SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
IEEE Wireless Communications
Volume 17, Issue 6, December 2010, Article
number5675778, Pages 52-57

學生:邱柏誌




This article first gives an overview of the web
architecture, its core REST concepts, and the
current state of the art in web services.
Two key activities required in order to achieve
efficient embedded web services are introduced:
◦ a fresh approach to a web application transfer protocol
and efficient payload encoding.
◦ The article analyzes the most promising payload
encoding techniques and introduces the new IETF
Constrained RESTful Environments (CoRE)
standardization activity.




The IPv6 over low-power wireless area
network are playing a key role in driving the
Internet of Things.
Problems:
◦ Web service technology today is a poor match for
the vast majority of constrained
networks, machine-to-machine (M2M) applications
◦ constrained embedded devices are optimized for
low cost and power consumption


Two general ways of realizing web services:
◦ applying REST for the manipulation of resources
using HTTP
◦ via remote procedure call (RPC) style interactions
using, say, the Simple Object Access Protocol
(SOAP).


The RESTful paradigm has many advantages
over RPC style interactions for constrained
embedded device. These include less
overhead, less parsing
complexity, statelessness, and tighter
integration with HTTP




Web services today are usually not suitable
for constrained networks and devices
Problems with these protocols include:




Overhead: The ideal UDP payload over
6LoWPAN and IEEE 802.15.4 is just 60–80
bytes for reasonable performance
TCP binding: Web services today depend on
TCP, which has performance problems over
lossy links, sensitivity to mobility, no
multicast support and high overhead for
short-lived transactions.




Pull model: In sensor networks wireless nodes
are typically sleeping over 90 percent of the
time, making the HTTP request/response pull
model inappropriate.

Complexity: A large number of features and
optional headers may be
employed, increasing embedded device
complexity.


To address those problems, we need a fresh
approach to both the transfer protocol used
to convey REST semantics, and the payload
formats exchanged between applications.


IETF started a new working group on
Constrained RESTful Environments (CoRE)
focusing on the goal of producing two items
specifically for M2M:


Constrained Application Protocol (CoAP):
◦ The group has defined an application transfer
protocol that realizes a minimal subset of REST
along with resource discovery, subscription
notification, and the use of appropriate security
measures



Security bootstrapping:
◦ The group will also define a set of security
bootstrapping methods for use in constrained
environments in order to associate devices and set
up keying material for secure operation


In order to realize the web architecture while
meeting the demanding requirements of M2M
applications, CoAP has the following key
features:
◦
◦
◦
◦
◦
◦
◦

Compact header
Methods and URIs
Subscription
Content Types
Simple caching
Transport binding
Resource discovery


By applying the fundamental REST
architecture to this domain, efficient web
service interfaces between embedded
machines can be achieved.




Recent advancements in XML encoding with
W3C EXI along with industry-specific formats
have shown promising results in minimizing
payload overhead and parsing complexity.
The new IETF Constrained RESTful
Environments working group is developing a
new application transfer protocol designed
specifically for realizing embedded web
services.


Routing scalability, naming and
identification, security, privacy, and the
manageability of such a network

Weitere ähnliche Inhalte

Was ist angesagt?

1. web technology basics
1. web technology basics1. web technology basics
1. web technology basicsJyoti Yadav
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportHasibul Islam Nirob
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project designTotal Assignment Help
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1nhepner
 
Uses of computer in Bangladesh
Uses of computer in BangladeshUses of computer in Bangladesh
Uses of computer in BangladeshAbdullah Al Noman
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration examsHossam Zein
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer NetworksShohanaakterKakon
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat applicationPiyush Rawat
 
WAN Design Project
WAN Design ProjectWAN Design Project
WAN Design ProjectD Ther Htun
 
Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Jonathan Jeon
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design Muhd Mu'izuddin
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...The University of Texas (UTRGV)
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3APSU
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4APSU
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkSudhriti Gupta
 

Was ist angesagt? (20)

1. web technology basics
1. web technology basics1. web technology basics
1. web technology basics
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
 
WeiYapResume
WeiYapResumeWeiYapResume
WeiYapResume
 
Uses of computer in Bangladesh
Uses of computer in BangladeshUses of computer in Bangladesh
Uses of computer in Bangladesh
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration exams
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer Networks
 
