SlideShare a Scribd company logo
1 of 35
WAP
1. Introduction
1.1 What is WAP?
• WAP stands for Wireless Application Protocol
• WAP is an application communication protocol
• WAP is used to access services and information
• WAP is inherited from Internet standards
• WAP is for handheld devices such as mobile phones
• WAP is a protocol designed for micro browsers
• WAP enables the creating of web applications for mobile
devices.
• WAP uses the mark-up language WML (not HTML)
• WML is defined as an XML 1.0 application
1.2. The Wireless Application Protocol
• The WAP is the leading standard for information
services on wireless terminals like digital mobile
phones.
• The WAP standard is based on Internet standards
(HTML, XML and TCP/IP).
1.3. History of WAP
• WAP is published by the WAP Forum, founded in 1997
by Ericsson, Motorola, Nokia, and Unwired Planet.
• Forum members now represent over 90% of the global
handset market, as well as leading infrastructure
providers, software developers and other
organizations.
2.1 Web-Model

Client

2. WAP Model

req.
resp.

Server
2.1 Internet Model
• The Internet model makes it possible for a
client to reach services on a large number of
origin servers.
• Each services is addressed by a unique
Uniform Resource Locator (URL).
• The content stored on the servers is of various
formats, but HTML is the predominant. HTML
provides the content developer with a means to
describe the appearance of a service in a flat
document structure. If more advanced features like
procedural logic are needed, then scripting languages
such as JavaScript or VB Script may be utilised.
2.1WEB Model
• The figure above shows how a WWW client request a resource
stored on a web server. On the Internet, standard communication
protocols, like HTTP and Transmission Control Protocol/Internet
Protocol (TCP/IP) are used.
• The content available at the web server may be static or dynamic.
Static content is produced once and not changed or updated very
often, for example a company presentation.
• Dynamic content is needed when the information
provided by the service changes more often, for
example timetables, news, stock quotes and account
information. Technologies such as Active Server Pages
(ASP), Common Gateway Interface (CGI), and Servlets
allow content to be generated dynamically.
2.2 WAP Model
• The

figure

below

shows

the

WAP

programming model. Note the similarities
with the Internet model. Without the WAP
Gateway/Proxy the two models would have
been practically identical.
WAP I model: Translator WAP WEB

Client
WAE
User
Agent

encoded req.
encoded resp.

WAP I

Gateway
Encode
&
Decode

req.
resp.

WEB

Server
cgi
scripts
etc.
• WAP Gateway/Proxy is the entity that connects
the wireless domain with the Internet. We
should make a note that the request that is sent
from

the

wireless

client

to

the

WAP

Gateway/Proxy uses the Wireless Session
Protocol (WSP). In its essence, WSP is a binary
version of HTTP.
• A markup language - the Wireless Markup
Language (WML) has been adapted to develop
optimized WAP applications. In order to save
valuable bandwidth in the wireless network,
WML can be encoded into a compact binary
format. Encoding WML is one of the tasks
performed by the WAP Gateway/Proxy.
2.3 How WAP Model Works?
When it comes to actual use, WAP works like this:
• The user selects an option on their mobile
device that has a URL with Wireless Markup
language (WML) content assigned to it.
• The phone sends the URL request via the phone
network to a WAP gateway, using the binary
encoded WAP protocol.
• The gateway translates this WAP request into a conventional
HTTP request for the specified URL, and sends it on to the
Internet.
• The appropriate Web server picks up the HTTP request.
• The server processes the request, just as it would any other
request. If the URL refers to a static WML file, the server delivers
it. If a CGI script is requested, it is processed and the content
returned as usual.
• The Web server adds the HTTP header to the WML content and
returns it to the gateway.
• The WAP gateway compiles the WML into binary form.
• The gateway then sends the WML response back to the phone.
• The phone receives the WML via the WAP protocol.
• The micro-browser processes the WML and displays the content
on the screen.
3. WAP- Architecture
WAP I – protocol stack
WAP

Application (WAE)

WEB

Application

Session (WSP)

HTTP

Transaction (WTP)

TCP

Security (WTLS)

Security (TLS)

Transport (WDP)

IP/UDP

Medium: GSM, CDMA, UMTS ...

