1. The document discusses the features of mobile and wireless devices, including less powerful CPUs, less memory, smaller displays, and different input devices compared to desktop computers. It also discusses the constrained communication environment of wireless networks, including less bandwidth, more latency, less connection stability, and less predictable availability compared to wired networks.
2. It describes the Wireless Application Environment (WAE) micro-browser environment, which includes the Wireless Markup Language (WML), WMLScript scripting language, Wireless Telephony Application (WTA) for telephony services, and content formats like images and phone book records.
3. The main elements of the WAE model are WAE user agents that interpret network content
The document discusses the application layer of WAP including the WAP model, mobile location based services, WAP gateway, WAP protocols, WAP user agent profile, caching model, wireless bearers of WAP, WML, WML scripts, WTA, iMode, and SyncML. It provides definitions and details on the WAP architecture, protocols, and technologies to enable wireless internet access from mobile devices. The document also covers mobile location based services and applications, challenges, and examples of location based services that utilize a user's real-time geographical position.
WAP (Wireless Application Protocol) is a standard for accessing information on mobile devices like phones. It uses WML (Wireless Markup Language) instead of HTML. WAP has a layered architecture including application, session, security, transaction, and transport layers. It allows access to the internet from mobile devices in a standardized way and is supported by most phone manufacturers and wireless networks.
WAP (Wireless Application Protocol) is a protocol that allows users to access information and services on the internet using handheld wireless devices like mobile phones. It uses a layered architecture and protocols like WSP, WTP, and WTLS to enable wireless internet access via technologies like GSM, CDMA, and UMTS networks. WAP was designed to work with microbrowsers and uses the markup language WML instead of HTML to optimize content for small screens and low bandwidth connections.
Here are some key points about location aided routing in mobile networks:
- Location information can be used to improve routing efficiency in mobile networks. Knowing the approximate location of a mobile device allows routing decisions to be made based on geographical proximity rather than just network addresses.
- Location-aided routing protocols route packets towards the estimated geographical location of the destination rather than just its IP address. This can reduce routing delays and number of hops, especially for highly mobile users.
- Common location aided routing protocols include:
1) Hierarchical state routing (HSR) - Uses location information to organize the network into geographical zones. Packets are routed towards the zone of the destination rather than exact address.
2)
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...Editor IJCATR
Accessing current and accurate information anywhere and at anytime is becoming a growing interest nowadays. Wireless Application Protocol (WAP) is an application protocol that creates an opportunity to access information of any interest from WAP servers using mobile phones. WAP is an enabling technology based on the Internet client server architecture model, for developing client application for handheld devices or other wireless terminal which usually have less powerful CPU’s, less memory, very restricted power consumption, smaller and variant displays, phone keypads etc. This paper analyses the features of WAP in relation to the well established HyperText Transfer Protocol (HTTP) technology, the web socket API innovations introduced in HTML5, the recent improvements in mobile devices processing capacity by connecting to cloud services and how application can be developed on them using modern tools. The features that are more adapted to client development of micro-devices are used for the technology application test.
slide2:The WWW Model
slide3-4:he WWW standards specify several mechanisms necessary to build a general-purpose application environment includes
slide5:The WWW protocols define three classes of servers:
origin
proxy
gateway
slide6-7:The internet model
slide8-9:The WAP model
slide10-11:How WAP model work
slide12-13:WAP defines a set of standard components that enable communication between mobile terminals and network servers, including:
standard naming model
content typing
standard content formats
standard protocols
slide14:Hardware and software requirements
slide15-16:usage
slide17:Disadvantage
WAP (Wireless Application Protocol) is an open international standard that allows users to access the internet from mobile devices like phones and PDAs. It uses a lightweight protocol stack and markup language called WML to optimize internet content for small screens and limited bandwidth on wireless networks. WAP addresses constraints of mobile networks like low bandwidth, high latency, unstable connections, and limited device capabilities. It enables the creation of mobile web applications and access to common internet services from phones.
1. The document describes the structure and protocols of the WAP network, including the WAP gateway, WAP server, and five layers of the WAP protocol stack.
2. It explains how a user request is processed, from the user pressing a button on their phone, to the WAP gateway encoding the response into a format readable by the user's phone.
3. The five layers of the WAP protocol stack are described: WAE, WSP, WTP, WTLS, and WDP, along with their respective functions in establishing communication between the user's phone and web servers.
The document discusses the application layer of WAP including the WAP model, mobile location based services, WAP gateway, WAP protocols, WAP user agent profile, caching model, wireless bearers of WAP, WML, WML scripts, WTA, iMode, and SyncML. It provides definitions and details on the WAP architecture, protocols, and technologies to enable wireless internet access from mobile devices. The document also covers mobile location based services and applications, challenges, and examples of location based services that utilize a user's real-time geographical position.
WAP (Wireless Application Protocol) is a standard for accessing information on mobile devices like phones. It uses WML (Wireless Markup Language) instead of HTML. WAP has a layered architecture including application, session, security, transaction, and transport layers. It allows access to the internet from mobile devices in a standardized way and is supported by most phone manufacturers and wireless networks.
WAP (Wireless Application Protocol) is a protocol that allows users to access information and services on the internet using handheld wireless devices like mobile phones. It uses a layered architecture and protocols like WSP, WTP, and WTLS to enable wireless internet access via technologies like GSM, CDMA, and UMTS networks. WAP was designed to work with microbrowsers and uses the markup language WML instead of HTML to optimize content for small screens and low bandwidth connections.
Here are some key points about location aided routing in mobile networks:
- Location information can be used to improve routing efficiency in mobile networks. Knowing the approximate location of a mobile device allows routing decisions to be made based on geographical proximity rather than just network addresses.
- Location-aided routing protocols route packets towards the estimated geographical location of the destination rather than just its IP address. This can reduce routing delays and number of hops, especially for highly mobile users.
- Common location aided routing protocols include:
1) Hierarchical state routing (HSR) - Uses location information to organize the network into geographical zones. Packets are routed towards the zone of the destination rather than exact address.
2)
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...Editor IJCATR
Accessing current and accurate information anywhere and at anytime is becoming a growing interest nowadays. Wireless Application Protocol (WAP) is an application protocol that creates an opportunity to access information of any interest from WAP servers using mobile phones. WAP is an enabling technology based on the Internet client server architecture model, for developing client application for handheld devices or other wireless terminal which usually have less powerful CPU’s, less memory, very restricted power consumption, smaller and variant displays, phone keypads etc. This paper analyses the features of WAP in relation to the well established HyperText Transfer Protocol (HTTP) technology, the web socket API innovations introduced in HTML5, the recent improvements in mobile devices processing capacity by connecting to cloud services and how application can be developed on them using modern tools. The features that are more adapted to client development of micro-devices are used for the technology application test.
slide2:The WWW Model
slide3-4:he WWW standards specify several mechanisms necessary to build a general-purpose application environment includes
slide5:The WWW protocols define three classes of servers:
origin
proxy
gateway
slide6-7:The internet model
slide8-9:The WAP model
slide10-11:How WAP model work
slide12-13:WAP defines a set of standard components that enable communication between mobile terminals and network servers, including:
standard naming model
content typing
standard content formats
standard protocols
slide14:Hardware and software requirements
slide15-16:usage
slide17:Disadvantage
WAP (Wireless Application Protocol) is an open international standard that allows users to access the internet from mobile devices like phones and PDAs. It uses a lightweight protocol stack and markup language called WML to optimize internet content for small screens and limited bandwidth on wireless networks. WAP addresses constraints of mobile networks like low bandwidth, high latency, unstable connections, and limited device capabilities. It enables the creation of mobile web applications and access to common internet services from phones.
