2022
DOI: 10.17762/ijcnis.v11i2.4034
|View full text |Cite
|
Sign up to set email alerts
|

6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP

Abstract: Different protocols have been developed for the Internet of things (IoT), such as the constrained application protocol (CoAP) for the application layer of the IPv6 over low-power wireless personal area networks (6LoWPAN) stack model. Data transmitted over 6LoWPAN are limited by the throughput and the frame size defined by IEEE 805.14.5 standards. Choosing the best configuration for data transmission involves a trade off between the application requirements, the constrained network configuration, the constraine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…When it comes to the context of the Internet of Things, this layer is the most crucial, since it unifies the numerous forms of communication technology that make it possible for IoT devices to communicate with one another. Among the most popular of these communication methods are ZigBee [7], BLE (i.e., piconet) [8,9], 6LoWPAB [10][11][12], LoRaWAN [13][14][15], and readable tags.…”
Section: Network Layermentioning
confidence: 99%
“…When it comes to the context of the Internet of Things, this layer is the most crucial, since it unifies the numerous forms of communication technology that make it possible for IoT devices to communicate with one another. Among the most popular of these communication methods are ZigBee [7], BLE (i.e., piconet) [8,9], 6LoWPAB [10][11][12], LoRaWAN [13][14][15], and readable tags.…”
Section: Network Layermentioning
confidence: 99%
“…e set of characteristic words contained in a bad information category is called the bad information characteristic word set of the bad information category. e characteristic words contained in all bad information categories constitute the bad information characteristic word set [15]. Assuming that the bad information set is represented by AJ and each bad information vector is represented by NAJ, as shown in formulas (1) and (2):…”
Section: Feature Model Of Bad Information Retrieval From Thementioning
confidence: 99%
“…Several studies have already been conducted to evaluate the performance of the IPv6 network and its applications. For example, Aloufi analyzed structure recommendations and message size for the IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) stack model [10]. Yang and Wu studied the Hierarchical Mobile IPv6 (HMIPv6) Binding Update message to support Call Admission Control (CAC) schemes to guarantee every service meets their Quality of Service (QoS) requirements in the mobile network of Wireless Broadband [11].…”
Section: Related Workmentioning
confidence: 99%