Ch10
Ch10Ch10
Ch10
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
 
E-Commerce 11
E-Commerce 11E-Commerce 11
E-Commerce 11
 
WAN Design Project
WAN Design ProjectWAN Design Project
WAN Design Project
 
Lis 4482 final report
Lis 4482 final reportLis 4482 final report
Lis 4482 final report
 
Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Web Technology and Standards Tutorial
Web Technology and Standards Tutorial
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Andere mochten auch

Evolution of intel microprocessors
Evolution of intel microprocessorsEvolution of intel microprocessors
Evolution of intel microprocessorsAurang Zaib
 
01 intel processor architecture core
01 intel processor architecture core01 intel processor architecture core
01 intel processor architecture coresssuhas
 
Intel microprocessor history
Intel microprocessor historyIntel microprocessor history
Intel microprocessor historyRamzi Alqrainy
 
ECESLU Microprocessors lecture
ECESLU Microprocessors lecture ECESLU Microprocessors lecture
ECESLU Microprocessors lecture Jeffrey Des Binwag
 
Evolution of Intel Processors
Evolution of Intel ProcessorsEvolution of Intel Processors
Evolution of Intel ProcessorsShad Ahmad Zaidi
 
Intel Processors
Intel ProcessorsIntel Processors
Intel Processorshome
 
Timeline of Processors
Timeline of ProcessorsTimeline of Processors
Timeline of ProcessorsDevraj Goswami
 
EMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGYEMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGYVinay Kumar
 
Evolution Of Microprocessor
Evolution Of MicroprocessorEvolution Of Microprocessor
Evolution Of Microprocessorguest3870d0
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processorsagar solanky
 
Evolution Of Microprocessors
Evolution Of MicroprocessorsEvolution Of Microprocessors
Evolution Of Microprocessorsharinder
 

Andere mochten auch (17)

Evolution of intel microprocessors
Evolution of intel microprocessorsEvolution of intel microprocessors
Evolution of intel microprocessors
 
Intel processors
Intel processorsIntel processors
Intel processors
 
01 intel processor architecture core
01 intel processor architecture core01 intel processor architecture core
01 intel processor architecture core
 
Intel microprocessor history
Intel microprocessor historyIntel microprocessor history
Intel microprocessor history
 
ECESLU Microprocessors lecture
ECESLU Microprocessors lecture ECESLU Microprocessors lecture
ECESLU Microprocessors lecture
 
SOLAR TREE
SOLAR TREE SOLAR TREE
SOLAR TREE
 
Evolution of Intel Processors
Evolution of Intel ProcessorsEvolution of Intel Processors
Evolution of Intel Processors
 
Intel Processors
Intel ProcessorsIntel Processors
Intel Processors
 
Timeline of Processors
Timeline of ProcessorsTimeline of Processors
Timeline of Processors
 
EMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGYEMBEDDED WEB TECHNOLOGY
EMBEDDED WEB TECHNOLOGY
 
Evolution Of Microprocessor
Evolution Of MicroprocessorEvolution Of Microprocessor
Evolution Of Microprocessor
 
Intel Core i7 Processors
Intel Core i7 ProcessorsIntel Core i7 Processors
Intel Core i7 Processors
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processor
 
ppt on solar tree
ppt on solar treeppt on solar tree
ppt on solar tree
 
Solar tree ppt
Solar tree pptSolar tree ppt
Solar tree ppt
 
Evolution Of Microprocessors
Evolution Of MicroprocessorsEvolution Of Microprocessors
Evolution Of Microprocessors
 
Evolution of processors
Evolution of processorsEvolution of processors
Evolution of processors
 

Ähnlich wie Embedded Web Services Report

What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfashumasih3
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...ecway
 
Dotnet importance of coherence protocols with network applications on multic...
Dotnet  importance of coherence protocols with network applications on multic...Dotnet  importance of coherence protocols with network applications on multic...
Dotnet importance of coherence protocols with network applications on multic...Ecway Technologies
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Ecway Technologies
 
Java importance of coherence protocols with network applications on multicor...
Java  importance of coherence protocols with network applications on multicor...Java  importance of coherence protocols with network applications on multicor...
Java importance of coherence protocols with network applications on multicor...Ecway Technologies
 
