CoAP is a lightweight protocol designed for resource constrained devices and networks. It allows devices to communicate over UDP using REST-like operations like GET, PUT, POST and DELETE. CoAP supports asynchronous messaging, multicast transmissions, discovery of services and resources, and can be mapped to HTTP for integration with the web. Implementations of CoAP are available in languages like C, Python, Java and .NET to enable M2M communication for devices with limited processing power and bandwidth.
This document discusses IoT networking and quality of service (QoS) for IoT networks. It begins by describing the characteristics of IoT devices such as low processing power, small size, and energy constraints. It then discusses enabling the classical Internet for IoT devices through standards developed by the IETF, including 6LoWPAN, ROLL, and CoRE. CoRE provides a framework for IoT applications and services discovery. The document concludes by examining policies for QoS in IoT networks to guarantee intended service, covering resource utilization, data timeliness, availability, and delivery.
The document provides an introduction to IoT including definitions, characteristics, genesis, applications and challenges. It describes the physical design of IoT including IoT devices, protocols, and the generic block diagram of an IoT device. It also describes the logical design including IoT functional blocks, communication models like publish-subscribe, request-response, levels of IoT deployment from level 1 to 6, and enabling technologies.
Internet of thing (IoT and cloud convergence opportunitis and challenges
This document discusses the convergence of IoT and cloud computing. It describes how IoT platforms have major requirements for connectivity, dynamic management of devices and data, and deriving value from connected devices. The cloud offers resources that can meet these IoT needs, including scalability, elasticity, and ubiquitous access. There are two main convergence approaches - cloud-centric IoT, which brings IoT functionality to the cloud, and IoT-centric cloud, which brings cloud functionality to distributed IoT networks. Examples are given of existing platforms that take each approach. Key challenges of the IoT-cloud convergence include distributed processing and storage of massive IoT data, interoperability, and ensuring real-time communication across devices, applications
This document discusses the vision, hype and reality of delivering IT services as computing utilities. It outlines the need for a market oriented cloud architecture to regulate supply and demand of cloud resources. Emerging cloud platforms like Amazon EC2, Google App Engine, Microsoft Live Mesh and Sun Grid are presented. The limitations of present cloud service providers are discussed. Finally, the concept of a Global Cloud Exchange is proposed to address these limitations through features like a market directory, banking system, brokers and price setting mechanisms.
This document provides an overview of a hands-on workshop on the Constrained Application Protocol (CoAP). It outlines the agenda which includes introductions to CoAP, the Californium CoAP framework, and hands-on projects. Attendees will work through example CoAP client and server code using the Californium libraries and test their implementations. Advanced CoAP topics like security, proxies, and resource directories are also discussed.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
This document discusses various Internet of Things (IoT) protocols. It defines IoT as interconnected devices that can transmit and receive data over a network. It then covers common network topologies and constraints of IoT devices. Several wireless protocols are described in detail, including their typical range, power usage, data rates, and costs. Popular protocols for messaging (MQTT) and REST-like interfaces (CoAP) are also summarized. The document aims to provide an overview of the IoT protocol landscape to help people get started with IoT development.
John Chiappetta prezo on 5G EdgeComputing and IoT and how interdependent they are.
Held Nov 19, 2019 at Milton Education Village Innovation Centre, Milton, Ontario, Canada.
Learn more here: https://siliconhalton.com/event/meetup-119-what-is-5g-and-edge-computing/
This document provides an introduction to the Internet of Things (IOT). It defines IOT as the collection of physical devices connected over the internet that can exchange data with less human involvement. The history and key technologies that enabled IOT are discussed, including wireless sensor networks, RFID, and cloud computing. The document also outlines the typical architecture of an IOT system including sensing, network, service, and application layers. Common IOT standards, protocols, and applications are summarized along with research areas and challenges in IOT development.
This document summarizes Cisco's Internet of Things (IoT) solutions and strategy. It notes that IoT adoption is growing rapidly, with 50 billion smart devices projected by 2020. Cisco's IoT system provides an integrated architecture to connect devices, aggregate and analyze data, and deliver business outcomes across industries like manufacturing, transportation, utilities and more. The system includes components for edge computing, security, analytics and application enablement to help customers build customized IoT solutions. Cisco is working with partners to develop its IoT portfolio and address the complex challenges of IoT projects.
This document discusses various techniques for transitioning from IPv4 to IPv6, including dual stacking, tunneling, and translation services. It provides examples of configuring dual stacking and manual IPv6 tunnels on Cisco routers to connect isolated IPv6 networks over an IPv4 infrastructure. Dual stacking allows hosts and devices to run both IPv4 and IPv6 simultaneously, while tunneling encapsulates IPv6 packets in IPv4 to enable connectivity across non-IPv6 networks. The document demonstrates establishing an IPv6 tunnel between two routers and routing IPv6 packets over the tunnel using RIPng.
This document discusses RFID and the Internet of Things (IoT). It describes RFID as an automatic identification technology that uses radio waves to identify objects. The IoT allows physical objects to be connected to the internet and be remotely monitored and controlled. The architecture of an IoT system generally has three layers - a perception layer to collect data from sensors and RFID tags, a network layer to transmit the information, and a service layer to process and analyze the data. RFID has applications in various fields including healthcare, transportation, and access control. Challenges to the wider adoption of RFID include collision problems, security issues, and high tag costs.
The document discusses the private cloud architecture being implemented at the University of the Witwatersrand. It outlines plans to build a private cloud infrastructure using open source technologies like OpenStack, Fedora, iRODS and Zimbra. The cloud will provide scalable compute and storage resources along with hosted services and a digital archive. Key steps are identifying support staff, collaborating with technology partners, and having the initial infrastructure in place by mid-November.
