2019
DOI: 10.3390/s19153433
|View full text |Cite|
|
Sign up to set email alerts
|

Congestion Control in CoAP Observe Group Communication

Abstract: The Constrained Application Protocol (CoAP) is a simple and lightweight machine-to-machine (M2M) protocol for constrained devices for use in lossy networks which offers a small memory capacity and limited processing. Designed and developed by the Internet Engineering Task Force (IETF), it functions as an application layer protocol and benefits from reliable delivery and simple congestion control. It is implemented for request/response message exchanges over the User Datagram Protocol (UDP) to support the Inter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 23 publications
(26 reference statements)
0
14
0
Order By: Relevance
“…According to [ 46 ] protocols such as CoAP that are based on UDP have a tendency to lose more packets when the amount of ongoing traffic is too high. They demonstrated this in a similar test scenario to the one demonstrated in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…According to [ 46 ] protocols such as CoAP that are based on UDP have a tendency to lose more packets when the amount of ongoing traffic is too high. They demonstrated this in a similar test scenario to the one demonstrated in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…According to [35] protocols such as CoAP that are based on UDP have a tendency to lose more packets when the amount of ongoing traffic is too high. They demonstrated this in a similar test scenario to the one demonstrated in this paper.…”
Section: Reliability Evaluationmentioning
confidence: 99%
“…The primary task of IoT devices is to collect data from the physical environment and send the requested data to the server. Today, many IoT applications rely not only on the occasional transmission of small payloads from IoT devices but also must transfer large blocks of collected data to the server, resulting in an enormous amount of traffic in the network [1], [2]. Transmission control of such traffic is inevitable for alleviating the network congestion.…”
Section: Introductionmentioning
confidence: 99%