1 FAQ’S ABOUT WAP Presented By Abhilash Pillai CSCI 5939-Independent Study.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Basic Internet Terms Digital Design. Arpanet The first Internet prototype created in 1965 by the Department of Defense.
4.01 How Web Pages Work.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Module 5: Configuring Access to Internal Resources.
(4.4) Internet Protocols Layered approach to Internet Software 1.
SCSC 455 Computer Security Virtual Private Network (VPN)
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
Topics in this presentation: The Web and how it works Difference between Web pages and web sites Web browsers and Web servers HTML purpose and structure.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
WAP: Wireless Application Protocol Mike Mc Ardle ACSG April, 2005.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Remote Networking Architectures
Wireless Application Protocol (WAP) Reference: Chapter 12, section 2, Wireless Communications and Networks, by William Stallings, Prentice Hall.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
IT 210 The Internet & World Wide Web introduction.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
CP476 Internet Computing Lecture 5 : HTTP, WWW and URL 1 Lecture 5. WWW, HTTP and URL Objective: to review the concepts of WWW to understand how HTTP works.
ES Module 5 Uniform Resource Locators, Hypertext Transfer Protocol, & Common Gateway Interface.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Network Services Networking for Home & Small Business.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
WWW Programming Model. WWW Model The Internet WWW architecture provides a flexible and powerful programming model. Applications and content are presented.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Module 11: Remote Access Fundamentals
Quick Implementation of a WAP Push Gateway Wen-Hung Su Fu Jen Catholic University Computer Science and Information Engineering Department Moblie Communication.
Ericsson Competence Solutions Rev A16/11/011 Mobile Learning Course for R380 and R520 Presented by Michelle Almeida Course Structure Design Guidelines.
TECHNICAL SEMINAR Presented by :- Satya Prakash Pattnaik TECHNICAL SEMINAR By Satya Prakash Pattnaik EC Under the guidance of Mr.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Wireless Application Protocol “Wireless application protocol (WAP) is an application environment and set of communication protocols for wireless devices.
Proxy Servers.
Wireless Application Protocol CSCI 465 Nathaniel Samson Alison White Steve MacNeil Michael Pyne James Snow.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
IT 284 Unit 4 Seminar.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
WAP Architecture Presented by, Nithya Inbamani. WAP Background Wireless Application Protocol – secure specification. Wireless Application Protocol – secure.
WWW Programming Model. WWW Model The Internet WWW architecture provides a flexible and powerful programming model. Applications and content are presented.
Web Services Using Visual.NET By Kevin Tse. Agenda What are Web Services and Why are they Useful ? SOAP vs CORBA Goals of the Web Service Project Proposed.
Web Services An Introduction Copyright © Curt Hill.
Presentation Title 1 1/27/2016 Lucent Technologies - Proprietary Voice Interface On Wireless Applications Protocol A PDA Implementation Sherif Abdou Qiru.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Wireless Application Protocol (WAP) William Thau CSC 8560 Dr. L. Cassel.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
4.01 How Web Pages Work.
4.01 How Web Pages Work.
Data communication and Networks
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Processes The most important processes used in Web-based systems and their internal organization.
M-Commerce Wireless Markup Language (WML) By Prof T.R. Vaidyanathan.
AbbottLink™ - IP Address Overview
4.01 How Web Pages Work.
Computer Networks Protocols
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Mobile Internet and WAP
Presentation transcript:

1 FAQ’S ABOUT WAP Presented By Abhilash Pillai CSCI 5939-Independent Study

2 Topics Covered Definition of a WAP gateway Architecture of a WAP gateway Configuration of WAP gateway Security over a WAP gateway Definition of WAP server Role of a WAP server

3 Definition of WAP gateway A WAP gateway is a piece of software that has several functions in the chain between the WAP device and the web server. When implementing services in Wireless Application Protocol(WAP),information is translated into Wireless Markup language(WML) by a two way device called a WAP gateway

4 Architecture of WAP Gateway Components of architecture Wireless Device WAP Gateway HTTP Server

5 Explanation Of Architecture The data transfer procedure is as follows Client sends a WSP request to WAP gateway WAP gateway decodes the WSP request into HTTP request WAP gateway sends the HTTP request to HTTP server WAP gateway receives the HTTP reply from HTTP server WAP gateway encodes the HTTP reply headers into WSP reply headers WAP gateway uses WML compiler to encode the received WML data to WMLC format,which is more compact WAP gateway sends WSP reply Client parses WSP reply and presents data.

6 Architecture cont……. From the previous procedure we can see the main tasks for a WAP gateway are Communication with clients (based on WSP) Decoding WSP requests into HTTP requests Communication with HTTP server (based on HTTP) Encoding HTTP reply headers into WSP Reply headers Compile WML data into WMLC format

7 Configuration of WAP gateway The WAP gateway and web server together form the WAP server are placed in outside the content providers domain System is less secure

8 Configuration Cont….. The WAP server ie the WAP gateway and the web server are placed in the content providers domain System is more secure

9 How the configuration works Mobile user types in the URL for a site on the WAP device The WAP device first checks if it already has an open connection. If not it dials the modem attached to a dial-in server (RAS, or Remote Access Service). This server gives the WAP device access to the protocols it needs. These protocols are the same lower level protocols as a normal Internet Service Provider will give you, i.e. PPP (Point-to-Point Protocol).

10 Description Cont…. After the PPP provider has given the WAP device the required protocols and assigned it an IP address, the request for the URL is then sent to the WAP Gateway. The WAP Gateway, now under "control" of the WAP device requests the URL with a normal HTTP request. The WAP Gateway is the link between the wireless and the Internet, basically giving the WAP device access to the common Internet.

11 Description Cont…. On the Internet, the web server receives the request from WAP Gateway and sends out the contents located at the URL back. Finally, back at the WAP device that requested the URL, the WML browser, when receiving the tokenized WML code renders the contents on the WAP device's display to present the first card off of the deck on the screen for the user To sum up, the client makes a request. This request is received by a WAP gateway that then processes the request and formulates a reply using WML and send back to the client for display. This process is very similar in concept to the standard HTTP transaction involving client Web browsers

12 Security Issues For a short span of time when the data is unencrypted in the WAP gateway; is major security issue It is upto the vendors discretion to make the gateway as secure as possible

13 Security issues Contd….. The second issue with security is that of certificates that are provide for the device This certificate is used to access the various services for a particular user If the mobile device is lost it is possible for any user who possess that mobile device to access the various services Thus for this purpose in the new WTLS specification the idea of pins were introduced ie a secure token id.thus the user is supposed to reveal the token before using the services.

14 What is a WAP server A WAP Server is nothing more than a normal web server and a WAP gateway-like device built into one. The WAP server can plug a few holes that are currently unplugged in the WAP environment. Since the WAP server contains a gateway, the third party gateway usually hosted by the mobile operator can be skipped, and the host of the WAP content will have full control over the encrypted stream

15 Is WAP secure with SSL and WTLS? SSL or Secure Sockets Layer which is widely used in the "web" world to encrypt the data stream between the browser and the webserver is actually also used in the WAP environment. SSL is only used between the webserver and the WAP gateway. Between the WAP gateway and the WAP device, a similar system called WTLS or Wireless Transport Layer Security. WTLS is specialized for the wireless environment. SSL and WTLS on their own provide adequate security for most applications. However, there is a potential security problem where the two protocols meet, and that's inside the WAP gateway.

16 Models of WAP system | | [WAP device]--|------[WAP gateway]---| [Content Server]  -|---  | {unprotected}  -|-  WTLS | SSL (Firewall) | | (Firewall) SSL is not directly compatible with WTLS, so the WAP gateway must decrypt the SSL protected data stream coming from the webserver and then re-encrypt it using WTLS before passing the data on to the WAP device Inside the memory of the WAP gateway, the data is unprotected

17 Models Cont…. A more secure model but with tradeoff [WAP device]--| | [WAP Server acting as WAP gateway]  -|  WTLS | (Firewall) | | (Firewall) WAP players are developing solutions to the problem posed in the earlier model, but for now these solutions create other problems "WAP servers", provide end-to-end security in a way because the data stream leaves the "WAP server" already encrypted with WTLS

18 Proposed solution for the future Pass Through Model of WAP system [WAP device]--|[WAP gateway}---| [WAP Server] |   | WTLS (Firewall) | |(Firewall)

19 What is a proxy server? A proxy-server plays the role of an agent between the web-browser or another web-client and the internet. With the help of a proxy-server users can use the internet in a controlled way, e.g. through a firewall. Furthermore, a proxy can be used as a filter (e.g. suppressing the referrer-header for security) or to cache documents. It is possible to create "off-line" caches and to index them for later searching. Because WAP Proxy-Server can also act as a web-server, it is possible to create virtual sites or to hide real sites

20 References Proxy servers- www checkcom.com/products WAP faq’s – Ric Howell,Concise Group-WAP security Architecture of WAP Gateway- ct/ntang/architecture.html