Internet of Things with Cloud Computing and M2M Communication
The IoT is the network of physical objects with intelligence. It can be more secure with MQTT protocol for Machine to Machine Communication and more storage capability can be achieved by using cloud computing.
This document discusses how SAP applications and IT landscapes are changing with the adoption of in-memory computing technologies like SAP HANA. It presents examples of how SAP HANA allows organizations to deliver real-time value by enabling smarter, faster and simpler business processes, interactions and reporting. The document also outlines the evolution of enterprise architectures and data center landscapes towards a consolidated environment on SAP HANA that can optimize transactional and analytical workloads.
This document provides an overview of predictive analytics, including its evolution, definition, process, tools and techniques. It discusses how predictive analytics is being used across various industries to optimize outcomes, increase revenue and reduce costs. Specific use cases are outlined, such as using IoT sensor data and predictive models to improve risk calculations for auto insurance, optimize energy usage in buildings, enhance customer recommendations, and optimize policy interventions. Business cases focus on how companies in various sectors leverage customer data and predictive analytics to increase digital marketing effectiveness, revenues, and customer loyalty. Overall, the document examines current and emerging applications of predictive analytics across different domains.
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IOT And other considerations:
IoT, Business Strategy, Tech, Security and Blockchain as a foundation tech
How to manage IoT / Blockchain for business strategy, technical set up, security, plus blockchain
The natural tech evolution marriage that has yet to properly consummate?
Why IOT products may not live up to their promise and how to overcome these to build successful IoT / Blockchain products.
This document provides an overview of supply chain strategy and how it relates to business strategy. It discusses various views on defining supply chain strategy, including:
- Matching supply chain strategy to product characteristics, such as using efficient supply chains for functional products and responsive supply chains for innovative products.
- Considering demand and supply uncertainty, such as using agile supply chains for high supply and demand uncertainty.
- Examining market characteristics and using lean strategies for stable markets with predictable demand, and agile strategies for dynamic markets with unpredictable demand.
- The concept of "leagile", using elements of both lean and agile strategies such as applying lean upstream and agile downstream.
The document serves as an introduction to
A Complete Beginners Guide to Blockchain Technology Part 1 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Kong is a scalable, open source API Platform (also known as an API Gateway or API Middleware). Kong was originally built by Kong Inc. (formerly known as Mashape) to secure, manage, and extend over 15,000 Microservices for its API Marketplace, which generates billions of requests per month.
China Mobile Limited is the leading telecommunications services provider in China, with more than 800 million active users. In China Mobile, distributed big data clusters are built by branch companies in each province for their unique requirements. Meanwhile, we have built a centralized Hadoop cluster with scale more than 1600 nodes, on which we collect data from dozens of distributed clusters and make analysis for our business.
In this session, we will introduce the architecture of the centralized Hadoop cluster and experience of constructing and tuning this large scale Hadoop cluster. Key points are as follows:
1. About Ambari: we improve Ambari with features like supporting HDFS Federation and Ambari HA , improving its performance and enabling it to support up to 1600 nodes.
2. About HDFS: we build a large HDFS cluster with data up to 60PB, using federation, ViewFS, FairCallQueue. Our best practice of cluster operation and management will also be included.
3. About Flume: We use the reformed Flume to collect data as much as 200TB per day.
Speakers
Yuxuan Pan, Software Engineer, China Mobile Software Technology
Duan Yunfeng, Chief Designer of China Mobile's big data system, China Mobile Communications Corporation
The CoAP protocol allows for resource-constrained networks and nodes to use RESTful web transfers. It uses UDP as a transport protocol and supports methods like GET, POST, PUT, and DELETE. CoAP messages use a simple header format and can include options to provide information like the URI of a requested resource. The protocol supports features like asynchronous messaging, built-in discovery of resources, and optional block transfers to handle larger payloads. Implementations of CoAP are available in several programming languages and it has been integrated into commercial IoT systems and devices.
The Constrained Application Protocol (CoAP) is a RESTful web transfer protocol for resource-constrained networks and nodes. CoAP uses a simple binary message format carried over UDP that supports asynchronous messaging with optional message confirmation and retransmission. CoAP supports features like GET, POST, PUT, DELETE methods, URIs, content formats and codes that are similar to HTTP but optimized for constrained nodes and networks.
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
1) The document discusses emerging open and standardized protocols for the Internet of Things (IoT), as IoT projects currently face challenges selecting technology stacks due to a lack of standardization.
2) It describes several standardized protocols for different layers of the TCP/IP model that are being used for IoT, including IEEE 802.15.4 for the network/link layer, 6LoWPAN for adapting IPv6 packets to IEEE 802.15.4 links, UDP and DTLS for the transport layer, and CoAP and MQTT for the application layer.
