internet of Things (IoT)
In Module 2 of the CWISA syllabus, the focus shifts from general wireless fundamentals to the Internet of Things (IoT) itself. This chapter explains what IoT really means, how it evolved, where it is used, and how IoT systems are structured from sensors to applications.
This module helped me clearly separate IoT facts from IoT buzzwords.
Defining the Internet of Things (IoT)
The term Internet of Things was coined by Kevin Ashton in the late 1990s during his work with RFID in supply-chain systems.
According to the CWNP definition, IoT refers to the interconnection of physical and virtual things—mobile or stationary—using connectivity and data transfer protocols to enable:
-
Monitoring
-
Sensing
-
Actuation
-
Interaction
-
Anywhere, anytime
A key takeaway from this module is:
IoT does NOT always require the Internet.
Many IoT deployments operate as local wireless sensor networks (WSNs), where data is processed on a LAN or through a gateway without ever reaching the public Internet.
Another important distinction:
IoT is not the same as AI, Big Data, or Cloud. Those technologies may consume IoT data, but IoT itself is about connecting objects that do not depend on direct human interaction.
Industrial Revolutions & IoT Milestones
The sources position IoT at the heart of Industry 4.0, which is defined by:
-
Ubiquitous connectivity
-
Low-cost sensors
-
Edge computing
-
Machine learning
An important milestone occurred in 2008, when the number of connected devices exceeded the global human population—a turning point that marked IoT’s rapid expansion.
The concept of Industry 5.0 is now emerging, emphasizing:
-
Human safety
-
Sustainability
-
Resource conservation
IoT becomes a tool not just for efficiency, but for responsible innovation.
IoT Verticals and Real-World Use Cases
IoT use cases are grouped into verticals, many of which overlap:
Industrial IoT (IIoT)
-
Integrates IT and OT
-
Manufacturing, oil & gas (upstream, midstream, downstream)
-
Predictive maintenance and automation
Healthcare IoT (HIoT)
-
Wearables, implantables, ingestibles
-
Patient monitoring, asset tracking, remote care
Retail IoT
-
Automated checkout systems
-
Location-based advertising
-
Inventory and supply chain optimization
Transportation IoT
-
V2X (Vehicle-to-Everything) communication
-
V2V and V2I for autonomous driving and safety
Smart Cities & Buildings
-
Energy management
-
Traffic optimization
-
Environmental and public safety monitoring
Smart Agriculture (Agro-IoT)
-
Soil and weather sensors
-
Livestock health monitoring
-
Smart irrigation systems
IoT Architecture – The 3-Layer Model
CWISA simplifies IoT architecture into three functional layers:
1. Perception (Sensing) Layer
-
Sensors and actuators at the edge
-
Collects raw environmental data
2. Network (Communication) Layer
-
Transfers data via wireless or wired networks
-
Includes gateways and backhaul connectivity
3. Application Layer
-
Data processing, analytics, and visualization
-
Business logic and decision-making systems
This layered view helps with design, troubleshooting, and security planning.
IoT Hardware Components
A standard IoT device typically includes:
-
Radio module – communication
-
Microcontroller (MCU) – logic and control
-
Sensors / Actuators – interaction with the environment
-
Power source – battery, PoE, or energy harvesting
Devices can be:
-
Off-the-shelf commercial products
-
Custom-built using boards like Raspberry Pi Foundation
-
Purpose-built System-on-a-Chip (SoC) designs
IoT Connectivity Technologies
Short-Range Protocols
-
Bluetooth / BLE
-
Zigbee
-
Z-Wave
-
IEEE 802.15.4
Long-Range (LPWAN)
-
LoRaWAN
-
Sigfox
-
NB-IoT
Each protocol is selected based on range, power consumption, bandwidth, and cost.
IoT Data Flow & Security Considerations
IoT data flows generally fall into three categories:
-
CO → CO (Machine-to-Machine / M2M)
-
CO → Service (Device to cloud or platform)
-
CO → User (Alerts, dashboards, notifications)
From a security perspective, administrators must apply the CIA triad:
-
Confidentiality – protect data
-
Integrity – prevent tampering
-
Availability – ensure uptime
Mutual authentication is critical to prevent spoofing, rogue devices, and unauthorized access.
Summary of the Module
Module 2 clearly defines what IoT is and what it is not.
It connects history, architecture, hardware, protocols, and real-world use cases into a single picture.
This module made it clear that successful IoT design starts with understanding connectivity, not just devices a theme that continues throughout the CWISA journey.






Leave a Reply