IEEE Wireless Communications
Volume 17, Issue 6, December 2010, Article
number5675778, Pages 52-57

學生:邱柏誌




This article first gives an overview of the web
architecture, its core REST concepts, and the
current state of the a...




The IPv6 over low-power wireless area
network are playing a key role in driving the
Internet of Things.
Problems:
◦ ...


Two general ways of realizing web services:
◦ applying REST for the manipulation of resources
using HTTP
◦ via remote p...


The RESTful paradigm has many advantages
over RPC style interactions for constrained
embedded device. These include les...




Web services today are usually not suitable
for constrained networks and devices
Problems with these protocols inclu...




Overhead: The ideal UDP payload over
6LoWPAN and IEEE 802.15.4 is just 60–80
bytes for reasonable performance
TCP bi...




Pull model: In sensor networks wireless nodes
are typically sleeping over 90 percent of the
time, making the HTTP re...


To address those problems, we need a fresh
approach to both the transfer protocol used
to convey REST semantics, and th...


IETF started a new working group on
Constrained RESTful Environments (CoRE)
focusing on the goal of producing two items...


Constrained Application Protocol (CoAP):
◦ The group has defined an application transfer
protocol that realizes a minim...


In order to realize the web architecture while
meeting the demanding requirements of M2M
applications, CoAP has the fol...


By applying the fundamental REST
architecture to this domain, efficient web
service interfaces between embedded
machine...




Recent advancements in XML encoding with
W3C EXI along with industry-specific formats
have shown promising results i...


Routing scalability, naming and
identification, security, privacy, and the
manageability of such a network
Embedded Web Services Report
Embedded Web Services Report
Embedded Web Services Report
Embedded Web Services Report
Embedded Web Services Report
Embedded Web Services Report
Upcoming SlideShare
Loading in...5
×

Embedded Web Services Report

201

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
201
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
23
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Embedded Web Services Report

  1. 1. IEEE Wireless Communications Volume 17, Issue 6, December 2010, Article number5675778, Pages 52-57 學生:邱柏誌
  2. 2.   This article first gives an overview of the web architecture, its core REST concepts, and the current state of the art in web services. Two key activities required in order to achieve efficient embedded web services are introduced: ◦ a fresh approach to a web application transfer protocol and efficient payload encoding. ◦ The article analyzes the most promising payload encoding techniques and introduces the new IETF Constrained RESTful Environments (CoRE) standardization activity.
  3. 3.   The IPv6 over low-power wireless area network are playing a key role in driving the Internet of Things. Problems: ◦ Web service technology today is a poor match for the vast majority of constrained networks, machine-to-machine (M2M) applications ◦ constrained embedded devices are optimized for low cost and power consumption
  4. 4.  Two general ways of realizing web services: ◦ applying REST for the manipulation of resources using HTTP ◦ via remote procedure call (RPC) style interactions using, say, the Simple Object Access Protocol (SOAP).
  5. 5.  The RESTful paradigm has many advantages over RPC style interactions for constrained embedded device. These include less overhead, less parsing complexity, statelessness, and tighter integration with HTTP
  6. 6.   Web services today are usually not suitable for constrained networks and devices Problems with these protocols include:
  7. 7.   Overhead: The ideal UDP payload over 6LoWPAN and IEEE 802.15.4 is just 60–80 bytes for reasonable performance TCP binding: Web services today depend on TCP, which has performance problems over lossy links, sensitivity to mobility, no multicast support and high overhead for short-lived transactions.
  8. 8.   Pull model: In sensor networks wireless nodes are typically sleeping over 90 percent of the time, making the HTTP request/response pull model inappropriate. Complexity: A large number of features and optional headers may be employed, increasing embedded device complexity.
  9. 9.  To address those problems, we need a fresh approach to both the transfer protocol used to convey REST semantics, and the payload formats exchanged between applications.
  10. 10.  IETF started a new working group on Constrained RESTful Environments (CoRE) focusing on the goal of producing two items specifically for M2M:
  11. 11.  Constrained Application Protocol (CoAP): ◦ The group has defined an application transfer protocol that realizes a minimal subset of REST along with resource discovery, subscription notification, and the use of appropriate security measures  Security bootstrapping: ◦ The group will also define a set of security bootstrapping methods for use in constrained environments in order to associate devices and set up keying material for secure operation
  12. 12.  In order to realize the web architecture while meeting the demanding requirements of M2M applications, CoAP has the following key features: ◦ ◦ ◦ ◦ ◦ ◦ ◦ Compact header Methods and URIs Subscription Content Types Simple caching Transport binding Resource discovery
  13. 13.  By applying the fundamental REST architecture to this domain, efficient web service interfaces between embedded machines can be achieved.
  14. 14.   Recent advancements in XML encoding with W3C EXI along with industry-specific formats have shown promising results in minimizing payload overhead and parsing complexity. The new IETF Constrained RESTful Environments working group is developing a new application transfer protocol designed specifically for realizing embedded web services.
  15. 15.  Routing scalability, naming and identification, security, privacy, and the manageability of such a network
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×