Quantcast
Channel: Internet Drafts: lwig
Browsing all 90 articles
Browse latest View live

"Guidance for Light-Weight Implementations of the Internet Protocol Suite" -...

2013-02-25, rev -03: Implementation of Internet protocols on small devices benefits from light-weight implementation techniques, which are often not documented in an accessible way.

View Article



"Minimal IKEv2" - Tero Kivinen

2013-04-11, rev -00: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...

View Article

"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...

2013-04-22, rev -04: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...

View Article

"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...

2013-07-01, rev -05: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...

View Article

"Guidance for Light-Weight Implementations of the Internet Protocol Suite" -...

2013-02-25, rev -03: Implementation of Internet protocols on small devices benefits from light-weight implementation techniques, which are often not documented in an accessible way.

View Article


"Minimal IKEv2" - Tero Kivinen

2013-04-11, rev -00: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...

View Article

"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...

2013-07-09, rev -05: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...

View Article

"Building Power-Efficient CoAP Devices for Cellular Networks" - Jari Arkko,...

2013-08-14, rev -00: This memo discusses the use of the Constrained Application Protocol (CoAP) protocol in building sensors and other devices that employ cellular networks as a communications medium....

View Article


"Guidance for Light-Weight Implementations of the Internet Protocol Suite" -...

2013-02-25, rev -03: Implementation of Internet protocols on small devices benefits from light-weight implementation techniques, which are often not documented in an accessible way.

View Article


"Minimal IKEv2" - Tero Kivinen

2013-04-11, rev -00: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...

View Article

"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...

2013-07-09, rev -05: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...

View Article

"Building Power-Efficient CoAP Devices for Cellular Networks" - Jari Arkko,...

2013-08-14, rev -00: This memo discusses the use of the Constrained Application Protocol (CoAP) protocol in building sensors and other devices that employ cellular networks as a communications medium....

View Article

"Minimal IKEv2" - Tero Kivinen

2013-04-11, rev -00: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...

View Article


"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...

2013-07-09, rev -05: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...

View Article

"Building Power-Efficient CoAP Devices for Cellular Networks" - Jari Arkko,...

2013-08-14, rev -00: This memo discusses the use of the Constrained Application Protocol (CoAP) protocol in building sensors and other devices that employ cellular networks as a communications medium....

View Article


"A Hitchhiker's Guide to the (Datagram) Transport Layer Security Protocol for...

2013-09-04, rev -00: Transport Layer Security (TLS) is a widely used security protocol that offers communication security services at the transport layer. The initial design of TLS was focused on the...

View Article

"Minimal IKEv2" - Tero Kivinen

2013-10-17, rev -01: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...

View Article


"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...

2013-12-18, rev -06: The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory and processing resources, creating constrained node networks. This...

View Article

"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...

2014-02-10, rev -07: The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory and processing resources, creating constrained node networks. This...

View Article

"Building Power-Efficient CoAP Devices for Cellular Networks" - Jari Arkko,...

2014-02-13, rev -01: This memo discusses the use of the Constrained Application Protocol (CoAP) protocol in building sensors and other devices that employ cellular networks as a communications medium....

View Article
Browsing all 90 articles
Browse latest View live




Latest Images