180 likes | 386 Views
WAP Architecture. Presented by, Nithya Inbamani. WAP Background. Wireless Application Protocol – secure specification. Convergence of wireless data market and internet Internet – computers with higher bandwidth. Limitations of the hand held devices - Less Powerful CPUs Less memory
E N D
WAP Architecture Presented by, Nithya Inbamani
WAP Background • Wireless Application Protocol – secure specification. • Convergence of wireless data market and internet • Internet – computers with higher bandwidth. • Limitations of the hand held devices - • Less Powerful CPUs • Less memory • Smaller Displays • Restricted Power Consumption • Different Input Devices (Phone keypad)
WAP Background -contd • Constrained Communication environment of wireless data networks- • Less Bandwidth • More Latency • Less Connection Stability • Less Predictable Availability • WAP Architecture provides solutions to n/w operators that are – • Interoperable • Scalable • Reliable • Efficient • Secure
WAP Network - Example • WAP Proxy translates WAP request to WWW requests, encodes responses from the web server. • HTML Filter converts WWW content into WAP content. • WTA is a gateway server
Application Layer - Wireless Application Environment (WAE) • General Purpose Application Environment – based on combination of WWW and Mobile Telephony Technologies. • Wireless Markup Language (WML), WMLScript.
Session Layer - Wireless Session Protocol (WSP) • Opens a session of communication between client and server. • Establishes protocol and negotiations • Exchanges encoded data • Exchanges requests and replies • Supports asynchronous transmission of data.
Transaction Layer - Wireless Transaction Protocol (WTP) • Deals with transaction and retransmission of data, separation and concatenation of data. • Has a separate interface to manage WTP layer and settings of handheld device.
Security Layer - Wireless Transport Layer Security (WTLS) • Security Protocol • Used for secure communication between terminals • Provides the following • Data Integrity • Privacy • Authentication • Denial-of-service protection
Transport Layer - Wireless Datagram Protocol (WDP) • Transport Layer Protocol. • Offers consistent service and common interface to upper layers of protocols. • Enhances communication between Bearer Services and upper level protocols.
Bearers • Products that implement WAP in their network and technology. • Eg : CDPD, Mobitex, GSM
Conclusion • The need for wireless technology has grown tremendously in the last 2 years. • In future – may be we can program our grocery list in portable devices. • May be a palm pilot could be programmed to submit assignments and exams.
References • http://taz.lasile.info/TAZ/Reseaux/WAP/Specif_Couches_WAP/SPEC-WAPArch-19980430.pdf • http://www.cs.purdue.edu/homes/fahmy/reports/leynawap.htm