Java importance of coherence protocols with network applications on multicor...
Java  importance of coherence protocols with network applications on multicor...Java  importance of coherence protocols with network applications on multicor...
Java importance of coherence protocols with network applications on multicor...ecwayerode
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow ControllerIRJET Journal
 
A practical architecture for mobile edge computing
A practical architecture for mobile edge computingA practical architecture for mobile edge computing
A practical architecture for mobile edge computingTejas subramanya
 
Load Balance in Data Center SDN Networks
Load Balance in Data Center SDN Networks Load Balance in Data Center SDN Networks
Load Balance in Data Center SDN Networks IJECEIAES
 
Building Blocks for IoT
Building Blocks for IoTBuilding Blocks for IoT
Building Blocks for IoTBob Marcus
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsIJECEIAES
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
 
Internet-Of-Things-For-Smart-Cities
Internet-Of-Things-For-Smart-CitiesInternet-Of-Things-For-Smart-Cities
Internet-Of-Things-For-Smart-CitiesSitakanta Mishra
 

Ähnlich wie Embedded Web Services Report (20)

IoT Coap
IoT Coap IoT Coap
IoT Coap
 
What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdf
 
DNIS in SRC
DNIS in SRCDNIS in SRC
DNIS in SRC
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
Dotnet importance of coherence protocols with network applications on multic...
Dotnet  importance of coherence protocols with network applications on multic...Dotnet  importance of coherence protocols with network applications on multic...
Dotnet importance of coherence protocols with network applications on multic...
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
Java importance of coherence protocols with network applications on multicor...
Java  importance of coherence protocols with network applications on multicor...Java  importance of coherence protocols with network applications on multicor...
Java importance of coherence protocols with network applications on multicor...
 
Java importance of coherence protocols with network applications on multicor...
Java  importance of coherence protocols with network applications on multicor...Java  importance of coherence protocols with network applications on multicor...
Java importance of coherence protocols with network applications on multicor...
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
A practical architecture for mobile edge computing
A practical architecture for mobile edge computingA practical architecture for mobile edge computing
A practical architecture for mobile edge computing
 
Load Balance in Data Center SDN Networks
Load Balance in Data Center SDN Networks Load Balance in Data Center SDN Networks
Load Balance in Data Center SDN Networks
 
Building Blocks for IoT
Building Blocks for IoTBuilding Blocks for IoT
Building Blocks for IoT
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 
Internet-Of-Things-For-Smart-Cities
Internet-Of-Things-For-Smart-CitiesInternet-Of-Things-For-Smart-Cities
Internet-Of-Things-For-Smart-Cities
 

Mehr von Bernie Chiu

Briefing - Dynamic Workers for Scheduling
Briefing - Dynamic Workers for SchedulingBriefing - Dynamic Workers for Scheduling
Briefing - Dynamic Workers for SchedulingBernie Chiu
 
書報期末 - Building Saas Through Research
書報期末 - Building Saas Through Research書報期末 - Building Saas Through Research
書報期末 - Building Saas Through ResearchBernie Chiu
 
演算法期中段落報告
演算法期中段落報告演算法期中段落報告
演算法期中段落報告Bernie Chiu
 
演算法排序應用說明簡介(以壓縮為例)
演算法排序應用說明簡介(以壓縮為例)演算法排序應用說明簡介(以壓縮為例)
演算法排序應用說明簡介(以壓縮為例)Bernie Chiu
 
演算法題目說明簡介
演算法題目說明簡介演算法題目說明簡介
演算法題目說明簡介Bernie Chiu
 
How I Use Derwent Innovations Index (DII)
How I Use Derwent Innovations Index (DII)How I Use Derwent Innovations Index (DII)
How I Use Derwent Innovations Index (DII)Bernie Chiu
 
Composing RESTful Services and Collaborative Workflows
Composing RESTful Services and Collaborative WorkflowsComposing RESTful Services and Collaborative Workflows
Composing RESTful Services and Collaborative WorkflowsBernie Chiu
 

Mehr von Bernie Chiu (7)

Briefing - Dynamic Workers for Scheduling
Briefing - Dynamic Workers for SchedulingBriefing - Dynamic Workers for Scheduling
Briefing - Dynamic Workers for Scheduling
 
