Page 18 - DCAP512_WAP_AND_WML
P. 18

WAP & WML




                    Notes             The WAP proxy typically is comprised of the following functionality: protocol gateway,
                                       content encoders and decoders.

                                      Wireless Application Environment is a general-purpose application environment based
                                       on a mixture of the World Wide Web (WWW) and Mobile Telephony technologies.
                                      WAE includes  a micro-browser  environment  containing  the  following  functionality:
                                       wireless markup language, WML script and content formats.
                                      WAP Datagram Protocol (WDP) is the transport layer that sends and receives messages
                                       via any available bearer network, Wireless Transport Layer Security (WTLS), an optional
                                       security layer, has  encryption facilities  that provide  the secure transport service,  WAP
                                       Transaction Protocol (WTP) layer provides transaction support, adding reliability to the
                                       datagram  service provided  by  WDP, WAP Session  Protocol (WSP) layer provides  a
                                       lightweight session layer to allow efficient exchange of data between applications.

                                      The WAP Gateway translates WSP requests from the mobile device and sends them to a
                                       Web Server. The data returned from the Web Server is translated by the WAP gateway
                                       into WSP format before sending it forward to the mobile device.
                                      The layered architecture of the WAP is very similar to the Internet Protocol Stack.
                                      The WAP protocols are modeled to operate over a variety of bearer services, including
                                       short message, circuit-switching data and packet data.
                                      The WAP layered architecture enables other services and applications to utilize the features
                                       of the stack through a set of well-defined interfaces. External applications may access the
                                       session, transaction, and security and transport layers directly.
                                      Initially, services are expected to run over the well-established SMS bearer. GPRS is seen
                                       by many as the perfect partner for WAP, with its distinct time slots serving to manage data
                                       packets in a way that prevents users from being penalized for holding standard circuit-
                                       switched connections.

                                   1.4 Keywords

                                   Authentication: The authenticity of the terminal and application is ensured server.
                                   Content Formats: It is set of well-defined data formats, including images, phone book records
                                   and calendar information. The application environment is modeled for use with mobile devices
                                   that have limited input keys.

                                   Content Providers: An organization  or  individual that  creates  information, educational  or
                                   entertainment content for the Internet, CD-ROMs or other software-based products. A content
                                   provider may or may not provide the software used to access the material.

                                   Data Integrity: WTLS ensures that data sent between the terminal and an application server is
                                   unchanged and uncorrupted.
                                   Denial-of-Service: Detecting and rejecting data that is replayed or not successfully verified.

                                   Denial-of-Service Protection: To provide protection ensuring that typical denial of service attacks
                                   are harder to accomplish and protects the upper protocol layers.
                                   Operators: It is an organization which provides carrier services in the wired or wireless arena.
                                   One example is ISPs.
                                   Pervasive Computing: It is aimed at providing people easy access to information and to help us
                                   control information quickly, efficiently and effortlessly making lives easier for us.




          12                                LOVELY PROFESSIONAL UNIVERSITY
   13   14   15   16   17   18   19   20   21   22   23