{"title":"受限网络下物联网协议的性能,基于用例的方法","authors":"S. Sreeraj, G. Santhosh Kumar","doi":"10.1109/IC3IOT.2018.8668105","DOIUrl":null,"url":null,"abstract":"An extensive collection of communication protocols were developed to support efficient communication of IoT devices. IoT applications are intended to run with constrained resources. Since IoT systems need wireless connectivity, and the devices often are remote, they have to manage with connections which are likely unreliable, irregular and inferior bandwidth to access the network. A quantitative assessment of IoT protocols in such situations remains unexplored. The objective of the present work is to assess the performance of IoT messaging protocols under restricted wireless access network based on Use Cases published by oneM2M specifications.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Performance of IoT protocols under constrained network, a Use Case based approach\",\"authors\":\"S. Sreeraj, G. Santhosh Kumar\",\"doi\":\"10.1109/IC3IOT.2018.8668105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An extensive collection of communication protocols were developed to support efficient communication of IoT devices. IoT applications are intended to run with constrained resources. Since IoT systems need wireless connectivity, and the devices often are remote, they have to manage with connections which are likely unreliable, irregular and inferior bandwidth to access the network. A quantitative assessment of IoT protocols in such situations remains unexplored. The objective of the present work is to assess the performance of IoT messaging protocols under restricted wireless access network based on Use Cases published by oneM2M specifications.\",\"PeriodicalId\":155587,\"journal\":{\"name\":\"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3IOT.2018.8668105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3IOT.2018.8668105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance of IoT protocols under constrained network, a Use Case based approach
An extensive collection of communication protocols were developed to support efficient communication of IoT devices. IoT applications are intended to run with constrained resources. Since IoT systems need wireless connectivity, and the devices often are remote, they have to manage with connections which are likely unreliable, irregular and inferior bandwidth to access the network. A quantitative assessment of IoT protocols in such situations remains unexplored. The objective of the present work is to assess the performance of IoT messaging protocols under restricted wireless access network based on Use Cases published by oneM2M specifications.