3) CoAP is presented as a specialized web transfer protocol for constrained environments like IoT, serving a similar purpose to HTTP with features tailored
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 4: IPv6 & The Internet of Things. http://gogonetlive.com
November 12 – 14, 201, Silicon Valley, California
Agenda: http://gogonetlive.com/gogonetlive4-agenda.asp
PRESENTATION
IoT Field Area Network Solutions & Integration of IPv6 Standards
Abstract: http://www.gogo6.com/profiles/blogs/my-presentation-at-gogolive-integration-of-ipv4-and-non-ip
Presentation video: http://www.gogo6.com/video/iot-field-area-network-solutions-integration-of-ipv6-standards-by
Interview video: http://www.gogo6.com/video/interview-with-carsten-bormann-at-gogonet-live-4-ipv6-iot-confere
SPEAKER
Patrick Grossetete - Technical Marketing Engineer (IoT), Cisco
Bio/Profile: http://www.gogo6.com/profile/PatrickGrossetete
MORE
Learn more about IPv6 on the gogoNET social network and our online training courses
http://www.gogo6.com/main
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
The document discusses using Apache Kafka for event detection pipelines. It describes how Kafka can be used to decouple data pipelines and ingest events from various source systems in real-time. It then provides an example use case of using Kafka, Hadoop, and machine learning for fraud detection in consumer banking, describing the online and offline workflows. Finally, it covers some of the challenges of building such a system and considerations for deploying Kafka.
The document discusses deploying IPv6 in OpenStack environments. It covers topics like tenant IPv6 addressing using SLAAC, stateless DHCPv6, and stateful DHCPv6. It also discusses provider networks, IPv6-only networks, IPv6 prefix delegation, and using IPv6 with Heat and L3 high availability. The agenda provides reference material and GitHub links for IPv6 Heat templates. Examples are given for creating tenant networks using different IPv6 addressing modes in Neutron. Captures from network sniffers show the router advertisements and DHCP messages used to configure IPv6 addresses and options.
This document provides a high-level overview of protocols for the Internet of Things (IoT). It discusses some of the key challenges for IoT including scalability, configurability, interoperability, discovery, and security. It then reviews several common IoT protocols, including HTTP, WebSockets, MQTT, CoAP, and mentions others like AMQP and XMPP. For each protocol, it summarizes their purpose, model (e.g. publish-subscribe vs client-server), efficiency considerations, and role in the protocol stack. It emphasizes that existing protocols like MQTT and CoAP are preferable to reinventing the wheel for IoT.
IoT Meets the Cloud: The Origins of Edge ComputingMaria Gorlatova
History of edge computing: IoT meets the cloud. Lecture delivered as part of Duke University Electrical and Computer Engineering / Computer Science Special Topics course on Edge Computing designed and developed by the instructor.
Network Virtualization in Cloud Data Centersrjain51
Class lecture by Prof. Raj Jain on Network Virtualization in Cloud Data Centers. The talk covers Network Virtualization, Network Virtualization Techniques, NVO3, NVO3 Goals, NVO3 Terminology, NVO3 Components, Current NVO Technologies, GRE, EoMPLSoGRE, NVGRE, VXLAN, VXLAN Architecture, VXLAN Deployment Example, VXLAN Encapsulation Format, Stateless Transport Tunneling Protocol (STT), LSO and LRO, STT Optimizations, STT Frame Format, TCP-Like Header in STT. Video recording available in YouTube.
This document discusses IoT networking and quality of service (QoS) for IoT networks. It begins by describing the characteristics of IoT devices such as low processing power, small size, and energy constraints. It then discusses enabling the classical Internet for IoT devices through standards developed by the IETF, including 6LoWPAN, ROLL, and CoRE. CoRE provides a framework for IoT applications and services discovery. The document concludes by examining policies for QoS in IoT networks to guarantee intended service, covering resource utilization, data timeliness, availability, and delivery.
The document provides an introduction to IoT including definitions, characteristics, genesis, applications and challenges. It describes the physical design of IoT including IoT devices, protocols, and the generic block diagram of an IoT device. It also describes the logical design including IoT functional blocks, communication models like publish-subscribe, request-response, levels of IoT deployment from level 1 to 6, and enabling technologies.
This document discusses the convergence of IoT and cloud computing. It describes how IoT platforms have major requirements for connectivity, dynamic management of devices and data, and deriving value from connected devices. The cloud offers resources that can meet these IoT needs, including scalability, elasticity, and ubiquitous access. There are two main convergence approaches - cloud-centric IoT, which brings IoT functionality to the cloud, and IoT-centric cloud, which brings cloud functionality to distributed IoT networks. Examples are given of existing platforms that take each approach. Key challenges of the IoT-cloud convergence include distributed processing and storage of massive IoT data, interoperability, and ensuring real-time communication across devices, applications
This document discusses the vision, hype and reality of delivering IT services as computing utilities. It outlines the need for a market oriented cloud architecture to regulate supply and demand of cloud resources. Emerging cloud platforms like Amazon EC2, Google App Engine, Microsoft Live Mesh and Sun Grid are presented. The limitations of present cloud service providers are discussed. Finally, the concept of a Global Cloud Exchange is proposed to address these limitations through features like a market directory, banking system, brokers and price setting mechanisms.
This document provides an overview of a hands-on workshop on the Constrained Application Protocol (CoAP). It outlines the agenda which includes introductions to CoAP, the Californium CoAP framework, and hands-on projects. Attendees will work through example CoAP client and server code using the Californium libraries and test their implementations. Advanced CoAP topics like security, proxies, and resource directories are also discussed.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
This document discusses various Internet of Things (IoT) protocols. It defines IoT as interconnected devices that can transmit and receive data over a network. It then covers common network topologies and constraints of IoT devices. Several wireless protocols are described in detail, including their typical range, power usage, data rates, and costs. Popular protocols for messaging (MQTT) and REST-like interfaces (CoAP) are also summarized. The document aims to provide an overview of the IoT protocol landscape to help people get started with IoT development.
John Chiappetta prezo on 5G EdgeComputing and IoT and how interdependent they are.
Held Nov 19, 2019 at Milton Education Village Innovation Centre, Milton, Ontario, Canada.