1. The document describes the structure and protocols of the WAP network, including the WAP gateway, WAP server, and five layers of the WAP protocol stack.
2. It explains how a user request is processed, from the user pressing a button on their phone, to the WAP gateway encoding the response into a format readable by the user's phone.
3. The five layers of the WAP protocol stack are described: WAE, WSP, WTP, WTLS, and WDP, along with their respective functions in establishing communication between the user's phone and web servers.
WAP (Wireless Application Protocol) allows users to access the internet from mobile devices like phones. It uses a layered protocol stack including WDP, WTP, WSP, and WTLS to transport data securely and reliably over wireless networks. The WAP architecture includes WAP clients, gateways that encode/decode content, and origin servers hosting applications. WAP browsers interpret WML, a markup language optimized for small screens to provide web-like experiences on mobile. While enabling mobility, WAP also has limitations like slow speeds, small screens, and higher power consumption. [/SUMMARY]
WAP (Wireless Application Protocol) allows for data exchange on mobile networks. It uses existing standards and defines a layered architecture to optimize access to information on devices like phones. The goal of WAP is to provide a web-like experience on small devices. It uses proxies to connect wireless networks to the internet and transports requests from mobile devices to web servers using protocols like WSP and WML, which is optimized for small screens. While higher bandwidth networks may reduce its need, WAP compliance with future standards could expand its usage for online services, productivity, and more.
The document outlines standards and best practices for mobile web development, covering topics like markup languages (XHTML), presentation (CSS), scripting, and standardization bodies. It provides an introduction to mobile web standards and discusses XHTML, CSS, JavaScript, MIME types, and groups that govern standards.
WAP (Wireless Application Protocol) allows users to access the internet and advanced telephony services from mobile phones. It was developed with constraints of mobile devices in mind, such as small displays and limited keypads. The WAP architecture includes WAE (Wireless Application Environment), WML (Wireless Markup Language), WMLScript, WSP (Wireless Session Protocol), WTLS (Wireless Transport Layer Security), WDP (Wireless Datagram Protocol), and WAP gateways. WAP gateways act as intermediaries between mobile clients and web servers, compressing data to reduce bandwidth usage.
The document discusses the Wireless Application Protocol (WAP), which was developed to allow mobile devices like phones to access the internet. WAP defines a set of communication protocols to standardize how internet content can be adapted for narrowband mobile bearers. It enables applications and services to be accessed from any wireless terminal, including cell phones, pagers, two-way radios and smart phones. WAP uses Wireless Markup Language (WML) instead of HTML to optimize content for mobile screens.
WLAN allows devices to connect to the internet and each other wirelessly using radio waves or infrared signals. It provides flexibility, portability, mobility, and ease of installation compared to wired networks. Common applications of WLAN include use in medical, education, temporary situations, airlines, and emergency centers. WLANs operate in either ad hoc mode for direct peer-to-peer connections or infrastructure mode which uses an access point to connect to other networks. Technologies used include infrared, radio waves that comply with FCC regulations, and microwaves. WAP allows access to internet content and services on mobile devices by compressing web pages for smaller screens.
Wireless Application Protocol (WAP) allows users to access the internet and advanced telephony services from mobile phones. It has a layered architecture including the Wireless Application Environment (WAE), Wireless Session Protocol (WSP), Wireless Transaction Protocol (WTP), Wireless Transport Layer Security (WTLS), and Wireless Datagram Protocol (WDP). WAP addresses the constraints of mobile devices by optimizing for small displays, limited keyboards, and providing interoperability across different networks and devices.
This document provides an overview of the Wireless Application Protocol (WAP). It describes WAP as an open standard that allows mobile devices to access internet content and services. The summary includes:
1) WAP defines an architecture and protocol for delivering internet content to mobile phones and other wireless devices in an optimized way.
2) The WAP architecture includes components like WAP clients, WAP gateways, WAP proxies, and WAP servers that work together to deliver internet content to mobile devices.
3) WAP uses protocols like WTP, WSP, WTLS and WDP to optimize delivery of content over wireless networks in an efficient, secure manner for devices with limited capabilities.
WAP Model- Mobile Location based services -WAP Gateway –WAP protocols – WAP
user agent profile- caching model-wireless bearers for WAP - WML – W MLScripts - WTA
- iMode- SyncML.
1) The document proposes an integrated wireless network architecture using proxy servers to support mobility management and reduce web traffic.
2) The architecture uses proxy servers and mobility-aware routers to maintain active data connections for mobile hosts as they handoff between different networks like cellular networks and wireless local area networks.
3) By deploying multiple proxy-router pairs and dynamically assigning mobile hosts to proxies, the approach provides efficient mobility support and is scalable.
Software Based Traffic Separation at the Access LayerIJERA Editor
Access Network is the subscriber part of the telecommunications network or the network connecting the subscribers to the Internet Service Providers (ISP) [1]. In many countries including Tanzania access network is still predominantly made up of the copper cable based or other point to point wireless connections. This has kept the network in large proportions passive, inflexible and relatively unreliable [2]. This traditional network has long been tailored to the services generally provided i.e. voice, leased lines, Internet, corporate data and video conference, sometimes each provided by separate equipment and networks. This paper presents the study on approaches used by ISP in Tanzania to separate traffic in the access network. The paper also presents the effective way of traffic separation, whereby multiple hardware used to separate traffic currently has been replaced with single hardware. The traffic separation technique is based on creating logical links (software based) for each traffic type inside single physical link, providing a differentiated QoS support for each type of traffic according to its individual QoS requirements.
The two most significant features shown in the previous example that have no direct equivalents in HTML are:
1. User input validation using the "format" attribute on <input> elements. This allows restricting input to conform to certain formats.
2. Shared variables between cards in a deck using the "$(variablename)" syntax. This allows passing data between different pages/cards in a WML application.
These features exist in WML because of the constraints of the mobile/wireless environment compared to traditional web pages. User input validation helps ensure only valid data is entered given the limited keyboard/input methods on phones. Shared variables allow data to carry over between pages without requiring server requests, improving performance on slower wireless networks.
1) Mobile agents are autonomous software programs that can migrate between network nodes, transporting their code and state between environments.
2) A mobile agent system consists of agents, places that host agents, and supports for execution, management, security, and communication.
3) The Wireless Application Protocol (WAP) enables access to information and services over mobile wireless networks through a browser. WAP uses Wireless Markup Language (WML) instead of HTML and is designed for microbrowsers on devices like phones.
Web Application Protocol (WAP) is a specification for communication protocols to standardize how wireless devices access the internet for email, web, newsgroups and messaging. A web page consists of objects like HTML files and images addressed by URLs. Hypertext Transfer Protocol (HTTP) is the most widely used protocol, seen as "http://" in browser addresses. HTTP uses GET, HEAD, POST, PUT and DELETE requests. HTTPS combines HTTP with SSL/TLS encryption to securely transmit personal information on ecommerce sites. WAP is suitable for mobile learning by optimizing for handheld devices and handling design challenges.
The document provides an overview of the Wireless Application Protocol (WAP). It describes WAP as an open standard that allows mobile devices to access internet content and services. The summary outlines WAP's architecture, including components like the wireless application environment, wireless session protocol, wireless transaction protocol, and wireless transport layer security. It also discusses WAP's usage, advantages of being an open standard, and some disadvantages like limited screen sizes and speeds of access on mobile devices.
