lecture 12 - wireless application protocol
TRANSCRIPT
-
8/3/2019 Lecture 12 - Wireless Application Protocol
1/28
Wireless ApplicationProtocol Architecture
Mobile Computer Technology
Joo Paulo PONCIANO
Faculty of Science and EngineeringFaculty of Science and Engineering
Department of Engineering and TechnologyDepartment of Engineering and Technology
-
8/3/2019 Lecture 12 - Wireless Application Protocol
2/28
-
8/3/2019 Lecture 12 - Wireless Application Protocol
3/28
Unit Outline
WAP Motivation
WAP Requirements Architecture and Overview
Components of the WAP Architecture
Compliance and Interoperability
-
8/3/2019 Lecture 12 - Wireless Application Protocol
4/28
BackgroundMotivation
WAP is positioned at the convergence of two rapidlyevolving network technologies, wireless data and theInternet.
Most of the technology developed for the Internet hasbeen designed for desktop and larger computers, andmedium-to-high bandwidth.
Wireless devices present a more constrainedcomputing environment.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
5/28
BackgroundMotivation - II
Mass-market handhelddevices and theirwireless networks tendto have: Less powerful CPUs
Less memory (ROM andRAM)
Restricted powerconsumption
Smaller displays Different input devices
(e.g., a phone keypad)
Wireless data networkspresent a constrainedcommunication
environment due to
limitations of power, available spectrum,
mobility,
Wireless data networks tend to have:Less bandwidth
More latency
Less connection stability
Less predictable availability
-
8/3/2019 Lecture 12 - Wireless Application Protocol
6/28
BackgroundMotivation - III
Provisioning of value-added services withsolutions to be:
Interoperable
Scaleable
Efficient
Reliable
Secure
The WAP specifications adapt existing networktechnology to the special requirements ofhandheld wireless data devices.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
7/28
BackgroundRequirements
Leverage existing standards where possible
Define a layered, scaleable, and extensible
architecture
Support as many wireless networks as possible
Optimise for narrowband bearers with potentially highlatency and for efficient use of device resources (lowmemory/CPU usage/power consumption)
Provide support for secure applications and
communication.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
8/28
BackgroundRequirements - II
Enable the creation ofMan Machine Interfaces (MMIs)with maximum flexibility and vendor control
Provide access to local handset functionality, such as
logical indication for incoming call
Facilitate network-operator and third-party serviceprovisioning
Support multivendor interoperability by defining theoptional and mandatory components of the specifications
Provide a programming model for telephony services andintegration
-
8/3/2019 Lecture 12 - Wireless Application Protocol
9/28
Architecture and OverviewThe WAP Model
Similar to the WWW programming model.
Optimizations and extensions have been made in order tomatch the characteristics of the wireless environment.
WAP content and applications are specified in a set of well-known content formats based on the familiar WWW contentformats.
Content is transported using a set ofstandardcommunication protocols based on the WWW.
A micro browserin the wireless terminal coordinates theuser interface and is analogous to a standard Web browser.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
10/28
Architecture and OverviewThe WAP Model - II
WAP defines a set of standard components
that enable communication between mobileterminals and network servers, including:
Standard naming model.
Content typing.
Standard content formats.
Standard communication protocols.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
11/28
-
8/3/2019 Lecture 12 - Wireless Application Protocol
12/28
Architecture and OverviewThe WAP Model - IV
This infrastructure ensures that mobile terminal userscan browse a wide variety of WAP content andapplications, and that the application author is able tobuild content services and applications that run on a
large base of mobile terminals.
The WAP proxy allows content and applications to behosted on standard WWW servers and to bedeveloped using proven WWW technologies such as
CGI scripting.
While the nominal use of WAP will include: a Web server,
WAP proxy WAP client,
-
8/3/2019 Lecture 12 - Wireless Application Protocol
13/28
WAP Gateway
WML Encoder
WMLScript
Compiler
Protocol Adapters
Client
WML
WML-
Script
WTAI
Etc.
Web Server
Content
CGI
Scripts
etc.
WMLDecks
withWML-Script
Architecture and OverviewThe WAP Programming Model
WSP/WTP HTTP
Encoders/
Decoders
WAE user
agent Origin Server
Encoded
request
Encodedresponse
RequestResponse
Request
-
8/3/2019 Lecture 12 - Wireless Application Protocol
14/28
HTMLFilter
WebServer
Architecture and OverviewExample WAP Network
WirelessNetwork
WTA
Server
WAPProxy
WML
HTMLWML
BinaryWML
-
8/3/2019 Lecture 12 - Wireless Application Protocol
15/28
Architecture and OverviewThe WAP Security Model
WAP enables a flexible security infrastructure thatfocuses on providing connection security between aWAP client and server.
WAP can provide end-to-end security between WAPprotocol endpoints. If a browser and origin serverdesire end-to-end security, they must communicatedirectly using the WAP protocols.
