lecture 12 - wireless application protocol

Upload: jpbp

Post on 06-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    1/28

    Wireless ApplicationProtocol Architecture

    Mobile Computer Technology

    Joo Paulo PONCIANO

    Faculty of Science and EngineeringFaculty of Science and Engineering

    Department of Engineering and TechnologyDepartment of Engineering and Technology

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    2/28

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    3/28

    Unit Outline

    WAP Motivation

    WAP Requirements Architecture and Overview

    Components of the WAP Architecture

    Compliance and Interoperability

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    4/28

    BackgroundMotivation

    WAP is positioned at the convergence of two rapidlyevolving network technologies, wireless data and theInternet.

    Most of the technology developed for the Internet hasbeen designed for desktop and larger computers, andmedium-to-high bandwidth.

    Wireless devices present a more constrainedcomputing environment.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    5/28

    BackgroundMotivation - II

    Mass-market handhelddevices and theirwireless networks tendto have: Less powerful CPUs

    Less memory (ROM andRAM)

    Restricted powerconsumption

    Smaller displays Different input devices

    (e.g., a phone keypad)

    Wireless data networkspresent a constrainedcommunication

    environment due to

    limitations of power, available spectrum,

    mobility,

    Wireless data networks tend to have:Less bandwidth

    More latency

    Less connection stability

    Less predictable availability

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    6/28

    BackgroundMotivation - III

    Provisioning of value-added services withsolutions to be:

    Interoperable

    Scaleable

    Efficient

    Reliable

    Secure

    The WAP specifications adapt existing networktechnology to the special requirements ofhandheld wireless data devices.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    7/28

    BackgroundRequirements

    Leverage existing standards where possible

    Define a layered, scaleable, and extensible

    architecture

    Support as many wireless networks as possible

    Optimise for narrowband bearers with potentially highlatency and for efficient use of device resources (lowmemory/CPU usage/power consumption)

    Provide support for secure applications and

    communication.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    8/28

    BackgroundRequirements - II

    Enable the creation ofMan Machine Interfaces (MMIs)with maximum flexibility and vendor control

    Provide access to local handset functionality, such as

    logical indication for incoming call

    Facilitate network-operator and third-party serviceprovisioning

    Support multivendor interoperability by defining theoptional and mandatory components of the specifications

    Provide a programming model for telephony services andintegration

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    9/28

    Architecture and OverviewThe WAP Model

    Similar to the WWW programming model.

    Optimizations and extensions have been made in order tomatch the characteristics of the wireless environment.

    WAP content and applications are specified in a set of well-known content formats based on the familiar WWW contentformats.

    Content is transported using a set ofstandardcommunication protocols based on the WWW.

    A micro browserin the wireless terminal coordinates theuser interface and is analogous to a standard Web browser.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    10/28

    Architecture and OverviewThe WAP Model - II

    WAP defines a set of standard components

    that enable communication between mobileterminals and network servers, including:

    Standard naming model.

    Content typing.

    Standard content formats.

    Standard communication protocols.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    11/28

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    12/28

    Architecture and OverviewThe WAP Model - IV

    This infrastructure ensures that mobile terminal userscan browse a wide variety of WAP content andapplications, and that the application author is able tobuild content services and applications that run on a

    large base of mobile terminals.

    The WAP proxy allows content and applications to behosted on standard WWW servers and to bedeveloped using proven WWW technologies such as

    CGI scripting.

    While the nominal use of WAP will include: a Web server,

    WAP proxy WAP client,

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    13/28

    WAP Gateway

    WML Encoder

    WMLScript

    Compiler

    Protocol Adapters

    Client

    WML

    WML-

    Script

    WTAI

    Etc.

    Web Server

    Content

    CGI

    Scripts

    etc.

    WMLDecks

    withWML-Script

    Architecture and OverviewThe WAP Programming Model

    WSP/WTP HTTP

    Encoders/

    Decoders

    WAE user

    agent Origin Server

    Encoded

    request

    Encodedresponse

    RequestResponse

    Request

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    14/28

    HTMLFilter

    WebServer

    Architecture and OverviewExample WAP Network

    WirelessNetwork

    WTA

    Server

    WAPProxy

    WML

    HTMLWML

    BinaryWML

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    15/28

    Architecture and OverviewThe WAP Security Model

    WAP enables a flexible security infrastructure thatfocuses on providing connection security between aWAP client and server.

    WAP can provide end-to-end security between WAPprotocol endpoints. If a browser and origin serverdesire end-to-end security, they must communicatedirectly using the WAP protocols.

    End-to-end security may also be achieved if the WAPproxy is trusted or, for example, located at the samephysically secure place as the origin server.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    16/28

    WAP Protocol ArchitectureWireless Application Environment

    WAE is a general-purpose application environmentbased on a combination of WWW and mobiletelephony technologies.

