Page 185 - DCAP512_WAP_AND_WML
P. 185

Unit 12: Secure Application




             offers a Circuit Breaker feature which enables subscribers to set a maximum amount they  Notes
             want to spend in a month for the service.
             With WPA 2 and 802.1X provisions it offers the high level of security available on wireless
             network. Mr Prakash Bajpai, Founder, Managing  Director  and  CEO, Tikona  Digital
             Networks, said, “The current broadband internet scenario is similar to what the mobile
             scenario was 10 years ago. India has just a little under 10 million broadband while China
             has more than 120 million broadband. Wireless broadband is the only option for India to
             increase its broadband base to levels that are similar to China’s.”

          12.4 Summary

              This intro to wireless networking setup and security is written with the assumption that
               the reader has a basic understanding of wired networks, because in terms of protocol,
               wireless works almost the same way.

              The difference is in the wireless component and associated hardware configuration.
              The WAP specification standardizes a set of protocols intended to send content to mobile
               devices like cellular phones, pagers and personal digital assistants (PDAs).

              It defines application environment and transport protocols. It  utilizes present Internet
               technologies and many of its components.
              The WAP application is developed taking into account the limitations of the handheld
               devices.
              WAP has no support for application sessions built in to its definition.
              You will have to manually create them by authenticating the user and tracking his progress.

              The next few sections will address how to do this, but it should be remembered that the
               WML applications should be as simple  as possible  to use – you should minimize  the
               information burden you place on the user.
          12.5 Keywords


          PDAs: personal digital assistants
          SSL: Secure Sockets Layer
          TLS: Transport Layer Security
          WAE: Wireless Application Environment

          WDL: Wireless Datagram Layer
          WDP: WAP Datagram Protocol
          WTLS: Wireless Transport Layer Security

          12.6 Review Questions


          1.   How does communication between the mobile terminals and network servers take place?
          2.   What is WML? How does it differ from HTML?
          3.   What are the functionalities of the WAP proxy? What does the WAP gateway do?






                                           LOVELY PROFESSIONAL UNIVERSITY                                   179
   180   181   182   183   184   185   186   187   188   189   190