Vous êtes sur la page 1sur 4

SEMESTER

SUBJECT CODE
&
NAME
BK ID
NAME
REG.NUMBER
PROGRAM

FIFTH
BT0087, WML and WAP Programming-Theory
B1182
RINKI DHIMAN
1411006170
BSC IT

QUESTIONS
BRIEFLY EXPLAIN THE COMPONENTS OF WAP
ARCHITECTURE?
COMPONENTS OF WAP ARCHITECTURE
The WAP architecture provides a scalable and extensible environment for
application development of mobile communication device the goals of the
WAP architecture are as follows:
. offer a flexible enhanced experience for the user with wed-centric
application model for wireless data services which uses telephone.
. offer a consistent and inter operable mode with the support of secure
and privacy in data and application
. offer narrow-band to wide-band wireless devices and network of work
. offer a secured access for log mobile functionality
. third party service and network operator provisioning is facilitated
. strength the existing and internet standard whenever and wherever
required.

Wireless application environment (WAE):


The wireless application environment is combination of world wide web
and mobile telephony technologies which is a general purpose application
environment.
The goal of wireless application environment includes a micro browser
environment containing the following functionality.
Wireless markup language (WML):
It is a lightweight markup language like HTML but optimize for hand held
mobile terminals
Mobile script:
It is a light weight scripting language like java script

Wireless telephony application (WTA, WTAI):


It is telephony service and programing interface
Content formats:
It is a well-defined data formats at which includes images phone book
record and calendar information

Wireless session protocol:


A consistent interface for two sessions is provides by the wireless session
protocol WSP two applications layer if the WAP.
The two service operated above the transaction layer protocol WAP and
other one operated above the secure and non-secure datagram
For browsing application, the wireless session protocols provide services
suited for browsing application following functions provided by WSP
. HTTP/2.1 punctuality and semantics in a compact over the air encoding
. log time session state
. session suspend and resume session migration
A common functionality for reliable and under reliable data push.
. protocol feature negotiation

Wireless transection protocol:


The wireless transection protocol is a protocol which runs on tap of a data
gram service
It is suitable for implementing in this client
For example: mobile
Station due to this light weight transection oriented protocol. WTP can
operated on secure or non-secure wireless data gram network efficiently.
It provides the following features
. transection service three classes
. unreliable one-way request
. reliable one-way request
. reliable two-way request reply transection
. uncomplied user to user dependability for each received messages WTP
user triggers to confirmation
. if data goes out of band acknowledgement is optional .

. to reduce the number of messages sent PDU conception and delayed


acknowledgement. a synchronize transections.

Wireless transport layer security (WTLS):


Based upon the industry standard transport layer security protocol (TLS)
formally secure sockets layer we have a security protocol for optimization
Over narrow band
WTLS is used

communication channels for the use of WAP transport

The following features provided by WTLS


DATA INTIGRITY:
For data send between the terminal and on application WTLS insecure the
data is changes and not corrupted
. Privacy:
The data transmitted between the terminal and an application WTLS insures
the data is changes and not corrupted
AUTTENTICATION:
The authentication is also insured by WTLS between the terminal and
application server
DENIAL OF SERVICE PROTECTION:
WTLS detects and rejects data is re send or unverified data. WTLS very well
protects the upper protocol layers when many typical denial of service
attacks for secure communication between terminals WTLS can be used for
EXAMPLE: authentication, electronics business card exchange depending on
the security
Requirements and the characteristics of the networks WTLS feature can be
enable by application

Wireless datagram protocol:


The transport layer protocol is also said to be wireless data gram protocol.
The WTP operators above the data capable of bearer services supported by
various network types.
Acominisist services given to the upper layer operates above the data
capable bearer services supported by the various network type
Acomonisist
services is given to the upper layer protocol also can
communicated transparently in an available barer services

Bearers:
WAP protocol can operate an deferent bearer services light packet data
switch data and short messages the bearer can provide quality of services
and different level of terms of through put error rate and delays disbarring of
services is well handeled by WAP protocol
The WDP specifications list the bearer supported since WDT layer provides a
junction between the bearer service and the rest of WAP stack also give the
techniques used to permit WAP protocols to run over bearer to each bearer
as the new bearer get added the existing list gets changed as the wireless
marked enveloped.

Other services and applications:


to use the feature of WAP stack, the WAP stack
the WAP layered architecture enables other services and applications
through well defined interfaces
the session transection security and transport layers con be accessed
directly by external application
this makes the application and services which are not specified by external
application and services which are specified by WAP stack.
Applications like electronics mail calendar phone book etc.

Vous aimerez peut-être aussi