    WAE is to establish an interoperable environmentthat will allow operators and service providers to buildapplications and services for wireless platforms.

    WAE includes a micro-browser environmentcontaining the following functionality: Wireless Markup Language (WML).

    WMLScript.

    Wireless Telephony Application (WTA, WTAI). Telephony

    services and programming interfaces. Content formats.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    17/28

    WAP Protocol ArchitectureWireless Session Protocol

    WSP provides the application layer of WAPwith a consistent interface for two session

    services. Connection-oriented service that operates above

    the transaction layer protocol WTP.

    Connectionless service that operates above a

    secure or nonsecure datagram service (WDP).

    WSP consist of services suited for browsingapplications (WSP/B).

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    18/28

    WAP Protocol ArchitectureWireless Session Protocol - II

    WSP/B provides the following functionality: HTTP/1.1 functionality and semantics in a compact over-the-

    air encoding

    Long-lived session state

    Session suspend and resume with session migration

    A common facility forreliable and unreliable data push

    Protocol feature negotiation

    The protocols in the WSP family are optimized forlow-bandwidth bearer networks with relatively longlatency. WSP/B is designed to allow a WAP proxy toconnect a WSP/B client to a standard HTTP server.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    19/28

    WAP Protocol ArchitectureWireless Transaction Protocol

    WTP runs on top of a datagram service and providesa lightweight transaction-oriented protocol that issuitable for implementation in thin clients.

    WTP operates oversecure or nonsecure wirelessdatagram networks and provides the following: Three classes of transaction service:

    Unreliable one-way requests

    Reliable one-way requests

    Reliable two-way request-reply transactions WTP provides and acknowledged service (user-to-user

    reliability)

    Optional out-of-band data on acknowledgments

    PDU concatenation and delayed acknowledgment to reducethe number of messages sent

    Asynchronous transactions

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    20/28

    WAP Protocol ArchitectureWireless Transport Layer Security

    WTLS is a security protocol based upontransport layer security (TLS) protocol. (used

    by http)

    WTLS is narrowband optimised and intendedfor use with the WAP transport protocols.

    WTLS may also be used forauthentication ofelectronic business card exchange.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    21/28

    WAP Protocol Architecture

    Wireless Application Environment

    Wireless Session Protocol

    Wireless Transaction Protocol

    Wireless Transport Layer Security

    Wireless Datagram Protocol

    Bearers

    GPRS GSM CDMA PHS CDPD PDC-P IDEN FLEX

    OtherServices

    andApplications

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    22/28

    WAP Protocol ArchitectureWireless Transport Layer Security II

    Applications are able to enable or disable

    WTLS features.

    WTLS provides the following features:

    Data integrity.

    Privacy. Authentication.

    Denial-of-service protection.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    23/28

    WAP Protocol ArchitectureWireless Datagram Protocol

    Security, Session, and Application layers are able tofunction independently of the underlying wireless network.This is done by adapting the Transport layer to specificfeatures of the underlying bearer via the WDP

    WDP is replaced by UDP when used over an IPnetwork layer.

    Provide consistent interface to a fundamental transport

    service across all wireless bearer networks.

    Provides a connectionless, unreliable datagramservice.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    24/28

    WAP Protocol ArchitectureBearer Services

    The WAP protocols are designed for Different Typesof Bearer Services:

    Short message, (SMS)

    Packet Switched Data, Circuit Switched Data.

    Responsible for different levels of:

    Quality of service

    Throughput

    Delay

    Error Rate

    The list of supported bearers will change over time,with new bearers being added as the wireless market

    evolves.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    25/28

    WAP Protocol Architecture

    Other Services and Applications

    The WAP layered architecture enables other servicesand applications to utilize the features of the WAPstack through a set of well-defined interfaces.

    External applications may access the Session,Transaction, Security, and Transport layers directly.

    For example, applications (e.g., electronic mail,calendar, phone book, notepad, and electroniccommerce) or services (e.g., white and yellow pages)may be developed to use the WAP protocols.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    26/28

    WAP Protocol Architecture

    Sample WAP Configurations

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    27/28

    Compliance and

    Interoperability

    To this end the WAP Forum has created a WAP

    Conformance Specification [WAPConf] and is working

    to maintain current information relating to all issues of

    WAP interoperability.

    Interoperability achieved by testing:

    Static testing is a manufacturers statement of the capabilities

    and functions of a product.

    Dynamic testing is the real form of testing that leads to a highdegree of confidence that two products will successfully

    interoperate.

  • 8/3/2019 Lecture 12 - Wireless Application Protocol

    28/28

    Recommended Reading

    Inside WAP: Programming Applicationswith WML and WMLScript

    Esko Hannula

    Adison Wesley - ISBN: 0-201-72591-6

    Chapter 1.1

    Chapter 1.2