WAP (Wireless Application Protocol) is a set of protocols that allow for data exchange across mobile networks. It aims to make accessing online services from mobile devices simple by extending internet technologies to wireless networks. WAP was initially developed by Ericsson, Motorola, Nokia, and Openwave Systems to provide a common protocol for wireless devices regardless of bearer network or manufacturer. It uses protocols like WSP, WTP, and WTLS to optimize delivery of internet content and applications to mobile phones in a wireless environment with limited resources. The WAP Forum, now called the Open Mobile Alliance, continues to develop and promote open standards and specifications for WAP.
The document discusses the three-tier architecture model for web applications. It describes each of the three tiers - presentation, application, and data - and their roles. The presentation tier (web browser) sends requests to the application tier (dynamic web content like PHP), which then queries and updates the database in the data tier. This separation of concerns into logical layers allows for improved flexibility, maintainability, reusability, scalability, and reliability compared to traditional single-tier applications.
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...Editor IJCATR
Accessing current and accurate information anywhere and at anytime is becoming a growing interest nowadays. Wireless
Application Protocol (WAP) is an application protocol that creates an opportunity to access information of any interest from WAP
servers using mobile phones. WAP is an enabling technology based on the Internet client server architecture model, for developing
client application for handheld devices or other wireless terminal which usually have less powerful CPU’s, less memory, very
restricted power consumption, smaller and variant displays, phone keypads etc. This paper analyses the features of WAP in relation to
the well established HyperText Transfer Protocol (HTTP) technology, the web socket API innovations introduced in HTML5, the
recent improvements in mobile devices processing capacity by connecting to cloud services and how application can be developed on
them using modern tools. The features that are more adapted to client development of micro-devices are used for the technology
application test.
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...Editor IJCATR
This document analyzes WAP, HTTP, and HTML5 technologies for developing mobile applications. It discusses the features of WAP and HTTP, including how WAP addresses constraints of mobile devices and wireless networks through standards like WML. It also describes the HTTP client-server model. Finally, it analyzes HTML5 and how its new features improved the experience of building mobile apps that can connect to cloud services, compared to older technologies like WAP that required separate protocols and gateways for mobile devices.
This document discusses implementing a low-power wireless microserver with Bluetooth technology to allow mobile devices to remotely control electronic devices. Key points:
1) The microserver would be small, low-cost and pluggable, allowing it to be added to existing devices via a standard connector. This is preferable to embedding full servers directly into devices.
2) The microserver would run a simplified embedded WAP server over Bluetooth, allowing control of devices via a mobile phone browser interface.
3) User interfaces could either be pre-programmed or downloaded dynamically to plugged-in microservers from the Internet or device. This allows remote updating of interface content.
The document provides an overview of the Wireless Application Protocol (WAP), which enables access to the internet and advanced services from wireless devices independently of manufacturer, vendor, or technology. WAP defines a set of protocols that bridge the gap between mobile devices and the internet/intranets by allowing access to the same information on small wireless devices as desktop computers. It also defines an application environment for developing advanced services and applications for operators, manufacturers, and content developers.
WAP (Wireless Application Protocol) allows users to access the internet from mobile devices like phones. It uses a layered protocol stack including WDP, WTP, WSP, and WTLS to transport data securely and reliably over wireless networks. The WAP architecture includes WAP clients, gateways that encode/decode content, and origin servers hosting applications. WAP browsers interpret WML, a markup language optimized for small screens to provide web-like experiences on mobile. While enabling mobility, WAP also has limitations like slow speeds, small screens, and higher power consumption. [/SUMMARY]
WAP (Wireless Application Protocol) allows for data exchange on mobile networks. It uses existing standards and defines a layered architecture to optimize access to information on devices like phones. The goal of WAP is to provide a web-like experience on small devices. It uses proxies to connect wireless networks to the internet and transports requests from mobile devices to web servers using protocols like WSP and WML, which is optimized for small screens. While higher bandwidth networks may reduce its need, WAP compliance with future standards could expand its usage for online services, productivity, and more.
The document outlines standards and best practices for mobile web development, covering topics like markup languages (XHTML), presentation (CSS), scripting, and standardization bodies. It provides an introduction to mobile web standards and discusses XHTML, CSS, JavaScript, MIME types, and groups that govern standards.
WAP (Wireless Application Protocol) allows users to access the internet and advanced telephony services from mobile phones. It was developed with constraints of mobile devices in mind, such as small displays and limited keypads. The WAP architecture includes WAE (Wireless Application Environment), WML (Wireless Markup Language), WMLScript, WSP (Wireless Session Protocol), WTLS (Wireless Transport Layer Security), WDP (Wireless Datagram Protocol), and WAP gateways. WAP gateways act as intermediaries between mobile clients and web servers, compressing data to reduce bandwidth usage.
The document discusses the Wireless Application Protocol (WAP), which was developed to allow mobile devices like phones to access the internet. WAP defines a set of communication protocols to standardize how internet content can be adapted for narrowband mobile bearers. It enables applications and services to be accessed from any wireless terminal, including cell phones, pagers, two-way radios and smart phones. WAP uses Wireless Markup Language (WML) instead of HTML to optimize content for mobile screens.
WLAN allows devices to connect to the internet and each other wirelessly using radio waves or infrared signals. It provides flexibility, portability, mobility, and ease of installation compared to wired networks. Common applications of WLAN include use in medical, education, temporary situations, airlines, and emergency centers. WLANs operate in either ad hoc mode for direct peer-to-peer connections or infrastructure mode which uses an access point to connect to other networks. Technologies used include infrared, radio waves that comply with FCC regulations, and microwaves. WAP allows access to internet content and services on mobile devices by compressing web pages for smaller screens.
Wireless Application Protocol (WAP) allows users to access the internet and advanced telephony services from mobile phones. It has a layered architecture including the Wireless Application Environment (WAE), Wireless Session Protocol (WSP), Wireless Transaction Protocol (WTP), Wireless Transport Layer Security (WTLS), and Wireless Datagram Protocol (WDP). WAP addresses the constraints of mobile devices by optimizing for small displays, limited keyboards, and providing interoperability across different networks and devices.
This document provides an overview of the Wireless Application Protocol (WAP). It describes WAP as an open standard that allows mobile devices to access internet content and services. The summary includes:
1) WAP defines an architecture and protocol for delivering internet content to mobile phones and other wireless devices in an optimized way.
2) The WAP architecture includes components like WAP clients, WAP gateways, WAP proxies, and WAP servers that work together to deliver internet content to mobile devices.
3) WAP uses protocols like WTP, WSP, WTLS and WDP to optimize delivery of content over wireless networks in an efficient, secure manner for devices with limited capabilities.
WAP Model- Mobile Location based services -WAP Gateway –WAP protocols – WAP
user agent profile- caching model-wireless bearers for WAP - WML – W MLScripts - WTA
- iMode- SyncML.
1) The document proposes an integrated wireless network architecture using proxy servers to support mobility management and reduce web traffic.
2) The architecture uses proxy servers and mobility-aware routers to maintain active data connections for mobile hosts as they handoff between different networks like cellular networks and wireless local area networks.
3) By deploying multiple proxy-router pairs and dynamically assigning mobile hosts to proxies, the approach provides efficient mobility support and is scalable.
Software Based Traffic Separation at the Access LayerIJERA Editor
Access Network is the subscriber part of the telecommunications network or the network connecting the subscribers to the Internet Service Providers (ISP) [1]. In many countries including Tanzania access network is still predominantly made up of the copper cable based or other point to point wireless connections. This has kept the network in large proportions passive, inflexible and relatively unreliable [2]. This traditional network has long been tailored to the services generally provided i.e. voice, leased lines, Internet, corporate data and video conference, sometimes each provided by separate equipment and networks. This paper presents the study on approaches used by ISP in Tanzania to separate traffic in the access network. The paper also presents the effective way of traffic separation, whereby multiple hardware used to separate traffic currently has been replaced with single hardware. The traffic separation technique is based on creating logical links (software based) for each traffic type inside single physical link, providing a differentiated QoS support for each type of traffic according to its individual QoS requirements.