Medium: ...
• WAP is designed in a layered fashion so that it can be extensible,
flexible, and scalable. As a result, the WAP protocol stack is divided
into five layers.
Application Layer
• Wireless Application Environment (WAE). This layer is of most
interest to content developers because it contains, among other
things, device specifications and the content development
programming languages, WML and WMLScript.
Session Layer
• Wireless Session Protocol (WSP). Unlike HTTP, WSP
has been designed by the WAP Forum to provide fast
connection suspension and reconnection.
• WSP-The WAP session protocol (WSP) layer provides a
lightweight session layer to allow efficient exchange
of data between applications.
Transaction Layer
• Wireless Transaction Protocol (WTP). The WTP runs on top of a
datagram service such as User Datagram Protocol (UDP) and is
part of the standard suite of TCP/IP protocols used to provide a
simplified protocol suitable for low bandwidth wireless stations.
• WTP -- The WAP transaction protocol (WTP) layer provides
transaction support, adding reliability to the datagram service
provided by WDP.
• WDP -- The WAP datagram protocol (WDP) is
the transport layer that sends and receives
messages via any available bearer network,
including SMS, USSD, CSD, CDPD and GPRS.
Security Layer
Wireless Transport Layer Security (WTLS). WTLS incorporates security
features that are based upon the established Transport Layer Security
(TLS) protocol standard. It includes data integrity checks, privacy, service
denial, and authentication services.
•

WTLS -- Wireless transport layer security (WTLS), an optional security
layer, has encryption facilities that provide the secure transport service
required by many applications, such as e-commerce.
Transport layer
Wireless Datagram Protocol (WDP). The WDP
allows WAP to be bearer-independent by adapting
the transport layer of the underlying bearer. The WDP
presents a consistent data format to the higher layers
of the WAP protocol stack, thereby offering the
advantage of bearer independence to application
developers.
• Each of these layers provides a well-defined interface to
the layer. This means that the internal workings of any
layer are transparent or invisible to the layers. The layered
architecture allows other applications and services to
utilize the features provided by the WAP-stack as well. This
makes it possible to use the WAP-stack for services and
applications that currently are not specified by WAP.
The WAP protocol architecture is shown below alongside a typical Internet Protocol
stack.
What operating systems are compatible
with WAP?
• WAP is a communications protocol and an
application environment. It can be built on
any operating system including PalmOS,
EPOC, Windows CE, FLEXOS, OS/9, JavaOS,
etc. It provides service interoperability even
between different device families.
Will WAP comply with Third Generation
wireless standards?
• Yes, WAP has been designed to be as
independent as possible from the underlying
network technology.
How does Bluetooth relate to WAP?
• Bluetooth is a local area low power radio link between devices.
Many of the usage scenarios for Bluetooth will also involve one of
the devices communicating over the air using WAP.
•

While many Bluetooth members are also WAP members, and it is
expected that many future handheld wireless devices will deploy
both Bluetooth and WAP technology, the two technologies
fundamentally address different problems.
Examples of WAP use
•

Checking train table information

•

Ticket purchase

•

Flight check in

•

Viewing traffic information

•

Checking weather conditions

•

Looking up stock values

•

Looking up phone numbers

•

Looking up addresses

•

Looking up sport results

More Related Content

What's hot

Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
Don Norwood
 

What's hot (20)

Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Wap
WapWap
Wap
 
Wireless Application Protocol ppt
Wireless Application Protocol pptWireless Application Protocol ppt
Wireless Application Protocol ppt
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
 
WLAN
WLANWLAN
WLAN
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
TinyOS
TinyOSTinyOS
TinyOS
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Ch5
Ch5Ch5
Ch5
 

Viewers also liked

Viewers also liked (8)

WAP- Wireless Application Protocol
WAP- Wireless Application ProtocolWAP- Wireless Application Protocol
WAP- Wireless Application Protocol
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Satellite communications
Satellite communicationsSatellite communications
Satellite communications
 
4g technology
4g technology4g technology
4g technology
 

Similar to WAP

FALLSEM2023-24_ITA1008_TH_VL2023240102332_2023-09-21_Reference-Material-I.pptx
FALLSEM2023-24_ITA1008_TH_VL2023240102332_2023-09-21_Reference-Material-I.pptxFALLSEM2023-24_ITA1008_TH_VL2023240102332_2023-09-21_Reference-Material-I.pptx
FALLSEM2023-24_ITA1008_TH_VL2023240102332_2023-09-21_Reference-Material-I.pptx
BARATHSHARMA
 
Mobile computing seminar
Mobile computing seminarMobile computing seminar
Mobile computing seminar
Meenakshi Devi
 

Similar to WAP (20)

wireless mobile
wireless mobilewireless mobile
wireless mobile
 
FALLSEM2023-24_ITA1008_TH_VL2023240102332_2023-09-21_Reference-Material-I.pptx
FALLSEM2023-24_ITA1008_TH_VL2023240102332_2023-09-21_Reference-Material-I.pptxFALLSEM2023-24_ITA1008_TH_VL2023240102332_2023-09-21_Reference-Material-I.pptx
FALLSEM2023-24_ITA1008_TH_VL2023240102332_2023-09-21_Reference-Material-I.pptx
 
Wap model
Wap modelWap model
Wap model
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
Wireless application prorocol
Wireless application prorocolWireless application prorocol
Wireless application prorocol
 
