Facilitating the creation of IoT applications through conditional observations in CoAP

被引:27
作者
Teklemariam, Girum Ketema [1 ]
Hoebeke, Jeroen [1 ]
Moerman, Ingrid [1 ]
Demeester, Piet [1 ]
机构
[1] Ghent Univ iMinds, Dept Informat Technol INTEC, B-9050 Ghent, Belgium
关键词
IoT; Conditional observation; Resource observation; REST; CoAP;
D O I
10.1186/1687-1499-2013-177
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things. The biggest challenge faced is the resource constraint of the smart objects to directly utilize the existing standard protocols and applications. A number of initiatives are currently witnessed to resolve this situation. One of such initiatives is the introduction of Constrained Application Protocol. This protocol is developed to fit in the resource-constrained smart object with the ability to easily translate to the prominent representational state transfer implementation, hypertext transfer protocol (and vice versa). The protocol has several optional extensions, one of them being, resource observation. With resource observation, a client may ask a server to be notified every state change of the resource. However, in many applications, all state changes are not significant enough for the clients. Therefore, the client will have to decide whether to use a value sent by a server or not. This results in wastage of the already constrained resources (bandwidth, processing power,aEuro broken vertical bar). In this paper, we introduced an alternative to the normal resource observation function, named Conditional Observation, where clients tell the servers the criteria for notification. We evaluated the power consumption and number of packets transmitted between clients and servers by using different network sizes and number of servers. In all cases, we found out that the existing observe option results in excessive number of packets (most of them unimportant for the client) and higher power consumption. We also made an extensive theoretical evaluation of the two approaches which give consistent result with the results we got from experimentation.
引用
收藏
页数:19
相关论文
共 17 条
[1]  
[Anonymous], 2012, IETF TRUST
[2]  
European Telecommunications Standards Institute (ETSI), 2011, 102690 ETSI TS, P10
[3]  
Hui J, 2012, RFC6550 IETF TRUST
[4]  
Ishaq I, 2012, INT WORKSH EXT SEAML
[5]  
Kovatsch M., 2011, 2011 IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems, P855, DOI 10.1109/MASS.2011.100
[6]  
Lai S, 2009, PUBLISH SUBSCRIBE MI
[7]  
Li ST, 2012, CONDITIONAL OBSERVE
[8]  
Montenegro G, 2007, 4944 RFC IETF TRUST
[9]  
Na A., 2007, Sensor Observation Service
[10]  
Roach AB, 2002, RFC3265 IETF TRUST