The two most significant features shown in the previous example that have no direct equivalents in HTML are:
1. User input validation using the "format" attribute on <input> elements. This allows restricting input to conform to certain formats.
2. Shared variables between cards in a deck using the "$(variablename)" syntax. This allows passing data between different pages/cards in a WML application.
These features exist in WML because of the constraints of the mobile/wireless environment compared to traditional web pages. User input validation helps ensure only valid data is entered given the limited keyboard/input methods on phones. Shared variables allow data to carry over between pages without requiring server requests, improving performance on slower wireless networks.
1) Mobile agents are autonomous software programs that can migrate between network nodes, transporting their code and state between environments.
2) A mobile agent system consists of agents, places that host agents, and supports for execution, management, security, and communication.
3) The Wireless Application Protocol (WAP) enables access to information and services over mobile wireless networks through a browser. WAP uses Wireless Markup Language (WML) instead of HTML and is designed for microbrowsers on devices like phones.
Web Application Protocol (WAP) is a specification for communication protocols to standardize how wireless devices access the internet for email, web, newsgroups and messaging. A web page consists of objects like HTML files and images addressed by URLs. Hypertext Transfer Protocol (HTTP) is the most widely used protocol, seen as "http://" in browser addresses. HTTP uses GET, HEAD, POST, PUT and DELETE requests. HTTPS combines HTTP with SSL/TLS encryption to securely transmit personal information on ecommerce sites. WAP is suitable for mobile learning by optimizing for handheld devices and handling design challenges.
The document provides an overview of the Wireless Application Protocol (WAP). It describes WAP as an open standard that allows mobile devices to access internet content and services. The summary outlines WAP's architecture, including components like the wireless application environment, wireless session protocol, wireless transaction protocol, and wireless transport layer security. It also discusses WAP's usage, advantages of being an open standard, and some disadvantages like limited screen sizes and speeds of access on mobile devices.
WAP (Wireless Application Protocol) is a set of protocols that allow for data exchange across mobile networks. It aims to make accessing online services from mobile devices simple by extending internet technologies to wireless networks. WAP was initially developed by Ericsson, Motorola, Nokia, and Openwave Systems to provide a common protocol for wireless devices regardless of bearer network or manufacturer. It uses protocols like WSP, WTP, and WTLS to optimize delivery of internet content and applications to mobile phones in a wireless environment with limited resources. The WAP Forum, now called the Open Mobile Alliance, continues to develop and promote open standards and specifications for WAP.
The document discusses the three-tier architecture model for web applications. It describes each of the three tiers - presentation, application, and data - and their roles. The presentation tier (web browser) sends requests to the application tier (dynamic web content like PHP), which then queries and updates the database in the data tier. This separation of concerns into logical layers allows for improved flexibility, maintainability, reusability, scalability, and reliability compared to traditional single-tier applications.
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...Editor IJCATR
Accessing current and accurate information anywhere and at anytime is becoming a growing interest nowadays. Wireless
Application Protocol (WAP) is an application protocol that creates an opportunity to access information of any interest from WAP
servers using mobile phones. WAP is an enabling technology based on the Internet client server architecture model, for developing
client application for handheld devices or other wireless terminal which usually have less powerful CPU’s, less memory, very
restricted power consumption, smaller and variant displays, phone keypads etc. This paper analyses the features of WAP in relation to
the well established HyperText Transfer Protocol (HTTP) technology, the web socket API innovations introduced in HTML5, the
recent improvements in mobile devices processing capacity by connecting to cloud services and how application can be developed on
them using modern tools. The features that are more adapted to client development of micro-devices are used for the technology
application test.
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...Editor IJCATR
This document analyzes WAP, HTTP, and HTML5 technologies for developing mobile applications. It discusses the features of WAP and HTTP, including how WAP addresses constraints of mobile devices and wireless networks through standards like WML. It also describes the HTTP client-server model. Finally, it analyzes HTML5 and how its new features improved the experience of building mobile apps that can connect to cloud services, compared to older technologies like WAP that required separate protocols and gateways for mobile devices.
This document discusses implementing a low-power wireless microserver with Bluetooth technology to allow mobile devices to remotely control electronic devices. Key points:
1) The microserver would be small, low-cost and pluggable, allowing it to be added to existing devices via a standard connector. This is preferable to embedding full servers directly into devices.
2) The microserver would run a simplified embedded WAP server over Bluetooth, allowing control of devices via a mobile phone browser interface.
3) User interfaces could either be pre-programmed or downloaded dynamically to plugged-in microservers from the Internet or device. This allows remote updating of interface content.
The document provides an overview of the Wireless Application Protocol (WAP), which enables access to the internet and advanced services from wireless devices independently of manufacturer, vendor, or technology. WAP defines a set of protocols that bridge the gap between mobile devices and the internet/intranets by allowing access to the same information on small wireless devices as desktop computers. It also defines an application environment for developing advanced services and applications for operators, manufacturers, and content developers.
This document discusses implementing a low-power wireless microserver with a small form factor that can be connected to mobile devices using Bluetooth technology. It explores two implementation options - embedding the server directly into a device, or using a pluggable server that can be retrofitted to different devices via a standard connector. It also describes distributing the user interface for the server by either preloading it onto the server, or downloading it from a network when the server is plugged into a device.
WAP (Wireless Application Protocol) allows users to access the internet from mobile devices like phones. It uses a layered protocol stack including WDP, WTP, WSP, and WTLS to transport data securely and reliably over wireless networks. The WAP architecture includes WAP clients, gateways that encode/decode content, and origin servers hosting applications and content. WAP browsers on devices use WML (not HTML) to display simplified web pages optimized for small screens. This allows users mobility and access to services like banking, email, and commerce from any location.
WAP is a protocol that allows mobile devices to access the internet. It defines an open standard for an application layer and transport layer optimized for wireless networks. The WAP architecture includes components like WAE, WSP, WTP, WTLS, and WDP that work together to deliver internet content to mobile devices in an efficient manner. WAP aims to provide a web-like experience on small devices and works across different wireless networks and operating systems.
WAP was created as a standard to enable internet access from mobile phones and other wireless devices with limited capabilities. It defines components like WML, WSP, WTLS, and WDP to translate between internet protocols and wireless networks. WAP provides a lightweight browser and markup language to display web-like content on devices. It works across various wireless networks and operating systems and provided early internet access to mobile users, but had limitations in speed, screen size, and bandwidth that hindered widespread adoption.
This document summarizes a research paper that proposes a middleware architecture to enable efficient access to web services from smartphones. The key issues addressed are loss of connection, limited bandwidth, limited smartphone resources, and security. The proposed solution involves transforming SOAP web services to RESTful services, optimizing responses through JSON to XML conversion, and using cryptographic algorithms for security. A mediation framework sits between web service clients and mobile hosts, allowing access to services over a peer-to-peer network. This improves scalability, reliability, and allows external clients to access mobile web services through the mediation framework.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The document provides an overview of web services, including their key features, architecture, and core technologies. It discusses how web services use standards like XML, SOAP, WSDL, and UDDI to allow software components to communicate over the internet in a manner that is self-contained, self-describing, and platform-independent. WSDL files describe web service operations and messages using an XML format, while SOAP is the messaging protocol used to make remote procedure calls between clients and services.
