Building an IoT application requires developers to consider the IoT Application Chain. The first consideration is the source of information which can range from sensors, smart devices, and hybrid technology to gateways. Second are transport mechanisms which will allow the information gathered from the source to be delivered to the network. For wireless connectivity, there are short-range ones such as WiFi and Bluetooth, medium-range such as cellular and long-range which can be satellite. There are also many non-wireless transport mechanisms that can be used. Third is the network infrastructure which is the place where device authorization and authentication will be completed. This is the control point for deciding which device can access the network and what control functions are activated in kind. For example, does the device have the authorization to access a particular service, did it authenticate itself properly, etc. Next, data connections such as the Internet, VPNs, and Point-to-Point connections provide a way to send the data through the network infrastructure to some place else. Then, host systems are where the data is sent and stored. The host systems provide access control for the recipients of the data which can be humans, processes or automation system. Host systems store the data and thereby help determine who needs to have control of the data and can also limit device access based on established rules and processes for that system. The projections are that more than 50 billion devices will be built by 2020 and as a result a lot of data will be generated by sensors, devices etc., which will need to be transported, evaluated and guided to the correct person or process who will be the recipient of the information.

