• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure

How to Manage the Burden of Connecting IoT Devices to the Network

As Internet of Things (IoT) gains steam, more devices are connecting to the network than ever before. How does an IT department deal with the burden of connected devices?

July 12, 2017 Luis Alvarez 2 Comments

Companies that connect products to the network – Internet of Things (IoT) devices like digital signage, audio visual equipment, video surveillance and so on – often end up butting heads with the IT department.

When connecting IoT devices to the network, the burden on IT revolves around several issues, each of which needs to be carefully considered, hopefully before the deployment of said IoT devices takes place.

Related: The Ultimate Guide to Internet of Things

IP Addresses

All IoT devices require some kind of connectivity, which typically means they need one or more IP address. The usual way that networks are set up – especially in many small business environments – doesn’t take into account managing IP addresses the way they should. Devices often end up conflicting with some other device that happens to have the same IP address.

This is common in environments where someone installs a video surveillance system or wireless IP cameras. All the IP addresses assigned to all the devices that are not managed correctly create bandwidth issues. There is a lot of data running through a network that is not designed to have that amount of data on it.

Bandwidth

In many cases, IoT implementations come through the Line-of-Business (LOB) manager, who doesn’t coordinate with IT prior to deployment – especially in smaller organizations that may not have a sophisticated internal IT department or use a service provider that isn’t there all the time. A manager will make the decision to bring in that third-party vendor to plug all the devices in without considering the capacity of the wiring in the walls.

If devices are designed to run at gigabit speed, it’s important to have the infrastructure and switching technology to support that, otherwise those devices won’t perform as well.

Once they are deployed and connect to the Internet, consider what that means for the Internet pipe. If a business has a T1 line or fairly limited bandwidth for Internet access, then a fraction of that Internet access is going to be taken up by bandwidth intensive services, so this will likely impact the organization’s Internet access, whether it’s browsing or accessing cloud-based services like email of hosted ERP. All these issues pop up when the bandwidth requirements of IoT deployments aren’t considered in the beginning.

You need to discuss what’s needed both inside the building as well as connectivity in terms of Internet access. When we have those conversations with our clients in advance of deployment, we can sometimes set up parallel Internet access for IoT devices.

In less than a decade, Luis Alvarez has grown the Alvarez Technology Group, Inc. (ATG) from a small two-person consultancy to the premier information technology (IT) solutions provider on the California Central Coast, delivering IT services to more than 200 companies throughout the state. Luis is considered an expert in business process flow and the integration of IT for maximum profitability. Luis has been received numerous accolades and awards, most notably landing on the MSPMentor 250 list every year since its inception as well as leading the company to an appearance on the Inc. 5000 Fastest-Growing Private Companies list in 2011.

Security

Another emerging issue to worry about is security concerns around IoT deployments.

In a lot of cases, IoT devices are managed by a third-party, especially in manufacturing where there are a lot of sensors in a plant along the production line. All those sensors report into a central console or system that is remotely managed by the third-party that deployed it.

While this is an ongoing relationship, recall that the famous Target hack that happened a few years ago was suspected to have originated with the HVAC vendor that had remote access to the Target systems. This is an example of the security concerns around IoT: the folks who are typically deploying the IoT systems don’t have the background or training that those of us in IT do. We take into consideration the security vulnerabilities when deploying technology.

The problem with cybersecurity is it’s never a point in time issue; the threats continue to evolve and get more sophisticated. The hackers always have access to better tools, so it’s the responsibility of the IT department or the IT service provider to treat those devices on the network as if they were PCs or servers or anything else they maintain.

It’s our job to tell the client that the IoT devices on the network are going to be scanned for vulnerabilities. If anything comes up, we will have to address those things because we want to keep the network safe. We use tools and we scan everything for known vulnerabilities – servers, printers, firewalls, surveillance video cameras, switches – everything that is on the network.

If a client adds a surveillance system with an IP address, we’re going to scan that as well. If there are any vulnerabilities, we’ll bring those to the attention of our clients. If the surveillance system is being maintained under contract by the company that installed it, we’ll reach out to them and tell them we need to update it with a patch.

Involving IT

There’s a tendency for the IT department to try to avoid any involvement with projects that are not IT-related. We’ll say, “This is a digital signage system so why should we care about it?” This resistance is usually why LOB decision makers don’t involve IT – they know they are going to get push back. It’s important for IT and IT service providers to recognize that IoT devices are going to become more and more prevalent on our networks; we have to embrace them and work with the LOB folks to make deployment happen in a more controlled manner. We need to say to LOB managers that we know you are going to do this – let’s do it cooperatively and let’s make sure we take into account all the issues that revolve around deploying this technology.

In some cases, this may mean creating a parallel network that coexists with the IT network but doesn’t cross into it so you can create private IP addresses that don’t conflict with anything on your IT network. Creating a subnetwork is also an option – something we did with one of our clients that deployed a bunch of new smart copiers on their network. When the client ran out of IP addresses, we reengineered their network and created VLANs specifically for those devices and assigned them to a separate subnet.

My Job as a Service Provider

As an IT service provider, we try to keep in mind the business outcomes that the client wants and work to that business outcome. It shouldn’t be about turf wars. It should be about what the client needs and how we do that in the most cost effective way for them.

Related: How to Choose the Right MSP Provider for Your Business

These six considerations will show you how to choose the right MSP provider to bring your business to the peak of technological success.

Sometimes it’s about having a very candid conversation with the client. What we can’t do is say “I don’t want that on my network,” because it’s not our network – it’s our client’s network. If the client has made a business decision to put technology that is not typical IT and more from the OT world, we need to embrace that and figure out how to make that happen. We need to keep the client informed about what the risks are if any, and what issues need to be resolved to get that technology installed.

If the client wants to put in an awesome audio/video system with a digital teleconferencing system and the AV provider says a dedicated ISDN system is needed, we as IT guys have to let the client know we have a perfectly good broadband solution that provides significantly more broadband than ISDN – so why not use that? That is a perfectly legitimate and healthy conversation to have to save the client some money and provide the AV vendor some alternatives.

Our core competency does not include deploying conference room AV systems beyond a certain amount of sophistication. If a client wants all the bells and whistles and a giant screen, we have partners that we bring in that we’ve worked with in the past and we trust.

The same goes for surveillance systems. We can deploy a system for a small office, but when we have a college client that wants to do a campus wide refresh of their camera system we bring in a security company. They scope the project and provide a proposal. Some technology components are involved such as power over Ethernet switches so we carve that out for ourselves. It’s a very collaborative process with the business outcome front and center. What the college wanted was more important than what the partners wanted.

With the IoT, it’s the client’s decision to make and it’s our job to advise.

Ready to start your new project? Download our Technology RFP Checklist!

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Internet of Things, IT Installer, Network Design, Network Implementation

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Software License Spending, SaaS, cloud apps Your Guide to Choosing the Best Cloud Security…
  • IT Budget 2025 Budgeting Tips for IT Pros/CIOs in 2025
  • A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space Five Ways to Reduce Desktop Support Troubleshooting Time

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Comments

  1. Justin jeosep says

    January 11, 2019 at 1:27 am

    Excellent blog! Please keep sharing, It’s great Information on manage burden connecting iot devices to network.. I look forward to read more…

    Reply

Trackbacks

  1. How to Help Your IT Clients Manage the Burden of Connecting IoT Devices - Commercial Integrator says:
    August 21, 2017 at 11:28 am

    […] Read the full story on our sister publication, TechDecisions. […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.