Mcpp113,16,33,41
Mcpp113,16,33,41Mcpp113,16,33,41
Mcpp113,16,33,41
 
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
 
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
 
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
 
Mobile applications
Mobile applicationsMobile applications
Mobile applications
 
Protocols and tools
Protocols and toolsProtocols and tools
Protocols and tools
 
Wap 1
Wap 1Wap 1
Wap 1
 
Introduction to WAP
Introduction to WAPIntroduction to WAP
Introduction to WAP
 
Wirelss LAN
Wirelss LANWirelss LAN
Wirelss LAN
 
Mobile computing seminar
Mobile computing seminarMobile computing seminar
Mobile computing seminar
 
WAP.PDF
WAP.PDFWAP.PDF
WAP.PDF
 
It2402 mobile communication unit5
It2402 mobile communication unit5It2402 mobile communication unit5
It2402 mobile communication unit5
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml script
 
112321 112333 wirless application protocol
112321 112333 wirless application protocol112321 112333 wirless application protocol
112321 112333 wirless application protocol
 
Web technology and commerce unit 5
Web technology and commerce unit 5Web technology and commerce unit 5
Web technology and commerce unit 5
 

More from Ali Habeeb

Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
Ali Habeeb
 
Opinion Mining
Opinion MiningOpinion Mining
Opinion Mining
Ali Habeeb
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Ali Habeeb
 
Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwarding
Ali Habeeb
 
Organizing User Search Histories
Organizing User Search HistoriesOrganizing User Search Histories
Organizing User Search Histories
Ali Habeeb
 
Detecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesDetecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy Anomalies
Ali Habeeb
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
Ali Habeeb
 
A study of Data Quality and Analytics
A study of Data Quality and AnalyticsA study of Data Quality and Analytics
A study of Data Quality and Analytics
Ali Habeeb
 

More from Ali Habeeb (20)

Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Opinion Mining
Opinion MiningOpinion Mining
Opinion Mining
 
USB 3.0
USB 3.0USB 3.0
USB 3.0
 
Blue Eyes
Blue EyesBlue Eyes
Blue Eyes
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Web Security
Web SecurityWeb Security
Web Security
 
Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwarding
 
Organizing User Search Histories
Organizing User Search HistoriesOrganizing User Search Histories
Organizing User Search Histories
 
Detecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesDetecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy Anomalies
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
A study of Data Quality and Analytics
A study of Data Quality and AnalyticsA study of Data Quality and Analytics
A study of Data Quality and Analytics
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
 