A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...IJMER
WAP is a standardized technology for cross-platform, distributed computing, very similar to the Internet’s combination of Hypertext Markup Language (HTML) and Hypertext Transfer Protocol (HTTP). WAP could be described as a set of protocols that has inherited its characteristics and functionality from Internet standards and from standards developed for wireless services by some of the world’s leading companies in the business of wireless telecommunications. This application will help patients, the normal doctor and the medical director. The patient can reserve an appointment. The normal doctor can view and print the lists of patient appointment under his responsibility. The medical director can add new departments, add new doctors, and also can change the password to access the database. He can also modify data and working schedules of doctors assigned. He can add new patients and can have privilege access to transfer any patient appointment to another doctor. This Application which has been developed by using WAP was the first of its kind here, where software has been developed.
This document summarizes an embedded web server designed for remote monitoring and control of wireless sensor networks. The web server allows authorized Internet users to monitor sensor data, download collected data, and change the operation mode of the wireless sensor network. It can generate email alerts, securely control sensor nodes, and log data to on-board flash memory. The web server is implemented on a RabbitCore module for its processing power and memory compared to sensor network nodes. It communicates with a sensor network node using a custom protocol to retrieve and send sensor data and commands. The web server operates in snapshot, monitoring, or log modes to provide sensor data to remote users.
Web Server for Remote Monitoring and Controliosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses the Wireless Application Protocol (WAP) which enables access to the Internet from mobile devices. WAP addresses the technical challenges of bandwidth limitations and small screens by using compact binary formats and lightweight protocols. It consists of the Wireless Markup Language (WML), WMLScript, and the Wireless Telephony Application Interface (WTAI). The WAP protocol stack includes layers like WAE, WSP, WTP and WTLS to securely transmit data. WAP enables useful mobile applications and services across various domains like banking, shopping, ticketing and more.
Performance of Web Services on Smart Phone PlatformsIOSR Journals
This document discusses and compares the performance of Web Services on smart phone platforms using SOAP and REST. It begins with an introduction to Web Services and the problems with using SOAP on mobile devices due to its limitations in processing power, bandwidth usage, and flexibility. It then proposes using RESTful Web Services as an alternative as they avoid XML parsing and are based on the lightweight HTTP protocol. The document analyzes the performance of SOAP versus REST Web Services on a mobile device to determine which is more efficient for smart phones.
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxbartholomeocoombs
Chapter 11 Selecting Technologies and Devices for Enterprise Networks This chapter presents technologies for the remote-access and wide-area network (WAN) components of an enterprise network design. The chapter discusses physical and data link layer protocols and enterprise network devices, such as remote-access servers, routers, firewalls, and virtual private network (VPN) concentrators. The chapter begins with a discussion of the following remote-access technologies: Point-to-Point Protocol (PPP) Cable modems Digital subscriber line (DSL) After discussing remote-access technologies, the chapter presents options for selecting WAN and remote-access capacities with the North American Digital Hierarchy, the European E system, or the Synchronous Digital Hierarchy (SDH). The chapter continues with a discussion of the following WAN technologies: Leased lines Synchronous Optical Network (SONET) Frame Relay Asynchronous Transfer Mode (ATM) Metro Ethernet The chapter then covers two topics that will help you complete your WAN design: Selecting routers for an enterprise WAN design Selecting a WAN service provider The chapter concludes with an example of a WAN network design that was developed for a medium-sized company, Klamath Paper Products, Inc. The example indicates what technologies and devices were chosen for this customer based on the customer’s goals. The technologies and devices you select for your particular network design customer will depend on bandwidth and quality of service (QoS) requirements, the network topology, business requirements and constraints, and technical goals (such as scalability, affordability, performance, and availability). An analysis of traffic flow and load, as discussed in Chapter 4, “Characterizing Network Traffic,” can help you accurately select capacities and devices. For some organizations, scalability is a key design goal. The selected WAN solution must have enough headroom for growth. As discussed in this chapter, some WAN technologies are more scalable than others. Another key design goal for many organizations is to minimize the cost of WAN and remote-access circuits. Optimization techniques that reduce costs play an important role in most WAN and remote-access designs. Methods for merging separate voice, video, and data networks into a combined, cost-effective WAN also play an important role. These methods must handle the diverse QoS requirements of different applications. Remote-Access Technologies As organizations have become more mobile and geographically dispersed, remote-access technologies have become an important ingredient of many enterprise network designs. Enterprises use remote-access technologies to provide network access to telecommuters, employees in remote offices, and mobile workers who travel. An analysis of the location of user communities and their applications should form the basis of your remote-access design. It is important to recognize the location and number of full- and part-time t.
A telecommunications network connects terminals, links, and nodes to enable telecommunication between users. It uses addresses to route messages or connections to the correct recipients. A telecommunications network consists of terminals, processors, channels, computers, and control software that work together to transmit and receive data.
UNIT V APPLICATION LAYER
WAP Model- Mobile Location based services -WAP Gateway –WAP protocols – WAP user agent profile- caching model-wireless bearers for WAP - WML – WMLScripts – WTA - iMode- SyncML
This document provides an overview of Java web services. It discusses the key concepts of web services architecture including WSDL, SOAP, and UDDI. WSDL is an XML format for describing web services, SOAP is a messaging protocol for making procedure calls over a network, and UDDI is a registry for web services. The document also provides details on how these technologies interact and the role they play in web services.
The document discusses the Open Grid Services Architecture (OGSA). It provides definitions and explanations of key concepts in OGSA including:
- OGSA defines standard protocols and formats to build large-scale, interoperable grid systems based on services.
- The Open Grid Services Infrastructure (OGSI) provides a specification for implementing grid services as stateful web services.
- Some major goals of OGSA are identifying use cases, core platform components, and defining models and profiles for interoperable solutions.
- Security is a key challenge in grid environments due to the need for integration with existing systems, interoperability across different hosting environments, and managing dynamic trust relationships.
Grid computing is a model of distributed computing that uses geographically and administratively disparate resources to solve large problems. It involves sharing computing power, data, and other resources across organizational boundaries. Key aspects include applying resources from many computers to a single problem, combining resources from multiple administrative domains for tasks requiring large processing power or data, and using middleware to coordinate resources as a virtual system. The document then discusses definitions of grid computing from various organizations and the core functional requirements and characteristics needed for grid applications and users.
The document discusses key concepts in object oriented systems including:
1. Cost-benefit analysis with an example of Krag Central Electric Company computerizing its billing system.
2. Risk analysis as part of risk management in software projects.
3. The structure of modern hierarchical programming teams with a team leader and team manager.
4. The synchronize-and-stabilize team organization model used by Microsoft with daily integration of work.
5. The five core workflows of the Unified Process: requirements, analysis, design, implementation, and testing.
The document discusses several topics related to computers and information technology:
1) It summarizes the goals of the Fifth Generation Computer Systems project in Japan to create a new "fifth generation" computer using parallel processing.
2) It explains what an Arithmetic Logic Unit (ALU) is and its important role in the central processing unit (CPU) of performing arithmetic and logical operations.
3) It distinguishes between application software and system software, with application software designed for specific tasks and system software involved in integrating computer capabilities.
1) A database is a structured collection of records or data that is stored in a computer system and allows for easy storage, retrieval, and maintenance of data. It must store large amounts of information and allow for easy access and input of new data.
2) There are different views available in PowerPoint for presenting information, including Normal view, Slide Sorter view, Notes Page view, and Slide Show view.
3) Media refers broadly to various means of communication, but in computers specifically refers to different types of data storage like hard drives, removable drives, CDs, DVDs, flash drives, and networks that connect workstations.
