摘要 |
Constrained devices and methods for managing a constrained device Methods for managing a constrained device are disclosed. The constrained device is one of a plurality of constrained devices within a network, each constrained device in the network having a device identity. A first method (100) comprises detecting that functionality of the constrained device will be reduced within a threshold period of time (110), and transferring the identity of the constrained device to another of the constrained devices in the network (130). Another method (200) comprises receiving an identity of another constrained device in the network (250), receiving a request directed to the received identity (260), and responding to the request (270). Also disclosed are constrained devices (400, 500, 600) and a computer program product configured to implement the above methods. |