Learn more here: https://siliconhalton.com/event/meetup-119-what-is-5g-and-edge-computing/
This document provides an introduction to the Internet of Things (IOT). It defines IOT as the collection of physical devices connected over the internet that can exchange data with less human involvement. The history and key technologies that enabled IOT are discussed, including wireless sensor networks, RFID, and cloud computing. The document also outlines the typical architecture of an IOT system including sensing, network, service, and application layers. Common IOT standards, protocols, and applications are summarized along with research areas and challenges in IOT development.
This document summarizes Cisco's Internet of Things (IoT) solutions and strategy. It notes that IoT adoption is growing rapidly, with 50 billion smart devices projected by 2020. Cisco's IoT system provides an integrated architecture to connect devices, aggregate and analyze data, and deliver business outcomes across industries like manufacturing, transportation, utilities and more. The system includes components for edge computing, security, analytics and application enablement to help customers build customized IoT solutions. Cisco is working with partners to develop its IoT portfolio and address the complex challenges of IoT projects.
This document discusses various techniques for transitioning from IPv4 to IPv6, including dual stacking, tunneling, and translation services. It provides examples of configuring dual stacking and manual IPv6 tunnels on Cisco routers to connect isolated IPv6 networks over an IPv4 infrastructure. Dual stacking allows hosts and devices to run both IPv4 and IPv6 simultaneously, while tunneling encapsulates IPv6 packets in IPv4 to enable connectivity across non-IPv6 networks. The document demonstrates establishing an IPv6 tunnel between two routers and routing IPv6 packets over the tunnel using RIPng.
This document discusses RFID and the Internet of Things (IoT). It describes RFID as an automatic identification technology that uses radio waves to identify objects. The IoT allows physical objects to be connected to the internet and be remotely monitored and controlled. The architecture of an IoT system generally has three layers - a perception layer to collect data from sensors and RFID tags, a network layer to transmit the information, and a service layer to process and analyze the data. RFID has applications in various fields including healthcare, transportation, and access control. Challenges to the wider adoption of RFID include collision problems, security issues, and high tag costs.
The document discusses the private cloud architecture being implemented at the University of the Witwatersrand. It outlines plans to build a private cloud infrastructure using open source technologies like OpenStack, Fedora, iRODS and Zimbra. The cloud will provide scalable compute and storage resources along with hosted services and a digital archive. Key steps are identifying support staff, collaborating with technology partners, and having the initial infrastructure in place by mid-November.
Internet of Things with Cloud Computing and M2M CommunicationSherin C Abraham
The IoT is the network of physical objects with intelligence. It can be more secure with MQTT protocol for Machine to Machine Communication and more storage capability can be achieved by using cloud computing.
This document discusses how SAP applications and IT landscapes are changing with the adoption of in-memory computing technologies like SAP HANA. It presents examples of how SAP HANA allows organizations to deliver real-time value by enabling smarter, faster and simpler business processes, interactions and reporting. The document also outlines the evolution of enterprise architectures and data center landscapes towards a consolidated environment on SAP HANA that can optimize transactional and analytical workloads.
This document provides an overview of predictive analytics, including its evolution, definition, process, tools and techniques. It discusses how predictive analytics is being used across various industries to optimize outcomes, increase revenue and reduce costs. Specific use cases are outlined, such as using IoT sensor data and predictive models to improve risk calculations for auto insurance, optimize energy usage in buildings, enhance customer recommendations, and optimize policy interventions. Business cases focus on how companies in various sectors leverage customer data and predictive analytics to increase digital marketing effectiveness, revenues, and customer loyalty. Overall, the document examines current and emerging applications of predictive analytics across different domains.
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
Blockchain in IOT And other considerations:
IoT, Business Strategy, Tech, Security and Blockchain as a foundation tech
How to manage IoT / Blockchain for business strategy, technical set up, security, plus blockchain
The natural tech evolution marriage that has yet to properly consummate?
Why IOT products may not live up to their promise and how to overcome these to build successful IoT / Blockchain products.
This document provides an overview of supply chain strategy and how it relates to business strategy. It discusses various views on defining supply chain strategy, including:
- Matching supply chain strategy to product characteristics, such as using efficient supply chains for functional products and responsive supply chains for innovative products.
- Considering demand and supply uncertainty, such as using agile supply chains for high supply and demand uncertainty.
- Examining market characteristics and using lean strategies for stable markets with predictable demand, and agile strategies for dynamic markets with unpredictable demand.
- The concept of "leagile", using elements of both lean and agile strategies such as applying lean upstream and agile downstream.
The document serves as an introduction to
CBGTBT - Part 1 - Workshop introduction & primerBlockstrap.com
A Complete Beginners Guide to Blockchain Technology Part 1 of 6. Slides from the #StartingBlock2015 tour by @blockstrap
Part 1: http://www.slideshare.net/Blockstrap/cbgtbt-part-1-workshop-introduction-primer
Part 2: http://www.slideshare.net/Blockstrap/02-blockchains-101
Part 3: http://www.slideshare.net/Blockstrap/03-transactions-101
Part 4: http://www.slideshare.net/Blockstrap/cbgtbt-part-4-mining
Part 5: http://www.slideshare.net/Blockstrap/05-blockchains-102
Part 6: http://www.slideshare.net/Blockstrap/06-transactions-102
Kong is a scalable, open source API Platform (also known as an API Gateway or API Middleware). Kong was originally built by Kong Inc. (formerly known as Mashape) to secure, manage, and extend over 15,000 Microservices for its API Marketplace, which generates billions of requests per month.