The document discusses various logic gates and flip flops. It begins by explaining the AND, OR, and NOT gates as the fundamental logic gates. It then discusses the JK flip flop, explaining its operation and how it can be used to create counters. It also briefly discusses the SR flip flop and D flip flop. The document provides truth tables and diagrams to illustrate the working of these logic components.
A parallel-in parallel-out shift register is designed to take in parallel data, shift it internally, and then output the shifted data in parallel. The design uses D flip-flops connected in a loop so that on each clock pulse, the data is shifted one position to the left or right. Mode control inputs determine the direction of shifting and whether the data is loaded in parallel or shifted serially. The design allows cascading multiple shift registers together to process more data bits.
A modulo-n counter is designed using D flip-flops to count from 0 to N-1 and then reset back to 0. The design is refined through steps like structural refinement to separate the counter and controller, interface refinement to
The document discusses the benefits of making the system catalogs in a relational database management system (RDBMS) as relations (tables). This approach stores schema metadata and internal bookkeeping information in relational tables and views, as advocated by the RDBMS. It allows all metadata to be made available through catalog views, which present metadata independently of the underlying implementation and are unaffected by catalog table changes. Catalog views provide the most efficient and standardized way to access core server metadata and help with query optimization.
The document discusses relational algebra operators and their composition. It explains that relational algebra operators return relations, so their outputs can be used as inputs to other operators, allowing operator composition. This ability to compose operators is important because it allows complex queries to be built by combining multiple simple operations.
Bt0067 c programming and data structures2Techglyphs
The document discusses various data structures and file input/output functions in C programming. It defines pointers and their advantages, describes the fread() function syntax, differentiates between linear and nonlinear data structures, discusses stack applications and operations, defines linked lists and their operations, and provides examples for each topic.
Bt0067 c programming and data structures 1Techglyphs
The document discusses various statements in the C programming language. It defines statement types such as selection/conditional statements (if-else, switch), iteration statements (for, while, do-while), jump statements (break, continue, goto, return), and label statements. It provides examples and explanations of each statement type, including nested if/else statements, the for loop variant forms, and when to use while, do-while, switch, and other statements. It also covers macros and functions in C with definitions and examples.
Bt0068 computer organization and architecture Techglyphs
The document discusses several topics related to computer organization and architecture. It begins by providing examples of converting decimal numbers to binary. It then explains one stage of logic circuits using AND, OR, XOR, and complement gates. It describes the Von Neumann architecture, including its five classical components and the concept of the Von Neumann bottleneck. Finally, it discusses the register organization of several microprocessors including the 8085, Z8000, and MC68000, comparing their register sets, address buses, and data buses.
Bt0068 computer organization and architecture 2Techglyphs
1. The document discusses various data types and number representations used in computer systems, including integers, floating point numbers, arrays, strings, and opaque data.
2. Integer representations include signed and unsigned integers stored in 32-bit two's complement format. Floating point numbers use the IEEE 754 standard for single and double precision numbers, representing the sign, exponent, and significand fields.
3. Common number systems like binary, hexadecimal, and octal are described along with their relationships. Gray code is also introduced as a way to represent successive values that differ in only one bit.
This document discusses several topics related to operating systems:
1. It explains multiprogramming and how operating systems can interrupt processes to share resources between multiple concurrent programs or users.
2. It describes three types of schedulers in operating systems - long-term, mid-term, and short-term schedulers - and their functions in admitting, swapping, and allocating CPU time to processes.
3. It discusses the First Come First Served scheduling algorithm and its properties of being simple but potentially resulting in long wait times.
The document discusses several topics related to operating systems:
1. It explains how virtual addresses are mapped to physical addresses using page tables, where a virtual address is split into a virtual page number and offset, and the page table converts the virtual page number to a physical page number.
2. It discusses the optimal page replacement algorithm, which replaces the page that will not be used farthest in the future.
3. It defines a file system as a method for organizing and storing computer files using a storage device divided into sectors organized into files and directories.
The document provides an overview of the ISO OSI model and its 7 layers, describing the functions of each layer. It then discusses several topics related to computer networks, including the ISO/OSI model (layers and functions), ISDN (architecture and usage), LAN protocols (such as Ethernet), framing in the data link layer and its importance, and the IEEE 802.11 wireless networking standard.
This document discusses various topics related to computer networking including routing, addressing schemes, congestion control, remote procedure calls, simple mail transfer protocol, static routing algorithms, IPv4 addressing, and session layer design issues. It provides definitions and explanations of static and dynamic routing, differentiates between IPv4 and IPv6 addressing, describes congestion and congestion control, discusses the importance and workings of remote procedure calls, provides a detailed explanation of SMTP, explains two static routing algorithms (Dijkstra's algorithm and flooding algorithm), discusses IPv4 addressing schemes, describes congestion avoidance in the transport layer, and discusses design issues of the session layer such as dialog control.
The document discusses Java bytecode, how to compile Java programs, operator precedence in Java expressions, arrays in Java, implementing inheritance in Java, and different types of exceptions in Java. It provides examples and explanations of each topic in 3-6 paragraphs per section.
Java defines data as objects with methods that support the objects. It provides features like abstraction, encapsulation, inheritance and polymorphism. Java programs can be executed on any platform that supports a Java Virtual Machine as Java code is compiled to bytecode, which is platform independent. To execute a Java program, the source code must be compiled to bytecode using the javac compiler, which checks for errors. The bytecode can then be executed using the java command.
This document discusses features of MySQL including security, scalability and limits, connectivity, and localization. It provides examples of SQL statements using SELECT, JOINs, subqueries, and transaction statements like SAVEPOINT and ROLLBACK TO SAVEPOINT. Key points covered include the differences between CHAR and VARCHAR data types, index operations in MySQL, and string and full-text search functions.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
2. 2
1. What are the features of mobile and wireless devices?
Mobile and wireless devices are usually handheld devices, and accessing
the WWW presents a more constrained computing environment compared
to desktop computers because of fundamental limitations of power and form
factor. Mass-market handheld wireless devices tend to have,
less powerful CPUs (Central Processor Units)
less memory [both ROM (Read Only Memory) and RAM (Random
Access Memory)] restricted power consumption
smaller displays
different input devices (e.g., a phone keypad, voice input, etc.).
Wireless data networks also present a more constrained communication
environment compared to wired networks. Because of fundamental
limitations of power, available spectrum, and mobility, wireless data
networks tend to have,
less bandwidth than traditional networks
more latency than traditional networks
less connection stability than other network technologies
less predictable availability.
3. 3
2. What is the functionality of the WAE micro-browser environment?
The Wireless Application Environment (WAE) is a
general-purpose application environment based on the combination of
WWW and Mobile Telephony technologies. The WAE allows operators and
service providers to build applications and services that can reach wireless
platforms in an efficient and useful manner. WAE contains a micro browser
environment containing the following functionality:
Wireless Markup Language (WML): a lightweight markup language,
similar to HTML, and optimized for use in handheld mobile devices.
WMLScript: a lightweight scripting language, similar to JavaScript.
Wireless Telephony Application (WTA): telephony services and
programming interfaces.
Content formats: a set of well-defined data formats, including images,
phone book records, and calendar information.
3. What are the main elements of the WAE model? Explain.
The WAE architecture includes networking schemes, content formats,
programming languages, and shared services. Interfaces are not
standardized and are specific to a particular implementation. WAE can work
with a browser and a class of user agents used in the World Wide Web
(WWW)
.The main elements of the WAE model are WAE user agents, content
4. 4
generators, standard content encoding, and WTA. WAE user agents
interpret network content referenced by a URL. Content generators are the
applications or services on origin servers, like CGI scripts, that produce
standard content formats in response to requests from user agents in Mts.
