CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets
2018The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control. Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer ...
C. Bormann +4 more
openaire +1 more source
The Constrained Application Protocol for pervasive machine-to-machine communications
2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 2012In the Constrained RESTful Environments (CoRE) working group at the Internet Engineering Task Force (IETF) a Representational State Transfer (REST) architecture is being defined for constrained nodes and networks, e.g. Wireless Sensor Networks (WSN). The CoRE working group has already proposed a standard called Constrained Application Protocol (CoAP ...
Markus Becker +3 more
openaire +1 more source
Constrained Application Protocol for Low Power Embedded Networks: A Survey
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012IPv6 will make it possible to provide Internet connectivity to any object embedding a communication device. In the same line, Web technologies will make managing, communicating and visualizing any information provided by these devices attractive to the end users and application developers.
Berta Carballido Villaverde +4 more
openaire +1 more source
Sensor Observation Service (SOS)/Constrained Application Protocol (CoAP) proxy design
2016 18th Mediterranean Electrotechnical Conference (MELECON), 2016Sensor networks have expanded their scope and capabilities, becoming a fundamental part of the Internet of Things (IoT). To be able to affront the interoperability needs that this rise brings, it is necessary to have a repository with standard interfaces and messages. This has been addressed through the creation of the Sensor Observation Service (SOS).
J. Pradilla +3 more
openaire +1 more source
Energy Saving in Constrained Application Protocol of Internet of Things
International Journal on Communications Antenna and Propagation (IRECAP), 2016The centralized resource discovery approach in the Constrained Application Protocol (CoAP) is based on the resource directory (RD) model, this directory contains a description for resources held in the servers (sensors and actuators), in which the servers register their resources in the RD while the clients are allowed to perform a lookup operation on ...
Muneer Bani Yassein +2 more
openaire +1 more source
A Short Delay Degree-Constrained Hierarchical Application Layer Multicast Protocol
2009 International Conference on Web Information Systems and Mining, 2009Scalability and efficiency are important for designing application-layer multicast protocol. In this paper, a short delay degree-constrained hierarchical protocol-SDDM is proposed for application-layer multicast. It adopts the idea of layer and cluster to construct multicast group members into a hierarchical architecture.
Jing Li, Yong Wang, Mei Xue, Zhong Tang
openaire +1 more source
Support Context-Adaptation in the Constrained Application Protocol (CoAP)
2019The number of interconnected smart devices has already rapidly increased, and the Internet of Things (IoT) has presented tremendous potential in various domains such as smart cities, healthcare and industrial automation. To integrate the IoT applications to Web to utilise the advantages of Internet infrastructures, the Constrained Application Protocol (
Yuji Dong +3 more
openaire +1 more source
Performance analysis of constrained application protocol (CoAP)
AIP Conference Proceedings, 2023Hadeel Hussein Azeez +1 more
openaire +1 more source
Deterministische und interoperable Kommunikation mit dem Constrained Application Protocol
2019In dieser Arbeit wird untersucht, inwieweit sich Echtzeitanforderungen in der Kommunikation mit einer rein Software-basierten Lösung auf Basis etablierter IoT-Standards unter Verwendung von Standardhardware erfüllen lassen. Hierzu wird schrittweise gezeigt, wie sich eine zeitlich deterministische Kommunikation allein auf Basis des Constrained ...
openaire +2 more sources
Introspecting IoT Protocols for Resources-Constrained Applications
International Journal of Software Engineering and Its Applications, 2017Kuldeep Kumar +2 more
openaire +1 more source

