Preview

Paper Telecom

Satisfactory Essays
Open Document
Open Document
989 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Paper Telecom
A Low-Power CoAP for Contiki
Matthias Kovatsch, Simon Duquennoy, and Adam Dunkels kovatsch@inf.ethz.ch simonduq@sics.se adam@sics.se

Monday, 17 Oct 2011

Internet of Things Protocol Stack
Layer
Application Transport Network Adaption MAC Radio Duty Cycling Physical
Matthias Kovatsch – ETH Zürich

Protocol
CoAP / REST Engine (Erbium) UDP IPv6 / RPL 6LoWPAN CSMA / link-layer bursts ContikiMAC IEEE 802.15.4
A Low-Power CoAP for Contiki 2

ContikiMAC

Radio on
D Data frame A ACK frame

Sender

D

D

D

D A

Receiver Channel check

D A

Transmission detected

Matthias Kovatsch – ETH Zürich

A Low-Power CoAP for Contiki

3

Link-layer Bursts

Radio on
D Data frame A ACK frame

Sender

D

D

D

D A D A D A D A

Receiver Channel check

D A D A D A D A

Transmission detected

Matthias Kovatsch – ETH Zürich

A Low-Power CoAP for Contiki

4

Constrained Application Protocol (CoAP)
 RESTful Web services for networked embedded devices
 Idealized architectural style of the Web  HTTP for the Internet of Things coap://sky2/ coap://sky1/

coap://sky3/

Matthias Kovatsch – ETH Zürich

A Low-Power CoAP for Contiki

5

«Erbium» CoAP for Contiki

 Implements draft-ietf-core-coap-07  Available in the Contiki repository on SourceForge

Matthias Kovatsch – ETH Zürich

A Low-Power CoAP for Contiki

6

«Erbium» CoAP
 Reliable UDP transport  Observing resources  Blockwise transfers  Resource discovery  Separate responses

 Blocking client requests
Matthias Kovatsch – ETH Zürich A Low-Power CoAP for Contiki 7

«Erbium» REST Engine
 Resource abstraction

CoRE Link Format title="Hello world"; rt="TemperatureC";

RESOURCE(handle, METHODs, URI-Path, Web Linking info);  Resource handler PERIODIC_RESOURCE(handle, METHODs, URI-Path, info, period);  Additional periodic handler EVENT_RESOURCE(handle, METHODs, URI-Path, info);  Additional event handler Observable

Matthias

You May Also Find These Documents Helpful

  • Better Essays

    The CA-Office location utilizes their PBX with Plain Old Telephone Systems (POTS). (POTS acts as an interface for connecting the extensions to the PBX). POTS are used in most homes and are a common…

    • 976 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Paper

    • 377 Words
    • 2 Pages

    4) What is the genotypic and phenotypic ratio from the F2 of a monohybrid cross?…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Paper

    • 1317 Words
    • 6 Pages

    | Influence cost is a type of _____ incurred while filling positions that have similar responsibilities but carry different pay.Answer…

    • 1317 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Excello Telecommunication

    • 1722 Words
    • 6 Pages

    Excello Telecommunication had seen many years of profitable sales. But, then in 2010 Excello had seen a drop of sales due to competition of their product by overseas manufactures. With all the years that this company had been in business they were now faced with the fact that their earnings estimates were not going to be met. There were many executive managers that were worried about the kind of effect this would have on the company bonuses, stock options, and the share prices of Excello's stock.…

    • 1722 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Gov't Paper

    • 1768 Words
    • 8 Pages

    People each have different personalities that others like and dislike about them. These individuals can be funny or serious; nice or a jerk; a talker or a listener. All this makes up a person and who they are. A person's personality is similar to a news program; sometimes they can be biased and unreliable; other times they are spot-on and trustworthy. Hardball and O'Reilly are both news programs that display their news differently.…