Standard content encoding allows a WAE user agent to navigate Web
content. WTA is a collection of telephony-specific extensions for call and
feature control mechanisms providing advanced Mobile Network Services.
The WAE logical model is shown in Figure 9.2. In the WAE model, the
content is transported using standard protocols in the WWW domain and an
optimized HTTP like protocol in the wireless domain. The content and
services in WAE architecture are hosted on standard Web origin servers
using proven technologies like Common Gateway Interface (CGI). The
5. 5
content is located by using WWW standard URLs. WAE supports Mobile
Network Services such as Call Control and Messaging. WAE architecture
supports low bandwidth and high latency networks and considers CPU
processing constraints in MTs. WAE assumes the existence of gateway
functionality responsible for encoding and decoding data transferred from
and to the mobile client. The purpose of the encoding content delivered to
the client is to minimize the size of data sent to the client Over The Air
(OTA), and to minimize the computational energy required by the client to
process the data. The gateway functionality can be added to origin servers
or placed in dedicated gateways.
WAE is based on the architecture used for WWW proxy servers. The
situation in which a user agent, a browser, must connect through a proxy to
reach an origin server, the server that contains the desired content, is very
similar to the case of a wireless device accessing a server through a
gateway. Most connections between the browser and the gateway use WAP
Session Protocol (WSP), regardless of the protocol of the destination server.
URL refers only to the destination server’s protocol and has no bearing on
what protocols may be used in intervening connections. The gateway
performs protocol conversion by translating requests from WSP into other
protocols, and translating the responses back into WSP. Content conversion
performed by the gateway is analogous to HTML/HTTP proxies available on
the Web. In the HTTP scheme, the browser communicates with the gateway
6. 6
using WSP. The gateway provides protocol conversion functions to connect
to an HTTP origin server.
WAE logical layers include user agents such as browsers, phone books,
message editors, and so on, and services and formats including common
elements and formats accessible to user agents such as Wireless Markup
Language (WML), WMLScript, image formats, vCard (electronic business
card) and vCalendar (electronic calendar and scheduling exchange)
formats, and so on. The WAE client components are shown in Figure WAE allows the integration of
domain-specific user agents with varying
architectures and environments. A WTA user agent is specified as an
extension to the WAE specification for the mobile telephony environments.
The WTA extensions allow for accessing and interacting with mobile
telephone features, like call control, and other applications assumed on the
telephones, such as phone books and calendar applications. The features
and capabilities of a user agent are decided by those who implement them.
7. 7
The main elements of the WAE model are WAE user agents, content
generators, standard content encoding, and WTA. WAE user agents
interpret network content referenced by a URL. Content generators are the
applications or services on origin servers, like CGI scripts, that produce
standard content formats in response to requests from user agents in Mts.
Standard content encoding allows a WAE user agent to navigate Web
content. WTA is a collection of telephony-specific extensions for call and
feature control mechanisms providing advanced Mobile Network Services.
4. What is the role of the repository in the WTA services?
The repository is a persistent storage module within the MT that may be
used to eliminate the need for network access when loading and executing
frequently used WTA services. The repository also addresses the issue of
how a WTA service developer ensures that time-critical WTA events are
handled in a timely manner. The repository addresses the issues of how the
WTA services developer preprogram the device with content, and how the
WTA services developer improves the response time for a WTA service.
The repository can be accessed by a service using one of the following
methods:
A WTA event associated with a channel is detected, and the user agent invokes a URL as specified by
the associated channel;
8. 8
The end user accesses services stored in the repository through an
implementation dependent representation (for instance, a menu
containing the labels of the channels) of the allowed services (channels
explicitly specified as user accessible by the channel definition) in the
repository;
The content of URL retrieved from the repository may be given to the
user agent by providing the URL in content or delivering it by Service
Indication (SI).
The WTA applications, that is, content loaded or otherwise received from
the WTA server, may access the repository.
5. What are the WLAN’s operating speeds?
A WLAN is a Wireless Local Area Network — a network of one or more computers and related
peripherals that is, or can be, wireless. A WLAN may combine both wired and wireless connections.
Wireless networks are not as speedy as some users would like, and there are several factors that are
known to affect WLAN speed.One factor that affects WLAN speed is the wireless standard used by the
network devices. The standard is called 802.11, but there are different versions available: 802.11a,
802.11b, 802.11g, and 802.11n. 802.11n, the most recent standard, operates in the 2.4GHz or 5 GHz
range, has speeds from 108 Mbps (Megabits per second) to 600 Mbps, and is backwards compatible
with 802.11a, b, and g. 802.11g also operates at 2.4 GHz and has a speed of 54 Mbps. 802.11b operate
in the 2.4 GHz band at 11 Mbps, while 802.11a operates in the 5 GHz range with a maximum data rate
of 54 Mbps.
If all the devices are connected to the router are capable of the same 802.11 standard, then the router
should be set for that standard, rather than mixed-mode. This is because allowing earlier standards
slows down the data. If all devices work on 802.11n standard, this will increase WLAN speed.
9. 9
Routers come with one or more built-in antennas, but they are often inexpensive and not as good as
they might be. They may or may not be made to be removed and upgraded. If they are removable,
replacing them with an appropriate antenna for the network can increase WLAN speed.
If a 2.4 GHz network is being used for the WLAN, it is possible to speed it up by avoiding the devices
that typically interfere with 2.4 GHz wireless transmissions. These include 2.4 GHz cordless phones,
Bluetooth® adapters, baby monitors, and microwave devices. Cordless phones that will not interfere
include those operating at 900 MHz, 1.9 GHz, and 5.8 GHz.
6. What is the radio frequency (RF) band in which the LANs operate?
In a wireless LAN (WLAN), the
connection between the client and user exists through the use of a wireless
medium such as Radio Frequency (RF) or Infrared (IR) communications
.This allows the mobile user to stay connected to the network. The wireless
connection is usually accomplished by the user having a handheld terminal
or a laptop computer that has an RF interface card installed inside the
terminal or through the PC Card slot of the laptop. The client connection
from the wired LAN to the user is made through an Access Point (AP) that
can support multiple users simultaneously. The AP can reside at any node
on the wired network and performs as a gateway for wireless users’ data to
be routed onto the wired network.
The network
communications use a part of the radio spectrum that is designated as
license-free. In this band, of 2.4 to 2.5 GHz, the users can operate without a
license when they use equipment that has been approved for use in this
license-free band
10. 10
The 2.4- GHz band has been designated as license-free by the
International Telecommunications Union (ITU) and is available for use,
license-free in most countries in the world. The rules of operation are
different in almost every country but they are simil ar enough so that the
products can be programmed for use in every country without changing the
hardware component.
7. What are the fundamental components of a GSM network? Explain.
The fundamental components of a GSM network are shown in Figure
A user carries a Mobile Station (MS), which can communicate over the air
with a base station, called Base Tranceiver Station (BTS) in GSM. The BTS
contains transmitter and receiver equipment, such as antennas and
amplifiers, as well as a few components for signal and protocol processing.
For example, error protection coding is performed in the BTS, and the link-
level protocol for signaling on the radio path is terminated here. In order to
keep the base stations small, the essential control and protocol intelligence
resides in the Base Station Controller (BSC). It contains, for example,
protocol functions for radio channel allocation, channel setup and
management of handovers. Typically, several BTSs are controlled by one
BSC.
