Results 211 to 220 of about 332,949 (253)
Some of the next articles are maybe not open access.

CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets

2018
The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control. Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer ...
C. Bormann   +4 more
openaire   +1 more source

The Constrained Application Protocol for pervasive machine-to-machine communications

2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 2012
In the Constrained RESTful Environments (CoRE) working group at the Internet Engineering Task Force (IETF) a Representational State Transfer (REST) architecture is being defined for constrained nodes and networks, e.g. Wireless Sensor Networks (WSN). The CoRE working group has already proposed a standard called Constrained Application Protocol (CoAP ...
Markus Becker   +3 more
openaire   +1 more source

Constrained Application Protocol for Low Power Embedded Networks: A Survey

2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
IPv6 will make it possible to provide Internet connectivity to any object embedding a communication device. In the same line, Web technologies will make managing, communicating and visualizing any information provided by these devices attractive to the end users and application developers.
Berta Carballido Villaverde   +4 more
openaire   +1 more source

Sensor Observation Service (SOS)/Constrained Application Protocol (CoAP) proxy design

2016 18th Mediterranean Electrotechnical Conference (MELECON), 2016
Sensor networks have expanded their scope and capabilities, becoming a fundamental part of the Internet of Things (IoT). To be able to affront the interoperability needs that this rise brings, it is necessary to have a repository with standard interfaces and messages. This has been addressed through the creation of the Sensor Observation Service (SOS).
J. Pradilla   +3 more
openaire   +1 more source

Energy Saving in Constrained Application Protocol of Internet of Things

International Journal on Communications Antenna and Propagation (IRECAP), 2016
The centralized resource discovery approach in the Constrained Application Protocol (CoAP) is based on the resource directory (RD) model, this directory contains a description for resources held in the servers (sensors and actuators), in which the servers register their resources in the RD while the clients are allowed to perform a lookup operation on ...
Muneer Bani Yassein   +2 more
openaire   +1 more source

A Short Delay Degree-Constrained Hierarchical Application Layer Multicast Protocol

2009 International Conference on Web Information Systems and Mining, 2009
Scalability and efficiency are important for designing application-layer multicast protocol. In this paper, a short delay degree-constrained hierarchical protocol-SDDM is proposed for application-layer multicast. It adopts the idea of layer and cluster to construct multicast group members into a hierarchical architecture.
Jing Li, Yong Wang, Mei Xue, Zhong Tang
openaire   +1 more source

Support Context-Adaptation in the Constrained Application Protocol (CoAP)

2019
The number of interconnected smart devices has already rapidly increased, and the Internet of Things (IoT) has presented tremendous potential in various domains such as smart cities, healthcare and industrial automation. To integrate the IoT applications to Web to utilise the advantages of Internet infrastructures, the Constrained Application Protocol (
Yuji Dong   +3 more
openaire   +1 more source

Performance analysis of constrained application protocol (CoAP)

AIP Conference Proceedings, 2023
Hadeel Hussein Azeez   +1 more
openaire   +1 more source

Deterministische und interoperable Kommunikation mit dem Constrained Application Protocol

2019
In dieser Arbeit wird untersucht, inwieweit sich Echtzeitanforderungen in der Kommunikation mit einer rein Software-basierten Lösung auf Basis etablierter IoT-Standards unter Verwendung von Standardhardware erfüllen lassen. Hierzu wird schrittweise gezeigt, wie sich eine zeitlich deterministische Kommunikation allein auf Basis des Constrained ...
openaire   +2 more sources

Introspecting IoT Protocols for Resources-Constrained Applications

International Journal of Software Engineering and Its Applications, 2017
Kuldeep Kumar   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy