• Constrained Application Protocol (CoAP) is a specialized UDP-based Internet application protocol for constrained devices, as defined in RFC 7252 (published...
    22 KB (1,813 words) - 02:51, 27 June 2025
  • Extensible Exchange Protocol Bitcoin BitTorrent CFDP, Coherent File Distribution Protocol CoAP, Constrained Application Protocol DDS, Data Distribution...
    11 KB (1,109 words) - 16:53, 21 July 2025
  • Wireless Application Protocol (WAP) is an obsolete technical standard for accessing information over a mobile cellular network. Introduced in 1999, WAP...
    24 KB (2,987 words) - 17:46, 21 July 2025
  • originally built on Constrained Application Protocol (CoAP) but later LwM2M versions also support additional transfer protocols. LwM2M's device management...
    6 KB (706 words) - 13:53, 21 April 2025
  • Thumbnail for Well-known URI
    Well-known URI (category Hypertext Transfer Protocol)
    Silverajan, Bill; Raymor, Brian (February 6, 2018). CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets. IETF. doi:10.17487/RFC8323...
    26 KB (1,629 words) - 14:43, 16 July 2025
  • Thumbnail for HTTP
    HTTP (redirect from Application/http)
    HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information...
    61 KB (7,794 words) - 11:04, 23 June 2025
  • QUIC (redirect from QUIC protocol)
    MsQuic library. Constrained Application Protocol (CoAP) – a UDP-based protocol utilizing REST model Datagram Congestion Control Protocol (DCCP) Datagram...
    41 KB (3,769 words) - 00:42, 31 July 2025
  • MQTT (redirect from MQTT protocol)
    Advanced Message Queuing Protocol (AMQP) Streaming Text Oriented Messaging Protocol (STOMP) Constrained Application Protocol (CoAP) Apache ActiveMQ Solace...
    18 KB (2,009 words) - 14:12, 31 July 2025
  • List of TCP and UDP port numbers (category Transmission Control Protocol)
    numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...
    321 KB (13,149 words) - 18:48, 7 August 2025
  • Thumbnail for Internet of things
    major role in handling the network layer scalability. IETF's Constrained Application Protocol, ZeroMQ, and MQTT can provide lightweight data transport. In...
    188 KB (20,188 words) - 15:16, 5 August 2025
  • the Certificate Management Protocol (CMP) Sahni, Mohit; Tripathi, Saurabh (November 2023). "Constrained Application Protocol (CoAP) Transfer for the Certificate...
    8 KB (623 words) - 04:23, 26 March 2025
  • Thumbnail for Gas meter
    monitoring. Other application-layer protocols, such as MQTT (Message Queuing Telemetry Transport) and CoAP (Constrained Application Protocol), are also utilized...
    23 KB (3,225 words) - 12:33, 5 August 2025
  • the original on 2025-01-28. Retrieved 2016-08-24. "CoAP — Constrained Application Protocol | Overview". Archived from the original on 2017-01-03. Retrieved...
    15 KB (1,544 words) - 21:19, 25 July 2025
  • Thumbnail for Zephyr (operating system)
    of required resources and modules A set of protocol stacks (IPv4 and IPv6, Constrained Application Protocol (CoAP), LwM2M, MQTT, 802.15.4, Thread, Bluetooth...
    11 KB (781 words) - 15:03, 21 July 2025
  • delivery of trading applications and keeping latency low increasingly requires an understanding of the FIX protocol. The FIX protocol specification was...
    22 KB (2,664 words) - 15:41, 4 June 2025
  • network for some constrained environments. It was initially derived from a requirement to run the ISO Common Management Information Protocol (CMIP) in TCP/IP-based...
    662 bytes (82 words) - 22:17, 13 August 2023
  • Studio. Recent releases of Nucleus include support for HTTPS, Constrained Application Protocol (CoAP), MQTT and 6LoWPAN. Nucleus has also announced support...
    19 KB (2,003 words) - 16:46, 30 May 2025
  • involved in the Internet of Things (IoT) based around the Constrained Application Protocol (CoAP). OIC was created in July 2014 by Intel, Broadcom, and...
    8 KB (536 words) - 02:42, 8 June 2025
  • The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP...
    54 KB (5,082 words) - 19:46, 2 August 2025
  • Thumbnail for Water metering
    systems. Other application-layer protocols, such as MQTT (Message Queuing Telemetry Transport) and CoAP (Constrained Application Protocol), are also utilized...
    48 KB (6,010 words) - 06:54, 7 August 2025
  • RFC 7252 Constrained Application Protocol (CoAP) June 2014 Constrained Application Protocol RFC 7301 Transport Layer Security (TLS): Application-Layer Protocol...
    38 KB (125 words) - 20:03, 3 June 2025
  • validate understanding of the Constrained Application Protocol (CoAP) base specification under development by IETF, and test protocol implementation interoperability...
    9 KB (747 words) - 04:42, 2 August 2025
  • Thumbnail for Bitcoin protocol
    The bitcoin protocol is the set of rules that govern the functioning of bitcoin. Its key components and principles are: a peer-to-peer decentralized network...
    22 KB (3,084 words) - 22:34, 13 June 2025
  • Time-Sensitive Networking (category Network protocols)
    Precision Time Protocol, which utilizes Ethernet frames to distribute time synchronization information. IEEE 802.1AS is a tightly constrained subset of IEEE...
    60 KB (7,130 words) - 21:08, 17 July 2025
  • Static Context Header Compression (category Internet protocols)
    Internet Protocol 6LoWPAN: IPv6 over Low-Power Wireless Personal Area Networks RoHC: Robust Header Compression CoAP: Constrained Application Protocol Farrell...
    10 KB (1,062 words) - 15:16, 7 November 2023
  • change and deploy, and protocols implemented in hardware can also inappropriately fix protocol details. A widely used application programming interface...
    18 KB (2,135 words) - 14:52, 22 June 2025
  • Server Name Indication (category Internet protocols)
    an extension to the Transport Layer Security (TLS) computer networking protocol by which a client indicates which hostname it is attempting to connect...
    34 KB (2,832 words) - 04:58, 29 July 2025
  • more tightly constrained, a more discriminate algorithm is required. In efforts to provide a shared framework for algorithm and application development...
    22 KB (2,354 words) - 02:06, 31 July 2025
  • cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the verifier)...
    64 KB (7,955 words) - 09:34, 4 July 2025
  • structured approach based on the OSI protocol model to meet the evolving challenges of the smart grid. At the application layer, ETSI TS 104 001 provides a...
    10 KB (1,205 words) - 09:41, 7 June 2025