Practice of large Hadoop cluster in China MobileDataWorks Summit
China Mobile Limited is the leading telecommunications services provider in China, with more than 800 million active users. In China Mobile, distributed big data clusters are built by branch companies in each province for their unique requirements. Meanwhile, we have built a centralized Hadoop cluster with scale more than 1600 nodes, on which we collect data from dozens of distributed clusters and make analysis for our business.
In this session, we will introduce the architecture of the centralized Hadoop cluster and experience of constructing and tuning this large scale Hadoop cluster. Key points are as follows:
1. About Ambari: we improve Ambari with features like supporting HDFS Federation and Ambari HA , improving its performance and enabling it to support up to 1600 nodes.
2. About HDFS: we build a large HDFS cluster with data up to 60PB, using federation, ViewFS, FairCallQueue. Our best practice of cluster operation and management will also be included.
3. About Flume: We use the reformed Flume to collect data as much as 200TB per day.
Speakers
Yuxuan Pan, Software Engineer, China Mobile Software Technology
Duan Yunfeng, Chief Designer of China Mobile's big data system, China Mobile Communications Corporation
The constrained application protocol (coap)Hamdamboy
The CoAP protocol allows for resource-constrained networks and nodes to use RESTful web transfers. It uses UDP as a transport protocol and supports methods like GET, POST, PUT, and DELETE. CoAP messages use a simple header format and can include options to provide information like the URI of a requested resource. The protocol supports features like asynchronous messaging, built-in discovery of resources, and optional block transfers to handle larger payloads. Implementations of CoAP are available in several programming languages and it has been integrated into commercial IoT systems and devices.
The Constrained Application Protocol (CoAP) is a RESTful web transfer protocol for resource-constrained networks and nodes. CoAP uses a simple binary message format carried over UDP that supports asynchronous messaging with optional message confirmation and retransmission. CoAP supports features like GET, POST, PUT, DELETE methods, URIs, content formats and codes that are similar to HTTP but optimized for constrained nodes and networks.
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoTAniruddha Chakrabarti
1) The document discusses emerging open and standardized protocols for the Internet of Things (IoT), as IoT projects currently face challenges selecting technology stacks due to a lack of standardization.
2) It describes several standardized protocols for different layers of the TCP/IP model that are being used for IoT, including IEEE 802.15.4 for the network/link layer, 6LoWPAN for adapting IPv6 packets to IEEE 802.15.4 links, UDP and DTLS for the transport layer, and CoAP and MQTT for the application layer.
3) CoAP is presented as a specialized web transfer protocol for constrained environments like IoT, serving a similar purpose to HTTP with features tailored
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 4: IPv6 & The Internet of Things. http://gogonetlive.com
November 12 – 14, 201, Silicon Valley, California
Agenda: http://gogonetlive.com/gogonetlive4-agenda.asp
PRESENTATION
IoT Field Area Network Solutions & Integration of IPv6 Standards
Abstract: http://www.gogo6.com/profiles/blogs/my-presentation-at-gogolive-integration-of-ipv4-and-non-ip
Presentation video: http://www.gogo6.com/video/iot-field-area-network-solutions-integration-of-ipv6-standards-by
Interview video: http://www.gogo6.com/video/interview-with-carsten-bormann-at-gogonet-live-4-ipv6-iot-confere
SPEAKER
Patrick Grossetete - Technical Marketing Engineer (IoT), Cisco
Bio/Profile: http://www.gogo6.com/profile/PatrickGrossetete
MORE
Learn more about IPv6 on the gogoNET social network and our online training courses
http://www.gogo6.com/main
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
The document discusses using Apache Kafka for event detection pipelines. It describes how Kafka can be used to decouple data pipelines and ingest events from various source systems in real-time. It then provides an example use case of using Kafka, Hadoop, and machine learning for fraud detection in consumer banking, describing the online and offline workflows. Finally, it covers some of the challenges of building such a system and considerations for deploying Kafka.
The document discusses deploying IPv6 in OpenStack environments. It covers topics like tenant IPv6 addressing using SLAAC, stateless DHCPv6, and stateful DHCPv6. It also discusses provider networks, IPv6-only networks, IPv6 prefix delegation, and using IPv6 with Heat and L3 high availability. The agenda provides reference material and GitHub links for IPv6 Heat templates. Examples are given for creating tenant networks using different IPv6 addressing modes in Neutron. Captures from network sniffers show the router advertisements and DHCP messages used to configure IPv6 addresses and options.
Intro to Project Calico: a pure layer 3 approach to scale-out networkingPacket
Slide presentation from the April 16th, 2015 Downtown NY Tech Meetup hosted at Control Group and presented by Christopher Liljenstolpe from Project Calico (www.projectcalico.org)
Project Calico is a scale-out networking fabric for bare metal, container, VM, and hybrid environments. Project Calico leverages the same networking techniques used to scale out the Internet to present a highly scaleable, L3 network for those environments without the use of tunnels, overlays, or other complex constructs. We'll also do a demo of a Calico enabled Docker environment, and have plenty of time for q&a during and after.
About Christopher Liljenstolpe
Christopher is the original architect of Project Calico and one of the project's evangelists. In his day job, he's the director of solutions architecture at Metaswitch Networks. Prior to Calico/Metaswitch, he's designed and run some bio-informatics OpenStack clusters, done some SDN architecture work at Big Switch Networks, Run architecture at two large carriers (Telstra - AS1221, and Cable & Wireless/iMCI - AS3561) and been the IP CTO for Alcatel in Asia. He's also run networks in Antarctica (hint, bend radius becomes REALLY important at -50C), and been foolish enough to do a stint as a wg co-chair in the IETF. Occasionally you can have the (mis-)fortune of hearing him speak at conferences and the like.
describing and comparing different protocols when it come to deploying apis on edge computing devices.
