Results 11 to 20 of about 13,790 (272)

CoAP over ICN [PDF]

open access: yes2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2016
The Constrained Application Protocol (CoAP) is a specialized Web transfer protocol for resource-oriented applications intended to run on constrained devices, typically part of the Internet of Things. In this paper we leverage Information-Centric Networking (ICN), deployed within the domain of a network provider that interconnects, in addition to other ...
Fotiou, Nikos   +5 more
openaire   +5 more sources

A Low-Power CoAP for Contiki [PDF]

open access: yes2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, 2011
Internet of Things devices will by and large be battery-operated, but existing application protocols have typically not been designed with power-efficiency in mind. In low-power wireless systems, power-efficiency is determined by the ability to maintain a low radio duty cycle: keeping the radio off as much as possible.
Kovatsch M., Duquennoy S., Dunkels A.
openaire   +9 more sources

COAP: Compositional Articulated Occupancy of People [PDF]

open access: yes2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022
ISBN:978-1-6654-6946 ...
Mihajlovic, Marko   +4 more
openaire   +4 more sources

CoAP and Its Performance Evaluation

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2020
ConstrainedApplication Protocol (CoAP) is one of the lightest IoT connectivity protocol.It has been developed for IoT devices that has constrained resources such asmemory, processing power, battery etc. CoAP protocol is built on RESTarchitecture.
Ünal Çavuşoğlu   +3 more
doaj   +6 more sources

CoAP congestion control for the internet of things [PDF]

open access: yesIEEE Communications Magazine, 2016
CoAP is a lightweight RESTful application layer protocol devised for the IoT. Operating on top of UDP, CoAP must handle congestion control by itself. The core CoAP specification defines a basic congestion control mechanism, but it is not capable of adapting to network conditions.
Betzler, August   +3 more
openaire   +7 more sources

Investigating the CoAP Congestion Control Strategies for 6TiSCH-Based IoT Networks

open access: yesIEEE Access, 2023
The Constrained Application Protocol (CoAP) is a RESTful protocol standardized by the IETF and widely used for IoT applications. CoAP includes a default congestion control algorithm to ensure efficient operation under high traffic conditions.
Francesca Righetti   +3 more
doaj   +2 more sources

A Performance Analysis of Internet of Things Networking Protocols: Evaluating MQTT, CoAP, OPC UA

open access: yesApplied Sciences, 2021
IoT data exchange is supported today by different communication protocols and different protocolar frameworks, each of which with its own advantages and disadvantages, and often co-existing in a way that is mandated by vendor policies. Although different
Daniel Silva   +3 more
doaj   +2 more sources

The Constrained Application Protocol (CoAP) [PDF]

open access: yesRequest for Comments, 2014
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have ...
Zach Shelby   +2 more
openaire   +3 more sources

Fine-grained management of CoAP interactions with constrained IoT devices [PDF]

open access: green, 2014
As open standards for the Internet of Things gain traction, the current Intranet of Things will evolve to a truly open Internet of Things, where constrained devices are first class citizens of the public Internet.
Floris Van den Abeele   +3 more
openalex   +3 more sources

Congestion Control in CoAP Observe Group Communication [PDF]

open access: yesSensors, 2019
The Constrained Application Protocol (CoAP) is a simple and lightweight machine-to-machine (M2M) protocol for constrained devices for use in lossy networks which offers a small memory capacity and limited processing.
Chanwit Suwannapong, Chatchai Khunboa
doaj   +4 more sources

Home - About - Disclaimer - Privacy