Implementasi Constrained Application Protocol pada Internet of Things dengan Constrained RESTful Environments berbasis Constrained Device
Abstract
Keywords
Full Text:
PDFReferences
S. Li, L. Da Xu, and S. Zhao, (2015) “The internet of things: a survey,†Inf. Syst. Front., vol. 17, no. 2, pp. 243–259.
M. Ilaghi, T. Leva, and M. Komu, (2014) “Techno-economic feasibility analysis of constrained application protocol,†2014 IEEE World Forum Internet Things, WF-IoT 2014, pp. 153–158.
C. Bormann, (2014) “Terminology for Constrained-Node Networks,†Internet Eng. Task Force, pp. 1–17.
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, (2015) “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications,†IEEE Commun. Surv. Tutorials, vol. 17, no. 4, pp. 2347–2376.
IETF RFC 7252, (2014) The Constrained Application Protocol (CoAP).
I. Ishaq, J. Hoebeke, F. Van Den Abeele, I. Moerman, and P. Demeester, (2013) “Group Communication in Constrained Environments using CoAP-based Entities,†pp. 345–350.
D. Garcia-carrillo and R. Marin-lopez, (2016) “Lightweight CoAP-Based Bootstrapping Service for,â€.
Rafiullah Khan, Salmad Ullah Khan, Rifaqat Zaheer, Shahid Khan, (2012) “Future Internet : The Internet of Things Architecture, Possible Application and Key Challengesâ€, International Conference on Frontiers of Information Technology.
Z. Shelby, (2014) “The Constrained Application Protocol (CoAP),†Internet Eng. Task Force, pp. 1–112.
Nurul Hikmah, (2016) "Implementasi WSN Pada Pendeteksi Dini Kebakaran Dengan Metode Fuzzy Logic Sugeno", Tugas Akhir, Fakultas Ilmu Komputer, Universitas Sriwijaya.
D. H. Networks, Network Infrastructure And Architecture Designing High-Availability Networks. 2008.
J. Postel, (1980) “User Datagram Protocol,†no. August, pp. 1–3.
I. Oktariawan, Martinus, and Sugiyanto, (2013) “Pembuatan Sistem Otomasi Dispenser Menggunakan Mikrokontroler Arduino Mega 2560,†Jurnal FEMA, Volume 1, Nomor 2, April 2013.
M. Dan, (2016) “Modul praktikum mikroprosesor dan mikrokontroler,†vol. 4, no. 24.
J. Iptek and V. No, “Perancangan Prototype Sistem Kontrol Dan Monitoring Pembatas Daya Listrik Berbasis Mikrokontroler,†vol. 16, no. 1, 2012.
F..S.A.forouzan, Behrouz, College, De Anza, (2007) Data Communications And Networking_Forouzan_2.pdf.
V. Mehta and N. Gupta, (2012) “Performance Analysis of QoS Parameters for Wimax Networks,†vol. 1, no. 5, pp. 105–110.
M. C. H. D. A. N. H and V. Call, “Analisis kualitas layanan,†no. 1, pp. 138–143.
M. B. Tamboli and D. Dambawade, (2016) “Secure and efficient CoAP based authentication and access control for Internet of Things (IoT),†2016 IEEE Int. Conf. Recent Trends Electron. Inf. Commun. Technol., pp. 1245–1250
DOI: https://doi.org/10.36269/jtr.v6i1.1916
Refbacks
- There are currently no refbacks.
Kontak :
Pengurus JITRO, Fakultas Teknik Universitas Muhammadiyah Lampung, Jl. Z.A Pagar Alam No.14 Bandar Lampung 35142
JITRO Index :
Flag Counter | Stat Counter | Creative Commons |
|
|
Jitro on MAP