5 different categories are analyzed and 7 protocols are examined
Vector Packet Technologies such as DPDK and FD.io/VPP revolutionized software packet processing initially for discrete appliances and then for NFV use cases. Container based VNF deployments and it's supporting NFV infrastructure is now the new frontier in packet processing and has number of strong advocates among both traditional Comms Service Providers and in the Cloud. This presentation will give an overview of how DPDK and FD.io/VPP project are rising to meet the challenges of the Container dataplane. The discussion will provide an overview of the challenges, recent new features and what is coming soon in this exciting new area for the software dataplane, in both DPDK and FD.io/VPP!
About the speaker: Ray Kinsella has been working on Linux and various other open source technologies for about twenty years. He is recently active in open source communities such as VPP and DPDK but is a constant lurker in many others. He is interested in the software dataplane and optimization, virtualization, operating system design and implementation, communications and networking.
Building high performance microservices in finance with Apache ThriftRX-M Enterprises LLC
Apache Roadshow Chicago Talk on May 14, 2019
In this talk we’ll look at the ways Apache Thrift can solve performance problems commonly facing next generation applications deployed in performance sensitive capital markets and banking environments. The talk will include practical examples illustrating the construction, performance and resource utilization benefits of Apache Thrift. Apache Thrift is a high-performance cross platform RPC and serialization framework designed to make it possible for organizations to specify interfaces and application wide data structures suitable for serialization and transport over a wide variety of schemes. Due to the unparalleled set of languages supported by Apache Thrift, these interfaces and structs have similar interoperability to REST type services with an order of magnitude improvement in performance. Apache Thrift services are also a perfect fit for container technology, using considerably fewer resources than traditional application server style deployments. Decomposing applications into microservices, packaging them into containers and orchestrating them on systems like Kubernetes can bring great value to an organization; however, it can also take a very fast monolithic application and turn it into a high latency web of slow, resource hungry services. Apache Thrift is a perfect solution to the performance and resource ills of many microservice based endeavors.
WebSockets and browser-based real-time communications allow for two-way communication between client-side code and remote servers. This enables web applications to maintain bidirectional communications using a simple API. While other options like AJAX exist, WebSockets provide more efficient bidirectional communications by keeping the connection open. The technology has evolved from static web pages to enable rich applications through standards like WebSockets and WebRTC.
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)Jakub Botwicz
Presentation about Cotopaxi toolkit from Black Hat Asia 2019 Arsenal session. Author: Jakub Botwicz
https://www.blackhat.com/asia-19/arsenal/schedule/index.html#cotopaxi-iot-protocols-security-testing-toolkit-14325
This document discusses Apache Kafka and message queuing systems. It provides an overview of Kafka, including how producers and consumers work, and details on topics, partitions, and Zookeeper. It then discusses performance, production issues, and what improvements are planned for future Kafka releases. The document also reviews the Kafka community and integrations with other technologies.
An overview of Haystack's security features for low power IoT networks. Unlike most IoT stacks, when Haystack invented DASH7, security was an a priori principle and led to the most secure networking stack available in the low power, wide area networking (LPWAN) space today.
Building the Internet of Things with Eclipse IoT - IoTBE meetupBenjamin Cabé
This document discusses building Internet of Things (IoT) solutions using Eclipse IoT projects. It begins by introducing MQTT and CoAP, two common IoT protocols. It then describes how Eclipse IoT projects can be used to build sensor networks, home automation, and device management solutions. Specific projects mentioned include Mosquitto, Paho, Kura, Wakaama, and Leshan. The presentation emphasizes that MQTT is very versatile for building complete IoT solutions and that Eclipse IoT provides both basic building blocks and more complete offerings.
This document discusses microservices architecture compared to a monolithic architecture. A microservices architecture breaks an application into smaller, independent services that each perform discrete functions. This allows for more rapid development and improved scalability. However, a microservices architecture is also more complex to deploy and manage. The document provides an example of how a VoIP application could use a microservices approach by breaking components like billing, fraud detection, and call analytics into separate services. It also discusses using Docker containers and services to deploy and scale the microservices architecture.
Similar to CoAP Course for m2m and Internet of Things scenarios (20)
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc
Six months into 2024, and it is clear the privacy ecosystem takes no days off!! Regulators continue to implement and enforce new regulations, businesses strive to meet requirements, and technology advances like AI have privacy professionals scratching their heads about managing risk.
What can we learn about the first six months of data privacy trends and events in 2024? How should this inform your privacy program management for the rest of the year?
Join TrustArc, Goodwin, and Snyk privacy experts as they discuss the changes we’ve seen in the first half of 2024 and gain insight into the concrete, actionable steps you can take to up-level your privacy program in the second half of the year.
This webinar will review:
- Key changes to privacy regulations in 2024
- Key themes in privacy and data governance in 2024
- How to maximize your privacy program in the second half of 2024
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
4. 01
How it all started…
Things (Devices) are getting smarter, from Class-1 to Consumer Electronics.
If a Thing is an Internet node, it’s subject of APIzation.
REST is the most successful Internet/Web API.
CoRE /CoAP
So we decided to start ourselves investing some 480€ to play with:
- 4 6LowPAN capable Motes (360€), 2 Raspberry PI (120€).