書報期末 - Building Saas Through Research
書報期末 - Building Saas Through Research書報期末 - Building Saas Through Research
書報期末 - Building Saas Through Research
 
演算法期中段落報告
演算法期中段落報告演算法期中段落報告
演算法期中段落報告
 
演算法排序應用說明簡介(以壓縮為例)
演算法排序應用說明簡介(以壓縮為例)演算法排序應用說明簡介(以壓縮為例)
演算法排序應用說明簡介(以壓縮為例)
 
演算法題目說明簡介
演算法題目說明簡介演算法題目說明簡介
演算法題目說明簡介
 
How I Use Derwent Innovations Index (DII)
How I Use Derwent Innovations Index (DII)How I Use Derwent Innovations Index (DII)
How I Use Derwent Innovations Index (DII)
 
Composing RESTful Services and Collaborative Workflows
Composing RESTful Services and Collaborative WorkflowsComposing RESTful Services and Collaborative Workflows
Composing RESTful Services and Collaborative Workflows
 

Kürzlich hochgeladen

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Kürzlich hochgeladen (20)

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Embedded Web Services Report

  • 1. IEEE Wireless Communications Volume 17, Issue 6, December 2010, Article number5675778, Pages 52-57 學生:邱柏誌
  • 2.   This article first gives an overview of the web architecture, its core REST concepts, and the current state of the art in web services. Two key activities required in order to achieve efficient embedded web services are introduced: ◦ a fresh approach to a web application transfer protocol and efficient payload encoding. ◦ The article analyzes the most promising payload encoding techniques and introduces the new IETF Constrained RESTful Environments (CoRE) standardization activity.
  • 3.
  • 4.   The IPv6 over low-power wireless area network are playing a key role in driving the Internet of Things. Problems: ◦ Web service technology today is a poor match for the vast majority of constrained networks, machine-to-machine (M2M) applications ◦ constrained embedded devices are optimized for low cost and power consumption
  • 5.
  • 6.  Two general ways of realizing web services: ◦ applying REST for the manipulation of resources using HTTP ◦ via remote procedure call (RPC) style interactions using, say, the Simple Object Access Protocol (SOAP).
  • 7.
  • 8.  The RESTful paradigm has many advantages over RPC style interactions for constrained embedded device. These include less overhead, less parsing complexity, statelessness, and tighter integration with HTTP
  • 9.   Web services today are usually not suitable for constrained networks and devices Problems with these protocols include:
  • 10.   Overhead: The ideal UDP payload over 6LoWPAN and IEEE 802.15.4 is just 60–80 bytes for reasonable performance TCP binding: Web services today depend on TCP, which has performance problems over lossy links, sensitivity to mobility, no multicast support and high overhead for short-lived transactions.
  • 11.   Pull model: In sensor networks wireless nodes are typically sleeping over 90 percent of the time, making the HTTP request/response pull model inappropriate. Complexity: A large number of features and optional headers may be employed, increasing embedded device complexity.
  • 12.  To address those problems, we need a fresh approach to both the transfer protocol used to convey REST semantics, and the payload formats exchanged between applications.
  • 13.
  • 14.  IETF started a new working group on Constrained RESTful Environments (CoRE) focusing on the goal of producing two items specifically for M2M:
  • 15.  Constrained Application Protocol (CoAP): ◦ The group has defined an application transfer protocol that realizes a minimal subset of REST along with resource discovery, subscription notification, and the use of appropriate security measures  Security bootstrapping: ◦ The group will also define a set of security bootstrapping methods for use in constrained environments in order to associate devices and set up keying material for secure operation
  • 16.
  • 17.  In order to realize the web architecture while meeting the demanding requirements of M2M applications, CoAP has the following key features: ◦ ◦ ◦ ◦ ◦ ◦ ◦ Compact header Methods and URIs Subscription Content Types Simple caching Transport binding Resource discovery
  • 18.
  • 19.  By applying the fundamental REST architecture to this domain, efficient web service interfaces between embedded machines can be achieved.
  • 20.   Recent advancements in XML encoding with W3C EXI along with industry-specific formats have shown promising results in minimizing payload overhead and parsing complexity. The new IETF Constrained RESTful Environments working group is developing a new application transfer protocol designed specifically for realizing embedded web services.
  • 21.  Routing scalability, naming and identification, security, privacy, and the manageability of such a network