2019
DOI: 10.1186/s13673-019-0182-9
|View full text |Cite
|
Sign up to set email alerts
|

Enabling multi-hop remote method invocation in device-to-device networks

Abstract: IntroductionResource sharing or computation offloading on mobile networks can bring a lot of benefits, the approaches in this domain if possible, can be widely applied to IoT networks or ubiquitous cities. In this section, we will go through the several limitations of current technologies, as well as our motivation to build a middleware that overcomes these obstacles by extending Remote Method Invocation method and multi-hop capability to enable resource sharing over mobile networks.Low-end devices always have… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…There are two limitations in Wi-Fi Direct technology that restrict the groups to connect and create an ad hoc network. The limitations are [15]: 1-The smartphone cannot be a P2P client of more than one group at the same time. 2-The GO of a group cannot be a P2P client of another group at the same time.…”
Section: Wi-fi Direct Multi-group Challengesmentioning
confidence: 99%
“…There are two limitations in Wi-Fi Direct technology that restrict the groups to connect and create an ad hoc network. The limitations are [15]: 1-The smartphone cannot be a P2P client of more than one group at the same time. 2-The GO of a group cannot be a P2P client of another group at the same time.…”
Section: Wi-fi Direct Multi-group Challengesmentioning
confidence: 99%
“…Through technological advancement, computer systems can be designed which allow an individual to operate remotely without any necessity. In addition, any individual could share data and link printers to one another with the help of P2P computing [13].…”
Section: Peer To Peer (P2p)mentioning
confidence: 99%
“…15 CoAP, constrained application protocol; D2A, device-to-application; D2C, device-to-cloud; D2D, device-to-device; D2G, device-to-gateway; IoT, Internet of Things; IP, Internet protocol; MQTT, message queuing telemetry transport; RFID, radio-frequency identification technologies such as sensor technology, cloud-based technology, messaging technology, IP technology, and wireless technology. 18,19 In order to connect the smart devices in IoT environment, some key technologies are applied such as wireless technology, sensor technology, messaging technology, gateway technology, and IP technology. [20][21][22] Besides, the communication types can have two main characteristics including application-wise or topology-wise.…”
Section: Figurementioning
confidence: 99%
“… Device-to-Cloud (D2C) communication: presents a directional interconnection between IoT devices and cloud service providers to transfer information and resources with controlling messages and sensors using existing communication technologies such as sensor technology, cloud-based technology, messaging technology, IP technology, and wireless technology [17]:…”
Section: Introductionmentioning
confidence: 99%