- Plus lots of hours of DIY “fun”!
M2M Community
Telefónica Digital
4
5. 02
Is CoAP Rocket Science? No, it’s just REST
Traditional REST WEB APIs relays on HTTP-TCP-IP
CoRE/CoAP = REST APIs over UDP-IP
M2M Community
Telefónica Digital
5
8. 05
Scenario1: Step 1
1.1) Install & compile ccoap in your laptop
https://github.com/ipflavors/ccoap/tree/master/doc
M2M Community
Telefónica Digital
?
8
9. 06
Scenario1: Step 2
1.2) Install Firefox Navigator plus Copper (CU) Plugin
https://addons.mozilla.org/en-US/firefox/addon/copper-270430/
M2M Community
Telefónica Digital
?
9
10. 07
Scenario1: Step 3
1.3) Test Firefox Copper with a CoAP server available in the Internet:
coap://vs0.inf.ethz.ch:5683/
M2M Community
Telefónica Digital
10
11. 08
Scenario1: Step 3b
1.3b) GET operation (of a long resource: 5x64bytes blocks):
coap://vs0.inf.ethz.ch:5683/
M2M Community
Telefónica Digital
11
12. 09
Scenario1: Steps 4 & 5
1.4) Install z-way-server & configure z-wave devices w/ RaspberryPI.
pi@raspberrypi:~$ wget -q -O - razberry.z-wave.me/install | sudo bash
To test installation: http://[IP_address]:8083
1.5) Install libcoap4.0.1 run server example in RaspberryPI.
Download libcoap-4.0.1.tar.gz - http://sourceforge.net/projects/libcoap/
pi@raspberrypi:~$ tar xvzf libcoap-4.0.1.tar.gz
pi@raspberrypi:~$ cd libcoap-4.0.1
pi@raspberrypi:~$ ./configure
pi@raspberrypi:~$make
M2M Community
Telefónica Digital
12
13. 10
Scenario1: Steps 4 & 5
1.6) Run CoAP server example in RaspberryPI.
M2M Community
Telefónica Digital
13
14. 11
Scenario1: Step 6
1.6) Test against our RasPI server with Firefox Copper:
coap://[2a02:9113:****:1f00:b***:****:****:***f]:5683/
M2M Community
Telefónica Digital
14
15. 12
Scenario1: Step 6b
1.6b) Discover resources of our CoAP-RasPI server with Firefox Copper:
coap://[2a02:9113:****:1f00:b***:****:****:***f]:5683/
M2M Community
Telefónica Digital
15
16. 13
Scenario1: Step 6c
1.6c) GET operation (Firefox Copper):
coap://[2a02:9113:****:1f00:b***:****:****:***f]:5683/
M2M Community
Telefónica Digital
16
17. 14
Scenario1: Step 6d
1.6d) OBSERVE operation (PUSH Notifications) (Firefox Copper):
coap://[2a02:9113:****:1f00:b***:****:****:***f]:5683/
M2M Community
Telefónica Digital
17
18. 15
Scenario1: Step 7
1.7) Modify server example to create CoAP resources based on z-wave dev:
- Follow IPSO Alliance Recs:
http://www.ipso-alliance.org/wp-content/media/draft-ipso-app-framework-04.pdf
M2M Community
Telefónica Digital
18
19. 16
Scenario1: Implementing all this in FI-WARE
We are updating some FI-WARE IoT Ges to support this:
- “FIGWAY” SW to export CoAP resources too.
https://github.com/telefonicaid/fiware-raspberryPI-M2M-Gateway
M2M Community
Telefónica Digital
19
20. 17
Scenario1: A nice Project out there
WEBIPOI – Exports RasPI GPIO (wired) devices (CoRE & REST)
http://code.google.com/p/webiopi/wiki/INTRODUCTION
M2M Community
Telefónica Digital
?
20
21. 18
Scenario2: CoAP (6LowPAN) Devices!
Two (or more) Contiki-supported motes
…
http://www.contiki-os.org/hardware.html
http://www.advanticsys.com/
http://www.zolertia.com
http://www.libelium.com (own Stack / OS)
“Nooliberry” -> 6LowPAN RasPI GPIO card
Your laptop
- MACOSX, Linux, Windows…
Install Instant-Contiki VM in your Laptop
http://www.contiki-os.org/start.html
App coding:
- Device: expose REST Resources over CoAP
- Client: consume REST Resources (CoAP or HTTP)
Web development as usual! Examples:
https://github.com/contiki-os/contiki/blob/master/examples/rest-example/coap?
M2M Community
Telefónica Digital
client-server-example.csc
21
23. 20
Scenario2: Who’re already on board?
“Talking at CES today, Cerf described his home's
sensor network, which uses IPv6 radios and the
Arch Rock PhyNet smart grid system to track
information like light levels, temperature, and
humidity. This is important for a wine cellar…”
M2M Community
Telefónica Digital
23
25. 01
CoAP: Constrained Application Protocol
Internet
Constrained Enviroments
Low-power
Lossy, high packet error rates
Low thtoughpunt of 10s of kbps
Sensor
Resources
CoAP
HTTP
Proxy
Server
HTTP
Client
CoAP
UDP
6LoWPAN
802.15.4
Contiki, Tiny OS, …
8-bit microcontrollers
Aprox. 100KB of RAM for code,
heap, data…
No filesystem
CoAP is an application layer protocol that enables web services for even the
most constrained devices and networks, while integrating with the web
architecture and HTTP.