    • 1768 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Carte, Penny and Fox, Chris, (2004), Bridging the Culture Gap: A Practical Guide to International Business Communication, Library of Congress Cataloging-in-Publication Data, Retrieved November 17, 2006 from: http://www.amazon.com/gp/reader/0749441704/ref=sib_dp_top_toc/002-9731822-8892040?%5Fencoding=UTF8&p=S009#reader-page…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Party Plates Company has come to the conclusion that there is a need for a new proposal for wireless technology. Our goal is to meet goals in technology advancement and to be up to date with our consumers and business associates. Our proposal will focus on wireless technology that will benefit the party plate business. Our team will also provide the pros and cons to our idea and justify our choices to incorporate them into Party Plates Company. In the proposal we will also include a spreadsheet presenting the equipment needed for using the technologies and the costs involved with the equipment.…

    • 533 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Communication plays a crucial role in the criminal justice system in order to convey important information about a matter in question concerning a particular case in a way of resolving a complex crime, especially in a court of law; therefore, effective communication is required so that the exchange of information is clearly understood among the criminal justice professionals. At some point in time, the development of technology undergoes change and improvement where our communication techniques begin to gradually develop, often into something more effective or advanced. The advancement of technology has an effect on the communication capabilities of specialized databases in the criminal justice system, for example, the Automated Fingerprint Identification system (AFIS) and the facial recognition method both benefit law enforcement agencies through the use of computer graphics that are operated for the purpose of identifying facial descriptions and an individual’s fingerprints.…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Telecommunications HW

    • 486 Words
    • 2 Pages

    War drivers are people who drive around a city looking for working access points that are unprotected. Drive-by hackers park just outside a company's premises and intercept the firm's data transmissions.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Mobile System Paper

    • 706 Words
    • 2 Pages

    Mobile applications was one of the most intriguing and intelligent things that could have been invented or designed. Mobile applications is software that is designed and made to run on cellular phones such as smartphones, Androids, iPhones, Windows phones, Blackberry phones and phones of that sort. Mobile applications are not only designed and engineered just for phones, they are also designed for tablet computers and anything that is a mobile device.…

    • 706 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In present-day, technology has been established to be tremendously essential and efficient, and has been embedded in our lives currently to the point of being close to a necessity. In Criminal Justice, the ardent use of technology has proven to be of tremendous help in many areas of the field. The incorporation of the computer systems in criminal justice tremendously has improved the general communication between agencies as the new methods of transferring information among departments. In addition, it has become much more resourceful and efficient in that it is much simpler to acquire the data at a more rapid rate, hence, speeding up the time it takes to prevent or solve crimes. The intent of this paper is to deliver an insight toward the efficiency of the methods in which technology was being used inside the criminal justice system.…

    • 1519 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    afasf

    • 8021 Words
    • 55 Pages

    The use of acknowledgments can provide reliable transfer over networks that are prone to error and…

    • 8021 Words
    • 55 Pages
    Powerful Essays
  • Powerful Essays

    allowing occasional bursts of packets in the queue. During explicit feedback from the gateway, transport-layer protocongestion, the probability that the gateway notifies a par- cols could infer congestion from the estimated bottleneck…

    • 13636 Words
    • 111 Pages
    Powerful Essays
  • Satisfactory Essays

    The question asks about the validity of two kinds of networks in a particular setting. The first scenario involves a bank, with main frames for all of its banks and businesses. A token ring only allows transmission of data to those who are in possession of the token/packet. What makes the token ring ideal is that since transmission cannot occur until your machine/workstation/computer is in physical possession of the token or packet. It creates less traffic and less likelihood of collision because more than one user is looking to access the same account. However, token ring protocols are on the decline. With that being said, I have to think that the increased security a token ring provides would be better for a banking system.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Letter of Recommendation

    • 348 Words
    • 2 Pages

    Mr. has requested me to serve as a reference for him as he applies to your M.S. program. As the professor in the Department of Electronics and Communication Engineering, I had the opportunity to appraise him from various angles for past four years.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays

Related Topics