End-to-end security may also be achieved if the WAPproxy is trusted or, for example, located at the samephysically secure place as the origin server.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
16/28
WAP Protocol ArchitectureWireless Application Environment
WAE is a general-purpose application environmentbased on a combination of WWW and mobiletelephony technologies.
WAE is to establish an interoperable environmentthat will allow operators and service providers to buildapplications and services for wireless platforms.
WAE includes a micro-browser environmentcontaining the following functionality: Wireless Markup Language (WML).
WMLScript.
Wireless Telephony Application (WTA, WTAI). Telephony
services and programming interfaces. Content formats.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
17/28
WAP Protocol ArchitectureWireless Session Protocol
WSP provides the application layer of WAPwith a consistent interface for two session
services. Connection-oriented service that operates above
the transaction layer protocol WTP.
Connectionless service that operates above a
secure or nonsecure datagram service (WDP).
WSP consist of services suited for browsingapplications (WSP/B).
-
8/3/2019 Lecture 12 - Wireless Application Protocol
18/28
WAP Protocol ArchitectureWireless Session Protocol - II
WSP/B provides the following functionality: HTTP/1.1 functionality and semantics in a compact over-the-
air encoding
Long-lived session state
Session suspend and resume with session migration
A common facility forreliable and unreliable data push
Protocol feature negotiation
The protocols in the WSP family are optimized forlow-bandwidth bearer networks with relatively longlatency. WSP/B is designed to allow a WAP proxy toconnect a WSP/B client to a standard HTTP server.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
19/28
WAP Protocol ArchitectureWireless Transaction Protocol
WTP runs on top of a datagram service and providesa lightweight transaction-oriented protocol that issuitable for implementation in thin clients.
WTP operates oversecure or nonsecure wirelessdatagram networks and provides the following: Three classes of transaction service:
Unreliable one-way requests
Reliable one-way requests
Reliable two-way request-reply transactions WTP provides and acknowledged service (user-to-user
reliability)
Optional out-of-band data on acknowledgments
PDU concatenation and delayed acknowledgment to reducethe number of messages sent
Asynchronous transactions
-
8/3/2019 Lecture 12 - Wireless Application Protocol
20/28
WAP Protocol ArchitectureWireless Transport Layer Security
WTLS is a security protocol based upontransport layer security (TLS) protocol. (used
by http)
WTLS is narrowband optimised and intendedfor use with the WAP transport protocols.
WTLS may also be used forauthentication ofelectronic business card exchange.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
21/28
WAP Protocol Architecture
Wireless Application Environment
Wireless Session Protocol
Wireless Transaction Protocol
Wireless Transport Layer Security
Wireless Datagram Protocol
Bearers
GPRS GSM CDMA PHS CDPD PDC-P IDEN FLEX
OtherServices
andApplications
-
8/3/2019 Lecture 12 - Wireless Application Protocol
22/28
WAP Protocol ArchitectureWireless Transport Layer Security II
Applications are able to enable or disable
WTLS features.
WTLS provides the following features:
Data integrity.
Privacy. Authentication.
Denial-of-service protection.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
23/28
WAP Protocol ArchitectureWireless Datagram Protocol
Security, Session, and Application layers are able tofunction independently of the underlying wireless network.This is done by adapting the Transport layer to specificfeatures of the underlying bearer via the WDP
WDP is replaced by UDP when used over an IPnetwork layer.
Provide consistent interface to a fundamental transport
service across all wireless bearer networks.
Provides a connectionless, unreliable datagramservice.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
24/28
WAP Protocol ArchitectureBearer Services
The WAP protocols are designed for Different Typesof Bearer Services:
Short message, (SMS)
Packet Switched Data, Circuit Switched Data.
Responsible for different levels of:
Quality of service
Throughput
Delay
Error Rate
The list of supported bearers will change over time,with new bearers being added as the wireless market
evolves.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
25/28
WAP Protocol Architecture
Other Services and Applications
The WAP layered architecture enables other servicesand applications to utilize the features of the WAPstack through a set of well-defined interfaces.
External applications may access the Session,Transaction, Security, and Transport layers directly.
For example, applications (e.g., electronic mail,calendar, phone book, notepad, and electroniccommerce) or services (e.g., white and yellow pages)may be developed to use the WAP protocols.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
26/28
WAP Protocol Architecture
Sample WAP Configurations
-
8/3/2019 Lecture 12 - Wireless Application Protocol
27/28
Compliance and
Interoperability
To this end the WAP Forum has created a WAP
Conformance Specification [WAPConf] and is working
to maintain current information relating to all issues of
WAP interoperability.
Interoperability achieved by testing:
Static testing is a manufacturers statement of the capabilities
and functions of a product.
Dynamic testing is the real form of testing that leads to a highdegree of confidence that two products will successfully
interoperate.
-
8/3/2019 Lecture 12 - Wireless Application Protocol
28/28
Recommended Reading
Inside WAP: Programming Applicationswith WML and WMLScript
Esko Hannula
Adison Wesley - ISBN: 0-201-72591-6
Chapter 1.1
Chapter 1.2