-
Notifications
You must be signed in to change notification settings - Fork 408
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feedbacks about CoAP-over-TCP #1343
Comments
Thx @boaks 🙏 I fixed it. I'm not sure but I think you can edit wiki by yourself. If I'm right, do not hesitate to fix this kind of typo directly. Except the typo, do you see anything which seems wrong/strange to you ? Let's use this issue for others feedback about : https://github.com/eclipse/leshan/wiki/CoAP-over-TCP |
You're right.
Not sure, if that fits "anything":
Anyway, it will be really very interesting, if TCP really helps to improve the usability. So, hands up,
|
You sounds very skeptical about CoAP over TCP. 😅 On my side, I haven't strong opinion, my current feeling is that UDP should be used as default like explained in the wiki page. Then I tried just to summarize the "literature" about it and see how it could fit to LWM2M use case. I currently have no production experience about that.
Maybe I'm wrong but I understand "low code footprint" as a kind of general idea which means that an UDP stack will probably required less disk , ram or CPU usage (maybe not all but at least some of them). But I agree this is not very clear
I understand the idea is just to say : use UDP but if UDP is blocked and TCP is not, you can fall back on CoAP over TCP.
I'm not sure to get you ? 🤔 |
I would rather say, I'm looking forward to the results.
If no messages are exchanged, because a large NAT timeout is assumed, the probability, that the client is not aware of a stale connection, gets larger. If that "back-channel" is important, the client needs to test the connection frequently, if it is still valid. |
It's my recollection that TCP was originally introduced to deal with lack of support by cloud hyperscalers for UDP on their load balancers. It was also to deal with the very short UDP TIMEOUT on firewalls (30-90S) and issues with DTLS security context being lost pre-CID support. |
Here some input about benefits of coap+tcp : eclipse-californium/californium#2092 (comment) |
contrained-node networks
=>
constrained-node networks
The text was updated successfully, but these errors were encountered: