WAP Architecture Presented by, Nithya Inbamani
WAP Background Wireless Application Protocol – secure specification. Wireless Application Protocol – secure specification. Convergence of wireless data market and internet Convergence of wireless data market and internet Internet – computers with higher bandwidth. Internet – computers with higher bandwidth. Limitations of the hand held devices - Limitations of the hand held devices - Less Powerful CPUs Less memory Smaller Displays Restricted Power Consumption Different Input Devices (Phone keypad)
WAP Background -contd Constrained Communication environment of wireless data networks- Less Bandwidth More Latency Less Connection Stability Less Predictable Availability WAP Architecture provides solutions to n/w operators that are – Interoperable Scalable Reliable Efficient Secure
W W W Programming Model
WAP Programming Model
WAP Network - Example WAP Proxy translates WAP request to WWW requests, encodes responses from the web server. HTML Filter converts WWW content into WAP content. WTA is a gateway server
WAP Architecture
Application Layer - Wireless Application Environment (WAE) General Purpose Application Environment – based on combination of WWW and Mobile Telephony Technologies. General Purpose Application Environment – based on combination of WWW and Mobile Telephony Technologies. Wireless Markup Language (WML), WMLScript. Wireless Markup Language (WML), WMLScript.
Session Layer - Wireless Session Protocol (WSP) Opens a session of communication between client and server. Opens a session of communication between client and server. Establishes protocol and negotiations Establishes protocol and negotiations Exchanges encoded data Exchanges encoded data Exchanges requests and replies Exchanges requests and replies Supports asynchronous transmission of data. Supports asynchronous transmission of data.
Transaction Layer - Wireless Transaction Protocol (WTP) Deals with transaction and retransmission of data, separation and concatenation of data. Deals with transaction and retransmission of data, separation and concatenation of data. Has a separate interface to manage WTP layer and settings of handheld device. Has a separate interface to manage WTP layer and settings of handheld device.
Security Layer - Wireless Transport Layer Security (WTLS) Security Protocol Security Protocol Used for secure communication between terminals Used for secure communication between terminals Provides the following Provides the following Data Integrity Privacy Authentication Denial-of-service protection
Transport Layer - Wireless Datagram Protocol (WDP) Transport Layer Protocol. Transport Layer Protocol. Offers consistent service and common interface to upper layers of protocols. Offers consistent service and common interface to upper layers of protocols. Enhances communication between Bearer Services and upper level protocols. Enhances communication between Bearer Services and upper level protocols.
Bearers Products that implement WAP in their network and technology. Products that implement WAP in their network and technology. Eg : CDPD, Mobitex, GSM Eg : CDPD, Mobitex, GSM
Conclusion The need for wireless technology has grown tremendously in the last 2 years. The need for wireless technology has grown tremendously in the last 2 years. In future – may be we can program our grocery list in portable devices. In future – may be we can program our grocery list in portable devices. May be a palm pilot could be programmed to submit assignments and exams. May be a palm pilot could be programmed to submit assignments and exams.
References C-WAPArch pdf C-WAPArch pdf