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 

Recently uploaded

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

WAP

  • 1. WAP
  • 2. 1. Introduction 1.1 What is WAP? • WAP stands for Wireless Application Protocol • WAP is an application communication protocol • WAP is used to access services and information • WAP is inherited from Internet standards • WAP is for handheld devices such as mobile phones
  • 3. • WAP is a protocol designed for micro browsers • WAP enables the creating of web applications for mobile devices. • WAP uses the mark-up language WML (not HTML) • WML is defined as an XML 1.0 application
  • 4. 1.2. The Wireless Application Protocol • The WAP is the leading standard for information services on wireless terminals like digital mobile phones. • The WAP standard is based on Internet standards (HTML, XML and TCP/IP).
  • 5. 1.3. History of WAP • WAP is published by the WAP Forum, founded in 1997 by Ericsson, Motorola, Nokia, and Unwired Planet. • Forum members now represent over 90% of the global handset market, as well as leading infrastructure providers, software developers and other organizations.
  • 6. 2.1 Web-Model Client 2. WAP Model req. resp. Server
  • 7. 2.1 Internet Model • The Internet model makes it possible for a client to reach services on a large number of origin servers. • Each services is addressed by a unique Uniform Resource Locator (URL).
  • 8. • The content stored on the servers is of various formats, but HTML is the predominant. HTML provides the content developer with a means to describe the appearance of a service in a flat document structure. If more advanced features like procedural logic are needed, then scripting languages such as JavaScript or VB Script may be utilised.
  • 10. • The figure above shows how a WWW client request a resource stored on a web server. On the Internet, standard communication protocols, like HTTP and Transmission Control Protocol/Internet Protocol (TCP/IP) are used. • The content available at the web server may be static or dynamic. Static content is produced once and not changed or updated very often, for example a company presentation.
  • 11. • Dynamic content is needed when the information provided by the service changes more often, for example timetables, news, stock quotes and account information. Technologies such as Active Server Pages (ASP), Common Gateway Interface (CGI), and Servlets allow content to be generated dynamically.
  • 12. 2.2 WAP Model • The figure below shows the WAP programming model. Note the similarities with the Internet model. Without the WAP Gateway/Proxy the two models would have been practically identical.
  • 13. WAP I model: Translator WAP WEB Client WAE User Agent encoded req. encoded resp. WAP I Gateway Encode & Decode req. resp. WEB Server cgi scripts etc.
  • 14.
  • 15. • WAP Gateway/Proxy is the entity that connects the wireless domain with the Internet. We should make a note that the request that is sent from the wireless client to the WAP Gateway/Proxy uses the Wireless Session Protocol (WSP). In its essence, WSP is a binary version of HTTP.
  • 16. • A markup language - the Wireless Markup Language (WML) has been adapted to develop optimized WAP applications. In order to save valuable bandwidth in the wireless network, WML can be encoded into a compact binary format. Encoding WML is one of the tasks performed by the WAP Gateway/Proxy.
  • 17. 2.3 How WAP Model Works? When it comes to actual use, WAP works like this:
  • 18.
  • 19. • The user selects an option on their mobile device that has a URL with Wireless Markup language (WML) content assigned to it. • The phone sends the URL request via the phone network to a WAP gateway, using the binary encoded WAP protocol.
  • 20. • The gateway translates this WAP request into a conventional HTTP request for the specified URL, and sends it on to the Internet. • The appropriate Web server picks up the HTTP request. • The server processes the request, just as it would any other request. If the URL refers to a static WML file, the server delivers it. If a CGI script is requested, it is processed and the content returned as usual.
  • 21. • The Web server adds the HTTP header to the WML content and returns it to the gateway. • The WAP gateway compiles the WML into binary form. • The gateway then sends the WML response back to the phone. • The phone receives the WML via the WAP protocol. • The micro-browser processes the WML and displays the content on the screen.
  • 23. WAP I – protocol stack WAP Application (WAE) WEB Application Session (WSP) HTTP Transaction (WTP) TCP Security (WTLS) Security (TLS) Transport (WDP) IP/UDP Medium: GSM, CDMA, UMTS ... Medium: ...
  • 24. • WAP is designed in a layered fashion so that it can be extensible, flexible, and scalable. As a result, the WAP protocol stack is divided into five layers. Application Layer • Wireless Application Environment (WAE). This layer is of most interest to content developers because it contains, among other things, device specifications and the content development programming languages, WML and WMLScript.
  • 25. Session Layer • Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed by the WAP Forum to provide fast connection suspension and reconnection. • WSP-The WAP session protocol (WSP) layer provides a lightweight session layer to allow efficient exchange of data between applications.
  • 26. Transaction Layer • Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram service such as User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to provide a simplified protocol suitable for low bandwidth wireless stations. • WTP -- The WAP transaction protocol (WTP) layer provides transaction support, adding reliability to the datagram service provided by WDP.
  • 27. • WDP -- The WAP datagram protocol (WDP) is the transport layer that sends and receives messages via any available bearer network, including SMS, USSD, CSD, CDPD and GPRS.
  • 28. Security Layer Wireless Transport Layer Security (WTLS). WTLS incorporates security features that are based upon the established Transport Layer Security (TLS) protocol standard. It includes data integrity checks, privacy, service denial, and authentication services. • WTLS -- Wireless transport layer security (WTLS), an optional security layer, has encryption facilities that provide the secure transport service required by many applications, such as e-commerce.
  • 29. Transport layer Wireless Datagram Protocol (WDP). The WDP allows WAP to be bearer-independent by adapting the transport layer of the underlying bearer. The WDP presents a consistent data format to the higher layers of the WAP protocol stack, thereby offering the advantage of bearer independence to application developers.
  • 30. • Each of these layers provides a well-defined interface to the layer. This means that the internal workings of any layer are transparent or invisible to the layers. The layered architecture allows other applications and services to utilize the features provided by the WAP-stack as well. This makes it possible to use the WAP-stack for services and applications that currently are not specified by WAP.
  • 31. The WAP protocol architecture is shown below alongside a typical Internet Protocol stack.
  • 32. What operating systems are compatible with WAP? • WAP is a communications protocol and an application environment. It can be built on any operating system including PalmOS, EPOC, Windows CE, FLEXOS, OS/9, JavaOS, etc. It provides service interoperability even between different device families.
  • 33. Will WAP comply with Third Generation wireless standards? • Yes, WAP has been designed to be as independent as possible from the underlying network technology.
  • 34. How does Bluetooth relate to WAP? • Bluetooth is a local area low power radio link between devices. Many of the usage scenarios for Bluetooth will also involve one of the devices communicating over the air using WAP. • While many Bluetooth members are also WAP members, and it is expected that many future handheld wireless devices will deploy both Bluetooth and WAP technology, the two technologies fundamentally address different problems.
  • 35. Examples of WAP use • Checking train table information • Ticket purchase • Flight check in • Viewing traffic information • Checking weather conditions • Looking up stock values • Looking up phone numbers • Looking up addresses • Looking up sport results