In practice, the BTS and BSC are connected by fixed lines or point-to-point
radio links. BTS and BSC together form the radio access network. The
combined traffic of the users is routed through a switch, called the Mobile
11. 11
Switching Center (MSC). It performs all the switching functions of a
switching node in a fixed telephone network, e.g., in an Integrated Services
Digital Network (ISDN). This includes path search, data forwarding and
service feature processing. The main difference between an ISDN switch
and an MSC is that the MSC also has to consider the allocation and
administration of radio resources and the mobility of the users. The MSC,
therefore, has to provide additional functions for location registration of
users and for the handover of a connection in the case of changing from cell
to cell.
A cellular network can have several MSCs with each being responsible for a
12. 12
part of the network (e.g., a city or metropolitan area). Calls originating from
or terminating in the fixed network are handled by a dedicated Gateway
MSC (GMSC). The interworking of a cellular network and a fixed network
(e.g., PSTN, ISDN) is performed by the Interworking Function (IWF). It is
needed to map the protocols of the cellular network onto those of the
respective fixed network. Connections to other mob ile or international
networks are typically routed over the International Switching Center (ISC)
of the respective country.
A GSM network also contains several types of databases. The Home
Location Register (HLR) and the Visited Location Register (VLR) store the
current location of a mobile user. This is needed since the network must
know the current cell of a user to establish a call to the correct base station.
In addition, these registers store the profiles of users, which are required for
charging and billing and other administrative issues. Two further databases
perform security functions: the Authentication Center (AUC) stores security-
related data such as keys used for authentication and encryption; the
Equipment Identity Register (EIR) registers equipment data rather than
subscriber data.
The network management is organized from a central place, the Operation
and Maintenance Center (OMC). Its functions include the administration of
subscribers, terminals, charging data, network configuration, operation,
performance monitoring and network maintenance. The operation and
13. 13
maintenance functions are based on the concept of the Telecommunication
Management Network (TMN) which is standardized in the ITU-T series
M.30.
8. Give the classification of Logical channels.
On Layer 1 of the OSI Reference Model, GSM defines a series of logical
channels, which are made available either in an unassigned random access
mode or in a dedicated mode assigned to a specific user. Logical channels
are divided into two categories as shown in table
The Traffic Channels (TCHs) are used for the transmission of user payload
data (speech, data). They do not carry any control information of Layer 3.
14. 14
Communication over a TCH can be circuit-switched or packet-switched. In
the circuit-switched case, the TCH provides a transparent data connection
or a connection that is specially treated according to the carried service (e.g.
telephony). For the packet-switched mode, the TCH carries user data of OSI
Layers 2 and 3 according to the recommendations of the X.25 standard or
similar standard packet protocols.
A TCH may either be fully used (full-rate TCH, TCH/F) or be split into two
half-rate channels (half-rate TCH, TCH/H), which can be allocated to
different subscribers. Following ISDN terminology, the GSM traffic channels
are also designated as Bm channel (mobile B channel) or Lm channel
(lower-rate mobile channel, with half the bit rate). A Bm channel is a TCH for
the transmission of bit streams of either 13 kbit/s of digitally coded speech
or of data streams at 14.5, 12, 6 or 3.6 kbit/s. Lm channels are TCH
channels with less transmission bandwidth than Bm channels and transport
speech signals of half the bit rate (TCH/H) or bit streams for data services
with 6 or 3.6 kbit/s.
The control and management of a cellular network demands a very high
signaling effort. Even when there is no active connection, signaling
information (for example, location update information) is permanently
transmitted over the air interface. The G SM signaling channels offer a
15. 15
continuous, packet-oriented signaling service to MSs in order to enable
them to send and receive messages at any time over the air interface to the
BTS. Following ISDN terminology, the GSM signaling channels are also
called Dm channels (mobile D channel).They are further divided into
Broadcast Channel (BCH), Common Control Channel (CCCH) and
Dedicated Control Channel (DCCH)
The unidirectional BCHs are used by the BSS to broadcast the same
information to all MSs in a cell. The group of BCHs consists of three
channels.
Broadcast Control Channel (BCCH): On this channel, a series of information
elements is broadcast to the MSs, which characterize the organization of the
radio network, such as radio channel configurations (of the currently used
cell as well as of the neighboring cells), synchronization information
(frequencies as well as frame numbering) and registration identifiers (LAI,
CI, BSIC). In particular, this includes information about the structural
organization (formats) of the CCCH of the local BTS. The BCCH is
broadcast on the first frequency assigned to the cell (the so-called BCCH
carrier).
Frequency Correction Channel (FCCH): On the FCCH, information about
correction of the transmission frequency is broadcast to the Mss.
16. 16
Synchronization Channel (SCH): The SCH broadcasts information to identify
a BTS, i.e. BSIC. The SCH also broadcasts data for the frame
synchronization of a MS, i.e. Reduced Frame Number (RFN) of the TDMA
frame.
FCCH and SCH are only visible within protocol Layer 1, since they are only
needed for the operation of the radio subsystem. There is no access to them
from Layer 2. In spite of this fact, the SCH messages contain data, which
are needed by Layer 3 for the administr ation of radio resources. These two
channels are always broadcast together with the BCCH.
9. Explain with block diagram the basic elements of the GSM transmission chain.
! A schematic overview of the basic elements of the GSM
transmission chain. The stream of sampled speech data is fed into a source
encoder, which compresses the data by removing unnecessary redundancy.
The resulting information bit sequence is passed to the channel encoder. Its
purpose is to add, in a controlled manner, some redundancy to the
information sequence. This redundancy serves to protect the data against
17. 17
the negative effects of noise and interference encountered in the
transmission through the radio channel. On the receiver side, the introduced
redundancy allows the channel decoder to detect and correct transmission
errors. GSM uses a combination of block and convolutional coding.
Moreover, an interleaving scheme is used to deal with burst errors that
occur over multipath and fading channels. Next, the encoded and
interleaved data are encrypted to guarantee secure and confident data
transmission. The encrypted data are subsequently mapped to bursts which
are then multiplexed as explained in previous sections. Finally, the stream of
bits is differential coded and modulated.
After transmission, the demodulator processes the signal, which was
18. 18
corrupted by the noisy channel. It attempts to recover the actual signal from
the received signal. The next steps are demultiplexing and decryption. The
channel decoder attempts to reconstruct the original information sequence
and, as a final step, the source decoder tries to reconstruct the original
source signal.
10. What is an ad hoc network? Explain.
In ad hoc networks all nodes
are mobile and can be connected dynamically in an arbitrary manner. All
nodes of these networks behave as routers and take part in discovery and
maintenance of routes to other nodes in the network. Ad hoc networks are
very useful in emergency search-and-rescue operations, meetings, or
conventions in which persons wish to quickly share information and data
acquisition operations in inhospitable terrain.
An ad hoc network is a collection of mobile nodes forming a temporary
network without the aid of any centralized administration or standard support
services regularly available in conventional networks. We assume that the
mobile hosts use wireless radio frequency transceivers as their network
interface, although many of the same principles will apply to infrared and
wire-based networks. Some form of routing protocol is necessary in these
ad hoc networks since two hosts wishing to exchange packets may not be
able to communicate directly.
The routing protocols meant for wired networks cannot be used for mobile
ad hoc networks because of the mobility of networks. The ad hoc routing
19. 19
protocols can be divided into two classes: table-driven and on-demand
routing, on the basis of when and how the routes are discovered. In table-
driven routing protocols, consistent and up-to-date routing information to all
nodes is maintained at each node, whereas in on-demand routing the routes
are created only when desired by the source host. We discuss a few of the
current table-driven protocols as well as on-demand protocols.
******************************************