M2M Community
Telefónica Digital
25
26. 02
CoAP: Designed for M2M
•
CoAP implements the REST architectural style:
can be transparently mapped to HTTP
•
CoAP goes beyond HTTP providing:
M2M Community
Telefónica Digital
Very low over-head, avoids the need of IPv6 fragmentation
Built-in discovery of services and resources
Multicast support
Asynchronous messages exchanges
Native push notification
26
27. 02
CoAP: The Web Architecture vs CoAP Architecture
The interaction model of CoAP is similar to the client/server model of
the Web. However, M2M interactions typically result in a CoAP
implementation acting in both client and server roles.
M2M Community
Telefónica Digital
27
28. 03
CoAP: Messaging Model
•
•
•
•
•
•
•
Short fixed-length binary header (4bytes)
Messages must fit in a single IP datagram
Default IP: 1280bytes,
6LoWPAN and IEEE802.15.4 127bytes
Messages can be confirmable (CON) or non confirmable (NON).
Naturally runs over UDP and supports :
multicast IP destination addresses
DTLS security
Piggy-backed REST request/response
The response to a CON message is carried in the ACK
Request methods: GET, PUT, POST, and DELETE almost as in
HTTP.
Response methods: 2.xx (success), 4.xx (client error), 5.xx (server
error).
M2M Community
Telefónica Digital
28
30. 05
CoAP: Unreliable Transmission
•
•
•
Tipically, repeated readings from a sensor
If server lacks context to answer the request, sends Reset (RST)
Client can send the same mesage several times to ensure it reaches
the server
M2M Community
Telefónica Digital
30
32. 07
CoAP: Reliable Transmission
•
Normally bounded to non-reliable transport protocols, CoAP
implements a lightweight reliability mechanism based on:
Stop&wait retransmisssion for CON
Duplicated detection for CON and NON
M2M Community
Telefónica Digital
32
36. 11
CoAP: Proxying and Caching
•
CoAP supports caching
Cacheability determined by response code
An option number mask determines if it is a cache key.
Max-age option indicates cache lifetime
Validity checked using the Etag Option
•
Caching can be at endpoint or intermediary (proxy).
•
Proxy can be used to
Improve performance (reduce network load)
Access sleeping nodes
Security reasons
•
Very easy mapping CoAP (Cross-protocol-proxy)HTTP
M2M Community
Telefónica Digital
36
38. 13
CoAP: Endpoints and URIs
•
•
•
•
•
A CoAP endpoint is a source or destination of a message.
URI representations for resources:
coap-URI = "coap:" "//" <HOST> [ ":" <PORT> ] <PATH> [ "?" <QUERY> ]
coaps-URI = "coaps:" "//" <HOST> [ ":" <PORT> ] <PATH> [ "?" <QUERY> ]
HOST can be an IP address or a registered name.
PORT where CoAP server is located (default CoAP port: 5683)
Example: coap://example.com:436/sensors/temp?min=10
M2M Community
Telefónica Digital
Host: example.com
Port: 436
Path: sensors/temp
Query: min=10
38
39. 14
CoAP: Service and Resource Discovery
1. Discovering the servers:
If unknown, the client has to learn HOST server
2. Discovering the resources
The client queries the well known URI of the server on port 5683
The server returns the list of resources in CoRE Link Format
GET /.well-known/core
<sensors/temp>;sz=512;title=Temperature Sensor;ct=50,
<actuators/jack>;sz=256;title=Hydraulic Jacks;ct=50
3. Both steps can be merged, querying the well known URI of “all
4.
CoAP nodes” using multicast address FF0X:0:0:0:0:0:0:C0A7
Resource Directories can be used
Related spec:
• RFC 5785 defines the a path prefix for "well-known locations“
• RFC 5988 defines the types of web links and a registry for them
• RFC 6690 defines a link format for user Web Link in CORE.
M2M Community
Telefónica Digital
39
40. 15
CoAP: RESTful Group Communication
•
CoAP supports making requests to IP multicast groups in NON
•
•
Leisure time
CoAP does not support yet the use of multicast with security
M2M Community
Telefónica Digital
40
41. 16
CoAP: Security
•
•
•
•
•
•
•
CoAP is secured using Datagram TLS (RFC6347) over UDP.
The endpoint initiates session to the server and, after the DTLS
handshake, it can send the 1st CoAP request.
All CoAP messages are sent as DTLS “application data”.
DTLS adds a limited per-datagram overhead of aprox 13 bytes.
Security info (e.g. keys, ACLs) must be provided during the
provisioning of the device.
The device can be in 1 of 4 security modes:
NoSec: DTLS is disabled. Can be combined with alternative security
(e.g. IPSEC)
PreSharedKey: DTLS enabled, preshared keys authenticate peers or
groups of peers.
RawPublicKey: DTLS enabled, asymmetric keys without certificate.
Certificate: DTLS enabled, asymmetric keys with x.509 certificate.
DTLS is not appropriate to group keying (multicast).
M2M Community
Telefónica Digital
41
42. 17
CoAP: Status, Advantages and Limitations
•
Proposed standard since July, 2013: draft-ietf-core-coap-18.
•
Advantages:
•
Designed for M2M, IoT
Easily mapped to HTTP, compatible with Proxy infrastructures.
Easy to map legacy protocols to CoAP
Extensions: push notifications, discovery and Multicast.
Limitations and work in progress:
End to end secure connection required for CoAP/HTTP mapping at a
proxy using DTLS/TLS.
Securing multicast communications.
Semantics should be standardized.
Caching of requests should also be allowed
M2M Community
Telefónica Digital
42